DOD – Jupiter Broadcasting https://www.jupiterbroadcasting.com Open Source Entertainment, on Demand. Mon, 11 Apr 2022 05:37:41 +0000 en-US hourly 1 https://wordpress.org/?v=5.5.3 https://original.jupiterbroadcasting.net/wp-content/uploads/2019/04/cropped-favicon-32x32.png DOD – Jupiter Broadcasting https://www.jupiterbroadcasting.com 32 32 Raleigh Action Show | LINUX Unplugged 453 https://original.jupiterbroadcasting.net/148182/raleigh-action-show-linux-unplugged-453/ Sun, 10 Apr 2022 19:15:00 +0000 https://original.jupiterbroadcasting.net/?p=148182 Show Notes: linuxunplugged.com/453

The post Raleigh Action Show | LINUX Unplugged 453 first appeared on Jupiter Broadcasting.

]]>

Show Notes: linuxunplugged.com/453

The post Raleigh Action Show | LINUX Unplugged 453 first appeared on Jupiter Broadcasting.

]]>
Convenient Emergency | Unfilter 62 https://original.jupiterbroadcasting.net/41302/convenient-emergency-unfilter-62/ Thu, 08 Aug 2013 05:14:38 +0000 https://original.jupiterbroadcasting.net/?p=41302 The Obama Administration claims to have intercepted significant chatter warning them to an impending attack from terrorist. We have questions.

The post Convenient Emergency | Unfilter 62 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Terror ALERT! The Obama Administration claims to have intercepted significant chatter warning them to an impending attack from terrorist. Forcing the US to shutter nearly two dozen diplomatic posts and evacuate personnel around the world.

The convenient emergency arises during major new revelations of domestic spying abuse.

The Drug Enforcement Administration is using intelligence gathered by the NSA to investigate US citizens for domestic crimes, a and then covers it up. We’ve got the details.

Plus: Snowden leaves the airport , your feedback, our follow up, and much much more…

On this week’s Unfilter.

Direct Download:

Video | MP3 Audio | OGG Audio | Torrent | YouTube

RSS Feeds:

Video Feed | MP3 Feed | OGG Feed | HD Torrent | Mobile Torrent | iTunes

Become an Unfilter Supporter:

— Show Notes —


Where in the World is Edward Snowden?

“We have reached the conclusion that there is not enough recent progress in our bilateral agenda with Russia to hold a US-Russia Summit,” the White House said in a statement.

In addition to Russia’s “disappointing decision” to grant Mr Snowden temporary asylum, the White House cited a lack of progress on issues ranging from missile defence to human rights.

“We believe it would be more constructive to postpone the summit until we have more results from our shared agenda,” the White House said.

Charles Schumer, the U.S. Senate’s third ranking Democrat and a close Obama ally, accused Russian President Vladimir Putin of trying to antagonize the United States by granting American fugitive Edward Snowden asylum for one year.

“President Putin is behaving like a schoolyard bully,” Schumer said on the CBS television talk show “Face the Nation.” “In my experience, I’ve learned unless you stand up to that bully, they ask for more and more and more.”


– Thanks for Supporting Unfilter –

This Week’s New Supporters:

  • Chris
  • Michael B
  • Allen P
  • James F
  • Nick W @13.33 – Welcome to the investors club Nick!
  • Kyle J
  • Dusko P
  • Brian
  • Thanks to our 151 Unfilter supporters!

  • Supporter perk: Downloadable Pre and Post show. Extra clips, music, hijinks, and off the cuff comments. The ultimate Unfiltered experience.


World Wide Terror Alert

Officials shuttered 22 U.S. embassies and consulates for the day on Sunday amid fears of an al Qaeda attack. On Sunday afternoon, the State Department said it had extended embassy and consulate closures in 15 of the locations until Friday and added four other posts to the list.

The House Intelligence Committee members weigh in the latest terror threat and the NSA.

Al-Qa’ida in the Arabian Peninsula (AQAP) is a Sunni extremist group based in Yemen that has orchestrated numerous high-profile terrorist attacks. One of the most notable of these operations occurred when AQAP dispatched Nigerian-born Umar Farouk Abdulmutallab, who attempted to detonate an explosive device aboard a Northwest Airlines flight on 25 December 2009

Egyptian newspaper, al-Masry al-Yom reported this week on what it is foreseeing will become Yemen – Saudi Arabia new Oil conflict.

Until 2012, Yemeni officials’ rhetoric revolve around the accepted belief that the poorest country of the Arabian Peninsula was running out of oil and gas.

It is important to note that experts’ discovery of large resources of petrol, most of which is said to be in basement (trap deep with earth pockets) were only made public in 2012, upon the departure from power of Yemen’s former President.

“There were attempts to control key cities in Yemen like Mukala and Bawzeer,” Badi told the British broadcaster. “This would be coordinated with attacks by al Qaeda members on the gas facilities in Shebwa city and the blowing up of the gas pipe in Belhaf city.”

the NY Times has already revealed details of the email intercepts by the US:

_The Obama administration’s decision last week to close nearly two dozen diplomatic missions and issue a worldwide travel alert resulted from intercepted electronic communications in which the head of Al Qaeda in Pakistan ordered the leader of its affiliate in Yemen, the terrorist organization’s most lethal branch, to carry out an attack as early as this past Sunday, according to American officials.

The intercepted conversations last week between Ayman al-Zawahri, who succeeded Osama bin Laden as the head of the global terrorist group, and Nasser al-Wuhayshi, the head of the Yemen-based Al Qaeda in the Arabian Peninsula, revealed one of the most serious plots against American and other Western interests since the attacks on Sept. 11, 2001, American intelligence officials and lawmakers have said.
_

So… revealing that we collect data on everyone somehow turns Snowden into a traitor, while having officials in the government tell the NY Times that we directly intercepted emails between Al Qaeda’s top leaders is somehow perfectly fine? How does that work?


SOD, The DEA’s Information Sharing Program

Reuters published a Monday report revealing that a shadowy
DEA unit known as the Special Operative Division (SOD) – made up
of officials from the FBI, CIA, NSA, IRS, and Department of
Homeland Security – funnels information gathered by the DEA to
those and other police agencies. Information from DEA wiretaps,
informants, and the database of telephone records is passed on,
often to investigations bearing no relevance to national
security.

According to documents viewed by Reuters, SOD federal agents are then trained to “recreate” the source of the investigation to cover up how they discovered a particular bit of information. That method, law experts say, violates an individual’s constitutional right to a fair trial because their defense attorney would be unable to examine details that could turn up evidence of biased witnesses or police malpractice.

A former federal agent who worked with the SOD said that police would find an excuse to stop a vehicle which they had prior information on and then have drug dogs search the car. Upon making the arrest, officers would fabricate a traffic violation that permitted the initial stop in order to hide that they were acting on an SOD tip.


NSA is Crazy

German High Court Justice Hans-Jürgen Papier defended the German government’s relationship with the American spy services. He said that a country has a “basic responsibility to protect its citizens from the attacks of foreign powers” but noted that a state “can only be responsible for doing things that it has the legal power, and is able, to do.”


TOP VOTED: The TSA Expands

With little fanfare, the agency best known for airport screenings has vastly expanded its reach to sporting events, music festivals, rodeos, highway weigh stations and train terminals.


Feedback:

Bitmessage Address: BM-GuQ4gqmBeW8CYpSo3Htg2pBrBdHbvpe7

Supporters Show Email:

If you’re a Supporter check your inbox!

Call us: 1.425.312.1756

Follow the Us:

The post Convenient Emergency | Unfilter 62 first appeared on Jupiter Broadcasting.

]]>
How Malware Makes Money | TechSNAP 31 https://original.jupiterbroadcasting.net/13756/how-malware-makes-money-techsnap-31/ Thu, 10 Nov 2011 18:18:24 +0000 https://original.jupiterbroadcasting.net/?p=13756 The FBI shuts down a cyber crime syndicate, and we’ll tell you just how much profit they were bring in. Plus we’ll cover how to securely erase your hard drive!

The post How Malware Makes Money | TechSNAP 31 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

The FBI shuts down a cyber crime syndicate, and we’ll tell you just how much profit they were bring in.

Plus we’ll cover how to securely erase your hard drive, Xbox Live’s minor password leak, how researches remotely opened prison cell doors, in my own state!

All that and more, on this week’s episode of TechSNAP!

Thanks to:
GoDaddy.com Use our codes TechSNAP10 to save 10% at checkout, or TechSNAP20 to save 20% on hosting!

 

Direct Download Links:

HD Video | Large Video | Mobile Video | MP3 Audio | OGG Audio | YouTube

Subscribe via RSS and iTunes:

   

Show Notes:

FBI takes out malware operation that illicitly made 14 million dollars

  • The malware was said to have infected as many as 4 million computers in 100 countries
  • Atleast 500,000 infected machines in the USA alone
  • Operation Ghost Click resulted in indictments against six Estonian and one Russian national. The Estonians were taken in to custody by local authorities and the US is seeking to extradite them.
  • The malware, called DNSChanger, changed the users DNS servers, to use rogue servers run by the botnet operators, and allowed the attackers to basically perform man-in-the-middle attacks against any site they wished.
  • The attackers redirected all traffic related to Apple and iTunes to a site that sold fake apple software and pirated music.
  • The attackers also stole traffic from legitimate advertising networks and replaced it with their own network, charging advertisers for their ill gotten traffic.
  • The malware also blocked windows update and most known virus scanners and help sites.

Pastebin of XBox Live IDs and passwords published

  • The pastebin contained 90 game tags, passwords and possibly email addresses
  • Microsoft says that they do not believe their network was compromised, and that this list is the result of a small scale phishing attack
  • The size of the credential dump seems to support that conclusion
  • Regardless, it is recommended that you change your XBox Live password, and the password on any other service that shared the same password, especially the email address used for your XBox Live.

Researchers Uncover ‘Massive Security Flaws’ In Amazon Cloud

  • The vulnerability (since fixed) allowed an attacker to completely take over administrative rights on another AWS account, including starting new EC2 and S3 instances, and deleting instances and storage
  • An attacker could have run up a huge bill very quickly, and it would appear legitimate.
  • Using EC2 to crack passwords becomes even more effective when someone else is paying for your instances
  • The vulnerability was exploited using an XML signature wrapping attack, allowing them to modify the signed message while still having it verify as unmodified.
  • Amazon said “customers fully implementing the AWS security best practices were not susceptible to these vulnerabilities”
  • Previous Article about Amazon AWS Security
  • The previous article mostly covers vulnerabilities created by users of AWS, including people publicly publishing AMIs with their SSH keys still in them.

Prison SCADA systems vulnerable to compromise

  • Researchers have been able to compromised the SCADA systems and open/close cell doors, overload door mechanisms so they cannot be open/closed, and disable the internal communications systems.
  • The researches worked in one of their basements, spent less than $2,500 and had no previous experience in dealing with these technologies.
  • Washington Times Article confirms that the research was delivered to state and prison authorities, and that Homeland Security has verified the research
  • Researchers were called in after an incident where all of the cell doors on death row at once prison opened spontaneously
  • While the SCADA systems are not supposed to be connected to the Internet, it was found that many of them were.
  • Some were used by prison staff to browse the Internet, leaving them open to malware and other such attacks.
  • While others had been connected to the Internet so they could be remotely managed by consultants and software vendors
  • Even without the Internet, researchers found that the system could be compromised by an infected USB drive, connected to the
    SCADA system either via social engineering or bribery of prison employees.

Feedback:

Simon asks about destroying your data before recycling/selling your used hard drives

  • There are a number of tools that will overwrite the contents of your hard drive a number of times in various patterns. The goal here is to ensure that any data that was on the drive can not be recovered. There is never a guarantee that the data will not be recoverable.
  • Allan Recommends: DBAN – Darik’s Boot And Nuke
  • It is still a very good idea to overwrite the data on your disks before you recycle/sell them. The methods are slightly different now, specifically, some methods such as the ‘Gutmann Wipe’ which was designed for a specific type of disk encoding that is no longer users in modern hard drives are no longer effective.
  • DBAN supports a number of methods:
  • PRNG Stream (recommend) – literally overwrites the entire drive with a stream of data from the Pseudo Random Number Generator. It is recommended that you use 4 passes for medium security, and 8 or more passes for high security.
  • DoD 5220.22-M – The US Department of Defence 7 pass standard. The default is DBAN is the DoD Short, which consists of passes 1, 2 and 7 from the full DoD wipe.
  • RCMP TSSIT OPS-II – The Canadian governments “Technical Security Standard for Information Technology”: Media Sanitization procedure. (8 passes)
  • Quick Erase (Not recommended) – Overwrite the entire drive from 0s, only 1 pass. This is designed for when you are going to reuse the drive internally, and is not considered secure at all
  • DBAN also verifies that the data was overwritten properly, by reading back the data from the drive and verifying that the correct pattern is found.
  • I am not certain about the answer to your question concerning SD cards and other flash storage not in the form of a hard disk. A file erasure utility may be the only option if the device does not actually accept ATA/SCSI commands (careful, some USB devices pretend to accept the commands but just ignore ones they do not understand)
  • Simon’s method of using the shred utility (designed to overwrite an individual file) on the block device, is not recommended. a proper utility like DBAN uses ATA/SCSI commands to tell the disk to securely erase it self, which involves disabling write caching, and erasing unaddressable storage such as those that have been relocated due to bad sectors.
  • Special consideration should be given to SSDs, as they usually contain more storage than advertised, and as the flash media wears out, it is replaced from this additional storage. You want to be sure your overwrite utility overwrites the no-longer-used sectors as they will still contain your data. This is why a utility that uses the proper ATA/SCSI commands is so important.
  • A utility like DBAN is also required if the disk contained business or customer data. Under legislation such as PIPEDA (Personal Information Protection and Electronic Documents Act, Canada), HIPAA and Sorbanes-Oxley (USA), the information must be properly destroyed.

Round UP:

ZFS Server Build Progress:

  • Finalized Parts List
  • Parts Summary:
  • Supermicro CSE–829TQ-R920UB Chassis
    • 8 hot swapable SAS bays
    • dual redundant 920 watt high-efficiency PSUs
  • Supermicro X8DTU–6F+ motherboard
    • Dual Socket LGA 1366
    • 18x 240pin DDR3 1333 slots (max 288GB ram)
    • Intel 5520 Tylersburg Chipset, ICH10R
    • LSI 6Gb/s SAS Hardware RAID controller
    • Intel ICH10R SATA 3Gb/s SATA Controller
    • IPMI 2.0 with Virtual Media and KVM over LAN
    • Dual Intel 82576 Gigabit Ethernet Controller
  • Dual Intel Xeon E5620 Processors (4×2.4Ghz, HT, 12MB Cache, 80W)
  • 48GB DDR3 1333mhz ECC Registered RAM
  • 2x Seagate Barracuda XT 2TB SATA 6Gb/s 7200rpm Drives (for OS)
  • 9x Seagate Consellsation ES 2TB SAS 6Gb/s 7200rpm Drives (8x for RAID Z2, 1x cold spare)
  • Adaptec RAID 6805 Controller (8 Internal drives, supports up to 256 drives, 512mb DDR2 667 cache)
  • Adaptec AFM 600 Flash Module (Alternative to BBU, provides 4GB NAND flash power by super capacitor to provide zero maintenance battery backup)

The post How Malware Makes Money | TechSNAP 31 first appeared on Jupiter Broadcasting.

]]> Feedback & Errata #1 | LAS | s19e02 https://original.jupiterbroadcasting.net/13091/feedback-errata-1-las-s19e02/ Sun, 23 Oct 2011 14:06:41 +0000 https://original.jupiterbroadcasting.net/?p=13091 Powered by your feedback, we cover your ideas, suggestions and correct a few mistakes! We fire up our ACTION camp stoves and pitch a tent!

The post Feedback & Errata #1 | LAS | s19e02 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

The big show covers a lot of epic ground, this week, we fire up our ACTION camp stoves and pitch a tent! Powered by your feedback, we cover your ideas, suggestions and correct a few mistakes!

Plus: The DoD thinks Open Source is ready for duty, we look back at Ubuntu’s 7 years, and fire the ACTION cannon at ZDNet’s latest Linux link bait!

All this week on, The Linux Action Show!

Thanks to:

GoDaddy.com Use our codes LINUX to save 10% at checkout, or LINUX20 to save 20% on hosting!

20% off WebSite Tonight plans (12 months or longer)

  • Code: linux12
  • By: Nov 15, 2011

Direct Episode Download Links:

HD Video | Large Video | Mobile Video | MP3 | OGG Audio | OGG Video | YouTube



[ad#shownotes]

Show Notes:

Runs Linux:

Android Pick:

Universal Pick:

Picks so far. Thanks to Madjo!

Check out the new SciByte:

Linux Action Show Subreddit

News:

David Gewirtz

He worked on a project called Frontier Kernel, he added sqlite and mysql support to it. So he is a “kernel” developer, but in the larger context of OS kernel development.

Errata & Feedback:

  • Felix Albrecht – Just saw your review and liked it a lot (more action like back in the days ;P), but you complained about two points which are not correct (or I misunderstood)
  • if you configure backup, there is an option ready to backup directly to your UbuntuOne storage
  • in the Ubuntu Software Center, there is an option under File -> “Sync between computers” to sync your installed applications between your computers using UbuntuOne
  • Jupiter Colony is a steaming pile of dog crap! Looking for someone to run it for us and make it more respectable!
  • From where i can find really old LAS podcasts?
  • Make ubuntu gnome3 look more like gnome2 (erroneously said allowed gnome2)
  • 7 Best GNOME Shell Extensions, Install in Ubuntu 11.10 Oneiric via PPA
  • VirtualBox: There are no longer a open source and proprietary version. There is only the GPL version which can be extended by an optional proprietary plugin. See https://www.virtualbox.org/wik…
  • VirtualBox correction In short: You can use the version from your distro repo and just download the extension file if you need the extra features.

Find us on Google+

Find us on Twitter:

Follow the network on Facebook:

Catch the show LIVE Sunday 10am PDT:

The post Feedback & Errata #1 | LAS | s19e02 first appeared on Jupiter Broadcasting.

]]>