Saturday, November 30, 2013

A Letter From Concerned Scientists | Cyber War! | FRONTLINE | PBS

A Letter From Concerned Scientists | Cyber War! | FRONTLINE | PBS: We, as concerned scientists and leaders, seek your help and offer ours. The critical infrastructure of the United States, including electrical power, finance, telecommunications, health care, transportation, water, defense and the Internet, is highly vulnerable to cyber attack.

UT WILD Outdoor / Wilderness Black Utility Kilt - UT Kilts

UT WILD Outdoor / Wilderness Black Utility Kilt - UT Kilts: The UT WILD is the ultimate kilt for the outdoor enthusiast. It comes with just about everything anyone would need that spends time in the outdoors.

Which Side of the Barricade Are You On? - Doug Sosnik - POLITICO Magazine

Which Side of the Barricade Are You On? - Doug Sosnik - POLITICO Magazine: The country’s dissatisfaction is evident in all the major polling trend lines. Since the beginning of the last decade, a majority of the country has believed that the country is heading in the wrong direction, regardless of which party was in power.

Wednesday, November 27, 2013

Scotty Roberts on Eve's Secret Reptilian Descendants - JasonColavito.com

Scotty Roberts on Eve's Secret Reptilian Descendants - JasonColavito.com: "From his mistaken view of evolution and DNA research, Roberts suggests that “visitors from another world” supplied the variant DNA that makes humans human."

'via Blog this'

Academic Phrasebank

Academic Phrasebank: "The Academic Phrasebank is a general resource for academic writers. "

'via Blog this'

Monday, November 25, 2013

Hardware Encryption Market by Algorithms, Applications & Products - 2018 | MarketsandMarkets

Hardware Encryption Market by Algorithms, Applications & Products - 2018 | MarketsandMarkets: The global hardware encryption market revenue is expected to reach $14.86 billion by end of 2013 is expected to grow to $166.67 billion in 2018 at a CAGR of 62.17%. Similarly, volumes are estimated to grow from roughly 59.76 million units to 691.79 million units in 2018 at a CAGR of 63.20%.

Sunday, November 24, 2013

Exploring the prudent limits of automated cyber attack

"Cyber Conflict (CyCon), 2013 5th International Conference on"

'via Blog this'

Friday, November 22, 2013

What Is the Difference: Viruses, Worms, Trojans, and Bots? - Cisco Systems

What Is the Difference: Viruses, Worms, Trojans, and Bots? - Cisco Systems: Viruses, worms, Trojans, and bots are all part of a class of software called malware. Malware or malicious code (malcode) is short for malicious software. It is code or software that is specifically designed to damage, disrupt, steal, or in general inflict some other “bad” or illegitimate action on data, hosts, or networks.

SilverSky’s Holiday Security Study: Can You Spot the Spoof? | SilverSky

SilverSky’s Holiday Security Study: Can You Spot the Spoof? | SilverSky: Turns out spoofed emails are nothing new to most employees, with 73 percent having received these dangerous messages at both work and at home. A whopping 98 percent are confident they could spot a spoofed email, yet when presented with a blatantly fake email as part of our study, only 70 percent could say for sure that the FedEx email included in the survey was a fake. (Check out this infographic to see if you can spot the red flags in our sample email). Additionally, 16 percent came clean, admitting to opening a spoofed email and clicking on a bad link at some time in the past. And 71 percent know a co-worker who has gotten duped by a spoof email.

Snowden leaks: NSA conducted 231 offensive cyber-ops in 2011, hailed as 'active defense' — RT USA

Snowden leaks: NSA conducted 231 offensive cyber-ops in 2011, hailed as 'active defense' — RT USA: According to the US intelligence budget, by the end of this year a $652 million program named GENIE, which reportedly helps the US break into foreign networks to plant sophisticated malware in computers, routers and firewalls in tens of thousands of machines every year, will control at least 85,000 implants in strategically chosen computers around the world - four times the number available in 2008.

NSA failed to install anti-leak software at Snowden’s workplace - report — RT USA

NSA failed to install anti-leak software at Snowden’s workplace - report — RT USA: Snowden began downloading information connected with the NSA’s surveillance while working for Dell Inc. in April 2012. In late March or early April 2013, he was assigned by Booz Allen Hamilton to the NSA Hawaii facility, known as a Remote Operations Center. The facility is tasked with intercepting communications from Asia. According to The Washington Post, it is also involved with operations in cyberspace such as mapping adversaries' computer networks and implanting electronic beacons.

EFF's guide to the NSA's official malware - Boing Boing

EFF's guide to the NSA's official malware - Boing Boing: Once a victim visits a malicious website, how does the attacker actually infect the computer? Perhaps the most straightforward method is to trick the user into downloading and running software.

Tuesday, November 19, 2013

Holly Gilbert | Multimedia Journalist

Holly Gilbert | Multimedia Journalist: "Spoon pumpkin mixture into muffin cups, about 1/2 full. Then add one tablespoon of the cream cheese mixture right in the middle of the batter. Push it down with your finger to make sure its down there good!"

'via Blog this'

Monday, November 18, 2013

One-quarter of mortgage settlement relief is from payments banks couldn’t collect, according to analysis - Capitol Report - MarketWatch

One-quarter of mortgage settlement relief is from payments banks couldn’t collect, according to analysis - Capitol Report - MarketWatch:

“This is a handout to the banks…Banks should never have been allowed to count deficiency judgment waivers or short sale forgiveness in non-recourse states. But they are, and they’re doing it in big numbers.”

FBI hacking squad used in domestic investigations, experts say - NBCNews.com

http://m.nbcnews.com/technology/fbi-hacking-squad-used-domestic-investigations-experts-say-6C10851882

"It's hard for me to write a virus that will only capture your actions on a computer without also capturing your kids using it to do their homework or your daughter getting undressed in front of a Web camera," he said.

From My iPhone

Sunday, November 17, 2013

How to disarm an infrastructure hacker - E & T Magazine

How to disarm an infrastructure hacker - E & T Magazine: ""We are at the beginning of a new and dangerous era of cyber warfare." That is the chilling warning from Mikko Hyponnen, chief research officer at Internet security company F-Secure."

Also, Bruce here:

http://www.networkworld.com/news/2012/061812-schneier-260303.html?page=2

and this

http://www.theregister.co.uk/2011/02/04/cyberwar_rules_of_engagement/

And

http://www.wired.com/threatlevel/2010/03/cyber-war-hype/

'via Blog this'

For Their Eyes Only: The Commercialization of Digital Spying

For Their Eyes Only: The Commercialization of Digital Spying: "The report features new findings, as well as consolidating a year of our research on the commercial market for offensive computer network intrusion capabilities developed by Western companies."

'via Blog this'

Think Again: Cyberwar - By Thomas Rid | Foreign Policy

Think Again: Cyberwar - By Thomas Rid | Foreign Policy: "Time for a reality check: Cyberwar is still more hype than hazard. Consider the definition of an act of war: It has to be potentially violent, it has to be purposeful, and it has to be political. The cyberattacks we've seen so far, from Estonia to the Stuxnet virus, simply don't meet these criteria."

'via Blog this'

Schneier on Security: The Threat of Cyberwar Has Been Grossly Exaggerated

Schneier on Security: The Threat of Cyberwar Has Been Grossly Exaggerated: "It's about who is in charge of cyber security, and how much control the government will exert over civilian networks. And by beating the drums of war, the military is coming out on top."

'via Blog this'

Words Of War And Weakness: The Zero-Day Exploit Market

Words Of War And Weakness: The Zero-Day Exploit Market: "Intelligence on such weaknesses, and the tools needed to exploit them, now sell for considerable sums."

'via Blog this'

The Citizen Lab - University of Toronto

The Citizen Lab - University of Toronto: "The Citizen Lab is an interdisciplinary laboratory based at the Munk School of Global Affairs, University of Toronto, Canada focusing on advanced research and development at the intersection of Information and Communication Technologies (ICTs), human rights, and global security"

'via Blog this'

New Malware Brings Cyberwar One Step Closer | MIT Technology Review

New Malware Brings Cyberwar One Step Closer | MIT Technology Review: "A newly discovered piece of malicious code dubbed Duqu is closely related to the notorious Stuxnet worm that damaged Iran’s nuclear-enrichment centrifuges last year. Although it has no known target or author, it sets the stage for more industrial and cyberwar attacks, experts say."

'via Blog this'

The U.S. Senate Wants to Control Malware Like It's a Missile | Killer Apps

The U.S. Senate Wants to Control Malware Like It's a Missile | Killer Apps: "The powerful congressional panel is looking for the President to "develop policy to control the proliferation of cyber weapons through unilateral and cooperative export controls, law enforcement activities, financial means, diplomatic engagement, and other means," according to the committee's report on the 2014 defense budget bill. "

'via Blog this'

Japan develops malware cyberweapon | ZDNet

Japan develops malware cyberweapon | ZDNet: "The Japanese government has been quietly developing a cyberweapon since 2008, which reportedly is able to track, identify and disable sources of online attacks, one report stated."

'via Blog this'

Cyber Weapon Friendly Fire: Chevron Stuxnet Fallout - Security -

Cyber Weapon Friendly Fire: Chevron Stuxnet Fallout - Security -: "But according to Chevron spokesman Morgan Crinklaw, Stuxnet caused no damage to Chevron's network. "We make every effort to protect our data systems from those types of threats," he told The Wall Street Journal."

'via Blog this'

Saturday, November 16, 2013

DHS-funded wi-fi devices used to collect personal data of Seattle residents - National Government | Examiner.com

DHS-funded wi-fi devices used to collect personal data of Seattle residents - National Government | Examiner.com: According to an article appearing on the website Infowars on Tuesday, documents from within the Department of Homeland Security reveal that the wi-fi boxes that are a part of the Wireless Mesh System in Seattle, which was funded by the agency, are used to collect the personal data of the people in that city.

Govt Documents Reveal DHS Domestic Spy Takeover Alex Jones' Infowars: There's a war on for your mind!

� EXCLUSIVE: Govt Documents Reveal DHS Domestic Spy Takeover Alex Jones' Infowars: There's a war on for your mind!: According to reports from Kiro 7 News, the mesh network devices can capture a mobile user’s IP address, mobile device type, apps used, current location and even historical location down to the last 1,000 places visited.

You Are a Rogue Device by Matt Fikse-Verkerk and Brendan Kiley - Seattle Features - The Stranger, Seattle's Only Newspaper

You Are a Rogue Device by Matt Fikse-Verkerk and Brendan Kiley - Seattle Features - The Stranger, Seattle's Only Newspaper: A New Apparatus Capable of Spying on You Has Been Installed Throughout Downtown Seattle. Very Few Citizens Know What It Is, and Officials Don’t Want to Talk About It.

How the NSA and GCHQ Spied on OPEC - SPIEGEL ONLINE

How the NSA and GCHQ Spied on OPEC - SPIEGEL ONLINE: America's NSA and Britain's GCHQ are both spying on the OPEC oil cartel, documents from whistleblower Edward Snowden reveal. The security of the global energy supply is one of the most important issues for the intelligence agencies.

NSA Still Not Sure What Snowden Took, But May Try To Pre-empt Future Leaks | Techdirt

NSA Still Not Sure What Snowden Took, But May Try To Pre-empt Future Leaks | Techdirt: We've been among those who have suggested that the best way for the NSA to deal with the upcoming NSA leaks is to just stop lying and come clean about what they're doing.

Poll’s lesson for NSA: Show that surveillance programs actually combat terrorism - The Washington Post

Poll’s lesson for NSA: Show that surveillance programs actually combat terrorism - The Washington Post: One finding of the study, according to Zegart, is that the Snowden disclosures have not only revealed once-secret activities, they have also led to a drop in public confidence “in the accuracy of the intelligence enterprise writ large.”

Emerging DNA technology will impinge on privacy: civil liberties australia

Emerging DNA technology will impinge on privacy: civil liberties australia: ''We are expecting to complete the preliminary assessment of the technology for prediction of biogeographical ancestry, eye and hair colour at the research level in a couple of years. However, the face prediction is dependent on the discovery of additional markers. Once the relevant markers have been identified and the analysis algorithms defined, the sample can be analysed in a matter of hours.''

Snowden, GCHQ and the launch of LCHR | Progress | News and debate from the progressive community

Arguably worse, parliament was not aware of Tempora, nor can it be said to have knowingly legislated for anything like this. In any case, the legal basis of GCHQ's actions is questionable. The Regulation of Investigatory Powers Act and the Intelligence Services Act are often invoked, but they are clearly stretched beyond their original aims.

- See more at: http://www.progressonline.org.uk/2013/11/04/snowden-gchq-and-the-launch-of-lchr/#sthash.nSrlLqe9.dpuf

http://www.progressonline.org.uk/2013/11/04/snowden-gchq-and-the-launch-of-lchr/


From My iPhone

Germany challenges UK over legal basis of GCHQ mass monitoring of global internet traffic - Home News - UK - The Independent

"Let us be clear about it: in both our countries intelligence work takes place within a strong legal framework.

"We operate under the rule of law and are accountable for it. In some countries secret intelligence is used to control their people - in ours, it only exists to protect their freedoms."



From My iPhone

Thursday, November 14, 2013

Wednesday, November 13, 2013

Tuesday, November 12, 2013

Watch Episode 350: Active Defense | PaulDotCom Security Weekly TV Episodes | Tech & Gadgets Videos | Blip

Watch Episode 350: Active Defense | PaulDotCom Security Weekly TV Episodes | Tech & Gadgets Videos | Blip: "We've all heard the term "Hacking Back". We all have mixed feelings about this term. Lets be clear, its not about feelings! The revenge-based "hacking back" was doomed for failure from the beginning"

'via Blog this'

Japan's Plan for 'Good Computer Virus' Sparks Debate | SecurityWeek.Com

Japan's Plan for 'Good Computer Virus' Sparks Debate | SecurityWeek.Com: The words “good” and “virus” may look funny stuck together in a headline, but the words have become a popular way to describe plans by the Japanese government to use a program designed to attack the attackers.

Friday, November 8, 2013

Time for Internet Engineers to Fight Back Against the "Surveillance Internet" | MIT Technology Review

Time for Internet Engineers to Fight Back Against the "Surveillance Internet" | MIT Technology Review: “Fundamentally, surveillance is a business model of the Internet. The NSA didn’t wake up and say: ‘Let’s just spy on everybody, it said: ‘Wow, corporations are spying on everybody, let’s get ourselves a copy,’ ”

Thursday, November 7, 2013

How to sign digital documents | Macworld

How to sign digital documents | Macworld:

Launch Preview, open its preferences, and select the Signatures tab. Click the plus ( ) button at the bottom of the window.

Blogs | StaySafeOnline.org

Blogs | StaySafeOnline.org: Every year on or around January 28, companies, nonprofits, schools and government agencies celebrate Data Privacy Day (DPD) by educating employees, customers and constituents about privacy. The National Cyber Security Alliance assists those efforts by providing resources with information about privacy and online safety and security.

Wednesday, November 6, 2013

Ian Stevenson’s Case for the Afterlife: Are We ‘Skeptics’ Really Just Cynics? | Bering in Mind, Scientific American Blog Network

Ian Stevenson’s Case for the Afterlife: Are We ‘Skeptics’ Really Just Cynics? | Bering in Mind, Scientific American Blog Network: Stevenson himself was convinced that, once the precise mechanisms underlying his observations were known, it would bring about “a conceptual revolution that will make the Copernican revolution seem trivial in comparison.” It’s hard to argue with that, assuming it ever does happen.

Kaspersky Lab’s Policy on the Use of Software for the Purpose of State Surveillance | Kaspersky Lab US

Kaspersky Lab’s Policy on the Use of Software for the Purpose of State Surveillance | Kaspersky Lab US: We have a very simple and straightforward policy as it relates to the detection of malware: We detect and remediate any malware attack, regardless of its origin or purpose. There is no such thing as “right” or “wrong” malware for us.

Patent granted for Lit Motors C-1 gimbaled flywheel stabilization system - AutoblogGreen


This involves a pair of high-speed spinners that change speed and direction in response to what's happening with the vehicle.

From My iPhone

Dear AV provider: Do you enable NSA spying? Yours, EFF | Ars Technica

The Electronic Frontier Foundation, security expert Bruce Schneier, and 23 others have called on antivirus providers around the world to protect their users against malware spawned by the National Security Agency and other groups that carry out government surveillance.




From My iPhone

MQ-1B crashes northwest of Holloman - Drones be crashing

MQ-1B crashes northwest of Holloman - Alamogordo Daily News: It's the seventh UAV to crash at Holloman since 2004 where an MQ-1 UAV crashed and burned on White Sands Missile Range, Another QF-4E