2014 Virtual Urban Farm Tour Contest

(Click for larger image)

(Click for larger image)

FLAGSTAFF – Attention local urban farmers and gardeners: Flagstaff Liberty Alliance is happy to announce their 2014 Virtual Urban Farm Tour Contest! This contest is open to the public and it is free to enter.

To enter the 2014 Flagstaff virtual urban farm tour, submit pictures of your urban farm including: gardens, fruit trees, chickens/livestock, and harvest/preserves!

Go to flagstafflibertyalliance.com to submit your photos and vote on your favorite entry!

First place winner will receive a $50 gift card to Flagstaff Native Plant & Seed and be featured in the Flagstaff Liberty Alliance 2015 Urban Farm Calendar. Runner up will receive a $25 gift card to Flagstaff Native Plant & Seed.

Entries for the Urban Farm Tour will be accepted through September 15, 2014.

Read more at Flagstaff Liberty Alliance

Government Lab Reveals It Has Operated Quantum Internet for Over Two Years

MIT Technology Review, May 6, 2013

QC networkA quantum internet capable of sending perfectly secure messages has been running at Los Alamos National Labs for the last two and a half years, say researchers

One of the dreams for security experts is the creation of a quantum internet that allows perfectly secure communication based on the powerful laws of quantum mechanics.

The basic idea here is that the act of measuring a quantum object, such as a photon, always changes it. So any attempt to eavesdrop on a quantum message cannot fail to leave telltale signs of snooping that the receiver can detect. That allows anybody to send a “one-time pad” over a quantum network which can then be used for secure communication using conventional classical communication.

That sets things up nicely for perfectly secure messaging known as quantum cryptography and this is actually a fairly straightforward technique for any half decent quantum optics lab. Indeed, a company called ID Quantique sells an off-the-shelf system that has begun to attract banks and other organisations interested in perfect security.

These systems have an important limitation, however. The current generation of quantum cryptography systems are point-to-point connections over a single length of fibre, So they can send secure messages from A to B but cannot route this information onwards to C, D, E or F. That’s because the act of routing a message means reading the part of it that indicates where it has to be routed. And this inevitably changes it, at least with conventional routers. This makes a quantum internet impossible with today’s technology

Various teams are racing to develop quantum routers that will fix this problem by steering quantum messages without destroying them. We looked at one of the first last year. But the truth is that these devices are still some way from commercial reality.

Read more at MIT Technology Review

N.S.A. Devises Radio Pathway Into Computers

JP-NSA-master675
By DAVID E. SANGER and THOM SHANKERJAN. 14, 2014

WASHINGTON — The National Security Agency has implanted software in nearly 100,000 computers around the world that allows the United States to conduct surveillance on those machines and can also create a digital highway for launching cyberattacks.

While most of the software is inserted by gaining access to computer networks, the N.S.A. has increasingly made use of a secret technology that enables it to enter and alter data in computers even if they are not connected to the Internet, according to N.S.A. documents, computer experts and American officials.

The technology, which the agency has used since at least 2008, relies on a covert channel of radio waves that can be transmitted from tiny circuit boards and USB cards inserted surreptitiously into the computers. In some cases, they are sent to a briefcase-size relay station that intelligence agencies can set up miles away from the target.
Related Coverage

The radio frequency technology has helped solve one of the biggest problems facing American intelligence agencies for years: getting into computers that adversaries, and some American partners, have tried to make impervious to spying or cyberattack. In most cases, the radio frequency hardware must be physically inserted by a spy, a manufacturer or an unwitting user.

The N.S.A. calls its efforts more an act of “active defense” against foreign cyberattacks than a tool to go on the offensive. But when Chinese attackers place similar software on the computer systems of American companies or government agencies, American officials have protested, often at the presidential level.

Read more at The New York Times
Related: Obama to Place Some Restraints on Surveillance

Confirmed: Snapchat Hack Not A Hoax, 4.6M Usernames And Numbers Published

snapchat_uhohA site called SnapchatDB.info has saved usernames and phone numbers for 4.6 million accounts and made the information available for download. In a statement to us, SnapchatDB says that it got the information through a recently identified and patched Snapchat exploit and that it is making the data available in an effort to convince the messaging app to beef up its security. We’ve also reached out to Snapchat.
SnapchatDB said:

Our motivation behind the release was to raise the public awareness around the issue, and also put public pressure on Snapchat to get this exploit fixed. It is understandable that tech startups have limited resources but security and privacy should not be a secondary goal. Security matters as much as user experience does.

We used a modified version of gibsonsec’s exploit/method. Snapchat
could have easily avoided that disclosure by replying to Gibsonsec’s private communications, yet they didn’t. Even long after that disclosure, Snapchat was reluctant to taking the necessary steps to secure user data. Once we started scraping on a large scale, they decided to implement very minor obstacles, which were still far from enough. Even now the exploit persists. It is still possible to scrape this data on a large scale. Their latest changes are still not too hard to circumvent.

We wanted to minimize spam and abuse that may arise from this release. Our main goal is to raise public awareness on how reckless many internet companies are with user information. It is a secondary goal for them, and that should not be the case. You wouldn’t want to eat at a restaurant that spends millions on decoration, but barely anything on cleanliness.

Earlier we speculated that SnapchatDB might be a hoax meant to call attention to the app’s security issues but, as it turns out, it’s real–at least one member of our editorial team has been affected. A reader also told us he found his own number, that of several friends and Snapchat founder Evan Spiegel in the list. On Hacker News, several people have had trouble downloading the data files (I just got an error message for both of them, but that may be because of high traffic), but a Jailbreak subreddit user who saw the list said that only numbers in some parts of the U.S. have been published so far. If you have not been able to download the list, you can use this site created by developer Robbie Trencheny to see if your username was included.

Read more at Tech Crunch

Want to be Unsene on the Internet?

SAN FRANCISCO—With recent revelations about the NSA spying and knowledge that Microsoft has left “backdoors” open for the government to enter and tamper with your computers, some may have decided to switch to the more secure Linux operating system.

Linux has advantages. Better security is the main feature. Depending on the version—called “distros” in Linux lingo; short for distribution—you can set up more effective firewalls. You can get programs that alert you when certain unwanted activities are going on in your computer. Linux has less problems with viruses. This is probably due to the fact that hackers are not so much interested in Linux as they are Microsoft. Because Microsoft equals Bill Gates.

One disadvantage of Linux is that it is a bit unwieldy for most computer users. They have neither the time nor the inclination to explore yet another operating system. Some cities have Linux Users Groups that may help, but that still takes time out of their schedule. Some distros are helping, such as Ubuntu, by making more user-friendly graphic interfaces.

Another is that much hardware is only Microsoft or MAC friendly unless the company has developed an alternative driver. That you may have to find and download.

There is a new open-source start-up which is seeking funding through Indiegogo. This group, associated with Chris Kitze of Beforeitsnews, has a web email and Skype alternative called Unsene. It is currently in the Beta web version and free. It will eventually ship as a program and Android and iPhone versions are planned.

The premium service is intended to allow for more features depending on the amount donated. Eventually it will be $47 per year, but people donating now will get a lifetime version for $37.

The full security features only work with Google Chrome. Beforeitsnews explains, “The text messaging and chat work with all browsers, but the audio and video calling and the encrypted file sharing require WebRTC, a new technology that is only available on Chrome. Support for Safari, IE and Firefox is expected soon. The Chrome browser is available for free download from Google.”

This program claims military-style encryption. “The service offers a basic level of encryption (AES256) and advanced encryption (xAES up to 4096 bits) and we’ve got some additional tricks up our sleeve for extremely secure encryption.”

See Also: Stop the Spying in Your Inbox

Some men get mad. Some men show tenderness.

Apparently a man in England found out his wife listed herself on an Internet dating site. While some men might get mad, this “crazy” “idiot” of a husband decided to show tenderness. He combined his wife’s love of her horses with her love of her Peugeot. Happy Valentines day.

The US opposes demonopolization of the Internet

This week’s conference of the International Telecommunication Union (ITU) in Dubai failed to produce an agreement on country-level Internet governance. After heated debates, the conference passed a vague-worded resolution calling on the ITU to play a more active role in the development of the Internet.

Russia and China suggested giving partial control over the allocation of web addresses either to ITU member states or to a specialized agency under the aegis of the United Nations. At present, this is the exclusive monopoly of the United States it exercises through the U.S.-based Internet Corporation for Assigned Names (ICANN) controlled by the U.S. Commerce Department.

The United States is visibly unprepared to share this monopoly with anybody else. All main IT resources, servers and transfer protocols are located in the United States, notes Russian IT expert Anton Korobkov-Zemlyansky.

Read more at The Voice of Russia.

SEE ALSO: US rejects UN telecom treaty over Internet rift

Ransomware Pays: FBI Updates Reveton Malware Warning

Latest malware, trying to trick users into paying a fine, claims the FBI is using audio, video, and other devices to record computer’s “illegal” activity.

Can people pay a fine online, avoid the threat of prosecution by the FBI, and unlock their locked PC all in one go?

That’s the offer made by a “Threat of Prosecution Reminder” that’s been flashing on numerous PC screens, which says that the FBI has locked the PC after finding evidence that the computer has been used to access child pornography or other illegal content. The latest version of this notice says that “all activity on this computer is being recorded using audio, video, and other devices.” But users are offered a way to pay the related fine being levied, immediately unlock their PC, and see the whole matter immediately dismissed.

The warning, however, is just a setup. “This is not a legitimate communication from the IC3, but rather is an attempt to extort money from the victim,” according to an advisory released last week by the Internet Crime Complaint Center (IC3), which is a joint effort between the FBI and the National White Collar Crime Center. “If you have received this or something similar do not follow payment instruction.”

The extortion part of the scam — now also featured on the FBI’s list of e-scams — is facilitated by a malicious application known as Reveton, which according to antivirus vendor F-Secure “fraudulently claims to be from a legitimate law enforcement authority and prevents users from accessing their infected machine, demanding that a ‘fine’ must be paid to restore normal access.” Machines are typically infected with Reveton via malicious websites — using drive-by download attacks launched by Citadel crimeware — rather than being introduced via phishing attacks or malicious email attachments.

Read more at Information Weekly

Leahy scuttles his warrantless e-mail surveillance bill

Sen. Patrick Leahy has abandoned his controversial proposal that would grant government agencies more surveillance power — including warrantless access to Americans’ e-mail accounts — than they possess under current law.

The Vermont Democrat said today on Twitter that he would “not support such an exception” for warrantless access. The remarks came a few hours after a CNET article was published this morning that disclosed the existence of the measure.

A vote on the proposal in the Senate Judiciary committee, which Leahy chairs, is scheduled for next Thursday. The amendments were due to be glued onto a substitute (PDF) to H.R. 2471, which the House of Representatives already has approved.

Leahy’s about-face comes in response to a deluge of criticism today, including the American Civil Liberties Union saying that warrants should be required, and the conservative group FreedomWorks launching a petition to Congress — with more than 2,300 messages sent so far — titled: “Tell Congress: Stay Out of My Email!”

Read more at CNET

Mail Deadline for Packages and Cards for the holidays.

According to the USPS calendar, November 13 was the last day to ship Parcel Post packages to military addresses to ensure Christmas arrival. The 3rd of December is the last day to send Priority Mail International in time for Christmas. The 11th is the last day to send Express Mail International for Christmas arrival. On the 15th you can ship Parcel Post to U.S. addresses in time for Christmas. On the 17th you can squeeze in letters to military in time for Christmas arrival.

The 19th to the 22nd are the busy days. The last day for most international shipping is the 19th. The 20th is the last day for first-class mail to ensure Christmas arrival. On the 21st you can send Priority Mail and the 22nd is the last day for most Express Mail to arrive on Christmas.

Hanukkah begins on sundown December 8th and last until December 16th.

If you miss those dates or desire to send additional greetings, you can do so with paid or free “e-cards” through the Internet. The following links are for e-card services on the Internet. They have cards for virtually—pardon the pun—every other occasions. Some of the free services may get paid by including advertising in the e-card. All are animated cards and some contain fun games.
Continue reading