Tuesday, May 31, 2011

@11:48, 05/30/11 ---------- 4


  • TimesPeople recommended a user:
    May 29, 2011
    Non_Toxic_Kids
    • HEIRS_EI posted to Twitter an article:
      Dec 25, 2009
      City's 'All Green' Stormwater Plan Raises Eyebrows at EPA
      “City's 'All Green' Stormwater Plan Raises Eyebrows at EPA - http://nyti.ms/7pmO3I” 
      There is a great deal of built plant to be replaced.
      Cities have spent freely to de-water their subsoil.
      Sealevel is rising inexorably.
      Build the tree pits.
      Separate the storm and sanitary drains.
      Build the treatment facility in Camden. Size it for the city of today.
      The city is shrinking.
  • TimesPeople recommended a user:
    May 29, 2011
    jrmoreau
  • TimesPeople recommended a user:
    May 29, 2011
    Wilhelmina Sims
  • TimesPeople recommended a user:
    May 29, 2011
    merqueen234
    • merqueen234 posted to Twitter an interactive graphic:
      May 30, 2011
      YouTube's Next Stars
      “Check out YouTube's Next Stars - http://nyti.ms/kHuOdH” 
      Absolutely no interest.
      I will run any single performance you wish.
  • TimesPeople recommended a user:
    May 29, 2011
    Sasha Koren
    • TPP recommended a blog post:
      Sep 22, 2010
      Showing Gay Teens a Happy Future
      A new online video channel is reaching out to teenagers who are bullied at school for being gay. The message: life really does get better after high school.
      Sooner is better. ------------- As soon as you can is best.
  • TimesPeople recommended a user:
    May 29, 2011
    laurenahayes
    • NeoplasmSix posted to Twitter an article:
      Mar 15, 2011
      Stuxnet Worm Used Against Iran Was Tested in Israel
      “Stuxnet Worm Used Against Iran Was Tested in Israel - http://nyti.ms/gfHRXE” 
      http://topics.nytimes.com/top/reference/timestopics/subjects/c/computer_malware/stuxnet/index.html
      http://slashdot.org/index2.pl?fhfilter=stuxnet
      Government

      Pentagon Says Cyberattacks Can Count As Act of War 227

      Posted by Soulskill
      from the now-we-can-invade-anybody dept.
      suraj.sun tips news that the Pentagon has decided computer sabotage originating from another country can be classified as an act of war. "The Pentagon's first formal cyber strategy, unclassified portions of which are expected to become public next month, represents an early attempt to grapple with a changing world in which a hacker could pose as significant a threat to US nuclear reactors, subways or pipelines as a hostile country's military." This news comes only days after the Chinese military admitted the existence of a team of cyberwarriors. "The report will also spark a debate over a range of sensitive issues the Pentagon left unaddressed, including whether the US can ever be certain about an attack's origin, and how to define when computer sabotage is serious enough to constitute an act of war. These questions have already been a topic of dispute within the military."
      Security

      New Siemens SCADA Vulnerabilities Kept Secret, Says Schneier 119

      Posted by Roblimo
      from the watch-those-centrifuges-spin-out-of-control dept.
      From the article: SCADA systems -- computer systems that control industrial processes -- are one of the ways a computer hack can directly affect the real world. Here, the fears multiply. It's not bad guys deleting your files, or getting your personal information and taking out credit cards in your name; it's bad guys spewing chemicals into the atmosphere and dumping raw sewage into waterways. It's Stuxnet: centrifuges spinning out of control and destroying themselves. Never mind how realistic the threat is, it's scarier." What worries Bruce Schneier most is that industry leader Siemens is keeping its SCADA vulnerabilities secret, at least in part due to pressure from the Department of Homeland Security .
      Security

      DHS Chief: What We Learned From Stuxnet 125

      Posted by CmdrTaco
      from the can't-wait-for-finals-week dept.
      angry tapir writes "If there's a lesson to be learned from last year's Stuxnet worm, it's that the private sector needs to be able to respond quickly to cyber-emergencies (CT: Warning, site contains obnoxious interstitial ads. Blocker advised), according to the head of the US Department of Homeland Security. When Stuxnet hit, the US Department of Homeland security was sent scrambling to analyze the threat. Systems had to be flown in from Germany to the federal government's Idaho National Laboratory. In short order the worm was decoded, but for some time, many companies that owned Siemens equipment were left wondering what, if any measures, they should take to protect themselves from the new worm."
      Security

      Iran Says Siemens Helped US, Israel Build Stuxnet 300

      Posted by Soulskill
      from the fair-and-balanced dept.
      CWmike writes "Iran's Brigadier General, Gholam Reza Jalali, accused Siemens on Saturday with helping US and Israeli teams craft the Stuxnet worm that attacked his country's nuclear facilities. 'Siemens should explain why and how it provided the enemies with the information about the codes of the SCADA software and prepared the ground for a cyber attack against us,' Jalali told the Islamic Republic News Service. Siemens did not reply to a request for comment on Jalali's accusations. Stuxnet, which first came to light in June 2010 but hit Iranian targets in several waves starting the year before, has been extensively analyzed by security researchers. Symantec and Langner Communications say Stuxnet was designed to infiltrate Iran's nuclear enrichment program, hide in the Iranian SCADA (supervisory control and data acquisition) control systems that operate its plants, then force gas centrifuge motors to spin at unsafe speeds. Jalali suggested that Iranian officials would pursue Siemens in the courts, and claimed that Iranian researchers traced the attack to Israel and the US. He said information from infected systems was sent to computers in Texas."
      Security

      40th Anniversary of the Computer Virus 60

      Posted by Soulskill
      from the over-the-hill dept.
      Orome1 writes "This year marks the 40th anniversary of Creeper, the world's first computer virus. From Creeper to Stuxnet, the last four decades saw the number of malware instances boom from 1,300 in 1990, to 50,000 in 2000, to over 200 million in 2010. Besides sheer quantity, viruses, which were originally used as academic proofs of concept, quickly turned into geek pranks, then evolved into cybercriminal tools. By 2005, the virus scene had been monetized, and virtually all viruses were developed with the sole purpose of making money via more or less complex business models."
      Australia

      Australia Creates Cyberwarfare Unit 60

      Posted by timothy
      from the sir-shall-I-adjust-the-budget-sir dept.
      An anonymous reader writes "Australia's Federal Government computer emergency response team and other spy agencies are teaming up to create a cyberspooks unit to counter threats from other countries, the nation's chief lawmaker said last night. In a speech referencing Stuxnet and GhostNet, Attorney-General Robert McClelland said the unit would protect sensitive Australian Government and business information from espionage by the nation's foes. Recently new powers were handed to spymasters to deal with the enhanced security threat that the Greens party said were 'excessive.'"
      Supercomputing

      Iran Claims Two New Supercomputers 110

      Posted by CmdrTaco
      from the good-thing-we-don't-export-crypto dept.
      dcblogs writes "Iran President Mahmoud Ahmadinejad announced development of two supercomputers Wednesday. Iranian government news media published a photo spread of one the systems it claims is capable of 89 teraflops, which is far short of the petascale systems in the US and China. There's no independent verification of Iran's claim. But after the Stuxnet attack, Iran may be trying for an IT comeback via supercomputing or just trying to show it is in control as regional unrest spreads. Iran says the new systems will make the global Top 500 supercomputing listing, but it hasn't submitted a Linpack benchmark to the list organizers."
      Businesses

      Stuxnet's Legacy: Get Back to Basics or Get Owned 162

      Posted by samzenpus
      from the all-your-files-are-belong-to-us dept.
      Gunkerty Jeb writes "Attacks such as Stuxnet, Operation Aurora or GhostNet are not what most enterprises and organizations need to be worried about. The plain fact is that most organizations are falling far short in protecting against the same threats that they've faced for the last 10 years. SQL injection, phishing, malicious attachments, social engineering. Old, every one of them. And yet, still incredibly effective at compromising networks in some of the best-known and theoretically best-protected companies."
      The Military

      On Retirement, Israeli General Takes Credit for Stuxnet Attacks 334

      Posted by timothy
      from the all-in-all-it's-been-a-good-run dept.
      dinscott writes "Last month, The New York Times ran a story about Stuxnet having been developed by the Americans and the Israelis as a part of a joint project, but it was based on claims by confidential sources. It now seems that the information from these sources was correct. The Haaretz — Israel's oldest daily newspaper — reports on a surprising video that was played at a party organized for General Gabi Ashkenazi's last day on the job."
      Government

      Obama Wants Big Hike In Cybersecurity Research 73

      Posted by CmdrTaco
      from the i-feel-safer-already dept.
      dcblogs writes "The White House 2012 budget seeks a 35% increase to $548 million in cybersecurity research and development, including funds to help DARPA mitigate the risk of insider threats. Think WikiLeaks. Improving control system security, post Stuxnet, was also cited as priority. Overall, the budget seeks $66.1 billion for basic and applied research across all areas, an 11.6% increase. Some areas called out for special focus by the White House include robotics. The feds have already started offering grants for developing of 'co-robots,' which are 'systems that can safely co-exist in close proximity to or in physical contact with humans in the pursuit of mundane, dangerous, precise or expensive tasks.' The US also wants to focus research on nanomanufacturing, 'and the merging of self-assembly with lithography to achieve large-scale predictable placement of nanoscale components.'"
      Security

      Anonymous Claims Possession of Stuxnet Worm 234

      Posted by timothy
      from the now-they-can-really-damage-your-nuclear-program dept.
      An anonymous reader writes "Last night, a member of hacker group Anonymous announced on Twitter that the group was in possession of the Stuxnet worm. Recently, Anonymous has been in the news for its high profile attacks on software security firm HBGary, after Aaron Barr, the CEO of HBGary's sister firm HBGary Federal, claimed to have acquired the names of senior Anonymous members and threatened to release them to the public. This is where the possibility for Anonymous getting its hands on Stuxnet increases."
      Government

      Iran Launches Cyber-Police Units 45

      Posted by Soulskill
      from the defending-against-stuxnet-and-freedom dept.
      Khopesh writes "Iran is implementing a cyber police force to combat social networks and similar sources of 'espionage and riots.' This will likely result in more control over internet access than efforts that might hinder attacks like Stuxnet. 'Ahmadi Moghaddam said that Iran's cyber police will take on the "anti-revolutionary" dissident groups that used online social networks to organize protests against President Mahmoud Ahmadinejad following disputed elections held in 2009. "Through these very social networks in our country, anti-revolutionary groups and dissidents found each other and contacted foreign countries and triggered riots," said Ahmadi Moghaddam, referring to the protests that took place at the time.'"
      Government

      Compromised Government and Military Sites For Sale 51

      Posted by Soulskill
      from the your-tax-dollars-at-derp dept.
      Khopesh writes "Imperva blogged today about the sale of compromised .gov, .mil, and .edu sites, illustrating that cyber-criminals are getting bolder. Krebs on Security has an unredacted view of the site list. Perhaps the biggest threat is yet to come; if an industrious criminal can break into top government and military sites, so too can government-backed teams, proving that GhostNet and Stuxnet are just the beginning."
      Security

      Stuxnet Authors Made Key Errors 228

      Posted by CmdrTaco
      from the sorry-about-that dept.
      Trailrunner7 writes "There is a growing sentiment among security researchers that the programmers behind the Stuxnet attack may not have been the super-elite cadre of developers that they've been mythologized to be in the media. In fact, some experts say that Stuxnet could well have been far more effective and difficult to detect had the attackers not made a few elementary mistakes."
      Businesses

      GE Venture Will Share Jet Technology With China 266

      Posted by Soulskill
      from the send-them-the-tsa-while-you're-at-it dept.
      vbraga writes "This week, during the visit of Chinese president Hu Jintao to the United States, GE plans to sign a joint-venture agreement in commercial aviation that shows the tricky risk-and-reward calculations American corporations must increasingly make in their pursuit of lucrative markets in China. GE, in partnership with a state-owned Chinese company, will be sharing its most sophisticated airplane electronics (NYT reg. required, reg.-free alternative here), including some of the same technology used in Boeing's new state-of-the-art 787 Dreamliner."
      Security

      Threat of Cyberwar Is Over-Hyped 123

      Posted by Soulskill
      from the let's-stick-to-normal-levels-of-hype dept.
      nk497 writes "A new OECD report suggests the cyberwar threat is over-hyped. A pair of British researchers have said states are only likely to use cyberattacks against other states when already involved in military action against them, and that sub-state actors such as terrorists and individual hackers can't really do much damage. Dr. Ian Brown said, 'We think that describing things like online fraud and hacktivism as cyberwar is very misleading.'"
      The Military

      New York Times Reports US and Israel Behind Stuxnet 406

      Posted by timothy
      from the alleged-shooter dept.
      Oxford_Comma_Lover writes "Confirming heavy speculation in the Slashdot community, the New York Times reports that joint US-Israeli efforts were almost certainly behind the recent Stuxnet attack on Iran's nuclear program." The article stops just short of saying in so many words that Israeli is the doer, but leaves little doubt of its conclusion.
      Security

      Did Stuxnet Take Out 1,000 Centrifuges At Natanz? 189

      Posted by timothy
      from the down-for-routine-maintenance dept.
      AffidavitDonda writes "In late 2009 or early 2010, Iran decommissioned and replaced about 1,000 IR-1 centrifuges in the Fuel Enrichment Plant (FEP) at Natanz, implying that these centrifuges broke. Iran's IR-1 centrifuges often break, yet this level of breakage exceeded expectations and occurred during an extended period of relatively poor centrifuge performance. Although Iran has not admitted that Stuxnet attacked the Natanz centrifuge plant, it has acknowledged that its nuclear sites were subject to cyber attacks."


  • esPeople recommended a user:
    May 29, 2011
    mpesce
  • TimesPeople recommended a user:
    May 29, 2011
    vlamers
    • vlamers posted to Twitter an article:
      May 29, 2011
      Against Learned Helplessness
      “Amazing solution oriented article. Makes me proud to have his signed book! Against Learned Helplessness - http://nyti.ms/k5MEjv” 
      Louder, LOUDER!
  • TimesPeople recommended an article:
    May 29, 2011
    Technology Provides an Alternative to Love.
    Our infatuation with technology encourages shallow self-reflection, and liking, rather than the harder work of loving.
    I will happily forgo the social part of the net for love.  Mail and search and look up  I would like to keep.
  • TimesPeople recommended a user:
    May 29, 2011
    WorkEcology

444444444444444444444444444444444444444444444444444444444444