I don't believe I mentioned NSA's UDC... I think that is legitimate news. I think your brain may have absorbed a bit much of that aluminum from your foil hat.
However, suggesting that there is a person reading all that crap seems pretty silly, and assuming that you're going to tip a balance by using those words in emails is a bit narcissistic. If you really can't see the operational value of a system that reads the streaming data from social media, and uses it to identify ongoing events of interest to DHS or of operational importance, then you should probably get your foil hat checked, because I'm probably trying to read your mind right now, too. There is a very clear, very obvious use case from where I sit, and it has nothing to do with tracking people. How many times did you hear about an earthquake via Facebook or Twitter before you heard about it on the news? If there was a list of words that they were using to track activities of subversive people and groups, such a project, and probably any information on the sig list it used would probably be classed. It probably wouldn't listen to just social media, and certainly not for such blasé keywords. It would likely be a highly dynamic list that contained targeted entries largely informed by recent intelligence produced by analysts working on different specific threats. It'd be a daft fool who releases his tracking signatures to the people he targets. It wasn't like this was a whistleblower or FOIA win... IIRC, this list, or some version of it has been out and making rounds on the internet for quite a while, over a year. So, I frequently label the act of implying things that are very clearly not in the text -- and needlessly add drama to a situation -- as creating FUD. Let me know if I am using it wrong. Calling me naïve is okay. I don't mind being considered naïve. I just think that this would be a very large amount of money and possibly negative publicity (and they hate negative publicity) to spend on mere misdirection. Note that the inquiry was not into monitoring activities of the NSA, and that this list is very specifically referred to as a DHS tool. If the NSA has a tool, it is really probable that it isn't this. http://www.scribd.com/doc/82701103/Analyst-Desktop-Binder-REDACTED This manual details the usage of the list, and what identifies an Item of Interest. On Mon, Jun 11, 2012 at 11:30 AM, steve pirk [egrep] <st...@pirk.com> wrote: > I really do not consider the NSA's Utah Data Center FUD, and I doubt that > this list is limited to Homeland Security. I figure if they are going to try > and read everything, then give them tons of junk to read. > > I'll see Rob's comments and raise him one. I think I will add a paragraph > similar to one of his to my G+ profile. That gets indexed by Google every > day at least. Pretty soon they might need another one of these data centers. > hahahaha > http://www.wired.com/threatlevel/2012/03/ff_nsadatacenter/all/1 > > Oh, I switched over to using my gmail account for funsec, so I am going to > remove this apps account from the list. Same me, different profile pic. > > --steve > On Tue, May 29, 2012 at 1:10 PM, Kyle Creyts <kyle.cre...@gmail.com> wrote: >> >> Somebody really obviously has their knickers in a bunch over some FUD >> again. This seems like a terribly overblown article making wild >> accusations about what is really obviously a situational awareness >> tool, not a system to track specific individuals. You don't put words >> like "tornado" on a list of words to seek for spying on individuals. >> >> On Tue, May 29, 2012 at 3:04 PM, Rob, grandpa of Ryan, Trevor, Devon & >> Hannah <rmsl...@shaw.ca> wrote: >> >> >> >> http://www.dailymail.co.uk/news/article-2150281/REVEALED-Hundreds-words-avoid- >> >> us ing-online-dont-want-government-spying-you.html >> > >> > This wasn't "smart." Obviously some "pork" barrel project dreamed up by >> > the DHS >> > "authorities" "team" ("Hail" to them!) who are now "sick"ly sorry they >> > looked >> > into "cloud" computing "response." They are going to learn more than >> > they ever >> > wanted to know about "exercise" fanatics going through the "drill." >> > >> > Hopefully this message won't "spillover" and "crash" their "collapse"d >> > parsing >> > app, possibly "strain"ing a data "leak." You can probably "plot" the >> > failures >> > at the NSA as the terms "flood" in. They should have asked us for >> > "help," or at >> > least "aid." >> > >> > Excuse, me, according to the time on my "watch," I have to leave off >> > working on >> > this message, "wave" bye-bye, and get some "gas" in the car, and then >> > get a >> > "Subway" for the "nuclear" family's dinner. Afterwards, we're playing >> > "Twister"! >> > >> > ("Dedicated denial of service"? Really?) >> > >> > >> > ====================== (quote inserted randomly by Pegasus Mailer) >> > rsl...@vcn.bc.ca sl...@victoria.tc.ca rsl...@computercrime.org >> > Every act of communication is an act of translation - G. Rabassa >> > victoria.tc.ca/techrev/rms.htm http://www.infosecbc.org/links >> > http://blogs.securiteam.com/index.php/archives/author/p1/ >> > http://twitter.com/rslade >> > _______________________________________________ >> > Fun and Misc security discussion for OT posts. >> > https://linuxbox.org/cgi-bin/mailman/listinfo/funsec >> > Note: funsec is a public and open mailing list. >> >> >> >> -- >> Kyle Creyts >> >> Information Assurance Professional >> BSidesDetroit Organizer >> _______________________________________________ >> Fun and Misc security discussion for OT posts. >> https://linuxbox.org/cgi-bin/mailman/listinfo/funsec >> Note: funsec is a public and open mailing list. > > > > > -- > steve pirk > yensid > "father... the sleeper has awakened..." paul atreides - dune > kexp.org member august '09 - Google+ pirk.com -- Kyle Creyts Information Assurance Professional BSidesDetroit Organizer _______________________________________________ Fun and Misc security discussion for OT posts. https://linuxbox.org/cgi-bin/mailman/listinfo/funsec Note: funsec is a public and open mailing list.