Vanilla 1.1.9 is a product of Lussumo. More Information: Documentation, Community Support.

  1.  
    Posted By: maryyugoDura and Dunc must have a strange idea of what constitutes "due process" and searches requiring warrants from judges in the US. Oh sure, like anything else, they are sometimes abused or used in error but rarely. If the FBI has obtained permission to crack someone's safe or search their home, there is usually a pretty good reason. Why not a similar process for cracking an iPhone?

    And BTW, it does little good for law enforcement in the US to work around the reasonable search laws. If they do, the evidence and everything derived from it gets thrown out of court. All it takes is a half way educated defense lawyer.


    WITH SUPPORT FROM NANCY PELOSI, HOUSE GIVES TRUMP ADMINISTRATION BROAD LATITUDE TO SPY ON AMERICANS

    WITH BIPARTISAN BACKING, the House of Representatives passed a bill Thursday that would renew one of the government’s most sweeping surveillance authorities for six years with minimal changes.

    The measure, which passed 256-164, reauthorized Section 702 of the Foreign Intelligence Surveillance Act, which was set to expire later this month.

    The law was first passed in 2008 to legalize President George W. Bush’s warrantless wiretapping program. It allows the National Security Agency to collect Americans’ communications with people overseas, as long as the NSA is “targeting” the foreigners involved.

    The vote followed a morning of confusion, as President Donald Trump tweeted in opposition to the bill, referencing a conspiracy theory about then-President Barack Obama spying on the Trump campaign. He walked himself back two hours later, tweeting, “We need it! Get Smart!”

    The law serves as the legal backing for two mammoth NSA programs revealed by Edward Snowden: Upstream, which collects information from the internet junctions where data passes in and out of the country, and PRISM, which collects communications from U.S.-based internet companies, like Google, Microsoft, Apple, and Yahoo.

    The programs rest on the notion that they are “targeting” foreigners, but they also collect massive amounts of data on Americans, including wholly domestic communications. Amazingly, the intelligence community has never disclosed how much. Numerous members of Congress have requested an estimate since 2011, but both the Obama and Trump administrations have refused to provide one.

    The bill also consolidates the FBI’s legal authority to search those communications without a warrant. Under current rules, the NSA shares certain kinds of information it collects under Section 702 with the FBI, whose agents can then search it in the course of investigating crimes unrelated to national security. In a secret court hearing in 2015, a lawyer for the Justice Department compared the frequency of those searches to the use of Google.

    On Thursday, the House failed to pass an amendment to the bill offered by Rep. Justin Amash, R.-Mich., which would have required federal law enforcement agents to get a warrant before searching NSA data for information on Americans. The amendment was defeated 183-233, with 125 Democrats voting for it and 55 Democrats against, including Minority Leader Nancy Pelosi, D-Calif..

    As it is, the bill contains a cosmetic reform to the practice of “backdoor searches,” which requires the FBI to get a warrant whenever conducting searches related to an established criminal investigation. But it carves out massive exceptions, including for any investigation related to national security and whenever the FBI determines there is a “threat to life or serious bodily harm.” The issue is largely moot anyway because current rules allow the FBI to conduct queries even before opening an investigation.

    “Our right to privacy does not begin when the Department of Justice has a fully formed criminal case against us,” said Rep. Jerrold Nadler, D-N.Y., the top Democrat on the House Judiciary Committee, who spoke on the floor in support of the amendment. “The Constitution guarantees far more than this — our right to privacy protects us when the government first makes its decision to search our private communications for information it might find useful.”

    Democratic and Republican leadership both lined up to support the bill and oppose the amendment. “Respectful of debate on this issue, I myself will be voting to support my ranking member on the Intelligence Committee,” said Pelosi, referring to the bill’s roots in a template from the Intelligence Committee. “Weighing the equities, that’s the path I will take.”

    House Speaker Paul Ryan, R-Wisc., also spoke in support of the bill and against the amendment from a member of his own party, adding: “I want to thank [Pelosi] for coming up and speaking against the Amash amendment, and in favor of the underlying bipartisan [bill].”

    The bill’s passage follows a monthlong push by Republicans on the House Intelligence Committee to reauthorize Section 702 with as few reforms as possible. On multiple occasions, Rep. Devin Nunes, R-Calif., chair of the committee, circulated fliers with pictures of Islamic State fighters urging passage of the bill. This week, Nunes circulated a flier opposing the Amash amendment with pictures of the Boston Marathon explosion and the bomber, Dzhokhar Tsarnaev.

    Daniel Schuman, policy director for the progressive group Demand Progress, told The Intercept that by supporting the bill, Democrats in the leadership and on the Intelligence Committee were buying into Nunes’s tactics.

    “Seventy percent of Democrats voted to protect Americans against giving President Trump the ability to spy on all of us without first obtaining a warrant, as the Constitution requires,” Schuman told The Intercept by email. “Unfortunately, 55 Democrats, led by Rep. Adam Schiff, lent their support to legislation — and implicitly signed on to the racist, xenophobic language used by the Intelligence Committee majority — that expands domestic surveillance and gives reason for every American to be fearful of their government. A swing of just 26 Democrats would have defeated the measure.”

    (Emphasis mine)

    What was that you were saying again about warrants and "reasonable search laws", MY?
    •  
      CommentAuthorDuracell
    • CommentTime4 days ago
     
  2.  
    Perhaps the final part of the quiz
    •  
      CommentAuthorgoatcheez
    • CommentTime4 days ago
     
    WHY SENIORS NEVER RESET THEIR PASSWORDS

    WINDOWS:
    Please enter your new password.

    USER:
    cabbage

    WINDOWS:
    Sorry, the password must be more than 8 characters.

    USER:
    boiled cabbage

    WINDOWS:
    Sorry, the password must contain 1 numerical character.

    USER:
    1 boiled cabbage

    WINDOWS:
    Sorry, the password cannot have blank spaces

    USER:
    50damnboiledcabbages

    WINDOWS:
    Sorry, the password must contain at least one upper case character

    USER:
    50Cabbages

    WINDOWS:
    Sorry the password cannot use more than one upper case character consecutively.

    USER:
    50damnBoiledCabbagesShovedUpYo urAssIfYouDon'tGiveMeAccessNow !

    WINDOWS:
    Sorry, the password cannot contain punctuation.

    USER:
    ReallyPissedOff50DamnBoiledCab bagesShovedUpYourAssIfYouDontG iveMeAccessNow

    WINDOWS:
    Sorry, that password is already in use
    • CommentAuthorAsterix
    • CommentTime4 days ago
     
    So what OS was the malware targeted at? (Let me guess...)
    •  
      CommentAuthorDuracell
    • CommentTime4 days ago
     
    It’s not always Windows: Man charged with spying on thousands of Mac users for 13 years

    Besides the creep factor, a stunning thing about Fruitfly is that it is both unsophisticated and relatively easy to spot, yet according to the DoJ, Durachinsky was able to use it undetected from 2003 until January 2017, when he was arrested and jailed on another charge.
    • CommentAuthorAsterix
    • CommentTime4 days ago
     
    The indictment charges that while Durachinsky primarily used Fruitfly to infect Macs, he also wrote variants of Fruitfly that were capable of infecting computers running Windows.


    Strange that Linux isn't mentioned...
    •  
      CommentAuthorDuracell
    • CommentTime4 days ago
     
    Posted By: Asterix
    The indictment charges that while Durachinsky primarily used Fruitfly to infect Macs, he also wrote variants of Fruitfly that were capable of infecting computers running Windows.


    Strange that Linux isn't mentioned...
    Yes, especially when you consider that Mac OS is based on a BSD code base ...
    • CommentAuthorAsterix
    • CommentTime4 days ago edited
     
    Yabut, Apple has morphed the hell out of 4.2BSD. I can recognize parts of it on a Mac, but that's about it.

    And Linux isn't BSD, by a long shot. It's similar and uses a lot of BSD/Unix ideas, but the code is apparently sui generis. The utilities, on the other hand, are a different story. You can see references to BSD in a lot Linux man pages.
    • CommentAuthorAsterix
    • CommentTime3 days ago
     
    •  
      CommentAuthorDuracell
    • CommentTime3 days ago
     
    Posted By: AsterixGot a recent Intel laptop? You should probably read this.


    To sidestep the password prompts, all an attacker needs to do is power up the target machine, and press CTRL+P during boot. The attacker then may log into Intel Management Engine BIOS Extension (MEBx) using the default password "admin",
    FFS ...
    • CommentAuthorAsterix
    • CommentTime3 days ago
     
    Well, it's better than "password" or "1234"...

    I suspect that less than !% of laptop owners are aware of MEBx.
    •  
      CommentAuthorDuracell
    • CommentTime3 days ago edited
     
    I just simply cannot believe that in the aftermath of the IoT default password shambles ANY Internet enabled devices are STILL being manufactured / shipped with default passwords instead of random unique passwords. What a fucking joke ...