Koko: Scary science, national security, and open-source research

Koko Sign: Transparency good. Scary science, national security, and open-source research Maggie Koerth-Baker BoingBoing, 13 January 2012 I’ve been following the story about the scientists who have been working to figure out how H5N1 bird flu might become transmissible from human to human, the controversial research they used to study that question, and the federal …

Marcus Aurelius: Hackers to Attack Feds Over Manning?

Feds involved in Manning prosecution enter hackers’ crosshairs By Aliya Sternstein NextGov, 12/20/2011 A government-hired forensics specialist and an Army investigating officer could face online backlash from WikiLeaks supporters who are unhappy with this week’s prosecution of a U.S. soldier accused of releasing confidential government files to the anti-secrets website, a computer engineer affiliated with …

DefDog: Is DHS Stupid, Dishonest, or Both? + RECAP

Is this more of the same as the alleged attack planning on the Saudi Ambassador? Stuxnet Clone Found Possibly Preparing Power Plant Attacks Security researchers have detected a new Trojan, scarily similar to the infamous Stuxnet worm, which could disrupt computers controlling power plants, oil refineries and other critical infrastructure networks. The Trojan, dubbed “Duqu” …

Robert Steele: Secrecy, Self-Restraint, & Democracy Done in By Elites and “Experts”

The times they are a’ changing.  I was asked to comment on  the recently published Reference: Protecting Sensitive “Open” Information and do so gladly.  The author of that work means well, and there is absolutely nothing wrong with the substance of what he expouses.  It is simply not reasonable nor feasible in context. I know …

TDL-4 Rules–Industrial Era Governments Helpless

New Botnet, Now 4.5 Million Machines Strong, is ‘Practically Indestructible’ Today in cyber threats: more than four million Windows PCs have been commandeered by a botnet that cybersecurity experts are calling nearly “indestructible.” Known as TDL-4 (it’s the fourth iteration of the malicious program), this particular little nuisance hides in places security software rarely checks …