Stories
Slash Boxes
Comments

SoylentNews is people

SoylentNews is powered by your submissions, so send in your scoop. Only 18 submissions in the queue.
posted by cmn32480 on Monday July 27 2015, @10:23AM   Printer-friendly
from the when-does-activism-become-terrorism dept.

I was saddened to hear that two individuals who released fur animals and vandalized fur farms across America were busted: http://www.stltoday.com/news/national/fbi-arrests-activists-accused-of-releasing-mink/article_6c169b5d-dbbc-5dd1-adb0-534ee46af88b.html

But the arrest is sort of beside the point and there are two interesting tidbits in there. First and less interesting, is the ridiculous charge of terrorism under the "Animal Enterprise Terrorism Act" -- seriously, what they did is just plain old crime. Before you know it, going 10 over on the freeway will be considered an act of terrorism.

More intriguing, despite a lack of details on how they got busted, is this tidbit:

The indictment states that they covered their tracks by avoiding phones or logging into known online accounts and email. Instead, they used public Internet computers and encrypted email and cash for purchases while traveling. They would allegedly withdraw hundreds of dollars while back home in the San Francisco Bay Area before another trip.

The FBI states that they drafted communiques and posted them online to publicize their actions on websites associated with "animal rights extremists."

I'm going to guess automatic license plate readers were involved. Pure guess.


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: -1, Troll) by Anonymous Coward on Monday July 27 2015, @10:28AM

    by Anonymous Coward on Monday July 27 2015, @10:28AM (#214210)

    Seriously. Fuck all you sheep with accounts on Soylent. Ba baa baaaa. You. Fuckers.

    Starting Score:    0  points
    Moderation   -1  
       Troll=1, Total=1
    Extra 'Troll' Modifier   0  

    Total Score:   -1  
  • (Score: 2, Insightful) by Anonymous Coward on Monday July 27 2015, @10:41AM

    by Anonymous Coward on Monday July 27 2015, @10:41AM (#214215)

    Fuck all you sheep

    sheep fucker

    • (Score: 1, Informative) by Ethanol-fueled on Monday July 27 2015, @04:27PM

      by Ethanol-fueled (2792) on Monday July 27 2015, @04:27PM (#214387) Homepage

      Mmmm, its time to eat some bloody, juicy rare mutton-steaks tonight.

      But beef and bacon are delicious too, when they keep those animals packed head-to-ass all the way until their execution at the hands of a slash or a bolt to the brain. And those deaths aren't calm, either. Those bodies are twitching and thrashing until they're gutted and quartered.

      Mmmm, I love eating meat for dinner. Protein. Amino-acids.

  • (Score: 2) by BsAtHome on Monday July 27 2015, @10:43AM

    by BsAtHome (889) on Monday July 27 2015, @10:43AM (#214216)

    Wow, a troll-ish comment that is on-topic. That makes me very ambivalent what to do next...

    Well, for the knowledgeable, there is a fine line when to be anonymous and when not. To know when to do what is the very trick into fooling the surveillance.

    Maybe we should start pooling our mobile phones. Then you can make the meta-data useless when the pool is large enough and usage is randomized.

    • (Score: 0) by Anonymous Coward on Monday July 27 2015, @07:00PM

      by Anonymous Coward on Monday July 27 2015, @07:00PM (#214466)

      Maybe we should start pooling our mobile phones.

      Most people today don't even remember their own mobile phone numbers. How are they going to remember someone else's?

      There is a solution: Write down all the numbers you need on a piece of paper that is chewable and digestable. In case of any issue, eat it.

    • (Score: 2) by edIII on Monday July 27 2015, @08:17PM

      by edIII (791) on Monday July 27 2015, @08:17PM (#214501)

      I've been seriously working on an idea to pool mobile phones for exactly that reason.

      The trick is to treat the mobile phone number as a dynamic IP address. Using a truly dumb system like a PBX, you could then route all communications through it while maintaining a consistent phone number per member similar to the way calling cards work. The alternative is a smart phone, but that has far more challenges with data leakage. Still, using encrypted DNS SRV records could allow somebody to look up your *current* phone number from the SRV records and then call it. The entire system would be transparent to the user, and only members able to decrypt the SRV records could functionally use the network for inbound. Outbound would be more free, but randomized caller ID by default. Of which, Caller ID cannot be used for reliable identifications anyways.

      I've entirely written off a smart phone as a viable communications medium. It literally leaks your position every 60 seconds to the carrier to be recorded for years already, and a smart phone just has that many more vectors for security vulnerabilities. Pooling mobile phones *could* possibly solve a lot of it, but most actions of the phone would be precluded. Meaning, you couldn't use it for personal use or unsecured apps. Possibly even secure ones.

      What I've always envisioned was a cheap throw-away smart phone with the most basic of hardware specs. A single application, that doesn't come from an app store, would moderate the voice communications through it as well as the Internet connection. Decrypting the SRV records to decode a phone number would mean that all the contacts are actually stored with the contact itself. The application would be responsible for modifications to the user's own SRV records to make them appear properly to other participating members. Recursive DNS servers mean that it would be a tall order to determine all Actors that are attempting to determine the current phone number, and no captured smart phones would contain an address book anymore. Only packet logs would help an attacker obtain information, so the bar is raised considerably by mandating packet logs for all attacks.

      Moderating the Internet connection on it allows a user to pair a 2nd secured personal device that can use that Internet connection for its own purposes. The moment you suspect anything, you put the phone back into the pool, or "destroy" it by putting into the recycle bin at a Verizon Wireless location.

      Ideally, it should be something that can be modified within a few minutes with very low TTL on the DNS SRV records, so a group of people getting together and exchanging their phones could take minutes. With a quick and easy process that takes minutes, it will help ensure that regular exchanges do happen.

      --
      Technically, lunchtime is at any moment. It's just a wave function.
  • (Score: 2) by Runaway1956 on Monday July 27 2015, @10:44AM

    by Runaway1956 (2926) Subscriber Badge on Monday July 27 2015, @10:44AM (#214218) Journal

    So - you're from the US midwest, or the Mediterranean Sea area. There are few other people in the world who want to fuck sheep. Is that you, Bubba Lane?

    • (Score: 0) by Anonymous Coward on Monday July 27 2015, @01:29PM

      by Anonymous Coward on Monday July 27 2015, @01:29PM (#214295)

      There are enough jokes and one-liners about New Zealanders and sheep to fill a book.

      • (Score: 3, Funny) by edIII on Monday July 27 2015, @08:30PM

        by edIII (791) on Monday July 27 2015, @08:30PM (#214505)

        I can recall a joke about New Zealanders, sheep, and the Polish, all in one joke.

        A New Zealander and a Polish tourist were in a jeep touring a farm. The New Zealander sees a sheep with his head stuck in the fence, pulls the jeep to a stop, and tells the Polish man to give him a minute. After walking over to the sheep the Polish is man is surprised when the New Zealander starts buggering the sheep instead of helping it out of the fence. Stepping back into the jeep, the New Zealander sees the look on the Polish man's face and exclaims, "Don't be shy mate. Give it a try". So the Polish man gets out, walks up to the fence, and promptly gets his head stuck next to the sheep.

        --
        Technically, lunchtime is at any moment. It's just a wave function.
    • (Score: 0) by Anonymous Coward on Monday July 27 2015, @03:01PM

      by Anonymous Coward on Monday July 27 2015, @03:01PM (#214340)

      They have sheep in the midwest? Thought it was miles and miles of cows? Or are you just making a crude joke?

      • (Score: 2) by Zinho on Monday July 27 2015, @04:41PM

        by Zinho (759) on Monday July 27 2015, @04:41PM (#214393)

        They have sheep in the midwest? Thought it was miles and miles of cows?

        I'm sure the cattle ranchers would like that to be the case. Shepherds and cowboys don't mix well, and around the turn of the last century it got violent across much of the west. [wikipedia.org]

        So, yeah, it's mostly cows out there. There are plenty of sheep, too, and as long as the sheep stay in their own pastures strong fences make good neighbors.

        --
        "Space Exploration is not endless circles in low earth orbit." -Buzz Aldrin
        • (Score: 0) by Anonymous Coward on Monday July 27 2015, @05:31PM

          by Anonymous Coward on Monday July 27 2015, @05:31PM (#214426)

          The west is not the mid-west, thus why they have different names. Moving east is no big deal. Moving to the middle-east is.