Skip to main content

Home/ Indie Nation/ Group items tagged ide

Rss Feed Group items tagged

John Lemke

Exclusive: Secret contract tied NSA and security industry pioneer | Reuters - 0 views

  • Documents leaked by former NSA contractor Edward Snowden show that the NSA created and promulgated a flawed formula for generating random numbers to create a "back door" in encryption products, the New York Times reported in September. Reuters later reported that RSA became the most important distributor of that formula by rolling it into a software tool called Bsafe that is used to enhance security in personal computers and many other products.Undisclosed until now was that RSA received $10 million in a deal that set the NSA formula as the preferred, or default, method for number generation in the BSafe software, according to two sources familiar with the contract. Although that sum might seem paltry, it represented more than a third of the revenue that the relevant division at RSA had taken in during the entire previous year, securities filings show.
  • RSA, meanwhile, was changing. Bidzos stepped down as CEO in 1999 to concentrate on VeriSign, a security certificate company that had been spun out of RSA. The elite lab Bidzos had founded in Silicon Valley moved east to Massachusetts, and many top engineers left the company, several former employees said.And the BSafe toolkit was becoming a much smaller part of the company. By 2005, BSafe and other tools for developers brought in just $27.5 million of RSA's revenue, less than 9% of the $310 million total."When I joined there were 10 people in the labs, and we were fighting the NSA," said Victor Chan, who rose to lead engineering and the Australian operation before he left in 2005. "It became a very different company later on."By the first half of 2006, RSA was among the many technology companies seeing the U.S. government as a partner against overseas hackers.New RSA Chief Executive Art Coviello and his team still wanted to be seen as part of the technological vanguard, former employees say, and the NSA had just the right pitch. Coviello declined an interview request.An algorithm called Dual Elliptic Curve, developed inside the agency, was on the road to approval by the National Institutes of Standards and Technology as one of four acceptable methods for generating random numbers. NIST's blessing is required for many products sold to the government and often sets a broader de facto standard.RSA adopted the algorithm even before NIST approved it. The NSA then cited the early use of Dual Elliptic Curve inside the government to argue successfully for NIST approval, according to an official familiar with the proceedings.RSA's contract made Dual Elliptic Curve the default option for producing random numbers in the RSA toolkit. No alarms were raised, former employees said, because the deal was handled by business leaders rather than pure technologists.
  • Within a year, major questions were raised about Dual Elliptic Curve. Cryptography authority Bruce Schneier wrote that the weaknesses in the formula "can only be described as a back door."
John Lemke

Man allegedly steals $100k coin collection then spends for face value on pizza and a mo... - 2 views

  • Garren denied the accusation back in May, telling police they, "didn't have any evidence against him," according to a report filed in Cowlitz County Superior Court.
  • But then Garren and Massman allegedly began using the coins at local establishments, spending them at face value, including a quarter that is estimated to be worth thousands of dollars. The Daily News reports the collection includes a variety of rare coins included Liberty Head quarters, Morgan dollars and several others dating back to the early 1800's, After police conducted their investigation, they now say the couple spend several 1930's coins at a Battle Ground area movie theater, using quarters worth between $5 and $68 each. Later on the same day, they then spend more of the coin collection at a local pizza restaurant, including a Liberty quarter with an estimated value between $1,100 and $18,500.
    • John Lemke
       
      I like the "but then" ... like he thought.. better ditch the evidence... no on will notice some of these coins are TWO centuries old"
John Lemke

White House releases trusted Internet ID plan - security, government, Google, Gary Lock... - 0 views

  •  
    The U.S. government will coordinate private-sector efforts to create trusted identification systems for the Internet, with the goal of giving consumers and businesses multiple options for authenticating identity online, according to a plan released by President Barack Obama's administration. The National Institute of Standards and Technology (NIST) will work with private companies to drive development and adoption of trusted ID technologies, White House officials said. The National Strategy for Trusted Identities in Cyberspace (NSTIC), released by the Department of Commerce on Friday, aims to protect the privacy and security of Internet users by encouraging a broad online authentication market in the U.S. "The fact is that the old password and username combination we often use to verify people is no longer good enough," Commerce Secretary Gary Locke said at an NSTIC release event hosted by the U.S. Chamber of Commerce. "It leaves too many consumers, government agencies and businesses vulnerable to ID and data theft."
John Lemke

Ask Ethan #55: Could a Manned Mission to Mars Abort? - Starts With A Bang! - Medium - 0 views

  • No humans have ever traveled farther away from Earth than the crew of Apollo 13 did, as they circled around the far side of the Moon close to lunar apogee, achieving a maximum distance of 400,171 km above the Earth’s surface on April 15, 1970. But when the first manned spaceflight to another planet occurs, that record will be shattered, and in a mere matter of days.
  • The way we currently reach other worlds with our present technology — or any remote location in the Universe — involves three distinct stages:The initial launch, which overcomes the Earth’s gravitational binding energy and starts our spacecraft off with a reasonably large (on the order of a few km/s) velocity relative to the Earth’s motion around the Sun.On-board course corrections, where very small amounts of thrust accelerate the spacecraft to its optimal trajectory.And gravity assists, where we use the gravitational properties of other planets in orbit around the Sun to change our spacecraft’s velocity, either increasing or decreasing its speed with every encounter.It’s through the combination of these three actions that we can reach any location — if we’re patient and we plan properly — with only our current rocket technology.
    • John Lemke
       
      How we can do it now, if we plan right.
  • The initial launch is a very hard part right now. It takes a tremendous amount of resources to overcome the Earth’s gravitational pull, to accelerate a significant amount of mass to the Earth’s escape velocity, and to raise it all the way up through the Earth’s atmosphere.
  • ...2 more annotations...
  • The most optimal one for a one-way trip to Mars, for those of you wondering, that minimizes both flight time and the amount of energy needed, involves simply timing your launch right.
    • John Lemke
       
      The cheapest and the fastest. The one way ticket option.
  • When a planet orbits the Sun, there’s a lot of energy in that system, both gravitational energy and kinetic energy. When a third body interacts gravitationally as well, it can either gain some energy by stealing it from the Sun-planet system, or it can lose energy by giving it up to the Sun-planet system. The amount of energy performed by the spacecraft’s thrusters is often only 20% (or less) of the energy either gained-or-lost from the interaction!
    • John Lemke
       
      The transfer of energy involved to change speeds.
John Lemke

Uroburos Rootkit: Most sophisticated 3-year-old Russian Cyber Espionage Campaign - The ... - 0 views

  • The researchers claimed that the malware may have been active for as long as three years before being discovered and appears to have been created by Russian developers.
  • The two main components of Uroburos are - a driver and an encrypted virtual file system, used to disguise its nasty activities and to try to avoid detection. Its driver part is extremely complex and is designed to be very discrete and very difficult to identify.
  • The virtual file system can’t be decrypted without the presence of drivers, according to the Gdata’s analysis explained in the PDF.
  • ...2 more annotations...
  • we assume that the group behind Uroburos is the same group that performed a cyberattack against the United States of America in 2008 with a malware called Agent.BTZ
  • The attacks carried out with Uroburos are targeting government institutions, research institutions, intelligence agencies, nation states, research institutions or companies dealing with sensitive information as well as similar high-profile targets. The oldest drivers identified by the researchers was compiled in 2011 is the evidence that the malware was created around three years ago and was undetected.
John Lemke

Chinese rover may freeze to death on the moon | The Verge - 0 views

  • Observers say the equipment failure may have disabled the electrical motors needed to close the rover's solar panels, which would have disastrous effects as the rover heads into the two-week "lunar night." If the panels cannot be closed, the rover will almost certainly freeze during the two week span.
John Lemke

NSA reportedly intercepting laptops purchased online to install spy malware | The Verge - 0 views

  • According to a new report from Der Spiegel based on internal NSA documents, the signals intelligence agency's elite hacking unit (TAO) is able to conduct sophisticated wiretaps in ways that make Hollywood fantasy look more like reality. The report indicates that the NSA, in collaboration with the CIA and FBI, routinely and secretly intercepts shipping deliveries for laptops or other computer accessories in order to implant bugs before they reach their destinations. According to Der Spiegel, the NSA's TAO group is able to divert shipping deliveries to its own "secret workshops" in a method called interdiction, where agents load malware onto the electronics or install malicious hardware that can give US intelligence agencies remote access. While the report does not indicate the scope of the program, or who the NSA is targeting with such wiretaps, it's a unique look at the agency's collaborative efforts with the broader intelligence community to gain hard access to communications equipment. One of the products the NSA appears to use to compromise target electronics is codenamed COTTONMOUTH, and has been available since 2009; it's a USB "hardware implant" that secretly provides the NSA with remote access to the compromised machine.
  • The Der Spiegel report, which gives a broad look at TAO operations, also highlights the NSA's cooperation with other intelligence agencies to conduct Hollywood-style raids. Unlike most of the NSA's operations which allow for remote access to targets, Der Spiegel notes that the TAO's programs often require physical access to targets. To gain physical access, the NSA reportedly works with the CIA and FBI on sensitive missions that sometimes include flying NSA agents on FBI jets to plant wiretaps. "This gets them to their destination at the right time and can help them to disappear again undetected after even as little as a half hour's work," the report notes.
  •  
    While the scope or the targets are reportedly not known, the article also does not mention anything about a search warrant. This is what happens when the government feels they are above the law.
John Lemke

Artificial spleen cleans up blood : Nature News & Comment - 0 views

  • A device inspired by the spleen can quickly clean blood of everything from Escherichia coli to Ebola, researchers report on 14 September in Nature Medicine1.
  • Blood infections can be very difficult to treat, and can lead to sepsis, an often-fatal immune response. More than 50% of the time, physicians cannot diagnose the cause of an infection that has prompted sepsis, and so they resort to antibiotics that attack a broad range of bacteria2. This approach is not always effective, and can lead to antibiotic resistance in bacteria.
  • To test the device, Ingber and his team infected rats with either E. coli or Staphylococcus aureus and filtered blood from some of the animals through the biospleen. Five hours after infection, 89% of the rats whose blood had been filtered were still alive, compared with only 14% of those that were infected but not treated.
  • ...3 more annotations...
  • the device had removed more than 90% of the bacteria from the rats' blood.
  • The researchers then tested whether the biospleen could handle the volume of blood in an average adult human — about 5 litres. They ran human blood containing a mixture of bacteria and fungi through the biospleen at a rate of 1 litre per hour, and found that the device removed most of the pathogens within five hours.
  • That degree of efficacy is probably enough to control an infection, Ingber says. Once the biospleen has removed most pathogens from the blood, antibiotics and the immune system can fight off remaining traces of infection — such as pathogens lodged in the organs, he says.
    • John Lemke
       
      In short, it remove enough pathogens to be an effective human treatment.
John Lemke

ground hum in studio a/c - Gearslutz.com - 0 views

  • The $30 20 minute fix. Go to home depot and get a run of 12 gauge green wire, a pair of wire strippers and a pipe ground. Attach the pipe ground to the cold water pipe in your basement that comes from the street. Attach the wire to the pipe ground and run it into your studio. Turn off the circuit breaker and open the outlet(s) and remove the ground that is there and replace it with the wire from the basement. Turn on the circuit breaker. Done and done.
  • your best bet it to drive an actual ground rod (theyre pretty cheap) in your basement 10' deep or so ... then use the grounding techniques as above.... consider using braided wire as well, the larger surface area is better at 'grabbing' and grounding RFI
John Lemke

Simply Scripts - Old Time Radio from the Golden Age of Radio - 0 views

  • Academy Award Theater: "The Maltese Falcon"
  • Academy Award Theater: The Great McGinty
  • Academy Award Theater: Brief Encounter
John Lemke

Inside NZ Police Megaupload files: US investigation began in 2010 | Ars Technica - 0 views

  • Further evidence of overeager and illegal police work emerged Thursday in New Zealand as Inspector General of Security and Intelligence Paul Neazor released a report on the illegal bugging of Kim Dotcom and Megaupload programmer Bram van der Kolk. Two GCSB officers were present at a police station nearby Dotcom’s mansion as the raid took place.
  • Police weighed several options for the raid named “Operation Debut,” undertaken at the behest of US authorities, and sought to take Dotcom and associates with the “greatest element of surprise” and to minimise any delays the in executing the search and seizure operation should the German file sharing tycoon’s staff be uncooperative or even resist officers on arrival.
  • The police planners also noted that “Dotcom will use violence against person’s [sic] and that he has several staff members who are willing to use violence at Dotcom’s bidding” after a U.S. cameraman, Jess Bushyhead, reported the Megaupload founder for assaulting him with his stomach after a dispute. Based on Dotcom’s license plates such as MAFIA, POLICE, STONED, GUILTY, and HACKER, police said this indicates the German “likes to think of himself as a gangster” and is “described as arrogant, flamboyant and having disregard for law enforcement.” However, the documents show that Dotcom had only been caught violating the speed limit in New Zealand. The request for assistance from the STG notes that the US investigation against Mega Media Group and Dotcom was started in March 2010 by prosecutors and the FBI. According to the documents, US prosecutors and FBI “discovered that the Mega Media Group had engaged in and facilitated criminal copyright infringement and money laundering on a massive scale around the world.” FBI in turn contacted NZ Police in “early 2011," requesting assistance with the Mega Media Group investigation as Dotcom had moved to New Zealand at the time.
John Lemke

Yahoo webcam images from millions of users intercepted by GCHQ | World news | theguardi... - 0 views

  • Britain's surveillance agency GCHQ, with aid from the US National Security Agency, intercepted and stored the webcam images of millions of internet users not suspected of wrongdoing, secret documents reveal.
  • between 2008 and 2010
  • Optic Nerve, the documents provided by NSA whistleblower Edward Snowden show, began as a prototype in 2008 and was still active in 2012, according to an internal GCHQ wiki page accessed that year.The system, eerily reminiscent of the telescreens evoked in George Orwell's 1984, was used for experiments in automated facial recognition, to monitor GCHQ's existing targets, and to discover new targets of interest. Such searches could be used to try to find terror suspects or criminals making use of multiple, anonymous user IDs
  • ...1 more annotation...
  • Optic Nerve was based on collecting information from GCHQ's huge network of internet cable taps, which was then processed and fed into systems provided by the NSA. Webcam information was fed into NSA's XKeyscore search tool, and NSA research was used to build the tool which identified Yahoo's webcam traffic.
John Lemke

NSA paid $10 Million bribe to RSA Security for Keeping Encryption Weak - 0 views

  • According to an exclusive report published by Reuters, there is a secret deal between the NSA and respected encryption company RSA to implement a flawed security standard as the default protocol in its products.
  • Earlier Edward Snowden leaks had revealed that the NSA created a flawed random number generation system (Dual_EC_DRBG), Dual Elliptic Curve, which RSA used in its Bsafe security tool and now Snowden has revealed that RSA received $10 million from NSA for keeping Encryption Weak. So, anyone who knows the right numbers used in Random number generator program, can decipher the resulting cryptotext easily.
John Lemke

Video: Sun has 'flipped upside down' as new magnetic cycle begins - Science - News - Th... - 0 views

  • The sun has "flipped upside down", with its north and south poles reversed to reach the midpoint of Solar Cycle 24, Nasa has said. Now, the magnetic fields will once again started moving in opposite directions to begin the completion of the 22 year long process which will culminate in the poles switching once again."A reversal of the sun's magnetic field is, literally, a big event," said Nasa’s Dr. Tony Phillips."The domain of the sun's magnetic influence (also known as the 'heliosphere') extends billions of kilometers beyond Pluto. Changes to the field's polarity ripple all the way out to the Voyager probes, on the doorstep of interstellar space."
  •  
    It is topics like these that Lumpy and Brian often discuss on Tech Net News and Opinion which airs Monday's from 8-10 PM EST. Feel free to join us in geekshed.net IRC in #indienation. We encourage listener participation and having listeners on the air.
John Lemke

Force of nature gave life its asymmetry : Nature News & Comment - 0 views

  • In an experiment that took 13 years to perfect1, the researchers have found that these electrons tend to destroy certain organic molecules slightly more often than they destroy their mirror images.
  • The weak nuclear force, which is involved in nuclear decay, is the only force of nature known to have a handedness preference: electrons created in the subatomic process known as β decay are always 'left-handed'. This means that their spin — a quantum property analogous to the magnetization of a bar magnet — is always opposite in direction to the electron's motion.
  • In all cases the asymmetry was tiny, but consistent, like flipping a not-quite-fair coin. “The scale of the asymmetry is as though we flip 20,000 coins again and again, and on average, 10,003 of them land on heads while 9,997 land on tails,” says Dreiling.
John Lemke

The White House Big Data Report: The Good, The Bad, and The Missing | Electronic Fronti... - 0 views

  • the report recognized that email privacy is critical
  • one issue was left conspicuously unaddressed in the report. The Securities and Exchange Commission, the civil agency in charge of protecting investors and ensuring orderly markets, has been advocating for a special exception to the warrant requirement. No agency can or should have a get-out-of-jail-free card for bypassing the Fourth Amendment.
  • the algorithm is only as fair as the data fed into it.
  • ...22 more annotations...
  • the danger of discrimination remains due to the very digital nature of big data
  • especially the elderly, minorities, and the poor
  • an example of this in Boston, which had a pilot program to allow residents to report potholes through a mobile app but soon recognized that the program was inherently flawed because “wealthy people were far more likely to own smart phones and to use the Street Bump app. Where they drove, potholes were found; where they didn’t travel, potholes went unnoted.”
  • The authors of the report agree, recommending that the Privacy Act be extended to all people, not just US persons.
  • metadata (the details associated with your communications, content, or actions, like who you called, or what a file you uploaded file is named, or where you were when you visited a particular website) can expose just as much information about you as the “regular” data it is associated with, so it deserves the same sort of privacy protections as “regular” data.
    • John Lemke
       
      What is Metadate... then discuss
  • The report merely recommended that the government look into the issue.
    • John Lemke
       
      Did the report give a strong enough recommendation? "looking into" and doing are much different
  • several other government reports have taken a much stronger stance and explicitly stated that metadata deserves the same level of privacy protections as “regular” data.
  • We think the report should have followed the lead of the PCAST report and acknowledged that the distinction between data and metadata is an artificial one, and recommended the appropriate reforms.
    • John Lemke
       
      I very strongly agree.  The report failed in this area.
  • the White House suggested advancing the Consumer Privacy Bill of Rights, which includes the idea that “consumers have a right to exercise control over what personal data companies collect from them and how they use it,” as well as “a right to access and correct personal data.”
  • Consumers have a right to know when their data is exposed, whether through corporate misconduct, malicious hackers, or under other circumstances. Recognizing this important consumer safeguard, the report recommends that Congress “should pass legislation that provides a single national data breach standard along the lines of the Administration's May 2011 Cybersecurity legislative proposal.”
  • While at first blush this may seem like a powerful consumer protection, we don’t think that proposal is as strong as existing California law. The proposed federal data breach notification scheme would preempt state notification laws, removing the strong California standard and replacing it with a weaker standard.
    • John Lemke
       
      In other words, it failed at what can be done and it would actually lower standards when compared to what California has in place currently.
  • We were particularly disconcerted
  • the Fort Hood shooting by Major Nidal Hasan
    • John Lemke
       
      WTF? how did he get in this group?
  • two big concerns
  • First, whistleblowers are simply not comparable to an Army officer who massacres his fellow soldiers
  • Secondly, the real big-data issue at play here is overclassification of enormous quantities of data.
  • Over 1.4 million people hold top-secret security clearances. In 2012, the government classified 95 million documents. And by some estimates, the government controls more classified information than there is in the entire Library of Congress.
    • John Lemke
       
      Don't leave this stat out.  More classified documents than LOC documents.  WTF? A "democracy" with more secret documents than public?
  • The report argues that in today’s connected world it’s impossible for consumers to keep up with all the data streams they generate (intentionally or not), so the existing “notice and consent” framework (in which companies must notify and get a user’s consent before collecting data) is obsolete. Instead, they suggest that more attention should be paid to how data is used, rather than how it is collected.
    • John Lemke
       
      This is the most troubling part perhaps,  isn't the collection without consent where the breech of privacy begins?
    • John Lemke
       
      "notice and consent"
  • An unfortunate premise of this argument is that automatic collection of data is a given
  • While we agree that putting more emphasis on responsible use of big data is important, doing so should not completely replace the notice and consent framework.
  • Despite being a fairly thorough analysis of the privacy implications of big data, there is one topic that it glaringly omits: the NSA’s use of big data to spy on innocent Americans.
    • John Lemke
       
      If we ignore it, it will go away?  Did they not just mostly ignore it and accept it as a given for corporations and completely ignore it regarding the government? Pretty gangster move isn't it?
  • Even though the review that led to this report was announced during President Obama’s speech on NSA reform, and even though respondents to the White House’s Big Data Survey “were most wary of how intelligence and law enforcement agencies are collecting and using data about them,” the report itself is surprisingly silent on the issue.2 This is especially confusing given how much the report talks about the need for more transparency in the private sector when it comes to big data. Given that this same logic could well be applied to intelligence big data programs, we don’t understand why the report did not address this vital issue.
John Lemke

The Walking Dead Adds Tyler James Williams - ComingSoon.net - 0 views

  • A new addition to the cast of "The Walking Dead" has been revealed today! The Hollywood Reporter brings word that Tyler James Williams (Peeples, "Go On," "Everybody Hates Chris") is set to play a mysterious character named Noah in the upcoming fifth season, which debuts on AMC next month.
  • The overall franchise also has a character named Noah Cruz, who appeared in the prequel video game The Walking Dead: Survival Instinct. Given that the Cruz character roughly matches Williams' age and ethnicity, it's possible that that's who we'll be seeing in future episodes.
John Lemke

Beyond The Dawn - 0 views

shared by John Lemke on 09 Aug 11 - No Cached
  • Twitter Directory and Search, Find Twitter Followers : WeFollow wefollow.com - Find Twitter celebrities, actors, TV personalities, or new Twitter friends in your area. WeFollow is a directory of Twitter users organized by interests. Find likeminded friends today! davehennmusic davehennmusic Just added myself to the http://wefollow.com twitter directory under: #chicago_il #music #indie #songwriting #chicago #musician about 2 hours ago Reply Retweet Follow Unfollow Favorite Suicide Silence | Indienation.fm indienation.fm - At the RockStar Energy Mayhem Festival it was my great pleasure to sit down with Mark Heylmun the guitarist from Suicide Silence. If you have yet to hear their music, Suicide Silence performs an ex...
  • Suicide Silence | Indienation.fm indienation.fm - At the RockStar Energy Mayhem Festival it was my great pleasure to sit down with Mark Heylmun the guitarist from Suicide Silence. If you have yet to hear their music, Suicide Silence performs an ex...
1 - 20 of 23 Next ›
Showing 20 items per page