MangoCats

joined 4 months ago
[–] MangoCats@feddit.it 1 points 5 hours ago (1 children)

it very easy to ruin other aspects of your life like your relationships, your public image, and can run you afoul of the law.

Not when you succeed to the level that you can ignore the laws - which isn't just one man in the US, not by a long shot.

[–] MangoCats@feddit.it 1 points 17 hours ago

Anytime, and incase you missed it: I'm not just talking about AI driven vehicles. AI driven decisions can be just as harmful: https://www.politico.eu/article/dutch-scandal-serves-as-a-warning-for-europe-over-risks-of-using-algorithms/

[–] MangoCats@feddit.it 1 points 1 day ago* (last edited 1 day ago)

Sure, the internet is more practical, and the odds of being caught in the time required to execute a decent strike plan, even one as vague as: "we're going to Amerika and we're going to hit 50 high profile targets on July 4th, one in every state" (Dear NSA analyst, this is entirely hypothetical) so your agents spread to the field and start assessing from the ground the highest impact targets attainable with their resources, extensive back and forth from the field to central command daily for 90 days of prep, but it's being carried out on 270 different active social media channels as innocuous looking photo exchanges with 540 pre-arranged algorithms hiding the messages in the noise of the image bits. Chances of security agencies picking this up from the communication itself? About 100x less than them noticing 50 teams of activists deployed to 50 states at roughly the same time, even if they never communicate anything.

HF (more often called shortwave) is well suited for the numbers game. A deep cover agent lying in wait, potentially for years. Only "tell" is their odd habit of listening to the radio most nights. All they're waiting for is a binary message: if you hear the sequence 3 17 22 you are to make contact for further instructions. That message may come at any time, or may not come for a decade. These days, you would make your contact for further instructions via internet, and sure, it would be more practical to hide the "make contact" signal in the internet too, but shortwave is a longstanding tech with known operating parameters.

[–] MangoCats@feddit.it 4 points 1 day ago (1 children)

Photo made with AI, and that's not Alligator Intelligence.

[–] MangoCats@feddit.it 1 points 1 day ago (2 children)

The point is: IP addresses that download the content are traceable (and spoofable, but that leaves trails too...) Yeah, you might be one of thousands, but every day you log in you increase your odds of being spotted.

Listening to longwave radio? Yeah, basically anybody anywhere on the planet with a receiver. Even local broadcasts it is nigh impossible to know who is listening where within the broadcast radius and the average person walks around with several radio receivers on them all the time now.

[–] MangoCats@feddit.it 2 points 1 day ago

What a way to advertise your impotence.

[–] MangoCats@feddit.it 3 points 2 days ago

Noem is no dumbass, but she plays a convincing one on TV.

[–] MangoCats@feddit.it 1 points 2 days ago (4 children)

Oh the legal system is pretty good at deciding intent

I wouldn't say it's good at determining actual intent, just good at deciding what intent is going to be assigned by the system.

If you send an encrypted email over Hamlink once, or say something like “Beefy Burrito this is Enchilada, the tamales are in the basket” on 33cm once, probably nobody’s gonna notice.

I've always wondered how much steganography is in practice - if it's being practiced well, nobody knows. Setup a HAM station that snaps a photo at sunset and a couple of other random times per day. Transmit the photo in a standard, open digital mode, but hide your message in the noisy lower bits of the 3 color channels 0-255 R G and B, you can easily modify 6 bits per pixel without visually distorting the image, drop that to 1 bit per pixel and nobody who doesn't know your scheme could ever find it. To the local hams, it's three chirps a day, with a reliable pretty picture of the sunset and a couple of more varied times. As a utility channel, that's three opportunities per day to secretly communicate something to a listener that nobody can identify. If the picture is just 2MP, that's 250kBytes of bandwidth per image.

If you want to secretly communicate with people, use Reddit, or the Fediverse.

Absolutely, though the "listeners" there are more readily identified, even via Tor.

[–] MangoCats@feddit.it 1 points 2 days ago (6 children)

difference is intent.

And intent is functionally impossible to prove, but endlessly arguable and a judge can make a finding based on their judgement - something very different from proof.

send a PGP signed message over ham radio; if I understand correctly that’s basically a checksum that can guarantee the sender’s possession of a private key.

Correct.

[–] MangoCats@feddit.it 1 points 2 days ago

If you intend to practice the hobby, get the license. I let mine lapse after 10 years because I don't practice anymore, but I generally still remember the basic rules and how to operate the gear, so if I ever had an emergency need I'd use what I had access to - but I haven't transmitted anything in years and years.

[–] MangoCats@feddit.it 4 points 2 days ago (1 children)

Most actual communication is illegal on the ham bands one way or another

Except in case of emergency, natural disaster, etc. Before we carried cell phones, I had ham handhelds that we would talk directly to each other on 70cm for the usual "Hi honey, I'm on my way home" or... in the days before cell phone lots existed at airports, I'd call her on the handheld to let her know I was approaching the passenger drop-off/pickup area at the airport after a flight so she could start going there from whatever makeshift staging area she was in.

Anyway, when we would be out in the woods, we could reach each other roughly 1/2 mile like that from handheld to handheld, but if we ever had a serious problem we could switch to 2m and hit the local repeater which would get us more like 12 miles of range and coverage all the way into town where there was usually somebody who could make a 911 call if we needed it.

So, yeah, we have cell phones today, and they work when they work, but I find that when the cell phones don't work (like during / after a hurricane) the ham bands generally are working - or at least are restored quicker, and nobody is going to press charges for emergency communications on the ham bands.

If you want to use the ham band for instacart dispatch coordination, yeah, you're gonna get more than static about that.

 

cross-posted from: https://lemmy.sdf.org/post/31879711

cross-posted from: https://slrpnk.net/post/20187958

A prominent computer scientist who has spent 20 years publishing academic papers on cryptography, privacy, and cybersecurity has gone incommunicado, had his professor profile, email account, and phone number removed by his employer Indiana University, and had his homes raided by the FBI. No one knows why.

Xiaofeng Wang has a long list of prestigious titles. He was the associate dean for research at Indiana University's Luddy School of Informatics, Computing and Engineering, a fellow at the Institute of Electrical and Electronics Engineers and the American Association for the Advancement of Science, and a tenured professor at Indiana University at Bloomington. According to his employer, he has served as principal investigator on research projects totaling nearly $23 million over his 21 years there.

He has also co-authored scores of academic papers on a diverse range of research fields, including cryptography, systems security, and data privacy, including the protection of human genomic data. I have personally spoken to him on three occasions for articles herehere, and here.

"None of this is in any way normal"

In recent weeks, Wang's email account, phone number, and profile page at the Luddy School were quietly erased by his employer. Over the same time, Indiana University also removed a profile for his wife, Nianli Ma, who was listed as a Lead Systems Analyst and Programmer at the university's Library Technologies division.

According to the Herald-Times in Bloomington, a small fleet of unmarked cars driven by government agents descended on the Bloomington home of Wang and Ma on Friday. They spent most of the day going in and out of the house and occasionally transferred boxes from their vehicles. TV station WTHR, meanwhile, reported that a second home owned by Wang and Ma and located in Carmel, Indiana, was also searched. The station said that both a resident and an attorney for the resident were on scene during at least part of the search.

Attempts to locate Wang and Ma have so far been unsuccessful. An Indiana University spokesman didn't answer emailed questions asking if the couple was still employed by the university and why their profile pages, email addresses and phone numbers had been removed. The spokesman provided the contact information for a spokeswoman at the FBI's field office in Indianapolis. In an email, the spokeswoman wrote: "The FBI conducted court authorized law enforcement activity at homes in Bloomington and Carmel Friday. We have no further comment at this time."

Searches of federal court dockets turned up no documents related to Wang, Ma, or any searches of their residences. The FBI spokeswoman didn't answer questions seeking which US district court issued the warrant and when, and whether either Wang or Ma is being detained by authorities. Justice Department representatives didn't return an email seeking the same information. An email sent to a personal email address belonging to Wang went unanswered at the time this post went live. Their resident status (e.g. US citizens or green card holders) is currently unknown.

Fellow researchers took to social media over the weekend to register their concern over the series of events.

"None of this is in any way normal," Matthew Green, a professor specializing in cryptography at Johns Hopkins University, wrote on Mastodon. He continued: "Has anyone been in contact? I hear he’s been missing for two weeks and his students can’t reach him. How does this not get noticed for two weeks???"

In the same thread, Matt Blaze, a McDevitt Professor of Computer Science and Law at Georgetown University said: "It's hard to imagine what reason there could be for the university to scrub its website as if he never worked there. And while there's a process for removing tenured faculty, it takes more than an afternoon to do it."

Local news outlets reported the agents spent several hours moving boxes in an out of the residences. WTHR provided the following details about the raid on the Carmel home:

Neighbors say the agents announced "FBI, come out!" over a megaphone.

A woman came out of the house holding a phone. A video from a neighbor shows an agent taking that phone from her. She was then questioned in the driveway before agents began searching the home, collecting evidence and taking photos.

A car was pulled out of the garage slightly to allow investigators to access the attic.

The woman left the house before 13News arrived. She returned just after noon accompanied by a lawyer. The group of ten or so investigators left a few minutes later.

The FBI would not say what they were looking for or who is under investigation. A bureau spokesperson issued a statement: “I can confirm we conducted court-authorized activity at the address in Carmel today. We have no further comment at this time.”

Investigators were at the house for about four hours before leaving with several boxes of evidence. 13News rang the doorbell when the agents were gone. A lawyer representing the family who answered the door told us they're not sure yet what the investigation is about.

This post will be updated if new details become available. Anyone with first-hand knowledge of events involving Wang, Ma, or the investigation into either is encouraged to contact me, preferably over Signal at DanArs.82. The email address is: dan.goodin@arstechnica.com.

view more: next ›