Skip to main content

Home/ Indie Nation/ Group items tagged targets

Rss Feed Group items tagged

John Lemke

Beyond The Dawn - 0 views

shared by John Lemke on 09 Aug 11 - No Cached
  • Twitter Directory and Search, Find Twitter Followers : WeFollow wefollow.com - Find Twitter celebrities, actors, TV personalities, or new Twitter friends in your area. WeFollow is a directory of Twitter users organized by interests. Find likeminded friends today! davehennmusic davehennmusic Just added myself to the http://wefollow.com twitter directory under: #chicago_il #music #indie #songwriting #chicago #musician about 2 hours ago Reply Retweet Follow Unfollow Favorite Suicide Silence | Indienation.fm indienation.fm - At the RockStar Energy Mayhem Festival it was my great pleasure to sit down with Mark Heylmun the guitarist from Suicide Silence. If you have yet to hear their music, Suicide Silence performs an ex...
  • Suicide Silence | Indienation.fm indienation.fm - At the RockStar Energy Mayhem Festival it was my great pleasure to sit down with Mark Heylmun the guitarist from Suicide Silence. If you have yet to hear their music, Suicide Silence performs an ex...
John Lemke

NSA reportedly intercepting laptops purchased online to install spy malware | The Verge - 0 views

  • According to a new report from Der Spiegel based on internal NSA documents, the signals intelligence agency's elite hacking unit (TAO) is able to conduct sophisticated wiretaps in ways that make Hollywood fantasy look more like reality. The report indicates that the NSA, in collaboration with the CIA and FBI, routinely and secretly intercepts shipping deliveries for laptops or other computer accessories in order to implant bugs before they reach their destinations. According to Der Spiegel, the NSA's TAO group is able to divert shipping deliveries to its own "secret workshops" in a method called interdiction, where agents load malware onto the electronics or install malicious hardware that can give US intelligence agencies remote access. While the report does not indicate the scope of the program, or who the NSA is targeting with such wiretaps, it's a unique look at the agency's collaborative efforts with the broader intelligence community to gain hard access to communications equipment. One of the products the NSA appears to use to compromise target electronics is codenamed COTTONMOUTH, and has been available since 2009; it's a USB "hardware implant" that secretly provides the NSA with remote access to the compromised machine.
  • The Der Spiegel report, which gives a broad look at TAO operations, also highlights the NSA's cooperation with other intelligence agencies to conduct Hollywood-style raids. Unlike most of the NSA's operations which allow for remote access to targets, Der Spiegel notes that the TAO's programs often require physical access to targets. To gain physical access, the NSA reportedly works with the CIA and FBI on sensitive missions that sometimes include flying NSA agents on FBI jets to plant wiretaps. "This gets them to their destination at the right time and can help them to disappear again undetected after even as little as a half hour's work," the report notes.
  •  
    While the scope or the targets are reportedly not known, the article also does not mention anything about a search warrant. This is what happens when the government feels they are above the law.
John Lemke

NSA reportedly 'piggybacking' on Google advertising cookies to home in on surveillance ... - 0 views

  • US surveillance agency may be using Google's advertising cookies to track and "pinpoint" targets for government hacking and location-tracking. According to Snowden's leaked presentation slides, both the NSA and the British equivalent, the GCHQ, are using a Google-specific ad cookie (know as "PREF") as a way of homing in on specific surveillance targets. While Google's cookie doesn't contain personal information like a name or email address, it does contain numeric codes that uniquely identify a user's browser.
  • The report notes that the NSA doesn't use this technique to find suspicious activity amidst the massive flood of internet communication that takes place every day — instead, it uses it to home in on targets already under suspicion.
John Lemke

NSA reportedly targeted as many as 122 world leaders for surveillance | The Verge - 0 views

  • The documents, leaked to the publications by Edward Snowden, contain a list of 11 world leaders that have been targeted by a system known as Nymrod — however the document implies the actual number targeted was 122. Nymrod is reportedly a system designed to automatically extract citations ("cites") out of a multiplicity of sources, including voice and computer communications. German Chancellor Angela Merkel is listed by name, as are more obvious targets like Syrian president Bashar Asad and former Ukranian prime minister Yulia Tymoshenko. Various leaders apparently have "cites" automatically added to to a "Target Knowledge Database."
John Lemke

Snowden documents show British digital spies use viruses and 'honey traps' * The Register - 0 views

  • "deny, disrupt, degrade and deceive" by any means possible.
  • According to reports in Der Spiegel last year, British intelligence has tapped the reservations systems of over 350 top hotels around the world for the past three years to set up Royal Concierge. It was used to spy on trade delegations, foreign diplomats, and other targets with a taste for the high life.
  • A PowerPoint presentation from 2010 states that JTRIG activities account for five per cent of GCHQ's operations budget and uses a variety of techniques. These include "call bombing" to drown out a target's ability to receive messages, attacking targets in hotels, Psyops (psychological operations) against individuals, and going all the way up to disrupting a country's critical infrastructure.
  • ...1 more annotation...
  • Targets can also be discredited with a "honey trap", whereby a fake social media profile is created, maybe backed up by a personal blog to provide credibility. This could be used to entice someone into making embarrassing confessions, which the presentation notes described as "a great option" and "very successful when it works."
  •  
    All that evil spy stuff in the hands of the government.   Big Brother is real.  Too Fin' real.
John Lemke

How Covert Agents Infiltrate the Internet to Manipulate, Deceive, and Destroy Reputatio... - 0 views

  • “The Art of Deception: Training for Online Covert Operations.”
  • Among the core self-identified purposes of JTRIG are two tactics: (1) to inject all sorts of false material onto the internet in order to destroy the reputation of its targets; and (2) to use social sciences and other techniques to manipulate online discourse and activism to generate outcomes it considers desirable. To see how extremist these programs are, just consider the tactics they boast of using to achieve those ends: “false flag operations” (posting material to the internet and falsely attributing it to someone else), fake victim blog posts (pretending to be a victim of the individual whose reputation they want to destroy), and posting “negative information” on various forums. 
  • Critically, the “targets” for this deceit and reputation-destruction extend far beyond the customary roster of normal spycraft: hostile nations and their leaders, military agencies, and intelligence services. In fact, the discussion of many of these techniques occurs in the context of using them in lieu of “traditional law enforcement” against people suspected (but not charged or convicted) of ordinary crimes or, more broadly still, “hacktivism”, meaning those who use online protest activity for political ends. The title page of one of these documents reflects the agency’s own awareness that it is “pushing the boundaries” by using “cyber offensive” techniques against people who have nothing to do with terrorism or national security threats, and indeed, centrally involves law enforcement agents who investigate ordinary crimes:
    • John Lemke
       
      Wow, how is not changing pictures and creating false victims not identity theft and conspiracy?  
  • ...4 more annotations...
  • it is not difficult to see how dangerous it is to have secret government agencies being able to target any individuals they want – who have never been charged with, let alone convicted of, any crimes – with these sorts of online, deception-based tactics of reputation destruction and disruption.
    • John Lemke
       
      Not only are you now guilty until proven innocent but, if you are guilty enough, we shall create a situation so that you are.
  • Government plans to monitor and influence internet communications, and covertly infiltrate online communities in order to sow dissension and disseminate false information, have long been the source of speculation. Harvard Law Professor Cass Sunstein, a close Obama adviser and the White House’s former head of the Office of Information and Regulatory Affairs, wrote a controversial paper in 2008 proposing that the US government employ teams of covert agents and pseudo-”independent” advocates to “cognitively infiltrate” online groups and websites, as well as other activist groups. Sunstein also proposed sending covert agents into “chat rooms, online social networks, or even real-space groups” which spread what he views as false and damaging “conspiracy theories” about the government. Ironically, the very same Sunstein was recently named by Obama to serve as a member of the NSA review panel created by the White House, one that – while disputing key NSA claims – proceeded to propose many cosmetic reforms to the agency’s powers (most of which were ignored by the President who appointed them).
    • John Lemke
       
      So one of the guys who advocates this and approves of it, gets to be on the NSA review committee?  Isn't that like Ted Kennedy on the Ethics Review Committee or the Warren Commission?
  • Whatever else is true, no government should be able to engage in these tactics: what justification is there for having government agencies target people – who have been charged with no crime – for reputation-destruction, infiltrate online political communities, and develop techniques for manipulating online discourse? But to allow those actions with no public knowledge or accountability is particularly unjustifiable.
John Lemke

Hackers Using 'Shellshock' Bash Vulnerability to Launch Botnet Attacks - 0 views

  • Researchers on Thursday discovered a critical remotely exploitable vulnerability in the widely used command-line shell GNU Bourne Again Shell (Bash), dubbed "Shellshock" which affects most of the Linux distributions and servers worldwide, and may already have been exploited in the wild to take over Web servers as part of a botnet that is currently trying to infect other servers as well.
  • the vulnerability is already being used maliciously by the hackers.
  • There is as of yet no official patch that completely addresses both vulnerabilities, including the second, which allows an attacker to overwrite files on the targeted system.
  • ...3 more annotations...
  • It's things like CGI scripts that are vulnerable, deep within a website (like CPanel's /cgi-sys/defaultwebpage.cgi)," Graham wrote in a blog post. "Getting just the root page is the thing least likely to be vulnerable. Spidering the site and testing well-known CGI scripts (like the CPanel one) would give a lot more results—at least 10x." In addition, Graham said, "this thing is clearly wormable and can easily worm past firewalls and infect lots of systems. One key question is whether Mac OS X and iPhone DHCP service is vulnerable—once the worm gets behind a firewall and runs a hostile DHCP server, that would be 'game over' for large networks."
  • 32 ORACLE PRODUCTS VULNERABLE
  • PATCH ISSUED, BUT INCOMPLETE
  •  
    "Researchers on Thursday discovered a critical remotely exploitable vulnerability in the widely used command-line shell GNU Bourne Again Shell (Bash), dubbed "Shellshock" which affects most of the Linux distributions and servers worldwide, and may already have been exploited in the wild to take over Web servers as part of a botnet that is currently trying to infect other servers as well."
John Lemke

$100 Million Pledged To Indie Film On Kickstarter... And 8,000 Films Made | Techdirt - 0 views

  • And, yes, the "but what about my $100 million movie" crowd will scoff and argue that this number is so "small." But, two points there: first, this number is growing very, very, very fast. And if you can't understand how trends explode, then you're going to be in trouble soon. Second -- and this is the more important point -- those funds helped create 8,000 films. For those who have been arguing about culture and how we're going to lose the ability to make movies... this suggests something amazing and important is happening which goes against all those gloom and doom predictions. By way of comparison, the UN, which keeps track of stats on film production, claimed that in 2009, 7,233 films were made. Worldwide.
  •  
    "Less than a year after being declared the darling of Sundance -- especially for not having "the arrogance of a studio" -- Kickstarter has announced that over $100 million has been pledged to indie film via its platform (which, of course, is hardly the only crowdfunding platform that filmmakers use, though it is the most popular). There are some caveats, of course. This is over Kickstarter's lifetime (since April 2009), but the numbers have been growing rapidly. $60 million of those pledges came in 2012. Also, that's pledges, not actual money given, since only projects that hit their target get the money. The actual total collected is $85.7 million -- which means that'll get over $100 million pretty quickly. "
John Lemke

Uroburos Rootkit: Most sophisticated 3-year-old Russian Cyber Espionage Campaign - The ... - 0 views

  • The researchers claimed that the malware may have been active for as long as three years before being discovered and appears to have been created by Russian developers.
  • The two main components of Uroburos are - a driver and an encrypted virtual file system, used to disguise its nasty activities and to try to avoid detection. Its driver part is extremely complex and is designed to be very discrete and very difficult to identify.
  • The virtual file system can’t be decrypted without the presence of drivers, according to the Gdata’s analysis explained in the PDF.
  • ...2 more annotations...
  • we assume that the group behind Uroburos is the same group that performed a cyberattack against the United States of America in 2008 with a malware called Agent.BTZ
  • The attacks carried out with Uroburos are targeting government institutions, research institutions, intelligence agencies, nation states, research institutions or companies dealing with sensitive information as well as similar high-profile targets. The oldest drivers identified by the researchers was compiled in 2011 is the evidence that the malware was created around three years ago and was undetected.
John Lemke

DARPA Robotics Challenge Trials Day 1 - 0 views

  • Pictured above is Valkyrie from NASA JPL. We reported on Valkyrie earlier this month. Arguably one of the better looking robots of the bunch, Valkyrie proved to be all show and no go today, failing to score any points in its day 1 trials. The day one lead went to Team Schaft, a new robot from Tokyo based startup company Schaft inc. Schaft scored 18 points in its first day. In second place is the MIT team  with 12 points. Third place is currently held by Team TRACLabs with 9 points. All this can change tomorrow as the second day of trials take place. The live stream will be available from 8am to 7pm EST on DARPA’s robotics challenge page.
John Lemke

Active malware operation let attackers sabotage US energy industry | Ars Technica - 0 views

  • Researchers have uncovered a malware campaign that gave attackers the ability to sabotage the operations of energy grid owners, electricity generation firms, petroleum pipelines, and industrial equipment providers.
  • the hacking group managed to install one of two remote access trojans (RATs) on computers belonging to energy companies located in the US and at least six European countries, according to a
  • Called Dragonfly
  • ...3 more annotations...
  • "This campaign follows in the footsteps of Stuxnet, which was the first known major malware campaign to target ICS systems," the Symantec report stated. "While Stuxnet was narrowly targeted at the Iranian nuclear program and had sabotage as its primary goal, Dragonfly appears to have a much broader focus with espionage and persistent access as its current objective with sabotage as an optional capability if required."
  • been in operation since at least 2011
  • "The Dragonfly group is technically adept and able to think strategically," the Symantec report stated. "Given the size of some of its targets, the group found a 'soft underbelly' by compromising their suppliers, which are invariably smaller, less protected companies."
John Lemke

David Byrne and Cory Doctorow Explain Music and the Internet | culture | Torontoist - 0 views

  • Byrne and Doctorow were there to talk about how the internet has affected the music business. While that was certainly a large part of the discussion, the conversation also touched on all the ways technology and music interact, from file sharing to sampling.
  • Doctorow pointed out that two of the best-selling and most critically acclaimed hip-hop records of the 1980s—Public Enemy’s It Takes a Nation of Millions to Hold Us Back, and the Beastie Boys Paul’s Boutique—would have each cost roughly $12 million to make given today’s rules surrounding sample clearance.
  • “In the world of modern music, there are no songs with more than one or two samples, because no one wants to pay for that,” Doctorow said. “So, there’s a genre of music that, if it exists now, exists entirely outside the law. Anyone making music like Paul’s Boutique can’t make money from it, and is in legal jeopardy for having done it. Clearly that’s not what we want copyright to do.” When the conversation turned to downloads and digital music distribution, both men were surprisingly passionate on the topic of digital rights management, and how it’s fundamentally a bad idea.
  • ...1 more annotation...
  • Doctorow argued that the way humans have historically shared music is totally antithetical to the idea of copyright laws. He pointed out that music predates not only the concept of copyright, but language itself. People have always wanted to share music, and, in an odd way, the sharing of someone else’s music is embedded in the industry’s business model, no matter how badly some may want to remove it.
  •  
    "Doctorow pointed out that two of the best-selling and most critically acclaimed hip-hop records of the 1980s-Public Enemy's It Takes a Nation of Millions to Hold Us Back, and the Beastie Boys Paul's Boutique-would have each cost roughly $12 million to make given today's rules surrounding sample clearance."
John Lemke

Court: Fining Jammie Thomas $9,250 Per Song Infringed Motivates Creative Activity | Tec... - 0 views

  • This is hardly a surprise, but similar to the Joel Tenenbaum case, Jammie Thomas-Rasset (the other person sued for copyright infringement for using a file sharing system), has lost again. The appeals court (8th Circuit) has ruled that $9,250 per song infringed is perfectly reasonable and that the judge in the case, Michael Davis, erred in calling for a new trial after the initial jury verdict (the first of three). There were a number of procedural issues here, and it's worth pointing out that Thomas-Rasset herself more or less asked the court to bring back this first verdict and focus on the Constitutionality of the damages amount. So, the whole mess with the three separate district court trials sort of gets swept under the rug. However, the court simply isn't buying Thomas-Rasset's claim that the statutory damages are unconstitutionally punitive and a violation of due process. Basically, it says that the fact that statutory damages are completely out of whack with actual damages doesn't matter, because the point of statutory damages is that they're disconnected from actual damages on purpose (because, in theory, they're put in place because actual damages are difficult to assess).
John Lemke

Yahoo webcam images from millions of users intercepted by GCHQ | World news | theguardi... - 0 views

  • Britain's surveillance agency GCHQ, with aid from the US National Security Agency, intercepted and stored the webcam images of millions of internet users not suspected of wrongdoing, secret documents reveal.
  • between 2008 and 2010
  • Optic Nerve, the documents provided by NSA whistleblower Edward Snowden show, began as a prototype in 2008 and was still active in 2012, according to an internal GCHQ wiki page accessed that year.The system, eerily reminiscent of the telescreens evoked in George Orwell's 1984, was used for experiments in automated facial recognition, to monitor GCHQ's existing targets, and to discover new targets of interest. Such searches could be used to try to find terror suspects or criminals making use of multiple, anonymous user IDs
  • ...1 more annotation...
  • Optic Nerve was based on collecting information from GCHQ's huge network of internet cable taps, which was then processed and fed into systems provided by the NSA. Webcam information was fed into NSA's XKeyscore search tool, and NSA research was used to build the tool which identified Yahoo's webcam traffic.
John Lemke

Microsoft's OneDrive For Business Throws Down Gauntlet For Box, Dropbox | TechCrunch - 0 views

  • be unshackled from its other services, and sold as a standalone cloud storage solution for corporate customers. 
  • Now, with OneDrive for Business — the new SkyDrive Pro — Microsoft is selling cloud storage directly to businesses, no other strings attached. If you don’t want to buy into an Office-as-a-service contract, you can still buy cloud storage from Microsoft.
  • Microsoft is offering a deep discount — 50 percent
  • ...1 more annotation...
  • Dropbox has raised $607 million. Box has raised $414 million. That’s more than a billion for just two players in the market.
John Lemke

Kurt Eichenwald Claims Snowden Is A Chinese Spy And Leaks Are Just To Protect Their Cyb... - 0 views

  • And the attempts to tar and feather Ed Snowden continue. The latest is that famed reporter Kurt Eichenwald, who started attacking Ed Snowden months ago, has written up a long speculative article for Newsweek arguing that Ed Snowden has "escalated the cyber war" by giving China the necessary cover it needs to avoid reining in its own cyber attacks
  • That is, if you follow the bizarre logic here, without Snowden, Eichenwald believes that the US would have somehow convinced the Chinese to stop their cyber attack program. And, now because of Snowden, the Chinese can ignore that effort, by pointing out that the US is doing a ton of online hacking too.
  • Again, nearly everything about that statement is ridiculous. He didn't "leave all of the documents in Hong Kong." He provided heavily encrypted versions to a very small number of journalists, and then got rid of the files himself. Eichenwald takes that to mean he "left" them in Hong Kong, based on nothing, and all of this apparently means that Snowden is working for the Chinese (even though he left China pretty quickly).
John Lemke

Massachusetts Man Charged Criminally For Videotaping Cop... Despite Earlier Lawsuit Rej... - 0 views

  • You may remember a high-profile, landmark ruling last year in Massachusetts, where charges against Simon Glik -- arrested for violating a state law that said it's "wiretapping" to record a police officer in public without his permission -- weren't just dropped, but the arrest was found to be both a First and Fourth Amendment violation. In the end, Boston was forced to pay Glik $170,000 for violating his civil rights. You would think that story would spread across Massachusetts pretty quickly and law enforcement officials and local district attorneys would recognize that filing similar charges would be a certified bad idea. Not so, apparently, in the town of Shrewsbury. Irving J. Espinosa-Rodrigue was apparently arrested and charged under the very same statute after having a passenger in his car videotape a traffic stop for speeding, and then posting the video on YouTube. Once again, the "issue" is that Massachusetts is a "two-party consent" state, whereby an audio recording can't be done without first notifying the person being recorded, or its deemed a "wiretap." This interpretation, especially when dealing with cops in public, is flat-out ridiculous and unconstitutional, as the Glik ruling showed.
John Lemke

The Internet Isn't Broken; So Why Is The ITU Trying To 'Fix' It? | Techdirt - 0 views

  • Of course, internet access has already been spreading to the far corners of the planet without any "help" from the ITU. Over two billion people are already online, representing about a third of the planet. And, yes, spreading that access further is a good goal, but the ITU is not the player to do it. The reason that the internet has been so successful and has already spread as far as it has, as fast as it has, is that it hasn't been controlled by a bureaucratic government body in which only other governments could vote. Instead, it was built as an open interoperable system that anyone could help build out. It was built in a bottom up manner, mainly by engineers, not bureaucrats. Changing that now makes very little sense.
  • And that's the thing. The internet works just fine. The only reason to "fix" it, is to "break" it in exactly the way the ITU wants, which is to favor a few players who have done nothing innovative to actually deserve it.
John Lemke

DDoS attacks on major US banks are no Stuxnet-here's why | Ars Technica - 0 views

  • More unusually, the attacks also employed a rapidly changing array of methods to maximize the effects of this torrent of data. The uncommon ability of the attackers to simultaneously saturate routers, bank servers, and the applications they run—and to then recalibrate their attack traffic depending on the results achieved—had the effect of temporarily overwhelming the targets."This very well could be a kid sitting in his mom's basement in Ohio launching these attacks." "It used to be DDoS attackers would try one method and they were kind of one-trick ponies," Matthew Prince, CEO and founder of CloudFlare, told Ars. "What these attacks appear to have shown is there are some attackers that have a full suite of DDoS methods, and they're trying all kinds of different things and continually shifting until they find something that works. It's still cavemen using clubs, but they have a whole toolbox full of different clubs they can use depending on what the situation calls for."
John Lemke

So What Can The Music Industry Do Now? | Techdirt - 0 views

  • The past was, and the future is going to be, much more about performance. In this new world, recordings often function as more as ads for concerts than as money-makers themselves. (And sometimes are bundled with concert tickets, as Madonna's latest album was.) As a result, copying looks a lot less fearsome. A copied ad is just as effective--and maybe much more so--than the original.
  • Just ask pop singer Colbie Caillat. Caillet's music career began in 2005 when a friend posted several of her home-recorded songs to MySpace. One song, Bubbly, began to get word of mouth among MySpace users, and within a couple of months went viral. Soon Colbie Caillat was the No. 1 unsigned artist on MySpace. Two years after posting Bubbly, Caillet had more than 200,000 MySpace friends, and her songs had been played more than 22 million times. Caillet had built a global fan base while never leaving her Malibu home. In 2007, Universal Records released her debut album, Coco, which peaked at No. 5 on the Billboard charts and reached platinum status.
  • The problem of piracy in music is, of course, very different from the problem in comedy. Stand-up comics worry most about a rival, not a fan, copying their jokes. Still, the reduction of consumer copying of music via norms may be possible, and will become more imaginable if the music industry experiences ever-greater fragmentation and communication. There is already an interesting example of norms playing a substantial role in controlling copying in music. In the culture of jambands, we see the fans themselves taking action to deter pirates. What are jambands? In a fascinating 2006 paper, legal scholar Mark Schultz studied the unique culture of a group of bands that belong to a musical genre, pioneered by the Grateful Dead, characterized by long-form improvisation, extensive touring, recreational drug use, and dedicated fans. Although acts like Phish, Blues Traveler, and the Dave Mathews Band vary in their styles, they are all recognizably inspired by the progenitors of jam music, the Dead. But the Dead's influence is not only musical. Most jambands adhere to a particular relationship with their fans that also was forged by the Dead.
  • ...1 more annotation...
  • it turns out that by killing the single, the record labels made the Internet piracy problem, when it arrived, even worse. One of the major attractions of filesharing was that it brought back singles. Consumers wanted the one or two songs on the album that they liked, and not the ten they didn't.
1 - 20 of 46 Next › Last »
Showing 20 items per page