Brazil – Jupiter Broadcasting https://www.jupiterbroadcasting.com Open Source Entertainment, on Demand. Thu, 21 Aug 2014 17:41:00 +0000 en-US hourly 1 https://wordpress.org/?v=5.5.3 https://original.jupiterbroadcasting.net/wp-content/uploads/2019/04/cropped-favicon-32x32.png Brazil – Jupiter Broadcasting https://www.jupiterbroadcasting.com 32 32 Brazil Remote Wipes Your Junk | Tech Talk Today 47 https://original.jupiterbroadcasting.net/65082/brazil-remote-wipes-your-junk-tech-talk-today-47/ Thu, 21 Aug 2014 09:40:34 +0000 https://original.jupiterbroadcasting.net/?p=65082 A court injunction demands Apple, Google, and Microsoft remove a “forbidden” app off thousands of users phones, reports claim Verizon is launching its own app store, which they have flat out denied & we acknowledge the sunset of a PC classic. Direct Download: MP3 Audio | OGG Audio | Video | HD Video | Torrent […]

The post Brazil Remote Wipes Your Junk | Tech Talk Today 47 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

A court injunction demands Apple, Google, and Microsoft remove a “forbidden” app off thousands of users phones, reports claim Verizon is launching its own app store, which they have flat out denied & we acknowledge the sunset of a PC classic.

Direct Download:

MP3 Audio | OGG Audio | Video | HD Video | Torrent | YouTube

RSS Feeds:

MP3 Feed | OGG Feed | iTunes Feed | Video Feed | Torrent Feed

Become a supporter on Patreon:

Foo

Show Notes:

Verizon denies plan to launch its own Android app store (update) | The Verge

Verizon is going to launch its own app store in an effort to compete with the Google Play Store on Android devices, claims a report from The Information. The new store will be available globally and is the result of a partnership with other carriers and hardware makers, says the report. In 2010, Verizon Wireless launched a similar app store for Android and BlackBerry smartphones in the US, but it shuttered it in January 2013. The Information says the discussions for a new app store are still in an early stage, and there is not a concrete date for when it would launch.

However, Recode received a statement from Verizon saying that the carrier had no plans to offer a new app store. “We have no plans to do that,” Verizon spokeswoman Debra Lewis said. “Been there. Done that.” Amir Efrati from _The Information _tweeted the following in response: “I and @theinformation stand by this report 100%.” Efrait also said that “Verizon’s comment is misleading.”

The Information claims that this new effort is a response to recent cutbacks from Google in revenue sharing with carriers and hardware makers for apps sold through the Google Play Store. Verizon would be stemming future losses with its own app store, as revenues from app store sales are expected to grow significantly over the next few years. The report says that Verizon would also use data like location, time of day, and social indicators to recommend apps to users.

Brazil Court Issues Injunction Against Secret And Calls For App To Be Remotely Wiped | TechCrunch

A court in Brazil has ruled (via UOL) that Apple and Google must remove Secret, the anonymous social networking app, from their mobile software stores — and also from user devices where it’s already installed. The court has issued a preliminary injunction in the case, pending the results of a final ruling, as a result of a complaints by users harmed by rumors spread via the app, who said that the app was used to share an “intimate photo” of him, which included personal identifying information including his full name and telephone number.

The injunction actually goes so far as to require that the companies remotely wipe the app from existing devices. That’s a tall order, of course, but the court has also applied a fine of around $9,000 per day following a 10-day grace period in case the rules haven’t been followed.

Uber Opens Its API With 11 Launch Partners, Including OpenTable, TripAdvisor, and United Airlines | TechCrunch

Today, the company is announcing its API will become available to app developers, with 11 launch partners already signed up.

For Uber, the introduction of its API is designed to increase reach and get it in front of lots of new potential users. The company is in 150 cities and nearly 50 countries around the world, but there are untold number of users who might not have tried its service. Showing up in other apps that those users already have installed is a simple way to introduce them to getting an Uber on-demand.

While it’s trying to appeal to as many app developers as possible, to start Uber is launching with 11 API partners that have already committed to introducing Uber to their users. Those apps include Expensify, Hinge, Hyatt Hotels & Resorts, Momento, OpenTable, Starbucks, Tempo, Time Out, TripAdvisor, TripCase, and United Airlines.

Samsung’s first Nook tablet arrives at Barnes & Noble today for $179 | The Verge

Samsung is becoming Barnes & Noble’s first partner to create a Nook-branded tablet today with the unveiling and release of the Galaxy Tab 4 Nook. The name is a mouthful, but it basically means that the tablet is a rebranded version of Samsung’s existing Galaxy Tab 4 tablet — part of its low-end line — that’s now been customized with some Nook software. The tablet has a 7-inch, 1280 x 800 display and will sell for $179.

Feedback:

Blizzard Not Expecting Major World Of Warcraft Growth

In a recent interview with MCV, World of Warcraft lead designer Tom Chilton admitted that Blizzard isn’t expecting to see the MMORPG grow like it did prior to the Cataclysm release. That’s likely because the subscription numbers have been on a steady decline since 4Q 2010

As of Q2 2014, World of Warcraft had 6.8 million subscribers. The upcoming fifth expansion pack, Warlords of Draenor, is expected to bring some players back. Previously, Blizzard indicated that it’s not unusual to see customers cancel their subscription until a new expansion arrives. Once that’s consumed, they will cancel again and wait for new content.


Last week, Blizzard announced that the upcoming Warlords of Draenor will be released on November 13, 2014.

The post Brazil Remote Wipes Your Junk | Tech Talk Today 47 first appeared on Jupiter Broadcasting.

]]>
Botnet Billionaires | TechSNAP 170 https://original.jupiterbroadcasting.net/62037/botnet-billionaires-techsnap-170/ Thu, 10 Jul 2014 11:25:39 +0000 https://original.jupiterbroadcasting.net/?p=62037 Want to make billions in days? Quit your job and become a botnet master. We’ll share the story about a Brazilian botnet that you’ve just got to hear. Plus a major flaw in Android, encryption done right, your questions, our answers & much much more! Thanks to: Direct Download: HD Video | Mobile Video | […]

The post Botnet Billionaires | TechSNAP 170 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Want to make billions in days? Quit your job and become a botnet master. We’ll share the story about a Brazilian botnet that you’ve just got to hear.

Plus a major flaw in Android, encryption done right, your questions, our answers & much much more!

Thanks to:


DigitalOcean


Ting


iXsystems

Direct Download:

HD Video | Mobile Video | MP3 Audio | Ogg Audio | YouTube | HD Torrent | Mobile Torrent

RSS Feeds:

HD Video Feed | Mobile Video Feed | MP3 Audio Feed | Ogg Audio Feed | iTunes Feeds | Torrent Feed

— Show Notes: —

Botnet stealing from Brazilian banks rampent, maybe into the billions of dollars

  • In Brazil, the most common form of payment, for everything from taxes, utility bills or large purchases and almost all business-to-business payments is “Boleto Bancario” (or just boleto for short)
  • It is basically an bank transfer, somewhere between a cheque and a wire transfer
  • Most Brazilians do not have credit cards, and credit card processing is expensive (usually 3-5% or more) and the merchant usually has to wait 30 days to receive the funds
  • A boleto usually only takes 24 to 48 hours and has a low fixed fee (approximately $1)
  • unlike credit card payments, which can be disputed and reversed, boleto cannot be reversed. Refunds are handled by bank transfer
  • The information is filled out on a form, and then the recipient enters the details online to receive the payment
  • Brian Krebs was shown a botnet that was lying in wait on infected computers, and as the user entered the details of a boleto, it would quickly change the recipient as the transfer was submitted, allowing the botnet controllers to receive the money, instead of the intended recipient
  • “Thieves had hijacked some 383 boleto transactions between February 2014 and the end of June, but had stolen the equivalent of nearly USD $250,000 during that time”
  • Researchers at RSA Security (part of EMC) found an even larger botnet
  • “RSA says the fraud ring it is tracking — known as the “Bolware” operation — affects more than 30 different banks in Brazil, and may be responsible for up to $3.75 billion USD in losses. RSA arrived at this estimate based on the discovery of a similar botnet control panel that tracked nearly a half-million fraudulent transactions.”
  • “Most Brazilian banks require online banking customers to install a security plug-in that hooks into the user’s browser. The plug-ins are designed to help block malware attacks. But according to RSA, the Bolware gang’s malware successfully disables those security plug-ins, leaving customers with a false sense of security when banking online.”
  • “RSA notes that the miscreants responsible for the Bolware operation appear to have used just over 8,000 separate accounts to receive the stolen funds.”
  • The botnet Krebs discovered was much less sophisticated, using only 3 destination bank accounts
  • RSA PDF

Dealing with encrypted streams

  • Adam Langley (of Google Security, and one of the authors behind BoringSSL) posts on his blog about how many file encryption systems, including gnupg, get it “wrong”
  • Specifically, when encrypting large messages they often use a single MAC (Message Authentication Code) at the end of the message
  • A MAC is used to ensure that the ciphertext has not been modified or corrupted before attempting to decrypt it
  • The problem is, if you do something like this: gpg -d your_archive.tgz.gpg | tar -xz
  • It will decrypt the contents of the gpg encrypted file and spit them out to the pipe, and not until it reaches the MAC at the end of the message, will it realize that the file was corrupted, and should not have been used. At this point it is too late, tar has already processed the invalid stream
  • An attacker may be able to use this to cause tar to overwrite a file the user did not intend, or otherwise create corrupted files or exploit a vulnerability in tar
  • The correct way to handle this situation is to not return the data until it has been authenticated, however this may require an impossibly large buffer
  • The author discusses the reasonably low overhead (0.1%) of breaking the message into 16 KiB chunks, each with a 16 byte MAC. This would allow gpg to authenticate each small chunk before writing it to the pipe.
  • However, with that approach “Although safer in general, when chunking one has to worry that an attacker hasn’t reordered chunks, hasn’t dropped chunks from the start and hasn’t dropped chunks from the end”
  • Ted Unangst (of OpenBSD/LibreSSL) posts his thoughts
  • Ted clarifies that OpenBSD’s ‘signify’ system in newer OpenBSD installers download the archive, verify the downloaded temporary archive before passing it to tar to be extracted, as opposed the the old design before signify, where the file was piped to tar directly from the ftp client, not requiring the temporary storage space
  • Ted also mentions his ‘reop’ (Reasonable Expectation Of Privacy) tool, a light weight (incompatible) replacement for GnuPG, “However, the entire message must decrypt and authenticate successfully before any output is produced, so it’s actually safer than a small packet streaming program which may produce partial output. (reop cheats a bit by imposing a message size limit; it simply can’t encrypt large files, for large values of large.)”

Android keystore stack overflow flaw could allow key-theft

  • The vulnerability could allow attackers to steal cryptographic keys from the device, including those for some banking services, virtual private networks, and PINs or patterns used to unlock vulnerable devices
  • The flaw is fixed in Android 4.4
  • Originally incorrectly reported as affecting 86% of devices, it only affects ~ 10.3% as it only affects Android 4.3
  • The vulnerability requires a malicious app be installed on the targeted handset, but we have seen legitimate apps be bought or hijacked before, and it is often fairly easy to trick people into installing apps
  • “Generally speaking this is how apps are going to store their authentication credentials, so if you can compromise the KeyStore, you can log in as the phone’s user to any service where they’ve got a corresponding app, or, at least, an app that remembers who you are and lets you log back in without typing a password. This means that most banking apps, which force you to type your password every time, are probably safe against this particular attack.”
  • Researcher Post

Feedback:


Round Up:


The post Botnet Billionaires | TechSNAP 170 first appeared on Jupiter Broadcasting.

]]>
It’s the Stupid Economy | Unfilter 68 https://original.jupiterbroadcasting.net/43642/its-the-stupid-economy-unfilter-68/ Wed, 25 Sep 2013 20:49:17 +0000 https://original.jupiterbroadcasting.net/?p=43642 This week marked the five-year anniversary of the collapse of Lehman Brothers investment bank, which triggered the largest crisis since the Great Depression.

The post It’s the Stupid Economy | Unfilter 68 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

This week marked the five-year anniversary of the collapse of Lehman Brothers investment bank, which triggered the largest financial crisis since the Great Depression. And it also marked second anniversary of the start of Occupy Wall Street.

And while the establishment uses false metrics to assure us everything is going in the right direction, the cold numbers paint a much different picture. On the eve of another political showdown that threatens yet another government shutdown, we’ll dig into the fundamental issues that leave us like boiling frogs.

Then it’s your feedback, our follow up, and much much more

On this week’s Unfilter.

Direct Download:

Video | MP3 Audio | OGG Audio | Torrent | YouTube

RSS Feeds:

Video Feed | MP3 Feed | OGG Feed | HD Torrent | Mobile Torrent | iTunes

Become an Unfilter Supporter:

— Show Notes —

NSA is CRAZY

Who pays for Snowden’s security in Russia?

Earlier this month, Brazilian president Dilma Rousseff announced plans to create an undersea fiber-optic cable that would funnel internet traffic between South America and Europe, bypassing the US entirely.

Brazil’s president, Dilma Rousseff, has launched a blistering attack on US espionage at the UN general assembly, accusing the NSA of violating international law by its indiscriminate collection of personal information of Brazilian citizens and economic espionage targeted on the country’s strategic industries.
Rousseff’s angry speech was a direct challenge to President Barack Obama, who was waiting in the wings to deliver his own address to the UN general assembly, and represented the most serious diplomatic fallout to date from the revelations by former NSA contractor Edward Snowden.

  • NSA planted bugs at Indian missions in D.C., U.N. – The Hindu

    According to a top-secret NSA document obtained by The Hindu, the NSA selected India’s U.N. office and the embassy as “location target” for infiltrating their computers and telephones with hi-tech bugs, which might have given them access to vast quantities of Internet traffic, e-mails, telephone and office conversations and even official documents stored digitally.
    Though emails sent to India’s New York mission have remained unanswered so far, an Indian diplomat told The Hindu that the NSA eavesdropping might have done “extensive damage” to India’s stand on many international issues ranging from UN Security Council reforms to peacekeeping operations. “If they could implant bugs inside communications equipment of European Union office here and tap into their communications cables as well, there is no reason to believe that they didn’t snoop on us,” said the diplomat, speaking strictly on condition of anonymity.


– Thanks for Supporting Unfilter –

This Week’s New Supporters:

  • Timothy B

  • Elvis K

  • Harry P

  • Tyler D

  • Avi G

  • Chris L

  • Thanks to our 176 Unfilter supporters!

  • Supporter perk: Downloadable Pre and Post show. Extra clips, music, hijinks, and off the cuff comments. The ultimate Unfiltered experience.


Economic Dissonance

“The 400 richest people in the United States have more wealth than the bottom 150 million put together,” said Berkeley Professor and former Labor Secretary Robert Reich on a recent CNNMoney panel on inequality.

Former Labor Secretary Robert B. Reich, who served in the Clinton administration, warned during an interview of the perils of widening income inequality in the United States, excessive executive compensation and the future of labor.

Reich is promoting his new documentary, “Inequality for All,” which looks at the income gap and possible solutions. The film premiered at the Sundance Film Festival in January and won a special jury prize in the documentary competition for director Jacob Kornbluth.

To put the staggering rise in income inequality another way: The incomes of the bottom 90 percent of Americans, adjusted for inflation, grew by $59 on average between 1966 and 2011, while the average income of the top 10 percent grew by $116,071 during the same period, according to an analysis by Pulitzer Prize-winning journalist David Cay Johnston.

The Treasury will only have $30 billion of cash on hand by mid-October, putting the United States on the precipice of an unprecedented default, the department said on Wednesday.

In the letter, Mr. Lew set Oct. 17 as the effective deadline for Congressional action: after that date, the country would be at severe risk of missing or defaulting on some of its payments every day going forward.

The Treasury makes more than 80 million individual payments a month. After exhausting its extraordinary measures, it would miss about 30 percent of those payments until Congress raised the ceiling again.

According to the Bipartisan Policy Center, the Treasury is facing a $12 billion Social Security payment on Oct. 23 and a $6 billion interest payment on the public debt on Oct. 31.

On Nov. 1 alone, it needs to spend $18 billion on Medicare, $25 billion on Social Security, $12 billion on military pay and veterans benefits and $3 billion on the Supplemental Security Income program.


Obamacare Showdown

Sen. Ted Cruz (R-Tex.) ended his marathon talking attack on President Obama’s health-care law Wednesday after 21 hours and 19 minutes — a feat of stamina that seems likely to complicate House GOP efforts to pass a funding bill aimed at averting a looming government shutdown.

The freshman senator ceded the floor — and got his first opportunity for a bathroom break — at noon, after running up against a deadline imposed by Senate procedural rules

Before tax credits that work like an upfront discount for most consumers, sticker-price premiums for a mid-range benchmark plan will average $328 a month nationally for an individual, comparable to payments for a new car.

Feedback:

If you’re a Supporter check your inbox!

Call us: 1.425.312.1756

Follow the Us:

The post It’s the Stupid Economy | Unfilter 68 first appeared on Jupiter Broadcasting.

]]>
Gaming is to Blame | Unfilter 67 https://original.jupiterbroadcasting.net/43312/gaming-is-to-blame-unfilter-67/ Wed, 18 Sep 2013 22:08:20 +0000 https://original.jupiterbroadcasting.net/?p=43312 In their quest to demonize their #1 competition, the media once again robs the people of a balanced dialog. We’ll do our best, to fix that.

The post Gaming is to Blame | Unfilter 67 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Another mass shooting grabs the attention of the nation, and while the essential details of the story are yet to emerge, the media has already cast their villain, video games. In their quest to demonize their #1 competition, they once again rob the people of a balanced dialog. We’ll do our best, to fix that.

Plus: The world economies dodged a major bullet by the name of Larry Summers. We’ll dig into this parasites destructive past and why this week was a victory for everyone.

The it’s your feedback, our follow up, and much much more.

On this week’s Unfilter.

Direct Download:

Video | MP3 Audio | OGG Audio | Torrent | YouTube

RSS Feeds:

Video Feed | MP3 Feed | OGG Feed | HD Torrent | Mobile Torrent | iTunes

Become an Unfilter Supporter:

— Show Notes —


NSA is CRAZY

During an interview at the Techcrunch Disrupt conference in San Francisco, Mayer was asked why tech companies had not simply decided to tell the public more about what the US surveillance industry was up to. “Releasing classified information is treason and you are incarcerated,” she said.

The Foreign Intelligence Surveillance Court is revealing information about the NSA’s collection of Americans’ phone records, called the Section 215 Bulk Phone Metadata Collection Program. According to a declassified brief released Tuesday by FISA Court Judge Claire Eagan, not a single telecom company has challenged the legality of the NSA’s collection of their customers’ metadata. The court briefing also went on to say that it believed members of Congress were fully briefed on the program. RT’s Sam Sacks has the reaction from members of Congress about the first brief the FISA Court declassified of its own volition.

“I appreciate that the consumer-centric IT firms that you referenced [Yahoo, Google, Microsoft] that it’s important to grandstand a bit, and waive their arms and protest loudly so as not to offend the sensibility of their customers,” Stratton said.

“This is a more important issue than that which is generated in a press release. This is a matter of national security.”

Brazilian President Dilma
Rousseff has canceled a state visit to Washington in October
over reports that the United States spied on her personal
communications and those of other Brazilians, a leading
Brazilian newspaper reported on Tuesday.

Rousseff’s visit, scheduled for Oct. 23, was conceived to highlight the improvement in ties between the two biggest economies in the Americas and Brazil’s emergence over the past decade as a regional power.
The trip has been seen as a platform for deals on oil exploration and biofuels technology, and Brazil’s potential purchase of fighter jets from Chicago-based Boeing Co.
The itinerary includes a state dinner at the White House, the only such event offered by the Obamas this year.


– Thanks for Supporting Unfilter –

This Week’s New Supporters:

  • David L

  • Andrej K

  • Thanks to our 181 Unfilter supporters!

  • Supporter perk: Downloadable Pre and Post show. Extra clips, music, hijinks, and off the cuff comments. The ultimate Unfiltered experience.


Navy Yard shooting

A former Navy man launched an attack Monday morning inside a building at the Washington Navy Yard, spraying gunfire on office workers in the cafeteria and in the hallway at the heavily secured installation, authorities said. Thirteen people were killed, including the gunman.

Elisabeth says that Navy Yard shooter Aaron Alexis, a 34-year-old IT contractor, was clearly influenced to go shoot up the Washington Navy Yard… by his gaming habit.

“What about frequency testing?” she added. “How often has this game been played? I’m not one to get in there and say, monitor everything, but if this, indeed, is a strong link, right, to mass killings then why aren’t we looking at frequency of purchases per person? And also, how often they’re playing and maybe they time out after a certain hour.”

  • [Video games getting blamed for Navy Yard attack… (https://www.gamezone.com/originals/2013/09/17/video-games-getting-blamed-for-navy-yard-attack-is-misdirection-and-irresponsible-of-mainstream-media)

But the Telegraph describe the “darker side to Alexis’s character” – the side that saw him playing violent “zombie” video games in his room for hours at a time.


Larry Punts

“Conditions in the job market today still are far from what all of us would like to see,” Bernanke said at a news conference after the policy-setting Federal Open Market Committee voted to continue its bond-buying program at the same pace.

The unemployment rate has dropped from 8.1% when the stimulus program began a year ago to 7.3% last month, Bernanke said.

The figure is close to the 7% level Bernanke has said the Fed wanted to see at the end of the bond-buying program.

But he noted that the rate still is “well above acceptable levels.”

During his time as Treasury Secretary in the Clinton administration, Summers earned his reputation as a deregulator. Summers urged Congress to repeal parts of a Depression-era rule called Glass-Steagall, which prevented financial institutions from simultaneously acting as investment banks, commercial banks and insurance companies. This move paved the way for banks to become larger than ever.

Also in the late ’90s, Summers pushed back against a movement to regulate complex derivatives. Some say, both those decisions played a role in precipitating the 2008 financial crisis.

The Memo confirmed every conspiracy freak’s fantasy: that in the late 1990s, the top US Treasury officials secretly conspired with a small cabal of banker big-shots to rip apart financial regulation across the planet. When you see 26.3 percent unemployment in Spain, desperation and hunger in Greece, riots in Indonesia and Detroit in bankruptcy, go back to this End Game memo, the genesis of the blood and tears.


Syria

According to a State Department official’s account of the negotiations, which began Thursday evening and ended Saturday afternoon with a framework accord to secure and eliminate Syria’s chemical weapons, it was a deal that almost did not happen.

In the end, the deal was written entirely by the U.S. side. The Russians agreed to it in an impromptu poolside conversation between Kerry, Lavrov and their deputies, who dragged over chairs to join them. Kerry made final edits to the draft on an iPad in his hotel room.

Feedback:

  • Cyber Domain

  • Bitmessage Address: BM-GuQ4gqmBeW8CYpSo3Htg2pBrBdHbvpe7

If you’re a Supporter check your inbox!

Call us: 1.425.312.1756

Follow the Us:

The post Gaming is to Blame | Unfilter 67 first appeared on Jupiter Broadcasting.

]]>
Why so Syria | Unfilter 65 https://original.jupiterbroadcasting.net/42462/why-so-syria-unfilter-65/ Wed, 04 Sep 2013 21:36:18 +0000 https://original.jupiterbroadcasting.net/?p=42462 We’ll blow past the patriotic platitudes and superficial reasons for the conflict and call out the real interest behind this aggression.

The post Why so Syria | Unfilter 65 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

After an abrupt change of course President Obama’s plan to bomb Syria has won key congressional support, as lawmakers prepare to authorize America’s new war, we’ll blow past the patriotic platitudes and superficial reasons for the conflict and call out the real interest behind this aggression, and the dangerous blowback even a limited strike could bring.

Plus: Revelation of the NSA’s rampant spying continue to leak, this week we learned the NSA captured the emails of Brazil and Mexico presidents, and they’re not very happy about it.

Then the good news for Cannabis legalization, your feedback, and much much more.

On this week’s Unfilter.

Direct Download:

Video | MP3 Audio | OGG Audio | Torrent | YouTube

RSS Feeds:

Video Feed | MP3 Feed | OGG Feed | HD Torrent | Mobile Torrent | iTunes

Become an Unfilter Supporter:

— Show Notes —


NSA is CRAZY

Brazil and Mexico have called on the U.S. to explain recent reports — sourced to documents obtained by Edward Snowden — alleging that the NSA spied on Brazilian president Dilma Rousseff and Mexican President Enrique Pena Nieto. Rousseff, who called in U.S. ambassador Thomas Shannon over the allegations, might cancel an October trip to the White House.

The United States intelligence agency was so interested, in fact, that it hacked into Al Jazeera’s internal communications system, according to documents from former NSA contractor and whistleblower Edward Snowden that have been seen by SPIEGEL.

One such document, dated March 23, 2006, reveals that the NSA’s Network Analysis Center managed to access and read communication by “interesting targets” that was specially protected by the news organization. The information also shows that the NSA officials were not satisfied with Al Jazeera’s language analysis.

"Much of the material is encrypted. However, among the unencrypted documents
… was a piece of paper that included the password for decrypting one of
the encypted files on the external hard drive recovered from the claimant.

“The fact that … the claimant was carrying on his person a handwritten piece
of paper containing the password for one of the encrypted files … is a
sign of very poor information security practice.”

According to the latest Snowden leaks in The Washington Post, an intelligence community report entitled “Threats to Unmanned Aerial Vehicles” details Al-Qaeda’s attempts to counter US drone strikes dating back to 2006. Al-Qaeda attempted to down US drones in various ways, including jamming GPS signals and hobby airplanes. The terrorist organization is trying to recruit more engineers and technicians to focus on counter-drone operations.


– Thanks for Supporting Unfilter –

This Week’s New Supporters:

  • Jesper M

  • Robert M

  • James T

  • Alexander l

  • Benjamin K

  • Samuel W

  • Patrik N

  • Adam P

  • Stefan S

  • Kevin H

  • Thanks to our 172 Unfilter supporters!

  • Supporter perk: Downloadable Pre and Post show. Extra clips, music, hijinks, and off the cuff comments. The ultimate Unfiltered experience.


Syria

The Prime Minister said that the UK “can’t be part and won’t be part” of any
military strikes against Bashar al-Assad’s regime.

“President Obama is not asking America to go to war,” Mr Kerry told the Senate Foreign Relations Committee.

“He is asking for authorization to degrade and deter (Syrian president) Bashar al-Assad’s capacity to use chemical weapons.”

The vote came after Sen. John McCain, R-Ariz., raised objections to an earlier draft. The objections forced lawmakers to renegotiate the measure; McCain ultimately won tougher language clarifying that U.S. policy would be aimed at changing the momentum on the ground. He was among the 10 who voted for the final resolution, after getting two amendments added.

“These amendments are vital to ensuring that any U.S. military operations in Syria are part of a broader strategy to change the momentum on the battlefield in Syria,” McCain said in a statement afterward. “That strategy must degrade the military capabilities of the Assad regime while upgrading the military capabilities of moderate Syrian opposition forces. These amendments would put the Congress on the record that this is the policy of the United States, as President Obama has assured me it is.”

U.S. Defense Secretary Chuck Hagel told lawmakers on Wednesday that a limited military strike against Syria was expected to cost “tens of millions” of dollars.


Weed

The Obama administration said Thursday that it would not challenge laws legalizing marijuana in Colorado and Washington state as long as those states maintain strict rules involving the sale and distribution of the drug.

In a memo to U.S. attorneys in all 50 states, Deputy Attorney General James M. Cole said the Justice Department is “committed to using its limited investigative and prosecutorial resources to address the most significant threats in the most effective, consistent and rational way.” He stressed that marijuana remains illegal under federal law.

Feedback:

Bitmessage Address: BM-GuQ4gqmBeW8CYpSo3Htg2pBrBdHbvpe7

If you’re a Supporter check your inbox!

Call us: 1.425.312.1756

Follow the Us:

The post Why so Syria | Unfilter 65 first appeared on Jupiter Broadcasting.

]]>
Standing with Ed | Unfilter 58 https://original.jupiterbroadcasting.net/40217/standing-with-ed-unfilter-58/ Wed, 10 Jul 2013 21:52:03 +0000 https://original.jupiterbroadcasting.net/?p=40217 Latin America stands with Snowden with multiple offers of asylum, we'll bring you up to date on the hunt for Edward Snowden and discuss latest revelations.

The post Standing with Ed | Unfilter 58 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

New leaks give us a better picture of how the NSA vacuums up your Internet traffic, and leverages their relationships with telecom companies to take what they want.

Then Latin America stands with Edward Snowden as multiple offers of asylum come in, we’ll bring you up to date on the hunt for Edward Snowden and discuss his latest revelations.

Plus on the eve of new talks with China the US is caught in another hypocritical scandal, a look at the explosive situation in Egypt, your feedback, and much much more.

Direct Download:

Video | MP3 Audio | OGG Audio | Torrent | YouTube

RSS Feeds:

Video Feed | MP3 Feed | OGG Feed | HD Torrent | Mobile Torrent | iTunes

Become an Unfilter Supporter:

— Show Notes —


Is Broccoli-Gate The Media Having a Laugh at the Public?

The president’s answer places him in direct odds with former President George H.W. Bush, who famously declared in 1990 that he hated broccoli.

“And I haven’t liked it since I was a little kid and my mother made me eat it. And I’m president of the United States, and I’m not going to eat any more broccoli!” he said.


Egypt Headed for Civil War?

Egypt lurched into dangerous new terrain Monday as an angry and bloodied Muslim Brotherhood called for an “uprising” against the new order, and the head of Egypt’s top Islamic authority warned that the country was headed toward “civil war,” after security forces opened fire on supporters of ousted President Mohamed Morsi in the early morning hours.

Senate Foreign Relations Committee Chairman Robert Menendez (D-N.J.) on Sunday said the U.S. could use its foreign aid package for Egypt as “leverage” to push the country back to democracy, days after the military ousted elected President Mohamed Morsi.

What do we actually give to Egypt? Between 1948 and 2011, the United States has given Egypt about $71.6 billion in bilateral military and economic aid. That’s more than we’ve given to any other country over that time frame save for Israel.

A recent report (pdf) from the Congressional Research Service lays out the details. The biggest chunk is military aid, averaging about $1.3 billion per year since 1987, with much of that military equipment. For instance, Egypt plans to acquire 1,200 M1A1 Abrams Battle tanks from the United States. The components are jointly manufactured in both countries and shipped to Egypt for final assembly. This year, the United States is also shipping 20 F–16 fighter jets overseas. Plus there’s money for border security along the Sinai Peninsula.

Egypt also gets a few special financing provisions, says CRS, including the ability to deposit its funds at an interest-bearing account at the Federal Reserve Bank of New York. The nation also gets to engage in cash-flow financing to pay for military equipment, a special provision not available to most recipients, and one that allows Egypt to negotiate bigger arms purchases.

The Obama administration has insisted that aid to Egypt is crucial to avoiding broader problems. “A hold up of aid might contribute to the chaos that may ensue because of their collapsing economy, said Secretary of State John Kerry in January. ”Their biggest problem is a collapsing economy."

– Thanks for Supporting Unfilter –

This Week’s New Supporters:

  • Christopher B
  • Kent K
  • Stephen M
  • Steven H
  • Victor
  • Marc G
  • Travis D
  • Julius S

Latest Leaks

A classified NSA slide obtained by The Washington Post and published here for the first time lists “Two Types of Collection.”

One is PRISM, the NSA program that collects information from technology companies, which was first revealed in reports by the Post and Britain’s Guardian newspaper last month. The slide also shows a separate category labeled “Upstream,” described as accessing “communications on fiber cables and infrastructure as data flows past.”

Colombia is considered a top military and diplomatic ally in the region following a decade of joint operations against Marxist rebels and drug trafficking gangs that have caused harm to both countries’ economies.

“In rejecting the acts of espionage that violate people’s rights and intimacy as well as the international conventions on telecommunication, Colombia requests the corresponding explanations from the United States government through its ambassador to Colombia,” the foreign ministry said in the statement.

A majority of U.S. registered voters
consider Edward Snowden a whistle-blower, not a traitor, and a
plurality says government anti-terrorism efforts have gone too
far in restricting civil liberties, a poll released today shows.

Fifty-five percent said Snowden was a whistle-blower in
leaking details about top-secret U.S. programs that collect
telephone and Internet data, in the survey

“The fact that there is little difference now along party lines about the overall anti-terrorism effort and civil liberties and about Snowden is in itself unusual in a country sharply divided along political lines about almost everything,”

Peter Brown, assistant director of Quinnipiac’s polling institute.

Where in the World is Snowden

In the second part of an exclusive interview with Glenn Greenwald and Laura Poitras, former NSA contractor Edward Snowden contemplates the reaction from the US government to his revelations of top-secret documents regarding its spying operations on domestic and foreign internet traffic, email and phone use. This interview was recorded in Hong Kong on 6 June 2013

Should NSA leaker Edward Snowden decide to accept Venezuela’s offer of asylum, the tricky thing will be figuring how to get there from Moscow’s Sheremetyevo Airport. His big problem is that after the strange saga of Bolivian President Evo Morales’s flight over Europe, which included an unexpected stopover in Austria where the presidential plane may have been searched, Snowden might want to avoid flying over any countries friendly to the United States.

He appears to have, generally speaking, five options, each of which carries significant risk.


Dinner with China:

US Vice President Joe Biden has urged China to end its “outright” theft through hacking and to improve human rights as the world’s two largest economies began annual strategic talks.

Treasury Secretary Lew tells Fareed Zakaria how Chinese cyber theft is different from NSA surveillance.

Citing documents leaked by Edward Snowden, the fugitive former American intelligence contractor, O Globo newspaper said the NSA programs went beyond military affairs to what it termed “commercial secrets.”

These included petroleum in Venezuela and energy in Mexico, according to a graphic O Globo identified as being from the NSA and dated February of this year.


Feedback:

If you’re a Supporter check your inbox!

Call us: 1.425.312.1756

Follow the Us:

The post Standing with Ed | Unfilter 58 first appeared on Jupiter Broadcasting.

]]>
How Malware Makes Money | TechSNAP 31 https://original.jupiterbroadcasting.net/13756/how-malware-makes-money-techsnap-31/ Thu, 10 Nov 2011 18:18:24 +0000 https://original.jupiterbroadcasting.net/?p=13756 The FBI shuts down a cyber crime syndicate, and we’ll tell you just how much profit they were bring in. Plus we’ll cover how to securely erase your hard drive!

The post How Malware Makes Money | TechSNAP 31 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

The FBI shuts down a cyber crime syndicate, and we’ll tell you just how much profit they were bring in.

Plus we’ll cover how to securely erase your hard drive, Xbox Live’s minor password leak, how researches remotely opened prison cell doors, in my own state!

All that and more, on this week’s episode of TechSNAP!

Thanks to:
GoDaddy.com Use our codes TechSNAP10 to save 10% at checkout, or TechSNAP20 to save 20% on hosting!

 

Direct Download Links:

HD Video | Large Video | Mobile Video | MP3 Audio | OGG Audio | YouTube

Subscribe via RSS and iTunes:

   

Show Notes:

FBI takes out malware operation that illicitly made 14 million dollars

  • The malware was said to have infected as many as 4 million computers in 100 countries
  • Atleast 500,000 infected machines in the USA alone
  • Operation Ghost Click resulted in indictments against six Estonian and one Russian national. The Estonians were taken in to custody by local authorities and the US is seeking to extradite them.
  • The malware, called DNSChanger, changed the users DNS servers, to use rogue servers run by the botnet operators, and allowed the attackers to basically perform man-in-the-middle attacks against any site they wished.
  • The attackers redirected all traffic related to Apple and iTunes to a site that sold fake apple software and pirated music.
  • The attackers also stole traffic from legitimate advertising networks and replaced it with their own network, charging advertisers for their ill gotten traffic.
  • The malware also blocked windows update and most known virus scanners and help sites.

Pastebin of XBox Live IDs and passwords published

  • The pastebin contained 90 game tags, passwords and possibly email addresses
  • Microsoft says that they do not believe their network was compromised, and that this list is the result of a small scale phishing attack
  • The size of the credential dump seems to support that conclusion
  • Regardless, it is recommended that you change your XBox Live password, and the password on any other service that shared the same password, especially the email address used for your XBox Live.

Researchers Uncover ‘Massive Security Flaws’ In Amazon Cloud

  • The vulnerability (since fixed) allowed an attacker to completely take over administrative rights on another AWS account, including starting new EC2 and S3 instances, and deleting instances and storage
  • An attacker could have run up a huge bill very quickly, and it would appear legitimate.
  • Using EC2 to crack passwords becomes even more effective when someone else is paying for your instances
  • The vulnerability was exploited using an XML signature wrapping attack, allowing them to modify the signed message while still having it verify as unmodified.
  • Amazon said “customers fully implementing the AWS security best practices were not susceptible to these vulnerabilities”
  • Previous Article about Amazon AWS Security
  • The previous article mostly covers vulnerabilities created by users of AWS, including people publicly publishing AMIs with their SSH keys still in them.

Prison SCADA systems vulnerable to compromise

  • Researchers have been able to compromised the SCADA systems and open/close cell doors, overload door mechanisms so they cannot be open/closed, and disable the internal communications systems.
  • The researches worked in one of their basements, spent less than $2,500 and had no previous experience in dealing with these technologies.
  • Washington Times Article confirms that the research was delivered to state and prison authorities, and that Homeland Security has verified the research
  • Researchers were called in after an incident where all of the cell doors on death row at once prison opened spontaneously
  • While the SCADA systems are not supposed to be connected to the Internet, it was found that many of them were.
  • Some were used by prison staff to browse the Internet, leaving them open to malware and other such attacks.
  • While others had been connected to the Internet so they could be remotely managed by consultants and software vendors
  • Even without the Internet, researchers found that the system could be compromised by an infected USB drive, connected to the
    SCADA system either via social engineering or bribery of prison employees.

Feedback:

Simon asks about destroying your data before recycling/selling your used hard drives

  • There are a number of tools that will overwrite the contents of your hard drive a number of times in various patterns. The goal here is to ensure that any data that was on the drive can not be recovered. There is never a guarantee that the data will not be recoverable.
  • Allan Recommends: DBAN – Darik’s Boot And Nuke
  • It is still a very good idea to overwrite the data on your disks before you recycle/sell them. The methods are slightly different now, specifically, some methods such as the ‘Gutmann Wipe’ which was designed for a specific type of disk encoding that is no longer users in modern hard drives are no longer effective.
  • DBAN supports a number of methods:
  • PRNG Stream (recommend) – literally overwrites the entire drive with a stream of data from the Pseudo Random Number Generator. It is recommended that you use 4 passes for medium security, and 8 or more passes for high security.
  • DoD 5220.22-M – The US Department of Defence 7 pass standard. The default is DBAN is the DoD Short, which consists of passes 1, 2 and 7 from the full DoD wipe.
  • RCMP TSSIT OPS-II – The Canadian governments “Technical Security Standard for Information Technology”: Media Sanitization procedure. (8 passes)
  • Quick Erase (Not recommended) – Overwrite the entire drive from 0s, only 1 pass. This is designed for when you are going to reuse the drive internally, and is not considered secure at all
  • DBAN also verifies that the data was overwritten properly, by reading back the data from the drive and verifying that the correct pattern is found.
  • I am not certain about the answer to your question concerning SD cards and other flash storage not in the form of a hard disk. A file erasure utility may be the only option if the device does not actually accept ATA/SCSI commands (careful, some USB devices pretend to accept the commands but just ignore ones they do not understand)
  • Simon’s method of using the shred utility (designed to overwrite an individual file) on the block device, is not recommended. a proper utility like DBAN uses ATA/SCSI commands to tell the disk to securely erase it self, which involves disabling write caching, and erasing unaddressable storage such as those that have been relocated due to bad sectors.
  • Special consideration should be given to SSDs, as they usually contain more storage than advertised, and as the flash media wears out, it is replaced from this additional storage. You want to be sure your overwrite utility overwrites the no-longer-used sectors as they will still contain your data. This is why a utility that uses the proper ATA/SCSI commands is so important.
  • A utility like DBAN is also required if the disk contained business or customer data. Under legislation such as PIPEDA (Personal Information Protection and Electronic Documents Act, Canada), HIPAA and Sorbanes-Oxley (USA), the information must be properly destroyed.

Round UP:

ZFS Server Build Progress:

  • Finalized Parts List
  • Parts Summary:
  • Supermicro CSE–829TQ-R920UB Chassis
    • 8 hot swapable SAS bays
    • dual redundant 920 watt high-efficiency PSUs
  • Supermicro X8DTU–6F+ motherboard
    • Dual Socket LGA 1366
    • 18x 240pin DDR3 1333 slots (max 288GB ram)
    • Intel 5520 Tylersburg Chipset, ICH10R
    • LSI 6Gb/s SAS Hardware RAID controller
    • Intel ICH10R SATA 3Gb/s SATA Controller
    • IPMI 2.0 with Virtual Media and KVM over LAN
    • Dual Intel 82576 Gigabit Ethernet Controller
  • Dual Intel Xeon E5620 Processors (4×2.4Ghz, HT, 12MB Cache, 80W)
  • 48GB DDR3 1333mhz ECC Registered RAM
  • 2x Seagate Barracuda XT 2TB SATA 6Gb/s 7200rpm Drives (for OS)
  • 9x Seagate Consellsation ES 2TB SAS 6Gb/s 7200rpm Drives (8x for RAID Z2, 1x cold spare)
  • Adaptec RAID 6805 Controller (8 Internal drives, supports up to 256 drives, 512mb DDR2 667 cache)
  • Adaptec AFM 600 Flash Module (Alternative to BBU, provides 4GB NAND flash power by super capacitor to provide zero maintenance battery backup)

The post How Malware Makes Money | TechSNAP 31 first appeared on Jupiter Broadcasting.

]]>