Tuesday, August 16, 2011

I suspect this is trivial. No defense contractor would be sending sensitive information via unsecured email... Would they?

http://www.thetechherald.com/article.php/201133/7514/Vanguard-Defense-Industries-compromised-by-AntiSec

Vanguard Defense Industries compromised by AntiSec

AntiSec is targeting defense contractors again. Continuing their beef with law enforcement, and organizations that offer them support, they have targeted Richard Garcia, the Senior Vice President of Vanguard Defense Industries (VDI). AntiSec plans to release nearly 4,713 emails and thousands of documents taken during the breach.

VDI is the Texas-based firm responsible for ShadowHawk, an unmanned helicopter that can be tasked with aerial surveillance or equipped for military usage.



These cases raise lots of interesting questions. If a reporter had filmed this incident, would there be any question of legitimacy/legality? How about a tape from a surveillance camera?

Cop Seeks Wiretapping Charges For Woman Who Videotaped Beating

"A police officer who was disciplined for his role in the beating of a Massachusetts man (many broken bones in his face and permanent partial blindness) is looking to bring criminal wiretapping charges against the woman who caught much of the incident on video. The officer received a 45-day suspension for the beating. He does not appear to deny anything that happened in the video, but he apparently thinks it shouldn't have been filmed."



This is a rather simple device, but they must have other evidence of the content of a secure signal, right?

http://www.networkworld.com/community/blog/cops-use-device-find-child-porn-wireless-netw

Cops Use Device to Find Child Porn on Wireless Networks

It's not exactly rocket science to detect Wi-Fi networks, but a new device is helping law enforcement detect wireless networks and locate individuals who are suspected of downloading child pornography. At the Crimes Against Children Conference, Fluke Networks announced that police are using a "one-button interface" on AirCheck Wi-Fi Tester to:

  • more confidently enter the suspect's location, if they determine a wireless network is secured, knowing that illegal Internet content is being downloaded from within that residence;

… You know, secured wireless networks can be cracked. Since Fluke said police can rest-assured that a suspect downloading illegal content on a secured network is the offender, I'm curious to see what happens when an innocent person wrongfully gets busted.



What happened to the “we represent the artist” argument?

Music Copyright War Looming

"When copyright law was revised in the mid-1970s, musicians, like creators of other works of art, were granted 'termination rights,' which allow them to regain control of their work after 35 years, so long as they apply at least two years in advance. Recordings from 1978 are the first to fall under the purview of the law, but in a matter of months, hits from 1979, like 'The Long Run' by the Eagles and 'Bad Girls' by Donna Summer, will be in the same situation. ... ' We believe the termination right doesn’t apply to most sound recordings,' said Steven Marks, general counsel for the Recording Industry Association of America, a lobbying group in Washington that represents the interests of record labels. As the record companies see it, the master recordings belong to them in perpetuity, rather than to the artists who wrote and recorded the songs, because, the labels argue, the records are 'works for hire,' compilations created not by independent performers but by musicians who are, in essence, their employees."



Only 13 states?

http://www.bespacific.com/mt/archives/028033.html

August 15, 2011

Database: S&P ratings for all 50 states

"Standard & Poor's downgrading of the U.S. government’s credit rating does not have any impact on individual states ratings, meaning those states that have the highest AAA rating won't have to face an automatic downgrade. There are 13 states that have the coveted Triple A credit rating by S&P, and many other states that have the same AA+ credit rating as the U.S., but with a "stable" outlook rather than the "negative" outlook of the U.S. That’s because bond issuers that have little dependence on the federal government, or that are likely to manage federal budget cuts without hurting their credit, should be able to hold on to their top ratings, an S&P analyst wrote." [via the Business Journals]

  • This database includes all 50 U.S. states and their ratings by S&P. [Online Database by Caspio]



De-gibberishing the SEC. Relatively simple document scrubbing. Why didn't anyone thing of this before?

http://techcrunch.com/2011/08/15/yc-funded-marketbrief-makes-obtuse-sec-documents-human-friendly/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+Techcrunch+%28TechCrunch%29

YC-Funded MarketBrief Makes Obtuse SEC Documents Human-Friendly

http://marketbrief.com/



How much data is “a lot?” (This is what Intelligence services used to do with pencils...)

http://techcrunch.com/2011/08/16/infinitegraph-steps-out-of-beta-to-help-companies-identify-deep-relationships-in-large-data-sets/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+Techcrunch+%28TechCrunch%29

InfiniteGraph Steps Out Of Beta To Help Companies Identify Deep Relationships In Large Data Sets

Last year, Eric Schmidt, the former CEO of Google, told a crowd gathered at the Techonomy Conference in Lake Tahoe, CA that we now create as much information in two days as we did from the dawn of civilization through 2003. While Roger J. Moore would disagree and amend that estimation slightly, the fact of the matter is that today we’re seeing a ridiculous (and exponential) telescoping in data production and consumption — which will only continue to increase.

Thus, in today’s world, data is becoming a valuable commodity. Many companies strive to collect as much data about their customer’s habits and interactions as possible to better serve them with ads, recommendations, discovery tools, and personalized product or service experiences (and so on). But, the fact of the matter is, big data management and analysis is still clunky and without being able to understand what that big data means — without being able to identify the important relationships, connections, and patterns within the data — it’s just a big pile of numbers and symbols.



For my Computer Forensics students...

http://viaforensics.com/android-forensics/android-forensic-links-resources.html

Android Forensic links and resources



For my Ethical hackers... (I was unable to connect... Probably hacked.)

http://blogs.computerworld.com/18810/happy_hackers_attack_sites_submit_hacks_for_ratings_on_rankmyhack

Happy hackers attack sites, submit hacks for ratings on RankMyHack

In theory, there have been more than 1,100 sites hacked. The current leader with a #1 ranking attacked the Huffington Post. Other sites range from Mashable, Mapquest, Monster, Flickr, Linkedin and many more. While XXS (cross-site scripting) attacks are worth fewer points, ['cause anyone can do it... Bob] there are bonus points called "bounty" awarded for hacking government, military, educational or racist websites. Bounties offer "additional ranking point reward" and Ku Klux Klan sites are included on that reward list. Allegedly MIT, Princeton, Harvard, Cornell, Georgetown, and Stanford have all been hacked and that's but naming a few.

If this site is for real, a potential attacker can input a website URL to see how many ranking points it would be worth. In the name of testing purposes, a person might be curious enough to test a couple in order to list examples: "nytimes.com is worth 1704545 Ranking Points. XSS attacks against nytimes.com are worth 17045 points." And "wired.com is worth 237341 Ranking Points. XSS attacks against wired.com are worth 2373 points." This is not an endorsement or a suggestion to hack anyone. [Sure... Bob]

There is also a "war room" for chatting. Another page is devoted to resources, information, hacking tutorials, tools and forums.

The Twitter account for @RankMyHack shows that the site launched July 22. Not even a month later, the current number of sites allegedly hacked is 1,132.



Should I tweet? (Probably not, but I'm considering it.)

http://www.makeuseof.com/tag/infographic-twitter-effectively/

INFOGRAPHIC : How To Twitter Effectively



One for the lawyers. Think of it as a program – “You can't tell the players without a program!”

http://news.cnet.com/8301-13578_3-20092728-38/a-motorola-lawsuit-primer-infographic/

A Motorola lawsuit primer (infographic)



For my musical students

SUNDAY, AUGUST 14, 2011

Print Your Own Blank Sheet Music

Blank Sheet Music.net allows you to create your own blank sheet music. Before printing you can select the key signature, time signature, number of staves per set, sets per sheet, and the cleff.



Darn. Some of my students use this app...

http://news.cnet.com/8301-10805_3-20092770-75/microsoft-cancels-its-reader-e-book-app/

Microsoft cancels its Reader e-book app


No comments: