Blog Heap o'Links
Just random links galore
filed under the
Blog Heading
of
Blog Heap o'Links filed under the Blog Heading of

Digital Criminal

Displaying 61 - 90 of 149
Dan Goodin, Ars Technica • Mon 2012 Jun 4, 10:49pm
Espionage software that was recently found targeting Iranian computers contains advanced Bluetooth capabilities, taking malware to new heights by allowing attackers to physically stalk their victims… could even surveil smartphones not infected by the malware…. With a size of 20 megabytes, Flame is a massive piece of malware whose discovery might be the security equivalent of oceanographers finding a previously unknown sea. Expect new factoids to trickle out steadily for the foreseeable future. [h/t Drudge]
The Guardian • Mon 2012 Jun 4, 10:45pm
China's censors have blocked internet access to the terms "six four", "23", "candle" and "never forget", broadening already extensive efforts to silence talk about the 23rd anniversary of the bloody 4 June crackdown on pro-democracy protesters. [h/t Drudge]
Navy Times • Wed 2012 May 30, 11:06am
Social security numbers and other personal data for 123,000 Thrift Savings Plan account holders were stolen from a contractor’s computer last year. Names, addresses, and financial account and routing numbers of some accounts were also compromised…. targeted a computer operated by contractor Serco Inc., which provides record-keeping services for 4.5 million federal employees, service members and beneficiaries with TSP accounts….
Charles Arthur, guardian.co.uk • Wed 2012 May 30, 10:45am
Two Cambridge experts have discovered a "back door" in a computer chip used in military systems and aircraft such as the Boeing 787 that could allow the chip to be taken over via the internet…. will heighten concerns about the risks of cyber-attacks on sensitive installations… [after] discovery this week of the 'Flamer' virus which has been attacking computer systems in Iran, Syria and Saudi Arabia….
Chi-Com flag
The Hill • Sun 2012 May 27, 5:23pm
House lawmakers will consider an international proposal next week to give the United Nations more control over the Internet. The proposal is backed by China, Russia, Brazil, India and other UN members, and would give the UN’s International Telecommunication Union (ITU) more control over the governance of the Internet. [Um... no. FYNQ.]
Jerome Taylor, The Independent (UK) • Thu 2012 May 24, 8:18pm
[Google's executive chairman Eric Schmidt] issued a stark warning tonight that the power of the internet to free some of the world’s most oppressed people risks being overturned by autocratic governments who seek to “Balkanise” the web by controlling what can be accessed.
t
Liberty Chick, Breitbart • Thu 2012 May 3, 12:19pm

Twitter has become the battleground for the 2012 elections and the fight to push the country further left or closer to the right. It is the vehicle that not only informs and influences the opinions of others, but often it is Twitter that actually drives the news cycle.... thought this might be the perfect opportunity to share a list of the “Top Ten Dirty Tricks Leftists Play Online...." there are some on the left who vehemently disagree with such tactics.... there are some on the right who might not play entirely fairly, either.... the instigators of such tactics I’m about to list below appear to be overwhelmingly left-leaning....

Sebastian Anthony, Extreme Tech • Tue 2012 May 1, 11:32am

According to reports from various industry sources, the Chinese government has begun the process of picking a national computer chip instruction set architecture (ISA). This ISA would have to be used for any projects backed with government money — which, in a communist country such as China, is a fairly long list of public and private enterprises and institutions, including China Mobile, the largest wireless carrier in the world. ... developing a brand new ISA — a daunting task, considering you have to create an entire software (compiler, developer, apps) and hardware (CPU, chipset, motherboard) ecosystem from scratch. But, there are benefits to building your own CPU architecture. ...silicon-level monitoring and censorship ...a ubiquitous, always-open backdoor that can be used by Chinese intelligence agencies... DNS and IP address blacklist [built] into the hardware itself ...implement a hardware-level 10pm curfew for video games... code that automatically turns negative mentions of Hu Jintao (the Chinese president) into positives, and inserts a few honorifics at the same time ...a latent botnet of hundreds of millions of computers that can be activated upon the commencement of World War III. Or, or, or… [The word "benefits," as employed here, is not value-oriented.]

Breitbart
Dan Collins, The Conservatory • Thu 2012 Apr 26, 5:49pm

FreeMarketAmerica released the video in response to Earth Day, which “fizzled badly” this year, in part because of the continued revelations regarding the hysteria rhetoric of Gaia catastrophists, and in part, I’m guessing, because people have other things to worry about, such as how to scrape together the money to pay for their mortgages, pay off their student loans, buy gas for their climate-destroying automobiles and oh my God will you freaking people please shut up? Because it went viral, I saw no need of posting it here . . . until Michelle Malkin and others were notified by the creators that YouTube has suspended their account ... Whether this was a matter that YouTube took up on its own volition, or whether it succumbed to lefty pressure is impossible to know without more information. Until I’m presented with evidence that this was an internal decision generated without any outside pressure, I’m inclined to give YouTube the benefit of the doubt.

War News Updates • Sun 2012 Apr 15, 3:28pm

The manner and progression in which the internet was cut reminds me of how both Iran and Egypt cut their internet during the height of their uprisings. This was a Chinese kill-switch test .... and yes .... it was successful.

Joseph S. Nye, Jr. at CNN • Wed 2012 Apr 11, 7:53pm

Mountains and oceans are hard to move, but portions of cyberspace can be turned on and off by throwing a switch. ... barriers to entry in the cyber domain are so low that non-state actors and small states can play a significant role at low cost. ... it makes little sense to speak of dominance in cyberspace. If anything, dependence on complex cyber systems for support of military and economic activities creates new vulnerabilities in large states that can be exploited by non-state actors. ... greater dependence on networked computers and communication leaves the US more vulnerable to attack than many other countries, and cyberspace has become a major source of insecurity, because, at this stage of technological development, offense prevails over defense there. ... actors are diverse (and sometimes anonymous), physical distance is immaterial, and some forms of offense are cheap. Because the Internet was designed for ease of use rather than security, attackers currently have the advantage over defenders. ... [No good conclusion to this except that "states need to sit down" to address the threat. Yeah. H/t War News Update]

Screwy Puppy • Tue 2012 Apr 3, 6:15pm

Arizona will make it possible to prosecute you for posting something offensive on the net.

A. It is unlawful for any person, with intent to terrify, intimidate, threaten, harass, annoy or offend, to use a telephone any electronic or digital device and use any obscene, lewd or profane language or suggest any lewd or lascivious act, or threaten to inflict physical harm to the person or property of any person. It is also unlawful to otherwise disturb by repeated anonymous telephone calls electronic or digital communications the peace, quiet or right of privacy of any person at the place where the telephone call or calls communications were received.

dailymail.co.uk • Fri 2011 Jul 15, 8:41pm

The Pentagon has admitted a foreign power hacked and stole 24,000 files from the United States this year forcing them to treat the internet as a warzone. The audacious theft was announced as Deputy Defense Secretary William Lynn launched a new online security strategy, which now classes cyberspace as an 'operational domain' like the sea, air and land. ... He said as part of its active defences, the Pentagon would introduce new operating concepts and capabilities on its networks, such as sensors, software and signatures to detect and stop malicious code before it affects U.S. operations. [And even though the whole herd of horses has been stolen, we are doubling the locks on the barn door!]

biggovernment.com • Tue 2011 Jul 12, 5:15pm

The Democrat Congress couldn't pass the energy sector-killing Cap & Trade? No problem, President Obama's Environmental Protection Agency (EPA) just began to implement it as if it did. The Democrat Congress couldn't pass the union-payoff, anti-free choice Employee Free Choice Act? No problem, President Obama's National Labor Relations Board (NLRB) just began to implement it as if it did. Then there is President Obama's Federal Communications Commission (FCC) — and its December 21 illegal Internet power grab executed so as to then impose the absurd Network Neutrality. The Democrat Congress couldn't pass Net Neutrality — and in fact 302 of its members were opposed to the FCC unilaterally force-feeding it to us. Please note: The FCC has zero authority over anything unless and until Congress writes a law that says "Hey FCC, do this." And as FCC Chairman Julius Genachowski readily admits, Congress has never done so with the Internet. ... The Media Marxists — the folks who are working to have the government control all news, media and communications — know this. They have moved past the "Fairness" Doctrine to other, bigger, newer forms of censorship. Mark Lloyd — a Hugo Chavez-loving Media Marxist whom the FCC hired as their inaugural "Chief Diversity Officer" — wrote a piece called "Forget the Fairness Doctrine" in which he details other ways to achieve the same silencing of the Right on the radio. But the Left is thinking long term — and that means Net Neutrality. The Godfather of the Media Marxist movement — Robert McChesney — describes Net Neutrality thusly: "(T)he ultimate goal is to get rid of the media capitalists in the phone and cable companies and to divest them from control."

cbsnews.com • Sun 2011 Jun 12, 10:14am

The New York Times reports that U.S. government funding is helping to develop and deploy "shadow" Internet and mobile phone systems to undermine repressive regimes that seek to prevent dissidents from getting their stories out to the world. [Who will help us develop such systems when our own government comes after us?]

foxnews.com • Fri 2011 Jun 10, 9:05am

Senate Bill 978, a bipartisan measure introduced last month by Sen. Amy Klobuchar (D-Minn.), Sen. John Cornyn (R-Texas) and Sen. Christopher Coons (D-Del.), is backed by supporters who say it closes glaring loopholes in current copyright infringement law created by the realities of the digital age. ... But critics say a section of the bill provides for steep penalties -- up to five years in prison -- for "publicly performing" copyrighted material and embedding the video to sites like YouTube. "It seems like (the bill) is attacking the core of the Internet itself, which is to promote communication amongst people all over the world" ....

ft.com • Wed 2011 May 18, 9:11pm

Owners of Android smartphones are being warned to avoid public WiFi networks after researchers found a security flaw that could affect the vast majority of devices based on Google's software.

nextgov.com • Mon 2011 May 16, 11:10pm

ObamaMonday's policy outlines the moves the United States must make in partnership with allies to promote compatible, secure, reliable and unfettered information exchange. "This is a strategy that goes beyond any singular partner or agency," John Brennan, President Obama's top counterterrorism adviser, said during a formal unveiling of the framework at the White House. Academics have long warned that poor interagency collaboration and misaligned domestic and foreign cyberspace policies are hurting U.S. efforts to, among other things, cut off financial support for terrorist groups. Nabbing the groups backing, for example, suicide bombers requires balancing national security and individual online privacy. Government officials typically must trace credit card transactions, online payments, emails and other communications to understand the target's day-to-day activities.

nationaljournal.com • Sat 2011 Apr 9, 7:27pm

Even as the House voted to repeal federal Internet access rules Friday, top Democratic policymakers called free and open communications a vital part of American democracy. Speaking at Free Press's National Conference for Media Reform, House Minority Leader Nancy Pelosi, D-Calif., said she was pleased by Democratic opposition to the GOP-backed resolution, which cleared the House Friday afternoon. The resolution would nullify Federal Communications Commission net neutrality regulations that aim to prevent Internet service providers from blocking certain websites. "No one should be guarding the gate on the Internet," Pelosi said. [My doublespeak dictionary is wearing out] Critics of the regulations say they unnecessarily interfere in the private market. Republicans who sponsored the House legislation argued that the FCC overstepped its authority to enact rules that aren't needed.

computerworld.com • Sat 2011 Apr 2, 6:55am

Hundreds of thousands -- and possibly millions -- of websites have been hit with a cyberattack that some are calling "one of the biggest mass-injection attacks we've ever seen."

nbcbayarea.com • Mon 2011 Mar 14, 4:40pm

Viral hoax in waiting or brilliant marketing display of the iPhone's hidden capabilities?... claims to have added a transmitter to his iPhone that allows him to take over any video screen....

dailytech.com • Mon 2011 Mar 7, 2:25pm

...[Survey] discovered that two-thirds are losing sleep to devices like computers, televisions and cell phones... poll shows that the most sleep deprived age group are those ages 13 to 18, who stay up late at night texting before falling asleep....

washingtontimes.com • Tue 2011 Mar 1, 1:18pm

In a speech to religious broadcasters that received a sustained ovation at his conclusion, he said free expression is under attack by a power structure in Washington populated with regulators who have never set foot inside a radio station or a television studio. "We see this threat in how the FCC is creeping further into the free market by trying to regulate the Internet," Mr. Boehner said. "The last thing we need, in my view, is the FCC serving as Internet traffic controller, and potentially running roughshod over local broadcasters who have been serving their communities with free content for decades...."

pcmag.com • Fri 2009 Jul 31, 11:47pm

Apple on Friday confirmed that it has issued an update to fix a security glitch on the iPhone that could have allowed hackers to disable or take over the smartphones.

news.cnet.com • Tue 2009 Jun 30, 7:01pm

Chicom FlagChina has indefinitely delayed enforcement of a requirement that PC makers preinstall Green Dam-Youth Escort software that experts believe would have screened not just Internet pornography but also some online political content.

news.cnet.com • Tue 2009 Jun 30, 7:01pm

Chicom FlagBeijing postpones a requirement that PC makers preinstall Green Dam software for filtering Internet content. But it may be just a temporary reprieve. Read this blog post by Stephen Shankland on Politics and Law.

money.cnn.com • Mon 2009 Jun 29, 4:39pm

Two major computer makers indicate that each will comply with a Chinese law requiring all computers shipped to the country include a particular type of web-filtering software. The recent moves by Acer Inc. (2353.TW) and Sony Corp. (SNE) to comply suggest some PC makers aren't willing to miss out on one of the world's biggest PC markets, despite concerns about abiding by an unpopular government policy, and the potential damage the software itself can do to their computers. [BOYCOTT ACER! BOYCOTT SONY!]

redorbit.com • Mon 2009 Jun 29, 4:35pm

Wikipedia IconThe New York Times reported on Monday that it had collaborated with online encyclopedia Wikipedia to keep news of its kidnapped reporter in Afghanistan from going public for more than seven months.... Times reporter David Rohde... and his translator, Tahir Ludin, were able to make a clean escape from their captors at a facility in Pakistan this month. Prior to their escape, Bill Keller, editor of the Times, asked Wikipedia to keep news of his kidnapping from going public.... Times believed that publicity over his kidnapping would worsen negotiations to ensure Mr. Rohde’s safe return....

government.zdnet.com • Fri 2009 Jun 26, 9:43pm

Chicom Flagfor the Chinese government there really is no difference. Political dissent and pornography are two sides of the same coin — negative forces that disrupt "wholesome society." That's why the same ministry deals with pornography and political speech.

bloomberg.com • Fri 2009 Jun 26, 9:41pm

Chicom FlagGoogle Inc. said it's investigating reports that its Google.com Web site is inaccessible in China, a week after the company was criticized by the government for spreading pornography in the biggest Internet market by users.

Pages