I lose. http://www.bbc.co.uk/news/technology-16810312
Arguably still situational awareness... but still... I lose. On Jun 11, 2012 1:39 PM, "Martin Hepworth" <[email protected]> wrote: > Daily mail is one of chicken licken type newspapers where rhe sky is > always falling! > > Martin > > On Monday, 11 June 2012, Kyle Creyts wrote: > >> I don't believe I mentioned NSA's UDC... I think that is legitimate >> news. I think your brain may have absorbed a bit much of that aluminum >> from your foil hat. >> >> However, suggesting that there is a person reading all that crap seems >> pretty silly, and assuming that you're going to tip a balance by using >> those words in emails is a bit narcissistic. If you really can't see >> the operational value of a system that reads the streaming data from >> social media, and uses it to identify ongoing events of interest to >> DHS or of operational importance, then you should probably get your >> foil hat checked, because I'm probably trying to read your mind right >> now, too. There is a very clear, very obvious use case from where I >> sit, and it has nothing to do with tracking people. How many times did >> you hear about an earthquake via Facebook or Twitter before you heard >> about it on the news? >> >> If there was a list of words that they were using to track activities >> of subversive people and groups, such a project, and probably any >> information on the sig list it used would probably be classed. It >> probably wouldn't listen to just social media, and certainly not for >> such blasé keywords. It would likely be a highly dynamic list that >> contained targeted entries largely informed by recent intelligence >> produced by analysts working on different specific threats. >> >> It'd be a daft fool who releases his tracking signatures to the people >> he targets. It wasn't like this was a whistleblower or FOIA win... >> IIRC, this list, or some version of it has been out and making rounds >> on the internet for quite a while, over a year. >> >> So, I frequently label the act of implying things that are very >> clearly not in the text -- and needlessly add drama to a situation -- >> as creating FUD. Let me know if I am using it wrong. Calling me naïve >> is okay. I don't mind being considered naïve. I just think that this >> would be a very large amount of money and possibly negative publicity >> (and they hate negative publicity) to spend on mere misdirection. Note >> that the inquiry was not into monitoring activities of the NSA, and >> that this list is very specifically referred to as a DHS tool. If the >> NSA has a tool, it is really probable that it isn't this. >> >> http://www.scribd.com/doc/82701103/Analyst-Desktop-Binder-REDACTED >> >> This manual details the usage of the list, and what identifies an Item >> of Interest. >> >> On Mon, Jun 11, 2012 at 11:30 AM, steve pirk [egrep] <[email protected]> >> wrote: >> > I really do not consider the NSA's Utah Data Center FUD, and I doubt >> that >> > this list is limited to Homeland Security. I figure if they are going >> to try >> > and read everything, then give them tons of junk to read. >> > >> > I'll see Rob's comments and raise him one. I think I will add a >> paragraph >> > similar to one of his to my G+ profile. That gets indexed by Google >> every >> > day at least. Pretty soon they might need another one of these data >> centers. >> > hahahaha >> > http://www.wired.com/threatlevel/2012/03/ff_nsadatacenter/all/1 >> > >> > Oh, I switched over to using my gmail account for funsec, so I am going >> to >> > remove this apps account from the list. Same me, different profile pic. >> > >> > --steve >> > On Tue, May 29, 2012 at 1:10 PM, Kyle Creyts <[email protected]> >> wrote: >> >> >> >> Somebody really obviously has their knickers in a bunch over some FUD >> >> again. This seems like a terribly overblown article making wild >> >> accusations about what is really obviously a situational awareness >> >> tool, not a system to track specific individuals. You don't put words >> >> like "tornado" on a list of words to seek for spying on individuals. >> >> >> >> On Tue, May 29, 2012 at 3:04 PM, Rob, grandpa of Ryan, Trevor, Devon & >> >> Hannah <[email protected]> wrote: >> >> >> >> >> >> >> http://www.dailymail.co.uk/news/article-2150281/REVEALED-Hundreds-words-avoid- >> >> >> us ing-online-dont-want-government-spying-you.html >> >> > >> >> > This wasn't "smart." Obviously some "pork" barrel project dreamed >> up by >> >> > the DHS >> >> > "authorities" "team" ("Hail" to them!) who are now "sick"ly sorry >> they >> >> > looked >> >> > into "cloud" computing "response." They are going to learn more than >> >> > they ever >> >> > wanted to know about "exercise" fanatics going through the "drill." >> >> > >> >> > Hopefully this message won't "spillover" and "crash" their >> "collapse"d >> >> > parsing >> >> > app, possibly "strain"ing a data "leak." You can probably "plot" the >> >> > failures >> >> > at the NSA as the terms "flood" in. They should have asked us for >> >> > "help," or at >> >> > least "aid." >> >> > >> >> > Excuse, me, according to the time on my "watch," I have to leave off >> >> > working on >> >> > this message, "wave" bye-bye, and get some "gas" in the car, and then >> >> > get a >> >> > "Subway" for the "nuclear" family's dinner. Afterwards, we're >> playing >> >> > "Twister"! >> >> > >> >> > ("Dedicated denial of service"? Really?) >> >> > >> >> > >> >> > ====================== (quote inserted randomly by Pegasus Mailer) >> >> > [email protected] [email protected] >> [email protected] >> >> > Every act of communication is an act of translation - G. Rabassa >> >> > victoria.tc.ca/techrev/rms.htm http://www.infosecbc.org/links >> >> > http://blogs.securiteam.com/index.php/archives/author/p1/ >> >> > http://twitter.com/rslade >> >> > _______________________________________________ >> >> > Fun and Misc security discussion for OT posts. >> >> > > > > > -- > -- > Martin Hepworth, CISSP > Oxford, UK >
_______________________________________________ Fun and Misc security discussion for OT posts. https://linuxbox.org/cgi-bin/mailman/listinfo/funsec Note: funsec is a public and open mailing list.
