Click here to subscribe to the O2DA Defense Academy. The most comprehensive online firearms academy worldwide. For individuals, businesses, schools, churches and communities. Sign-up

Category Archives: 042 Cyber Security

The Blockchain and Us: Interview with Caitlin Long, Symbiont – YouTube

This type of technology will revolutionalize the way the world works, and what money is.

The more competition, the better, the more secure your funds will be. The market (now able to react at the speed of light) will find the value as long as no one owns a monopoly on what people want to use.

Someone is learning how to take down the Internet – What you can do to safeguard yourself

In a nutshell: The internet is highly centralized and vulnerable to attacks.

The solution to this problem is a distributed network that that becomes more secure and faster as more people partake.

Technologies like MaidSafe are leading the way, and are now in alpha testing.

“These probes take the form of precisely calibrated attacks designed to determine exactly how well these companies can defend themselves, and what would be required to take them down. It feels like a nation’s military cybercommand trying to calibrate its weaponry in the case of cyberwar.”

Source: KurzweilAI

U.S. investigating potential covert Russian plan to disrupt November elections?

Apparently operating off the assumption Americans are suffering from an acute case of the Murray Gell-Mann Amnesia effect?

U.S. intelligence and law enforcement agencies are investigating what they see as a broad covert Russian operation in the United States to sow public distrust in the upcoming presidential election and in U.S. political institutions, intelligence and congressional officials said… Sen. Ben Sasse (R-Neb.) in a statement urged Obama to publicly name Russia as responsible for the DNC hack and apparent meddling in the electoral process. “Free and legitimate elections are non-negotiable.

Denial isn’t just a river in Egypt.

Apparently people are supposed to be more upset who leaked/hacked – than they are supposed to be about the incriminating information that was revealed.

Hint fellas: We have a problem. Ignoring it and pointing fingers isn’t going to make it go away, it will only make it worse.

Source: The Washington Post

FBI wants app to turn your smartphone into secret recording device

The FBI is seeking a developer for a mobile app to turn smartphones into secret audio and video recording devices that can be used as evidence in court cases. The FBI has posted a job opportunity on the US government’s federal business opportunities website seeking contractors that can create an app to give Android, iOS and Windows phones the ability to record audio using the smartphone’s built-in microphone.

Source: ibtimes.co.uk

900 million Android devices affected by Quadrooter security flaws in Qualcomm chips

Hackers can potentially infect Android devices with malware, which when installed, would provide them with “privilege escalation” to gain rooting access to devices, thanks to four new vulnerabilities, dubbed Quadrooter, identified by security researchers. Around 900 million Android devices have been left vulnerable by Quadrooter.

Source: ibtimes

The Inevitability of Decentralization/Distributed Networks and How To Break Open The Webopoly

Leading to the only logical conclusion: Distributed networks.

All of us, technically minded or not, need to understand the tradeoffs we’ve been making. Then we need to make decisions. We can accept choke points and lock-in. Or we can look for ways to reclaim control—declining to rely so much on centralized services, and using encryption and the new decentralized tools, such as the already-working IndieWeb, as they become available.

Source: Fast Company

Government moves on Apple, orders Apple to violate your rights – Apple respectfully says No.

Tim Cook looks to be taking a stand against government overreach. In a statement on Apples website, he claims that, “Rather than asking for legislative action through Congress, the FBI is proposing an unprecedented use of the All Writs Act of 1789 to justify an expansion of its authority.

The government would have us remove security features and add new capabilities to the operating system, allowing a passcode to be input electronically. This would make it easier to unlock an iPhone by ‘brute force,’ trying thousands or millions of combinations with the speed of a modern computer.”

This is an obvious no-go for anyone who has even a elementary understanding of individual rights, the right to ones own private thoughts, communications with others, and let’s not forget the protections the Fourth Amendment is supposed to serve.

Cook continues, “The implications of the government’s demands are chilling. If the government can use the All Writs Act to make it easier to unlock your iPhone, it would have the power to reach into anyone’s device to capture their data. The government could extend this breach of privacy and demand that Apple build surveillance software to intercept your messages, access your health records or financial data, track your location, or even access your phone’s microphone or camera without your knowledge.

Opposing this order is not something we take lightly. We feel we must speak up in the face of what we see as an overreach by the U.S. government.

We are challenging the FBI’s demands with the deepest respect for American democracy and a love of our country. We believe it would be in the best interest of everyone to step back and consider the implications.

While we believe the FBI’s intentions are good, it would be wrong for the government to force us to build a backdoor into our products. And ultimately, we fear that this demand would undermine the very freedoms and liberty our government is meant to protect.”

Read More

Entire US voter registration record (191 million) leaked

“I’m Chris Vickery. I know your phone number, address, date of birth, and more (if you’re registered to vote in the US).

I have recently downloaded voter registration records for 191 million Americans from a leaky database. I believe this is every registered voter in the entire country. To be very clear, this was not a hack.

The mysterious, insecure database is currently configured for public access. No password or other authentication is required at all. Anyone with an internet connection can grab all 300+ gigabytes.

We’re talking about first name, middle name, last name, home address, mailing address, phone number, date of birth, party affiliation, and logs of whether or not you voted in primary/general elections all the way back to 2000. I looked myself up in the Texas table. It’s accurate.

It is not known whether or not ‘high risk professionals’ are included in this database. However, I have looked up several police officers in my city, and their data is indeed present.

I’ve been working with journalists and authorities for over a week to get this database shut down or secured. No luck so far.

Check out the initial coverage here: http://www.csoonline.com/article/3018592/security/database-configuration-issues-expose-191-million-voter-records.html”

(Via.) Reddit: <— Read more here

Support Peacekeeper 2.0 – Your Decentralized Security app of Tomorrow, Today, and Why You Should Support Their Indiegogo Campaign

The Peacekeeper app is one of my top picks for a decentralized security network – it’s on the “short list” of selected apps and technologies every rugged individualist should’t be without.

Those of you who don’t know what Peacekeeper is, you owe it to your selves to learn about it.

“Emergency protection is a vital service that we all need. But let’s face it,’’ say the developers of the Peacekeeper app “most of us know that the government is not able to protect us.”

In other words, “When seconds count, police are just minutes away” the developers continue.

Their skepticism is well founded. The courts have consistently held that not only are police not responsible for your safety, neither are they required to intervene in your behalf. In other words, when push comes to shove, you are on your own and you better be able to protect whats yours – or be prepared to lose it.

Does this sound familiar in light of recent events? Of course it does, and the developers of Peacekeepers aim to fix the problem – not just complain about it. They have actually designed a decentralized security app (1.0) and they are now refining it with all new features, beefed up software, and even more resources to back up their claim that “…(they) are determined to create a system that actually puts the odds in your favor.” 

Look into them and support them, and put the odds in your favor – you need this app.

 

(Via.) Indiegogo <—Read more here

Duqu 2: The most advanced cyber-espionage tool ever discovered and its likely state origins

Developing and operating such a professional malware campaign is extremely expensive and requires resources beyond those of everyday cybercriminals. The cost of developing and maintaining such a malicious framework is colossal: we estimate it to be around $50 million.

“Duqu 2 shares a lot of the code base of the original Duqu, which leads Symantec to believe it has been created by the same group of attackers. Duqu, in turn, shares much of the code base of Stuxnet, widely believed to have been jointly developed by the US and Israel as part of the US government’s covert operation Olympic Games.

Considering the US is unlikely to have spied on its own negotiations in Tehran, that increases the suspicion that Israel was involved in Duqu 2’s creation.

Attribution in cyberattacks is notoriously difficult and at this level of sophistication is almost impossible and Israel will never admit to the use and/or creation of Duqu 2. What has been the response to Duqu 2 attack?

Eugene Kaspersky is not very happy:

Governments attacking IT security companies is simply outrageous. We’re supposed to be on the same side as responsible nations, sharing the common goal of a safe and secure cyberworld. We share our knowledge to fight cybercrime and help investigations become more effective. There are many things we do together to make this cyberworld a better place. But now we see some members of this ‘community’ paying no respect to laws, professional ethics or common sense.”

(Via.) International Business Times

UA-56674165-1