DefDog: 10 Year Old Hacker Whacks System Clocks

Civil Society, Cultural Intelligence, Hacking
DefDog

The most interesting part about this, that a 10 year old could do it. The government continues to look for “college graduates” to fill the ranks of their Cyber force without understanding that those individuals often lack the “spirit” that embodies the hacking community……

Ten-year old hacker finds vulnerabilities in mobile games

Named CyFi, she used system clocks to exploit vulnerabilities in FarmVille-style games.

A 10-year old California girl is the world’s newest famous hacker. Going by the name CyFi, the preteen found a way to exploit a vulnerability in numerous mobile apps by tinkering with mobile devices’ system clocks.

She presented her work at the first ever DefCon Kids conference, a new part of Defcon, the world’s most famous hacker conference. Ïn her talk, called “Apps – A Traveler of Both Time and Space (And What I Learned About Zero-Days and Responsible Disclosure),” CyFi explained that she was able to circumvent common security measures that prevent users from manipulating apps by changing their device’s system clock.

Read more….

Venessa Miemis: Self-Assembling Dynamic Networks and Boundary-less Tribalism (Includes Diaspora)

Advanced Cyber/IO, Autonomous Internet, Civil Society, Collective Intelligence, Cultural Intelligence, Ethics, Hacking
Venessa Miemis

2011: Self-Assembling Dynamic Networks And Boundary-less Tribalism

DK Matai, mi2g

Business Insider, 19 January 2011

“Self-assembling dynamic networks” is one phrase we should all memorise to prepare ourselves and to understand 2011. This phrase encapsulates the defining aspect of both the year ahead and the years to come, as we embark on the second decade of the 21st century.

Whether we act as individuals, families, communities, businesses, government departments or organizations, there can be no question that we have to listen, learn and adapt according to the massive paradigm shift created by self-assembling dynamic networks and their by-product: boundary-less tribalism.

. . . . . . . .

All Silos Penetrated

Just like biological systems, self-assembling dynamic networks are increasingly manifest in every aspect of human thought, behaviour and endeavour in the 21st century enabled by mobile telephones and the Internet. It is no longer a question of when or where… societies, governments, businesses and non-governmental-organisations are all being buffeted by the consequences of this rising phenomenon. Geo-politics, foreign policy, domestic governance, tran-national business, financial markets and online platforms are all being subject to the vagaries of self-assembling dynamic networks in countless ways.

. . . . . . .

Key Features

The key features of self-assembling dynamic networks are as follows:

1. Asymmetric power
2. Unintended consequences
3. No central control
4. No intelligent blueprint or formalised design
5. Rapid scaling
6. Unprecedented speed
7. Trans-national synchronicity
8. Total transparency
9. Creation of boundary-less tribalism
10. New order born out of chaos

Read full article….

Seth Godin: Creativity Demands Deep Understanding

Advanced Cyber/IO, Blog Wisdom, Collective Intelligence, Ethics, Hacking
Seth Godin

Bypassing the leap

Every now and then, a creative act comes out of nowhere, a giant leap, a new way of thinking apparently woven out of a brand new material.

Most of the the time, though, creativity is the act of reassembling many elements that are already known. That's why domain knowledge is so critical.

The screenwriter who understands how to take the build that went into the classic Greg Morris episode of the Dick Van Dyke show and integrate it with the Maurce Chevalier riff from the Marx Bros… Or the way Moby took his encyclopedic knowledge of music and turned into a record that sold millions… if you don't have awareness and an analytical understanding of what worked before, you can't build on it.

That's one of the reasons that the recent incarnation of the Palm failed. The fact that the president of the company had never used an iPhone left them only one out: to make a magical leap.

It's not enough to be aware of the domain you're working in, you need to understand it. Noticing things and being curious about how they work is the single most common trait I see in creative people. Once you can break the components down, you can put them back together into something brand new.

DefDog: Inexpensive Drone Do It Yourself Cyber-War

Advanced Cyber/IO, Computer/online security, Hacking
DefDog Recommends....

Wardriving Evolves Into Warflying

Researchers release specs for a DIY radio-controlled plane that hacks systems by air

By Ericka Chickowski, Contributing Editor

Dark Reading, 4 August 2011

BLACK HAT USA 2011 — Las Vegas — Yesterday at Black Hat, two security researchers demonstrated how a radio-controlled model airplane outfitted with a computer and 4G connectivity could be used to create a nearly undetectable aerial hacking device that could perpetrate aerial attacks on targets otherwise unreachable by land.

Created completely with off-the-shelf equipment and open-source software — and with a budget of only about $6,100 — the demo plane they brought on stage with them was capable of wireless network sniffing and cracking, cell tower spoofing, cell phone tracking and call interception, data exfiltration, and video surveillance.

Read more….

Phi Beta Iota:  Until integrity in all senses of the word is “root,” society will continue to be vulnerable to all forms of corruption including low-bidder unethical cyber-systems, and high-bidder unethical cyber-attack.

See Also:

2010: OPINION–America’s Cyber Scam

Robert Steele: The Virgin Truth (Old)

Advanced Cyber/IO, Commerce, Earth Intelligence, Ethics, Fact Sheets, Hacking, InfoOps (IO), Key Players, Methods & Process, Mobile, Policies, Real Time, Reform, Strategy, Threats

OBE See Instead: 2012 Robert Steele for Richard Branson: The Virgin Truth 2.6

Robert David STEELE Vivas

There is a very talented author, journalist, and speaker, Mike Southon, who publishes in the Financial Times.  One of his articles, “Perfect Pitch,” 7 March 2009 was instrumental in crafting the below one-page “pitch.”  Mike's four web sites:

www.ft.com/mikesouthon
www.yoodoo.biz
www.mikesouthon.com
www.beermat.biz

Short Persistent URL for this post (The Virgin Truth):

http://tinyurl.com/Steele4Branson

 

Click on Image to Enlarge

One-Pager Online Updated

UN + Start-Up Seek to Get Poor Online with Cell Numbers

01 Poverty, 03 Economy, 04 Education, 06 Family, 07 Health, 09 Justice, 11 Society, Advanced Cyber/IO, Civil Society, Collective Intelligence, Ethics, Gift Intelligence, Hacking, Key Players, Mobile, Non-Governmental, Real Time

Startup Aims to Get the Poor Online With Phone Numbers

By Stephen Lawson, IDG News

U.K. startup Movirtu plans to help 3 million or more people in poor countries use mobile services by giving them personal phone numbers, not phones.

Working with a U.N.-affiliated initiative called Business Call to Action (BCtA), Movirtu will offer the numbers, which it calls mobile identities, through commercial carriers in developing countries in Africa and South Asia. People in those countries who typically borrow phones from others will be able to log into the carrier's network and use their own prepaid minutes and bits of data.

The service is called Cloud Phone, though it operates within a carrier's own infrastructure rather than on the Internet as a classic cloud service would. Having a personal mobile identity can save users money in two ways, according to Ramona Liberoff, executive vice president of marketing, strategy and planning at Movirtu. First, they can use mobile services without buying a phone, which is a luxury even at US$15 or $20 for people making $1 or $2 per day.

Second, the cost of prepaid service from a carrier typically is less than what consumers in those countries pay someone to borrow a phone, she said. Though it's customary in many of these countries to lend a phone to someone in need, the borrower is also expected to pay the lender for the usage. The average savings from using regular prepaid service instead is estimated at about $60 per year, Liberoff said.

The service will help people to use mobile banking, insurance and farming assistance services as well as make phone calls, Liberoff said. Some of these services currently can only be delivered to individuals and not to someone sharing a phone. Personal mobile identities could be a boon to NGOs (non-governmental organizations) that want to use mobile technology.

Read more….

See Also:

Continue reading “UN + Start-Up Seek to Get Poor Online with Cell Numbers”

Cofer Black: Hackers Evil, Pay Me… + Hackers RECAP

Commerce, Corruption, Cultural Intelligence, Hacking, IO Impotency
Cofer Black

Cofer Black Says Threat Posed by Hackers Same as Pre-9/11 Terrorism

Public Intelligence Net, 4 August 2011

not to be confused with Phi Beta Iota the Public Intelligence Blog

Ex-CIA official sounds alarm about hackers’ next targets (CNN):

The former director of the CIA’s Counterterrorism Center raised concerns Wednesday about an impending “code war” in which hackers will tamper not just with the Internet but with technology that runs real-world infrastructure.

Somewhat fittingly, Cofer Black’s keynote talk at the Black Hat hacker conference at Caesars Palace in Las Vegas was interrupted by a literal alarm: flashing lights, sirens and the whole bit.

“Attention, please. Attention, please,” a robotic woman’s voice said repeatedly as Black smiled, apparently confused. “We are currently investigating the alarm signal you are hearing. Please remain calm.”

After a pause and some laughs from the audience, Black kept going.

Read full article….

Phi Beta Iota:  He does not seem to realize he was put on the program as an inside joke, or that we all knew in 1990-1994 that cyber-space was going to be the next combat zone.  What Mr. Black does not appear to understand, is that hackers are the good guys, while politicians, bureaucrats, and vendors who routinely betray the public trust are the bad guys.  He is out of touch with both history and reality.   He lives in a world of lies, not the world of truth.  Only in the world of truth can problems be fully understood and intelligently addressed.  Here above the line are one simple graphic and the most recent exposure of the cyber-scam that is on-going between ignorant Contracting Officers and equally ignorant vendors.  Below the line are more references.

Graphic: Cyber-Threat 101

2010: OPINION–America’s Cyber Scam

Continue reading “Cofer Black: Hackers Evil, Pay Me… + Hackers RECAP”