Copies of TAILS Linux for Upcoming NSA Event!

On Saturday, February 1st, Senator Sanders will be facilitating a public forum in Montpelier entitled “NSA: Out of Control.” It will feature Professor David Cole from Georgetown Law School , and Heidi Boghosian, the Executive Director of the National Lawyers Guild, and, as of the time writing, almost 100 people have RSVPed to the Facebook event.

TAILS PenguinThe event certainly seems like it will be a good opportunity to learn more about the NSA privacy abuses that have flooded the media in the wake of Edward Snowden’s revelations, but, beyond that, it offers an ideal opportunity to widely distribute user-friendly privacy tools that allow people to opt-out of the NSA drag-net immediately while Congress figures out how to appropriately respond to the revelations of abuse. The best suite I’ve found which is easily usable by folks with limited computer literacy is TAILS Linux, a live OS based on Debian that, among numerous other features, is preconfigured to route all internet connections through TOR.

As such, in the next week I will be assembling a few hundred burned DVD copies of the latest TAILS release to hand out to the attendees of Saturday’s event. If anyone would like to help defray the cost of DVDs and jewel cases, Bitcoin donations can be sent here: 13qaGsVRjoGHmYnV4RZcugnfxpTXxRkAsL

Additionally, I’ll be working on burning and assembling copies at the Lab during public hours on Thursday from 7-9pm; if you want to help with production or with distribution at the event itself, stop in!

Cryptome: HBGary Federal

Cryptome has broken down the HBGary data dump for review.

HBG-Anon-WL.zip       HBGary Anonymous and Wikileaks                   February 13, 2011 (317KB)
HBG-VE-IR.zip         HBGary Venezuela and Iran                        February 13, 2011 (697KB)
HBG-EC-APT.zip        HBGary E-Crime and Advanced Persistent Threats   February 13, 2011 (554KB)
HBG-JHU-APL.zip       HBGary Secure Applied Physics Lab                February 13, 2011 (874KB)

HBG-NSA.zip           HBGary National Security Agreements              February 13, 2011 (1.3MB)
HBG-TENPP.pdf         HBGary Targeting Exelon Nuclear Power Plant      February 13, 2011
HBG-CIRC.zip          HBGary Corporate Information Spying Cell         February 13, 2011 (288KB)
HBG-TMC.zip           HBGary Threat Monitoring Center                  February 13, 2011 (792KB)
HBG-EA.zip            HBGary Exploitation Assessment                   February 13, 2011 (712KB)

HBG-SMSR.zip          HBGary Social Media Security Reset               February 12, 2011 (5.5MB)
HBG-ETT.zip           HBGary Emerging Threats and Trends 2011          February 12, 2011 (4.2MB)
dodi-3305-01.pdf      National Intelligence University                 February 12, 2011

HBG-LE-Intel.zip      HBGary Scoutvision Law Enforcement-Intel Cases   February 11, 2011 (6.7MB)
HBG-SME.zip           HBGary Social Media Exploitation                 February 11, 2011 (5.8MB)
HBG-APT.zip           HBGary Advanced Persistent Threat                February 11, 2011 (3.0MB)
HBG-Mandiant.zip      HBGary Mandiant Advanced Persistent Threat       February 11, 2011 (2.0MB)

HBG-McAfee.zip        HBGary McAfee Integration                        February 11, 2011 (1.5MB)
HBG-Aurora.zip        HBGary Aurora Malware Report                     February 11, 2011 (400KB)
HBG-Splunk.zip        HBGary Splunk Brief-IT Management Is Broken      February 11, 2011 (3.2MB)
HBG-TVA.zip           HBGary Topological Vulnerability Analysis        February 11, 2011 (2.4MB)
HBG-Fed-OA.pdf        HBGary Federal Operating Agreement               February 11, 2011
This isn't everything in the HBGary feed, but it certainly is interesting

Sintered Armorgel is here!

  The Deliverator belongs to an elite order, a hallowed subcategory. He's
got  esprit up to here. Right now,  he is preparing to carry  out  his third
mission of the night. His uniform  is black as activated charcoal, filtering
the very light out of the air. A bullet will  bounce  off  its  arachnofiber
weave  like  a  wren hitting  a  patio  door, but excess perspiration  wafts
through it  like a breeze through a freshly napalmed  forest. Where his body
has  bony extremities,  the suit  has sintered armorgel:  feels like  gritty
jello, protects like a stack of telephone books.

Information Security News: Call for Papers: Cyber Security in International Relations

Information Security News: Call for Papers: Cyber Security in International Relations.

Forwarded from: Brent Kesler <bdkesler (at) nps.edu>

Call for Papers: Cyber Security in International Relations
Submissions due: February 1, 2011

Strategic Insights, an online journal published by the Center on 
Contemporary Conflict at the Naval Postgraduate School, is seeking 
scholarly papers on the role that cyber security and information and 
communications technology (ICT) play in international relations and the 
strategic thinking of state and nonstate actors. This issue of SI seeks 
to inform policy makers and military operators of lessons drawn from 
real-world experience with computer and IT issues.

We seek assessment and analysis based on real-world events, not 
speculation regarding potential threats and perceived vulnerabilities. 
Papers that test or develop political theories and concepts are 
encouraged. We hold a broad definition of cyber security, and encourage 
submissions on a range of ICT topics related to threats to national 
security and individual liberties, responses to such threats from states 
and non-state actors, and emerging issues offering an over-the-horizon 
view of cyber security.

However, all submissions should be empirically based; we do not intend 
to publish work purely devoted to editorial opinion, threat 
anticipation, or policy advocacy. Submissions therefore should attempt 
to map capabilities based on available sources or game out real-world 
implications based on empirical data; any "digital Pearl Harbor" 
scenarios should attempt to measure the extent of the damage--tangible, 
social, or political--that could occur.

Sample Topics:

* Use of cyber attacks to influence government behavior (e.g., 2007 
  Estonia attacks)

* Cyber attacks as a force multiplier in conventional conflicts (e.g., 
  2008 Georgia attacks)

* Internet as a critical resource for political and social movements 
  (e.g., the Green Movement in Iran, electioneering in Moldova, Red 
  Shirt Movement in Thailand)

* Governments' efforts to contain popular movements that organize via IT 
  (e.g., shutting down or containing flash mobs, Chinese monitoring of 
  the Dalai Lama, software filtering and surveillance technologies)

* The role of information technology strategies in the US and other 
  states' foreign policy (e.g., US State Department intervention to 
  prevent Twitter shut-down during protests following the 2009 Iranian 
  elections)

* Regional cyber-conflicts (e.g., North and South Korea, India and 
  Pakistan, Israelis and Palestinians)

* Espionage and secrecy in a networked world (e.g., China and Google, 
  Wikileaks)

* Information technologies, civil liberties and privacy (e.g., RIM 
  Blackberry and Chinese, Indian and US efforts at surveillance;  
  Wikileaks; the Safe Harbor dispute)

* Strategic implications of cyber attacks against critical 
  infrastructures

* Innovative cyber attacks (e.g., Stuxnet and the Iranian nuclear 
  program)

* International cooperation to manage cyber-security and IT issues 
  (e.g., Internet governance, WSIS, ICANN, WIPO)

Submission Details: Submissions should be addressed to SI Editor Brent 
Kesler and sent in MS Word compatible format to ccc (at) nps.edu. They 
should range from 10 to 20 pages, double spaced, or 3,000 to 6,000 
words. For more information on submission guidelines, please consult:

http://www.nps.edu/Academics/Centers/CCC/Research-Publications/StrategicInsights/submissions.html

Time to put on the big thinking hat!