Category Archives: 017 Technology

Entire US voter registration record (191 million) leaked

“I’m Chris Vickery. I know your phone number, address, date of birth, and more (if you’re registered to vote in the US).

I have recently downloaded voter registration records for 191 million Americans from a leaky database. I believe this is every registered voter in the entire country. To be very clear, this was not a hack.

The mysterious, insecure database is currently configured for public access. No password or other authentication is required at all. Anyone with an internet connection can grab all 300+ gigabytes.

We’re talking about first name, middle name, last name, home address, mailing address, phone number, date of birth, party affiliation, and logs of whether or not you voted in primary/general elections all the way back to 2000. I looked myself up in the Texas table. It’s accurate.

It is not known whether or not ‘high risk professionals’ are included in this database. However, I have looked up several police officers in my city, and their data is indeed present.

I’ve been working with journalists and authorities for over a week to get this database shut down or secured. No luck so far.

Check out the initial coverage here: http://www.csoonline.com/article/3018592/security/database-configuration-issues-expose-191-million-voter-records.html”

(Via.) Reddit: <— Read more here

Duqu 2: The most advanced cyber-espionage tool ever discovered and its likely state origins

Developing and operating such a professional malware campaign is extremely expensive and requires resources beyond those of everyday cybercriminals. The cost of developing and maintaining such a malicious framework is colossal: we estimate it to be around $50 million.

“Duqu 2 shares a lot of the code base of the original Duqu, which leads Symantec to believe it has been created by the same group of attackers. Duqu, in turn, shares much of the code base of Stuxnet, widely believed to have been jointly developed by the US and Israel as part of the US government’s covert operation Olympic Games.

Considering the US is unlikely to have spied on its own negotiations in Tehran, that increases the suspicion that Israel was involved in Duqu 2’s creation.

Attribution in cyberattacks is notoriously difficult and at this level of sophistication is almost impossible and Israel will never admit to the use and/or creation of Duqu 2. What has been the response to Duqu 2 attack?

Eugene Kaspersky is not very happy:

Governments attacking IT security companies is simply outrageous. We’re supposed to be on the same side as responsible nations, sharing the common goal of a safe and secure cyberworld. We share our knowledge to fight cybercrime and help investigations become more effective. There are many things we do together to make this cyberworld a better place. But now we see some members of this ‘community’ paying no respect to laws, professional ethics or common sense.”

(Via.) International Business Times

You’re a Criminal in a Mass Surveillance World – How to Not Get Caught

A long, but excellent article that clearly explains the problem and more importantly – provides a solution.

The bravest heroes in this world are law-breakers.

“All the nightmare regimes of the past that kids study in school predate the era of computerized mass surveillance. The ability to lock down people’s lives instantly… to track them, analyze them, trap them, financially paralyze them, impersonate them, frame them, and apprehend them is unprecedented. Governments always seek to control the governed, but mass surveillance is the most powerful weapon of control ever devised. Because of its novelty, invisibility, and deep complexity, many people can’t comprehend its implications and therefore don’t defend against it. Why You’re a Criminal

We unknowingly commit crimes, including felonies, in our day to day lives. The fact that we haven’t been caught is a matter of detection – namely, surveillance. As mass surveillance expands, the government’s crime detection capabilities increase exponentially.

‘There is no one in the United States over the age of 18 who cannot be indicted for some federal crime. That is not an exaggeration.’ This warning is from John Baker, a retired law professor who tried in vain to count new federal crimes created in just the past few years. The same message comes from attorney Harvey Silverglate in his book Three Felonies a Day: How the Feds Target the Innocent.

Because politicians have made us criminals, what the government knows about you can cost you your freedom. Understanding that is so important that you shouldn’t take anybody’s word for it. See for yourself.”

(Via.) Liberty.me <—Read more here

High-tech military goggles combine night vision, thermal imaging

“BAE Systems is developing state-of-the-art goggles for the U.S. Army that combine night vision and thermal imaging technology.

The Army has awarded the defense technology specialist a five-year contract worth up to $434 million for the system, which will give soldiers faster and more accurate targeting. The tech will work in all weather and lighting conditions, according to BAE.

A BAE spokesman told FoxNews.com that the high-tech goggles are expected to be in the hands of servicemembers in late 2016 or early 2017.”

(Via.) Fox News 

House Wants to Cut Army’s M9 Replacement Money

“The U.S. Army’s effort to replace its M9 9mm pistol with a new Modular Handgun System may be facing another hurdle now that lawmakers in the House want to kill the service’s $5.4 million fiscal 2016 budget request.

The language in the House Chairman’s mark-up of the fiscal 2016 National Defense Authorization Bill comes three months after the Army announced it was delaying the MHS competition in late January.

The program would replace the 30-year-old M9, made by Beretta USA, with a more-powerful, modern handgun. The Army began working with the small arms industry on MHS in early 2013, but the effort has been in the works for more than five years…”

(Via.) Kit Up! <—Read more here

Stories – Aimpoint T-1 vs. T-2 Comparison and Review with Video

Accompanied with beautiful photos, and a first class video, Jonathan Owen of SWHAT (Special Hog Weapons and Tactics) clearly delineates the differences between Aimpoint’s outstanding  T1 and T2 sights.

“For years the Aimpoint T1 has been the gold standard of red dot sights, so when I first got wind of a T2 in the works, I was pretty curious. They sure look a lot alike. Both have 2 MOA dots. The T2 costs a little more, so what’s the big deal I wondered. I read some reviews online that were fairly vanilla leaving my thirst for knowledge unsatisfied.

In a unique opportunity, I visited with Lennart Ljungfelt, President, Aimpoint AB, Sweden, and inspected the very first pre serial number 0 prototype. The place was Dallas Safari Club, and Ljungfelt was enjoying throwing his sight across the room. But since there’s only so much you can tell without having one in your hand, I decided to do the best Aimpoint T-1 vs. T-2 review on the web. It’s almost like having one in your own hands.”

(Via.) SHWAT Storie <—Read more here

Deleting Complete Google Search History is Now Possible

“Google has released a new update which makes it possible to export your complete Google search history within your computer. The Google search history tells a story of one’s virtual life. Scrolling over your Google history can be equally terrifying and edifying experience. Now Google has made it possible to see everything you ‘Googled’ and you can erase it all together, with ease.

Every person is familiar with that, for the purpose of target ads and various other reasons Google always tracks you, however now a person can check out his/her Google history and also get an indication of why he/she sees those ads. GOS (Google Operation Systems) initially noticed this new feature, and the new feature is not a big deal for Google. According to the new Google feature, you can see or export your Google search history easily.”

(Via.) Security Gladiators <—Read more here

GM, Ford, And Others Want to Make Working on Your Own Car Illegal

“One of the inherent rights of owning a vehicle is the ability to get on one’s backside — a wrench in one hand and a grease rag in the other, and just tinker to your little heart’s desire. Since the vehicle was invented, it’s been an important facet within the community of gearheads.

General Motors — the same company responsible for 87 deaths related to faulty ignition switches, FYI — wants to take that right away from you citing safety and security issues. Along with a few other big names.

It’s called the Digital Millennium Copyright Act (DMCA). It’s been around since 2000 and started as anti-Internet piracy legislation. But automakers want to use it to try and make working on your own car illegal. Yes, illegal. The general premise is that unlike cars of the past, today’s vehicles are so advanced and use such a large amount of software and coding in their general makeup, altering said code could be dangerous and possibly even malicious.”

(Via.) Boldride.com <—Read more here

Beartooth: Stay Connected (Even Without Cell Service) With: Secure Voice, Text, and Even Offline Maps

Screen Shot 2015 03 13 at 8 31 10 AM

“Beartooth’s patent pending technology allows iOS and Android devices to communicate even if the cellular network is unavailable, failed, or congested. Whether you are skiing fresh powder in the backcountry or dancing at Coachella, you can now reliably stay in contact with your group in ways that were previously unavailable. Beartooth allows for true peer-to-peer communication between the devices, completely bypassing the Wi-Fi and cellular network.”

(Via.) Beartooth

UA-56674165-2