Skip to main content

Home/ Indie Nation/ Group items tagged identity

Rss Feed Group items tagged

John Lemke

How LexisNexis and others may have unwittingly aided identity thieves | Ars Technica - 0 views

  • Wednesday's report exposes serious risks in what banks, mortgage companies, and other financial services call "knowledge-based authentication." Representatives from these services frequently rely on a list of about 100 questions such as "What was your previous address?" or "Which company services your mortgage?" when trying to determine if the person on the phone or filling out an application is the individual he claims to be. Ready access to the data stored by the data aggregators can make the difference between a fraudulent application being approved or rejected. Krebs goes on to recount a story told by Gartner fraud analyst Avivah Litan about a fellow analyst who witnessed an identity thief in action.
John Lemke

White House releases trusted Internet ID plan - security, government, Google, Gary Lock... - 0 views

  •  
    The U.S. government will coordinate private-sector efforts to create trusted identification systems for the Internet, with the goal of giving consumers and businesses multiple options for authenticating identity online, according to a plan released by President Barack Obama's administration. The National Institute of Standards and Technology (NIST) will work with private companies to drive development and adoption of trusted ID technologies, White House officials said. The National Strategy for Trusted Identities in Cyberspace (NSTIC), released by the Department of Commerce on Friday, aims to protect the privacy and security of Internet users by encouraging a broad online authentication market in the U.S. "The fact is that the old password and username combination we often use to verify people is no longer good enough," Commerce Secretary Gary Locke said at an NSTIC release event hosted by the U.S. Chamber of Commerce. "It leaves too many consumers, government agencies and businesses vulnerable to ID and data theft."
John Lemke

Hackers charged with stealing Xbox, 'Call of Duty,' and US Army secrets worth over $100... - 0 views

  • Four hackers have been jointly charged with conspiracies to commit computer fraud, copyright infringement, wire fraud, mail fraud, identity theft, and theft of trade secrets. Individually, they have been charged with counts of aggravated identity theft, unauthorized computer access, copyright infringement, and wire fraud.
  • The defendants, aged between 18 and 28, are believed to have stolen more than $100 million in intellectual property and other proprietary data from the likes of Microsoft Corporation, Epic Games, Valve, and even the US Army. This includes pre-release versions of Gears of War 3 and Call of Duty: Modern Warfare 3, Apache helicopter simulation software developed for the US army, and information about the Xbox One console. Two of the suspects have pleaded guilty, one of which is 22-year old David Pokora. His plea represents what may be the first conviction of a foreign-based individual for hacking into US businesses to steal trade secret information.
  • 18-count superseding indictment
John Lemke

Air Force Wants Hundreds of Fake Online Identities - Slashdot - 0 views

  •  
    security privacy etc.
John Lemke

Cambodia Wants Mandatory Surveillance Cameras In Internet Cafes | Techdirt - 0 views

  • All telecommunications operators, sales outlets and distributors are obliged to register their business at local authorities. Meanwhile, all locations serving telephone services and Internet shall be equipped with closed circuit television camera and shall store footage data of users for at least 03 months. Telephone service corporation owners along public roads shall record National Identity Cards of any subscriber.
John Lemke

How Covert Agents Infiltrate the Internet to Manipulate, Deceive, and Destroy Reputatio... - 0 views

  • “The Art of Deception: Training for Online Covert Operations.”
  • Among the core self-identified purposes of JTRIG are two tactics: (1) to inject all sorts of false material onto the internet in order to destroy the reputation of its targets; and (2) to use social sciences and other techniques to manipulate online discourse and activism to generate outcomes it considers desirable. To see how extremist these programs are, just consider the tactics they boast of using to achieve those ends: “false flag operations” (posting material to the internet and falsely attributing it to someone else), fake victim blog posts (pretending to be a victim of the individual whose reputation they want to destroy), and posting “negative information” on various forums. 
  • Critically, the “targets” for this deceit and reputation-destruction extend far beyond the customary roster of normal spycraft: hostile nations and their leaders, military agencies, and intelligence services. In fact, the discussion of many of these techniques occurs in the context of using them in lieu of “traditional law enforcement” against people suspected (but not charged or convicted) of ordinary crimes or, more broadly still, “hacktivism”, meaning those who use online protest activity for political ends. The title page of one of these documents reflects the agency’s own awareness that it is “pushing the boundaries” by using “cyber offensive” techniques against people who have nothing to do with terrorism or national security threats, and indeed, centrally involves law enforcement agents who investigate ordinary crimes:
    • John Lemke
       
      Wow, how is not changing pictures and creating false victims not identity theft and conspiracy?  
  • ...4 more annotations...
  • it is not difficult to see how dangerous it is to have secret government agencies being able to target any individuals they want – who have never been charged with, let alone convicted of, any crimes – with these sorts of online, deception-based tactics of reputation destruction and disruption.
    • John Lemke
       
      Not only are you now guilty until proven innocent but, if you are guilty enough, we shall create a situation so that you are.
  • Government plans to monitor and influence internet communications, and covertly infiltrate online communities in order to sow dissension and disseminate false information, have long been the source of speculation. Harvard Law Professor Cass Sunstein, a close Obama adviser and the White House’s former head of the Office of Information and Regulatory Affairs, wrote a controversial paper in 2008 proposing that the US government employ teams of covert agents and pseudo-”independent” advocates to “cognitively infiltrate” online groups and websites, as well as other activist groups. Sunstein also proposed sending covert agents into “chat rooms, online social networks, or even real-space groups” which spread what he views as false and damaging “conspiracy theories” about the government. Ironically, the very same Sunstein was recently named by Obama to serve as a member of the NSA review panel created by the White House, one that – while disputing key NSA claims – proceeded to propose many cosmetic reforms to the agency’s powers (most of which were ignored by the President who appointed them).
    • John Lemke
       
      So one of the guys who advocates this and approves of it, gets to be on the NSA review committee?  Isn't that like Ted Kennedy on the Ethics Review Committee or the Warren Commission?
  • Whatever else is true, no government should be able to engage in these tactics: what justification is there for having government agencies target people – who have been charged with no crime – for reputation-destruction, infiltrate online political communities, and develop techniques for manipulating online discourse? But to allow those actions with no public knowledge or accountability is particularly unjustifiable.
John Lemke

South Korean Scientists Use E. Coli to Make Gasoline - Korea Real Time - WSJ - 0 views

  • Using genetically modified E. coli to generate biofuel isn’t new. U.K. scientists said in April they have developed a process under which the bacterium turns biomass into an oil that is almost identical to conventional diesel–a development that followed similar research by U.S. biotechnology firm LS9 in 2010. But the breakthrough this time is important because the reprogrammed E. coli can produce gasoline, a high-premium oil product that’s more expensive than diesel if the biofuel becomes commercially viable, according to Prof. Lee Sang-yup at the Korea Advanced Institute of Science and Technology. His team’s study was published in the international science journal Nature on Monday.
  • The significance of this breakthrough is that you don’t have to go through another process to crack the oil created by E. coli to produce gasoline. We have succeeded in converting glucose or waste biomass directly into gasoline,
  • only a few drops of the fuel per hour—making just 580 milligrams of gasoline from one liter of glucose culture.
John Lemke

Payback time: First patent troll ordered to pay "extraordinary case" fees | Ars Technica - 0 views

  • In the recent Octane Fitness case (PDF), the Supreme Court changed the test for fee-shifting precisely to deter behavior such as Lumen's, Cote found. Lumen didn't do "any reasonable pre-suit investigation," and filed a number of near-identical "boilerplate" complaints in a short time frame. That all suggests "Lumen’s instigation of baseless litigation is not isolated to this instance, but is instead part of a predatory strategy aimed at reaping financial advantage from the inability or unwillingness of defendants to engage in litigation against even frivolous patent lawsuits."
John Lemke

New Theory Suggests Parallel Universes Interact With And Affect Our Own Universe | IFLS... - 0 views

  • This new theory suggests that all of these infinite multiple worlds overlap and occupy the same region of time and space simultaneously, just like a quantum state. 
  • Under this new interpretation, some worlds in parallel universes would be nearly identical. In others, the “Butterfly Effect” is responsible for completely different outcomes. Each universe is equally real; it isn’t that one universe is the truth while others are bizarre copies or lesser in any way. Wiseman also believes that the quantum forces responsible for driving this shared existence are also responsible for causing quantum interactions between the worlds.
1 - 9 of 9
Showing 20 items per page