mouthporn.net
#cyberwar – @h4x0r3d on Tumblr
Avatar

through h4x0r3d's eyes

@h4x0r3d / h4x0r3d.tumblr.com

+-------------------------------+ .:[h4x0r3d@Hackerzlair]:. +-------------------------------+ .:[Links]:. > KOPIMI > HACKER EMBLEM > DATALOVE! > CASCADIA > ABOUT.ME #CYBERWHALEWARRIOR #DGR +-------------------------------+
+-------------------------------+
Avatar

The battle for control of cyberspace is turning nasty, with young hackers, pirates and activists facing long prison sentences. We report from the frontline

*          *          *

....Back in January, the young tech entrepreneur Aaron Swartz killed himself. His body was found in his Brooklyn apartment. He was facing prison for downloading a mass of copyright-protected academic journals belonging to the Massachusetts Institute of Technology. It was hardly the crime of the century, and he'd probably have got not much more than a warning had federal prosecutors not intervened. But they did. They announced their intention to send him to jail for up to 35 years. It was like drawing battle lines between the old world that valued copyright protection and privacy of information, and the new world that valued the opposite. Swartz, who had suffered from depression for years, hanged himself. He was 26. He left behind him, among other innovations, Reddit, the open-source social media site, which he co-owned....

[Read More Here]
Avatar

© flickr

For those that are hungry for knowledge, these are feasting times. Caches of knowledge are being released all over the place. Cryptome has been releasing a collection of ebooks that are very interesting for /r/evolutionReddit.

Thank you Cryptome!

PDF WARNINGS:

Other misc:

White House Petitions:

Open Access Journals:

Book Collections on Tor:

This is far from over and the fight to release information from paywalls to the effective public domain has only just begun.

Avatar

Lecture date: Oct 13, 2009 at George Mason University by Prof. Paul A. Strassmann slides: http://www.strassmann.com/pubs/gmu/2009-10-13-cyberwar.pdf Part I: Internet Basics Part II: User Attacks Part III: Attacks on Switches Part IV: Attacks on Routers Part V: Attacks on Domain Names Summary This movie is part of the collection: Community Video Producer: Paul A. Strassmann Production Company: George Mason University Audio/Visual: sound, color Keywords: internet flaws, internet attacks, cyberwarfare Contact Information: [email protected]

Creative Commons license: Attribution 3.0 United States

Avatar

Source: Booz Allen Hamilton

How should the United States respond as global competitors expand their influence over the Internet and build cyber capabilities? An analysis of the Internet in 2020 shows that the United States must develop a strategy that focuses on more than technology to retain its cyberpower status. Read this white paper and decide for yourself which of these four potential scenarios is most likely for the US:

  • The Asian Tiger -- Asia attains Internet dominance over the US.
  • First Among Equals -- the US maintains a significant role, but lack of controls persists.
  • The Balkanized Internet -- the Internet becomes fragmented and its access controlled by nation-states.
  • The Stagnating Internet -- the US retains a dominant role, but over-regulation strangles commerce.

What is the future state of the cyber domain?

-or-

Avatar

The White House is reviewing whether to ask for new authorities for the Defense Department and other government agencies to ensure that the nation's critical computer systems are protected in the event of a major attack, the commander of the Pentagon's new Cyber Command said Thursday.

If an adversary were to penetrate the U.S. power grid or other critical systems with an "unknown capability," those systems probably would "shut down," Gen. Keith Alexander told members of the House Armed Services Committee.

The Cyber Command is tasked with protecting only military computer networks. "It is not my mission to defend, today, the entire nation," Alexander said.

Deciding who should execute what role in defending the nation against cyberattack is a thorny issue, complicated by the fact that the agency tasked with assisting the private sector - the Department of Homeland Security - lags behind the Defense Department in personnel, resources and capabilities.

Alexander said the White House is discussing how to form a team with the FBI, the Cyber Command, DHS and other agencies to "ensure that everybody has the exact authorities and capabilities that they would need to protect the country." The White House may have to ask Congress for new authorities.

You are using an unsupported browser and things might not work as intended. Please make sure you're using the latest version of Chrome, Firefox, Safari, or Edge.
mouthporn.net