Summary of the Day's Online Travels |
READ
#Reddit "shadowbans" user for asking#Assange a question about censorship on Reddit. https://www.reddit.com/r/technology/comments/2ghp54/i_am_julian_assange_ama_about_my_new_book_when/ …#GamerGate
#GamerGate'ers should know that the pattern of censorship & cronyism they see is mirrored at the very top. Level up:
Misc. Look-ups
" ... video game space has been so heavily politicized with a left-leaning, feminist-driven slant," >> http://goo.gl/bQtdF9>> Why do ppl bother to use#Reddit when it's a censored platform?"4chan in general is widely viewed as a nasty sort of place for anyone not straight and male" [Forbes] >>But 4Chan's heaps more interesting"... capitalizing on a culture of victimhood" (Erik Kain) >> What a fantastic phrase. We see this happening ALL THE TIME in wider society!-----------------------------------------------#Russia - Lavrov's trip#Zimbabwe - platinum deposit, Darwendale, project - w/ Russia's Rostec & others http://goo.gl/4pG2D1 >-----------------------------------------------#PoliceState - UK government made 1,535 requests for citizens' information from Google - http://goo.gl/D88J1LIrish authorities - x10 requests this year - Gmail, Google Docs, YouTube or other Google - http://goo.gl/D88J1L - reasons unknown#Ireland#Denmark - x52 requests for citizens' information from Google. http://goo.gl/D88J1L#Belgium - x213 user data requests from Google >> http://goo.gl/D88J1L#Portugal -- x338 user data requests from Google -- http://goo.gl/D88J1L-----------------------------------------------#UK - C6 Intell Info Systems Ltd (“C6”) - global intelligence info - both individuals & companiesworked 4 City / London Fraud Squad - have access to ‘dark web’ http://goo.gl/7WBt6e - stolen perso records traded#hacker-----------------------------------------------#auspol >>NSW Police cyber hacking could be breaking the law, warns civil liberties lawyer>> http://goo.gl/HefliG -#WikiLeaks#Assange
>>warrants *don't allow generalised software computer hacking* - premises-based / search computers + 2 access other networks.-----------------------------------------------#USA &#Israel used Stuxnet computer worm 2009 to control#Iranian nuclear facility’s computer sys & destroy 1/5 country’s uranium supply!
- “zero-day” exploit -- http://www.wired.com/2011/07/how-digital-detectives-deciphered-stuxnet/all/ …The Stuxnet 2009 worm & Iran destruction uranium info is from New York Times. Wired info good but hard to follow (4 me).#Surveillance - NSA Secretly Trying To Map The Internet — Including All Devices Connected To It — In Real-Time - http://goo.gl/D0tYHS>> "a bird’s eye view of the planet’s digital arteries" --#Snowden“...agencies successfully infiltrated major German telecommunications providers Netcologne and Telekom, the latter of which runs service to Britain and the eastern U.S.” [DailyCaller]“... Stellar, a German satellite communications firm revealed to have been hacked” [DailyCaller]#surveillance - NSA Big Brother program, entitled Treasure Map - http://goo.gl/UD6yIG - Five Eyes hacks & monitors -#auspol#nzpol#ukpol>> NSA + Five Eyes (UK, AU, NZ, CA) alliance essentially have access to all communications in the world. [ibtimesco.uk]“More German tensions: Among the “autonomous systems” Treasure Map penetrated in order to create this global map, according to Snowden documents, is Deutsche Telekom, which is partly owned by the German government, and Netcologne, a regional German telecom. That’s sure to cause even more friction between the U.S. and Germany, which expelled the CIA’s Berlin station chief in July over NSA spying revelations, including that the spy agency allegedly tapped Chancellor Angela Merkel’s cellphone. Deutsche Telekom told Der Spiegel it conducted an extensive investigation after the magazine alerted it about the possible infiltration but found no suspicious hardware or data leaving its networks.”Source: http://www.politico.com/morningcybersecurity/0914/morningcybersecurity15290.html-----------------------------------------------ISRAEL"Israel has built “an Iron Dome of cybersecurity that parallels the Iron Dome against the rockets,” Netanyahu said ..."
"Netanyahu said the majority of attacks stem from Iran, including cyberattacks that are ostensibly from Iran-allied groups such as Hezbollah and Hamas."
"“Iran and its proxies take advantage of the security and anonymity of cyber space” to attack Israel and other countries, he said."
The story from the Jerusalem Post: http://bit.ly/1tRBvlL
[Politico/com]
#Israel #Iran #CybersecurityUnited Nations Disengagement Observer Force Zone - costs $64 million per year to run as of 2014 - http://goo.gl/TNgP0E ...#Israel #Syria ... Golan Heights-----------------------------------------------#Hacker#cybersecurity - Involvement of a major US carrier in Border Gateway Protocol hijacking http://goo.gl/L8uLm1 misrouting#BulgariaGermany-based spyware firm FinFisher facing more troubles w/ publication on#Wikileaks / http://bit.ly/1s2FrUp + http://politico.pro/1kvMmSz-----------------------------------------------United Kingdom profile - Timeline - A chronology of key events - http://goo.gl/jyqCgu>1945 Labour intros welfare state + UN Security Council perma memb/ 1949 UK a founder member of Nato / 1973 EEC / end. by refer. 1975-----------------------------------------------RUSSIA / BALTIC#Russia >>> Baltic States of suppressing the rights of Russian speakers >>> http://goo.gl/OmCCdf >>>#Latvia,#Lithuania,#Estonia
This some of the information I looked at today.
As usual, it's easier to just copy over where I've been than it is to try to recall.
Ran off a copy of the massive Stuxnet article because I find it impossible to focus on something long and involved, staring at a screen. Find it better to have a hard copy for mark-up and ease of reading.
At the end of my day of checking things out, I'm wondering why I've bothered running off the involved Stuxnet hacking article when I'm not a techie and really don't need to know anything in depth.
On the other hand, it's supposed to be some techie (or surveillance) big deal, so I might have to force myself to get through the information -- even if it's just skimming over it.
No comments:
Post a Comment