Just a basic blog—snagging random stuff that catches our eye—nothing else, really...
Tuesday, December 31, 2013
Jesse Willms, the Dark Lord of the Internet - Atlantic Mobile
Regulatory authorities like the FTC are undermanned; courts seem reluctant to punish offenders; and worse yet, even the sheriffs we believe are imposing order online—Google, Yahoo, Microsoft—often end up providing scammers with a platform for deception.
From My iPhone
Covert action in Colombia | The Washington Post
And, as a drug-trafficking organization, the FARC's status as a threat to U.S. national security had been settled years earlier with Reagan's counternarcotics finding. At the time, the crack cocaine epidemic was at its height, and the government decided that organizations that brought drugs to America's streets were a threat to national security.
From My iPhone
Sunday, December 29, 2013
This Flying Ambulance May Save Wounded Soldiers from Certain Death
The AirMule's fully-ducted fans make it unique among UAV's. Since the rotors are protected from obstacles and debris, the AirMule will be able to easily and safely operate within urban environments—something that neither traditional propeller or rotor-driven UAVs can do.
http://gizmodo.com/this-flying-ambulance-may-save-wounded-soldiers-from-ce-1484258226
Susan Rice: NSA Officials Didn’t Lie, They ‘Inadvertently Made False Representations’ | Mediaite
"There are many things we do in intelligence that, if revealed, would have the potential for all kinds of blowback," Clapper told a House panel on October
From My iPhone
Saturday, December 28, 2013
China jails World of Warcraft cybercrime group — RT News
A real prison term for selling gold and guns in the online game World of Warcraft? Easy answer: ten men have been sentenced to up to two years behind bars in China for taking over 11,500 World of Warcraft accounts.
From My iPhone
Friday, December 27, 2013
Weird link bill on cyber tools
(1) To identify the intelligence, law enforcement, and financial sanctions tools that can and should be used to suppress the trade in cyber tools and infrastructure that are or can be used for criminal, terrorist, or military activities while preserving the ability of governments and the private sector to use such tools for legitimate purposes of self-defense.
http://www.opencongress.org/bill/hr3304-113/text?version=enr&nid=t0:enr:3326
Thursday, December 26, 2013
Rep. Jack Kingston Proposes That Poor Students Sweep Floors In Exchange For Lunch
I had to watch the video to believe he is a real person who really said that and not a satirist.
http://www.huffingtonpost.com/2013/12/18/jack-kingston-school-lunch_n_4467711.html
Wednesday, December 25, 2013
CIA, FBI, NSA, differents agencies for an unique intent...global monitoring - Security Affairs
From May, 2012: The FBI has recently created a secret surveillance unit to project and develop technologic tools and software for Internet and wireless communications monitoring.
The National Security Agency’s oversharing problem | Ars Technica
Ars talks to an ex-NSA pro who filed unlawful sharing complaints—only to be shunned.
From My iPhoneSunday, December 22, 2013
Device Identification & Device Fingerprinting | iovation
https://www.iovation.com/risk-management/device-identification
WANT TO MEET A BILLION DEVICES?
We can already give you the lowdown on 1.5 billion of them. In many cases, what appears to be a new device to you is not a new device to iovation. In fact, we've already seen and re-recognized the originating device for 84 percent of all transactions deemed fraudulent at our customers' sites. And we're meeting more devices—and learning more about them—all the time
Counterfeit wine: A vintage crime - CBS News
He says he has spent $4.5 million on 421 bottles of wine that turned out to be counterfeit. "So it's a pretty big swindle."
Saturday, December 21, 2013
Friday, December 20, 2013
"what is an oyster flight" - Google Search
Seriously, am I the first person to ask this question?
From My iPhone
Meet the contractors analyzing your private data - Salon.com
Private companies are getting rich probing your personal information for the government. Call it Digital Blackwater
Looking back at NSA revelations since the Snowden leaks | PBS NewsHour | Dec. 12, 2013 | PBS
MARGARET WARNER: The boxy, one million-square-foot complex rising from the Utah desert outside Salt Lake City, ringed by heavy security and code-named Bumblehive, is the latest data mining center of the National Security Agency, or NSA.
From My iPhone
Business Insider
Seven months had passed since they'd launched an undercover operation against a suspected Chinese arms-trafficking network - one of scores operating in support of Beijing's ambitious military expansion into outer space.
From My iPhone
Custom Square Coated Board Coaster (16pt.) with Logo
PrintGlobe | Custom Beer Coasters | Branded Beer Coasters
Get your brand recognized at your next important event or function with custom beer coasters.
From My iPhone
Saab Wins $4.5 Billion Brazil Order as Spat Hurts Boeing - Bloomberg
From My iPhone
Wednesday, December 18, 2013
There is no freedom without freedom of movement - Estonian World
British prime minister David Cameron recently caused a furore when suggesting that in future, the immigration from poorer EU countries to the UK should be restricted, thus undermining and ignoring one of the fundamental EU principles – the free movement of workers. David Cameron also described the immigration from A8 (including Estonia) countries to the UK since 2004 as “a big mistake”. Adam Garrie argues why the prime minister is wrong on this.
Program for International Student Assessment (PISA) - Overview
Tuesday, December 17, 2013
A guide to enterprise iOS management: Features, devices and security
With the iPhone Configuration Utility, mobile device management (MDM) application program interfaces(APIs) for iOS, Apple Configurator and some new iOS 6 features that have IT in mind, iOS management is slowly getting easier. But it's not a breeze yet. Until the day that managing 1,000 iPads is a snap, consult this guide to enterprise iOS management.
From My iPhone
Monday, December 16, 2013
Se hela intervjun med Glenn Greenwald - Uppdrag Granskning | SVT.se
Glenn Greenwald: - Their goal, that they wake up every day to fulfill, is to ensure that all forms of human electronic communication, things that take place over the telephone, or over the internet, is collected by the NSA, and then stored, monitored and analyzed, so that there is no human communication that takes place, beyond the surveillance reach of the NSA. Ultimately that is the real revelation, of all of these documents.
From My iPhone
Coding Horror: Better Image Resizing
Bicubic image enlargement.
From My iPhone
MANHIGH II - (Simons) -1957-
During this flight, Simon's balloon achieved a world's altitude free balloon record of 101,516 feet (30,942 meters). For this achievement, he was awarded a certificate from the Federation Aeronautique Internationale. In 1962 Simons wrote a book about his experience entitled MANHIGH.
From My iPhone
Sunday, December 15, 2013
Leaked Documents Reveal Budget Breakdown Between CIA, NSA : NPR
Photo Enlargement
*limited only by computer memory
Saturday, December 14, 2013
hemochromatosis-fibromyalgia - Google Search
Prospective studies are needed to better understand the risk factors for FMS in such patients.
From My iPhone
High prevalence of fibromyalgia in pati - PubMed Mobile
CONCLUSIONS: This study reveals a high prevalence of FMS (43%) among subjects with HFE-related hemochromatosis. Prospective studies are needed to better understand the risk factors for FMS in such patients.
From My iPhone
Friday, December 13, 2013
Global Antivirus Software Package Market 2012-2016 with ESET LLC, Microsoft Corp., and... -- DUBLIN, Ireland, December 6, 2013 /PRNewswire/ --
Wednesday, December 11, 2013
Tuesday, December 10, 2013
Monday, December 9, 2013
On November 5, 1603, a man called Guy Fawkes
Killing off the leadership of a country is a classic tactic of extremists, fundamentalists, dictators, in short, anyone who wants to impose their agenda and belief system on a population. Examples from modern times include Khmer Rouge and the Nazis.
In recent years, in a massive collision
of irony and ignorance, some groups that advocate liberty and freedom have taken as their symbol a mask resembling guy Fawkes
From My iPhone
Sunday, December 8, 2013
Someone's Been Siphoning Data Through a Huge Security Hole in the Internet | Threat Level | Wired.com
UT Documents
Subsentio :: Home
Cryppies, Day Ladies, and Whiffling: The Just-Declassified Lingo of the NSA - Alexis C. Madrigal - The Atlantic
Saturday, December 7, 2013
SolarCity to Use Batteries From Tesla for Energy Storage - NYTimes.com
Compare to stop cap story on anti- solar Alec.
From My iPhone
Estonian Phrases and Common Sentences
http://linguanaut.com/english_estonian.htm
This page contains a table including the following: Estonian phrases, expressions and words in Estonian, conversation and idioms, Estonian greetings, and survival phrases. It also helps if you simply want to know what to say when chatting in Estonian!
Read more: http://linguanaut.com/english_estonian.htm#ixzz2mkKRLyVa
Thursday, December 5, 2013
Do Antivirus Companies Whitelist NSA Malware? - InformationWeek
I predict that in 2014 every major newspaper and magazine will perpetuate, to the detriment of data security and human understanding, the grossly erroneous notion that "for an antivirus firm to spot malware, it first needs to have seen the malware, recognized that it's malicious code, and written a corresponding virus signature for its products."
The fact that this is simply not true, and has not been true for many years, will not deter people from repeating it, over and over.
A bit like Autotrend saying that cars cannot be started without first engaging the crank handle.
Wall Street, investment bankers, and social good : The New Yorker
Wednesday, December 4, 2013
Tuesday, December 3, 2013
SkyJack - autonomous drone hacking
"Using a Parrot AR.Drone 2, a Raspberry Pi, a USB battery, an Alfa AWUS036H wireless transmitter, aircrack-ng, node-ar-drone, node.js, and my SkyJack software, I developed a drone that flies around, seeks the wireless signal of any other drone in the area..."
U.S. Loses Over $71 Billion in Religious Tax Exemptions | Center for Inquiry
http://www.centerforinquiry.net/newsroom/u.s._loses_over_71_billion_in_religious_tax_exemptions/
From My iPhone
Monday, December 2, 2013
Florida mom's photos used in more than 200 bogus Match.com profiles: $1.5 billion lawsuit - NY Daily News
Will of the WISP: Your company's Written Information Security Program
Here are some links to free information and samples that can help you tackle the WISP creation and implementation:
- Massachusetts Written Information Security Plan developed by Buchanan & Associates of Boston (.pdf)
- Common misconceptions about the Mass privacy law
- A Small Business Guide: Formulating A Comprehensive Written Information Security Program (.pdf)
- A Sample Information Security Policy from Advanced System Integrators (.pdf)
Edu: http://my.gwu.edu/files/policies/InformationSecurityPolicyFINAL.pdf
Most SMBs have no Information Security Policies
http://www.mass.gov/ocabr/docs/idtheft/sec-plan-smallbiz-guide.pdf
Information Security Policy and Procedures Manual
Information Security -�Office of Information Technology
Princeton University possesses information that is sensitive and valuable, e.g., personally identifiable information, financial data, building plans, research, and other information considered sensitive.
State Cyber and Information Security Policies
E.g. Alabama Department of Finance, Information Services Division
Information Security Policy