"The future masters of technology will have to be lighthearted and intelligent. The machine easily masters the grim and the dumb." -- Marshall McLuhan, 1969
Comcast Hijackers Say They Warned the Company First | Threat Level from Wired.com
Topic: Computer Security
1:24 pm EDT, Jun 2, 2008
The computer attackers who took down Comcast's homepage and webmail service for over five hours Thursday say they didn't know what they were getting themselves into.
In an hour-long telephone conference call with Threat Level, the hackers known as "Defiant" and "EBK" expressed astonishment over the attention their DNS hijacking has garnered. In the call, the pair bounded freely between jubilant excitement over the impact of their attack, and fatalism that they would soon be arrested for it.
Neither hacker would identify their full names or locations. Defiant's MySpace profile lists him in Cashville, Tennessee, but he says that's incorrect. His girlfriend lists herself in New York. Threat Level expects both hackers' names and locations will emerge shortly.
This is entertaining... One of those cases where you really gotta sympathize with the perps. It was a prank - fairly innocent. Egg on Comcast's face for getting outsmarted by a couple of teenage pot heads. Hope they don't throw the book at them. This isn't the mafia here.
We're in the final week before Summercon 2008! Come out Friday night @ 7PM and meet at the Wyndham Hotel bar, a.k.a. "The Mojito Lounge". Don't be shy, just look for someone wearing a Summercon t-shirt and introduce yourself. They won't bite or fight... probably. We'll plan on hanging out at the hotel for a bit and then herd everyone to another fine drinking establishment. Friday night is an ice-breaker, so come out and get to know your friendly neighborhood hacker. Don't sleep in much past noon on Saturday, presentations start at 12:30PM.
Last week, federal, state, and local police in Tennessee, Mississippi, and Arkansas conducted a massive sweep dubbed "Operation Sudden Impact."
The operation included raids of businesses, homes, and boats; traffic roadblocks; and personal searches. They say they were looking for "terrorists." If they found any, they haven't announced it yet. They did arrest 332 people, 142 of whom they describe as "fugitives." They also issued about 1,300 traffic tickets, and according to one media account, seized "hundreds" of dollars.
...
The FBI along with hundreds of officers said they are looking for anything out of the ordinary. Agents take computers and paperwork from businesses.
"What we have found traditionally is that terrorists are involved in a number of lesser known type crimes," said Mark Luttrell, Shelby County sheriff.
There you have it. All law enforcement is anti-terrorism. The police cannot legally establish "anti-terrorism" roadblocks that essentially serve as forums for random search and seizure.
The Volokh Conspiracy - Ninth Circuit Allows Suspicionless Computer Searches at the Border:
Topic: Civil Liberties
3:47 pm EDT, Apr 22, 2008
The Ninth Circuit has (finally) handed down United States v. Arnold; the court ruled that there is no Fourth Amendment requirement of "reasonable suspicion" to search a laptop computer at the border.
Feds Tout New Domestic Intelligence Centers | Threat Level from Wired.com
Topic: Surveillance
11:19 am EDT, Apr 3, 2008
Federal, state and local cops are huddling together in domestic intelligence dens around the nation to fuse anti-terror information and tips in ways they never have before, and they want the American people to know about it -- sort of.
The dominant catchphrase from the officials was that the centers need to focus on "all threats, all hazards." Officials say the centers must look at even the most mundane crimes, since they can be used to fund terrorism.
Total surveillance, justified by the threat of terrorism, but applied in absolutely every context. More here.
The fusion centers have subscriptions to private information-broker services that keep records about Americans' locations, financial holdings, associates, relatives, firearms licenses and the like.
Pennsylvania buys credit reports and uses face-recognition software to examine driver's license photos, while analysts in Rhode Island have access to car-rental databases. In Maryland, authorities rely on a little-known data broker called Entersect, which claims it maintains 12 billion records about 98 percent of Americans.
"There is never ever enough information when it comes to terrorism" said Maj. Steven G. O'Donnell, deputy superintendent of the Rhode Island State Police. "That's what post-9/11 is about."
Recent reports in this paper and others allege the existence of broad intelligence programs run by the National Security Agency to process wide-ranging personal data on Americans' activities. One of us (Eshoo) sees this as the latest in a string of troubling accusations about the erosion of privacy and civil liberties since 9/11. The other (McConnell) sees it as more hyperbole and inaccurate press reports designed to mislead the public into thinking that the intelligence community is acting against American law and values. Honest people can differ on these tough issues. We think it is healthy. This is America, after all.
Despite our diverging opinions, it would be useful to set forth those areas where we agree...
A cyber attack could be more devastating economically than Sept. 11. Preventing a cyber attack will require tremendous cooperation between the government and the private sector, and above all, a common understanding that our liberty and our security go hand in hand.
Comments like "our liberty and our security go hand in hand" are usually made by people when they are doing away with liberty.
Finally, no cyber-security plan will succeed without congressional support. Checks and balances are essential in a democracy, particularly when the matter concerns secret government programs that rightly remain out of the public view. Active congressional oversight gives the public confidence that their rights and their security are being properly attended to, and such oversight allows Congress to say so confidently and publicly.
This, I assume, is as opposed to judicial review... I give you Arlen Specter.
Hackers Publish German Minister's Fingerprint | Threat Level from Wired.com
Topic: Technology
2:36 pm EDT, Apr 1, 2008
To demonstrate why using fingerprints to secure passports is a bad idea, the German hacker group Chaos Computer Club has published what it says is the fingerprint of Wolfgang Schauble, Germany's interior minister.
According to CCC, the print of Schauble's index finger was lifted from a water glass that he used during a panel discussion that he participated in last year at a German university. CCC published the print on a piece of plastic inside 4,000 copies of its magazine Die Datenschleuder that readers can use to impersonate the minister to biometric readers.
BBC NEWS | Magazine | World's best-known protest symbol turns 50
Topic: Society
1:34 pm EDT, Mar 20, 2008
It started life as the emblem of the British anti-nuclear movement but it has become an international sign for peace, and arguably the most widely used protest symbol in the world. It has also been adapted, attacked and commercialised.
Gerald Holtom, a designer and former World War II conscientious objector from West London, persuaded DAC that their aims would have greater impact if they were conveyed in a visual image. The "Ban the Bomb" symbol was born.