Create an Account
username: password:
 
  MemeStreams Logo

Spontaneous Sociability and The Enthymeme

search

Rattle
Picture of Rattle
Rattle's Pics
My Blog
My Profile
My Audience
My Sources
Send Me a Message

sponsored links

Rattle's topics
Arts
  Literature
   Sci-Fi/Fantasy Literature
  Movies
  Music
Business
  Tech Industry
  Telecom Industry
Games
Health and Wellness
Holidays
Miscellaneous
  Humor
  MemeStreams
   Using MemeStreams
Current Events
  War on Terrorism
  Elections
Recreation
  Travel
Local Information
  SF Bay Area
   SF Bay Area News
Science
  Biology
  History
  Nano Tech
  Physics
  Space
Society
  Economics
  Futurism
  International Relations
  Politics and Law
   Civil Liberties
    Internet Civil Liberties
    Surveillance
   Intellectual Property
  Media
   Blogging
  Military
  Security
Sports
Technology
  Biotechnology
  Computers
   Computer Security
    Cryptography
   Cyber-Culture
   PC Hardware
   Computer Networking
   Macintosh
   Linux
   Software Development
    Open Source Development
    Perl Programming
    PHP Programming
   Spam
   Web Design
  Military Technology
  High Tech Developments

support us

Get MemeStreams Stuff!


 
"The future masters of technology will have to be lighthearted and intelligent. The machine easily masters the grim and the dumb." -- Marshall McLuhan, 1969

AP Source: FBI formally closes anthrax case | TPM News Pages
Topic: War on Terrorism 1:57 pm EST, Feb 19, 2010

The FBI has decided with finality that a government researcher acted alone in the deadly 2001 anthrax mailings and is closing its long-running investigation, a person familiar with the case said Friday.

The anthrax case was one of the most vexing and costly investigations in U.S. history until officials announced in 2008 that the lone suspect was Dr. Bruce Ivins, who killed himself as authorities prepared to indict him. The move Friday seals that preliminary investigative conclusion.

AP Source: FBI formally closes anthrax case | TPM News Pages


2 Chinese Schools Said to Be Linked to Online Attacks - NYTimes.com
Topic: Computer Security 12:51 pm EST, Feb 19, 2010

A series of online attacks on Google and dozens of other American corporations have been traced to computers at two educational institutions in China, including one with close ties to the Chinese military, say people involved in the investigation.

The Chinese schools involved are Shanghai Jiaotong University and the Lanxiang Vocational School, according to several people with knowledge of the investigation who asked for anonymity because they were not authorized to discuss the inquiry.

Jiaotong has one of China’s top computer science programs. Just a few weeks ago its students won an international computer programming competition organized by I.B.M. — the “Battle of the Brains” — beating out Stanford and other top-flight universities.

Lanxiang, in east China’s Shandong Province, is a huge vocational school that was established with military support and trains some computer scientists for the military. The school’s computer network is operated by a company with close ties to Baidu, the dominant search engine in China and a competitor of Google.

“We have to understand that they have a different model for computer network exploit operations,” said James C. Mulvenon, a Chinese military specialist and a director at the Center for Intelligence Research and Analysis in Washington. Rather than tightly compartmentalizing online espionage within agencies as the United States does, he said, the Chinese government often involves volunteer “patriotic hackers” to support its policies.

2 Chinese Schools Said to Be Linked to Online Attacks - NYTimes.com


Cyber Warriors
Topic: Military Technology 10:37 am EST, Feb 16, 2010

James Fallows:

Retired Admiral Mike McConnell argues that we now suffer from a conspiracy of secrecy about the scale of cyber risks. No credit-card company wants to admit how often or how easily it is cheated. No bank or investment house wants to admit how close it has come to being electronically robbed. As a result, the changes in law, regulation, concept, or habit that could make online life safer don't get discussed. Sooner or later, the cyber equivalent of 9/11 will occur -- and, if the real 9/11 is a model, we will understandably, but destructively, overreact.

Tom Cross via Andy Greenberg:

Internet-related companies need to be more transparent about their lawful intercept procedures or risk exposing all of their users. There are a lot of other technology companies out there that haven't published their architecture, so they can't be audited. We can't be sure of their security as a result.

Rattle:

Paranoia about the conspiracy is always justified. It's just usually misplaced.

Rebecca Brock:

She tells me she's ready. She may be small, she says, but she's mean. She outlines her plans for fending off terrorists. She says, "I kind of hope something happens, you know?"

She wears an American flag pin on the lapel of her blazer. She sits on the jump seat, waiting for her life to change.

Decius:

Wow, life is boring.

Cyber Warriors


Microsoft Patch Tuesday for February 2010: 13 bulletins
Topic: Computer Security 1:59 pm EST, Feb  5, 2010

Holy crap, the next Patch Tuesday is going to be major.

# Bulletin 1: Critical (Remote Code Execution), Windows
# Bulletin 2: Critical (Remote Code Execution), Windows
# Bulletin 3: Critical (Remote Code Execution), Windows
# Bulletin 4: Critical (Remote Code Execution), Windows
# Bulletin 5: Critical (Remote Code Execution), Windows
# Bulletin 6: Important (Remote Code Execution), Office
# Bulletin 7: Important (Remote Code Execution), Office
# Bulletin 8: Important (Remote Code Execution), Windows
# Bulletin 9: Important (Denial of Service), Windows
# Bulletin 10: Important (Elevation of Privilege), Windows
# Bulletin 11: Important (Remote Code Execution), Windows
# Bulletin 12: Important (Denial of Service), Windows
# Bulletin 13: Moderate (Elevation of Privilege), Windows

Microsoft Patch Tuesday for February 2010: 13 bulletins


Search Engine video podcast: Free Hossein Derakhshan, even if he's kind of a jerk! Boing Boing
Topic: Miscellaneous 3:53 pm EST, Jan 30, 2010

Hoder watch...

Search Engine video podcast: Free Hossein Derakhshan, even if he's kind of a jerk! Boing Boing


Google China insiders may have helped with attack | InSecurity Complex - CNET News
Topic: Computer Security 11:18 am EST, Jan 20, 2010

Google is looking into whether employees in its China office were involved in the attacks on its network that led to theft of intellectual property, according to CNET sources.

Sources familiar with the investigation told CNET last week that Google was looking into whether insiders at the company were involved in the attacks, but additional details were not known at the time.

Google China insiders may have helped with attack | InSecurity Complex - CNET News


Twitter / WikiLeaks: Several rumours from google ...
Topic: Computer Security 6:31 pm EST, Jan 14, 2010

Decius:

Several rumours from google sources that China accessed google's US-gov intercept system which provides gmail subjects/dates

This was my suspicion when I read that the attackers had accessed "subject lines" from emails but not the content. It sounds like they got access to a system designed for use by law enforcement when they have "trap and trace" authority but not a warrant. Personally, I think email subject lines are not "routing information" and should require a warrant, but the matter hasn't been litigated to my knowledge and of course, law enforcement disagrees.

This is somewhat relevant to my Blackhat DC talk on lawful intercept vulnerabilities, but of course even if this is true, a totally different technology was involved...

Twitter / WikiLeaks: Several rumours from google ...


Google China cyberattack part of vast espionage campaign, experts say - washingtonpost.com
Topic: Computer Security 11:27 am EST, Jan 14, 2010

I'm glad to see this is finally getting some attention. As bad as these articles make the extent of the ongoing Chinese espionage sound, it's actually worse...

Human rights groups as well as Washington-based think tanks that have helped shape the debate in Congress about China were also hit.

sigh...

"Usually it's a group using one type of malicious code per target," said Eli Jellenc, head of international cyber-intelligence for VeriSign's iDefense Labs, a Silicon Valley company helping some firms investigate the attacks. "In this case, they're using multiple types against multiple targets -- but all in the same attack campaign. That's a marked leap in coordination."

The division of labor is what I think stands out the most.

"This is a big espionage program aimed at getting high-tech information and politically sensitive information -- the high-tech information to jump-start China's economy and the political information to ensure the survival of the regime," said James A. Lewis, a cyber and national security expert at the Center for Strategic and International Studies. "This is what China's leadership is after. This reflects China's national priorities."

Google China cyberattack part of vast espionage campaign, experts say - washingtonpost.com


Black Hat Technical Security Conference: DC 2010 // Briefings
Topic: Miscellaneous 8:50 am EST, Jan  5, 2010

Exploiting Lawful Intercept to Wiretap the Internet

Many goverments require telecommunications companies to provide interfaces that law enforcement can use to monitor their customer's communications. If these interfaces are poorly designed, implemented, or managed they can provide a backdoor for attackers to perform surveillance without lawful authorization. Most lawful intercept technology is proprietary and difficult to peer review. Fortunately, Cisco has published the core architecture of it's lawful intercept technology in an Internet Draft and a number of public configuration guides.

This talk will review Cisco's architecture for lawful intercept from a security perspective. The talk will explain how a number of different weaknesses in its design coupled with publicly disclosed security vulnerabilities could enable a malicious person to access the interface and spy on communications without leaving a trace. The talk will explain what steps network operators need to take to protect this interface. The talk will also provide a set of recommendations for the redesign of the interface as well as SNMP authentication in general to better mitigate the security risks.

//BIO: Tom Cross

Black Hat Technical Security Conference: DC 2010 // Briefings


Heady Internet freedom in China as Great Firewall falls -- briefly - latimes.com
Topic: Surveillance 4:39 pm EST, Jan  4, 2010

Web users reported an outage of China's strict Internet controls, known as the Great Firewall, for several hours this morning, allowing them brief access to banned websites such as YouTube, Facebook and Twitter.

But by the time many woke up, strict restrictions had returned. Error messages once again flashed across computer screens for sites blocked by the nation's censorship filter.

Heady Internet freedom in China as Great Firewall falls -- briefly - latimes.com


(Last) Newer << 2 - 3 - 4 - 5 - 6 - 7 - 8 - 9 - 10 - 11 ++ 21 >> Older (First)
 
 
Powered By Industrial Memetics
RSS2.0