Create an Account
username: password:
 
  MemeStreams Logo

It's always easy to manipulate people's feelings. - Laura Bush

search

Decius
Picture of Decius
Decius's Pics
My Blog
My Profile
My Audience
My Sources
Send Me a Message

sponsored links

Decius's topics
Arts
  Literature
   Sci-Fi/Fantasy Literature
  Movies
   Sci-Fi/Fantasy Films
  Music
   Electronic Music
Business
  Finance & Accounting
  Tech Industry
  Telecom Industry
  Management
  Markets & Investing
Games
Health and Wellness
Home and Garden
  Parenting
Miscellaneous
  Humor
  MemeStreams
Current Events
  War on Terrorism
Recreation
  Cars and Trucks
  Travel
Local Information
  United States
   SF Bay Area
    SF Bay Area News
Science
  Biology
  History
  Math
  Nano Tech
  Physics
Society
  Economics
  Politics and Law
   Civil Liberties
    Internet Civil Liberties
    Surveillance
   Intellectual Property
  Media
   Blogging
Sports
Technology
  Computer Security
  Macintosh
  Spam
  High Tech Developments

support us

Get MemeStreams Stuff!


 
"I don't think the report is true, but these crises work for those who want to make fights between people." Kulam Dastagir, 28, a bird seller in Afghanistan

FBI angers politician whose image was used to show older Bin Laden - CNN.com
Topic: Miscellaneous 1:26 pm EST, Jan 17, 2010

The FBI used a photograph of a Spanish lawmaker as part of a digitally enhanced Osama bin Laden wanted poster, and the U.S. Embassy here has apologized to the angry politician, a spokesman said.

FAIL!

FBI angers politician whose image was used to show older Bin Laden - CNN.com


Satellite Photos of Haiti Before and After the Earthquake | Wired Science | Wired.com
Topic: Miscellaneous 8:22 am EST, Jan 16, 2010

These new satellite images released Wednesday by Google and GeoEye show the devastation from above, giving a new view of the severity of this disaster.

Satellite Photos of Haiti Before and After the Earthquake | Wired Science | Wired.com


AFP: Iran police warn against SMS, email protest calls
Topic: Miscellaneous 8:21 am EST, Jan 16, 2010

Those who organise or issue appeals have committed a worse crime than those who come to the streets.

AFP: Iran police warn against SMS, email protest calls


Surveillance, Security, and the Google Breach | Cato @ Liberty
Topic: Miscellaneous 6:24 pm EST, Jan 15, 2010

The irony here is that, while we’re accustomed to talking about the tension between privacy and security—to the point where it sometimes seems like people think greater invasion of privacy ipso facto yields greater security—one of the most serious and least discussed problems with built-in surveillance is the security risk it creates.

Surveillance, Security, and the Google Breach | Cato @ Liberty


Another source claims Chinese spies targeted lawful intercept
Topic: Miscellaneous 7:25 pm EST, Jan 14, 2010

They apparently were able to access a system used to help Google comply with search warrants by providing data on Google users, said a source familiar with the situation, who spoke on condition of anonymity because he was not authorized to speak with the press. "Right before Christmas, it was, 'Holy s***, this malware is accessing the internal intercept [systems],'" he said.

Previous...

Another source claims Chinese spies targeted lawful intercept


Google China cyberattack part of vast espionage campaign, experts say - washingtonpost.com
Topic: Computer Security 1:09 pm EST, Jan 14, 2010

Rattle:

I'm glad to see this is finally getting some attention. As bad as these articles makes the extent of the ongoing Chinese espionage sound, it's actually worse...

Human rights groups as well as Washington-based think tanks that have helped shape the debate in Congress about China were also hit.

sigh...

"Usually it's a group using one type of malicious code per target," said Eli Jellenc, head of international cyber-intelligence for VeriSign's iDefense Labs, a Silicon Valley company helping some firms investigate the attacks. "In this case, they're using multiple types against multiple targets -- but all in the same attack campaign. That's a marked leap in coordination."

The division of labor is what I think stands out the most.

"This is a big espionage program aimed at getting high-tech information and politically sensitive information -- the high-tech information to jump-start China's economy and the political information to ensure the survival of the regime," said James A. Lewis, a cyber and national security expert at the Center for Strategic and International Studies. "This is what China's leadership is after. This reflects China's national priorities."

Google China cyberattack part of vast espionage campaign, experts say - washingtonpost.com


American Red Cross: Haiti donations
Topic: Miscellaneous 8:13 am EST, Jan 14, 2010

You can help the victims of countless crises, like the recent earthquake in Haiti, around the world each year by making a financial gift to the American Red Cross International Response Fund, which will provide immediate relief and long-term support through supplies, technical assistance and other support to help those in need.

American Red Cross: Haiti donations


Twitter / WikiLeaks: Several rumours from googl ...
Topic: Miscellaneous 8:10 am EST, Jan 14, 2010

Several rumours from google sources that China accessed google's US-gov intercept system which provides gmail subjects/dates

This was my suspicion when I read that the attackers had accessed "subject lines" from emails but not the content. It sounds like they got access to a system designed for use by law enforcement when they have "trap and trace" authority but not a warrant. Personally, I think email subject lines are not "routing information" and should require a warrant, but the matter hasn't been litigated to my knowledge and of course, law enforcement disagrees.

This is somewhat relevant to my Blackhat DC talk on lawful intercept vulnerabilities, but of course even if this is true, a totally different technology was involved...

Twitter / WikiLeaks: Several rumours from googl ...


Apparently, there IS an ISO standard for everything...
Topic: Miscellaneous 9:28 pm EST, Jan 13, 2010

The method consists in extracting of soluble substances in dried tea leaf, containing in a porcelain or earthenware pot, by means of freshly boiling water, pouring of the liquor into a white porcelain or earthenware bowl, examination of the organoleptic properties of the infused leaf, and of the liquor with or without milk or both.

Apparently, there IS an ISO standard for everything...


Have You Been Subjected to Suspicionless Laptop Search or Seizure at the Border? | Electronic Frontier Foundation
Topic: Miscellaneous 5:27 pm EST, Jan 13, 2010

The National Association of Criminal Defense Lawyers is seeking potential plaintiffs for a lawsuit challenging suspicionless laptop searches. As a first step in this effort, NACDL is seeking to identify defense lawyers who have had their laptops searched at the border and are willing to serve as individual plaintiffs.

Have You Been Subjected to Suspicionless Laptop Search or Seizure at the Border? | Electronic Frontier Foundation


(Last) Newer << 130 ++ 140 - 141 - 142 - 143 - 144 - 145 - 146 - 147 - 148 ++ 158 >> Older (First)
 
 
Powered By Industrial Memetics
RSS2.0