Just a basic blog—snagging random stuff that catches our eye—nothing else, really...
Saturday, November 30, 2013
A Letter From Concerned Scientists | Cyber War! | FRONTLINE | PBS
UT WILD Outdoor / Wilderness Black Utility Kilt - UT Kilts
Which Side of the Barricade Are You On? - Doug Sosnik - POLITICO Magazine
Thursday, November 28, 2013
Wednesday, November 27, 2013
Backlash by the Bay - Tech Riches Alter a City - NYTimes.com
'via Blog this'
Scotty Roberts on Eve's Secret Reptilian Descendants - JasonColavito.com
'via Blog this'
Academic Phrasebank
'via Blog this'
Monday, November 25, 2013
Hardware Encryption Market by Algorithms, Applications & Products - 2018 | MarketsandMarkets
Sunday, November 24, 2013
Saturday, November 23, 2013
Friday, November 22, 2013
What Is the Difference: Viruses, Worms, Trojans, and Bots? - Cisco Systems
Thursday, November 21, 2013
SilverSky’s Holiday Security Study: Can You Spot the Spoof? | SilverSky
Snowden leaks: NSA conducted 231 offensive cyber-ops in 2011, hailed as 'active defense' — RT USA
NSA failed to install anti-leak software at Snowden’s workplace - report — RT USA
EFF's guide to the NSA's official malware - Boing Boing
Tuesday, November 19, 2013
Holly Gilbert | Multimedia Journalist
'via Blog this'
Monday, November 18, 2013
One-quarter of mortgage settlement relief is from payments banks couldn’t collect, according to analysis - Capitol Report - MarketWatch
“This is a handout to the banks…Banks should never have been allowed to count deficiency judgment waivers or short sale forgiveness in non-recourse states. But they are, and they’re doing it in big numbers.”
FBI hacking squad used in domestic investigations, experts say - NBCNews.com
"It's hard for me to write a virus that will only capture your actions on a computer without also capturing your kids using it to do their homework or your daughter getting undressed in front of a Web camera," he said.
From My iPhone
Sunday, November 17, 2013
How to disarm an infrastructure hacker - E & T Magazine
Also, Bruce here:
http://www.networkworld.com/news/2012/061812-schneier-260303.html?page=2
and this
http://www.theregister.co.uk/2011/02/04/cyberwar_rules_of_engagement/
And
http://www.wired.com/threatlevel/2010/03/cyber-war-hype/
'via Blog this'
For Their Eyes Only: The Commercialization of Digital Spying
'via Blog this'
Think Again: Cyberwar - By Thomas Rid | Foreign Policy
'via Blog this'
Schneier on Security: The Threat of Cyberwar Has Been Grossly Exaggerated
'via Blog this'
Words Of War And Weakness: The Zero-Day Exploit Market
'via Blog this'
The Citizen Lab - University of Toronto
'via Blog this'
New Malware Brings Cyberwar One Step Closer | MIT Technology Review
'via Blog this'
The U.S. Senate Wants to Control Malware Like It's a Missile | Killer Apps
'via Blog this'
Japan develops malware cyberweapon | ZDNet
'via Blog this'
Cyber Weapon Friendly Fire: Chevron Stuxnet Fallout - Security -
'via Blog this'
Saturday, November 16, 2013
DHS-funded wi-fi devices used to collect personal data of Seattle residents - National Government | Examiner.com
Govt Documents Reveal DHS Domestic Spy Takeover Alex Jones' Infowars: There's a war on for your mind!
You Are a Rogue Device by Matt Fikse-Verkerk and Brendan Kiley - Seattle Features - The Stranger, Seattle's Only Newspaper
How the NSA and GCHQ Spied on OPEC - SPIEGEL ONLINE
NSA Still Not Sure What Snowden Took, But May Try To Pre-empt Future Leaks | Techdirt
Poll’s lesson for NSA: Show that surveillance programs actually combat terrorism - The Washington Post
Emerging DNA technology will impinge on privacy: civil liberties australia
Friday, November 15, 2013
Snowden, GCHQ and the launch of LCHR | Progress | News and debate from the progressive community
- See more at: http://www.progressonline.org.uk/2013/11/04/snowden-gchq-and-the-launch-of-lchr/#sthash.nSrlLqe9.dpuf
http://www.progressonline.org.uk/2013/11/04/snowden-gchq-and-the-launch-of-lchr/
From My iPhone
Germany challenges UK over legal basis of GCHQ mass monitoring of global internet traffic - Home News - UK - The Independent
"Let us be clear about it: in both our countries intelligence work takes place within a strong legal framework.
"We operate under the rule of law and are accountable for it. In some countries secret intelligence is used to control their people - in ours, it only exists to protect their freedoms."
From My iPhone
Thursday, November 14, 2013
Wednesday, November 13, 2013
Ian Stevenson’s Case for the Afterlife: Are We ‘Skeptics’ Really Just Cynics? | Bering in Mind, Scientific American Blog Network
Tuesday, November 12, 2013
Watch Episode 350: Active Defense | PaulDotCom Security Weekly TV Episodes | Tech & Gadgets Videos | Blip
'via Blog this'
Japan's Plan for 'Good Computer Virus' Sparks Debate | SecurityWeek.Com
Monday, November 11, 2013
Sunday, November 10, 2013
Saturday, November 9, 2013
Friday, November 8, 2013
Time for Internet Engineers to Fight Back Against the "Surveillance Internet" | MIT Technology Review
NSA Funding Bill Passed By Senate Intelligence Community Gives Agency Extra Cash To Hunt 'Insider Threats' | Techdirt Lite
Thursday, November 7, 2013
How to sign digital documents | Macworld
Launch Preview, open its preferences, and select the Signatures tab. Click the plus ( ) button at the bottom of the window.
Blogs | StaySafeOnline.org
Wednesday, November 6, 2013
Ian Stevenson’s Case for the Afterlife: Are We ‘Skeptics’ Really Just Cynics? | Bering in Mind, Scientific American Blog Network
Kaspersky Lab’s Policy on the Use of Software for the Purpose of State Surveillance | Kaspersky Lab US
Tuesday, November 5, 2013
Monday, November 4, 2013
Patent granted for Lit Motors C-1 gimbaled flywheel stabilization system - AutoblogGreen
From My iPhoneThis involves a pair of high-speed spinners that change speed and direction in response to what's happening with the vehicle.
Sunday, November 3, 2013
Saturday, November 2, 2013
Friday, November 1, 2013
Dear AV provider: Do you enable NSA spying? Yours, EFF | Ars Technica
The Electronic Frontier Foundation, security expert Bruce Schneier, and 23 others have called on antivirus providers around the world to protect their users against malware spawned by the National Security Agency and other groups that carry out government surveillance.
From My iPhone