Tuesday, December 31, 2013

Jesse Willms, the Dark Lord of the Internet - Atlantic Mobile

http://m.theatlantic.com/magazine/archive/2014/01/the-dark-lord-of-the-internet/355726/

Regulatory authorities like the FTC are undermanned; courts seem reluctant to punish offenders; and worse yet, even the sheriffs we believe are imposing order online—Google, Yahoo, Microsoft—often end up providing scammers with a platform for deception.

From My iPhone

Covert action in Colombia | The Washington Post

http://www.washingtonpost.com/sf/investigative/2013/12/21/covert-action-in-colombia/

And, as a drug-trafficking organization, the FARC's status as a threat to U.S. national security had been settled years earlier with Reagan's counternarcotics finding. At the time, the crack cocaine epidemic was at its height, and the government decided that organizations that brought drugs to America's streets were a threat to national security.

From My iPhone

Sunday, December 29, 2013

This Flying Ambulance May Save Wounded Soldiers from Certain Death

The AirMule's fully-ducted fans make it unique among UAV's. Since the rotors are protected from obstacles and debris, the AirMule will be able to easily and safely operate within urban environments—something that neither traditional propeller or rotor-driven UAVs can do.

http://gizmodo.com/this-flying-ambulance-may-save-wounded-soldiers-from-ce-1484258226

Business Insider

http://www.businessinsider.com/data-breach-rules-2013-12


From My iPhone

Susan Rice: NSA Officials Didn’t Lie, They ‘Inadvertently Made False Representations’ | Mediaite


"There are many things we do in intelligence that, if revealed, would have the potential for all kinds of blowback," Clapper told a House panel  on October

From My iPhone

How did the NSA hack our emails?

http://mash.network.coull.com/activatevideo?video_provider_id=2&pid=8165&website_id=21975&width=584&height=359&embed_type=IFRAME&video_provider_url=http%3A//www.youtube.com/embed/ulg_AHBOIQU%3Fversion%3D3%26rel%3D1%26fs%3D1%26showsearch%3D0%26showinfo%3D1%26iv_load_policy%3D1%26wmode%3Dtransparent&mobile=true&referrer=http%3A%2F%2Fleaksource.wordpress.com%2F2013%2F12%2F28%2Fprofessor-edward-frenkel-the-mathematics-behind-nsas-encryption-backdoors%2F


From My iPhone

NSA drowning in overcollected data, can't do its job properly - Boing Boing

http://boingboing.net/2013/12/27/nsa-drowning-in-overcollected.html

Like we predicted.

From My iPhone

Saturday, December 28, 2013

Friday, December 27, 2013

Weird link bill on cyber tools


(1) To identify the intelligence, law enforcement, and financial sanctions tools that can and should be used to suppress the trade in cyber tools and infrastructure that are or can be used for criminal, terrorist, or military activities while preserving the ability of governments and the private sector to use such tools for legitimate purposes of self-defense.

http://www.opencongress.org/bill/hr3304-113/text?version=enr&nid=t0:enr:3326

Sunday, December 22, 2013

Device Identification & Device Fingerprinting | iovation

https://www.iovation.com/risk-management/device-identification

WANT TO MEET A BILLION DEVICES?
We can already give you the lowdown on 1.5 billion of them. In many cases, what appears to be a new device to you is not a new device to iovation. In fact, we've already seen and re-recognized the originating device for 84 percent of all transactions deemed fraudulent at our customers' sites. And we're meeting more devices—and learning more about them—all the time

Counterfeit wine: A vintage crime - CBS News


He says he has spent $4.5 million on 421 bottles of wine that turned out to be counterfeit. "So it's a pretty big swindle."

From My iPhone

Friday, December 20, 2013

"what is an oyster flight" - Google Search

https://www.google.com/search?client=safari&hl=en&ei=RY-0UquZEceGogT66oD4CA&q=%22what+is+an+oyster+flight%22&oq=%22what+is+an+oyster+flight%22&gs_l=mobile-gws-serp.3...23203.23203.0.23645.1.1.0.0.0.0.0.0..0.0....0...1c.1.32.mobile-gws-serp..1.0.0.ep-dDRoOGDs

Seriously, am I the first person to ask this question?

From My iPhone

Meet the contractors analyzing your private data - Salon.com


Private companies are getting rich probing your personal information for the government. Call it Digital Blackwater


From My iPhone

Looking back at NSA revelations since the Snowden leaks | PBS NewsHour | Dec. 12, 2013 | PBS

http://www.pbs.org/newshour/bb/government_programs/july-dec13/nsa1_12-12.html

MARGARET WARNER: The boxy, one million-square-foot complex rising from the Utah desert outside Salt Lake City, ringed by heavy security and code-named Bumblehive, is the latest data mining center of the National Security Agency, or NSA.

From My iPhone

Business Insider

http://www.businessinsider.com/china-military-tech-2013-12

Seven months had passed since they'd launched an undercover operation against a suspected Chinese arms-trafficking network - one of scores operating in support of Beijing's ambitious military expansion into outer space.

From My iPhone

What's the ROI from Telehealth Programs?

http://www.hin.com/lp/hcpb121813_telehealth_ROI_2013.html


From My iPhone

Healthcare Intelligence Network- Chart of the Week: What's the ROI from Telehealth Programs?

http://www.hin.com/chartoftheweek/telehealth_ROI_2013_printable.html


From My iPhone

Custom Square Coated Board Coaster (16pt.) with Logo

Custom Square Coated Board Coaster (16pt.) with Logo: This coated board coaster comes in a square shape. This is made out of 16 point white board.

PrintGlobe | Custom Beer Coasters | Branded Beer Coasters

http://www.printglobe.com/printing/custom-beer-coasters.htm

Get your brand recognized at your next important event or function with custom beer coasters.

From My iPhone

John Bolton: Edward Snowden 'Ought To Swing From A Tall Oak Tree'

http://m.huffpost.com/us/entry/4461196

Hang Snowden?

From My iPhone

Saab Wins $4.5 Billion Brazil Order as Spat Hurts Boeing - Bloomberg


Saab AB (SAABB) surged in Stockholmas it beat Boeing Co. (BA) to supply 36 jet fighters for Brazil's air force after President Dilma Rousseff called alleged U.S. spying on her government an affront to the South American nation.

From My iPhone

Wednesday, December 18, 2013

There is no freedom without freedom of movement - Estonian World

There is no freedom without freedom of movement - Estonian World:

British prime minister David Cameron recently caused a furore when suggesting that in future, the immigration from poorer EU countries to the UK should be restricted, thus undermining and ignoring one of the fundamental EU principles – the free movement of workers. David Cameron also described the immigration from A8 (including Estonia) countries to the UK since 2004 as “a big mistake”. Adam Garrie argues why the prime minister is wrong on this.

Video shows STUNNING penguin ‘traveling wave’ [VIDEO] | Science Recorder

http://www.sciencerecorder.com/news/video-shows-stunning-penguin-traveling-wave-video/


From My iPhone

Program for International Student Assessment (PISA) - Overview

Program for International Student Assessment (PISA) - Overview: PISA 2012 assessed students’ mathematics, reading, and science literacy. PISA 2012 also included computer-based assessments in mathematics literacy, reading literacy, and general problem solving, and an assessment of students' financial literacy.

Tuesday, December 17, 2013

A guide to enterprise iOS management: Features, devices and security


With the iPhone Configuration Utility, mobile device management (MDM) application program interfaces(APIs) for iOS, Apple Configurator and some new iOS 6 features that have IT in mind, iOS management is slowly getting easier. But it's not a breeze yet. Until the day that managing 1,000 iPads is a snap, consult this guide to enterprise iOS management.

From My iPhone

Monday, December 16, 2013

Get Inspired | Turnstone sit on it

http://myturnstone.com/get-inspired/buoy-office-chair-for-the-active-person/


From My iPhone

Se hela intervjun med Glenn Greenwald - Uppdrag Granskning | SVT.se

http://www.svt.se/ug/se-hela-intervjun-med-glenn-greenwald

Glenn Greenwald: - Their goal, that they wake up every day to fulfill, is to ensure that all forms of human electronic communication, things that take place over the telephone, or over the internet, is collected by the NSA, and then stored, monitored and analyzed, so that there is no human communication that takes place, beyond the surveillance reach of the NSA. Ultimately that is the real revelation, of all of these documents.

From My iPhone

Coding Horror: Better Image Resizing

http://www.codinghorror.com/blog/2007/07/better-image-resizing.html

Bicubic image enlargement.

From My iPhone

MANHIGH II - (Simons) -1957-

http://stratocat.com.ar/fichas-e/1957/CBY-19570819.htm

During this flight, Simon's balloon achieved a world's altitude free balloon record of 101,516 feet (30,942 meters). For this achievement, he was awarded a certificate from the Federation Aeronautique Internationale. In 1962 Simons wrote a book about his experience entitled MANHIGH.

From My iPhone

Sunday, December 15, 2013

Leaked Documents Reveal Budget Breakdown Between CIA, NSA : NPR

Leaked Documents Reveal Budget Breakdown Between CIA, NSA : NPR: STEVEN AFTERGOOD: NRO used to be close to twice the budget of CIA, and NSA was 25 percent bigger than CIA. And now, those numbers have nearly reversed, and it's CIA that is 50 percent bigger than those other agencies.

Photo Enlargement

Photo Enlargement: Kneson Software's revolutionary Kneson Unlimited enlargement engine that converts pixels into vectors for enlargement then back into unlimited enlargements.*
*limited only by computer memory

Monday, December 9, 2013

On November 5, 1603, a man called Guy Fawkes

On November 5, 1603, a man called Guy Fawkes was apprehended trying to blow up parliament.

Killing off the leadership of a country is a classic tactic of extremists, fundamentalists, dictators, in short, anyone who wants to impose their agenda and belief system on a population. Examples from modern times include Khmer Rouge and the Nazis.

In recent years, in a massive collision
of irony and ignorance, some groups that advocate liberty and freedom have taken as their symbol a mask resembling guy Fawkes


From My iPhone

Circumpolar Mural - Digital Blasphemy| Murals Your Way

http://www.muralsyourway.com/circumpolar-mural/

Lack of resources exposes organizations to APTs, study finds - SC Magazine

http://www.scmagazine.com//lack-of-resources-exposes-organizations-to-apts-study-finds/article/324367/

Sunday, December 8, 2013

Someone's Been Siphoning Data Through a Huge Security Hole in the Internet | Threat Level | Wired.com

Someone's Been Siphoning Data Through a Huge Security Hole in the Internet | Threat Level | Wired.com: But the technique demonstrated at DefCon, and now spotted in the wild, allows an attacker to send his announcement in such a way that it is delivered only to select routers. So, once the traffic passes through his router, it gets directed to its rightful destination through routers that never got the bogus announcement. The attack intercepts only traffic headed to target addresses, not from them.

UT Documents

UT Documents: I was previously a constitutional law and civil rights litigator and am now a journalist.

Subsentio :: Home

Subsentio :: Home: Subsentio is a service bureau whose technical solutions connect a lawful intercept from the customer to the Federal, State and Local Law Enforcement monitoring centers to comply with lawfully authorized electronic surveillance (LAES) court orders.

Cryppies, Day Ladies, and Whiffling: The Just-Declassified Lingo of the NSA - Alexis C. Madrigal - The Atlantic

Cryppies, Day Ladies, and Whiffling: The Just-Declassified Lingo of the NSA - Alexis C. Madrigal - The Atlantic: Cryppie: shortened form of "cryptanalyst"; used (and taken) by some as affectionate, by others as derogatory -- listen carefully for the tone of voice and check to see if the speaker is smiling or not.

FBI’s search for ‘Mo,’ suspect in bomb threats, highlights use of malware for surveillance - The Washington Post

http://www.washingtonpost.com/business/technology/2013/12/06/352ba174-5397-11e3-9e2c-e1d01116fd98_story_2.html

Following the Wh1t3 Rabbit - A Security blog by Rafal Los: Enterprise Security Professionals Getting Out of the Enterprise?

http://blog.wh1t3rabbit.net/2013/12/enterprise-security-professionals.html?m=1

Comment

From My iPhone

Thursday, December 5, 2013

Do Antivirus Companies Whitelist NSA Malware? - InformationWeek

Do Antivirus Companies Whitelist NSA Malware? - InformationWeek:

I predict that in 2014 every major newspaper and magazine will perpetuate, to the detriment of data security and human understanding, the grossly erroneous notion that "for an antivirus firm to spot malware, it first needs to have seen the malware, recognized that it's malicious code, and written a corresponding virus signature for its products."

The fact that this is simply not true, and has not been true for many years, will not deter people from repeating it, over and over.

A bit like Autotrend saying that cars cannot be started without first engaging the crank handle.

Wall Street, investment bankers, and social good : The New Yorker

Wall Street, investment bankers, and social good : The New Yorker: Rent capture causes the misallocation of labor and capital, transfers substantial wealth to bankers and financiers, and, at worst, induces systemic failure. Both impose social costs on their own, but in combination they create a perfect storm of wealth destruction.”

Tuesday, December 3, 2013

SkyJack - autonomous drone hacking

SkyJack - autonomous drone hacking:

"Using a Parrot AR.Drone 2, a Raspberry Pi, a USB battery, an Alfa AWUS036H wireless transmitter, aircrack-ng, node-ar-drone, node.js, and my SkyJack software, I developed a drone that flies around, seeks the wireless signal of any other drone in the area..."

U.S. Loses Over $71 Billion in Religious Tax Exemptions | Center for Inquiry

the tax exemptions enjoyed by religious institutions cost the U.S. a staggering $71 billion per year, at the least. Meanwhile, this religious privilege helps to subsidize the lavish homes and lifestyles of numerous clergy on the taxpayers' dime.

http://www.centerforinquiry.net/newsroom/u.s._loses_over_71_billion_in_religious_tax_exemptions/


From My iPhone

Monday, December 2, 2013

Florida mom's photos used in more than 200 bogus Match.com profiles: $1.5 billion lawsuit - NY Daily News

Florida mom's photos used in more than 200 bogus Match.com profiles: $1.5 billion lawsuit - NY Daily News: 'Not a day goes by when someone doesn't tell me that they saw my pictures posted on Match.com or another web site,' says Yuliana Avalos, a Florida mom and part-time model who never actually signed up for the site. She charges the popular dating site with engaging in 'one of the biggest conspiracies ever executed on the Internet.'

Will of the WISP: Your company's Written Information Security Program

Will of the WISP: Your company's Written Information Security Program:

Here are some links to free information and samples that can help you tackle the WISP creation and implementation:
There are several commercial vendors that offer tools for implementing policy, for example Info-Tech's Security Policy Implementation tool.

Edu: http://my.gwu.edu/files/policies/InformationSecurityPolicyFINAL.pdf

Most SMBs have no Information Security Policies

Most SMBs have no Information Security Policies � Security Policy University: Phishing attacks are now among the top security risks for organizations. Yet, according to a recent survey of small and medium-sized businesses (SMB), a full Eighty-seven (87%) percent do not have a formal written Internet security policy for employees.

http://www.mass.gov/ocabr/docs/idtheft/sec-plan-smallbiz-guide.pdf

Information Security Policy and Procedures Manual

Information Security Policy and Procedures Manual | Instant Download | Dozens of Policies, Forms, Checklists, Samples, Examples, and More - myinformationsecuritypolicy.com: The "Information Security Policy and Procedures Manual", available for instant download, includes over 300 pages of professionally researched, industry leading information security policies, procedures, forms, checklists, templates, provisioning and hardening documents, and much more.

Information Security -�Office of Information Technology

Information Security -�Office of Information Technology:

Princeton University possesses information that is sensitive and valuable, e.g., personally identifiable information, financial data, building plans, research, and other information considered sensitive.

State Cyber and Information Security Policies

State Cyber and Information Security Policies:

E.g. Alabama Department of Finance, Information Services Division
Information Security Policy