report – Jupiter Broadcasting https://www.jupiterbroadcasting.com Open Source Entertainment, on Demand. Wed, 04 Dec 2019 04:32:40 +0000 en-US hourly 1 https://wordpress.org/?v=5.5.3 https://original.jupiterbroadcasting.net/wp-content/uploads/2019/04/cropped-favicon-32x32.png report – Jupiter Broadcasting https://www.jupiterbroadcasting.com 32 32 ZFS Rename Repo | BSD Now 327 https://original.jupiterbroadcasting.net/137507/zfs-rename-repo-bsd-now-327/ Thu, 05 Dec 2019 04:00:00 +0000 https://original.jupiterbroadcasting.net/?p=137507 Show Notes/Links: https://www.bsdnow.tv/327

The post ZFS Rename Repo | BSD Now 327 first appeared on Jupiter Broadcasting.

]]>

Show Notes/Links: https://www.bsdnow.tv/327

The post ZFS Rename Repo | BSD Now 327 first appeared on Jupiter Broadcasting.

]]>
Ghost, Meat, or Block? | User Error 76 https://original.jupiterbroadcasting.net/135632/ghost-meat-or-block-user-error-76/ Fri, 11 Oct 2019 00:15:09 +0000 https://original.jupiterbroadcasting.net/?p=135632 Show Notes: error.show/76

The post Ghost, Meat, or Block? | User Error 76 first appeared on Jupiter Broadcasting.

]]>

Show Notes: error.show/76

The post Ghost, Meat, or Block? | User Error 76 first appeared on Jupiter Broadcasting.

]]>
Turkey.deb | TechSNAP 294 https://original.jupiterbroadcasting.net/105026/turkey-deb-techsnap-294/ Thu, 24 Nov 2016 18:32:02 +0000 https://original.jupiterbroadcasting.net/?p=105026 RSS Feeds: HD Video Feed | Mobile Video Feed | MP3 Audio Feed | Ogg Audio Feed | iTunes Feed | Torrent Feed Become a supporter on Patreon: Show Notes: Akamai’s quarterly State of the Internet report: The Krebs Attack “Internet infrastructure giant Akamai last week released a special State of the Internet report. Normally, […]

The post Turkey.deb | TechSNAP 294 first appeared on Jupiter Broadcasting.

]]>
RSS Feeds:

HD Video Feed | Mobile Video Feed | MP3 Audio Feed | Ogg Audio Feed | iTunes Feed | Torrent Feed

Become a supporter on Patreon:

Patreon

Show Notes:

Akamai’s quarterly State of the Internet report: The Krebs Attack

  • “Internet infrastructure giant Akamai last week released a special State of the Internet report. Normally, the quarterly accounting of noteworthy changes in distributed denial-of-service (DDoS) attacks doesn’t delve into attacks on specific customers. But this latest Akamai report makes an exception in describing in great detail the record-sized attack against KrebsOnSecurity.com in September, the largest such assault it has ever mitigated.”
  • Akamai: “The same data we’ve shared here was made available to Krebs for his own reporting and we received permission to name him and his site in this report.”
  • “Akamai said the attack on Sept. 20 was launched by just 24,000 systems infected with Mirai, mostly hacked Internet of Things (IoT) devices such as digital video recorders and security cameras.”
  • “The first quarter of 2016 marked a high point in the number of attacks peaking at more than 100 Gbps,” Akamai stated in its report. “This trend was matched in Q3 2016, with another 19 mega attacks. It’s interesting that while the overall number of attacks fell by 8% quarter over quarter, the number of large attacks, as well as the size of the biggest attacks, grew significantly.”
  • “The magnitude of the attacks seen during the final week were significantly larger than the majority of attacks Akamai sees on a regular basis,” Akamai reports. “In fact, while the attack on September 20 was the largest attack ever mitigated by Akamai, the attack on September 22 would have qualified for the record at any other time, peaking at 555 Gbps.”
  • Krebs has also made a .csv of the data available: “An observant reader can probably correlate clumps of attacks to specific stories covered by Krebs. Reporting on the dark side of cybersecurity draws attention from people and organizations who are not afraid of using DDoS attacks to silence their detractors.” In case any trenchant observant readers wish to attempt that, I’ve published a spreadsheet here (in .CSV format) which lists the date, duration, size and type of attack used in DDoS campaigns against KrebsOnSecurity.com over the past four years.”
  • Some comments about the “mega” attacks on Kreb’s site:
  • “We haven’t seen GRE really play a major role in attacks until now. It’s basically a UDP flood with a layer-7 component targeting GRE infrastructure. While it’s not new, it’s certainly rare.”
  • “Overall, Columbia was the top source of attack traffic. This is surprising, because Columbia has not been a major source of attack traffic in the past. While Columbia only accounted for approximately 5% of the traffic in the Mirai-based attacks, it accounted for nearly 15% of all source IPs in the last four attacks. A country that was suspiciously missing from both top 10 lists was the u.s. With regards to Mirai, this may be due to a comparative lack of vulnerable and compromised systems, rather than a conscious decision not to use systems in the u.s.”
  • “There are a few distinctive programming characteristics we initially discovered in our lab, and later confirmed when the source code was published, which have helped identify Mirai-based traffic. At the end of the day what Mirai really brings to the table is a reasonably well written and extensible code base. It’s unknown as to what Mirai may bring in the foreseeable future but it is clear that it has paved the way for other malicious actors to create variants that improve on its foundation.”
  • The full report can be downloaded here
  • Some other data from the report:
  • “Last quarter we reported a 276% increase in NTP attacks compared with Q2 of 2015. This quarter, we analyzed NTP trends over two years and have noticed shrinking capabilities for NTP reflection.” — It is good to finally see NTP falling off the attack charts as it gets patched up
  • “Web application attack metrics around the European Football Cup Championship Game and the Summer Games, as analyzed in the Web Application Attack Spotlight, show us that while malicious actors take advantage of high-profile events, there’s also a lull that indicates they might like to watch them.” (see page 26)
  • Application Layer DDoS attacks (GET/HEAD/POST/PUT etc) account for only 1.66% of DDoS attacks. Most attacks are aimed at the infrastructure layer (IP and TCP/UDP)
  • “Repeat DDoS Attacks by Target / After a slight downturn in Q2 2016, the average number of DDoS attacks increased to an average of 30 attacks per target, as shown in Figure 2-13. This statistic reflects that once an organization has been attacked, there is a high probability of additional attacks.”
  • SQL Injection (49%) and Local File Inclusion (40%) make up the greatest share of attacks against web applications

Is your server (N)jinxed ?

  • A flaw in the way Debian (and Ubuntu) package nginx, can allow your server to be compromised.
  • The flaw allows an attacker who has managed to gain control of a web application, like wordpress, to escalate privileges from the www-data user to root.
  • “Nginx web server packaging on Debian-based distributions such as Debian or Ubuntu was found to create log directories with insecure permissions which can be exploited by malicious local attackers to escalate their privileges from nginx/web user (www-data) to root.”
  • “The vulnerability could be easily exploited by attackers who have managed to compromise a web application hosted on Nginx server and gained access to www-data account as it would allow them to escalate their privileges further to root access and fully compromise the system.”
  • The attack flow works as follows:
    • Compromise a web application
    • Run the exploit as the www-data user
    • Compile your privilege escalation shared library /tmp/privesclib.c
    • Install your own low-priv shell (maybe /bin/bash, or an exploit) as /tmp/nginxrootsh
    • Take advantage of the permissions mistake where /var/log/nginx is writable by the www-data user, and replace error.log with a symlink to /etc/ld.so.preload
    • Wait for nginx to be restarted or rehashed by logrotate
    • When nginx is restarted or rehashed, it creates the /etc/ld.so.preload file
    • Add the /tmp/privesclib.so created earlier to /etc/ld.so.preload
    • Run sudo, which will now load /tmp/privesclib.so before other libraries, running the code
    • sudo will not allow the www-data user to do any commands, but before sudo read its config file, it ran privesclib.so, which made /tmp/nginxrootsh setuid root for us
    • Run /tmp/nginxrootsh as any user, and you now have a shell as the root user
    • The now own the server
  • Video Proof of Concept
  • Fixes:
  • Debian: Fixed in Nginx 1.6.2-5+deb8u3
    • Ubuntu 14.04 LTS: 1.4.6-1ubuntu3.6
    • Ubuntu 16.04 LTS: 1.10.0-0ubuntu0.16.04.3
    • Ubuntu 16.10: 1.10.1-0ubuntu1.1
  • Make sure your log directory is not writable by the www-data user

Hacking 27% of the web via WordPress Auto-update

  • “At Wordfence, we continually look for security vulnerabilities in the third party plugins and themes that are widely used by the WordPress community. In addition to this research, we regularly examine WordPress core and the related wordpress.org systems. Recently we discovered a major vulnerability that could have caused a mass compromise of the majority of WordPress sites.”
  • “The vulnerability we describe below may have allowed an attacker to use the WordPress auto-update function, which is turned on by default, to deploy malware to up to 27% of the Web at once.”
  • “The server api.wordpress.org has an important role in the WordPress ecosystem: it releases automatic updates for WordPress websites. Every WordPress installation makes a request to this server about once an hour to check for plugin, theme, or WordPress core updates. The response from this server contains information about any newer versions that may be available, including if the plugin, theme or core needs to be updated automatically. It also includes a URL to download and install the updated software.”
  • “Compromising this server could allow an attacker to supply their own URL to download and install software to WordPress websites, automatically. This provides a way for an attacker to mass-compromise WordPress websites through the auto-update mechanism supplied by api.wordpress.org. This is all possible because WordPress itself provides no signature verification of the software being installed. It will trust any URL and any package that is supplied by api.wordpress.org.”
  • “We describe the technical details of a serious security vulnerability that we uncovered earlier this year that could compromise api.wordpress.org. We reported this vulnerability to the WordPress team via HackerOne. They fixed the vulnerability within a few hours of acknowledging the report. They have also awarded Wordfence lead developer Matt Barry a bounty for discovering and reporting it.”
  • “api.wordpress.org has a GitHub webhook that allows WordPress core developers to sync their code to the wordpress.org SVN repository. This allows them to use GitHub as their source code repository. Then, when they commit a change to GitHub it will reach out and hit a URL on api.wordpress.org which then triggers a process on api.wordpress.org that brings down the latest code that was just added to GitHub.”
  • “The URL that GitHub contacts on api.wordpress.org is called a ‘webhook’ and is written in PHP. The PHP for this webhook is open source and can be found in this repository. We analyzed this code and found a vulnerability that could allow an attacker to execute their own code on api.wordpress.org and gain access to api.wordpress.org. This is called a remote code execution vulnerability or RCE.”
  • “If we can bypass the webhook authentication mechanism, there is a POST parameter for the GitHub project URL that is passed unescaped to shell_exec which allows us to execute shell commands on api.wordpress.org. This allows us to compromise the server.”
  • There is security built into the system. Github hashes the JSON data with a shared secret, and submits the hash with the data. The receiving side then hashes the JSON with its copy of the shared secret. If the two hashes match, the JSON must have been sent by someone who knows the shared secret (ideally only api.wordpress.com and github)
  • There is a small catch
  • “GitHub uses SHA1 to generate the hash and supplies the signature in a header: X-Hub-Signature: sha1={hash}. The webhook extracts both the algorithm, in this case ‘sha1’, and the hash to verify the signature. The vulnerability here lies in the fact the code will use the hash function supplied by the client, normally github. That means that, whether it’s GitHub or an attacker hitting the webhook, they get to specify which hashing algorithm is used to verify the message authenticity”
  • “The challenge here is to somehow fool the webhook into thinking that we know the shared secret that GitHub knows. That means that we need to send a hash with our message that ‘checks out’. In other words it appears to be a hash of the message we’re sending and the secret value that only api.wordpress.org and GitHub know – the shared secret.”
  • “As we pointed out above, the webhook lets us choose our own hashing algorithm. PHP provides a number of non-cryptographically secure hashing functions like crc32, fnv32 and adler32, which generate a 32bit hash vs the expected 160 bit hash generated by SHA1. These hashing functions are checksums which are designed to catch data transmission errors and be highly performant with large inputs. They are not designed to provide security.”
  • So instead of having to brute force a 160 bit hash (1.46 with 48 zeros after it) you only have to brute force 32 bits (4 billion possibilities). But it gets even easier
  • “Of these weak algorithms, the one that stood out the most was adler32, which is actually two 16 bit hashing functions with their outputs concatenated together. Not only are the total number of hashes limited, but there’s also significant non-uniformity in the hash space. This results in many hashes being the same even though they were supplied with different inputs. The distribution of possible checksum values are similar to rolling dice where 7 is the most likely outcome (the median value), and the probability of rolling any value in that range would work its way out from the median value (6 and 8 would have the next highest probability, and on it goes to 2 and 12).”
  • “The proof of concept supplied in the report utilizes the non-uniformity by creating a profile of most common significant bytes in each 16 bit hash generated. Using this, we were able to reduce the amount of requests from 2^32 to approximately 100,000 to 400,000 based on our tests with randomly generated keys.”
  • “This is a far more manageable number of guesses that we would need to send to the webhook on api.wordpress.org which could be made over the course of a few hours. Once the webhook allows the request, the attack executes a shell command on api.wordpress.org which gives us access to the underlying operating system and api.wordpress.org is compromised.”
  • “From there an attacker could conceivably create their own update for all WordPress websites and distribute a backdoor and other malicious code to more than one quarter of the Web. They would also be able to disable subsequent auto-updates so that the WordPress team would lose the ability to deploy a fix to affected websites.”
  • “We confidentially reported this vulnerability on September 2nd to Automattic and they pushed a fix to the code repository on September 7th. Presumably the same fix had been deployed to production before then.”
  • “We still consider api.wordpress.org a single point of failure when distributing WordPress core, plugins and theme updates. We have made attempts to start a conversation with members of Automattic’s security team about improving the security posture of the automatic update system, but we have not yet received a response.”

Feedback:


Round Up:


The post Turkey.deb | TechSNAP 294 first appeared on Jupiter Broadcasting.

]]>
America’s False Flag | Unfilter 190 https://original.jupiterbroadcasting.net/100111/americas-false-flag-unfilter-190/ Mon, 30 May 2016 20:23:33 +0000 https://original.jupiterbroadcasting.net/?p=100111 Wearing the YPG insignia on the frontlines of Syria US Special forces are exposed by new photos this week, Snowden’s got new leaks, Hillary takes a beating from the media, Trump backs out of debating Bernie & we check in with the new controversy around Gary Johnson. Plus a packed Overtime & much more! Direct […]

The post America's False Flag | Unfilter 190 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Wearing the YPG insignia on the frontlines of Syria US Special forces are exposed by new photos this week, Snowden’s got new leaks, Hillary takes a beating from the media, Trump backs out of debating Bernie & we check in with the new controversy around Gary Johnson.

Plus a packed Overtime & much more!

Direct Download:

Video | MP3 Audio | OGG Audio | Torrent | YouTube

RSS Feeds:

Video Feed | MP3 Feed | OGG Feed | HD Torrent | Mobile Torrent | iTunes

Become an Unfilter supporter on Patreon:

Patreon

— Show Notes —

Episode Links

The post America's False Flag | Unfilter 190 first appeared on Jupiter Broadcasting.

]]>
Torturing the Truth | Unfilter 188 https://original.jupiterbroadcasting.net/99796/torturing-the-truth-unfilter-188/ Mon, 16 May 2016 20:23:18 +0000 https://original.jupiterbroadcasting.net/?p=99796 A quick update edition of Unfilter this week, we just couldn’t stay away! We cover some of the crazy things happening in the news, our favorite clips of the week & more! Direct Download: Video | MP3 Audio | OGG Audio | Torrent | YouTube RSS Feeds: Video Feed | MP3 Feed | OGG Feed […]

The post Torturing the Truth | Unfilter 188 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

A quick update edition of Unfilter this week, we just couldn’t stay away! We cover some of the crazy things happening in the news, our favorite clips of the week & more!

Direct Download:

Video | MP3 Audio | OGG Audio | Torrent | YouTube

RSS Feeds:

Video Feed | MP3 Feed | OGG Feed | HD Torrent | Mobile Torrent | iTunes

Become an Unfilter supporter on Patreon:

Patreon

— Show Notes —

Episode Links

The post Torturing the Truth | Unfilter 188 first appeared on Jupiter Broadcasting.

]]>
The Saudi Connection | Unfilter 185 https://original.jupiterbroadcasting.net/99131/the-saudi-connection-unfilter-185/ Thu, 28 Apr 2016 01:28:01 +0000 https://original.jupiterbroadcasting.net/?p=99131 The “28 Pages” of the 9/11 report the media never talked about… Until they did. What’s in the 28 pages? Why is it getting so much attention now? We’ll reveal how the Obama administration is using vital information about 9/11 as leverage with the Saudis & why these 28 pages are getting so much attention […]

The post The Saudi Connection | Unfilter 185 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

The “28 Pages” of the 9/11 report the media never talked about… Until they did. What’s in the 28 pages? Why is it getting so much attention now? We’ll reveal how the Obama administration is using vital information about 9/11 as leverage with the Saudis & why these 28 pages are getting so much attention now.

Plus details on how the FBI hacked the iPhone 5c, the Bern starts to fade & Trump takes the lead on the right.

Then we end it all on a high note & an epic Overtime segment!

Direct Download:

Video | MP3 Audio | OGG Audio | Torrent | YouTube

RSS Feeds:

Video Feed | MP3 Feed | OGG Feed | HD Torrent | Mobile Torrent | iTunes

Become an Unfilter supporter on Patreon:

Patreon

— Show Notes —

Episode Links

The post The Saudi Connection | Unfilter 185 first appeared on Jupiter Broadcasting.

]]>
Straight Outta FOSDEM | LINUX Unplugged 78 https://original.jupiterbroadcasting.net/76722/straight-outta-fosdem-lup-78/ Tue, 03 Feb 2015 18:37:45 +0000 https://original.jupiterbroadcasting.net/?p=76722 FOSDEM just wrapped up, where thousands of developers & enthusiasts of free & open source software gather to talk all things Linux. Plus we drool over the new Raspberry Pi 2 & ask if B+ buyers got a little screwed. Thanks to: Get Paid to Write for DigitalOcean Direct Download: MP3 Audio | OGG Audio […]

The post Straight Outta FOSDEM | LINUX Unplugged 78 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

FOSDEM just wrapped up, where thousands of developers & enthusiasts of free & open source software gather to talk all things Linux.

Plus we drool over the new Raspberry Pi 2 & ask if B+ buyers got a little screwed.

Thanks to:

Ting


DigitalOcean


Linux Academy

Direct Download:

MP3 Audio | OGG Audio | Video | HD Video | Torrent | YouTube

RSS Feeds:

MP3 Feed | OGG Feed | iTunes Feed | Video Feed | Torrent Feed | WebM Torrent Feed

Become a supporter on Patreon:

Foo

Show Notes:

FU:


FOSDEM 2015

Every year, thousands of developers of free and open source software from all over the world gather at the event in Brussels.

systemd is now a core component of most major distributions. In this talk I want to give an overview over everything new in the systemd project over the last year, and what to expect over the next year.

Hopefully it clears up what we mean when we talk about systemd and desktop environments, and where we could use different parts of systemd.

It should be apparent that as developers there are parts we want to embrace as it. In many cases it allows us to throw away large amounts of code whilst at the same time providing a better user experience. Adding it as an optional extra defeats the main benefit.

Raspberry Pi 2 on sale now at $35 | Raspberry Pi

Let’s get the good stuff out of the way above the fold. Raspberry Pi 2 is now on sale for $35 (the same price as the existing Model B+), featuring:

  • A 900MHz quad-core ARM Cortex-A7 CPU (~6x performance)
  • 1GB LPDDR2 SDRAM (2x memory)
  • Complete compatibility with Raspberry Pi 1

Because it has an ARMv7 processor, it can run the full range of ARM GNU/Linux distributions, including Snappy Ubuntu Core, as well as Microsoft Windows 10.

Speaking to The Register last week, foundation head honcho Eben Upton said: “I think it’s a usable PC now. It was always the case that you could use a Raspberry Pi 1 as a PC but you had to say ‘this is a great PC in so far as it cost me 35 bucks’. We’ve removed the caveat that you had to be a bit forgiving with it. Now it’s just good.”

Runs Linux from the people:

  • Send in a pic/video of your runs Linux.
  • Please upload videos to YouTube and submit a link via email or the subreddit.

New Shows : Tech Talk Today (Mon – Thur)

Support Jupiter Broadcasting on Patreon

Post-Show

The post Straight Outta FOSDEM | LINUX Unplugged 78 first appeared on Jupiter Broadcasting.

]]>
Tortured Logic | Unfilter 127 https://original.jupiterbroadcasting.net/74072/tortured-logic-unfilter-127/ Thu, 18 Dec 2014 00:08:05 +0000 https://original.jupiterbroadcasting.net/?p=74072 Apologist for the CIA were out in full force since our last episode. We’ve clipped their labored justifications & break them down point by point. Plus the critical president Obama is silently setting for future administrations. It’s been a bad week for Russia & our local correspondent discusses the tragic events in Sydney Australia, then […]

The post Tortured Logic | Unfilter 127 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Apologist for the CIA were out in full force since our last episode. We’ve clipped their labored justifications & break them down point by point. Plus the critical president Obama is silently setting for future administrations.

It’s been a bad week for Russia & our local correspondent discusses the tragic events in Sydney Australia, then we wrap the show with a little good news.

Direct Download:

Video | MP3 Audio | OGG Audio | Torrent | YouTube

RSS Feeds:

Video Feed | MP3 Feed | OGG Feed | HD Torrent | Mobile Torrent | iTunes

Become an Unfilter supporter on Patreon:

Foo

— Show Notes —

CIA Torture Report

‘Rectal Hydration’: Inside the CIA’s Interrogation of Khalid Sheikh Mohammed

Report

Along with the waterboarding, Mohammed was subjected to days of standing sleep deprivation, slapping and “stress positions,” the report says. And it says that several times he underwent an emergency medical procedure known as “rectal rehydration,” or proctolysis


The report matter-of-factly notes that such** treatment was “medically unnecessary” for Mohammed**, whom it describes as having been doused with, submerged in or force-fed water hundreds of times. After one session, the medical officer present reported that Mohammed’s gastric contents were “so diluted by water” that Mohammed was in danger of water intoxication. The medical officer later wrote that “in the new technique we are basically doing a series of near drownings.”

**”It’s almost never done,” **he wrote to the NewsHour in an email. “There are so many easier and more effective ways to hydrate or feed a patient.”

Thomas Burke, an emergency doctor at Massachusetts General Hospital who teaches at Harvard Medical School echoed that in an interview with the Washington Post.

“For all practical purposes, it’s never used,” Burke said. “No one in the United States is hydrating anybody through their rectum. Nobody is feeding anybody through their rectum. … That’s not a normal practice.”

Contrary to some claims, this is not a medical procedure, nor was it ever approved by the Justice Department’s Office of Legal Counsel as an authorized interrogation technique. On December 10, 2014, the New York-based Physicians for Human Rights stated that “Contrary to the CIA’s assertions, there is no clinical indication to use rectal rehydration and feeding over oral or intravenous administration of fluids and nutrients.”

Dick Cheney’s Tortured Appearance On ‘Meet The Press’ Should Be His Public Swan Song

Dick Defends His History

Torture is “an American citizen on his cellphone making a last call to his four young daughters shortly before he burns to death in the upper levels of the Trade Center in New York on 9/11.”

Cheney would be right were he to pose this as an example rather than the defining metric when seeking to determine an act of torture. The horrendous, unthinkable experience referred to by Cheney is, unquestionably, one example of inflicting torture—and a pretty good example of horrific torture at that—but hardly the sole method that Cheney insisted on pretending to be the case.

Yet, each time Cheney was asked for a more realistic and more encompassing definition of torture that would rationally go beyond any one particular example, he continuously returned to the experiences of our lost countrymen on 9-11. This seemed, in the mind of Dick Cheney, to be the only standard to be applied when determining if our interrogation methods may have exceeded the legal bounds imposed by the Geneva Convention for the treatment of detainees.

At a point, it became more than clear that Cheney had pre-planned this “non-answer” for his appearance, thinking it to be very clever.

By pretending that only a horrible infliction of agony similar to what was heaped on the victims of 9-11 would rise to a level that could be termed torture, the Vice-President was simply sending a coded message to his supporters to remind them that, given what the bad guys did to us, there was nothing too horrible that we could do to them—Geneva Convention be damned.

U.S. Sen. Rockefeller helps release CIA report; torture practice

Sen. Jay Rockefeller

On Dec. 8, the outgoing senator spoke on the floor after the Senate Select Committee on Intelligence released the Executive Summary of its Study on the CIA’s Detention and Interrogation Program. The redacted summary was released after the Intelligence Committee voted in April 2014 to declassify the summary and after negotiations among the Committee, the White House, and the CIA.

A little Truth

News

Breaking News

Sony Just Canceled The Pre mire Of ‘The Interview’

Movie Still

Sony Pictures has decided to cancel the Dec. 25 release of “The Interview” after major theaters said they wouldn’t screen the movie.

“We have decided not to move forward with the planned December 25 theatrical release of ‘The Interview,'” the company said in a statement.

Sony dropped its plan to release the film after the four largest theater chains in the United States — Regal Entertainment, AMC Theaters, Cinemark and Carmike Cinemas — and several smaller chains said they would not show the film. The cancellations virtually killed “The Interview” as a theatrical enterprise, at least in the near term, one of the first known instances of a threat from another nation pre-empting the release of a movie.

The duo has withdrawn from previously scheduled press appearances, including Rogen’s Thursday appearance on “Late Night with Seth Meyers” and an interview with both of them on “The Tonight Show Starring Jimmy Fallon” on Wednesday, leading up to “The Interview’s” Christmas Day release. They were also booked for an appearance on Buzzfeed Brews in New York on Tuesday.

U.S. Links North Korea to Sony Hacking

North Korea

American intelligence officials have concluded that the North Korean government was “centrally involved” in the recent attacks on Sony Pictures’s computers, a determination reached just as Sony on Wednesday canceled its release of the comedy, which is based on a plot to assassinate Kim Jong-un, the North Korean leader.

Senior administration officials, who would not speak on the record about the intelligence findings, said the White House was still debating whether to publicly accuse North Korea of what amounts to a cyberterrorism campaign.

Kerry speaks of lifting Russia sanctions if Putin makes the right decisions

Kerry Has Path for Russia

Russia has made constructive moves in recent days towards reducing tensions in Ukraine, US Secretary of State John Kerry said yesterday (16 December), and he raised the possibility that Washington could lift sanctions if Moscow keeps taking positive steps.

Speaking in London, Kerry said the United States and Europe could lift sanctions within days or weeks if President Vladimir Putin keeps taking steps to ease tensions and lives up to commitments under ceasefire accords to end the Ukraine conflict.

“These sanctions could be lifted in a matter of weeks or days, depending on the choices that President Putin takes,” Kerry told reporters.

“Their sole purpose here is to restore the international norm with respect to behavior between nations,” to ensure respect for borders, sovereignty and rights, he said.

Russia imposes steep interest rate hike as ruble plummets

Ruble Drops

The fear was sparked by the plummeting ruble, which has dropped 17 percent against the dollar in two days despite a dead-of-night decision Tuesday by the Russian central bank to impose a steep interest-rate hike to stem the currency losses.

GOP rep attempted late bid to kill spy bill | TheHill

Rep. Justin Amash

One of the biggest thorns in the side of the country’s intelligence agencies attempted to mount an eleventh hour bid to kill the spy agencies’ funding bill on Wednesday.

Rep. Justin Amash (R-Mich.) wrote on Facebook that the intelligence authorization bill that easily passed through the House contained “one of the most egregious sections of law I’ve encountered during my time as a representative.”

“It grants the executive branch virtually unlimited access to the communications of every American,” explained Amash, who has a record of skepticism toward the National Security Agency and other agencies. Last year, he nearly succeeded in an attempt to end the NSA’s controversial phone records program.

That type of collection is currently allowed under an executive order that dates back to former President Reagan, but the new stamp of approval from Congress was troubling, Amash said. Limits on the government’s ability to retain information in the provision did not satisfy the Michigan Republican.

Despite Amash’s late attempt,** the bill easily passed, 325-100**.

The bill passed the Senate earlier this week and is now on its way to President Obama.

Russia has invited North Korean leader Kim Jong Un to attend a May ceremony marking the end of World War Two, in what would be Kim’s first foreign visit since taking the helm of the reclusive state in 2011, Japan’s Asahi Shimbun daily said on Wednesday.

An American force has fought its actual first battle against the Islamic State of Iraq and Syria “ISIS” organization during a counter-attack that was carried out by tribal forces

and other force of the Iraqi army near Ein al-Asad base, west of Anbar, in an attempt to remove them from the base of which includes about 100 US adviser in it.

A field commander of the Iraqi Army in Anbar province, said that “the US force equipped with light and medium weapons, supported by fighter force model” F-18 “, was able to inflict casualties against fighters of ISIS organization, and forced them to retreat from the al-Dolab area, which lies 10 kilometers from Ain al-Assad base .

US troops have entered with its Iraqi partner, according to Colonel , Salam Nazim in line against ISIS elements and clashed with them for more than two hours, to succeed in removing them from al-Dolab area, and causing losses in their ranks, at a time American fighter jets directed several strikes focused on ISIS gatherings that silenced their heavy sources of fire. “He points out that the clashes took place between 1 a.m. and 3 a.m. on Sunday night.

Canisters packed with poisonous varieties of scorpion are being blasted into towns and villages, which explode on impact – scattering the scorpions and causing panic among the innocent local population.

High Note

Cannbis

Tacoma to close medical marijuana collectives

All medical marijuana collectives in Tacoma could soon have to shut down.

City leaders addressed plans last week to send out letters to cease operations as early as January, as they are not licensed under Initiative 502. Both business owners and patients are now expressing concerns.

Medical marijuana wins but marijuana legalization loses in congressional spending deal

The spending bill passed by Congress on December 14 includes a provision that prevents the Department of Justice, including the Drug Enforcement Administration, from interfering with states’ medical marijuana laws.
The provision applies to 32 states and Washington, DC, which allow the use of marijuana or a marijuana-based compound, such as the non-psychoactive CBD, for medical purposes.

Teen marijuana use falls as more states legalize – The Washington Post

Teen alcohol and drug use — including marijuana use — was down across the board in 2014.

That’s the big take-home from the 2014 Monitoring the Future study by the University of Michigan and the National Institutes on Drug Abuse, which was released Tuesday morning. The MTF is an annual survey of 40,000 8th-graders, 10th-graders and 12th-graders. It’s notable both for its size and for the fact that it was conducted this past spring, in the midst of a nationwide conversation about drug reform in the run-up to the midterm elections

The post Tortured Logic | Unfilter 127 first appeared on Jupiter Broadcasting.

]]>
Obama Sells ISIS | Unfilter 113 https://original.jupiterbroadcasting.net/66497/obama-sells-isis-unfilter-113/ Wed, 10 Sep 2014 20:42:00 +0000 https://original.jupiterbroadcasting.net/?p=66497 In the live run up to Obama’s sales pitch to the nation to go back into Iraq, we analysis the recent developments of ISIS, and dispel common memes being pushed out by the media. Then cover Obama’s speech in real time with our commentary. Plus new leaks from the CIA Torture report suggest the scope […]

The post Obama Sells ISIS | Unfilter 113 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

In the live run up to Obama’s sales pitch to the nation to go back into Iraq, we analysis the recent developments of ISIS, and dispel common memes being pushed out by the media. Then cover Obama’s speech in real time with our commentary.

Plus new leaks from the CIA Torture report suggest the scope of waterboarding and other tactics by the CIA were much more brutal than the public has been lead to believe.

Then we end on a surprising high note, and in-depth discussion.

Direct Download:

Video | MP3 Audio | OGG Audio | Torrent | YouTube

RSS Feeds:

Video Feed | MP3 Feed | OGG Feed | HD Torrent | Mobile Torrent | iTunes

Become an Unfilter supporter on Patreon:

Foo

— Show Notes —

CIA Torture Report

CIA ‘tortured al-Qaeda suspects close to the point of death by drowning them in water-filled baths’ – Telegraph

As the US Senate prepares to release a report documenting US
torture programme after 9/11, Telegraph reveals new details about the scope
of CIA excesses


“They weren’t just pouring water over their heads or over a cloth,” said the source who has first-hand knowledge of the period. “They were holding them under water until the point of death, with a doctor present to make sure they did not go too far. This was real torture.”

The account of extreme CIA interrogation comes as the US Senate prepares to publish a declassified version of its so-called Torture Report – a 3,600-page report document based on a review of several million classified CIA documents.


Publication of the report is currently being held up by a dispute over how much of the 480-page public summary should remain classified, but it is expected to be published within weeks.

Snowden

The Swiss attorney general has said that whistleblower Edward Snowden can reside there if he responds to state requests for testimony against the US National Security Agency (NSA).


A document provided to the Swiss Sunday newspaper Sonntagszeitung is titled, “What are the rules would apply to consider when Edward Snowden would [be] brought to Switzerland and then the United States would make a request for extradition“, and it relates that the rules would allow the movement and repel the requests.

Speaking to the newspaper, Snowden’s Swiss lawyer Marcel Bosonnet revealed that he is pleased with the results of the study, commenting that, “The legal requirements for safety are met.”

ISIS

Seven in 10 Americans believe ISIS has the resources to launch an attack against the United States, just days before President Barack Obama plans to address the nation on the subject.

The poll released Monday shows that Americans favor:

— Additional airstrikes against ISIS (76% favor, 23% oppose)

— Military aid to forces fighting ISIS (62% favor, 37% oppose)

— Providing humanitarian aid to people fleeing ISIS (83% favor, 16% oppose)

U.S. targets ISIS fighters near Iraq’s second-largest dam

But a majority of Americans, 61%-38%, oppose placing U.S. soldiers on the ground in Iraq and Syria to combat the terrorist group.

Even as Americans support military action against ISIS, they still want Obama to seek authority from Congress before taking any action. More than 7 in 10 Americans think Obama should ask Congress for the ability to strike ISIS militarily. And 8 in 10 Americans support Congress approving military force against ISIS.

High Note:

Washington’s indoor pot grows could be big power suck – Local – MyNorthwest.com

“You’re installing 1,000 watt lights over about every two plants and running those 16 to 18 hours a day to grow the product over a 10, 12, 14 week cycle. It’s a pretty significant consumption of electricity.”

The council studied a number of growers across the state earlier this summer after they were granted licenses by the Washington State Liquor Control Board. It determined demand for electricity could grow between 60 and 160 average megawatts over the next few years.

“That’s significant,” Eckman says. “That’s about half of the size of a new combustion turbine gas generating plant.”

Since Washington voters in 2012 approved an initiative to legalize recreational pot use by adults, the state Liquor Control Board has so far issued more than 200 licenses to marijuana growers out of about 2,500 who have applied.

Colorado is now selling more recreational pot than medical pot, a turning point for the newly legal industry.

Tax records released by the state Department of Revenue on Wednesday showed that the state sold $29.7 million worth of recreational marijuana in July, the most recent data available. That was slightly higher than the $28.9 million worth of medical marijuana sold in the same month.

Colorado has many more medical pot shops than recreational pot shops, which are open to all 21 and over. Colorado has some 500 medical shops, fewer than 200 open to all adults.

Since January, Colorado has reaped more than $37 million in taxes from marijuana. That figure includes taxes, licenses and fees from both medical and recreational pot.

The post Obama Sells ISIS | Unfilter 113 first appeared on Jupiter Broadcasting.

]]>
Watchlist of Terror | Unfilter 109 https://original.jupiterbroadcasting.net/63997/watchlist-of-terror-unfilter-109/ Wed, 06 Aug 2014 19:57:05 +0000 https://original.jupiterbroadcasting.net/?p=63997 The Intercept has published Obama’s secret terrorist tracking system, by the numbers. We dig in. The CIA and the Senate are still fighting over the torture report. Then we’ll examine the new groundwork for the new Cold War, and the ridiculous reactions Colorado’s neighbor states are having to Cannabis legalization. Direct Download: Video | MP3 […]

The post Watchlist of Terror | Unfilter 109 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

The Intercept has published Obama’s secret terrorist tracking system, by the numbers. We dig in. The CIA and the Senate are still fighting over the torture report.

Then we’ll examine the new groundwork for the new Cold War, and the ridiculous reactions Colorado’s neighbor states are having to Cannabis legalization.

Direct Download:

Video | MP3 Audio | OGG Audio | Torrent | YouTube

RSS Feeds:

Video Feed | MP3 Feed | OGG Feed | HD Torrent | Mobile Torrent | iTunes

Become an Unfilter supporter on Patreon:

Foo

— Show Notes —

— The Slow Death of Privacy —

Barack Obama’s Secret Terrorist-Tracking System, by the Numbers

imgurlArea 06-08-14  11_11_37.png

Of the 680,000 people caught up in the government’s Terrorist Screening Database—a watchlist of “known or suspected terrorists” that is shared with local law enforcement agencies, private contractors, and foreign governments—more than 40 percent are described by the government as having “no recognized terrorist group affiliation.” That category—280,000 people—dwarfs the number of watchlisted people suspected of ties to al Qaeda, Hamas, and Hezbollah combined.

The documents, obtained from a source in the intelligence community, also reveal that the Obama Administration has presided over an unprecedented expansion of the terrorist screening system. Since taking office, Obama has boosted the number of people on the no fly list more than ten-fold, to an all-time high of 47,000—surpassing the number of people barred from flying under George W. Bush.

“If everything is terrorism, then nothing is terrorism,” says David Gomez, a former senior FBI special agent. The watchlisting system, he adds, is “revving out of control.”

• The second-highest concentration of people designated as “known or suspected terrorists” by the government is in Dearborn, Mich.—a city of 96,000 that has the largest percentage of Arab-American residents in the country.

• The government adds names to its databases, or adds information on existing subjects, at a rate of 900 records each day.

• The CIA uses a previously unknown program, code-named Hydra, to secretly access databases maintained by foreign countries and extract data to add to the watchlists.

State Dept. ‘Torture Talking Points’ Reveal White House PR Machine Ahead of Senate Report

A State Department document obtained by the Associated Press reveals part of the Obama administration’s attempt to ready its public relations response to an upcoming Senate report on the CIA’s torture program.

The document details some of the administration’s prepared talking points to be used once a White House-approved version of the report is released.

Reportedly sent by accident via email to the AP, the State Department memo describes the report as a demonstration of American democracy, rather than as an indictment of the CIA’s torture practices. The document states that “no American is proud” of the CIA’s tactics, but that “the story” of illegal, indefinite torture and imprisonment is part of a larger message, one in which “America’s democratic system worked just as it was designed to work in bringing an end to actions inconsistent with our democratic values.” That story, the document proclaims, is one in which Americans can take pride.


The document contains a few subtle errors in its dates and phrasing. At one point, it claims that the “interrogation methods were debated in our free media, challenged in our independent courts, and, just two years after their introduction, restricted by an act of our Congress sponsored by Senator John McCain and overwhelmingly backed by members of both of our political parties.”

As investigative journalist Marcy Wheeler notes, that “act of Congress” likely refers to the Detainee Treatment Act — but that legislation was passed in 2005, almost four years after the launch of the CIA’s Retention, Detention, and Interrogation (RDI) program, not two. In addition, the RDI program has rarely been “challenged in independent courts,” as both President George W. Bush and President Barack Obama regularly prevented the details of the program from coming to light by invoking the “state secrets privilege,” a rule which allows governments to hold back evidence in a legal case by claiming that disclosing the information might endanger national security.

Report: Israel tapped John Kerry’s phone when he was brokering peace talks

Israeli intelligence intercepted phone calls of US Secretary of State John Kerry while he was trying to broker a peace deal between Israel and the Palestinian Authority earlier this year, German news magazine _Der Spiegel _reported on Sunday.

The report was confirmed by several sources in the intelligence community, according to Der Spiegel.

Both Israel and Russia Shared Kerry’s Intercepted Phone Calls Tikun-Olam Tikun Olam-תיקון עולם

Yesterday’s report, originating in Der Spiegel that Israel intercepted the telecommunications of Secretary of State John Kerry when he was in flight to the Middle East has just become a much bigger story. The reporter noted that there were two countries who eavesdropped on Kerry. But he didn’t say which country it was.

My highly-placed Israeli source tells me that the identity of that country is Russia.

While Kerry’s position on the Israel-Palestine peace talks was Israel’s number one priority, Russia’s number one priority was to learn the U.S. plans and position regarding the Ukrainian separatist movement and Russia’s involvement with it. My source had this to say:

…It’s a “fruitful ongoing joint venture” initiated by Lieberman thanks to his Moscow connections. Israel provides Russia with recordings of intercepted calls Kerry makes flying over the Middle East, and Russia provides Israel with recordings of calls he makes flying over Central Asia, the Far East & the Pacific Ocean.

The source notes this “joint venture” became extremely important for Moscow since last February — because of the Ukrainian crisis.

In this way, the spying collaboration has been fruitful for both sides.

New leaker disclosing US secrets, government concludes

Proof of the newest leak comes from national security documents that formed the basis of a news story published Tuesday by the Intercept, the news site launched by Glenn Greenwald, who also published Snowden’s leaks.


— Thanks for Supporting Unfilter —

Become an Unfilter supporter on Patreon

Foo

  • Thanks to our 314 patrons

  • 3 Slots at the SWAG pledge level have opened.

  • Supporter perk: Downloadable Pre and Post show. Extra clips, music, hijinks, and off the cuff comments. The ultimate Unfiltered experience. ‘

  • Supporter perk: Exclusive BitTorrent Sync share of our production and non-production clips, notes, and more since the NSA scandal broke in episode 54. The ultimate Unfiltered experience, just got more ultimate.

  • Supporter Perk: Past 5 supporters shows, in a dedicated bittorrent sync folder.


— Cold War 2.0 —

Putin Urges Economic Retaliation for Sanctions Over Ukraine Conflict – NYTimes.com

Mr. Putin said that Russia should signal that it finds the economic sanctions offensive, but that it should do so without harming Russian consumers.

“The political tools of economic pressure are unacceptable and run counter to all norms and rules,” he was quoted as saying by Russian news agencies.

Unintended consequences: Sanctions on Russia hurt US dollar dominance — RT USA

The US dollar, the dominant global currency since 1944, may lose some of its luster due to the American-led sanctions against Russia over the turmoil in Ukraine. The greenback has been fading in favor since the global financial crisis in 2008.

The US-led sanctions against Russia may have backfired on the US
because it threatens to “hasten a move away from the dollar
that’s been stirring since the global financial crisis [in
2008],”
Rachel Evans at Bloomberg wrote. In an unexpected turn of events, Hong Kong’s
central bank has bought more than $9.5 billion since the start of
July “to prevent its currency from rallying as the sanctions
stoked speculation of an influx of Russian cash,”
she noted.

Germany Blocks the Delivery of Military Parts to Russia – NYTimes.com

A spokesman for Chancellor Angela Merkel said that Berlin would be open to expanding the existing European Union sanctions to include already signed deals. “The European Council decided what it decided,” the spokesman, Georg Streiter, told reporters on Monday.


The decision to halt the deal, estimated by the Economics Ministry to be worth 123 million euros, or about $165 million, will also put the German government under increased pressure from the country’s powerful industrial sector, which has warned that economic sanctions against Russia will hamper growth and increase unemployment.

Vladimir Putin signs historic $20bn oil deal with Iran to bypass Western sanctions

Vladimir Putin has agreed a $20bn (£11.8bn) trade deal with Iran that will see
Russia sidestep Western sanctions on its energy sector.

Under the terms of a five-year accord, Russia will help Iran organise oil
sales as well as “cooperate in the oil-gas industry, construction of power
plants, grids, supply of machinery, consumer goods and agriculture
products”, according to a statement by the Energy Ministry in Moscow.


The move is a win-win for both nations after they were hit with Western sanctions aimed at limiting their energy sectors.

Russia, India to ink $40 bn gas deal

Russian President Vladimir Putin and Indian Prime Minister Narendra Modi are expected to announce a massive natural gas deal during their summit later this year, Indian media reports said Monday.

Russian and Indian officials are negotiating a $40 billion gas pipeline project from Russia to India, oil ministry officials told Indian daily Hindustan Times.

Russia will also supply 46 million tonnes of oil to China each year in the next 25 years, according to recent deals signed by President Vladimir Putin and his Chinese counterpart Xi Jinping.

Even as the US and EU try to isolate Russia on the Ukraine issue, Beijing and other BRICS capitals have been cementing their business ties with Moscow.


— Weed Wackers —

Since marijuana legalization, highway fatalities in Colorado are at near-historic lows – The Washington Post

Since the new Colorado law took effect in January, the “drugged driver” panic has only intensified.I’ve already written about one dubious example, in which the Colorado Highway Patrol and some local and national media perpetuated a story that a driver was high on pot when he slammed into a couple of police cars parked on an interstate exit ramp. While the driver did have some pot in his system, his blood-alcohol level was off the charts and was far more likely the cause of the accident.

As you can see, roadway fatalities this year are down from last year, and down from the 13-year average. Of the seven months so far this year, five months saw a lower fatality figure this year than last.


What’s notable here is that the totals so far in 2014 are closer to the safest composite year since 2002 than to the average year since 2002. I should also add here that these are total fatalities.


Secure Ways to Contact the Show:


Follow the Us:

Call us: 1.425.312.1756


If you’re a Supporter check Patreon for this episodes supporter exclusives!

The post Watchlist of Terror | Unfilter 109 first appeared on Jupiter Broadcasting.

]]>
Devious Methods | BSD Now 42 https://original.jupiterbroadcasting.net/60302/devious-methods-bsd-now-42/ Thu, 19 Jun 2014 11:56:15 +0000 https://original.jupiterbroadcasting.net/?p=60302 Coming up this week, we’ll be showing you how to chain SSH connections, as well as some cool tricks you can do with it. Going along with that theme, we also have an interview with Bryce Chidester about running a BSD-based shell provider. News, emails and cowsay turkeys, on BSD Now – the place to […]

The post Devious Methods | BSD Now 42 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Coming up this week, we’ll be showing you how to chain SSH connections, as well as some cool tricks you can do with it. Going along with that theme, we also have an interview with Bryce Chidester about running a BSD-based shell provider. News, emails and cowsay turkeys, on BSD Now – the place to B.. SD.

Thanks to:


iXsystems


Tarsnap

Direct Download:

Video | HD Video | MP3 Audio | OGG Audio | Torrent | YouTube

RSS Feeds:

MP3 Feed | OGG Feed | iTunes Feed | Video Feed | HD Vid Feed | HD Torrent Feed

– Show Notes: –

Headlines

PIE and ASLR in FreeBSD update

  • A status update for Shawn Webb’s ASLR and PIE work for FreeBSD
  • One major part of the code, position-independent executable support, has finally been merged into the -CURRENT tree
  • “FreeBSD has supported loading PIEs for a while now, but the applications in base weren’t compiled as PIEs. Given that ASLR is useless without PIE, getting base compiled with PIE support is a mandatory first step in proper ASLR support”
  • If you’re running -CURRENT, just add “WITH_PIE=1” to your /etc/src.conf and /etc/make.conf
  • The next step is working on the ASLR coding style and getting more developers to look through it
  • Shawn will also be at EuroBSDCon (in September) giving an updated version of his BSDCan talk about ASLR

Misc. pfSense news

  • Couple of pfSense news items this week, including some hardware news
  • Someone’s gotta test the pfSense hardware devices before they’re sold, which involves powering them all on at least once
  • To make that process faster, they’re building a controllable power board (and include some cool pics)
  • There will be more info on that device a bit later on
  • On Friday, June 27th, there will be another video session (for paying customers only…) about virtualized firewalls
  • pfSense University, a new paid training course, was also announced
  • A single two-day class costs $2000, ouch

ZFS stripe width

  • A new blog post from Matt Ahrens about ZFS stripe width
  • “The popularity of OpenZFS has spawned a great community of users, sysadmins, architects and developers, contributing a wealth of advice, tips and tricks, and rules of thumb on how to configure ZFS. In general, this is a great aspect of the ZFS community, but I’d like to take the opportunity to address one piece of misinformed advice”
  • Matt goes through different situations where you would set up your zpool differently, each with their own advantages and disadvantages
  • He covers best performance on random IOPS, best reliability, and best space efficiency use cases
  • It includes a lot of detail on each one, including graphs, and addresses some misconceptions about different RAID-Z levels’ overhead factor

FreeBSD 9.3-BETA3 released

  • The third BETA in the 9.3 release cycle is out, we’re slowly getting closer to the release
  • This is expected to be the final BETA, next will come the RCs
  • There have mostly just been small bug fixes since BETA2, but OpenSSL was also updated and the arc4random code was updated to match what’s in -CURRENT (but still isn’t using ChaCha20)
  • The FreeBSD foundation has a blog post about it too
  • There’s a list of changes between 9.2 and 9.3 as well, but we’ll be sure to cover it when the -RELEASE hits

Interview – Bryce Chidester – brycec@devio.us / @brycied00d

Running a BSD shell provider


Tutorial

Chaining SSH connections


News Roundup

My FreeBSD adventure

  • A Slackware user from the “linux questions” forum decides to try out BSD, and documents his initial impressions and findings
  • After ruling out PCBSD due to the demanding hardware requirements and NetBSD due to “politics” (whatever that means, his words) he decides to start off with FreeBSD 10, but also mentions trying OpenBSD later on
  • In his forum post, he covers the documentation (and how easy it makes it for a switcher), dual booting, packages vs ports, network configuration and some other little things
  • So far, he seems to really enjoy BSD and thinks that it makes a lot of sense compared to Linux
  • Might be an interesting, ongoing series we can follow up on later

Even more BSDCan trip reports

  • BSDCan may be over until next year, but trip reports are still pouring in
  • This time we have a summary from Li-Wen Hsu, who was paid for by the FreeBSD foundation
  • He’s part of the “Jenkins CI for FreeBSD” group and went to BSDCan mostly for that
  • Nice long post about all of his experiences at the event, definitely worth a read
  • He even talks about… the food

FreeBSD disk partitioning

  • For his latest book series on FreeBSD’s GEOM system, MWL asked the hackers mailing list for some clarification
  • This erupted into a very long discussion about fdisk vs gnop vs gpart
  • So you don’t have to read the tons of mailing list posts, he’s summarized the findings in a blog post
  • It covers MBR vs GPT, disk sector sizes and how to handle all of them with which tools

BSD Router Project version 1.51

  • A new version of the BSD Router Project has been released, 1.51
  • It’s now based on FreeBSD 10-STABLE instead of 10.0-RELEASE
  • Includes lots of bugfixes and small updates, as well as some patches from pfSense and elsewhere
  • Check the sourceforge page for the complete list of changes
  • The minimum disk size requirement has increased to 512MB

Feedback/Questions


  • All the tutorials are posted in their entirety at bsdnow.tv
  • A special thanks to our viewer Lars for writing most of today’s tutorial and sending it in
  • Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv
  • If you want to come on for an interview or have a tutorial you’d like to see, let us know
  • Watch live Wednesdays at 2:00PM Eastern (18:00 UTC)

The post Devious Methods | BSD Now 42 first appeared on Jupiter Broadcasting.

]]>
Narrative of Negligence | Unfilter 92 https://original.jupiterbroadcasting.net/54852/narrative-of-negligence-unfilter-92/ Wed, 09 Apr 2014 21:14:23 +0000 https://original.jupiterbroadcasting.net/?p=54852 We update you on several big stories, plus our thoughts on Mozilla’s CEO stepping down, XP coming to an end, and more!

The post Narrative of Negligence | Unfilter 92 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

We update you on several big stories we’ve been following this week in this causal supporter show style edition of Unfilter. Plus our thoughts on Mozilla’s CEO stepping down, XP coming to an end, and more!

Direct Download:

Video | MP3 Audio | OGG Audio | Torrent | YouTube

RSS Feeds:

Video Feed | MP3 Feed | OGG Feed | HD Torrent | Mobile Torrent | iTunes

Become an Unfilter Supporter:

— Show Notes —

NSA is Crazy

Edward Snowden: US government spied on human rights workers

The US has spied on the staff of prominent human rights organisations, Edward Snowden has told the Council of Europe in Strasbourg, Europe’s top human rights body.

Giving evidence via a videolink from Moscow, Snowden said the National Security Agency – for which he worked as a contractor – had deliberately snooped on bodies like Amnesty International and Human Rights Watch.

Snowden, meanwhile, dismissed NSA claims that he had swiped as many as 1.7m documents from the agency’s servers in an interview with Vanity Fair.

He described the number released by investigators as “simply a scare number based on an intentionally crude metric: everything that I ever digitally interacted with in my career.”
He added: “Look at the language officials use in sworn testimony about these records: ‘could have,’ ‘may have,’ ‘potentially.’ They’re prevaricating. Every single one of those officials knows I don’t have 1.7m files, but what are they going to say? What senior official is going to go in front of Congress and say, ‘We have no idea what he has, because the NSA’s auditing of systems holding hundreds of millions of Americans’ data is so negligent that any high-school dropout can walk out the door with it’?”

In the Vanity Fair interview the whistleblower said he paid the bill in the Mira Hotel using his own credit card because he wanted to demonstrate he was not working for a foreign intelligence agency. “My hope was that avoiding ambiguity would prevent spy accusations and create more room for reasonable debate,” he told the magazine. “Unfortunately, a few of the less responsible members of Congress embraced the spy charges for political reasons, as they still do to this day.”

– Thanks for Supporting Unfilter –

  • :-] Charles R
  • :-] Tom F
  • :-] Daniel G
  • :-] Kalidasia Media Productions, LLC
  • :-] Lotusware of North America
  • :-] Wes M
  • :-] Edward R
Thanks to our 375 Unfilter supporters!
  • Supporter perk: Downloadable Pre and Post show. Extra clips, music, hijinks, and off the cuff comments. The ultimate Unfiltered experience. ‘

  • Supporter perk: Exclusive BitTorrent Sync share of our production and non-production clips, notes, and more since the NSA scandal broke in episode 54. The ultimate Unfiltered experience, just got more ultimate.

  • Supporter Perk: Past 5 supporters shows, in a dedicated bittorrent sync folder.


CIA Torture Scandal Marches On

Fury at attack on Dianne Feinstein by ex-CIA director Michael Hayden

The latest row broke on Sunday when Hayden, a former NSA and CIA director, said the Senate intelligence committee’s landmark report on torture and coercive interrogations was not objective because Feinstein, a California Democrat, was too “emotional”.

Ron Wyden, a member of the Senate intelligence committee, said on Monday that Michael Hayden’s attack on Feinstein, the committee chairperson, was “outrageous” and fitted a pattern of “misleading” the American public.


Check out + SomaFM: Listener Supported, Commercial Free Internet Radio

We need your donations to keep SomaFM on the air.
We still need to raise $27,641 this month (or $1,320 a day for the next 21 days) to meet our monthly budget. Thank you!!

If you’re a Supporter check your inbox!

Call us: 1.425.312.1756

Follow the Us:

The post Narrative of Negligence | Unfilter 92 first appeared on Jupiter Broadcasting.

]]>
Cyber Cold War | Unfilter 38 https://original.jupiterbroadcasting.net/32147/cyber-cold-war-unfilter-38/ Wed, 20 Feb 2013 22:50:52 +0000 https://original.jupiterbroadcasting.net/?p=32147 A clandestine Chinese military unit has conducted sophisticated cyber espionage operations against hundeds of companies, we dig to the bottom of this story.

The post Cyber Cold War | Unfilter 38 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

A clandestine Chinese military unit has conducted sophisticated cyber espionage operations against dozens of American and Canadian companies, we dig to the bottom of this story and share our insights.

A 75 year old Soybean farmer is fighting Monsanto all the way to the US Supreme court, but things are not looking good for the farmer.

Then it’s our first review of the blockbuster show politicians are gearing up for, the Horse Meat Scandal Trots Along, and how the media attacked video games again this week.

Plus your feedback, and much much more on this week’s Unfilter.

Direct Download:

HD Video | Mobile Video | MP3 Audio | OGG Audio | Torrent | YouTube

RSS Feeds:

HD Feed | Mobile Feed | MP3 Feed | OGG Feed | HD Torrent | Mobile Torrent | iTunes

Become an Unfilter Supporter:

\"\"

Thanks for Supporting Unfilter:

  • Caspar
  • Austin

  • Thanks to our 27 Unfilter supporters!

  • New supporter perk: Downloadable Pre and Post show. Extra clips, music, hijinks, and off the cuff comments. The ultimate Unfiltered experience.

A spot buy meant to take advantage of the big deliveries for a breaking news story like the Fukushima Daiichi nuclear power plant disaster in Japan won\’t necessarily be as comfortable a fit as a :30 that airs during a space shuttle launch or ticker-tape parade, but CNN will still sell it at a premium.


— Soybean Farmers Monsanto Lawsuit Reaches US Supreme Court —

Supreme Court justices suggest they would agree with Monsanto that its patent protection covers not just the first planting but also seeds generated later.

\”Without the ability to limit reproduction of soybeans containing this patented trait,\” he said, \”Monsanto could not have commercialized its invention and never would have produced what is, by now, the most popular agricultural technology in America.\”


— Horse Meat Labelled as Beef Scandal Trots Along —

First centered on Britain and Ireland, the scandal over beef products adulterated with horse meat escalated across Continental Europe on Tuesday after Nestlé, one of the world’s best-known food companies, said it was removing pasta meals from store shelves in Italy and Spain.


— The so Called Sequester Battle —

With just a little over a week to avert them, it appears increasingly likely the $1.2 trillion in so-called sequester cuts will go into effect.

Unofficially, many members of Congress are betting that a few weeks into the automatic spending cuts, Democratic and Republican leaders will get serious about negotiating a replacement to the sequestration and the $85 billion in spending cuts will not have had time to really bite.


— US Businesses Under Sustained CYBER ATTACK!!oneone!! —

The report by computer security firm Mandiant Corp. in Alexandria, Va., breaks new ground by attributing attacks against 141 companies to a specific 12-story office building in the financial center of Shanghai.

Shanghai security officers chase a CNN crew attempting to record a building at the center of hacking allegations

Chinese officials have insisted in recent years that China is one of the biggest targets of cyberattacks.

\”Statistics show that Chinese military terminals connected to the Internet have been subjected to large numbers of attacks from abroad,\” the defense ministry said Wednesday, adding that Internet protocol addresses \”indicate that a considerable number of these attacks are from the United States, but we have never used this as a reason to accuse the United States.\”

\”Every country should handle the problem of cybersecurity in a professional and responsible manner,\” the ministry said.

A look at Mandiant, allegations on China hacking – SFGate

  • Headquartered in Alexandria, Va., Mandiant was started in 2004 by Kevin Mandia, a retired Air Force officer who carved out a lucrative niche investigating computer crimes.

  • Mandiant was most recently noted for its work in helping The New York Times trace an attack on its employees\’ computers to China, following a Times investigation into China\’s Premier Wen Jiabao. The newspaper publicly acknowledged Mandiant\’s role in the case.

  • Mandiant alleges that it has traced a massive hacking campaign on U.S. businesses to a drab, white 12-story office building outside Shanghai run by \”Unit 61398\” of the People\’s Liberation Army. The report contains some of the most extensive and detailed accusations on China\’s cybersnooping publicly available, including a timeline and details of malware used.

  • Mandiant has an obvious commercial interest in releasing the information, too. The company said its existing customers were already warned about and protected against the techniques it discovered, and it offered a free software tool to companies and organizations to detect suspicious activity. It puts Mandiant front-and-center at a critical time on a national debate about cybersecurity.

  • Its founder testified earlier this month to the House Intelligence Committee on hacking threats.

  • Read the full report PDF

  • U.S. Govt: Cyberattacks a \’Substantial\’ Concern – YouTube


— Adam Lanza Reportedly Used Violent Video Games to Hone Killing Skills —

A blacked-out gaming room helped Newtown, Conn., shooter Adam Lanza descend into his own world, CBS News senior correspondent John Miller, a former FBI assistant director, said on \”CBS This Morning.\”

\”During an ongoing criminal investigation, we do not release bits and pieces of a case, we simply don\’t do it so anyone that sees any information that indicates that it is associated with this case, and see \”sources,\” being the source of information, should be take a step back,\” said Lt. Vance.


— US General Allen retires —

The American general tipped to become the next head of NATO has decided instead to retire. The decision came after a scandal linking him to inappropriate emails to a woman. General John Allen was nominated for the job after running the war in Afghanistan for 19 months.


Feedback:

Call us: 1.425.312.1756

Follow the Us:

The post Cyber Cold War | Unfilter 38 first appeared on Jupiter Broadcasting.

]]>
Obama’s Dronegeddon | Unfilter 19 https://original.jupiterbroadcasting.net/25221/obamas-dronegeddon-unfilter-19/ Thu, 27 Sep 2012 21:24:09 +0000 https://original.jupiterbroadcasting.net/?p=25221 A major new report on the secret US drone war in Pakistan says the attacks have killed far more civilians than acknowledged, and undermined international law.

The post Obama's Dronegeddon | Unfilter 19 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

A major new report on the secret US drone war in Pakistan says the attacks have killed far more civilians than acknowledged, traumatized a nation, and undermined international law. Stay tuned for the full details, and our thoughts.

From the headlines we’ll introduce you to what the media’s wants you to be scared about this fall season, the violent protests in Spain this week, and why a Brazilian judge has ordered the arrest Google\’s head of operations.

PLUS: Many of you have written in with some hard questions about the media’s coverage of the presidential candidates, or better put, who they refuse to cover. It’s your feedback, and our follow up.

All that and a lot more on this week’s Unfilter.

Direct Download:

HD Video | Mobile Video | MP3 Audio | OGG Audio | Torrent | YouTube

RSS Feeds:

HD Feed | Mobile Feed | MP3 Feed | OGG Feed | HD Torrent | Mobile Torrent | iTunes

Get Unfilter on your Android:

Browser Affiliate Extension:

  • Jupiter Broadcasting Affiliate Extensions for Chrome and Firefox

Show Notes:

ACT ONE:

ACT TWO: Living Under Drones

This report is the result of nine months of research by the International Human Rights
and Conflict Resolution Clinic of Stanford Law School (Stanford Clinic) and the Global
Justice Clinic at New York University School of Law (NYU Clinic).

In December 2011, Reprieve, a charity based in the United Kingdom, contacted the
Stanford Clinic to ask whether it would be interested in conducting independent
investigations into whether, and to what extent, drone strikes in Pakistan conformed to
international law and caused harm and/or injury to civilians. The Stanford Clinic agreed
to undertake independent fact-finding and analysis on these questions, as well as others
related to drone strikes and targeted killings in Pakistan, beginning in December 2011.
Later, the NYU Clinic agreed to join the research project and participated in the second
research trip to Pakistan, as well as in additional research, writing, and editing of this
report.

Previous Unfilter Coverage on Drones:

ACT THREE: Feedback

Follow Up

Song pick of the week:

[asa]B000W08IHA[/asa]

Follow the Team:

If you don’t already have a Dropbox account help Dan out by signing up using this link and then installing Dropbox

The post Obama's Dronegeddon | Unfilter 19 first appeared on Jupiter Broadcasting.

]]>
NASA Hacked 5,400 Times? | TechSNAP 47 https://original.jupiterbroadcasting.net/17571/nasa-hacked-5400-times-techsnap-47/ Thu, 01 Mar 2012 20:20:13 +0000 https://original.jupiterbroadcasting.net/?p=17571 NASA loses the keys to the International Space Station, Microsoft can’t figure out what day it is, and laugh over the lack of security at Stratfor.

The post NASA Hacked 5,400 Times? | TechSNAP 47 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

NASA loses the keys to the International Space Station, Microsoft can’t figure out what day it is, and I laugh myself to tears over the lack of security at Stratfor

All that and more, on this week’s TechSNAP!

Thanks to:

GoDaddy.com Use our codes TechSNAP10 to save 10% at checkout, or TechSNAP20 to save 20% on hosting!

Super special savings for TechSNAP viewers only. Get a .co domain for only $7.99 (regular $29.99, previously $17.99). Use the GoDaddy Promo Code cofeb8 before the end of March to secure your own .co domain name for the same price as a .com.

Private Registration use code: march8

Pick your code and save:
cofeb8: .co domain for $7.99
techsnap7: $7.99 .com
techsnap10: 10% off
techsnap20: 20% off 1, 2, 3 year hosting plans
techsnap40: $10 off $40
techsnap25: 25% off new Virtual DataCenter plans

   

 

Direct Download Links:

HD Video | Large Video | Mobile Video | MP3 Audio | OGG Audio | YouTube

Subscribe via RSS and iTunes:

Show Notes:

NASA laptop stolen, contained control algorithms for the International Space Station

  • In 2010 and 2011 NASA reported 5,408 computer security incidents ranging from the installation of malware on a computer, through the theft of devices and cyber attacks suspected to be from foreign intelligence agencies.
  • 47 incidents were identified as Advance Persistent Threat attacks, and of these, 13 were successful in compromising the agency’s computer systems
  • In an example of such an incident, attackers from Chinese-based IP addresses gained full access to a number of key JPL systems giving them the ability to:
  • Modify, copy or delete sensitive files
  • Add, modify or delete user accounts for mission critical systems
  • Upload hacking tools (keyloggers, rootkits) to steal user credentials and thereby compromise other NASA systems
  • Modify or corrupt the system logs to conceal their actions
  • Some of the breaches have resulted in the unauthorized release of Personally Identifiable Information, the disclosure of sensitive export-controlled data and 3rd party intellectual property
  • Inspector General Testimony before Congress re: IT Security
  • Discovery News Coverage

Windows Azure suffers worldwide outage

  • The Microsoft Azure Cloud service was down for most of the day on February 29th
  • The Service Management system was down for over 9 hours
  • Azure Data Sync was down form 2012–02–29 08:00 through 2012–03–01 03:00 UTC
  • Microsoft says that the outage appears to have been caused by a leap year bug
  • “28 February, 2012 at 5:45 PM PST Windows Azure operations became aware of an issue impacting the compute service in a number of regions,”
  • “While final root cause analysis is in progress, this issue appears to be due to a time calculation that was incorrect for the leap year.”
  • Microsoft Azure Service Dashboard
  • The outage also effected the UK Government’s ‘G-Cloud’ CloudStore
  • TechWeek Europe Coverage
  • Slashdot Coverage – Outage Root Cause
  • PCWorld – Previous Microsoft problems with Leap Years

Wikileaks releases the data stolen in the StratFor compromise


Feedback:

Q: Robert Bishop Writes: Can I Secure my network with multiple NAT routers to isolate a system?

War Story:

This is a war story with a difference, as it didn’t involve some crazy user doing some bat shit crazy thing with their computer. It was simply a call to one of the tech support agents where the user wanted to know the following:

“What is the exact chemical composition of the battery in the Thinkpad 760 XD?”
“What are the recommended disposal procedures for said battery?”
“Can you tell me what would happen to the battery if it ruptured in a vacuum environment?”
“If the battery were to overheat, how volatile would the liquid effluent be?”

I doubt the user could have even gotten the questions out and taken a breath before the agent put them on hold and ran for help. The agent walked over to the second level support area rather than call as per procedure. After a good five minutes of talking, nobody could really answer the questions and worse, we couldn’t figure out what part of the company might actually have those answers.

As with all good tech support strategies we decided a two pronged approach – the agent would get back on with the user and stall for time while the rest of us would frantically hunt down any possible source of information that could help. We told the agent to ask why the user needed such detailed information and if it was a weak answer to push for a callback to buy even more time.

Some twenty minutes later the agent came back over to us with some interesting details on what was going on. It was all a misunderstanding. The user was supposed to call some private support number at IBM and not the public number. Our enterprising young agent did pull a fast one and offer to transfer the user to the number directly. The user provided the number and the agent promptly connected the call, then hit mute and stayed on the line. An American accent answered, the user responded and provided an account code upon request.

The tech on the private number acknowledged that the user was calling from NASA – Blackhawk Technologies Subsidiary. Apparently the shuttle program had 4 of those laptops on each mission – 1 primary and 3 redundant backups just in case. Suddenly the tricky questions all made sense. And eavesdropping can kill curiosity can never be a bad thing, right?

Round Up:

The post NASA Hacked 5,400 Times? | TechSNAP 47 first appeared on Jupiter Broadcasting.

]]> Back to School | STOked 91 https://original.jupiterbroadcasting.net/10577/back-to-school-stoked-91/ Mon, 25 Jul 2011 21:20:15 +0000 https://original.jupiterbroadcasting.net/?p=10577 Cryptic has launched Starfleet Academy, and we’ve got no choice but to geek out in some major ways about their take on this iconic environment.

The post Back to School | STOked 91 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

We’re back! During our week off, Cryptic surprised us with a direct-to-Holodeck launch of Starfleet Academy, and we’ve got no choice but to geek out in some major ways about their take on this iconic environment. We also have in-game shots of the Enterprise-F, now called an Odyssey Class Cruiser, and you know the ship geeks have to make their final opinions heard.

Before we jump into a brand new Community Feedback, there’s also the July Engineering Report to review, and OH BROTHER it’s got some juicy teases about future content that’ve got our brain juices pumping. Tune in to hear our thoughts!

Direct Download Links

HD Video | Large Video | Mobile Video | MP3 Audio | OGG Audio | YouTube

Subscribe via RSS and iTunes:

Our STOked App:

STOked App Grab the STOked iPhone/iPod App and download STOked on the go!

[ad#shownotes]

Show Notes:

NEWS

Foundry re-opened…

  • … with issues … still no editing capabilities
  • AUTHORS: If your mission is broken, go HERE
  • There’s also a bug on Tribble where C-Store unlocks are linked to Foundry building assets – it will be corrected, these should not be locked for those that haven’t purchased them

Ent F Dev Diary

  • The FINAL design, revealed at last… hear our thoughts!
  • Odyssey Class (how many times will that be spelled wrong?)
  • Daniel Stahl – an “official blogger” for StarTrek.com
  • Action Shots

Starfleet Academy

  • OMG!
  • Accolade + Title for reading all of the plaques (which are references to episodes and movies)
  • Fleetmates showed me a way to get “out of bounds” where I went running on the waves and climbing to the tops of buildings.
  • Cadet Uniforms walkin’ around
  • Shuttle traffic, nice touch
  • Mission replay accessible from Holodecks (but, it’d be nice to be able to ‘launch’ the mission)
  • They nailed the look that we saw in Voyager Season 5 Episode 4 – In the Flesh.

Engineering Report

  • I enjoy this bullet point: “Lots of tickets from Season 4 launch” … heh
  • The first open zone ground combat area (Invasion zone)
  • Trivia and Lore missions for Social Zones
  • 6 new end-game gear sets (3 space, 3 ground)
  • Moving kit/armor options to Tailor
  • Combining all marks (etc) into a single scaling Emblem currency
  • C-Store / Emblem trading
  • “One Sector Map To Rule Them All” (in discussion for S5)

Tweet Leaks!

Special Edition : Borg/Academy

COMMUNITY FEEDBACK

Vote in our Poll: https://poll.fm/34qol


If you have any additional comments, please leave them ON THIS PAGE!

The post Back to School | STOked 91 first appeared on Jupiter Broadcasting.

]]> Podcaster Summit Highlights | STOked 80 https://original.jupiterbroadcasting.net/7742/sto-podcaster-summit/ Tue, 03 May 2011 06:13:43 +0000 https://original.jupiterbroadcasting.net/?p=7742 It’s a break from our regularly scheduled STOked this week, and we’ve got the some of the best moments from the recent STO Podcasters Summit.

The post Podcaster Summit Highlights | STOked 80 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

It’s a break from our regularly scheduled STOked this week, and we’ve got the some of the best moments from the recent STO Podcasters Summit.

Plus Murphy joins us for a new Community feedback segment, and shares his personal inspirations for his Foundry missions!

Direct Download Links

HD Video | Large Video | Mobile Video | MP3 Audio | OGG Audio | YouTube

Subscribe via RSS and iTunes:

Our STOked App:

STOked App Grab the STOked iPhone/iPod App and download STOked on the go!

Download:

The post Podcaster Summit Highlights | STOked 80 first appeared on Jupiter Broadcasting.

]]>