Google Begins Fueling Military Attack Against Iran

Satellite photos provided by the Pentagon-sponsored company are said to show Iranian facilities that the  IAEA report claims are nuclear weapon developing places.

Mail Online
November 11, 2011

These are the satellite images being used by the UN to claim that facilities at two Iranian cities may be used to develop nuclear weapons.

Satellite images of Arak and Natanz show changes to the facilities in the areas when compared with images taken in October 2010.

The overhead pictures were released by Google following a report by the International Atomic Energy Agency (IAEA) which expressed ‘serious concerns regarding possible military dimensions to Iran’s nuclear programme’.

The IAEA report released earlier this week states that while some activities in Iran have civilian as well as military applications, others are ‘specific to nuclear weapons’.

There were indications in the dossier that the country had conducted detonator development, as well as high explosives testing and electronic modelling of a nuclear warhead core.

The IAEA report, which ‘completely discredits’ the Islamic nation’s protestations of innocence, according to Foreign Secretary William Hague, cites preparatory work for a nuclear weapons test.

Development of an intermediate-range nuclear payload capable of reaching Israel is also in progress, according to the report.

Natanz, which features a Fuel Enrichment Plant and Pilot Fuel Enrichment Plant at its site, has been described as ‘the facility at the heart of Iran’s dispute with the UN’.

It is also thought to be the largest nuclear facility in Iran, and has anti-aircraft weapons to defend itself from potential airstrikes.

The town of Arak is home to a heavy-water production plant, which can be used to generate nuclear power.

The IAEA report stated that the agency requested further access to the plant in August, but did not receive a response from Iran.

Instead it has chosen to monitor the facilities from the air via satellite imagery.

It was revealed earlier this week that Israel could launch military action against Iran before Christmas, in a bid to prevent the country from developing a nuclear weapon.

Sources say the understanding at the top of the British Government is that Israel will attempt to strike against the nuclear sites ‘sooner rather than later’ – with logistical support from the U.S.

A senior Foreign Office figure has revealed that ministers have been told to expect Israeli military action, adding: ‘We’re expecting something as early as Christmas, or very early in the new year.’

Officials believe President Barack Obama would have to support the Israelis or risk losing vital Jewish-American support in the next presidential election.

In recent weeks, Ministry of Defence sources confirmed that contingency plans have been drawn up in the event that the UK decided to support military action.

Note: These are the same people who said there were weapons of mass destruction in Iraq, that Saddam was involved with the terror attacks on 9/11 and that terrorists had bought yellow cake uranium to use it as fuel for bombs. Up until today, no solid proof has been shown that any of the claims above are true. Neither has it been shown that Iran is developing nuclear weapons or that it intends to use them against anyone in the Middle East or elsewhere.

Google Cars grabbed Locations of Phones, PCs

by Declan McCullagh
CNETNews
July 26, 2011

Google’s Street View cars collected the locations of millions of laptops, cell phones, and other Wi-Fi devices around the world, a practice that raises novel privacy concerns, CNET has confirmed.

The cars were supposed to collect the locations of Wi-Fi access points. But Google also recorded the street addresses and unique identifiers of computers and other devices using those wireless networks and then made the data publicly available through Google.com until a few weeks ago.

The French data protection authority, known as the Commission Nationale de l’Informatique et des Libertés (CNIL) recently contacted CNET and said its investigation confirmed that Street View cars collected these unique hardware IDs. In March, CNIL’s probe resulted in a fine of 100,000 euros, about $143,000.

The confirmation comes as concerns about location privacy appear to be growing. Apple came under fire in April for recording logs of approximate location data on iPhones, and eventually released a fix. That controversy sparked a series of disclosures about other companies’ location privacy practices, questions and complaints from congressmen, a pair of U.S. Senate hearings, and the now-inevitable lawsuits seeking class action status.

A previous CNET article, published June 15 and triggered by the research of security consultant Ashkan Soltani, was the first to report that Google made these unique hardware IDs–called MAC addresses–publicly available through a Web interface. Google curbed the practice about a week later.

But it was unclear at the time whether Google’s location database included the hardware IDs of only access points and wireless routers or client devices, such as computers and mobile phones, as well.

Anecdotal evidence suggested they had been swept up. Alissa Cooper, chief computer scientist at the Center for Democracy and Technology and co-chair of an Internet Engineering Task Force on geolocation, said her 2009 home address was listed in Google’s location database. Nick Doty, a lecturer at the University of California at Berkeley who co-teaches the Technology and Policy Lab, found that Google listed his former home in the Capitol Hill neighborhood in Seattle.

Read Full Article…

Google could be sued for stealing data from open wi-fi networks

International Business Times
July 1, 2011

A judge in San Francisco decided that the company’s actions may have violated federal laws on wiretapping.

Despite Google’s attempts to have the lawsuit thrown out by repeatedly that anyone could have intercepted the wireless signals, the internet Giant could still face prosecution, as it had previously admitted collecting the data by mistake while gathering images for its Street View service.

Since the allegations first emerged, Google has stopped its Street View cars logging wi-fi networks, which previously involved sampling packets of data from wireless hotspots.

Once on unencrypted networks the system was able to access logins, passwords and other personal details and more than 600MB of data was said to have been collected in 30 countries.

As soon as the evidences first emerged, , Google apologised for its action, explaining that blaming a coding error was responsible for the malfunction and it maintained it would , and delete the data, but that did not stop investigations to be launched in several countries.

France fined Google 100,000 euros (£87,000) over the breach and in the US, a class action lawsuit was brought on behalf of plaintiffs from nine states.

During the case, which is being heard in California where Google’s headquarters is located, the firm tried to have the case dismissed on the grounds that the data gathering was inadvertent but the U.S District Court Judge James Ware disagreed and said that just because a wi-fi network was open did not mean it was meant to be public.

“Merely pleading that a network is unencrypted does not render that network readily accessible to the general public,” Judge Ware wrote in his decision.

The fact that Google used some specialist equipment meant it was was liable for prosecution under federal wiretap laws.

Judge Ware threw out several other elements of the complaint against Google, relating to state laws on wiretapping and unfair competition.

In a statement, the company dismissed the claims and said it would consider the latest ruling before deciding whether to launch an appeal.

“We believe these claims are without merit and that the court should have dismissed the wiretap claim just as it dismissed the plaintiffs’ other claims. We’re still evaluating our options at this preliminary stage,” Google said in a statement to the WSJ.

Internet Dictatorship Begins in Singapore

A “new” system that records every move, stores all passwords and homogenizes software and that will control the net from 3 major hubs.

by John Markoff
NYTimes
June 25, 2011

A small group of Internet security specialists gathered in Singapore this week to start up a global system to make e-mail and e-commerce more secure, end the proliferation of passwords and raise the bar significantly for Internet scam artists, spies and troublemakers.

“It won’t matter where you are in the world or who you are in the world, you’re going to be able to authenticate everyone and everything,” said Dan Kaminsky, an independent network security researcher who is one of the engineers involved in the project.

The Singapore event included an elaborate technical ceremony to create and then securely store numerical keys that will be kept in three hardened data centers there, in Zurich and in San Jose, Calif. The keys and data centers are working parts of a technology known as Secure DNS, or DNSSEC. DNS refers to the Domain Name System, which is a directory that connects names to numerical Internet addresses. Preliminary work on the security system had been going on for more than a year, but this was the first time the system went into operation, even though it is not quite complete.

The three centers are fortresses made up of five layers of physical, electronic and cryptographic security, making it virtually impossible to tamper with the system. Four layers are active now. The fifth, a physical barrier, is being built inside the data center.

The technology is viewed by many computer security specialists as a ray of hope amid the recent cascade of data thefts, attacks, disruptions and scandals, including break-ins at Citibank, Sony, Lockheed Martin, RSA Security and elsewhere. It allows users to communicate via the Internet with high confidence that the identity of the person or organization they are communicating with is not being spoofed or forged.

Internet engineers like Mr. Kaminsky want to counteract three major deficiencies in today’s Internet. There is no mechanism for ensuring trust, the quality of software is uneven, and it is difficult to track down bad actors.

One reason for these flaws is that from the 1960s through the 1980s the engineers who designed the network’s underlying technology were concerned about reliable, rather than secure, communications. That is starting to change with the introduction of Secure DNS by governments and other organizations.

The event in Singapore capped a process that began more than a year ago and is expected to be complete after 300 so-called top-level domains have been digitally signed, around the end of the year. Before the Singapore event, 70 countries had adopted the technology, and 14 more were added as part of the event. While large countries are generally doing the technical work to include their own domains in the system, the consortium of Internet security specialists is helping smaller countries and organizations with the process.

The United States government was initially divided over the technology. The Department of Homeland Security included the .gov domain early in 2009, while the Department of Commerce initially resisted including the .us domain because some large Internet corporations opposed the deployment of the technology, which is incompatible with some older security protocols.

Internet security specialists said the new security protocol would initially affect Web traffic and e-mail. Most users should be mostly protected by the end of the year, but the effectiveness for a user depends on the participation of the government, Internet providers and organizations and businesses visited online. Eventually the system is expected to have a broad effect on all kinds of communications, including voice calls that travel over the Internet, known as voice-over-Internet protocol.

“In the very long term it will be voice-over-I.P. that will benefit the most,” said Bill Woodcock, research director at the Packet Clearing House, a group based in Berkeley, Calif., that is assisting Icann, the Internet governance organization, in deploying Secure DNS.

Secure DNS makes it possible to make phone calls over the Internet secure from eavesdropping and other kinds of snooping, he said.

Security specialists are hopeful that the new Secure DNS system will enable a global authentication scheme that will be more impenetrable and less expensive than an earlier system of commercial digital certificates that proved vulnerable in a series of prominent compromises.

The first notable case of a compromise of the digital certificates — electronic documents that establish a user’s credentials in business or other transactions on the Web — occurred a decade ago when VeriSign, a prominent vendor of the certificates, mistakenly issued two of them to a person who falsely claimed to represent Microsoft.

Last year, the authors of the Stuxnet computer worm that was used to attack the Iranian uranium processing facility at Natanz were able to steal authentic digital certificates from Taiwanese technology companies. The certificates were used to help the worm evade digital defenses intended to block malware.

In March, Comodo, a firm that markets digital certificates, said it had been attacked by a hacker based in Iran who was trying to use the stolen documents to masquerade as companies like Google, Microsoft, Skype and Yahoo.

“At some point the trust gets diluted, and it’s just not as good as it used to be,” said Rick Lamb, the manager of Icann’s Secure DNS program.

The deployment of Secure DNS will significantly lower the cost of adding a layer of security, making it more likely that services built on the technology will be widely available, according to computer network security specialists. It will also potentially serve as a foundation technology for an ambitious United States government effort begun this spring to create a system to ensure “trusted identities” in cyberspace.

Americans Have Been Bugged For 20 Years

Paul Joseph Watson
Infowars.com
June 14, 2011

Outrage over the revelation that Chinese authorities have been installing spying devices on all dual-plate Chinese-Hong Kong vehicles is nothing compared to the fact that Americans and European have had all their communications tracked for at least two decades.

“For years now Chinese authorities have been installing spying devices on all dual-plate Chinese-Hong Kong vehicles, enabling a vast network of eavesdropping across the archipelago,” reports the Epoch Times.

However, the modern era of high-tech surveillance really began with the Echelon program in the early 90′s.

In 1999 the Australian government admitted that it was part of an NSA-led global intercept and surveillance grid in alliance with the US and Britain that could listen to “every international telephone call, fax, e-mail, or radio transmission,” using keywords to allow “powerful computers capable of voice recognition” to eavesdrop globally.

Furthermore, a 2001 European Parliament report stated that “within Europe all e-mail, telephone and fax communications are routinely intercepted” by the NSA.

As we reported back in 2006, Google announced that it would be using in-built microphones on personal computers to listen for “background noise,” which would then be used to tailor invasive Minority Report-style advertising.

“The idea is to use the existing PC microphone to listen to whatever is heard in the background, be it music, your phone going off or the TV turned down. The PC then identifies it, using fingerprinting, and then shows you relevant content, whether that’s adverts or search results, or a chat room on the subject,” reported the Register.

The report touched upon the inevitability that the use and abuse of this technology will eventually be taken over by the state.

“Pretty soon the security industry is going to find a way to hijack the Google feed and use it for full on espionage.”

We are now surrounded by high-tech devices that serve a dual use purpose, one of which is spying on and keeping a record of our communications and other information to build psychological profiles. These include cell phones, two-way cable TV boxes, satellite navigation devices, so-called “smart home” products, as well as services like OnStar and Google Street View.

Read Full Article…

Related Links:

Togel178

Pedetogel

Sabatoto

Togel279

Togel158

Colok178

Novaslot88

Lain-Lain

Partner Links