| |
"I don't think the report is true, but these crises work for those who want to make fights between people." Kulam Dastagir, 28, a bird seller in Afghanistan
|
|
Captured: America in Color from 1939-1943 – Plog Photo Blog |
|
|
Topic: Miscellaneous |
1:25 pm EDT, Aug 5, 2010 |
These images, by photographers of the Farm Security Administration/Office of War Information, are some of the only color photographs taken of the effects of the Depression on America’s rural and small town populations. The photographs are the property of the Library of Congress and were included in a 2006 exhibit Bound for Glory: America in Color.
Captured: America in Color from 1939-1943 – Plog Photo Blog |
|
Google, CIA Invest in 'Future' of Web Monitoring |
|
|
Topic: Surveillance |
9:19 am EDT, Aug 5, 2010 |
Noah Shachtman: The company is called Recorded Future, and it scours tens of thousands of websites, blogs and Twitter accounts to find the relationships between people, organizations, actions and incidents -- both present and still-to-come.
CEO Christopher Ahlberg: We can assemble actual real-time dossiers on people.
Decius: Money for me, databases for you.
Decius: What you tell Google you've told the government.
Eric Schmidt: If you have something that you don't want anyone to know, maybe you shouldn't be doing it in the first place.
Google, CIA Invest in 'Future' of Web Monitoring |
|
Topic: Surveillance |
9:09 am EDT, Aug 5, 2010 |
Julian Sanchez: They're calling it a tweak. Yet those four little words would make a huge difference.
I can see both sides of this dispute. It really boils down to what you think the scope of the term is. I tend to agree that the term ought to be clearly defined, and that is part of the problem. Congress will need to wade into this water and clearly regulate what kinds of electronic transactional records are available without court review. A very good example is locational information from the cellular phone system. The FBI wants it without a warrant, some courts have argued that a warrant would be required. This change may push the argument in the FBI's favor. The fact is that we're going to need to see some limit on warrantless collection of transactional information if we're going to maintain some semblance of a right against unreasonable privacy intrusions in a world where everything that we do is constantly being recorded by computers. Obama's Power Grab |
|
Cisco’s Wiretap Security Flaws Not Getting Fixed - The Firewall - the world of security - Forbes |
|
|
Topic: Miscellaneous |
11:17 pm EDT, Aug 4, 2010 |
Coverage of my talk at Blackhat Vegas. The larger barrier to closing the gaps in networking equipments’ wiretap functions may be what Cross calls a “market failure.” Unlike many security vulnerabilities in products, the product’s buyer isn’t the one who suffers from this flaw. Internet service providers want to make sure they comply with law enforcement’s demands, and agencies who use the intercept function want it to provide the maximum surveillance, with as few people aware of the wiretap as possible. “Network providers aren’t demanding [a fix],” says Cross. “The customer for this is law enforcement. You are not the customer.”
Cisco’s Wiretap Security Flaws Not Getting Fixed - The Firewall - the world of security - Forbes |
|
Legal wiretap mechanisms may be open to abuse within ISPs |
|
|
Topic: Miscellaneous |
11:14 pm EDT, Aug 4, 2010 |
Coverage of my talk at Blackhat Vegas. "To me this is bizarre," Cross says, because it makes it impossible to demonstrate that someone has tapped communication illegally. He says he understands law enforcement officials want the feature because it prevents insiders at the ISPs from checking the logs to spot what the cops are tapping and tipping off the parties being investigated. But still, "There's no way to see if a person is lying if they say they didn't tap a line," he says.
Legal wiretap mechanisms may be open to abuse within ISPs |
|
The Volokh Conspiracy - What Is “Project Vigilant,” and Is It Violating the Law? |
|
|
Topic: Miscellaneous |
9:08 am EDT, Aug 4, 2010 |
Greenwald’s coverage suggests that the group is in cahoots with the feds, and that it is conducting some sort of mass surveillance of lots of people and then handing over the leads to the federal government. If that is true — which remains unclear to me — then the legality of the project’s work strikes me as questionable.
The Volokh Conspiracy - What Is “Project Vigilant,” and Is It Violating the Law? |
|
US Government performing warrantless Internet wiretapping through EULA loopholes |
|
|
Topic: Miscellaneous |
10:46 pm EDT, Aug 3, 2010 |
According to Uber, one of Project Vigilant's manifold methods for gathering intelligence includes collecting information from a dozen regional U.S. Internet service providers (ISPs). Uber declined to name those ISPs, but said that because the companies included a provision allowing them to share users' Internet activities with third parties in their end user license agreements (EULAs), Vigilant was able to legally gather data from those Internet carriers and use it to craft reports for federal agencies. A Vigilant press release says that the organization tracks more than 250 million IP addresses a day and can "develop portfolios on any name, screen name or IP address." "We don't do anything illegal," says Uber. "If an ISP has a EULA to let us monitor traffic, we can work with them. If they don't, we can't."
Jesus Christ! If this is even remotely true it will be a massive scandal. The ISP industry needs to come clean on this now. Hopefully its a bunch of lies. Bejtlich is not buying it. US Government performing warrantless Internet wiretapping through EULA loopholes |
|
Julian Assange Responds to Increasing US Government Attacks on WikiLeaks |
|
|
Topic: Miscellaneous |
10:27 pm EDT, Aug 3, 2010 |
Very interesting and up to date interview with Assange: I see this a bit as a floating balloon that Thiessen has put up. Of course, he is no doubt doing it in order to show that he’s at the vanguard of that school of thought. And it will be seen whether that balloon gets shot down or not by the American people. And if it doesn’t get shot down by criticism, then it will be assumed that that behavior is in some way acceptable... If the political will in the United States doesn’t shoot down these floating balloons that Rogers and Thiessen are putting up, then we could see a shift towards finding that behavior or similar behavior acceptable. People have to shoot those statements down; otherwise, they will become the new norm.
Julian Assange Responds to Increasing US Government Attacks on WikiLeaks |
|
Marc A. Thiessen - WikiLeaks must be stopped |
|
|
Topic: Miscellaneous |
10:45 pm EDT, Aug 2, 2010 |
I was absolutely horrified by this editorial in the Washington Post in which a former Bush Administration official calls for US Cyber Command to declare war on the Internet by DDOSing wikileaks. (Liz Cheney has also apparently come out in support of this position, so clearly there is a coordinated effort going on here.) Assange recently boasted that he has created "an uncensorable system for untraceable mass document leaking." I am sure this elicited guffaws at the National Security Agency... With the stroke of his pen, the president can authorize USCYBERCOM to protect American and allied forces by eliminating WikiLeaks' ability to disseminate classified information that puts their lives at risk. WikiLeaks represents a clear and present danger to the national security of the United States... Will President Obama stop WikiLeaks from doing so -- or sit back and do nothing?
This would result in a massive counter-reaction from people who don't believe that the United States should use DDOS attacks to censor information it doesn't like on the Internet. The Wikileaks files would end up all over the place and the fundamental question of freedom of speech would completely overshadow the question of whether or not it was irresponsible for wikileaks to repost this material unredacted. US Cyber Command would be forced into an ugly conflict with a large group of the general public, including American citizens, that would have repercussions for years into the future. The mere fact that this has been suggested by these people itself constitutes a significant problem. US Cyber Command has an important mission, but it must now be considered a weapon that may be pointed at the American public, and that fact will cloud future discussions about its development. Stupid. Marc A. Thiessen - WikiLeaks must be stopped |
|
Wikileaks' estranged co-founder becomes a critic (Q&A) | Privacy Inc. - CNET News |
|
|
Topic: Miscellaneous |
12:40 am EDT, Jul 31, 2010 |
John Young: You cannot provide any security over the Internet, much less any other form of communication. We actually post periodically warnings not to trust our site. Don't believe us. We offer no protection. You're strictly on your own. We also say don't trust anyone who offers you protection, whether it's the U.S. government or anybody else. That's a story they put out. It's repeated to people who are a little nervous. They think they can always find someone to protect them. No, you can't. You've got to protect yourself. You know where I learned that? From the cypherpunks.
Wikileaks' estranged co-founder becomes a critic (Q&A) | Privacy Inc. - CNET News |
|