background preloader

Unnamed pearl

Unnamed pearl
Monthly donors (our Guardians of Liberty) enable us to respond to urgent threats to our civil liberties. They provide us with the resources to stop: Attempts to suppress free speech Politicians from denying women reproductive freedom Racially-biased practices in our criminal justice system Join today with a monthly donation. Frequently Asked Questions about the Guardians of Liberty Program Where does my money go? What payment methods do you accept? When will I be charged? Can I change my donation? Can I cancel? Will I still need to renew my membership? Are my monthly gifts tax-deductible?

https://www.aclu.org/donate/join-renew-give

Bureau of Justice Statistics (BJS) Government Government of any kind currently affects every human activity in many important ways. For this reason, political scientists generally argue that government should not be studied by itself; but should be studied along with anthropology, economics, history, philosophy, science, and sociology. Political science Etymology From Middle English government,[citation needed] from Old French government[citation needed] (French gouvernement), from Latin gubernatio ("management, government"). Government is a compound formed from the Ancient Greek κυβερνάω (kubernaō, "I steer, drive, guide, pilot") and the Latin -mente, ablative singular of mēns ("mind"). Escalation. This week in Developmental Psychology class I presented a paper on dating violence in teenage relationships. I'm not going to rehash the paper here, because it's boring and Google-vulnerable, but I wanted to share the most interesting conclusion I found. How much conflict there is in a relationship, or the seriousness of the conflict issues, are not predictors of whether there will be violence. The biggest predictor is the degree to which conflicts in the relationship escalate.

U.S. Bureau of Labor Statistics How to Get a Copy of Your FBI The Freedom of Information Act is a powerful thing. If you've ever wanted to know just what those guvmint bastards have on you, anyway, here's your chance. Just fill in the italics in this form letter with the appropriate information, get your signature notarized, send it off, and you're in business! This should be free, though if your search returns reams of information, you may be charged 5 cents per page in duplication fees. Communicate if Your Government Shuts Off Your Internet From Wired How-To Wiki Scenario: Your government is displeased with the communication going on in your location and pulls the plug on your internet access, most likely by telling the major ISPs to turn off service. This is what happened in Egypt Jan. 25 prompted by citizen protests, with sources estimating that the Egyptian government cut off approximately 88 percent of the country's internet access. What do you do without internet? Step 1: Stop crying in the corner. Then start taking steps to reconnect with your network.

The Shadow Superpower - By Robert Neuwirth With only a mobile phone and a promise of money from his uncle, David Obi did something the Nigerian government has been trying to do for decades: He figured out how to bring electricity to the masses in Africa's most populous country. It wasn't a matter of technology. David is not an inventor or an engineer, and his insights into his country's electrical problems had nothing to do with fancy photovoltaics or turbines to harness the harmattan or any other alternative sources of energy. Instead, 7,000 miles from home, using a language he could hardly speak, he did what traders have always done: made a deal.

U.K. spy chief sees 'disturbing' volume of cyberattacks A significant but unsuccessful cyberattack was launched on the U.K. Foreign Office and other government departments this summer, according to the head of the country's communications spy agency. Iain Lobban, director of the U.K.'s Government Communications Headquarters, wrote today in a piece for The Times, based in London, that there was a "disturbing" volume of e-crime and attacks on government and industry systems. "I can attest to attempts to steal British ideas and designs--in the IT, technology, defence, engineering and energy sectors as well as other industries--to gain commercial advantage or to profit from secret knowledge of contractual arrangements," Lobban wrote. "We are also aware of similar techniques being employed to try to acquire sensitive information from British government computer systems, including one significant (but unsuccessful) attempt on the Foreign Office and other government departments this summer."

FBI: Spies Hid Secret Messages on Public Websites Moscow communicated with a ring of alleged spies in America by encoding instructions in otherwise innocent-looking images on public websites. It’s a process called steganography. And it’s one of a slew of high-tech and time-tested methods that the deep-cover agents and their Russian handlers used to pass information — from private Wi-Fi networks to buried paper bags. Steganography is simultaneously one of the oldest methods for secret communications, and one of the more advanced. The process dates back to the fifth century B.C., when the Greek tyrant Histiaeus shaved the head of one of his servants, tattooed a message on his head, and waited for his hair to grow back before sending the messenger out.

PlayStation Network hack launched from Amazon EC2 High performance access to file storage The hackers who breached the security of Sony's PlayStation Network and gained access to sensitive data for 77 million subscribers used Amazon's web services cloud to launch the attack, Bloomberg News reported. The attackers rented a server from Amazon's EC2 service and penetrated the popular network from there, the news outlet said, citing an unnamed person with knowledge of the matter. March RSA Hack Hits Lockheed, Remote Systems Breached A March attack on RSA's SecurID authentication service has possibly claimed its first big victim: Lockheed Martin. According to a source speaking to Reuters, unknown hackers have broken into Lockheed Martin's security systems by using duplicate SecurID tokens to spoof legitimate authentications into the network. These SecurID tokens are analogous to Blizzard's World of Warcraft Authenticators: Tiny little keyfobs that display an ever-changing code one must enter to log into a protected service. Lockheed hasn't issued comment on alleged breach itself, leading only to speculation as to what data, if any, those breaching the company's network were able to acquire.

Related: