Aug 26

- China may unveil homegrown OS rivals to Windows, Google and Apple (RT, Aug 25, 2014):

Following revelations of America’s National Security Agency’s global internet surveillance system, combined with a desire to enhance domestic production, China is beating a path towards unveiling its own operating systems in October.

The Chinese-made substitutes would first be introduced on desktop devices, later expanding to include smartphones and other hand-held devices, Ni Guangnan heads an official operating system development alliance established in March, Xinhau reported at the weekend.

“We hope to launch a Chinese-made desktop operating system by October supporting app stores,” Ni told the trade paper. Continue reading »

Tags: , , , , , , , , , ,

Aug 19

- NSA BIOS Backdoor a.k.a. God Mode Malware Part (Infosec Institute):

This article is the first part of a series on NSA BIOS backdoor internals. Before we begin, I’d like to point out why these malwares are classified as “god mode.” First, most of the malware uses an internal (NSA) codename in the realms of “gods,” such as DEITYBOUNCE, GODSURGE, etc. Second, these malwares have capabilities similar to “god mode” cheats in video games, which make the player using it close to being invincible. This is the case with this type of malware because it is very hard to detect and remove, even with the most sophisticated anti-malware tools, during its possible deployment timeframe.

Tags: , , , , , , , ,

Jun 22

NSA111
Image: The NSA is not an independent agency nor does it merely answer to those in Washington. It is a manifestation of an overreaching corporatocracy that will stop at nothing to expand its various monopolies.
The key to defeating the NSA is not attacking it directly but by undermining and replacing the corporate interests that created it and direct it in the first place.

- Russia to Swap Intel-AMD Processors For Local Technology  (Activist Post, June 22, 2014):

Russia’s ITAR-TASS News Agency reported in an article titled, “Russia wants to replace US computer chips with local processors,” that:

Russia’s Industry and Trade Ministry plans to replace US microchips Intel and AMD, used in government’s computers, with domestically-produced micro processor Baikal in a project worth dozens of millions of dollars, business daily Kommersant reported Thursday.

It also stated:

The Baikal chips will be installed on computers of government bodies and in state-run firms, which purchase some 700,000 personal computers annually worth $500 million and 300,000 servers worth $800 million. The total volume of the market amounts to about 5 million devices worth $3.5 billion.

In addition to the obvious financial benefits for Russia of locally manufacturing processors, there are several other dimensions within which the move will be beneficial, including in terms of national security. Continue reading »

Tags: , , , , , , , , ,

May 27

IBM logo_0

- First Cisco And Microsoft, Now IBM: China Orders Banks To Remove High-End IBM Servers (ZeroHedge, May 27, 2014):

A week ago, in retaliation to the inane charges lobbed by the US accusing 5 Chinese army officials of spying on US companies (when the NSA spying scandal on, well, everyone refuses to leave the front pages), China announced it would ban the use of Windows 8 on government computers (considering the quality of Windows 8, this is likely a decision government computers would have taken on their own regardless). Today, China has expanded its list of sanctioned companies from Microsoft to include IBM as well, following a Bloomberg report that the Chinese government is pushing domestic banks to “remove high-end servers made by International Business Machines Corp. and replace them with a local brand.

Why is MSFT and now IBM sowing the seeds of the US government’s stupidity and failed attempts to distract from its own spying scandals? We don’t know. Here is what we do know: Continue reading »

Tags: , , , , , , ,

May 20

- China Publishes Data Claiming US Is World’s Largest Cyber Attacker (ZeroHedge, May 20, 2014):

Well that didn’t take long. Having already responded angrily to the US charging 5 military officers with cyber espionage, China has published details of the US cyber attacks:

  • *CHINA CALLS U.S. THE BIGGEST ATTACKER OF CYBER SPACE: XINHUA

From 3/19 to 5/18, they claim to have found 135 host computers in the US carrying 563 phishing pages targeting Chinese sites that directly controlled 1.18 million computers. But Jay Carney said earlier that “the US does not engage in economic espionage.”

As Xinhua reports, Continue reading »

Tags: , , , , , , , ,

May 20

- China “Sanctions” US, Bans Use Of Windows 8 On Government Computers (ZeroHedge, May 20, 2014):

Considering the epic production and sales flop that Windows 8 has been, one probably does not need an actual sales ban from preventing anyone sane from using it let alone buying it, however in yet another symbolic step, banning its government employees from using the latest Windows operating system is precisely what China did in retaliation to yesterday’s DOJ announcement it was charging five PLA members with hacking offenses against the US. According to Reuters, this latest blow to Microsoft came when the Central Government Procurement Center issued the ban as part of a notice on the use of energy-saving products. So Windows 8 lead to global warming? Who knew…

Continue reading »

Tags: , , , , , , , , , ,

May 12

NSA-The-Only-Part-Of-Government-That-Actually-Listens

- NSA embedded surveillance tools within exported US computer hardware (RT, May 12, 2014):

While the United States has warned against buying Chinese routers due to surveillance concerns, a new book about the Edward Snowden revelations states America has been intercepting and tinkering with routers intended for foreign customers.

According to Glenn Greenwald – one of the journalists entrusted with Snowden’s leaked documents – the National Security Agency has been implanting devices into routers headed overseas since at least 2010.

In an extract from Greenwald’s new book, titled “No Place to Hide,” the journalist states the NSA “routinely receives – or intercepts – routers, servers, and other computer network devices being exported from the US before they are delivered to the international customers.”
Continue reading »

Tags: , , , , , , , , ,

May 03

- Microsoft includes XP users in Internet Explorer fix (BBC News, May 2, 2014):

Microsoft has said users of its Windows XP operating system will also get the security update it has issued to fix a flaw in the Internet Explorer browser.

It issued the update on Thursday to fix a bug that let hackers gain access and user rights to computers.

Continue reading »

Tags: , , , , ,

Apr 28

- Hackers find first post-retirement Windows XP-related vulnerability (Computerworld, April 27, 2014):

Internet Explorer 6, 7 and 8 arent being exploited yet, but harbor a critical flaw

Computerworld – Microsoft on Saturday told customers that cyber-criminals are exploiting an unpatched and critical vulnerability in Internet Explorer (IE) using “drive-by” attacks.

“Microsoft is aware of limited, targeted attacks that attempt to exploit a vulnerability in Internet Explorer 6, Internet Explorer 7, Internet Explorer 8, Internet Explorer 9, Internet Explorer 10, and Internet Explorer 11,” the company said in a security advisory.

Continue reading »

Tags: , , , , , ,

Apr 12

Related info:

- Dutch Government To Pay Microsoft ‘Millions’ To Extend Windows XP Support


- IRS Misses XP Deadline, Pays Microsoft Millions For Patches (Computerworld, April 11, 2014):

Tax collector has 58,000 PCs still running the aged XP; will spend $30M to upgrade to Windows 7

Computerworld – The U.S. Internal Revenue Service (IRS) acknowledged this week that it missed the April 8 cut-off for Windows XP support, and will be paying Microsoft millions for an extra year of security patches.

Microsoft terminated Windows XP support on Tuesday when it shipped the final public patches for the nearly-13-year-old operating system. Without patches for vulnerabilities discovered in the future, XP systems will be at risk from cyber criminals who hijack the machines and plant malware on them.

Continue reading »

Tags: , , , , , , ,

Apr 05

- Dutch government to pay Microsoft ‘millions’ to extend XP support  (Dutch News, April 4, 2014):

The Dutch government has signed a ‘multi-million euro’ deal with Microsoft for continued support for its Windows XP systems, according to website Webwereld.

Between 34,000 and 40,000 Dutch national government civil servants are still using computers equipped with Windows XP, even though Microsoft is ending its support for the programme this month.

Continue reading »

Tags: , , , , , ,

Mar 15

- How the NSA Plans to Infect ‘Millions’ of Computers with Malware (The Intercept, March 12, 2014):

By Ryan Gallagher and Glenn Greenwald

Top-secret documents reveal that the National Security Agency is dramatically expanding its ability to covertly hack into computers on a mass scale by using automated systems that reduce the level of human oversight in the process.

The classified files – provided previously by NSA whistleblower Edward Snowden – contain new details about groundbreaking surveillance technology the agency has developed to infect potentially millions of computers worldwide with malware “implants.” The clandestine initiative enables the NSA to break into targeted computers and to siphon out data from foreign Internet and phone networks.

Continue reading »

Tags: , , , , , , , , , ,

Jan 03

nsa-321

- NSA seeks to build quantum computer that could crack most types of encryption (Washington Post, Jan 2, 2014):

In room-size metal boxes ­secure against electromagnetic leaks, the National Security Agency is racing to build a computer that could break nearly every kind of encryption used to protect banking, medical, business and government records around the world.

According to documents provided by former NSA contractor Edward Snowden, the effort to build “a cryptologically useful quantum computer” — a machine exponentially faster than classical computers — is part of a $79.7 million research program titled “Penetrating Hard Targets.” Much of the work is hosted under classified contracts at a laboratory in College Park, Md.

“If you think you understand quantum mechanics, you don’t understand quantum mechanics,” said the late Nobel laureate Richard Feynman, widely regarded as the pioneer in quantum computing. The science video blog Vertiasium tries to help make sense of it.

Tags: , , , , , , , , , , ,

Nov 27

- If this doesn’t terrify you… Google’s computers OUTWIT their humans (The Register, Nov 15, 2013):

‘Deep learning’ clusters crack coding problems their top engineers can’t

Analysis Google no longer understands how its “deep learning” decision-making computer systems have made themselves so good at recognizing things in photos.

This means the internet giant may need fewer experts in future as it can instead rely on its semi-autonomous, semi-smart machines to solve problems all on their own.

Continue reading »

Tags: , , , ,

Nov 24

- NSA infected 50,000 computer networks with malicious software (NRC, Nov 23, 2013):

The American intelligence service – NSA – infected more than 50,000 computer networks worldwide with malicious software designed to steal sensitive information. Documents provided by former NSA-employee Edward Snowden and seen by this newspaper, prove this.

A management presentation dating from 2012 explains how the NSA collects information worldwide. In addition, the presentation shows that the intelligence service uses ‘Computer Network Exploitation’ (CNE) in more than 50,000 locations. CNE is the secret infiltration of computer systems achieved by installing malware, malicious software.

Continue reading »

Tags: , , , , , , , , ,

Oct 28


YouTube

Description:

This is Game 1 of the 1997 rematch Kasparov vs Deep Blue. IBM’s Man vs. Machine event was held in May of 1997 in New York City, New York. This rematch between World Chess Champion Garry Kasparov and IBM supercomputer Deep Blue has been called “the most spectacular chess event in history”.

Tags: , , ,

Sep 25

See also:

- Linus Torvalds Talks Linux Development at LinuxCon (eWeek, Sep 18, 2013):

NSA Backdoor

Torvalds was also asked if he had ever been approached by the U.S. government to insert a backdoor into Linux. Torvalds responded “no” while nodding his head “yes,” as the audience broke into spontaneous laughter.


- Who rooted kernel.org servers two years ago, how did it happen, and why? (Ars Technica, Sep 24, 2013):

Maintainers of Linux still haven’t delivered promised autopsy of serious breach.

More than two years after unknown hackers gained unfettered access over multiple computers used to maintain and distribute the Linux operating system kernel, officials still haven’t released a promised autopsy about what happened.

The compromise, which began no later than August 12, 2011, wasn’t detected for at least 16 days, a public e-mail and interviews immediately following the intrusion revealed. During that time, attackers were able to monitor the activities of anyone using the kernel.org servers known as Hera and Odin1, as well as personal computers belonging to senior Linux developer H. Peter Anvin. The self-injecting rootkit known as Phalanx had access to a wealth of sensitive data, possibly including private keys used to sign and decrypt e-mails and remotely log in to servers. A follow-up advisory a few weeks later opened the possibility that still other developers may have fallen prey to the attackers.

Continue reading »

Tags: , , ,

Jun 20

FYI.


- Skynet rising: Google acquires 512-qubit quantum computer; NSA surveillance to be turned over to AI machines (Natural News, June 20, 2013)

Tags: , , , , , , , , , ,

Feb 18

- The computer that never crashes (New Scientist, Feb 14, 2013):

A revolutionary new computer based on the apparent chaos of nature can reprogram itself if it finds a fault

OUT of chaos, comes order. A computer that mimics the apparent randomness found in nature can instantly recover from crashes by repairing corrupted data.

Dubbed a “systemic” computer, the self-repairing machine now operating at University College London (UCL) could keep mission-critical systems working. For instance, it could allow drones to reprogram themselves to cope with combat damage, or help create more realistic models of the human brain.

Everyday computers are ill suited to modelling natural processes such as how neurons work or how bees swarm. This is because they plod along sequentially, executing one instruction at a time. “Nature isn’t like that,” says UCL computer scientist Peter Bentley. “Its processes are distributed, decentralised and probabilistic. And they are fault tolerant, able to heal themselves. A computer should be able to do that.”

Continue reading »

Tags: , ,

Feb 14

- How to turn living cells into computers (Nature, Feb 13, 2013):

Genetic system performs logic operations and stores data in DNA.

Synthetic biologists have developed DNA modules that perform logic operations in living cells. These ‘genetic circuits’ could be used to track key moments in a cell’s life or, at the flick of a chemical switch, change a cell’s fate, the researchers say. Their results are described this week in Nature Biotechnology1.

Synthetic biology seeks to bring concepts from electronic engineering to cell biology, treating gene functions as components in a circuit. To that end, researchers at the Massachusetts Institute of Technology (MIT) in Cambridge have devised a set of simple genetic modules that respond to inputs much like the Boolean logic gates used in computers.

Continue reading »

Tags: , , , , , ,

Jan 14

- Ethiopian kids hack OLPCs in 5 months with zero instruction (DVICE, Oct 30, 2012):

What happens if you give a thousand Motorola Zoom tablet PCs to Ethiopian kids who have never even seen a printed word? Within five months, they’ll start teaching themselves English while circumventing the security on your OS to customize settings and activate disabled hardware. Whoa.

The One Laptop Per Child project started as a way of delivering technology and resources to schools in countries with little or no education infrastructure, using inexpensive computers to improve traditional curricula. What the OLPC Project has realized over the last five or six years, though, is that teaching kids stuff is really not that valuable. Yes, knowing all your state capitols how to spell “neighborhood” properly and whatnot isn’t a bad thing, but memorizing facts and procedures isn’t going to inspire kids to go out and learn by teaching themselves, which is the key to a good education. Instead, OLPC is trying to figure out a way to teach kids to learn, which is what this experiment is all about.

Continue reading »

Tags: , , , ,

Dec 19

- Connecticut school shooting: police fail to recover data from Adam Lanza’s computer (Telegraph, Dec 18, 2012)

Police have been unable to recover data from gunman Adam Lanza’s computer after the 20-year-old deliberately sabotaged the machine’s hard-drive, investigators have said.

Forensic experts revealed the software had been smashed so extensively that attempts to retrieve potentially crucial evidence such as emails had failed.

A joint effort to piece together the remains of the hard-drive, reported to have been damaged with a screwdriver or hammer, was undertaken by both Connecticut State police and the Federal Bureau of Investigation.

Tags: , , , ,

Nov 17

Start watching from 03:50 into the video.

For my German speaking readers: The translation is terrible, but still better than nothing.

Related info:

- Former Royal Navy Microwave Weapons Expert And UK Intelligence Services Agent Dr. Barrie Trower: Dangers And Lethality Of Microwave Technology (Video – 2:19:36)

- Former Royal Navy Microwave Weapons Expert: NWO TECHNOLOGY UPDATE – Deadly Mobile Phones & The Worst Genocide Ever Committed – The Dangers Of Wi-Fi To Women And Children (Video)



YouTube

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Nov 11

- “The Worm Turns” As Chevron ‘Infected’ By Stuxnet Collateral Damage (ZeroHedge, Nov 10, 2012):

“I don’t think the US government even realized how far it had spread” is how the collateral damage from the Iran-attacking Stuxnet computer virus is described by Chevron. The sleep San-Ramon-based oil giant admitted this week that from 2010 on “we’re finding it in our systems and so are other companies… so now we have to deal with it.” It would seem that little consideration for just how viral this cyber warfare tactic has become and this news (reported by Russia Today) is the first time a US company has come clean about the accidental infection. Discovered in 2010, the Stuxnet worm was reported with all but certainty to be the creation of the United States, perhaps with the assistance of Israel, to set back Iran’s nuclear enrichment program as a preemptive measure against an eventual war. In a June 2012 article published by The New York Times, government agents with direct knowledge of Stuxnet claimed that first President George W. Bush, then Barack Obama, oversaw the deployment of the worm as part of a well-crafted cyberassault on Iran. On the record, the federal government maintains ignorance on the subject of Stuxnet, but perhaps Chevron sums up the impact of Stuxnet best (given the escalating Iranian enrichment program): “I think the downside of what they did is going to be far worse than what they actually accomplished.”

Via Russia Today:

America’s cyberwar is already seeing collateral damage, and it’s hitting the country’s own billion-dollar companies. Oil giants Chevron say the Stuxnet computer virus made by the US to target Iran infected their systems as well.

Continue reading »

Tags: , , , ,

Oct 20

Related info:

- Study: Ban Under-Threes From Watching TV – Children’s Obsession With TV, Computers And Screen Games Is Causing Developmental Damage As Well As Long-Term Physical Harm

- Dr. Dietrich Klinghardt: Smart Meters & EMR – The Health Crisis Of Our Time (Video)

- Former Royal Navy Microwave Weapons Expert And UK Intelligence Services Agent Dr. Barrie Trower: Dangers And Lethality Of Microwave Technology (Video – 2:19:36)

- Former Royal Navy Microwave Weapons Expert: NWO TECHNOLOGY UPDATE – Deadly Mobile Phones & The Worst Genocide Ever Committed – The Dangers Of Wi-Fi To Women And Children (Video)


- A sad ending for the children’s bedtime story: Declining attention spans mean they could become a thing of the past (Daily Mail, Oct 18, 2012):

Bedtime stories are dying out as children’s attention spans shrink, a survey found today.

A declining ability to concentrate is threatening children’s enjoyment of reading, according to a poll of teachers and parents.

One in four parents of young children admit they never read a bedtime story or only do so once every six months.

Parents report that their children are more interested in screen-based activities such as watching TV, playing computer games and surfing the web.

Teachers say that growing claims on children’s attention are undermining their ability to concentrate for long periods.

Ninety-one per cent of teachers polled said children’s attention spans were shorter than ever before in the classroom.

Continue reading »

Tags: , , , , ,

Oct 10

- Ban under-threes from watching television, says study (Guardian, Oct 9, 2012):

Doctors should curb amount of time children spend watching television to prevent long-term harm, say paediatricians

Doctors and government health officials should set limits, as they do for alcohol, on the amount of time children spend watching screens – and under-threes should be kept away from the television altogether, according to a paper in an influential medical journal published on Tuesday.

A review of the evidence in the Archives Of Disease in Childhood says children’s obsession with TV, computers and screen games is causing developmental damage as well as long-term physical harm. Doctors at the Royal College of Paediatrics and Child Health, which co-owns the journal with the British Medical Journal group, say they are concerned. Guidelines in the US, Canada and Australia already urge limits on children’s screen time, but there are none yet in Britain.

Continue reading »

Tags: , , , ,

Sep 24

FYI.


- Does The Internet Make You Dumb? Top German Neuroscientist Says Yes – And Forever (Welt, Sep 12, 2012):

BERLIN – Dr. Manfred Spitzer knows that people find his arguments provocative. In his first book, he warned parents of the very real dangers of letting their children spend too much time in front of the TV. Now, in a second book called Digitale Demenz [Digital Dementia], he’s telling them that teaching young kids finger-counting games is much better for them than letting them explore on a laptop.

Spitzer, 54, may be a member of the slide-rule generation that learned multiplication tables by heart, but his work as a neuropsychiatrist has shown him that when young children spend too much time using a computer, their brain development suffers and that the deficits are irreversible and cannot be made up for later in life.

South Korean doctors were the first to describe this phenomenon, and dubbed it digital dementia – whence the title of Spitzer’s book. Simplistically, the message can be summed up this way: the Internet makes you dumb. And it is of course a message that outrages all those who feel utterly comfortable in the digital world. In the aftermath of the publication of Spitzer’s book, they have lost no time venting their wrath across Germany.

Continue reading »

Tags: , , , , , , , , , ,

Aug 23

- US government developing ultimate cyber weapon; Prime-factoring quantum computing makes encryption obsolete (Natural News, Aug 20, 2012)

The U.S. government is making steady progress on a game-changing technology that would give it the most powerful weapon ever devised in the realm of cyber warfare and information dominance. The weapon is called a “prime-factoring quantum computer,” and a small-scale version of the game-changing technology has already been demonstrated by researchers at UC Santa Barbara, where qubits — quantum bits of computational potential — factored the number 15 into its prime factors three and five.

So what, you say? Can’t any fifth grader do the same thing?

But hold on: Every digital encryption algorithm used today depends in the extreme mathematical difficulty of factoring (the prime numbers of) very large numbers. When you buy something on the internet, for example, your credit card number is sent to the merchant using something called “SSL encryption” which typically uses a 40-bit, 128-bit or sometimes even a 256-bit encryption algorithm. Anyone who might intercept your web form data would not be able to extract your credit card number unless they decrypted your encrypted data. This task requires extraordinary computing power.

For example, using “military grade” 512-bit encryption means that it would take a supercomputer longer than the age of the known universe to decrypt your file and expose your secrets. This is why the U.S. military uses such encryption. It’s virtually unbreakable given today’s computers.

But quantum computers have the spooky ability to process complex decryption algorithms using what some scientists believe are computational bits which coexist in an infinite number of parallel universes. You feed the quantum computer a decryption task, and it “calculates” the answer in all possible parallel universes. The correct answer then emerges in this universe, seemingly magically.

Quantum computing appears to break the laws of physics… yeah, it’s spooky Continue reading »

Tags: , , , , , , , , ,

Jun 20

See also:

- Flame Steals Data Even When Computers Are Not Connected To The Internet

- Flame Virus Developed By U.S. Government

- Kaspersky At Cyber Security Conference: ‘It’s Not Cyber War, It’s Cyber Terrorism And I’m Afraid It’s Just The Beginning Of The Game … I’m Afraid It Will Be The End Of The World As We Know It’

- Kaspersky Lab: Flame And Stuxnet Virus Share Common Origin

- Obama Ordered The Stuxnet Attack On Iran’s Nuclear Facilities – And Yes: This Is An Act Of War!

- President Obama Ordered Stuxnet Attacks On Iran Nuclear Facilities

- US And Israel Created Stuxnet, Lost Control Of It

- Flame Super-Virus Threatening To Cripple Entire Nations Has ‘Hallmarks Of The NSA’



- Israel, US collaborated in creation of ‘Flame’ virus to slow Iran’s nuke efforts, report says (FOX News, June 19, 2012):

Israel and the United States collaborated in the development of the powerful computer virus dubbed the “Flame,” which briefly affected Iran’s key oil industry, an official with knowledge of the effort said.

The Washington Post reports that the massive piece of malware, which collected critical intelligence information from Iran, was created with the aim of slowing the country’s suspected nuclear weapon development.

The Worm.Win32.Flame threat, or “Flame” for short, was likely built by the same nation-state responsible for the Stuxnet virus that targeted Iran’s nuclear power plant in 2010. Many suspect Stuxnet was the work of Israeli intelligence.

Continue reading »

Tags: , , , , , , , , , , , , ,

Jun 14

- Flame Steals Data Even When Computers Are Not Connected to the Internet (Occupy Corporatism, June 13, 2012):

Experts specializing in malware from Bitdefender have uncovered a special capability in Flame’s code that allows the virus to steal data from computers that are not connected to the internet or networked machines.

Flame can move stolen data to a USB memory stick plugged into an infected harddrive. Bitdefender assert that this ability has never been witnessed before. This cyberespionage virus will move stolen information to an USB outlet, then seemingly wait for the chance to upload it to the malware controllers once the infected computer links to the internet.

Continue reading »

Tags: , , , , , , , , , , , , , ,