Hacker Newsnew | past | comments | ask | show | jobs | submit | asdefghyk's commentslogin

I was just being cautious - as in previous events there has been some conflicting statements about categorization of events ...

I just clicked on link ..... and got ... Story was removed by a moderator.

(Logged-out visitors only see "Story was removed" because we don't want to give trolls a convenient public monument to content that was so bad or bizarre we removed it.)


Said to be terrorist event.

Some what (vaguely) related to this topic About surveillance.

I recall a local political and business figure making statements you and/or I are being surveilled by the government. Everyone thought that's not likely , its not possible, he is a bit imbalanced..

After the dumping of documents' from Snowden and Assange it was shown to be possible Things like, if its even possible , it could plausibly be happening. The government has somewhat infinite resources.

The altered software for hard drive hacking for example. Wow. Intercepting packages in mail and altering the software ...


The Soviets planted listening devices in American embassy typewriters between October 1976 and January 1984 - by intercepting them in the mail!

Really sophisticated devices: https://www.cryptomuseum.com/covert/bugs/selectric/


Wow, back in the 70s the bugs were only detectable by x-ray scan. Makes you wonder what kinds of things can be hidden in the ICs of today.

I love the internet. For all its drawbacks lately, deep down at its core, there are still hidden gems out there like this website. There goes my afternoon.

We know now that communications are being intercepted in bulk as a matter of intelligence gathering, but that does not equate to everyone being surveilled by the government.

What this actually provides, first and foremost, is the capability to perform targeted surveillance more rapidly, and to do so temporally by reaching into datasets already recorded. Obviously this provides a much-needed capability for legitimate investigations, where the target of interest and their identifying markers may not yet be known.


>We know now that communications are being intercepted in bulk as a matter of intelligence gathering, but that does not equate to everyone being surveilled by the government.

Yes it does.


No it doesn't. Think about it. Some computer somewhere that is involved in bulk interception happens to record your browser connecting to, say, the Hacker News website, at various dates and times. This is stored in a dataset. No-one ever views these connection records. No-one ever writes a query for the dataset that returns these connection records. These connection records are automatically deleted after the retention period is up. Clearly, you are not being surveilled.

So your claim is that this massive data collection, done at massive public expense, is not used at all? That seems unlikely. And given how good computers are at natural language processing these days, the data is more usable than ever.

Of course it is used. But unless you're a target of interest to intelligence analysts, the metadata generated by your online activities will be of no interest whatsoever. It won't even be looked at.

The whole point of mass data collection is that you can check everyone to see if they should be targets of interest. And as societies get more totalitarian, what qualifies you to be a target becomes less and less dramatic.

Doing this is easy these days. You keep using phrases like "looked at" as if humans had to manually read through the records.


It leads to a Chilling Effect which has a huge negative impact on society.

Analytics are mining the data on here every second. Hacker News is a wildly popular site with higher ups in major Fortune 500 company posting anonymously and publicly here. Say anything bad about a major country's government (or even a minor country like Israel or Palestine) and all kinds of accounts you've never seen before start defending and attacking.

Everything you are saying is being actively monitored at this point on every major website even if you don't believe it's negatively affecting you yet


An analyst who is tasked with investigating, say, terrorist threats, is not going to be remotely interested in the browsing habits of random people who pose no threat whatsoever.

It's just pure paranoia. Yes, we know bulk interception is being done by intelligence agencies. No, they're not watching you. They have more important things to be getting on with.


You can get on secret watchlists by means of guilt by association, automagically.

https://legalclarity.org/what-happens-if-you-are-on-a-watchl...

https://abcnews.go.com/US/terrorist-watch-list-works/story?i...

https://www.businessinsider.com/how-to-be-on-fbi-watch-list-...

That also applies to just visiting absolutely harmless websites which have been deemed VERBOTEN! to visit, for whichever reason(again, in secret).

Have fun trying flying then, or being debanked. Would you like to spanked?


Your are arguing from a green account that everyone should ignore all evidence contrary to what you are saying and just calling everyone paranoid for not pretending that evidence doesn't exist. The same government that is demanding all visitors to the United States show them all posts they have made online as a condition of entry. It is not an argument worth engaging with anymore.

That supports my point. If there really was a mass surveillance regime as the paranoics claim, there would be no need for the border control agents to ask for social media posts to be shown on entry. They would already have this information.

No, it does not!

Doppelt genäht hält besser! https://dict.leo.org/german-english/Doppelt%20gen%C3%A4ht%20....

Also plausible deniability and/or competition/mistrust between different actors/agencies.


R U sure/serious?

There is the concept of https://en.wikipedia.org/wiki/Dragnet_(policing) and

https://en.wikipedia.org/wiki/Sentiment_analysis

Combine that with https://en.wikipedia.org/wiki/Geofence_warrant and enjoy the possible hassle of being 'by-catch'.


I thought about it, and now I’m even more convinced we are being surveilled.

William Binney, former technical director of NSA disagrees: https://www.youtube.com/watch?v=3owk7vEEOvs

I see further down the thread you claim that surveillance data is deleted without ever being looked at. Must be why they need a half dozen gargantuan datacenters full of storage and compute.


This is the correct point of reference, but you are misinterpreting it and I urge you to think about it again. All of the government's facilities put together amount to almost nothing in the data center landscape, therefore it should be quite obvious that they certainly are not equipped to broadly intercept, store, and search "everything".

"A former senior U.S. intelligence agent described Alexander's program: "Rather than look for a single needle in the haystack, his approach was, 'Let's collect the whole haystack. Collect it all, tag it, store it ... And whatever it is you want, you go searching for it.""

https://en.wikipedia.org/wiki/Keith_B._Alexander#NSA_appoint...


What you're describing is a program from 20 years ago design to surveil limited parties in a limited geographic region overseas, during a war, in a place that enjoyed Stone Age information systems. That is not in the sense that the people in this discussion meant by blanket surveillance. They are talking about broad interception of all communications by U.S. persons, an undertaking that it should be obvious to you if you are in this industry would be economically if not thermodynamically impossible.

"After 9/11, they took one of the programs I had done, or the backend part of it, and started to use it to spy on everybody in this country. That was a program I created called Stellar Wind. That was seperate and compartmented from the regular activity which was ongoing because it was doing domestic spying. All the equipment was coming in, I knew something was happening but then when the contractors I had hired came and told me what they were doing, it was clear where all the hardware was going and what they were using it to do. It was simply a different input, instead of being foreign it was domestic." - William Binney

https://www.youtube.com/watch?v=590cy1biewc


Civilian information systems have radically expanded in size since 2001, even if we take that ancient statement at face value. In the year 2025 it's crazy to believe that every newspaper is shouting that civilian information systems are destabilizing the national power grid and drying up the water table, but the government possesses a larger, far more capable information system that paradoxically has no observable physical presence.

"The Utah Data Center (UDC), also known as the Intelligence Community Comprehensive National Cybersecurity Initiative Data Center, is a data storage facility for the United States Intelligence Community that is designed to store data estimated to be on the order of exabytes or larger."

"The structure provides 1 to 1.5 million sq ft (93,000 to 139,000 m2), with 100,000 sq ft (9,300 m2) of data center space and more than 900,000 sq ft (84,000 m2) of technical support and administrative space."

"The completed facility is expected to require 65 megawatts of electricity, costing about $40 million per year. Given its open-evaporation-based cooling system, the facility is expected to use 1.7 million US gal (6,400 m3) of water per day.

An article by Forbes estimates the storage capacity as between 3 and 12 exabytes as of 2013, based on analysis of unclassified blueprints, but mentions Moore's Law, meaning that advances in technology could be expected to increase the capacity by orders of magnitude in the coming years."

https://en.wikipedia.org/wiki/Utah_Data_Center


There was an interesting connection I discovered once.

The NSA's UDC is located here: https://en.wikipedia.org/wiki/Bluffdale,_Utah

Then there was https://en.wikipedia.org/wiki/M-DISC which was located here:

https://en.wikipedia.org/wiki/American_Fork,_Utah

Open the two location articles in tabs, scroll down a little until you see the maps, or rather have them in good view, and then switch between them, fast, back and forth.

See what I mean?

There was more, but I don't have it ready ATM(storage long lost), and am too tired to research it again(reading many ugly government and business sites) but, shortly after it was officially known where that datacenter would be built, Millenniata (M-Disc) opened shop there.

I can't recall exactly anymore ATM, they may have incorporated smaller, elsewhere, near there, but the move to the final location came shortly after public/official knowledge of where that data center would be built.

Ain't that funny? :-)

Edit: Got another one, but probably unrelated because of the timeframe, but interesting nonetheless. Very advanced and fast flash storage(for the time, and in some aspects still, like retention time and durability).

https://en.wikipedia.org/wiki/Lehi,_Utah where one of IM-Flash's(Joint Venture of Intel & Micron) factories was/is located (sold to Texas Instruments, producing other stuff now).

https://en.wikipedia.org/wiki/IM_Flash_Technologies

https://en.wikipedia.org/wiki/3D_XPoint


Exactly. That is a toy-sized data center. It would fit in the janitor's closet of a real data center.

According to Sandvine, the vast majority of internet traffic from 2013 (chosen to coincide with the Forbes storage estimates) was video such as Netflix and Youtube[1] and remains so today[2]. Assuming NSA is aware of industry standard techniques such as data de-duplication and compression, Forbe's estimate of 3 - 12 exabytes in 2013 would have been sufficient to store the entire year's world internet traffic in full.

In 2025 The Internet Archive holds approximately 100 exabytes[3] and contains data dating back to 1995[4]. Adjusting the 2013 Forbes numbers for the Utah Data Center for 2025 storage density (4Tb drives in 2013, 36Tb drives in 2025) yields 27 - 108 exabytes. Which demonstrates clearly that a datacenter on the scale of the Utah Data Center is capable of storing and retaining a versioned history of a significant fraction of the world's internet over a significant period of time.

Assuming they prioritize metadata and unique traffic further extends the horizon on how much can be stored and for how long.

1: https://macaubas.com/wp-content/uploads/2013/05/Sandvine_Glo...

2: https://www.applogicnetworks.com/blog/sandvines-2024-global-...

3: https://en.wikipedia.org/wiki/Internet_Archive#Web_archiving

4: https://archive.org/post/60275/what-is-the-oldest-page-on-th...


Maybe just the metadata, of which phone-number calls which other when and where? Who messages whom by email, messenger, whatever, when and where? For the graph of communications over time, with interesting nodes appearing, showing emerging clusters around them, whose members then could be targeted by other means?

Yes, and this is the only feasible approach given the huge technical advances in communications over the past few decades.

Why should they when they have access to FAANG? No need for massive data centers.

By access to FAANG, you mean they can issue court orders to surveil specific foreign accounts, right? Because that's what was in Snowden's docs.

"NSA Secretly Tapped Google, Yahoo Data Centers, Report Says"

https://www.networkcomputing.com/data-center-networking/nsa-...

"A striking feature of proceedings at the Foreign Intelligence Surveillance Court (FISC) is that the executive always wins. Between 1979 and 2012—the first thirty-three years of the FISC’s existence—federal agencies submitted 33,900 ex parte requests to the court. The judges denied eleven and granted the rest: a 99.97% rate of approval."

https://www.stanfordlawreview.org/online/is-the-foreign-inte...

"The newspaper reported that in "more than a dozen classified rulings, the nation's surveillance court has created a secret body of law giving the National Security Agency the power to amass vast collections of data on Americans""

https://en.wikipedia.org/wiki/United_States_Foreign_Intellig...

So, by "court order" do you mean secret law and secret trials with a history of always deciding against those who are being surveilled? Because that's what was in Snowden's docs.


> "NSA Secretly Tapped Google, Yahoo Data Centers, Report Says"

This was for extracting email envelope metadata to build a graph of who was contacting whom, a program that Snowden's leaks showed had already been shut down.

> "A striking feature of proceedings at the Foreign Intelligence Surveillance Court (FISC) is that the executive always wins. Between 1979 and 2012—the first thirty-three years of the FISC’s existence—federal agencies submitted 33,900 ex parte requests to the court. The judges denied eleven and granted the rest: a 99.97% rate of approval."

What do you think the approval rate for other court orders is? It's exactly the same.

> "The newspaper reported that in "more than a dozen classified rulings, the nation's surveillance court has created a secret body of law giving the National Security Agency the power to amass vast collections of data on Americans"

This reporting was at odds with what the leaked documents said and was later walked back.

> So, by "court order" do you mean secret law and secret trials with a history of always deciding against those who are being surveilled? Because that's what was in Snowden's docs.

That explicitly was not in Snowden's docs. The law is public, and warrants are almost always granted. In this case, as Snowden's docs said, the court orders are for foreigners, living outside the U.S.


> This was for extracting email envelope metadata to build a graph of who was contacting whom, a program that Snowden's leaks showed had already been shut down.

"According to Victor Marchetti, a former special assistant to the deputy director of the Central Intelligence Agency (CIA), a limited hangout is "spy jargon for a favorite and frequently used gimmick of the clandestine professionals. When their veil of secrecy is shredded and they can no longer rely on a phony cover story to misinform the public, they resort to admitting—sometimes even volunteering—some of the truth while still managing to withhold the key and damaging facts in the case."

https://en.wikipedia.org/wiki/Limited_hangout

In fact, NSA's own slide deck, an excerpt of which can be viewed here: https://www.cnet.com/tech/services-and-software/fiber-optic-... indicate that all Google services including Gmail, Docs, Maps, and others were subject to interception.

Additional NSA slides here: https://www.cnet.com/tech/tech-industry/new-slides-reveal-gr... detail email, chat, video, voice, photos, stored data, VoIP, file transfers, video conferencing, notifications, social networking details, and the ever ominous "Special Requests".

> What do you think the approval rate for other court orders is? It's exactly the same.

"Two wrongs make a right" is considered "one of the most common fallacies in Western philosophy".

https://en.wikipedia.org/wiki/Two_wrongs_don%27t_make_a_righ...

> This reporting was at odds with what the leaked documents said and was later walked back.

The linked article: https://en.wikipedia.org/wiki/United_States_Foreign_Intellig... contains 96 references to reporting from 2004 to 2021 from a wide variety of sources. The word "retraction" does not appear once. Among the cited sources are many examples such as:

A former federal judge who served on a secret court overseeing the National Security Agency's secret surveillance programs said Tuesday the panel is independent but flawed because only the government's side is represented effectively in its deliberations.

"Anyone who has been a judge will tell you a judge needs to hear both sides of a case," said James Robertson, a former federal district judge based in Washington who served on the secret Foreign Intelligence Surveillance Act court for three years between 2002 and 2005.

https://web.archive.org/web/20130711211028/https://abcnews.g...


> "According to Victor Marchetti, a former special assistant to the deputy director of the Central Intelligence Agency (CIA), a limited hangout is "spy jargon for a favorite and frequently used gimmick of the clandestine professionals. When their veil of secrecy is shredded and they can no longer rely on a phony cover story to misinform the public, they resort to admitting—sometimes even volunteering—some of the truth while still managing to withhold the key and damaging facts in the case."

Then why didn't Snowden's doc show any illegal use of that data? Instead, he leaked many things that were perfectly legal as well as which high value targets were being surveilled in China in a transparent and failed attempt to get asylum in Hong Kong.

> "Two wrongs make a right" is considered "one of the most common fallacies in Western philosophy".

You are assuming it's wrong. Investigators aren't going to waste their time writing up court orders that aren't likely to be approved. Instead, we find that criminal defense attorneys rarely challenge the validity of warrants as issued but may challenge whether the warrant was followed.

> "Anyone who has been a judge will tell you a judge needs to hear both sides of a case," said James Robertson, a former federal district judge based in Washington who served on the secret Foreign Intelligence Surveillance Act court for three years between 2002 and 2005.

You're confusing multiple things here. You're confusing bulk metadata collection, which Robertson opposed, with individual surveillance warrants, which are always done without informing the person being surveilled. There was no opposing side to the bulk metadata collection, which was shut down. There was no record of mass domestic surveillance in Snowden's docs.


> There was no record of mass domestic surveillance in Snowden's docs.

That's funny, because there's a full slide deck from NSA about it here:

https://en.wikipedia.org/wiki/PRISM#The_slides

"Its existence was leaked six years later by NSA contractor Edward Snowden"

> Then why didn't Snowden's doc show any illegal use of that data?

"Snowden's subsequent disclosures included statements that government agencies such as the United Kingdom's GCHQ also undertook mass interception and tracking of internet and communications data – described by Germany as "nightmarish" if true – allegations that the NSA engaged in "dangerous" and "criminal" activity by "hacking" civilian infrastructure networks in other countries such as "universities, hospitals, and private businesses", and alleged that compliance offered only very limited restrictive effect on mass data collection practices (including of Americans) since restrictions "are policy-based, not technically based, and can change at any time", adding that "Additionally, audits are cursory, incomplete, and easily fooled by fake justifications", with numerous self-granted exceptions, and that NSA policies encourage staff to assume the benefit of the doubt in cases of uncertainty."

https://web.archive.org/web/20130626032506/http://news.yahoo...

https://web.archive.org/web/20170103043118/https://www.thegu...

https://web.archive.org/web/20170103043118/https://www.thegu...


Unfortunately Binney has absolutely lost it and can’t be considered credible.. literally hanging out with Alex Jones and talking about Stolen elections using math a precocious middle schooler could rebut.

His pinned Tweet is still referencing a “directed energy weapon” assassination attempt of him by the US Air Force (which took place during the Trump administration, who he was supporting, so apparently some rogue DEW plane or deep state operative?)


Every human has ideas and opinions others disagree with. However, as Technical Director and later geopolitical world Technical Director of NSA with over 30 years of SIGINT service, literally no one is in a better position to know about NSA surveillance activities.

He was a middle manager decades ago. Literally most intelligence people are in a better position to know about NSA surveillance activities.

"Binney was the agency official responsible for automating much of the NSA’s worldwide monitoring networks."

https://www.wired.com/2012/04/shady-companies-nsa/


That doesn't in any way contradict what I said. Both technology and the law changed significantly since he was a middle manager in the NSA.


I was sitting in the auditorium, early 2010s at DEF CON ~X[¿I?]X~, when General Alexander gave the headlining speech of that conference (then-Director of NSA).

Within the speech he defined the world "intercept," within the intelligence community, as meaning a human operator has (in some manner) catalogued some piece of information.

The implication was that all data in stored forever, and machine learning tasks were making associations without meeting their definition of "having been intercepted" — even with the elementary ML of fifteen years ago, this was a striking admission.

----

This was among the first things I thought about during my initial weeks using GPT-3.5 (~January 2023): that most of these conversations wouldn't be considered "intercepted" despite this immense capability of humanless understanding.

Now, almost three years later, I_just_hope_our_names_touch_on_this_watchlist.jpg


>We know now that communications are being intercepted in bulk as a matter of intelligence gathering, but that does not equate to everyone being surveilled by the government.

Yeah it does. Especially because its being added to a very searchable database that can be accessed via a bewildering number of people.


Having tried skydiving thie makes me shiver. Scary Others in plane quickly jump out , maybe to avoid being in plane if it crashes ?

The Australian Transport Safety Bureau has released heart-­stopping footage of the moment a skydiver’s reserve parachute snagged on the aircraft from which he was jumping, leaving him dangling 15,000ft above ground.

Paywalled link?

BBC links has video https://www.bbc.com/news/videos/cx2ey15l4zro


Hamas hid tons of baby formula to damage Israel with starvation claims, Palestinian activist says

Hamas hid tons of baby formula and nutritional shakes meant for kids inside a warehouse to allow Gazans to starve and further its claims of widespread famine to undermine Israel, a US-based Palestinian activist claimed. Ahmed Fouad Alkhatib, an anti-Hamas activist, accused the terror group of hoarding food meant for infants and young children to purposefully increase starvation in Gaza and damage the public perception of Israel.

Obviously needs to be verified ..... as there has been lots propaganda in this war ( my belief) from both sides I suspect ....


I got offered a initial O'Reilly subscription of $200 / year - just last week ....

Went looking for the material , but could not find it on the website

Seems US military is set up to be judge and jury .

....the shipwrecked men still posed a threat ... In my opinion ...rubbish..


They were never a theat. And their boat could not reach USA without refueling dozens of times.

It was just a murder, literally to make the minister of war feels more manly.


And an admiral who felt threatened by two drowning people clinging to a piece of debris. I'll never be tough like this.

You would just … leave them?

Because that's the only logical alternative? If this were truly the mission it claimed to be, they would capture and interrogate them obviously.

I mean, it would be better. The other option is to take them out of water. There is no universe where the only option to deal with shipwrecked people is to kill them.

In a war situation, which this was not, this is a war crime.


Or do what they did in subsequent murder attempts when there were survivors: pick them up alive and return them from whence they came.

A interesting related technical explanation from Reddit

"...NukeRocketScientist • 1d ago There's really only two ways to physically lower the likelihood of bit flips from cosmic rays, one, redundancy, and two, increasing the distance between transistors. One of the downsides of making transistors as small as they are nowadays, they are much more prone to bit flips. This is due to when a cosmic ray proton at high energy interacts with materials, you can get essentially a "splashing" effect of electrons around where the proton went through the material. By having transistors as close as possible this splashing or shockwave of electrons has a higher likelihood of electrons flowing into the transistors imparting a charge and causing a 0 to flip to a 1. Redundancy is important as a cosmic ray interacting with one computer chip wouldn't have any effects on another one nearby and like you said for error checking as well.

You could of course try to physically shield the computer, but trying to stop a cosmic ray proton is far easier said than done as they can travel at more than 50% the speed of light depending on energy. It can also be even worse if you don't stop the proton fully as cosmic rays stop both kinetically and electromagnetically causing the cosmic ray to impart more of its energy into the material than if it was at much higher energy. This is called the Bragg peak and is important in proton beam therapy for treating cancer.

Source: I worked in cosmic ray interactions with materials and semiconductors for my undergrad school's CubeSat program ...." https://www.reddit.com/r/aviation/comments/1p9upno/a320_pilo...


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: