Saturday, November 30, 2013

A Letter From Concerned Scientists | Cyber War! | FRONTLINE | PBS

A Letter From Concerned Scientists | Cyber War! | FRONTLINE | PBS: We, as concerned scientists and leaders, seek your help and offer ours. The critical infrastructure of the United States, including electrical power, finance, telecommunications, health care, transportation, water, defense and the Internet, is highly vulnerable to cyber attack.

UT WILD Outdoor / Wilderness Black Utility Kilt - UT Kilts

UT WILD Outdoor / Wilderness Black Utility Kilt - UT Kilts: The UT WILD is the ultimate kilt for the outdoor enthusiast. It comes with just about everything anyone would need that spends time in the outdoors.

Which Side of the Barricade Are You On? - Doug Sosnik - POLITICO Magazine

Which Side of the Barricade Are You On? - Doug Sosnik - POLITICO Magazine: The country’s dissatisfaction is evident in all the major polling trend lines. Since the beginning of the last decade, a majority of the country has believed that the country is heading in the wrong direction, regardless of which party was in power.

Meet the Spies Doing the NSA's Dirty Work - By Shane Harris | Foreign Policy

http://www.foreignpolicy.com/articles/2013/11/21/the_obscure_fbi_team_that_does_the_nsa_dirty_work?page=0,2


From My iPhone

Monday, November 25, 2013

Hardware Encryption Market by Algorithms, Applications & Products - 2018 | MarketsandMarkets

Hardware Encryption Market by Algorithms, Applications & Products - 2018 | MarketsandMarkets: The global hardware encryption market revenue is expected to reach $14.86 billion by end of 2013 is expected to grow to $166.67 billion in 2018 at a CAGR of 62.17%. Similarly, volumes are estimated to grow from roughly 59.76 million units to 691.79 million units in 2018 at a CAGR of 63.20%.

Friday, November 22, 2013

What Is the Difference: Viruses, Worms, Trojans, and Bots? - Cisco Systems

What Is the Difference: Viruses, Worms, Trojans, and Bots? - Cisco Systems: Viruses, worms, Trojans, and bots are all part of a class of software called malware. Malware or malicious code (malcode) is short for malicious software. It is code or software that is specifically designed to damage, disrupt, steal, or in general inflict some other “bad” or illegitimate action on data, hosts, or networks.

Thursday, November 21, 2013

DailyTech - Cheeky, Possibly Illegal Microsoft Memorabilia Trolls Google Over Data Theft

http://www.dailytech.com/Cheeky+Possibly+Illegal+Microsoft+Memorabilia+Trolls+Google+Over+Data+Theft/article33791c.htm


From My iPhone

SilverSky’s Holiday Security Study: Can You Spot the Spoof? | SilverSky

SilverSky’s Holiday Security Study: Can You Spot the Spoof? | SilverSky: Turns out spoofed emails are nothing new to most employees, with 73 percent having received these dangerous messages at both work and at home. A whopping 98 percent are confident they could spot a spoofed email, yet when presented with a blatantly fake email as part of our study, only 70 percent could say for sure that the FedEx email included in the survey was a fake. (Check out this infographic to see if you can spot the red flags in our sample email). Additionally, 16 percent came clean, admitting to opening a spoofed email and clicking on a bad link at some time in the past. And 71 percent know a co-worker who has gotten duped by a spoof email.

Snowden leaks: NSA conducted 231 offensive cyber-ops in 2011, hailed as 'active defense' — RT USA

Snowden leaks: NSA conducted 231 offensive cyber-ops in 2011, hailed as 'active defense' — RT USA: According to the US intelligence budget, by the end of this year a $652 million program named GENIE, which reportedly helps the US break into foreign networks to plant sophisticated malware in computers, routers and firewalls in tens of thousands of machines every year, will control at least 85,000 implants in strategically chosen computers around the world - four times the number available in 2008.

NSA failed to install anti-leak software at Snowden’s workplace - report — RT USA

NSA failed to install anti-leak software at Snowden’s workplace - report — RT USA: Snowden began downloading information connected with the NSA’s surveillance while working for Dell Inc. in April 2012. In late March or early April 2013, he was assigned by Booz Allen Hamilton to the NSA Hawaii facility, known as a Remote Operations Center. The facility is tasked with intercepting communications from Asia. According to The Washington Post, it is also involved with operations in cyberspace such as mapping adversaries' computer networks and implanting electronic beacons.

EFF's guide to the NSA's official malware - Boing Boing

EFF's guide to the NSA's official malware - Boing Boing: Once a victim visits a malicious website, how does the attacker actually infect the computer? Perhaps the most straightforward method is to trick the user into downloading and running software.

Tuesday, November 19, 2013

Holly Gilbert | Multimedia Journalist

Holly Gilbert | Multimedia Journalist: "Spoon pumpkin mixture into muffin cups, about 1/2 full. Then add one tablespoon of the cream cheese mixture right in the middle of the batter. Push it down with your finger to make sure its down there good!"

'via Blog this'

Sunday, November 17, 2013

How to disarm an infrastructure hacker - E & T Magazine

How to disarm an infrastructure hacker - E & T Magazine: ""We are at the beginning of a new and dangerous era of cyber warfare." That is the chilling warning from Mikko Hyponnen, chief research officer at Internet security company F-Secure."

Also, Bruce here:

http://www.networkworld.com/news/2012/061812-schneier-260303.html?page=2

and this

http://www.theregister.co.uk/2011/02/04/cyberwar_rules_of_engagement/

And

http://www.wired.com/threatlevel/2010/03/cyber-war-hype/

'via Blog this'

For Their Eyes Only: The Commercialization of Digital Spying

For Their Eyes Only: The Commercialization of Digital Spying: "The report features new findings, as well as consolidating a year of our research on the commercial market for offensive computer network intrusion capabilities developed by Western companies."

'via Blog this'

Think Again: Cyberwar - By Thomas Rid | Foreign Policy

Think Again: Cyberwar - By Thomas Rid | Foreign Policy: "Time for a reality check: Cyberwar is still more hype than hazard. Consider the definition of an act of war: It has to be potentially violent, it has to be purposeful, and it has to be political. The cyberattacks we've seen so far, from Estonia to the Stuxnet virus, simply don't meet these criteria."

'via Blog this'

Schneier on Security: The Threat of Cyberwar Has Been Grossly Exaggerated

Schneier on Security: The Threat of Cyberwar Has Been Grossly Exaggerated: "It's about who is in charge of cyber security, and how much control the government will exert over civilian networks. And by beating the drums of war, the military is coming out on top."

'via Blog this'

Words Of War And Weakness: The Zero-Day Exploit Market

Words Of War And Weakness: The Zero-Day Exploit Market: "Intelligence on such weaknesses, and the tools needed to exploit them, now sell for considerable sums."

'via Blog this'

The Citizen Lab - University of Toronto

The Citizen Lab - University of Toronto: "The Citizen Lab is an interdisciplinary laboratory based at the Munk School of Global Affairs, University of Toronto, Canada focusing on advanced research and development at the intersection of Information and Communication Technologies (ICTs), human rights, and global security"

'via Blog this'

New Malware Brings Cyberwar One Step Closer | MIT Technology Review

New Malware Brings Cyberwar One Step Closer | MIT Technology Review: "A newly discovered piece of malicious code dubbed Duqu is closely related to the notorious Stuxnet worm that damaged Iran’s nuclear-enrichment centrifuges last year. Although it has no known target or author, it sets the stage for more industrial and cyberwar attacks, experts say."

'via Blog this'

The U.S. Senate Wants to Control Malware Like It's a Missile | Killer Apps

The U.S. Senate Wants to Control Malware Like It's a Missile | Killer Apps: "The powerful congressional panel is looking for the President to "develop policy to control the proliferation of cyber weapons through unilateral and cooperative export controls, law enforcement activities, financial means, diplomatic engagement, and other means," according to the committee's report on the 2014 defense budget bill. "

'via Blog this'

Japan develops malware cyberweapon | ZDNet

Japan develops malware cyberweapon | ZDNet: "The Japanese government has been quietly developing a cyberweapon since 2008, which reportedly is able to track, identify and disable sources of online attacks, one report stated."

'via Blog this'

Cyber Weapon Friendly Fire: Chevron Stuxnet Fallout - Security -

Cyber Weapon Friendly Fire: Chevron Stuxnet Fallout - Security -: "But according to Chevron spokesman Morgan Crinklaw, Stuxnet caused no damage to Chevron's network. "We make every effort to protect our data systems from those types of threats," he told The Wall Street Journal."

'via Blog this'

Saturday, November 16, 2013

DHS-funded wi-fi devices used to collect personal data of Seattle residents - National Government | Examiner.com

DHS-funded wi-fi devices used to collect personal data of Seattle residents - National Government | Examiner.com: According to an article appearing on the website Infowars on Tuesday, documents from within the Department of Homeland Security reveal that the wi-fi boxes that are a part of the Wireless Mesh System in Seattle, which was funded by the agency, are used to collect the personal data of the people in that city.

Govt Documents Reveal DHS Domestic Spy Takeover Alex Jones' Infowars: There's a war on for your mind!

� EXCLUSIVE: Govt Documents Reveal DHS Domestic Spy Takeover Alex Jones' Infowars: There's a war on for your mind!: According to reports from Kiro 7 News, the mesh network devices can capture a mobile user’s IP address, mobile device type, apps used, current location and even historical location down to the last 1,000 places visited.

You Are a Rogue Device by Matt Fikse-Verkerk and Brendan Kiley - Seattle Features - The Stranger, Seattle's Only Newspaper

You Are a Rogue Device by Matt Fikse-Verkerk and Brendan Kiley - Seattle Features - The Stranger, Seattle's Only Newspaper: A New Apparatus Capable of Spying on You Has Been Installed Throughout Downtown Seattle. Very Few Citizens Know What It Is, and Officials Don’t Want to Talk About It.

How the NSA and GCHQ Spied on OPEC - SPIEGEL ONLINE

How the NSA and GCHQ Spied on OPEC - SPIEGEL ONLINE: America's NSA and Britain's GCHQ are both spying on the OPEC oil cartel, documents from whistleblower Edward Snowden reveal. The security of the global energy supply is one of the most important issues for the intelligence agencies.

NSA Still Not Sure What Snowden Took, But May Try To Pre-empt Future Leaks | Techdirt

NSA Still Not Sure What Snowden Took, But May Try To Pre-empt Future Leaks | Techdirt: We've been among those who have suggested that the best way for the NSA to deal with the upcoming NSA leaks is to just stop lying and come clean about what they're doing.

Poll’s lesson for NSA: Show that surveillance programs actually combat terrorism - The Washington Post

Poll’s lesson for NSA: Show that surveillance programs actually combat terrorism - The Washington Post: One finding of the study, according to Zegart, is that the Snowden disclosures have not only revealed once-secret activities, they have also led to a drop in public confidence “in the accuracy of the intelligence enterprise writ large.”

Emerging DNA technology will impinge on privacy: civil liberties australia

Emerging DNA technology will impinge on privacy: civil liberties australia: ''We are expecting to complete the preliminary assessment of the technology for prediction of biogeographical ancestry, eye and hair colour at the research level in a couple of years. However, the face prediction is dependent on the discovery of additional markers. Once the relevant markers have been identified and the analysis algorithms defined, the sample can be analysed in a matter of hours.''

Capability is Driving Policy, Not Just at the NSA But Also in Police Departments | American Civil Liberties Union

https://www.aclu.org/blog/technology-and-liberty-national-security/capability-driving-policy-not-just-nsa-also-police


From My iPhone

Top Cyber Headlines November 15: DHS Cyberattacks on HealthCare.gov

http://video.cnbc.com/gallery/?video=3000218863

What?

From My iPhone

Friday, November 15, 2013

cognitive radio security - Google Search

https://www.google.com/search?client=safari&hl=en&ei=532GUsWpGMSYiALY_oDYDA&q=cognitive+radio+security&oq=cognitive+radio+security&gs_l=mobile-gws-serp.1.0.0l3j0i22i30l2.80586.82676.0.84578.9.9.0.0.0.0.266.1189.3j5j1.9.0....0...1c.1.31.mobile-gws-serp..3.6.648.2P_xS4s14Gk


From My iPhone

The TRUTH about mystery Trojan found in SPAAACE • The Register

http://www.theregister.co.uk/Print/2013/11/13/space_station_malware_not_stuxnet/


From My iPhone

Lilliput PC745 7" Industrial Control Device w/ WinCE 5.0

http://store.mp3car.com/Lilliput_PC745_7_Industrial_Control_Device_w_Win_p/ccc-216.htm


From My iPhone

Snowden, GCHQ and the launch of LCHR | Progress | News and debate from the progressive community

Arguably worse, parliament was not aware of Tempora, nor can it be said to have knowingly legislated for anything like this. In any case, the legal basis of GCHQ's actions is questionable. The Regulation of Investigatory Powers Act and the Intelligence Services Act are often invoked, but they are clearly stretched beyond their original aims.

- See more at: http://www.progressonline.org.uk/2013/11/04/snowden-gchq-and-the-launch-of-lchr/#sthash.nSrlLqe9.dpuf

http://www.progressonline.org.uk/2013/11/04/snowden-gchq-and-the-launch-of-lchr/


From My iPhone

Germany challenges UK over legal basis of GCHQ mass monitoring of global internet traffic - Home News - UK - The Independent

"Let us be clear about it: in both our countries intelligence work takes place within a strong legal framework.

"We operate under the rule of law and are accountable for it. In some countries secret intelligence is used to control their people - in ours, it only exists to protect their freedoms."



From My iPhone

NSA Fallout: Tech Firms Feel a Chill - WSJ.com

http://m.us.wsj.com/articles/SB10001424052702303789604579198370093354680?mg=reno64-wsj


From My iPhone

Monday, November 11, 2013

Patent granted for Lit Motors C-1 gimbaled flywheel stabilization system

From AutoblogGreen: http://green.autoblog.com/2013/11/01/patent-granted-for-lit-motors-c-1-gimbaled-flywheel/


From My iPhone

Lit Motors C1 two-wheeled encased motorcycle prototype rolls, rocks! - AutoblogGreen

http://m.green.autoblog.com/2012/05/31/lit-motors-c1-two-wheeled-encased-motorcycle-prototype/


From My iPhone

Tom Burghardt | Global Research

http://www.globalresearch.ca/author/tom-burghardt


From My iPhone

BBC News - 9/11: The man who 'plotted' America's darkest day

http://m.bbc.co.uk/news/magazine-23914519


From My iPhone

BBC News - Viewpoint: Five ways the world is doing better than you think

http://m.bbc.co.uk/news/magazine-24835822

Some good news for a change.

From My iPhone

5 sites teens flock to instead of Facebook - Slide Show - MarketWatch

http://www.marketwatch.com/story/5-social-sites-cooler-than-facebook-2013-11-01?link=sfmw


From My iPhone

The U.S. Secret State and the Internet: “Dirty Secrets” and “Crypto Wars” from “Clipper Chip” to PRISM | Global Research

http://www.globalresearch.ca/the-u-s-secret-state-and-the-internet-dirty-secrets-and-crypto-wars-from-clipper-chip-to-prism/5357623


From My iPhone

Watch "Henri 2, Paw de Deux" on YouTube

https://www.youtube.com/watch?v=Q34z5dCmC4M&feature=youtube_gdata_player

Thursday, November 7, 2013

How to sign digital documents | Macworld

How to sign digital documents | Macworld:

Launch Preview, open its preferences, and select the Signatures tab. Click the plus ( ) button at the bottom of the window.

Blogs | StaySafeOnline.org

Blogs | StaySafeOnline.org: Every year on or around January 28, companies, nonprofits, schools and government agencies celebrate Data Privacy Day (DPD) by educating employees, customers and constituents about privacy. The National Cyber Security Alliance assists those efforts by providing resources with information about privacy and online safety and security.

Wednesday, November 6, 2013

Ian Stevenson’s Case for the Afterlife: Are We ‘Skeptics’ Really Just Cynics? | Bering in Mind, Scientific American Blog Network

Ian Stevenson’s Case for the Afterlife: Are We ‘Skeptics’ Really Just Cynics? | Bering in Mind, Scientific American Blog Network: Stevenson himself was convinced that, once the precise mechanisms underlying his observations were known, it would bring about “a conceptual revolution that will make the Copernican revolution seem trivial in comparison.” It’s hard to argue with that, assuming it ever does happen.

Digital Attack Map

Digital Attack Map

Where's Indonesia

Kaspersky Lab’s Policy on the Use of Software for the Purpose of State Surveillance | Kaspersky Lab US

Kaspersky Lab’s Policy on the Use of Software for the Purpose of State Surveillance | Kaspersky Lab US: We have a very simple and straightforward policy as it relates to the detection of malware: We detect and remediate any malware attack, regardless of its origin or purpose. There is no such thing as “right” or “wrong” malware for us.