671 posts tagged with security.
Displaying 351 through 400 of 671. Subscribe:

Think things better before Bush?

Forty men and one woman went to prison for sedition in Montana Seems that we make faulty assumptions about how we have protection and rights in our democracy, and that things used to be much better than they now are...not so. A big difference, though, is that now our Big Brothers have technology to help snare misbehaving citizens.
posted by Postroad on May 3, 2006 - 38 comments

Mac OS/X, Safari Security Threats on the Rise

Safari is added to the spring 2006 update of the SANS Top Twenty Internet Security Vulnerabilities, following its last update in the fall which for the first time added OS/X to the list. OS/X saw its first zero-day exploit this year, there are at least seven new vulnerabilities waiting for a patch, and everyone is starting to notice. Do you still think your Mac is bulletproof?
posted by poppo on May 3, 2006 - 92 comments

All such matters will be taken seriously.

Making any jokes or statements during the screening process may be grounds for both criminal and civil penalties.
posted by quonsar on Apr 24, 2006 - 73 comments

Movie plot threats

Security expert (and personal hero) Bruce Schneier on the subject of movie plot threats : Sometimes it seems like the people in charge of homeland security spend too much time watching action movies. They defend against specific movie plots instead of against the broad threats of terrorism.

This month, Schneier announces a contest for readers of his blog and newsletter - submit the most unlikely, yet still plausible, terrorist attack scenarios you can come up with.

From the announcement : "The prize will be an autographed copy of Beyond Fear. And if I can swing it, a phone call with a real live movie producer."
posted by Afroblanco on Apr 8, 2006 - 31 comments

Emirates Aided Kin of Palestinian Militants

Emirates Aided Kin of Palestinian Militants The American people, for reasons of possible anti-Arab feelings, made it clear that the Arab Emirates were not to gain control over our ports, despite the statements from the White House that this group is our friend and a partner in the fight against terrorism. Despite our 'friendship," there is now this evidence to the contrary. But will this news be sufficient to prevent Dubai's $1.2 Bln Bid for U.S. Weapons Maker ?
posted by Postroad on Mar 20, 2006 - 31 comments

premptive strike as last resort

The National Security Strategy of the United States of America The new(ish), policy statement from the US govt. News stories: The Times, US News & World Report, Bloomberg, BBC (newsfilter +)
posted by edgeways on Mar 16, 2006 - 42 comments

Exclusive: Dubai ports firm enforces Israel boycott

Exclusive: Dubai ports firm enforces Israel boycott [Defenders of the Bush/Dubai deal argue that we ought to be fair and not be racist in being anti-Arab...that is "un-American."] "The parent company of a Dubai-based firm at the center of a political storm in the US over the purchase of American ports participates in the Arab boycott against Israel, The Jerusalem Post has learned.....Moreover, the Post found that the website for Dubai's Jebel Ali Free Zone Area, which is also part of the PCZC, advises importers that they will need to comply with the terms of the boycott....
posted by Postroad on Feb 28, 2006 - 61 comments

There's some sort of karmic justice here.

"To tell the truth ... I'm sorta surprised they haven't caught me yet," The Washington Post ran an interesting interview with a botmaster, a young man who made serveral thousands of dollars a month installing XXX spyware on machines that he controlled. He installed the software on the machines of people he did not know by hacking into them remotely. The lenghty article included a partial photo of the botmaster along with vauge descriptions of the small midwestern town where the man lives, and was published with the understanding that the man's identity would be kept secret. Someone should have told that to the person that manages photos at the Washington Post. An estute reader over at Slashdot was able to locate some extra information stored in the picture's metadata including the photographer and the location the picture was taken, Roland, Oklahoma, a town of less than 3000 people. Whoops.
posted by daHIFI on Feb 21, 2006 - 56 comments

Top 12 media myths and falsehoods on the Bush administration's spying scandal

Top 12 media myths and falsehoods on the Bush administration's spying scandal Summary: Media Matters presents the top 12 myths and falsehoods promoted by the media on President Bush's spying scandal stemming from the recent revelation in The New York Times that he authorized the National Security Agency (NSA) to eavesdrop on domestic communications without the required approval of the Foreign Intelligence Surveillance court.
posted by Postroad on Feb 10, 2006 - 12 comments

FTC imposes $10M fine against ChoicePoint for data breach

FTC imposes $10M fine against ChoicePoint for data breach The U.S. Federal Trade Commission has fined ChoicePoint $10 million for a data breach that allowed identity thieves posing as legitimate businesses to steal social security numbers, credit reports, and other data from nearly 140,000 people. This is the largest fine ever levied by the FTC. ChoicePoint also has to set up a 'trust fund' for people victimized by identity thieves. From the article: 'As part of its agreement with the FTC, ChoicePoint will also have to submit to comprehensive security audits every two years for the next 20 years.'" BusinessWeek has additional info. Perhaps there might be hope for individual privacy after all. Let's all keep our fingers crossed.
posted by mk1gti on Jan 26, 2006 - 22 comments

Fly in the Fast Lane

Tired of standing in line at the airport? Worried that you might share a name with a known terrorist or subversive on the TSA's mysterious no-fly lists? Relax. Get fingerprinted and/or iris scanned. And pay $79.95 a year to become a Registered Traveler, and fly Clear in the fast lane. (And note how quickly conceptual art projects become indistinguishable from reality.) Meanwhile, the Feds settle an ACLU lawsuit over the no-fly lists... while revealing no information about them. [Lists recently discussed here].
posted by digaman on Jan 25, 2006 - 52 comments

HAVA has forced us to purchase systems that in my opinion are not appropriate for citizens to be voting on

E-voting systems hacker sees ‘particularly bad’ security issues ...On Tuesday, Dec. 13, we conducted a hack of the Diebold AccuVote optical scan device. I wrote a five-line script in Visual Basic that would allow you to go into the central tabulator and change any vote total you wanted, leaving no logs.... More from the Washington Post here, where ... Four times over the past year Sancho told computer specialists to break in to his voting system. And on all four occasions they did, changing results with what the specialists described as relatively unsophisticated hacking techniques. ..."Can the votes of this Diebold system be hacked using the memory card?" Two people marked yes on their ballots, and six no. The optical scan machine read the ballots, and the data were transmitted to a final tabulator. The result? Seven yes, one no. ... Verified Voting and Black Box Voting have much much more on all of this.
posted by amberglow on Jan 23, 2006 - 58 comments

THIS MEANS WAAAAR!!

A revolution is the solution We talked about how Ebaum's World sucks before in the Blue, but it's looks like things have been taken a step futher with Eric Bauman's latest theft of an animated GIF of Lindsey Lohan. While script kiddies have already been concentrating on wiping Ebaum's World off the net completely, the latest swipe from ytmnd.com (NSFW?) has caused a 'massive' DoS war against Bauman as this wonderful writeup from Vitalsecurity.org explains.
posted by daHIFI on Jan 9, 2006 - 59 comments

Mohan also declined to say how often or in what volume CBP might be opening mail.

Private Mail--Not. ...Goodman, an 81-year-old retired University of Kansas history professor, received a letter from his friend in the Philippines that had been opened and resealed with a strip of dark green tape bearing the words “by Border Protection” and carrying the official Homeland Security seal. ...the agency can, will and does open mail coming to U.S. citizens that originates from a foreign country whenever it’s deemed necessary. ...
posted by amberglow on Jan 6, 2006 - 54 comments

The Increasingly Unfriendly Skies

Is your name James Moore? If so, you may be a terrorist. Or at least the NSA thinks so, having added that name -- which also happens to be the name of the author of Bush's Brain: How Karl Rove Made George W. Bush Presidential -- to its mysteriously targeted and infamously mismanaged "No-Fly" list [previously discussed here.]
posted by digaman on Jan 5, 2006 - 51 comments

Homeland Security visit a hoax. Students do the funniest things.

America seems a little less evil today. The outrage and indignation expressed in a previous MeFi story was unjustified. The Department of Homeland Security did not visit a student after he made an interlibrary request for Mao Tse-Tung's Little Red Book. The student made it all up.
posted by Meridian on Dec 24, 2005 - 53 comments

Because there just haven't been enough government scandals lately...

Federal surveillance of over a hundred homes, businesses, mosques, warehouses and other sites has been conducted without warrants, according to a new USNews report. Indications are that the persons so targeted were US citizens. "In numerous cases, the monitoring required investigators to go on to the property under surveillance, although no search warrants or court orders were ever obtained, according to those with knowledge of the program. Some participants were threatened with loss of their jobs when they questioned the legality of the operation, according to these accounts."
posted by darkstar on Dec 23, 2005 - 131 comments

Echelon: 60 Minutes discussion

Echelon This is what we know--or do not know--about NSA prgram called Echelon, from 60 Minute show (TV) in 2000. If we assume this what had been going on and there were some sort of restraints for internal spying, then what is going on now? This evening I had heard on radio that the White House claimed that only calls going in and out of the country might be monitored. But this early interview suggests that such calls were monitored previous to the "new" approach. Why were legal restraints put in place calling for judicial hearings? Because of spying abuse done under Nixon. Those restraints are now removed.
posted by Postroad on Dec 19, 2005 - 158 comments

Above Ground Covert-Ops

Global Options, Inc. Have you been unfairly attacked by: the media? trial lawyers? disgruntled workers? terrorists? overzealous federal regulators? competitors? hackers? industrial spies? one-issue activists? extortionists? intellectual property thieves? or even the Russian mafia? Global Options has your back. [warning: radar beeps.]
posted by panoptican on Dec 4, 2005 - 19 comments

Signaling Vulnerabilities in Wiretapping Systems

Signaling Vulnerabilities in Wiretapping Systems. The technology used for decades by law enforcement agents to wiretap telephones has a security flaw that allows the person being wiretapped to stop the recorder remotely [bugmenot]. It is also possible to falsify the numbers dialed [pdf].
posted by event on Nov 30, 2005 - 5 comments

David Brin's worried ....

David Brin -- hoping to rescue modernity Quote: -- "... I have spoken before of the blatant -- and yet never-reported -- pattern shown by more than a hundred members of the United States Congress, appointing young cadets to the US Military Academies according to one criterion above all others -- their depth of religious zealotry. This infusion of young officers who believe in a coming apocalypse is discreetly worrisome at West Point and Annapolis, but it has already had newsworthy effects at the Air Force Academy, in Colorado Springs. A town that is also now known as a main locus and training center for fanatics bent on dominating American civilization. (see) This coincidence... one of many that simply cannot be coincidence... should be tallied and noted. See also this in recent -- 11/26 -- news "... Among the steps already taken by the Pentagon that enhanced its domestic capabilities was the establishment after 9/11 of Northern Command, or Northcom, in Colorado Springs, to provide military forces to help in reacting to terrorist threats in the continental United States. Today, Northcom's intelligence centers in Colorado and Texas fuse reports from CIFA, the FBI and other U.S. agencies, and are staffed by 290 intelligence analysts. That is more than the roughly 200 analysts working for the State Department's Bureau of Intelligence and Research, and far more than those at the Department of Homeland Security...."
posted by hank on Nov 28, 2005 - 29 comments

Deafening silence over GAO e-voting report, new evidence of abuse.

Mainstream Media to American Democracy: Drop Dead! Brad Friedman ask alarming questions about the complete lack of attention which has been paid to the GAO report on electronic voting technology (PDF link) released more than a month ago, which confirms what security experts have been saying for years: these systems are vulnerable to multiple independent attacks targeting system and network vulnerabilities, access controls, hardware controls, and overall management practices. If you're short of time, at least read Rep. Waxman's fact sheet summary.

Ultimately, there is no real security on these machines; the report shows that overturning election results would not be at all difficult for even a single moderately skilled attacker. And now Bob Fitrakis and Harvey Wasserman are wondering if American Democracy has died an electronic death in the wake of massive discrepancies between final pre-election opinion polls and the results of several citizen initiatives designed to reform Ohio's electoral processes.
posted by dinsdale on Nov 16, 2005 - 68 comments

Security smackdown

Howard Schmidt thinks that developers should be accountable for security holes. Schneier responds.
posted by afroblanca on Oct 20, 2005 - 29 comments

Herding Zombies

Interesting "New Yorker" article about online extortion via DDoS attacks. Call me naive and underinformed, but I had little understanding of how this works. "In the most common scenario, the bots surreptitiously connect hundreds, or thousands, of zombies to a channel in a chat room. The process is called “herding,” and a herd of zombies is called a botnet."
posted by dersins on Oct 7, 2005 - 34 comments

Conservation doesn't include Air Force One

Petroleum Industry Christmas Wishlist Conservative pundits are quick to point out that no "new refineries have been built since 1976", and even quicker to blame "environmentalists". But the facts just don't support that. Refiners have chosen the environment that they do business in, and in some cases have willingly contributed to it. (Plenty of data here.) Here's why:

  • The government has allowed the industry to merge, consolidate, and restrict refining capacity, thus impacting pricing, supply, and demand.
  • The quest for profits has caused the need to run extremely lean supplies (ie. no stockpiles of crude - it arrives when you need it, not before) and has resulted in susceptability to wild volatility in prices, but has allowed refiners to operate at very high efficiency but with no margin of excess capacity for temporary shortages, disasters, etc.
  • Oil refiners trimmed back capacity after the Oil Crash of the early 1980s and have been unwilling to reinvest in new technologies unless environmental restrictions and local fuel cleanliness mandates are reduced.
As one would expect, Bush's solutions nicely match up with the wishlists of OPEC and US refiners, who in the past few decades have largely undone the breakup of Standard Oil (via) via mergers and joint ventures. Representative Joe Barton, (R-TX), Chairperson of the Energy and Commerce Committee, incidentally up for reelection and well funded, by "the industry" through various Political Action Committees, has released a draft of the predictably named (to be found here when released) Gasoline for America's Security Act of 2005 (committee discusion and webcast are scheduled for 9/28 at 8 am.) Given that new refineries are years away, there is still no solution for current prices or the (90%?) increase in prices since January of 2001.
posted by rzklkng on Sep 27, 2005 - 22 comments

In the future, the whole world will be like a video game....

Closed Circuit TV and Data Confluence
Qinetiq is bringing their CCTV confluence technology, codenamed Praetorian, to the UK. "The system automatically tracks and stitches 3D images with CCTV video, maps and other real-time information. It automatically alerts operators to intruders, unusual behaviour, left objects or anything it is told to spot." And it looks more like a video game than a video feed. This new tech is perhaps not as controversial as Qinetiq's Millimetre Wave Imaging System that allows passive scanning through clothing to detect guns, knives or bombs.
Yes, it is very Big Brother-esque but its also pretty amazing technology too. Qinetiq previously discussed on MeFi here, here, here and here.
posted by fenriq on Aug 12, 2005 - 7 comments

Kill Spam Dead

"Israeli technology firm Blue Security has set up a scheme to batter spam websites with thousands of complaints. The plan is to fill order forms...offering pills, porn and penile health tonics with complaints about the products advertised for sale in junk messages." I signed up.
posted by JPowers on Jul 23, 2005 - 27 comments

Stealing Osama's Identity

Security, the TSA, and the No-Fly List You would think that our National Security apparatus would be like the TV series "24", with the most ingenious and sophisticated technology available. You would be wrong. Disclaimer: TSA is not an intelligent intelligence agency. Here's a blurb from the resume of the designer(Kenneth Mack) of the application the airline industry uses for *PDF* managing their employee data and the cross-checking them with the no-fly list:
- Sr. Developer: Developed a program [for Goddard Technologies] that uses the "No-Fly List" Excel spreadsheet, provided by the FAA and the database of badged employees to permute the name combinations. It takes into consideration multiple first and middle names, with Soundex and the various "initial" combinations. This program reduced the time for comparison from 3 days to 10 minutes.
The scary yet interesting part of all of this is that the No-Fly List is nothing more than a password-protected spreadsheet (see this PDF). One would guess our Government's geeks would know that it's a bad idea to send email attachments containing social security numbers and dates of birth, unencrypted, over the internets, even if they might be terrorists.
posted by rzklkng on Jul 15, 2005 - 30 comments

Alarming Article on Security Procedures

Alarming Article on Security Procedures What is alarming is not necessarily that there is a "no-fly" list, or that we have security measures in response to a percieved terrorist threat. What's alarming is that there seems to be no accountabity or due process demanded from public officials. Without accountability, what's to stop public officials from acting arbitrarily, or for some political endeavor? (See the Plame case.) Combined with the Right's seeming position that the president is above the law in prosecuting a war, U.S. Supreme Court Case No. 03-1027 (Rumsfield v. Padilla) and Case No. 03-6696 (Hamdi v. Rumsfield), (see also the recent DOJ position papers), and for the 1st time I am becoming nervous that America might devolve into something like a police state.
posted by JKevinKing on Jul 7, 2005 - 36 comments

$$$P0--ahgo6

Write down your password. Bruce Schneier, Author of Applied Cryptography and founder of Counterpane security is urging people to write down their passwords.
posted by delmoi on Jun 21, 2005 - 68 comments

Ice Cream Safety At Last

Keep your ice cream safe or at least make it clear that you don't appreciate the tampering.
posted by plinth on Jun 15, 2005 - 23 comments

"Skunk" Baxter

Rocker Jeff Baxter Moves and Shakes in National Security • "Jeff Baxter played psychedelic music with Ultimate Spinach, jazz-rock with Steely Dan and funky pop with the Doobie Brothers. But in the last few years he has made an even bigger transition: Mr. Baxter, who goes by the nickname "Skunk," has become one of the national-security world's well-known counterterrorism experts."
posted by dhoyt on May 25, 2005 - 27 comments

Terror Alert: Yellow!

Be afraid: The national threat-alert level today is yellow or "elevated," with "significant risk of terrorist attacks," says the Department of Homeland Security. In fact, the alert level has been elevated since December of 2003, when it was raised from orange. During the election season, the Fox News network flashed the terror alert level in their "crawl" as if there was breaking news -- the sort of thing that prompted some liberal wags to ridicule the entire system. Now former DHS secretary Tom Ridge says that the Bush administration was "really aggressive" about raising the threat-alert level during his tenure, even when the agency felt that the intelligence didn't warrant it.
posted by digaman on May 11, 2005 - 24 comments

"Speaks strange language? Check. Ethnic-style dress? Check. Very suspicious".

Terrorists from Antarctica. Two Seaworld penguins flying out of San Diego airport are sent walking through the metal detector. Better safe than sorry. via BoingBoing, via Schneier
posted by matteo on Apr 23, 2005 - 44 comments

US Anti-Espionage Posters

Loose lips sink ships!!!1 (There be images, some quite big here) I suspect a lot of MeFi shares my obsession with propaganda (and propaganda-style) posters, both domestic and foreign, as well as the photoshops that the Something Awful or Fark crowds generate. CoolGov has a link today to the Office of the National National Counterintelligence Executive and their Anti-Espionage poster collection. Some are great, some are almost pure propaganda, and some show how obsessed with secrecy our government has become. That lead me to Google to look for posters on the *.gov and *.mil domains. Check out the posters for "Venemous Snakes of Afghanistan and Pakistan", or what the well dressed airmen is wearing (*note the "Essentials"), posters from the NOAA telling you that "lightning kills", the Code of Ethics for Government Officers and Employees, and this one telling GI's why smoking could kill them.
posted by rzklkng on Apr 18, 2005 - 22 comments

Harvard rejects

"Hacker" discovers backdoor to Harvard Business School admissions decisions.
Harvard rejects all applicants who used the "hack."
posted by trharlan on Mar 8, 2005 - 68 comments

Prox Card Hack

Think your Prox Card system is secure? Guess again. Some Sophomores at Olin College reverse-engineered the prox card system on campus and built their own reader. Rumor has it they have a spoofer (self-contained copier/transmitter) too, but nothing on the site about it.
posted by Brockstar on Mar 5, 2005 - 10 comments

Want to know the hardware behind Echelon?

Want to know the hardware behind Echelon? The other day I posted a book (Chatter) review about NSA. In this follow-up, the equipment used. "Aside from using the system for industrial espionage and bypassing international and national laws to listen in on people, it is also used to listen out for people like Osama bin Laden and assorted terrorists in the hope of preventing attacks."
posted by Postroad on Mar 3, 2005 - 7 comments

A false is false, of course of course

New Firefox build fixes IDN toggle Hear about the IDN debacle yesterday? Last night's build of Firefox fixes it. Download and install over your existing Firefox. The Mozilla tree is fixed too. [instructions inside]
posted by cavalier on Feb 8, 2005 - 38 comments

IDN browser hacks

Heard about the IDN browser hack? Try out this test page which should open your eyes (the hack is blocked in IE, ironically enough). Here's a list of all affected browsers, ways to fix this in mozilla inside.
posted by mathowie on Feb 7, 2005 - 64 comments

Earmarked

Visitors to the US tagged with RFID chips? They already use them on goods and livestock, but soon also foreign visitors will be earmarked. Will it make the US a safer country?
posted by kika on Jan 27, 2005 - 34 comments

Prohibited Items at the Presidential Inauguration

Empty your pockets before attending the Presidential Inauguration. Among items forbidden are pocket tools, explosives, animals -- and in case they forgot to mention something, "any other items at the discretion of the security screeners that may pose a potential safety hazard"
posted by ThePrawn on Jan 16, 2005 - 50 comments

Sign on the X

Testing the limits of credit card receipt signatures. Are there any?
posted by DBAPaul on Jan 14, 2005 - 62 comments

Nothing--you're screwed.

Safe Personal Computing. Bruce Schneier, cited frequently on Metafilter, has a new article on his blog in which he gives home users concrete actions they could take to improve security. As the holidays come and I make the rounds to disinfect and repair all my family's computers, I'll be printing this out and sticking copies to their monitors.
posted by sohcahtoa on Dec 13, 2004 - 73 comments

Barlow's War

Is John Barlow, cofounder of the Electronic Frontier Foundation and Grateful Dead lyricist, a threat to national security? "On September 15, 2003, I boarded Delta Flight 310, scheduled to depart San Francisco International Airport for JFK at 7:20 that morning. I was still feeling slightly singed from Burning Man and the hour was one I prefer to see from the other side. I was almost back to sleep when, roughly two minutes before pull-back, I was approached by a Delta employee who informed me that there was 'a problem' of some sort and that it would be necessary to get off the aircraft..."
posted by digaman on Dec 10, 2004 - 172 comments

Que pensaient-ils?

French police on Sunday ended their practice of hiding plastic explosives in air passengers' luggage to train bomb-sniffing dogs after one such bag got lost, possibly ending up on a flight out of Paris' Charles de Gaulle airport.
WTF were they thinking? Isn't there a better way to train the dogs without making innocent people unwittingly carry plastique?
posted by Vidiot on Dec 5, 2004 - 34 comments

Who is watching Big Brother?

Who is watching Big Brother? Last week, the Australian Privacy Foundation held its annual Big Brother Awards, with biometric passports winning the prestigious "Orwell" for the most invasive technology (other countries' Big Brother Awards here). Not long before, Privacy International and the Electronic Privacy Information Center released their 7th Annual Survey on the state of privacy in sixty countries, claiming that threats to personal privacy have reached a level that is dangerous to fundamental human rights. Are we edging closer to Room 101?
posted by UbuRoivas on Nov 29, 2004 - 6 comments

Oceania has always been at war with Eurasia

I feel safer already! Yesterday, the Department of Homeland Security lowered the terror alert-level for the financial-services sector in the NY/DC area from orange to yellow, which has nothing, repeat nothing, to do with the election. "We don't do politics here at this department," days DHS deputy secretary James Loy. When the alert was jacked up back in August, some felt otherwise.
posted by digaman on Nov 11, 2004 - 16 comments

Robotechs personal robots that protect and hopefully don't kill

I always thought a future filled with robots would be kinda cool, but I find the Robowatch home security robot kinda creepy. It's expensive (50k euros), looks pretty obvious patrolling around, does have a slick futuristic controller, but finding the three stooges is about the best it can do. I suppose this would be like having your own googlebot around the house.
posted by mathowie on Nov 5, 2004 - 5 comments

Google falters? Can't be!

GMail not-so-safe Mail. So apparentley GMail has a major exploit that's been discovered by an Israeli hacker. "Using a hex-encoded XSS link, the victim's cookie file can be stolen by a hacker, who can later use it to identify himself to Gmail as the original owner of an email account, regardless of whether or not the password is subsequently changed." And so the fun with GMail begins..
posted by mrplab on Oct 29, 2004 - 9 comments

Page: 1 ... 4 5 6 7 8 9 10 11 ... 14