metadata – Jupiter Broadcasting https://www.jupiterbroadcasting.com Open Source Entertainment, on Demand. Tue, 08 May 2018 02:53:55 +0000 en-US hourly 1 https://wordpress.org/?v=5.5.3 https://original.jupiterbroadcasting.net/wp-content/uploads/2019/04/cropped-favicon-32x32.png metadata – Jupiter Broadcasting https://www.jupiterbroadcasting.com 32 32 Tech Talk Today 276 https://original.jupiterbroadcasting.net/124676/tech-talk-today-276/ Mon, 07 May 2018 18:53:55 +0000 https://original.jupiterbroadcasting.net/?p=124676 Show Notes: techtalk.today/276

The post Tech Talk Today 276 first appeared on Jupiter Broadcasting.

]]>

Show Notes:

techtalk.today/276

The post Tech Talk Today 276 first appeared on Jupiter Broadcasting.

]]>
Game of File Systems | TechSNAP 272 https://original.jupiterbroadcasting.net/100661/game-of-file-systems-techsnap-272/ Thu, 23 Jun 2016 18:56:21 +0000 https://original.jupiterbroadcasting.net/?p=100661 What’s got Windows admins in a Panic? Total chaos my friends, we’ll tell you why. Extensive coverage of Apple’s new filesystem, Ransomware that might just impress you… Your great questions, our answers, a packed round up & much, much more! Thanks to: Get Paid to Write for DigitalOcean Direct Download: HD Video | Mobile Video […]

The post Game of File Systems | TechSNAP 272 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

What’s got Windows admins in a Panic? Total chaos my friends, we’ll tell you why. Extensive coverage of Apple’s new filesystem, Ransomware that might just impress you…

Your great questions, our answers, a packed round up & much, much more!

Thanks to:


DigitalOcean


Ting


iXsystems

Direct Download:

HD Video | Mobile Video | MP3 Audio | OGG Audio | YouTube | HD Torrent | Mobile Torrent

RSS Feeds:

HD Video Feed | Mobile Video Feed | MP3 Audio Feed | Ogg Audio Feed | iTunes Feed | Torrent Feed

Become a supporter on Patreon:

Patreon

Show Notes:

Windows Admins in panic after Microsoft fix breaks Group Policies

  • Group Policies are a powerful set of Windows registry settings that are downloaded and applied when a computer and/or user login to a domain controller.
  • Group Policy Objects (GPOs) allow Administrators to control settings and access to Windows computers centrally. They allow things like disabling the run menu, hiding specific drives, controlling access to applications, and even application whitelisting
  • On June 14th, Microsoft released MS16-072: Security update for Group Policy rated “Important for all supported releases of Microsoft Windows”
  • “An elevation of privilege vulnerability exists when Microsoft Windows processes group policy updates. An attacker who successfully exploited this vulnerability could potentially escalate permissions or perform additional privileged actions on the target machine.
    To exploit this vulnerability, an attacker would need to launch a man-in-the-middle (MiTM) attack against the traffic passing between a domain controller and the target machine. An attacker could then create a group policy to grant administrator rights to a standard user. The security update addresses the vulnerability by enforcing Kerberos authentication for certain calls over LDAP.”
  • later Microsoft released a knowledge base article about this issue: KB 3163622
  • “MS16-072 changes the security context with which user group policies are retrieved. This by-design behavior change protects customers’ computers from a security vulnerability. Before MS16-072 is installed, user group policies were retrieved by using the user’s security context. After MS16-072 is installed, user group policies are retrieved by using the computer’s security context.”
  • “Symptoms: All user Group Policy, including those that have been security filtered on user accounts or security groups, or both, may fail to apply on domain joined computers.”
  • “Cause: This issue may occur if the Group Policy Object is missing the Read permissions for the Authenticated Users group or if you are using security filtering and are missing Read permissions for the domain computers group.”
  • Resolution:
  • To resolve this issue, use the Group Policy Management Console (GPMC.MSC) and follow one of the following steps:
  • Add the Authenticated Users group with Read Permissions on the Group Policy Object (GPO).
  • If you are using security filtering, add the Domain Computers group with read permission.
  • This issue struck a large number of Windows administrators, some of them extremely hard
  • GPOs are the main tool administrators have to enforce policies throughout the network
  • One admin reported: “desktop images were configured such that the A, B, C and D drives that were hidden from users, but they are now showing up”
  • This was likely done to keep users from accidentally saving files to the local computer, rather than the network where they can be accessed from other computers, and centrally backed up.
  • “Other users report having printers and drive maps become inaccessible and security group settings no longer applying”

More coverage of APFS, in detail this time

  • Building on the post from last week, Adam Leventhal breaks down his early analysis of APFS
  • “APFS, the Apple File System, was itself started in 2014 with Dominic as its lead engineer. It’s a stand-alone, from-scratch implementation. I asked him about looking for inspiration in other modern file systems such as BSD’s HAMMER, Linux’s btrfs, or OpenZFS, all of which have features similar to what APFS intends to deliver. Dominic explained that while, as a self-described file system guy (he built the file system in BeOS), he was aware of them, but didn’t delve too deeply for fear, he said, of tainting himself.”
  • “APFS first and foremost pays down the unsustainable technical debt that Apple has been carrying in HFS+. HFS was introduced in 1985 when the Mac 512K (of memory!) was Apple’s flagship. HFS+, a significant iteration, shipped in 1998 on the G3 PowerMacs with 4GB hard drives. Since then storage capacities have increased by factors of 1,000,000 and 1,000 respectively.”
  • Compression: “in typical Apple fashion—neither confirmed nor denied while strongly implying that it’s definitely a feature we can expect in APFS”
  • Encryption: “Encryption is clearly a core feature of APFS. This comes from diverse requirements from the various devices, for example multiple keys within file systems on the iPhone or per-user keys on laptops”
  • Filesystems (and possibly individual files) will support 3 different flavours:
  • Unencrypted
  • Single-key for metadata and user data
  • Multi-key with different choices for metadata, files, and even sections of a file (“extents”)
  • “Multi-key encryption is particularly relevant for portables where all data might be encrypted, but unlocking your phone provides access to an additional key and therefore additional data. Unfortunately this doesn’t seem to be working in the first beta of macOS Sierra (specifying fileEncryption when creating a new volume with diskutil results in a file system that reports “Is Encrypted” as “No”).”
  • “APFS (apparently) supports constant time cryptographic file system erase, called “effaceable” in the diskutil output. This presumably builds a secret key that cannot be extracted from APFS and encrypts the file system with it. A secure erase then need only delete the key rather than needing to scramble and re-scramble the full disk to ensure total eradication. Various iOS docs refer to this capability requiring some specialized hardware; it will be interesting to see what the option means on macOS. Either way, let’s not mention this to the FBI or NSA, agreed?”
  • Snapshots: APFS will support snapshots, but likely not the same type of serialization that “zfs send” provides. “ZFS sends all changed data while Time Machine can have exclusion lists and the like.”
  • “APFS right now is incompatible with Time Machine due to the lack of directory hard links, a fairly disgusting implementation that likely contributes to Time Machine’s questionable reliability. Hopefully APFS will create some efficient serialization for Time Machine backup.”
  • “While Eric Tamura, APFS dev manager, demonstrated snapshots at WWDC, the required utilities aren’t included in the macOS Sierra beta.”
  • Management: “APFS brings another new feature known as space sharing. A single APFS “container” that spans a device can have multiple “volumes” (file systems) within it. Apple contrasts this with the static allocation of disk space to support multiple HFS+ instances, which seems both specious and an uncommon use case. Both ZFS and btrfs have a similar concept of a shared pool of storage with nested file systems for administration and management.”
  • Clones: “Apple’s sort-of-unique contribution to space efficiency is constant time cloning of files and directories.” “With APFS, if you copy a file within the same file system, no data is actually duplicated. Instead a constant amount of metadata is updated and the on-disk data is shared. Changes to either copy cause new space to be allocated (so-called “copy on write” or COW).”
  • “As a quick aside, “files” in macOS are often really directories; it’s a convenient lie they tell to allow logically related collections of files to be treated as an indivisible unit. Right click an application and select “Show Package Contents” to see what I mean.”
  • “Side note: Finder copy creates space-efficient clones, but cp from the command line does not.”
  • Performance: “APFS claims to be optimized for flash” “SSDs mimic the block interface of conventional hard drives, but the underlying technology is completely different. In particular while magnetic media can read or write sectors arbitrarily, flash erases large chunks (blocks) and reads and writes smaller chunks (pages). The management is done by what’s called the flash translation layer (FTL), software that makes blocks and pages appear more like a hard drive. An FTL is very similar to a file system, creating a virtual mapping (a translation) between block addresses and locations within the media. Apple controls the full stack including the SSD, FTL, and file system; they could have built something differentiated, optimizing this components to work together. What APFS does, however, is simply write in patterns known to be more easily handled by NAND. It’s a file system with flash-aware characteristics rather than one written explicitly for the native flash interfaces, more or less what you’d expect in 2016.”
  • “APFS includes TRIM support. TRIM is a command in the ATA protocol that allows a file system to indicate to an SSD (specifically, its FTL) that some space has been freed.”
  • “APFS also focuses on latency; Apple’s number one goal is to avoid the beachball of doom. APFS addresses this with I/O QoS (quality of service) to prioritize accesses that are immediately visible to the user over background activity that doesn’t have the same time-constraints. This is inarguably a benefit to users and a sophisticated file system capability.”
  • Redundancy: “APFS makes no claims with regard to data redundancy. As Apple’s Eric Tamura noted at WWDC, most Apple devices have a single storage device (i.e. one logical SSD) making RAID, for example, moot. Instead redundancy comes from lower layers such as Apple RAID (apparently a thing), hardware RAID controllers, SANs, or even the “single” storage devices themselves.”
  • “Also, APFS removes the most common way of a user achieving local data redundancy: copying files. A copied file in APFS actually creates a lightweight clone with no duplicated data. Corruption of the underlying device would mean that both “copies” were damaged whereas with full copies localized data corruption would affect just one.”
  • Crash Consistency: In order to maintain consistency of the file system after a crash, you need to be able to revert any incompleted operations. The problem is that a typical file system overwrites data in place, making this impossible
  • “APFS claims to implement a “novel copy-on-write metadata scheme”; APFS lead developer Dominic Giampaolo emphasized the novelty of this approach without delving into the details. In conversation later, he made it clear that APFS does not employ the ZFS mechanism of copying all metadata above changed user data which allows for a single, atomic update of the file system structure.”
  • So APFS does COW for metadata, but not for data. Meaning the filesystem will be consistent, but your data might not be
  • “It’s surprising to see that APFS includes fsck_apfs—even after asking Dominic I’m not sure why it would be necessary.”
  • Checksums: “Notably absent from the APFS intro talk was any mention of checksums. A checksum is a digest or summary of data used to detect (and correct) data errors. The story here is surprisingly nuanced. APFS checksums its own metadata but not user data. The justification for checksumming metadata is strong: there’s relatively not much of it (so the checksums don’t consume much storage) and losing metadata can cast a potentially huge shadow of data loss. If, for example, metadata for a top level directory is corrupted then potentially all data on the disk could be rendered inaccessible. ZFS duplicates metadata (and triple duplicates top-level metadata) for exactly this reason.”
  • So ZFS can recover from corrupt metadata even in a single device configuration, because metadata is always stores as 2 complete copies, or 3 for important pool-wide metadata
  • “Explicitly not checksumming user data is a little more interesting. The APFS engineers I talked to cited strong ECC protection within Apple storage devices. Both flash SSDs and magnetic media HDDs use redundant data to detect and correct errors. The engineers contend that Apple devices basically don’t return bogus data.”
  • So Apple relies on the hardware to do the right thing, this is likely to backfire eventually
  • “The Apple folks were quite interested in my experience with regard to bit rot (aging data silently losing integrity) and other device errors. I’ve seen many instances where devices raised no error but ZFS (correctly) detected corrupted data. Apple has some of the most stringent device qualification tests for its vendors; I trust that they really do procure the best components. Apple engineers I spoke with claimed that bit rot was not a problem for users of their devices, but if your software can’t detect errors then you have no idea how your devices really perform in the field. ZFS has found data corruption on multi-million dollar storage arrays; I would be surprised if it didn’t find errors coming from TLC (i.e. the cheapest) NAND chips in some of Apple’s devices. Recall the (fairly) recent brouhaha regarding storage problems in the high capacity iPhone 6. At least some of Apple’s devices have been imperfect.”
  • Scrub: “As data ages you might occasionally want to check for bit rot. Likely fsck_apfs can accomplish this; as noted though there’s no data redundancy and no checksums for user data, so scrub would only help to find problems and likely wouldn’t help to correct them. And if it makes it any easier for Apple to reverse course, let’s say it’s for the el cheap-o drive I bought from Fry’s not for the gold-plated device I got from Apple.”
  • Conclusions: “Any file system started in 2014 should of course consider huge devices, and SSDs–check and check. Copy-on-write (COW) snapshots are the norm; making the Duplicate command in the Finder faster wasn’t much of a detour. The use case is unclear, it’s a classic garbage can theory solution, a solution in search of a problem, but it doesn’t hurt and it makes for a fun demo. The beach ball of doom earned its nickname; APFS was naturally built to avoid it.”
  • “There are some seemingly absent or ancillary design goals: performance, openness, and data integrity. Squeezing the most IOPS or throughput out of a device probably isn’t critical on watchOS, and it’s relevant only to a small percentage of macOS users. It will be interesting to see how APFS performs once it ships (measuring any earlier would only misinform the public and insult the APFS team).”
  • “APFS development docs have a bullet on open source: “An open source implementation is not available at this time.” I don’t expect APFS to be open source at this time or any other, but prove me wrong, Apple. If APFS becomes world-class I’d love to see it in Linux and FreeBSD–maybe Microsoft would even jettison their ReFS experiment. My experience with OpenZFS has shown that open source accelerates that path to excellence. It’s a shame that APFS lacks checksums for user data and doesn’t provide for data redundancy. Data integrity should be job one for a file system, and I believe that that’s true for a watch or phone as much as it is for a server.”
  • “At stability, APFS will be an improvement, for Apple users of all kinds, on every device. There are some clear wins and some missed opportunities. Now that APFS has been shared with the world the development team is probably listening. While Apple is clearly years past the decision to build from scratch rather than adopting existing modern technology, there’s time to raise the priority of data integrity and openness. I’m impressed by Apple’s goal of using APFS by default within 18 months. Regardless of how it goes, it will be an exciting transition.”
  • I am not sure anyone has ever wanted an “Exciting” filesystem.

New Ransomware written entirely in javascript, RAA

  • A new crypto ransomware has made an appearance on the Internet, and it is slightly unusual.
  • The malware arrives as an attachment pretending to be a .doc file, but is actually .js
  • For whatever reason, the default file association for .js on Windows is the Windows Scripting Host, so when opened, the javascript actually executes
  • The javascript standard library does not include any encryption mechanisms, however the designers of the malware bundled CryptoJS, a framework that provides standard crypto primitives like AES256 in pure javascript
  • The ransomware demands around $250 worth of bitcoin for the key to decrypt your files
  • The ransomware also comes bundled with an embedded password stealing malware
  • So even if you pay, the attackers have already stolen all of your saved passwords
  • Once the ransomware is run, it generates a random .doc file and opens it. The object is to make the user think the file was corrupt, and avoid the user being suspicious
  • “While the victim thinks the attachment is corrupted, in the background the RAA Ransomware will start to scan all the available drives and determine if the user has read and write access to them. If the drives can be written to, it will scan the drive for targeted file types and use code from the CryptoJS library to encrypt them using AES encryption”
  • It also seems to purposely disables the Windows Volume Shadow Copy service. May also destroy actual shadow copies, code is too obfuscated to tell right now.
  • “Finally, the ransomware will create a ransom note on the desktop called !!!README!!![id].rtf, with [ID] being the unique ID assigned to the victim. The text of this ransom note is in Russian”
  • “When a JavaScript file, such as RAA, executes outside of the browser it requires an interpreter that can read the file and execute the JavaScript commands within it. As most people do not need to execute Javascript outside of a web browser, it is suggested that everyone disables the Windows Script Host so that these types of files are not allowed to execute. If you wish to disable the windows script host, which is enabled by default in Windows, you can add the following DWORD Registry entry to your computer and set the value to 0.”
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows Script Host\Settings\Enabled
  • You probably don’t need to execute javascript on your machine anyway. Push this out as a group policy… and hope it works 😉

Feedback:


Round Up:


The post Game of File Systems | TechSNAP 272 first appeared on Jupiter Broadcasting.

]]>
Chasing Down Terror | Unfilter 169 https://original.jupiterbroadcasting.net/91306/chasing-down-terror-unfilter-169/ Wed, 09 Dec 2015 22:14:13 +0000 https://original.jupiterbroadcasting.net/?p=91306 In a very special edition of your Unfilter show, we cover the San Bernardino Shooting in that special way that only the Unfilter show can & the big developments in the war against encryption. Then Iraq & Russia call out Turkey for financing ISIS. Plus we end on a high note you green thumbs will […]

The post Chasing Down Terror | Unfilter 169 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

In a very special edition of your Unfilter show, we cover the San Bernardino Shooting in that special way that only the Unfilter show can & the big developments in the war against encryption. Then Iraq & Russia call out Turkey for financing ISIS.

Plus we end on a high note you green thumbs will just love, the weeks big news & more!

Direct Download:

Video | MP3 Audio | OGG Audio | Torrent | YouTube

RSS Feeds:

Video Feed | MP3 Feed | OGG Feed | HD Torrent | Mobile Torrent | iTunes

Become an Unfilter supporter on Patreon:

Foo

Show Notes:

— Episode Links —

The post Chasing Down Terror | Unfilter 169 first appeared on Jupiter Broadcasting.

]]>
Unpatriotic Act | Unfilter 146 https://original.jupiterbroadcasting.net/83212/unpatriotic-act-unfilter-146/ Wed, 03 Jun 2015 22:11:00 +0000 https://original.jupiterbroadcasting.net/?p=83212 NSA Metadata collection provisions of the Patriot Act were suspended this weekend, followed by a nasty political battle. We examine where things stand now, the new powers granted to the NSA, who came down on which side & more! Direct Download: Video | MP3 Audio | OGG Audio | Torrent | YouTube RSS Feeds: Video […]

The post Unpatriotic Act | Unfilter 146 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

NSA Metadata collection provisions of the Patriot Act were suspended this weekend, followed by a nasty political battle. We examine where things stand now, the new powers granted to the NSA, who came down on which side & more!

Direct Download:

Video | MP3 Audio | OGG Audio | Torrent | YouTube

RSS Feeds:

Video Feed | MP3 Feed | OGG Feed | HD Torrent | Mobile Torrent | iTunes

Become an Unfilter supporter on Patreon:

Foo

Show Notes:

The post Unpatriotic Act | Unfilter 146 first appeared on Jupiter Broadcasting.

]]>
Snowdens Story | Unfilter 99 https://original.jupiterbroadcasting.net/58432/snowdens-story-unfilter-99/ Wed, 28 May 2014 21:46:40 +0000 https://original.jupiterbroadcasting.net/?p=58432 Edward Snowden has once again captured the attention of the media. False claims, and ridiculous rhetoric are in full force, and we’ll cut through the crap. Plus: What we suspect is going on with TrueCrypt, Greenwald claims he’s ready to disclose names of the NSA’s targets, the big changes in Afghanistan, and why the director […]

The post Snowdens Story | Unfilter 99 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Edward Snowden has once again captured the attention of the media. False claims, and ridiculous rhetoric are in full force, and we’ll cut through the crap.

Plus: What we suspect is going on with TrueCrypt, Greenwald claims he’s ready to disclose names of the NSA’s targets, the big changes in Afghanistan, and why the director of FBI wants to hire pot smokers.

Direct Download:

Video | MP3 Audio | OGG Audio | Torrent | YouTube

RSS Feeds:

Video Feed | MP3 Feed | OGG Feed | HD Torrent | Mobile Torrent | iTunes

Become an Unfilter supporter on Patreon:

\"Foo\"

— Show Notes —

NSA is Crazy

TrueCrypt Hacked?

\"TrueCrypt

  • The binary on the website is capable only to decode encrypted data, not encode, and may contain trojan (although I didn\’t find any, but don\’t believe me). The binary is signed with the valid (usual) key. All old versions are wiped, the repository is wiped too.

\"TrueCrypt


Assumption #1 The website is presumed hacked, the keys are presumed compromised. Please do not download or run it. And please don\’t switch to bitlocker.

Latest working version is 7.1a. Version 7.2 is a hoax

  • On the SourceForge, the keys were changed before any TrueCrypt files uploaded, but now they are deleted and the old keys got reverted back.

Why I think so: strange key change, DNS record changed, why bitlocker?


Assumption #2 Something bad happened to TrueCrypt developers (i.e. take down or death) or to TrueCrypt itself (i.e. found the worst vulnerability ever) which made them do such a thing. So this version is legit

Why I think so: all files are with valid signatures, all the releases are available (Windows; Linux x86, x86_64, console versions, Mac OS, sources), the binaries seems like was built on the usual developer PC (there are some paths like c:\\truecrypt-7.2\\driver\\obj_driver_release\\i386\\truecrypt.pdb, which were the same for 7.1a).


  • SourceForge sent emails on 22 May, they said they changed password algorithms and everybody should change their passwords.

  • TrueCrypt developers are unknown and currently there is no way to know who is who and who should we listen to.

  • From wikileaks twitter https://twitter.com/wikileaks/status/471769936038461440:

(1/4) Truecrypt has released an update saying that it is insecure and development has been terminated https://truecrypt.sf.net

(2/4) the style of the announcement is very odd; however we believe it is likely to be legitimate and not a simple defacement

(3/4) the new executable contains the same message and is cryptographically signed. We believe that there is either a power conflict..

(4/4) in the dev team or psychological issues, coersion of some form, or a hacker with access to site and keys.

@SteveBellovin @mattblaze @0xdaeda1a I think this is legit.

\"Eds

After wrapping up my presentation, Snowden connected his laptop to the projector and began talking about using the TrueCrypt software for encrypting hard drives and USB sticks on Macs, Linux and Windows. He pointed out that while the only known name associated with TrueCrypt is someone in the Czech Republic, TrueCrypt is one of the best open-source solutions available.

Snowden continued with TrueCrypt\’s _\”hidden volumes\”, a feature that divides your encrypted storage into separate \”volumes\” with separate passwords. If you are coerced by authorities into revealing the password for your \”encrypted storage\” you need only reveal the password for the volume with the least incriminating content — one containing pictures of cats, maybe?_

The Lies Mike Rogers Told Congress About The USA Freedom Act

\"Rogers

One of the most obvious ways that you knew the USA Freedom Act that passed out of the House yesterday was clearly not real NSA reform was the simple fact that the NSA #1 defender in chief, Rep. Mike Rogers, not only voted for it, but spoke strongly in favor of it on the House floor.

\"Brian

\”I was trained as a spy in sort of the traditional sense of the word — in that I lived and worked undercover, overseas, pretending to work in a job that I\’m not — and even being assigned a name that was not mine,\” Snowden said.

Kerry: Snowden a \”Coward\” and \”Traitor\” ](https://www.nbcnews.com/politics/first-read/kerry-snowden-coward-traitor-n116366)

“Edward Snowden is a coward, he is a traitor and he has betrayed his country,” Kerry said in an interview on MSNBC’s “The Daily Rundown” with Chuck Todd. “And if he wants to come home tomorrow to face the music, he can do so.”

\”If this man is a patriot, he should stay in the United States and make his case,\” he said. \”Patriots don\’t go to Russia, they don\’t seek asylum in Cuba, they don\’t seek asylum in Venezuela, they fight their cause here.\”

cryptome.org counting total Snowden doc releases: 42 Years for Snowden Docs Release, Free All Now

— Thanks for Supporting Unfilter —

Become an Unfilter supporter on Patreon

\"Foo\"

  • Thanks to our 188 patrons, we gained 62 since last week!

  • Supporter perk: Downloadable Pre and Post show. Extra clips, music, hijinks, and off the cuff comments. The ultimate Unfiltered experience. ‘

  • Supporter perk: Exclusive BitTorrent Sync share of our production and non-production clips, notes, and more since the NSA scandal broke in episode 54. The ultimate Unfiltered experience, just got more ultimate.

  • Supporter Perk: Past 5 supporters shows, in a dedicated bittorrent sync folder.


Afghanistan Late Pullout

White House mistakenly identifies CIA chief in Afghanistan

The CIA\’s top officer in Kabul was exposed Saturday by the White House when his name was inadvertently included on a list provided to news organizations of senior U.S. officials participating in President Obama\’s surprise visit with U.S. troops.

The Post is withholding the name of the CIA officer at the request of Obama administration officials who warned that the officer and his family could be at risk if the name were published. The CIA and the White House declined to comment.

White House: U.S. will have 9,800 troops in Afghanistan after 2014

The U.S. will leave 9,800 troops in the country in 2015 with two narrow missions, according to the White House: continue supporting Afghan forces, who took the lead ins securing the country last year, and continuing to support counter terrorism operations against the remnants of al Qaeda.


Weed Wackers:

Comey: FBI ‘Grappling’ With Hiring Policy Concerning Marijuana

\"FBI

Congress has authorized the FBI to add 2,000 personnel to its rolls this year, and many of those new recruits will be assigned to tackle cyber crimes, a growing priority for the agency. And that\’s a problem, Mr. Comey told the White Collar Crime Institute, an annual conference held at the New York City Bar Association in Manhattan. A lot of the nation\’s top computer programmers and hacking gurus are also fond of marijuana.

\”I have to hire a great work force to compete with those cyber criminals and some of those kids want to smoke weed on the way to the interview,\” Mr. Comey said.

Mr. Comey said that the agency was \”grappling with the question right now\” of how to amend the agency\’s marijuana policies, which excludes from consideration anyone who has smoked marijuana in the previous three years, according to the FBI\’s Web site. One conference goer asked Mr. Comey about a friend who had shied away from applying because of the policy. \”He should go ahead and apply,\” despite the marijuana use, Mr. Comey said.

The FBI Says It Can\’t Find Hackers to Hire Because They All Smoke Pot

After being chastised for his comments about marijuana by Senator Jeff Sessions (R-Ala.), FBI director Comey told those in attendance at a senate hearing on the bureau\’s oversight that he was just kidding.


If you’re a Supporter check your inbox!

Call us: 1.425.312.1756

Follow the Us:

The post Snowdens Story | Unfilter 99 first appeared on Jupiter Broadcasting.

]]>
Death by Metadata | Unfilter 85 https://original.jupiterbroadcasting.net/51527/death-by-metadata-unfilter-85/ Wed, 12 Feb 2014 21:52:00 +0000 https://original.jupiterbroadcasting.net/?p=51527 Drone assassinations and the NSA surveillance programs have intersected this week. We’ve got the details on how the NSA Metadata is used to kill people.

The post Death by Metadata | Unfilter 85 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Two topics we’ve been closing following on the Unfilter show, Drone assassinations, and the NSA surveillance programs have intersected this week. We’ll give you the details on how Obama uses the NSA Metadata collection to kill people with drones.

Now as we record this episode thanks to new leaks we’ve learned the Administration is preparing their case to kill another American citizen based on the cellphone, in his pocket.

Plus the GCHQ gets caught playing with hackers, and we’ll take a look at Glenn Greenwald’s new publication, and much much more.

On this week’s episode of, Unfilter.

Direct Download:

Video | MP3 Audio | OGG Audio | Torrent | YouTube

RSS Feeds:

Video Feed | MP3 Feed | OGG Feed | HD Torrent | Mobile Torrent | iTunes

Become an Unfilter Supporter:

— Show Notes —


NSA is Crazy

More than 5,300 web-based companies and other organizations, including Reddit, Imgur, Tumblr, Mozilla the Electronic Frontier Foundation and the American Civil Liberties Union, have joined forces to protest National Security Agency surveillance on Feb. 11.

The Day We Fight Back, though, is an attempt to dismantle a system that’s been in place for years. Inside the US, participants are urged to put a banner on their website and call or email their legislators in support of Representative Jim Sensenbrenner (R-WI) and Senator Patrick Leahy’s (D-VT) USA Freedom Act, which would reform the NSA’s metadata database. But they’re also urged to oppose Dianne Feinstein’s (D-CA) FISA Improvements Act, a bill that sounds just as pleasant but has been sharply criticized for enshrining the database program in law. And even these are just baby steps in the long run.

“This, we believe, will be a historic lawsuit,” the Kentucky Republican said. The suit, joined by conservative advocacy group FreedomWorks, was filed in U.S. District Court in the District of Columbia.

So far, damages and injury from NSA data-gathering have been hard to establish even on an individual basis. Several groups have brought lawsuits against the administration by saying a particular individual organization or person has suffered because of surveillance. But even for Verizon customers, who have a leaked court order to back them up, there’s no definitive way to tell whether the NSA actually collected metadata from them, and the claim is too hypothetical for many judges. If Paul wants to go forward with the suit, he’ll need to calculate and prove similar damages for _every single member _of his class.


Drones

According to a former drone operator for the military’s Joint Special Operations Command (JSOC) who also worked with the NSA, the agency often identifies targets based on controversial metadata analysis and cell-phone tracking technologies. Rather than confirming a target’s identity with operatives or informants on the ground, the CIA or the U.S. military then orders a strike based on the activity and location of the mobile phone a person is believed to be using.

The drone operator, who agreed to discuss the top-secret programs on the condition of anonymity, was a member of JSOC’s High Value Targeting task force, which is charged with identifying, capturing or killing terrorist suspects in Yemen, Somalia, Afghanistan and elsewhere.

The JSOC operator’s account is supported by another insider who was directly involved in the drone program. Brandon Bryant spent six years as a “stick monkey” – a drone sensor operator who controls the “eyes” of the U.S. military’s unmanned aerial vehicles. By the time he left the Air Force in 2011, Bryant’s squadron, which included a small crew of veteran drone operators, had been credited with killing 1,626 “enemies” in action.

Bryant says he has come forward because he is tormented by the loss of civilian life he believes that he and his squadron may have caused. Today he is committed to informing the public about lethal flaws in the U.S. drone program.

Leaks from two unnamed officials in the Obama administration to the Associated Press describe him as “an al-Qaida facilitator who has been directly responsible for deadly attacks against U.S. citizens overseas and who continues to plan attacks against them that would use improvised explosive devices.”

The person, who was not identified, has been the subject of debate among military commanders and intelligence officials for several weeks as they decide what to recommend. President Barack Obama would make a final decision.

CNN has also learned key members of Congress have been aware of the internal debate.

The officials spoke to CNN’s Barbara Starr on condition of anonymity because of the sensitivity of the situation.

Exhaustive independent studies by the British Bureau of Investigative Journalism, the New America Foundation and the Long War Journal have documented that civilian casualties are endemic – the latest count is at least 440 since the drone campaigns began, according to the BIJ.

Obama himself is hardly unaware of the dreadful downside of errant drone strikes. As Daniel Klaidman reported in his book, “Kill or Capture,” Obama authorized his very first drone strike on the third full day of his presidency, after having been assured by then-CIA director Michael Hayden that the targets were high-level al Qaeda and Taliban commanders. The Hellfire missile he sent into a compound in Pakistan instead killed a prominent pro-government tribal elder and four members of his family, including two children.

“The online news venture backed by eBay founder Pierre Omidyar debuted Monday, featuring fresh revelations about US intelligence from investigative reporter Glenn Greenwald. The news site dubbed ”The Intercept“ launched with two articles, including one co-authored by Greenwald stating that the US National Security Agency is relying on electronic surveillance, such as cell phone location, rather than human intelligence, to locate targets for lethal drone strikes. The report said the NSA ”geolocates“ the SIM card or handset of a suspected terrorist’s mobile phone for raids and drone strikes to capture or kill suspected terrorists…”.* How does this match up with what President Obama has said? The Young Turks host Cenk Uygur breaks it down.

– Thanks for Supporting Unfilter –

This Week’s New Supporters:

  • Donald M.

  • Phil*

  • Keith G

I have just signed up as a JB supporter. The $10(USD) a month was intended for the Unfilter show.

The reason I am contributing $10, is because of your unmentioned and non-existent Valentines Day offer. Both my girlfriend and I listen to Unfilter. I hope I am not breaking any rules by having two names on one payment account. If you like you may read the following on-air:

“I would like to express my love for Judith using the cyber tubes of the internet in the freedom dimension.”

  • Thanks to our 347 Unfilter supporters!

  • Supporter perk: Downloadable Pre and Post show. Extra clips, music, hijinks, and off the cuff comments. The ultimate Unfiltered experience. ‘

  • Supporter perk: Exclusive BitTorrent Sync share of our production and non-production clips, notes, and more since the NSA scandal broke in episode 54. The ultimate Unfiltered experience, just got more ultimate.

  • Supporter Perk: Past 5 supporters shows, in a dedicated bittorrent sync folder.


Top Story in the unfilter Subreddit


If you’re a Supporter check your inbox!

Call us: 1.425.312.1756

Follow the Us:

The post Death by Metadata | Unfilter 85 first appeared on Jupiter Broadcasting.

]]>
Unfiltering the State of the Union | Unfilter 83 https://original.jupiterbroadcasting.net/50557/unfiltering-the-state-of-the-union-unfilter-83/ Tue, 28 Jan 2014 23:01:41 +0000 https://original.jupiterbroadcasting.net/?p=50557 Unfilter is bringing you play-by-play coverage of Obama’s 2014 Station of the Union. Plus we’ll fact checking the talking points, and take your live calls.

The post Unfiltering the State of the Union | Unfilter 83 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Grab the popcorn it’s special occasion and were throwing out the playbook and doing it live. Unfilter is bringing you play-by-play coverage of Obama’s 2014 Station of the Union.

Plus we’ll fact checking the talking points, take your live calls, our follow up, and much much more.

On this week’s episode of, Unfilter.

Direct Download:

Video | MP3 Audio | OGG Audio | Torrent | YouTube

RSS Feeds:

Video Feed | MP3 Feed | OGG Feed | HD Torrent | Mobile Torrent | iTunes

Become an Unfilter Supporter:

— Show Notes —



State of the Union


– Thanks for Supporting Unfilter –

This Week’s New Supporters:

  • Matt R

  • Jason T

  • James E

  • Chresten C

  • Mike G

  • Kenneth L

  • Mike

  • Jason G

  • Jordan E

  • Thanks to our 341 Unfilter supporters!

  • Supporter perk: Downloadable Pre and Post show. Extra clips, music, hijinks, and off the cuff comments. The ultimate Unfiltered experience. ‘

  • Supporter perk: Exclusive BitTorrent Sync share of our production and non-production clips, notes, and more since the NSA scandal broke in episode 54. The ultimate Unfiltered experience, just got more ultimate.

  • Supporter Perk: Past 5 supporters shows, in a dedicated bittorrent sync folder.


NSA is Crazy:

Exploiting phone information and location is a high-priority effort for the intelligence agencies, as terrorists and other intelligence targets make substantial use of phones in planning and carrying out their activities, for example by using phones as triggering devices in conflict zones. The NSA has cumulatively spent more than $1bn in its phone targeting efforts.

The disclosures also reveal how much the shift towards smartphone browsing could benefit spy agencies’ collection efforts.
golden nugget
A May 2010 NSA slide on the agency’s ‘perfect scenario’ for obtaining data from mobile apps. Photograph: Guardian

One slide from a May 2010 NSA presentation on getting data from smartphones – breathlessly titled “Golden Nugget!” – sets out the agency’s “perfect scenario”: “Target uploading photo to a social media site taken with a mobile device. What can we get?”

The question is answered in the notes to the slide: from that event alone, the agency said it could obtain a “possible image”, email selector, phone, buddy lists, and “a host of other social working data as well as location”.

Whistleblower Edward Snowden leaked the documents about US mass surveillance. He spoke about his disclosures and his life to NDR journalist Seipel in Moscow.

“If there’s information at Siemens that’s beneficial to US national interests – even if it doesn’t have anything to do with national security – then they’ll take that information nevertheless,” Snowden said in the interview conducted in Russia, where Snowden has claimed asylum.

Snowden also told the German public broadcasting network he no longer had possession of any documents or information on NSA activities and had turned everything over to select journalists. He said he did not have any control over the publication of the information.


Top Story in the unfilter Subreddit


If you’re a Supporter check your inbox!

Call us: 1.425.312.1756

Follow the Us:

The post Unfiltering the State of the Union | Unfilter 83 first appeared on Jupiter Broadcasting.

]]>
Obama’s NSA Reform Ruse | Unfilter 82 https://original.jupiterbroadcasting.net/50167/obamas-nsa-reform-ruse-unfilter-82/ Wed, 22 Jan 2014 21:45:37 +0000 https://original.jupiterbroadcasting.net/?p=50167 President Obama has outlined his so called reforms of America's controversial surveillance tactics. But as expected the reforms are light on real change.

The post Obama’s NSA Reform Ruse | Unfilter 82 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

President Obama has outlined his so called reforms of America’s controversial surveillance tactics. But as expected the reforms are light on real change, and leave many of the worst policies in place and unabated. We’ll dig into the most egregious.

Plus: It’s new round of character assassination for Edward Snowden, and this time the claims are even more ridiculous. Is Snowden a double agent for the FSB? We’ll debunk.

Then it’s your feedback, our followup, and much much more.

On this week’s Unfilter.

Direct Download:

Video | MP3 Audio | OGG Audio | Torrent | YouTube

RSS Feeds:

Video Feed | MP3 Feed | OGG Feed | HD Torrent | Mobile Torrent | iTunes

Become an Unfilter Supporter:

— Show Notes —


NSA is CRAZY

Michael Morell, who retired as deputy director of the CIA last summer, has joined CBS News as an intelligence, national security and counterterrorism contributor, the network announced this week.

The Washington Post has already identified the five big takeaways from Obama’s speech:

  1. US intelligence agencies will no longer hold Americans’ phone call records.

  2. There will, nevertheless, be some system for those records to be accessible when required.

  3. The US will no longer monitor the communications of the heads of state or government of “close friends and allies”.

  4. A new panel will be created to provide additional input into the secret court that oversees the Foreign Intelligence Surveillance Act (FISA), including privacy specialists and other non-government folks.

  5. There will be new rules to extend some of the privacy provisions applying to US citizens to foreigners, unless there’s a “compelling national security purpose”.

  6. ’The USA knows that for us spying is a crime’

“The German justice system will not stand idly by if the efforts of the NSA blithely continue here,” he told Bild newspaper on Monday.

Hours after President Barack Obama finished his speech last Friday on proposed intelligence and surveillance reforms, the Office of the Director of National Intelligence (ODNI) declassified a number of documents from the nation’s most secretive court.

The new documents are heavily redacted orders from FISC to the FBI. These items request that the court order an entity (likely a business) to provide “tangible things” under Section 215 of the PATRIOT Act. The documents do not refer to who the target is, nor which company or organization they apply to.

“The Court understands that NSA expects that it will continue to provide on average approximately three telephone identifiers per day to the FBI,” reads a footnote in a 2007 court order (PDF) authored by FISC Judge Frederick Scullin, Jr.

We’ve put together a scorecard showing how Obama’s announcements stack up against 12 common sense fixes that should be a minimum for reforming NSA surveillance. Each necessary reform was worth 1 point, and we were willing to award partial credit for steps in the right direction. On that scale, President Obama racked up 3.5 points out of a possible 12.


– Thanks for Supporting Unfilter –

This Week’s New Supporters:

  • Kai

  • AmazonReviewPolice

  • Jonathan M.

  • Niklas V.

  • Michael O. ← 333rd Subscriber!

  • Thanks to our 333 Unfilter supporters!

  • Supporter perk: Downloadable Pre and Post show. Extra clips, music, hijinks, and off the cuff comments. The ultimate Unfiltered experience. ‘

  • Supporter perk: Exclusive BitTorrent Sync share of our production and non-production clips, notes, and more since the NSA scandal broke in episode 54. The ultimate Unfiltered experience, just got more ultimate.

  • Supporter Perk: Past 5 supporters shows, in a dedicated bittorrent sync folder.


Snow Job:

Mr. Rogers said on the NBC News program “Meet the Press” on Sunday that Mr. Snowden should be seen not as a whistle-blower but as “a thief, who we believe had some help.”

Officials at both the N.S.A. and the F.B.I. have said their investigations have turned up no evidence that Mr. Snowden was aided by others.

Speaking from Moscow, where he is a fugitive from American justice, Snowden told The New Yorker, “This ‘Russian spy’ push is absurd.”

“It’s not the smears that mystify me,” Snowden told me. “It’s that outlets report statements that the speakers themselves admit are sheer speculation.” Snowden went on to poke fun at the range of allegations that have been made against him in the media without intelligence officials providing some kind of factual basis: “ ‘We don’t know if he had help from aliens.’ ‘You know, I have serious questions about whether he really exists.’ ”

Snowden went on, “It’s just amazing that these massive media institutions don’t have any sort of editorial position on this. I mean these are pretty serious allegations, you know?” He continued, “The media has a major role to play in American society, and they’re really abdicating their responsibility to hold power to account.”

Ellsberg is commonly looked at as the quintessential whistleblower today, but shortly after he leaked the top secret Vietnam War study, the Nixon administration made a concerted effort to paint him as a Soviet spy in the press, using anonymous quotes and non-existent ‘secret’ evidence.

  • Live Q&A with Edward Snowden: Thursday 23rd January, 8pm GMT, 3pm EST | Free Snowden](https://freesnowden.is/_2476.html)

Top Story in the unfilter Subreddit

The National Security Agency has collected almost 200 million text messages a day from across the globe, using them to extract data including location, contact networks and credit card details, according to top-secret documents.

The untargeted collection and storage of SMS messages – including their contacts – is revealed in a joint investigation between the Guardian and the UK’s Channel 4 News based on material provided by NSA whistleblower Edward Snowden.

The documents also reveal the UK spy agency GCHQ has made use of the NSA database to search the metadata of “untargeted and unwarranted” communications belonging to people in the UK.

The NSA program, codenamed Dishfire, collects “pretty much everything it can”, according to GCHQ documents, rather than merely storing the communications of existing surveillance targets.

The NSA has made extensive use of its vast text message database to extract information on people’s travel plans, contact books, financial transactions and more – including of individuals under no suspicion of illegal activity.


If you’re a Supporter check your inbox!

Call us: 1.425.312.1756

Follow the Us:

The post Obama’s NSA Reform Ruse | Unfilter 82 first appeared on Jupiter Broadcasting.

]]>
Phish and Chips | TechSNAP 118 https://original.jupiterbroadcasting.net/40257/phish-and-chips-techsnap-118/ Thu, 11 Jul 2013 18:04:25 +0000 https://original.jupiterbroadcasting.net/?p=40257 We'll cover Dropbox’s two-factor authentication flaw, how “Team Telecom” forced fibre providers to enable surveillance, the FBI’s phishing attacking warnings.

The post Phish and Chips | TechSNAP 118 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

We\’ll cover Dropbox’s two-factor authentication flaw, how “Team Telecom” forced fibre providers to enable surveillance, the FBI’s warning about phishing attacks.

A great big batch of your questions our answers, and much much more!

Thanks to:

Use our code tech249 to score .COM for $2.49!

Get private registration FOR FREE with a .COM! code: free5

 

Visit techsnap.ting.com to save $25 off your device or service credits.

 

Direct Download:

HD Video | Mobile Video | MP3 Audio | Ogg Audio | YouTube | HD Torrent | Mobile Torrent

RSS Feeds:

HD Video Feed | Mobile Video Feed | MP3 Audio Feed | Ogg Audio Feed | iTunes Feeds | Torrent Feed

Mentioned this Episode:

[asa]0312605536[/asa]
[asa]0307279391[/asa]
[asa]B000BKUSS8[/asa]

Dropbox flaw allows attackers to circumvent two-factor authentication

  • If an attacker is able to get the username and password for your dropbox account, they can access your account even if you have enabled two-factor authentication
  • Dropbox does not verify the email address used to signup for a new account, because of this, the attacker can signup for a new account with your email address and just append a dot to the end of the domain name
  • Login to this new account and enable 2 factor authentication
  • Save the ‘emergency override code’, used in case you lose your phone
  • Logout and login to the victim account, when prompted for the one-time password, click “I lost my phone”
  • Enter the emergency override code (it is the same for both accounts)
  • It is not clear why having the dot at the end of the email (valid) is enough to make the account unique, but does not make the override code unique

US Government established “Team Telecom” to force foreign owned fibre providers to allow the government access to the data transitting them

  • In 2003 the “Network Security Agreement” was signed between the US Government and Global Crossing, one of the largest internet transit providers, connecting 200 major cities in 27 nations on four continents
  • “In months of private talks, the team of lawyers from the FBI and the departments of Defense, Justice and Homeland Security demanded that the company maintain what amounted to an internal corporate cell of American citizens with government clearances”
  • The FCC would hold up approval of cable licenses until such agreements were in place
  • The agreements required the transit providers to maintain a “Network Operations Center” (NOC) on U.S. soil. This NOC must be staffed with U.S. citizens pre-screened by the government and operating under gag orders, preventing the employees for sharing the information even with their bosses.
  • Originally a US company, Global Crossing filed for Chapter 11 bankruptcy protection in 2002
  • A deal was setup where a partnership between Singapore Technologies Telemedia and Hong Kong-based Hutchison Whampoa would buy Global Crossing
  • The Hong Kong side of the partnership was pressured by the US Government and eventually withdrew. The US was worried that the Chinese Government would gain access to the US’s surveillance requests
  • Singapore Technologies Telemedia eventually agreed to buy the majority stake in Global Crossing and that half of the new board of directors would consist of American citizens with security clearances
  • This agreement has been used as a template for other foreign owned telcos and applied as foreign investors bought existing telcos from US investors
  • In 2011 Global Crossing was sold to US Telecom giant Level3, however ST Telemedia maintained a minority stake, resulting in another round of review by “Team Telecom”
  • A spokesman for Level 3 Communications declined to comment for this article
  • Tapping undersea cables has been a key component of US intelligence collection since WWII, the US Navy used to have a number of submarines specifically outfitted for tapping undersea copper phone lines to listen to sensitive traffic in the Soviet Union
  • Infographic

FBI issues formal warning about targetted spear phishing

  • Many of the very large compromises that we have covered lately were made possible by the attacker establishing an initial beachhead on a single machine, via spear phishing
  • The compromises at The Onion and the Financial Times were both explained in detail after the fact and showed just how much damage an attacker can do once they get inside the network, and how easily they can get inside the network with spear phishing
  • Many in the defense and aerospace industries have been targeted by highly sophisticated spear phishing campaigns, including professionally produced .pdf flyers for fake conferences that took advantage of flaws in Adobe Acrobat to infect the system
  • According to research by AV vendor Trend Micro, 91% of all targeted attacks involved spear phishing in the initial phases
  • Training firm PhishMe says their clients usually start at around 60% susceptibility, but training reduces this to single digits
  • The PhiseMe system works by sending your users different types of phishing emails, including links, attachments, etc
  • When the user falls for the phishing attempt, they are redirected to training pages, teaching them what they did wrong
  • Enhanced versions will even disguise themselves to look like your company\’s page, and prompt users to enter sensitive information. If they do, they are admonished and given further training
  • This type of ongoing proactive training seems like the only real way to increase security, because typical training does not seem to work

MIT Media lab rolls out ‘Immersion’ tool to allow you to visualize your email metadata

  • Logs in to your gmail via OAuth
  • Looks at only the headers (To, From, CC, and timestamp)
  • Builds a visualization of your ‘social graph’
  • After you view the report, you have the option to allow them to save it, or ask them to erase it
  • If you save a snapshot of your social graph, it is automatically deleted after 30 days

Feedback:

TechSNAP Bitmessage: BM-GuGEaEtsqQjqgHRAfag5FW33Dy2KHUmZ


Round Up:

The post Phish and Chips | TechSNAP 118 first appeared on Jupiter Broadcasting.

]]>