RE: Edward Snowden NSA Snow Job - POLITICO Magazine
12:13 pm EST, Feb 1, 2014
Decius wrote: I'm really getting sick of the rationalizations of the surveillance state.
The people who do need to take responsibility for the fact that a public discussion of these issues didn't come about through a proper process in the first place. The attempt to focus attention on Snowden's flaws is an attempt to divert attention away from that fact.
And on the other hand you have "the people" willingly using shit like this:
Read your text messages (SMS or MMS) - If you add a phone number to your account, this allows us to confirm your phone number automatically by finding the confirmation code that we send via text message.
Download files without notification - This allows us to improve the app experience by pre-loading News Feed content.
Read/write your contacts - These permissions allow you to import your phone’s contacts to Facebook and sync your Facebook contacts to your phone.
Add or modify calendar events and send email to guests without owners’ knowledge - This allows you to see your Facebook events in your phone’s calendar.
Read calendar events plus confidential information - This allows the app to show your calendar availability (based on your phone’s calendar) when you’re viewing an event on Facebook.
Most of the self absorbed glowing gadget fondling generation could not care less about real privacy, arm flailing criticism of NSA spying not withstanding. If they did, they wouldn't be handing their phone over to Facebook in exchange for the dribbling stream of Pavlovian hits of electronic social interaction.
I'm all for complete domestic spying by the NSA, CIA, FBI, and whatever other stupid scary three letter acronym they can come up with if they would do this one simple thing: Run signals intelligence and tracking of people using their goddamn cell phones they can't put down for 5 minutes while they are piloting a 2000+ pound steel projectile at 80 mph, veering into my lane and causing me to have to turn every day's commute into a real life video game of "dodge the encroaching Range Rover." Use that data to kill the phones of people who are within 100 yards of me while I'm driving. I don't want to play an ADD fueled game of chicken with my life, thanks.
India is currently implementing some of the scariest surveillance schemes in the world. This lecture will shed light on India’s surveillance industry, its UID scheme which aims at the collection of all biometric data and on various controversial surveillance schemes, such as the Central Monitoring System (CMS).
Greenwald's partner detained for carrying stolen classified docs
1:31 pm EDT, Aug 19, 2013
Looks like there's more to this story. Still not sure how this equates to "terrorism" though.
First, as we learned from The Guardian itself, Miranda was not just traveling or on vacation -- he was specifically visiting Laura Poitras, a U.S. film-maker based in Berlin who had also received many of the stolen documents from Snowden:
While in Berlin, Miranda had visited Laura Poitras, the US film-maker who has also been working on the Snowden files with Greenwald and the Guardian.
And then, after finding out that Poitras was working with the same stolen, classified materials as Greenwald, we subsequently learned from the New York Times that Poitras is in the practice of using others to transport and hold her sensitive materials for her:
After being detained repeatedly, Poitras began taking steps to protect her data, asking a traveling companion to carry her laptop, leaving her notebooks overseas with friends or in safe deposit boxes. She would wipe her computers and cellphones clean so that there would be nothing for the authorities to see. Or she encrypted her data, so that law enforcement could not read any files they might get hold of. These security preparations could take a day or more before her travels.
So, already the story sounds much different than Greenwald's initial claims. And now we learn, again from the NYT, as now confirmed by Greennwald himself, that Greenwald and Poitras were, in fact, using Miranda as a mule to transport the stolen classified documents:
Mr. Miranda was in Berlin to deliver documents related to Mr. Greenwald’s investigation into government surveillance to Ms. Poitras, Mr. Greenwald said. Ms. Poitras, in turn, gave Mr. Miranda different documents to pass to Mr. Greenwald. Those documents, which were stored on encrypted thumb drives, were confiscated by airport security, Mr. Greenwald said. All of the documents came from the trove of materials provided to the two journalists by Mr. Snowden.
At 6:30 am this morning my time - 5:30 am on the East Coast of the US - I received a telephone call from someone who identified himself as a "security official at Heathrow airport." He told me that my partner, David Miranda, had been "detained" at the London airport "under Schedule 7 of the Terrorism Act of 2000."
David had spent the last week in Berlin, where he stayed with Laura Poitras, the US filmmaker who has worked with me extensively on the NSA stories. A Brazilian citizen, he was returning to our home in Rio de Janeiro this morning on British Airways, flying first to London and then on to Rio. When he arrived in London this morning, he was detained.
The stated purpose of this law, as the name suggests, is to question people about terrorism. The detention power, claims the UK government, is used "to determine whether that person is or has been involved in the commission, preparation or instigation of acts of terrorism."
But they obviously had zero suspicion that David was associated with a terrorist organization or involved in any terrorist plot. Instead, they spent their time interrogating him about the NSA reporting which Laura Poitras, the Guardian and I are doing, as well the content of the electronic products he was carrying. They completely abused their own terrorism law for reasons having nothing whatsoever to do with terrorism: a potent reminder of how often governments lie when they claim that they need powers to stop "the terrorists", and how dangerous it is to vest unchecked power with political officials in its name.
This is obviously a rather profound escalation of their attacks on the news-gathering process and journalism. It's bad enough to prosecute and imprison sources. It's worse still to imprison journalists who report the truth. But to start detaining the family members and loved ones of journalists is simply despotic.
I'm having something similar to Decius' inexplicable Twitter lockout experience a while back. Signed up for LinkedIn a couple of days ago. I've been diligently building out my network like they encourage you to do. I signed in this morning and I got this:
Account Restricted | LinkedIn
Your LinkedIn account has been temporarily restricted
Contact our customer service team to get this resolved as soon as possible.
Clicking the link to the "customer service team" takes you to a generic form that asks for your name and email address. It auto-populates the subject line with "Account High Restricted" and the form says "Your Question"
When you submit you get:
Your question has been submitted to LinkedIn
The ticket reference number for your question is: #
You've successfully submitted your question, and we'll send you a confirmation email soon.
Go to your Support History page to check out your ticket.
What's really funny is when you click the link for "Support History" it loops you back to "Your LinkedIn account has been temporarily restricted.
I love mediated online social mechanisms with arbitrary kill switches!
Training the Next Generation: Predator Toy Drone at Amazon
1:19 pm EST, Jan 6, 2013
My son is very interested in joining the Imperial forces when he grows up. He says he's not sure if he wants to help police the homeland or if he wants to invade foreign countries. So I thought a new Predator drone toy would be a nice gift for him. These drones are used both domestically and internationally, to spy on people and assassinate them at the Emperor's discretion. He just loves flying his drone around our house, dropping Hellfire missiles on Scruffy, our dog. He kept saying that Scruffy was a terror suspect and needed to be taken out. I asked him if Scruffy should get a trial first, and he quoted Lindsay Graham, Imperial Senator: "Shut up Scruffy, you don't get a trial!" I was so proud. I think I'll buy him some video games that promote martial law for Christmas.
I bought this for my son and he spent countless, blissful hours simulating massacres of weddings, funerals, and other family gatherings of brown skinned foreigners! He even realized that if he circled the drone back around on the first responders, his effective kill rate soared! Neat-o!
This is the best toy ever. Finally, I can pretend that I'm a winner of the Nobel Peace Prize! It's like I'm sitting right there in the White House with my very own kill list!
Bookmarked for future reference. I had been thinking about a way to "load balance" traffic across multiple Snort instances and thought about applying something like Cisco's etherchannel load-balance srt-dst-ip hashing algorithm.
Lo and behold, I found this great BPF kludge!
In our example, there will be four nodes monitoring traffic, so the BPF looks like this for the first node: (ip[14:2]+ip[18:2]) - (4*((ip[14:2]+ip[18:2])/4)) == 0 So, in /etc/bro/local.bro, we have this: redef cmd_line_bpf_filter="(ip[14:2]+ip[18:2]) - (4*((ip[14:2]+ip[18:2])/4)) == 0"; On the second node, we would have this: redef cmd_line_bpf_filter="(ip[14:2]+ip[18:2]) - (4*((ip[14:2]+ip[18:2])/4)) == 1"; Third: redef cmd_line_bpf_filter="(ip[14:2]+ip[18:2]) - (4*((ip[14:2]+ip[18:2])/4)) == 2"; And fourth: redef cmd_line_bpf_filter="(ip[14:2]+ip[18:2]) - (4*((ip[14:2]+ip[18:2])/4)) == 3";
Special note: If you are monitoring a link that is still vlan tagged (like from an RSPAN), then you will need to stick vlan && in front of each of the BPF's.