me @ ur help

Friday, December 31, 2010

Metal Wire Growing From Skin

Noorsyaidah, an Indonesian woman, claims metal wire has grown from her body for 18 years

This is currently big news in Indonesia. Metal wires about 10-20 cm long grow from a woman’s body! Skeptics initially thought that is must be “self-inflicted”. Doctors however, have other theories but have given up on providing any scientific or medical explanations.

The woman had this problem for 17 years and currently being investigated by the Ministry of Health. Initial consultation with More..doctors and specialists found that the wires are also inside her body. At this stage, there were no current medical explanations or any case ever exist. Hence, there is but only one other possible consideration… Occult magic.

Video:


Her name is NOORSYAIDAH. A 40 years old kindergarten teacher from Sangatta, East Kutai. Her first symptoms started manifestating in 1991. The metal wires grew out of her chest and her belly. There was no explanation then (or even now). During the first week wires kept falling off from her body and were gone. A month later, the wires grew back again and from that time onward the wires did not fall. They kept growing!

One of her sisters said that she tried to help by trimming the wires. Alas, whenever she trimmed the wires, the wire retreated as if it were hiding and then popped up in another part of Noorsyaidah’s body.

There have been 4 Medical Specialists taking this matter seriously and have treated her in several ways. And as the result, doctors can’t figure out what exactly is happening to her. The doctors have taken an X-Ray image from her stomach and found that there are more than 40 metal wires inside her and some of them are bursting out of her skin. They looks like a living phenomenon. The wires are able mobile and therefore can change location at will, Thus the doctors are forced to use a magnet to scan the exact position of the wires. The wires bursted out without any symptoms of Tetanus, but she said that they’re hurting her like when needles sting.

Chinese workers build 15-story hotel in just six days


A construction crew in the south-central Chinese city of Changsha has completed a 15-story hotel in just six days.

Six days. That’s how long it took to build this level 9 Earthquake-resistant, sound-proofed, thermal-insulated 15-story hotel in Changsha, complete with everything, from the cabling to three-pane windows. The foundations were already built, but it’s just impressive.

Despite the frenetic pace of construction, no workers were injured — and thanks to the prefab nature of the process, the builders wasted very few construction materials.


Taiwan woman to marry herself in New Year

A Taiwanese woman therapist plans a new start in the New Year by holding a splendid wedding. What is unusual about her plan is that there will be no groom, the TVBS cable news channel reported.
Chen Ching, 45, a popular therapist from the central county of Nantou who has published a number of books, said she spent two months preparing for her wedding in full, traditional Taiwan style.
It is to include lighting firecrackers, serving gluttonous rice dumplings, giving out Taiwan wedding cakes and sending out invitations to friends and relatives for her wedding banquet, she said.
"It is a new life experience I must have," she said.
She said she felt lucky she was able to "meet myself and fall in love with myself".
Chen said her wedding would be held on the first day of the New Year when Taiwan is to also celebrate its 100th year as a republic.
Chen plans to put on a wedding gown, wait for a limousine she is to hire to take her from her home in Mingchien to Sun Moon Lake in Nantou, where her self-wedding is to be staged.
Chen would not be the only woman to marry herself. Last month, a 30-year-old Taipei office worker held her self-wedding after thinking that it was about time for her to get married, even though she had yet to find Mr Right.

Facebook overtakes Google


Facebook passed Google as the most visited website in the US in 2010, according to a survey by the web tracking firm Experian Hitwise.
The social networking site also claimed the top search term of the year, with variations on its name filling four of the 10 most popular searches, the survey found. In all, Facebook searches accounted for 3.48 per cent of all web searches in the US in 2010, a 207-per cent increase over 2009.
The study found that Facebook accounted for 8.93 per cent of all US website visits in the year, ahead of Google.com's 7.19 per cent and third-placed Yahoo Mail with 3.85 per cent.

However if all Google's various properties are taken into account, the web search giant did overtake Facebook with 9.85 per cent of all website visits. Microsoft's msn.com and bing.com also made it into the list of top ten websites, as did myspace.com.
Other terms in the top 10 searches included "youtube", "craigslist", "myspace", "ebay" and "yahoo".

World's Teensiest Battery

Atomic-scale examination of battery life was a scientific pipe dream until the DOE team invented a new type of electrolyte, a molten salt that functions under the high-vacuum conditions of transmission electron microscopy. Use of single nanowires rather than bunched wires or bulk materials was another novel approach, like assessing the strength of a rope by studying its individual threads.

With electron microscopes and tiny wires far thinner than a human hair, U.S. Department of Energy researchers have pinpointed key events in the life of a consumer electronics staple -- the lithium ion battery.

Their findings could lead to smaller, longer-lasting, more powerful batteries ready to rev up next-gen electric vehicles, laptops, cellphones and tablets.

"We think this work will stimulate new thinking for energy storage," said Chongmin Wang, a materials scientist at the Department of Energy's Pacific Northwest National Laboratory (PNNL). "We hope that with continued work, it will show us how to design a better battery."


World's Smallest Battery

A desire to understand batteries "from the bottom up" motivated Wang, fellow PNNL researcher Wu Xu, DOE Sandia National Laboratories nanotechnology scientist Jianyu Huang, and researchers from the University of Pittsburgh and University of Pennsylvania to create the world's smallest lithium ion battery, a feat they reported in the Dec. 10 issue of the journal Science.

One seven-thousandth the thickness of a human hair, the battery's 100-nanometer-wide anode, through which electric charge flows in, is a single nanowire made of tin oxide, Xu explained. From the single-wire anode, the nanobattery's electric current flows through a liquid electrolyte to a lithium-cobalt oxide cathode.

It's a design that mimics the ubiquitous consumer electronics battery, albeit on a far smaller scale.

In a rechargeable lithium ion battery (LIB), positively charged lithium ions move from a negative electrode (the anode) to a positive electrode (the cathode) during electric discharge, and back again during recharge.

Lithium ions make great battery chargers because they strongly gravitate toward electrons, initially clustering around the cathode. As charging pumps free electrons into the anode, lithium ions make haste across an electrolyte fluid, flowing from the cathode to the anode.

Playing tunes on an iPod or downloading email on a notebook depletes the newly charged battery, causing electrons to flee the anode while leaving lithium ions behind. In time, those ions return to the cathode, back across the electrolyte fluid.

Dual Innovations

Atomic-scale examination of battery life was a scientific pipe dream until the DOE team invented a new type of electrolyte, a molten salt that functions under the high-vacuum conditions of transmission electron microscopy.

Use of single nanowires rather than bunched wires or bulk materials was another novel approach, like assessing the strength of a rope by studying its individual threads. Previous battery researchers have studied bulk materials, a process Huang likened to "looking at a forest and trying to understand the behavior of an individual tree."

These dual innovations provided what he termed "the closest view to what's happening during charging of a battery that researchers have achieved so far," including how so-called "lithiation stresses" -- physical nanowire distortions -- take a toll on battery life.

"Lithiation means squeezing lithium into a material, which happens during battery charging," Huang told TechNewsWorld. "Our observations -- which initially surprised us -- tell battery researchers how lithiation distortions are generated, how they evolve during charging, and offer guidance on how to mitigate them."

Medusa's Hair - and Glare

The distortions and contortions the nanowires sustain during lithiation create a many-headed area of atomic dislocations the researchers christened the "Medusa front."

Medusa was a Greek Gorgon, a mythological female monster with snakes for hair whose countenance could turn a person to stone.

"The dislocations emanating from the Medusa front are just like Medusa's hair snaking out of her head," said Huang.

A high-resolution video of the tin oxide wires shows them behaving like snakes during a meal, writhing and fattening by as much as 250 percent as lithium ions feed them with electricity.


The nanowire's lively behavior is important for several reasons, PNNL's Xu explained. Repeated distortions can introduce tiny defects that accumulate, damaging electrode materials. Indeed, over time lithiation changes the tin oxide from a neatly arranged crystal to an amorphous glass -- not unlike the Medusa's flesh-to-stone changing glare.

"The insertion of lithium ions into tin oxide crystals leads to a phase transformation, from crystalline to amorphous," PNNL's Wang told TechNewsWorld. "Accompanying this phase transformation is the volume expansion."

Along with the volume expansion, the researchers observed that upon recharging the battery, the tin oxide nanowires nearly double in length, a finding that conflicts with the conventional wisdom -- that batteries swell across their diameter.

To help avoid short circuits that shorten battery life, "manufacturers should take account of this elongation in their battery designs," said Sandia's Huang. "The gap between the cathode and anode needs to be more than double the length of the nanowire, so that no short circuit will occur during charging."

Lab to Market

Observing that nanowires "were able to withstand the deformations associated with electrical flow better than bulk tin oxide, which is a brittle ceramic," PNNL's Wang envisions a rudimentary design for a nanoscale battery that works as well in the marketplace as it does in the laboratory.

"It reminds me of making a rope from steel -- you wind together thinner wires rather than making one thick rope," he said.

Presently studying silicon, which works extremely well with lithium ions, the DOE research team's nano-sized rechargeable battery "might look like a human hair," Huang said.

Until they finish such a design, however, "the methodology we developed should stimulate extensive real-time studies of the microscopic processes in batteries," he said, "and lead to a more complete understanding of the mechanisms governing battery performance and reliability."

Trojan attack on Android phones


A bit of malware that could allow hackers to control victims' phones is making its way around Android handsets. A Trojan called "Geinimi" apparently is able to sneak into Android phones by way of pirated apps available through third-party China-based Android apps stores. It appears the original versions of the malware-riddled apps are not infected.

A new Trojan that can create botnets has emerged in China, according to Lookout Mobile Security.

This Trojan, dubbed "Geinimi," is the most sophisticated Android malware so far, the company said.

Once it's installed on a user's phone, Geinimi can receive commands from a remote server that lets that server's owner control the smartphone.

Geinimi is apparently being spread through pirated versions of legitimate Android apps, mainly games, and is being distributed in third-party Android app stores in China.


How Geinimi Works

When a smartphone user launches an infected application containing Geinimi, the Trojan collects information in the background.

This information includes location coordinates and unique identifiers for the device and its SIM card, Lookout Mobile said.

Every five minutes, the Trojan tries to connect to a remote server using one of 10 embedded domain names. These domain names include www.widifu.com; www.udaore.com; www.frijd.com; www.islpast.com and www.piajesj.com, according to the security company.

If Geinimi manages to connect to the remote server, it will upload information it collected. The Trojan also prompts the user to uninstall an app, and it sends a list of installed apps to the remote server, Lookout Mobile said.

The malware's creators have used an off-the-shelf bytecode obfuscator to hide the code and have encrypted some of the command-and-control data. This data comes into play when the Trojan connects back from a victim's smartphone to the remote server.

Where the Virus Lurks

Pirated applications that include the Trojan that are available in Chinese app stores include "Monkey Jump 2;" "Sex Positions;" "President vs. Aliens;" "City Defense;" and "Baseball Superstars 2010," Lookout Mobile said.

However the original versions of these apps that are in the official Google (Nasdaq: GOOG) Android Market have not been affected, Lookout Mobile said.

"The Trojan is an add-on, so it could be uploaded to any app on the Android Market, but so far the infected apps have only shown up in the Chinese app markets," Kevin Mahaffey, chief technology officer at Lookout Mobile, told TechNewsWorld.

"We contacted the developers, and they didn't know this was going on or that their games were being pirated," Mahaffey added.

Green Isn't Always Good

"We see the exact same thing with software for Windows in China all the time," Chester Wisniewski, a senior security adviser at Sophos, told TechNewsWorld.

"The malware authors convert legitimate Windows apps into adware and offer it for free, and it wouldn't surprise me if they took the same approach with Android," Wisniewski explained. "There's a term in Chinese that translates to something like 'green software,' and that refers to pirated versions of software."

About 80 percent of so-called green software on websites in China contain malware, Wisniewski said.

No Sailing the 7 Seas Yet

Geinimi was discovered on a user forum in China, Lookout Mobile's Mahaffey said.

While the malware currently affects only users in China, it could well spread elsewhere.

"Mobile devices have a fairly international user base, and there's a lot of cross-pollination of apps," Mahaffey pointed out. "But so far, the market is still localized."

Google can easily prevent the spread of the Trojan by kicking the app off Android, Randy Abrams, director of technical education at ESET, pointed out. "Why hasn't Google done anything yet?" he asked.

Google didn't respond to requests for comment by press time.

A Smartphone Is Not Just a Phone

Smartphone users need to realize that their devices are "really powerful little computers," ESET's Abrams told TechNewsWorld.

For example, Android-based smartphones can be used to launch distributed denial of service (DDoS) attacks against websites, Abrams said.

"Right now, people are constantly installing apps that tell you they will access the Internet, or send and receive text messages, or send and receive email," Abrams pointed out. "These apps are paid for by advertising. The Trojan takes things one step further in that it can create a botnet. But in terms of giving up privacy, people are already doing that by installing free games and apps."

Android offers users two types of protection, Lookout Mobile's Mahaffey said. One is that the apps users download must ask for permission if they want to access any of the operating system's features.

The other type of protection blocks sideloading, which is the technical term for users downloading apps from unknown sources. In order to download pirated apps, which may contain the Geinimi Trojan, Android smartphone owners need to turn off sideloading protection, Mahaffey said.

That's exactly what they shouldn't do; after all, they don't turn antivirus off on their PCs before downloading applications.

"Treat your smartphone like you would your PC, and make sure that all the things you safeguard on your PC you safeguard on your smartphone," Mahaffey stated.

Saturday, December 25, 2010

ISRO rocket explodes


Indian Space Research Organisation (ISRO) suffered a major setback on Saturday when the Geosynchronous Satellite Launch Vehicle-F06 launch vehicle failed to put communication satellite GSAT-5P in orbit.
GSLV-F06, powered by Russian cryogenic engine, lifted off from the second launch pad at the Satish Dhawan Space Centre in Sriharikota at 4:04 PM on Saturday evening after the 29-hour countdown. But the rocket deviated from its intended path and exploded mid-air destroying the Rs 125 crore communication satellite GSAT-5P.
ISRO sources said the rocket failed due to a techinical glitch in the first stage of the lift-off.
GSAT-5P, weighing 2,130 kg, with 24 C-band transponders and 12 extended C-band transponders was to ensure continuity of telecom, television and weather services. The satellite was scheduled to replace the INSAT-2E satellite, which was put in orbit in 1999.
The satellite, developed by ISRO Satellite Centre, Bangalore, was the fifth in the GSAT series. It had a designed mission life of 12 years.
The launch of the satellite, which was originally scheduled for December 20, had been postponed after a leak in the Russian cryogenic engine on board the launch vehicle.
This is the second failure this year for ISRO after the previous GSLV mission with the country's maiden cryogenic engine hit a snag and the rocket plunged into the Bay of Bengal on April 15 this year.

Tuesday, December 21, 2010

Browser to free the Web of suffixes


A Dutch technology company has emerged as a front-runner in a project to rid the Internet of limited number of suffixes such as .com, and offer single names which can be countries, company names or fantasy words.
Such a system, which enables countries, individuals and firms to have a Web address which consists of a single name, offers flexibility and is language and character independent.
Internet Corporation for Assigned Names and Numbers (ICANN), which operates the root servers of the Internet guiding all Web traffic, has been working for years on a similar plan as it determines which suffixes, known as top-level domains (TLDs), are recognized by those root servers.

A root server is a master list of all top-level domain names, such as .com, .net, .org, and individual country codes, made available to all routers.
Earlier this month ICANN said there was pent-up demand for freeing suffixes, but delayed the plan to approve them into 2011.
To bypass the ICANN system Amsterdam-based UnifiedRoot has created browser SunDial, which enables web users to visit web sites associated with Unifiedroot TLDs, as well as all web sites registered in the ICANN system.
"We expect in short term that other browsers will also adopt our solution," Erik Seeboldt, managing director of UnifiedRoot, said in an interview.
So far free SunDial browser has been downloaded more than 15,000 times directly from UnifiedRoot, but Seeboldt said due to different other firms distributing the browser total downloads were unknown.
Seeboldt said he was convinced leading browser providers - such as Microsoft, Mozilla and Google - would tweak their software to allow access to UnifiedRoot domains.
"When there is traffic other browsers start to come to us," he said.
UnifiedRoot offers practically unlimited numbers of suffixes, unlike the short list of suffixes currently in use.
Seeboldt said first 7-8 new root domains using new suffixes would open in early 2011.
Its offer is different from other "alternative root" providers such as New.net which offers to register names in front of a small range of new suffixes, such as .golf or .law.
Critics argue alternative root companies such as UnifiedRoot introduce ambiguity because they bring a new set of traffic rules to the Web which are, certainly in the beginning, only recognized by a limited number of computers around the world.
To avoid conflicts between top level domains from UnifiedRoot and ICANN, the Dutch company will not register existing ICANN TLDs, and it informs ICANN of any names registered into its system.
Seeboldt said the communication between UnifiedRoot and ICANN has been mostly one-way.
"It seems they are not taking us very seriously," he said.
A spokesman for ICANN said parallel platforms like UnifiedRoot had a limited scope.
"While these systems might indeed function, it's important to note that many are not part of a single root, which to a large extent defines the Internet, its global reach and true value," he said.

Microsoft Opens HTML5 Proving Ground


Web developers will have a chance to explore and tweak emerging yet unstable standards in Microsoft's new HTML5 Labs site. "At this point, HTML5 standards are moving targets," Pund-IT's Charles King stated. "But it's better for developers to get involved early and tweak their offerings along the way than to start late and deliver half-baked offerings."

Microsoft (Nasdaq: MSFT) launched an HTML5 laboratory for developers on Tuesday. The company intends the project to be a site where Redmond prototypes early and unstable Web standard specs from standards bodies such as the W3C and shares them with the developer community.

One reason for establishing the lab could be that Microsoft wants to leverage its strong relationship with developers for the Web.

Microsoft could also be playing catch-up with Google (Nasdaq: GOOG), which launched its HTML5-based Body Browser last week, and with Mozilla's Firefox browser.


About the HTML5 Labs site

The HTML5 Labs site is managed by the Microsoft Interoperability Strategy Group. Currently, it has two prototypes available -- IndexedDB and WebSockets

IndexedDB is a draft Web specification for the storage of large amounts of structured data in the browser. WebSockets simplifies bi-directional, full-duplex communications channels over a single TCP socket.

"WebSockets and IndexDB were chosen because the specifications have great potential to provide benefits to a broad audience, but they are currently unstable," Microsoft spokesperson Anna Imperati told TechNewsWorld.

The WebSocket API (application programming interface) is being standardized by the W3C, and the protocol is being standardized by the IETF, while IndexedDB is a "developing W3C Web standard," Imperati added.

Microsoft set up the lab to separate prototype implementations from mainstream browser product implementations. For example, in IE9, it's only delivering on the key parts of HTML5 that are site-ready.

The New Face of Microsoft

With the HTML5 Labs, Microsoft is apparently changing its approach to testing apps -- instead of throwing betas out to users, it will offer only relatively stable products.

"Microsoft is focusing much more on finishing products before they send them out these days, largely to both address past bad practices and to more sharply differentiate themselves against Google, which aggressively uses first releases as beta tests," Rob Enderle, principal analyst at the Enderle Group, told TechNewsWorld.

"Microsoft recognizes that IE9 is a critical product for the company upon which much of its infrastructure resides," Enderle pointed out.

"They messed IE up once and they intend to never do that again," he added.

Redmond "historically has had a very strong relationship with developers in other areas, and it looks like it's trying to apply some of those practices to the Web development community around HTML5," Ray Valdes, vice president of Web services at Gartner (NYSE: IT), told TechNewsWorld.

"This highlights Microsoft's recognition of how critical a role developers will play in the success of IE9 and other HTML5-related products," Charles King, principal analyst at Pund-IT, told TechNewsWorld. "But one goal here is to ensure that IE9 add-ons and services are robust from the beginning."

Web Standard Specs Are a Gamble

Web standards are hammered out over time by members of the computer industry, and they're not always stable until they've been finally ratified. Sometimes, only parts of a standard are stable. Such is the case with HTML5.

"There are certain subsystems of HTML5 that are more volatile than others," Gartner's Valdes stated. "Some go through a trajectory that looks good but they reach an impasse."

WebSQL is one such specification. It's supported by Safari, Chromium 4 and Opera.

"For the last three years, WebSQL was gong to be the primary mechanism for offline storage, then the committee reached an impasse and work stopped," Valdes remarked.

IndexDB is "the presumed replacement for HTML5," Valdes said. However, it's fairly new, having only emerged over the past couple of months, and browser vendors haven't been able to incorporate it into their products, with the exception of Mozilla, which has implemented it in Firefox 4. It's also scheduled to be supported by Chromium Milestone 9.

"At this point, HTML5 standards are moving targets," Pund-IT's King stated. "But it's better for developers to get involved early and tweak their offerings along the way than to start late and deliver half-baked offerings."

Catching Up to the Competition

Perhaps Microsoft is also trying to make sure IE9 can compete with other browsers on the market.

The Internet Explorer browser, which once had well over 90 percent of the browser market, had only 42.5 percent at the end of November, according to W3Counter's statistics.

Firefox came in a reasonably close second with 32 percent of the market, and Google's quickly growing Chrome came in third with a tad over 13 percent.

"HTML5 isn't prevalent enough to exert a significant commercial impact, but Google's launch last week of its Body Browser caused quite a stir, and gave the company something of a leg up in HTML5 thought leadership," Pund-IT's King remarked. "Though it isn't anywhere near as high profile as the Body Browser, the Microsoft Labs does reflect a similar sort of effort."

Saturday, December 18, 2010

Court Ruling Grants Email the Cloak of Privacy


"Just because we now use modes of communications not contemplated by the framers of the Constitution does not mean that government gets a free pass to intercept and listen in without following constitutionally mandated process," said Jonathan Askin, a professor at Brooklyn Law School. "As our modes of communications evolve, so should the legal processes affecting them."

The Sixth Circuit Court of Appeals has handed down a ruling that delights privacy advocates and Fourth Amendment purists: In U.S. v. Warshak, it found that the government should have obtained a search warrant before seizing and searching defendant Stephen Warshak's emails, which were stored by email service providers.

In the criminal case, Warshak was being investigated by the Justice Department for fraud and related crimes associated with his marketing of "male enhancement" pills.

During the investigation, the Justice Department ordered the email provider to prospectively preserve copies of Warshak's future emails, using a subpoena and a non-probable cause court order. The government based its actions on the Stored Communications Act, which allows it to obtain emails already in storage with a provider.

The Court of Appeals agreed that the government did act in good faith by relying on the Stored Communications Act. However, it continued, a warrant was in order.

"If we accept that an email is analogous to a letter or a phone call, it is manifest that agents of the government cannot compel a commercial ISP to turn over the contents of an email without triggering the Fourth Amendment," the decision reads. "An ISP is the intermediary that makes email communication possible. Emails must pass through an ISP's servers to reach their intended recipient. Thus, the ISP is the functional equivalent of a post office or a telephone company."


Calls for New Laws

It is an important ruling, because it is the first time a federal court of appeals has extended the Fourth Amendment to email with such careful consideration, and it is likely to be influential on both legal and practical levels, Alexander H. Southwell, a partner with Gibson Dunn's white collar defense and investigations practice, told the E-Commerce Times.

"This will likely lead to re-invigorated calls for legislation," he predicted.

The decision is particularly important because the Stored Communications Act does allow the government to secretly obtain emails without a warrant in many situations, according to the EFF, which filed an amicus brief in the case.

The Department of Justice was unable to return a call from the E-Commerce Times in time for publication.

"It's reassuring to see that the Sixth Circuit recognizes that the Fourth Amendment should be technology-agnostic," Jonathan Askin, a professor at Brooklyn Law School, told the E-Commerce Times.

"Just because we now use modes of communications not contemplated by the framers of the Constitution does not mean that government gets a free pass to intercept and listen in without following constitutionally mandated process," he pointed out. "As our modes of communications evolve, so should the legal processes affecting them."

More Needs to Be Done

It is important to remember, though, that this is one circuit court out of eleven, said Jim Dempsey, VP for public policy at the Center for Democracy and Technology.

"If anything, it heightens the issue and gives credibility to the notion that the courts are all over the map on this issue, and that inconsistent rulings don't provide customers or businesses or the government with the kind of certainty that they should all want," Dempsey told the E-Commerce Times.

Dempsey is a member of the Digital Due Process coalition, formed earlier this year by such companies as Google (Nasdaq: GOOG), the ACLU, Microsoft (Nasdaq: MSFT) and Salesforce.com (NYSE: CRM). The coalition is calling for the federal government to update laws on government access to email and private files stored by third-party service providers in the cloud -- or any other storage system.

Currently, the coalition holds, third-party storage of digital data is a legal gray area, which has allowed the Department of Justice to prevail with the argument that all it needs is a subpoena or court order to obtain customer data from companies. The coalition would like to see clear laws requiring warrants for such requests.

Cybervigilantism


Controversy over Wikileaks so-called Cablegate release last month led to a series of attacks and counterattacks over the Web, as Wikileaks supporters attempted to cripple the sites of organizations seen as working against the whistleblower website. Those attackers were in turn attacked themselves. Some see the attackers as political protesters; to others, they're criminals.

Things took an interesting turn in the aftermath of Cablegate, which saw 250,000 documents, many of them sensitive, put on the open Web by WikiLeaks.

Julian Assange, the founder of the site, has been charged by Swedish police with a sex crime; the U.S. government is seeking to try Assange, who's currently out on bail; hundreds of mirrored WikiLeaks sites have sprung up around the world; WikiLeaks supporters have launched DDoS attacks on the websites of anyone taking action against the whistleblower site; and free speech advocates have criticized actions against WikiLeaks.

Wre the WikiLeaks supporters who attacked the Web sites of various organizations perceived as acting against the whistleblower site really cyber-vigilantes, or are their actions really an online version of public protest?

Further, is cyber-vigilantism wrong? What about cyber-vigilantes like the hacker th3j35t3r, (The Jester), who take down Jihadi websites on their own?
A Litany of Online Ills

In the weeks following Wikileaks' release of Cablegate, MasterCard (NYSE: MA), Visa (NYSE: V) and Paypal, who refused to process contributions to WikiLeaks, all saw their sites hindered to some degree by online attackers.

The websites of PostFinance and even Senator Joe Lieberman, who spoke out against WikiLeaks over Cablegate, were also attacked. The attackers were the groups Anonymous and Operation Payback, and you can see a partial list of the attacks on Panda Labs' security blog.

Hundreds, if not thousands, of people worldwide have joined in the DDoS attacks on organizations that cracked down on WikiLeaks, and a Dutch teenager has been arrested for participation in the attacks.

The attackers used the Low Orbit Ion Cannon (LOIC), an open source DDoS tool. This lets users start up or join a voluntary botnet to launch their attacks in concert.

LOIC lets users insert the address of a command and control server. The application will then automatically connect the users' computers to the C and C server, creating an ad hoc botnet, and launch synchronized attacks against a predetermined target. Some botnet operators were reportedly recruited by WikiLeaks supporters.

Anonymous and Operation Payback disclaimed any connections with each other, and if they're to be believed, they're just independent Web users who have a common cause -- targeting big business and government organizations perceived as trying to shut down free speech.

Senator Joe Lieberman's office did not respond to requests for comment by press time.

We Are What We Do

When a group of people get together to attack the website of a group they disagree with philosophically or politically, or to avenge the crushing of an ordinary person by a large organization, is that cybervigilantism or an attempt to protect free speech?

There is no standard definition for the terms "cyber-vigilantism" or "cyber-attacks" in state and federal laws addressing wrongful conduct on the Internet, Julie Machal-Fulks, a partner in law firm Scott and Scott Partners, told TechNewsWorld.

"How we may classify different kinds of cyber-vigilantes is less important than the specific actions taken by those groups or individuals," Machal-Fulks pointed out. For DDoS attacks and other similar activities, "there is no legally meaningful distinction between violation of a law applicable to online activity and violation of a law applicable to offline activity," she stated.

The claim that DDoS attacks are a form of political protest may not hold water.

There's a difference between legal and illegal political protest, whether the protests are conducted in the street or in cyberspace, George Pike, an assistant professor of law at the University of Pittsburgh's School of Law, told TechNewsWorld.

"A protest event that results in deliberate property damage or injury does not become legal simply because the intent was political," Pike explained.

Civil Disobedience or Incivility?

Could the spontaneous emergence of people worldwide who launched these DDoS attacks be considered civil disobedience instead?

"I am aware that civil disobedience is often claimed as a justification for some illegal activities, but the role or purpose of civil disobedience is generally oriented to changing public opinion about the law," Pike said. An act of civil disobedience, he contended, is "public and acknowledged by the actor, and not hidden and anonymous."

At the height of the attacks, the Electronic Frontier Foundation tweeted its condemnation of cyber-vigilantism.

"DDoS attacks are just that -- attacks," Chris Palmer, technology director at the EFF, told TechNewsWorld. "Like all attacks, they may have collateral damage, and may thus be counter-productive."

As the Internet becomes ever more densely connected and as people depend on it more and more, collateral damage "will become increasingly counter-productive and unsustainable," Palmer warned

Ours Are Good Guys, Theirs Are Bastards

The pro-WikiLeaks attackers didn't necessarily go scot-free -- Operation Payback's own website came under DDOS attack in what seemed to be retaliation for the group's actions over WikiLeaks.

The attackers were described in the Panda Labs blog as "a group of patriots attempting to protect the greater interests of the United States of America."

Indeed, some self-proclaimed cyber-vigilantes in America have launched cyberattacks against websites of people perceived as the enemy.

Perhaps one of the best known is a hacker calling himself "th3j35t3r," ("The Jester"). He specializes in taking down Muslim extremists' websites. Others include Bill Warner, a private investigator who shut down three extremist websites hosted by an ISP in Tampa, Fla., in 2008.

Where do we draw the line? Is it wrong for cybervigilantes to attack the websites of governments, government officials and large corporations? What about those of extremist religious groups?

Yahoo's job Cuts


Yahoo has undertaken a series of mid-December layoffs and other cutbacks, axing about 650 workers right before the holidays. Hardest hit will be its product groups. It's also nixing several Web properties, including Yahoo Buzz, AltaVista and bookmark site Delicious. Meanwhile, hackers hammer Gawker, spooks hit OpenBSD, and Microsoft winds up for another swing at tablets.

For a long time now, Yahoo (Nasdaq: YHOO) has suffered a bit of an identity problem. What does it want to be? King of search is Google's (Nasdaq: GOOG) thing, and Facebook owns the social network scene, so what is Yahoo's identity, besides being a really big email provider?

This week, Yahoo apparently started looking toward a new role model: The Grinch. It's started dealing out a fresh deck of pink slips, and its timing is so God-awful that you almost have to think it was on purpose, or that the company is so strapped for cash and credit that it couldn't scape together another two weeks' pay for a tiny percentage of its workforce.

The total number of employees given Yuletide Yahoo layoffs will be around 650, or 4 percent of the company. The company's product groups will be the worst hit.

On top of the personnel cutbacks, Yahoo's also kicking a few websites and technologies to the curb. The company's confirmed that Yahoo Buzz will be laid to rest, as will the traffic APIs related to its mapping services. Also reportedly on the chopping block are one-time search contender AltaVista, Yahoo Picks, Yahoo Bookmarks, MyM, MyBlogLog and AllTheWeb. Last but not least, Delicious is apparently on its way out too.

Of course, a leaner Yahoo may be better able to compete with its rivals. The company's been growing in a hodgepodge of different directions over the years, and if this cost-saving measure is accompanied by a renewed effort to focus its direction and vision, then maybe things will work out. A little pruning can be good for a company in the long run.

That's not very comforting for the employees who lost their jobs, of course, and it's especially stinging to see Yahoo rivals like Google giving their workers across-the-board raises just to keep them on board. Those at Yahoo who get to keep their jobs may feel relieved, but a round of mid-December layoffs sounds like something that could really undermine the morale of the entire remaining staff.

In the wake of this news, though, Yahoo's figurative image problem became very literal. On Tuesday, the day news of the layoffs hit, Yahoo Search users discovered a rather odd bug. Innocuous search terms -- anything from puppies to sweet potatoes to wrenches, whatever -- would result in a set of related thumbnail images at the top of the screen. That's normal. What wasn't so normal was what you'd see if you clicked on those images. Users who did so were shown hardcore porn.

No word on whether that little trick was the work of a recently pink-slipped employee. Or it could have been done by a worker who's job wasn't in danger at all -- maybe they just didn't like Yahoo's holiday spirit and figured out a way to pull a prank without getting caught. But if it was just a coincidence ... well, that's one hell of a coincidence.

Google Gets Under People's Skin


Google's new Body Browser could be a valuable tool for physicians -- helping them explain medical conditions and surgeries to patients, among other things. It will also be of value to medical educators and students. One possible drawback, though, is that some people might be tempted to use it for self-diagnosis, which could be dangerous. "Information from the Internet nearly killed my daughter," warned author Robert Goldberg. "Twice."

With Google's (Nasdaq: GOOG) announcement Thursday of the Body Browser, online mapping technology finally caught up with the medical crew of "Fantastic Voyage," miniaturized in the 1966 sci-fi flick to enter a renowned scientist's bloodstream and save his brain from a life-threatening blood clot.

A Chrome-OS driven online Gray's Anatomy, Body Browser continues Google's quest to map everything, now including the human body.

"Body Browser is a detailed, interactive 3D model," Google representative Jason Freidenfelds told TechNewsWorld. "You can search, explore different layers of human anatomy, rotate, and zoom in on parts you're interested in. Perhaps it's analogous to the way geospatial imagery has made it easier to explore the world in engaging and informative ways."


To view the publicly available demo at Google Labs, users will need a WebGL-enabled browser, "such as the just-updated version of Google Chrome Beta," Freidenfelds explained. "WebGL is a standard that allows you to visualize complex 3D graphics in the browser without a plug-in."

After visualizing it himself, Samieh Rizk, M.D., said Body Browser is "a fascinating tool."

"As a facial plastic surgeon, I can see using Body Browser to educate patients," said Rizk, who directs Manhattan Facial Plastic Surgery, and on his website offers a 3D tour of his office and surgical suite. "For example, when I explain to a patient that his nasal septum is deviated, or the smoker's lines around a woman's mouth are caused by the obicularis muscle contracting, I can show them, and they will get it."

Wednesday, December 8, 2010

Amazing pictures by NASA




Internet body meets to expand list of domain names and IP addresses


ICANN, the international regulatory body for Web architecture, met here Monday to discuss expanding the list of top level domain names and a new generation of Internet protocol addresses.

"We are a thousand individuals from all over the world convening in Cartagena to adopt fundamental decisions on the biggest issues facing the Internet industry on a global scale," said ICAAN chairman Peter Thrush.

A California-based non-profit corporation, the Internet Corporation for Assigned Names and Numbers manages the Domain Name System and Internet Protocol addresses that form the technical backbone of the Web.

Every device connecting to the Internet needs an IP address and Thrush said ICANN's board meeting was to help prepare the transition from IPv4 (Internet Protocol version 4) to IPv6, which already exists but is rarely used.

Less than 150 million IPv4 addresses are still available, and "will come to an end by mid-2011, which necessitates an urgent adoption of a new generation of the respective protocols," he said.

During its meeting here, ICANN is also expected to discuss expanding the list of what are known as generic top level domains such as .com, .net and .org.

Thrush said an expansion of domain names would herald "the beginning of a new era of change for completion of the map of the Internet."

Tumblr blogging site back up after massive outage


The popular blogging site Tumblr is recovering from an outage that had left it out of service for about 24 hours.
Tumblr says the problem was in one of its database clusters, or collection of databases. On Twitter, the company says the databases are up and running. Tumblr says it is slowly opening up access to people's blogs and monitoring site performance.
New York-based Tumblr lets users post photos, text, videos and other content in short updates. It bills itself "the easiest way to blog," though on Monday morning that wasn't the case.
While both Facebook and Twitter have suffered big outages in recent years, the length of Tumblr's problem is unusual.
Twitter users complained about the outage in English, Spanish and Japanese among other languages.

Tuesday, December 7, 2010

Google e-book store


Google Inc. is making the leap from digital librarian to merchant in a challenge to Amazon.com Inc. and its Kindle electronic reader.

The long-awaited Internet book store, which opened Monday in the U.S., draws upon a portion of the 15 million printed books that Google has scanned into its computers during the past six years.

About 4,000 publishers, including CBS Corp.'s Simon & Schuster Inc., Random House Inc. and Pearson PLC's Penguin Group, are also allowing Google to carry many of their recently released books in the new store.

Those publishing deals will ensure that most of the current best sellers are among the 3 million e-books initially available in Google's store, said Amanda Edmonds, who oversaw the company's partnerships. Millions more out-of-print titles will appear in Google's store, called eBooks, if the company can gain federal court approval of a proposed class-action settlement with U.S. publishers and authors.

The $125 million settlement has been under review for more than two years. It faces stiff opposition from rivals, consumer watchdogs, academic experts, literary agents and even foreign governments, which worry that Google would get too much power to control prices in the still-nascent market for electronic books. Amazon.com, which started its business as a seller of books over the Internet, is among the competitors trying to squelch the settlement. The U.S. Justice Department has advised the judge overseeing the case that the settlement probably would violate antitrust and copyright laws.

Books bought from Google's store can be read on any machine with a Web browser. There are also free applications that can be installed on Apple Inc.'s iPad and iPhone, as well as other devices powered by Google's own mobile operating system, Android.

But Google's eBooks can't be loaded on to the Kindle.

Electronic books are expected to generate nearly $1 billion in U.S. sales this year and climb to $1.7 billion by 2012 as more people buy electronic readers and computer tablets such as the iPad, according to Forrester Research. The research group expects a total of 15 million e-readers and tablets to have been sold in the U.S. by the end of the year.

Google believes it's already offering the broadest selection of digital titles in the world, and it plans to keep adding to the inventory if it can gain the necessary copyright clearances. The company, based in Mountain View, Calif., believes it eventually will be able to make electronic copies of the estimated 130 million books in the world. It's also planning to start selling books outside the U.S. next year.

Google's eBooks store, originally to be called Editions, has been in the works for more than a year. The company already had been showing books no longer protected under copyright in their entirety and displaying snippets of other titles through its widely used search engine.

The company is trying to position its new sales outlet as an ally to publishers, merchants and consumers looking for alternatives to Amazon's electronic book store, which feeds Amazon's hot-selling Kindle, but not other e-readers, including Barnes & Noble Inc.'s Nook.

Google's e-books will work on the Nook, Sony Corp.'s Reader devices and practically every other e-reading device except the Kindle. Google achieves this with the help of Adobe Inc.'s copy-protection system for e-books. That system is already used by public libraries and smaller online bookstores, but hasn't seen much interest from the major players. Amazon.com, Barnes & Noble and Apple all have their own copy-protection systems.

Google plans to offer sharp discounts on many of its e-books but it will still pay publishers 52 percent of the list price for sales made on its site, unless another arrangement has been negotiated with an outside agency. The formula means that even if Google elects to sell a book with a $10 list price for $6, the publisher would still be entitled to $5.20.

Forrester Research analyst James McQuivey described Google's latest effort as a "game expander" rather than a game changer.

The growing embrace of digital sales by the publishing industry is expected to result in the closure of hundreds more book stores during the next few years, adding to a media mortuary of music and video merchants killed by electronic distribution.

Google's announcement comes on the same day that activist investor William Ackman, who owns a 37 percent stake in Borders Group Inc., offered to finance a Borders-led takeover bid for rival bookseller Barnes & Noble Inc. If successful, it could ultimately lead to closures of overlapping stores.

In a move that could delay closures of other retailers, Google is allowing independent book stores to sell its inventory through their own sites. More than 100 book retailers in 36 states already have agreed to team up with Google. They include Powell's in the Portland, Ore., area and online-only merchant Alibris.com.

Opening the door to book merchants who can't afford to invest heavily in technology could help some of them survive the digital transition, McQuivey said. "At least this gives them a fighting chance."

Although Google expects the lion's share of its eBooks revenue to be funneled to its partners, its portion of the sales could help the company develop another way to make money besides the Internet ads that bring most of its income. The availability of eBooks also could help boost advertising sales by giving people another reason to come to Google's website.

Google shares edged up $5.36, or nearly 1 percent, to close Monday at $578.36.

To allay concerns that it will exploit the dominance of its Internet search engine to spur e-book sales on its own site, Google plans to include links to several other places where people can buy a book mentioned in a search request. And when visitors come to the book section on Google's website, they will be asked if they are interested in buying or just doing general research.

chrome OS laptops


The first crop of computers powered by Google Inc's Chrome operating system will start selling in mid-2011 and come with free Verizon Wireless connections for two years, opening another front in its rivalry with Microsoft Corp and Apple Inc.
The new Chrome-based notebooks will come with 100 megabytes of free wireless data transfers per month for two years courtesy of Verizon, executives told reporters on Tuesday.
They are designed to promote Web-centric computing, in which consumers use online applications instead of downloading software to their PCs. To support that, the company started up on Tuesday a Web store selling some 500 games, news and other software applications, carving out a bigger role in the next generation of Internet media and entertainment.
Electronic Arts demonstrated a game that will go on sale on the Chrome software store later Tuesday. The online store will also sell applications to run news, from National Public Radio to the New York Times.
Google executives also told a news conference in San Francisco that the Chrome Internet browser, on which the similarly named operating system is based, has 120 million users. In May, it had 70 million.
Apple Inc in October said it would open an applications store for its Macintosh computers as it tries to replicate the success of apps sold for its iPhone. That store is expected to go live early next year.
Shares in Google, which had performed strongly all session, were up 2 percent at $ 589.40 in afternoon trading on the Nasdaq.
More details about the Google Chrome OS can be found at http://www.google.com/chromeos/

Monday, December 6, 2010

Facebook's new Face


Facebook on Sunday unveiled new profile pages that give photos centerstage, allow users to highlight important friends and go into far more detail on their jobs.
Previous changes on the world's largest social networking site have sometimes resulted in criticism on how the company handles privacy issues, generating occasional backlashes against Facebook. The revamp comes amid ongoing speculation about when Facebook will launch an initial public offering.
In a blog post, Facebook software engineer Josh Wiseman said the overhaul would make it "easier for you to tell your story and learn about your friends."
Users with the new profile get a strip of photos at the top of their profile pages. Under the old system, users keep photos under a separate tab.
Bigger photos accompany lists of interests, such as favorite television shows and sports teams, helping them pop out from the screen.
Users can also list their friends by relationship, grouping family members together and highlighting their best friends.
The changes make it easier for Facebook users to integrate details about their work lives into their pages, a shift for a service used largely for social activities.
There is much more room for job information such as specific projects a user has worked on. The move highlights Facebook's potential to compete with LinkedIn, a career-networking Web site with 85 million members. It too is considered a strong IPO candidate.
Wiseman said Facebook would gradually roll out the redesign over the next year, giving users the option to switch to it immediately if they like.
Facebook co-founder Mark Zuckerberg was set to discuss the changes on CBS's "60 Minutes" on Sunday night.

Saturday, December 4, 2010

UK developing cyber weaponry


Britain is devoting more energy to understanding and developing "weaponry" for cyber warfare than any other military area, armed forces chief General David Richards said on Monday.
"It's very genuinely a huge priority for us," Richards said.
"Along with like-minded nations in NATO for example, we are more actively expanding our understanding and weaponry in this area than in any other area," he told an audience during questions that followed his first public speech since taking over as Britain's Chief of the Defence Staff.
Britain announced last month it would spend an extra 650 million pounds ($ 1 billion) on cyber security after a new National Security Strategy highlighted the area as one of the top threats the country faced.
The issue came to the prominence in September when security experts suggested that the Stuxnet computer worm that attacks a widely used industrial system could have been created by a state to attack nuclear facilities in Iran.
Last month the head of Britain's communications spy agency also warned that countries were already using cyber techniques to attack each other.
"I often say to people, even today you might take out a country's infrastructure by bombing the hell out of it. Within no time at all you'll do it through cyber attack," Richards said. "It's a huge area of risk."
Richards also said that NATO's timetable for handing over responsibility for security in Afghanistan to Afghan forces in 2014 and ending combat operations by the following year was "very achievable".
"This has not been plucked from thin air," he said, adding that Mullah Mohammad Omar, the leader of the Afghan Taliban, did not like the message that the withdrawal would not be sooner.
"Four years, given the punishment that they are receiving and the very steady growth in the ANSF (Afghan National Security Force), is not something they are obviously very happy about," he said. "We can be cautiously optimistic about hitting that timeline."

CBI website hacked


The Central Bureau of Investigation (CBI) on Saturday registered a case against unknown persons for hacking and defacement of its official website by people who identified themselves as "Pakistani Cyber Army".
The CBI registered the case under various sections of the Information Technology Act and said efforts were underway to restore the website for public interface at the earliest, an official spokesperson said in New Delhi.
In a brief statement, the spokesperson said, "It has come to the notice of the CBI that its official website was illegally accessed and defaced in the intervening night of December 3 and 4. A case has been registered in this connection in the cyber crime cell of the CBI and efforts are underway to restore the website with the help of National Informatics Centre and the CBI cyber security experts."
The home page of the CBI website was hacked and it had a message from the 'Pakistani Cyber Army' warning the 'Indian Cyber Army' that their websites should not be attacked.
The message from the hackers also spoke about the filtering controls provided by the NIC, a body which mans computer servers across the country.
Intelligence agencies have been warning the government that proper cyber security was not being ensured in offices and that no security audit was being carried out.
The 'Pakistani Cyber Army' also threatened to carry out "mass defacement" of other websites.

Friday, December 3, 2010

yummybay: yummybay fans



what is yummybay.com?
  • Yummybay.com is Kerala's first online food ordering portal.
  • You can order or book anything from tables, cakes, caterers, resorts and even gift food.
  • Food lovers can view detailed menu with price of the different resturants and also view offers and promotions that the restaurants provide and also custom promotions by Yummybay.
  • They can also view delivery areas of the restaurant of their choice.
  • Finally they can place orders for thier favourite dishes.
How to order food from yummybay?
  • search for a local takeaway or delivery giving resturant.
  • choose your favorite food from the menu.
  • sign up(free...lol)
  • confirm delivery address and place order.
what's unique in yummybay?
yummybay is the first online food ordering portal in India to have payment integration, accepting all cards including international cards.

"I m hungry...what wil i do....??"
"vishakunnu....enth cheayam..??"
"passikkudh....ennaa seyyum..?"
"bhook lag raha hai...kya karu..?"

don't worry my dear Indians...just log on to www.yummybay.com and order ur favourite dish.

enjoy food....keep ordering..visit www.cyborgs.tk


Companies beware: The next big leak could be yours

WikiLeaks' release of secret government communications is a warning to the world's biggest companies: You may be next.

Computer experts have warned for years about the threat posed by disgruntled insiders and by poorly crafted security policies, which give too much access to confidential data. And there is nothing about WikiLeaks' release of U.S. diplomatic documents to suggest that the group can't or won't use the same methods to reveal the secrets of powerful corporations.

And as WikiLeaks claims it has incriminating documents from a major U.S. bank, possibly Bank of America, there's new urgency to addressing information security inside corporations and a reminder of its limits when confronted with a determined insider.

At risk are e-mails, documents, databases and internal websites that companies think are locked to the outside world. Companies create records of every decision they make, whether it's rolling out new products, pursuing acquisitions, fighting legislation, foiling rivals or allowing executives to sell stock.

Although it's easy technologically to limit who in a company sees specific types of information, many companies leave access settings far too open. And despite intentions, mistakes happen and settings can become inadvertently broad, especially as networks grow more complex with reorganizations and acquisitions.

And even when security technology is doing its job, it's a poor match if someone with legitimate access decides to go rogue.

All an insider needs to obtain and leak secrets are access and a cheap thumb drive. By contrast, outside attackers often have to hack into personal computers at the bottom of the food chain, then use their skills and guile in hopes of working their way up.

Employees go rogue all the time for ego, to expose hypocrisy, to exact revenge or simply for greed:

A former analyst with mortgage lender Countrywide Financial Corp., now owned by Bank of America, is awaiting trial on charges he downloaded data on potentially 2 million customers over two years, charging $500 for each batch of 20,000 profiles. Prosecutors say the analyst worked secretly on Sundays, using an unsecured Countrywide computer that allowed downloads to personal thumb drives. Other home loan companies bought the customer profiles, including Social Security numbers, for new sales leads, according to authorities.

An employee with Certegy Check Services Inc., a check authorization service, was accused of stealing information on more than 8 million people and selling it to telemarketers for a haul of $580,000. He was sentenced in 2008 to nearly five years in prison.

Despite the repeated warnings, many large companies lack clear policies on who should have access to certain data, said Christopher Glyer, a manager with the Mandiant Corp., an Alexandria, Va.-based security firm that investigates computer intrusions.

WikiLeaks argues that revealing details of companies and governments behaving badly, no matter how the information is obtained, is good for democracy.

Julian Assange, WikiLeaks' founder, told Forbes magazine that the number of leaks his site gets has been increasing "exponentially" as the site has gotten more publicity. He said it sometimes numbers in the thousands per day.

Assange told Forbes that half the unpublished material his organization has is about the private sector, including a "megaleak" involving a bank. He would not name the bank, but he said last year in an interview with Computerworld that he has several gigabytes of data from a Bank of America executive's hard drive. One gigabyte can hold nearly 700,000 pages of text.

Assange also told Forbes that Wikileaks has "lots" of information on BP PLC, the London-based oil company under fire for the massive Gulf of Mexico oil spill. Assange said his organization is trying to figure out if its information on BP is unique.

WikiLeaks published confidential documents from the Swiss bank Julius Baer and the Kaupthing Bank in Iceland. The site also published an operation manual for the U.S. prison in Guantanamo Bay, Cuba.

WikiLeaks' most recent leaks exposed frank and sometimes embarrassing communications from diplomats and world leaders. They included inflammatory assessments of their counterparts and international hot spots such as Iran and North Korea.

The prime suspect in the diplomatic leaks, Army Pfc. Bradley Manning, is being held in a maximum-security military brig at Quantico, Va., charged in connection with an earlier WikiLeaks release: video of a 2007 U.S. Apache helicopter attack in Baghdad that killed a Reuters news photographer and his driver.

Military investigators say Manning is a person of interest in the leak of nearly 77,000 Afghan war records WikiLeaks published online in July. Though Manning has not been charged in the latest release of internal U.S. government documents, WikiLeaks has hailed him as a hero.

Manning boasted to a hacker confidant that security was so flimsy he was able to bring a homemade music CD into work, delete its contents and fill it with secrets, according to a log of the exchange posted by Wired.com.

Experts said a key flaw in the military's security was that Manning may not have even had to look all that hard for the data, as it was apparently available for many people to see. The Defense Department says it has bolstered its computer security since the leaks.

Companies have many options technologically to protect themselves.

Alfred Huger, vice president of engineering for security firm Immunet Corp. in Palo Alto, said companies could simply configure their e-mail servers to restrict who certain people can send documents to.

Other measures include prohibiting certain people from copying and pasting from documents, blocking downloads to thumb drives and CD-ROMs, and deploying technologies that check if executives' e-mail messages are being checked too often a sign that an automated program is copying the contents.

But the more companies control information, the more difficult it is for employees to access documents they are authorized to view. That lowers productivity and increases costs in the form of the additional help from technicians.

"You run the risk of creating an environment that's so rigid that people can't do their jobs," Huger said. "You have to find that balance. Unfortunately, there's no panacea against it."

Nokia installs server in India; RIM may face pressure


Nokia today announced installation of a server in India to enable security agencies lawfully intercept its email and messenger services, a move which may force BlackBerry to follow suit.
Nokia India Vice President and MD D Shivakumar called on Home Secretary G K Pillai today and handed over the letter, saying the company has conformed with all requirements suggested by the law enforcement agencies.
The company, however, assured its customers that their privacy would be protected, even while fulfilling public responsibility and legal obligations.
"As a responsible corporate citizen, we follow all local laws and regulations that are required by the government authorities," it added.
Installing a server to intercept data sent and received through smart-phones was a key demand of security agencies, which feared that this service could be used terror elements.
"We made a commitment to install host servers in India by end of the year. It gives me immense pleasure to inform you that it has been installed. We have completed the software installation and internal testing and the messaging service is now live on our India based servers," Shivakumar said in the letter.
This comes amid concerns raised by the government over flow of data on smart phones, especially BlackBerry which offers services like BlackBerry-to-BlackBerry messaging and enterprise mail on the device.
Canada-based Research-in-Motion, makers of BlackBerry, had said it was an industry issue and should be dealt with all the players including Nokia and other service providers who offer Virtual Private Network (VPN) services.
RIM has been saying that the security architecture was the same around the world and RIM truly had no ability to provide the agencies its customers' encryption keys. Government has given Blackberry time till January 2011 to create lawful interception facilities with all operators offering the service.
With Nokia installing the servers in India, "the tool provides real time intercept of content. It also facilitates location of the mobile device generating emails," Shivakumar's letter to Pillai said.
According to the company, Nokia Messaging is a push mail service that aggregates current email accounts of the subscribers on their mobile phones. The service merely collates information available through the internet and directs it to the respective mobile devices.
Nokia servers include authentication server, email enterprise server, and configuration database servers. "This ensures that the authentication happens within India and the database will reside within India," Shivakumar said.

WikiLeaks' site back with Swiss name after cyber attacks


Whistleblower website WikiLeaks came back online with a Swiss name on Friday around six hours after its wikileaks.org domain name was shut down because it was suffering massive cyber attacks.

"WikiLeaks moves to Switzerland," the group declared on Twitter, although an Internet trace of the new domain name suggested that the site itself is still hosted in Sweden and in France.

Web users accessing the wikileaks.ch address are directed to a page under the URL http://213.251.145.96/ -- which gives them access to the former site, including a massive trove of leaked US diplomatic traffic.

A separate search via the whois.net tool indicated that the wikileaks.ch site name is owned by the Swiss Pirates Party, which campaigns for data privacy and Internet freedoms. It was not immediately available to comment.
WikiLeaks has come under repeated cyber attacks since it began on Sunday publishing more than 250,000 US diplomatic cables, many of them "secret", that the website is thought to have obtained from a disaffected US soldier.

The cyber attacks have come on top of broadsides from governments around the world after diplomats were left red-faced by the often unflattering revelations in the massive leak of US State Department cables.

US Secretary of State Hilary Clinton has described the leak as "an attack on the world" and on Thursday expressed her regret to Argentine President Cristina Kirchner and Pakistani President Asif Ali Zardari over their content.

The original wikileaks.org domain was taken offline at 0300 GMT Friday by its American domain name system provider, EveryDNS.net, following reports of massive attacks on the site.

"The interference at issue arises from the fact that wikileaks.org has become the target of multiple distributed denial of service (DDOS) attacks," EveryDNS.net said in a statement.

Classic DDoS attacks occur when legions of "zombie" computers, normally machines infected with viruses, are commanded to simultaneously visit a website, overwhelming servers or knocking them offline completely.

The latest technological setback for the whistleblower site came after Amazon booted it from its computer servers on Wednesday following pressure from US politicians, prompting the site to move to a French server.

"Free speech the land of the free -- fine our dollars are now spent to employ people in Europe," WikiLeaks said. "If Amazon are so uncomfortable with the First Amendment, they should get out of the business of selling books."

WikiLeaks founder Julian Assange said last month that he was considering requesting asylum in Switzerland and basing the whistleblowing website in the fiercely neutral Alpine country.

"That is a real possibility," Assange said when asked whether he and the website might relocate, adding that Switzerland, and perhaps Iceland, were the only Western countries that his outfit feels safe in.

Assange told TSR television that Wikileaks was examining the possibility of creating a foundation that would allow it to operate out of Switzerland, and confirmed that he might apply for asylum.

The 39-year-old Australian is believed to be currently in Britain, and British police have been informed of his whereabouts as he is subject to an arrest warrant over rape allegations in Sweden, his lawyer said Thursday.

A WikiLeaks spokesman has said that Assange had to remain out of the public eye because he had faced assassination threats.

Swedish police said they would issue a new international warrant for Assange on suspicion of "rape, sexual molestation and unlawful coercion" to replace one that could not be applied because of a procedural error.

The announcement came after Sweden's supreme court refused to hear an appeal by Assange against the warrant which relates to events in Sweden in August. Assange denies the charges.

WikiLeaks' site back with Swiss name after cyber attacks


Whistleblower website WikiLeaks came back online with a Swiss name on Friday around six hours after its wikileaks.org domain name was shut down because it was suffering massive cyber attacks.

"WikiLeaks moves to Switzerland," the group declared on Twitter, although an Internet trace of the new domain name suggested that the site itself is still hosted in Sweden and in France.

Web users accessing the wikileaks.ch address are directed to a page under the URL http://213.251.145.96/ -- which gives them access to the former site, including a massive trove of leaked US diplomatic traffic.

A separate search via the whois.net tool indicated that the wikileaks.ch site name is owned by the Swiss Pirates Party, which campaigns for data privacy and Internet freedoms. It was not immediately available to comment.
WikiLeaks has come under repeated cyber attacks since it began on Sunday publishing more than 250,000 US diplomatic cables, many of them "secret", that the website is thought to have obtained from a disaffected US soldier.

The cyber attacks have come on top of broadsides from governments around the world after diplomats were left red-faced by the often unflattering revelations in the massive leak of US State Department cables.

US Secretary of State Hilary Clinton has described the leak as "an attack on the world" and on Thursday expressed her regret to Argentine President Cristina Kirchner and Pakistani President Asif Ali Zardari over their content.

The original wikileaks.org domain was taken offline at 0300 GMT Friday by its American domain name system provider, EveryDNS.net, following reports of massive attacks on the site.

"The interference at issue arises from the fact that wikileaks.org has become the target of multiple distributed denial of service (DDOS) attacks," EveryDNS.net said in a statement.

Classic DDoS attacks occur when legions of "zombie" computers, normally machines infected with viruses, are commanded to simultaneously visit a website, overwhelming servers or knocking them offline completely.

The latest technological setback for the whistleblower site came after Amazon booted it from its computer servers on Wednesday following pressure from US politicians, prompting the site to move to a French server.

"Free speech the land of the free -- fine our dollars are now spent to employ people in Europe," WikiLeaks said. "If Amazon are so uncomfortable with the First Amendment, they should get out of the business of selling books."

WikiLeaks founder Julian Assange said last month that he was considering requesting asylum in Switzerland and basing the whistleblowing website in the fiercely neutral Alpine country.

"That is a real possibility," Assange said when asked whether he and the website might relocate, adding that Switzerland, and perhaps Iceland, were the only Western countries that his outfit feels safe in.

Assange told TSR television that Wikileaks was examining the possibility of creating a foundation that would allow it to operate out of Switzerland, and confirmed that he might apply for asylum.

The 39-year-old Australian is believed to be currently in Britain, and British police have been informed of his whereabouts as he is subject to an arrest warrant over rape allegations in Sweden, his lawyer said Thursday.

A WikiLeaks spokesman has said that Assange had to remain out of the public eye because he had faced assassination threats.

Swedish police said they would issue a new international warrant for Assange on suspicion of "rape, sexual molestation and unlawful coercion" to replace one that could not be applied because of a procedural error.

The announcement came after Sweden's supreme court refused to hear an appeal by Assange against the warrant which relates to events in Sweden in August. Assange denies the charges.

Thursday, December 2, 2010

Japan pitches mind-blowing high-tech 3D World Cup


Japan promised a high tech marvel in its final pitch to host the 2022 World Cup on Wednesday by paving 400 stadiums around the world with 3D flat screens to show life size matches thousands of miles away.

"I have to admit that the idea of this blows my mind away," admitted Japan 2022 bid committee chief executive Kohzo Tashima.

"Three hundred and sixty million people could have a full stadium experience of matches; that's over 100 times the number of spectators at the 1994 World Cup in the United States," he told FIFA's executive committee.

Backed by Sony chairman Howard Stringer, Japanese officials mirrored the promise of an electronics revolution for the next generation that would eliminate language problems in Japan by providing tiny real-time interpretation machines and constant connection to palm sized screens.

But the highlight of the presentation a day before the grandees of world footballs' governing body -- some of whom are in their 80s -- choose the hosts, was the idea of paving whole pitches including Wembley or the legendary Maracana stadium with flat screens.

They would project real-time hologram-like three dimensional images of the game in life size and real time to crowds around the world.

"Our nation's bid is not about one nation hosting the games or two nations, but 208 regions and FIFA nations hosting the game together," said Junji Ogura, chairman of the Japanese bid and a member of FIFA's executive committee.

"Create a World Cup for the next generation to bring 208 smiles to the world," he urged his fellow footballing offocials.

Although the idea seemed far fetched, Stringer insisted it was as realistic as the steps taken when the Walkman portable music player, home video cameras, or PlayStation were launched

"The truth is the world is changing faster than any of us can understand," the Sony chief explained.

"I can tell you that this is not science fiction, in 2022 this will be science fact," Stringer insisted, dressed in a Japan football jersey.

Japanese sports minister Kan Suzuki said the government was ready to give "absolute guarantees" not only for the political and financial pledges, but also the technological promise.

Ogura said: "The challenge for FIFA, for football, is to identify the next big idea."

Japan is vying with more traditional bids from Australia, the United States, Qatar, and South Korea to host the 2022 tournament.

Verizon launching 4G wireless network


US telecom titan Verizon will launch a new generation wireless network on Sunday that delivers data as much as 10 times faster than 3G technology currently used by smartphones.

The "4G LTE" network debuting in 38 major metropolitan areas and at more than 60 airports will be aimed at business "road warriors" who want super speedy connections for laptop computers, according to Verizon.

"This next-generation network will provide speeds significantly faster than existing wireless networks," Verizon spokeswoman Debra Lewis told AFP.

"Downloading a video that takes 10 minutes now will take one minute on a 4G network."

Verizon worked with South Korean electronics firms LG and Pantech to design USB modems people can plug into laptop computers to connect to the LTE network.

The devices will be priced at 150 dollars each, with 50-dollar rebates available if people sign two-year service contracts with Verizon.

Data plan options will be to pay 50 dollars per month for a five-gigabyte allowance of data monthly or 80 dollars each month for 10 gigabytes of data, with users paying 10 dollars per gigabyte for overages.

The modems switch to 3G coverage in places where the LTE network isn't available, according to Verizon.

"Our 4G LTE launch gives customers access to the fastest and most advanced mobile network in America and immediately reaches more than one-third of all Americans right where they live," said Verizon chief executive Dan Mead.

"That's just the start. We will quickly expand 4G LTE, and by 2013 will reach the existing Verizon Wireless 3G coverage area."

Verizon expected smartphones synched to the 4G, short for "fourth generation," network to be available by the middle of next year.