Rogers – Jupiter Broadcasting https://www.jupiterbroadcasting.com Open Source Entertainment, on Demand. Mon, 22 Feb 2016 02:46:59 +0000 en-US hourly 1 https://wordpress.org/?v=5.5.3 https://original.jupiterbroadcasting.net/wp-content/uploads/2019/04/cropped-favicon-32x32.png Rogers – Jupiter Broadcasting https://www.jupiterbroadcasting.com 32 32 Yemen has Fallen | Unfilter 131 https://original.jupiterbroadcasting.net/76442/yemen-has-fallen-unfilter-131/ Wed, 28 Jan 2015 23:15:13 +0000 https://original.jupiterbroadcasting.net/?p=76442 Yemen instability reveals limits of U.S. counterterrorism strategy & the warhawks are calling for boots on the ground. We report on the entire mess. Plus the conflict in Ukraine heats back up, with leaked videos reportedly showing American’s in the field. Then the ISIS videos get debunked by a “Fox expert”, a new kind of […]

The post Yemen has Fallen | Unfilter 131 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Yemen instability reveals limits of U.S. counterterrorism strategy & the warhawks are calling for boots on the ground. We report on the entire mess. Plus the conflict in Ukraine heats back up, with leaked videos reportedly showing American’s in the field.

Then the ISIS videos get debunked by a “Fox expert”, a new kind of High-Note & more!

Direct Download:

Video | MP3 Audio | OGG Audio | Torrent | YouTube

RSS Feeds:

Video Feed | MP3 Feed | OGG Feed | HD Torrent | Mobile Torrent | iTunes

Become an Unfilter supporter on Patreon:

Foo

Show Notes:

News

Experts say ISIS ransom clip faked as deadline for Japanese hostages passes | Fox News

The hostage video showing the hostages wearing orange jump suits and kneeling before a masked, black-clad jihadist may have been faked, experts said. New analysis of the video appears to reveal the message was shot indoors using a “green screen,” and a phony backdrop, according to Veryan Khan, editorial director for the Terrorism Research and Analysis Consortium. She told The Associated Press the light source on the men in the latest videos appears to be coming from two different directions — as opposed to one bright sun, and said if the video was made outdoors in natural light, the shadows behind them should be going in one direction. Instead, they converge.

“The hostages are visibly bothered by” the bright light, she said.

Meet Loretta Lynch

Loretta Lynch Favorite Suit

Loretta Lynch__, President Obama’s nominee for attorney general, pledged on Wednesday to bolster the Justice Department’s cybersecurity work if she is confirmed by the Senate.

“All of us are struck by the prevalence of cyber issues in every type of case we prosecute now,” Lynch said during her confirmation hearing with the Senate Judiciary Committee.

Yemen Houthi Coup

Where is Yemen

“We have got to have boots on the ground. We have got to have training capability,” said McCain. “We need more boots on the ground. I know that’s a tough thing to say, and a tough thing for Americans to swallow, but it doesn’t mean the 82nd airborne.”


Feinstein said Obama is in a difficult position because “the American people don’t want another war.”

“Where McCain is right, is that we need some special operations in these countries, on the ground, more than just advisors,” she said.

The Obama administration has been forced to suspend certain counterterrorism operations with Yemen in the aftermath of the collapse of its government, according to U.S. officials, a move that eases pressure on al-Qaeda’s most dangerous franchise.

Yet the collapse of the Yemeni government Thursday has raised doubts about the efficacy of a “light footprint” counterterrorism strategy, in no small part because the power vacuum creates an opening for al Qaeda in the Arabian Peninsula (AQAP), the Gulf-based Islamic militant group that has been behind plots in the U.S. and other Western nations.

January – The Houthis reject the draft of a new constitution proposed by the government. They seize state TV and clash with troops in the capital, in what the government called a coup attempt.

President Hadi and his government resign in protest at the takeover by Houthi rebels of the capital.

US “FIGHTING”TERROR GROUP WITH FICTIONAL LEADERS

al-Baghdadi

In 2007, the New York Times revealed that long-vilified “Islamic State” leader Abdullah Rashid al-Baghdadi did not exist, and that the creation of this fictional character was a ruse to obfuscate the role of foreigners in the creation and perpetuation of “Al Qaeda in Iraq.”

Ukraine

Ukraine Pipline Map

After Brief Respite, Conflict In Ukraine Flares Back Up

The war in eastern Ukraine seems to have restarted. Russian-backed militias have launched an offensive on several fronts. NATO says that Russian troops are now openly taking part in the assault, providing heavy weapons and advanced technology to the militias. President Obama says the U.S. is considering all options short of military action, and the European Union has called a meeting of its foreign ministers. We’ve been speaking with NPR’s Corey Flintoff in Kyiv. I asked him about the situation on the ground in eastern Ukraine.

High Note:

Submitted by lowfatty in the Unfilter subreddit

A small minority have covertly engineered a partial solution by pooling funds to create a private network of more than 9,000 computers with small, inexpensive but powerful hidden Wi-Fi antennas and Ethernet cables strung over streets and rooftops spanning the entire city. Disconnected from the real Internet, the network is limited, local and built with equipment commercially available around the world, with no help from any outside government, organizers say.

Hundreds are online at any moment pretending to be orcs or U.S. soldiers in multiplayer online games such as “World of Warcraft” or “Call of Duty.” They trade jokes and photos in chat rooms and organize real-world events like house parties or trips to the beach.

“We really need Internet because there’s so much information online, but at least this satisfies you a little bit because you feel like, `I’m connected with a bunch of people, talking to them, sharing files,” said Rafael Antonio Broche Moreno, a 22-year-old electrical engineer who helped build the network known as SNet, short for streetnet.

The post Yemen has Fallen | Unfilter 131 first appeared on Jupiter Broadcasting.

]]>
Back in Iraq | Unfilter 102 https://original.jupiterbroadcasting.net/60227/back-in-iraq-unfilter-102/ Wed, 18 Jun 2014 21:43:35 +0000 https://original.jupiterbroadcasting.net/?p=60227 The US is sending troops and equipment back to Iraq, we’ll explain why were getting involved, who ISIS is, and the possible impact the conflict could have. Plus Mike Rogers makes the case for ISP level filtering, and a look at the economics of cannabis investment. Direct Download: Video | MP3 Audio | OGG Audio […]

The post Back in Iraq | Unfilter 102 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

The US is sending troops and equipment back to Iraq, we’ll explain why were getting involved, who ISIS is, and the possible impact the conflict could have.

Plus Mike Rogers makes the case for ISP level filtering, and a look at the economics of cannabis investment.

Direct Download:

Video | MP3 Audio | OGG Audio | Torrent | YouTube

RSS Feeds:

Video Feed | MP3 Feed | OGG Feed | HD Torrent | Mobile Torrent | iTunes

Become an Unfilter supporter on Patreon:

\"Foo\"

— Show Notes —

The Slow Death of Privacy

Mike Rogers Says Google Is Unpatriotic For Not Wanting NSA To Spy On Its Users

Broadcast live streaming video on Ustream

This past Wednesday, the CIA held its first ever Conference on National Security at Georgetown University

While I\’m on my soapbox, we should be really mad at Google and Facebook and Microsoft, because they\’re doing a very interesting, and I think, very dangerous thing. They\’ve decided to come out and say \”we oppose this new FISA bill, because it doesn\’t go far enough.\” And when you peel that onion back a bit and say \”Why are you doing this? This is a good bill, it\’s safe, it\’s bi-partisan, it\’s rational. It meets all the requirements for 4th Amendment protections and privacy protection and allowing the system to work.\”

And they say, \”Well, we have to do this because we\’re trying to make sure we don\’t lose our European business.\” I don\’t know about the rest of you but that offends me from the words \”European business.\” Think about what they\’re doing. They\’re willing to, in their mind, justify the importance of their next quarter\’s earnings in Europe versus the national security of the United States. Everybody on those boards should be embarrassed and their CEOs should be embarrassed and their stockholders should be embarrassed. That one quarter cannot be worth the national security of the United States for the next ten generations.\”

\"Mike

The House intelligence chairman charged that by opposing the House version of the USA Freedom Act and calling for more limits on surveillance the American firms are putting their profits ahead of their loyalty to the United States.

NSA Turned Germany Into Its Largest Listening Post in Europe – The Intercept

\"der-spiegel\"/

The story reveals that the NSA\’s key facilities in Germany include Building 4009 at the \”Storage Station\” on Ludwig Wolker Street in Wiesbaden, which is in the southwest of the country. Officially known as the European Technical Center, the facility is the NSA\’s \”primary communications hub\” in Europe, intercepting huge amounts of data and forwarding it to \”NSAers, warfighters and foreign partners in Europe, Africa and the Middle East,\” according to the documents.

Spiegel also reports that an even larger NSA facility is under construction three miles away, in the Clay Kaserne, which is a U.S. military complex. Called the Consolidated Intelligence Center, the facility will cost $124 million once it is completed, and will house data-monitoring specialists from the Storage Station.

cryptome.org counting total Snowden doc releases: 42 Years for Snowden Docs Release, Free All Now

— Thanks for Supporting Unfilter —

Become an Unfilter supporter on Patreon

\"Foo\"

  • Unfilter Episode 100 Shirt! | Teespring

  • Thanks to our 281 patrons

  • Supporter perk: Downloadable Pre and Post show. Extra clips, music, hijinks, and off the cuff comments. The ultimate Unfiltered experience. ‘

  • Supporter perk: Exclusive BitTorrent Sync share of our production and non-production clips, notes, and more since the NSA scandal broke in episode 54. The ultimate Unfiltered experience, just got more ultimate.

  • Supporter Perk: Past 5 supporters shows, in a dedicated bittorrent sync folder.


Back to Iraq

\"iraq

Obama announces 275 troops to deploy to Iraq for embassy security in Baghdad

\"Troops

US President Barack Obama has announced 275 US troops will be deployed to Iraq to provide security for the US Embassy in Baghdad as Sunni insurgents continue to test the nation\’s security forces in its push closer to the capital.

\”This force is deploying for the purpose of protecting U.S.
citizens and property, if necessary, and is equipped for
combat,\”
Obama said in a letter sent to House and Senate
leaders.\”This force will remain in Iraq until the security
situation becomes such that it is no longer needed.\”

Gunmen Attack North of Baghdad as Obama Weighs Options for Iraq – Bloomberg

\"ISIS

Islamist militants in Iraq fought with the army in a town near Baghdad and with Kurds in the oil-rich province of Kirkuk, as the U.S. weighed options to stem an offensive that threatens to fracture the country.

ISIS\’ half-a-billion-dollar bank heist makes it world\’s richest terror group

\"Members

The al-Qaeda splinter grouping made off with £256 million in cash and a
large amount of gold bullion from Mosul\’s central bank during its takeover
of the city.

How Iraq became unstable

\"imgurlArea

P.J. Crowley and Bill Kristol debate underlying mistakes and missteps that led to rise of terrorist group ISIS.

Tony Blair Bears \’Total Responsibility\’ For Isis, Says Academic Who Advised Him On Iraq

There is \”absolutely\” a link between the invasion of Iraq and the rise of terror group Isis, for which Tony Blair bears \”total responsibility\”, says a leading academic who advised the then prime minister in the run-up to the war.

ISIS Stunner: Terrorist Organization\’s Annual Reports Unveiled; Reveal Full \”Investment Highlights\” | Zero Hedge

\"ISIS

In conclusion: ISIS has the balance sheet, it also has the cash flow, it has the weapons inventory, the property, refinery plants and bomb equipment, and the terrorist churn. It also has a glossy 410 page annual report for the Terrorist Fiscal Year Ended 2013 (which at more than double the pages of the 2012 report means business has never been better).

Sen. Lindsey Graham: Next 9/11 attack could come from Iraq and Syria

\"lindsey

Sen. Lindsey Graham, R-S.C., warned that the next 9/11 attack could emanate from Iraq and Syria if the U.S. does not take steps to immediately halt the advance of the Islamic militants sweeping toward the Iraqi capital of Baghdad.

Wait, John McCain and Lindsey Graham are at odds? Yes — on Iran and Iraq.

\"Sen.

Pick your favorite foreign policy debate and odds are hawkish Republican Sens. John McCain (Ariz.) and Lindsey Graham (S.C.) will be on the same side. Not so when it comes to the escalating situation in Iraq.

McCain on Monday warned sharply against the idea of collaborating with Iran to help the Iraqi government push back against radical Islamist fighters who have swept through the northern part of the country; Graham signaled openness to the idea a day earlier.

Iraq formally asks US to launch air strikes against rebels

\”We have a request from the Iraqi government for air power,\” confirmed top US military commander Gen Martin Dempsey in front of US senators.

A Petro-Sectarian Map Of The Middle East

  • Iraq Oil Pipelines

\"ZeroHedge


Weed Wackers:

Canadians Invent Weed Breathalyzer

\"Cannabix

But now, a pair of Canadian scientists have developed the \”Cannabix breathalyzer\” that detects pot use only within the last few hours. It could soon help cops catch stoned drivers on the road.

Clinton opens up about marijuana views

\"Clinton

Hillary Clinton answers questions from CNN\’s Christiane Amanpour during a town hall event.

Marijuana investors, entrepreneurs gather at Denver\’s Cannabis Capital Summit

\"Denver\'s

Troy Dayton, CEO of The ArcView Group, which provides angel investments for the cannabis industry, kicked off the summit Thursday morning with a rousing keynote speech about how far the industry has come in recent years and the huge potential for growth in the future.

Dayton, who said his group has raised $10 million already for cannabis investments this year, said the national legal marijuana market (both medical and recreational) will grow from a $1.5 billion industry in 2013 to about $2.6 billion this year — a nearly 70 percent increase.


If you’re a Supporter check your inbox!

Call us: 1.425.312.1756

Follow the Us:

The post Back in Iraq | Unfilter 102 first appeared on Jupiter Broadcasting.

]]>
Snowdens Story | Unfilter 99 https://original.jupiterbroadcasting.net/58432/snowdens-story-unfilter-99/ Wed, 28 May 2014 21:46:40 +0000 https://original.jupiterbroadcasting.net/?p=58432 Edward Snowden has once again captured the attention of the media. False claims, and ridiculous rhetoric are in full force, and we’ll cut through the crap. Plus: What we suspect is going on with TrueCrypt, Greenwald claims he’s ready to disclose names of the NSA’s targets, the big changes in Afghanistan, and why the director […]

The post Snowdens Story | Unfilter 99 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Edward Snowden has once again captured the attention of the media. False claims, and ridiculous rhetoric are in full force, and we’ll cut through the crap.

Plus: What we suspect is going on with TrueCrypt, Greenwald claims he’s ready to disclose names of the NSA’s targets, the big changes in Afghanistan, and why the director of FBI wants to hire pot smokers.

Direct Download:

Video | MP3 Audio | OGG Audio | Torrent | YouTube

RSS Feeds:

Video Feed | MP3 Feed | OGG Feed | HD Torrent | Mobile Torrent | iTunes

Become an Unfilter supporter on Patreon:

\"Foo\"

— Show Notes —

NSA is Crazy

TrueCrypt Hacked?

\"TrueCrypt

  • The binary on the website is capable only to decode encrypted data, not encode, and may contain trojan (although I didn\’t find any, but don\’t believe me). The binary is signed with the valid (usual) key. All old versions are wiped, the repository is wiped too.

\"TrueCrypt


Assumption #1 The website is presumed hacked, the keys are presumed compromised. Please do not download or run it. And please don\’t switch to bitlocker.

Latest working version is 7.1a. Version 7.2 is a hoax

  • On the SourceForge, the keys were changed before any TrueCrypt files uploaded, but now they are deleted and the old keys got reverted back.

Why I think so: strange key change, DNS record changed, why bitlocker?


Assumption #2 Something bad happened to TrueCrypt developers (i.e. take down or death) or to TrueCrypt itself (i.e. found the worst vulnerability ever) which made them do such a thing. So this version is legit

Why I think so: all files are with valid signatures, all the releases are available (Windows; Linux x86, x86_64, console versions, Mac OS, sources), the binaries seems like was built on the usual developer PC (there are some paths like c:\\truecrypt-7.2\\driver\\obj_driver_release\\i386\\truecrypt.pdb, which were the same for 7.1a).


  • SourceForge sent emails on 22 May, they said they changed password algorithms and everybody should change their passwords.

  • TrueCrypt developers are unknown and currently there is no way to know who is who and who should we listen to.

  • From wikileaks twitter https://twitter.com/wikileaks/status/471769936038461440:

(1/4) Truecrypt has released an update saying that it is insecure and development has been terminated https://truecrypt.sf.net

(2/4) the style of the announcement is very odd; however we believe it is likely to be legitimate and not a simple defacement

(3/4) the new executable contains the same message and is cryptographically signed. We believe that there is either a power conflict..

(4/4) in the dev team or psychological issues, coersion of some form, or a hacker with access to site and keys.

@SteveBellovin @mattblaze @0xdaeda1a I think this is legit.

\"Eds

After wrapping up my presentation, Snowden connected his laptop to the projector and began talking about using the TrueCrypt software for encrypting hard drives and USB sticks on Macs, Linux and Windows. He pointed out that while the only known name associated with TrueCrypt is someone in the Czech Republic, TrueCrypt is one of the best open-source solutions available.

Snowden continued with TrueCrypt\’s _\”hidden volumes\”, a feature that divides your encrypted storage into separate \”volumes\” with separate passwords. If you are coerced by authorities into revealing the password for your \”encrypted storage\” you need only reveal the password for the volume with the least incriminating content — one containing pictures of cats, maybe?_

The Lies Mike Rogers Told Congress About The USA Freedom Act

\"Rogers

One of the most obvious ways that you knew the USA Freedom Act that passed out of the House yesterday was clearly not real NSA reform was the simple fact that the NSA #1 defender in chief, Rep. Mike Rogers, not only voted for it, but spoke strongly in favor of it on the House floor.

\"Brian

\”I was trained as a spy in sort of the traditional sense of the word — in that I lived and worked undercover, overseas, pretending to work in a job that I\’m not — and even being assigned a name that was not mine,\” Snowden said.

Kerry: Snowden a \”Coward\” and \”Traitor\” ](https://www.nbcnews.com/politics/first-read/kerry-snowden-coward-traitor-n116366)

“Edward Snowden is a coward, he is a traitor and he has betrayed his country,” Kerry said in an interview on MSNBC’s “The Daily Rundown” with Chuck Todd. “And if he wants to come home tomorrow to face the music, he can do so.”

\”If this man is a patriot, he should stay in the United States and make his case,\” he said. \”Patriots don\’t go to Russia, they don\’t seek asylum in Cuba, they don\’t seek asylum in Venezuela, they fight their cause here.\”

cryptome.org counting total Snowden doc releases: 42 Years for Snowden Docs Release, Free All Now

— Thanks for Supporting Unfilter —

Become an Unfilter supporter on Patreon

\"Foo\"

  • Thanks to our 188 patrons, we gained 62 since last week!

  • Supporter perk: Downloadable Pre and Post show. Extra clips, music, hijinks, and off the cuff comments. The ultimate Unfiltered experience. ‘

  • Supporter perk: Exclusive BitTorrent Sync share of our production and non-production clips, notes, and more since the NSA scandal broke in episode 54. The ultimate Unfiltered experience, just got more ultimate.

  • Supporter Perk: Past 5 supporters shows, in a dedicated bittorrent sync folder.


Afghanistan Late Pullout

White House mistakenly identifies CIA chief in Afghanistan

The CIA\’s top officer in Kabul was exposed Saturday by the White House when his name was inadvertently included on a list provided to news organizations of senior U.S. officials participating in President Obama\’s surprise visit with U.S. troops.

The Post is withholding the name of the CIA officer at the request of Obama administration officials who warned that the officer and his family could be at risk if the name were published. The CIA and the White House declined to comment.

White House: U.S. will have 9,800 troops in Afghanistan after 2014

The U.S. will leave 9,800 troops in the country in 2015 with two narrow missions, according to the White House: continue supporting Afghan forces, who took the lead ins securing the country last year, and continuing to support counter terrorism operations against the remnants of al Qaeda.


Weed Wackers:

Comey: FBI ‘Grappling’ With Hiring Policy Concerning Marijuana

\"FBI

Congress has authorized the FBI to add 2,000 personnel to its rolls this year, and many of those new recruits will be assigned to tackle cyber crimes, a growing priority for the agency. And that\’s a problem, Mr. Comey told the White Collar Crime Institute, an annual conference held at the New York City Bar Association in Manhattan. A lot of the nation\’s top computer programmers and hacking gurus are also fond of marijuana.

\”I have to hire a great work force to compete with those cyber criminals and some of those kids want to smoke weed on the way to the interview,\” Mr. Comey said.

Mr. Comey said that the agency was \”grappling with the question right now\” of how to amend the agency\’s marijuana policies, which excludes from consideration anyone who has smoked marijuana in the previous three years, according to the FBI\’s Web site. One conference goer asked Mr. Comey about a friend who had shied away from applying because of the policy. \”He should go ahead and apply,\” despite the marijuana use, Mr. Comey said.

The FBI Says It Can\’t Find Hackers to Hire Because They All Smoke Pot

After being chastised for his comments about marijuana by Senator Jeff Sessions (R-Ala.), FBI director Comey told those in attendance at a senate hearing on the bureau\’s oversight that he was just kidding.


If you’re a Supporter check your inbox!

Call us: 1.425.312.1756

Follow the Us:

The post Snowdens Story | Unfilter 99 first appeared on Jupiter Broadcasting.

]]>
Olympic Fear Games | Unfilter 84 https://original.jupiterbroadcasting.net/51037/olympic-fear-games-unfilter-84/ Wed, 05 Feb 2014 21:47:22 +0000 https://original.jupiterbroadcasting.net/?p=51037 The Winter Propaganda Games are in full force, ramping up before the actual games begin and the media would have you believe the Olympics are taking place in the middle of a war zone.

The post Olympic Fear Games | Unfilter 84 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

The Winter Propaganda Games are in full force, ramping up before the actual games begin and the media working in hand with egomaniac politicians would have you believe the Olympics are taking place in the middle of a war zone.

Then the GCHQ, the NSA, and the Canadian spy agencies spend some more time in the light, as new revelations have come out. We’ll bring you up to date.

Plus an update from across the pond, our follow up, and much much more.

On this week’s episode of, Unfilter.

Direct Download:

Video | MP3 Audio | OGG Audio | Torrent | YouTube

RSS Feeds:

Video Feed | MP3 Feed | OGG Feed | HD Torrent | Mobile Torrent | iTunes

Become an Unfilter Supporter:

— Show Notes —


NSA is Crazy

Rogers, who today runs the Navy’s Fleet Cyber Command, oversees a total force of approximately 15,000 sailors and civilians – plus contractors- of which about 5,000 are specifically charged with giving the Navy the same kind of reach and flexibility in cyberspace that it has at sea.

“The network must be treated as a weapons system as we continue the fight to maintain our advantage in cyberspace, and thus across the other four war fighting domains: sea, air, land and space,” he said in a Q&A on the Feb. 2013 issue of Military Information Technology magazine, which dubbed him the “Cyberspace Warrior.”

“He was the best there was, and he was going to lead us into the cyberfuture,” said retired Adm. Gary Roughead, who in 2011 picked Rogers to head Fleet Cyber Command, the Navy’s cyber organization, which was seen as a steppingstone.

A top secret document retrieved by U.S. whistleblower Edward Snowden and obtained by CBC News shows that Canada’s electronic spy agency used information from the free internet service at a major Canadian airport to track the wireless devices of thousands of ordinary airline passengers for days after they left the terminal.

After reviewing the document, one of Canada’s foremost authorities on cyber-security says the clandestine operation by the Communications Security Establishment Canada (CSEC) was almost certainly illegal.


Joint Committee on National Security Strategy has a chat with PM David Cameron

“I think the public reaction as I judge it has not been one of
‘shock horror!’ but one of ‘intelligence agencies carry out
intelligence work: good’,” Cameron said. Apparently Mr Cameron
hasn’t seen this
YouGov poll
from June 2013, which showed that 56 percent of
people think that Edward Snowden did the right thing (compared to
27 percent of people who think he did the wrong thing) and 52
percent think he shouldn’t be prosecuted.

Mr Cameron highlighted how crimes in television dramas are solved by tracking
the use of mobile phones. He warned that investigators will lose this
ability as criminals and terrorists resort to using the internet instead.

Earlier this week Mr Cameron told BBC Radio 2 that he likes to relax by
watching Elementary, a modern-day version of Sherlock Homes set in the US,
and Homeland, a thriller about a CIA agent on the trail of a soldier she
believes is an Al-Qaida operative.

– Thanks for Supporting Unfilter –

This Week’s New Supporters:

  • Dalton R

  • Harry

  • Patrik N

  • Nick A

  • Thanks to our 345 Unfilter supporters!

  • Supporter perk: Downloadable Pre and Post show. Extra clips, music, hijinks, and off the cuff comments. The ultimate Unfiltered experience. ‘

  • Supporter perk: Exclusive BitTorrent Sync share of our production and non-production clips, notes, and more since the NSA scandal broke in episode 54. The ultimate Unfiltered experience, just got more ultimate.

  • Supporter Perk: Past 5 supporters shows, in a dedicated bittorrent sync folder.


Winter Propaganda Games

The U.S. State Department has told Americans coming to Sochi that they should have “no expectation of privacy,” even in their hotel rooms.

A July 2013 article in the Washington Times reveals that there was a significant cybersecurity threat during the 2012 London Olympic Games. “There was a credible [threat of] attack on the electricity infrastructure supporting the Games,” said Oliver Hoare, head of Olympic cybersecurity.

“There are a number of specific threats of varying degrees of credibility that we’re tracking,” he said. “And we’re working very closely with the Russians and with other partners to monitor any threats we see and to disrupt those.”

“The primary threat, from a terrorism perspective, comes from Imarat Kavkaz, probably the most prominent terrorist group in Russia. It’s made its intent clear to seek to carry out attacks in the run-up to the Games,” said Olsen. “We think the greater danger from a terrorist perspective is in potential for attacks to occur outside of the actual venues for the Games themselves in the area surrounding Sochi or outside of Sochi in the region.”


Top Story in the unfilter Subreddit


Feedback:

If you’re a Supporter check your inbox!

Call us: 1.425.312.1756

Follow the Us:

The post Olympic Fear Games | Unfilter 84 first appeared on Jupiter Broadcasting.

]]>
Unfiltering the State of the Union | Unfilter 83 https://original.jupiterbroadcasting.net/50557/unfiltering-the-state-of-the-union-unfilter-83/ Tue, 28 Jan 2014 23:01:41 +0000 https://original.jupiterbroadcasting.net/?p=50557 Unfilter is bringing you play-by-play coverage of Obama’s 2014 Station of the Union. Plus we’ll fact checking the talking points, and take your live calls.

The post Unfiltering the State of the Union | Unfilter 83 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Grab the popcorn it’s special occasion and were throwing out the playbook and doing it live. Unfilter is bringing you play-by-play coverage of Obama’s 2014 Station of the Union.

Plus we’ll fact checking the talking points, take your live calls, our follow up, and much much more.

On this week’s episode of, Unfilter.

Direct Download:

Video | MP3 Audio | OGG Audio | Torrent | YouTube

RSS Feeds:

Video Feed | MP3 Feed | OGG Feed | HD Torrent | Mobile Torrent | iTunes

Become an Unfilter Supporter:

— Show Notes —



State of the Union


– Thanks for Supporting Unfilter –

This Week’s New Supporters:

  • Matt R

  • Jason T

  • James E

  • Chresten C

  • Mike G

  • Kenneth L

  • Mike

  • Jason G

  • Jordan E

  • Thanks to our 341 Unfilter supporters!

  • Supporter perk: Downloadable Pre and Post show. Extra clips, music, hijinks, and off the cuff comments. The ultimate Unfiltered experience. ‘

  • Supporter perk: Exclusive BitTorrent Sync share of our production and non-production clips, notes, and more since the NSA scandal broke in episode 54. The ultimate Unfiltered experience, just got more ultimate.

  • Supporter Perk: Past 5 supporters shows, in a dedicated bittorrent sync folder.


NSA is Crazy:

Exploiting phone information and location is a high-priority effort for the intelligence agencies, as terrorists and other intelligence targets make substantial use of phones in planning and carrying out their activities, for example by using phones as triggering devices in conflict zones. The NSA has cumulatively spent more than $1bn in its phone targeting efforts.

The disclosures also reveal how much the shift towards smartphone browsing could benefit spy agencies’ collection efforts.
golden nugget
A May 2010 NSA slide on the agency’s ‘perfect scenario’ for obtaining data from mobile apps. Photograph: Guardian

One slide from a May 2010 NSA presentation on getting data from smartphones – breathlessly titled “Golden Nugget!” – sets out the agency’s “perfect scenario”: “Target uploading photo to a social media site taken with a mobile device. What can we get?”

The question is answered in the notes to the slide: from that event alone, the agency said it could obtain a “possible image”, email selector, phone, buddy lists, and “a host of other social working data as well as location”.

Whistleblower Edward Snowden leaked the documents about US mass surveillance. He spoke about his disclosures and his life to NDR journalist Seipel in Moscow.

“If there’s information at Siemens that’s beneficial to US national interests – even if it doesn’t have anything to do with national security – then they’ll take that information nevertheless,” Snowden said in the interview conducted in Russia, where Snowden has claimed asylum.

Snowden also told the German public broadcasting network he no longer had possession of any documents or information on NSA activities and had turned everything over to select journalists. He said he did not have any control over the publication of the information.


Top Story in the unfilter Subreddit


If you’re a Supporter check your inbox!

Call us: 1.425.312.1756

Follow the Us:

The post Unfiltering the State of the Union | Unfilter 83 first appeared on Jupiter Broadcasting.

]]>
Obama’s NSA Reform Ruse | Unfilter 82 https://original.jupiterbroadcasting.net/50167/obamas-nsa-reform-ruse-unfilter-82/ Wed, 22 Jan 2014 21:45:37 +0000 https://original.jupiterbroadcasting.net/?p=50167 President Obama has outlined his so called reforms of America's controversial surveillance tactics. But as expected the reforms are light on real change.

The post Obama’s NSA Reform Ruse | Unfilter 82 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

President Obama has outlined his so called reforms of America’s controversial surveillance tactics. But as expected the reforms are light on real change, and leave many of the worst policies in place and unabated. We’ll dig into the most egregious.

Plus: It’s new round of character assassination for Edward Snowden, and this time the claims are even more ridiculous. Is Snowden a double agent for the FSB? We’ll debunk.

Then it’s your feedback, our followup, and much much more.

On this week’s Unfilter.

Direct Download:

Video | MP3 Audio | OGG Audio | Torrent | YouTube

RSS Feeds:

Video Feed | MP3 Feed | OGG Feed | HD Torrent | Mobile Torrent | iTunes

Become an Unfilter Supporter:

— Show Notes —


NSA is CRAZY

Michael Morell, who retired as deputy director of the CIA last summer, has joined CBS News as an intelligence, national security and counterterrorism contributor, the network announced this week.

The Washington Post has already identified the five big takeaways from Obama’s speech:

  1. US intelligence agencies will no longer hold Americans’ phone call records.

  2. There will, nevertheless, be some system for those records to be accessible when required.

  3. The US will no longer monitor the communications of the heads of state or government of “close friends and allies”.

  4. A new panel will be created to provide additional input into the secret court that oversees the Foreign Intelligence Surveillance Act (FISA), including privacy specialists and other non-government folks.

  5. There will be new rules to extend some of the privacy provisions applying to US citizens to foreigners, unless there’s a “compelling national security purpose”.

  6. ’The USA knows that for us spying is a crime’

“The German justice system will not stand idly by if the efforts of the NSA blithely continue here,” he told Bild newspaper on Monday.

Hours after President Barack Obama finished his speech last Friday on proposed intelligence and surveillance reforms, the Office of the Director of National Intelligence (ODNI) declassified a number of documents from the nation’s most secretive court.

The new documents are heavily redacted orders from FISC to the FBI. These items request that the court order an entity (likely a business) to provide “tangible things” under Section 215 of the PATRIOT Act. The documents do not refer to who the target is, nor which company or organization they apply to.

“The Court understands that NSA expects that it will continue to provide on average approximately three telephone identifiers per day to the FBI,” reads a footnote in a 2007 court order (PDF) authored by FISC Judge Frederick Scullin, Jr.

We’ve put together a scorecard showing how Obama’s announcements stack up against 12 common sense fixes that should be a minimum for reforming NSA surveillance. Each necessary reform was worth 1 point, and we were willing to award partial credit for steps in the right direction. On that scale, President Obama racked up 3.5 points out of a possible 12.


– Thanks for Supporting Unfilter –

This Week’s New Supporters:

  • Kai

  • AmazonReviewPolice

  • Jonathan M.

  • Niklas V.

  • Michael O. ← 333rd Subscriber!

  • Thanks to our 333 Unfilter supporters!

  • Supporter perk: Downloadable Pre and Post show. Extra clips, music, hijinks, and off the cuff comments. The ultimate Unfiltered experience. ‘

  • Supporter perk: Exclusive BitTorrent Sync share of our production and non-production clips, notes, and more since the NSA scandal broke in episode 54. The ultimate Unfiltered experience, just got more ultimate.

  • Supporter Perk: Past 5 supporters shows, in a dedicated bittorrent sync folder.


Snow Job:

Mr. Rogers said on the NBC News program “Meet the Press” on Sunday that Mr. Snowden should be seen not as a whistle-blower but as “a thief, who we believe had some help.”

Officials at both the N.S.A. and the F.B.I. have said their investigations have turned up no evidence that Mr. Snowden was aided by others.

Speaking from Moscow, where he is a fugitive from American justice, Snowden told The New Yorker, “This ‘Russian spy’ push is absurd.”

“It’s not the smears that mystify me,” Snowden told me. “It’s that outlets report statements that the speakers themselves admit are sheer speculation.” Snowden went on to poke fun at the range of allegations that have been made against him in the media without intelligence officials providing some kind of factual basis: “ ‘We don’t know if he had help from aliens.’ ‘You know, I have serious questions about whether he really exists.’ ”

Snowden went on, “It’s just amazing that these massive media institutions don’t have any sort of editorial position on this. I mean these are pretty serious allegations, you know?” He continued, “The media has a major role to play in American society, and they’re really abdicating their responsibility to hold power to account.”

Ellsberg is commonly looked at as the quintessential whistleblower today, but shortly after he leaked the top secret Vietnam War study, the Nixon administration made a concerted effort to paint him as a Soviet spy in the press, using anonymous quotes and non-existent ‘secret’ evidence.

  • Live Q&A with Edward Snowden: Thursday 23rd January, 8pm GMT, 3pm EST | Free Snowden](https://freesnowden.is/_2476.html)

Top Story in the unfilter Subreddit

The National Security Agency has collected almost 200 million text messages a day from across the globe, using them to extract data including location, contact networks and credit card details, according to top-secret documents.

The untargeted collection and storage of SMS messages – including their contacts – is revealed in a joint investigation between the Guardian and the UK’s Channel 4 News based on material provided by NSA whistleblower Edward Snowden.

The documents also reveal the UK spy agency GCHQ has made use of the NSA database to search the metadata of “untargeted and unwarranted” communications belonging to people in the UK.

The NSA program, codenamed Dishfire, collects “pretty much everything it can”, according to GCHQ documents, rather than merely storing the communications of existing surveillance targets.

The NSA has made extensive use of its vast text message database to extract information on people’s travel plans, contact books, financial transactions and more – including of individuals under no suspicion of illegal activity.


If you’re a Supporter check your inbox!

Call us: 1.425.312.1756

Follow the Us:

The post Obama’s NSA Reform Ruse | Unfilter 82 first appeared on Jupiter Broadcasting.

]]>
In NSA We Trust | Unfilter 61 https://original.jupiterbroadcasting.net/41037/in-nsa-we-trust-unfilter-61/ Wed, 31 Jul 2013 22:21:43 +0000 https://original.jupiterbroadcasting.net/?p=41037 XKeyscore has been exposed in a newly released presentation giving us a better picture of the system said to hold a three day buffer of all Internet activity.

The post In NSA We Trust | Unfilter 61 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

A diagram that literally puts the NSA’s world wide spying system on the map has been exposed in a newly released presentation giving us a better picture of the surveillance system that is said to hold a three day buffer of all Internet activity.

Plus: An update on Bradley Manning, the Obama Administration pledges not to torture Snowden, and the US continues to dance around that big problem in Egypt.

Then it’s your feedback, our follow up, and much much more…

On this week’s Unfilter.

Direct Download:

Video | MP3 Audio | OGG Audio | Torrent | YouTube

RSS Feeds:

Video Feed | MP3 Feed | OGG Feed | HD Torrent | Mobile Torrent | iTunes

Become an Unfilter Supporter:

— Show Notes —


Violence in Egypt Over the Weekend

A coalition of human rights liberals and conservatives opposed to foreign aid is gaining strength. In mid-July, Senate Republicans John McCain and Lindsey Graham, two party leaders on foreign policy, called canceling military aid “right and necessary.” Though, Graham said Tuesday he’s reserving final judgment until he and McCain return next week from a trip to Egypt at President Obama’s behest.


– Thanks for Supporting Unfilter –

In a twist that television industry gawkers immediately homed in on, the victory was shared by Ms. Sawyer and one of her regular fill-ins, David Muir. That was because Mr. Muir substituted for Ms. Sawyer three nights last week — the same three nights, it turned out, that ABC beat NBC in the all-important ratings demographic. Mr. Williams prevailed, barely, on the two nights that Ms. Sawyer was at work.

This Week’s New Supporters:

  • Benjamin J
  • Craig T
  • Rex
  • Bertel K
  • Thanks to our 142 Unfilter supporters!

  • Supporter perk: Downloadable Pre and Post show. Extra clips, music, hijinks, and off the cuff comments. The ultimate Unfiltered experience.

  • Become a Supporter


Manning Not Aiding the Enemy – Faces Years in Prison

A military judge on Tuesday found U.S. soldier Bradley Manning not guilty of aiding the enemy, the most serious charge he faced for handing over documents to WikiLeaks, but he still likely faces a long jail term after being found guilty of 19 other counts.

One of Manning’s most visible supporters was banned from the trial Friday after the judge said someone posted threats online. Clark Stoeckley, a college art instructor from New Jersey, confirmed he was the one booted.

Stoeckley attended the court-martial as a sketch artist, arriving each day in a white box truck with bold words painted on the sides: “WikiLeaks TOP SECRET Mobile Information Collection Unit.”

A tweet Thursday night from an account Stoeckley used said: “I don’t know how they sleep at night but I do know where.” It was removed Friday and Stoeckley told The Associated Press on Twitter he couldn’t comment.

During Bradley Manning’s trial in Fort Meade, Maryland, many of the soldier’s supporters showed up during the trial to back the whistleblower for revealing one of the biggest data leaks in US history, but last Friday Clark Stoeckley, courtroom sketch artist, was banned for one of his tweets.

NSA is Crazy

From Greenwald:

XKeyscore provides the technological capability, if not the legal authority, to target even US persons for extensive electronic surveillance without a warrant provided that some identifying information, such as their email or IP address, is known to the analyst.

Furthermore, Greenwald reports that analysts can use XKeyscore and other NSA systems “to obtain ongoing ‘real-time’ interception of an individual’s internet activity.”

Training materials for the XKeyscore program detail how analysts can use it and other systems to mine enormous agency databases and develop intelligence from the web

Some highlights:

“Performs strong (e.g. email) and soft (content) selection.” pg 2

“Provides real-time target activity.” pg 2

“Show me all the VPN startups in country X, and give me the data so I can decrypt and discover the users” pg 17

“Show me all the exploitable machines in country X” pg 24

According to one of the 11 judges that sits on the Foreign Intelligence Surveillance Court (FISC), no corporation ever served with a “business record” court order under the Patriot Act has ever challenged one, even though the law provides them a means to do so.

Sen. Ron Wyden said Tuesday that U.S. intelligence agencies’ violations of court orders on surveillance of Americans is worse than the government is letting on.

Wyden (D-Ore.), as a member of the Senate Intelligence Committee, is privy to classified briefings on the government’s surveillance. On Tuesday, he told Andrea Mitchell on MSNBC that all he could say is that the violations are worse than being made public.

• XKeyscore gives ‘widest-reaching’ collection of online data
• NSA analysts require no prior authorization for searches
• Sweeps up emails, social media activity and browsing history
NSA’s XKeyscore program – read one of the presentations

United States Representative Mike Rogers serves as the Chairman of the House Permanent Select Committee on Intelligence. The Committee is the House’s primary panel responsible for authorizing the funding for and overseeing the execution of the intelligence activities of the United States government.

General Keith Alexander Visits Black Hat

Alexander’s talk had begun with a plea for the hacker and security researcher community to reconsider the NSA’s role in the wake of a still-unfolding scandal revealed by the classified leaks of former Booz Allen contractor Edward Snowden. “Their reputation has been tarnished,” he said, speaking of his NSA staff. “But you can help us articulate the facts properly. I will answer every question to the fullest extent possible, and I promise you the truth: What I know, what we’re doing, and what I cannot tell you because we don’t want to jeopardize the future of our defense.”

After the talk, I found McCoy in the crowd and asked him about his not-so-friendly debate with the general. “His speech was pretty canned,” said McCoy. “It’s anything you can see on Fox News any day. We’re in danger, we have to get rid of your freedom to keep you safe.”

“Everyone’s thinking this, but no one’s saying it public, so everyone thinks they’re alone,” he said. “Ninety-eight percent of society has issues with this…But no one speaks up.”

He attempted to reassure a skeptical audience by saying “our people have to take courses and pass exams to use this data.” Data from the interception programs has “provided value” across some 53 “terror-related activities” detected by the NSA.


Where in the World is Snowden

In a letter sent this week, US attorney general Eric Holder told his Russian counterpart that the charges faced by Snowden do not carry the death penalty. Holder added that the US “would not seek the death penalty even if Mr Snowden were charged with additional, death penalty-eligible crimes”.

Holder said he had sent the letter, addressed to Alexander Vladimirovich, Russia’s minister of justice, in response to reports that Snowden had applied for temporary asylum in Russia “on the grounds that if he were returned to the United States, he would be tortured and would face the death penalty”.

House Intelligence Committee Chairman Mike Rogers (R-Mich.) said Sunday that Edward Snowden’s actions defy logic.

By granting NSA leaker Edward Snowden temporary asylum, Russia is giving itself time to figure out what their best move is, the chairman of the Senate Intelligence Committee said Sunday.

What has happened to NSA whistleblower who leaked files to Guardian since he decided to reveal his identity to the world and began his asylum battle


Feedback:

Bitmessage Address: BM-GuQ4gqmBeW8CYpSo3Htg2pBrBdHbvpe7

If you’re a Supporter check your inbox!

Call us: 1.425.312.1756

Follow the Us:

The post In NSA We Trust | Unfilter 61 first appeared on Jupiter Broadcasting.

]]>
Answers for Everyone | TechSNAP 42 https://original.jupiterbroadcasting.net/16331/answers-for-everyone-techsnap-42/ Thu, 26 Jan 2012 20:40:12 +0000 https://original.jupiterbroadcasting.net/?p=16331 We’ve got the answer to life the universe and everything, plus why you need to get upset about ACTA, and patch your Linux Kernel. In this Q&A PACKED edition!

The post Answers for Everyone | TechSNAP 42 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

We’ve got the answer to life the universe and everything, plus why you need to get upset about ACTA, and patch your Linux Kernel!

All that and more, in this Q&A PACKED edition of TechSNAP!

Thanks to:
GoDaddy.com Use our codes TechSNAP10 to save 10% at checkout, or TechSNAP20 to save 20% on hosting!

Pick your code and save:
DOTCO9: .co domain for $17.99
techsnap7: $7.99 .com
techsnap10: 10% off
techsnap20: 20% off 1, 2, 3 year hosting plans
techsnap40: $10 off $40
techsnap25: 25% off new Virtual DataCenter plans

   

Direct Download Links:

   

HD Video | Large Video | Mobile Video | MP3 Audio | OGG Audio | YouTube

 

Subscribe via RSS and iTunes:

Show Notes:

Dreamhost gets hacked, resets all customers’ passwords, has scale issues

  • On January 19th, Dreamhost.com detected unauthorized activity in one of their databases
  • It is unclear which databases were compromised, if they were dreamhost databases of customer data, or customer site databases
  • Dreamhost uses separate passwords for their main web control panel, and individual user SSH and FTP accounts
  • Dreamhost ran in to scale issues, where their centralized web control panel could not handle the volume of users logging in and attempting to change their shell passwords
  • The fast forced password reset by DreamHost appears to have promptly ended the malicious activity
  • Based on the urgency of the reset, there seem to be indications that DreamHost stores users’ passwords in plain text in one or more databases
  • This assertion is further supported by the fact that they print passwords to confirmation screens and in emails
  • Dreamhost also reset the passwords for all of their VPS customers

Linux root exploit – when the fix makes it worse

  • Linux kernel versions newer than 2.6.39 are susceptible to a root exploit that allowed writing to protected memory
  • Prior to version 2.6.39 write access was prevent by an #ifdef, however this was deemed to be to weak, and was replaced by newer code
  • The new security code that was to ensure that writes were only possible with the correct permissions, turned out to be inadequate and easily fooled
  • Ubuntu has confirmed that an update for 11.10 has been released, users are advised to upgrade
  • This issue does not effect Redhat Enterprise Linux 4 or 5, because this change was not backported. A new kernel package for RHEL 6 is now available
  • Analysis
  • Proof of Concept
  • Proof of Concept for Android

Feedback

Q: Tzvi asks how to best Monitor employee Internet usage?

A: There are a number of ways to monitor and restrict Internet access through a connection you control. A common suggestion is the use of a proxy server. The issue with this is that it requires configuration on each client machine and sometimes even each client application. This is a lot of work, and is not 100% successful. However, there is an option know as a ‘transparent proxy’. This is where the router/firewall, or some other machine that all traffic to the internet must pass through analyzes the traffic, and routes connections outbound for port 80 or 443 (HTTP and HTTPS respectively, and optional additional ports) through the proxy server, without any configuration required on the individual clients. Then, you can use the firewall to deny all traffic outbound that is not via the proxy.

This is relatively easy to setup, so much so that as part of the final exam in my Unix Security class, students had 2 hours to setup their machine as follows:

  • Configure TCP/IP stack
  • Download GPG and Class GPG Key
  • Decrypt Exam Instructions
  • Install Lynx w/ SSL support
  • Install a class self-signed SSL certificate and the root certificate bundle to be trusted
  • Install and configure Squid to block facebook with a custom error page
  • Configure Lynx to use Squid
  • Create a default deny firewall that only allows HTTP via squid and FTP to the class FTP server
  • Access the college website and facebook (or rather the custom error page when attempting to access facebook)

While they had a little practice, and didn’t have to configure a transparent proxy, it is still are fairly straight forward procedure.

Instead of rolling your own, you can just drop in pfSense and follow these directions


Q: Brett asks, what do you do after a compromise?

A: The very first thing you do after a compromise, is take a forensic image of the drive. A bit by bit copy, without ever writing or changing the disk in any way. You then pull that disk out and put it away for safe keeping. Do all of your analysis and forensics on copies of that first image (but no not modify it either, you don’t want to have to do another copy from the original). This way as you work on it, and things get modified or trashed, you do not disturb the original copy. You may need the original unmodified copy for legal proceedings, as the evidentiary value is lost if it is modified or tampered with in any way.

So your best bet, is to boot off of a live cd (not just any live cd, many try to be helpful and auto-mount every partition they find, use a forensics live cd that will not take any auction without you requesting it). Then use a tool like dd to image the drive to a file or another drive. You can then work off copies of that. This can also work for damaged disks, using command switches for dd such as conv=noerror,sync . Also using a blocksize of 1mb or so will speed up the process greatly.

You asked about tripwire and the like, the problem with TripWire is that you need to have been running it since before the incident, so it has a fingerprint database of what the files should look like, so it can detect what has changed. If you did not have tripwire setup and running before, while it may be possible to create a fingerprint database from a backup, it is not that useful.
The freebsd-update command includes an ‘IDS’ command, that compares all of the system files against the central fingerprint database used to update the OS, and provides quick and powerful protection against the modification of the system files, but it does not check any files installed my users or packages. The advantage to the freebsd-update IDS over tripwire is that it uses the FreeBSD Security Officers fingerprint database, rather than a locally maintained one that may have been modified as part of the system compromise. In college I wrote a paper on using Bacula as a network IDS, I’ll see if I can find it and post it on my blog at appfail.com.


Q: Jono asks, VirtualBox vs. Bare to the metal VMs?

  • Xen, KVM and VirtualBox are not bare metal, they requires a full linux host
  • XenServer is similar to VMWare ESXi, in that it is bare metal. It uses a very stripped down version of CentOS and therefore far fewer resources than a full host. However XenServer is a commercial product (though there is a free version)
    +The advantage to XenServer over VMWare ESXi (both are commercial but free), is XenServer is supported by more open source management tools, such as OpenStack

Q:Gene asks, IT Control is out of control, what can we users do?


Q: Crshbndct asks, Remote SSH for Mum


Roundup

The post Answers for Everyone | TechSNAP 42 first appeared on Jupiter Broadcasting.

]]>