10/23/2014

#ukraine denies Der Spiegel desinformation about BUK missiles and #MH17

we have published here time and time over again all the information that has been published by specialists since long time that the BUK came in from Russia and there is all the photographic evidence to proof it.

But the propaganda and intox campaign of the masters of the Kremlin is as good as even when it comes to the western press who just copy-paste without verifying or critically researching information before researching it.

And this strategy was even foreseen from the beginning directly after the disaster.

“We have clearly stated that all our missile systems, including their personnel, were not present in the area of the tragedy,” Ukraine’s Ministry of Foreign Affairs spokesman Yevhen Perebyinis told DW on Monday, October 20.  “Statements that  militants had seized Ukrainian missile complexes do not conform to reality since all these systems had actually been moved in advance. We find it strange to hear conclusions that the militants had used Ukrainian missiles,” he said.

 

Similarly, Ukraine’s Ministry of Defense in an official statement posted on its website, October 20, has categorically denied claims that terrorists had seized the BUK-M1 (NATO code: SA-11 Gadfly) anti-aircraft missile system from a Ukrainian military unit.

 

“Certain media citing the German magazine Der Spiegel have been disseminating information that the Malaysian passenger plane, flight MH17 , flying over the Donetsk Oblast had been downed by a BUK anti-aircraft missile system seized by pro-Russian separatists from one of the Ukrainian military units. The Command of the Air Force of the Armed Forces of Ukraine officially states that information on the seizure by terrorists of the BUK-M1 anti-aircraft missile system from a military unit of the Air Force of Ukraine is not true,” the Ministry’s statement said.


http://euromaidanpress.com/2014/10/22/ukraine-asks-german...

Permalink |  Print |  Facebook | | | | Pin it! |

the german drones can't be used in Ukraine because.....

yeah you read it

they will never go to Antartica

http://euromaidanpress.com/2014/10/19/bundeswehr-german-drones-are-not-suitable-for-the-osce-mission-in-ukraine/

Permalink |  Print |  Facebook | | | | Pin it! |

the military ships of the future don't look like ships

In fact they are constructed to survive in electronic warfare attack and to keep attacks off that try to intercept communications (Tempest)

If in the next war you can't defend yourself against the electronical signals and protect your own, than you have lost, no matter how big your bomb is

by the way Russia is building an enormous Electronic warfare base in Kalingrad the Russian enclave that oversees the baltic sees (he is sending a few hundred electronic and cyberwarfare soldiers there)

Permalink |  Print |  Facebook | | | | Pin it! |

#gamergate:how a small bunch of online SS-style bullish trolls bring down big gamessites

These big gamers sites are all about the money, about having advertising and the advertisers all want to be hip and cool and not be embroiled in an online war between young women who happen to be gamers but of a different kind (even if professional gamer specialists say that women are the new market as the men market for gaming is already totally conquered and every industry looks for enormous expansion to be able to invest and develop and grow and diversify)

but as they didn't win on the public forum about the place that women couldn't have in their gamers environment, they went on the attack against the firms who often lack the moral courage to withstand public campaigns and fight for the freedom of each to live, speak and breath whatever the sex, religion, race or political opinion

"On October 1, the computing giant Intel pulled its ads from Gamasutra, a trade website for game developers, over an essay called "'Gamers' don't have to be your audience. 'Gamers' are over" by a journalist named Leigh Alexander. Intel had been successfully harassed by a small, contemptible crusade called "Gamergate"—a campaign of dedicated anti-feminist internet trolls using an ill-informed mob of alienated and resentful video game-playing teenagers and young men to harass and intimidate female activists, journalists, and critics.

Unable to run Alexander out of game writing, as they had with the writer Jenn Frank, or force her from her home, as they did to the developer Brianna Wu, or threaten her from public engagements, as they did the following week to the critic and activist Anita Sarkeesian, Gamergate went after her publisher. And, in an unbelievable and embarrassing act of ignorance and cowardice, Intel capitulated. The company's laughable "apology," released late on that Friday afternoon, didn't cover up the fact of Gamergate's victory: Intel was not replacing its ads.
http://gawker.com/how-we-got-rolled-by-the-dishonest-fasc...

And other advertisers followed suit and those big gamer communities are losing hundreds of thousands of dollars. But now it is time for the others to go back on the offense against the firms who didn't stand firm, who didn't defend our and your freedom and let the bullish gangs cry victory. Even in Football stadiums girls and women go with men to see the match and support their teams together. There are even women in the police, the army and other professions that were before solely for men. Why should gaming be different ? And every woman working for firms like Intel or buying products from Intel or distributing them should tell Intel they were wrong because by withholding their advertising because of a gang of people who have no respect for the rights of others they go against any moral leadership they claim in all of their social responsability ads.

If women can be no part of the community there is no community.

 

Permalink |  Print |  Facebook | | | | Pin it! |

10/22/2014

hacking the announcement screens in a Belgian train

well there are only two ways

or you have only fysical access and that means that you have to open the door and type a new message in

or it works wireless and than you have to observe the kind of system, look up the administrative password that probably will still be the same and than you log on with your wifi (look at the logons if you keep that) and set the message

Stefaan is shit

I'll have a look at it tomorrow in the train :) and report back to you later

if I got more info (anybody knows the name of the system ?)

Permalink |  Print |  Facebook | | | | Pin it! |

some belgian servers that use SHA1 that can be used to make a fake certificate

this one is used by millions

 

and so on and so on and so on

but others are doing the right thing by disactivating SHA1 like Belgacom - nice

Permalink |  Print |  Facebook | | | | Pin it! |

naughty users of sextoy site leaked

well now you will be the joke

maybe you need a spank

Permalink |  Print |  Facebook | | | | Pin it! |

massive attacks against flashplayer - patch now

"Regardless of where the exploit came from, users who have not yet installed the latest Flash Player updates should do so as soon as possible; especially companies, where automatic updates are typically disabled and the patch deployment process takes longer.

 

Windows and Mac users should update to Flash Player 15.0.0.189, or 13.0.0.250 if they’re using the extended support release. Users of Flash Player on Linux should upgrade to version 11.2.202.411. The Flash Player plug-ins bundled with Google Chrome, Internet Explorer 10 and Internet Explorer 11 will receive patches though the update mechanisms of those browsers.

 

Adobe also released updates for its AIR application runtime and software development kit (SDK), since the program bundles Flash Player.
http://www.pcworld.com/article/2836732/one-week-after-pat...

Permalink |  Print |  Facebook | | | | Pin it! |

10/21/2014

test if the SSL certificate uses SHA1 and can be falsified (disable SHA1)

this is the website http://www.sha2sslchecker.com

it offers a clear explanation and a information about how to set up your migration

Permalink |  Print |  Facebook | | | | Pin it! |

US officials warn latest hack campaign of the year got 500 million financial records

"Federal officials warned companies Monday that hackers have stolen more than 500 million financial records over the past 12 months, essentially breaking into banks without ever entering a building.

"We're in a day when a person can commit about 15,000 bank robberies sitting in their basement," said Robert Anderson, Jr., executive assistant director of the FBI's Criminal Cyber Response and Services Branch.

The U.S. financial sector is one of the most targeted in the world, FBI and Secret Service officials told business leaders at a cybersecurity event organized by the Financial Services Roundtable. The event came in the wake of mass hacking attacks against Target, Home Depot, JPMorgan Chase and other financial institutions.
http://www.usatoday.com/story/news/politics/2014/10/20/se...

and ?

is anybody going to get some new legislation ? give more police and powers ? control more services if they are following regulations ? fine some people so they won't forget ?

nah, they don't panick when they give those numbers like that, so why should you

maybe it ain't true and it ain't so bad

because if it was really bad than he probably would be acting otherwise and would ask for resources and new regulations

Permalink |  Print |  Facebook | | | | Pin it! |

the code for the dangerous PPTX attacks used by Chinese APT is published

we have published it here

http://belsec.skynetblogs.be/this-is-the-pptx-exploit-used-by-chinese-apt-attacks-patched.html

because this has been used for years before it was patched now by Microsoft

and because it is and was used against critical infrastructure

and because it is published online and circulating freely

Permalink |  Print |  Facebook | | | | Pin it! |

#ukraine : the ceasefire may come to an end soon

this is what a Russian commentator says

"current polls suggest that “there will be almost no pro-Russian deputies” in the Verkhovna Rada to be elected on October 26.  And Putin needs to achieve his goals in the next few months before the situation in the occupied territories becomes “truly catastrophic” and potentially explosive for Russia itself.

 

Given that confluence of events, the Moscow commentator says, it is likely that “soon Russian forces and separatists will step up their military activities in an attempt to defeat the Ukrainian army, to cast doubt on the legitimacy of the parliamentary elections, and to provoke in Ukraine a political crisis” that will end either by making the current regime more willing to make concessions or by bringing to power a pro-Moscow government.

 

Given the approach of winter and the reluctance of the EU to put its gas supplies at risk by a new round of sanctions, Putin has every reason to move quickly. And “if Russian forces and their allies in the Donbas do not achieve real successes, perhaps, they will attack along the entire line of the border
http://euromaidanpress.com/2014/10/20/putin-has-no-altern...

and later today one of the rebel leaders said that the ceasefire is over

while new pictures have emerged from Russian military transports to Ukraine

the elections are near and very clear, there will hardly be any prorussian elected, so Putin has nothing to win if the elections take place because he can't lose anything

so don't be surprised if we have some surprises in the coming week

Permalink |  Print |  Facebook | | | | Pin it! |

German parliamentary commission that controls BND leaked wrongly the #MH17story

wow this will stirr some problems in the trust relationship

the president of the BND was briefing the Parliamentary commission about the indications and thoughts he had about the shooting of the airline but he doesn't had any proof. Only one member of the commission didn't understand it like this and told Der Spiegel that the intelligence agency BND had enough evidence.

perfect for the Russians

and the stories about the stolen BUK's from Ukraine were also planted.

http://ukraineatwar.blogspot.nl/2014/10/president-of-german-intelligence-and.html

Permalink |  Print |  Facebook | | | | Pin it! |

10/20/2014

omnipresence of mobile lights and police is the new communitypolicing in crime ridden NY neighborhoods

first at night they place mobile lights with generators everywhere where there is not enough light

there is no darkness as cover, you can see in the parks everything and everybody around you

and the drug streetcorners are being taken over by cops, every corner a few of them

not stopping and checking on everybody but being there to convince you that this is neither the time nor the place to do some crime there

and to keep everybody wondering what it is all about

nobody is communicating the official policies and strategies

http://www.vice.com/read/omnipresence-is-the-newest-nypd-tactic-youve-never-heard-of-1020

why is this important because the whole western world has studied the policies they have used in NY to diminish crime (zero tolerance) and the defects of some other policies

what works in NY will be copied by police forces all over the western world

Permalink |  Print |  Facebook | | | | Pin it! |

Facebook scrapes stolen passwords online and notifies its users - why not others

"Facebook is looking for your stolen passwords. On Friday, the social network announced that it built a system that will actively search sites for stolen credentials and then reference that data with its own records. "This is a completely automated process that doesn't require us to know or store your actual Facebook password in an unhashed form," Facebook security engineer Chris Long wrote in a post. "In other words, no one here has your plain text password." If there is a match, users will be notified by Facebook.
http://www.nbcnews.com/tech/security/facebook-hunting-you...

there are other volunteer and commercial services that say that they are doing the same thing but you have to trust them that they scrape everything instantly and that they don't miss out one publication on websites that are under watch (because they are on holiday for example). 

It is a system I have been trying to sell as an idea to the cert.be and to dns.be to do for the .be emailadresses and domains that were leaked, but each had doubts if it would fall within their mission (but publishing blablabla websites was no problem). It is even not that expensive and the hosting websites will even be happy because you can notify them of illegal information on their sites.

At the least I think the two big ISP's in Belgium should do it for their domainnames and dns.be for the belgian .be domainnames. That would already cover a big part of the stolen identities market.

And speed is important. One has to notify the sites, people and hosters as fast as possible after publication. This is the rat race.

Facebook has now shown that it can be done. Maybe facebook should make its code accessable to other partners (Gmail, yahoo, microsoft, aol, etc....)

 

Permalink |  Print |  Facebook | | | | Pin it! |

aren't these pretty barricades in Hong Kong (but where are the protestors gone ?)

watch live here nothing happening absolutely nothing live now

http://www.nbcnews.com/watch/live-video/watch-live-pro-democracy-protests-in-hong-kong-322519619939

Permalink |  Print |  Facebook | | | | Pin it! |

Mad Putin proposed to Poland in 2008 to invade #ukraine and take possession of 5 western provinces

this is like 1939 the other way round when Hitler proposed to Stalin (not the other way round) to invade Poland as a secret part of their non-aggression pact

http://www.thedailybeast.com/cheats/2014/04/24/poland-russia-offered-to-divide-ukraine.html

Maybe we understand now better why Poland and the other eastern countries are so afraid of Putin because he is so unpredictable and capable of anything

would you ever believe that he was capable of doing or saying this ?

And another thing 'the prime minister of Poland is talking with Putin and he knows that Putin is recording this conversation' (for propaganda goals). Does he still think he is a KGB operative playing spy or agent provocateur ? it is a mad mad world with people like this

Permalink |  Print |  Facebook | | | | Pin it! |

the Chinese government put some espionageware in the new iphones

Normally when you start the iphone you will still get a warning but if you ignore this because you don't understand it, than in fact you are giving everything away to the Chinese government

"This is clearly a malicious attack on Apple in an effort to gain access to usernames and passwords and consequently all data stored on iCloud such as iMessages, photos, contacts, etc. Unlike the recent attack on Google, this attack is nationwide and coincides with the launch today in China of the newest iPhone. While the attacks on Google and Yahoo enabled the authorities to snoop on what information Chinese were accessing on those two platforms, the Apple attack is different. If users ignored the security warning and clicked through to the Apple site and entered their username and password, this information has now been compromised by the Chinese authorities. Many Apple customers use iCloud to store their personal information, including iMessages, photos and contacts. This may also somehow be related again to images and videos of the Hong Kong protests being shared on the mainland.
https://en.greatfire.org/blog/2014/oct/china-collecting-a...

Permalink |  Print |  Facebook | | | | Pin it! |

how to exfiltrate confidential data as videofiles without being detected

it is one thing to get into a network

it is a second thing to get to the confidential data

but the most difficult thing is getting it out without being detected

but if this is possible, it very easy (unless you have blocked the export of multimedia)

source http://www.darkreading.com/attacks-breaches/in-plain-sigh...

Permalink |  Print |  Facebook | | | | Pin it! |

international coordinated police effort to classify and organize seized childporn pictures

In the UK a database has been set up that will make it possible to limit the number of duplicate pictures and quicker find links between the pictures. It is called CAID

"The CAID database is also part of a larger international effort called Project Vic that seeks to classify images held by forces around the world.Richard Brown from the International Centre for Missing and Exploited Children, which is helping co-ordinate Project Vic, said the two initiatives were using the same protocols to ensure images could be swapped back and forth easily.Seven other countries were already helping with Project Vic and more were expected to sign up soon, he said.

 

"It is groundbreaking for law enforcement, tool providers, non-profits and industry to all stand together and agree on the need to standardize the approach to such egregious crimes," Mr Brown told the BBC
http://www.bbc.com/news/technology-29652766

standardizing could be done in many other sectors of cybercrime or malware

Permalink |  Print |  Facebook | | | | Pin it! |

1 2 3 4 5 6 7 8 Next