Toggle light / dark theme

The Pentagon has quietly put out a call for vendors to bid on a contract to develop, execute and manage its new cyber weaponry and defense program. The scope of this nearly half-billion-dollar “help wanted” work order includes counterhacking, as well as developing and deploying lethal cyberattacks — sanctioned hacking expected to cause real-life destruction and loss of human life.

In June 2016, work begins under the Cyberspace Operations Support Services contract (pdf) under CYBERCOM (United States Cyber Command). The $460 million project recently came to light and details the Pentagon’s plan to hand over its IT defense and the planning, development, execution, management, integration with the NSA, and various support functions of the U.S. military’s cyberattacks to one vendor.

While not heavily publicized, it’s a surprisingly public move for the Pentagon to advertise that it’s going full-on into a space that has historically been kept behind closed doors. Only this past June, the Department of Defense Law of War Manual (pdf) was published for the first time ever and included Cyber Operations under its own section — and, controversially, a section indicating that cyber-weapons with lethal outcomes are sanctioned by Pentagon doctrine.

Read more

Think the Google Glass camera glasses are funny looking? Check out the 3RDi. Pronounced “third eye,” it’s a new camera that lets you capture your life while you’re enjoying the moment by placing a camera smack dab in the center of your forehead, making you look like a camera cyclops.

The camera is the brainchild of a Montreal, Quebec-based startup called 3RDiTEK. Style-wise, it looks like a bright white headband with a small black camera built into the forehead section.

complet+noir+a

Read more

with its amazing HD camera, the 3RDi captures videos & photos just like an action camera.

3RDiTEK
capture your life.
Buy one on Indiegogo: http://igg.me/at/3rditek
Visit us on the web — http://www.3RDiTEK.com
Like Us on Facebook — https://goo.gl/evk3qQ
Join us on Google+ — https://goo.gl/5FQ6xb
Follow Us on Twitter — https://goo.gl/cxPMP9

Read more

Every time you log in to Facebook, every time you click on your News Feed, every time you Like a photo, every time you send anything via Messenger, you add another data point to the galaxy they already have regarding you and your behavior. That, in turn, is a tiny, insignificant dot within their vast universe of information about their billion-plus users.

It is probable that Facebook boasts the broadest, deepest, and most comprehensive dataset of human information, interests, and activity ever collected. (Only the NSA knows for sure.) Google probably has more raw data, between Android and searches–but the data they collect is (mostly) much less personal. Of all the Stacks, I think it’s fair to say, Facebook almost certainly knows you best.

They can use this data for advertising, which is contentious, I suppose; but much worse, it’s boring. What’s long been more interesting to me is the possibility of interpolating from this data, i.e. deducing from your online behavior things that you never explicitly revealed to Facebook–and extrapolating from it, i.e. predicting your reactions to new information and new situations. What’s interesting is the notion that Facebook might be able to paint an extraordinarily accurate pointillist picture of you, with all the data points you give it as the pixels.

Read more

I think about pros and cons of living in a connected world … think about it …sometimes the answer it is not so simple, nor unique.

http://www.fas.org/sgp/crs/misc/R44227.pdf by Eric A. Fischer — Senior Specialist in Science and Technology, October 13, 2015

Computers are really, really good at recognizing faces… For people who don’t want to be found, or just enjoy the previously unquestioned ability to travel without being tracked, facial recognition poses a risk. As a solution, Japan’s National Institute of Informatics (NIII) created glasses that make faces unreadable to machines.

Image Credit: flickr/Steve Jurvetson.

Read more

43c0c76c-2b4c-11e5-acfb-cbd2e1c81cca.img

I sometimes wonder, How much data am I generating? Meaning: how much data do I generate just sitting there in a chair, doing nothing except exist as a cell within any number of global spreadsheets and also as a mineable nugget lodged within global memory storage systems — inside the Cloud, I suppose. (Yay Cloud!)

Read more

Toss Your Credit Cards and Other Security Musings – By: Sherri Hammons

“Let’s post our credit card numbers and even those pesky CSV codes on the back. (Better yet, let’s just do away with credit cards altogether because, at the end of that day, it’s just a bank taking on the risk that you’ll pay back a loan.) Let’s post our social security numbers and our driver’s licenses. Let’s post everything. Overnight, the incentives to steal your data are wiped off the face of the earth. The dark databases are worth zero.”

Last year, my personal credit cards and banks were breached five times. Last week, another personal breach. Each time, I was informed by email and snail mail, a new credit card or bank account was issued, and I bought more monitoring for my credit or, in the case of one of the breaches, the company that was breached bought additional monitoring. About the fourth time, I started wondering why our industry doesn’t do something else. The traditional IT security model is dead, but we just keep propping up the body. Hope has become our strategy in the cyber security war. Read more