"I don't think the report is true, but these crises work for those who want to make fights between people." Kulam Dastagir, 28, a bird seller in Afghanistan
A Minor Clerical Error in DC. vs. Heller
11:35 pm EDT, Oct 21, 2014
I've finished preparing my presentation slides for PhreakNIC regarding the history and current interpretation of the Second Amendment. I think I've provided a faithful review of the history of the Amendment that explains the reasons for the controversy that surrounds it. In doing so, I found a minor error in the Opinion of the Supreme Court in D.C. vs. Heller - the recent landmark case recognizing an individual right to keep arms for self defense in the home. The Opinion makes reference on page 41 to two rulings of the Tennessee Supreme Court, Aymette v. State, decided in 1840, and Andrews v. State which the Opinion dates "21 years later." In fact, Andrews v. State was decided in 1871 - 31 years later.
I don't think that this error has any significance other than proof that I've been staring at this material too long. In 1861, Tennessee was in the process of withdrawing from the Union, which would have been very disruptive to the adjudication of Constitutional issues! In any event, I'm looking forward to speaking about this subject at PhreakNIC, and I hope that I can shed some light on it for everyone there.
In a move that is bound to piss off everybody in the entire community, Decius is going to present his thoughts on the history and interpretation of the Second Amendment to the United States Constitution.
Torture undermines all sound principles of good interrogation, intelligence collection, and assessment. It does not work, it is unnecessary, it is illegal, it betrays our ideals and our nation’s laws. There is no practical, legal, moral, or utilitarian argument in favor of torture. We don’t need it, and it betrays who we seek to be. No fine-tuning of the law is necessary to justify it — ever.
But there's not much particularly Chinese in the Hong Kong design, unless Boss Tweed was an ancient Chinese prophet. Tweed famously quipped, "I don't care who does the electing, so long as I get to do the nominating." Beijing's proposal is just Tweedism updated: a multi-stage election, with a biased filter at the first stage.
The pattern has been common in America's democracy too.
Reddit Plans Its Own Cryptocurrency To Give Back To Its Users After $50 Million Raise | TechCrunch
10:11 am EDT, Oct 1, 2014
We are thinking about creating a cryptocurrency and making it exchangeable (backed) by those shares of reddit, and then distributing the currency to the community. The investors have explicitly agreed to this in their investment terms.
▶ Black Hat USA 2014 - Enterprise: The Library of Sparta - YouTube
8:34 am EDT, Oct 1, 2014
On today's increasingly militarized Internet, companies, non-profits, activists, and individual hackers are forced to melee with nation-state class adversaries. Just as one should never bring a knife to a gun fight, a network defender should not rely on tired maxims such as "perimeter defense" and "defense in depth." Today's adversaries are well past that. This talk teaches you how to tap what we call the Library of Sparta - the collective written expertise codified into military doctrine. Hidden in plain sight, vast free libraries contain the time-tested wisdom of combat at the tactical, operational, and strategic levels. This is the playbook nation-state adversaries are using to target and attack you. This talk will help you better understand how adversaries will target your organization, and it will help you to employ military processes and strategies in your defensive operations. These techniques scale from the individual and small team level all the way up to online armies. This talk isn't a dry index into the library of doctrine, we provide entirely new approaches and examples about how to translate and employ doctrinal concepts in your current operations.
Many people in the computer security community use words like "OPSEC," "Kill Chain," and "intelligence-driven" without fully understanding the underlying concepts. Even worse, many show their ignorance by using military jargon incorrectly, thereby alienating clients, customers, and colleagues. These concepts are powerful and should not be ignored, but they must be well understood before they can be leveraged in your network.
This talk will include topics such as deception, electronic warfare, operations security, intelligence preparation of the battlefield, human intelligence collection, targeting, psychological operations, information operations, maneuver, and military cryptanalysis, among numerous others. Conventional wisdom at Black Hat is that that attacker will always win. Attackers have a clear intelligence advantage over defenders when it comes to vulnerabilities, malware, and open source information. A key point of the talk will be helping defenders generate the intelligence, information, and disinformation advantage necessary to turn the tables. You will leave this talk with an entirely new arsenal of military-grade strategies that will help you advance your work beyond the individual and small-team level and will prepare you to take on the most advanced adversaries.
Reuters graphic looks at how public opinion has changed since the handover. Polls conducted by the University of Hong Kong show ebbing confidence in China’s “one country, two systems” philosophy and Hong Kong’s future in general, and more than 50 percent of respondents are either “quite distrustful” or “very distrustful” of the Beijing central government.