Free Republic 3rd Qtr 2025 Fundraising Target: $81,000 Receipts & Pledges to-date: $18,643
23%  
Woo hoo!! And we're now over 23%!! Thank you all very much!! God bless.

Keyword: encryption

Brevity: Headers | « Text »
  • Informant says Wikileaks suspect had civilian help

    07/31/2010 12:36:26 PM PDT · by rawhide · 42 replies · 9+ views
    ajc.com ^ | 7-31-10 | By DAVID DISHNEAU
    HAGERSTOWN, Md. — A key figure in the government's investigation of thousands of leaked secret war records says the suspected culprit had help. Adrian Lamo is the computer hacker who turned in Army intelligence analyst Bradley Manning. Lamo says someone told him that he helped Manning set up encryption software that Manning allegedly used to send classified information to the whistleblower website Wikileaks. Lamo isn't naming the apparent accomplice. But he says the man is among a group of people in the Boston area who work with Wikileaks.
  • Has HDTV Code Been Cracked? (Duh?)

    09/15/2010 7:29:58 AM PDT · by ImJustAnotherOkie · 24 replies
    Fox News ^ | Sept 14, 2010 | Blake Snow
    Much to the chagrin of the entertainment industry, the encryption that protects most high-definition video content may have just been cracked. Intel Corp. officials confirmed Tuesday to FoxNews.com an investigation into a security breach, possibly a fundamental compromise of High-bandwidth Digital Content Protection (HDCP) -- the digital rights management software that governs every device that plays high-def content.
  • Oglala Lakota code talker Clarence Wolf Guts laid to rest

    06/23/2010 9:50:22 AM PDT · by Kartographer · 22 replies · 1+ views
    rapidcityjournal.com ^ | 6/23/10 | Tyler Jerke
    Three rifle volleys echoed through the Hills Tuesday afternoon, bidding farewell to the nation’s last Oglala Lakota code talker. Clarence Wolf Guts, an 86-year-old World War II veteran, was laid to rest in the Black Hills National Cemetery with the Lord’s Prayer and drum beat resonating inside the rock rotunda. A procession of 30 vehicles -- including one white Chevy Impala with the sign “We love you Grandpa Clarence, forever in our heart.” -- followed a white van that carried Wolf Guts from a traditional Lakota ceremony in Wanblee to Sturgis. A crowd of over 60 traveled to pay their...
  • Jihadis Discover Google's Encrypted Search

    06/07/2010 3:32:44 PM PDT · by Cindy · 2 replies · 21+ views
    INTERNET HAGANAH.com ^ | June 7, 2010 | n/a
    07 June 2010 "JIHADIS DISCOVER GOOGLE'S ENCRYPTED SEARCH" SNIPPET: "What this means is that their connection to Google's servers is encrypted. Their search terms are not encrypted."
  • ...Charges Two Brooklyn Men with Conspiring to Provide Material Support to al Qaeda

    04/30/2010 1:45:09 PM PDT · by Cindy · 17 replies · 385+ views
    Note: The following text is a quote: Manhattan U.S. Attorney Charges Two Brooklyn Men with Conspiring to Provide Material Support to al Qaeda PREET BHARARA, the United States Attorney for the Southern District of New York, GEORGE VENIZELOS, the Special Agent-in-Charge of the New York Office of the Federal Bureau of Investigation ("FBI"), and RAYMOND W. KELLY, the Police Commissioner of the City of New York, announced the indictment of U.S. citizens WESAM EL-HANAFI and SABIRHAN HASANOFF for allegedly conspiring to provide material support, including computer advice and assistance, to al Qaeda. EL-HANAFI and HASANOFF are expected to be presented...
  • Security chip that does encryption in PCs hacked

    02/09/2010 3:40:32 PM PST · by Neil E. Wright · 37 replies · 838+ views
    AP/Yahoo News ^ | Feburary 08, 2010 | JORDAN ROBERTSON, AP Technology Writer
    SAN FRANCISCO – Deep inside millions of computers is a digital Fort Knox, a special chip with the locks to highly guarded secrets, including classified government reports and confidential business plans. Now a former U.S. Army computer-security specialist has devised a way to break those locks.The attack can force heavily secured computers to spill documents that likely were presumed to be safe. This discovery shows one way that spies and other richly financed attackers can acquire military and trade secrets, and comes as worries about state-sponsored computer espionage intensify, underscored by recent hacking attacks on Google Inc.The new attack discovered...
  • Officers Warned of Flaw in U.S. Drones in 2004 (Predator vulnerability discussed 12/17)

    12/18/2009 11:57:45 AM PST · by markomalley · 9 replies · 409+ views
    Wall Street Journal ^ | 12/18/2009 | YOCHI J. DREAZEN, AUGUST COLE and SIOBHAN GORMAN
    Senior U.S. military officers working for the Joint Chiefs of Staff discussed the danger of Russia and China intercepting and doctoring video from drone aircraft in 2004, but the Pentagon didn't begin securing the signals until this year, according to people familiar with the matter. The disclosure came after The Wall Street Journal reported insurgents in Iraq had intercepted video feeds from drones, downloading unencrypted communications from the unmanned planes. Shiite fighters in Iraq used software programs such as SkyGrabber -- available for as little as $25.95 on the Internet -- to regularly capture drone video feeds, said a person...
  • Secret code saves man who spied on flatmates

    10/22/2009 7:09:31 AM PDT · by BGHater · 10 replies · 1,868+ views
    Courier Mail ^ | 19 Oct 2009 | Jeremy Pierce
    A MAN who established a sophisticated network of peepholes and cameras to spy on his flatmates has escaped a jail sentence after police were unable to crack an encryption code on his home computer. Rohan James Wyllie, 39, yesterday pleaded guilty in Southport District Court to charges of attempting to visually record one of his flatmates when she was in a private place without her consent. But police were unable to prove his elaborate surveillance system had actually been used. Wyllie's three flatmates, two women and a man, grew suspicious that he was up to something when they noticed lights...
  • New attack cracks common Wi-Fi encryption in a minute

    08/28/2009 10:58:25 AM PDT · by ShadowAce · 42 replies · 1,331+ views
    Network World ^ | 27 August 2009 | Robert McMillan
    Computer scientists in Japan say they've developed a way to break the WPA encryption system used in wireless routers in about one minute. The attack gives hackers a way to read encrypted traffic sent between computers and certain types of routers that use the WPA (Wi-Fi Protected Access) encryption system. The attack was developed by Toshihiro Ohigashi of Hiroshima University and Masakatu Morii of Kobe University, who plan to discuss further details at a technical conference set for Sept. 25 in Hiroshima. Last November, security researchers first showed how WPA could be broken, but the Japanese researchers have taken the...
  • Former State Department Official and Wife Arrested for Serving as Illegal Agents of Cuba...

    06/05/2009 4:00:39 PM PDT · by Cindy · 26 replies · 1,260+ views
    Note: The following text is a quote: Former State Department Official and Wife Arrested for Serving as Illegal Agents of Cuba for Nearly 30 Years Couple Allegedly Conspired to Provide Classified Information to Cuban Government A former State Department official and his wife have been arrested on charges of serving as illegal agents of the Cuban government for nearly 30 years and conspiring to provide classified U.S. information to the Cuban government. The arrests were announced today by David Kris, Assistant Attorney General for National Security; Channing D. Phillips, Acting U.S. Attorney for the District of Columbia; Joseph Persichini, Jr.,...
  • DVDs to harness hyperspace - Gold nanorods could boost capacity of next-generation disks.

    05/23/2009 1:35:38 PM PDT · by neverdem · 20 replies · 1,225+ views
    Nature News ^ | 20 May 2009 | Zeeya Merali
    DVDs are set to explore new dimensions.Punchstock Spreading into extra dimensions could help next-generation DVDs to store even more data than they currently do. The new technique could squeeze around 140 times the capacity of the best Blu-rays into a standard-sized disk. Traditional DVDs and Blu-ray disks store data in two dimensions, and there's been a recent push to increase their capacity by creating multi-layered disks that store data across three dimensions. But, asks James Chon at the Swinburne University of Technology in Melbourne, Australia, why stop there?Chon and his colleagues are stepping into hyperspace, by encoding information in two...
  • Dangerous and depraved: paedophiles unite with terrorists online

    10/18/2008 11:15:58 AM PDT · by BGHater · 10 replies · 501+ views
    Times Online ^ | 17 Oct 2008 | Richard Kerbaj, Dominic Kennedy, Richard Owen and Graham Keeley
    For some, the internet is merely a hiding place — a web of secret corridors where all manner of shameful deeds unfold. But the police never expected that it might become a strategic platform where two groups of society's outcasts, terrorists and child sex abusers, could meet to exchange operational secrets. The realisation that there might be something in common between violent Muslim fanatics known for their supposed piety and sexual deviants who prey on children has only slowly dawned on officers. Cracking the mystery of how these worlds overlap is expected to improve understanding of the mindsets of both...
  • UK appeals court rejects encryption key disclosure defense

    10/18/2008 11:38:09 AM PDT · by BGHater · 6 replies · 388+ views
    IDG News Service ^ | 15 Oct 2008 | Jeremy Kirk
    Defendants can't deny police an encryption key because of fears the data it unlocks will incriminate them, a British appeals court has ruled. The case marked an interesting challenge to the UK's Regulation of Investigatory Powers Act (RIPA), which in part compels someone served under the act to divulge an encryption key used to scramble data on a PC's hard drive. Failure to do so could mean a two-year prison sentence or up to five years if the case involves national security. The appeals court heard a case in which two suspects refused to give up encryption keys, arguing that...
  • New attack against multiple encryption functions

    08/22/2008 12:55:10 PM PDT · by LibWhacker · 7 replies · 141+ views
    Computerworld ^ | 8/22/08 | Carl Jongsma
    New mathematical attack works against a broad range cryptographic functions.Unless you're a dyed in the wool cryptographic geek you probably didn't know that there was a Crypto conference, or even a chain of worldwide crypto conferences that take place each year. Fortunately, for the most of us that aren't crypto geeks there are a handful of very highly skilled people who are; they can take the highly theoretical and complex mathematical proofs and arguments that make up most of modern cryptographic and cryptanalytic research and put it into plain language. Probably the best known is Bruce Schneier, who is a...
  • Microsoft Helps Law Enforcement Get Around Encryption

    04/29/2008 9:31:07 PM PDT · by familyop · 7 replies · 133+ views
    IDG, PC World ^ | 29APR08 | Nancy Gohring, IDG News Service
    The growing use of encryption software -- like Microsoft's own BitLocker -- by cyber criminals has led Microsoft to develop a set of tools that law enforcement agents can use to get around the software, executives at the company said...Microsoft first released the toolset, called the Computer Online Forensic Evidence Extractor (COFEE)...Microsoft gives the software to agents for free.
  • Disk encryption easily cracked, researchers find

    02/22/2008 8:20:54 AM PST · by ShadowAce · 26 replies · 99+ views
    Network World ^ | 21 February 2008 | Network World Staff
    Security approach common on Vista, Apple and Linux laptops The disk encryption technology used to secure the data in your Windows, Apple and Linux laptops can be easily circumvented, according to new research out of Princeton University. The flaw in this approach, the researchers say, is that data previously thought to disappear immediately from dynamic RAM (DRAM) actually takes its time to dissolve, leaving the data on the computer vulnerable to thievery regardless of whether the laptop is on or off. That's because the disk encryption key, unlocked via a password when you log on to your computer, then is...
  • New Research Result: Cold Boot Attacks on Disk Encryption (keys vulnerable in DRAM after power cut)

    02/21/2008 11:31:34 AM PST · by LibWhacker · 9 replies · 168+ views
    Freedom to Tinker ^ | 2/21/08 | Ed Felten
    Today eight colleagues and I are releasing a significant new research result. We show that disk encryption, the standard approach to protecting sensitive data on laptops, can be defeated by relatively simple methods. We demonstrate our methods by using them to defeat three popular disk encryption products: BitLocker, which comes with Windows Vista; FileVault, which comes with MacOS X; and dm-crypt, which is used with Linux. The research team includes J. Alex Halderman, Seth D. Schoen, Nadia Heninger, William Clarkson, William Paul, Joseph A. Calandrino, Ariel J. Feldman, Jacob Appelbaum, and Edward W. Felten. Our site has links to the...
  • Updated encryption tool for al-Qaeda backers improves on first version, researcher says

    02/04/2008 4:10:52 PM PST · by balls · 43 replies · 220+ views
    Computerworld ^ | Jaikumar Vijayan
    A recently released tool that allegedly was designed to help al-Qaeda supporters encrypt their Internet-based communications is a well-written and easily portable piece of code, according to a security researcher who has analyzed the software.
  • U.S. Web site said to offer strengthened encryption tool for al-Qaeda backers

    01/24/2008 12:12:44 PM PST · by Robert357 · 5 replies · 63+ views
    Computer World ^ | Jan 23, 2008 | Jaikumar Vijayan
    An Arabic-language Web site hosted on a server located in Tampa, Fla., is apparently offering a new version of software that was designed to help al-Qaeda supporters encrypt their Internet communications. The new encryption tool is called Mujahideen Secrets 2 and appears to be an updated version of easier-to-crack software that was released early last year, said Paul Henry, vice president of technology evangelism at Secure Computing Corp. in San Jose. The tool is being distributed free of charge on a password-protected Web site that belongs to an Islamic forum known as al-Ekhlaas, according to Henry and a blog posting...
  • If Your Hard Drive Could Testify...

    01/07/2008 6:56:46 AM PST · by rawhide · 122 replies · 144+ views
    New York Times ^ | 01-07-08 | Adam Liptak
    A couple of years ago, Michael T. Arnold landed at the Los Angeles International Airport after a 20-hour flight from the Philippines. He had his laptop with him, and a customs officer took a look at what was on his hard drive. Clicking on folders called “Kodak pictures” and “Kodak memories,” the officer found child pornography. The search was not unusual: the government contends that it is perfectly free to inspect every laptop that enters the country, whether or not there is anything suspicious about the computer or its owner. Rummaging through a computer’s hard drive, the government says, is...