cyberwar – Jupiter Broadcasting https://www.jupiterbroadcasting.com Open Source Entertainment, on Demand. Thu, 17 May 2018 01:10:59 +0000 en-US hourly 1 https://wordpress.org/?v=5.5.3 https://original.jupiterbroadcasting.net/wp-content/uploads/2019/04/cropped-favicon-32x32.png cyberwar – Jupiter Broadcasting https://www.jupiterbroadcasting.com 32 32 Mutually Assured Manipulation | Unfilter 280 https://original.jupiterbroadcasting.net/124941/mutually-assured-manipulation-unfilter-280/ Wed, 16 May 2018 17:10:59 +0000 https://original.jupiterbroadcasting.net/?p=124941 Show Notes: unfilter.show/280

The post Mutually Assured Manipulation | Unfilter 280 first appeared on Jupiter Broadcasting.

]]>

Show Notes: unfilter.show/280

The post Mutually Assured Manipulation | Unfilter 280 first appeared on Jupiter Broadcasting.

]]>
The Rat Race Begins | Unfilter 141 https://original.jupiterbroadcasting.net/80532/the-rat-race-begins-unfilter-141/ Wed, 15 Apr 2015 17:58:03 +0000 https://original.jupiterbroadcasting.net/?p=80532 With the lead up to LinuxFest Northwest Chris takes a moment to reflect on the kick off of the 2016 horse races. Congress gets involved with Iran, Putin has missiles for sale & a Cyberwar take-down you have to hear to believe. Direct Download: Video | MP3 Audio | OGG Audio | Torrent | YouTube […]

The post The Rat Race Begins | Unfilter 141 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

With the lead up to LinuxFest Northwest Chris takes a moment to reflect on the kick off of the 2016 horse races. Congress gets involved with Iran, Putin has missiles for sale & a Cyberwar take-down you have to hear to believe.

Direct Download:

Video | MP3 Audio | OGG Audio | Torrent | YouTube

RSS Feeds:

Video Feed | MP3 Feed | OGG Feed | HD Torrent | Mobile Torrent | iTunes

Become an Unfilter supporter on Patreon:

Foo

The post The Rat Race Begins | Unfilter 141 first appeared on Jupiter Broadcasting.

]]>
Military Budget Bomb | Unfilter 87 https://original.jupiterbroadcasting.net/52357/military-budget-bomb-unfilter-87/ Wed, 26 Feb 2014 22:20:38 +0000 https://original.jupiterbroadcasting.net/?p=52357 Defense Secretary Chuck Hagel on Monday proposed shrinking the Army to its smallest size in 74 years. Old special interests are digging in.

The post Military Budget Bomb | Unfilter 87 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Defense Secretary Chuck Hagel on Monday proposed shrinking the Army to its smallest size in 74 years, closing bases and reshaping forces to confront future threats like cyberwarfare. Old special interests are digging in and fighting back with everything they’ve got. But how deep are the cuts? And is there really any reduction in spending? We’ll dig in.

Plus: The NSA doubles down in Germany, an update on the Ukraine, and much much more.

On this week’s episode of, Unfilter.

Direct Download:

Video | MP3 Audio | OGG Audio | Torrent | YouTube

RSS Feeds:

Video Feed | MP3 Feed | OGG Feed | HD Torrent | Mobile Torrent | iTunes

Become an Unfilter Supporter:

— Show Notes —


NSA is Crazy

The Obama administration has asked a special court for approval to hold onto National Security Agency phone records for a longer period–an unintended consequence of lawsuits seeking to stop the phone-surveillance program.

The Wall Street Journal reported last week that the Justice Department was considering such a move, which would end up expanding the controversial phone records database by not deleting older call records.

Under the current system, the database is purged of phone records more than five years old. The Justice Department, in a filing made public Wednesday, said it needs to hold onto the older records as evidence in lawsuits brought by the American Civil Liberties Union, Electronic Frontier Foundation, and others.

Under the proposal made to the Foreign Intelligence Surveillance Court, the older data would continue to be held, but NSA analysts would not be allowed to search it.

After having stopped spying on Merkel, the NSA is now focusing on German Interior Minister Thomas de Maizière and other confidants (google translate)

These agencies are attempting to control, infiltrate, manipulate, and warp online discourse, and in doing so, are compromising the integrity of the internet itself.

Among the core self-identified purposes of JTRIG are two tactics: (1) to inject all sorts of false material onto the internet in order to destroy the reputation of its targets; and (2) to use social sciences and other techniques to manipulate online discourse and activism to generate outcomes it considers desirable.

Other tactics aimed at individuals are listed here, under the revealing title “discredit a target”:

Then there are the tactics used to destroy companies the agency targets:

GCHQ describes the purpose of JTRIG in starkly clear terms: “using online techniques to make something happen in the real or cyber world,” including “information ops (influence or disruption).”

The moderators at the giant r/news reddit (with over 2 million subscribed readers) repeatedly killed the Greenwald/Snowden story on government manipulation and disruption of the Internet … widely acknowledged to be one of the most important stories ever leaked by Snowden.

Similarly, the moderators at the even bigger r/worldnews reddit (over 5 million subscribers) repeatedly deleted the story, so that each new post had to start over at zero.

Under current plans, a joint venture between Brazilian telecoms provider Telebras and Spain’s IslaLink Submarine Cables would lay the communications link. Telebras would have a 35 percent stake, IslaLink would have a 45 percent interest and European and Brazilian pension funds could put up the remainder.

Brazil and the European Union are joining forces against the National Security Agency and spying by the United States. Brazil and the EU announced they will build an undersea communications cable to connect the two areas and to reduce the reliance on cables going through the US. The proposed $185 million cable would stretch from Fortaleza, Brazil to Lisbon, Portugal.


:– Mikey C
:– Roger M
:– Aidan C
:– J RR
:– Kyle B
:– Kyr0
:– PartyHorse
:– Mike D
:– Colby B
:– Lee H
:– Daniel S
:– Richard A
:– Jeff F
:– Darren G
:– Epi

– Thanks for Supporting Unfilter –

  • Thanks to our 349 Unfilter supporters!

  • Supporter perk: Downloadable Pre and Post show. Extra clips, music, hijinks, and off the cuff comments. The ultimate Unfiltered experience. ‘

  • Supporter perk: Exclusive BitTorrent Sync share of our production and non-production clips, notes, and more since the NSA scandal broke in episode 54. The ultimate Unfiltered experience, just got more ultimate.

  • Supporter Perk: Past 5 supporters shows, in a dedicated bittorrent sync folder.


Shrinking the Beast

In a speech at the one-year mark of his tenure as Pentagon chief, Hagel revealed many details of the defense spending plan that will be part of the 2015 budget that President Barack Obama will submit to Congress next week. Hagel described it as the first Pentagon budget to fully reflect the nation’s transition from 13 years of wa

Some of that risk, Hagel said, is associated with a sharp drawdown in the size of the Army, which the proposed budget calls for reducing to as low as 440,000 active duty soldiers from the current size of 520,000, while ensuring the force remains well trained and equipped.

The cuts assume the United States no longer becomes involved in large, prolonged stability operations overseas on the scale of Iraq and Afghanistan. “An Army of this size is larger than required to meet the demands of our defense strategy,” Hagel said. “It is also larger than we can afford to modernize and keep ready.”

“It is my judgment that the Department of Defense needs an appropriation of at least $540 billion for FY2011 for US military to properly carry out its mission, maintain readiness and prepare for the future,” said Gates, who also discussed cuts he’s made to the military budget, on programs no longer needed.
However, what is not widely known is that most of the $78 billion he’s cut would not take place until 2014 and 2015, when there will be a new secretary of defense and possibly a new president.

Defense Secretary Chuck Hagel recommended Monday that U.S. troops be reduced levels not seen since prior to World War II. In a news conference at the Pentago.

The future of the A–10s is up in the air again after Secretary of Defense Chuck Hagel outlined Monday massive proposed cuts to the military.

In the first half of fiscal 2013, however, those eligible to shop in military commissaries – which include disabled veterans and others with military identification – cashed in nearly $53 million in food stamps, according to data provided to The Huffington Post by the Defense Commissary Agency. In 2011, more than 5,000 “active duty military” relied on the government aid.

A September report by nonprofit think tank Center on Budget and Policy Priorities estimated that at least 900,000 veterans received Supplemental Nutrition Assistance Program assistance, or food stamps, each month.

You might disagree with Obama’s priorities, but Cheney’s claim is based entirely on the notion that Hagel and Obama are proposing military cuts. But they aren’t. Hagel proposed a change in force structure that would lead to a smaller Army, but his overall budget proposal is $115 billion more than the current sequester levels demanded by Republicans

The U.S. Army is giving away 13,000 armored trucks, worth about $500,000 each. The 20-ton MRAPs, or Mine-Resistant Ambush-Protected trucks, were built specifically to save U.S. soldiers from roadside bombs in the Iraq and Afghanistan wars. Now the trucks are patrolling U.S. city streets. U.S. law enforcement agencies have received the lion’s share of this high-powered military surplus. (Source: Bloomberg)

One proposal would be to put phone metadata collection under the purview of US telecommunications companies. Under this option, the NSA would inform the companies of when it needs to search their databases for terrorism-related investigations, and the phone companies would return only the results of those searches, rather than data on consumers unrelated to the investigations.

A second proposal would see a different federal agency hold the data — the Federal Bureau of Investigation (FBI), for instance — and a third would place them under the control of a third entity that’s neither a federal agency nor a telecom company.

The final proposal would abolish the data collection program altogether, an option that Obama in January said would require more work “to determine exactly how this system might work.”

This article is a list of countries by military expenditure, the amount spent by a nation on its military in a given year.

We currently spend more on defense than the next 10 countries combined. Defense spending accounts for about 20 percent of all federal spending — nearly as much as Social Security, or the combined spending for Medicare and Medicaid.

Mike Lofgren, a former GOP congressional staff member with the powerful House and Senate Budget Committees, joins Bill to talk about what he calls the Deep State, a hybrid of corporate America and the national security state, which is “out of control” and “unconstrained.” In it, Lofgren says, elected and unelected figures collude to protect and serve powerful vested interests.


Ukraine mayhem

The Maidan council named Arseniy Yatsenyuk to become prime minister. The cabinet – to be voted on by MPs on Thursday – includes leading activists.

The US has offered Ukraine’s struggling economy – which faces default – loan guarantees of up to $1bn (£600m).

Meanwhile, Mr Yanukovych has been put on the international wanted list.

The fugitive president – whose whereabouts are unclear – is accused of being behind last week’s deaths of more than 100 protesters at the hands of riot police in and around the Maidan.

US Secretary of State John Kerry said Washington planned to offer Ukraine the loan guarantees to help stabilise the country’s economy.

Mr Kerry also warned Russia it would be a “grave mistake” to embark on any military intervention in Ukraine.

Russia ordered surprise military exercises on Ukraine’s doorstep Wednesday as tensions in that country’s southern Crimea region simmered, with pro-Russian demonstrators facing off against rival protesters in the city of Simferopol.

Feedback:

If you’re a Supporter check your inbox!

Call us: 1.425.312.1756

Follow the Us:

The post Military Budget Bomb | Unfilter 87 first appeared on Jupiter Broadcasting.

]]>
Spooky Scary Cyberwar | Unfilter 20 https://original.jupiterbroadcasting.net/25596/spooky-scary-cyberwar-unfilter-20/ Thu, 04 Oct 2012 22:41:23 +0000 https://original.jupiterbroadcasting.net/?p=25596 After a string of high profile Cyberattacks we could be witnessing the creation of the next generation military industrial complex.

The post Spooky Scary Cyberwar | Unfilter 20 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

After a string of high profile Cyberattacks we could be witnessing the creation of the next generation military industrial complex. Or is President Obama desperately seeking to protect us from same the types of Cyber weapons we’ve attacked other nations with?

Nobody celebrates National Cybersecurity Awareness Month like the US government.

Plus: We start in the United States, which is facing a dramatic “Fiscal Cliff”. We’ll break down exactly what that term means, how it will impact you, and when the supposed deadline is.

Then from Libya to Spain we’ll focus on the important events that developed this week around the world.

And: The first presidential debates have just wrapped, we reflect on a few moments, and play a few of our favorite clips.

All that and a heck of a lot more, on this week’s Unfilter!

Direct Download:

HD Video | Mobile Video | MP3 Audio | OGG Audio | Torrent | YouTube

RSS Feeds:

HD Feed | Mobile Feed | MP3 Feed | OGG Feed | HD Torrent | Mobile Torrent | iTunes

Get Unfilter on your Android:

Browser Affiliate Extension:

  • Jupiter Broadcasting Affiliate Extensions for Chrome and Firefox

Show Notes:

ACT ONE:

ACT TWO:

ACT THREE: Debates

  • Romney was stronger than expected?
  • The Tax discussion seemed rather pointless. Romney remained vague, and neither addressed the 2013 automatic kick ins.
  • Obama seemed like he did not want to be there, Romney seemed like he wanted the evening.
  • Did this debate change your view of Romney or Obama?

Song pick of the week:

[asa]B000W0YLJO[/asa]

Follow the Team:

If you don’t already have a Dropbox account help Dan out by signing up using this link and then installing Dropbox

The post Spooky Scary Cyberwar | Unfilter 20 first appeared on Jupiter Broadcasting.

]]>
Learning to Hack | TechSNAP 56 https://original.jupiterbroadcasting.net/19266/learning-to-hack-techsnap-56/ Thu, 03 May 2012 17:19:29 +0000 https://original.jupiterbroadcasting.net/?p=19266 In Barnes and Noble attempt to censor a magazine article about hacking, that have propelled it into the spotlight. We’ve got the details on this great write up!

The post Learning to Hack | TechSNAP 56 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

In Barnes and Noble attempt to censor a magazine article about hacking, that have propelled it into the spotlight. We’ve got the details on this great write up!

PLUS: Moving big files around the world, faster torrents, and Microsoft’s hotmail flaw.

All that and more, in this week’s TechSNAP!

Thanks to:

GoDaddy.com Use our codes TechSNAP10 to save 10% at checkout, or TechSNAP20 to save 20% on hosting!

Limited time offer:

New customers 25% off your entire order, code: 25MAY7
Expires: May 31, 2012

 

Direct Download:

HD Video | Mobile Video | MP3 Audio | Ogg Audio | YouTube | Torrent File

RSS Feeds:

HD Video Feed | Mobile Video Feed | MP3 Audio Feed | Ogg Audio Feed | iTunes Feeds | Torrent Feed

Support the Show:

Show Notes:

OpenSSL fixes land for most distros


Barnes and Noble pulls magazine for article on how to hack

  • Issue #154 of Linux Format magazine has been pulled off shelves at Barnes and Noble stores in the US after complaints about the cover article, ‘Learn To Hack’
  • The content of the article has been posted online
  • The article walks the user through using the BackTrack Linux, the Penetration Testing distribution in order to exploit a virtual machine, specifically the ‘Metaspoitable’ image, which was setup specifically to contain vulnerabilities for the user to test against and exploit
  • The tutorial then walks the user through exploiting a PHP vulnerability to get a shell, and then further exploiting the Debian SSH Key weakness to gain root access to the virtual machine
  • The tutorial then moves on from attacking servers to attacking desktop machine
  • If you have physical access to a machine, is it trivial to boot from a live cd/usb and access the files on the disks, however if the user has encrypted their home directory (a simple option in newer versions of Ubuntu), then you need to be a bit more devious
  • The tutorial walks through using the LiveCD to creating a reverse-tcp shell to allow you to access the system at a later time, once the user has mounted their encrypted /home partition, giving you access to the files
  • The tutorial goes on to explain using WireShark to capture unencrypted HTTP credentials and quite a bit more
  • Metasploit Testing Lab Setup Instructions
  • Metasploitable VM Image

Microsoft patches widely exploited 0-day flaw in hotmail password reset system

  • Researchers discovered a problem with the way hotmail handles password resets
  • When you reset a hotmail password, they provide you with a token that allows you to set a new password on the account, the issue is that their code did not properly check the token, and pretty much any non-null value allowed any user to reset any other users’ password
  • Microsoft was notified of the flaw on April 20th and responded with a fix within hours, but not before the flaw was widely exploited
  • It can be particularly difficult to recover your account from an attack like this if the attacker changed the secret answer questions, removing your further ability to reset the password
  • Flaw was discovered by Vulnerability-Lab.com

Feedback:

In this week’s feedback segment, we discuss how ScaleEngine handled the unique challenges of delivering large video files to a global audience in both the short and long term.

Round Up:

The post Learning to Hack | TechSNAP 56 first appeared on Jupiter Broadcasting.

]]> Simulated Cyber War | TechSNAP 36 https://original.jupiterbroadcasting.net/14956/simulated-cyber-war-techsnap-36/ Thu, 15 Dec 2011 20:35:34 +0000 https://original.jupiterbroadcasting.net/?p=14956 Find out how the 2012 Olympics are preparing for cyper war, we’ll answer a great batch of questions. And Allan’s embarrassing tech war story!

The post Simulated Cyber War | TechSNAP 36 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Find out how the 2012 Olympics are preparing for cyper war, we’ll answer a great batch of questions.

And Allan’s embarrassing tech war story!

All that and more, on this week’s TechSNAP!

Thanks to:

GoDaddy.com Use our codes TechSNAP10 to save 10% at checkout, or TechSNAP20 to save 20% on hosting!

Free Private Registration

GoDaddy Offer Code: techsnap17
Link: https://www.godaddy.com/domainaddon/private-registration.aspx?isc=techsnap17

$1.99 hosting for the first 3 months

GoDaddy Offer Code: techsnap11

Direct Download Links:

HD Video | Large Video | Mobile Video | MP3 Audio | OGG Audio | YouTube

   
Subscribe via RSS and iTunes:

Show Notes:

Big Oil the next big target for cyber attacks?

  • The IT Manager for Royal Dutch Shell told the World Petroleum Conference that their company has been receiving an ever increasing number of cyber attacks against its infrastructure.
  • The attacks are said to be motivated by commercial interest, as well as political and criminal interests.
  • If attackers managed to gain access to critical control systems, they would be able to manipulate valves and pumps, and cause unimaginable damage, physical, monetary and environmental.
  • British Petroleum said they had seen a large increase in cyber attacks after the US Golf Oil Spill disaster.
  • This is only further evidence that industrial control systems need to be completely isolated from the internet, not protected by just a firewall, but entirely isolated. Even then, threats such as stuxnet or duqu can be introduced by portable media such as USB flash drives. Physical and System security needs to be taken much more seriously.

Olympic Control Center prepares for simulated Cyber Attacks

  • The new Olympic Control Center in Canary Wharf that will provide support and management for the IT infrastructure of the 2012 Olympics in London is preparing for a variety of Simulated Cyber Attacks in order to improve their preparedness for the Olympic games.
  • The simulated attacks will include a Denial of Service attack, which they plan to mitigate by using a distributed website, and viruses and other malware getting in to the organizers’ computers.
  • The computer network is used to store and record scores from the games and feed information to the public and the media.
  • The operations Center has a staff of 180 permanent employees.
  • “Another key principle is to keep mission-critical games systems quite isolated from anything web-facing. So very much partitioned and separated, thus making it hard for an external attack to succeed.”
  • The company running the Operations Center is Atos, a very large multinational IT services company. However Atos has had issues of its own.
  • In the autumn of 2008, Atos Origin was the subject of a government enquiry after a memory stick with passwords and user names for an important government computer system was found in a car park. BBC Coverage

War Story

Allan’s rm -rf / war story (Sovereign)

When I was in high school and college, I ran an IRC shell provider. It started out as one little home brew server on a 128kbit colocation, and grew to its peak of 9 dedicated servers in 4 data centers. As you can imagine, there were plenty of times where people tries to attack, hack or root my servers. It always made me laugh when they tried the latest Redhat exploit against my FreeBSD 4.x machine.

One such exploit involved a symbolic link to / with a obfuscated name (If I recall correctly, it was dot space space and then some unicode characters). As part of the cleanup, I went to remove the offending symlink. Because of the special characters etc in the name, I used the shell’s tab complete feature. Out of admittedly bad habit I used rm -rf rather than just rm, and either the shell or I put a trailing / on the symlink, so rather than removing the symlink, the shell resolved the symlink and started to execute the equivalent of rm -rf /. I knew something was wrong after a second or two when the command prompt did not return, and before I could figure out what was going on, I saw error messages about how /bin/tcsh could not be removed because it was in use, and that the kernel would not be deleted because it was flagged ‘system immutable’. I felt the blood drain out of my face and I quickly broke out in a cold sweat. I immediately hit control+c to prevent any further damage, but things were pretty far gone. /etc and /bin were gone, save for my shell because it was in use. So, without even ls, it was a little difficult to even tell what was left. This server had about 100 customers on it, and a decent uptime (175 days or so if I recall correctly).

Luckily, because of proper disaster planning on my part, daily Bacula backups of that server existed on our central backup server. A few commands to the bacula console and I was restoring /etc, /boot and /bin. Then I did a verify/compare operation to determine what other files may have been deleted, and restored them as well. Amazingly, all of this was pulled off without a reboot, and without a single complaint from a customer. Total time from disaster to recovery was less than 1 hour, and I managed to maintain the uptime.


Feedback

Q: (Matt) I listened to TechSnap – 28 and 34 about the ZFS Server Build. Now I’m a little confused, How is Allan’s ZFS server configured? If ZFS will do all the RAID stuff and he’s using RAID Z2 for the RAID–6 option then why are his drives on an Adaptec RAID controller and how is the Adaptec configured? Are you using a big RAID–0?

A: We’ve gotten this question quite a bit, because using a RAID controller is contrary to what I said during the TechSNAP 28 ZFS episode. In this case, I did not have a choice, I needed a controller that was supported under BSD, so I went with the Adaptec. The motherboard’s onboard Intel controller only has 6 ports, and 2 of those are used for the dedicated OS drives, which are mirrored in FreeBSD software using GEOM. The adaptec had the added advantage to their unique solution for battery backup. I have configured the Adaptec to pass-thru each drive directly to ZFS without any RAID, and then ZFS deals with the drives individually, making the RAID Z2 array. As I said during the initial episode, you don’t want to back your ZFS with a RAID device, because you lose control, and some ZFS features, like the ability to swap a device out. If I had done a big RAID–0 device exposed to ZFS, I could not have created the RAID Z2 array, because it requires at least 3 devices. Also, if one drive in a RAID–0 dies, the entire array is lost, so that would not be very good either.
*

Q: (Graham) I am looking to do a Raid set up but I would like to know if need two hard drives to be the same make or model or can they be two hard drives of the same size?

A: While the two drives do not have to be the same model, size, or even manufacturer, it is best if they are. Then you are striping or mirroring, the performance is mostly dictated by the slower of the two drives, so identical drives means that one drive is not constantly waiting for the other. There are also be issues with timing when the drives have drastically different performance. However, depending on your configuration, sometimes it is possible to make use of the additional performance of one of the drives. The FreeBSD software RAID driver GEOM’s mirroring mode supports different balancing methods, including: load, prefer, round-robin and split.
*

Q: (Bill) Currently I am designing/developing a client/server communications platform. I would love to make the project Open Source when I start developing the code but I am concerned about potential security implications. The plan is to use a user auth system so users can easily contact each other. This is making my security senses tingle because if you have the code for the auth system you could it break down easily. I would love to hear your opinions about this as there are ways it could be done but they could kill ease of use.

A: If you rely on nothing more than the fact that no one knows how your security system works (called Security Through Obscurity), then it is not really security at all. Rather than writing your own authentication system, it might be best to use an existing library, depending on what exactly you are trying to authenticate against. Standard libraries for cryptography like AES, SHA and Blowfish, and authenticity libraries like GPG and SSL/TLS. In the end, being open source allows other developers to spot any mistakes you make, and either notify you about them, or contribute patches to resolve them.

Round-Up:

Holiday Reading:

[asa default]0307269930[/asa]
[asa default]0765323117[/asa]

  • Audible Audio Book Version
  •    

    The post Simulated Cyber War | TechSNAP 36 first appeared on Jupiter Broadcasting.

    ]]>