Page 4 of 6 FirstFirst 123456 LastLast
Results 76 to 100 of 134
  1. #76
    dangerous floater Winehole23's Avatar
    My Team
    San Antonio Spurs
    Join Date
    Nov 2008
    Post Count
    89,639
    Yet another Foreign Intelligence Surveillance Court (FISC) judge has blasted United States intelligence officials for disregarding the court’s guidelines for domestic surveillance of American e-mail metadata traffic, a program that ran for around a decade before ending in 2011.


    “[National Security Agency’s] record of compliance with these rules has been poor,” wrote Judge John D. Bates in a 117-page opinion (PDF) whose date was redacted. The opinion is just one of a series of do ents released and declassified late Monday evening by the Office of the Director of National Intelligence (ODNI).


    “Most notably, NSA generally disregarded the special rules for disseminating United States person information outside of NSA until it was ordered to report such disseminations and certify to the FISC that the required approval had been approved. The government has provided no meaningful explanation why these violations occurred, but it seems likely that widespread ignorance of the rules was a contributing factor.”
    http://arstechnica.com/tech-policy/2...-continuously/

  2. #77
    dangerous floater Winehole23's Avatar
    My Team
    San Antonio Spurs
    Join Date
    Nov 2008
    Post Count
    89,639
    In the August 2013 release, Judge Reggie Walton lambasted the government’s mistakes on the business records metadata collection program.


    According to his newly-released March 2009 FISC order (PDF), the court required the NSA to only access the vast metadata archive when there is a “reasonable, articulable su ion that the telephone identifier is associated with [REDACTED]” as of February 2009. (Presumably that association has something to do with a terrorism or national security threat.)

    That same 2009 FISC order says that the government had not lived up to the court’s requirements.

    Before the FISC’s initial authorization of the metadata sharing program in May 2006, the NSA developed an "alert list process" that compared telephone numbers to incoming data from its "business record (BR)" collection.

    Thus, since the earliest days of the FISC-authorized collection of call-detail records by the NSA, the NSA has, on a daily basis, accessed the BR metadata for purposes of comparing thousands of non-RAS approved telephone identifiers on its alert list against the BR metadata in order to identify any matches. Such access was prohibited by the governing minimization procedures under each of the relevant Court orders, as the government concedes in its submission.

    The government’s submission suggests that its non-compliance with the Court’s orders resulted from a belief by some personnel within the NSA that some of the Court’s restrictions on access to the BR metadata applied only to “archived data,” i.e., data residing within certain databases at the NSA. That interpretation of the Court’s Orders strains credulity. It is difficult to imagine why the Court would intend the applicability of the RAS requirements—a critical component of the procedures proposed by the government and adopted by the Court—to turn on whether or not the data being access has been “archived” by the NSA in a particular database at the time of the access. Indeed, to the extent that the NSA makes the decision about where to store incoming BR metadata and when the archiving occurs, such an illogical interpretation of this Court’s Orders renders compliance with the RAS requirement merely optional.


    Walton also noted that the government was collecting mostly data on non-suspect US persons:


    [N]early all of the call detail records collected pertain to communications of non-US persons who are not the subject of an FBI investigation to obtain foreign intelligence information, are communications of US persons who are not the subject of an FBI investigation to protect against international terrorism or clandestine intelligence activities, and are data that otherwise could not be legally captured in bulk by the government. Ordinarily, this alone would provide sufficient grounds for an FISC judge to deny the application.


    The judge said that the court has approved the government’s metadata collection program due to sworn testimony that these programs were necessary and that there were “specific oversight requirements.”

    “To approve such a program, the Court must have every confidence that the government is doing its utmost to ensure that those responsible for implementation fully comply with the Court’s orders,” he wrote. “The Court no longer has such confidence.”
    http://arstechnica.com/tech-policy/2...cking-program/

  3. #78
    dangerous floater Winehole23's Avatar
    My Team
    San Antonio Spurs
    Join Date
    Nov 2008
    Post Count
    89,639
    Judge Kollar-Kotelly outlined very specific guidelines for the intelligence community to use this information, in particular what may be one of the earliest uses of the “reasonable articulable su ion” (RAS) standard. As she concluded:

    Such information shall be accessed only through queries using the contact chaining [REDACTED] methods described at page 43 above. Such queries shall be performed only on the basis of a particular known [REDACTED] after the NSA has concluded, based on the factual and practical considerations of everyday life on which reasonable and prudent persons act, that there are facts giving rise to a reasonable articulable su ion that [REDACTED] is associated with [REDACTED] provided, however, that [REDACTED] believed to be used by a US person shall not be regarded as associated with [REDACTED] solely on the basis of activities that are protected by the First Amendment to the Cons ution.

    That RAS definition is more clearly outlined in a another do ent that was also declassified on Monday evening.


    A do ent (PDF) dated August 29, 2008, a “Memorandum for the Deputy Program Manager for Counterterrorism Special Projects, Analysis and Production,” specifically illustrates this standard.


    The “reasonable articulable su ion” standard embodied in the Court’s Orders requires that before an analyst may use a telephone number or electronic identifier as a “seed” address to query the database of records, he/she must be able to articulate some fact or set of facts that causes him/her to suspect that the number is associated with [REDACTED]. This formulation means that analysts are not free to use a telephone number or electronic identifier based merely on a hunch or guess but must instead base their decisions on specific facts that would cause a reasonable person to form such a su ion.

  4. #79
    dangerous floater Winehole23's Avatar
    My Team
    San Antonio Spurs
    Join Date
    Nov 2008
    Post Count
    89,639
    The Supreme Court on Monday passed up an opportunity to weigh in on the cons utionality of the National Security Agency's collection of a massive database containing information on virtually every telephone call made to, from or within the United States.


    The justices' action makes it unlikely the high court will provide a definitive answer on the question during its current term.


    Acting without comment or indication of dissent on Monday, the justices turned down a pe ion from the Electronic Privacy Information Center seeking to have the Supreme Court perform a direct review of a Foreign Intelligence Surveillance Court order authorizing the call-tracking program under the PATRIOT Act—a controversial anti-terrorism statute passed a few weeks after the September 11, 2001 attacks.
    http://www.politico.com/blogs/under-...QrbY4w.twitter

  5. #80
    dangerous floater Winehole23's Avatar
    My Team
    San Antonio Spurs
    Join Date
    Nov 2008
    Post Count
    89,639
    The surveillance issue could reach the high court through a variety of other vehicles. The Justice Department pointed to three civil lawsuits filed in U.S. District Courts by the American Civil Liberties Union, the Electronic Frontier Foundation and conservative legal activist Larry Klayman.


    In addition to the civil lawsuits, the government has disclosed the use of the NSA call-tracking database in at least two criminal cases. The defendants in those cases could use their criminal appeals to pursue cons utional challenges to the surveillance program, with those challenges also having the potential to reach the Supreme Court.
    same

  6. #81
    dangerous floater Winehole23's Avatar
    My Team
    San Antonio Spurs
    Join Date
    Nov 2008
    Post Count
    89,639
    One thing the July 24, 2004 Colleen Kollar-Kotelly opinion and the May 23, 2006 phone dragnet application reveal is that the government and the court barely considered the First Amendment Freedom of Association implications of the dragnets.
    The Kollar-Kotelly opinion reveals the judge sent a letter asking the government about “First Amendment issues.” (3) Way back on 57, she begins to consider First Amendment issues, but situates the in the querying of data, not the creation of a dragnet showing all relationships in the US.
    In this case, the initial acquisition of information is not directed at facilities used by particular individuals of investigative interest, but meta data concerning the communications of such individuals’ [redacted]. Here, the legislative purpose is best effectuated at the querying state, since it will be at a point that an analyst queries the archived data that information concerning particular individuals will first be compiled and reviewed. Accordingly, the Court orders that NSA apply the following modification of its proposed criterion for querying the archived data: [redacted] will qualify as a seed [redacted] only if NSA concludes, based on the factual and practical considerations of everyday life on which reasonable and prudent persons act, there are facts giving rise to a reasonable articulable su ion that a particularly known [redacted] is associated with [redacted] provided, however, that an [redacted] believed to be used by a U.S. person shall not be regarded as associated with [redacted] solely on the basis of activities that are protected by the First Amendment to the Cons ution. For example, an e-mail account used by a U.S. person could not be a seed account if the only information thought to support the belief that the account is associated with [redacted] is that, in sermons or in postings on a web site, the U.S. person espoused jihadist rhetoric that fell short of “advocacy … directed to inciting or producing imminent lawless action and … likely to incite or produce such action.” Brandnberg v. Ohio
    By focusing on queries rather than collection, Kollar-Kotelly completely sidesteps the grave implications for forming databases of all the relationships in the US.

    Then, 10 pages later, Kollar-Kotelly examines the First Amendment issues directly. She cites Reporters Committee for Freedom of the Press v. AT&T to lay out that in criminal investigations the government can get reporters’ toll records. Predictably, she says that since this application is “in furtherance of the compelling national interest of identifying and tracking [redacted terrorist reference], it makes it an easier case. Then, finally, she cites Paton v. La Prade to distinguish this from an much less intrusive practice, mail covers.

    The court in Paton v. La Prade held that a mail cover on a dissident political organization violated the First Amendment because it was authorized under a regulation that was overbroad in its use of the undefined term “national security.” In contrast, this pen register/trap and trace surveillance does not target a political group and is authorized pursuant to statute on the grounds of relevance to an investigation to protect against “international terrorism,” a term defined at 50 U.S.C. § 1801(c). This definition has been upheld against a claim of First Amendment overbreadth. [citations omitted]
    Of course, a mail cover is not automated and only affects the targeted party. This practice, by contrast, affects the targeted party (the selector) and anyone three hops out from him. Thus, even if those people are, in fact, a dissident organization (perhaps a conservative mosque), they in effect become criminalized by the association to someone only suspected — using the Terry Stop standard (the same used with stop-and-frisk) — of ties (but not even necessarily organizational ties) to terrorism.

    Here’s how it looks in translation, in the 2006 application:

    It bears emphasis that, given the types of analysis the NSA will perform, no information about a telephone number will ever be accessed or presented in an intelligible form to any person unless either (i) that telephone number has been in direct contact with a reasonably suspected terrorist-associated number or is linked to such a number through one or two intermediaries. (21)
    So: queries require only a Terry Stop standard, and from that, mapping out everyone who is three degrees of association — whose very association with the person should be protected by the First Amendment — is fair game too.
    Imagine if Ray Kelly had the authority to conduct an intrusive investigation into every single New Yorker who was three degrees of separation away from someone who had ever been stop-and-frisked. That’s what we’re talking about, only it happens in automated, secret fashion.
    http://www.emptywheel.net/2013/11/19...of-terry-stop/

  7. #82
    dangerous floater Winehole23's Avatar
    My Team
    San Antonio Spurs
    Join Date
    Nov 2008
    Post Count
    89,639
    On Monday, three Somali immigrants — an imam, a cabdriver and an employee of a money-transmitting business — were sentenced to federal prison in San Diego for sending money to a terrorist group in their homeland. It is the only prosecution the government has said resulted exclusively from its collection of American telephone records beginning in late 2001.
    http://www.latimes.com/nation/la-na-...40,print.story

  8. #83
    dangerous floater Winehole23's Avatar
    My Team
    San Antonio Spurs
    Join Date
    Nov 2008
    Post Count
    89,639
    well, how about them apples?

  9. #84
    dangerous floater Winehole23's Avatar
    My Team
    San Antonio Spurs
    Join Date
    Nov 2008
    Post Count
    89,639
    An analysis of 225 terrorism cases inside the United States since the Sept. 11, 2001, attacks has concluded that the bulk collection of phone records by the National Security Agency “has had no discernible impact on preventing acts of terrorism.”


    In the majority of cases, traditional law enforcement and investigative methods provided the tip or evidence to initiate the case, according to the study by the New America Foundation, a Washington-based nonprofit group.
    http://www.washingtonpost.com/world/...9b2_story.html

  10. #85
    dangerous floater Winehole23's Avatar
    My Team
    San Antonio Spurs
    Join Date
    Nov 2008
    Post Count
    89,639
    the electronic dragnet diminishes our privacy, but doesn't make us safer:

    The head of the British electronic spy agency GCHQ, Robert Hannigan, created a minor flap last week in an article he wrote for the Financial Times. In effect, Hannigan argued that more robust encryption procedures by private Internet companies were unwittingly aiding terrorists such as the Islamic State (IS) or al Qaeda, by making it harder for organizations like the NSA and GCHQ to monitor online traffic. The implication was clear: The more that our personal privacy is respected and protected, the greater the danger we will face from evildoers.

    It's a serious issue, and democracies that want to respect individual privacy while simultaneously keeping citizens safe are going to have to do a much better job of reassuring us that vast and (mostly) secret surveillance capabilities overseen by unelected officials such as Hannigan won't be abused. I tend to favor the privacy side of the argument, both because personal freedoms are hard to get back once lost, but also because there's not much evidence that these surveillance activities are making us significantly safer. They seem to be able to help us track some terrorist leaders, but there's a lively debate among scholars over whether tracking and killing these guys is an effective strategy.
    http://www.foreignpolicy.com/article..._terrorist_cve

  11. #86
    dangerous floater Winehole23's Avatar
    My Team
    San Antonio Spurs
    Join Date
    Nov 2008
    Post Count
    89,639
    For starters, they'd have to rely more heavily on tried-and-true counterterrorism measures: infiltrating extremist organizations and flipping existing members, etc., to find out what they were planning, head attacks off before they occurred, and eventually roll up organization themselves. States waged plenty of counterterrorism campaigns before the Internet was invented, and while it can be difficult to infiltrate such movements and find their vulnerable points, it's not exactly an unknown art. If we couldn't spy on them from the safety of Fort Meade, we'd probably be doing a lot more of this.


    Second, if we didn't have all these expensive high-tech capabilities, we might spend a lot more time thinking about how to discredit and delegitimize the terrorists' message, instead of repeatedly doing things that help them make their case and recruit new followers. Every time the United States goes and pummels another Muslim country -- or sends a drone to conduct a "signature strike" -- it reinforces the jihadis' claim that the West has an insatiable desire to dominate the Arab and Islamic world and no respect for Muslim life. It doesn't matter if U.S. leaders have the best of intentions, if they genuinely want to help these societies, or if they are responding to a legitimate threat; the crude message that drones, cruise missiles, and targeted killings send is rather different.


    If we didn't have all these cool high-tech hammers, in short, we'd have to stop treating places like Afghanistan, Pakistan, Iraq, and Syria as if they were nails that just needed another pounding, and we might work harder at marginalizing our enemies within their own societies. To do that, we would have to be building more effective partnerships with authoritative sources of legitimacy within these societies, including religious leaders. Our failure to do more to discredit these movements is perhaps the single biggest shortcoming of the entire war on terror, and until that failure is recognized and corrected, the war will never end.
    same

  12. #87
    Veteran
    My Team
    San Antonio Spurs
    Join Date
    Mar 2009
    Post Count
    97,520
    "do more to discredit these movements"

    there's no $100Ms for the MIC in that activity. only hard core shooting wars are what enrich the MIC



  13. #88
    Veteran
    My Team
    San Antonio Spurs
    Join Date
    Mar 2009
    Post Count
    97,520
    ...

  14. #89
    dangerous floater Winehole23's Avatar
    My Team
    San Antonio Spurs
    Join Date
    Nov 2008
    Post Count
    89,639
    mass surveillance means US companies will lose out on billions in cloud computing, due to lost trust:

    A new report by a non-aligned United States think tank warns the American cloud computing industry could take a major earnings hit, thanks to former NSA employee Edward Snowden's revelations of indiscriminate government mass surveillance.


    In the report [PDF], the Information Technology and Innovation foundation (ITIF) said if non-American companies decided the risks of storing data with US firms outweighed the benfits, the collection of electronic data from third-paties "will likely have immediate and lasting impact on the compe iveness on the US cloud computing industry".


    A significant amount of revenue is at stake for US companies, the ITIF estimated.


    At the low end, US cloud computing providers could lose US$21.5 billion (A$24 billion) in revenue over the next thre years; that estimate is based on a modest ten per cent loss of the overseas market to European and Asian compe ors.
    Should the worst-case scenario come true with a fifth loss of market foreign market share while retaining its current domestic customer base, US cloud providers stand to shed US$35 billion (A$39.2 billion) by 2016 the ITIF said.
    Read more: http://www.itnews.com.au/news/us-clo...#ixzz3kn2HOMUU

  15. #90
    dangerous floater Winehole23's Avatar
    My Team
    San Antonio Spurs
    Join Date
    Nov 2008
    Post Count
    89,639
    Guardian confirms: US tech giants compromised by NSA

    Some of the world's largest internet brands are claimed to be part of the information-sharing program since its introduction in 2007. Microsoft – which is currently running an advertising campaign with the slogan "Your privacy is our priority" – was the first, with collection beginning in December 2007.


    It was followed by Yahoo in 2008; Google, Facebook and PalTalk in 2009; YouTube in 2010; Skype and AOL in 2011; and finally Apple, which joined the program in 2012. The program is continuing to expand, with other providers due to come online.
    Collectively, the companies cover the vast majority of online email, search, video and communications networks.
    http://www.theguardian.com/world/201...iants-nsa-data

  16. #91
    dangerous floater Winehole23's Avatar
    My Team
    San Antonio Spurs
    Join Date
    Nov 2008
    Post Count
    89,639
    The do ent also shows the FBI acts as an intermediary between other agencies and the tech companies, and stresses its reliance on the participation of US internet firms, claiming "access is 100% dependent on ISP provisioning".

  17. #92
    dangerous floater Winehole23's Avatar
    My Team
    San Antonio Spurs
    Join Date
    Nov 2008
    Post Count
    89,639
    "It's shocking enough just that the NSA is asking companies to do this," he said. "The NSA is part of the military. The military has been granted unprecedented access to civilian communications.


    "This is unprecedented militarisation of domestic communications infrastructure. That's profoundly troubling to anyone who is concerned about that separation."

  18. #93
    Veteran hater's Avatar
    My Team
    San Antonio Spurs
    Join Date
    Feb 2007
    Post Count
    70,986
    obama

    What a ing joke. He pretty much half assing it for the last few years

  19. #94
    Veteran hater's Avatar
    My Team
    San Antonio Spurs
    Join Date
    Feb 2007
    Post Count
    70,986
    There is absolutely no difference between way china handles their IT vs US. No difference with a communist country

  20. #95
    dangerous floater Winehole23's Avatar
    My Team
    San Antonio Spurs
    Join Date
    Nov 2008
    Post Count
    89,639
    obama

    What a ing joke. He pretty much half assing it for the last few years
    disagree. with respect to domestic surveillance he stepped on the gas.

  21. #96
    Veteran hater's Avatar
    My Team
    San Antonio Spurs
    Join Date
    Feb 2007
    Post Count
    70,986
    disagree. with respect to domestic surveillance he stepped on the gas.
    Imo. The people around him did. He's just a prop nowadays.

  22. #97
    dangerous floater Winehole23's Avatar
    My Team
    San Antonio Spurs
    Join Date
    Nov 2008
    Post Count
    89,639
    Tell that to GOP majorities that want to defund Planned parenthood. It ain't so.

    Power of the Prez is still considerable. Your personal dislike of the man doesn't make it less so.

  23. #98
    I play pretty, no? TeyshaBlue's Avatar
    My Team
    Dallas Mavericks
    Join Date
    Jun 2006
    Post Count
    13,319
    Hope. Change.

  24. #99
    dangerous floater Winehole23's Avatar
    My Team
    San Antonio Spurs
    Join Date
    Nov 2008
    Post Count
    89,639
    Continuity. Handing off power intact or enhanced to the next guy. Obama is a Tory.

  25. #100
    dangerous floater Winehole23's Avatar
    My Team
    San Antonio Spurs
    Join Date
    Nov 2008
    Post Count
    89,639
    one way the NSA is breaking encryption:

    There have been rumors for years that the NSA can decrypt a significant fraction of encrypted Internet traffic. In 2012, James Bamford published an article quoting anonymous former NSA officials stating that the agency had achieved a “computing breakthrough” that gave them “the ability to crack current public encryption.” The Snowden do ents also hint at some extraordinary capabilities: they show that NSA has built extensive infrastructure to intercept and decrypt VPN traffic and suggest that the agency can decrypt at least some HTTPS and SSH connections on demand.


    However, the do ents do not explain how these breakthroughs work, and speculation about possible backdoors or broken algorithms has been rampant in the technical community. Yesterday at ACM CCS, one of the leading security research venues, we and twelve coauthors presented a paper that we think solves this technical mystery.


    The key is, somewhat ironically, Diffie- man key exchange, an algorithm that we and many others have advocated as a defense against mass surveillance. Diffie- man is a cornerstone of modern cryptography used for VPNs, HTTPS websites, email, and many other protocols. Our paper shows that, through a confluence of number theory and bad implementation choices, many real-world users of Diffie- man are likely vulnerable to state-level attackers.


    For the nerds in the audience, here’s what’s wrong: If a client and server are speaking Diffie- man, they first need to agree on a large prime number with a particular form. There seemed to be no reason why everyone couldn’t just use the same prime, and, in fact, many applications tend to use standardized or hard-coded primes. But there was a very important detail that got lost in translation between the mathematicians and the prac ioners: an adversary can perform a single enormous computation to “crack” a particular prime, then easily break any individual connection that uses that prime.


    How enormous a computation, you ask? Possibly a technical feat on a scale (relative to the state of computing at the time) not seen since the Enigma cryptanalysis during World War II. Even estimating the difficulty is tricky, due to the complexity of the algorithm involved, but our paper gives some conservative estimates. For the most common strength of Diffie- man (1024 bits), it would cost a few hundred million dollars to build a machine, based on special purpose hardware, that would be able to crack one Diffie- man prime every year.
    https://freedom-to-tinker.com/blog/h...o-much-crypto/

Thread Information

Users Browsing this Thread

There are currently 1 users browsing this thread. (0 members and 1 guests)

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •