View Single Post
Old 04-20-2014, 06:02 PM
redrat11 redrat11 is offline
Senior Member
Join Date: Sep 2005
Posts: 2,399
Default Re: High Tech Corruption


Eric Schmidt to dictators: 'You don’t turn off the internet: you infiltrate it'

Google’s executive chairman concerned by manipulative new approach of governments spooked by popular uprisings

Stuart DredgeFriday 7 March 2014*14.24*EST

Dictators are taking a new approach in their responses to use of the internet in popular uprisings, according to Google’s executive chairman Eric Schmidt.

“What’s happened in the last year is the governments have figured out you don’t turn off the internet: you infiltrate it,” said Schmidt, speaking at the SXSW conference in Austin, Texas.

“The new model for a dictator is to infiltrate and try to manipulate it. You’re seeing this in China, and in many other countries.”
article continues at link below


White House Cyber Chief Says Snowden Damage Will Be Felt for Decades

BY:*Bill Gertz*March 28, 2014 5:10 pm

Damage to U.S. national security caused by NSA contractor Edward Snowden will take decades to repair, the White House official in charge of cyber security said Friday.

“Make no mistake: We are going to be dealing with the fallout from that for all of your careers, and the impact that that has had on our national security will reverberate for decades,” Michael Daniel, special assistant to the president for cyber security, told Naval Academy midshipmen.


Your Next Smartphone Could Respond to Your Voice, Even When It’s Asleep

A new feature in Qualcomm’s chips will let you wake your phone with a voice command so it can do your bidding. Now it just needs to learn to cook.By*Rachel Metz*on February 21, 201


Snowden: ‘Training Guide’ for GCHQ, NSA Agents Infiltrating and Disrupting Alternative Media Online

FEBRUARY 25, 2014*BY*21WIRE43 COMMENTS21st Century Wire*says…

Ed Snowden’s latest leaked documents open the lid on what is perhaps the most vindictive and disgusting aspect of the government-corporate joint surveillance state seen yet…

This is Britain’s *GCHQ how-to guide for*Online Covert Action*which, according to Glenn Greenwald (see links below) has been shared with US agencies like the NSA. Upon review, it can only be described as government-sponsored subterfuge of domestic society.

According to these latest documents, there are paid government agent/contractor persons on social media posing as someone they are not, whilst on the payroll of the government. Their job is to befriend members of the alternative media, embed themselves in the ebb and flow of day-to-day communications, and then to engage in elaborate subterfuge – by any means necessary.

The training exercise below uses terms like*“befriend”, “infiltrate”, “mask/mimic”, “ruse”, “set-up”, “disrupt”, “create cognitive stress”,*“use deception”,*“ruin business relationships”, and*“post negative information on appropriate forums”*– all of which is not only illegal and morally bankrupt, but also runs completely contrary to the very fundamental ‘values’ and indeed founding principles, of a modern free democratic society or constitutional republic.*
full article link below

Optic Nerve: millions of Yahoo webcam images intercepted by GCHQ

* -1.8m users targeted by UK agency in six-month period alone

*•*Optic Nerve program collected Yahoo webcam images in bulk

*•*Yahoo: 'A whole new level of violation of our users' privacy'

*•*Material included large quantity of sexually explicit images

Spencer Ackerman*and*James BallFriday 28 February 2014*05.31*EST

Britain's surveillance agency GCHQ, with aid from the US National Security Agency, intercepted and stored the webcam images of millions of internet users not suspected of wrongdoing, secret documents reveal.

GCHQ files dating between 2008 and 2010 explicitly state that a surveillance program codenamed Optic Nerve collected still images of*Yahoo*webcam chats in bulk and saved them to agency databases, regardless of whether individual users were an intelligence target or not.

On Hacking MicroSD Cards

Today at the Chaos Computer Congress (30C3),xobs*and I disclosed a finding that some SD cards contain vulnerabilities that allow arbitrary code execution — on the memory card itself. On the dark side, code execution on the memory card enables a class of MITM (man-in-the-middle) attacks, where the card seems to be behaving one way, but in fact it does something else. On the light side, it also enables the possibility for hardware enthusiasts to gain access to a very cheap and ubiquitous source of microcontrollers.

In order to explain the hack, it’s necessary to understand the structure of an SD card. The information here applies to the whole family of “managed flash” devices, including microSD, SD, MMC as well as the eMMC and iNAND devices typically soldered onto the mainboards of smartphones and used to store the OS and other private user data. We also note that similar classes of vulnerabilities exist in related devices, such as USB flash drives and SSDs.



TELL ME NOW*—*APRIL 20, 2014

As more and more human rights of U.S. citizens are violated in the name of safety and security, the group Anonymous stands to fight at the side of Americans.* Over the holiday weekend, they have even gone as far to announce a call to arms.


Documents reveal demand for 116 more workers to review, investigate 'suspects'

Published: 01/20/2014 at 9:56 PM

The federal government will hire up to 116 full-time private-contractor personnel to help amass and screen data on persons whose movements or activities are brought to the attention of the Terrorist Screening Center, an FBI-administered interagency unit.

The federal government,*starting from the time Obama took office, in various ways has described returning veterans, conservatives, pro-lifers and those who support a constitutional government as potential terrorists.
Read more at*


How your car can be hacked remotely by a tiny device

Automakers need security bounty programs.

By*Steve Abrams*February 7, 2014*/ Photos by Jade

Yet another security researcher is demonstrating a better way to break into vehicle electronic systems, taking control from drivers in a way that could wreak havoc on the roads. While we aren't in imminent danger of wireless drive-by hacks on our cars, automakers must quickly take a more proactive role in discovering and plugging the holes in automotive computer networks before someone devises a practical exploit that requires no physical access to the car.

Automakers remain secretive about their in-vehicle computer security, but as hackers find new ways into these rolling networks, automakers need to open up, acknowledge the risks, and ask for help.

READ THIS:*NHTSA pledges to keep our highways safe from cyber attackers

At the upcoming*Black Hat Asia 2014computer security conference in Singapore, a pair of Spanish security researchers will demonstrate a smartphone-sized circuit board dubbed the 'CAN Hacking Tool' (CHT), which they claim will let them remotely take partial control of many vehicles over a wireless Bluetooth connection.


Govt. “Threat List” Names 8 Million Americans Who Will Be Detained When Martial Law Is Imposed


Mozilla's Lightbeam tool will expose who is looking over your shoulder on the web

By*ADAM SHERWIN Thursday 24 October 2013

Just who is looking over your shoulder when you browse the Internet? Tomorrow, web users will be given a new tool to shine a light on the commercial organisations which track your every movement online.

Lightbeam, a download produced by Mozilla, the US free software community behind the popular Firefox browser, claims to be a “watershed” moment in the battle for web transparency.Everyone who browses the Internet leaves a digital trail used by advertisers to discover what your interests are.

Last edited by redrat11 : 04-21-2014 at 05:37 PM.
Reply With Quote