Tuesday, August 15, 2006

Liquid Explosives

This liquid explosives thing was not urgent. The USG pressured the UK into arresting these guys immediately. Media hyped the story as a cliffhanger. Ari Fleischer admitted in 2004 that the terror alerts were done for political manoeuvering. Examine the fake alert profile. This is arguably treasonous activity. Certainly dishonest.

Sunday, August 13, 2006

Ari Fleischer Says Terror Alerts Political Tools

"...The latest alerts were issued 'as a result of all the controversy that took place last week,' said Bush spokesman Ari Fleischer, referring to reports that the president received a CIA briefing in August about terror threats..."

Tuesday, August 08, 2006

The 4th Amendment

Researchers from the University of Pennsylvania School of Engineering and Applied Science warn against an entirely new threat to computer security: peripheral devices – such as keyboards, mice or microphones – which could be physically bugged in an attempt to steal data. Penn graduate student Gaurav Shah has identified a class of devices that could covertly transmit data across an existing network connection without the user's knowledge.

They are called JitterBugs, named by Shah's advisor, Penn Associate Professor Matthew Blaze, for both the way they transmit stolen data in "jittery" chunks by adding nearly imperceptible processing delays after a keystroke and for the "jitters" such a bug could inspire in anyone with secure data to safeguard.

Shah presented his findings Aug. 3 at the USENIX Security Conference in Vancouver, B.C., where it was designated the "Best Student Paper" by conference organizers. As proof of the concept, Shah and his colleagues built a functional keyboard JitterBug with little difficulty.

"This is spy stuff. Someone would need physical access to your keyboard to place a JitterBug device, but it could be quite easy to hide such a bug in plain sight among cables or even replace a keyboard with a bugged version," said Shah, a graduate student in Penn's Department of Computers and Information Science. "Although we do not have evidence that anyone has actually been using JitterBugs, our message is that if we were able to build one, so could other, less scrupulous people."

JitterBug devices are conceptually similar to keystroke loggers, such as the one famously used by the FBI to gather evidence against bookmaker Nicodemo Scarfo Jr. Unlike keystroke loggers, which would have to be physically installed into a subject's computer and then retrieved, a keyboard JitterBug only needs to be installed. The device itself sends the collected information through any interactive software application where there is a correlation between keyboard activity and network activity, such as instant messaging, SSH or remote desktop applications. The bug leaks the stolen data through short, virtually unnoticeable delays added every time the user presses a key.

Anytime the user surfs the web, sends an e-mail or instant messages someone, an implanted JitterBug could be timed to open a covert jitter channel to send stolen data. According to Shah, a JitterBug could not log and transmit every touch of the key due to limited storage space on the device, but it could be primed to record a keystroke with a particular trigger.

"For example, one could pre-program a JitterBug with the user name of the target as a trigger on the assumption that the following keystrokes would include the user's password," Shah said. "Triggers might also be more generic, perhaps programmed to detect certain typing patterns that indicate some sort of important information might follow."

JitterBugs are potentially worrisome to governments, universities or corporations with information meant to be kept confidential. One particular scenario is what Blaze refers to as a "Supply Chain Attack," in which the manufacture of computer peripherals could be compromised. Such an attack could, for example, result in a large number of such JitterBugged keyboards in the market. An attacker would only then need to wait until a target of interest acquires a bugged keyboard.

According to Shah, the channel through which the JitterBug transmits data is also the point where it could be most easily detected and countered.

While his presentation only discussed simple countermeasures to JitterBugs, Shah's initial results indicate that the use of cryptographic techniques to hide the use of encoded jitter channels might be a promising approach.

"We normally do not think of our keyboard and input devices as being something that needs be secured; however, our research shows that if people really wanted to secure a system, they would also need to make sure that these devices can be trusted," Shah said. "Unless they are particularly paranoid, however, the average person does not need to worry about spies breaking into their homes and installing JitterBugs."

Source: University of Pennsylvania


"it probably has a built-in keylogger and stores it in a cache file which is periodically distributed when one the internet without asking the user.

also, WHERE IS MY 4TH AMENDMENT!!!??? this is outrageously and unequivocally unlike the 4th amendment. I don't care about some loophole through private companies. The state cannot receive this information, and corporations have no right to break the amendments of consumers without their knowledge.

it offends people."

Saturday, August 05, 2006

Judicial Appeal of State Indiscretion

There must be a judicial area to bring matters of state to. I could not, and would not, sue the US Government or a department of government for their actions, with the intent of winning a change in organization or recording of policy. I would expect the ABA or ACLU or another judicial appelate group to win such a case in a trial. But who would the defendant truly be, and where would these two meet? I do not accept fiat government.

We also should consider looking at the legal apparatus behind the Federal Reserve. They are a private company with private holders. They won the power to print money in 1913, and should not have this over a state or a people. >100% of our recent fiscal expansion has been debt.

Your Friend,
William Bunker

On Sat, 5 Aug 2006 22:50:39 -0400, "Noam Chomsky"
said:
> Of course it is scandalous. Exactly how to proceed to deal with this is
> not
> a trivial question. One can't bring issues to the Supreme Court.
>
>
>
> ----- Original Message -----
> Subject: Israel and the NSA
>
>
> >I am confused as to why Israel is given NSA information. This should be
> > reviewed by the Supreme Court and actions should be taken to restore the
> > 4th amendment.
> >
> > Thank you for your consideration,
> > William Bunker


===

The people must have a more active role in modifying the state than through petition to their elected officials. The people should have the power to organize and argue for their rights with force and consequence in courts of law on the actions of government. This will make anyone a king and decentralize power from those who would lord it over others.

Kevin Barret speaks with Hannity & Colmbes

In this video interview with Fox news, Professor Kevin Barret speaks to the news anchor about events surrounding 9/11 and the manner in which he address the topic in his classes.

Thank you, tube. You make information possible.

Tuesday, August 01, 2006

JFK Assassination Web

One would think that after trying and eliminating the ones who operate this Goodfellas-like community the world would work smoothly. Granted, it would probably work much more smoothly, but I don't know if it would work as perfectly as Jesus Christ would be honored by. What do you think?

This is also going in Tactical Edge.