Is the recent report from the three-letter agencies on the alleged Russian hack of the Democratic National Committee evidence-based attribution or attributibabble?
Attitudes and judgments have these biases baked into them. Failing to appreciate this simple fact allows all sundry forms of popular nonsense to remain unchallenged. Such is the case with cyberattribution.
Faith-based attribution is a term used by security specialist Jeff rey Carr to denote nonscientific analysis that leads to untestable attribution to a security incident.
Over the past year, we’ve covered a number of the challenges facing the supercomputing industry in its efforts to hit exascale compute levels by the end of the decade. The problem has been widely discussed at supercomputing conferences, so we’re not surprised that Horst Simon, the Deputy Director at the Lawrence Berkeley National Laboratory’s NERSC (National Energy Research Scientific Computing Center), has spent a significant amount of time talking about the problems with reaching exascale speeds.
But putting up $2000 of his own money in a bet that we won’t hit exascale by 2020? That caught us off guard.
OHM2013 – Observe. Hack. Make. is a 5-day international outdoor technology and security conference. OHM2013 is currently requesting proposals for content.
A motley bunch of around 3000 hackers, free-thinkers, philosophers, activists, geeks, scientists, artists, creative minds and others will convene from all over the world for this informal meeting of minds to contemplate, reflect, share, criticize, look ahead, code, build, and more.
An otherwise unassuming stretch of land, just 30km (20mi) North of Amsterdam, will be transformed into a colourful oasis of light providing a backdrop for this unique event. It is an immersive experience, with an emphasis on interaction.
The four-yearly Dutch hacker camps provide a very open, friendly and relaxed atmosphere, with a high level of knowledge. The campsite is buzzing with energy, ideas and projects, not least because people from various backgrounds are interacting. It is a non-commercial community event where every visitor is also a volunteer.
ROBERT STEELE: This is legitimate hacking’s third wind (ham radio was the first, cyber and social engineering the second). This takes hacking to a new level, with an emphasis on “Do It Yourself” and thus fullfils the guidance from Buckminster Fuller: do not seek to repair a pathologically damaged system, instead create a new system to replace it, and route around the old system. I have proposed a lecture and a workshop (originally commissioned for the Wales Intelligence Conference in 2013), and am seeking donations to cover travel — estimated $1,500. I particularly solicit donations for pre-conference and post-conference sessions, in person or via Skype, anywhere in Europe including the UK that will help cover travel including side trips, and perhaps a bit more to support the work of our 501c3. I am on stand-by for Afghanistan and believe they won’t move on replacing the KIA/WIA until September for a 1 October start date.
Sam Parry proves here in his book, “America’s Stolen Narrative,” that he has his eye on the ball. For he sees that in large measure the decline in American civility, international prestige, much of today’s governmental dysfunction, and the alarming and unaccountable shift to the right, has a lot to do with the way we have allowed the rightwing 24/7 media attack machine and the money that backs it, to get away with lying about and thus stealing and murdering our history.
By fiat they have been able to commandeer both the symbols of state and now through Gerrymandering, voter suppression and other such illicit stratagems, have also been able to take over the very machinery of government: Even when they lose elections and are out of power, as they are today, they still win as they are able to control the national narrative, the national agenda and has a newly elected President, with his national voter mandate so stymied that he cannot even make appointments or carry out the normal duties delegated to the presidency?
10,000 angry kids scared the shit out of the powers that be….proved to the government that its views about everything are wrong, and no longer matters — 10,000 angry kids can kick ass whenever and wherever they want.
[This interview openly discusses criminal activities from the perspective of an admitted criminal. You may find this content distressing, even offensive, but what is described in this interview is real. We know from personal experience is that these activities are happening on websites everywhere, everyday, and perhaps even on your websites. WhiteHat Security brings this information to light for the sole purpose of assisting those who want to protect themselves on their online business.]
The men and women who hack for the NSA belong to a secretive unit known as Tailored Access Operations. It gathers vast amounts of intelligence on terrorist financial networks, international money-laundering and drug operations, the readiness of foreign militaries, even the internal political squabbles of potential adversaries, according to two former U.S. government security officials, who asked not to be named when discussing foreign intelligence gathering. For years, the NSA wouldn’t acknowledge TAO’s existence. A Pentagon official who also asked not to be named confirmed that TAO conducts cyber espionage, or what the Department of Defense calls “computer network exploitation,” but emphasized that it doesn’t target technology, trade, or financial secrets. The official says the number of people who work for TAO is classified. NSA spokeswoman Vaneé Vines would not answer questions about the unit.
The two former security officials agreed to describe the operation and its activities without divulging which governments or entities it targets. According to the former officials, U.S. cyberspies, most from military units who’ve received specialized training, sit at consoles running sophisticated hacking software, which funnels information stolen from computers around the world into a “fusion center,” where intelligence analysts try to make sense of it all. The NSA is prohibited by law from spying on people or entities within the U.S., including noncitizens, or on U.S. citizens abroad. According to one of the former officials, the amount of data the unit harvests from overseas computer networks, or as it travels across the Internet, has grown to an astonishing 2 petabytes an hour—that’s nearly 2.1 million gigabytes, the equivalent of hundreds of millions of pages of text.