RizWords – Daily Politics and Tech – EP53

RizWords – Daily Politics and TechEpisode 53 – download link coming soon: check the feed for details: subscribe now A member of the TechPodcast Network @ techpodcast.com. If it’s Tech, it’s here. Remember, if you’re listening on the podcast recording, you can call into the show live if you tune in through TalkShoe.com at 2:30 PM EST every weekday. If you like the podcast (and you haven’t already given us a rating), head over and do so, and don’t forget to sign up for the discussion list. Other Podcast Plugs: TalkGirls comes on Tuesday nights. Check out the TalkGirls Podcast … it’s good times! Cotolo Chronicles: Frank is a good friend of the show, and an associate of the late great Wolfman Jack. Check out his podcast. NewsReal: Good friend to Art and I – has one of the best hours of news podcast each week. You Are the Guest: Bill Grady turns the microphone on the internet’s most interesting people. Sponsors: Try GoToMeeting for 45 days! Visit www.GoToMeeting.com/podcast to start your free trial today. J. Douglas Barker – Voice-overs for you! www.romancingthetone.com A bunch of new startup acquisition news. We talk a bit about the acquisitions specifically, and then a bit in general about the prevalence in the news lately of all the startups getting bought: Look For Confirmation of eBay/StumbleUpon TodayI’m hearing that the eBay/StumbleUpon acquisition will be officially announced sometime today. Keep an eye our for the press release. We originally broke this rumor in April when a term sheet was reportedly signed. The Wall Street Journal picked up the story earlier this month. I don’t...

Hackers Declaring Cyberwar on Facebook and Myspace

I’ve been seeing this headline pop up all over the place the last few days: Hackers Declaring War On MySpace, Facebook? My question is: who are these hackers? Is there a central organisation of hackers that have decided to declare this war? Should Facebook and MySpace fight back? The best defense, after all, is a good offense. (SC Magazine) “If the hackers know you have a particular interest, this can be used to target you in a phishing attack. They know what you’re into and can exploit this to obtain more information from you such as credit card details,” he said. “People are putting far too much information online and into the hands of identity thieves. Young people in particular, need to be very careful as it may come back to haunt them.” Those of us with an above average IQ know the vulnerability MySpace, Facebook, and other social networking sites present to our identity. Still, all this hubub begs the question: where are these hackers? Furthermore, should I join up? I’ve been a hacker for years, and there’s apparently some money in harvesting this information. Do these hackers have an HR department I can apply to? It’s simply ridiculous to use terms like CyberWar and hackers when it comes to stories like this, but still the media persists....

CyberWar Update: The Next Generation

Why is it that everyone who is an ‘expert’ on China thinks they have some mystical abilities on the computer? There was an interview with an author on the blog Human Events Online that caught my attention this morning. I’ve seen this type of author before, and I’m rapidly becoming familiar with the type: they are convinced that there’s an upcoming war with China, and that they have all these awesome abilities to take us out and we’re not gonna see it coming. Read the excerpt: In Showdown, you raise the possibility of the Chinese’ waging cyberwar against the U.S., and Japan. What’s exactly would that mean? China—as we illustrate in the last fictional scenario in Showdown—is rapidly building the most advanced offensive computer war capability in the world. If they decided to use it, they could—unless we counter it with our own massive buildup of defensive and offensive cyberwar capability—conquer America without firing a shot. They could do everything from disabling satellite networks to taking down the stock market and banking networks. America could be reduced to a 1940s existence in a matter of minutes. I don’t believe they have the ability to do this yet, but they will very soon. [via Human Events Online] See, I used to sortof be in the camp that thought that China might be a threat. The problem is that every time I read something said by these authors, they always talk about “CyberWar” like it’s something that could actually happen. CyberWar is somewhat tricky and deceptive term for online warfare. One imagines a keyboard of big red buttons that you can...

I’m working on several original news stories that I will be posting here soon. I look forward to comments, questions, criticism and other assundrous comments from the peanut galleries on them. If you do a search on the web for Factbook or Cyberwar (and perhaps couple it with rizzn in the keywords), you will come up with links all over the place to a series of articles I did in 2001 strongly tied with the Terrorism Factbook I compiled and the interview series I did for John Batchelor and Paul Alexander on WABC. To save you the time searching them, they are all archived here. I intend to do an update three years later on these programs and how they are affected by the new Patriot Acts (one and the proposed second one). This means I’ll probably have to print out all one gazillion pages of the Patriot Act and actually read it top to bottom. Furthermore, there’s a war a brewin’! I pretty much alluded to this sort of thing happening in many of my OSINT posts not long ago. I also posted something here similarly on topic. Basically, the motivation to write this article is to toot my own prognosticating horn and to bank on it and make some more predictions in this arena. Stay tooned....

CyberWar Update #5

The latest Cyberwar Update ./mark.hopkins.aka.rizzn// Rizzn’s Wartime Factbook: http://factbook.diaryland.com/ The Best UAV: http://www.unmannedaircraft.com Rizzn’s Musical Stylings: http://rizzn.trance.nu ——————– CyberWar Update #5 Update as of February 21, 2002 Report Assembled by Mark Hopkins <markhopkins@mindless.com> of Parallad Studios OSIS Project Hello, my readers.  The focus of this mailer revolves around two news stories that have come out recently, but are reasons, as the first headline says, to “hug a hacker, before [he/she] goes underground.” Most software hackers are quite familiar with the RFPolicy, written by Rain Forest Puppy.  The first article is a commentary on how the industry is moving away from the usage of this policy, and how this is a Bad Thing for the industry. Especially in this day and age of quite a bit more malicious strains of hackers showing up as wards of different branches of the al-Qa’ida network, it is in society as a whole’s best interest to do as much as possible to embrace and encourage ethical hackers. The second article is something of a far more sinister nature; it is the announcement by the US Government that cyberterrorists can now be bombed by the DOD.  Given the broad nature of the government’s definition of a cyberterrorist, compounded with the government’s newfound liberty in the ability to search, seize, and rifle through the belongings of ‘cyberterrorists’ without either the hacker’s or a judge’s permission, the government now announces without a vote by the people, that they intent to physically harm with military force, hackers.  I find this especially despicable and cringe for our collective future. Can it be as bad as all that?  Read the...

CyberWar Update #4

Merry Christmas all — I will be out of pocket for the coming holidays — best to you and yours. /mark hopkins markhopkins@mindless.com parallad studios http://www.parallad.com OSIS Project Rizzn’s Wartime Factbook: http://factbook.diaryland.com/ The Best UAV: http://www.unmannedaircraft.com CyberWar Update #4 Update as of December 23, 2001 Report Assembled by Mark Hopkins <markhopkins@mindless.com> of Parallad Studios OSIS Project http://www.parallad.com Things this report will concern itself with:   a.. Operation Buccaneer   b.. Magic Lantern Developments and Analysis   c.. New Virus Developments: We have a new Christmas-time virus, the third email worm in three weeks. Read the details to protect yourself from attack.   d.. Al Qa’ida/Microsoft Hack     a.. The Story: Suspected member of the Al Qaeda terrorist network, Mohammad Afroze Abdul Razzak, claimed that Islamic militants infiltrated Microsoft and sabotaged the company’s Windows XP operating system, according to a source close to Indian police.     b.. Analysis: How likely is this allegation to be true?  Many say not very.  Read for some interesting possible connections.   e.. New Federal Encryption Standard     a.. The Story:The U.S. Federal Government has finally decided to upgrade its DES standard to the newly created AES encryption standard, a long needed change.     b.. Analysis: How effective is the new standard?  Is it all it’s cracked up to be? Operation Buccaneer The Story The federal government concludes a yearlong investigation into software piracy, and in the past week, been involved in raids against WAREZ groups, including 90+ scene group senior members and leaders in US, Canada, Britain, Australia, Norway, 2 cracking groups in Poland. The US Customs Service, along with the US Department of...

CyberWar Report #3: John Walker Lindh Supplemental

This is the notes for my interview John Batchelor and John Alexander this evening (WABC 770am NYC @ 10:00pm EST) I’ve compiled into a CWR.  It is based almost entirely off the newsgroup postings of John Walker Lindh before his departure for Yemen and later Afghanistan. /mark Rizzn’s Wartime Factbook: http://factbook.diaryland.com/ The Best UAV: http://www.unmannedaircraft.com CyberWar Report #3: John Walker Lindh Supplemental The update as of December 15th, 2001 Report assembled by Mark Hopkins <markhopkins@mindless.com> of Parallad Studios OSIS Project http://www.parallad.com John Walker Lindh Internet Profile and Analysis Analysis 19 years old now, John Walker Lindh began showing his presence online around mid-1995 (Jun 30th, 1995) using the whimsical e-mail address “doodoo@hooked.net” and other similar variants at age 14.  From his posting style, his language command is somewhat sophisticated, however the subject of his emails were mostly inflammatory trollings to begin with, the kind that most experienced newsgroupers will skip, and newbies/marks tend to respond in kind to.  He presented himself as a young, black hip-hop dj.  The majority of his usage of his usage of newsgroups was to buy and sell audio equiptment, and occasionally other items such as console gaming systems, comics, and music collections, as well as occasionally make commentary on other’s posted lyrics or to post lyrics of his own. It can be said that John Walker Lindh, or John Doe, as he was known in his hip hop dj’ing circles, that he was somewhat of an expert the area of hip hop music, and he had one of the first hip-hop webpages on the internet, named “John Doe’s Dukey Palace” (http://www.hooked.net/users/doodoo/index.html).  Unfortunately, there exist...

CyberWar Update #2

The Virus Invasion portion is new material that I’ve been working on for a couple days, it first became relevant news about Tuesday of this week.  The FBI vs. CIA is material I went over with John and Paul on their radio show on WABC last night (hear them on 770am 10-1 EST) — included is a list of other tools that the FBI and CIA are currently employing in their effort to come in line with the online world. Included is a description how you can completely, legally and safely circumvent all the known ways of online federal monitoring.  There are other ways to make it more safe, but these include tactics which are not allowed within the confines of the law, and I cannot suggest their usage for everyday purposes. Rizzn’s Wartime Factbook: http://factbook.diaryland.com/ The Best UAV: http://www.unmannedaircraft.com CyberWar Update #2 The update as of November 30th, 2001 Report assembled by Mark Hopkins <markhopkins@mindless.com> of Parallad Studios OSIS Project There are two major fronts opening up in the Cyber War front, largely being ignored by the major media. Computer security groups are noting the vast influx of email-propelled virii. The other front largely ignored is the clash in the surveillance policies and programs between the FBI and the CIA, reported only by Charles R. Smith of Newsmax.com news service. Virus Invasion Badtrans is the name of the virus that is making the rounds currently and grinding email servers to a halt worldwide. There is much speculation by respectable theorists that this may be the much-talked about keylogging virus the FBI is threatening to release on the public...

A different front in the Cyberwar.

A different front in the Cyberwar. Rizzn’s Wartime Factbook: http://factbook.diaryland.com/ The Best UAV: http://www.unmannedaircraft.com FBI v. CIA Battle in Cyberspace Charles R. Smith Wednesday, Nov. 28, 2001 U.S. Agencies Battle Each Other on the Internet The U.S. government is struggling to rebuild its image after it failed to discover the plot to attack America on Sept. 11. The FBI and CIA, two agencies charged with law enforcement and intelligence operations, have taken the most heat for the failure. Both agencies had few areas of cooperation prior to Sept. 11. Now the FBI and CIA have suddenly discovered conflicting roles inside cyberspace. The FBI recently was forced to reveal another part of its Cyber-Knight project, an effort by the agency to monitor all Internet communications. Last year the FBI was forced by privacy advocates to reveal that it had a new software program called Carnivore designed to monitor Internet e-mail. The Carnivore system is reportedly installed not on home personal computers but on Internet Service Provider computers, allowing the agency to siphon off data from suspected customers. The FBI is reportedly using a new and improved version of Carnivore, a software program designed to monitor secure e-mail over the Internet. The new FBI program, called Magic Lantern, is described as key logger software designed to steal the pass phrase used to start the popular encryption program PGP, or Pretty Good Privacy. A key logger program is designed to capture keystrokes – what a user keys in – and then store the data in a separate location for later retrieval by a hacker. The FBI plans to use Magic Lantern to...