Register a SA Forums Account here!
JOINING THE SA FORUMS WILL REMOVE THIS BIG AD, THE ANNOYING UNDERLINED ADS, AND STUPID INTERSTITIAL ADS!!!

You can: log in, read the tech support FAQ, or request your lost password. This dumb message (and those ads) will appear on every screen until you register! Get rid of this crap by registering your own SA Forums Account and joining roughly 150,000 Goons, for the one-time price of $9.95! We charge money because it costs us money per month for bills, and since we don't believe in showing ads to our users, we try to make the money back through forum registrations.
 
  • Locked thread
Rooney McNibnug
Sep 2, 2008

"Life always hopes. When a definite object cannot be outlined, the indomitable spirit of hope still impels the living mass to move toward something--something that shall somehow be better."

Ghost of Reagan Past posted:

EDIT: I can't wait for someone to hijack some system infected with NSA malware, and for them to do bad things with it. Or some journalist to discover that they've got some kind of NSA malware sitting on their PC, watching them and maybe doing worse. Those will be interesting times.

This is almost certainly happening already, by the hands of the GCHQ: http://www.theguardian.com/uk-news/...washington-post

quote:

New evidence from other UK intelligence documents revealed by Snowden also shows that a GCHQ information security assessment listed “investigative journalists” as a threat in a hierarchy alongside terrorists or hackers.

quote:

One restricted document intended for those in army intelligence warned that “journalists and reporters representing all types of news media represent a potential threat to security”.

It continued: “Of specific concern are ‘investigative journalists’ who specialise in defence-related exposés either for profit or what they deem to be of the public interest.

“All classes of journalists and reporters may try either a formal approach or an informal approach, possibly with off-duty personnel, in their attempts to gain official information to which they are not entitled.”

It goes on to caution “such approaches pose a real threat”, and tells staff they must be “immediately reported” to the chain-of-command.

GCHQ information security assessments, meanwhile, routinely list journalists between “terrorism” and “hackers” as “influencing threat sources”, with one matrix scoring journalists as having a “capability” score of two out of five, and a “priority” of three out of five, scoring an overall “low” information security risk.

Terrorists, listed immediately above investigative journalists on the document, were given a much higher “capability” score of four out of five, but a lower “priority” of two. The matrix concluded terrorists were therefore a “moderate” information security risk.

--

hakimashou posted:

There are plenty of airplanes, why make better ones?

:nsallears: please, go on, hakimashou

Rooney McNibnug fucked around with this message at 17:05 on Feb 20, 2015

Adbot
ADBOT LOVES YOU

Rooney McNibnug
Sep 2, 2008

"Life always hopes. When a definite object cannot be outlined, the indomitable spirit of hope still impels the living mass to move toward something--something that shall somehow be better."

snorch posted:

:siren: There's a bigass new leak with stuff from MI6, Mossad, FSB, SSA, Iran and more :siren:

http://www.aljazeera.com/news/2015/...8100147229.html

One thing worth noting here is AJ's mention that these cables will highlight agency HUMIT operations, different from most of the SIGINT stuff we've seen within the Snowden documents.

Rooney McNibnug
Sep 2, 2008

"Life always hopes. When a definite object cannot be outlined, the indomitable spirit of hope still impels the living mass to move toward something--something that shall somehow be better."

IUG posted:

So is Tor still the way to go to help hide your network traffic? I figure this morning showed that I need to start taking my privacy a lot more seriously.

TAILS is an OS that will route all traffic through the tor network for you. You can run it via a bootable USB and it will wipe the memory well enough during the shutdown process - https://tails.boum.org/

Whonix is another option as an OS for forcing all traffic through the tor network. Whonix goes as far as compartmentalizing the routing of traffic to its own isolated virtual machine, which it calls the Gateway, and then having a separate VM as your Workstation which works with the Gateway to configure/maintain any connections - https://www.whonix.org/

Keep in mind though, its really important to understand that tor isn't a silver bullet or anything. Please understand this is a privacy tool, not inherently a security tool, and so you must rely on your own actions to a degree - https://www.torproject.org/download/download-easy.html.en#warning

Here's also a handy guide of what the tor browser does and doesn't protect you from:

quote:

TOR BROWSER CAN

+ Prevent the ISP [Internet Service Provider] or other folks on the wifi at a cafe from knowing which sites you’re visiting

+ Prevent a site you’re visiting from knowing who you are (unless you tell them)

+ Prevent a site you’re visiting from knowing that you’re the same person who visited them yesterday

————————————

TOR BROWSER CAN’T

+ Prevent the ISP from knowing you use Tor (normally)

+ Prevent a site you’re visiting from knowing you’re using Tor

+ Make other programs on your computer use Tor

+ Protect you from browser add-ons or plugins (like Flash [don’t add these])

+ Sanitize files that you download from the web

+ Protect you from malware

Rooney McNibnug
Sep 2, 2008

"Life always hopes. When a definite object cannot be outlined, the indomitable spirit of hope still impels the living mass to move toward something--something that shall somehow be better."
https://www.nytimes.com/2017/04/28/us/politics/nsa-surveillance-terrorism-privacy.html

quote:

WASHINGTON — The National Security Agency is stopping one of the most disputed forms of its warrantless surveillance program in which it collects Americans’ emails and texts to and from people overseas and that mention a foreigner under surveillance, according to officials familiar with the matter.

National security officials have argued that such surveillance is lawful and helpful in identifying people who might have links to terrorism, espionage or otherwise are targeted for intelligence-gathering. The fact that the sender of such a message would know an email address or phone number associated with a surveillance target is grounds for suspicion, these officials argued.

But privacy advocates argue that such broad collection of information means the agency, with help from telecommunications companies, is intercepting communications based on what they say, rather than who has sent or received it.

The existence of this so-called “about the target” collection from network switches was first reported by The New York Times in 2013.

Waiting for more updates, but quite a development if confirmed.

  • Locked thread