Search This Blog

Wednesday, February 3, 2010


1) The desecration, murder and persecution must end.

The War Against the Infidels

2) Google vs. China: The Tip of the Cyberwar:


"So much worse things can happen," Sandhu says. A program designed to disrupt a financial institution or government department can sit undetected and dormant within a network for a decade. Then, when a conflict or war breaks out, the virus is triggered, disrupting communications and destroying an organization's infrastructure.
"We may call it espionage, but it's really warfare," Paller says. "They're planting logic bombs." He says much of what is being discussed now in classified national security briefings revolves around these sorts of stealth attacks. He declined to answer questions as to whether such secret programs had been detected in any major governmental or infrastructure networks, but he emphasized that a major vulnerability is the nation's power grid.

How to Win the Cyberwar
Taking counter measures against such cyber attacks is problematic. Microsoft issued an emergency patch for its Internet Explorer browser this week that it said addressed a vulnerability exploited in the Google hack. The previous week, Google beefed up its own Gmail security by automatically encrypting its e-mail sessions. The Electronic Frontier Foundation said the move was a "significant step to safeguard user's privacy and security."
But scientists, security experts, and researchers say this is no longer enough.

3) Charges Withdrawn in Military Commissions for Sept. 11 Suspects:


The Obama administration decided in November to remove the five suspects -- including self-professed 9/11 mastermind Khalid Sheikh Mohammed -- from a military trial after $100 million was spent on their prosecution and on the construction of a state-of-the-art courthouse at Guantanamo Bay built specifically to facilitate their military commissions.

4) U.N. Climate Change Expert Cites More Errors in Report:

5) Is an Electoral Bloodbath Coming?

No comments:

Post a Comment