On Saturday, February 1st, Senator Sanders will be facilitating a public forum in Montpelier entitled “NSA: Out of Control.” It will feature Professor David Cole from Georgetown Law School , and Heidi Boghosian, the Executive Director of the National Lawyers Guild, and, as of the time writing, almost 100 people have RSVPed to the Facebook event.
The event certainly seems like it will be a good opportunity to learn more about the NSA privacy abuses that have flooded the media in the wake of Edward Snowden’s revelations, but, beyond that, it offers an ideal opportunity to widely distribute user-friendly privacy tools that allow people to opt-out of the NSA drag-net immediately while Congress figures out how to appropriately respond to the revelations of abuse. The best suite I’ve found which is easily usable by folks with limited computer literacy is TAILS Linux, a live OS based on Debian that, among numerous other features, is preconfigured to route all internet connections through TOR.
As such, in the next week I will be assembling a few hundred burned DVD copies of the latest TAILS release to hand out to the attendees of Saturday’s event. If anyone would like to help defray the cost of DVDs and jewel cases, Bitcoin donations can be sent here: 13qaGsVRjoGHmYnV4RZcugnfxpTXxRkAsL
Additionally, I’ll be working on burning and assembling copies at the Lab during public hours on Thursday from 7-9pm; if you want to help with production or with distribution at the event itself, stop in!
# Country: LIBYAN ARAB JAMAHIRIYA # ISO Code: LY # Total Networks: 5 # Total Subnets: 299,008
nmap -sn -PE -PA21,23,80,3389 –traceroute 184.108.40.206/20 220.127.116.11/18 18.104.22.168/14 22.214.171.124/19 126.96.36.199/19
Cryptome has broken down the HBGary data dump for review.
HBG-Anon-WL.zip HBGary Anonymous and Wikileaks February 13, 2011 (317KB)
HBG-VE-IR.zip HBGary Venezuela and Iran February 13, 2011 (697KB)
HBG-EC-APT.zip HBGary E-Crime and Advanced Persistent Threats February 13, 2011 (554KB)
HBG-JHU-APL.zip HBGary Secure Applied Physics Lab February 13, 2011 (874KB)
HBG-NSA.zip HBGary National Security Agreements February 13, 2011 (1.3MB)
HBG-TENPP.pdf HBGary Targeting Exelon Nuclear Power Plant February 13, 2011
HBG-CIRC.zip HBGary Corporate Information Spying Cell February 13, 2011 (288KB)
HBG-TMC.zip HBGary Threat Monitoring Center February 13, 2011 (792KB)
HBG-EA.zip HBGary Exploitation Assessment February 13, 2011 (712KB)
HBG-SMSR.zip HBGary Social Media Security Reset February 12, 2011 (5.5MB)
HBG-ETT.zip HBGary Emerging Threats and Trends 2011 February 12, 2011 (4.2MB)
dodi-3305-01.pdf National Intelligence University February 12, 2011
HBG-LE-Intel.zip HBGary Scoutvision Law Enforcement-Intel Cases February 11, 2011 (6.7MB)
HBG-SME.zip HBGary Social Media Exploitation February 11, 2011 (5.8MB)
HBG-APT.zip HBGary Advanced Persistent Threat February 11, 2011 (3.0MB)
HBG-Mandiant.zip HBGary Mandiant Advanced Persistent Threat February 11, 2011 (2.0MB)
HBG-McAfee.zip HBGary McAfee Integration February 11, 2011 (1.5MB)
HBG-Aurora.zip HBGary Aurora Malware Report February 11, 2011 (400KB)
HBG-Splunk.zip HBGary Splunk Brief-IT Management Is Broken February 11, 2011 (3.2MB)
HBG-TVA.zip HBGary Topological Vulnerability Analysis February 11, 2011 (2.4MB)
HBG-Fed-OA.pdf HBGary Federal Operating Agreement February 11, 2011
This isn't everything in the HBGary feed, but it certainly is interesting
The Deliverator belongs to an elite order, a hallowed subcategory. He's
got esprit up to here. Right now, he is preparing to carry out his third
mission of the night. His uniform is black as activated charcoal, filtering
the very light out of the air. A bullet will bounce off its arachnofiber
weave like a wren hitting a patio door, but excess perspiration wafts
through it like a breeze through a freshly napalmed forest. Where his body
has bony extremities, the suit has sintered armorgel: feels like gritty
jello, protects like a stack of telephone books.
Someone has leaked some OpenLeaks docs, available from Cryptome
openleaks-leak.pdf application/pdf Object.
Are you ready to stop using Passwords for websites? How about ready to have all your online activity tracked under one account — your Internet ID. Big Brother is watching even closer…. [External Link]
Information Security News: Call for Papers: Cyber Security in International Relations.
Forwarded from: Brent Kesler <bdkesler (at) nps.edu>
Call for Papers: Cyber Security in International Relations
Submissions due: February 1, 2011
Strategic Insights, an online journal published by the Center on
Contemporary Conflict at the Naval Postgraduate School, is seeking
scholarly papers on the role that cyber security and information and
communications technology (ICT) play in international relations and the
strategic thinking of state and nonstate actors. This issue of SI seeks
to inform policy makers and military operators of lessons drawn from
real-world experience with computer and IT issues.
We seek assessment and analysis based on real-world events, not
speculation regarding potential threats and perceived vulnerabilities.
Papers that test or develop political theories and concepts are
encouraged. We hold a broad definition of cyber security, and encourage
submissions on a range of ICT topics related to threats to national
security and individual liberties, responses to such threats from states
and non-state actors, and emerging issues offering an over-the-horizon
view of cyber security.
However, all submissions should be empirically based; we do not intend
to publish work purely devoted to editorial opinion, threat
anticipation, or policy advocacy. Submissions therefore should attempt
to map capabilities based on available sources or game out real-world
implications based on empirical data; any "digital Pearl Harbor"
scenarios should attempt to measure the extent of the damage--tangible,
social, or political--that could occur.
* Use of cyber attacks to influence government behavior (e.g., 2007
* Cyber attacks as a force multiplier in conventional conflicts (e.g.,
2008 Georgia attacks)
* Internet as a critical resource for political and social movements
(e.g., the Green Movement in Iran, electioneering in Moldova, Red
Shirt Movement in Thailand)
* Governments' efforts to contain popular movements that organize via IT
(e.g., shutting down or containing flash mobs, Chinese monitoring of
the Dalai Lama, software filtering and surveillance technologies)
* The role of information technology strategies in the US and other
states' foreign policy (e.g., US State Department intervention to
prevent Twitter shut-down during protests following the 2009 Iranian
* Regional cyber-conflicts (e.g., North and South Korea, India and
Pakistan, Israelis and Palestinians)
* Espionage and secrecy in a networked world (e.g., China and Google,
* Information technologies, civil liberties and privacy (e.g., RIM
Blackberry and Chinese, Indian and US efforts at surveillance;
Wikileaks; the Safe Harbor dispute)
* Strategic implications of cyber attacks against critical
* Innovative cyber attacks (e.g., Stuxnet and the Iranian nuclear
* International cooperation to manage cyber-security and IT issues
(e.g., Internet governance, WSIS, ICANN, WIPO)
Submission Details: Submissions should be addressed to SI Editor Brent
Kesler and sent in MS Word compatible format to ccc (at) nps.edu. They
should range from 10 to 20 pages, double spaced, or 3,000 to 6,000
words. For more information on submission guidelines, please consult:
Time to put on the big thinking hat!
7 Days Newspaper publish an cover story article last week about the developing digital forensics culture in Vermont. [LINK HERE]
A group of hacktivists attacked PostFinance in Julian Assanges name, calling for retribution and justice. [LINK HERE]