Create an Account
username: password:
  MemeStreams Logo

It's always easy to manipulate people's feelings. - Laura Bush


Picture of Decius
Decius's Pics
My Blog
My Profile
My Audience
My Sources
Send Me a Message

sponsored links

Decius's topics
   Sci-Fi/Fantasy Literature
   Sci-Fi/Fantasy Films
   Electronic Music
  Finance & Accounting
  Tech Industry
  Telecom Industry
  Markets & Investing
Health and Wellness
Home and Garden
Current Events
  War on Terrorism
  Cars and Trucks
Local Information
  United States
   SF Bay Area
    SF Bay Area News
  Nano Tech
  Politics and Law
   Civil Liberties
    Internet Civil Liberties
   Intellectual Property
  Computer Security
  High Tech Developments

support us

Get MemeStreams Stuff!

"I don't think the report is true, but these crises work for those who want to make fights between people." Kulam Dastagir, 28, a bird seller in Afghanistan

Wiretapping before the Wires: The Post Office and the Birth of Communications Privacy by Anuj C. Desai :: SSRN
Topic: Miscellaneous 2:28 pm EDT, Oct 23, 2014

I explain the history of postal surveillance and show that the principle of communications privacy derives not from the Fourth Amendment or even from the Constitution at all. Rather, it comes from early postal policymakers who put that principle into postal ordinances and statutes in the late eighteenth century. Over time, the principle of communications privacy became embedded into the postal network by both law and custom. It was only then that the Court incorporated it into the Fourth Amendment in the 1878 case Ex parte Jackson, which in turn served as one of the bases of Justice Brandeis's Olmstead dissent. So, if today we see the principle of communications privacy as fundamental to the Fourth Amendment, we have postal policymakers to thank, for it was through the post office, not the Constitution or the Bill of Rights, that early Americans first established that principle.

Wiretapping before the Wires: The Post Office and the Birth of Communications Privacy by Anuj C. Desai :: SSRN

The Right to Privacy in American History
Topic: Miscellaneous 2:27 pm EDT, Oct 23, 2014

An excellent review of privacy in American history.

The Right to Privacy in American History

A Minor Clerical Error in DC. vs. Heller
Topic: Miscellaneous 11:35 pm EDT, Oct 21, 2014

I've finished preparing my presentation slides for PhreakNIC regarding the history and current interpretation of the Second Amendment. I think I've provided a faithful review of the history of the Amendment that explains the reasons for the controversy that surrounds it. In doing so, I found a minor error in the Opinion of the Supreme Court in D.C. vs. Heller - the recent landmark case recognizing an individual right to keep arms for self defense in the home. The Opinion makes reference on page 41 to two rulings of the Tennessee Supreme Court, Aymette v. State, decided in 1840, and Andrews v. State which the Opinion dates "21 years later." In fact, Andrews v. State was decided in 1871 - 31 years later.

I don't think that this error has any significance other than proof that I've been staring at this material too long. In 1861, Tennessee was in the process of withdrawing from the Union, which would have been very disruptive to the adjudication of Constitutional issues! In any event, I'm looking forward to speaking about this subject at PhreakNIC, and I hope that I can shed some light on it for everyone there.

Jackie Chan is no friend to Hong Kong’s protesters - The Washington Post
Topic: Miscellaneous 12:42 pm EDT, Oct 13, 2014

Chan added: "I'm gradually beginning to feel that we Chinese need to be controlled. If we're not being controlled, we'll just do what we want."

Jackie Chan is no friend to Hong Kong’s protesters - The Washington Post

How the Second Amendment Works | PhreakNIC
Topic: Miscellaneous 9:59 am EDT, Oct 13, 2014

In a move that is bound to piss off everybody in the entire community, Decius is going to present his thoughts on the history and interpretation of the Second Amendment to the United States Constitution.

How the Second Amendment Works | PhreakNIC

Torture is wrong - Opinion - The Boston Globe
Topic: Miscellaneous 11:04 am EDT, Oct  6, 2014

Torture undermines all sound principles of good interrogation, intelligence collection, and assessment. It does not work, it is unnecessary, it is illegal, it betrays our ideals and our nation’s laws. There is no practical, legal, moral, or utilitarian argument in favor of torture. We don’t need it, and it betrays who we seek to be. No fine-tuning of the law is necessary to justify it — ever.

Torture is wrong - Opinion - The Boston Globe

▶ A Night in Tunisia - Charlie Parker and Dizzy Live at Carnegie Hall - YouTube
Topic: Miscellaneous 10:05 pm EDT, Oct  3, 2014

This makes me happy...

▶ A Night in Tunisia - Charlie Parker and Dizzy Live at Carnegie Hall - YouTube

We Should Be Protesting, Too | Lawrence Lessig
Topic: Miscellaneous 8:44 am EDT, Oct  2, 2014

But there's not much particularly Chinese in the Hong Kong design, unless Boss Tweed was an ancient Chinese prophet. Tweed famously quipped, "I don't care who does the electing, so long as I get to do the nominating." Beijing's proposal is just Tweedism updated: a multi-stage election, with a biased filter at the first stage.

The pattern has been common in America's democracy too.

We Should Be Protesting, Too | Lawrence Lessig

Reddit Plans Its Own Cryptocurrency To Give Back To Its Users After $50 Million Raise | TechCrunch
Topic: Miscellaneous 10:11 am EDT, Oct  1, 2014

We are thinking about creating a cryptocurrency and making it exchangeable (backed) by those shares of reddit, and then distributing the currency to the community. The investors have explicitly agreed to this in their investment terms.

Reddit Plans Its Own Cryptocurrency To Give Back To Its Users After $50 Million Raise | TechCrunch

▶ Black Hat USA 2014 - Enterprise: The Library of Sparta - YouTube
Topic: Miscellaneous 8:34 am EDT, Oct  1, 2014

On today's increasingly militarized Internet, companies, non-profits, activists, and individual hackers are forced to melee with nation-state class adversaries. Just as one should never bring a knife to a gun fight, a network defender should not rely on tired maxims such as "perimeter defense" and "defense in depth." Today's adversaries are well past that. This talk teaches you how to tap what we call the Library of Sparta - the collective written expertise codified into military doctrine. Hidden in plain sight, vast free libraries contain the time-tested wisdom of combat at the tactical, operational, and strategic levels. This is the playbook nation-state adversaries are using to target and attack you. This talk will help you better understand how adversaries will target your organization, and it will help you to employ military processes and strategies in your defensive operations. These techniques scale from the individual and small team level all the way up to online armies. This talk isn't a dry index into the library of doctrine, we provide entirely new approaches and examples about how to translate and employ doctrinal concepts in your current operations.

Many people in the computer security community use words like "OPSEC," "Kill Chain," and "intelligence-driven" without fully understanding the underlying concepts. Even worse, many show their ignorance by using military jargon incorrectly, thereby alienating clients, customers, and colleagues. These concepts are powerful and should not be ignored, but they must be well understood before they can be leveraged in your network.

This talk will include topics such as deception, electronic warfare, operations security, intelligence preparation of the battlefield, human intelligence collection, targeting, psychological operations, information operations, maneuver, and military cryptanalysis, among numerous others. Conventional wisdom at Black Hat is that that attacker will always win. Attackers have a clear intelligence advantage over defenders when it comes to vulnerabilities, malware, and open source information. A key point of the talk will be helping defenders generate the intelligence, information, and disinformation advantage necessary to turn the tables. You will leave this talk with an entirely new arsenal of military-grade strategies that will help you advance your work beyond the individual and small-team level and will prepare you to take on the most advanced adversaries.

▶ Black Hat USA 2014 - Enterprise: The Library of Sparta - YouTube

<< 1 - 2 - 3 - 4 - 5 ++ 15 >> Older (First)
Powered By Industrial Memetics