Create an Account
username: password:
  MemeStreams Logo

Information Warfare for The People!


sponsored links

popular topics

browse topics
Health and Wellness
Home and Garden
Current Events
Local Information


MemeStreams combines the power of weblogs and social networking. The members of our community work together to find interesting content on the web. As you use the site, it learns your interests, and provides new links it thinks you will like. Read more about MemeStreams or create an account!

oh, the possibilities

Michael Lewis:

Perhaps now more than ever, clever people are habituated to being paid to ignore the spirit of any rule -- which is one reason they have become such a problem on Wall Street. Upon seeing a new rule they do not think, "What social purpose does this serve, and how can I help it to do the job?" They think, "How can I game it?"

Darius Rejali:

Nothing predicts future behavior as much as past impunity.

Peter Pomerantsev:

If nothing is true, then anything is possible.

George Friedman:

The tough part of national self-determination is the need to make decisions and live with them.

Toyota Mirai - the car of the future

Toyota Mirai is the first mass-produced fuel cell car. Toyota Mirai has all the advantages of the electric car without its limits since its fuel cell only needs 5 kg of hydrogen to travel 500 kilometers.

Toyota Mirai - the car of the future

what we believe and what we perceive

Mark Twain:

When an entirely new and untried political project is sprung upon the people, they are startled, anxious, timid, and for a time they are mute, reserved, noncommittal. The great majority of them are not studying the new doctrine and making up their minds about it, they are waiting to see which is going to be the popular side.

Michael Lewis:

Perhaps now more than ever, clever people are habituated to being paid to ignore the spirit of any rule ... Upon seeing a new rule they do not think, "What social purpose does this serve, and how can I help it to do the job?" They think, "How can I game it?"

Mark Bittman:

Everything affects everything. It's all tied together, and the starting place hardly matters: A just and righteous system will have a positive impact on everything we care about, just as an unjust, exploitative system makes everything worse.

Nassim Nicholas Taleb and Gregory Treverton:

On its face, centralization seems to make governments more stable. But that stability is an illusion.

Anna Madeleine:

The cusp, or threshold, between light and darkness, and between what we believe and what we perceive -- that moment when we realise something isn't flat when we thought it was, or that it is static when we thought it was moving -- are the moments James Turrell manages to suspend us in, sometimes for surreally extended periods of time.

Richard Holbrooke:

Only with hindsight can one look back and see that the smartest course may not have been the right one.

Bruce Schneier:

Even if it was done right it would be the wrong thing to do.

Adam Gopnik:

Even doing the right thing rarely works out.

Ashby Jones:

Happiness exists just around the corner, it's just a matter of figuring out how to get there.

how they have been tested

Thomas Wadlow:

Whatever components or services you choose, consider how they have been tested for trustworthiness. Consider these principles attributed to Auguste Kerckhoffs, a Dutch linguist and cryptographer, in the 19th century:

* The system should be, if not theoretically unbreakable, then unbreakable in practice.

* The design of a system should not require secrecy, and compromise of the system design should not inconvenience the correspondents.

David Sanger:

What is remarkable in this case is that after three weeks of pressure, the attack forced one of Hollywood's largest studios, and Japan's most famous companies, to surrender.

Brooks Barnes:

Once the hackers threatened physical violence, the film's cancellation became almost inevitable, even though Sony spent a day steadfastly maintaining its plans for the release and premiere. The incident is likely to be remembered as a failure of Hollywood leadership.

Hackers claim to have taken at least 100 terabytes of Sony data.

Bruce Schneier:

Nobody noticed that 100 TB, yes T. of data was moving thru the pipes? Really?

Eriq Gardner:

The massive hack by the so-called Guardians of Peace and ongoing leaks could raise unprecedented legal issues for Sony for years to come. Now that eyes are open, it might be hard to shut them.

Alain de Botton:

The primary error ... lies in overlooking a central fact about people in general ... that everyone has something very substantially wrong with them once their characters are fully known ... We can't yet know what the problems will be, but we can and should be certain that they are there, lurking somewhere behind the facade, waiting for time to unfurl them.

Kevin Mandia:

Ninety five percent of networks are compromised in some way.

Jane Austen:

What are men to rocks and mountains?

Li Po:

We sit together, the mountain and me,
until only the mountain remains.

riddle me this

Craig Timberg:

Experts say it's increasingly clear that SS7, first designed in the 1980s, is riddled with serious vulnerabilities that undermine the privacy of the world's billions of cellular customers.

A single carrier in Congo or Kazakhstan, for example, could be used to hack into cellular networks in the United States, Europe or anywhere else.

Peter Singer:

The attackers wonderfully understand the American psyche. This was a hack, but call it 'cyber' and 'terrorism,' and we lose our shit. There's no other way to put it.

KABC7 Los Angeles:

An American Airlines flight from LAX to London was delayed Sunday after concerns over the name of a WiFi hotspot.

Nick Wingfield:

In April, a drone crashed trying to airlift a payload of cellphones, marijuana and tobacco over the walls of a maximum-security prison. Authorities are unsure whether drone operators made earlier undetected drops.

Marc Rogers:

Let's face it -- most of today's so-called "cutting edge" security defenses are either so specific, or so brittle, that they really don't offer much meaningful protection against a sophisticated attacker or group of attackers.


North Korea's attack on SPE reaffirms that cyber threats pose one of the gravest national security dangers to the United States.

Sony reported this incident within hours, which is what the FBI hopes all companies will do when facing a cyber attack. The FBI stands ready to assist any US company that is the victim of a destructive cyber attack or breach of confidential business information.

Shawn Henry, FBI executive assistant director [in 2012]:

I don't see how we ever come out of this without changes in technology or changes in behavior, because with the status quo, it's an unsustainable model. Unsustainable in that you never get ahead, never become secure, never have a reasonable expectation of privacy or security.

Ted Cruz:

If you can frame the narrative, you win.

FYI I'm speaking at: ShmooCon 2015 - January 16-18

Deception for the Cyber Defender: To Err is Human; to Deceive, Divine
Tom Cross, David Raymond, and Gregory Conti

Since the first conflict between man, deception has played an integral role. Today on the network battlefield attackers enjoy many advantages and frequently employ deception as a powerful tool to accomplish their objectives. In this talk we discuss how to turn the tables on the attacker and employ deception strategies that deceive both human attackers and the code they employ to best defend your assets. This talk isn’t about social engineering or honeypots, but instead carefully analyzes dozens of deception techniques and how they can be woven together into a deception strategy that increases your defensive posture. We do so by mapping traditional and well-developed military battlefield deception techniques and principles onto the cyber domain. We’ll intersperse historical examples from military deception operations as well as provide new concepts for deception on the geographic, physical (OSI Layer 1), Logical (OSI Layer 2-7), persona, and supervisory planes that comprise the operational cyber environment. You’ll leave this talk inspired and armed to better defend your networks, systems, and people while forcing your attackers off balance.

Tom Cross is CTO at Drawbridge Networks. Previously he was the Director of StealthWatch Labs at Lancope and manager of X­Force Research at IBM/ISS. He has spoken at numerous security conferences, including Black Hat, DEFCON, CyCon, HOPE and RSA.

David Raymond is an Associate Professor at West Point where he teaches cybersecurity and coaches the CTF Team. He is an Army officer with a unique mix of experience in armored maneuver warfare and Army automation.

Greg Conti is Director of the Army Cyber Institute at West Point. He has spoken at Black Hat, DEFCON, ShmooCon, and RSA.

FYI I'm speaking at: ShmooCon 2015 - January 16-18

Powered By Industrial Memetics