Monthly Archives: July 2013

Land of the Free To Be Piss Pant Patriots

Advertisements

Nasty Things That Go Blink

Oh dear,

Another one-click setting configures the Pwn Plug for “passive reconnaissance,” Porcello said. “Just push a button and it will start logging all of the HTTP requests it sees on the network—cookies and passwords and e-mail addresses and that sort of thing.”

Additional features in the Pwn Plug R2’s arsenal of pwnness include, among other things:

  • New wireless penetration testing attacks, including the FreeRADIUS attack for high-security enterprise Wi-Fi networks
  • Metasploit, the open-source penetration testing framework from Rapid7
  • The Social Engineer Toolkit, an open-source tool written in Python designed for social engineering attacks on networks
  • Kismet and Aircrack-NG, two Wi-Fi network attack tools
  • nmap, a port-scanning tool
  • SSLstrip, an SSL man-in-the-middle attack tool that hijacks links to secure HTTP sites
  • THC Hydra, a network authentication “cracker”
  • The w3af Web attack framework, Scapy packet spoofing tool, and Ettercap packet capture tool

Yessiree Bob, that’s one secure protocol you got there! On the bright side no one will abuse this box or its tools, so don’t worry, be happy.

The conservative in me notes that the government through the EPA has banned most open burning of wood fires so someone might want to come up with another way of sending messages.

I kind of feel bad for the children of today. By the time they reach maturity they’ll have so many noses up the asses they won’t be able to sit down.

ooT oslA

You NSA Boys Set To Go?

Good, let’s get started.

I guess Toobin pissed Glenn off 

(editors note: I am trying to update this post as often as possible, so you dear readers are informed nearly as quickly as the NSA, and all the rest of the Constitutional government of popular imagination.)

A top secret National Security Agency program allows analysts to search with no prior authorization through vast databases containing emails, online chats and the browsing histories of millions of individuals, according to documents provided by whistleblower Edward Snowden.

The NSA boasts in training materials that the program, called XKeyscore, is its “widest-reaching” system for developing intelligence from the internet.

In short, all your short hairs are belong to US.

The files shed light on one of Snowden’s most controversial statements, made in his first video interview publis
One top-secret document describes how the program “searches within bodies of emails, webpages and documents”, including the “To, From, CC, BCC lines” and the ‘Contact Us’ pages on websites”.
To search for emails, an analyst using XKS enters the individual’s email address into a simple online search form, along with the “justification” for the search and the time period for which the emails are sought.
hed by the Guardian on June 10.

“I, sitting at my desk,” said Snowden, could “wiretap anyone, from you or your accountant, to a federal judge or even the president, if I had a personal email”.

US officials vehemently denied this specific claim. Mike Rogers, the Republican chairman of the
One top-secret document describes how the program “searches within bodies of emails, webpages and documents”, including the “To, From, CC, BCC lines” and the ‘Contact Us’ pages on websites”.
To search for emails, an analyst using XKS enters the individual’s email address into a simple online search form, along with the “justification” for the search and the time period for which the emails are sought.
House intelligence committee, said of Snowden’s assertion: “He’s lying. It’s impossible for him to do what he was saying he could do.”

But training materials for XKeyscore detail how analysts can use it and other systems to mine enormous agency databases by filling in a simple on-screen form giving only a broad justification for the search. The request is not reviewed by a court or any NSA personnel before it is processed.

 Trust but verify,

One top-secret document describes how the program “searches within bodies of emails, webpages and documents”, including the “To, From, CC, BCC lines” and the ‘Contact Us’ pages on websites”.

To search for emails, an analyst using XKS enters the individual’s email address into a simple online search form, along with the “justification” for the search and the time period for which the emails are sought.

 Oh Lucy, you got some splainin’ to do.

One document, a top secret 2010 guide describing the training received by NSA analysts for general surveillance under the Fisa Amendments Act of 2008, explains that analysts can begin surveillance on anyone by clicking a few simple pull-down menus designed to provide both legal and targeting justifications.

Once options on the pull-down menus are selected, their target is marked for electronic surveillance and the analyst is able to review the content of their communications:

Of course dear reader you don’t have to worry about any leakage from the NSA to journalists, government employees, etc. 

Anthony Weiner To Switch To GOP

Scandalized weiner expected to disappear.

So How’s Your Ass Today?

Good.

Not so good.

That interview sums up the entire situation. The issue isn’t with the press interactions that may have pushed Fish over this edge, or even Fish in particular. This is the sort of world we live in now. You open yourself up to constant abuse, hate speech, and hounding if you dare to release any creative work.

This goes for game developers, this goes for critics and reporters, and this goes for artists, photographers, or people making Youtube videos. It’s universal. The ability to soak in, digest, and live with abuse is a prerequisite for being in the public eye, or existing online in some form next to your creations.

David Vonderhaar is the Studio Design Director on Call of Duty: Black Ops 2. Recently it was announced that a gun in the game was being balanced. “The DSR fire time was 0.2 seconds. It’s now 0.4 seconds,” Vonderhaar said on Twitter. “The rechamber time was 1.0 seconds. It’s now 1.1 seconds.” He also said that he didn’t know if these fractions of a second are worth threats of violence.

That’s not hyperbole, and in fact he was being very calm about the sort of messages he was receiving, some of which you can see in this tumblr. I want to quote a few, and I’m not going to edit any of the words or spelling. This is what we ask the people to make our games to wake up to every morning. This is their diet of fan interaction.

That stuff never happens to bloggers. We of a matter of course are very creative in our insults over here in the political sphere, and in fact when I do it most people aren’t really sure if I said what they think I said, or if it perhaps has that other, more benign meaning. 

Coding, games or whatever, requires considerable personal intense effort, whereas blogging is more about the delete key, and on the fly modification of thought. It almost rises to writing. It also helps if your readers know you’re a bastard.

What Is Truth?

It’s OK when we do it.

A decent respect for the opinions of mankind is just soooooooo yesterday.

In a piece making the obvious comparison between fugitive spy Robert Seldon Lady and accused Espionage fugitive Edward Snowden, Tom Englehardt writes off the press silence about presumed American assistance to Lady in fleeing an international arrest warrant as the reality of being the sole superpower.

This version of how it all works is so much the norm in Washington that few there are likely to see any contradiction at all between the Obama administration’s approaches to Snowden and Lady, nor evidently does the Washington media.

I have to wonder when people, of whatever nation, actually started believing what the American government says instead of what they do.

It is doubtful that the Constitution could have been debated and formed in open sessions of the Continental Congress and then have been ratified. We should not be too surprised that the function follows the form.

Snowden’s biggest crime was economic, not political. I doubt seriously that other nations are fooled, or have been fooled, by the rhetoric coming out of DC. They have no compelling necessity to BS themselves and their people as our government has in BSing us, or we do ourselves. ( We did it for the children.)

States have interests. Not friends, not principles.

There will be a lot less lucre because of Snowden, because now the world knows that American companies are pretty easily squeezed by the government if it so chooses to do so, and like many Americans, will no longer wish to have business dealings with them. Their governments however will not be so free to act as they are, for they are privy to many more aspects of American soft power than we the people, much less their own citizens.

That Wall Street emerged relatively unscathed from 2008 shows where the true influence on politics lays, and the fact that Stuxnet, extraordinary renditions, torture et al are not prosecuted but Snowden is is remarkable only if you believe this is a nation of laws. That is only true when it is in the interest of those in power.  For the most part however that is only dragon eggs roasting on an open fire.