Settings

Theme

British intelligence able to read and flag private Snapchat messages

reuters.com

169 points by 0xNOTVALID 2 years ago · 124 comments

Reader

realfeel78 2 years ago

OP title is not backed up by linked article whatsoever. The article says nothing at all to that effect.

The article says this, however, which I don't really understand:

> He suggested one of the chat's other members could have warned the police, but if that were the case, that other member would have to be charged, not Verma.

Can anyone help explain this?

  • yellow_lead 2 years ago

    I believe the part you are asking about means: Verma did not make a threat, but a private joke in a group chat, so he's not liable for the police reaction. If his friend is the one who informed the police, while knowing it was a joke, the friend should be charged instead.

dang 2 years ago

The submitted title broke the HN guidelines badly. From https://news.ycombinator.com/newsguidelines.html: "Please use the original title, unless it is misleading or linkbait; don't editorialize."

If you want to say what you think is important about an article, that's fine, but do it by adding a comment to the thread. Then your view will be on a level playing field with everyone else's: https://hn.algolia.com/?dateRange=all&page=0&prefix=false&so...

(Normally we'd revert the title, but the comments in this thread have been so skewed by submitted title that the thread won't make sense anymore if I do that.)

Daviey 2 years ago

It's an /assumption/ that British intelligence able to read and flag private Snapchat messages, as the article literally states, "The trial did not make clear how the British services managed to have access to Verma's private messages, the judge stressed."

The truth is, it isn't public knowledge how this unfolded and anything suggesting otherwise is conjecture.

Also, this post doesn't' reflect the article title, "Spanish judge clears British teen of Menorca flight bomb hoax charges".

  • chatmasta 2 years ago

    If we're speculating, a much more likely explanation is that Snapchat moderation teams monitor certain words in certain areas, flagging for example any message containing "bomb" sent from an airport.

    This is arguably even creepier than government surveillance, since it implies Snapchat employees are looking at the content of private chats and the user may never know.

    • udev4096 2 years ago

      I'm surprised the amount of trust you put in Snapchat and likewise companies whose sole purpose is to maximize their profit by selling user data

    • tgv 2 years ago

      It also means that there's no encryption, or the key is known to Snapchat employees (and therefore to everybody who has enough money).

    • the_gipsy 2 years ago

      Might be automated, but still, a corporation controls what gets flagged.

trimethylpurine 2 years ago

There's no need to speculate about encryption or surveillance.

"we may need to enforce our Terms and other policies. In some cases, we may also use or share your information to cooperate with law enforcement requests, escalate safety issues to law enforcement, industry partners, or others, or comply with our legal obligations."

https://values.snap.com/privacy/privacy-policy

jackweirdy 2 years ago

Not clear if it was message interception or (maybe more likely) Snapchat have their own moderation that can refer outward. The text is not e2e encrypted

  • misnome 2 years ago

    Snapchat boast about having a small turnaround for threats that they proactively scan for and forward to law enforcement.

    There is no mystery or need for intelligence skullduggery here.

goda90 2 years ago

> He suggested one of the chat's other members could have warned the police, but if that were the case, that other member would have to be charged, not Verma

This doesn't make sense to me. Why would that other member be charged for reporting a threat?

  • timmb 2 years ago

    Because they would have obviously known it was their friend making a joke.

    • lolyyy2 2 years ago

      I don't think they could have known for sure it was a joke.

      • cal85 2 years ago

        The judge’s point is that if they want to sue anyone for misleading them, it should be whoever sent them the message. He’s not saying they would necessarily win that hypothetical case.

    • chatmasta 2 years ago

      So why shouldn't Snapchat (who presumably reported it to the government) be charged for the same offense of reporting a non-threat?

      I'm not suggesting they should be, but just following the same logic as your comment.

  • cypherpunks01 2 years ago

    I thought they might have been talking about reporting a false threat, or something of that nature?

    If you are a comedian working on a joke and write one about a political assassination in your private journal, certainly you can't be charged with communicating a threat, because you did not communicate it. But if a friend/enemy finds your notebook, knows you have no intent to harm, but reports the journal to authorities out of spite anyways, then the friend could be culpable for communicating a false threat, even though the joke is in your handwriting. Maybe they were getting at something like that?

    In any case, it was very awkward wording at best for a report from Reuters, it should have been either explained or left out.

switch007 2 years ago

The MOD encourages their personnel to use Snapchat, and blocks WhatsApp (on their internal networks).

What more do you need to know?

  • b3nji 2 years ago

    Interesting, I'd like to know more. What makes you say that?

tommoor 2 years ago

Previously here: https://news.ycombinator.com/item?id=39094306

asciii 2 years ago

Is there any recourse for him to figure out how the message was intercepted and his false arrest?

jp42 2 years ago

Recently read The Making of Atomic Bomb & Skunkworks. Govt puts enormous amount of money & employees best people in given area to achieve their objectives. It's hard for me to imagine govt will be ok to have tech that they can't crack, they will find a way to crack. I am not saying we should be OK with it, but I don't see a path to make it happen. It can be made difficult with E2E and other tech but not impossible.

  • Aerbil313 2 years ago

    It’s mathematically impossible to crack the technology of E2EE. But govts have all the power to coerce the companies into not using E2EE at all times and to lie that they do.

    • KMag 2 years ago

      It's conjectured, but not proven, that there is no efficient algorithm on classical computers to compute discrete logarithms over elliptic curves.

Aerbil313 2 years ago

This is absolutely hilarious. I myself made multiple jokes over the years on plain unencrypted cell phone with my friends, knowing full well that it’s very likely all conversations are listened to with (probably) STT and regexes, but I always thought that my country’s intelligence service has the competence to distinguish a joke from the real deal.

pregnenolone 2 years ago

The only reasonable explanation I have is that he got flagged by Snapchat automatically who reported him to the authorities immediately. Even without E2E encryption, how would they intercept the message as the app is most likely communicating with the server via HTTPS or SSL?

gusfoo 2 years ago

> The message was somehow intercepted by British security services

"somehow" is doing a lot of heavy lifting there. There are multiple routes to alert the authorities by the public that don't involve randomly intercepting internet traffic.

archsurface 2 years ago

I think "Intelligence" was used in the name at a time when spying was done on foreign countries. If the spying is now done on the domestic general public it seems we should change the name to something more appropriate.

saaaaaam 2 years ago

The title of this post is very misleading. This is not what the story says at all.

mromanuk 2 years ago

Was this text captured due to something like Echelon doing mass surveillance?

lolyyy2 2 years ago

I don't know much about hashing but is it possible five eyes just has a zettabyte-scale rainbow table covering scary words? They could use that to score encrypted messages and act on the scary ones.

  • WhatsName 2 years ago

    Strong encryption has properties that make "known plaintext" attacks impossible. You should not be able to tell the message from pure randomness. Breaking End-to-End-Encryption is not impossible but rather far fetched. If they read Snapchat, my bets would not be on broken crypto, but rather a lack thereof.

  • PhilipRoman 2 years ago

    I don't see any use for hashing here, and encrypted messages have padding (otherwise you could trivially decrypt simple messages like yes/no)

  • creer 2 years ago

    A more serious problem with the story is if they had any kind of advanced (or magical) brute force or mathematical path against some standard encryption scheme - they would not waste that major secret on some random 18yo joker.

    (Although in the background, fuckups are always possible and they did send a fighter jet initially so there was some pressure to follow through. Still not enough to risk a major secret.)

  • speedgoose 2 years ago

    I don’t know. Without even going in normal standard crypto, if you XOR a few words with a random initialisation vector, is it possible to flag those messages?

mouzogu 2 years ago

i'm certain that the feds can read my whatsapp.

100% zuck is ratting me out. every message.

considering xkeyscore and prism are over 10 years old. can only imagine what things are like now.

  • mohon 2 years ago

    especially with the push of whatsapp business, orgs can freely store ur messages to them.

    also by relying on the whatsapp metadata (the one where you can export by urself), it should be already good enough for feds agent to locate u.

    for the E2E itself, as non crypto guy, seems the open whisper paper implemented on whatsapp alr good enough?

    • mouzogu 2 years ago

      > the open whisper paper implemented on whatsapp alr good enough?

      i think wikileaks showed us that we cannot really trust anything when it comes to the sophistication of tech surveillance.

thekevan 2 years ago

I thought I read another article that said it was caught because he was connected to and using the airport's wifi.

  • eterm 2 years ago

    That's not how wifi works.

    Being on wifi doesn't mean that wifi network has access to your encrypyed communication.

AzzyHN 2 years ago

Since when are Snapchat messages private?

exabrial 2 years ago

If anyone is actually surprised by this....? You do not own your device. No root = not your phone.

smsm42 2 years ago

The guy us lucky he got the sane judge. It could have easily gone very badly for him.

game_the0ry 2 years ago

Personally, start from the premise that my iphone is a CIA tracking device. That changes my behavior accordingly.

Though ideally I should expect privacy from the electronics I own.

  • exe34 2 years ago

    You'd think if the CIA is so good at tracking, they'd know when you were joking.

amriksohata 2 years ago

Most intelligence orgs from most companies can read messages on any app if they comprimise your phone through existing backdoors

chmod775 2 years ago

So these people do not want to talk about and are generally unable to provide examples of their surveillance stopping an actual threat because "they do not want to give away their capabilities", but when they get shown up for being absolute fools by taking an obvious joke seriously, they have no problem starting noisy court proceedings? They were likely just so giddy that they finally got something, they didn't stop to think whether it was real, suing that kid in red-faced anger and embarrassment afterwards.

These fuckups should be paid for out of their budget.

  • somenameforme 2 years ago

    At least in the US a lot of the surveillance is probably illegal and cannot be used in court. They way they get around this is parallel construction. [1] Reuters had an awesome article about this a long time ago, which seems to have been removed from their site. [2] The NSA or whoever spies on somebody they're not supposed to be spying on. They see he's e.g. selling drugs, and further spying shows the time of a sell. They pass this onto a local law enforcement agency who then finds some sort of plausible justification to go stop/search the involved car. A cop, who just happens to have a drug sniffing dog, stops the car for 'driving erratically' or whatever.

    If the intelligence agency revealed they were involved then not only could the person involved sue to get his own charges dismissed, but more importantly he could also sue the NSA to try to get the entire program scrapped. Countless entities (Wikimedia, EFF, and others) have tried to sue the NSA for this but it always ends the same way. They can't prove they were hurt by spying, or even that they were spied on, so the cases get tossed for lack of standing.

    So they are actually being honest when they say they don't want to give away their capabilities, but that's because what they're doing is probably illegal. At least in the US, but I assume the UK must have something akin to the 4th amendment. To not have a government randomly spying on everybody is one of the foundations of a Free society. We were supposed to learn from KGB, Stasi, and so on. And maybe we did, but not the right lessons.

    ---

    [1] - https://en.wikipedia.org/wiki/Parallel_construction

    [2] - https://web.archive.org/web/20130806082051/http://www.reuter...

    • aragonite 2 years ago

      > Reuters had an awesome article about this a long time ago, which seems to have been removed from their site. [2]

      It seems the link stopped working some time in the past 2 weeks or so.

      https://archive.is/wmthA

      https://news.ycombinator.com/item?id=39191639

    • wasdfff 2 years ago

      How often does this even get used? How does the NSA even communicate to a police officer in the field? I think you give local cops a ton of credit. At the end of the day it looks like there are more hard drugs available on the street than ever before despite all the spooky tech and warrantless searching.

      • squigz 2 years ago

        I think selling drugs was a simple, if dated, example. And nobody suggested the NSA would contact an officer 'in the field' - they said contacting the agency/department

      • digging 2 years ago

        > At the end of the day it looks like there are more hard drugs available on the street than ever

        Nobody said they're doing it to get drugs off the street.

      • MagnumOpus 2 years ago

        The NSA (probably) communicates it to the DEA’s Special Operations Division, which creates an entry in the DEA’s DICE database and tips off a DEA field office, which then asks local law enforcement to do a “random” stop and to use some Parallel Construction to keep it hush hush.

      • missingrib 2 years ago

        It was probably used in the Silk Road investigation.

      • goodSteveramos 2 years ago

        They aren’t going after drugs they are going after people for their political beliefs. Remember when the IRS audited every organization just for having the word “patriot” in their name?

  • throwaway49849 2 years ago

    The people that gravitate towards positions of unrestrained power often seem to have an authoritarian bend. If there's an opportunity to use their power to be a hero, that will scratch the itch, but in the absence of that opportunity, they seem to readily turn their power on the rest of us.

    • sremani 2 years ago

      A man's urge to be a Hero and save the day, and a bureaucrat's fear of losing reputation are a deadly cocktail.

      • KMag 2 years ago

        That's a great statement. DDG seems to think you came up with it. Is that so?

        Thank goodness I'm not inebriated near an all-night tattoo parlor.

        • feoren 2 years ago

          > Thank goodness I'm not inebriated near an all-night tattoo parlor.

          Speaking of brand new sentences ...

  • bilekas 2 years ago

    The nerve they have to try and make the victim pay damages too?

    "We messed up, send the Spanish authorities to scramble a jet to escort the flight, but he should pay for that"

    The balls on these guys.

    • KMag 2 years ago

      Who is the "We" in "We messed up" here?

      Presumably, the "We" is British intelligence, but it's Spanish prosecutors that were asking for the kid to reimburse the Spanish government for the cost of scrambling the fighter jet.

      • bilekas 2 years ago

        > but it's Spanish prosecutors that were asking for the kid to reimburse the Spanish government for the cost of scrambling the fighter jet

        The point still stands, regardless who was asking for the reimbursement.

        In fact the last person who should be expected to pay out is the victim of this incompetence. A delivery driver being sent on a prank order delivery doesn't expect the victim to pay for the order.

        • KMag 2 years ago

          I totally agree that joint failures by the British and Spanish government shouldn't be paid for by the victim. I'm just saying that there isn't any evidence that British intelligence asked for any restitution. I think they screwed up, know it, and are keeping quiet.

          The Spanish prosecutors, on the other hand... shame on them for having the nerve to continue prosecution, particularly after Spanish law enforcement subjected the victim to time in jail.

  • DaiPlusPlus 2 years ago

    > but when they get shown up for being absolute fools by taking an obvious joke seriously, they have no problem starting noisy court proceedings

    Those aren't the same people, though.

clawoo 2 years ago

One needs to ask themselves, what is more likely?

1. The /feds/ broke Snapschat's end to end encryption and they're monitoring for all traffic with designated stopwords, or...

2. One of his friends reported him, one way or another, or..

3. Snapchat's end to end encryption is... not. I can't find any definitive statement that the chat messages themselves are E2EE, only that photos and videos are encrypted and the key is exchanged between users[1]. This means that Snapchat can monitor for text messages or decrypt uploaded attachments when necessary, since they have access to the message that contains the key for the attachment.

Most likely Snapchat's E2EE is just a facade, they probably have a dictionary of "funny" words on the device (and/or the server) and automatically flags the message in the internal systems when certain stopwords are being used.

[1] https://nordvpn.com/blog/is-snapchat-safe/

  • badwolf 2 years ago

    https://values.snap.com/privacy/privacy-by-product

    Snap doesn't mention encryption in regards to chat, only in "my memories"

  • ranger_danger 2 years ago

    I think there's arguably several things going on in reality.

    I don't think anyone has "broken" proper encryption that any major service is using, but I believe there is proof that the encryption is being bypassed in one of multiple ways.

    One way could be through things like Pegasus, the Israeli spyware that can be silently installed on mobile phones. How this gets onto the device in the first place is not disclosed, but with the major app stores already having the capability to remotely install apps without your permission, this is obviously a very easy way to do it.

    There have also been leaked US government documents stating that they have systems in place to monitor unencrypted messages from major proprietary apps like Facebook, Whatsapp, Instagram etc. I think any time you don't have the source code to at least the client program, there's no guarantee it's properly encrypting things in the first place.

    Also it's possible the Whatsapp and similar programs are simply compromised by design, to where even though messages DO use E2EE, the client program itself could still be intercepting the messages secretly BEFORE they're encrypted and then doing who knows what with them. Without the source it's hard to know.

    And with UK being part of Five Eyes I don't doubt at least some of this tech is shared with them.

  • implements 2 years ago

    > Most likely Snapchat's E2EE is just a facade, they probably have a dictionary of "funny" words on the device (and/or the server) and automatically flags the message in the internal systems when certain stopwords are being used.

    On device content scanning notifies Snapchat of a certain type of threat, that + metadata goes to a real-time law-enforcement system which combines it with other sources to decide whether a lawful intercept is warranted - if so, Snapchat pulls the cached messages off the device and forwards them on.

    It’s arguable that would be reasonable and legal, depending on the watchlist.

    • CryptoBanker 2 years ago

      On device scanning would be reasonable? What happened when everybody was up in arms about Apple wanting to do on device scanning for child porn?

      • implements 2 years ago

        Well - it’s reasonable for a government to seek to stop absolute privacy subverting the prevention and detection of crime … I think, so a state has to find some way to be able to construct reasonable suspicion and then lawful search on routine internet activity. (Opinions vary, obviously)

  • ghaff 2 years ago

    The almost real-time response is what makes it really hard to believe it was in response to some list of codewords that probably get mentioned in messages many thousands of times per day. (and which, as far as we know, has never triggered a response like this previously.) Someone shoulder surfing or a friend freaking out and calling see something/say something seems much more likely IMO.

  • vhguru 2 years ago

    Group chats generally don’t have E2EE. Most apps provide that only for one-to-one conversations. Group E2E encryption is a difficult problem.

    • homefree 2 years ago

      I think signal/OTR has e2ee support for pretty large groups.

      The kid was using airport wifi for this right? I'd guess public airport wifi installs some backdoored SSL cert and is generally monitored (and you probably agree to this ToS when you use it) - you may even agree to not make jokes about planes - I wouldn't be surprised.

    • pr337h4m 2 years ago

      WhatsApp and Signal have had end-to-end encryption for group chats for a very long time.

    • clawoo 2 years ago

      You're not wrong.

      I've implemented E2EE in group chats using Olm/Megolm and it's not easy to scale and comes with a ton of limitations.

      If I was running Snapchat, I wouldn't see the point in dedicating that many resources and infrastructure to it.

    • wannacboatmovie 2 years ago

      > Group E2E encryption is a difficult problem.

      Not if it was architected properly from the beginning.

      • treyd 2 years ago

        Nah the best you could do for a long while was just to have n^2 bilateral encryption sessions that behave like a group channel. Only fairly recently was a workable construction for doing many-party encryption sessions actually developed, called TreeKEM, and is now standardized in the IETF MLS standard. This is literally bleeding edge cryptography.

        It's an extremely flexible design and has relatively few constraints in how it can be used in a larger system, but it's just extremely new.

        The ART construction exited a few years ealier than TreeKEM but that's a weaker design with more restrictions so it wasn't adopted very widely afaik.

        • CMCDragonkai 2 years ago

          When talking about recent, you're talking about 6 years ago right?

        • thaumasiotes 2 years ago

          > Nah the best you could do for a long while was just to have n^2 bilateral encryption sessions that behave like a group channel.

          What? We could do better than that before we had group chats. PGP will let you send encrypted email to multiple recipients, and multiple simultaneous bilateral encryption sessions are not involved.

          The system is:

          1. You encrypt the message using a symmetric encryption key.

          2. You encrypt the key, which is short, once for every recipient.

          3. You prepend the whole bundle of encrypted keys to the message.

          4. You send that out. Everyone receives the same encrypted data. This is what would appear in a group channel.

          5. When you receive a message, you try to decrypt it. If decrypting the header doesn't produce a key for you, then you're not one of the recipients.

          Even if you want to analyze this as a set of bilateral sessions, the storage and computation requirements are linear, not quadratic: when I send a shared message to Alice and Bob, I need to know how I send messages to Alice, and I need to know how I send messages to Bob, but I don't care how Alice sends messages to Bob.

          • treyd 2 years ago

            PGP is poorly suited for live conversations with rotating members like this since it doesn't support post-compromise security or perfect forward secrecy (not in-protocol, at least), which most people would expect from an E2EE chat protocol. I was speaking of protocols that did have these properties.

            TreeKEM also manages sublinear communication, constant per message (since there's a shared secret already used for the ratchet) and logn for key updates or group membership changes.

            • thaumasiotes 2 years ago

              The concept of encryption is poorly suited for live conversations with rotating members. If you don't know who you're talking to, there's no point in encrypting your message.

              > I was speaking of protocols that did have these properties.

              The method PGP uses to encrypt messages to multiple recipients will still work for whatever protocol you have in mind. Why is your dislike for PGP relevant?

              • treyd 2 years ago

                That's pretty reductive, perhaps you don't have a fully connected graph of relationships in a group but other parties you do know in a group you trust to vouch for others. There's also lots of data privacy/security compliance reasons you'd want to have E2EE with large groups. I believe I heard that some larger companies wanted to investigate using MLS to encrypt internal communications, and having hundreds/thousands of people in a group where most don't know each other but they're all managed by an authority who doesn't want to be able to know what they're discussing.

                I don't dislike PGP I'm just saying that it doesn't natively have PFS and PCS, which are generally accepted by security people as being necessary properties for a protocol to be considered full E2EE.

                • thaumasiotes 2 years ago

                  > I believe I heard that some larger companies wanted to investigate using MLS to encrypt internal communications, and having hundreds/thousands of people in a group where most don't know each other but they're all managed by an authority who doesn't want to be able to know what they're discussing.

                  But it's impossible for the authority to achieve that goal. If they manage the group membership, they are free to add themselves and read the discussions.

  • AeroNotix 2 years ago

    > Most likely Snapchat's E2EE is just a facade, they probably have a dictionary of "funny" words on the device (and/or the server) and automatically flags the message in the internal systems when certain stopwords are being used.

    Reminds me of whenever I used to phone a friend during my teenage years I would always start with "BOMB QUEEN, BOMB QUEEN."

  • bell-cot 2 years ago

    2. ... friends of friends, or somebody posted his "joke" to a platform which GCHQ does real-time monitoring of, or ...

    4. Compromised endpoint(s).

    (I also somewhat favor your #3.)

raxxorraxor 2 years ago

Ridiculous to demand a fine from him being the victim of bad surveillance.

Snapchat text is often used to prosecute people, I think the message being forwarded is a likely explanation, despite chats not being thoroughly encrypted and the article saying it would be unlikely. Could have been an anonymous tip.

  • 01acheru 2 years ago

    My exact thought. If the Spanish prosecutors want somebody to pay for those expenses it should be the British gov or whatever other agency as it is the same as if I warned the police of some fake bomb threat.

    • raxxorraxor 2 years ago

      Certainly. Of course then governments would share less information if they are culpable for any false positives. But penalizing the wrongly accused is a special way of worsening an already significant fuckup.

rkagerer 2 years ago

With every ounce of privacy given up, each person-hour spent waiting in a security line at the airport, and each incident like this, the bad guys win a little bit more. The cultural shift wreaked in the aftermath is something I rarely see measured and weighed.

aaron695 2 years ago

There is no way British intelligence could have acted so quick, if it was true. Maybe if he/they were already being watched.

This is an interesting theory, if it's technically possible would be it. For sure airports would watch such traffic if they technically can.

"It was previously thought the WiFi network at London Gatwick Airport could have intercepted it, but an airport spokesperson told the BBC it didn't have that capability."

Else it's the 'friends'

  • KoolKat23 2 years ago

    The WiFi network in one of the London airports had this weird phone time error when connecting, it wanted to update time definitions, I always wondered if it's had to do with certificate validation, or just a simple misconfiguration, or even if it was just my personal device.

  • siilats 2 years ago

    or maybe, hear me out, there was a person sitting next to him at the airport and saw his snapchat messages and freaked out?

_chu1 2 years ago

This is why even if you aren't doing anything wrong, you should always use E2E encrypted communication.

  • perryizgr8 2 years ago

    Not really, no. The real issue here is not that private chats were surveilled. The issue that caused grief is the idiotic reaction to an innocent joke made among friends, and then trying to make the victim pay for that mistake.

  • krisoft 2 years ago

    > even if you aren't doing anything wrong

    I mean... joking about bomb threats at an airport is not "not doing anything wrong".

    Should we throw the person in prison for it? No, of course not. Is it a dumb thing to do? I think so. Very dumb.

    > you should always use E2E encrypted communication

    I agree with that.

    • Zak 2 years ago

      Joking about bombs in a private conversation with six friends who know it's a joke is different from joking about bombs where others might overhear. The kind of person who posts on HN might assume Snapchat isn't really private, but most people would not.

      • ghaff 2 years ago

        Well, the current evidence is that there's at least a reasonable chance that one of the friends wasn't in on the joke.

    • NoMoreNicksLeft 2 years ago

      > I mean... joking about bomb threats at an airport is not "not doing anything wrong".

      This isn't just Snapchat surveillance. Most of the people joking about "bombs" aren't at the airport. If they knew he both joked, and was currently at the airport, then the surveillance has to be much more pervasive somehow.

    • Der_Einzige 2 years ago

      Sorry, but by this example I shouldn't say "Hi" to my friend "jack" at the airport because it will sound like "hijack". I expect airports to have uniquely high numbers of "jokes" about airplane hijackings as such a thing is on everyones mind.

    • redeeman 2 years ago

      > I mean... joking about bomb threats at an airport is not "not doing anything wrong".

      in a private message to friends? it most definitely is.

      also what does airports have to do with anything? are you implying its okay to do if the target is a rural farmhouse, but not an airport?

      • krisoft 2 years ago

        > what does airports have to do with anything?

        Happy to explain. Due to previous attacks people and law enforcement around air travel are more on edge about such threats. This is because for inherent technical reasons during a flight a relatively small explosive can have devastating consequences. This is due to the pressure difference between the cabin and the atmosphere at cruise altitude , and the inherent energies incorporated in an airliner. (Both potential energy due to altitude, kinetic energy due to speed and chemical energy in the fuel.)

        > are you implying its okay to do if the target is a rural farmhouse, but not an airport?

        I'm not implying that. I simply did not claim anything about threats agains rural farmhouses.

        > in a private message to friends? it most definitely is.

        It seems we disagree on this point then.

        • alwa 2 years ago

          There’s also the small matter of that attack mode having actually been fashionable amongst murderously-suicidal ideologue types over the years.

          https://en.m.wikipedia.org/wiki/Timeline_of_airliner_bombing...

          Security forces pay more attention to threat vectors that have a track record of actively being exploited.

        • redeeman 2 years ago

          whether law enforcement is more on edge is their problem. Either you are ACTUALLY threatening, or you're not. A joke between friends in a private channel is NOT a threat.

      • dylan604 2 years ago

        a farmhouse is a funny thing to jump to as an example.

        s/farmhouse/school/ and holy hell will rain down upon you. the zero tolerance at schools has become ridiculous.

    • PretzelPirate 2 years ago

      I had a gate agent joke about needing to check a replacement plane for bombs before we can board. She said it over the intercom and then said "I probably can't joke about that at an airport."

      There was a lot of laughter and it made me far less annoyed about the delay. It was hilarious.

      • itishappy 2 years ago

        The situations are not equal.

        "We are checking the plane for bombs" cannot be interpreted as a threat. If it were to be misunderstood as serious, it would indicate an abundance of caution by the airline.

        "I am going to blow up a plane" sure can. If it were to be misunderstood as serious, it would indicate an immediate threat to the health and safety of hundreds of people.

    • _chu1 2 years ago

      I never said they weren't doing anything wrong though. Maybe it shouldn't be as easy to wander into an airport with a bomb.

Keyboard Shortcuts

j
Next item
k
Previous item
o / Enter
Open selected item
?
Show this help
Esc
Close modal / clear selection