Here’s Why You Hate Your Cable Company

Via: All Things D

March 30, 2013 at 4:00 am PT

Hate your cable TV (or satellite TV, or telco TV) company? Here’s why — and why it’s not going to change anytime soon — explained in 98 concise seconds.

Hard to believe no one has done this before, but kudos to Extremely Decent Films for nailing it.

Warning: If your workplace or home isn’t cool with some well-placed profanity, then this video isn’t safe for your workplace or home.

Read more: here

Advertisements

POLICY CONCERNING RIVER CITY PROCEDURES

Via: Cryptome

UNITED STATES MARINE CORPS
15TH MARINE EXPEDITIONARY UNIT
BOX 555365
CAMP PENDLETON, CALIFORNIA 92055-5365
Canc: Aug 2013
MEUBul 2023
13 Aug 12
MARINE EXPEDITIONARY UNIT BULLETIN 2023
From: Commanding Officer
To: Distribution List
Subj: POLICY CONCERNING RIVER CITY PROCEDURES
Ref: (a) (C//NF) USS PELELIU (LHA-5) Instruction C3430.2
(b) NAVY Wide OPTASK IO, 151731Z May 06
Encl: (1) RIVER CITY Access List
(2) RIVER CITY Access Modification Request

1. Purpose. To provide procedural guidance for controlling outgoing
communications and network paths for 15th Marine Expeditionary Unit (MEU)
from the USS PELELIU (LHA-5) for the purpose of operations security (OPSEC)
and force protection.

2. Background. RIVER CITY conditions are used as a countermeasure to
prevent the release of sensitive information – Essential Elements of Friendly
Information (EEFI) — by controlling outgoing communications and network paths
from the ship while allowing users to perform mission essential duties (not
administrative or personal use).

a. RIVER CITY is not to be confused with Information Operation Condition
(INFOCON), which is an all service Computer Network Defense (CND) posture
that reduces incoming traffic during military operations and/or threats to
the computer network.

b. EEFI are those elements of information that are particularly
vulnerable to adversary exploitation, and requires protection.

c. RIVER CITY conditions should be employed prior to setting certain
force protection conditions, commencing sensitive mission planning, and/or
operations that could be compromised by an inadvertent communications or
information release.

d. Instances where RIVER CITY may be required include, but are not
limited to: special operations support, strait transits, offensive strikes,
response to casualties, high-tempo operations, or when web browsing is
adversely affecting the command’s operational mission. Additionally, RIVER
CITY will be set in response to serious events, or as the Information Warfare
Commander (IWC), deems necessary to control transmitted information by phone
or electronic mail.

Read more: here 

Translation… Shutting down all external communications!
-Moose

Ye Olde Sneaker Net: Cubans Evade Censorship by Exchanging Computer Memory Sticks

Via: Cryptogon

March 20th, 2013

Via: McClatchy:

Dissident Cuban blogger Yoani Sanchez on Saturday told newspaper publishers from around the Western Hemisphere that “nothing is changing” in Cuba’s ossified political system and that “the situation of press freedom in my country is calamitous.”

But Sanchez said underground blogs, digital portals and illicit e-magazines proliferate, passed around on removable computer drives known as memory sticks.. The small computer memories, also known as flash drives or thumb drives, are dropped into friendly hands on buses and along street corners, offering a surprising number of Cubans access to information.

Information circulates hand to hand through this wonderful gadget known as the memory stick,” Sanchez said, “and it is difficult for the government to intercept them. I can’t imagine that they can put a police officer on every corner to see who has a flash drive and who doesn’t.”

Sanchez said “these little gizmos” have “helped us a lot to pass information.”
Read more: here

We can learn from our Cuban brothers…..
-Moose

US Drones Bombing Africa Operated From RAF Bases In The Heart of The Lincolnshire Countryside

Via: The Daily Mail

By Robert Verkaik, Mail On Sunday Security Editor

An RAF base in Britain is being used by America in its controversial drone warfare campaign, it was claimed last night.

Documents seen by The Mail on Sunday reveal that the United States has established a drone ‘operations centre’ in the heart of the Lincolnshire countryside which could be used to co-ordinate attacks in the Middle East and Africa.

Last night, the revelation sparked claims of British complicity in the US Airforce (USAF) assassination programme which is being investigated by the United Nations.

One document requests US security-cleared staff to work at RAF Waddington on a USAF drone called the Predator. The weapon has killed hundreds of people in Pakistan, Somalia and Yemen.

A second document describes a role for a communications technician at the same base ‘supporting 24/7 operations of critical real-time USAF/ANG [Air National Guard] mission operations’.

Bosh Global Services, the US company recruiting personnel, designs and maintains key drone equipment for the American military and has established a base in Lincolnshire, believed to be at RAF Waddington.

The site has been designated Britain’s first drone centre and will have five fully armed Reapers from next year.

Read more: here

Thank goodness we will never have armed drones in the US…
-Moose 

The Low-Information Voter’s Guide to Politics

Via: PJ Media

Personal responsibility is hard. We’re here to help.


by Oleg Atbashian

March 2, 2013
 

 
If you think you only deserve fun answers to all life’s questions … you’re right! This primer will help you look smart and morally superior in any political discussion. Just memorize these big words, explained in easy terms you already know from TMZ and The Daily Show:

BIASED: If you have a weird friend who goes to church and her parents are still married, that’s what they are.
ELECTIONS: These are like the Teen Choice Awards: the coolest and most popular wins. Democrats always win because they are cool and popular. Republicans are more like your weird friend’s parents.
DEBT CEILING: This is like Lindsay Lohan’s probation: by law, she should go to jail if she gets arrested, but we all know she won’t.
PUBLIC EDUCATION. Think Memento. Remember how the guy in the movie learned to go through life and fight enemies by relying on snapshots, notes, and tattoos? Public education does that on a national level as a free service.
IM-MI-GRA-TION: Whew, that’s a long word — just like that velvet rope outside nightclubs. When really fun people arrive, you just open it right up.
QUAN-TI-TA-TIVE EASING: Remember Leonardo DiCaprio in Catch Me If You Can, and how he printed his own checks? Well, that’s what the Treasury secretary, Tim Geithner, does. It’s really cool.
TRILLION DOLLARS: This is a silly number. If someone says: “The U.S. national debt has topped 16 trillion,” take it easy. Remember how Jeffrey Dahmer was sentenced to fifteen life terms while having only one life?
Once you owe more than you can pay, numbers stop making sense. Anything above that is free money; spend it fast so you can get more.
ECONOMIC STIMULUS: It’s like Whitney Houston upping her dosage to get the same high, always needing to use more and more to “chase the dragon.”

Read more: here

The Low-Information Voter’s Guide to Politics

Via: PJ Media

Personal responsibility is hard. We’re here to help.


by Oleg Atbashian

March 2, 2013
 

 
If you think you only deserve fun answers to all life’s questions … you’re right! This primer will help you look smart and morally superior in any political discussion. Just memorize these big words, explained in easy terms you already know from TMZ and The Daily Show:

BIASED: If you have a weird friend who goes to church and her parents are still married, that’s what they are.
ELECTIONS: These are like the Teen Choice Awards: the coolest and most popular wins. Democrats always win because they are cool and popular. Republicans are more like your weird friend’s parents.
DEBT CEILING: This is like Lindsay Lohan’s probation: by law, she should go to jail if she gets arrested, but we all know she won’t.
PUBLIC EDUCATION. Think Memento. Remember how the guy in the movie learned to go through life and fight enemies by relying on snapshots, notes, and tattoos? Public education does that on a national level as a free service.
IM-MI-GRA-TION: Whew, that’s a long word — just like that velvet rope outside nightclubs. When really fun people arrive, you just open it right up.
QUAN-TI-TA-TIVE EASING: Remember Leonardo DiCaprio in Catch Me If You Can, and how he printed his own checks? Well, that’s what the Treasury secretary, Tim Geithner, does. It’s really cool.
TRILLION DOLLARS: This is a silly number. If someone says: “The U.S. national debt has topped 16 trillion,” take it easy. Remember how Jeffrey Dahmer was sentenced to fifteen life terms while having only one life?
Once you owe more than you can pay, numbers stop making sense. Anything above that is free money; spend it fast so you can get more.
ECONOMIC STIMULUS: It’s like Whitney Houston upping her dosage to get the same high, always needing to use more and more to “chase the dragon.”

Read more: here

Ordering A Pizza In The Panopticon

Via: disinformation

Posted by JacobSloan on February 8, 2013 

How much of the ACLU’s prescient 2004 short film Ordering Pizza, which envisions ordering a pizza online in a future dystopian electronic surveillance state, has is already starting to come true? Getting takeout has never been so traumatic:

We are facing a flood of powerful new technologies that expand the potential for centralized monitoring, an executive branch aggressively seeking new powers to spy on citizens, a docile Congress and courts, as well as a cadre of mega-corporations that are willing to become extensions of the surveillance state. We confront the possibility of a dark future where our every move, our every transaction, our every communication is recorded, compiled, and stored away, ready for access by the authorities whenever they want.

Read more: here

We are so f#%ked!
-Moose

Ordering A Pizza In The Panopticon

Via: disinformation

Posted by JacobSloan on February 8, 2013 

How much of the ACLU’s prescient 2004 short film Ordering Pizza, which envisions ordering a pizza online in a future dystopian electronic surveillance state, has is already starting to come true? Getting takeout has never been so traumatic:

We are facing a flood of powerful new technologies that expand the potential for centralized monitoring, an executive branch aggressively seeking new powers to spy on citizens, a docile Congress and courts, as well as a cadre of mega-corporations that are willing to become extensions of the surveillance state. We confront the possibility of a dark future where our every move, our every transaction, our every communication is recorded, compiled, and stored away, ready for access by the authorities whenever they want.

Read more: here

We are so f#%ked!
-Moose

IRS Funneled Nearly $500M in Contracts to One IT Firm in 2012

Via: CNS News

WASHINGTON (AP) — The House Oversight Committee is investigating whether a personal relationship between an Internal Revenue Service employee and the owner of a computer company produced a series of government contracts worth about $500 million.

In a letter obtained by The Associated Press from the committee’s chairman, Rep. Darrell Issa, R-Calif., to acting Treasury Secretary Neal S. Wolin, Issa writes that he recently has learned about a personal relationship between an IRS employee and Braulio Castillo, the owner of Signet Computers Inc. Signet Computers’ website lists company addresses in Virginia and Washington, D.C.

The name of the IRS employee, who works in the agency’s procurement department, is blacked out in the letter obtained by the AP. The IRS operates within the Treasury Department.

Issa writes that prior to 2012, Signet Computers, which advertises itself as specializing in information technology issues, “does not appear to have received any federal contracts.” Since then, he writes, Signet has been awarded approximately $500 million worth of federal contracts, all but $180,835 of them from the IRS.

“The fact that Signet Computers was able to secure federal contracts worth a half-billion dollars in a matter of months, despite having no track record of past performance, raises many questions,” Issa writes.

Read more: here

No, not in that bastion of honor..The IRS…
-Moose

Pre-Emptive Cyber-Wars Begun They Have

Via: ZeroHedge

As the world’s economic powers squabble over the intricacies of cause and effect in a vicious cycle of currency devaluation and domestic economic defense; it appears, NYTimes reports, that the US is leading the way in another direction. A secret legal review on the use of America’s growing arsenal of cyber-weapons has concluded that President Obama has the broad power to order a pre-emptive strike if the United States detects credible evidence of a major digital attack looming from abroad – i.e. if we ‘suspect’ someone is going to hack us, we can hack them.

In what appears to be Stuxnet’s bigger (and scarier) brother,one official noted, “there are levels of cyberwarfare that are far more aggressive than anything that has been used or recommended to be done.” New policies will also govern how the intelligence agencies can carry out searches of faraway computer networks for signs of potential attacks on the United States and, if the president approves, attack adversaries by injecting them with destructive code – even if there is no declared war. Cyberweaponry is the newest and perhaps most complex arms race under way, based in Cyber Command at The Pentagon, with the unspoken question being, ‘What are we going to do about China?’
 
Read more: here

Pre-Emptive Cyber-Wars Begun They Have

Via: ZeroHedge

As the world’s economic powers squabble over the intricacies of cause and effect in a vicious cycle of currency devaluation and domestic economic defense; it appears, NYTimes reports, that the US is leading the way in another direction. A secret legal review on the use of America’s growing arsenal of cyber-weapons has concluded that President Obama has the broad power to order a pre-emptive strike if the United States detects credible evidence of a major digital attack looming from abroad – i.e. if we ‘suspect’ someone is going to hack us, we can hack them.

In what appears to be Stuxnet’s bigger (and scarier) brother,one official noted, “there are levels of cyberwarfare that are far more aggressive than anything that has been used or recommended to be done.” New policies will also govern how the intelligence agencies can carry out searches of faraway computer networks for signs of potential attacks on the United States and, if the president approves, attack adversaries by injecting them with destructive code – even if there is no declared war. Cyberweaponry is the newest and perhaps most complex arms race under way, based in Cyber Command at The Pentagon, with the unspoken question being, ‘What are we going to do about China?’
 
Read more: here

How the NSA Warrantless Wiretap System Works

Via: End the Lie

An Educated Guess

J. I. Nelson, Ph.D.

PREFACE: This paper is “An Educated Guess” because I have had contact only with the kind of open information that is available in an open society. Therefore, the following analysis is necessarily speculative, as I will warn you again at the end (“Caveat”). On the other hand, I believe it is largely correct, and anyone with a good scientific and technical background could have written a similar account. 

SUMMARY:
The National Security Agency (NSA) is opening so many phone taps that it is physically impossible to obtain court-reviewed warrants. It is time to forget warrants and move on. This Administration certainly has.

Read more: here

How the NSA Warrantless Wiretap System Works

Via: End the Lie

An Educated Guess

J. I. Nelson, Ph.D.

PREFACE: This paper is “An Educated Guess” because I have had contact only with the kind of open information that is available in an open society. Therefore, the following analysis is necessarily speculative, as I will warn you again at the end (“Caveat”). On the other hand, I believe it is largely correct, and anyone with a good scientific and technical background could have written a similar account. 

SUMMARY:
The National Security Agency (NSA) is opening so many phone taps that it is physically impossible to obtain court-reviewed warrants. It is time to forget warrants and move on. This Administration certainly has.

Read more: here

Barracuda Security Equipment Contains Hardcoded Backdoors

Via: Information week

Mathew J. Schwartz | January 24, 2013 01:41 PM

Multiple Barracuda appliances — including its firewall, SSL VPN server, and load balancer devices – have security flaws that can be exploited by attackers to remotely access and gain shell-level access to the appliances.

That warning over hardcoded backdoor accounts, as well as a “critical SSH backdoor,” was sounded Thursday in a security warning released by Austria-based information security consultancy SEC Consult.

Read more: here