Mozilla: Microsoft Bans Firefox On ARM-Based Windows

Microsoft bans Firefox on ARM-based Windows, Mozilla says (CNET News, May 9, 2012):

Raising the specter of last-generation browser battles, Mozilla launches a publicity campaign to seek a place for browsers besides IE on Windows devices using ARM chips.

Stop me if you’ve heard this one before: Microsoft muscles aside other browsers and cements the dominance of Internet Explorer. The browser market, deprived of competition, stagnates.

That, of course, is what happened during the first browser war of the 1990s and beyond, on personal computers. Today, Mozilla’s top lawyer warned that Microsoft’s behavior threatens a repeat of history, because it’s telling Mozilla that it’s barring Firefox from forthcoming Windows 8 machines that use ARM processors.

“They’re trying to make a new version of their operating system which denies their users choice, competition, and innovation,” said Harvey Anderson, Mozilla’s general counsel. “Making IE the only browser on that platform is a complete return to the digital dark ages when there was only one browser on the Windows platform.”

Anderson has been discussing the matter with his counterparts at Microsoft, but the company hasn’t budged, he said. Anderson also detailed concerns in a blog post.

Microsoft declined to comment for this story.

Read moreMozilla: Microsoft Bans Firefox On ARM-Based Windows

Hacking Expert David Chalk Joins Urgent Call To Halt Smart Grid: ‘100% Certainty Of Catastrophic Failure Of Energy Grid Within 3 Years’

Hacking Expert David Chalk Joins Urgent Call to Halt Smart Grid (Market Watch, April 12, 2012):

“100% certainty of catastrophic failure of energy grid within 3 years”

VANCOUVER, British Columbia, Apr 12, 2012 (BUSINESS WIRE) — The vulnerability of the energy industry’s new wireless smart grid will inevitably lead to lights out for everyone, according to leading cyber expert David Chalk. In an online interview for an upcoming documentary film entitled ‘Take Back Your Power’ ( www.ThePowerFilm.org ), Chalk says the entire power grid will be at risk to being taken down by cyber attack, and if installations continue it’s only a matter of time.

“We’re in a state of crisis,” said Chalk. “The front door is open and there is no lock to be had. There is not a power meter or device on the grid that is protected from hacking – if not already infected – with some sort of trojan horse that can cause the grid to be shut down or completely annihilated.”

“One of the most amazing things that has happened to mankind in the last 100 years is the Internet. It’s given us possibility beyond our wildest imagination. But we also know the vulnerabilities that exist inside of it. And then we have the backbone, the power grid that powers our nations. Those two are coming together. And it’s the smart meter on your home or business that’s now allowing that connectivity.”

Chalk also issued a challenge to governments, media and technology producers to show him one piece of digital technology that is hack-proof.

Read moreHacking Expert David Chalk Joins Urgent Call To Halt Smart Grid: ‘100% Certainty Of Catastrophic Failure Of Energy Grid Within 3 Years’

Windows 8: ‘Millions Of Desktop And Laptop PCs Will Get Kill Switches For The First Time

The Kill Switch Comes to the PC (Bloomberg/Businessweek, Feb. 16, 2012):

Janne Kytömäki, a Finnish software developer, was cruising Google’s (GOOG) Android Market for smartphone apps last year when he noticed something strange. Dozens of best-selling applications suddenly listed the same wrong publisher. It was as if Stephen King’s name had vanished from the covers of his books, replaced by an unknown author. Kytömäki realized the culprit was a piece of malware that was spreading quickly, and he posted his findings online.

Google responded swiftly. It flipped a little-known kill switch, reaching into more than 250,000 infected Android smartphones and forcibly removing the malicious code. “It was sort of unreal, watching something like that unfold,” says Kytömäki, who makes dice simulator apps. Kill switches are a standard part of most smartphones, tablets, and e-readers. Google, Apple (AAPL), and Amazon (AMZN) all have the ability to reach into devices to delete illicit content or edit code without users’ permission. It’s a powerful way to stop threats that spread quickly, but it’s also a privacy and security land mine.

With the rollout of the Windows 8 operating system expected later this year, millions of desktop and laptop PCs will get kill switches for the first time. Microsoft (MSFT) hasn’t spoken publicly about its reasons for including this capability in Windows 8 beyond a cryptic warning that it might be compelled to use it for legal or security reasons. The feature was publicized in a widely cited Computerworld article in December when Microsoft posted the terms of use for its new application store, a feature in Windows 8 that will allow users to download software from a Microsoft-controlled portal. Windows smartphones, like those of its competitors, have included kill switches for several years, though software deletion “is a last resort, and it’s uncommon,” says Todd Biggs, director of product management for Windows Phone Marketplace.

Microsoft declined to answer questions about the kill switch in Windows 8 other than to say it will only be able to remove or change applications downloaded through the new app store. Any software loaded from a flash drive, DVD, or directly from the Web will remain outside Microsoft’s control. Still, the kill switch is a tool that could help Microsoft prevent mass malware infections. “For most users, the ability to remotely remove apps is a good thing,” says Charlie Miller, a researcher with the security company Accuvant.

Read moreWindows 8: ‘Millions Of Desktop And Laptop PCs Will Get Kill Switches For The First Time

New Email Viruses Take Over Computers (Without Opening Any Attachments Or Links)

Threat from new virus-infected emails which take over your PC even if you DON’T open their attachments (Daily Mail, Feb. 2, 2012):

A new class of cyber attack is threatening PCs – emails which infect PCs without the user having to open an attachment.

The user will not even be warned this is happening – the only message that appears is ‘loading’.

The email automatically downloads malicious software into your computer from elsewhere the moment a user clicks to open it.

The mails themselves are not infected – and thus will not ‘set off’ many web-security defence packages.

Security experts say that the development is ‘particularly dangerous’.

Read moreNew Email Viruses Take Over Computers (Without Opening Any Attachments Or Links)

Microsoft Can Remotely Kill Purchased Apps

Microsoft Can Remotely Kill Purchased Apps (PCMag, Dec. 8, 2011):

Microsoft’s terms of service for its Windows Store allows the company to remotely “kill” or remove access to a user’s apps for security or legal reasons, it said.

As noted by Computerworld, Microsoft’s terms of service for the Windows store will technically allow the company to cut off access to apps, even if the user purchased them.

Microsoft unveiled an app store for Windows 8 apps, on Tuesday. The key ingredients of the Windows Store are easy app discovery from within and without the online marketplace, built-in app trials with quick upgrade paths, support for both x86 and ARM-based hardware, and a flexible business model, Microsoft’s Antoine Leblond said then.

Microsoft addresses the possibility that it might remove apps under the heading, “Can Microsoft remove apps or data from my device?”

“We may change or discontinue certain apps or content offered in the Windows Store at any time, for any reason,” the company says. “Sometimes, we do so to respond to legal or contractual requirements. In cases where your security is at risk, or where we’re required to do so for legal reasons, you may not be able to run apps or access content that you previously acquired or purchased a license for.

“In cases where we remove a paid app from your Windows 8 Beta device not at your direction, we may refund to you the amount you paid for the license,” Microsoft added. “Some apps may also stop working if you update or change your Windows 8 Beta device, or if you attempt to use those apps on a Windows 8 Beta device with different features or processor type. You are responsible for backing up the data that you store in apps that you acquire via the Windows Store, including content you upload using those apps. If the Windows Store, an app, or any content is changed or discontinued, your data could be deleted or you may not be able to retrieve data you have stored. We have no obligation to return data to you. If sign in information or other data is stored with an expiration date, we may also delete the data as of that date.”

Read moreMicrosoft Can Remotely Kill Purchased Apps

Facebook Rolls Out Big Changes To ‘Lock In’ Users

Facebook rolls out big changes to ‘lock in’ users (Bangkok Tiimes, Sep. 30,2011):

Facebook on Friday begins rolling out its biggest ever shake-up, in a move observers say will not only profoundly alter how its 800 million users interact with the site, but will keep them coming back for decades to come.

The new “Timeline,” revealed last week by chief executive Mark Zuckerberg will also likely shock some users, notorious for backlashes in recent years over even small adjustments to the site, let alone a complete re-think of how their lives are presented to the world.

The changes amount to the “heart of your Facebook experience, completely rethought from the ground up,” Zuckerberg told an annual developers conference.

Rick Marini, CEO of the Facebook-focused “career network” BranchOut, which itself boasts millions of users, marveled this week in a conference call with marketers and reporters how the site had managed to build an enduring model.

“If your Timeline becomes an important part of your life — the diary of your life — Facebook may have just locked people in for the next 20 years,” Marini said Wednesday.

If Facebook is “where all of this happens, all your pictures, all your video, everything you’ve ever done,” he added: “you’re never going to leave.”

Read moreFacebook Rolls Out Big Changes To ‘Lock In’ Users

Computer Virus Infects US Drone Fleet

Exclusive: Computer Virus Hits U.S. Drone Fleet (Wired, Oct. 7, 2011):

A computer virus has infected the cockpits of America’s Predator and Reaper drones, logging pilots’ every keystroke as they remotely fly missions over Afghanistan and other warzones.

The virus, first detected nearly two weeks ago by the military’s Host-Based Security System, has not prevented pilots at Creech Air Force Base in Nevada from flying their missions overseas. Nor have there been any confirmed incidents of classified information being lost or sent to an outside source. But the virus has resisted multiple efforts to remove it from Creech’s computers, network security specialists say. And the infection underscores the ongoing security risks in what has become the U.S. military’s most important weapons system.

“We keep wiping it off, and it keeps coming back,” says a source familiar with the network infection, one of three that told Danger Room about the virus. “We think it’s benign. But we just don’t know.”

Read moreComputer Virus Infects US Drone Fleet

New JP Morgan Supercomputer Runs Complete Risk Analysis In 12 Seconds (Instead Of 8 Hours Before)!!!

“The project took JP Morgan around three years, and the bank is now looking to push it into other areas of the business, such as high frequency trading.”


JP Morgan supercomputer offers risk analysis in near real-time (Computerworld UK, July 11, 2011):

JP Morgan is now able to run risk analysis and price its global credit portfolio in near real-time after implementing application-led, High Performance Computing (HPC) capabilities developed by Maxeler Technologies.

The investment bank worked with HPC solutions provider Maxeler Technologies to develop an application-led, HPC system based on Field-Programmable Gate Array (FPGA) technology that would allow it to run complex banking algorithms on its credit book faster.

JP Morgan uses mainly C++ for its pure analytical models and Python programming for the facilitation. For the new Maxeler system, it flattened the C++ code down to a Java code. The company also supports Excel and all different versions of Linux.

Prior to the implementation, JP Morgan would take eight hours to do a complete risk run, and an hour to run a present value, on its entire book. If anything went wrong with the analysis, there was no time to re-run it.

It has now reduced that to about 238 seconds, with an FPGA time of 12 seconds.

“Being able to run the book in 12 seconds end-to-end and get a value on our multi-million dollar book within 12 seconds is a huge commercial advantage for us,” Stephen Weston, global head of the Applied Analytics group in the investment banking division of JP Morgan, said at a recent lecture to Stanford University students.

“If we can compress space, time and energy required to do these calculations then it has hard business values for us. It gives us ultimately a competitive edge, the ability to run our risk more frequently, and extracting more value from our books by understanding more fully is a real commercial advantage for us.”

The faster processing times means that JP Morgan can now respond to changes in its risk position more rapidly, rather than just looking back at the risk profile of the previous day, which was produced by overnight analyses.

The speed also allows the bank to identify potential problems and try to deal with them in advance. For example, JP Morgan can now run potential scenarios to assess its exposure to problems such as the Irish or Greek bank problems, which Weston said “wouldn’t have even been thinkable” before.

Read moreNew JP Morgan Supercomputer Runs Complete Risk Analysis In 12 Seconds (Instead Of 8 Hours Before)!!!

Hackers Are Everywhere. Panic! (PCMag)

Flashback:

Congressman Ron Paul on  the Cyber Security Act: ‘They are doing everything in the world to control the internet.’

Law Professor: Counter Terrorism Czar Told Me There Is Going To Be An i-9/11 And An i-Patriot Act:

Lawrence Lessig, a respected Law Professor from Stanford University told an audience at this years Fortune’s Brainstorm Tech conference in Half Moon Bay, California, that “There’s going to be an i-9/11 event” which will act as a catalyst for a radical reworking of the law pertaining to the internet.

Looks like the US government wants to further control the internet before the greatest financial collapse in world history happens, because this may not be good enough:

– Former governor Jesse Ventura Conspiracy Theory: Police State (And FEMA Concentration Camps)

And if this is true…

1 in 4 US Hackers ‘Is An FBI Informer’ (Guardian)

… then how come the FBI is not able to do anything about this?


Hackers Are Everywhere. Panic! (PCMag, June 17, 2011):

When is the last time you can recall so many news items about hackers? It’s become a massive meme within society as a whole. Hardly a day goes by without some discussion or news about hackers.

And, I should mention this right off: If there was ever any attempt to soft-pedal the word hacker versus cracker (with hacker meaning a guy who likes to fool around with his computer to discover new things and the cracker meaning the evil, black-hat criminal), well that definition is done. The hacker today is now the cracker for all practical purposes of discussion.

Now that I have that definition out of the way, let me try and figure out what is going on here.

Read moreHackers Are Everywhere. Panic! (PCMag)

Los Alamos Takes Supercomputers Offline

Los Alamos Takes Supercomputers Offline (Data Center Knowledge, June 30, 2011):

The wildfire threatening Los Alamos, New Mexico has gained national attention, largely due to concerns about the safety of nuclear waste at Los Alamos National Labs, which played a key role in the Manhattan Project and nuclear weapons development and testing. As we noted Monday, the Department of Energy facility also houses two of the world’s leading supercomputers, the Cielo and Roadrunner systems. Those systems have been taken offline, Computerworld reports.“

A Los Alamos spokeswoman said the laboratory conducted an ‘orderly shutdown’ of two of its largest supercomputers,” writes Patrick Thibodeau at ComputerWorld. “IBM’s Roadrunner, the first the break the petaflop barrier in 2008, and now the 10th ranked most powerful supercomputer in the world, and Cielo, a Craig system that is ranked No. 6 on the Top500 list. The supercomputer shutdowns were conducted ‘early on,’ but an exact day or reason for the action wasn’t clear.”

Read moreLos Alamos Takes Supercomputers Offline

Study: Teens Deprived Of Laptops And Smart Phones Suffer Cold Turkey

The Daily Telegraph has censored/removed the article (and the cache).


Teens deprived of laptops and smart phones suffer cold turkey (Telegraph):

One in 5 reported feelings of withdrawal like an obsession while 11 per cent pronounced they were confused or felt like a failure. Nearly one in 5 (19 per cent) reported feelings of trouble and 11 per cent felt isolated. Just 21 per cent pronounced they could feel a advantages of being unplugged.

Some students even reported highlight from simply not being means to hold their
phone.

One member reported: “I am an addict. we don’t need alcohol, heroin or any other derailing form of amicable depravity.

“Media is my drug; though it we was lost.’

Another wrote: ‘I literally didn’t know what to do with myself. Going down to a kitchen to pointlessly demeanour in a cupboards became unchanging routine, as did removing a drink.”

Susan Moeller. lead researcher of a University of Maryland study, said: ‘Technology provides a amicable network for immature people currently and they have spent their whole lives being “plugged in”.

Read moreStudy: Teens Deprived Of Laptops And Smart Phones Suffer Cold Turkey

TV And Computer Monitors Do Manipulate Your Brain: US Patent 6506148 – Nervous System Manipulation By Electromagnetic Fields From Monitors

The TV and your computer monitor can be used to manipulate your nervous system. Here is the proof. Read it and weep:

Nervous system manipulation by electromagnetic fields from monitors US Patent #6,506,148

“SUMMARY: Computer monitors and TV monitors can be made to emit weak low-frequency electromagnetic fields merely by pulsing the intensity of displayed images. Experiments have shown that the 1/2 Hz sensory resonance can be excited in this manner in a subject near the monitor. The 2.4 Hz sensory resonance can also be excited in this fashion. Hence, a TV monitor or computer monitor can be used to manipulate the nervous system of nearby people.”

“It is thus apparent that the human nervous system can be manipulated by screen emissions from subliminal TV image pulses.” LINK

The human nervous system controls everything from breathing and producing digestive enzymes, to memory and intelligence. (Human Nervous System)

Barbara H. Peterson
Farm Wars


Posted on February 16, 2011 by Barbara Peterson

Source: Speak Truth 2 Power

How To Get Internet Access When Your Government Shuts It Down

Does your government have an Internet kill-switch? Read our guide to Guerrilla Networking and be prepared for when the lines get cut.


President Obama May Get Power to Shut Down Internet Without Any Court oversight

These days, no popular movement goes without an Internet presence of some kind, whether it’s organizing on Facebook or spreading the word through Twitter. And as we’ve seen in Egypt, that means that your Internet connection can be the first to go. Whether you’re trying to check in with your family, contact your friends, or simply spread the word, here are a few ways to build some basic network connectivity when you can’t rely on your cellular or landline Internet connections.

Do-It-Yourself Internet With Ad-Hoc Wi-Fi

Even if you’ve managed to find an Internet connection for yourself, it won’t be that helpful in reaching out to your fellow locals if they can’t get online to find you. If you’re trying to coordinate a group of people in your area and can’t rely on an Internet connection, cell phones, or SMS, your best bet could be a wireless mesh network of sorts–essentially, a distributed network of wireless networking devices that can all find each other and communicate with each other. Even if none of those devices have a working Internet connection, they can still find each other, which, if your network covers the city you’re in, might be all you need. At the moment, wireless mesh networking isn’t really anywhere close to market-ready, though we have seen an implementation of the 802.11s draft standard, which extends the 802.11 Wi-Fi standard to include wireless mesh networking, in the One Laptop Per Child (OLPC) XO laptop.

However, a prepared guerrilla networker with a handful of PCs could make good use of Daihinia ($25, 30-day free trial), an app that piggybacks on your Wi-Fi adapter driver to turn your normal ad-hoc Wi-Fi network into a multihop ad-hoc network (disclaimer: we haven’t tried this ourselves yet), meaning that instead of requiring each device on the network to be within range of the original access point, you simply need to be within range of a device on the network that has Daihinia installed, effectively allowing you to add a wireless mesh layer to your ad-hoc network.

Advanced freedom fighters can set up a portal Web page on their network that explains the way the setup works, with Daihinia instructions and a local download link so they can spread the network even further. Lastly, just add a Bonjour-compatible chat client like Pidgin or iChat, and you’ll be able to talk to your neighbors across the city without needing an Internet connection.

Read moreHow To Get Internet Access When Your Government Shuts It Down

Scientists Create Ultra-Fast Computer Chip, 20 Times Faster Than Current Desktop Computers


Dr Wim Vanderbauwhede of the University of Glasgow who led the team and (right) the chip which promises to usher in a new age of high-speed computing

Scientists have created an ultra-fast computer chip which is 20 times faster than current desktop computers.

Modern PCs have a processor with two, four or sometimes 16 cores to carry out tasks.

But the central processing unit (CPU) developed by the researchers effectively had 1,000 cores on a single chip.

The developments could usher in a new age of high-speed computing in the next few years for home users frustrated with slow-running systems.

And the new ‘super’ computer is much greener than modern machines – using far less power – despite its high speed.

Scientists used a chip called a Field Programmable Gate Array (FPGA) which like all microchips contains millions of transistors – the tiny on-off switches which are the foundation of any electronic circuit.

Read moreScientists Create Ultra-Fast Computer Chip, 20 Times Faster Than Current Desktop Computers

Swiss Nuclear Bunker Houses World’s Toughest Server Farm


Photo: Todd Antony

Deep inside the Swiss Alps, a former nuclear bunker is now the ultimate hiding place for the world’s most sensitive secrets. Wired gains access to the server farm designed to survive a full-scale military attack.

The cockpit of Christoph Oschwald’s silver Audi A8 is preternaturally quiet as he steers through the Swiss countryside towards our destination. Wired has been instructed not to disclose its exact whereabouts. It’s late June, “the longest day of the year”, Oschwald notes. It should be 25°C outside. Instead, it’s an unseasonably chilly 12°C, and the tiny village of Saanen, in the canton of Bern, sits beneath a steel-grey sky that lends an ominous air to what might otherwise resemble an Alpenland panorama on a souvenir chocolate bar.

The green valley that cradles Saanen and the near by town of Gstaad in the Bernese highlands plays host, according to local newspaper Der Bund, to the highest concentration of billionaires in the world, their chalets creeping up the piney slopes. But it’s also home to something else — a place that you won’t find on any of the tourist maps. For the past 18 years, Oschwald, 53, a retired Swiss paratrooper turned contractor, and his business partner, an engineer named Hanspeter Baumann, 55, have committed thousands of hours and millions of francs to realising their vision — the place we’re headed to today.

We pass a Tissot boutique abutting a tractor dealership before the road dives into dense forest and follows a stream. Finally we arrive at our destination. At first, it appears to be nothing more than a timber operation, with lorries moving wooden payloads around a gravelly clearing. But then we see them: three guards clad in black uniforms, berets askew, pacing at the base of an enormous mountain. The Alpine foliage above the sentry ends abruptly at a bare rock face painted in fading camo. And carved into the side of the mountain is our destination: a small, weather-beaten metal door. Once the entrance to a vast nuclear bunker built by the Swiss military at the height of the Cold War in the mid-60s, it is now a portal into what its creators claim to be the most secure and secretive storehouse for digital information in the world: the place Oschwald has christened Swiss Fort Knox.

“Sixteen years ago, nobody took us seriously,” Oschwald says. “They said to us, ‘Storing data under a mountain? Why?’” In the cheerier geopolitical climate of the 90s, it was decidedly easier to scoff at the eccentric Swiss entrepreneur, with his slicked-back hair and blinding white smile, as he extolled the data-security benefits of his decommissioned bunker. But today — with terrorism, environmental disasters and financial meltdown on the global agenda — some of the biggest players in technology and finance are buying into the facility’s promise. Oschwald can tick off blue-chip companies such as Cisco Systems, Novartis, UBS and Deutsche Bank among his clients.

Read moreSwiss Nuclear Bunker Houses World’s Toughest Server Farm

China Has Built The Fastest Supercomputer Ever Made, Wrests Title From US

Now China will be No.1 in HIGH-FREQUENCY TRADING!

See also: China Unveils World Speed Record Train Line


A Chinese scientific research center has built the fastest supercomputer ever made, replacing the United States as maker of the swiftest machine, and giving China bragging rights as a technology superpower.

The computer, known as Tianhe-1A, has 1.4 times the horsepower of the current top computer, which is at a national laboratory in Tennessee, as measured by the standard test used to gauge how well the systems handle mathematical calculations, said Jack Dongarra, a University of Tennessee computer scientist who maintains the official supercomputer rankings.

Although the official list of the top 500 fastest machines, which comes out every six months, is not due to be completed by Mr. Dongarra until next week, he said the Chinese computer “blows away the existing No. 1 machine.” He added, “We don’t close the books until Nov. 1, but I would say it is unlikely we will see a system that is faster.”

Officials from the Chinese research center, the National University of Defense Technology, are expected to reveal the computer’s performance on Thursday at a conference in Beijing. The center says it is “under the dual supervision of the Ministry of National Defense and the Ministry of Education.”

The race to build the fastest supercomputer has become a source of national pride as these machines are valued for their ability to solve problems critical to national interests in areas like defense, energy, finance and science. Supercomputing technology also finds its way into mainstream business; oil and gas companies use it to find reservoirs and Wall Street traders use it for superquick automated trades. Procter & Gamble even uses supercomputers to make sure that Pringles go into cans without breaking.

And typically, research centers with large supercomputers are magnets for top scientific talent, adding significance to the presence of the machines well beyond just cranking through calculations.

Over the last decade, the Chinese have steadily inched up in the rankings of supercomputers. Tianhe-1A stands as the culmination of billions of dollars in investment and scientific development, as China has gone from a computing afterthought to a world technology superpower.

“What is scary about this is that the U.S. dominance in high-performance computing is at risk,” said Wu-chun Feng , a supercomputing expert and professor at Virginia Polytechnic Institute and State University. “One could argue that this hits the foundation of our economic future.”

Modern supercomputers are built by combining thousands of small computer servers and using software to turn them into a single entity. In that sense, any organization with enough money and expertise can buy what amount to off-the-shelf components and create a fast machine.

Read moreChina Has Built The Fastest Supercomputer Ever Made, Wrests Title From US

Microsoft: Virus-Infected Computers Should Be Quarantined, Blocked From The Internet

Software giant wants people cut off from the internet and health certificates issued


Millions of computers around the world running versions of Microsoft’s Windows operating system are infected by viruses. Photograph: Kay Nietfeld/EPA

Virus-infected computers should be blocked from the internet and kept in quarantine until they are given a “health certificate”, a top Microsoft security researcher suggested on Thursday.

Under the proposed security regime, put forward by the technology giant’s trustworthy computing team, an individual’s internet connection would be “throttled” to prevent the virus spreading to other computers. But security experts today warned that cutting people off from the internet could be a drastic step too far – and that the question of who would issue and verify the “health certificate” was troubling.

Millions of computers around the world running versions of Microsoft’s Windows operating system are infected by viruses without their user’s knowledge and used to generate billions of spam emails and attacks against websites, such as that used against a British law company earlier this month.

Read moreMicrosoft: Virus-Infected Computers Should Be Quarantined, Blocked From The Internet

Teenager jailed for not giving police his computer password

A teenage takeaway worker has been jailed for four months for refusing to give child protection police the password to his computer.

Oliver Drage was originally arrested in May last year by a team of officers from Blackpool tackling child sexual exploitation.

The 19-year-old’s computer was seized but officers could not access material stored on it as it was protected by a sophisticated 50-character encryption password.

Drage, who worked in a fast food shop, was then formally requested to disclose the password, but failed to do so.

He was convicted after a trial last month of failing to disclose an encryption key, an offence covered by the Regulation of Investigatory Powers Act 2000.

Yesterday at Preston Crown Court Drage, of Freckleton, Lancs., was sentenced to 16 weeks in a Young Offenders Institution.

Detective Sergeant Neil Fowler, of Lancashire Police, said: ‘Drage was previously of good character so the immediate custodial sentence handed down by the judge in this case shows just how seriously the courts take this kind of offence.

‘Computer systems are constantly advancing and the legislation used here was specifically brought in to deal with those who are using the internet to commit crime.

‘It sends a robust message out to those intent on trying to mask their online criminal activities that they will be taken before the courts with the ultimate sanction, as in this case, being a custodial sentence.’

Police are still trying to crack the code on Drage’s computer to find out its contents 17 months after they seized it.

Read moreTeenager jailed for not giving police his computer password

Stuxnet ‘Cyber Superweapon’ Wreaks Havoc in China, Infects Millions of Computers

See also:

Anti-Iran computer bug had powerful backers

Has the West declared cyber war on Iran?


An antivirus expert said the virus has infected over 6 million computer accounts

an-antivirus-expert-said-the-stuxnet-virus-has-infected-over-6-million-computer-accounts
The Stuxnet computer worm has wreaked havoc in China, infecting millions of computers around the country, state media have reported.

A computer virus dubbed the world’s “first cyber superweapon” by experts and which may have been designed to attack Iran’s nuclear facilities has found a new target — China.

The Stuxnet computer worm has wreaked havoc in China, infecting millions of computers around the country, state media reported this week.

Stuxnet is feared by experts around the globe as it can break into computers that control machinery at the heart of industry, allowing an attacker to assume control of critical systems like pumps, motors, alarms and valves.

It could, technically, make factory boilers explode, destroy gas pipelines or even cause a nuclear plant to malfunction.

The virus targets control systems made by German industrial giant Siemens commonly used to manage water supplies, oil rigs, power plants and other industrial facilities.

“This malware is specially designed to sabotage plants and damage industrial systems, instead of stealing personal data,” an engineer surnamed Wang at antivirus service provider Rising International Software told the Global Times.

“Once Stuxnet successfully penetrates factory computers in China, those industries may collapse, which would damage China’s national security,” he added.

Another unnamed expert at Rising International said the attacks had so far infected more than six million individual accounts and nearly 1,000 corporate accounts around the country, the official Xinhua news agency reported.

Read moreStuxnet ‘Cyber Superweapon’ Wreaks Havoc in China, Infects Millions of Computers

Has the West declared cyber war on Iran?

Experts say the computer virus found in a nuclear plant is the work of a foreign power

president-mahmoud-ahmadinejad-visits-one-of-irans-nuclear-plants
President Mahmoud Ahmadinejad visits one of Iran’s nuclear plants, which have come under attack from the virus

Computers can go wrong, and everyone is used to it. But that’s at home. We assume that the machines controlling the infrastructure that makes everything tick – power stations, chemical works, water purification plants – have rock-solid defences in place to deal with unexplained crashes or virus attacks by malicious strangers.

Now, though, a new kind of online sabotage has reached its zenith with a self-replicating “worm” that started on a single USB drive and has spread rapidly through industrial computer systems around the world.

So sophisticated that many analysts believe it can only be part of a state-sponsored attack, the Stuxnet worm – or “malware” – is the first such programming creation designed with the specific intention of causing real world damage. And if the experts are right, it could herald a new chapter in the history of cyber warfare.

Read moreHas the West declared cyber war on Iran?

Anti-Iran computer bug had powerful backers

Stuxnet computer code designed to infect industrial plants created by well-funded hackers, says Symantec Corp expert

anti-iran-computer-bug-had-powerful-backers
Graph shows concentration of Stuxnet-infected computers in Iran as of August. Photograph: Symantec

A powerful computer code attacking industrial facilities around the world, but mainly in Iran, was probably created by experts working for a country or a well-funded private group, according to an analysis by a leading computer security company.

The malicious code, called Stuxnet, was designed to go after several “high-value targets”, said Liam O Murchu, manager of security response operations at Symantec Corp. But both O Murchu and US government experts say there is no proof it was developed to target nuclear plants in Iran, despite recent speculation from some researchers.

Creating the malicious code required a team of as many as five to 10 highly educated and well-funded hackers. Government experts and outside analysts say they haven’t been able to determine who developed it or why.

The malware has infected as many as 45,000 computer systems around the world. Siemens AG, the company that designed the system targeted by the worm, said it has infected 15 of the industrial control plants it was apparently intended to infiltrate. It is not clear what sites were infected, but they could include water filtration, oil delivery, electrical and nuclear plants.

None of those infections has adversely affected the industrial systems, according to Siemens.

Read moreAnti-Iran computer bug had powerful backers

US Cyber Command: War In World’s Fifth Battlespace

us-cyber-command_logo

On May 21 U.S. Secretary of Defense Robert Gates announced the activation of the Pentagon’s first computer command. And the world’s first comprehensive, multi-service military cyber operation.

U.S. Cyber Command (CYBERCOM), initially approved on June 23, 2009, attained the status of what the Pentagon calls initial operations capability eleven months afterward. It is to be fully operational later this year.

CYBERCOM is based at Fort Meade, Maryland, which also is home to the National Security Agency (NSA). The head of the NSA and the related Central Security Service is Keith Alexander, U.S. Army lieutenant general on the morning of May 21 but promoted to four-star general before the formal launching of Cyber Command later in the day so as to become its commander.

The U.S. Senate confirmed Alexander for his new position on May 7. In written testimony presented to Congress earlier, he stated that in addition to the defense of computer systems and networks, “the cyber command would be prepared to wage offensive operations as well….” [1] Two days before his confirmation the Associated Press reported that Alexander “said the U.S. is determined to lead the global effort to use computer technology to deter or defeat enemies.” [2] The conjunction “and” would serve the purpose better than “or.”

The day Alexander assumed his new command Deputy Defense Secretary William Lynn “called the establishment of U.S. Cyber Command at Fort Meade, Md., today a milestone in the United States being able to conduct full-spectrum operations in a new domain,” adding that the “cyber domain…is as important as the land, sea, air and space domains to the U.S. military, and protecting military networks is crucial to the Defense Department’s success on the battlefield.” [3]

Read moreUS Cyber Command: War In World’s Fifth Battlespace

Big Brother Google’s Wi-Fi Spying: What Were They Thinking?

privacy-vs-google

“Don’t be evil” has gone all 1984 on us. Or so it seems after Google revealed Friday that its Street View cars, in addition to snapping photos of the world’s roadways, have also been collecting sensitive personal information from unencrypted wireless networks.

It was no secret that Google’s cars had already been collecting publicly broadcast SSID information (Wi-Fi network names) and MAC addresses (unique numbers for devices like Wi-Fi routers). But this techie data, which is used for location-based services such as Google Maps, didn’t include any “payload data,” or personal information sent over the network.

Or so “Big Brother” Google claimed on April 27. But yesterday the search behemoth ‘fessed up to a security gaffe of Orwellian proportions. Due to a piece of code written in 2006 by an engineer for an experimental Wi-Fi project, Google had in fact been collecting those private bits after all:

“But it’s now clear that we have been mistakenly collecting samples of payload data from open (i.e. non-password-protected) WiFi networks, even though we never used that data in any Google products,” wrote Alan Eustace, Google senior VP, engineering & research.

Wow. That’s freaky and strange. And not in a good way, either.

Read moreBig Brother Google’s Wi-Fi Spying: What Were They Thinking?

Digital Economy Act: This Means War!

Baking surveillance, control and censorship into the very fabric of our networks, devices and laws is the absolute road to dictatorial hell

the-pacific-2010
The Digital Economy Act declares war on people who illegaly downloiad TV shows such as second world war drama The Pacific. Photograph: HBO/Rex Features

With the rushed passage into law of the Digital Economy Act this month, the fight over copyright enters a new phase. Previous to this, most copyfighters operated under the rubric that a negotiated peace was possible between the thrashing entertainment giants and civil society.

But now that the BPI and its mates have won themselves the finest law that money can buy – a law that establishes an unprecedented realm of web censorship in Britain, a law that provides for the disconnection of entire families from the net on the say-so of an entertainment giant, a law that shuts down free Wi-Fi hotspots and makes it harder than ever to conduct your normal business on the grounds that you might be damaging theirs – the game has changed.

I came to the copyfight from a pretty parochial place. As a working artist, I wanted a set of just copyright rules that provided a sound framework for my negotiations with big publishers, film studios, and similar institutions. I worried that the expansion of copyright – in duration and scope – would harm my ability to freely create. After all, creators are the most active re-users of copyright, each one of us a remix factory and a one-person archive of inspirational and influential materials. I also worried that giving the incumbent giants control over the new online distribution system would artificially extend their stranglehold over creators. This stranglehold means that practically every media giant offers the same awful terms to all of us, and no kinder competitor can get our works into the hands of our audiences.

I still worry about that stuff, of course. I co-founded a successful business – Boing Boing, the widely-read website – that benefits enormously from not having to pay fealty to a distributor in order to reach its readers (by contrast, the old print edition of Boing Boing folded when its main distributor went bankrupt while owing it a modest fortune and holding onto thousands of dollars’ worth of printed materials that we never got back). My novels find their way onto the bestseller list by being distributed for free from my website simultaneous with their mainstream bookstore sales through publishers like Macmillan and HarperCollins and Random House.

My whole life revolves around the digital economy: running entrepreneurial businesses that thrive on copying and that exploit the net’s powerful efficiencies to realise a better return on investment.

Parliament has just given two fingers to me (and every other small/medium digital enterprise) by agreeing to cripple Britain’s internet in order to give higher profits to the analogue economy represented by the labels and studios.

But today, my bank-balance is the least of my worries. The entertainment industry’s willingness to use parliament todi impose censorship and arbitrary punishment in the course of chasing a few extra quid is so depraved and terrible that it has me in fear for the very underpinnings of democracy and civil society.

In the US, the MPAA and RIAA (American equivalents of the MPA and the BPI) just submitted comments to the American Intellectual Property Czar, Victoria Espinel, laying out their proposal for IP enforcement. They want us all to install spyware on our computers that deletes material that it identifies as infringing. They want our networks censored by national firewalls (U2’s Bono also called for this in a New York Times editorial, averring that if the Chinese could control dissident information with censorware, our own governments could deploy similar technology to keep infringement at bay). They want border-searches of laptops, personal media players and thumb-drives.

They want poor countries bullied into diverting GDP from humanitarian causes to enforcing copyright. And they want their domestic copyright enforcement handled, free of charge, by the Department of Homeland Security.

Read moreDigital Economy Act: This Means War!

Hacker Disables More Than 100 Cars Remotely Over Internet

ramos-lopez
Police say Ramos-Lopez, fired from a Texas auto dealership, went online for revenge as part of a “harmless prank.”

More than 100 drivers in Austin, Texas found their cars disabled or the horns honking out of control, after an intruder ran amok in a web-based vehicle-immobilization system normally used to get the attention of consumers delinquent in their auto payments.

Police with Austin’s High Tech Crime Unit on Wednesday arrested 20-year-old Omar Ramos-Lopez, a former Texas Auto Center employee who was laid off last month, and allegedly sought revenge by bricking the cars sold from the dealership’s four Austin-area lots.

“We initially dismissed it as mechanical failure,” says Texas Auto Center manager Martin Garcia. “We started having a rash of up to a hundred customers at one time complaining. Some customers complained of the horns going off in the middle of the night. The only option they had was to remove the battery.”

The dealership used a system called Webtech Plus as an alternative to repossessing vehicles that haven’t been paid for. Operated by Cleveland-based Pay Technologies, the system lets car dealers install a small black box under vehicle dashboards that responds to commands issued through a central website, and relayed over a wireless pager network. The dealer can disable a car’s ignition system, or trigger the horn to begin honking, as a reminder that a payment is due. The system will not stop a running vehicle.

Read moreHacker Disables More Than 100 Cars Remotely Over Internet