| |
"I don't think the report is true, but these crises work for those who want to make fights between people." Kulam Dastagir, 28, a bird seller in Afghanistan
|
|
FBI angers politician whose image was used to show older Bin Laden - CNN.com |
|
|
Topic: Miscellaneous |
1:26 pm EST, Jan 17, 2010 |
The FBI used a photograph of a Spanish lawmaker as part of a digitally enhanced Osama bin Laden wanted poster, and the U.S. Embassy here has apologized to the angry politician, a spokesman said.
FAIL! FBI angers politician whose image was used to show older Bin Laden - CNN.com |
|
Surveillance, Security, and the Google Breach | Cato @ Liberty |
|
|
Topic: Miscellaneous |
6:24 pm EST, Jan 15, 2010 |
The irony here is that, while we’re accustomed to talking about the tension between privacy and security—to the point where it sometimes seems like people think greater invasion of privacy ipso facto yields greater security—one of the most serious and least discussed problems with built-in surveillance is the security risk it creates.
Surveillance, Security, and the Google Breach | Cato @ Liberty |
|
Another source claims Chinese spies targeted lawful intercept |
|
|
Topic: Miscellaneous |
7:25 pm EST, Jan 14, 2010 |
They apparently were able to access a system used to help Google comply with search warrants by providing data on Google users, said a source familiar with the situation, who spoke on condition of anonymity because he was not authorized to speak with the press. "Right before Christmas, it was, 'Holy s***, this malware is accessing the internal intercept [systems],'" he said.
Previous... Another source claims Chinese spies targeted lawful intercept |
|
Google China cyberattack part of vast espionage campaign, experts say - washingtonpost.com |
|
|
Topic: Computer Security |
1:09 pm EST, Jan 14, 2010 |
Rattle: I'm glad to see this is finally getting some attention. As bad as these articles makes the extent of the ongoing Chinese espionage sound, it's actually worse... Human rights groups as well as Washington-based think tanks that have helped shape the debate in Congress about China were also hit.
sigh... "Usually it's a group using one type of malicious code per target," said Eli Jellenc, head of international cyber-intelligence for VeriSign's iDefense Labs, a Silicon Valley company helping some firms investigate the attacks. "In this case, they're using multiple types against multiple targets -- but all in the same attack campaign. That's a marked leap in coordination."
The division of labor is what I think stands out the most. "This is a big espionage program aimed at getting high-tech information and politically sensitive information -- the high-tech information to jump-start China's economy and the political information to ensure the survival of the regime," said James A. Lewis, a cyber and national security expert at the Center for Strategic and International Studies. "This is what China's leadership is after. This reflects China's national priorities."
Google China cyberattack part of vast espionage campaign, experts say - washingtonpost.com |
|
American Red Cross: Haiti donations |
|
|
Topic: Miscellaneous |
8:13 am EST, Jan 14, 2010 |
You can help the victims of countless crises, like the recent earthquake in Haiti, around the world each year by making a financial gift to the American Red Cross International Response Fund, which will provide immediate relief and long-term support through supplies, technical assistance and other support to help those in need.
American Red Cross: Haiti donations |
|
Twitter / WikiLeaks: Several rumours from googl ... |
|
|
Topic: Miscellaneous |
8:10 am EST, Jan 14, 2010 |
Several rumours from google sources that China accessed google's US-gov intercept system which provides gmail subjects/dates
This was my suspicion when I read that the attackers had accessed "subject lines" from emails but not the content. It sounds like they got access to a system designed for use by law enforcement when they have "trap and trace" authority but not a warrant. Personally, I think email subject lines are not "routing information" and should require a warrant, but the matter hasn't been litigated to my knowledge and of course, law enforcement disagrees. This is somewhat relevant to my Blackhat DC talk on lawful intercept vulnerabilities, but of course even if this is true, a totally different technology was involved... Twitter / WikiLeaks: Several rumours from googl ... |
|
Apparently, there IS an ISO standard for everything... |
|
|
Topic: Miscellaneous |
9:28 pm EST, Jan 13, 2010 |
The method consists in extracting of soluble substances in dried tea leaf, containing in a porcelain or earthenware pot, by means of freshly boiling water, pouring of the liquor into a white porcelain or earthenware bowl, examination of the organoleptic properties of the infused leaf, and of the liquor with or without milk or both.
Apparently, there IS an ISO standard for everything... |
|
Have You Been Subjected to Suspicionless Laptop Search or Seizure at the Border? | Electronic Frontier Foundation |
|
|
Topic: Miscellaneous |
5:27 pm EST, Jan 13, 2010 |
The National Association of Criminal Defense Lawyers is seeking potential plaintiffs for a lawsuit challenging suspicionless laptop searches. As a first step in this effort, NACDL is seeking to identify defense lawyers who have had their laptops searched at the border and are willing to serve as individual plaintiffs.
Have You Been Subjected to Suspicionless Laptop Search or Seizure at the Border? | Electronic Frontier Foundation |
|