Create an Account
username: password:
 
  MemeStreams Logo

Spontaneous Sociability and The Enthymeme

search

Rattle
Picture of Rattle
Rattle's Pics
My Blog
My Profile
My Audience
My Sources
Send Me a Message

sponsored links

Rattle's topics
Arts
  Literature
   Sci-Fi/Fantasy Literature
  Movies
  Music
Business
  Tech Industry
  Telecom Industry
Games
Health and Wellness
Holidays
Miscellaneous
  Humor
  MemeStreams
   Using MemeStreams
Current Events
  War on Terrorism
  Elections
Recreation
  Travel
Local Information
  SF Bay Area
   SF Bay Area News
Science
  Biology
  History
  Nano Tech
  Physics
  Space
Society
  Economics
  Futurism
  International Relations
  Politics and Law
   Civil Liberties
    Internet Civil Liberties
    Surveillance
   Intellectual Property
  Media
   Blogging
  Military
  Security
Sports
Technology
  Biotechnology
  Computers
   Computer Security
    Cryptography
   Cyber-Culture
   PC Hardware
   Computer Networking
   Macintosh
   Linux
   Software Development
    Open Source Development
    Perl Programming
    PHP Programming
   Spam
   Web Design
  Military Technology
  High Tech Developments

support us

Get MemeStreams Stuff!


 
From User: Decius

"The future masters of technology will have to be lighthearted and intelligent. The machine easily masters the grim and the dumb." -- Marshall McLuhan, 1969

Comcast Hijackers Say They Warned the Company First | Threat Level from Wired.com
Topic: Computer Security 1:24 pm EDT, Jun  2, 2008

The computer attackers who took down Comcast's homepage and webmail service for over five hours Thursday say they didn't know what they were getting themselves into.

In an hour-long telephone conference call with Threat Level, the hackers known as "Defiant" and "EBK" expressed astonishment over the attention their DNS hijacking has garnered. In the call, the pair bounded freely between jubilant excitement over the impact of their attack, and fatalism that they would soon be arrested for it.

Neither hacker would identify their full names or locations. Defiant's MySpace profile lists him in Cashville, Tennessee, but he says that's incorrect. His girlfriend lists herself in New York. Threat Level expects both hackers' names and locations will emerge shortly.

This is entertaining... One of those cases where you really gotta sympathize with the perps. It was a prank - fairly innocent. Egg on Comcast's face for getting outsmarted by a couple of teenage pot heads. Hope they don't throw the book at them. This isn't the mafia here.

Comcast Hijackers Say They Warned the Company First | Threat Level from Wired.com


Operation Summercon 2k8 in Da House
Topic: Cyber-Culture 3:33 pm EDT, May 28, 2008

We're in the final week before Summercon 2008! Come out Friday night @ 7PM and meet at the Wyndham Hotel bar, a.k.a. "The Mojito Lounge". Don't be shy, just look for someone wearing a Summercon t-shirt and introduce yourself. They won't bite or fight... probably. We'll plan on hanging out at the hotel for a bit and then herd everyone to another fine drinking establishment. Friday night is an ice-breaker, so come out and get to know your friendly neighborhood hacker. Don't sleep in much past noon on Saturday, presentations start at 12:30PM.

Operation Summercon 2k8 in Da House


Tennessee Terrorism Sweep nets traffic violators
Topic: Civil Liberties 10:52 am EDT, Apr 23, 2008

Last week, federal, state, and local police in Tennessee, Mississippi, and Arkansas conducted a massive sweep dubbed "Operation Sudden Impact."

The operation included raids of businesses, homes, and boats; traffic roadblocks; and personal searches. They say they were looking for "terrorists." If they found any, they haven't announced it yet. They did arrest 332 people, 142 of whom they describe as "fugitives." They also issued about 1,300 traffic tickets, and according to one media account, seized "hundreds" of dollars.

...

The FBI along with hundreds of officers said they are looking for anything out of the ordinary. Agents take computers and paperwork from businesses.

"What we have found traditionally is that terrorists are involved in a number of lesser known type crimes," said Mark Luttrell, Shelby County sheriff.

There you have it. All law enforcement is anti-terrorism. The police cannot legally establish "anti-terrorism" roadblocks that essentially serve as forums for random search and seizure.

Tennessee Terrorism Sweep nets traffic violators


The Volokh Conspiracy - Ninth Circuit Allows Suspicionless Computer Searches at the Border:
Topic: Civil Liberties 3:47 pm EDT, Apr 22, 2008

The Ninth Circuit has (finally) handed down United States v. Arnold; the court ruled that there is no Fourth Amendment requirement of "reasonable suspicion" to search a laptop computer at the border.

This is extremely bad.

The Volokh Conspiracy - Ninth Circuit Allows Suspicionless Computer Searches at the Border:


Feds Tout New Domestic Intelligence Centers | Threat Level from Wired.com
Topic: Surveillance 11:19 am EDT, Apr  3, 2008

Federal, state and local cops are huddling together in domestic intelligence dens around the nation to fuse anti-terror information and tips in ways they never have before, and they want the American people to know about it -- sort of.

The dominant catchphrase from the officials was that the centers need to focus on "all threats, all hazards." Officials say the centers must look at even the most mundane crimes, since they can be used to fund terrorism.

Total surveillance, justified by the threat of terrorism, but applied in absolutely every context.
More here.

The fusion centers have subscriptions to private information-broker services that keep records about Americans' locations, financial holdings, associates, relatives, firearms licenses and the like.

Pennsylvania buys credit reports and uses face-recognition software to examine driver's license photos, while analysts in Rhode Island have access to car-rental databases. In Maryland, authorities rely on a little-known data broker called Entersect, which claims it maintains 12 billion records about 98 percent of Americans.

"There is never ever enough information when it comes to terrorism" said Maj. Steven G. O'Donnell, deputy superintendent of the Rhode Island State Police. "That's what post-9/11 is about."

Feds Tout New Domestic Intelligence Centers | Threat Level from Wired.com


The Intelligence Consensus - WSJ.com
Topic: Surveillance 11:18 am EDT, Apr  3, 2008

Recent reports in this paper and others allege the existence of broad intelligence programs run by the National Security Agency to process wide-ranging personal data on Americans' activities. One of us (Eshoo) sees this as the latest in a string of troubling accusations about the erosion of privacy and civil liberties since 9/11. The other (McConnell) sees it as more hyperbole and inaccurate press reports designed to mislead the public into thinking that the intelligence community is acting against American law and values. Honest people can differ on these tough issues. We think it is healthy. This is America, after all.

Despite our diverging opinions, it would be useful to set forth those areas where we agree...

A cyber attack could be more devastating economically than Sept. 11. Preventing a cyber attack will require tremendous cooperation between the government and the private sector, and above all, a common understanding that our liberty and our security go hand in hand.

Comments like "our liberty and our security go hand in hand" are usually made by people when they are doing away with liberty.

Finally, no cyber-security plan will succeed without congressional support. Checks and balances are essential in a democracy, particularly when the matter concerns secret government programs that rightly remain out of the public view. Active congressional oversight gives the public confidence that their rights and their security are being properly attended to, and such oversight allows Congress to say so confidently and publicly.

This, I assume, is as opposed to judicial review...
I give you Arlen Specter.

The Intelligence Consensus - WSJ.com


summercon 2008 | A new tradition of organization
Topic: Recreation 5:59 pm EDT, Apr  2, 2008

May 30th - June 1rst. Details will be posted to the website as they come in.

summercon 2008 | A new tradition of organization


Hackers Publish German Minister's Fingerprint | Threat Level from Wired.com
Topic: Technology 2:36 pm EDT, Apr  1, 2008

To demonstrate why using fingerprints to secure passports is a bad idea, the German hacker group Chaos Computer Club has published what it says is the fingerprint of Wolfgang Schauble, Germany's interior minister.

According to CCC, the print of Schauble's index finger was lifted from a water glass that he used during a panel discussion that he participated in last year at a German university. CCC published the print on a piece of plastic inside 4,000 copies of its magazine Die Datenschleuder that readers can use to impersonate the minister to biometric readers.

Good Job!

Hackers Publish German Minister's Fingerprint | Threat Level from Wired.com


Copyfighters beat down Tennessee bill - Boing Boing
Topic: Intellectual Property 1:21 pm EDT, Mar 21, 2008

Copyfighters in Tennessee have scored a massive win, defanging a crappy, RIAA-written state bill:

Kudos to the Tennessee crew.

Copyfighters beat down Tennessee bill - Boing Boing


BBC NEWS | Magazine | World's best-known protest symbol turns 50
Topic: Society 1:34 pm EDT, Mar 20, 2008

It started life as the emblem of the British anti-nuclear movement but it has become an international sign for peace, and arguably the most widely used protest symbol in the world. It has also been adapted, attacked and commercialised.


Gerald Holtom, a designer and former World War II conscientious objector from West London, persuaded DAC that their aims would have greater impact if they were conveyed in a visual image. The "Ban the Bomb" symbol was born.

BBC NEWS | Magazine | World's best-known protest symbol turns 50


(Last) Newer << 1 - 2 - 3 - 4 - 5 - 6 - 7 - 8 - 9 ++ 19 >> Older (First)
 
 
Powered By Industrial Memetics
RSS2.0