The U.S. military has banned and blocked Army, Air Force, Navy and Marine Corps from visiting The Intercept Media website for publishing highly classified documents including Edward Snowden’s NSA leaks.
BlackBerry, Boeing to Develop Self-Destruct Mission Impossible Style Phone.Waqas Amir
The Boeing Black smartphone was designed to meet the security and flexibility needs of the U.S. defense and security communities. It features embedded hardware security, configurable operating system policies, and physical modularity. The hardware roots of trust ensure the device starts in a trusted state. Hardware encryption and inhibits protect data and transmissions. The modular expansion port allows for additional sensors, satellite connectivity, or other customizations. The dual-SIM capability and integration with management systems and VPNs allow it to be highly productive across networks and missions.
The document summarizes surveillance practices in Pakistan. It discusses how the Pakistani government justifies widespread communications surveillance as necessary for counterterrorism, though this surveillance has expanded beyond targeted measures and been abused. The report reveals that in 2013 the ISI sought to implement a mass surveillance system to intercept undersea cables and gain access to 660 gigabytes per second of communications data. It also describes how Pakistan cooperates extensively with international surveillance by foreign intelligence agencies like the NSA.
Unpatched Security Flaws Openly Solicited by US NavyWaqas Amir
The US Navy is seeking information from qualified vendors to develop exploit products that integrate with commonly used cyber security frameworks. The Navy requires access to vulnerability intelligence, exploit reports, and operational exploit binaries affecting widely used commercial software. Vendors must be rated at CMMI Level 3 and provide a minimum of 10 unique exploit reports and binaries over a one year period. Responses are requested to provide company and technical capability information by June 18, 2015. This notice is to gather information only and is not a solicitation for proposals.
Police can Grab cell phone records without Warrant, Rules CourtWaqas Amir
This document summarizes a court case involving Quartavius Davis who was convicted of several counts of armed robbery and gun charges. The key issue on appeal was whether cell phone records obtained from Davis's cellular provider, MetroPCS, violated his Fourth Amendment rights. The records included historical cell tower location information showing the cell towers used for Davis's calls during the period where the robberies occurred. While the records did not precisely locate Davis, they placed his phone near the robbery locations. The court held that obtaining the records did not require a warrant and did not violate Davis's Fourth Amendment rights. It affirmed Davis's convictions.
Boeing 787s can lose control while flying due to Software bug: ReportWaqas Amir
This glitch can abruptly shut-off all electrical power of the plane during mid-air causing the flyers to lose control of the flight | Full Store: http://goo.gl/bTpkyc
Big brother-exposed-r2 k-handbook-on-surveillance-webWaqas Amir
This document summarizes the history of South Africa's intelligence structures and their monitoring of political activists. It describes how the State Security Agency was initially given a broad mandate to conduct political intelligence gathering in the 2000s, leading to scandals where the SSA spied on lawful political opponents. In 2013, a new law was passed limiting the SSA's mandate to exclude monitoring lawful political activity, advocacy, protest or dissent. However, cases discussed in the document suggest the SSA may still be monitoring some activist movements.
Reserchers show how medical robots can be hacked during surgeryWaqas Amir
This document analyzes cybersecurity threats against teleoperated surgical robots like the Raven II system. The researchers identify several possible attacks, including intention manipulation, intention modification, and hijacking attacks. They experimentally evaluate vulnerabilities and demonstrate the ability to maliciously control robot functions or override surgeon commands. The researchers also find attacks can abuse the emergency stop mechanism. They propose initial steps to increase security but note more work is needed given the risks of disrupted surgical procedures if systems are compromised.
BlackBerry, Boeing to Develop Self-Destruct Mission Impossible Style Phone.Waqas Amir
The Boeing Black smartphone was designed to meet the security and flexibility needs of the U.S. defense and security communities. It features embedded hardware security, configurable operating system policies, and physical modularity. The hardware roots of trust ensure the device starts in a trusted state. Hardware encryption and inhibits protect data and transmissions. The modular expansion port allows for additional sensors, satellite connectivity, or other customizations. The dual-SIM capability and integration with management systems and VPNs allow it to be highly productive across networks and missions.
The document summarizes surveillance practices in Pakistan. It discusses how the Pakistani government justifies widespread communications surveillance as necessary for counterterrorism, though this surveillance has expanded beyond targeted measures and been abused. The report reveals that in 2013 the ISI sought to implement a mass surveillance system to intercept undersea cables and gain access to 660 gigabytes per second of communications data. It also describes how Pakistan cooperates extensively with international surveillance by foreign intelligence agencies like the NSA.
Unpatched Security Flaws Openly Solicited by US NavyWaqas Amir
The US Navy is seeking information from qualified vendors to develop exploit products that integrate with commonly used cyber security frameworks. The Navy requires access to vulnerability intelligence, exploit reports, and operational exploit binaries affecting widely used commercial software. Vendors must be rated at CMMI Level 3 and provide a minimum of 10 unique exploit reports and binaries over a one year period. Responses are requested to provide company and technical capability information by June 18, 2015. This notice is to gather information only and is not a solicitation for proposals.
Police can Grab cell phone records without Warrant, Rules CourtWaqas Amir
This document summarizes a court case involving Quartavius Davis who was convicted of several counts of armed robbery and gun charges. The key issue on appeal was whether cell phone records obtained from Davis's cellular provider, MetroPCS, violated his Fourth Amendment rights. The records included historical cell tower location information showing the cell towers used for Davis's calls during the period where the robberies occurred. While the records did not precisely locate Davis, they placed his phone near the robbery locations. The court held that obtaining the records did not require a warrant and did not violate Davis's Fourth Amendment rights. It affirmed Davis's convictions.
Boeing 787s can lose control while flying due to Software bug: ReportWaqas Amir
This glitch can abruptly shut-off all electrical power of the plane during mid-air causing the flyers to lose control of the flight | Full Store: http://goo.gl/bTpkyc
Big brother-exposed-r2 k-handbook-on-surveillance-webWaqas Amir
This document summarizes the history of South Africa's intelligence structures and their monitoring of political activists. It describes how the State Security Agency was initially given a broad mandate to conduct political intelligence gathering in the 2000s, leading to scandals where the SSA spied on lawful political opponents. In 2013, a new law was passed limiting the SSA's mandate to exclude monitoring lawful political activity, advocacy, protest or dissent. However, cases discussed in the document suggest the SSA may still be monitoring some activist movements.
Reserchers show how medical robots can be hacked during surgeryWaqas Amir
This document analyzes cybersecurity threats against teleoperated surgical robots like the Raven II system. The researchers identify several possible attacks, including intention manipulation, intention modification, and hijacking attacks. They experimentally evaluate vulnerabilities and demonstrate the ability to maliciously control robot functions or override surgeon commands. The researchers also find attacks can abuse the emergency stop mechanism. They propose initial steps to increase security but note more work is needed given the risks of disrupted surgical procedures if systems are compromised.
Child Abuse Images Traded by Paedophiles for Bitcoin: ReportWaqas Amir
The Internet Watch Foundation (IWF) works to remove criminal online content, especially child sexual abuse imagery. In 2014, IWF:
- Increased its analyst team and began proactively searching for abuse content, finding 45% more reports than 2013.
- Processed over 74,000 reports and removed over 141,000 URLs globally.
- Worked closely with UK and international law enforcement and partner organizations to more effectively combat online child abuse.
- Continued developing new tools and services to further its mission of eliminating child sexual abuse imagery online.
Robert Sherman, the Manager of Privacy and Public Policy at Facebook, testified before the Senate subcommittee about Facebook's use of facial recognition technology in its tag suggestions feature. He explained that tag suggestions uses the photos and tags users have voluntarily provided on Facebook to automate the tagging process for new photos uploaded by analyzing similarities between photos people are already tagged in. Sherman emphasized that users have transparency and control over the use of their data and images through privacy tools and settings on Facebook.
Android App Used by Hackers in Sex Extortion CampaignsWaqas Amir
The document discusses a new mobile sextortion modus operandi used by criminal gangs in East Asia. It involves convincing victims to install Android malware that steals their contact lists and personal data. This information is then used to blackmail victims by threatening to share embarrassing material with their friends and family unless a ransom is paid. Four main Android malware families have been used for this purpose, undergoing various revisions to improve functionality. Money mules and online drop zones play a key role in receiving stolen funds and data. The criminal operations have links to ethnic Chinese individuals in South Korea and involve collaboration between malware developers and distributors.
Facebook's revised policies_and_terms_v1.2Waqas Amir
Facebook tracks users even when they log out from their social media account - The site also tracks individuals who do not even have a Facebook account | More
Adiós gps darpa working on alternative position tracking technologyWaqas Amir
The U.S government’s Defence Advanced Research Projects Agency (DARPA) has prioritized the development of a more dependable and efficient real-time location tracking technology due to the incompetence of GPS in specific situations | More: http://goo.gl/fWcqxh
Study reveals we are being tracked by our smartphones --- every 3 minutesWaqas Amir
This document summarizes a study that evaluated the effectiveness of providing smartphone users with an app permission manager and privacy nudges about how their apps access sensitive data. The study found that giving users access to a permission manager helped many review and restrict app permissions, but the effectiveness was significantly enhanced when privacy nudges were also provided to raise awareness of how apps access location, contacts, and other private data. The nudges prompted almost all users to further review permissions and led over half to make more restrictive changes to permissions.
Stingray Mobile Phone Surveillance Details to be unveiled.. Orders NY CourtWaqas Amir
New York Civil Liberties Union (NYCLU), in one of its cases a judge ordered the Erie County Sheriff’s Office to disclose data to public regarding the department’s use of Stingrays | More:
FBI Admits Using Stingray Devices to Disrupt Phone Service.Waqas Amir
Unsealed Document Exposes FBI - Bureau admits using Stingray Devices to Disrupt Phone Service | More @ https://www.hackread.com/fbi-admits-using-stingray-devices-to-disrupt-phone-service/
DARPA Wants to Monitor The Arctic, offers $4 Million For An Unmanned Surveill...Waqas Amir
Ice melting in the Arctic has been the leading issue in strategic plans of almost all government leaders in Northern Hemisphere.. More @ https://www.hackread.com/darpa-wants-to-use-unmanned-surveillance-system-to-monitor-the-arctic/
Nsa hiding undetectable spyware in hard drives worldwideWaqas Amir
The US National Security Agency (NSA) hid undetectable spying software within the hard drives of computers, be it of any make, says a Moscow-based cyber security researcher and software maker.
Citizenfour producers-face-legal-challenges-over-edward-snowden-leaksWaqas Amir
A lawsuit has been filed against The Weinstein Co., Participant Media and others for aiding and abetting Edward Snowden, the American whistleblower, according to hackread.com.
Citizenfour producers-face-legal-challenges-over-edward-snowden-leaksWaqas Amir
This document is a complaint filed in United States District Court against Edward Snowden, filmmakers involved in the documentary Citizenfour, and their production companies. It alleges that Snowden breached his security agreements and oath by stealing and disseminating classified government information. It further alleges that the filmmakers aided and abetted Snowden's illegal acts by collaborating with him to profit from the stolen information and cloak his actions as whistleblowing rather than espionage. The complaint seeks a constructive trust over profits from Citizenfour to remedy damage to national security and unjust enrichment by the defendants.
Court ruling : Parents may be responsible for what their kinds post on facebookWaqas Amir
This document summarizes a legal case involving a minor who created a fake Facebook profile impersonating a classmate. The classmate and her parents sued the impersonating minor and his parents. The trial court granted summary judgment to the impersonating minor's parents. The appellate court must now determine whether questions of material fact remain regarding the parents' potential negligence. Key issues include whether the parents should have foreseen harm and taken steps to compel the minor to remove the fake profile once notified of its existence.
Fbi’s internal guide list to internet slangs revealedWaqas Amir
The document discusses the benefits of exercise for mental health. Regular physical activity can help reduce anxiety and depression and improve mood and cognitive functioning. Exercise causes chemical changes in the brain that may help protect against mental illness and improve symptoms.
Monsanto hacked, 1300 individuals affectedWaqas Amir
An unauthorized party gained access to Precision Planting LLC's computer systems on March 27, potentially accessing files containing personal information for 14 residents in the state. The information included names, addresses, tax IDs, financial account information, and in some cases Social Security numbers and driver's license numbers. While the intent is unknown, the personal information may have been accessed. The incident has been contained and an investigation is underway. Affected individuals are being notified and offered free credit monitoring.
Iran has been developing both defensive and offensive cyber capabilities in recent years as part of an asymmetrical warfare strategy. It has allocated $1 billion to develop technology and recruit experts from its educational institutions. Defensively, Iran aims to protect critical infrastructure from attacks and monitor domestic internet usage. Offensively, Iran likely aims to launch cyber attacks against other countries' infrastructure during escalations, as evidenced by recent attacks against US financial institutions and Saudi and Qatari energy companies. The development of Iran's cyber capabilities is a concern for the US and Israel, who will need to improve their own defenses and intelligence cooperation to counter Iranian cyber threats.
karnataka housing board schemes . all schemesnarinav14
The Karnataka government, along with the central government’s Pradhan Mantri Awas Yojana (PMAY), offers various housing schemes to cater to the diverse needs of citizens across the state. This article provides a comprehensive overview of the major housing schemes available in the Karnataka housing board for both urban and rural areas in 2024.
Jennifer Schaus and Associates hosts a complimentary webinar series on The FAR in 2024. Join the webinars on Wednesdays and Fridays at noon, eastern.
Recordings are on YouTube and the company website.
https://www.youtube.com/@jenniferschaus/videos
Child Abuse Images Traded by Paedophiles for Bitcoin: ReportWaqas Amir
The Internet Watch Foundation (IWF) works to remove criminal online content, especially child sexual abuse imagery. In 2014, IWF:
- Increased its analyst team and began proactively searching for abuse content, finding 45% more reports than 2013.
- Processed over 74,000 reports and removed over 141,000 URLs globally.
- Worked closely with UK and international law enforcement and partner organizations to more effectively combat online child abuse.
- Continued developing new tools and services to further its mission of eliminating child sexual abuse imagery online.
Robert Sherman, the Manager of Privacy and Public Policy at Facebook, testified before the Senate subcommittee about Facebook's use of facial recognition technology in its tag suggestions feature. He explained that tag suggestions uses the photos and tags users have voluntarily provided on Facebook to automate the tagging process for new photos uploaded by analyzing similarities between photos people are already tagged in. Sherman emphasized that users have transparency and control over the use of their data and images through privacy tools and settings on Facebook.
Android App Used by Hackers in Sex Extortion CampaignsWaqas Amir
The document discusses a new mobile sextortion modus operandi used by criminal gangs in East Asia. It involves convincing victims to install Android malware that steals their contact lists and personal data. This information is then used to blackmail victims by threatening to share embarrassing material with their friends and family unless a ransom is paid. Four main Android malware families have been used for this purpose, undergoing various revisions to improve functionality. Money mules and online drop zones play a key role in receiving stolen funds and data. The criminal operations have links to ethnic Chinese individuals in South Korea and involve collaboration between malware developers and distributors.
Facebook's revised policies_and_terms_v1.2Waqas Amir
Facebook tracks users even when they log out from their social media account - The site also tracks individuals who do not even have a Facebook account | More
Adiós gps darpa working on alternative position tracking technologyWaqas Amir
The U.S government’s Defence Advanced Research Projects Agency (DARPA) has prioritized the development of a more dependable and efficient real-time location tracking technology due to the incompetence of GPS in specific situations | More: http://goo.gl/fWcqxh
Study reveals we are being tracked by our smartphones --- every 3 minutesWaqas Amir
This document summarizes a study that evaluated the effectiveness of providing smartphone users with an app permission manager and privacy nudges about how their apps access sensitive data. The study found that giving users access to a permission manager helped many review and restrict app permissions, but the effectiveness was significantly enhanced when privacy nudges were also provided to raise awareness of how apps access location, contacts, and other private data. The nudges prompted almost all users to further review permissions and led over half to make more restrictive changes to permissions.
Stingray Mobile Phone Surveillance Details to be unveiled.. Orders NY CourtWaqas Amir
New York Civil Liberties Union (NYCLU), in one of its cases a judge ordered the Erie County Sheriff’s Office to disclose data to public regarding the department’s use of Stingrays | More:
FBI Admits Using Stingray Devices to Disrupt Phone Service.Waqas Amir
Unsealed Document Exposes FBI - Bureau admits using Stingray Devices to Disrupt Phone Service | More @ https://www.hackread.com/fbi-admits-using-stingray-devices-to-disrupt-phone-service/
DARPA Wants to Monitor The Arctic, offers $4 Million For An Unmanned Surveill...Waqas Amir
Ice melting in the Arctic has been the leading issue in strategic plans of almost all government leaders in Northern Hemisphere.. More @ https://www.hackread.com/darpa-wants-to-use-unmanned-surveillance-system-to-monitor-the-arctic/
Nsa hiding undetectable spyware in hard drives worldwideWaqas Amir
The US National Security Agency (NSA) hid undetectable spying software within the hard drives of computers, be it of any make, says a Moscow-based cyber security researcher and software maker.
Citizenfour producers-face-legal-challenges-over-edward-snowden-leaksWaqas Amir
A lawsuit has been filed against The Weinstein Co., Participant Media and others for aiding and abetting Edward Snowden, the American whistleblower, according to hackread.com.
Citizenfour producers-face-legal-challenges-over-edward-snowden-leaksWaqas Amir
This document is a complaint filed in United States District Court against Edward Snowden, filmmakers involved in the documentary Citizenfour, and their production companies. It alleges that Snowden breached his security agreements and oath by stealing and disseminating classified government information. It further alleges that the filmmakers aided and abetted Snowden's illegal acts by collaborating with him to profit from the stolen information and cloak his actions as whistleblowing rather than espionage. The complaint seeks a constructive trust over profits from Citizenfour to remedy damage to national security and unjust enrichment by the defendants.
Court ruling : Parents may be responsible for what their kinds post on facebookWaqas Amir
This document summarizes a legal case involving a minor who created a fake Facebook profile impersonating a classmate. The classmate and her parents sued the impersonating minor and his parents. The trial court granted summary judgment to the impersonating minor's parents. The appellate court must now determine whether questions of material fact remain regarding the parents' potential negligence. Key issues include whether the parents should have foreseen harm and taken steps to compel the minor to remove the fake profile once notified of its existence.
Fbi’s internal guide list to internet slangs revealedWaqas Amir
The document discusses the benefits of exercise for mental health. Regular physical activity can help reduce anxiety and depression and improve mood and cognitive functioning. Exercise causes chemical changes in the brain that may help protect against mental illness and improve symptoms.
Monsanto hacked, 1300 individuals affectedWaqas Amir
An unauthorized party gained access to Precision Planting LLC's computer systems on March 27, potentially accessing files containing personal information for 14 residents in the state. The information included names, addresses, tax IDs, financial account information, and in some cases Social Security numbers and driver's license numbers. While the intent is unknown, the personal information may have been accessed. The incident has been contained and an investigation is underway. Affected individuals are being notified and offered free credit monitoring.
Iran has been developing both defensive and offensive cyber capabilities in recent years as part of an asymmetrical warfare strategy. It has allocated $1 billion to develop technology and recruit experts from its educational institutions. Defensively, Iran aims to protect critical infrastructure from attacks and monitor domestic internet usage. Offensively, Iran likely aims to launch cyber attacks against other countries' infrastructure during escalations, as evidenced by recent attacks against US financial institutions and Saudi and Qatari energy companies. The development of Iran's cyber capabilities is a concern for the US and Israel, who will need to improve their own defenses and intelligence cooperation to counter Iranian cyber threats.
karnataka housing board schemes . all schemesnarinav14
The Karnataka government, along with the central government’s Pradhan Mantri Awas Yojana (PMAY), offers various housing schemes to cater to the diverse needs of citizens across the state. This article provides a comprehensive overview of the major housing schemes available in the Karnataka housing board for both urban and rural areas in 2024.
Jennifer Schaus and Associates hosts a complimentary webinar series on The FAR in 2024. Join the webinars on Wednesdays and Fridays at noon, eastern.
Recordings are on YouTube and the company website.
https://www.youtube.com/@jenniferschaus/videos
How To Cultivate Community Affinity Throughout The Generosity JourneyAggregage
This session will dive into how to create rich generosity experiences that foster long-lasting relationships. You’ll walk away with actionable insights to redefine how you engage with your supporters — emphasizing trust, engagement, and community!
The Power of Community Newsletters: A Case Study from Wolverton and Greenleys...Scribe
YOU WILL DISCOVER:
The engaging history and evolution of Wolverton and Greenleys Town Council's newsletter
Strategies for producing a successful community newsletter and generating income through advertising
The decision-making process behind moving newsletter design from in-house to outsourcing and its impacts
Dive into the success story of Wolverton and Greenleys Town Council's newsletter in this insightful webinar. Hear from Mandy Shipp and Jemma English about the newsletter's journey from its inception to becoming a vital part of their community's communication, including its history, production process, and revenue generation through advertising. Discover the reasons behind outsourcing its design and the benefits this brought. Ideal for anyone involved in community engagement or interested in starting their own newsletter.
Presentation by Rebecca Sachs and Joshua Varcie, analysts in CBO’s Health Analysis Division, at the 13th Annual Conference of the American Society of Health Economists.
Presentation by Julie Topoleski, CBO’s Director of Labor, Income Security, and Long-Term Analysis, at the 16th Annual Meeting of the OECD Working Party of Parliamentary Budget Officials and Independent Fiscal Institutions.