Our Gov can sing! Still not the same without Clarence Clemens. Will never forget you!
The disclosure came after Guardian editor Alan Rusbridger, summoned to give evidence at a parliamentary inquiry, was accused by lawmakers of helping terrorists by making top secret information public and sharing it with other news organizations.
The Guardian was among several newspapers which published leaks from U.S. spy agency contractor Snowden about mass surveillance by the National Security Agency (NSA) and Britain's eavesdropping agency GCHQ.
In a rare interview on Nov. 25 with French journalists, Ren Zhengfei, the 69-year-old founder and CEO of China-based Huawei, said he would no longer look for business in the United States, in the wake of accusations from lawmakers and government officials that the company is a de facto arm of the Chinese authorities. "If Huawei gets in the middle of U.S-China relations," and causes problems, "it's not worth it," Ren reportedly said, according to a Chinese transcript of the interview. "Therefore, we have decided to exit the U.S. market, and not stay in the middle."
Mitt Romney's New 'Tiger Song'
Routers made by China-based Huawei Technologies have very few modern security protections and easy-to-find vulnerabilities, two network-security experts stated at the Defcon hacking convention
|U.S. Attorney’s Office December 02, 2013|
WICHITA—A Wisconsin man has been sentenced to two years' federal probation and ordered to pay $183,000 in restitution for taking part in a cyber attack on Koch Industries in Wichita that was sponsored by a group known as Anonymous, U.S. Attorney Barr Grissom said today.
Eric J. Rosol, 38, Black Creek, Wisconsin, pleaded guilty to one misdemeanor count of accessing a protected computer. In his plea, he admitted that on February 28, 2011, he took part in a denial of service attack on a web page of Koch Industries—Kochind.com. From Wisconsin, he used software called a Low Orbit Ion Cannon Code, which was loaded on his computer. He took part in the attack for approximately one minute. The attack, which was organized by a computer hacking group known as Anonymous, caused Kochind.com to go offline for approximately 15 minutes.
Koch Industries had hired a consulting group to protect its websites at a cost of approximately $183,000.
Grissom commended the FBI and Assistant U.S. Attorney Alan Metzger for their work on the case.
Previous on Low Orbit Ion Cannon:
More About Hackers' new super weapon High Orbit Ion Cannon
Newt Gingrich on CNN & Twitter - "Kathleen Sebelius A Worse Liar Than Nixon"
FBI executes search warrants in probe of pro-WikiLeaks cyber attacks
Hacker gang 'CCC' mutates to lobby group
A secret hacking group with conspiratorial meetings? Who is the Chaos Computer Club so imagine mistaken enormous. The largest European hacker club has established itself as a lobby group.
Young guys in hoodies huddled in dark, smoke-filled rooms in front of their notebooks . Between pizza boxes and coke cans to crack foreign computer networks to steal sensitive data and paralyze websites. As far as the stereotype of evil hackers. With the reality that has to do however little. At least not in those who have opted for the "good side".
Who wants to see what those hackers drive today can buy, for example, for 80 euros a ticket for the annual meeting of the Chaos Computer Club (CCC) in Hamburg. There met last in December 2012 over 5000 hackers, computer scientists and IT specialists for the exchange of technical and social developments in lectures and workshops.
Conspiratorially, there is nothing, on the contrary, transparency is one of the most important commandments of the Chaos Computer Club. With over 3000 members, it is one of the biggest clubs in Europe hackers. And one who enjoys respect: The association is committed to privacy and freedom of information. CCC representatives enter into parliamentary committees or before the Federal Constitutional Court as an expert.
With his commitment to the CCC is clear of Internet activists such as Anonymous off. Constanze Kurz, spokeswoman for the club sees Anonymous as well as "more than labels as a solid organization," and criticizes lack of ethical principles. Moreover, lacking a trusted organization.
How it all began
The solid structure of the CCC has developed over the years. The story began in September 1981 with a call in the daily newspaper "taz". Under the title "Tu wat" drummed Klaus Schleisiek and Wau Holland "Komputerfrieks" from all over Germany are due to meet in Berlin and founded the CCC.
Free access to information was already one of the main issues for the CCC. Who would want to submit data needed, via on-screen text (BTX) to select the desired subscriber by telephone through a modem. And it was these modems are costly because of the telecommunications monopoly only to Deutsche Post for rent.
Post and "Komputerfrieks" became implacable enemies. Interventions with devices and terminals were illegally, but the CCC tinkerers built himself a 1984 modem and clamped it to the line. The instructions they published in the "Hacker Bible", a popular collection of documents among members of the scene.
The first hacks
In November 1984, the Chaos Computer Club, first won public attention. The Post had until then again and again praised the safety of its BTX technology, but the CCC hackers managed to crack the system and on-screen text is not encrypted and password of an account of the Hamburger Sparkasse (Haspa) access.
With this access is logged in a CCC member a BTX and called repeatedly on a fee-based side of the Chaos Computer Club. The costs incurred by that time had about 135,000 marks on the club back to the bank at Haspa, to make publicity attention to the security problem.
This action was the starting signal for numerous hackers working around the Chaos Computer Club. In the coming years, such as the spectacular hacks reach break-in of the U.S. space agency NASA and its European counterpart ESA jointly operated SPANet (Space Physics Analysis Network). Through this approach hackers came in 1986 in a far-reaching network of computers of NASA, ESA, the French Atomic Energy Commission, the CERN particle accelerator and various universities and research institutions.
The motive of the hacker was usually the same: They wanted to draw attention to safety issues. But some CCC members were simply criminal. The most serious case was the so-called KGB Hack: club members from Hanover had the Soviet secret service KGB sold data from computer systems, such as break-ins in western SPANet. The hackers flew and were arrested. The life of the hacker ended tragically in mysterious circumstances .
Use for policy
One of the most spectacular coup succeeded the Chaos Computer Club in 2008 with the publication of the fingerprint Wolfgang Schäuble . The hacker criticized the then interior minister because of his demand for a passport with biometric data.
Schauble's name was also synonymous with the introduction of online searches and the expansion of Internet monitoring. With the release of Schäuble's fingerprint in the CCC publication "data extractor" wanted the club to draw attention to safety concerns for biometric passports and the opportunities for abuse.
Again and again feel the Chaos Computer Club on vulnerabilities in digital technology. 2008 should arrive in Hamburg in the upcoming state election, an electronic voting pen used. The Hackers cracked the supposedly safe technique by manipulating a voting sheet. The choice pin would therefore supplied false voting. The result: In Hamburg, the voters make their crosses with more traditional pen.
Hack the State Trojan
Last saw the Chaos Computer Club with the analysis of the State Trojan headlines: by the by the Federal anti-crime sniffer software was used for the hackers. First, the program had more functions than legally allowed. Because the monitoring software may in suspicious cases only going communication record as Skype conversations. With the Trojans but complete online searches have been possible.
The CCC also found out that the Trojan was programmed so poorly that he - once discovered - from spying itself can be manipulated. For illustrative purposes, the hacker-programmed remote control software for the Trojans.
Your argument against the software: Test results could be falsified and were as useless. This damning finding has led to the authorities no longer use the program. In general, the CCC hackers any form of monitoring is suspect. The club therefore fights for a ban on state spying software.
The future of the club
The changing role of the CCC can not see all the members positively. Some feel exploited when the club in parliamentary committees to be heard on issues such as counter-terrorism database. Internal critics are calling: The club may not be monopolized by the policy and are not a computer TÜV ", but must retain its independence.
The debate over the future of the institution hackers continues. The club goes more towards lobbying? Or it remains a playground for hackers, inventors and experts?
Constanze Kurz sees the independence of the Chaos Computer Club is not jeopardized, "We will continue to deliver without influence by donors or political parties expressed herein opportunities and risks of current and future technologies.
Source: "Computer Bild". You can also see the "computer screen", issue 7/2013.
In 2011, Chaos Computer Club announced their plans for their own Satellites:
Chaos Computer Club outlines plan for 'Hackerspace Global Grid'
Naveen Jain, Founder of Big Data Inc's Intelius, is even setting up data services on the Moon. The 'front view' of MoonExpress is data for NASA. But the big money with the Big Data Inc. companies has always been the 'back view'. Hence, MoonExpress already has online the Personal Impression Plan, which is Personal data collection.
Pirate Bay Has just purchased air space for their low orbit drone servers.
27 November 2013
Much Ado About Bitcoin
By ADRIAN CHEN
Published: November 26, 2013
FOR the obsessive followers of the volatile virtual currency bitcoin, the price of a single bitcoin at the time their fixation began holds undue significance. I know one bitcoin cost around $9 when I first stumbled on it in the summer of 2011. That was before I single-handedly sent the price of bitcoin soaring.
I wasn’t trying to manipulate an underground economy. I was just doing my job as a blogger for the website Gawker when I broke the story of the online underground illegal drug market Silk Road, on which bitcoin was the only accepted currency because of its relative anonymity. The article went viral and introduced hundreds of thousands to bitcoin.
Senator Charles E. Schumer, Democrat of New York, helped, too. During a news conference a couple of days after my article was published, he called bitcoin “an online form of money laundering.” I suppose a lot of people thought that sounded pretty cool. The price of bitcoin surged to $14.
Huh, I thought, maybe I should buy some bitcoin.
But I didn’t, and as of this writing, one bitcoin is worth around $880. Senate hearings held to discuss regulating bitcoin earlier this month were “lovefests,” according to The Washington Post. Abroad, Chinese investors are flocking. Bitcoin seems on the brink of respectability.
Still, there’s a zaniness about the currency. Bitcoin is built on a weird mix of the most old-fashioned kind of speculative greed, bolstered by a contemporary utopian cyberlibertarian ideology. Boosters say that bitcoin is the currency of the future. I’d argue that the phenomenon is a digital gold rush perfectly emblematic of the present.
Some of bitcoin’s appeal comes from the fact that it does not physically exist. Each bitcoin is just a string of numbers. Instead of a bank, a decentralized network of computers ensures the authenticity of bitcoin and issues new ones by doing complex calculations. This allows bitcoin to be traded peer to peer, bypassing credit card companies and payment processors. It’s digital cash, offering the same relative anonymity and freedom as a paper sack of bills. WikiLeaks began accepting bitcoin donations in 2011 in order to bypass PayPal and credit card companies, which had frozen payments to the organization.
The WikiLeaks episode hints at the utopian promise built into bitcoin by its creator, a mysterious programmer called Satoshi Nakamoto, whose identity is a subject of dispute and intrigue. The ideas behind bitcoin can be traced to a 1988 tract called the Crypto Anarchist Manifesto [below], which loftily predicted a future where anonymity-protecting technology made state control of the market impossible. Everything would be for sale to anyone all the time, 100 percent tax-free. Many of bitcoin’s hard-core fans see the currency as a revolutionary step toward this anarchocapitalist wonderland.
I’m skeptical. I don’t think we’ll all be paying in bitcoin for tickets to Kanye West’s 2024 presidential victory tour. You can’t use bitcoin for much today besides gambling in online casinos and reserving seats on Virgin Galactic spaceflights, and a vast majority of it is held by speculators. Even with the imprimatur of government regulation, the promise of bitcoin seems to end with helping online retailers avoid credit-card processing fees. Bitcoin is mainly innovative in the way of credit default swaps: new ways to gamble with money.
Bitcoin is most interesting on an emotional level. Its sheen of technomagic has let uber-rational geeks treat the casino-floor frenzy as a serious technological story. Tech blogs breathlessly track the price of bitcoin. Each new business that accepts bitcoin is heralded with the fanfare of a despot opening his country’s borders to a new, previously outlawed luxury. The drumbeat suggests that getting rich is as simple as being an early adopter.
So many have bought in because the Internet is very good at stoking the fear of missing out. There’s even a trendy acronym, FOMO, to describe the anxiety inspired by scrolling through the social media accounts of people having more fun than you. Bitcoin fosters a particularly potent brand of FOMO. Recently there was the story of the Norwegian 20-something who discovered that his long-forgotten bitcoin, bought for basically nothing, was worth so much that he traded some of it to buy an apartment. Bitcoin holders have taken to posting screenshots of their swollen accounts. I know a guy who bought a few hundred dollars’ worth of bitcoin as a sort of joke years ago. Now he’s made enough to buy a nice car.
All I can say is that the crash is going to be great. Bitcoin is too dependent on speculative mania to be of practical use as a currency. But as a symbol of the misguided dream that one can tap into the global data stream and download riches like a pop song, it’s gold.
Adrian Chen is a freelance journalist and an editor at The New Inquiry.
A version of this op-ed appears in print on November 27, 2013, on page A25 of the New York edition with the headline: Much Ado About Bitcoin.
The Crypto Anarchist Manifesto
Timothy C. May
A specter is haunting the modern world, the specter of crypto anarchy.
Computer technology is on the verge of providing the ability for individuals and groups to communicate and interact with each other in a totally anonymous manner. Two persons may exchange messages, conduct business, and negotiate electronic contracts without ever knowing the True Name, or legal identity, of the other. Interactions over networks will be untraceable, via extensive re-routing of encrypted packets and tamper-proof boxes which implement cryptographic protocols with nearly perfect assurance against any tampering. Reputations will be of central importance, far more important in dealings than even the credit ratings of today. These developments will alter completely the nature of government regulation, the ability to tax and control economic interactions, the ability to keep information secret, and will even alter the nature of trust and reputation.
The technology for this revolution--and it surely will be both a social and economic revolution--has existed in theory for the past decade. The methods are based upon public-key encryption, zero-knowledge interactive proof systems, and various software protocols for interaction, authentication, and verification. The focus has until now been on academic conferences in Europe and the U.S., conferences monitored closely by the National Security Agency. But only recently have computer networks and personal computers attained sufficient speed to make the ideas practically realizable. And the next ten years will bring enough additional speed to make the ideas economically feasible and essentially unstoppable. High-speed networks, ISDN, tamper-proof boxes, smart cards, satellites, Ku-band transmitters, multi-MIPS personal computers, and encryption chips now under development will be some of the enabling technologies.
The State will of course try to slow or halt the spread of this technology, citing national security concerns, use of the technology by drug dealers and tax evaders, and fears of societal disintegration. Many of these concerns will be valid; crypto anarchy will allow national secrets to be trade freely and will allow illicit and stolen materials to be traded. An anonymous computerized market will even make possible abhorrent markets for assassinations and extortion. Various criminal and foreign elements will be active users of CryptoNet. But this will not halt the spread of crypto anarchy.
Just as the technology of printing altered and reduced the power of medieval guilds and the social power structure, so too will cryptologic methods fundamentally alter the nature of corporations and of government interference in economic transactions. Combined with emerging information markets, crypto anarchy will create a liquid market for any and all material which can be put into words and pictures. And just as a seemingly minor invention like barbed wire made possible the fencing-off of vast ranches and farms, thus altering forever the concepts of land and property rights in the frontier West, so too will the seemingly minor discovery out of an arcane branch of mathematics come to be the wire clippers which dismantle the barbed wire around intellectual property.
Arise, you have nothing to lose but your barbed wire fences!