Flag – Jupiter Broadcasting https://www.jupiterbroadcasting.com Open Source Entertainment, on Demand. Mon, 22 Feb 2016 02:47:09 +0000 en-US hourly 1 https://wordpress.org/?v=5.5.3 https://original.jupiterbroadcasting.net/wp-content/uploads/2019/04/cropped-favicon-32x32.png Flag – Jupiter Broadcasting https://www.jupiterbroadcasting.com 32 32 Boston Bomb Job | Unfilter 46 https://original.jupiterbroadcasting.net/35601/boston-bomb-job-unfilter-46/ Wed, 17 Apr 2013 21:07:59 +0000 https://original.jupiterbroadcasting.net/?p=35601 We cover and analyze the Boston Bombings, take a critical look at the media’s horrendous coverage and breakdown a few of the common conspiracies.

The post Boston Bomb Job | Unfilter 46 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

We cover and analyze the Boston Bombings, take a critical look at the media’s horrendous coverage and breakdown a few of the common conspiracies.

Plus: Letters sent to a Mississippi senator and President Obama tested positive for Ricin, adding to state of national panic. But are these letters connected with the Boston Bombings? We’ve got the answers

And: CISPA is just hours from passing, a little bit of good news, your feedback, and much much more!

On this week’s episode of, Unfilter.

Direct Download:

HD Video | Mobile Video | MP3 Audio | OGG Audio | Torrent | YouTube

RSS Feeds:

HD Feed | Mobile Feed | MP3 Feed | OGG Feed | HD Torrent | Mobile Torrent | iTunes

Become an Unfilter Supporter:

-- Show Notes --


Another Bird Flu Outbreak

Most of the human H7N9 cases have occurred in Shanghai or the surrounding region. But there have been two cases in Beijing, which is nearly 800 miles away from Shanghai.

Most people infected have been hospitalized with severe respiratory problems and 17 have died. But Hartl says there have been a handful of mild cases. \”At least one person wasn\’t hospitalized.\” And, one boy in Beijing tested positive for the virus but showed no symptoms at all.

Thanks for Supporting Unfilter:

This Week’s New Supporters:

  • Hans-Peter G
  • Jacob B
  • Detlef W
  • Stephen B
  • Douglas D – Using a PayPal specific email?
  • Thanks to our 65 Unfilter supporters!

  • Supporter perk: Downloadable Pre and Post show. Extra clips, music, hijinks, and off the cuff comments. The ultimate Unfiltered experience.


Boston Bombing

A camera shot first moments after deadly explosions in Boston, Massachusetts. At least three people, including an eight-year-old, have been killed and more than a hundred injured after two explosions hit the finish line of the Boston Marathon.

There is conflicting information as to whether someone has been arrested in connection with the Boston Marathon bombings.

A federal law enforcement source told CNN\’s Fran Townsend that someone was arrested. But two senior administration officials and another federal official then told Townsend that there had been a misunderstanding among officials and that no one has been arrested.

Two Justice Department officials also told CNN\’s Joe Johns that there has been no arrest, and that authorities were looking into where the earlier confusion came from.

Amid a frenzy of reporting on Wednesday that a suspect had been arrested in the Boston Marathon bombing case, NBC News stood out as the only network reporting that no arrest had been made. In the face of increasing evidence that they were incorrect, NBC News stuck to their guns and insisted that there had been no arrest. Within minutes, it became clear that NBC News was the only network to get the story right — no arrest had been made in the Boston bombing case.

\”Editing should maintain the integrity of the photographic images\’ content and context,\” according to the ethics code for the National Press Photographers Association, a professional society. \”Do not manipulate images … in any way that can mislead viewers or misrepresent subjects.\”


Poison Letters

Federal agents on Wednesday arrested a suspect in the mailing of letters to President Barack Obama and a U.S. senator that initially tested positive for the poison ricin.

The suspect was identified as Paul Kevin Curtis of Tupelo, Miss., federal officials told NBC News. They said he may appear in court as early as Wednesday night.

FBI spokesman Paul Bresson said preliminary tests on the letter to Obama showed evidence of ricin, a powerful toxin that is generally considered to be ineffective as a weapon for mass terrorism.

A letter sent to a Mississippi senator tested positive for the poison ricin, federal authorities revealed Tuesday, adding to security concerns in the Capitol after the Boston Marathon bombing.

Ricin comes from the castor bean plant, and is the most poisonous, naturally occurring substance, according to Cornell University Department of Animal Sciences. The part of the plant that is poisonous to people, animals, and insects, is the bean


US tortured detainees\’ after 9/11 attack

A two-year study by the Constitution Project determined that there was \”no
justification\” for the so-called \”enhanced interrogation techniques\”
deployed by the George W Bush administration, which it said violated both
international and American law.

\”It is indisputable that the United States engaged in the practice of
torture,\” said the 577-page report by Constitution Project, a high-powered
Washington watchdog.

The US military detention centre at Guantanamo Bay is the symbol of everything the country has done wrong since the September 11 attacks, according to a bipartisan group of former officials and academics.

The group, which reviewed US detention and rendition practices, has concluded that US interrogators committed torture while questioning detainees, and there\’s no proof the torture gave authorities any information to prevent future attacks.

Seasoned interrogators have confirmed the report finding that harsh interrogation techniques were ineffective and there was no rationale for their use, whether practical or moral.


CISPA is Coming…

Yesterday, we reached two important milestones in the fight to stop CISPA! Just after surpassing 50,000 petition signatures, a formal statement from the White House announced President Obama\’s intention to veto CISPA if it passes Congress in its current form. But with several amendments to the bill pending that could make him rethink his veto threat (even if they do little to protect our privacy), we need to keep the pressure on.

One of the key things we\’ve seen in the pushback on CISPA is that its backers insist that people arguing against it don\’t really understand how the bill works, and that it does protect privacy. CISPA sponsor Rep. Mike Rogers himself took to Twitter this morning to tell the EFF that it\’s misreading his bill. But, of course, as we\’ve seen, it seems that Rogers himself is the one being misleading when it comes to privacy. If he truly believed in privacy protections, he would have supported a variety of straightforward amendments that made it clear how privacy could be protected. But he didn\’t. Instead, he clearly left it open for abuse.


If you’re a Supporter check your inbox!

Call us: 1.425.312.1756

Follow the Us:

The post Boston Bomb Job | Unfilter 46 first appeared on Jupiter Broadcasting.

]]>
Cyber Warfare | TechSNAP 13 https://original.jupiterbroadcasting.net/10096/cyber-warfare-techsnap-13/ Thu, 07 Jul 2011 22:21:42 +0000 https://original.jupiterbroadcasting.net/?p=10096 We cover what critical targets hackers and foreign governments might target to wage Cyber Warfare. Plus what major attacks have already taken place.

The post Cyber Warfare | TechSNAP 13 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Since the start of this show, one constant theme keeps coming to light, a new age of Cyber warfare has begun.

In this week’s episode we cover what critical targets hackers and foreign governments might target to wage Cyber Warfare

Plus what major attacks have already taken place? Some of which we are just now learning the ramifications of…

All that and more, on this week’s TechSNAP!

Direct Download Links:

HD Video | Large Video | Mobile Video | MP3 Audio | OGG Audio | YouTube

Subscribe via RSS and iTunes:

[ad#shownotes]

Show Notes:

Thanks to the TechSNAP Redditors!

 

No Q&A this week, but we’re doing a double dose next week, send in your feedback and questions!

Attacks on Government:


Topic: Anonymous hacks 100 Turkish Government Sites

  • As part of Operation Anti-Sec, Anonymous has compromised the Turkish governments network of sites, and locked the administrators out.
  • A number of the sites appear to be for Hospitals and other medical facilities
  • The group released a 20MB archive on ThePirateBay, a complete dump of the content of each of the compromised sites.
  • Many of the sites were defaced
  • In a Cyber Warfare type situation, these types of actions could disable critical government functions, everything from weather forecasts to tax filing.

Submitted by: Acidpunk


Topic: Florida Elections Database Hacked

  • The database contained the names, usernames and plaintext passwords of election workers and polling stations
  • Username was first initial, last name, and password was first initial, last initial and 4 numbers. These passwords are too predictable and horribly insecure.

Submitted by: Deathwalk


Topic: Attacks on RoK Gov might have been Drills by DPRK

  • Attacks that crippled South Korean (Republic of Korea) government websites in July 2009 and again in March 2011 might have been cyber warfare drills conducted by North Korea (Democratic People’s Republic of Korea)
  • Attacks were likely reconnaissance to start building a detailed plan of attack in the event of war.
  • Much of the attack came from within South Korea, it is speculated that the virus was left on a number of South Korean file sharing sites, and then the resulting botnet of infected computers was used to take down the government websites.

Attacks on Media:


Topic: Washington Post hacked, 1.27m email addresses leaked

  • The Washington Post’s Jobs site was compromised on June 27th and 28th
  • 1.27 Million Usernames and email addresses were leaked
  • The Washington Post claims that no passwords or other personal information were stolen (were the passwords just hashed, and therefore ‘not disclosed’, or did the attackers not gain access to the passwords?)

Topic: Fox News Twitter hacked, False Obama Death Notice

  • The @foxnewspolitics twitter account was hijacked and false news of US President Obama’s assassination was posted.
  • As with all incidents of this nature, it is being investigated by the Secret Service
  • BBC Coverage

Submitted by: beyere5398 and LeifAndersen


The Future:


Topic: The Pentagon Establishes Cyber Warfare Retaliation Policy

  • The Pentagon has concluded that computer sabotage coming from another country can constitute an act of war
  • Foreign directed hacker could pose as significant a threat to U.S. nuclear reactors, subways or pipelines as a hostile country’s military
  • If a cyber attack causes significant disruption (for example, to the power grid), or death, then the attackers will be met with conventional armed force.
  • New York Times coverage

Topic: More is happening than we actually know

  • By reverse engineering a crashed EP-3E Aries II reconnaissance plane, the Chinese were able to begin intercepting encrypted US Navy communications
  • A few weeks after President Obama’s election, the Chinese flooded communications links they knew were monitored by the NSA with unencrypted copies of intercepted communications, proving they had compromised American communications links.

Topic: Cyber Warfare will be constant and often subtle

  • The attacks on RSA earlier this year were not conclusively linked to Cyber Warfare, they could have been the work of a lone hacker, a small group, or an organized government
  • The RSA hack later led to the compromise of secure systems at Lockheed Martin and other US arms manufacturers.
  • Earlier this year we also saw the compromise of a large number of email accounts belonging to government and military officials. This type of reconnaissance can be used to gather information that would allow attackers to break in to more secured systems over time.
  • Many attacks go unnoticed, as the perpetrators keep the systems just to be used to launch future attacks from. As we saw in the RSA hack, the attackers used an offsite webserver they had compromised earlier to send the data to, to avoid connecting directly to RSA and possibly leaving a trail. They then destroyed the webserver, breaking the link back to them
  • In the past was have discussed the similar tactic of Island hopping, compromising an outward facing system such as a web, mail or monitoring server, or the desktop of a secretary or other lower level employee, and then slowly gathering more and more information in order to compromise the true targets of the attack.

Submitted by: Raventiger


Roundup:
South Korea army, University to start Cyber Defense majorSubmitted by: refuse2speak
Anonymous hacks apple server, leaks usernames and hashed passwords
The Fog of Cyber Warfare – A battle without borders?Submitted by: Raventiger
Chicago Mercantile Exchange Secrets and Source Code Leaked To China

Copies of vsftpd 2.3.4 downloaded from official mirrors contain backdoorSubmitted by: stmiller
Dropbox TOS gives them broad copyright license over your filesSubmitted by: rakudave
Targeted phishing helped hackers earn 150 million in JuneSubmitted by: stmiller

Bitcoin BLASTER:
Lawyer Attempts To Trademark Bitcoin
First bitcoin app for Android, but is it safe?
BTCGuild suffers major DDoS Attack

Download & Comment:

The post Cyber Warfare | TechSNAP 13 first appeared on Jupiter Broadcasting.

]]>