Top
Best
New

Posted by duxup 4 hours ago

FBI is investigating Minnesota Signal chats tracking ICE(www.nbcnews.com)
287 points | 276 comments
chinathrow 28 minutes ago|
The FBI should investigate the murders done by ICE and until done with that, remain silent.
epistasis 10 minutes ago||
And importantly the DoJ attorneys who would be responsible for investigating g the murders resigned because they were prevented from performing the standard procedure investigation that happens after every single shooting. They were instead directed to investigate the family of the person who was shot:

https://kstp.com/kstp-news/top-news/nyt-6-federal-prosecutor...

We are through the looking glass, folks. This will be dropped and ignored like so many other outrages unless we demand answers from Congress, and hold SCOTUS responsible for partisan abdication of their constitutional duties.

wyldberry 2 minutes ago|||
It's a good thing FBI has capacity to do more than one thing at a time. Also Trump agreed to allow MNPD to handle the wrongful death investigation.

Two things can be true: the "resistance" rings in MN are behaving like the insurgents the US has fought for decades in the Middle East, and ICE agents wrongfully killed a man.

hollandheese 14 minutes ago|||
The police (FBI and ICE included) are never your friends. They work to protect the rich and powerful and not us.
jorblumesea 7 minutes ago|||
Kash thinks Trump should be king, there will be no introspection or proper investigations.
DonHopkins 8 minutes ago||
Maybe they should subscribe to some of the top secret Signal chats that Trump Administration officials use to exchange memes and discuss military invasions, or the White Supremacist Young Republican Signal chats where they praise Hitler and say the N-word.
hedayet 1 hour ago||
With all the predatory tech Palantir has produced, it won't take more than a few minutes for FBI to start taking actions, IF they had anything tangible.

This is just an intimidation tactic to stop people talking (chatting)

crystal_revenge 43 minutes ago||
I'm never sure why people assume that Palantir is magically unlike the overwhelming majority of tech startups/companies I've worked at: vastly over promising what is possible to create hype and value while offering things engineering knows will never really quite work like they're advertised.

To your point, but on a larger scale, over hyping Palantir has the added benefit of providing a chilling effect on public resistance.

As a former government employee I had the same reaction to the Snowden leaks: sure the government might be collecting all of this (which I don't support), but I've never seen the government efficiently action on any data they have collected.

Incompetence might be the greatest safety we have against a true dystopia.

blurbleblurble 16 minutes ago|||
Incompetence could also be incredibly dangerous given enough destructive willpower.

https://www.thenation.com/article/world/nsa-palantir-israel-...

roenxi 7 minutes ago||||
> ... I've never seen the government efficiently action on any data they have collected.

It isn't usually a question of efficiency, it is a question of damage. Technically there is an argument that something like the holocaust was inefficiently executed, but still a good reason to actively prevent governments having ready-to-use data on hand about people's ethnic origin.

A lot of the same observations probably apply to the ICE situation too. One of the big problems with the mass-migration programs has always been that there is no reasonable way to undo that sort of thing because it is far too risky for the government to be primed to identify and deport large groups of people. For all the fire and thunder the Trump administration probably isn't going to accomplish very much, but at great cost.

newsclues 12 minutes ago||||
Because palantirs selling proposition is: you can’t find the answers in your own data, but we can.
GuinansEyebrows 13 minutes ago||||
doing Bad Things poorly is still doing Bad Things.
sixsevenrot 15 minutes ago||||
3...2...1... days left until ICE buys the social scoring app from China

3...2...1... years left until IBM ports their algorithm used to identify and kill Jews, Roma and gay people in 1930ies Germany from punchcards to Rust.

https://en.wikipedia.org/wiki/IBM_and_the_Holocaust

shrubble 2 minutes ago|||
The algorithm was sorting punch cards and then putting the cards in different stacks on a table.

We can only hope that the surveillance state is still working with the same algorithm…

Bender 6 minutes ago|||
The NAZI rhetoric is beyond old at this point. If that were a thing today there would be exactly zero protestors, rioters, illegal immigrants, people looking at one of the SS, deportation. There would just be one big ditch in each city, many bags of lye and a bulldozer. All of these events would have lasted a few hours and we would instead be trying to figure out who is missing.
OhMeadhbh 42 minutes ago|||
lol. came here to say pretty much the same thing.
forshaper 16 minutes ago||
I've generally held this position, but assume a sufficient combination of models could do a lot more than was possible before.
fudged71 28 minutes ago|||
It's noteworthy at this point in time that there is a contradiction. The government is currently ramping up Palantir and they are using "precise targeting" of illegal aliens using "advanced data/algorithms". And yet, at the very same time we are seeing time and time again that ICE/DHS agents are finding the wrong people, seemingly going to any house indescriminently, and generally profiling people instead of using any intelligence whatsoever.

Maybe now is exactly the right time to publicly call out the apparent uselessness of Palantir before they fully deploy their high altitude loitering blimps and drones for pervasive surveillance and tracking protestors to their homes.

(My greater theory is that the slide into authoritarianism is not linear, but rather has a hump in the middle where government speech and actions are necessarily opposite, and that they expect the contradiction to slide. Calling out the contradiction is one of the most important things to do for people to see what is going on.)

mikkupikku 40 minutes ago|||
How does Palantir defeat Signal's crypto? I suppose it could be done by pwning everybody's phones, but Palantir mostly does surveillance AFAIK, I haven't heard of them getting into the phone hacking business. I think Israeli corps have that market covered.
blurbleblurble 16 minutes ago||
It doesn't, they're infiltrating the groups and/or gaining access to peoples' phones in other ways.
OhMeadhbh 42 minutes ago|||
Meh. Palintir is optimized to sell data to the government. Said governments usually don't care about the quality of data about any one individual. Wear sunglasses when you go out and stay off facebook and it's amazing how little palintir signal you send up. Bonus points if you created an LLC to pay your utility bills. But... Palintir is not as good as you seem to be implying.
subscribed 28 minutes ago||
Oh, you don't need to have Facebook account to have a very comprehensive and accurate profile: https://www.howtogeek.com/768652/what-are-facebook-shadow-pr...
q34tlR4y 32 minutes ago|||
[dead]
jatora 54 minutes ago||
Is it? Seems like enforcing laws to protect the citizens of law enforcement from vigilante justice isnt something governments should or do mess around with, in general.
janalsncm 49 minutes ago|||
While we’re getting rid of the first amendment maybe we should also get rid of the fourth and fifth amendment too since they make law enforcement harder? I’m sure cops in North Korea have a much easier and safer job.
OhMeadhbh 40 minutes ago|||
You only have rights you exercise. Don't let the cops trample on your rights. Though... this does seem to work better for white, rich, older dudes than for other people.
janalsncm 29 minutes ago||
I’m reminded of (I think) people in Shanghai complaining that their posts about covid lockdowns were censored, saying “we have free speech”. And if you believe in universal rights, they’re right. They do.

The question is whether the government will respect and protect those rights or not.

jjk166 46 minutes ago||||
Can't argue with their 110% conviction rate, North Korean tactics work.
charcircuit 29 minutes ago|||
Vigilante justice is not what the first amendment is about protecting.
ceejayoz 15 minutes ago||
And protesting is not vigilante justice.
nyc_data_geek 51 minutes ago||||
Seems like citizens are the ones who need protection from law and immigration enforcement, considering the public executions we've all witnessed in the past week or so.
nielsbot 24 minutes ago||||
If ICE agents were actually in danger or subject to "vigilante justice", the administration would be CROWING about it SO LOUDLY we'd never hear the end of it. They're spending their entire working days searching for evidence of it. They can't hardly wait!

That's not what is happening here.

lovich 22 minutes ago||||
“Citizens of law enforcement”

What a phrase

awesome_dude 47 minutes ago|||
The whole premise of the second amendment is about citizens being armed in order to resist/overthrow a government
hollandheese 11 minutes ago|||
No, it's citizens being armed to steal native land and kill the natives.
OhMeadhbh 39 minutes ago|||
[citation needed]
ceejayoz 37 minutes ago||
It's not exactly an unusual claim, and it was very much the loudly espoused position of the Republican Party until, well, last week.

https://en.wikipedia.org/wiki/Second_Amendment_to_the_United...

> In Federalist No. 46, Madison wrote how a federal army could be kept in check by the militia, "a standing army ... would be opposed [by] militia." He argued that State governments "would be able to repel the danger" of a federal army, "It may well be doubted, whether a militia thus circumstanced could ever be conquered by such a proportion of regular troops." He contrasted the federal government of the United States to the European kingdoms, which he described as "afraid to trust the people with arms"...

hollandheese 6 minutes ago||
This was posited as the nice sounding reason for the second amendment, when the more accurate reason was to ensure citizens had guns to drive out the indigenous peoples and steal their lands.

We rather quickly saw the federal government rolling over the people even with weapons in the Whiskey Rebellion.

ceejayoz 4 minutes ago||
I don't disagree.

But it's still very funny seeing the Right wrestle with "wait, the other team has guns?!" and "wait, Trump sounds like he wants gun control?!" right now when this claim has been the basis of their argument for decades.

ddtaylor 3 hours ago||
I don't know signal very well but when I have spoken to others about it they mention that the phone number is the only metadata they will have access to.

This seems like a good example of that being enough metadata to be a big problem.

causalscience 1 hour ago||
I've been hearing for years people say "Signal requires phone number therefore I don't use it", and I've been hearing them mocked for years.

Turns out they were right.

OneDeuxTriSeiGo 29 minutes ago|||
They weren't though? Signal requires a phone number to sign up and it is linked to your account but your phone number is not used in the under the hood account or device identification, it is not shared by default, your number can be entirely removed from contact disovery if you wish, and even if they got a warrant or were tapping signal infra directly, it'd be extremely non trivial to extract user phone numbers.

https://signal.org/blog/phone-number-privacy-usernames/

https://signal.org/blog/sealed-sender/

https://signal.org/blog/private-contact-discovery/

https://signal.org/blog/building-faster-oram/

https://signal.org/blog/signal-private-group-system/

ddtaylor 20 minutes ago||
In past instances where Signal has complied with warrants, such as the 2021 and 2024 Santa Clara County cases, the records they provided included phone numbers to identify the specific accounts for which data was available. This was necessary to specify which requested accounts (identified by phone numbers in the warrants) had associated metadata, such as account creation timestamps and last connection dates.
OneDeuxTriSeiGo 10 minutes ago|||
Yep however that only exposes a value of "last time the user registered/verified their account via phone number activation" and "last day the app connected to the signal servers".

There isn't really anything you can do with that information. The first value is already accessible via other methods (since the phone companies carry those records and will comply with warrants). And for pretty much anyone with signal installed that second value is going to essentially always be the day the search occurred.

And like another user mentioned, the most recent of those warrants is from the day before they moved to username based identification so it is unclear whether the same amount of data is still extractable.

smeej 16 minutes ago|||
This was before Signal switched to a username system.
rainonmoon 1 hour ago||||
Absolutely nothing in this article is related to feds using conversation metadata to map participants, so, no they weren’t.
jvanderbot 47 minutes ago|||
If you follow the X chatter on this, some folks got into the groups and tracked all the numbers, their contributions, and when they went "on shift" or "off".

I don't really think Signal tech has anything to do with this.

OhMeadhbh 33 minutes ago|||
Yeah. It's notable they didn't crack the crypto. In the 90s when I was a young cypherpunk, I had this idea that when strong crypto was ubiquitous, certainly people would be smart enough to understand its role was only to force bad guys to attack the "higher levels" like attacking human expectations of privacy on a public channel. It was probably unrealistic to assume everyone would automatically understand subtle details of technology.

As a reminder... if you don't know all the people in your encrypted group chat, you could be talking to the man.

ddtaylor 21 minutes ago||||
My Session and Briar chats don't give out the phone numbers of other users.
rainonmoon 38 minutes ago|||
That’s really interesting extra context, thanks!
causalscience 36 minutes ago||
[flagged]
causalscience 1 hour ago|||
[flagged]
gosub100 1 hour ago||
We don't do the "duct-tape an insult to the end to drive your point harder" gimmick here. It will lead to loss of your account.
dylan604 54 minutes ago|||
whoa, losing access to a throwaway account created for specifically posting trolling comments? i'm sure they're shaking in their boots at the prospect
causalscience 43 minutes ago||
This throwaway account wasn't created specifically for posting trolling comments, this is just my personality :-(
causalscience 46 minutes ago|||
[flagged]
OhMeadhbh 37 minutes ago||||
I talked to Moxie about this 20 years ago at DefCon and he shrugged his shoulders and said "well... it's better than the alternative." He has a point. Signal is probably better than Facebook Messenger or SMS. Maybe there's a market for something better.
Bender 34 minutes ago|||
I remember listening to his talks and had some respect for him. He could defeat any argument about any perceived security regarding any facet of tech. Not so much any more. He knows as well as I do anything on a phone can never be secure. I get why he did it. That little boat needed an upgrade and I would do it too. Of course this topic evokes some serious psychological responses in most people. Wait for it.
ddtaylor 17 minutes ago||
> He knows as well as I do anything on a phone can never be secure

I assume because of the baseband stuff to be FCC compliant? Last I checked that meant DMA channels, etc. to access the real phone processor. All easily activated over the air.

Bender 3 minutes ago|||
All easily activated over the air.

Indeed. The only reason this is not used by customer support for more casual access, firmware upgrades and debugging is a matter of policy and the risk of mass bricking phones and as such this is not exposed to them. There are other access avenues as well including JTAG debugging over USB and Bluetooth.

hsbauauvhabzb 3 minutes ago|||
Any citation on this? I’ve never heard that.
ddtaylor 18 minutes ago||||
Briar and Session are the better encrypted messengers.
causalscience 33 minutes ago|||
I have no idea if that was true 20 years ago, but it's not true now. XMPP doesn't have this problem; your host instance knows your IP but you can connect via Tor.
ddtaylor 16 minutes ago||
OTR has been on XMPP for so long now
causalscience 11 minutes ago||
Is that good? According to the wikipedia page it seems last stable release was 9 years ago. Is anyone using that? Last time I had a look at XMPP everybody was using OMEMO.
BugsJustFindMe 32 minutes ago||||
Signal's use of phone numbers is the least of your issues if you've reached this level of inspection. Signal could be the most pristine perfect thing in the world, and the traffic from the rest of your phone is exactly as exposing as your phone number is when your enemy is the US government who can force cooperation from the infrastructure providers.
causalscience 24 minutes ago||
Your point is correct but irrelevant to this conversation.

The question here is NOT "if Signal didn't leak your phone number could you still get screwed?" Of course you could, no one is disputing that.

The question is "if you did everything else perfect, but use Signal could the phone number be used to screw you?" The answer is ALSO of course, but the reason why we're talking about it is that this point was made to the creator of Signal many many times over the years, and he dismissed it and his fanboys ridiculed it.

gosub100 1 hour ago|||
Suppose they didn't require that. Wouldn't that open themselves up to DDoS? An angry nation or ransom-seeker could direct bots to create accounts and stuff them with noise.
OhMeadhbh 30 minutes ago|||
I think the deal is you marry the strong crypto with a human mediated security process which provides high confidence the message sender maps to the human you think they are. And even if they are, they could be a narc. Nothing in strong crypto prevents narcs in whom ill-advised trust has been granted from copying messages they're getting over the encrypted channel and forwarding them to the man.

And even then, a trusted participant could not understand they're not supposed to give their private keys out or could be rubber-hosed into revealing their key pin. All sorts of ways to subvert "secure" messaging besides breaking the crypto.

I guess what I'm saying is "Strong cryptography is required, but not sufficient to ensure secure messaging."

ddtaylor 14 minutes ago|||
There are a lot of solutions to denial of service attacks than to collect personal information. Plus, you know, you can always delete an account later? If what Signal says is true, then this amounts to a few records in their database which isn't cause for concern IMO
charliebwrites 1 hour ago|||
The steps to trouble:

- identify who owns the number

- compel that person to give unlocked phone

- government can read messages of _all_ people in group chat not just that person

Corollary:

Disappearing messages severely limits what can be read

SR2Z 1 hour ago|||
Unless they compel people at gunpoint (which prevents the government from bringing a case), they will probably not have much luck with this. As soon as a user sets up a passcode or other lock on their phone, it is beyond the ability of even most parts of the US government to look inside.

It's much more likely that the government convinces one member of the group chat to turn on the other members and give up their phone numbers.

midasz 1 hour ago|||
> which prevents the government from bringing a case

Genuinely, from outside, it seems like your government doesn't give a damn on what they are and aren't allowed to do.

dylan604 56 minutes ago|||
Looks that way from the inside as well.
nyc_data_geek 48 minutes ago||
Yes and all of the credulous rubes still whinging about how they "can't imagine" how it's gotten this bad or how much worse it can get, or how "this is not who we are" at some point should no longer be taken as suckers in good faith, and at some point must rightly be viewed as either willfully complicit bad faith interlocuters, or useful idiots.
dylan604 44 minutes ago||
Learning about WWII in high school, I often wondered how the people allowed the Axis leaders gain power. Now I know. However, I feel we're worse for allowing it to happen because we were supposed to "never again".
nyc_data_geek 39 minutes ago|||
Agreed. To see "Never Again" morphed into "Never Again for me, Now Again for thee" has been one of the most heartwrenching, sleep depriving things I've witnessed since some deaths in my family.
causalscience 39 minutes ago||||
Worse, I often wondered how some people collaborated. Now I know that many people would rather have a chunk of the population rounded up and killed than lose their job.
nyc_data_geek 36 minutes ago||
"Whoever can make you believe absurdities, can make you commit atrocities." and "It is difficult to get a man to understand something, when his salary depends on his not understanding it."

etc, etc. So it goes

Zak 25 minutes ago|||
Watching it in real time, I still don't understand it. I could see how Trump won the first time around; Hillary Clinton was unpopular with most people outside of her party's leadership, but the second just seems insane. The kinds of things that would happen were obvious to me, and I am no expert.
dylan604 17 minutes ago|||
Two party system. As many people didn't like Hillary, clearly there were a lot of people unhappy with Biden->Harris. When you don't like the current admin's direction and/or their party, there's only one other party to select. I think there were plenty of voters that truly did not believe this would be the result of that protest vote.
mikkupikku 6 minutes ago|||
Not the second time, the third time. Remember that Biden whooped Trump's ass once and could have whooped his ass a second time, but the donor class (career retards) got cold feet when they were forced to confront his senility, and instead of letting the election be one senile old man against another senile old man, they replaced Biden with the archetype of an HR bitch. I hope nobody thinks it a coincidence that the two times Trump won were the two times he was up against a woman. Americans don't want to vote for their mother-in-law, nor for the head of HR. And yes, that certainly is sexist, but it is what it is.

I just pray they run Newsom this time. Despite his "being from California" handicap, I think he should be able to easily beat Vance by simply being a handsome white man with a white family. Vance is critically flawed and will demoralize much of the far right IFF his opponent doesn't share those same weaknesses.

ModernMech 32 minutes ago||||
You have to remember that "the government" is not a monolith. Evidence goes before a judge who is (supposed to be) independent, and cases are tried in front of a jury of citizens. In the future that system may fall but for now it's working properly. Except for the Supreme Court... which is a giant wrench in the idea the system still works, but that doesn't mean a lower court judge won't jettison evidence obtained by gunpoint.
mothballed 47 minutes ago|||
They haven't for a long time, just that most of the time they were doing things we thought was for good (EPA, civil rights act, controlled substance act, etc) and we thereby entered a post-constitutional world to let that stuff slide by despite the 10th amendment limiting the federal powers to enumerated powers.

Eventually we got used to letting the feds slide on all the good things to the point everything was just operating on slick ice, and people like Trump just pushed it to the next logical step which is to also use the post-constitutional world to his own personal advantage and for gross tyranny against the populace.

thewebguyd 20 minutes ago||||
> it is beyond the ability of even most parts of the US government to look inside.

I'm sure the Israeli spyware companies can help with that.

Although then they'd have to start burning their zero days to just go after protestors, which I doubt they're willing to do. I imagine they like to save those for bigger targets.

OneDeuxTriSeiGo 25 minutes ago||||
If you aren't saving people's phone numbers in your own contacts, signal isn't storing them in group chats (and even if you are, it doesn't say which number, just that you have a contact with them).

Signal doesn't share numbers by default and hasn't for a few years now. And you can toggle a setting to remove your number from contact discovery/lookup entirely if you are so inclined.

xmcp123 23 minutes ago||||
There are multiple companies that can get different amounts of information off of locked phones including iPhones, and they work with LE.

I’m also curious what they could get off of cloud backups. Thinking in terms of auth, keys, etc. For SMS it’s almost as good as phone access, but I am not sure for apps.

ddtaylor 13 minutes ago||||
I'm confident the people executing non-complaint people in the street would be capable of compelling a citizen.
mrWiz 51 minutes ago||||
All they have to do is pretend to be a concerned neighbor who wants to help give mutual aid and hope that someone in the group chat takes the bait and adds them in. No further convincing is needed.
OhMeadhbh 24 minutes ago||
social engineering for the win.
hedayet 1 hour ago||||
or convince one member of a group chat to show their group chat...
neves 1 hour ago||||
Or just let the guy to enter the country after unlocking her phone.
pixl97 1 hour ago|||
https://xkcd.com/538/
janalsncm 40 minutes ago|||
This is accurate, but the important point is that threatening people with wrenches isn’t scalable in the way mass surveillance is.

The problem with mass surveillance is the “mass” part: warrantless fishing expeditions.

OhMeadhbh 23 minutes ago||
hunh. we haven't even started talking about stingray, tracking radios and so forth.
fruitworks 40 minutes ago|||
it is difficult to wrench someone when you do not know who they are
OhMeadhbh 25 minutes ago||||
I think disappearing messages only works if you activate it on your local device. And if the man compromises someone without everyone else knowing, they get all messages after that.

But yes... it does limit what can be read. My point is it's not perfect.

Bender 15 minutes ago||
Is the message on storage zero'd out or just deleted?
mrWiz 53 minutes ago||||
It's even easier than that. They're simply asking on neighborhood Facebook (and other services too, I assume) groups to be added to mutual aid Signal groups and hoping that somebody will add them without bothering to vet them first.
Bender 16 minutes ago|||
compel that person to give unlocked phone

Celebrite or just JTAG over bluetooth or USB. It's always been a thing but legally they are not supposed to use it. Of course laws after the NSA debacle are always followed. Pinky promise.

tptacek 1 hour ago|||
Presumably this is data taken from interdicted phones of people in the groups, not, like, a traffic-analytic attack on Signal itself.
tucnak 1 hour ago||
I wonder whether the protesters could opt for offshore alternatives that don't require exposing their phone number to a company that could be compelled to reveal it by US law. For example, there is Threema[1], a Swiss option priced at 5 euros one-time. It is interesting on Android as you can pay anonymously[2], therefore it doesn't depend on Google Play and its services (they offer Threema Push services of their own.) If your threat model includes traffic analysis, likely none of it would make much difference as far as US state-side sigint product line is concerned, but with Threema a determined party might as well get a chance! Arguably, the US protest organisers must be prepared for the situation to escalate, and adjust their security model accordingly: GrapheneOS, Mullvad subscription with DAITA countermeasures, Threema for Android, pay for everything with Monero?

[1] https://threema.com/

[2] https://shop.threema.ch/en

OneDeuxTriSeiGo 21 minutes ago|||
It's worth noting that the way Signal's architecture is set up, Signal the organisation doesn't have access to users' phone numbers.

They technically have logs from when verification happens (as that goes through an SMS verification service) but that just documents that you have an account/when you registered. And it's unclear whether those records are available anymore since no warrants have been issued since they moved to the new username system.

And the actual profile and contact discovery infra is all designed to be actively hostile to snooping on identifiable information even with hardware access (requiring compromise of secure enclaves + multiple levels of obfuscation and cryptographic anti-extraction techniques on top).

chocolatkey 54 minutes ago|||
Note that Threema has had a recent change in ownership to a German investment firm. Supposedly nothing will change but I can’t help but be wary
dylan604 53 minutes ago||
Just being owned by an offshore company doesn't mean that they still can't be infiltrated. But as you pointed out, just because Company A creates an app does not mean that Company B can't come in later to take control.
tucnak 44 minutes ago||
The alarming extent of US-affiliated signals intelligence collection is well-documented, but in the case of Threema it's largely inconsequential; you can still purchase the license for it anonymously, optionally build from source, and actively resist traffic analysis when using it.

That is to say: it allows a determined party to largely remain anonymous even in the face of upstream provider's compromise.

spankalee 3 hours ago|||
I don't think it's much of a problem at all. Many of the protesters and observers are not hiding their identities, so finding their phone number isn't a problem. Even with content, coordinating legal activities isn't a problem either.
fusslo 3 hours ago|||
I would never agree with you. protestors behaving legally or practicing civil disobedience can still have their lives ruined by people in power.

https://www.phoenixnewtimes.com/news/arizona-supreme-court-s...

scoofy 1 hour ago|||
The literal point of civil disobedience is accepting that you may end up in jail:

"Any man who breaks a law that conscience tells him is unjust and willingly accepts the penalty by staying in jail to arouse the conscience of the community on the injustice of the law is at that moment expressing the very highest respect for the law."

-- Letter from the Birmingham Jail, MLK Jr: https://people.uncw.edu/schmidt/201Stuff/F14/B%20SophistSocr...

jjk166 11 minutes ago|||
That's not the point of civil disobedience, it's an unfortunate side effect. You praise a martyr for their sacrifice, you deplore that the sacrifice was necessary.
estearum 1 hour ago||||
Yeah, that doesn't make it "not a problem."
EA-3167 1 hour ago||
It makes it a problem that's inherently present for any act of civil disobedience, unless you truly believe that you can hide from the US government. I'm pretty sure that all of the technical workarounds in the world, all of the tradecraft, won't save you from the weakest link in your social network.

That's life, if you can't take that heat stay out of the kitchen. It's also why elections are a much safer and more reliable way to enact change in your country than "direct action" is except under the most dire of circumstances.

estearum 52 minutes ago||
Sure? Can't tell what the point of this comment is.

No one is arguing that people who practice civil disobedience can expect to be immune from government response.

mothballed 1 hour ago||||
If you let the government stomp on your constitutional rights and willingly go to jail on unconstitutional grounds, then that's not respect for the law. That's respect for injustice.

Accepting jail over 1A protected protests only proves you're weak (not in the morally deficient way, just from a physical possibilities way) enough to be taken. No one thinks more highly of you or your 'respect for the law' for being caught and imprisoned in such case, though we might not think lesser of you, since we all understand it is often a suicide mission to resist it.

scoofy 20 minutes ago|||
>If you let the government stomp on your constitutional rights and willingly go to jail on unconstitutional grounds, then that's not respect for the law. That's respect for injustice.

My point is about civil disobedience, not disobedience generally. The point of civil disobedience is to bring attention to unjust laws by forcing people to deal with the fact they they are imprisoning people for doing something that doesn't actually deserve prison.

Expecting to not end up in prison for engaging in civil disobedience misses the point. It's like when people go on a "hunger strike" by not eating solid foods. The point is self-sacrifice to build something better for others.

https://www.kqed.org/arts/11557246/san-francisco-hunger-stri...

If that's not what you're into -- and it's not something I'm into -- then I would suggest other forms of disobedience. Freedoms are rarely granted by asking for them.

Amezarak 31 minutes ago|||
Materially impeding law enforcement operations, interfering with arrests, harassing or assault officers, and so forth is not 1A protected and is illegal. There’s lots of this going on and some of it is orchestrated in these chats. They may nevertheless be civil disobedience, maybe even for a just cause, but I have no problem with people still being arrested for this. You obviously cannot have a civil society where that is legally tolerated.

It isn’t just people walking around holding signs or filming ICE. Can we please distinguish these cases?

peyton 1 hour ago||||
Importantly this definition references an individual’s conscience. Seditious conspiracy is another matter. Here is the statute:

> If two or more persons in any State or Territory, or in any place subject to the jurisdiction of the United States, conspire to overthrow, put down, or to destroy by force the Government of the United States, or to levy war against them, or to oppose by force the authority thereof, or by force to prevent, hinder, or delay the execution of any law of the United States, or by force to seize, take, or possess any property of the United States contrary to the authority thereof, they shall each be fined under this title or imprisoned not more than twenty years, or both.

A group chat coordinating use of force may be tough.

snarky_dog 1 hour ago|||
[dead]
ajross 1 hour ago||||
> protestors behaving legally or practicing civil disobedience can still have their lives ruined by people in power.

They surely can. But the point was more than the people in power don't really need Signal metadata to do that. On the lists of security concerns modern protestors need to be worrying about, Signal really just isn't very high.

mrtesthah 3 hours ago|||
This is the price we pay to defend our rights. I would also expect any reasonable grand jury to reject such charges given how flagrantly the government has attempted to bias the public against protesters.
ls612 54 minutes ago||||
Some of the signal messages I've seen screenshotted (granted screenshots can be altered) make it seem like the participants have access to some sort of ALPR data to track vehicles that they think are ICE. That would probably be an illegal use of that data if true.
ceejayoz 48 minutes ago||
> make it seem like the participants have access to some sort of ALPR data to track vehicles

The whole reason cops love ALPR data is anyone's allowed to collect it, so they don't need a warrant.

mikkupikku 34 minutes ago||
The government falling victim to ALPR for once might actually be the push we need to get some reform. That said, they'll probably try to ban it for everybody but themselves. Never before have they had such comprehensive surveillance and I don't expect them to give it up easily.
cyberge99 2 hours ago||||
How do you connect a strangers face to a phone number? Or does it require the ELITE app?
nicce 1 hour ago||
Palantir steps in indeed
ruined 3 hours ago||||
conspiracy charges are a thing, and they'll only need a few examples of manifestly illegal interference.

it will be quite easy for a prosecutor to charge lots of these people.

it's been done for less, and even if the case is thrown out it can drag on for years and involve jail time before any conviction.

spankalee 3 hours ago||
If they could arrest people for what they've been doing, they would have already arrested people. And they have arrested a few here and there for "assault" (things like daring to react when being shoved by an annoyed officer), but the thing that's really pissing DHS off is that the protesters and observers are not breaking the law.
missingcolours 1 hour ago|||
Remember that most of the participants in J6 walked away and were later rounded up and arrested across the country once the FBI had collected voluminous digital and surveillance evidence to support prosecution.
SR2Z 1 hour ago|||
Fortunately for us (or really unfortunately for us) most of the competent FBI agents have been fired or quit, with the new bar simply being loyalty to the president.

The FBI is weak now compared to what it was even two years ago.

mikkupikku 32 minutes ago||
Most are probably just keeping their heads down, trying to wait out this administration. When you're in that kind of cushy career track, you'd have to be very dumb or very selfless to give it up.
spankalee 1 hour ago||||
The J6 insurrectionists committed real crimes, and it's very good that they were rounded up, but afaiu most of the evidence had to do with them provably assaulting officers, damaging property, and breaking into a government building. Not that they messaged other people when they were legally demonstrating before the Capital invasion.

The real protection for the legal protesters and observers in MN is numbers. They can't arrest and control and entire populace.

missingcolours 1 hour ago||
People were also charged for coordinating and supporting J6 without being there, e.g. Enrique Tarrio of the "Proud Boys" was charged with seditious conspiracy based on activity in messaging apps. If people in these Signal chats were aware that people were using force to inhibit federal law enforcement, which some of the leaked training materials suggest is most likely true and easy to prove, and there are messages showing their support or coordination of those actions, I assume they could face the same charges.
spankalee 20 minutes ago||
They had a lot more than metadata on Enrique Tarrio.
direwolf20 1 hour ago|||
That was a different, Biden's, FBI
missingcolours 32 minutes ago||
Yeah, and I wouldn't bet money on this happening for that reason. But it is possible.
ruined 3 hours ago|||
one person walking away from a police encounter doesn't mean police think that person did not break the law.

prosecutors may take their time and file charges at their leisure.

JohnFen 1 hour ago||
That may be true in the abstract (although it doesn't matter if the cops think you're breaking the law. What matters is whether or not a judge does).

However, neither Border patrol nor ICE have been exhibiting thoughtfulness or patience, so I doubt they're playing any such long game.

Psillisp 3 hours ago|||
Government intimidation of the practice of constitutional rights... what ever could go wrong.
spankalee 3 hours ago||
I was replying specifically to this:

> This seems like a good example of that being enough metadata to be a big problem

I was not saying it's not a problem that the feds are doing this, because that's not what I was replying to.

Psillisp 3 hours ago||
You are going to need to clarify more. I have no idea what you are for.
rationalist 3 hours ago||
Why does a person have to be "for" something?
Psillisp 3 hours ago||
A statement was made... I am trying to understand why for the statement was made. Go sleaze somewhere else.
Volundr 1 hour ago||
The statement was made to point out that this is an example where a phone number is enough metadata to to problematic for privacy. It stands on its own. It doesn't need more context or purpose.
UncleOxidant 1 hour ago|||
Was starting to think about setting up a neighborhood Signal group, but now thinking that maybe something like Briar might be safer... only problem is that Briar only works on Android which is going to exclude a lot of iPhone users.
jaxefayo 48 minutes ago|||
What about BitChat?
adolph 10 minutes ago|||
Why wouldn't you just use random abandoned forums or web article message threads? Iirc this is what teenagers used to do when schools banned various social media but not devices. Just put the URL in a discrete qr code that only a person in the neighborhood could see.
suriya-ganesh 1 hour ago||
but this is not a technical attack that returns the metadata.

much more closer to the $5 wrench attack

https://xkcd.com/538/

bs7280 3 hours ago||
A wise man told me, you know signal works because its banned in Russia. I also find it incredibly ironic that they have a problem with this, when the DoD is flagrantly using signal for classified communications.
joekrill 1 hour ago||
They aren't taking issue with Signal, per se... they are upset that people are sharing the whereabouts and movements of ICE officers. Signal just seems to be the medium-of-choice. And this just happens to give them a chance to declare Signal as "bad", since they can't spy on Signal en masse.
huhtenberg 20 minutes ago|||
It doesn't mean much. Roblox is banned in Russia.

They've been just gradually banning everything not made in Russia.

OhMeadhbh 22 minutes ago|||
Sure, but using Signal for classified info is a violation of policy.
cyberge99 2 hours ago|||
You know it works because they banned it in Russia? Works for whom?
NewsaHackO 1 hour ago||
Yes, at best it implies Russia cannot easily get confidential information from them. Everyone else, the jury is still out for.
psunavy03 3 hours ago||
The DOD is not using "flagrantly using Signal." The Secretary of Defense, whatever his preferred pronouns are, is breaking the law.
kodyo 3 hours ago||
CISA recommended Signal for encrypted end-to-end communications for "highly targeted individuals."

https://www.cisa.gov/sites/default/files/2024-12/guidance-mo...

paulryanrogers 1 hour ago|||
Recommendations to the private sector don't condone violating security and retention laws for people working in the public sector.
sedivy94 8 minutes ago||
Military personnel are currently only allowed to use Signal for mobile communications within their unit. Classified information is a different story, though.
Cornbilly 1 hour ago||||
The best part is that, in trying to comply with this guidance, the government chose Telemessage to provide the message archiving required by the Federal Records Act.

The only problem is that Telemessage was wildly insecure and was transmitting/storing message archives without any encryption.

thomasrognon 51 minutes ago|||
Come on, man. We're talking about classified information, not general OPSEC advice. I worked in a SCIF. Literally every piece of equipment, down to each ethernet cable, has a sticker with its authorized classification level. This system exists for a reason, like making it impossible to accidently leak information to an uncleared contact in your personal phone. What Hegseth did (and is doing?) is illegal. It doesn't even matter what app is used.
nimbius 3 hours ago||
i suppose what he means is that the phones of protestors which have signal chat will be investigated.

Assuming they dont have disappearing messages activated, and assuming any protestors willingly unlock their phones.

craftkiller 3 hours ago||
> willingly unlock their phones

Or they are running any mainstream iPhone or Android phone, they've unlocked the phone at least once since their last reboot, and the police have access to graykey. Not sure what the current state of things is, since we rely on leaked documents, but my take-away from the 2024 leaks was GrapheneOS Before First Unlock (BFU) is the only defense.

lugu 1 hour ago|||
https://freedom.press/digisec/blog/new-leaks-on-police-phone...
dvtkrlbs 43 minutes ago||||
Isn't latest iPhones also have similar security profile on BFU. The latest support table I saw from one of the vendors was also confirming this.
ActorNightly 1 hour ago|||
>is the only defense.

Or you know, the 2nd amendment.

Id be willing to bet that ICE would have a much smaller impact if they would be met with bullets instead of cameras. In the end, what ICE is doing doesn't really matter to Trump, as long as MAGA believes that things are being done, even if nothing is being done, he doesn't care.

archy_ 23 minutes ago|||
Never fear, the 2nd amendments days are numbered too. Trump just said 'You can't have guns. You can't walk in with guns' (the 'in' in this context being 'outside')

https://www.pbs.org/newshour/politics/watch-you-cant-have-gu...

dylan604 49 minutes ago||||
That's a strange take. It also feels like exactly what they are hoping to have happen. Encouraging gun violence is not something condoned, so not sure why you are posting that nonsense. Are you an agitator?
convolvatron 41 minutes ago||
I wish we would stop using that word 'agitator', while I understand the subjective idea that someone is just trying to stir up trouble, it kind of undermines the idea that we should be able to express opinions no matter how distasteful.

and apparently it now a perfectly valid reason for the state to execute someone without being charged or a trial.

dylan604 30 minutes ago||
anyone promoting for people to start showing up and shooting at law enforcement, even if it is ICE, is what if not an agitator?
convolvatron 24 minutes ago||
where is the line? I was fine with the word until it started being used to justify killing innocents
dylan604 20 minutes ago||
Then be upset with them for misappropriating the word. I'm using it just fine, thank you very much!
mrguyorama 26 minutes ago||||
Nothing about the 2nd amendment legalizes shooting law enforcement officers.

This has always been the absurdity of the moronic claims of the 2nd amendment being to overthrow government tyranny: You may own the gun legally, but at no point will your actions be legal. If you've decided the government needs to be overthrown, you are already throwing "law" out the window, even if you have a valid argument that the government you are overthrowing has abandoned the constitution.

Why the fuck do you need legal guns to commit treason? Last I checked, most government overthrows don't even involve people armed with private rifles!

If you are overthrowing the government, you will need to take over local police stations. At the moment, you no longer need private arms, and what you are doing isn't legal anyway.

Meanwhile, every single fucking time it has come up, the gun nuts go radio silent when the government kills the right person who happens to own a gun. Every. Single. Time.

It took minutes for the "SHALL NOT BE INFRINGED" people who raised a million dollars for Kyle Rittenhouse to defend himself for driving to a protest in a different state while armed to the teeth to of course get to shoot someone to turn around and say "Actually bringing a gun to a protest makes you a terrorist and you need to be shot". Minutes. They have also put up GoFundMes for the guy who executed that man.

If you are too scared to stand up to your government without a fucking rifle, you have never been an actual threat to your government, and they know that.

32527823634 34 minutes ago|||
[flagged]
servercobra 3 hours ago|||
Or has biometric login turned on and didn't lock their phone behind a passcode before being arrested.
spiderice 51 minutes ago|||
There are already people on X who have infiltrated chats and posted screen captures. Getting the full content of the chats isn't going to be difficult. They have way to many people in them.
politelemon 3 hours ago|||
Unlocking isn't necessary, We've already seen that Apple and Google will turn data over on government requests.

https://www.businessinsider.com/apple-complies-percent-us-go...

lenerdenator 1 hour ago||
Non-paywalled link?
layer8 1 hour ago||
https://archive.ph/copyn

It wasn’t paywalled for me, BTW.

mrtesthah 3 hours ago|||
Unfortunately not everyone in a group chat may be fully vetted, in which case they could be feds collecting "evidence". Some chats may have publicly circulating invite links.

But any judge that doesn't immediately reject such cases on a first-amendment basis is doing the business of an authoritarian dictator. This is fully protected speech and assembly.

JumpCrisscross 3 hours ago|||
> any judge that doesn't immediately reject such cases on a first-amendment basis

If you say something illegal in a chat with a cop in it, or say it in public, I don’t think there are Constitutional issues with the police using that as evidence. (If you didn’t say anything illegal, you have a valid defence.)

tremon 1 hour ago|||
Not sure what difference that makes, it's not like the current regime limits their actions to respect constitutional bounds.
mrtesthah 3 hours ago|||
Sure. Can you give me an example of something that's illegal to say in a group chat that coordinates legal observers?
docdeek 2 hours ago|||
One of the things that has been circulating in videos of the Signal chats online is someone confirming/not confirming that certain license plates are related to ICE. Perhaps if someone is misusing their access to an administrative or law enforcement database to ‘run plates’ and report on who owns the vehicle, this could be unlawful.

I don’t know if anyone IS using such a database unlawfully - they might be checking the plate number against an Excel sheet they created based on other reports from people opposed to ICE - but if its a databse they shouldn’t be using in this way, if might be against the law.

JohnFen 1 hour ago|||
> Perhaps if someone is misusing their access to an administrative or law enforcement database to ‘run plates’ and report on who owns the vehicle, this could be unlawful.

But that's not an example of something that would be illegal to say in a chat. It would be an example of something that's illegal to do regardless of the chat.

defen 1 hour ago||
I don't think the idea is that the speech in the chat is inherently illegal; it's that it could be used as evidence of illegal activity. Using that example - if someone in the chat asks about plate XYZ at 10AM, and if a phone linked to "Bob" posts to the group chat at 10:04 AM that license plate XYZ is used by ICE, and the internal logs show that Bob queried the ICE database about plate XYZ at 10:02 AM, and no one else queried that license plate in the past month, that is pretty good evidence that Bob violated the CFAA.
direwolf20 1 hour ago||||
"ICE are at (address)" apparently
JumpCrisscross 3 hours ago|||
> Can you give me an example of something that's illegal to say in a group chat that coordinates legal observers?

Actual examples? No. I don’t believe it happened.

Hypothetical examples? Co-ordinating gunning down ICE agents. If the chat stays on topic to “coordinat[ing] legal observers,” there shouldn’t be liability. The risk with open chats is they can go off topic if unmoderated.

dylan604 48 minutes ago|||
> Unfortunately not everyone in a group chat may be fully vetted,

Curious how many group chats have unknowingly allowed a well known journalist into their groups.

PrettiGoodDead 3 hours ago||
[flagged]
sschueller 21 minutes ago||
Interesting, this may result in showing how secure signal really is.
soupfordummies 39 minutes ago||
Oh wow this article contains “ICE” in the title and isn’t flagged yet!
mrandish 24 minutes ago||
I suspect they're going to find it challenging to turn protected speech into something prosecutable like obstruction - assuming activists exercise even a modicum of care in their wording. Seems like just another intimidation tactic but in doing that, they've also given a heads-up to their targets.
iamnothere 3 hours ago||
I have seen anti-Signal FUD all over the place since it was discovered that protesters have been coordinating on Signal.

Here’s the facts:

- Protesters have been coordinating using Signal

- Breaches of private Signal groups by journalists and counter protesters were due to poor opsec and vetting

- If the feds have an eye into those groups, it’s likely that they gained access in the same way as well as through informants (which are common)

- Signal is still known to be secure

- In terms of potential compromise, it’s much more likely for feds to use spyware like Pegasus to compromise the endpoint than for them to be able to break Signal. If NSA has a Signal vulnerability they will probably use it very sparingly and on high profile foreign targets.

- The fact that even casual third parties can break into these groups because of opsec issues shows that encryption is not a panacea. People will always make mistakes, so the fact that secure platforms exist is not a threat in itself, and legal backdoors are not needed.

biophysboy 16 minutes ago||
The downside of opsec is that it breeds paranoia and fear about legal, civic participation. In a way, bullshit investigations like this are an intimidation tactic. What are they going to find - a bunch of Minnesotans that were mad about state-backed killings?
hnal943 8 minutes ago||
[delayed]
cyberge99 2 hours ago||
Feds and ICE are using Palantir ELITE.
iamnothere 2 hours ago||
That’s only for targeting. From what I understand ELITE does not include device compromise or eavesdropping. If feds want to compromise a device that has Signal, they would use something like Pegasus that uses exploits to deliver a spyware package, likely through SMS, Whatsapp, or spear phishing URL. (I don’t actually know which software is currently in use but it would be similar to Pegasus.)
lugu 1 hour ago||
As mentioned by someone else, they just need to take the phone of a demonstrator to access their signal groups.

https://freedom.press/digisec/blog/new-leaks-on-police-phone...

iamnothere 43 minutes ago||
True, physical interception is probably the easiest method, at least for short term access. Once the captured user is identified and removed from the group they will lose access though.
OhMeadhbh 46 minutes ago|
Couple of minor nits:

1. Some rando on X saying "OMG! I infiltrated a lefty signal group" doesn't mean said rando actually did infiltrate a signal group.

2. Signal was not the app Hegseth, et al. used. They used TM SGNL, which is a fork of Signal. But that's a minor nit.

3. Encryption is not the same thing as authentication. And authentication is somewhat meaningless if you let everyone into your encrypted group chat.

More comments...