RE:Confiscation of Anti-War Video

2002-10-28 Thread jayh
The problem might be the resultant emf signature, much more of a giveaway than the 
brief activity of a digital camera.

What really might be useful is steganographically placing it on the back of some 
bulshit cellphone call (not likely to arouse much suspicion these days)

j
- Original Text -

In antoher context I've wondered about the possibility of wireless,
near-real-time video upload.










We videoed and photoed the demo, but tape and chip were confiscated Sunday
by the guards at Warrenton Training Center, Site D, near Brandy Station,
VA,
Site D is the global comm center for State and DoD, and reportedly the CIA:

   http://cryptome.org/wtcd-eyeball.htm

I asked if the shoulder of the road was federal property. Their answer:
yes.



Choose an Internet access plan right for you -- try MSN!
http://resourcecenter.msn.com/access/plans/default.asp




Re: Fw: RE:Confiscation of Anti-War Video

2002-10-28 Thread Dave Emery
On Mon, Oct 28, 2002 at 02:56:29PM -0800, Richard Crisp wrote:
 hmm, it seems to me that video riding in a stegano fashion on a cell phone
 call would exceed the bandwidth capability of the channel. It's one thing to
 send a single image steganographically  on a cell call, but it is another to
 send a live video feed.
 rdc

There are many issues here... in general should this kind of
thing happen often, there will be either CALEA access at the switch to
lists of all traffic from a cellsite or geographical area (remember E911
location capability) or local off air gear deployed to monitor traffic.

Clearly the spooks have developed some modern off-air digital
traffic monitoring stuff - they need it it places without CALEA - and
there is little doubt that it only costs money to hire some programmers
to make it work with US carrier unique variations of protocols.

And needless to say, most of this stuff consists of tuners
coupled to DSPs coupled to high power high end laptops so most all
of the heavy lifting is in code for the DSPs and laptops that sort
through the bits and signals - and upgrading for the domestic
environment is just loading some new code...

And as for using 802.11 stuff, sure it will work the first time
or two it is tried, but soon enough portable 802.11 stuff will appear on
the other side, including both capture and jamming equipment. And most
of the code for capture and analysis can be had from the public domain
from hacker sources right now - not much expense in adapting it.

And locating 802.11b stuff by using appropriate direction
finding sniffer hardware with DF antennas is a pretty obvious thing to
do - presumably finding the points talking to each other should be easy,
making finding the remote relay site and pouncing on it pretty easy.

Also, you are very right about the bandwidth issues, and another
point not made is that the network is a sealed box with analog voice
in and analog voice out rather than a general purpose TCP/IP bit
pipe - one cannot just pervert a voice call into carrying hidden data
on digital cellphones, at least at much bandwidth as the voice is
vocoded into 4800 baud or thereabouts (modern phones use variable
rate stuff) and it would take some truly hairy DSP code to synthesize
a bizarre stream of voice like audio that allowed access to even
a small fraction of that 4800 baud.   I suppose it is theoretically
possible, but much harder than the V90 stuff and heavily dependent
on very precise knowledge of the vocoders and error correction used.

One might get 1200 baud or so, but even that would take a lot
of tricks at both ends and sure would not be stenography in any
normal sense in that it would sound like something from mars and nothing
like normal speech in any known language.  And probably in order to
get reasonable band with the talk spurt statistics would have to be
very wrong which would make it stick out like a sore thumb anyway.
And what use is 1200 baud when dealing with video ?

And of course data as opposed to voice calls would be targeted
by the CALEA stuff from the git-go since they would actually be the
logical pipe to  ex filtrate the video and one with reasonable
bandwidth...




Re: Fw: RE:Confiscation of Anti-War Video

2002-10-28 Thread Dave Emery
On Mon, Oct 28, 2002 at 09:32:48PM -0500, Tyler Durden wrote:
 Any chance this is the same Dave Emery who does the radio broadcasts? (I 
 listen from WFMU). If so, man! If a tiny fraction of the stuff you have 
 said over the years is true, well...brrr. A good example is Los Amigos de 
 Bush...doesn't have to be true/right...the fact that those theories so 
 easily fit the facts is very uncomfortable. If nothing else, it has 
 challenged my complacency.
 
 If you're NOT that Dave Emery, well, please purge the brain cells that this 
 little message has eaten up!
 
 TD

Sorry, a completely unrelated east coast David Emery.  Never
met the west coast radio personality, though it is possible we share
some opinions...



-- 
Dave Emery N1PRE,  [EMAIL PROTECTED]  DIE Consulting, Weston, Mass. 
PGP fingerprint = 2047/4D7B08D1 DE 6E E1 CC 1F 1D 96 E2  5D 27 BD B0 24 88 C3 18




Re: Fw: RE:Confiscation of Anti-War Video

2002-10-28 Thread Tyler Durden
Any chance this is the same Dave Emery who does the radio broadcasts? (I 
listen from WFMU). If so, man! If a tiny fraction of the stuff you have said 
over the years is true, well...brrr. A good example is Los Amigos de 
Bush...doesn't have to be true/right...the fact that those theories so 
easily fit the facts is very uncomfortable. If nothing else, it has 
challenged my complacency.

If you're NOT that Dave Emery, well, please purge the brain cells that this 
little message has eaten up!

TD






From: Dave Emery [EMAIL PROTECTED]
To: Richard Crisp [EMAIL PROTECTED]
CC: [EMAIL PROTECTED]
Subject: Re: Fw: RE:Confiscation of Anti-War Video
Date: Mon, 28 Oct 2002 18:29:13 -0500

On Mon, Oct 28, 2002 at 02:56:29PM -0800, Richard Crisp wrote:
 hmm, it seems to me that video riding in a stegano fashion on a cell 
phone
 call would exceed the bandwidth capability of the channel. It's one 
thing to
 send a single image steganographically  on a cell call, but it is 
another to
 send a live video feed.
 rdc

	There are many issues here... in general should this kind of
thing happen often, there will be either CALEA access at the switch to
lists of all traffic from a cellsite or geographical area (remember E911
location capability) or local off air gear deployed to monitor traffic.

	Clearly the spooks have developed some modern off-air digital
traffic monitoring stuff - they need it it places without CALEA - and
there is little doubt that it only costs money to hire some programmers
to make it work with US carrier unique variations of protocols.

	And needless to say, most of this stuff consists of tuners
coupled to DSPs coupled to high power high end laptops so most all
of the heavy lifting is in code for the DSPs and laptops that sort
through the bits and signals - and upgrading for the domestic
environment is just loading some new code...

	And as for using 802.11 stuff, sure it will work the first time
or two it is tried, but soon enough portable 802.11 stuff will appear on
the other side, including both capture and jamming equipment. And most
of the code for capture and analysis can be had from the public domain
from hacker sources right now - not much expense in adapting it.

	And locating 802.11b stuff by using appropriate direction
finding sniffer hardware with DF antennas is a pretty obvious thing to
do - presumably finding the points talking to each other should be easy,
making finding the remote relay site and pouncing on it pretty easy.

	Also, you are very right about the bandwidth issues, and another
point not made is that the network is a sealed box with analog voice
in and analog voice out rather than a general purpose TCP/IP bit
pipe - one cannot just pervert a voice call into carrying hidden data
on digital cellphones, at least at much bandwidth as the voice is
vocoded into 4800 baud or thereabouts (modern phones use variable
rate stuff) and it would take some truly hairy DSP code to synthesize
a bizarre stream of voice like audio that allowed access to even
a small fraction of that 4800 baud.   I suppose it is theoretically
possible, but much harder than the V90 stuff and heavily dependent
on very precise knowledge of the vocoders and error correction used.

	One might get 1200 baud or so, but even that would take a lot
of tricks at both ends and sure would not be stenography in any
normal sense in that it would sound like something from mars and nothing
like normal speech in any known language.  And probably in order to
get reasonable band with the talk spurt statistics would have to be
very wrong which would make it stick out like a sore thumb anyway.
And what use is 1200 baud when dealing with video ?

	And of course data as opposed to voice calls would be targeted
by the CALEA stuff from the git-go since they would actually be the
logical pipe to  ex filtrate the video and one with reasonable
bandwidth...


_
Get faster connections -- switch to MSN Internet Access! 
http://resourcecenter.msn.com/access/plans/default.asp