Krypt3ia

(Greek: κρυπτεία / krupteía, from κρυπτός / kruptós, “hidden, secret things”)

Archive for January 14th, 2009

Goodbye Grissom

with 2 comments

Goodbye Grissom

Goodbye Grissom

I ran across an article on CNN.com today about how Grissom is leaving CSI. Part of me thinks that, well, it’s a natural progression and should be good. What I think is klugey and bad is bringing Fish in to take over (in a way) I think its actually time to let the show go CBS.

The other two shows kinda suck and really Grissom was the heart of this show. I would really hate to see this show devolve any more ala CSI Miami. What a suckfest that is…

http://www.cnn.com/2009/SHOWBIZ/TV/01/13/ew.petersen/index.html

Written by Krypt3ia

2009/01/14 at 01:52

Posted in Tv

Are you being watched?

with 2 comments

Report: U.S. Surveillance Society Running Rampant

By David Kravets EmailJanuary 12, 2009 | 4:30:49 PMCategories: Surveillance

If you think you’re being watched, you’re probably right.

The American Civil Liberties Union posted a website Monday showing that government-financed surveillance cameras are running rampant across the United States.

All the while, studies suggest they do nothing to cut down on violent crime. San Francisco, for example, has spent $700,000 for dozens of public cameras, but a University of California study (.pdf, 187 pages) just concluded there was “no evidence” they curtailed violent crime.

“Violent incidents do not decline in areas near the cameras relative to areas further away,” added the study, which noted the cameras helped police bring charges against six people accused of felony property crimes. “We observe no decline in violent crimes occurring in public places.”

But the report did show that, over the past two years, property crimes such as burglary and muggings dropped an estimated 24 percent in areas within 100 feet of San Francisco camera locations.

The ACLU’s website, “You Are Being Watched,” shows a map of the 50 U.S. states with links to news accounts about where surveillance cameras are in each state. The federal government has given state and local governments $300 million in grants to fund an ever-growing array of cameras.

Barry Steinhardt, director of the ACLU’s Technology and Liberty Program, said in a telephone interview that, while the cameras have helped nab suspects, he believes they provide a false sense of security.

“It’s the illusion of security … public authorities like to give the impression they are doing something about crime and terrorism,” Steinhardt said.

He said it is impossible to quantify exactly how many government-backed surveillance cameras are in the public right of way, but they are in virtually every U.S. state.

Two questions posed on the ACLU site ask: “Do we want a society where an innocent individual can’t walk down the street without being considered a potential criminal?” and “Do we want a society where people are comfortable with constant surveillance?”

Yes, well, what about camera systems that get a high rez picture to use as a method of biometrical recognition? Take that image file and add it to a vast database perhaps that ties into oh, Drivers licensing servers? Sounds to me like a good way to keep a dbase on everyone eh?

Written by Krypt3ia

2009/01/14 at 01:33

Posted in Infosec

Is Someone in China Reading Your Emails?

leave a comment »

Is Someone in China Reading Your Emails?

By Maura Moynihan, AlterNet

Posted on January 12, 2009, Printed on January 13, 2009

http://www.alternet.org/story/119064/

On December 16th 2008, Time Magazine announced the annual People Of the Year List.  Barack Obama topped the list, and one runner-up was China’s Zhang Yimou, the epic filmmaker and Olympic impresario, for creating “arguably the grandest spectacle of the new millennium,” the opening and closing ceremonies of the 2008 Beijing Olympics Games, which “showcased the rise of China as a world power.”

The bland celebration of China’s version of Leni Riefenstahl dodged the uncomfortable truth that the Olympics enabled the Chinese Communist Party to expand their intelligence operations within the corporations and governments who flew to Beijing for a sports party. China is now flexing its post-Olympic power with an aggressive new cyber-espionage campaign, targeting government, military and civilians with equal force. If you use Windows, the Chinese Communist Party to knows how to hack into your laptop. If you have friends and associates in China, they’re reading your emails.

The Pentagon, the State Department and the US Congress have been monitoring China’s cyber intelligence campaigns for years. The Congressional Record has a long list of hearings on the matter.  In 2008 press statements, the Pentagon report that Chinese cyber espionage has “increased dramatically” before and after the Olympic Games.

During preparations for the Olympics, China installed massive new surveillance and security systems with the generous assist of the U.S. corporations Honeywell, General Electric, United Technologies and IBM. Throughout the Olympic gold rush the Bush administration routinely sidestepped the 1990 law stipulating that high-tech must not benefit the Chinese military. After all, the People’s Republic of China was a paying customer and owns a majority share of U.S. Treasury Bills.

The craven posturing of the Olympic Committee and their corporate sponsors allowed Beijing party bosses to break every pledge to improve human rights, duly sworn when they lobbied for the contract. And what has the result been of this blind quest for corporate profit? On November 20, 2008, the bipartisan U.S. China Economic and Security Review Commission sent its annual report to the United States Congress. It states: “China is targeting U.S. government and commercial computers for espionage (and) is stealing vast amounts of sensitive information from U.S. computer networks.”

The website of an independent research consortium infowar-monitor.net provides updates on China’s web infiltration methods. One alarming new report describes tracking devices carefully affixed into computers manufactured in China that route information to the Chinese Communist Party’s Public Security Bureau. Cyber intelligence is linked into a vast human intelligence gathering operation of Chinese citizens recruited to spy for the Motherland known as “a thousand grains of sand.”  This network involves tourists, businessmen and some of the over 100,000 Chinese students who study overseas each year. Every one is questioned by intelligence officers before and after their foreign tour and offered lucrative rewards for valued intelligence.

China’s military academies are also diligently training thousands of young workers in computer hacking. Larry M. Wortzel, the author of a 2007 US Army War College report on China’s cyber campaigns said: “The thing that should give us pause is that in many Chinese military manuals they identify the U.S. as the country they are most likely to go to war with. They are moving very rapidly to master this new form of warfare.” Two Chinese army hackers produced a “virtual guidebook for electronic warfare and jamming” after studying dozens of US and NATO manuals on military tactics.

Chinese cyber hackers have made numerous incursions into classified US networks.  In November 2006, Retired Air Force Major General Richard Goetze, a Naval War College professor, said the Chinese “took down” the entire Naval War College computer network — an operation that prompted the U.S. Strategic Command to raise the security alert level for the Pentagon’s 12,000 computer networks and 5 million computers. In June 2007, 150 computers in the $1.75 billion computer network at the Department of Homeland Security was quietly with programs that sent an unknown quantity of information to a Chinese-language Web site. Unisys Corporation, the manager of the DHS computers, allegedly covered up the penetration for three months.

Do a brief web search and you will find a long list of U.S. educated, high level Chinese-born agents serving time in U.S. prisons for spying and stealing military secrets for their homeland.  Last fall FBI agents warned the Obama and McCain campaigns that Chinese networks were monitoring their computers. In June 2008, Rep. Frank Wolf (R-VA.) revealed that computers in the House International Relations Committee had been hacked by Chinese agents.  “These cyber attacks permitted the source to probe our computers to evaluate our system’s defenses, and to view and copy information,” said Wolf. “My suspicion is that I was targeted by Chinese sources because of my long history of speaking out about China’s abysmal human rights record.”

On Feb. 15, 2006, representatives of Google, Yahoo, Microsoft, and Cisco Systems were summoned before the House International Relations Committee to defend what Rep. Chris Smith (R-N.J.) called a “sickening collaboration” with the Chinese government that was “decapitating the voice of the dissidents.” The web executives defended their dealings with the Chinese government on the grounds that China is a global market.

The global market provides endless opportunities for cyber-espionage. A February 2005 report from the Defense Science Board states “a significant migration of critical microelectronics manufacturing from the United States to other foreign countries has [occurred] and will continue to occur.” America’s defense systems are based on “trusted and classified” microchips. The February 2005 Defense Science Board report said, “Trust cannot be added to integrated circuits after fabrication; electrical testing and reverse engineering cannot be relied upon to detect undesired alterations in military integrated circuits.”

After Deng Xiaopeng took Chairman Mao to the shopping mall, Wall Street analysts proclaimed that China’s Maoists were different from Stalin’s Bolsheviks, and that Coca Cola would magically engender democracy within a totalitarian state. China’s Maoists were supposedly different, making the economy work without dismantling state surveillance and control.

The financial tsunami that gushed out of Wall Street this fall forced the closure of over 30 Chinese factories, the ones that make the plastic Santas, socks and other such junk available at Walmart. But plenty more Chinese factories are churning out computers, digital chips, satellites, and rockets for the high-tech universe that China has staked out as the next frontier of world war. Let’s hope that the only thing “Made in China” next Christmas is a plastic Santa — not spyware in our computers, where Big Brother, wearing, a Mao cap, is shifting through our cyber profiles.

Those of you who know me from LJ will no doubt again say “Shit, here he goes again on China!” but, let me tell you this is only the half of it! You folks are not privy to the other darker side of the street. Suffice to say that China will overtake us I think.

Why?

Because this country is too fat, slothy, and stupid to fix the shit and not allow China to take over.

Doomed we are.

Ni hao my Chinese overlords!

Written by Krypt3ia

2009/01/14 at 00:43

Posted in Cyber, Infosec