Battlefield 4 tournament at Flag Military Surplus April 27th

battlefield-4FLAGSTAFF—Flag Military Surplus and the Phantom Gaming Society have announced a tournament based on the Battlefield 4 video game beginning at 11 am. The proceeds will benefit the Wounded Warrior program.

The entry fee is $20 per person and includes dog tags, free drink and lunch and an entry for a raffle for a desktop PC. The cash purse will depend on the number of entries. There will be live music with a D.J. and a dunk tank.

Other sponsors of the event include 103.7 The Eagle, GameStop, Radio Shack, CommSpeed, Coca-Cola and BTO.

You may register at Flag Military Surplus at 7975 north U.S. 89 north of the Flagstaff Mall or where ever you see the Phantom Gamers car in town.

Government Lab Reveals It Has Operated Quantum Internet for Over Two Years

MIT Technology Review, May 6, 2013

QC networkA quantum internet capable of sending perfectly secure messages has been running at Los Alamos National Labs for the last two and a half years, say researchers

One of the dreams for security experts is the creation of a quantum internet that allows perfectly secure communication based on the powerful laws of quantum mechanics.

The basic idea here is that the act of measuring a quantum object, such as a photon, always changes it. So any attempt to eavesdrop on a quantum message cannot fail to leave telltale signs of snooping that the receiver can detect. That allows anybody to send a “one-time pad” over a quantum network which can then be used for secure communication using conventional classical communication.

That sets things up nicely for perfectly secure messaging known as quantum cryptography and this is actually a fairly straightforward technique for any half decent quantum optics lab. Indeed, a company called ID Quantique sells an off-the-shelf system that has begun to attract banks and other organisations interested in perfect security.

These systems have an important limitation, however. The current generation of quantum cryptography systems are point-to-point connections over a single length of fibre, So they can send secure messages from A to B but cannot route this information onwards to C, D, E or F. That’s because the act of routing a message means reading the part of it that indicates where it has to be routed. And this inevitably changes it, at least with conventional routers. This makes a quantum internet impossible with today’s technology

Various teams are racing to develop quantum routers that will fix this problem by steering quantum messages without destroying them. We looked at one of the first last year. But the truth is that these devices are still some way from commercial reality.

Read more at MIT Technology Review

Arizona Bill to reduce metadata collection moves forward

nsa-hubArizona Senator Kelli Ward introduced SB 1156 (HTML | PDF) which would prevent agencies and corporations of The Great State of Arizona from assisting in the metadata collection by the NSA and other agencies.

The Tenth Amendment web site calls it the first in the nation.

Arizona Senator Kelli Ward (Photo AZ Legislature web)

Arizona Senator Kelli Ward (Photo AZ Legislature web)

FOURTH AMENDMENT

The Fourth Amendment of the inalienable Bill of Rights provides:

The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.

The Supreme Court has so watered down most of the Bill of Rights through decisions based on ideology and not constitutionality that this provision is almost worthless. For example, TSA can violate your person without a warrant based on probable cause by Oath or affirmation by your simple act of buying a ticket for public transportation.

Apparently, however, the “fake” NSA spying scandal has finally pushed Senator Ward too far. The bill would not stop illegal data collection by the NSA and other agencies which has tapped into all forms of communications. It would only prevent the State agencies and corporations dealing with the State from providing any assistance to the federal government.
Continue reading

N.S.A. Devises Radio Pathway Into Computers

JP-NSA-master675
By DAVID E. SANGER and THOM SHANKERJAN. 14, 2014

WASHINGTON — The National Security Agency has implanted software in nearly 100,000 computers around the world that allows the United States to conduct surveillance on those machines and can also create a digital highway for launching cyberattacks.

While most of the software is inserted by gaining access to computer networks, the N.S.A. has increasingly made use of a secret technology that enables it to enter and alter data in computers even if they are not connected to the Internet, according to N.S.A. documents, computer experts and American officials.

The technology, which the agency has used since at least 2008, relies on a covert channel of radio waves that can be transmitted from tiny circuit boards and USB cards inserted surreptitiously into the computers. In some cases, they are sent to a briefcase-size relay station that intelligence agencies can set up miles away from the target.
Related Coverage

The radio frequency technology has helped solve one of the biggest problems facing American intelligence agencies for years: getting into computers that adversaries, and some American partners, have tried to make impervious to spying or cyberattack. In most cases, the radio frequency hardware must be physically inserted by a spy, a manufacturer or an unwitting user.

The N.S.A. calls its efforts more an act of “active defense” against foreign cyberattacks than a tool to go on the offensive. But when Chinese attackers place similar software on the computer systems of American companies or government agencies, American officials have protested, often at the presidential level.

Read more at The New York Times
Related: Obama to Place Some Restraints on Surveillance

Confirmed: Snapchat Hack Not A Hoax, 4.6M Usernames And Numbers Published

snapchat_uhohA site called SnapchatDB.info has saved usernames and phone numbers for 4.6 million accounts and made the information available for download. In a statement to us, SnapchatDB says that it got the information through a recently identified and patched Snapchat exploit and that it is making the data available in an effort to convince the messaging app to beef up its security. We’ve also reached out to Snapchat.
SnapchatDB said:

Our motivation behind the release was to raise the public awareness around the issue, and also put public pressure on Snapchat to get this exploit fixed. It is understandable that tech startups have limited resources but security and privacy should not be a secondary goal. Security matters as much as user experience does.

We used a modified version of gibsonsec’s exploit/method. Snapchat
could have easily avoided that disclosure by replying to Gibsonsec’s private communications, yet they didn’t. Even long after that disclosure, Snapchat was reluctant to taking the necessary steps to secure user data. Once we started scraping on a large scale, they decided to implement very minor obstacles, which were still far from enough. Even now the exploit persists. It is still possible to scrape this data on a large scale. Their latest changes are still not too hard to circumvent.

We wanted to minimize spam and abuse that may arise from this release. Our main goal is to raise public awareness on how reckless many internet companies are with user information. It is a secondary goal for them, and that should not be the case. You wouldn’t want to eat at a restaurant that spends millions on decoration, but barely anything on cleanliness.

Earlier we speculated that SnapchatDB might be a hoax meant to call attention to the app’s security issues but, as it turns out, it’s real–at least one member of our editorial team has been affected. A reader also told us he found his own number, that of several friends and Snapchat founder Evan Spiegel in the list. On Hacker News, several people have had trouble downloading the data files (I just got an error message for both of them, but that may be because of high traffic), but a Jailbreak subreddit user who saw the list said that only numbers in some parts of the U.S. have been published so far. If you have not been able to download the list, you can use this site created by developer Robbie Trencheny to see if your username was included.

Read more at Tech Crunch

Special Report: How China’s weapon snatchers are penetrating U.S. defenses

2013-12-17T222147Z_2_CBRE9BG15ZK00_RTROPTP_2_BREAKOUT-STINGBy John Shiffman and Duff Wilson

OAKLAND, California (Reuters) – Agents from Homeland Security sneaked into a tiny office in Oakland’s Chinatown before sunrise on December 4, 2011. They tread carefully, quickly snapping digital pictures so they could put everything back in place. They didn’t want Philip Chaohui He, the businessman who rented the space, to learn they had been there.

Seven months had passed since they’d launched an undercover operation against a suspected Chinese arms-trafficking network – one of scores operating in support of Beijing’s ambitious military expansion into outer space.

The agents had allowed a Colorado manufacturer to ship He a type of technology that China covets but cannot replicate: radiation-hardened microchips. Known as rad-chips, the dime-sized devices are critical for operating satellites, for guiding ballistic missiles, and for protecting military hardware from nuclear and solar radiation.

It was a gamble. This was a chance to take down an entire Chinese smuggling ring. But if He succeeded in trafficking the rad-chips to China, the devices might someday be turned against U.S. sailors, soldiers or pilots, deployed on satellites providing the battlefield eyes and ears for the People’s Liberation Army.

Entering He’s office at 2:30 that December morning, the agents looked inside the FedEx boxes. The microchips were gone. The supervisor on the case, Greg Slavens, recoiled.

“There are a bunch of rad-chips headed to China,” Slavens recalls thinking, “and I’m responsible.'”

Read more at Yahoo!

Georgia man charged with theft for plugging in electric car

leafGEORGIA—A man in Atlanta was confronted by police when he plugged his Nissan Leaf into a school outlet “stealing” about five-cents worth of electricity. He was arrested for the “crime” ten days later.

According to ArsTechnia,

Kaveh Kamooneh plugged an extension cable from his Nissan Leaf into a 110-volt external outlet at Chamblee Middle School while his son was practicing tennis. A short time later, he noticed someone in his car and went to investigate—and found that the man was a Chamblee police officer. “He informed me he was about to arrest me, or at least charge me, for electrical theft,” Kamooneh told Atlanta’s Channel 11 News.

Sergeant Ernesto Ford of the Chamblee Police Department told News 11 that a theft is a theft and he would arrest anyone for theft.

Videos of Russian plane crash appearing on the Internet

KAZAN, RUSSIA–A Tartarstan Airlines plane crashed in the city of Kazan Russia about 450 miles east of Moscow. The crash killed all 44 passengers and six crew members on the flight.

The 23-year-old plane was attempting to make a second landing in a flight which started in Moscow and ended tragically at the airport in its home city of Kazan.

According to a report from Herald Sun in Australia

Russian President Vladimir Putin expressed his “deep condolences to the relatives and loved ones of those who died in the plane crash at Kazan airport”, the Kremlin said in a statement.

“After receiving a report on the air crash, the head of state ordered the government to urgently form a commission to investigate the reasons and circumstances of what happened.”

Prime Minister Dmitry Medvedev wrote on Twitter: “With all my heart I grieve for the relatives, friends and loved ones of the victims. A terrible tragedy.”

The cause of the crash is being investigated.

A video of the from Live Leak shows the plane exploding on its second attempt to land. Another YouTube video shows firefighters working at the crash site.

Urbee 2, the 3D-Printed Car That Will Drive Across the Country

urbee-01-1113-mdn

It may look like a bean, but the hybrid car Urbee 2 can get hundreds of miles to the gallon—and it’s made mostly via 3D printing. In two years, it could become the first such vehicle to drive across the United States.

In early 1903, physician and car enthusiast Horatio Nelson Jackson accepted a $50 bet that he could not cross the United States by car. Just a few weeks later, on May 23, he and mechanic Sewall K. Crocker climbed into a 20-hp Winton in San Francisco and headed east. Accompanied by Bud, a pit bull they picked up along the way, the two men arrived in New York 63 days, 12 hours, and 800 gallons of fuel later, completing the nation’s first cross-country drive.

About two years from now, Cody and Tyler Kor, now 20 and 22 years old, respectively, will drive coast-to-coast in the lozenge-shaped Urbee 2, a car made mostly by 3D printing. Like Jackson and Crocker, the young men will take a dog along for the ride—Cupid, their collie and blue heeler mix. Unlike Jackson and Crocker, they will spend just 10 gallons of fuel to complete the trip from New York to San Francisco. Then they will refuel, turn around, and follow the same west-to-east route taken by Jackson, Crocker, and Bud.

Read more at Popular Mechanics

Aeroscraft – Mega Airship Back in the air in Tustin, California

aeroscraft_silver650Two days after receiving experimental airworthiness certification from the Federal Aviation Administration Aeros Corp. began flight-testing the Aeroscraft airship. For safety, the current flights are tethered, and, according to John Kiehle, communications director at Aeros, untethered flights are expected to follow within few weeks. Francis Govers of Gizmag reports.

The Aeroscraft half scale prototype is 266 ft (79 m) long and 97 ft (29.5m) wide. The final design is expected to be more than 400 feet (121m) long and be able to lift a cargo weight of 66 tons. The prototype is powered by three swiveling engines – two on the sides and one in the back – that provide both lift and thrust to lift the airship into the air and propel it forward. The rear engine gives control at low airspeeds by pushing the tail around, side to side or up and down. Two sets of wing-like control surfaces are mounted fore and aft, and two large rudders push up vertically from the tail end. These aerodynamic surfaces will be used at higher speeds (above 20 mph / 30 kph).

Read more at Defense Update