«
Expand/Collapse
53 items tagged "war"
Related tags:
directory traversal vulnerability [+],
vulnerability [+],
war ftp daemon [+],
usa [+],
united states [+],
make [+],
ftp [+],
friends in war [+],
format string [+],
daemon [+],
cyber [+],
russia [+],
north america [+],
iraq [+],
greenland [+],
exploit [+],
earth [+],
denmark [+],
cyber war [+],
control [+],
combinations [+],
canada [+],
break [+],
arctic [+],
western democracies [+],
weimar republic [+],
weapons of war [+],
usn [+],
txt [+],
security notice [+],
radio legislation [+],
radio [+],
purpose [+],
oona leganovic [+],
military radio equipment [+],
libya [+],
legislation [+],
intelligence [+],
hacks [+],
germany [+],
general purpose computers [+],
general purpose computer [+],
filenames [+],
extraordinary rendition [+],
computer [+],
audio [+],
arbitrary files [+],
annie machon [+],
zone [+],
year [+],
work horse [+],
word war [+],
word [+],
web applications [+],
web [+],
weapons [+],
war zone [+],
war v1 [+],
war conflict [+],
vulnerabilities [+],
virtual war [+],
virtual [+],
video [+],
unpublished [+],
uav [+],
tug of war [+],
tug [+],
trust [+],
tom parker tags [+],
timey [+],
spy photographs [+],
sony [+],
soldering iron [+],
sergeant chrisfessenden [+],
scott blake [+],
run [+],
robot war [+],
robot [+],
revolt [+],
response capabilities [+],
resistance [+],
recent incidents [+],
rebels [+],
r.i.p [+],
queensland police [+],
queensland [+],
prepares [+],
police [+],
phillip torrone [+],
news [+],
multinational corporation [+],
mind man [+],
mind [+],
merits and demerits [+],
love [+],
logs [+],
iraq war [+],
iran [+],
investigations [+],
internet [+],
information operation [+],
iii [+],
ian amit tags [+],
hardware company [+],
hackers [+],
governments [+],
google [+],
global hegemony [+],
future of war [+],
future [+],
fessenden [+],
far [+],
exploits [+],
excellent [+],
europe [+],
erniefessenden [+],
engineering students [+],
dr. julius neurbronner [+],
dog [+],
digital [+],
design authors [+],
day [+],
dangerous waters [+],
cyber crime [+],
culture [+],
crime war [+],
crime [+],
contests [+],
civil war [+],
civil [+],
chris hall [+],
chris [+],
china run [+],
china [+],
chances [+],
car [+],
cameras [+],
brink [+],
brave birds [+],
brain waves [+],
botnets [+],
black hat [+],
begun [+],
battle tech [+],
basic virology [+],
attack [+],
article [+],
analysis [+],
afghanistan [+],
adversary [+],
tomcat [+],
apache tomcat [+],
apache [+],
chaos communication congress [+]
-
-
2:14
»
SecDocs
Authors:
Oona Leganovic Tags:
radio Event:
Chaos Communication Congress 23th (23C3) 2006 Abstract: The introduction of radio in the USA and Germany is compared, the role amateurs played and how the respective authorities reacted to them. Questions arise as to how those reactions were models for the treatment of younger communications technologies, and the different approaches to uncontrolled communication will be sketched out. Is "everybody can listen in" a scary thing? The role of radio amateurs in the introduction of radio and the development of radio legislation is sketched out, as well as the ways in which they were treated (by this legislation). The First World War serves as an important point of reference in making clear the differences between the two countries: The American army could already access a significant number of self-educated amateurs, while in Germany many radio operators where educated during the war for the military, and only became effective as independent amateurs after the war, when they seized military radio equipment in great numbers (the phenomen whose name gave this talk its title). While in the USA self-organised amateur organisations where listened to by Congress regarding radio legislation, and their interest actually considered, in Germany the involvement of many amateurs in the November Revolution scared the authorities so much that they became obsessed with the control and taming of radio, censorship and elimination of 'Funkerspuk' - these aims shaped radio legislation in the Weimar Republic. It was noticed how well radio is suited to broadcasting news, but nobody got the idea that freedom of the press might apply to it, too. One of the consequences was that Goebbels did not so much have to build a new control apparatus for radio than seize an existing one. Later the German quest for control boosted the development and spread of magnetic tape, while the economic interests of the commercial radio networks inhibited its use in the USA. More details in the lecture.
-
1:45
»
SecDocs
Authors:
Oona Leganovic Tags:
radio Event:
Chaos Communication Congress 23th (23C3) 2006 Abstract: The introduction of radio in the USA and Germany is compared, the role amateurs played and how the respective authorities reacted to them. Questions arise as to how those reactions were models for the treatment of younger communications technologies, and the different approaches to uncontrolled communication will be sketched out. Is "everybody can listen in" a scary thing? The role of radio amateurs in the introduction of radio and the development of radio legislation is sketched out, as well as the ways in which they were treated (by this legislation). The First World War serves as an important point of reference in making clear the differences between the two countries: The American army could already access a significant number of self-educated amateurs, while in Germany many radio operators where educated during the war for the military, and only became effective as independent amateurs after the war, when they seized military radio equipment in great numbers (the phenomen whose name gave this talk its title). While in the USA self-organised amateur organisations where listened to by Congress regarding radio legislation, and their interest actually considered, in Germany the involvement of many amateurs in the November Revolution scared the authorities so much that they became obsessed with the control and taming of radio, censorship and elimination of 'Funkerspuk' - these aims shaped radio legislation in the Weimar Republic. It was noticed how well radio is suited to broadcasting news, but nobody got the idea that freedom of the press might apply to it, too. One of the consequences was that Goebbels did not so much have to build a new control apparatus for radio than seize an existing one. Later the German quest for control boosted the development and spread of magnetic tape, while the economic interests of the commercial radio networks inhibited its use in the USA. More details in the lecture.
-
-
13:36
»
SecDocs
Tags:
social Event:
Chaos Communication Congress 24th (24C3) 2007 Abstract: Russia, Canada, the United States and Denmark are each pushing for more control and access to the resources of the Arctic. In the balance hangs the future of an entire ecosystem and our planet. In August of 2007, a Russian submarine planted a flag under water claiming more territory on the sea bed of the arctic for Russia. Back home they were welcomed as heros, like cosmonauts returning from the moon. In the boardrooms of the state owned oil company, executives were already salivating about the alleged oil and gas reserves that lay untapped below their chunk of the arctic. Meanwhile in North America, similar salivating is taking place, as both Canada and the United States send military and civilian ships to claim their piece of the alleged pie. In between there's Greenland, administered by the Danes, who also realize there's money to made and national pride at stake. But what about the people of the earth? The communities, the ecosystem, both in the arctic and throughout the globe... What will happen to them if the Arctic meltrush goes into full throttle? This talk is about the new cold war, where nations and corporations carve up one of the most important regions on earth and fight amongst themselves for control.. for money.. for power. And as the melt-rush goes forward, citizens of the world are left in the dark about just what plans their governments have and what is at stake for every living thing on earth.
-
13:34
»
SecDocs
Tags:
social Event:
Chaos Communication Congress 24th (24C3) 2007 Abstract: Russia, Canada, the United States and Denmark are each pushing for more control and access to the resources of the Arctic. In the balance hangs the future of an entire ecosystem and our planet. In August of 2007, a Russian submarine planted a flag under water claiming more territory on the sea bed of the arctic for Russia. Back home they were welcomed as heros, like cosmonauts returning from the moon. In the boardrooms of the state owned oil company, executives were already salivating about the alleged oil and gas reserves that lay untapped below their chunk of the arctic. Meanwhile in North America, similar salivating is taking place, as both Canada and the United States send military and civilian ships to claim their piece of the alleged pie. In between there's Greenland, administered by the Danes, who also realize there's money to made and national pride at stake. But what about the people of the earth? The communities, the ecosystem, both in the arctic and throughout the globe... What will happen to them if the Arctic meltrush goes into full throttle? This talk is about the new cold war, where nations and corporations carve up one of the most important regions on earth and fight amongst themselves for control.. for money.. for power. And as the melt-rush goes forward, citizens of the world are left in the dark about just what plans their governments have and what is at stake for every living thing on earth.
-
13:33
»
SecDocs
Tags:
social Event:
Chaos Communication Congress 24th (24C3) 2007 Abstract: Russia, Canada, the United States and Denmark are each pushing for more control and access to the resources of the Arctic. In the balance hangs the future of an entire ecosystem and our planet. In August of 2007, a Russian submarine planted a flag under water claiming more territory on the sea bed of the arctic for Russia. Back home they were welcomed as heros, like cosmonauts returning from the moon. In the boardrooms of the state owned oil company, executives were already salivating about the alleged oil and gas reserves that lay untapped below their chunk of the arctic. Meanwhile in North America, similar salivating is taking place, as both Canada and the United States send military and civilian ships to claim their piece of the alleged pie. In between there's Greenland, administered by the Danes, who also realize there's money to made and national pride at stake. But what about the people of the earth? The communities, the ecosystem, both in the arctic and throughout the globe... What will happen to them if the Arctic meltrush goes into full throttle? This talk is about the new cold war, where nations and corporations carve up one of the most important regions on earth and fight amongst themselves for control.. for money.. for power. And as the melt-rush goes forward, citizens of the world are left in the dark about just what plans their governments have and what is at stake for every living thing on earth.
-
-
10:01
»
Hack a Day
Challenge your friends to a little mental Tug of War thanks to the Omaha Maker Group’s Red Bull Creation contest entry. The power struggle is all in your mind, and can only be won if you’re able to concentrate deeply and quickly. The headsets worn by each competitor monitor brain waves over a ten second window. [...]
-
-
15:09
»
SecDocs
Authors:
Annie Machon Tags:
intelligence Event:
Chaos Communication Congress 24th (24C3) 2007 Abstract: A presentation about the role of intelligence agencies in the current era of the unending “war on terror”, how they monitor us, the implications for our democracies, and what we can do to fight back. In the name of protecting national security, spy agencies are being given sweeping new powers and resources. Their intelligence has been politicised to build a case for the disastrous war in Iraq, they are failing to stop terrorist attacks, and they continue to collude in illegal acts of internment and torture, euphemistically called “extraordinary rendition”. Most western democracies have already given so many new powers to the spies that we are effectively living in police states. As an informed community, what can we do about this?
-
15:06
»
SecDocs
Authors:
Annie Machon Tags:
intelligence Event:
Chaos Communication Congress 24th (24C3) 2007 Abstract: A presentation about the role of intelligence agencies in the current era of the unending “war on terror”, how they monitor us, the implications for our democracies, and what we can do to fight back. In the name of protecting national security, spy agencies are being given sweeping new powers and resources. Their intelligence has been politicised to build a case for the disastrous war in Iraq, they are failing to stop terrorist attacks, and they continue to collude in illegal acts of internment and torture, euphemistically called “extraordinary rendition”. Most western democracies have already given so many new powers to the spies that we are effectively living in police states. As an informed community, what can we do about this?
-
-
13:01
»
Hack a Day
These brave birds are weapons of war. Well, not these actual birds… they’re just models used for this photograph courtesy of a taxidermist. But their living relatives were used to take spy photographs during World War I. [Dr. Julius Neurbronner] didn’t suddenly jump into the field of avian photography. He, like his father before him, [...]
-
-
21:42
»
SecDocs
Authors:
Cory Doctorow Tags:
warfare Event:
Chaos Communication Congress 28th (28C3) 2011 Abstract: The last 20 years of Internet policy have been dominated by the copyright war, but the war turns out only to have been a skirmish. The coming century will be dominated by war against the general purpose computer, and the stakes are the freedom, fortune and privacy of the entire human race. The problem is twofold: first, there is no known general-purpose computer that can execute all the programs we can think of except the naughty ones; second, general-purpose computers have replaced every other device in our world. There are no airplanes, only computers that fly. There are no cars, only computers we sit in. There are no hearing aids, only computers we put in our ears. There are no 3D printers, only computers that drive peripherals. There are no radios, only computers with fast ADCs and DACs and phased-array antennas. Consequently anything you do to "secure" anything with a computer in it ends up undermining the capabilities and security of every other corner of modern human society. And general purpose computers can cause harm -- whether it's printing out AR15 components, causing mid-air collisions, or snarling traffic. So the number of parties with legitimate grievances against computers are going to continue to multiply, as will the cries to regulate PCs. The primary regulatory impulse is to use combinations of code-signing and other "trust" mechanisms to create computers that run programs that users can't inspect or terminate, that run without users' consent or knowledge, and that run even when users don't want them to. The upshot: a world of ubiquitous malware, where everything we do to make things better only makes it worse, where the tools of liberation become tools of oppression. Our duty and challenge is to devise systems for mitigating the harm of general purpose computing without recourse to spyware, first to keep ourselves safe, and second to keep computers safe from the regulatory impulse.
-
21:42
»
SecDocs
Authors:
Cory Doctorow Tags:
warfare Event:
Chaos Communication Congress 28th (28C3) 2011 Abstract: The last 20 years of Internet policy have been dominated by the copyright war, but the war turns out only to have been a skirmish. The coming century will be dominated by war against the general purpose computer, and the stakes are the freedom, fortune and privacy of the entire human race. The problem is twofold: first, there is no known general-purpose computer that can execute all the programs we can think of except the naughty ones; second, general-purpose computers have replaced every other device in our world. There are no airplanes, only computers that fly. There are no cars, only computers we sit in. There are no hearing aids, only computers we put in our ears. There are no 3D printers, only computers that drive peripherals. There are no radios, only computers with fast ADCs and DACs and phased-array antennas. Consequently anything you do to "secure" anything with a computer in it ends up undermining the capabilities and security of every other corner of modern human society. And general purpose computers can cause harm -- whether it's printing out AR15 components, causing mid-air collisions, or snarling traffic. So the number of parties with legitimate grievances against computers are going to continue to multiply, as will the cries to regulate PCs. The primary regulatory impulse is to use combinations of code-signing and other "trust" mechanisms to create computers that run programs that users can't inspect or terminate, that run without users' consent or knowledge, and that run even when users don't want them to. The upshot: a world of ubiquitous malware, where everything we do to make things better only makes it worse, where the tools of liberation become tools of oppression. Our duty and challenge is to devise systems for mitigating the harm of general purpose computing without recourse to spyware, first to keep ourselves safe, and second to keep computers safe from the regulatory impulse.
-
-
22:46
»
SecDocs
-
-
11:52
»
SecDocs
Authors:
Tom Parker Tags:
vulnerability Event:
Black Hat USA 2010 Abstract: Recent incidents commonly thought to be linked to state sponsored activities have given rise to much discussion over the reliability of technical analysis as a source for adversary attribution - specifically in regards to what is commonly termed as the Advanced Persistent Threat (or APT). We now live in a world where the reverse engineering of a malicious binary, or analysis of a compromised host may very well play into a world-changing decision, such as whether a country should declare war on another - or indeed, whether it is no longer viable for a large, multinational corporation to continue doing business in a given part of the globe. This talk will discuss in depth the merits and demerits of technical analysis; demonstrating ways in which various techniques including static binary analysis and memory forensics may be utilized to build a granular profile of the adversary, and where the same techniques may fall short. The presentation will discuss detailed characterization matrix that can be leveraged to assess and even automate assessment of multiple aspects of the adversary (such as motive, technical skill, technological research resources) that may all play into the way in which we respond to an incident, or reposition ourselves to handle a specific threat over in long term.
-
-
11:17
»
Hack a Day
R.I.P sand-colored radio-controlled truck. Your life ended with a bang and in doing so, saved some lives. This little work-horse is a hack that [Ernie Fessenden] put together and sent to his brother [Sergeant Chris Fessenden] who is on a tour of duty in Afghanistan. [Chris'] team is trained to be on the lookout for roadside bombs, [...]
-
-
13:01
»
Hack a Day
They say all’s fair in love and war – trust us, you don’t have to tell these guys twice. With the war in Libya raging on, the rebels have turned to anything and everything to help give them the upper hand. Engineers and engineering students have put aside their work and studies to become the [...]
-
-
8:01
»
Hack a Day
[Phillip Torrone] recently wrote an article over at Make regarding Sony and their “War on Makers, Hackers, and Innovators“. In the article, he traces Sony’s history as a well-liked hardware company that once produced innovative products, to its current state as an enemy to all who would dare wield a screwdriver and soldering iron. He [...]
-
-
0:00
»
Packet Storm Security Recent Files
Ubuntu Security Notice 899-1 - It was discovered that Tomcat did not correctly validate WAR filenames or paths when deploying. A remote attacker could send a specially crafted WAR file to be deployed and cause arbitrary files and directories to be created, overwritten, or deleted.
-
0:00
»
Packet Storm Security Advisories
Ubuntu Security Notice 899-1 - It was discovered that Tomcat did not correctly validate WAR filenames or paths when deploying. A remote attacker could send a specially crafted WAR file to be deployed and cause arbitrary files and directories to be created, overwritten, or deleted.
-
-
21:12
»
SecDocs
Tags:
social Event:
Chaos Communication Congress 26th (26C3) 2009 Abstract: What does it mean to fight a culture war? How does culture propagate through a population? What is a meme? And why are some cultural memes more virulent than others? As the capitalist corporate monoculture further asserts its global hegemony, it is vital that individuals become more skillful in their resistance to it. In a hyper-connected world, the most powerful vector of resistance is that of memetics, the core unit of cultural belief. A culture war is, fundamentally, a memetic war. Thus the modern revolutionary must learn to intentionally engineer memes that can not only survive in competition with those of the dominant culture, but thrive. Hackers, already adept at identifying and leveraging vulnerabilities in computer systems, are the ideal candidates to identify and exploit the memetic vulnerabilities of cultural systems. This talk will explore memetic viral engineering as a mechanism for cultural change. Specifically, how such cultural viruses can be most effectively weaponized by crafting their content not only to maximize the rate of infection, but subsequent retention and integration. This conversion of the transmitted meme into mass action is the primary aim of revolutionary memetics. A basic introduction to memes and memetic theory will be presented. The difference between a classic Dawkins/Blackmore meme and an Internet meme will be clarified, and their relationship in the context of memetic resistance will be explored. Basic virology will also be introduced, as it will be used as the primary (though not sole) analytical metaphor. Key mechanisms of memetic transmission will be identified and a simplified model of memetic valuation will be introduced. Strong and weak vectors of memetic infection will be discussed, as will the concepts of memetic progenitors and domain crossover. Memetic immune systems will be analyzed, and potential exploits explored. Inflection points - places where small pushes have large impacts - will be introduced, along with methods for their identification. The need for meme-splitting will be explained, and prime memetic candidates for metastasizing hacker/maker culture will be identified. The immediate benefits and the long-term advantages of such an effort will be discussed. The use of digital communication systems in memetic warfare will be explored, both as testbeds (e.g., Twitter as memetic petri dish) and as infection vectors. The potential of memetic resistance against monolithic power structures such as global corporatism and religious fundamentalism will be assessed. The semantics of memetic resistance will be discussed, particularly in the context of contemporary propaganda systems, such as the United States' "Global War on Terror". Illuminating historical and cultural references will be cited, humorous anecdotes will be told and, in the laughter that follows, a fleeting glance between two members of the audience will lead to a vigorous stand-up shag in the nearest IDF closet, and the two will go on to become iconic revolutionary agitators who bring down too-proud nations worldwide, as well as a significant portion of the network in the Congress Center.