This week's Glenn Greenwald revelation is that Britain's GCHQ JTRIG intelligence organization offers its agents and planners tools with abilities to increase the search ranking of chosen web sites, “change outcome of online polls”, “masquerade Facebook Wall Posts for individuals or entire countries”, and accomplish “amplification of a given message, normally video, on popular multimedia websites (Youtube).” [more inside]
From a small town in Romania, Guccifer skewered and glorified the power elite.
If Snowden perfectly fit the profile of geek crusader, Lehel, a stone-faced, disheveled man in a tight leather jacket, seemed an odd candidate for one of the world’s most notorious hackers. But Guccifer is to hacking what the Beatles are to rock and roll. He had predecessors, 4Chan cowboys like Anonymous and Sabu of LulzSec, but he’s changed the nature of hacking fame. Guccifer rose by exploiting the connections people make online to infiltrate the private lives of some of the most powerful people on Earth. He served up the results to the media, irresistible high-low raw material for an online news cycle driven by leaks and voyeurism and racked by anxiety over privacy.What Is A Guccifer? [more inside]
Sian Jarvis, the supermarket’s head of corporate affairs, had undermined her claims to care about the health of her customers and let slip one of the secrets of a multi-billion-pound industry ... she revealed that one in three Asda checkouts “are what we call guilt-free checkouts”. Jarvis insisted “guilt-free” was merely “a term that’s commonly used in retail”. But it was too late, and her “guilt” gaffe quickly invited scorn in the industry and among public health professionals. Whatever the damage, she had already opened a door to the arcane science of supermarket psychology. To the designers of the modern store, shoppers are lab rats with trolleys, guided through a maze of aisles by the promise of rewards they never knew they sought The Secrets Of Our Supermarkets[more inside]
At 5:00 PM, they remote wiped my iPhone. At 5:01 PM, they remote wiped my iPad. At 5:05, they remote wiped my MacBook Air.
Yes, I was hacked. Hard. Mat Honan, a tech journalist, had his iPhone and Mac remotely wiped and his gmail account deleted within the space of 5 minutes. Password cracked? No. Security question leak? No. Social engineering Apple tech support.
Jo Guldi writes a fascinating entry about social engineering and geography in the 1970's. "The geographers located answers in American zones of isolation and hopelessness. Bill Bunge organized his fellow professors into the Detroit Geographical Expedition, leading frequent trips to document the slums of Detroit and later Toronto. Their findings were equally provocative. In 1968, the Society published a map entitled “Where Commuters Run Over Black Children on the Pointes-Downtown Track.” Life and death, they argued, were not merely the commodities available to any hard-working American, but hung upon the thread of a special kind of privilege, the privilege of safe territory." Guldi is a historian at the Harvard Society of Fellows. [more inside]
‘Forgot your password?’ may be weakest link. Herbert Thompson, chief security strategist of People Security, "asked some of his acquaintances for permission to break into their online banking accounts. The goal was simple: get into their online accounts using the information about them, their families and acquaintances that is freely available online." [more inside]
The 24th Chaos Communication Congress, "the annual four-day conference organized by the Chaos Computer Club is taking place in Berlin right now. The Congress offers lectures and workshops on a multitude of topics and attracts a diverse audience of thousands of hackers, scientists, artists, and utopians from all around the world." Lectures are also being streamed live (Check the CCC Tube) [more inside]
Covert Call allows you to alter the caller id that is sent to the phone you are calling. It can operate just like a calling card, all for the price of a normal long distance call. Caller-ID spoofing for 5¢ a minute, for all your prankster/paranoid/social engineering needs.
Testing the limits of credit card receipt signatures. Are there any?
The connections between post-war urban reconstruction, demographics, social engineering, and eugenics are explored in this treasure trove of links, from things magazine.
The International Center for Bathroom Etiquette makes me really glad that I'm a girl. I had no idea there were such complex decisions to be made about where to stand and which sink to use.
Don't be fooled by fake blogger.com. Crackers are after your Blogger password.