U-2, Before The Band

The U-2 is nicknamed the Dragon Lady for good reason. You never knew what to expect when you took it into the air, no matter how seasoned a pilot you were. This was an unfortunate consequence of its design. The trade-off of a plane built light enough to fly above 70,000 feet is that it is almost impossible to control. And 13 miles above the ground, the atmosphere is so thin that the “envelope” between stalling and “overspeed” — going so fast you lose control of the plane, resulting in an unrecoverable nose dive — is razor-thin, making minor disruptions, even turbulence, as deadly as a missile. The challenge is even greater near the ground, since to save weight, the plane doesn’t have normal landing gear.

Other risks were less benign, as I found when I was the ground officer for a pilot who radioed, “My skin feels like it’s crawling.” He had the bends so badly from changes in pressure that when he landed his body was covered with huge welts. Had the weather not cleared in time for him to land, these bubbles of nitrogen might have lodged in his brain or optical nerve — as they had in other U-2 pilots.

via Op-Ed Contributor – Flying with the Dragon Lady – NYTimes.com.

The War on Spam & Cybercrime

While Western governments debate the efficacy, or legality, of going on the offensive against Internet spies and criminals, more Internet security companies, and academic researchers, are taking the initiative. The most recent victory was the elimination of the Neustar of Lethic botnet, which represented about ten percent of all spam email sent.

The biggest victory took place in 2008, when a small ISP, McColo Corporation, was taken off line. This caused worldwide spam traffic to decline by over 50 percent in one day. Before that, two similar ISPs, the Russian Business Network and Intercage, had a less dramatic impact on spam traffic, and Internet based criminal activity in general, when they were shut down.

Internet crime, particularly spam (unsolicited email) has become a big money maker. Because of the very low cost of sending it, you need only one response for several million spam messages, to make lots of money. But the same ISPs that host the spammers, also host operations that try to sneak into business, government and personal computers to steal stuff (bank account information, trade secrets, classified military information).

via Information Warfare: The War Below.

Protect Yourself On Facebook -5 Easy Steps

Unbeknownst to most mainstream Facebook users, the social network actually offers a slew of privacy controls and security features which can help you batten down the hatches, so to speak. If used properly, you’ll never have to worry about whether you should friend the boss and your mom. You can friend anyone you want while comfortable in the knowledge that not everyone gets to see everything you post.

The problem in implementing these privacy options is that they’re just too confusing for most non-tech savvy people to handle. And often, folks don’t want to bother to take the time to learn. To simplify the process, we’re offering five easy steps you can take today to help make your Facebook experience safer, more secure, and more private.

via 5 Easy Steps to Stay Safe (and Private!) on Facebook – NYTimes.com. Continue reading “Protect Yourself On Facebook -5 Easy Steps”

DNA To Self-Assemble Microchips

CyborgIBM researchers, along with scientists at the California Institute of Technology, have discovered that the tiny components that run along a chip’s silicone surface will self-adhere to previously laid down DNA patterns.

IBM researchers, along with scientists at the California Institute of Technology, have discovered that the tiny components that run along a chip’s silicone surface will self-adhere to previously laid down DNA patterns.

“The combination of this directed self-assembly with today’s fabrication technology could lead to substantial savings in the most expensive and challenging part of the chip-making process,”

via IBM Eyes DNA For Chip Development — InformationWeek.

Secret U.S.Tests Fight Web Censorship

The U.S. government is covertly testing technology in China and Iran that lets residents break through screens set up by their governments to limit access to news on the Internet.

The “feed over email” (FOE) system delivers news, podcasts and data via technology that evades web-screening protocols of restrictive regimes, said Ken Berman, head of IT at the U.S. government’s Broadcasting Board of Governors, which is testing the system.

The news feeds are sent through email accounts including those operated by Google Inc, Microsoft Corp’s Hotmail and Yahoo Inc.

“We have people testing it in China and Iran,” said Berman, whose agency runs Voice of America.

via U.S. tests technology to break foreign Web censorship | U.S. | Reuters.

The Fall of the Internet As We Know It….

Reformed black-hat hacker Michael Calce, better known as the 15-year-old “mafiaboy” who, in 2000, took down Websites CNN, Yahoo, E*Trade, Dell, Amazon, and eBay, says widespread adoption of cloud computing is going to make the Internet only more of a hacker haven.

“It will be the fall of the Internet as we know it,” Calce said today during a Lumension Security-sponsored Webcast event. “You’re basically putting everything in one little sandbox…it’s going to be a lot more easy to access,” he added, noting that cloud computing will be “extremely dangerous.”

“This is not the last you’re going to hear of this,” he said.

via ‘Mafiaboy’: Cloud Computing Will Cause Internet Security Meltdown – DarkReading.