Archive for the ‘The Perfect Storm’ Category

Rivers of ice: Vanishing glaciers

Wednesday, November 2nd, 2011

Stunning images from high in the Himalayas – showing the extent by which many glaciers have shrunk in the past 80 years or so – have gone on display at the Royal Geographical Society in central London.

Between 2007 and 2010, David Breashears retraced the steps of early photographic pioneers such as Major E O Wheeler, George Mallory and Vittorio Sella – to try to re-take their views of breathtaking glacial vistas.

The mountaineer and photographer is the founder of GlacierWorks – a non-profit organisation that uses art, science and adventure to raise public awareness about the consequences of climate change in the Himalayas.

– To the article and pictures…

Researchers warn of new Stuxnet worm

Wednesday, November 2nd, 2011

Researchers have found evidence that the Stuxnet worm, which alarmed governments around the world, could be about to regenerate.

Stuxnet was a highly complex piece of malware created to spy on and disrupt Iran’s nuclear programme.

No-one has identified the worm authors but the finger of suspicion fell on the Israeli and US governments.

The new threat, Duqu, is, according to those who discovered it, “a precursor to a future Stuxnet-like attack”.

Its discovery was made public by security firm Symantec, which in turn was alerted to the threat by one of its customers.

The worm was named Duqu because it creates files with the prefix DQ.

Symantec looked at samples of the threat gathered from computer systems located in Europe.

Initial analysis of the worm found that parts of Duqu are nearly identical to Stuxnet and suggested that it was written by either the same authors or those with access to the Stuxnet source code.

“Unlike Stuxnet, Duqu does not contain any code related to industrial control systems and does not self-replicate,” Symantec said in its blog.

“The threat was highly targeted towards a limited number of organisations for their specific assets.”

In other words, Duqu is not designed to attack industrial systems, such as Iran’s nuclear production facilities, as was the case with Stuxnet, but rather to gather intelligence for a future attack.

The code has, according to Symantec, been found in a “limited number of organisations, including those involved in the manufacturing of industrial control systems”.

Symantec’s chief technology officer Greg Day told the BBC that the code was highly sophisticated.

“This isn’t some hobbyist, it is using bleeding-edge techniques and that generally means it has been created by someone with a specific purpose in mind,” he said.

Whether that is state-sponsored and politically motivated is not clear at this stage though.

“If it is the Stuxnet author it could be that they have the same goal as before. But if code has been given to someone else they may have a different motive,” Mr Day said.

He added that there was “more than one variant” of Duqu.

“It looks as if they are tweaking and fine-tuning it along the way,” he said.

The worm also removes itself from infected computers after 36 days, suggesting that it is designed to remain more hidden than its predecessor.

The code used a “jigsaw” of components including a stolen Symantec digital certificate, said Mr Day.

“We provide digital certificates to validate identity and this certificate was stolen from a customer in Taiwan and reused,” said Mr Day.

The certificate in question has since been revoked by Symantec.

– More…

 

Climate change ‘grave threat’ to security and health

Wednesday, November 2nd, 2011

Climate change poses “an immediate, growing and grave threat” to health and security around the world, according to an expert conference in London.

Officers in the UK military warned that the price of goods such as fuel is likely to rise as conflict provoked by climate change increases.

A statement from the meeting adds that humanitarian disasters will put more and more strain on military resources.

It asks governments to adopt ambitious targets for curbing greenhouse gases.

The annual UN climate conference opens in about six weeks’ time, and the doctors, academics and military experts represented at the meeting (held in the British Medical Association’s (BMA) headquarters)argue that developed and developing countries alike need to raise their game.

Scientific studies suggest that the most severe climate impacts will fall on the relatively poor countries of the tropics.

UK military experts pointed out that much of the world’s trade moves through such regions, with North America, Western Europe and China among the societies heavily dependent on oil and other imports.

Rear Admiral Neil Morisetti, climate and energy security envoy for the UK Ministry of Defence (MoD), said that conflict in such areas could make it more difficult and expensive to obtain goods on which countries such as Britain rely.

“If there are risks to the trade routes and other areas, then it’s food, it’s energy,” he told BBC News.

“The price of energy will go up – for us, it’s [the price of] petrol at the pumps – and goods made in southeast Asia, a lot of which we import.”

– More…

 

GCHQ chief reports ‘disturbing’ cyber attacks on UK

Monday, October 31st, 2011

The UK has been subject to a “disturbing” number of cyber attacks, the director of communications intelligence agency GCHQ has said.

Sensitive data on government computers has been targeted, along with defence, technology and engineering firms’ designs, Iain Lobban said in the Times.

There was a “significant” unsuccessful internet-based attack on Foreign Office computer systems this summer, he added.

On Tuesday, the government hosts a two-day conference on the issue.

Foreign Secretary William Hague convened the London Conference on Cyberspace after criticism that ministers are failing to take the threat from cyber warfare seriously enough.

It aims to bring together political leaders, such as US Secretary of State Hillary Clinton and EU digital supremo Neelie Kroes, with leading cyber security experts and technology entrepreneurs such as Wikipedia founder Jimmy Wales and Cisco vice-president Brad Boston.

More…

Why is it not good to use proprietary Software or Formats?

Monday, October 31st, 2011

Proprietary Software can include back doors – see Skype and Microsoft.

Proprietary formats can include metadata. This is data, which you can’t see but it can lead to your identity. They caught a Greek anonymous activist, because he uploaded a word document with his real name in the metadata.

If you are no computer expert don’t upload anything else then plain TXT files to the Internet. You can use copy and past as well to post it in web services. Even graphic formats like JPEG or TIFF can include data like GPS coordinates, the used camera, user and software name.

It’s very difficult for beginners to find this metadata. So if you are a good designer like the poor Greek one, send your PDF files to a computer expert. He can clean the metadata before the upload.

These programms can show you the metadata:

PDF – BeCyPDFMetaEdit
Viewer for many formats: http://regex.info/exif.cgi

[UPDATE]
The metadata can be useful to locate the author of a document in real life, if you have questions for example. Open source programs like Libre Office uses metadata too. The trick is not to fill in your real name during installation and don’t use your real name for login.

You can use a Linux live system (like TAILS) to produce anonymous documents.

Comments:

The UK government has its problems with PDF formats too:

http://news.slashdot.org/story/11/04/17/0831204/MoDs-Error-Leaks-Secrets-of-UK-Nuclear-Submarine

“UK’s Ministry of Defence admitted that secret information about its nuclear powered submarines was leaked on the internet by mistake.

and

FOCA is a good program to show meta data for windows. You have to give an email adr. to dowload the program …

http://www.informatica64.com/DownloadFOCA/

– To the original…

 

Directors’ pay rose 50% in past year, says IDS report

Sunday, October 30th, 2011

Pay for the directors of the UK’s top businesses rose 50% over the past year, a pay research company has said.

Incomes Data Services (IDS) said this took the average pay for a director of a FTSE 100 company to just short of £2.7m.

The rise, covering salary, benefits and bonuses, was higher than that recorded for the main person running the company, the chief executive.

Their pay rose by 43% over the year, according to the study.

Prime Minister David Cameron, speaking in Australia, said the report was “concerning” and called for big companies to be more transparent when they decide executive pay.

Labour leader Ed Miliband said the pay increases were part of a “something for nothing” culture, since the stock market had not risen to match them.

A statement from IDS said that that figure suggested that “executive largesse is evenly spread across the board”.

Base salaries rose by just 3.2%, although that was above the median rise recorded by IDS this week for average pay settlements of 2.6% for private sector workers.

The latest consumer price inflation figures showed inflation at 5.2%.

– More…

 

Hackers targeted US government satellites, Congressional report claims

Sunday, October 30th, 2011

It sounds like the stuff of James Bond – foreign hackers managing to gain unauthorised access to US satellites as they orbit 700 km above the Earth, and interfere with their controls.

Maybe, if things were turning really bad, the hackers could even “damage or destroy the satellite.”

Well, if the upcoming annual report by the US-China Economic and Security Review Commission is to believed, maybe this isn’t just the imagination of a Hollywood scriptwriter.

According to Bloomberg BusinessWeek, a Congressional commision report to be released next month will reveal that hacker interfered with the operations of two US government satellites in 2007 and 2008.

The hackers, who were said to have gained access to the satellites via a ground station in Spitsbergen, Norway, are said to have interfered with the running of the Landsat-7 and Terra AM-1 Earth observation satellites which examine the planet’s climate and terrain. According to Bloomberg BusinessWeek, the report claims Landsat-7 experienced “12 or more minutes of interference in October 2007 and July 2008”.

NASA’s Terra AM-1 satellite, meanwhile, is said to have suffered interference for two minutes in June 2008 and nine minutes in October of that year. According to the draft report, “the responsible party achieved all steps required to command the satellite.”

– More…

 

Japanese parliament hit by cyber-attack

Sunday, October 30th, 2011

According to local media reports, hackers were able to snoop upon emails and steal passwords from computers belonging to lawmakers at the Japanese parliament for over a month.

A report in the Asahi Shimbun claims that PCs and servers were infected after a Trojan horse was emailed to a a Lower House member in July.

The Trojan horse then downloaded malware from a server based in China – allowing remote hackers to secretly spy on email communications and steal usernames and passwords from lawmakers.

– More…

 

About the Occupy Wall Street movement

Tuesday, October 18th, 2011

I’ve been reflecting on the Occupy Wall Street Movement. 

First, Bravo to them for understanding what’s happening to the world and for standing up and pointing it out so well.   I hope the movement continues to ‘grow legs’ and I also hope that, like the ‘Arab Spring’, it results in real and fundamental changes.

But, my hopes and my projections of likely outcomes live in separate boxes in my head.  And while I am deeply pleased at the OWS movement, I don’t think it will result in more than superficial change.

The problem, as I just wrote to a friend in a private E-Mail, is

“The people with power and money like, Dick Cheney for instance, are not going to give up their perks because the demonstrators make them feel guilty.   Rather, if they begin to feel the heat, they will direct that a series of measures be taken by their political handmaidens to make it look like changes are being effected when, in fact, the changes will be mostly form and very little substance.  

They will institute ‘a dazzle the bozos campaign'”.

A great strength of the new movements like the Arab Spring and OWS are their decentralized natures; they have no single head to cut off to stifle them.   But, it their weakness as well as their ‘intelligence and perceptive depth’ is limited to the average of the group since they are all independent actors.

Those who control the Multinationals and who direct our politicians like sheep with their money are far far brighter than that average and they will obfuscate the issues and make great shows of doing something through the media they control while, in fact, doing very little to disadvantage themselves.

Those are my thoughts.   Only time will tell and I, like so many, am deeply interested to see how it all plays out.

-dennis

 

 

Germany spyware: Minister calls for probe of state use

Wednesday, October 12th, 2011

Germany’s justice minister has called for a national and state level probe into the use of controversial computer software to spy on people.

The German state of Bavaria has admitted using the spyware, but claimed it had acted within the law.

Three other states have also confirmed they have used spyware in order to investigate serious criminal offences, a German newspaper reports.

Use of the software was exposed by a German hacker group.

The Berlin-based Chaos Computer Club (CCC) said it had analysed a “lawful interception” malware programme called Federal Trojan, used by the German police force.

They found that, once installed, the programme allows its operators to monitor exactly what the user is looking at – from which websites they have visited, to the emails they send and receive and the calls made through Skype.

“The malware cannot only siphon away intimate data but also offers a remote control or backdoor functionality for uploading and executing arbitrary other programs,” the group wrote on its website.

The program, it said, had “significant design and implementation flaws”, which made “all of the functionality available to anyone on the internet”.

Strong feelings

The CCC had analysed a laptop allegedly belonging to a man accused of illegally exporting pharmaceuticals. His lawyer claims the Trojan program was installed on his client’s computer when it passed through airport customs.

Bavaria Interior Minister Joachim Herrman has confirmed that state officials have been using the software since 2009 – though he made no mention of any specific incidents – and insisted that they had acted within the law. However, he promised a review of the software’s use.

The German broadcaster Deutsche Welle reported on Tuesday that three other states – Baden-Wurttemberg, Brandenburg and Lower Saxony had confirmed using spyware, although it is not clear if all four states had used the same software.

Justice Minister Sabine Leutheusser-Schnarrenberger has called on the federal and state governments to launch an investigation into the matter.

“Trying to play down or trivialise the matter won’t do,” she said. “The citizen, in both the public and private spheres, must be protected from snooping through strict state control mechanisms.”

The BBC’s Stephen Evans says the incident has sparked a row because Germans, given the country’s Nazi and Communist past, feel strongly about spying on citizens. Germany’s constitution stipulates strict protection against it, he adds.

– to the original…