Create an Account
username: password:
 
  MemeStreams Logo

Spontaneous Sociability and The Enthymeme

search

Rattle
Picture of Rattle
Rattle's Pics
My Blog
My Profile
My Audience
My Sources
Send Me a Message

sponsored links

Rattle's topics
Arts
  Literature
   Sci-Fi/Fantasy Literature
  Movies
  Music
Business
  Tech Industry
  Telecom Industry
Games
Health and Wellness
Holidays
Miscellaneous
  Humor
  MemeStreams
   Using MemeStreams
Current Events
  War on Terrorism
  Elections
Recreation
  Travel
Local Information
  SF Bay Area
   SF Bay Area News
Science
  Biology
  History
  Nano Tech
  Physics
  Space
Society
  Economics
  Futurism
  International Relations
  Politics and Law
   Civil Liberties
    Internet Civil Liberties
    Surveillance
   Intellectual Property
  Media
   Blogging
  Military
  Security
Sports
Technology
  Biotechnology
  Computers
   Computer Security
    Cryptography
   Cyber-Culture
   PC Hardware
   Computer Networking
   Macintosh
   Linux
   Software Development
    Open Source Development
    Perl Programming
    PHP Programming
   Spam
   Web Design
  Military Technology
  High Tech Developments

support us

Get MemeStreams Stuff!


 
"The future masters of technology will have to be lighthearted and intelligent. The machine easily masters the grim and the dumb." -- Marshall McLuhan, 1969

HP Pretexting Scandal - Updates
Topic: Current Events 12:09 am EDT, Sep 11, 2006

With a Little Stealth, Just About Anyone Can Get Phone Records

It is not clear how widespread pretexting is, but its perpetrators appear to be mostly private investigators, seeking information for clients involved in divorces or other civil disputes. Hewlett-Packard used investigators to try to ferret out which company directors had leaked information to reporters.

Walt Sharp, a spokesman for AT&T, said AT&T determined that over the last year, records of some 2,500 customers could have been compromised.

HP memo: We will take the necessary action

On Friday, Mark Hurd, president and CEO of Hewlett-Packard and a member of its board of directors, sent the following memo to the company's employees. The memo stresses that leaking information to the media is a problem that must and will be resolved.

Oh, the irony.

HP probe snared a third News.com reporter

An HP spokesman said reporter Stephen Shankland's records were targeted by a subcontractor working for a private investigator hired by the company. Shankland was a contributing reporter on a Jan. 23 article about a long-term board planning session that apparently angered HP Chairman Patricia Dunn, who launched the investigation.

The co-authors of that Jan. 23 News.com article, Dawn Kawamoto and Tom Krazit, were told Thursday by the California attorney general's office that their phone records were also accessed using a controversial method called "pretexting," where someone poses as a telephone subscriber to gain access to that subscriber's records.

The personal phone records of six other reporters, including Pui-Wing Tam and George Anders of The Wall Street Journal and John Markoff of The New York Times, were also targeted by HP's investigators. Friday afternoon, BusinessWeek reported on its Web site that the phone records of three of its reporters, Peter Burrows, Ben Elgin and Roger Crockett, were also targeted.

Also on Friday, Dunn apologized to Kawamoto and Krazit, and said she first learned two days earlier that reporters' records were pretexted. Nonetheless, Dunn still defended the need for HP's investigation.

H.P. Chairwoman Aims Not to Be the Scapegoat

At a board meeting on Sunday, the underlying theme is whether Patricia Dunn should remain as chairwoman. Dunn is the daughter of a vaudeville actor and a Las Vegas showgirl.

"This is not a job I asked for or a job that I particularly wanted," she said.

That sounds a lot like a taunt. She seems to be telling the board, I beg you to fire me!

Ms. Dunn said Friday that she felt that a personal dispute was at the center of the storm. "Tom is a powerful man with friends in powerful places," she said. "This brouhaha is the result of his anger toward me. He is winning the p.r. war."

"He was the most hawkish member of the board for finding the leaker," she added. "He wanted us to bring in lie detectors."

And fire him, too, while you're at it! I can't stand him!

HP Pretexting Scandal - Updates


Al Qaeda Finds Its Center of Gravity
Topic: War on Terrorism 12:08 am EDT, Sep 11, 2006

Over the last year, as Iran, Iraq and Lebanon have dominated headlines, hopes of gaining firmer control of a largely forgotten corner of the war on terrorism — the lawless Pakistan-Afghanistan border region — have quietly evaporated.

On Tuesday, the Pakistani government signed a "truce" with militants which lets militants remain in the area as long as they promised to halt attacks.

Is this the "separate peace" that Rumsfeld was talking about? He must be furious about this, right?

The Taliban leadership is believed to have established a base of operations in and around the Pakistani city of Quetta. The Pakistani government sees the group as a tool to counter growing Indian influence in Afghanistan. In Afghanistan, roadside bomb attacks have doubled this year, and suicide bombings have tripled.

This year, the United States cut its aid to Afghanistan by 30 percent.

Al Qaeda and the Taliban are no doubt betting that time is on their side.

Al Qaeda Finds Its Center of Gravity


Bin Laden Trail 'Stone Cold'
Topic: War on Terrorism 11:51 pm EDT, Sep 10, 2006

Dana Priest sums up the situation.

In the last three months, following a request from President Bush to "flood the zone," the CIA has sharply increased the number of intelligence officers and assets devoted to the pursuit of bin Laden.

The problem, former and current counterterrorism officials say, is that no one is certain where the "zone" is.

The Afghan-Pakistan border is about 1,500 miles.

At least 23 senior anti-Taliban tribesmen have been assassinated in South and North Waziristan since May 2005.

Pakistan has now all but stopped looking for bin Laden.

"Once again, we have lost track of Ayman al-Zawahiri," the Pakistani intelligence official said in a recent interview. "He keeps popping on television screens. It's miserable, but we don't know where he or his boss are hiding."

"There's nobody in the United States government whose job it is to find Osama bin Laden!" one frustrated counterterrorism official shouted. "Nobody!"

"We work by consensus," explained Brig. Gen. Robert L. Caslen Jr. "It's not that effective, or we'd find the guy."

This is an interesting vignette:

In early November 2002, a CIA drone armed with a Hellfire missile killed a top al-Qaeda leader traveling through the Yemeni desert. About a week later, Rumsfeld expressed anger that it was the CIA, not the Defense Department, that had carried out the successful strike.

"How did they get the intel?" he demanded.

Gen. Michael V. Hayden, then director of the National Security Agency and technically part of the Defense Department, said he had given it to them.

"Why aren't you giving it to us?" Rumsfeld wanted to know.

Hayden, according to this source, told Rumsfeld that the information-sharing mechanism with the CIA was working well. Rumsfeld said it would have to stop.

Bin Laden Trail 'Stone Cold'


OpenSSL | RSA Signature Forgery (CVE-2006-4339)
Topic: Computer Security 1:12 am EDT, Sep  8, 2006

Daniel Bleichenbacher recently described an attack on PKCS #1 v1.5
signatures. If an RSA key with exponent 3 is used it may be possible
to forge a PKCS #1 v1.5 signature signed by that key. Implementations
may incorrectly verify the certificate if they are not checking for
excess data in the RSA exponentiation result of the signature.

Since there are CAs using exponent 3 in wide use, and PKCS #1 v1.5 is
used in X.509 certificates, all software that uses OpenSSL to verify
X.509 certificates is potentially vulnerable, as well as any other use
of PKCS #1 v1.5. This includes software that uses OpenSSL for SSL or
TLS.

OpenSSL | RSA Signature Forgery (CVE-2006-4339)


Phone-Records Scandal at HP - Newsweek Business
Topic: Surveillance 5:27 pm EDT, Sep  6, 2006

The confrontation at Hewlett-Packard started innocently enough. Last January, the online technology site CNET published an article about the long-term strategy at HP, the company ranked No. 11 in the Fortune 500. While the piece was upbeat, it quoted an anonymous HP source and contained information that only could have come from a director. HP’s chairwoman, Patricia Dunn, told another director she wanted to know who it was; she was fed up with ongoing leaks to the media going back to CEO Carly Fiorina’s tumultuous tenure that ended in early 2005. According to an internal HP e-mail, Dunn then took the extraordinary step of authorizing a team of independent electronic-security experts to spy on the January 2006 communications of the other 10 directors—not the records of calls (or e-mails) from HP itself, but the records of phone calls made from personal accounts. That meant calls from the directors’ home and their private cell phones.

Any time a director resigns from a U.S. public corporation, federal law requires the company to disclose it to the SEC in what’s called an 8-K filing. If the director resigned for reasons related to a “disagreement” with the company about “operations, policies or practices,” that, too, is now required. HP reported Perkins’s resignation to the SEC four days after it happened—back in May—but gave no reason for the resignation, instead including only a press release thanking Perkins for his years of service. Perkins has twice challenged that omission in e-mails to the HP board and, he says, he received no response from HP.

This security team pretexted all the directors' home and cellular phone records. Perkins, who was not the leak, rightly freaked out about this methodology and resigned from the HP BoD. It is possible that HP could wind up in trouble with the SEC, FTC, and the local Attorney General.

Update: Catonic points out that Groklaw has chimed in.

Phone-Records Scandal at HP - Newsweek Business


The Volokh Conspiracy - Can Encryption create an expectation of privacy
Topic: Politics and Law 4:59 am EDT, Sep  6, 2006

Does encrypting Internet communications create a reasonable expectation of privacy in their contents, triggering Fourth Amendment protection? At first blush, it seems that the answer must be yes: A reasonable person would surely expect that encrypted communications will remain private. In this paper, Professor Kerr explains why this intuitive answer is entirely wrong: Encrypting communications cannot create a reasonable expectation of privacy. The reason is that the Fourth Amendment regulates access, not understanding: no matter how unlikely it is that the government will successfully decrypt ciphertext, the Fourth Amendment offers no protection if it succeeds. As a result, the government does not need a search warrant to decrypt encrypted communications.

The Volokh Conspiracy - Can Encryption create an expectation of privacy


Stratfor: Al'Q wins in London even though the attack was foiled.
Topic: War on Terrorism 1:45 am EDT, Aug 30, 2006

Stratfor: Terrorism Intelligence Report - August 29, 2006
Airline Incidents: Fear as Force Multiplier
By Fred Burton

During the past month, since British authorities announced the
disruption of a bomb plot involving airliners, there has been a
worldwide increase in security awareness, airline security measures
-- and fear among air passengers. At least 17 public incidents
involving airline security have been reported in the United States
and parts of Europe since Aug. 10. Most of these were innocuous,
but many resulted in airliners making emergency landings off their
scheduled routes, sometimes escorted by fighter aircraft.

The spate of incidents -- each of which rings up significant
financial costs to the airline company and governments involved and
causes inconvenience and delays for travelers -- is a reminder that
terrorism, philosophically, is not confined to the goal of filling
body bags or destroying buildings. At a deeper level, it is about
psychology and the "propaganda of the deed." And as far as al Qaeda
is concerned, it is also about economic warfare: Osama bin Laden
personally has stated that one of the group's strategic objectives
is to "bleed America to the point of bankruptcy."

To say that the governments and industries targeted by terrorism
face difficult choices is a gross understatement. The problem lies
in the fact that decision-makers not only must protect the public
against specific groups using known tactics (in al Qaeda's case,
bombs and liquid explosives) but also must protect themselves in
the face of public opinion and potential political blowback.
Officials naturally want to be perceived as doing everything
possible to prevent future acts of violence; therefore, every
threat -- no matter how seemingly ridiculous -- is treated
seriously. Overreaction becomes mandatory. Politicians and
executives cannot afford to be perceived as doing nothing.

This powerful mandate on the defensive side is met, asymmetrically,
on the offensive side by a force whose only requirements are to
survive, issue threats and, occasionally, strike -- chiefly as a
means of perpetuating its credibility.

The Impact to Air Travel

Following the thwarted U.K. airlines plot, security measures in
Britain, the United States and elsewhere were tightened. These new
regulations have included a ban on liquids and electronic items in
the passenger compartment, more stringent baggage checks and
tighter scrutiny of prospective passengers.

These new security measures already have had a financial impact on
the airline industry. On Aug. 25, Irish discount airline Ryanair
filed the lawsuit it had previously threatened against the
British Department for Transport. The lawsuit represents an effort
to change the new re... [ Read More (1.2k in body) ]

Stratfor: Al'Q wins in London even though the attack was foiled.


New Jersey is richest state, but has some of the poorest cities (phillyBurbs.com) | New Jersey News
Topic: Local Information 10:19 pm EDT, Aug 29, 2006

New Jersey again has the highest household income of any state and one of the lowest poverty rates, according to new data from the U.S. Census Bureau, but two of its biggest cities are among the poorest in the nation.

Camden ranks as the poorest place in the country with a population over 65,000 and Newark is among the poorest cities with more than 250,000 people, according to the figures released Tuesday based on data for 2005.

The numbers illustrate that New Jersey, with its middle-class and wealthy suburbs nestled up against struggling, old industrial cities, continues to be a place of stark economic contrasts.

New Jersey is richest state, but has some of the poorest cities (phillyBurbs.com) | New Jersey News


The democratization of cruise missile technology, part II
Topic: Military Technology 3:36 pm EDT, Aug 29, 2006

The barriers to entry have dropped sufficiently so that, as long as anyone has the will to fight, they'll be able to continue fighting. I think that's the strategic picture that's most pertinent to our time."

What if the Iranians could launch swarms of hundreds of missiles simultaneously? All bets might be off. In such a scenario, the Iranians could conceivably devastate an American naval force. Do the Iranians possess enough missiles to do that? The truth is that we don't know. In the longer term, the trend seems clear.

This is the second half of an article recently discussed here.

The democratization of cruise missile technology, part II


Google Trends
Topic: Media 7:54 pm EDT, Aug 26, 2006

Google has launched a site that allows you to do searches on keywords for graphs of their usage, as well as the top cities, regions, and languages involved. This is the right way to expose this kind of data. This type of statistical data is useful, but does not infringe on anyone privacy. This will be useful for trend spotting and interest gauging.

Strangely, there seem to be some things missing. For instance, take these two Google queries: "aol search database" and "quicksilver mac". For both, MemeStreams has similar result ranking on Google, either second or third term. I can pull up trend data for "quicksilver mac", but not "aol search database", even though queries for the AOL database are about 5 times more prevalent.

This could just be because the AOL related searches are more current.. (U: It only includes data up to the turnover of the month, a month ago.) However, that's the situation where this might be most useful. I would very much like to be able to gauge interest level associated with issues over the first week or two of their inception. That would be _very_ useful, especially considering that links are provided to news stories that include the term.

Google needs to turn the knob up to 11 on this one. Anything that sends a few dozen referrals to sites from unique users should get included in this.

Update: These are not particular amazing keyword collections, but they display some ways this is interesting: Events, Places, Organizations, People.

Google Trends


(Last) Newer << 80 ++ 90 - 91 - 92 - 93 - 94 - 95 - 96 - 97 - 98 ++ 108 >> Older (First)
 
 
Powered By Industrial Memetics
RSS2.0