Skip to main content

Home/ Indie Nation/ Group items tagged html

Rss Feed Group items tagged

John Lemke

Ain't No Science Fiction, Suspended Animation Is FDA Approved and Heading To Clinical T... - 0 views

  • The Food and Drug Administration has already approved his technique for human trials, and he has secured funding from the Army to conduct the feasibility phase. Dr. Rhee is currently lobbying for funds to conduct a full trial. If he’s successful human trials could begin as early as next year.
  • What Dr. Rhee hopes to test on humans is a method he worked out for the past couple decades on pigs. Patients would be injected with a cold fluid to induce severe hypothermia. Clinically hypothermia is characterized by the drop of a person’s body temperature from its normal 98.6 degrees Fahrenheit (37 degrees Celcius) to lower than 95 degrees (35 C). Below 95, the heart, nervous system and other organs begin to fail. The strict range is indicative of a metabolic system with strict temperature requirements for proper function (death waits only a few degrees the other way as well). Dr. Rhee’s method involves injecting patients with a cold fluid that would bring the body’s temperature down to 50 degrees Fahrenheit (10 C). Sounds chilling, but when he induced the extreme hypothermia in pigs they came out just fine. Heart function, breathing, and brain function was completely normal.
  • Dr. Rhee is no stranger to high-stakes medicine. The native South Korean was trained at the Uniformed Services University Medical School in Bethesda, Maryland. Following a fellowship in trauma and critical care at the University of Washington’s Harborview Medical Center he served in the US Navy as director of the University of South California’s Navy Trauma Training Center at Los Angeles County. He was then sent to Afghanistan where he was one of the first surgeons at Camp Rhino. Later he started the first surgical unit at Ramadi, Iraq. His cool under fire was on display nationally as he performed surgery on US Representative Gabrielle Giffords after she was shot through the skull in the Tucson shootings this past January. His experience with induced hypothermia came into play the night of the shootings when Dr. Rhee removed part of the congresswoman’s skull. The wound had raised her body temperature and began “cooking the brain.” He used a device to cool Rep. Giffords’ skin.
John Lemke

US banks hit by more than a week of cyberattacks (Update) - 0 views

    • John Lemke
       
      They believe it was not a hacktivist attack because they are usually also associated with a rise in IRC and social network activity, those who would be joining the hacktivist event, and this even had no such spike.
  • Could a state actor be at play? U.S. Senator Joe Lieberman, without offering any proof, said he believed the assaults were carried out by Iran in retaliation for tightened economic sanctions imposed by the United States and its allies.
  • only a handful of groups out there that have the technical ability or incentive
  • ...3 more annotations...
  • at least half a dozen banks—including the Bank of America, JPMorgan Chase, and Citigroup—have witnessed traffic surges and disruptions. Not all have confirmed they were the victims of an online onslaught, but such surges are a hallmark of denial-of-service attacks, which work by drowning target websites with streams of junk data.
  • Such attacks are fairly common and generally don't compromise sensitive data or do any lasting damage. Still, they can be a huge headache for companies that rely on their websites to interact with customers.
  • Most say the recent spate of attacks has been unusually powerful. PNC bank, which was hit on Thursday, has never seen such a strong surge in traffic, spokesman Fred Solomon said in a telephone interview. Smith said he estimated the flow of data at 60 to 65 gigabits per second.
John Lemke

Germany: Mosley takes on Google in privacy fight - 0 views

  • claiming the search engine is breaking German privacy laws by providing links to websites hosting a hidden-camera video of him at a sadomasochistic sex party.
  • Mosley successfully sued a British tabloid over a 2008 story headlined "Formula One boss has sick Nazi orgy with five hookers." Mosley has acknowledged the orgy, but says the story was an "outrageous" invasion of privacy and the Nazi allegation was damaging and "completely untrue."
John Lemke

'Smartware' clothing could signal impending epileptic seizures - 0 views

  • They are currently working on 'smartware', fabrics that treat chronic wounds that result from diabetes and leg ulcers. Their 'senseware' technology, which is motion sensors found inside textiles, can give medical professionals the tools they need to detect the onset of epileptic seizures. The centre's 'bioware' technology is embedded materials and surfaces found in the home and on the body.
  •  
    "They are currently working on 'smartware', fabrics that treat chronic wounds that result from diabetes and leg ulcers. Their 'senseware' technology, which is motion sensors found inside textiles, can give medical professionals the tools they need to detect the onset of epileptic seizures. The centre's 'bioware' technology is embedded materials and surfaces found in the home and on the body."
John Lemke

Snowden documents show British digital spies use viruses and 'honey traps' * The Register - 0 views

  • "deny, disrupt, degrade and deceive" by any means possible.
  • According to reports in Der Spiegel last year, British intelligence has tapped the reservations systems of over 350 top hotels around the world for the past three years to set up Royal Concierge. It was used to spy on trade delegations, foreign diplomats, and other targets with a taste for the high life.
  • A PowerPoint presentation from 2010 states that JTRIG activities account for five per cent of GCHQ's operations budget and uses a variety of techniques. These include "call bombing" to drown out a target's ability to receive messages, attacking targets in hotels, Psyops (psychological operations) against individuals, and going all the way up to disrupting a country's critical infrastructure.
  • ...1 more annotation...
  • Targets can also be discredited with a "honey trap", whereby a fake social media profile is created, maybe backed up by a personal blog to provide credibility. This could be used to entice someone into making embarrassing confessions, which the presentation notes described as "a great option" and "very successful when it works."
  •  
    All that evil spy stuff in the hands of the government.   Big Brother is real.  Too Fin' real.
John Lemke

Caphaw Banking Malware Distributed via YouTube Ads - The Hacker News - 0 views

  • The Exploitation process relied upon a Java vulnerability (CVE-2013-2460) and after getting dropped into the target computer system, the malware detects the Java version installed on the operating system and based upon it requests the suitable exploit.
John Lemke

Uroburos Rootkit: Most sophisticated 3-year-old Russian Cyber Espionage Campaign - The ... - 0 views

  • The researchers claimed that the malware may have been active for as long as three years before being discovered and appears to have been created by Russian developers.
  • The two main components of Uroburos are - a driver and an encrypted virtual file system, used to disguise its nasty activities and to try to avoid detection. Its driver part is extremely complex and is designed to be very discrete and very difficult to identify.
  • The virtual file system can’t be decrypted without the presence of drivers, according to the Gdata’s analysis explained in the PDF.
  • ...2 more annotations...
  • we assume that the group behind Uroburos is the same group that performed a cyberattack against the United States of America in 2008 with a malware called Agent.BTZ
  • The attacks carried out with Uroburos are targeting government institutions, research institutions, intelligence agencies, nation states, research institutions or companies dealing with sensitive information as well as similar high-profile targets. The oldest drivers identified by the researchers was compiled in 2011 is the evidence that the malware was created around three years ago and was undetected.
John Lemke

Robert Duncan Begins Prison Sentence For Working In Legal Medical Pot Shop - 0 views

  • Duncan does not have a background in the marijuana industry, and only began working for the dispensary after being laid off from a more traditional sales job as the economy soured. After the raid, he returned to mainstream employment and up until recently was a sales manager at a Bay Area merchandising company; Duncan told The Huffington Post that he wouldn't have taken the pot job if the feds hadn't signaled that they'd steer clear of medical marijuana businesses that were in compliance with state laws."It was shortly after the federal government said it would not intervene if people followed state law," Duncan said. "We wanted to abide by the rules. None of us had criminal backgrounds. We’re all regular guys. The only reason we got into this was because the federal government said they wouldn’t intervene."
John Lemke

NSA paid $10 Million bribe to RSA Security for Keeping Encryption Weak - 0 views

  • According to an exclusive report published by Reuters, there is a secret deal between the NSA and respected encryption company RSA to implement a flawed security standard as the default protocol in its products.
  • Earlier Edward Snowden leaks had revealed that the NSA created a flawed random number generation system (Dual_EC_DRBG), Dual Elliptic Curve, which RSA used in its Bsafe security tool and now Snowden has revealed that RSA received $10 million from NSA for keeping Encryption Weak. So, anyone who knows the right numbers used in Random number generator program, can decipher the resulting cryptotext easily.
John Lemke

The NSA Uses Powerful Toolbox in Effort to Spy on Global Networks - SPIEGEL ONLINE - 0 views

  • According to internal NSA documents viewed by SPIEGEL, these on-call digital plumbers are involved in many sensitive operations conducted by American intelligence agencies. TAO's area of operations ranges from counterterrorism to cyber attacks to traditional espionage. The documents reveal just how diversified the tools at TAO's disposal have become -- and also how it exploits the technical weaknesses of the IT industry, from Microsoft to Cisco and Huawei, to carry out its discreet and efficient attacks. The unit is "akin to the wunderkind of the US intelligence community," says Matthew Aid, a historian who specializes in the history of the NSA. "Getting the ungettable" is the NSA's own description of its duties. "It is not about the quantity produced but the quality of intelligence that is important," one former TAO chief wrote, describing her work in a document. The paper seen by SPIEGEL quotes the former unit head stating that TAO has contributed "some of the most significant intelligence our country has ever seen." The unit, it goes on, has "access to our very hardest targets."
  •  
    Page One of a good three page read on just how extensive the government's illegal spying operations actually are... the worst part is it is just how extensive the portions of it we know about are!
John Lemke

Video: Sun has 'flipped upside down' as new magnetic cycle begins - Science - News - Th... - 0 views

  • The sun has "flipped upside down", with its north and south poles reversed to reach the midpoint of Solar Cycle 24, Nasa has said. Now, the magnetic fields will once again started moving in opposite directions to begin the completion of the 22 year long process which will culminate in the poles switching once again."A reversal of the sun's magnetic field is, literally, a big event," said Nasa’s Dr. Tony Phillips."The domain of the sun's magnetic influence (also known as the 'heliosphere') extends billions of kilometers beyond Pluto. Changes to the field's polarity ripple all the way out to the Voyager probes, on the doorstep of interstellar space."
  •  
    It is topics like these that Lumpy and Brian often discuss on Tech Net News and Opinion which airs Monday's from 8-10 PM EST. Feel free to join us in geekshed.net IRC in #indienation. We encourage listener participation and having listeners on the air.
John Lemke

NSA reportedly intercepting laptops purchased online to install spy malware | The Verge - 0 views

  • According to a new report from Der Spiegel based on internal NSA documents, the signals intelligence agency's elite hacking unit (TAO) is able to conduct sophisticated wiretaps in ways that make Hollywood fantasy look more like reality. The report indicates that the NSA, in collaboration with the CIA and FBI, routinely and secretly intercepts shipping deliveries for laptops or other computer accessories in order to implant bugs before they reach their destinations. According to Der Spiegel, the NSA's TAO group is able to divert shipping deliveries to its own "secret workshops" in a method called interdiction, where agents load malware onto the electronics or install malicious hardware that can give US intelligence agencies remote access. While the report does not indicate the scope of the program, or who the NSA is targeting with such wiretaps, it's a unique look at the agency's collaborative efforts with the broader intelligence community to gain hard access to communications equipment. One of the products the NSA appears to use to compromise target electronics is codenamed COTTONMOUTH, and has been available since 2009; it's a USB "hardware implant" that secretly provides the NSA with remote access to the compromised machine.
  • The Der Spiegel report, which gives a broad look at TAO operations, also highlights the NSA's cooperation with other intelligence agencies to conduct Hollywood-style raids. Unlike most of the NSA's operations which allow for remote access to targets, Der Spiegel notes that the TAO's programs often require physical access to targets. To gain physical access, the NSA reportedly works with the CIA and FBI on sensitive missions that sometimes include flying NSA agents on FBI jets to plant wiretaps. "This gets them to their destination at the right time and can help them to disappear again undetected after even as little as a half hour's work," the report notes.
  •  
    While the scope or the targets are reportedly not known, the article also does not mention anything about a search warrant. This is what happens when the government feels they are above the law.
John Lemke

Leaked Snowden documents detail NSA's plans for 'millions' of malware attacks | The Verge - 0 views

  • A program known as TURBINE, first revealed last year, is meant to dramatically speed the process: one document says it will "allow the current implant network to scale to large size (millions of implants) by creating a system that does automated control implants by groups instead of individually."
  • The scaling process, according to Greenwald, started in 2004, when the NSA operated only 100 to 150 software implants. The number of implants used in the years between 2010 to 2012, by contrast, is described as numbering in the tens of thousands.
John Lemke

2 million Facebook, Gmail and Twitter passwords stolen in massive hack - Dec. 4, 2013 - 0 views

  • The massive data breach was a result of keylogging software maliciously installed on an untold number of computers around the world,
  • The virus was capturing log-in credentials for key websites over the past month and sending those usernames and passwords to a server controlled by the hackers.
  • Of all the compromised services, Miller said he is most concerned with ADP. Those log-ins are typically used by payroll personnel who manage workers' paychecks. Any information they see could be viewed by hackers until passwords are reset.
  • ...1 more annotation...
  • But in a statement, ADP said that, "To [its] knowledge, none of ADP's clients has been adversely affected by the compromised credentials."
John Lemke

TSA agent confiscates sock monkey's toy pistol | KING5.com Seattle - 0 views

  • Rooster Monkburn" the cowboy sock monkey is without his pistol, thanks to a diligent TSA agent in St. Louis.
  • May said the TSA agent went through the bag, through the sewing supplies and found the two-inch long pistol. “She said ‘this is a gun,’” said May. “I said no, it’s not a gun it’s a prop for my monkey.” “She said ‘If I held it up to your neck, you wouldn’t know if it was real or not,’ and I said ‘really?’” said May.
John Lemke

Officials Say U.S. May Never Know Extent of Snowden's Leaks - NYTimes.com - 0 views

  • “They’ve spent hundreds and hundreds of man-hours trying to reconstruct everything he has gotten, and they still don’t know all of what he took,” a senior administration official said. “I know that seems crazy, but everything with this is crazy.”
  • In recent days, a senior N.S.A. official has told reporters that he believed Mr. Snowden still had access to documents not yet disclosed. The official, Rick Ledgett, who is heading the security agency’s task force examining Mr. Snowden’s leak, said he would consider recommending amnesty for Mr. Snowden in exchange for those documents.
  • “So, my personal view is, yes, it’s worth having a conversation about,” Mr. Ledgett told CBS News. “I would need assurances that the remainder of the data could be secured, and my bar for those assurances would be very high. It would be more than just an assertion on his part.”
John Lemke

NSA's bulk phone data collection ruled unconstitutional, 'almost Orwellian,' by federal... - 0 views

  • “The government does not cite a single case in which analysis of the NSA’s bulk metadata collection actually stopped an imminent terrorist attack,” the judge wrote.
  • “Given the limited record before me at this point in the litigation – most notably, the utter lack of evidence that a terrorist attack has ever been prevented because searching the NSA database was faster than other investigative tactics – I have serious doubts about the efficacy of the metadata collection program as a means of conducting time-sensitive investigations in cases involving imminent threats of terrorism.”
  • “I acted on my belief that the NSA's mass surveillance programs would not withstand a constitutional challenge, and that the American public deserved a chance to see these issues determined by open courts,” Snowden wrote. “Today, a secret program authorized by a secret court was, when exposed to the light of day, found to violate Americans’ rights. It is the first of many.”
John Lemke

FireChat: The internet-free messaging app that's sweeping the world - News - Gadgets an... - 0 views

  • t's a messaging app for iOS.
  • based on peer-to-peer “mesh networking” and connects to nearby phones using Bluetooth and WiFi, with connectivity increasing as more people use it in an area.
  • In Hong Kong mostly, where pro-democracy protesters are using it to communicate amid fears of network shutdowns. It's also been used by Iraqis and Taiwanese students during their anti-Beijing Sunflower Movement. Aside from not being reliant on the internet (which some governments restrict), it is more clandestine and less traceable.
John Lemke

FBI Arrested CEO of 'StealthGenie' for Selling Mobile Spyware Apps - 0 views

  • The Federal Bureau of Investigation (FBI) has arrested the CEO of a UK-based company for allegedly advertising and selling a spyware app to individuals who suspect their romantic partners of cheating on them.
  • The dodgy cell phone spyware application, dubbed as StealthGenie, monitors victims’ phone calls, text messages, videos, emails and other communications "without detection" when it is installed on a target's phone, according to the Department of Justice.
  • Once installed on the phone, it allows conversations to be monitored as they take place, enables the purchaser to call the phone and activate it at any time to monitor all surrounding conversations within a 15-foot radius, and collects the user’s incoming and outgoing email and SMS messages, incoming voicemail, address book, calendar, photographs, and videos. All of these functions are enabled without the knowledge of the user of the phone.
  • ...1 more annotation...
  • Akbar was charged with conspiracy, sale of a surreptitious interception device, advertisement of a known interception device and advertising a device as a surreptitious interception device in US District Court for the Eastern District of Virginia.
‹ Previous 21 - 40 of 86 Next › Last »
Showing 20 items per page