I don't believe I mentioned NSA's UDC... I think that is legitimate
news. I think your brain may have absorbed a bit much of that aluminum
from your foil hat.

However, suggesting that there is a person reading all that crap seems
pretty silly, and assuming that you're going to tip a balance by using
those words in emails is a bit narcissistic. If you really can't see
the operational value of a system that reads the streaming data from
social media, and uses it to identify ongoing events of interest to
DHS or of operational importance, then you should probably get your
foil hat checked, because I'm probably trying to read your mind right
now, too. There is a very clear, very obvious use case from where I
sit, and it has nothing to do with tracking people. How many times did
you hear about an earthquake via Facebook or Twitter before you heard
about it on the news?

If there was a list of words that they were using to track activities
of subversive people and groups, such a project, and probably any
information on the sig list it used would probably be classed. It
probably wouldn't listen to just social media, and certainly not for
such blasé keywords. It would likely be a highly dynamic list that
contained targeted entries largely informed by recent intelligence
produced by analysts working on different specific threats.

It'd be a daft fool who releases his tracking signatures to the people
he targets. It wasn't like this was a whistleblower or FOIA win...
IIRC, this list, or some version of it has been out and making rounds
on the internet for quite a while, over a year.

So, I frequently label the act of implying things that are very
clearly not in the text -- and needlessly add drama to a situation --
as creating FUD. Let me know if I am using it wrong. Calling me naïve
is okay. I don't mind being considered naïve. I just think that this
would be a very large amount of money and possibly negative publicity
(and they hate negative publicity) to spend on mere misdirection. Note
that the inquiry was not into monitoring activities of the NSA, and
that this list is very specifically referred to as a DHS tool. If the
NSA has a tool, it is really probable that it isn't this.

http://www.scribd.com/doc/82701103/Analyst-Desktop-Binder-REDACTED

This manual details the usage of the list, and what identifies an Item
of Interest.

On Mon, Jun 11, 2012 at 11:30 AM, steve pirk [egrep] <st...@pirk.com> wrote:
> I really do not consider the NSA's Utah Data Center FUD, and I doubt that
> this list is limited to Homeland Security. I figure if they are going to try
> and read everything, then give them tons of junk to read.
>
> I'll see Rob's comments and raise him one. I think I will add a paragraph
> similar to one of his to my G+ profile. That gets indexed by Google every
> day at least. Pretty soon they might need another one of these data centers.
> hahahaha
> http://www.wired.com/threatlevel/2012/03/ff_nsadatacenter/all/1
>
> Oh, I switched over to using my gmail account for funsec, so I am going to
> remove this apps account from the list. Same me, different profile pic.
>
> --steve
> On Tue, May 29, 2012 at 1:10 PM, Kyle Creyts <kyle.cre...@gmail.com> wrote:
>>
>> Somebody really obviously has their knickers in a bunch over some FUD
>> again. This seems like a terribly overblown article making wild
>> accusations about what is really obviously a situational awareness
>> tool, not a system to track specific individuals. You don't put words
>> like "tornado" on a list of words to seek for spying on individuals.
>>
>> On Tue, May 29, 2012 at 3:04 PM, Rob, grandpa of Ryan, Trevor, Devon &
>> Hannah <rmsl...@shaw.ca> wrote:
>> >>
>> >> http://www.dailymail.co.uk/news/article-2150281/REVEALED-Hundreds-words-avoid-
>> >> us ing-online-dont-want-government-spying-you.html
>> >
>> > This wasn't "smart."  Obviously some "pork" barrel project dreamed up by
>> > the DHS
>> > "authorities" "team" ("Hail" to them!) who are now "sick"ly sorry they
>> > looked
>> > into "cloud" computing "response."  They are going to learn more than
>> > they ever
>> > wanted to know about "exercise" fanatics going through the "drill."
>> >
>> > Hopefully this message won't "spillover" and "crash" their "collapse"d
>> > parsing
>> > app, possibly "strain"ing a data "leak."  You can probably "plot" the
>> > failures
>> > at the NSA as the terms "flood" in.  They should have asked us for
>> > "help," or at
>> > least "aid."
>> >
>> > Excuse, me, according to the time on my "watch," I have to leave off
>> > working on
>> > this message, "wave" bye-bye, and get some "gas" in the car, and then
>> > get a
>> > "Subway" for the "nuclear" family's dinner.  Afterwards, we're playing
>> > "Twister"!
>> >
>> > ("Dedicated denial of service"?  Really?)
>> >
>> >
>> > ======================  (quote inserted randomly by Pegasus Mailer)
>> > rsl...@vcn.bc.ca     sl...@victoria.tc.ca     rsl...@computercrime.org
>> > Every act of communication is an act of translation     - G. Rabassa
>> > victoria.tc.ca/techrev/rms.htm http://www.infosecbc.org/links
>> > http://blogs.securiteam.com/index.php/archives/author/p1/
>> > http://twitter.com/rslade
>> > _______________________________________________
>> > Fun and Misc security discussion for OT posts.
>> > https://linuxbox.org/cgi-bin/mailman/listinfo/funsec
>> > Note: funsec is a public and open mailing list.
>>
>>
>>
>> --
>> Kyle Creyts
>>
>> Information Assurance Professional
>> BSidesDetroit Organizer
>> _______________________________________________
>> Fun and Misc security discussion for OT posts.
>> https://linuxbox.org/cgi-bin/mailman/listinfo/funsec
>> Note: funsec is a public and open mailing list.
>
>
>
>
> --
> steve pirk
> yensid
> "father... the sleeper has awakened..." paul atreides - dune
> kexp.org member august '09 - Google+ pirk.com



-- 
Kyle Creyts

Information Assurance Professional
BSidesDetroit Organizer
_______________________________________________
Fun and Misc security discussion for OT posts.
https://linuxbox.org/cgi-bin/mailman/listinfo/funsec
Note: funsec is a public and open mailing list.

Reply via email to