background preloader

Other

Facebook Twitter

Cyberattacks should require presidential authorization, official says. “It really comes down to, so what are those reactions that make sense that we can do defensively, analogous to the missile shoot-down?”

Cyberattacks should require presidential authorization, official says

He told the Senate Armed Services Committee. “But if you are to go after a computer in foreign space or some other thing, that might be a response option that would now take, I think, the president and the [defense] secretary to step in and start making decisions, versus us taking that on,” Alexander said. “And I think that’s probably where we’ll end up, and that makes a lot of sense from my perspective.” Alexander’s remarks came during a hearing that highlighted senators’ concerns about the growing threats to U.S. military, civilian and commercial networks dependent on the Internet. TECS.pdf (application/pdf Object) Israel said would keep Gaza near collapse: WikiLeaks. JERUSALEM (Reuters) - Israel told U.S. officials in 2008 it would keep Gaza's economy "on the brink of collapse" while avoiding a humanitarian crisis, according to U.S. diplomatic cables published by a Norwegian daily on Wednesday.

Israel said would keep Gaza near collapse: WikiLeaks

Three cables cited by the Aftenposten newspaper, which has said it has all 250,000 U.S. cables leaked to WikiLeaks, showed that Israel kept the U.S. Embassy in Tel Aviv briefed on its internationally criticized blockade of the Gaza Strip. The territory, home to 1.3 million Palestinians, is run by the Islamist Hamas group, which is shunned by the West over its refusal to recognize Israel, renounce violence or accept existing interim Israeli-Palestinian peace deals. "As part of their overall embargo plan against Gaza, Israeli officials have confirmed to (U.S. embassy economic officers) on multiple occasions that they intend to keep the Gazan economy on the brink of collapse without quite pushing it over the edge," one of the cables read.

24,AS13335,AS10026,AS6939,AS3257,AS3549,AS6762,AS1299,AS3356,AS1239,AS9002,AS2828,AS2516,AS16735,AS2914,AS286,AS3561,AS11164,AS29686,AS293,AS4436,AS174,AS39756,AS1221,AS6453,AS4826,AS17379,AS852,AS4637,AS29449,AS8492!22-21,15-3,19-3,20-6,24-5,14-4,14-5,21. Geleakte Abhörprotokolle und Korruptionsverdacht - Slowakei. Ein Korruptionsskandal gewaltigen Ausmaßes scheint sich in der Slowakei anzubahnen.

Geleakte Abhörprotokolle und Korruptionsverdacht - Slowakei

Im Mittelpunkt der Affäre steht angebliches Geheimdienstmaterial, das kurz vor Weihnachten von Unbekannten ins Internet gestellt wurde und jetzt für immer mehr Aufregung im Land sorgt. Über 70 Seiten vermutlicher Abhörprotokolle, die vom slowakischen Geheimdienst SIS stammen sollen, sind offenbar verschriftlichte Versionen einer Abhöraktion mit dem Decknamen "Gorilla". Laut den Dokumenten soll der Lauschangriff von Geheimdienstagenten auf eine Wohnung in Bratislava fokussiert gewesen sein. Die Abhöraktion war legal, mit richterlicher Genehmigung, in den Jahren 2005 und 2006, also zu Ende der zweiten Regierung von Mikulás Dzurinda erfolgt. In der besagten Wohnung soll sich einer der bekanntesten slowakischen Finanzhaie und Mitbesitzer der Finanzgruppe Penta mit hochrangigen Politikern und Beamten, darunter mit dem damaligen Wirtschaftsminister Jirko Malchárek, getroffen haben.

Speaking of 2011 - The Drum Opinion. Find More Stories Speaking of 2011 Dean Frenkel 2011 was a big year for speech with WikiLeaks, the Bolt court case, the Arab Spring Movement, the News of the World scandal and much more. New issues have emerged, old controversies are continuing to play out and some of the most critical will develop intriguingly in 2012. Speech gained attention in 2010 as a result of Oscar-winning film The King's Speech. 2011 was acknowledged as a year for free speech by Time Magazine, who awarded The Protester with its Person of the Year award. 2011 continued to focus on the unprecedented free speech issues inspired by WikiLeaks: the freedom to speak privately versus the public's right to have access to important information that affects them; the Government's right to classify information versus the public's right to know the internal machinations of Government; the freedom of public relations spin doctors to control public perceptions versus the public's right to examine raw information.

Email Share x. How to secure your computer and surf fully Anonymous BLACK-HAT STYLE. Flash Proxies. Contents Overview Flash proxies are a new way of providing access to a censorship circumvention system such as Tor.

Flash Proxies

A flash proxy is a miniature proxy that runs in a web browser. It checks for clients that need access, then conveys data between them and a Tor relay. Tor has bridge relays, but in some cases even these can be blocked despite the fact that their addresses are handed out only a few at a time. The U.S. Cities With the Most Leftover to Spend ... After Paying for Housing - Housing. The comments on my recent post on America's most economically advantaged metros got me thinking.

The U.S. Cities With the Most Leftover to Spend ... After Paying for Housing - Housing

A number of folks brought up the issue of cost of living. "Does your index take into account the high cost of living in some of the metro areas that top this list," one commenter asked. "The amount of money people have to buy presents is diminished when they're paying over a third of their income on housing.

" In many cases, it is a quite a bit more than that. With the help of Charlotta Mellander, I took a look at the amount of money people in different cities have left over after they paid for housing. The variation across metros is huge. The table below lists the 20 metros with the most money left over after paying for housing: How SOPA's 'circumvention' ban could put a target on Tor. A little-noticed section of the Stop Online Piracy Act could make it illegal to distribute Tor and other software that can "circumvent" attempts by the U.S. government to block pirate Web sites.

How SOPA's 'circumvention' ban could put a target on Tor

The controversial Hollywood-backed copyright bill allows injunctions to be filed against "any" person, nonprofit organization, or company that distributes a "product or service" that can be used to circumvent or bypass blockades erected against alleged pirate Web sites such as ThePirateBay.org. "It looks like SOPA would outlaw Tor," says Markham Erickson, an attorney with Holch & Erickson LLP who runs NetCoalition.

Julian Assange, Australien, 40 ans, date de naissance inconnue. Who's afraid of Julian Assange of WikiLeaks? Everyone - The Economic Times. Anand Soondas, TNN Nov 6, 2011, 10.39am IST I don't know if Liu Xiaobo has met Julian Assange.

Who's afraid of Julian Assange of WikiLeaks? Everyone - The Economic Times

But if the two do bump into each other sometime in life— unlikely as that may be - they'll have a lot to crib about. There were no high-fives for Liu from most world leaders as China slammed the Nobel peace prize winner for talking freedom and liberty. User details stolen from Tas Govt - Networks. Those Verisign dickheads. Are you going to charge me dickhead?

those Verisign dickheads

-- Hockney in Usual Suspects What is happening? Verisign, the registrar in charge of the .net and .com toplevel domains, has recently decided to hijack every available domain and redirect them to their advertising webserver. Boy in the Browser. Imperva has seen a resurgence of what we have dubbed "Boy-in-the-Browser" attacks, which are less sophisticated versions of Man-in-the-Browser attacks, but just as effective and similarly hard to detect.

Boy in the Browser

A more technical overview can be found at Imperva's ADC Advisory page. “Boy-in-the-Browser” attacks reroute the victim’s traffic to an attacker controlled server. Anonymous Collective. After allegedly breaking into NATO’s servers this morning, the amorphous hacktivist collective Anonymous announced on Twitter that they had retrieved a document from the U.S.

Anonymous Collective

Treasury providing previously unseen information on the debt ceiling. The document, which is a page long, was not obtained through illegal methods, says group spokesman “An0n0ps”. In an exclusive online chat with TheDC, An0n0ps stated that the data contained in this document will be “surprising” and will be detrimental to the GOP’s efforts in settling the debt ceiling issue. The group plans to release the document on an0n0ps.tumblr.com tomorrow morning at 7 a.m. Web Demin (hackedelic) ✔ mate Ω (xSSLZx) Subversionistic (subversionistic) Deep packet inspection used to stop censorship in new "Telex" scheme.

The Internet has become so economically important that few countries can afford to cut off access altogether. Instead, repressive regimes allow 'Net access, but try to block individual websites they don't want their populations to see. Some users, aided by allies in the West, use circumvention technologies like Web proxies or TOR to access forbidden information. This has led to a long-running cat-and-mouse game in which censorship opponents establish new proxies while censors race to identify and block them. Researchers at the University of Michigan have developed technology that they hope can decisively tilt the playing field toward free speech. Cortex m3 (cortexm3) U8easY0axF92c (U8easY0axF92c)