Pages

Wednesday, July 28, 2010

cia & google invest in 'recorded future' of web monitoring

google/cia invest in 'future' of pre-crime
cia & google invest in 'recorded future' of web monitoringfrom danger room: The investment arms of the CIA and Google are both backing a company that monitors the web in real time - and says it uses that information to predict the future.

The company is called Recorded Future, and it scours tens of thousands of websites, blogs and Twitter accounts to find the relationships between people, organizations, actions and incidents - both present and still-to-come. In a white paper, the company says its temporal analytics engine “goes beyond search” by “looking at the ‘invisible links’ between documents that talk about the same, or related, entities and events.”

The idea is to figure out for each incident who was involved, where it happened and when it might go down. Recorded Future then plots that chatter, showing online “momentum” for any given event.

The cool thing is, you can actually predict the curve, in many cases,” says company CEO Christopher Ahlberg, a former Swedish Army Ranger with a PhD in computer science.

Which naturally makes the 16-person Cambridge, Massachusetts, firm attractive to Google Ventures, the search giant’s investment division, and to In-Q-Tel, which handles similar duties for the CIA and the wider intelligence community.

It’s not the very first time Google has done business with America’s spy agencies. Long before it reportedly enlisted the help of the National Security Agency to secure its networks, Google sold equipment to the secret signals-intelligence group. In-Q-Tel backed the mapping firm Keyhole, which was bought by Google in 2004 — and then became the backbone for Google Earth.

This appears to be the first time, however, that the intelligence community and Google have funded the same startup, at the same time. No one is accusing Google of directly collaborating with the CIA. But the investments are bound to be fodder for critics of Google, who already see the search giant as overly cozy with the U.S. government, and worry that the company is starting to forget its “don’t be evil” mantra.

Tuesday, July 27, 2010

US declares iphone 'jailbreaking' legal over apple objections

US declares iphone 'jailbreaking' legal over apple objectionsfrom threat level: Federal regulators lifted a cloud of uncertainty when they announced it was lawful to hack or “jailbreak” an iPhone, declaring Monday there was “no basis for copyright law to assist Apple in protecting its restrictive business model.”

Jailbreaking is hacking the phone’s OS to allow consumers to run any app on the phone they choose, including applications not authorized by Apple.

The Electronic Frontier Foundation asked regulators 19 months ago to add jailbreaking to a list of explicit exemptions to the Digital Millennium Copyright Act’s anti-circumvention provisions.

At stake for Apple is the very closed business model the company has enjoyed since 2007, when the iPhone debuted. Apple says it’s unlawful to jailbreak, (.pdf) but has not taken legal action against the millions who have jailbroken their phones and used the underground app store Cydia.

Apple maintains that its closed marketplace is what made the success of the iPhone possible, and sold more than three billion apps. Apple also told regulators that the nation’s cellphone networks could suffer “potentially catastrophiccyberattacks by iPhone-wielding hackers at home and abroad (.pdf) if iPhone owners are permitted to legally jailbreak their shiny wireless devices.

Thursday, July 22, 2010

defcon 7/22: bleaker for bloggers

false flag cyber attack could takedown the internet*
false flag cyber attack could takedown the internetobama joins un to dictate acceptable behavior on the net*
feds ignore 1st amendment, shut down 1000s of blogs*
google launches coverup of 'google spies' story*
google's china changes in line with law*
wikileaks reopens for leakers*

scientists find most massive star ever discovered

scientists find most massive star ever discoveredfrom ap: A huge ball of brightly burning gas drifting through a neighboring galaxy may be the heaviest star ever discovered - 100s of times more massive than the sun, scientists said Wednesday after working out its weight for the first time. Those behind the find say the star, called R136a1, may once have weighed as much as 320 solar masses. Astrophysicist Paul Crowther said the obese star - twice as heavy as any previously discovered - has already slimmed down considerably over its lifetime... it's burning itself off with such intensity that it shines at nearly 10 million times the luminosity of the sun.

Wednesday, July 21, 2010

google's wi-spying & intel ties prompt call for congressional hearing

consumer watchdog wants hearings on google's ties to cia/nsa
google's wi-spying & intel ties prompt call for congressional hearingfrom prnewswire: Citing new information about Google's classified government contracts and the Internet giant's admitted Wi-Spying activity, Consumer Watchdog today said it is more imperative than ever for the Energy and Commerce Committee to conduct hearings into possible privacy violations by Google. In a letter to Committee Chairman Henry Waxman and Ranking Member Joe Barton, the nonpartisan, nonprofit public interest group's John M. Simpson wrote:
"Based on today's Washington Post, it appears that Google holds classified U.S. government contracts to supply search and geospatial information to the U.S. government. In addition, White House records show that Google executives have been holding meetings with U.S. national security officials for undisclosed reasons. Finally, it also appears that Google's widely criticized efforts to collect wireless network data on American citizens were not inadvertent, contrary to the company's claims... As history has repeatedly shown, alliances between the U.S. intelligence community and giant corporations that collect data on American citizens can be a toxic combination where the U.S. Constitution is concerned.

Monday, July 19, 2010

underground tunnel complexes found on the moon

underground tunnel complexes found on the moonfrom the register: Space boffins believe they may be on the verge of discovering a vast, hidden network of tunnels beneath the surface of the Moon. The tunnels aren't thought to be the work of long-extinct (or perhaps still surviving) intelligent moon aliens, perhaps driven to adopt a subterranean existence by a notional disappearing atmosphere aeons ago. Nor is any involvement by Tibetans, Elvis or others seeking a secluded dwelling far from prying human eyes suspected. Instead, top moonologists think that they may be on the track of "lava tubes" not dissimilar to those of Earth. A lava tube, unsurprisingly, is a tube in solid surrounding rock along which at some point liquid lava has flowed (or is still flowing, in some Earthly cases). When the lava cools and solidifies, there is often an open space left above its surface, forming a tunnel.

Saturday, July 17, 2010

feds look for wikileaks founder at nyc hacker event

feds look for wikileaks founder at nyc hacker eventfrom cnet: Federal agents appeared at a hacker conference Friday morning looking for Julian Assange, the controversial figure who has become the public face of Wikileaks, an organizer said. Eric Corley, publisher of 2600 Magazine and organizer of The Next HOPE conference in midtown Manhattan, said five Homeland Security agents appeared at the conference a day before Wikileaks Editor in Chief Assange was scheduled to speak.

The conference program lists Assange--who has been at the center of a maelstrom of positive and negative publicity relating to the arrest of a U.S. serviceman and videos the serviceman may have provided to the document-sharing site--as speaking at 1 p.m. ET on Saturday.

"If he shows up, he will be questioned at length," Corley told CNET. Assange did not immediately respond to questions late Friday.

Corley announced on April 19 that Assange would be a keynote speaker. But by June 14, after news of the arrest of Army intelligence specialist Bradley Manning leaked, the conference was warning that Assange might remain outside of the United States for fear of being arrested on related charges.

Sunday, July 11, 2010

chinese airport closed after 'fiery ufo' is spotted flying over city

chinese airport closed after 'fiery ufo' is spotted flying over cityfrom daily mail: A Chinese airport was closed after this mysterious object was spotted in the sky. Arcing over Zhejiang's provincial capital Hangzhou, the UFO appeared to glow with an eerie white light and left a bright trail in its wake. Xiaoshan Airport was closed after the UFO was detected at around 9 pm and dozens of flights had to be diverted. Stunned witnesses reported seeing a comet-like fireball in the sky and a number of local residents took photos of the strange ball of light.

A local bus driver, giving his name only as Yu, said he had seen a strange glowing object in the sky late on Wednesday afternoon. 'The thing suddenly ran westwards fast, like it was escaping from something,' he said. Inbound flights were diverted to nearby airports while outbound flights were delayed for three to four hours. Some Chinese experts claimed that the strange sight was actually debris from a US intercontinental ballistic missile. Chinese officials later said that they knew what the object had been but were unable to make it public because there was a 'military connection.' An official statement is expected later today.

Wednesday, July 7, 2010

crack the code in cybercom's logo

"be sure to drink your ovaltine fight the net"
crack the code in cybercom's logofrom danger room: The U.S. military’s new Cyber Command is headquartered at Ft. Meade, Maryland, one of the military’s most secretive and secure facilities. Its mission is largely opaque, even inside the armed forces. But the there’s another mystery surrounding the emerging unit. It’s embedded in the Cyber Command logo.

On the logo’s inner gold ring is a code: 9ec4c12949a4f3147
4f299058ce2b22a

It is not just random numbers and does ‘decode’ to something specific,” a Cyber Command source tells Danger Room. “I believe it is specifically detailed in the official heraldry for the unit symbol... While there a few different proposals during the design phase, in the end the choice was obvious and something necessary for every military unit,” the source adds. “The mission.”

With that hint in hand, go crack this code open. E-mail us your best guess, or leave it in the comments below. Our Cyber Command source will confirm the right answer. And the first person to get it gets his/her choice of a Danger Room T-shirt or a ticket to the International Spy Museum.


update: code cracked! cybercom logo's mystery solved
from danger room: Okay, maybe it wasn’t that much of a mystery. In fact, it took a little more than three hours your Danger Room reader jemelehill to figure out the odd string of letters and numbers in the logo of the U.S. military’s new Cyber Command. Turns out, it’s the new unit’s mission statement, translated into 32 digits with the md5 cryptographic hash:
USCYBERCOM plans, coordinates, integrates, synchronizes, and conducts activities to: direct the operations and defense of specified Department of Defense information networks and; prepare to, and when directed, conduct full-spectrum military cyberspace operations in order to enable actions in all domains, ensure freedom of action in cyberspace for the U.S. and its allies, and deny the same to adversaries.
Eventually, other commenters figured it out (especially after jemelehill’s solution made it to all the databases of cracked hashes). But that didn’t stop folks from offering their own, shall we say, creative guesses, in order to win one of two coveted prizes: a Danger Room t-shirt or a ticket to the International Spy Museum.
* “If you can read this, send your resume to jobs@nsa.gov.”
* “I’m sorry, Dave. I’m afraid I can’t do that.
* “If the intelligence community is a family, think of us as the uncle no one talks about.”
* “Darmok and Jalad at Tanagra”
* “In God We Trust All Others We Monitor”
* “Why do people keep posting the wrong answers when someone solved it like 20 comments ago?”
Yahoo News, the Associated Press, Agence Presse France, Slashdot, El Reg, and the websites of the Washington Post and the L.A. Times all joined in the fun. The hubub even provoked this reponse from an official Defense Department blog:
I cracked the code, but you can keep my t-shirt.

Tuesday, July 6, 2010

US soldier linked to wikileaks 'collateral murder' video is charged

US soldier linked to wikileaks 'collateral murder' video is chargedfrom washington post: An Army intelligence analyst has been charged in connection with the leak of a controversial video of a U.S. helicopter strike and the transfer of more than 50 classified State Department cables, the military said Tuesday.

Pfc. Bradley Manning, 22, was detained in Kuwait in May after Wikileaks, a whistleblower Web site, released the video, which it titled "Collateral Murder." The footage, taken by cameras on U.S. Apache helicopters, shows several civilians, including two Reuters news agency employees, being killed in a U.S. strike in July 2007.

Manning faces two charges under the Uniform Code of Military Justice. The first encompasses four counts of violating Army regulations by transferring classified information to his personal computer between November and May and adding unauthorized software to a classified computer system. The second comprises eight counts of violating federal laws governing the handling of classified information.

Among the materials Manning is accused of transmitting to "a person not entitled to receive them" are the video and more than 50 classified diplomatic cables. According to the charge sheet, he allegedly downloaded more than 150,000 cables in all.

Monday, July 5, 2010

tsa to block 'controversial opinion' on the web

tsa to block 'controversial opinion' on the webfrom cbsnews: The Transportation Security Administration (TSA) is blocking certain websites from the federal agency's computers, including halting access by staffers to any Internet pages that contain a "controversial opinion," according to an internal email obtained by CBS News. The email was sent to all TSA employees from the Office of Information Technology on Friday afternoon. It states that as of July 1, TSA employees will no longer be allowed to access five categories of websites that have been deemed "inappropriate for government access." The categories include:

• Chat/Messaging

• Controversial opinion

• Criminal activity

• Extreme violence (including cartoon violence) and gruesome content

• Gaming

The email does not specify how the TSA will determine if a website expresses a "controversial opinion." There is also no explanation as to why controversial opinions are being blocked, although the email stated that some of the restricted websites violate the Employee Responsibilities and Conduct policy. The TSA did not return calls seeking comment by publication time.


update: tsa reverses 'controversial opinion' web policy