Create an Account
username: password:
 
  MemeStreams Logo

Spontaneous Sociability and The Enthymeme

search

Rattle
Picture of Rattle
Rattle's Pics
My Blog
My Profile
My Audience
My Sources
Send Me a Message

sponsored links

Rattle's topics
Arts
  Literature
   Sci-Fi/Fantasy Literature
  Movies
  Music
Business
  Tech Industry
  Telecom Industry
Games
Health and Wellness
Holidays
Miscellaneous
  Humor
  MemeStreams
   Using MemeStreams
Current Events
  War on Terrorism
  Elections
Recreation
  Travel
Local Information
  SF Bay Area
   SF Bay Area News
Science
  Biology
  History
  Nano Tech
  Physics
  Space
Society
  Economics
  Futurism
  International Relations
  Politics and Law
   Civil Liberties
    Internet Civil Liberties
    Surveillance
   Intellectual Property
  Media
   Blogging
  Military
  Security
Sports
Technology
  Biotechnology
  Computers
   Computer Security
    Cryptography
   Cyber-Culture
   PC Hardware
   Computer Networking
   Macintosh
   Linux
   Software Development
    Open Source Development
    Perl Programming
    PHP Programming
   Spam
   Web Design
  Military Technology
  High Tech Developments

support us

Get MemeStreams Stuff!


 
"The future masters of technology will have to be lighthearted and intelligent. The machine easily masters the grim and the dumb." -- Marshall McLuhan, 1969

General Memetics, on Tom Ricks's Inbox
Topic: Military Technology 3:57 pm EDT, Jul 28, 2007

Here, in a study published in June 2006 by the military's Joint Special Operations University, two "information warfare" specialists mull over how the US armed forces and intelligence agencies might influence opinion overseas through foreign bloggers:

... [I]t may be easy for foreign audiences to dismiss the US perspective with "Yes, but you aren't one of us, you don't really understand us."

In this regard, information strategists can consider clandestinely recruiting or hiring prominent bloggers or other persons of prominence already within the target nation, group or community to pass the US message. ... Sometimes numbers can be effective; hiring a block of bloggers to verbally attack a specific person or promote a specific message may be worth considering. On the other hand, such operations can have a blowback effect, as witnessed by the public reaction following revelations that the US military had paid journalists to publish stories in the Iraqi press under their own names. People do not like to be deceived, and the price of being exposed is lost credibility and trust.

An alternative strategy is to "make" a blog and blogger. The process of boosting the blog to a position of influence could take some time, however. ...

There will also be times when it is thought to be necessary, in the context of an integrated information campaign, to pass false or erroneous information through the media ... in support of military deception activities. ... In these cases, extra care must be taken to ensure plausible deniability and nonattribution, as well as employing a well-thought-out deception operation that minimizes the risks of exposure.

General Memetics, on Tom Ricks's Inbox


SummerCon
Topic: Computer Security 4:00 am EDT, Jul 28, 2007

SummerCon 2007: August 24-26, 2007 Atlanta

Where: Wyndham Garden Hotel
125 10th Street NE
Atlanta, GA 30309
1 404-873-4800
(corner of Peachtree St & 10th)

I am happy about this...

SummerCon


'Furry Grim Reaper'
Topic: Miscellaneous 1:59 pm EDT, Jul 26, 2007

Oscar the cat seems to have an uncanny knack for predicting when nursing home patients are going to die, by curling up next to them during their final hours.
art.cat.ap.jpg

His accuracy, observed in 25 cases, has led the staff to call family members once he has chosen someone. It usually means the patient has less than four hours to live.

"He doesn't make too many mistakes. He seems to understand when patients are about to die," Dr. David Dosa said in an interview. He describes the phenomenon in a poignant essay in Thursday's issue of the New England Journal of Medicine.

"Many family members take some solace from it. They appreciate the companionship that the cat provides for their dying loved one," said Dosa, a geriatrician and assistant professor of medicine at Brown University.

After about six months, the staff noticed Oscar would make his own rounds, just like the doctors and nurses. He'd sniff and observe patients, then sit beside people who would wind up dying in a few hours.

Dosa said Oscar seems to take his work seriously and is generally aloof. "This is not a cat that's friendly to people," he said.

Yes, I have made an lolcat photo based on Oscar... Photo is from Reuters.

'Furry Grim Reaper'


DOMinatrix - The JavaScript SQL Injector
Topic: Computer Security 3:17 am EDT, Jul 26, 2007

Yeah, Billy has another toolkit for destroying the web.. Don't be too shocked or anything, there will most likely be another one next week.

This one is branted with more sexual innuendo then the last one though..

DOMinatrix is, well, incredibly awesome. It's a full automated SQL Injection tool written in JavaScript, which will dump out data from MS SQL Server databases (more to come). I'm be demoing DOMinatrix at my Black Hat presentation.

XSS + Web worm + DOMinatrix = oh crap.

In the last 5 months we've seen the development of web scanners and SQL injectors in JavaScript.

These aren't a browser exploits.
These aren't buffer overflows.
These aren't something that affects only a single browser and only on pages that don't explicitly set a character set.

This is using JavaScript in perfectly valid ways to do extremely malicious things.

There is no way to patch this.
End users are pretty much screwed.

Here is a screen shot of DOMinatrix in action.

DOMinatrix - The JavaScript SQL Injector


Al Qaeda and the Strategic Threat to the U.S. Homeland
Topic: War on Terrorism 8:41 pm EDT, Jul 25, 2007

Stratfor does not think we will be seeing a spectacular summer terrorist attack.

By Fred Burton and Scott Stewart

The July 17 release of portions of a National Intelligence Estimate (NIE) titled "The Terrorist Threat to the U.S. Homeland" has generated a great deal of comment from Stratfor readers, many of whom contend it is at odds with our assessment published shortly before the contents of the NIE were leaked. In that report, we attempted to clarify what we mean when we refer to "al Qaeda" and we differentiate between the small al Qaeda core organization (what we call "al Qaeda prime"), the somewhat wider array of al Qaeda franchise organizations (such as al Qaeda in Iraq) and the broad assortment of grassroots jihadists who have no actual connection to the core organization. Our assessment also echoed an assertion we have been making for quite some time now -- that al Qaeda lacks the ability to pose a strategic threat to the United States.

It must be understood that al Qaeda and other jihadists still pose a tactical threat to the U.S. homeland. In other words, they can still kill Americans. In fact, in looking at the jihadist shift in operations abroad, attacks against smaller, softer targets have actually caused more fatalities than large-scale strikes against hard targets. However, attacks against low-level soft targets, such as the November 2005 hotel attacks in Amman, Jordan, and the July 7, 2005, suicide bombings in London, do not have the strategic impact of a 9/11-style attack.

A number of tactical and strategic considerations have led us to conclude that al Qaeda does not pose a strategic threat.

Tactical Realities

As long as the ideology of jihadism exists and jihadists embrace the philosophy of attacking the "far enemy," they will pose a threat on U.S. soil. Though the U.S. government has tightened visa and asylum restrictions since 9/11, those processes still contain holes. Furthermore, given that even small, repressive regimes have been unable to control their immigration, it is not surprising that a country as large as the United States, one that must deal with the open nature of U.S. society, cannot hermetically seal it borders to prevent terrorist operatives from entering. Jihadist operatives still can reach the United States illegally, by committing immigration fraud or slipping across the border. Legally, they can obtain visas, use operatives from visa-waiver countries or those who are U.S. citizens. Of course, people residing in the United States who decide to "go jihad" also pose a threat. While some, perhaps even most, of these jihadist operatives will be caught before they can enter, some inevitably will get into the country. There undoubtedly are such people -- both transnational and homegrown operatives -- in the United States right now. That is a tactical reality.

Another tactical reality is that the U.S. governmen... [ Read More (1.4k in body) ]

Al Qaeda and the Strategic Threat to the U.S. Homeland


The Blotter: FBI Proposes Building Network of U.S. Informants
Topic: Politics and Law 8:32 pm EDT, Jul 25, 2007

The FBI is taking cues from the CIA to recruit thousands of covert informants in the United States as part of a sprawling effort to boost its intelligence capabilities.

According to a recent unclassified report to Congress, the FBI expects its informants to provide secrets about possible terrorists and foreign spies, although some may also be expected to aid with criminal investigations, in the tradition of law enforcement confidential informants. The FBI did not respond to requests for comment on this story.

The bureau has arranged to use elements of CIA training to teach FBI agents about "Source Targeting and Development," the report states. The courses will train FBI special agents on the "comprehensive tradecraft" needed to identify, recruit and manage these "confidential human sources." According to January testimony by FBI Deputy Director John S. Pistole, the CIA has been working with the bureau on the course.

The bureau apparently mulled whether to adopt entire training courses from the CIA or from the Defense Intelligence Agency (DIA), which like the CIA recruits spies overseas. But the FBI ultimately determined "the courses offered by those agencies would not meet the needs of the FBI's unique law enforcement." The FBI report said it would also give agents "legal and policy" training, noting that its domestic intelligence efforts are "constitutionally sensitive."

"It's probably a good sign they are not adopting CIA recruitment techniques wholesale," said Steven Aftergood of the Federation of American Scientists, an expert on classified programs. U.S. intelligence officers abroad can use bribery, extortion, and other patently illegal acts to corral sources into working for them, Aftergood noted. "You're not supposed to do that in the United States," he said.

This is disturbing..

The Blotter: FBI Proposes Building Network of U.S. Informants


Elonka on 'Fox and Friends', July 22, 2007
Topic: Cryptography 2:30 am EDT, Jul 23, 2007

FOX News July 22, 2007 10 MB 4-minute segment on "Fox and Friends", about the upcoming NOVAscienceNOW show

Here's an archive of my appearance on FOX News this morning.

It's such a surreal experience, being interviewed remotely on live TV. The show was broadcast from New York, but I was in St. Louis. They'd rented out a local PBS studio in downtown St. Louis, to do the live feed. I was a "talking head."

So there I am in the St. Louis studio, at 6:45 a.m. on a Sunday morning, trying to look perky even though I'd been up since 3:30 a.m. to get ready. There were two technicians in the studio, wearing headsets and outside of my vision. So I'm perched on a stool, looking into a blank camera, listening to the audio feed via an earplug. I had no visual feedback whatsoever as to whether or not I was on the air -- no red light, no monitor. For a sense of what this feels like, go sit in front a blank wall, stare at it, and try to keep your face smiling and engaged, even though you have no idea of whether or not you're even being looked at.

I also had some panic before the segment... I was supposed to meet with a makeup artist at 4:30 who was going to do my hair and makeup, but they were a no-show. So I rummaged for some makeup from my purse, brushed my hair, and went on camera "as-is". So if I look a bit windswept, well, now you know why. ;)

Looking forward to the actual Kryptos segment on PBS NOVAscienceNOW this Tuesday...

Elonka :)

Elonka just appeared on Fox and Friends.

Someone should post the video she archived up to Google Video so we can embed it..

Elonka on 'Fox and Friends', July 22, 2007


YouTube - BET - Read A Book (High Quality)
Topic: Humor 5:04 pm EDT, Jul 21, 2007

This is, in fact, funny.

YouTube - BET - Read A Book (High Quality)


Community Structure in the United States House of Representatives
Topic: Politics and Law 12:06 am EDT, Jul 21, 2007

We investigate the networks of committee and subcommittee assignments in the United States House of Representatives from the 101st--108th Congresses, with the committees connected by ``interlocks'' or common membership. We examine the community structure in these networks using several methods, revealing strong links between certain committees as well as an intrinsic hierarchical structure in the House as a whole. We identify structural changes, including additional hierarchical levels and higher modularity, resulting from the 1994 election, in which the Republican party earned majority status in the House for the first time in more than forty years. We also combine our network approach with analysis of roll call votes using singular value decomposition to uncover correlations between the political and organizational structure of House committees.

This is the Take Two on something that's been recommended before...

Community Structure in the United States House of Representatives


YouTube - Trojan Horse Test
Topic: Humor 6:09 pm EDT, Jul 17, 2007

This rocks. some Australian guys build a Trojan Horse full of people dressed like Greek solders, and then try to get it past security into various places in Sydney. The only place that denies them access is the Turkish Consulate.

YouTube - Trojan Horse Test


(Last) Newer << 31 ++ 41 - 42 - 43 - 44 - 45 - 46 - 47 - 48 - 49 ++ 59 >> Older (First)
 
 
Powered By Industrial Memetics
RSS2.0