Saturday, December 12, 2009

U.S. and Russia Open Talks on Limits to War in Cyberspace

~~ About time !!
Actual Cyber Warfare would have serious consequences ~~

December 13, 2009

U.S. and Russia Open Talks on Limits to War in Cyberspace

The United States has begun talks with Russia and a United Nations arms control committee about strengthening Internet security and limiting military use of cyberspace.

American and Russian officials have different interpretations of the talks so far, but the mere fact that the United States is participating represents a significant policy shift after years of rejecting Russia’s overtures. Officials familiar with the talks said the Obama administration realized that more nations were developing cyberweapons and that a new approach was needed to blunt an international arms race.

In the last two years, Internet-based attacks on government and corporate computer systems have multiplied to thousands a day. Hackers, usually never identified, have compromised Pentagon computers, stolen industrial secrets and temporarily jammed government and corporate Web sites. President Obama ordered a review of the nation’s Internet security in February and is preparing to name an official to coordinate national policy.

Thursday, September 10, 2009

",,,,,in South Africa it seems the web is still no faster than a humble pigeon."

~~ I would label this Retro-TechnoPolitical. :) ~~~

BBC NEWS10 Sep 09 10:03 11:03 UK

South Africa pigeon 'faster than broadband' !!

Broadband promised to unite the world with super-fast data delivery - but in South Africa it seems the web is still no faster than a humble pigeon.

A Durban IT company pitted an 11-month-old bird armed with a 4GB memory stick against the ADSL service from the country's biggest web firm, Telkom.

Winston the pigeon took two hours to carry the data 60 miles - in the same time the ADSL had sent 4% of the data.

Telkom said it was not responsible for the firm's slow internet speeds.

The idea for the race came when a member of staff at Unlimited IT complained about the speed of data transmission on ADSL.

He said it would be faster by carrier pigeon.

"We renown ourselves on being innovative, so we decided to test that statement," Unlimited's Kevin Rolfe told the Beeld newspaper, 'No cats allowed,"


Friday, July 31, 2009

Cyber attack seen as emerging threat for London 2012

~~ Cyber Wars are now a daily fact. Every single gov't , biz , org., or person must be continually on guard for cyber attack. We tend to forget how much of our national security , industrial base and electrical/energy grid, is all very venerable to gifted hackers of ill intent.
Cyber Security is among the foremost issues of our times. Good Jobs there for gifted computer geeks for millennium to come!
If I was in high school or college and looking for a good economically safe career,
Cyber Security Network Admin seems a good bet. ~~~~

Cyber attack seen as emerging threat for London 2012
Tue Jul 21, 2009 3:53pm BST
By Avril Ormsby

LONDON (Reuters) - Olympic organisers are "very alive" to the threat of a cyber attack on the London 2012 Olympics, made more challenging because of its evolving nature, senior Home Office officials said on Tuesday.

Ticketing systems, the transport network and hotel bookings as well as security are among potential targets.

Olympic security officials are also planning for the possible diversion of aircraft to protect airspace around the venues from terrorist attacks, the officials said.

The greatest threat to security at the Games is international terrorism, the government's latest "Safety and Security Strategy" report said.

"There's no current evidence of a terrorist threat to 2012," one of the Home Office officials said.

"But if you look at precedents for sporting events, and to some degree about Olympic events, it would not be beyond the point of imagination to imagine a terrorist threat to 2012 nearer the time."

Tuesday, July 7, 2009

A Database for Everything

I think this a good , even great thing. OK , as pointed out below it may create a sea of data so large it will be hard to navigate,, but as also pointed out , there are tech firms already looking to solve that issue-- which is a little economic boost right there. ~~ technopolitical

A Database For Everything
By Erika Lovley |

6/24/09 @ 5:06 AM EST

The government has answers. Lots of answers. Wondering which airline is the most stingy with passenger snacks? No problem. Want to know how many people were injured by vending machines last year? Got that, too.

Agencies and departments already boast countless registries and databases of seemingly bizarre, seemingly useless information, but lawmakers continue to call by the day for the creation of new databases.

Since January, Congress has introduced bills that call for the creation of nearly 40 new databases and registries, by POLITICO’s count.

Monday, June 15, 2009

TechnoPolitics and Elections in the Middle East.

~~ The NYT's Thomas Friedman today puts forth that there is a real TechnoPolitical change going on in the Middle Eastern Body Politic. Internet and Cell Texting are fueling the pro-western the reform movements there.~~ posted from blackberry by technopolitical~~


Published: June 14, 2009

"Twenty years ago, I wrote a book about the Middle East, and recently I was thinking of updating it with a new introduction. It was going to be very simple - just one page, indeed just one line: "Nothing has changed."
".....something is going on in the Middle East today that is very new. Pull up a chair; this is going to be interesting."

" What we saw in the Lebanese elections,........., and what we saw in the provincial elections in Iraq, the product of four historical forces that have come together to crack open this ossified region".

**"First is the diffusion of technology. The Internet, blogs, YouTube and text messaging via cellphones, particularly among the young - 70 percent of Iranians are under 30 - is giving Middle Easterners cheap tools to communicate horizontally, to mobilize politically and to criticize their leaders acerbically, outside of state control. It is also enabling them to monitor vote-rigging by posting observers with cellphone cameras. I knew something had changed when I sat down for coffee on Hamra Street in Beirut last week with my 80-year-old friend and mentor, Kemal Salibi, one of Lebanon's greatest historians, and he told me about his Facebook group!"***

Sunday, June 14, 2009

"CYBERWAR Privacy May Be a Victim in Cyberdefense Plan"

~ We are at war.

A Government run Cyber Defense is needed.

The internet is a public forum that I choose to enter.

Am I willing to surrender some my cyber rights to enter cyberspace -- to surrender my internet privacy in the name of American national self defense?

I know for me I already personally-- but not politically-- censor myself online. Unlike others who really do completely open their life to the internet, I post almost nothing about my private life , or at least nothing shocking.

Nor do I visit any websites that I would want to later deny doing so.

For me there would be very little if any real impact on my personal internet use, in light of the proposed American Government measures of Cyber Defense.

I already guard my privacy online and do not visit sites of illicit or illegal activity.

Ido also do google myself often to find out what others could learn about me with a quick internet search. (With a little work one can mostly control their online presence.)

Now, I am still very much a civil libertarian when it comes to both private and mutually consenting personal interactions. I fully believe that the government has no right to regulate or monitor our private lives.

But again , I CHOOSE to go onto the Internet, with the understanding that it may be monitored and my online actions and interactions might be recorded by some government snoop, a snoop whose job it is to look for threats of violence against man or machine. But it is not his charge to monitor normal free speech, association, and/or political organizing. Those activities are fully protected rights in the USA.

My life online is not that exciting. And again purposely so. Privacy must be guarded by ones self, as only you can protect your own privacy. So I am careful what I post and write about myself on my various blogs.

When you drive the roads in your car there are traffic cops. On the internet too there does need to be a cyberpolice and I am willing to accept Government monitoring of the Internert in the name of Cyber National Security, as I for one do not see how it would change my techno cyber political behaviors in any way.

The First amendment of the US Constitution fully protects all my cyber activities. I have full free speech and free press rights here at TechnoPolitical. I post what I think and believe very freely and without constraint.

If I want or need Privacy I can turn the Computer Off.

We are at war. There are lunatics of all stripes out there who use the internet as a tool to further violence and terrorism. There has to be Government Cyber Security in the USA. The stakes are just too high.

Now below this post, there is another recent post about China's cyber crackdown attempt.

This is a different situation than the USA's, as China is working to suppress nonviolent speech and civil dissent. For there is no right to free speech and free association in China and the Chinese Government is quite totalitarian in its Electronic-Governance of Cyber Space.

The USA however is not looking suppress nonviolent speech and association, but to protect its citizens from Terrorism both domestic and foreign. Big difference.
Posted from blackberry by technopolitical via AT&T.~~

"CYBERWAR Privacy May Be a Victim in Cyberdefense Plan"


Published: June 13, 2009

"WASHINGTON - A plan to create a new Pentagon cybercommand is raising significant privacy and diplomatic concerns, as the Obama administration moves ahead on efforts to protect the nation from cyberattack and to prepare for possible offensive operations against adversaries' computer networks.

President Obama has said that the new cyberdefense strategy he unveiled last month will provide protections for personal privacy and civil liberties.

But senior Pentagon and military officials say that Mr. Obama's assurances may be challenging to guarantee in practice, particularly in trying to monitor the thousands of daily attacks on security systems in the United States that have set off a race to develop better cyberweapons."

Wednesday, June 10, 2009

"China Requires Censorship Software on New PCs"

~~ China here using their powers of E-Governance to censor the Internet and spy on all cyber activities.

Don't ever think "It Can't Happen Here" in the USA.
Not as long Dick Cheney types are around~~ Posted by technopolitical via BlackBerry by AT&T~~

"China Requires Censorship Software on New PCs"


Published: June 09, 2009 BEIJING -

China has issued a sweeping directive requiring all personal computers sold in the country to include sophisticated software that can filter out pornography and other "unhealthy information" from the Internet. The software, which manufacturers must install on all new PCs starting July 1, would allow the government to regularly update computers with an ever-changing list of banned Web sites.

The rules, issued last month, ratchet up Internet restrictions that are already among the most stringent in the world. China regularly blocks Web sites that discuss the Dalai Lama, the 1989 crackdown on Tiananmen Square protesters, and the Falun Gong, the banned spiritual movement.

But free-speech advocates say they fear the new software could make it even more difficult for China's 300 million Internet users to obtain uncensored news and information.

"This is a very bad thing," said Charles Mok, chairman of the Hong Kong chapter of the Internet Society, an international advisory group on Internet standards.

"It's like downloading spyware onto your computer, but the government is the spy."

Sunday, May 31, 2009

"On Streets and on Facebook, Homeless Stay Wired"

~~Digital Technology has now even become part of the homeless lifestyle. The internet is such a useful tool that it can actually ease the burden of social isolation that is part of being homeless.

Remember : Technological Advances are meant to improve the quality of all people's lives ; housed or houseless.~~ posted from Blackberry by technopolitical~~

"On Streets and on Facebook, Homeless Stay Wired"

May 31, 2009
9:43 AM

Like most San Franciscans, Charles Pitts is wired. Mr. Pitts, who is 37 years old, has accounts on Facebook, MySpace and Twitter. He runs an Internet forum on Yahoo, reads news online and keeps in touch with friends via email. The tough part is managing this digital lifestyle from his residence under a highway bridge. "You don't need a TV. You don't need a radio. You don't even need a newspaper," says Mr. Pitts, an aspiring poet in a purple cap and yellow fleece jacket, who says he has been homeless for two years. "But you need the Internet.¤tPage=0

Sent via BlackBerry by AT&T

Saturday, May 30, 2009

The Government's Urgent Push into CyberWarfare.

~~ The sport of CyberWarfare is now becoming part of our economic recovery and the reorganization of the American commerce system. ~~ technopolitical ~~

"CYBERWAR: Contractors Vie for Plum Work, Hacking for the United States."


May 31, 2009

MELBOURNE, Fla. - The government's urgent push into cyberwarfare has set off a rush among the biggest military companies for billions of dollars in new defense contracts.

The exotic nature of the work, coupled with the deep recession, is enabling the companies to attract top young talent that once would have gone to Silicon Valley. And the race to develop weapons that defend against, or initiate, computer attacks has given rise to thousands of "hacker soldiers" within the Pentagon who can blend the new capabilities into the nation's war planning.Nearly all of the largest military companies - including Northrop Grumman, General Dynamics, Lockheed Martin and Raytheon - have major cyber contracts with the military and intelligence agencies.;jsessionid=890810930FD395399FFDF08898666AEB.w5?a=3702

Sent via BlackBerry by AT&T

"Obama Announces Strategy Against Cyberattacks"

"Obama Announces Strategy Against Cyberattacks"


New York Times

Published: May 30, 2009

WASHINGTON - President Obama declared Friday that the country's disparate efforts to "deter, prevent, detect and defend" against cyberattacks would now be run out of the White House, but he also promised that he would bar the federal government from regular monitoring of "private-sector networks" and the Internet traffic that has become the backbone of American communications.

Mr. Obama's speech, which was accompanied by the release of a long-awaited new government strategy, was an effort to balance the United States' response to a rising security threat with concerns - echoing back to the debates on wiretapping without warrants in the Bush years - that the government would be regularly dipping into Internet traffic that knew no national boundaries.

"Obama's new cyber czar may create turf war"

~~ Truly Cyber Politics. Who will "run" the internet is no easy question. For the average Netizen it really does not directly affect our emailing and blogging.

But in the world of Cyber Warfare, Cyber Crime and etc, who actually is in "control" of the Internet is serious political drama- with real world consequences.~~

~posted from blackbery by technopolitcal ~~


By Lolita C. Baldor

Associated Press

WASHINGTON - The digital battlefield is proving to be difficult terrain for President Barack Obama.As he unveiled his plan Friday to make the nation's computer networks more secure, he fulfilled a campaign pledge to make cyber security a top priority.

But he fell short on another promise to create a cyber adviser "who will report directly to me."Ten months ago, candidate Obama told a Purdue University audience that he "will make cyber security the top priority that it should be in the 21st century."

He went on to pledge that he would coordinate efforts across government, implement a national policy, tighten standards to make information more secure, and bring together government, industry and academia "to determine the best ways to guard the infrastructure that supports our power.

On Friday, Obama took the first step toward making that far-reaching promise a reality.

But it remains unclear whether the structure he is creating will be capable and powerful enough to take on an enduring and monumental task.

Sent via BlackBerry by AT&T

Monday, May 25, 2009

Mobile.POLITICO:The A-list: The best email lists in politics

~Email has really taken off as a fund raising tool, I believe beyond anybody's realistic expectations. The stratospheric amounts that Obama 2008 raised using the internet will go down as a historic watershed.

And as we see below even though Hillary Clinton lost, her email list still lives and prospers~~

~~posted from blackberry by TechnoPolitical~~.

Clinton’s online mint isn’t even considered the best in its class. There are a handful of other lists, in both parties, that are thought to be either equal or even more potent.Using the criteria used by political pros to assess the value of these emails lists—size, freshness, comprehensiveness (does it include addresses, land lines, cell phone numbers or donation data?), open rates (what percentage of emails in a given send get opened), click-throughs (how many links are activated), actions and donations (how many emails result in a contribution or a letter to member of Congress) as well as intangibles like buzz and list managers’ skills—here is POLITICO’s ranking of the top five most potent email lists in politics

Monday, May 18, 2009

Major League Baseball awarded geolocation patent

~~ I am a big baseball fan ,
so i just could not resit posting this ,
even though it is more techno , than political --
but its BaseBall and that is all that really counts.
It is also really very interesting.~~`


Major League Baseball awarded geolocation patent

  • By Ben Klayman - Fri May 15, 2009 5:41PM EDT
CHICAGO (Reuters) -

Major League Baseball has won a patent for technology that blocked certain fans from viewing local games online, and it may open the door for the U.S. sports league to profit by licensing it to media companies.

Baseball's advanced media business was awarded a U.S. patent last month for online geolocation technology, a system that uses two or more electronic methods (such as wireless and satellite) to pinpoint the geographic location of a subscriber, the sports league said in a statement late Thursday.

The sports league filed for the patent, its first, in 2004 as a way of excluding certain fans from watching its games streamed live online.

MLB wanted to block reception of games in a subscriber's local market as a way of protecting the hundreds of millions of dollars its 30 clubs receive in rights fees from such regional sports networks as the New York Yankees' YES or Boston Red Sox's NESN.

"This was a clear example where necessity really was the mother of invention," Bob Bowman, chief executive of baseball's advanced media arm, said Friday in a telephone interview.

Baseball now could approach any company using multiple geolocation technologies to determine a subscriber's location and ask for a licensing fee, analysts said. The other options would be for those companies to try to work around baseball's patent or challenge it in court.

Most Attacks Come from Legit but Hijacked Sites

~~~ The Internet is a very interesting place. Just be careful.~~~~

Most Attacks Come from Legit but Hijacked Sites

Web attacks are routinely hosted by actual sites infected and acting as zombies, security firm warns.

John E. Dunn,

Sunday, May 17, 2009 01:10 PM PDT

Artwork: Diego Aguirre
The number of legitimate Websites being hacked to host malware has hit startling highs in recent days, new figures from MessageLabs have revealed.

Data taken from the days between May 4 and 8 showed that 84.6 percent of Websites blocked by the company for hosting malicious content were 'well-established' domains that have been around for a year or more.

During the same period, 10.2 percent of blocked domains were less than a year old and only 3.1 percent were less than a week old.

At first glance this, this runs counter to the assumption that malicious Websites more commonly exist for only days or hours in some cases, the better to avoid detection and filtering. This is termed "fast-fluxing," cycling websites through a maze of bogus sub-domains.

However, according to MessageLabs, the likely explanation is that a move to genuine domains means that the fast-fluxing has now migrated to use a different part of the domain tree.

"The bad guys will compromise the DNS and add sub-domains," said MessageLabs' Paul Wood. The recent figure represented a high mark, admitted Wood, but still represented a gathering storm.

"People need to be extra vigilant and understand that even sites they know and trust can be compromised through attacks such as SQL injection attacks, while businesses need to ensure they take the necessary precautions to block all the latest malicious sites," said Wood.

"With the ever advancing world of cybercrime, nothing can be taken at face value."

Tuesday, May 12, 2009

CYBERWAR: Cadets Trade the Trenches for Firewalls

~~ Warfare in the TechnoPolitical Age ~~ 

CYBERWAR: Cadets Trade the Trenches for Firewalls

WEST POINT, N.Y. — The Army forces were under attack. Communications were down, and the chain of command was broken.

Pacing a makeshift bunker whose entrance was camouflaged with netting, the young man in battle fatigues barked at his comrades: “They are flooding the e-mail server. Block it. I’ll take the heat for it.”

These are the war games at West Point, at least last month, when a team of cadets spent four days struggling around the clock to establish a computer network and keep it operating while hackers from the National Security Agency in Maryland tried to infiltrate it with methods that an enemy might use. The N.S.A. made the cadets’ task more difficult by planting viruses on some of the equipment, just as real-world hackers have done on millions of computers around the world.


May 12, 2009

Tracking Cyberspies Through the Web Wilderness

For old-fashioned detectives, the problem was always acquiring information. For the cybersleuth, hunting evidence in the data tangle of the Internet, the problem is different.

“The holy grail is how can you distinguish between information which is garbage and information which is valuable?” said Rafal Rohozinski, aUniversity of Cambridge-trained social scientist involved in computer security issues.

First attempt to describe the 'electronic police state'

~~ Electronic -Governance of our lifes is now here .  Moreso outside the USA.  Non-Democracies know that a FREE and OPEN cyber-space  theatens them.  But i have faith that in the end Cyber-space will make the world a freer place. Maybe. ~~

The Electronic Police State

Posted by kdawson on Monday May 11, @11:54PM
from the watching-you dept.
gerddie writes"Cryptohippie has published what may be called a first attempt to describe the 'electronic police state' (PDF). Based on information available from different organizations such as Electronic Privacy Information Center, Reporters Without Borders, and Freedom House, countries were rated on 17 criteria with regard to how close they are already to an electronic police state. The rankings are for 2008. Not too surprisingly, one finds China, North Korea, Belarus, and Russia at the top of the list. But the next slots are occupied by the UK (England and Wales), the US, Singapore, Israel, France, and Germany."This is a good start, but it would be good to see details of their methodology. They do provide theraw data (in XLS format), but no indication of the weightings they apply to the elements of "electronic police state" behavior they are scoring.

Friday, May 8, 2009

UC Berkeley computers hacked, 160,000 at risk

~~ The Cyber Cat and Mouse wars  are with us daily. Really makes you wonder if cyber record keeping is secure at any level~~

UC Berkeley computers hacked, 160,000 at risk

May 8, 2009 1:53 PM PDT

This post was updated at 2:16 p.m. PDT with comment from an outside database security software vendor.

Hackers broke into the University of California at Berkeley's health services center computer and potentially stole the personal information of more than 160,000 students, alumni, and others, the university announced Friday.

At particular risk of identity theft are some 97,000 individuals whose Social Security numbers were accessed in the breach, but it's still unclear whether hackers were able to match up those SSNs with individual names, Shelton Waggener, UCB's chief technology officer, said in a press conference Friday afternoon.

Thursday, May 7, 2009

The rise of government 2.0

~~ The White House on "Facebook, MySpace and Twitter". 
 Pretty cool actually , and maybe politically important.
 President Obama likes to
 circumvent the old guard media and go strait to the people. 
 It may help for a President-People axis of power , that will get Congess to move on issues like health care.  
Let us hope so !! 

The rise of government 2.0
By Micah L. Sifry & Andrew Rasiej 

 5/7/09 @ 4:32 AM EST

Last Friday, the White House made a splash online by announcing the launch of its official presence on Facebook, MySpace and Twitter, the popular social networking hubs. In doing so, President Barack Obama’s new media team demonstrated its understanding of one of the most basic facts of online culture and communications: You have to go where people are, instead of expecting them to come to you — no matter how big your brand. 

“Technology has profoundly impacted how — and where — we all consume information and communicate with one another,” the White House blog noted in a post titled “WhiteHouse 2.0.” It added, “ is an important part of the administration’s effort to use the Internet to reach the public quickly and effectively — but it isn’t the only place.” 

Pentagon girds for cyber warfare

~~ These Cyber - Defense  issues are  daily news  in the "papers" now.    
Serious stuff .  ~~ 

Pentagon girds for cyber warfare

Attacks from well-funded nations, terror groups are biggest threats

By Lolita C. Baldor
updated 8:38 p.m. ET, Thurs., May 7, 2009

WASHINGTON - Cyber espionage and attacks from well-funded nations or terror groups are the biggest threats to the military's computer networks, a top officer said Thursday.

Air Force Gen. Kevin Chilton, who heads U.S. Strategic Command, said he worries that foes will learn to disable or distort battlefield communications. Chilton told reporters that even as the Pentagon improves its network defenses against hackers, he needs more people, training and resources to hone offensive cyber war capacity.

IP Enforcement Treaty Still Being Kept Secret

~~ Did anybody in the general public know this was being kept secret?

Even though it is now not
a secret that it is a secret,
as it is
posted all
over the Internet.

Just try making small talk in the elevator 
on this--- actually quite important , but boring --- topic.

---- z n o o z e ~~ y a w n ~~

Posted by timothy on Wednesday May 06, @06:00PM
from the in-the-spirit-of-openness- dept.
Hugh Pickens writes "More than a thousand pages of material about Anti-Counterfeiting Trade Agreement (ACTA), are still being withheld, despite the Obama administration's promises to run a more open government.

The EFF and Public Knowledge filed suit in September of 2008, demanding that background documents on ACTA be disclosed under the Freedom of Information Act (FOIA). "We are very disappointed with the USTR's decision to continue to withhold these documents The president promised an open and transparent administration," said EFF Senior Counsel David Sobel.

Publicly available information about the treaty shows it could establish far-reaching customs regulations over Internet traffic in the guise of anti-counterfeiting measures. Additionally, multi-national IP industry companies have publicly requested that ISPs be required to engage in filtering of their customers' Internet communications for potentially copyright-infringing material, force mandatory disclosure of personal information about alleged copyright infringers, and adopt 'Three Strikes' policies requiring ISPs to automatically terminate customers' Internet access upon a repeat allegation of copyright infringement.

'What we've seen tends to confirm that the substance of ACTA remains a grave concern,' said Public Knowledge Staff Attorney Sherwin Siy. '

The agreement increasingly looks like an attempt by Hollywood and the content industries to perform an end-run around national legislatures and public international forums to advance an aggressive, radical change in the way that copyright and trademark laws are enforced.'"

"All trademarks and copyrights on this 
page/post [from Slash-Dot] are owned by their respective owners. 
Comments are owned by the Poster. "
The Rest © 1997-2009 SourceForge, Inc."   

Schwarzenegger Urges a Study on Legalizing Marijuana Use

~~ Why is this TechnoPolitical ?
Because Hemp -- whether Industrial 
or Medicinal or Recreational--
is a modern natural solution to
many economic woes ,
and as well,  
to  many costly health problems .

To have a natural un-adulterated
plant ILLEGAL is insane.

Part of technological maturity 
is unterstanding how to
best use what nature 
gives us for free.

Hemp is woven 
into human history. 
{ Pun intented }
Hemp is the strongest natural
 fiber there is.

The USA legalized 
& utilized HEMP
in "World War Two" with
"Hemp for victory"
as it was the 
cheapest and best fiber
for many military uses during WWII.

Also , ever wonder where the name
"Hempstead" came from ?
 now have
 a POTUS who has smoked pot , and inhaled-- and liked it.
It is time to legalize, tax , 
and educate everyone 
-- young and old-- 
honestly all about  
the Great Weed.

The TERMINATOR is correct here.
This issue needs public debate !


Schwarzenegger Urges a Study on Legalizing Marijuana Use

Published: May 6, 2009

LOS ANGELESGov. Arnold Schwarzenegger said Tuesday that the discussion over whether to legalize and tax marijuana for recreational use in California would benefit from a large-scale study, including international case comparisons, to show the possible impact of such a change.


Wednesday, May 6, 2009

Zombie computers 'on the rise'

~~ Don't let you computer become a ZOMBIE !!!!
Use care online, update your anti-virus and spam-ware regularly.
Do not visit stupid websites that load these viruses. ~~~~

Zombie computers 'on the rise'
By Maggie Shiels
Technology Reporter, BBC News, Silicon Valley
Page last updated at 09:03 GMT, Wednesday, 6 May 2009 10:03 UK

Twelve million computers have been hijacked by cyber-criminals and detected by security vendor McAfree since January, the firm has said.

It reports there has been a 50% increase in the number of detected so-called "zombie" computers since 2008.

The true number of newly-hijacked PCs is likely to be higher than those detected by McAfee alone.

The figures come as a report from Deloitte said a global approach to cyber-security is needed.

"Doing nothing is not an option," said Deloitte's Greg Pellegrino.

How does the data get stolen from my computer?

~~ TWO Nice articles over at CNET today.
One for those of you
who want to understand how online rip-offs happen.
( Beside the crazy over-charges from our ISPs
for hi-speed bandwidth we never really get.)

And another for those of you who still use P2P file share programs.
Which I really do not any more. Simply too many virus bugs in cyberspace, and too much data on my computer that I value.

FAQ: Demystifying ID fraud
How does the data get stolen from my computer?
There are many ways sensitive data can be pried out of computer users. In a typical social-engineering phishing attack, a consumer opens an e-mail that looks like it was sent by the consumer's bank, Amazon, PayPal, or some other trusted source. With a bogus excuse, such as suggesting there was a security incident and the user needs to verify his or her account details, the e-mail will prompt the recipient to provide username and password via a link to a Web site that looks legitimate but isn't. The consumer enters the information and continues on, not knowing that the data is now being sent to criminals.

P2P bill could regulate Web browsers, FTP clients

May 5, 2009 4:30 AM PDT

news analysis The U.S. House of Representatives has scheduled a hearing Tuesday to examine a bill that would force peer-to-peer applications to provide specific notice to consumers that their files might be shared.

Math buffs awed by Odd Day

SAN FRANCISCO – Prepare to be awed by Odd Day.

For the mathematically challenged, Thursday's date, 5/7/09, is one of only six this century that will feature three consecutive odd numbers.

Numbers lovers say the rare occurrence is an excuse to celebrate.

"The previous stretch of six dates like this started with 1/3/1905 — 13 months after the Wright Brothers' flight," said Ron Gordon, the Redwood City teacher who enthusiastically promotes these numerical holidays, like Square Root Day on 3/3/09.

Gordon is offering a prize of $579 to those who celebrate the date with the most zeal or who get the most people involved in an Odd Celebration.


On the Net:

Odd Day:

Tuesday, May 5, 2009

EU calls on Obama to give up Internet oversight

~~ With the issues of Cyber Security at the forefront now
, do not count on the USA giving in so easily here ~~

EU calls on Obama to give up Internet oversight

Major decisions on Internet made solely by a California-based nonprofit

updated 10:43 a.m. ET, Mon., May 4, 2009

BRUSSELS - A senior European Union official called on President Barack Obama to give up United States' oversight of the Internet.

Major decisions on how the Internet is run are made solely by the California-based nonprofit Internet Corporation for Assigned Names and Numbers — which is overseen by the U.S. Commerce Department under an agreement that expires September 30.