Archive for the ‘DefCon’ Category

“Notwithstanding Americans’ resistance to a Real ID infrastructure, as consumers of social networks we have consented to a de facto Real ID that markets and information technology, rather than government and regulation, have created,”- Alessandro Acquisti

BTC–“Friendly fascism” and “democratized surveillance” are terms being used to address issues of Big Web’s collusion with the government surveillance state by way of hackers, software applications and social networks at this years DEFCON convention.

Here’s how it works: Developed applications are voluntarily adopted by users who create highly personal profiles.  Some profiles are then funnelled through a federal data surveillance apperture by big technology companies and private contractors to advance a fine grasp of social control of everyone who poses any resistance to the State.  A familiar scenario was illustrated in Aldous Huxley’s Brave New World.   

SEE:An Open Letter to Defcon Hackers: Don’t Sell Out to the NSA

If the American government has indeed lost their undertsanding and fellowship with basic Constitutional freedoms, one can only conclude this Summer’s escalated levels of surveillance is an effort to control the only people in the world with any real power to reign in a rogue government on an imperial rampage.

The resistance of American people may be invisible to the rest of the world due to a media circus which is allowed to tamper with the American justice system.  Something is drastically wrong when Court TV evolved. Nancy Grace based her entire broadcast career on a legal reality show known as “The Casey Anthony trial”.  Many believe this trend was initiated with OJ Simpson’s acquittal in the beating death of his wife.

One morning, I observed Headline News Anchor, Carlos Diaz say,” It’s good that Big Brother is watching out for Octomom.” I would never gather that Carlos Diaz’s audience could raise Octomom’s children better than she could, mainly because they are uninvested strangers. America’s televised media believes itself to be government and has been since corrupted.  American media’s conflict of interest in government role-play leads to it being ineffectual in exposing government corruption. Women and children are still the losers when televised media becomes the social justice handlers.

The media blowback has manifested in new media empire empowerment of Wikileaks and robin hood hacker vigilantes Anonymous who now pilfer the data mines of crooked police bureaus in a retaliatory fashion.

One out of 4 hackers still work for the federal government. If companies hand over users information through coersion or through commerce,  there is only a small patch of legal real estate left to leverage the tipping point for user privacy and basic civil liberty.

Now that the “genie is out of the bottle” it is anyone’s guess whether the User will reclaim authority over the management of their digital identity or allow the liquidation blow-out sale of their information to continue.

Here is second life for news that matters:


Why ‘Privacy By Design’ Is The New Corporate Hotness  +  Design 4 Privacy Awards coverage.

Hints Facebook Is Becoming a Full-On Identification Service

Security, Hacker Conferences Have Technology Industry Buzzing

California Adopts First Standards for Cyber Security of Smart Meters

US seeks to counter extremism on Facebook, Twitter

Line Noise: Electronic Device Search and Seizure

Big Brother Wants a Longer Memory

American Spies Have Their Very Own Phone Hacking Scandal

FBI Director’s Term Extension Ensures Neo-COINTELPRO Operations Will Prevail

Bill Would Force Intel Chief to Renounce ‘Secret Patriot Act’

These updates in from Slashdot.org


Death Metal writes with this excerpt from Computer Weekly, which casts some doubt on the security of the UK’s proposed personal identification credential:“The prospective national ID card was broken and cloned in 12 minutes, the Daily Mail revealed this morning. The newspaper hired computer expert Adam Laurie to test the security that protects the information embedded in the chip on the card. Using a Nokia mobile phone and a laptop computer, Laurie was able to copy the data on a card that is being issued to foreign nationals in minutes.”
FourthAge writes“Federal agents at the Defcon 17 conference were shocked to discover that they had been caught in the sights of an RFID reader connected to a web camera. The reader sniffed data from RFID-enabled ID cards and other documents carried by attendees in pockets and backpacks. The ‘security enhancing’ RFID chips are now found in passports, official documents and ID cards. ‘For $30 to $50, the common, average person can put [a portable RFID-reading kit] together,’ said security expert Brian Marcus, one of the people behind the RFID webcam project. ‘This is why we’re so adamant about making people aware this is very dangerous.'”

Wired Magazine, Kim Zetter 

LAS VEGAS — It’s one of the most hostile hacker environments in the country –- the DefCon hacker conference held every summer in Las Vegas.

But despite the fact that attendees know they should take precautions to protect their data, federal agents at the conference got a scare on Friday when they were told they might have been caught in the sights of an RFID reader.

The reader, connected to a web camera, sniffed data from RFID-enabled ID cards and other documents carried by attendees in pockets and backpacks as they passed a table where the equipment was stationed in full view.

It was part of a security-awareness project set up by a group of security researchers and consultants to highlight privacy issues around RFID. When the reader caught an RFID chip in its sights — embedded in a company or government agency access card, for example — it grabbed data from the card, and the camera snapped the card holder’s picture.

But the device, which had a read range of 2 to 3 feet, caught only five people carrying RFID cards before Feds attending the conference got wind of the project and were concerned they might have been scanned.::MORE HERE:::