A Mother’s Personal Appeal to ISIS | The New York Times


Publicado el 27/8/2014

Shirley Sotloff’s son Steven is being held by the Islamic State in Iraq and Syria. In a video released to The New York Times, she spoke directly to the group’s leader, Abu Bakr al-Baghdadi.

Read the story here: http://nyti.ms/1C2F5zh

 

DIGITAL CHAMBER + Keiser Report en español: Una sociedad de robots (E644)


http://digitalchamber.org/

BY: https://twitter.com/PerianneDC

@PerianneDC

I am building the case for Bitcoin in DC.

Washington, DC
Joined June 2011

Keiser Report en español: Una sociedad de robots (E644)

Publicado el 23/8/2014

Hoy, en Keiser Report, Max y Stacy imaginan un mundo futuro no muy lejano de robots, en el que los seres humanos se verán reemplazados por máquinas. Ponen como ejemplo a Japón donde los robots desempeñan todo tipo de tareas domésticas. En la segunda mitad, Max entrevista a Perianne Boring, de la Cámara de Comercio Digital, una asociación de comercio con sede en Washington que representa a la industria de las divisas y los activos digitales ante el Gobierno y la opinión pública.

¡Suscríbete a RT en español!
http://www.youtube.com/user/Actualida…

RT en Twitter: https://twitter.com/ActualidadRT
RT en Facebook: https://www.facebook.com/ActualidadRT
RT en Google+: https://plus.google.com/+RTenEspanol/…
RT en Vkontakte: http://vk.com/actualidadrt

Vea nuestra señal en vivo: http://actualidad.rt.com/en_vivo

RT EN ESPAÑOL: DESDE RUSIA CON INFORMACIÓN

 

Cellular Exploitation on a Global Scale: The Rise and Fall of the Control Protocol


Publicado el 11/8/2014

“Since the introduction of the smart phone, the issue of control has entered a new paradigm. Manufacturers and enterprises have claimed control over not just how your phone operates, but the software that is allowed to run on it. However, few people know that Service Providers have a hidden and pervasive level of control over your device. These hidden controls can be found in over 2 billion cellular devices worldwide. Organizations have been quietly deploying these controls in smart phones, feature phones, basebands, laptops, embedded M2M devices, and even certain cars. Someone with knowledge of these controls and the right techniques could potentially leverage them for cellular exploitation on a global scale.

We’ve reverse engineered embedded baseband and application space code. We’ve torn apart the Over-the-Air communications and implemented our own code to speak the relevant protocols. Layer by layer, we’ve deconstructed these hidden controls to learn how they work. While performing this work we’ve unearthed subtle flaws in how the communication is handled and implemented. After understanding these flaws, we’ve written proof-of-concept exploits to demonstrate the true risk this software presents to the end user.

In this presentation, we will discuss and disclose how Over-the-Air code execution can be obtained on the major cellular platforms and networks (GSM/CDMA/LTE). Including but not limited to Android, iOS, Blackberry, and Embedded M2M devices. You will come away from this talk armed with detailed insight into these hidden control mechanisms. We will also release open source tools to help assess and protect from the new threats this hidden attack surface presents. These tools will include the ability to dynamically test proprietary system applications and simulate different aspects of a cellular environment.”

BH Cover Photo
BH Cover Photo

Saving Cyberspace by Jason Healey


us-14-logo
us-14-logo

Publicado el 11/8/2014
“Imagine that twenty years after Johannes Gutenberg invented mechanical movable type, the Pope and the petty princes – in fact, anyone who tried hard enough – had the ability to determine exactly who was printing exactly what. Worrying about intellectual property theft, privacy or civil rights violations, had those concepts existed, would be missing the point.

The future of Europe, the future of humanity, would have been profoundly changed, not just for five years but five hundred. If people lost trust in the underlying communication medium, could there even have been a Renaissance or Enlightenment?

Unfortunately, the world is facing this dilemma today as it is possible, even likely, the Internet will not remain as resilient, free, secure, and as awesome, for future generations as it has been for ours. It is under grave threat from data breaches, theft of commercial secrets, the opportunity for widespread disruptive attacks and systemic failures, erection of sovereign borders, and mass surveillance.

The only truly goal for this new cyber strategy should be to give the defenders the high-ground advantage over attackers. This is just imaginable with a clever push for new technology, policy, and practice which is applied patiently, internationally, at scale, and with the private sector at the fore.

This talk will discuss these threats to the Internet and novel approaches to sidestep much of the current unproductive debate over privacy versus security.”

Assange: “Abandonaré la Embajada de Ecuador pronto”


Publicado el 18/8/2014

“Puedo confirmar que voy a salir de la Embajada de Ecuador pronto, pero no por las razones que imaginan ustedes, ni por las que señalan los medios”, afirmó el fundador de WikiLeaks, Julian Assange, este lunes durante una rueda de prensa.

LEER MÁS: http://es.rt.com/zLC

El portavoz de WikiLeaks a RT: http://es.rt.com/zMf

¡Suscríbete a RT en español!
http://www.youtube.com/user/Actualida…

RT en Twitter: https://twitter.com/ActualidadRT
RT en Facebook: https://www.facebook.com/ActualidadRT
RT en Google+: https://plus.google.com/+RTenEspanol/…
RT en Vkontakte: http://vk.com/actualidadrt

Vea nuestra señal en vivo: http://actualidad.rt.com/en_vivo

RT EN ESPAÑOL: DESDE RUSIA CON INFORMACIÓN