Advertisement
If you have a new account but are having problems posting or verifying your account, please email us on hello@boards.ie for help. Thanks :)
Hello all! Please ensure that you are posting a new thread or question in the appropriate forum. The Feedback forum is overwhelmed with questions that are having to be moved elsewhere. If you need help to verify your account contact hello@boards.ie
Hi all,
Vanilla are planning an update to the site on April 24th (next Wednesday). It is a major PHP8 update which is expected to boost performance across the site. The site will be down from 7pm and it is expected to take about an hour to complete. We appreciate your patience during the update.
Thanks all.

PRISM

11112131416

Comments

  • Closed Accounts Posts: 1,260 ✭✭✭Rucking_Fetard


    Big Data Firm Says It Can Link Snowden Data To Changed Terrorist Behavior
    For nearly a year, U.S. government officials have said revelations from former NSA contract worker Edward Snowden harmed national security and allowed terrorists to develop their own countermeasures. Those officials haven't publicly given specific examples — but a tech firm based in Cambridge, Mass., says it has tangible evidence of the changes.

    According to a new report to be released Friday by big data firm , a direct connection can be drawn: Just months after the Snowden documents were released, al-Qaida dramatically changed the way its operatives interacted online.

    "We saw at least coming out with different organizations with al-Qaida and associated organizations fairly quickly after the Snowden disclosures," said Recorded Future's CEO and co-founder Christopher Ahlberg. "But we wanted to go deeper and see how big those changes were."

    By "product releases," Ahlberg means new software. And for the first time, Recorded Future says, it can now codify just how big a change it was.

    The company brought in a cyber expert, Mario Vuksan, the CEO of Reversing Labs, to investigate the technical aspects of the new software. Vuksan essentially reverse-engineered the 2013 encryption updates and found not only more sophisticated software but also newly available downloads that allowed encryption on cellphones, Android products and Macs.

    To put that change into context, for years, al-Qaida has used an encryption program written by its own coders called Mujahideen Secrets. It was a Windows-based program that groups like al-Qaida's arm in Yemen and al-Shabab in Somalia used to scramble their communications. American-born radical imam Anwar al-Awlaki used it, too. Since Mujahideen Secret's introduction in 2007, there had been some minor updates to the program, but no big upgrades.

    Ahlberg thought the fact that the group changed the program months after Snowden's revelations provided good circumstantial evidence that the former contractor had had an impact — but he wanted to see how much.

    As it turns out, Recorded Future and Reversing Labs discovered that al-Qaida didn't just tinker at the edges of its seven-year-old encryption software; it overhauled it. The new programs no longer use much of what's known as "homebrew," or homemade algorithms. Instead, al-Qaida has started incorporating more sophisticated open-source code to help disguise its communications.

    "This is as close to proof that you can get that these have changed and improved their communications structure post the Snowden leaks," Ahlberg said.

    Others are less sure that you can draw a straight line from Snowden to the changes in al-Qaida's encryption program. Bruce Schneier, a technologist and fellow at the Berkman Center at Harvard, said it's hard to tell.

    "Certainly they have made changes," Schneier said, "but is that because of the normal costs of software development or because they thought rightly or wrongly that they were being targeted?"

    Whatever the reason, Schneier says, al-Qaida's new encryption program won't necessarily keep communications secret, and the only way to ensure that nothing gets picked up is to not send anything electronically. Osama bin Laden understood that. That's why he ended up resorting to couriers.

    Upgrading encryption software might mask communications for al-Qaida temporarily, but probably not for long, Schneier said.

    "It is relatively easy to find vulnerabilities in software," he added. "This is why cybercriminals do so well stealing our credit cards. And it is also going to be why intelligence agencies are going to be able to break whatever software these al-Qaida operatives are using."

    The NSA, for its part, declined to comment.


  • Closed Accounts Posts: 1,004 ✭✭✭Recondite49



    Many thanks for this RF, interesting to see the knock on effect here.

    There's an excellent review of the two main programs used by Al Qaeda here : http://www.rbijou.com/2013/03/18/an-overview-of-jihadist-encryption-programs/

    What I found surprising as I'm sure did all of you is why the Terrorists don't make use of superior open source alternatives, particularly as the discovery of these Jihadi specific tools on your machine would be fairly damning.

    The answer seems to be general distrust of software developed in the West as well as an attempt to appear grandiose through heading their PGP keys with the words 'Al Qaeda'.


  • Closed Accounts Posts: 1,004 ✭✭✭Recondite49


    Further to my last post if anyone would like to see a summary of the encryption products used by Al Qaeda, you can find one here.

    The Recorded Future website gives an excellent rundown of each of these tools, plus the improvements that have been made to them of late.

    In brief it seems more encryption algorithms have been added and they've taken to using 4096 bit keys to exchange messages. Still most of this stuff is home brew and runs on Windows so I don't think the NSA have too much to worry about.


  • Closed Accounts Posts: 1,260 ✭✭✭Rucking_Fetard


    A 'second Snowden' is leaking secret U.S. documents
    U.S. officials believe that a new source is leaking national security information to the public.

    CNN reports that officials reached this conclusion based on new documents published today by Glenn Greenwald’s site The Intercept—documents which post-date National Security Agency (NSA) whistleblower Edward Snowden’s flight to Russia. CNN’s report confirms a theory has been floating around for at least a month.


  • Closed Accounts Posts: 1,260 ✭✭✭Rucking_Fetard


    Theirs a thread around here somewhere with an article about using a smartphone to detect vibrations from a keyboard and knowing what was typed. Search isin't finding it, nearest comment is below...so I'll stick this here...


    Smartphone apps that can detect vibrations can guess what keys are being pressed.

    How paranoid do you want to be ?

    HoHo, this is after going to a whole new level.

    Detecting the sound vibrations on a crisp bag through sound proof glass:eek::pac::D from 15 FEET away.

    http://newsoffice.mit.edu/2014/algorithm-recovers-speech-from-vibrations-0804



  • Advertisement
  • Closed Accounts Posts: 1,260 ✭✭✭Rucking_Fetard


    Snowden got new 3 year visa. Will have to return to US or apply for residency before that ends.

    On phone, funny bit in article, visa allows him to move about freely AND travel abroad. lol.

    Cant see their being to much travel. The US still have warrants out for Mckinnon if he leaves the UK even.

    Kenny should send the Jet over for snowden. Not messing. Do some good b4 hes tossed out at next election.


  • Closed Accounts Posts: 1,260 ✭✭✭Rucking_Fetard


    The US Intelligence Community has a Third Leaker
    Ever since The Intercept published this story about the US government's Terrorist Screening Database, the press has been writing about a "second leaker":

    The Intercept article focuses on the growth in U.S. government databases of known or suspected terrorist names during the Obama administration.

    The article cites documents prepared by the National Counterterrorism Center dated August 2013, which is after Snowden left the United States to avoid criminal charges.

    Greenwald has suggested there was another leaker. In July, he said on Twitter "it seems clear at this point" that there was another.

    Everyone's miscounting. This is the third leaker:

    Leaker #1: Edward Snowden.

    Leaker #2: The person that is passing secrets to Jake Appelbaum, Laura Poitras and others in Germany: the Angela Merkel surveillance story, the TAO catalog, the X-KEYSCORE rules. My guess is that this is either an NSA employee or contractor working in Germany, or someone from German intelligence who has access to NSA documents. Snowden has said that he is not the source for the Merkel story, and Greenwald has confirmed that the Snowden documents are not the source for the X-KEYSCORE rules. I have also heard privately that the NSA knows that this is a second leaker.

    Leaker #3: This new leaker, with access to a different stream of information (the NTSC is not the NSA), who The Intercept calls "a source in the intelligence community."

    Harvard Law School professor Yochai Benkler has written an excellent law-review article on the need for a whistleblower defense. And there's this excellent article by David Pozen on why government leaks are, in general, a good thing.


  • Closed Accounts Posts: 1,260 ✭✭✭Rucking_Fetard


    Most Wanted Man in the World - Big New Interview

    Says that he left crumbs so that the NSA would know exactly what he took.

    NSA took down syrian Internet in 2012 trying to eavesdrop.

    And gives details about another NSA Program (Greenwald needs to get off his ass) MonsterMind
    The program, disclosed here for the first time, would automate the process of hunting for the beginnings of a foreign cyberattack. Software would constantly be on the lookout for traffic patterns indicating known or suspected attacks. When it detected an attack, MonsterMind would automatically block it from entering the country—a “kill” in cyber terminology.

    Programs like this had existed for decades, but MonsterMind software would add a unique new capability: Instead of simply detecting and killing the malware at the point of entry, MonsterMind would automatically fire back, with no human involvement. That’s a problem, Snowden says, because the initial attacks are often routed through computers in innocent third countries. “These attacks can be spoofed,” he says. “You could have someone sitting in China, for example, making it appear that one of these attacks is originating in Russia. And then we end up shooting back at a Russian hospital. What happens next?”


  • Registered Users Posts: 7,282 ✭✭✭jmcc


    The problem with a lot of Snowden's claims about his positions and work is that much of his CV is very hard to verify. Is MonsterMind a reactive system for dealing with botnet originated attacks or a system for backtracking malware infections? Is it a system for detecting a full critical infrastructure attack? It sounds impressive but its operation and targets are not exactly clear.

    Regards...jmcc


  • Registered Users Posts: 367 ✭✭900913


    Schrodinger’s Cat Video and the Death of Clear-Text

    Introduction

    While there has been much discussion about the use of software described as ‘implants’ or ‘backdoors’ to perform targeted surveillance, this report is about the less well understood method by which most targeted surveillance is delivered: network injection. Taking advantage of security flaws in major web presences (such as Google’s ‘YouTube’ and Microsoft’s ‘Live’)2, vendors have started selling turnkey solutions that enable easy installation of targeted surveillance software at scale.

    This report provides a detailed analysis of two products sold for facilitating targeted surveillance known as network injection appliances. These products allow for the easy deployment of targeted surveillance implants and are being sold by commercial vendors to countries around the world. Compromising a target becomes as simple as waiting for the user to view unencrypted content on the Internet.

    While the technology required to perform such attacks has been understood for some time, there is limited documentation of the operation of these attacks by state actors.
    This report provides details on the use of such surveillance solutions including how they are built, deployed, and operated.


  • Advertisement
  • Closed Accounts Posts: 1,260 ✭✭✭Rucking_Fetard




  • Closed Accounts Posts: 1,260 ✭✭✭Rucking_Fetard


    Treasure Map: The NSA Breach of Telekom and Other German Firms
    Treasure Map is anything but harmless entertainment. Rather, it is the mandate for a massive raid on the digital world. It aims to map the Internet, and not just the large traffic channels, such as telecommunications cables. It also seeks to identify the devices across which our data flows, so-called routers.

    Furthermore, every single end device that is connected to the Internet somewhere in the world -- every smartphone, tablet and computer -- is to be made visible. Such a map doesn't just reveal one treasure. There are millions of them.

    The breathtaking mission is described in a Treasure Map presentation from the documents of the former intelligence service employee Edward Snowden which SPIEGEL has seen. It instructs analysts to "map the entire Internet -- Any device, anywhere, all the time."

    Treasure Map allows for the creation of an "interactive map of the global Internet" in "near real-time," the document notes. Employees of the so-called "FiveEyes" intelligence agencies from Great Britain, Canada, Australia and New Zealand, which cooperate closely with the American agency NSA, can install and use the program on their own computers. One can imagine it as a kind of Google Earth for global data traffic, a bird's eye view of the planet's digital arteries.

    Jaysus.


  • Closed Accounts Posts: 1,260 ✭✭✭Rucking_Fetard


    NSA shared Americans' private communications with Israel: Snowden
    The data gathered by the unit included Palestinians’ sexual orientations, infidelities, money problems, family medical conditions and other private matters that could be used to coerce them into becoming collaborators, they said.


  • Closed Accounts Posts: 1,260 ✭✭✭Rucking_Fetard


    "It's one of the biggest abuses we’ve seen," Bamford quoted Snowden as saying.

    Jeez, it really is when you think about it. This has nothing to do with "protecting the country" blah blah, this is purly looking for dirt on people to get them to do your bidding.

    Really should be more about this.


  • Closed Accounts Posts: 4,029 ✭✭✭shedweller


    "It's one of the biggest abuses we’ve seen," Bamford quoted Snowden as saying.

    Jeez, it really is when you think about it. This has nothing to do with "protecting the country" blah blah, this is purly looking for dirt on people to get them to do your bidding.

    Really should be more about this.

    There should.
    But look a little deeper down the rabbit hole and you'll see why there isn't.
    Sorry, its probably a bit tin foily for some but thats the way i feel at this stage of my life. I've seen enough now to have made my mind up on that.
    Not young and impressionable, just a little past young and just fecking annoyed now at the global bullsh1t thats going on.


  • Closed Accounts Posts: 1,260 ✭✭✭Rucking_Fetard


    Liars liars pants on Fire, independent study shows
    “.…Flashpoint Global Partners, a private security firm, examined the frequency of releases and updates of encryption software by jihadi groups….. It found no correlation in either measure to Snowden’s leaks about the NSA’s surveillance techniques, which became public beginning June 5, 2013.”

    https://firstlook.org/theintercept/2014/09/16/snowdens-leaks-didnt-help-terrorists/


  • Closed Accounts Posts: 1,260 ✭✭✭Rucking_Fetard


    I wonder will he get the peace prize friday...


  • Closed Accounts Posts: 1,260 ✭✭✭Rucking_Fetard


    I wonder will he get the peace prize friday...
    Nope Rucking, he didn't. Because it seems to be all gone political and the Committee were afraid of upsetting, the Americans, the Chinese, the Japanese, everyone...pffft may aswell not bother. Tis a joke.



    Winners.


    Physics Award has questions over it to.


  • Closed Accounts Posts: 1,260 ✭✭✭Rucking_Fetard




  • Closed Accounts Posts: 1,260 ✭✭✭Rucking_Fetard




  • Advertisement
  • Closed Accounts Posts: 1,260 ✭✭✭Rucking_Fetard


    Edward Snowden’s Privacy Tips: “Get Rid Of Dropbox,” Avoid Facebook And Google

    New Interview Vid.


    The Holder of Secrets
    Laura Poitras’s closeup view of Edward Snowden.


  • Registered Users Posts: 43 bd0101


    Google Analytics create user profiles even if you are not a google user.. Android devices (non-rooted ones) require a google account for enabling most functionality, smartphones collect a vast amount of data, every browser is almost uniquely identified by the plugins and several other system parameters .. and my question is: would reducing or even seizing usage of these services help? Maybe, but it will be insignificant to the whole lot.

    What we need is an internet Reformation, a decentralized system of governance and trust, which would take away powers from US.


  • Banned (with Prison Access) Posts: 55 ✭✭KaaaaaaPOW


    CITIZENFOUR is on CH4 Wednesday at 23.05

    channel4.com/programmes/citizenfour


  • Moderators, Technology & Internet Moderators Posts: 4,621 Mod ✭✭✭✭Mr. G


    Has anyone seen it? Looking forward to that.


  • Registered Users Posts: 203 ✭✭industrialhorse


    Mr. G wrote: »
    Has anyone seen it? Looking forward to that.

    I downloaded it a few weeks ago. Brilliant documentary and well worth a watch. Also picked up the best documentary oscar last night. Take that Murica:)


  • Moderators, Technology & Internet Moderators Posts: 37,485 Mod ✭✭✭✭Khannie


    Snowden, Greenwald and Laura Poitras did an AMA over on reddit there yesterday. Snowden made some cracking posts. He's an incredible communicator.

    Snowden for President!

    Of Earth!



    https://www.reddit.com/r/IAmA/comments/2wwdep/we_are_edward_snowden_laura_poitras_and_glenn/


  • Closed Accounts Posts: 3,362 ✭✭✭rolion


    Scary...to write this post here,now,while watching it...
    Gosh...unbelievable...one feel to hear but seeing it....oaahhh...
    Thank You.


  • Registered Users Posts: 57 ✭✭INPUT INNPUT


    Seems Assange was the one the "leaked" that Snowden was on the Bolivian Presidential plane in 2013 which forced it to emergency land in Austria after being denied flight permission through France and Portugal.

    http://www.telesurtv.net/english/news/Bolivia-Accuses-Assange-of-Putting-Evo-Morales-Life-at-Risk-20150413-0024.html


  • Closed Accounts Posts: 720 ✭✭✭anvilfour


    Can anyone make head or tail of the systemd controversy?


  • Advertisement
  • Registered Users Posts: 43 bd0101


    Since Microsoft has been the first PRISM member, I thought this would be a nice relevant (and controversial) white paper to post:

    http://blogs.microsoft.com/cybertrust/2014/12/03/proposed-cybersecurity-norms/

    The majority of terminology and solutions are taken from military strategies and rules of engagement.. nothing new. It is very funny though that this had been posted by Microsoft - that had handled over all keys to NSA..


Advertisement