For nearly twenty years in the United States a law called CALEA (Communications Assistance for Law Enforcement Act of 1994) has been on the books. To summarize, CALEA set the federal requirement that telecommunications companies (phone companies, long distance companies, cellular carriers, and so forth) had to modify their infrastructures such that various forms of wiretapping of customers had to be possible upon presentation of a warrant. Contrary to popular belief, there are methods of surveillance other than recording a conversation. The simplest involves making a list of every phone number that a particular number calls, when the calls were …
First, I'd like to give special thanks to I/Oerror who's been keeping a hawk's eye on this. I found a couple of the articles for this post on his Twitter feed during my daily news crawl. I wish I had the time to dedicate to scanning feeds constantly for stuff like this.
I haven't been posting about this for two reasons: first, because hearing that stuff like this is going on within the United States of America to decent people who haven't done anything upsets me greatly. There is simply no reason to mistreat people like this, all it …
Every couple of days - usually on the weekends - I force myself to go on a media fast. If I can get away with it, I don't watch television, I don't look at my RSS feed reader, and I don't let myself get wrapped up in the newswires. These days it's about the only thing that lets me get a good night's sleep on the weekends and makes my blood pressure managable. I'm pretty much a desk jockey these days so that's about the only exercise I get, but that's beside the point.
It seems that the controversy over full body x-ray backscatter scanners hasn't died down yet. Since word got out that the TSA was, in fact, saving imagesfrom the machines (note: NSFW pictures) quite a few ears have perked up. Like those of a couple of US Senators. Senators Lieberman and Collins, who are the Chairman and a ranking member of the Homeland Security and Governmental Affairs Committee along with a number of other senators have made an official inquiry of the US Marshals Service about the practice. They aim to determine whether or not they are intruding unnecessarily into …
A couple of years back the Transportation Security Agency started deploying full body scanners at some airports around the country which use millimeter wave radar to scan travelers and show them as if they were nude (note: actual image, NSFW) to ensure that they weren't concealing anything under their clothes. Nevermind the fact that they utterly failed in the practicals, but never let it be said that a little thing like "it doesn't do what we want it to" stops a government project. Needless to say this has many people upset and has even resulted in no small amount of …
I've updated my blog's privacy policy to take into account some things that my web hosting provider does differently than I did when I ran my own web server. If you're curious or concerned about this, give it a look.
If you're anything like me, at some point you started to run out of room for your dead-tree editions and started downloading e-books. While you no longer have the tactile experience of reading e-books you have to admit that having a fixed-sized device with which you can store hundreds upon thousands of texts makes life a lot easier, plus, not everyone can read comfortably on a laptop or desktop display. Enter Amazon's Kindle, the darling of the e-book reader market which not only lets you buy e-books wirelessly (which can either tank your bank account or save your sanity while …
I'll be giving a presentation on Tor for the Washington DC Linux Users' Group the evening of 19 May 2010. The LUG meeting will start at 1900 EST5EDT (7:00pm) and run until 2100 EST5EDT (9:00pm) or thereabouts; afterward folks usually go to dinner nearby and hang out for a while. The meeting location is 2025 M Street NW; Washington, DC; 20036. From the street look for the big Tux the Linux Penguin poster or a sign for the LUG.
Confirmation's just hit the NOVALUG website - I will be presenting at the next meeting on 10 April 2010 on the topic of anonymity technologies in general and Tor in particular. Tor is the name of a free/open source utility which protects the user from traffic analysis and some content monitoring by passive attackers. I will discuss the origins of Tor as well as the threat model it was designed for, its capabilities, and potential attacks against the network as a whole and individual users thereof. I will also talk about operational security for users and Tor nodes. I will …