• Home
  •  » High Street
  •  » The Bush-Obama-Trump Whitehouse - Your privacy down the shitter

#851 2015-10-19 21:08:54

https://cruelery.com/sidepic/rabidblogger.png


Stoner kid claims he hacked CIA Director's email.

Auto-edited on 2020-08-02 to update URLs

Offline

 

#852 2015-10-21 09:49:33

https://cruelery.com/sidepic/serveandprotect.png


The NYPD, a municipal police department, becomes a spy agency.

Auto-edited on 2020-08-02 to update URLs

Offline

 

#853 2015-10-21 10:33:39

Even before 9/11, NYC was quickly devolving into the police-iest police state of them all.  Fuck that place.

Grumble grumble I remember Time Square when it had street preachers and hookers on the same corner grumble grumble fucking weapons of mass consumption Disneyfied bullshit grumble grumble.

Auto-edited on 2020-08-02 to update URLs

Offline

 

#854 2015-10-21 12:31:42

XregnaR wrote:

Grumble grumble I remember Time Square when it had street preachers and hookers on the same corner grumble grumble fucking weapons of mass consumption Disneyfied bullshit grumble grumble.

My old man's office was on the Empire State Bldg's 44th floor when I was in grade school, when you could still open its upper storey windows and amuse yourself tossing pennies... until Time Square's quarter peep shows beckoned below.

https://cruelery.com/sidepic/hsovmidnightcowboy.jpg



Auto-edited on 2020-08-02 to update URLs

Offline

 

#855 2015-10-21 15:07:47

Confirmed - we be old.

Offline

 

#856 2015-10-23 23:38:46

I don't actually know what this means, but it seems sorta sinister and encouraging at the same time.

Offline

 

#857 2015-10-24 01:34:15

George Orr wrote:

I don't actually know what this means, but it seems sorta sinister and encouraging at the same time.

Is it state sponsored fuckery, organized crime, or a joint venture? Only her hairdresser knows for sure.

Offline

 

#858 2015-10-24 19:31:15

While it's tempting to think of the story as Max Headroom-style subversion of the tools of social control, I'm less optimistic.  It's more like someone ripping a surveillance camera off the wall and using it to smash the windows of nearby cars to steal from them.  Actually, in that example, the impact on the camera operator would be much greater than what we're seeing here.

Now, if people start hacking the cameras to actually alter the video they spit out, that's another story...

Offline

 

#859 2015-10-26 16:26:39

IRS

Offline

 

#860 2015-10-28 18:06:12

Let's just have industry do the spying for us.

In essence, the measure provides corporate America with legal immunity when sharing data about hacks and digital breaches with the Department of Homeland Security. The DHS can then funnel that information to other agencies, including the NSA and FBI.

How did your Senators vote?

Offline

 

#861 2015-10-28 18:39:42

Don't just suck up all the license plate data: share it with the world.

Earlier this year, EFF learned that more than a hundred ALPR cameras were exposed online, often with totally open Web pages accessible by anyone with a browser.

Offline

 

#862 2015-10-29 15:06:51

At least somebody in Texas has their priorities straight:  Cruz (R-TX), Not Voting

Offline

 

#863 2015-10-29 18:54:54

For once, a massive and welcome hack.

Can anyone explain to me why China applying what they learn about our misbegotten health care system for their own 2020 rollout harms the US in any way?

Dollars to donuts, they manage better than we ever have. Hopefully, we'll learn something.

Offline

 

#864 2015-11-08 17:22:40

Move over, GCHQ - MI5 has been doing its own mass surveillance.

Offline

 

#865 2015-11-08 17:48:59

Leaks are bad, mmmkay?  Except when we do them.

Offline

 

#866 2015-11-10 01:14:14

One judge goes off script.

Judge Richard Leon wrote:

Thus, for all the reasons stated herein, I will grant plaintiffs J.J. Little and J.J. Little & Associates' requests for an injunction and enter an order consistent with this Opinion that (1) bars the Government from collecting, as part of the NSA's Bulk Telephony Metadata Program, any telephone metadata associated with these plaintiffs' Verizon Business Network Services accounts and (2) requires the Government to segregate any such metadata in its possession that has already been collected.

Offline

 

#867 2015-11-13 01:55:04

square wrote:

One judge goes off script.

Well, that was quick.

The appeals court, meanwhile, stayed the Monday ruling "until further order of the court." . . . The appellate court issued its order Tuesday, hours after the President Barack Obama administration made the request.

Offline

 

#868 2015-11-13 01:58:05

We mostly tell you about security flaws, mostly.

The U.S. National Security Agency, seeking to rebut accusations that it hoards information about vulnerabilities in computer software, thereby leaving U.S. companies open to cyber attacks, said last week that it tells U.S. technology firms about the most serious flaws it finds more than 90 percent of the time.

The re-assurances may be misleading, because the NSA often uses the vulnerabilities to make its own cyber-attacks first, according to current and former U.S. government officials. Only then does NSA disclose them to technology vendors so that they can fix the problems and ship updated programs to customers, the officials said.

Offline

 

#869 2015-11-13 02:06:32

Too stupid to locate suspects yourself?  Pesky legal barriers in the way?  Just outsource your dragnet snooping to academia.

The Tor Project on Wednesday afternoon sent WIRED a statement from its director Roger Dingledine directly accusing Carnegie Mellon [University] of providing its Tor-breaking research in secret to the FBI in exchange for a payment of "at least $1 million."

Offline

 

#871 2015-11-16 12:52:38

https://cruelery.com/sidepic/edwardsnowden.png


Snowden's Practical Privacy Primer

Auto-edited on 2020-08-02 to update URLs

Offline

 

#872 2015-11-29 20:14:24

NSA's shell game.

Though it was revealed by Edward Snowden in June 2013, the National Security Agency's (NSA) infamous secret program to domestically collect Americans' e-mail metadata in bulk technically ended in December 2011. Or so we thought. A new document obtained through a lawsuit filed by The New York Times confirms that this program effectively continued under the authority of different government programs with less scrutiny from the Foreign Intelligence Surveillance Court (FISC).

Offline

 

#873 2015-12-01 04:24:35

https://cruelery.com/sidepic/freedomsilence.png

And the gag order remained in place even after Nick [Merrill of Calyx Internet] had persuaded Congress and the courts to narrow the NSL [National Security Letter] statute. It wasn't until 2010 -- six years after the gag order was imposed -- that Nick was permitted to identify himself as the recipient of an NSL. Even then, the FBI insisted that Nick not disclose the attachment that listed the kinds of records the FBI had demanded Calyx turn over.

Now, more than 11 years after the order was imposed, the district court has lifted the gag order in its entirety.

Auto-edited on 2020-08-02 to update URLs

Offline

 

#874 2015-12-01 05:59:49

Let's see... intelligence agencies focus their effort on collecting wholesale data on you, me, and millions of other innocents and pushing for encryption backdoors.  Meanwhile, actual known terrorists who don't even bother using encryption aren't picked up.  Just who are we paying these people to watch?

Offline

 

#875 2015-12-01 14:13:51

square wrote:

Let's see... intelligence agencies focus their effort on collecting wholesale data on you, me, and millions of other innocents and pushing for encryption backdoors.  Meanwhile, actual known terrorists who don't even bother using encryption aren't picked up.  Just who are we paying these people to watch?

They just get together on these online gaming sites and go into a private chat room.  I wouldn't even try to estimate the number of people that do this on a daily basis.
(Online gaming sites around the world X people who at least once private chatted in one) + The entire Internet Relay Chat system, but especially #alt.

Offline

 

#876 2015-12-01 14:21:03

Baywolfe wrote:

square wrote:

Let's see... intelligence agencies focus their effort on collecting wholesale data on you, me, and millions of other innocents and pushing for encryption backdoors.  Meanwhile, actual known terrorists who don't even bother using encryption aren't picked up.  Just who are we paying these people to watch?

They just get together on these online gaming sites and go into a private chat room.  I wouldn't even try to estimate the number of people that do this on a daily basis.
(Online gaming sites around the world X people who at least once private chatted in one) + The entire Internet Relay Chat system, but especially #alt.

It's always easier and more effective to hide in plain sight.

Offline

 

#877 2015-12-10 00:41:52

Good summary of how intelligence agencies and their stooges are using the deaths in Paris to attack encryption, despite the fact that it had nothing to do with them.

Offline

 

#878 2015-12-31 06:21:39

Surprise, surprise: surveillance only goes one way.

The Home Office has refused to make Theresa May's internet browsing history public under freedom of information rules, arguing that a request to do so is "vexatious".

The Independent requested the Home Secretary's work browsing history for the last week of October under the Freedom of Information Act.

Under the new Investigatory Powers Bill announced by Ms May the internet browsing history of everyone in the UK will have to be stored for a year and police and security services will be able to access the list of visited websites without any warrant.

Offline

 

#879 2015-12-31 06:47:10

Oh, you actually expected us to stop?

U.S. lawmakers said Wednesday they are investigating whether the National Security Agency spied on members of Congress while electronically eavesdropping on Israeli Prime Minister Benjamin Netanyahu during the Iran nuclear deal negotiations. . . .

Obama promised agencies would cease monitoring allied nations after the Edward Snowden document releases showed that the NSA had monitored the private communications of dozens of world leaders. German Chancellor Angela Merkel, French President François Hollande and other NATO leaders were taken off the spy list, the Journal reported Tuesday, but Obama authorized an ongoing dragnet on Netanyahu and other Israeli leaders, citing a "compelling national security purpose."

Offline

 

#880 2016-01-09 01:23:35

"Collect it all" doesn't work.

William Binney, a former technical director of the US National Security Agency (NSA), told parliamentarians that the plans for bulk collection of communications data tracking everyone's internet and phone use are "99% useless" because they would swamp intelligence analysts with too much data.

Offline

 

#881 2016-01-09 01:34:39

https://cruelery.com/sidepic/houseboats.jpg



Auto-edited on 2020-08-02 to update URLs

Offline

 

#882 2016-01-10 18:24:45

square wrote:

"Collect it all" doesn't work.

William Binney, a former technical director of the US National Security Agency (NSA), told parliamentarians that the plans for bulk collection of communications data tracking everyone's internet and phone use are "99% useless" because they would swamp intelligence analysts with too much data.

I, and I'm sure a bazillion other people, have been saying that for years.  Collect the fucking data, we still don't have intelligent enough software or fast enough computers to process it.

Offline

 

#884 2016-01-13 05:50:03

Baywolfe wrote:

square wrote:

"Collect it all" doesn't work.

William Binney, a former technical director of the US National Security Agency (NSA), told parliamentarians that the plans for bulk collection of communications data tracking everyone's internet and phone use are "99% useless" because they would swamp intelligence analysts with too much data.

I, and I'm sure a bazillion other people, have been saying that for years.  Collect the fucking data, we still don't have intelligent enough software or fast enough computers to process it.

That's only a problem for now, while Moore's Law is mostly defunct it still carries some weight.

Offline

 

#885 2016-01-13 11:18:08

Emmeran wrote:

Baywolfe wrote:

square wrote:

"Collect it all" doesn't work.

I, and I'm sure a bazillion other people, have been saying that for years.  Collect the fucking data, we still don't have intelligent enough software or fast enough computers to process it.

That's only a problem for now, while Moore's Law is mostly defunct it still carries some weight.

Not that I'd be concerned if they could do it right now but, I'll be dead by then anyway.  Fuck everybody else.

Offline

 

#886 2016-01-24 19:23:49

The article's a bit technical, but not surprising: UK spy arm GCHQ discourages a secure telephone encryption standard (MIKEY-IBAKE), preferring a standard that allows undetectable mass surveillance (MIKEY-SAKKE).

MIKEY-SAKKE is the security protocol behind the Secure Chorus voice (and also video) encryption standard, commissioned and designed by GCHQ through their information security arm, CESG. GCHQ have announced that they will only certify voice encryption products through their Commercial Product Assurance (CPA) security evaluation scheme if the product implements MIKEY-SAKKE and Secure Chorus. As a result, MIKEY-SAKKE has a monopoly over the vast majority of classified UK government voice communication and so companies developing secure voice communication systems must implement it in order to gain access to this market. GCHQ can also set requirements of what products are used in the public sector and as well as for companies operating critical national infrastructure. . . .

Although the words are never used in the specification, MIKEY-SAKKE supports key escrow. That is, if the network provider is served with a warrant or is hacked into it is possible to recover responder private keys and so decrypt past calls without the legitimate communication partners being able to detect this happening. Secure Chorus facilitates undetectable mass surveillance, in a way that EDH [ephemeral Diffie-Hellman] based key encryption schemes would not. This is presented as a feature rather than bug, with the motivating case in the GCHQ documentation being to allow companies to listen to their employees calls when investigating misconduct, such as in the financial industry. . . .

GCHQ's submission to the committee provides an analysis of MIKEY-IBAKE and points out the security features which result from its use of EDH - forward security and resistance to passive eavesdropping - are incompatible with their requirements of allowing large scale undetectable surveillance, both from a technical and legal perspective. Consequently GCHQ requested that MIKEY-IBAKE should not be used, stating:

"In light of these requirements, UK government has developed a similar scheme, MIKEY-SAKKE, which supports 3GPP SA3 LI [lawful interception] requirements and has additional benefits such as low latency."

Somehow, having private master keys in the hands of telecoms, sure to be the target of every intelligence agency and skilled hacker, isn't weakening encryption.

Nor does GCHQ want security products to be weakened by forcing products in the UK to have "so-called backdoors," [GCHQ Director Robert] Hannigan claimed.

"We have never said this and we do not want this," he added. "Products should be secure. We work with companies to help make them secure."

Offline

 

#888 2016-01-27 03:02:29

http://cdn.arstechnica.net/wp-content/uploads/2016/01/FullSizeRender-640x480.jpg
Haven't read it myself yet, but this looks like a must-have book for anyone who's made it this far into the thread.

Offline

 

#889 2016-01-28 01:44:51

How do you handle a lawyer who exposes illegal behavior but is impractical to prosecute? Try to get him disbarred.

A former Justice Department lawyer is facing legal ethics charges for exposing the President George W. Bush-era surveillance tactics--a leak that earned The New York Times a Pulitzer and opened the debate about warrantless surveillance that continues today.

The lawyer, Thomas Tamm, now a Maryland state public defender, is accused of breaching Washington ethics rules for going to The New York Times instead of his superiors about his concerns about what was described as "the program."

Offline

 

#890 2016-01-28 04:19:22

square wrote:

How do you handle a lawyer who exposes illegal behavior but is impractical to prosecute? Try to get him disbarred.

According to the National Law Journal, which broke the story Tuesday, the bar review panel opened Tamm's case in 2009, and the charges were lodged in December. The delay was attributed to a "backlog" of cases. Tamm is expected to respond to the ethics charges next month. His attorney said the allegations were a "shame."

There is no evidence here anywhere of shame for the sham, the lies on top of lies at one stroke responsible for erasing 200-odd years of US faith in due process.

No, demoting a lawyer at the top of his profession to defense of the indigent wasn't enough.

https://cruelery.com/sidepic/coinreturn.jpg


The phone booth Thomas Tamm employed to alert the NYT.

Auto-edited on 2020-08-02 to update URLs

Last edited by choad (2016-01-28 08:06:38)

Offline

 

#891 2016-02-04 02:01:30

square wrote:

Academic freedom? We've heard of it.

What happens when you hire former Secretary of Homeland Security Janet Napolitano to be in charge of your university system?

In recent weeks The Senate-Administration Joint Committee on Campus Information Technology (JCCIT) has learned that UCOP [University of California system Office of the President] installed hardware on the campus network designed to monitor and possibly record all network traffic coming or going to the campus.
This secret monitoring is on-going.
UCOP would like these facts to remain secret. However, the tenured faculty on the JCCIT are in agreement that continued silence on our part would make us complicit in what we view as a serious violation of shared governance and a serious threat to the academic freedoms that the Berkeley campus has long cherished.
Some salient facts:
- The UCOP had this hardware installed last summer.
- They did so over the objections of our campus IT and security experts.
- For many months UCOP required that our IT staff keep these facts secret from faculty and others on the Berkeley campus.
- The intrusive hardware is not under the control of local IT staff--it sends data on network activity to UCOP and to the vendor. Of what these data consists we do not know.
- The intrusive device is capable of capturing and analyzing all network traffic to and from the Berkeley campus, and has enough local storage to save over 30 days of *all* this data ("full packet capture"). This can be presumed to include your email, all the websites you visit, all the data you receive from off campus or data you send off campus.
- UCOP defends their actions by relying on secret legal determinations and painting lurid pictures of "advanced persistent threat actors" from which we must be kept safe. They further promise not to invade our privacy unnecessarily, while the same time implementing systems designed to do exactly that.

Offline

 

#892 2016-02-04 02:10:58

Rest easy, Europeans! You're now safe behind the EU-US Privacy ShieldTM!

"The US has clarified that they do not carry out indiscriminate mass surveillance of European citizens," [European Commission vice president Andrus] Ansip said.

Offline

 

#893 2016-02-04 12:11:01

square wrote:

This secret monitoring is on-going.
UCOP would like these facts to remain secret. However, the tenured faculty on the JCCIT are in agreement that continued silence on our part would make us complicit in what we view as a serious violation of shared governance and a serious threat to the academic freedoms that the Berkeley campus has long cherished.

2014-12-01: 50th anniversary of the Free Speech Movement

Offline

 

#894 2016-02-09 05:28:42

The British are coming (again).

If U.S. and British negotiators have their way, MI5, the British domestic security service, could one day go directly to American companies such as Facebook or Google with a wiretap order for the online chats of British suspects in a counterterrorism investigation.

The transatlantic allies have quietly begun negotiations this month on an agreement that would enable the British government to serve wiretap orders directly on U.S. communication firms for live intercepts in criminal and national security investigations involving its own citizens. Britain would also be able to serve orders to obtain stored data, such as emails. . . .

The negotiating text was silent on the legal standard the British government must meet to obtain a wiretap order or a search warrant for stored data. Its system does not require a judge to approve search and wiretap warrants for surveillance based on probable cause, as is done in the United States. Instead, the home secretary, who oversees police and internal affairs, approves the warrant if that cabinet member finds that it is "necessary" for national security or to prevent serious crime and that it is "proportionate" to the intrusion.

Offline

 

#895 2016-02-09 12:35:20

Isn't this the job of INTERPOL?  When did the British FBI get that kind of powers?

Offline

 

#896 2016-02-11 01:32:04

Genuine surprise: someone in government stands up for encryption.

A State or political subdivision of a State may not mandate or request that a manufacturer, developer, seller, or provider of covered products or services--

(1) design or alter the security functions in its product or service to allow the surveillance of any user of such product or service, or to allow the physical search of such product, by any agency or instrumentality of a State, a political subdivision of a State, or the United States; or

(2) have the ability to decrypt or otherwise render intelligible information that is encrypted or otherwise rendered unintelligible using its product or service.

Offline

 

#897 2016-02-11 01:44:03

Not so surprising.

"Smart devices incorporated into the electric grid, vehicles--including autonomous vehicles--and household appliances are improving efficiency, energy conservation, and convenience. However, security industry analysts have demonstrated that many of these new systems can threaten data privacy, data integrity, or continuity of services. In the future, intelligence services might use the [Internet of Things] for identification, surveillance, monitoring, location tracking, and targeting for recruitment, or to gain access to networks or user credentials," [Director of National Intelligence James] Clapper said, according to his prepared testimony before the Senate Select Committee on Intelligence. . . .

Clapper's remarks on the Internet of Things are remarkable because they come from the nation's top spy chief, and they likely mean that US spy agencies are trying to exploit it.

Offline

 

#898 2016-02-11 05:50:30

square wrote:

Not so surprising.

"Smart devices incorporated into the electric grid, vehicles--including autonomous vehicles--and household appliances are improving efficiency, energy conservation, and convenience. However, security industry analysts have demonstrated that many of these new systems can threaten data privacy, data integrity, or continuity of services. In the future, intelligence services might use the [Internet of Things] for identification, surveillance, monitoring, location tracking, and targeting for recruitment, or to gain access to networks or user credentials," [Director of National Intelligence James] Clapper said, according to his prepared testimony before the Senate Select Committee on Intelligence. . . .

Clapper's remarks on the Internet of Things are remarkable because they come from the nation's top spy chief, and they likely mean that US spy agencies are trying to exploit it.

So bugging just got a little easier it wasn't all that difficult in the first place once the age of electronics was upon us.

Offline

 

#899 2016-02-11 11:34:24

Emmeran wrote:

square wrote:

Not so surprising.

"Smart devices incorporated into the electric grid, vehicles--including autonomous vehicles--and household appliances are improving efficiency, energy conservation, and convenience. However, security industry analysts have demonstrated that many of these new systems can threaten data privacy, data integrity, or continuity of services. In the future, intelligence services might use the [Internet of Things] for identification, surveillance, monitoring, location tracking, and targeting for recruitment, or to gain access to networks or user credentials," [Director of National Intelligence James] Clapper said, according to his prepared testimony before the Senate Select Committee on Intelligence. . . .

Clapper's remarks on the Internet of Things are remarkable because they come from the nation's top spy chief, and they likely mean that US spy agencies are trying to exploit it.

So bugging just got a little easier it wasn't all that difficult in the first place once the age of electronics was upon us.

No, the difficulty is not with accessing the data, it's with the enormous volume of data when you're scatter shooting as opposed to legal specific access to a single person's data.  I still think they're going to have to wade through dick pictures regardless.

Offline

 

#900 2016-02-17 23:59:50

Will Apple allow the FBI to torture its iPhone, make it confess and burn down the US tech sector in the process?

No link. All anyone can predict from here is this won't end well.

https://cruelery.com/sidepic/oligopoly.png



Auto-edited on 2020-08-02 to update URLs

Offline

 
  • Home
  •  » High Street
  •  » The Bush-Obama-Trump Whitehouse - Your privacy down the shitter

Board footer

cruelery.com