
Hopefully, this is just a start.
The US Senate has passed the USA Freedom Act that adds mild limits to Uncle Sam's intelligence agencies' activities on American soil. It was passed with a 67-32 vote. Glad the Senate finally passed the USA Freedom Act. It protects civil liberties and our national security. I'll sign it as soon as I get it. — President Obama (@ …
IF (and it's a pretty big if) we believe certain Congress Critters, yes... it's a start. Senator Ron Wyden has been very vocal about these things and he's slowly convincing others to see the light (so to speak). At least for now with this bit of legislation, they just can't slurp everything but have to get a warrant for the data metadata from the Telco.
The "USA Freedom Act" was a compromise between pro-privacy people who wanted to control the NSA's spying and the pro-spying Congress members - but it was written before the court decision that invalidated most of the NSA's bulk collection, and before the Senate decided not to renew Part 215 of the "USA Patriot Act", so by the time it was passed, it ended up authorizing some data collection that was no longer allowed by earlier laws (which it had been trying to restrict) and got almost nothing in return.
It's worse than you fear.
The actual title of the act is:
"Uniting and Strengthening America by Fulfilling Rights and Ensuring Effective Discipline Over Monitoring Act of 2015"
I believe we can conclude from this that two centuries of competitive campaigning selects for inane acronym affinity (acronymiphilia?).
The telcos kept this information already. Worst case someone hacks into them and knows who you called/texted. That's not a problem in general, only if they're able to target you and do that specifically (think mob hits, stalking battered wives, etc.) How do you think they know what to bill you? Maybe not today with unlimited everything, but a decade ago when you were charged per minute on each call and per text, and AT&T would send you a 10 page paper bill detailing every single call and text message...
The telcos aren't keeping what you're saying, just the info on what numbers you called. Even the NSA's new billion dollar datacenter couldn't come within three orders of magnitude of storing months worth of actual texts and calls, so they need this big haystack to determine which quarter million numbers to bug and intercept all calls/texts to/from to form the smaller haystack.
If you think that's too broad a net and they'll probably miss the next 9/11 because they'll have too many suspects and too much data, I'd heartily agree with you. Bugging everyone with two degrees of contact separation from the thousands of tier one terrorist suspects is a fool's errand.
"Even the NSA's new billion dollar datacenter couldn't come within three orders of magnitude of storing months worth of actual texts and calls"
It easily could.
A single 5TB drive could store an hours' worth of speech a day for 1.3 million people (8kbips sampling). Or 200 disks for the whole US population per day. That probably fits in a single rack or two. Texts could all fit on a usb stick.
I'm sure they have plenty of room in their data centers for 1000's of such disks.
You're spot on. And don't worry, they aren't storing MP3s. That huge complex in Utah (and Fort Meade, elsewhere) is analyzing the speech, pictures, etc. and rendering machine-friendly-for-harvesting representations of the information. This is what google voice has done for a while also.
So if some lackey from the govt says "we don't collect voice records" it just means that the waveforms have been rendered into something much more analyzable.
I think they already got your brains with their newspeak. As I understand the issue, the sentence should be:
"collect" – apparently to the intelligence community, it means collecting and looking at data. Merely collecting the data does not count if no human eyes looked at it. There are probably other logical AND conditions that they don't yet talk about (it doesn't count if the data come from a different postal code, the looked-at data must be on the screen for at least 1.5 minutes in the same format and order it was collected in, three colleagues must bear witness that the data was looked at, ...) .
Or maybe you got it right and they redefine the data as uncollected if it was looked at?
"collect" – apparently to the intelligence community, it means collecting and looking at data. Merely collecting the data does not count if no human eyes looked at it. There are probably other logical AND conditions that they don't yet talk about (it doesn't count if the data come from a different postal code, the looked-at data must be on the screen for at least 1.5 minutes in the same format and order it was collected in, three colleagues must bear witness that the data was looked at, ...) ."
Exactly.
I like to think of it as the "Matt Bryant" defense.
Stank then. Stinks now.
You notice how quiet MB has been on this subject and related items lately?
Perhaps he's finally realised that his argument, of how everything that the Gov(s) have done is all good and legal and fair and honest, has all been "male bovine" all along?
We can but hope that enlightenment has dawned.
"You notice how quiet MB has been on this subject and related items lately?"
I'm not sure I've seen him anywhere.
"Perhaps he's finally realised that his argument, of how everything that the Gov(s) have done is all good and legal and fair and honest, has all been "male bovine" all along?"
I wouldn't bet on it.
He always came across as someone who was very confident of his opinions, basically because he held them. QED they were the correct ones. I also got the sense of a snout firmly in the government trough.
If you arent doing anything wrong you dont have anything to worry about - I havent got an issue with the NSA or MI-whatever slurping any data related to me as Im not engaged in anything illegal.
For those who are engaged in illegal activities it might be worht the rest of us bearing in mind how some of the plots of recent years have been foiled. If you really do value your security then im afraid this sort of thing is necessary and I cannot understand why anybody rational would not support it as long as its properly controlled, which it now appears to be.
"If you arent [sic] doing anything wrong you dont[sic] have anything to worry about - I havent[sic] got an issue with the NSA or MI-whatever slurping any data related to me as Im [sic] not engaged in anything illegal."
Yes you are, you just don't know it. There are so many laws on the books across the world that someone somewhere can get you for something. That's why it's important that the authorities don't have detailed records on everyone, otherwise an agent with authority (a human being like anyone else) can decide to go through your history to try and make your life hell if they take a dislike to you.
"If one would give me six lines written by the hand of the most honest man, I would find something in them to have him hanged."*
*Give me his browser history and he is totally fucked.
R69,
Quite, but for a given definition of controlled eh?
A pertinent example from not that long ago, my mother-in-laws family (along with most of the populace) filled in the census info as required by the democratically elected government.
They valued their security, prosperity and good neighbours, and their religious heritage too...
A few years later, virtually all of the family were murdered in gas chambers.
I am fairly sure that nothing like that is going to happen in the USA or UK anytime soon, but be careful what you wish for eh???
Food for thought.
J.
"I am fairly sure that nothing like that is going to happen in the USA or UK anytime soon, but be careful what you wish for eh???
Food for thought."
3 points you might like to keep in mind.
The last 2 UK censuses were not down to the "house" level, but the individual person.
The data was processed by a subsidiary of Lockheed Martin, so would be subject to THE PATRIOT Act.
The data is neutral. But once it's collected what are the limits on what it's used for?
I believe the US also used census records in rounding up and imprisoning innocent Japanese people (many of them US citizens) around the same time. Better than being gassed, to be sure, but not exactly a pound moment in our history.
I'd like to think nothing similar could happen again, but you never know.
That's correct. US law says that census records are sealed for 75 years (length of time might have been different back then), and only summary information is available before that, not individual records, but the Army used them anyway to find the names and addresses of Japanese-sounding people in the US and put them in the relocation camps.
Even for non-illegal uses of census records, there's also the problem of 75-year-old records revealing your mother's maiden name, and for supposedly summary-only data revealing that the number of people in your census tract with a husband of Mexican origin, wife Guatemalan, and three kids is exactly 1, and the US census forms obsess about detail for anybody Hispanic, unlike those of us with Anglo or Celtic origin.
Exactly. For all the talk about the NSA database, I've never heard of any innocent person being the slightest bit harmed by any use of it. Its supposed dangers are entirely hypothetical, whereas the dangers posed by criminal conspiracies which might be tracked through such a database are demonstrably real.
Gh,
Right, let me get this right.
Because you haven't heard of any government agency using their legal/illegally intel on anyone, that means everything is just dandy?
A couple of points to consider (and please share your thoughts on them):
- if (insert name of agency) had used their info to 'influence' someones decision making (or blackmail them), the agency or individual are fairly unlikely to take an ad out in the press to tell us or scribble about it on their blog dontcha think?
- if an agency did use the gathered info (heaven forbid), wouldn't it diminish their (rightfully) stealth capabilities if EVERYONE NEW ABOUT IT??? Which may explain why they are all a tad miffed about Mr Snowden
- Regardless of what laws are enacted in (insert name of country), how can Joe or Jane Doe actually check what info agencies are gathering on themselves and keep an eyeball on who they share it with and what they do with it?
A final question for you: do you 100% trust the relevant agencies to never share info about you, your sexual proclivities, gambling/drinking habits, the not so good bits of your work history, who you may owe money or a favour to WITH ANYONE THEY F'ING WELL LIKE IF IT SUITS THEM??
Because I sure as hell don't, and I never will...
Thanks for contributing btw.
Regards,
Jay
" I've never heard of any innocent person being the slightest bit harmed by any use of it"
I'd like you to do a search for "Extraordinary Rendition". After that, please read about a place called Gauntanamo, with a specific eye on the nature of the interns, their legal rights and, most importantly, what they have been charged with. It is reasonable to assume that NSA data collection was responsible for a proportion of those activities.
"For all the talk about the NSA database, I've never heard of any innocent person being the slightest bit harmed by any use of it. Its supposed dangers are entirely hypothetical, whereas the dangers posed by criminal conspiracies which might be tracked through such a database are demonstrably real."
I've been harmed by the NSA database. So fuck you.
And there are lots of "criminals" who haven't harmed anyone. Providing a perfectly harmless (when used appropriately, in moderation) substance such as marijuana, or engaging in sodomy, being gay, being a hardworking illegal immigrant...the list of people who have broken laws but ultimate been a benefit to society is huge.
Being a criminal emphatically does not mean you harm anyone. Some criminals do. Most criminals don't.
The law has long ago become not about protecting the citizens, but protecting those in power from the loss of their power, and/or imposing the paranoid morality of the crazy few upon all. Full stop.
This is but a short lived 'victory'.
In a few months, maybe a year or two to be sure, there will be an act of 'terrorism' that will slip past the NSA and FBI 'Accidentally'.
An investigation will take place and it will be found that the alphabet agencies were unable to stop the event because they came up on a brick wall when trying to collect the required data.
Cue "we told you so" and the allowance of even greater surveillance, all in the name of protecting peoples freedoms.
My current conspiracy theory is that this has "been allowed" to occur because, with the recent changes to Law in Australia, the NSA will just get GCHQ and ASIO to collect the data for them.
Much as I'd like to think that the change in the US could cause a change in UK and Australian Law I'm not holding my breath.
Dear Ac,
The bits of your post that instantly stuck in my memory are: clueless, ignorance and bliss...
Do you seriously believe that the NSA (or whatever agency), if they get a whiff of a 'non-terrorist-esque' planned actual crime actually pick up the jellybone and call the relevant sheriff so that he/she can miraculously 'prevent' it happening?
If you do believe that then I really want some of what you are smoking...
Regards,
Jay
"The bits of your post that instantly stuck in my memory are: clueless, ignorance and bliss..."
You missed the irony about them posting AC while supporting state surveillance in the first place.
"Do you seriously believe that the NSA (or whatever agency), if they get a whiff of a 'non-terrorist-esque' planned actual crime actually pick up the jellybone and call the relevant sheriff so that he/she can miraculously 'prevent' it happening?"
Actually where the DEA were concerned they did, as some of the Snowden documents show. Unfortunately that meant the DEA had to falsify the source. Which has given them some issue with some of the convictions.
So just to be clear with complete access to all US phone records (and IIRC conversations on demand) the DEA still could not win "The War on Drugs" (TM).
Total surveillance to end all crime.
I think not.
John,
Right again, methinks I missed that due to my 'wtf' quotient going off of the scale at the time, plus I had some plaster to get on the wall sharpish...
I did recall the DEA example you mentioned, but sought to make a more mundane day-to-day example.
I believe that the only guaranteed outcome of the whole '1984' surveillance thing is that lots of taxpayers dollars/sterling ends up in the pockets of very few companies which means we are paying more in tax than needs be for f'all tangible benefit, and the agencies recruit even more (un)civil servants.
Have one on me.
Cheers,
jay
"Now more crims will escape punishment because authorities will not know about them until after they impose their evil"
Most criminals are good people. Many of them are better in most ways than huge numbers of people who have yet to be identified as having broken the law.
The law isn't about good and evil. It's about power and control.
I think people who honestly believe that 'if you have nothing to hide, you have nothing to fear' have absolutely no understanding of the word privacy.
I've not done anything illegal, however, I'd very much like to have a shower without someone unknown to me watching, I'd also like to talk to my doctor about my medical conditions without anyone who doesn't need the information knowing.
Neither of these acts are criminal, but in a world where mass surveillance is normal, how long before every action we take is monitored. Privacy isn't about needing to hide illegal things, its about wanting to hide personal things.
(Or, if you have nothing to hide, thus nothing to fear, can I take a photograph of your genitalia and stick it on the internet with identifying details - also, can I listen to your private conversations with your partner about what you'd like to do to them in bed, and broadcast them on the radio? - No, why not, nothing to hide after all)
Windows PowerShell is enormously useful, extremely prevalent, and often targeted by crooks because it offers an express route into the heart of Windows servers and networks.
Some have therefore suggested the tool is a liability that should be disabled in the interest of improved security.
But on Wednesday national cybersecurity agencies from the US, UK, and New Zealand decided that's a bit drastic. Instead, the agencies recommend securing PowerShell prudently.
RSA Conference A heightened state of defensive cyber security posture is the new normal, according to federal cyber security chiefs speaking at the RSA Conference on Tuesday. This requires greater transparency and threat intel sharing between the government and private sector, they added.
"There'll never be a time when we don't defend ourselves –— especially in cyberspace," National Cyber Director Chris Inglis said, referencing an opinion piece that he and CISA director Jen Easterly published earlier this week that described CISA's Shields Up initiative as the new normal.
"Now, we all know that we can't sustain the highest level of alert for an extensive period of time, which is why we're thinking about, number one, what's that relationship that government needs to have with the private sector," Easterly said on the RSA Conference panel with Inglis and National Security Agency (NSA) cybersecurity director Rob Joyce.
State-sponsored Chinese attackers are actively exploiting old vulnerabilities to "establish a broad network of compromised infrastructure" then using it to attack telcos and network services providers.
So say the United States National Security Agency (NSA), Cybersecurity and Infrastructure Security Agency (CISA), and Federal Bureau of Investigation (FBI), which took the unusual step of issuing a joint advisory that warns allied governments, critical infrastructure operators, and private industry organizations to hurry up and fix their IT estates.
The advisory states that network devices are the target of this campaign and lists 16 flaws – some dating back to 2017 and none more recent than April 2021 – that the three agencies rate as the most frequently exploited.
False-flag cyberattacks represent a red line that even nation states like Russia and China don't want to cross, according to Mandiant CEO Kevin Mandia.
"It's one of the last rules of the playground that a modern nation may not want to break because they don't want everyone doing false flags," he said, speaking on a panel this week at Vanderbilt University's Summit on Modern Conflict and Emerging Threats.
US Cyber Command chief General Paul Nakasone has revealed the agency he leads conducted nine "hunt forward" operations last year, sending teams to different counties to help them improve their defensive security posture and hunt for cyberthreats.
These missions provide "security for our nation in cyberspace," said Nakasone, who is also director of the National Security Agency, during a Summit on Modern Conflict and Emerging Threats at Vanderbilt University. "It provides an inoculation of these threats, and it provides a partnership with a nation that has asked us for assistance."
Such missions are a win-win for both participating governments, he said. The foreign countries benefit from US cybersecurity tools and threat intel, and US Cyber Command gets to put sensors on these nation's networks, which gives the military better visibility into threats beyond America's border.
Security flaws in Log4j, Microsoft Exchange, and Atlassian's workspace collaboration software were among the bugs most frequently exploited by "malicious cyber actors" in 2021 , according to a joint advisory by the Five Eyes nations' cybersecurity and law enforcement agencies.
It's worth noting that 11 of the 15 flaws on the list were disclosed in 2021, as previous years' lists often found miscreants exploiting the older vulns for which patches had been available for years.
Of course, the US Cybersecurity and Infrastructure Security Agency (CISA) and friends note that malicious cyber actors have not stopped trying to exploit older flaws – but reckon those efforts are happening to a "lesser extent" than in the past.
The United States Department of Justice (DoJ) has accused an NSA employee of sharing top-secret national security information with an unnamed person who worked in the private sector.
According to a DoJ announcement and the indictment, an NSA staffer named Mark Unkenholz "held a TOP SECRET/Sensitive Compartmented Information (SCI) clearance and had lawful access to classified information relating to the national defense."
The indictment alleges that on 13 occasions between 2018 and 2020, Unkenholz shared some of that information with a woman identified only as "RF" who was not entitled to see it. Unkenholz did so despite allegedly having "reason to believe [the info] could be used to the injury of the United States or to the advantage of any foreign nation."
China claims it has obtained malware used by the NSA to steal files, monitor and redirect network traffic, and remotely control computers to spy on foreign targets.
The software nasty, dubbed NOPEN, is built to commandeer selected Unix and Linux systems, according to Chinese Communist Party tabloid Global Times, which today cited a report it got exclusively from China's National Computer Virus Emergency Response Center.
Trouble is, NOPEN was among the files publicly leaked in 2016 by the Shadow Brokers. If you can recall back that far, the Shadow Brokers stole and dumped online malware developed by the NSA's Equation Group.
Pangu Lab has identified what it claims is a sophisticated backdoor that was used by the NSA to subvert highly targeted Linux systems around the world for more than a decade.
The China-based computer-security outfit says it first spotted the backdoor code, or advanced persistent threat (APT), in 2013 when conducting a forensic investigation on a host in "a key domestic department" – presumably a Chinese company or government agency.
To us it seems whoever created the code would compromise or infect a selected Linux system and then install the backdoor on it. This backdoor, which Pangu has now described, would do its best to hide from administrators and users, and covertly communicate over networks with the outside world.
America's National Security Agency has published an FAQ about quantum cryptography, saying it does not know "when or even if" a quantum computer will ever exist to "exploit" public-key cryptography.
In the document, titled Quantum Computing and Post-Quantum Cryptography, the NSA said it "has to produce requirements today for systems that will be used for many decades in the future." With that in mind, the agency came up with some predictions [PDF] for the near future of quantum computing and their impact on encryption.
Is the NSA worried about the threat posed by a "cryptographically relevant quantum computer" (CRQC)? Apparently not too much.
Biting the hand that feeds IT © 1998–2022