Journal Journal: "With Less Than 5% of the World's Population..." 9
"...the US accounts for a quarter of the world's prisoners."
"...the US accounts for a quarter of the world's prisoners."
In recent times I've been fortunate enough to be the one conducting interviews instead of the one being interviewed. It's been an eye-opening experience. The first few times I was very nervous in case I asked a wrong/stupid question. I wouldn't want to put someone off or give a bad impression of the company.
Without wanting to sound conceited or pompous, I have been absolutely astounded at the apparent lack of ability of some candidates.
Put it this way: I'm completely self taught. I have spoken to people who are claiming to have developed software for nearly 20 years in some cases and make a big song and dance about all the hardware they've programmed for, and all the fancy IDEs, static analysis tools, industry standards they've followed etc. and about their wonderful C and C++ skills.
But what really beats me is how anyone can have been coding for longer than a fortnight and not know what an array is, or to have been doing C++ for 15 years and not know about parameterised types.
NSA Trigger Words for PRISM:
This is an (admittedly huge) list of words that supposedly cause the NSA to flag you as a potential terrorist if you over-use them in an email.
We found this on Reddit, where James Bamford, a veteran reporter with 30 years experience covering the NSA, is answering questions from the community. This list comes from Reddit user GloriousDawn, who found it on Attrition.org, a site that very closely follows the security industry.
http://attrition.org/misc/keywords.html
Waihopai, INFOSEC, Information Security, Information Warfare, IW, IS, Privacy, Information Terrorism, Terrorism Defensive Information, defence Information Warfare, Offensive Information, Offensive Information Warfare, National Information Infrastructure, InfoSec, Reno, Compsec, Computer Terrorism, Firewalls, Secure Internet Connections, ISS, Passwords, DefCon V, Hackers, Encryption, Espionage, USDOJ, NSA, CIA, S/Key, SSL, FBI, Secert Service, USSS, Defcon, Military, White House, Undercover, NCCS, Mayfly, PGP, PEM, RSA, Perl-RSA, MSNBC, bet, AOL, AOL TOS, CIS, CBOT, AIMSX, STARLAN, 3B2, BITNET, COSMOS, DATTA, E911, FCIC, HTCIA, IACIS, UT/RUS, JANET, JICC, ReMOB, LEETAC, UTU, VNET, BRLO, BZ, CANSLO, CBNRC, CIDA, JAVA, Active X, Compsec 97, LLC, DERA, Mavricks, Meta-hackers, ^?, Steve Case, Tools, Telex, Military Intelligence, Scully, Flame, Infowar, Bubba, Freeh, Archives, Sundevil, jack, Investigation, ISACA, NCSA, spook words, Verisign, Secure, ASIO, Lebed, ICE, NRO, Lexis-Nexis, NSCT, SCIF, FLiR, Lacrosse, Flashbangs, HRT, DIA, USCOI, CID, BOP, FINCEN, FLETC, NIJ, ACC, AFSPC, BMDO, NAVWAN, NRL, RL, NAVWCWPNS, NSWC, USAFA, AHPCRC, ARPA, LABLINK, USACIL, USCG, NRC, ~, CDC, DOE, FMS, HPCC, NTIS, SEL, USCODE, CISE, SIRC, CIM, ISN, DJC, SGC, UNCPCJ, CFC, DREO, CDA, DRA, SHAPE, SACLANT, BECCA, DCJFTF, HALO, HAHO, FKS, 868, GCHQ, DITSA, SORT, AMEMB, NSG, HIC, EDI, SAS, SBS, UDT, GOE, DOE, GEO, Masuda, Forte, AT, GIGN, Exon Shell, CQB, CONUS, CTU, RCMP, GRU, SASR, GSG-9, 22nd SAS, GEOS, EADA, BBE, STEP, Echelon, Dictionary, MD2, MD4, MDA, MYK, 747,777, 767, MI5, 737, MI6, 757, Kh-11, Shayet-13, SADMS, Spetznaz, Recce, 707, CIO, NOCS, Halcon, Duress, RAID, Psyops, grom, D-11, SERT, VIP, ARC, S.E.T. Team, MP5k, DREC, DEVGRP, DF, DSD, FDM, GRU, LRTS, SIGDEV, NACSI, PSAC, PTT, RFI, SIGDASYS, TDM. SUKLO, SUSLO, TELINT, TEXTA. ELF, LF, MF, VHF, UHF, SHF, SASP, WANK, Colonel, domestic disruption, smuggle, 15kg, nitrate, Pretoria, M-14, enigma, Bletchley Park, Clandestine, nkvd, argus, afsatcom, CQB, NVD, Counter Terrorism Security, Rapid Reaction, Corporate Security, Police, sniper, PPS, ASIS, ASLET, TSCM, Security Consulting, High Security, Security Evaluation, Electronic Surveillance, MI-17, Counterterrorism, spies, eavesdropping, debugging, interception, COCOT, rhost, rhosts, SETA, Amherst, Broadside, Capricorn, Gamma, Gorizont, Guppy, Ionosphere, Mole, Keyhole, Kilderkin, Artichoke, Badger, Cornflower, Daisy, Egret, Iris, Hollyhock, Jasmine, Juile, Vinnell, B.D.M.,Sphinx, Stephanie, Reflection, Spoke, Talent, Trump, FX, FXR, IMF, POCSAG, Covert Video, Intiso, r00t, lock picking, Beyond Hope, csystems, passwd, 2600 Magazine, Competitor, EO, Chan, Alouette,executive, Event Security, Mace, Cap-Stun, stakeout, ninja, ASIS, ISA, EOD, Oscor, Merlin, NTT, SL-1, Rolm, TIE, Tie-fighter, PBX, SLI, NTT, MSCJ, MIT, 69, RIT, Time, MSEE, Cable & Wireless, CSE, Embassy, ETA, Porno, Fax, finks, Fax encryption, white noise, pink noise, CRA, M.P.R.I., top secret, Mossberg, 50BMG, Macintosh Security, Macintosh Internet Security, Macintosh Firewalls, Unix Security, VIP Protection, SIG, sweep, Medco, TRD, TDR, sweeping, TELINT, Audiotel, Harvard, 1080H, SWS, Asset, Satellite imagery, force, Cypherpunks, Coderpunks, TRW, remailers, replay, redheads, RX-7, explicit, FLAME, Pornstars, AVN, Playboy, Anonymous, Sex, chaining, codes, Nuclear, 20, subversives, SLIP, toad, fish, data havens, unix, c, a, b, d, the, Elvis, quiche, DES, 1*, NATIA, NATOA, sneakers, counterintelligence, industrial espionage, PI, TSCI, industrial intelligence, H.N.P., Juiliett Class Submarine, Locks, loch, Ingram Mac-10, sigvoice, ssa, E.O.D., SEMTEX, penrep, racal, OTP, OSS, Blowpipe, CCS, GSA, Kilo Class, squib, primacord, RSP, Becker, Nerd, fangs, Austin, Comirex, GPMG, Speakeasy, humint, GEODSS, SORO, M5, ANC, zone, SBI, DSS, S.A.I.C., Minox, Keyhole, SAR, Rand Corporation, Wackenhutt, EO, Wackendude, mol, Hillal, GGL, CTU, botux, Virii, CCC, Blacklisted 411, Internet Underground, XS4ALL, Retinal Fetish, Fetish, Yobie, CTP, CATO, Phon-e, Chicago Posse, l0ck, spook keywords, PLA, TDYC, W3, CUD, CdC, Weekly World News, Zen, World Domination, Dead, GRU, M72750, Salsa, 7, Blowfish, Gorelick, Glock, Ft. Meade, press-release, Indigo, wire transfer, e-cash, Bubba the Love Sponge, Digicash, zip, SWAT, Ortega, PPP, crypto-anarchy, AT&T, SGI, SUN, MCI, Blacknet, Middleman, KLM, Blackbird, plutonium, Texas, jihad, SDI, Uzi, Fort Meade, supercomputer, bullion, 3, Blackmednet, Propaganda, ABC, Satellite phones, Planet-1, cryptanalysis, nuclear, FBI, Panama, fissionable, Sears Tower, NORAD, Delta Force, SEAL, virtual, Dolch, secure shell, screws, Black-Ops, Area51, SABC, basement, data-haven, black-bag, TEMPSET, Goodwin, rebels, ID, MD5, IDEA, garbage, market, beef, Stego, unclassified, utopia, orthodox, Alica, SHA, Global, gorilla, Bob, Pseudonyms, MITM, grey Data, VLSI, mega, Leitrim, Yakima, Sugar Grove, Cowboy, Gist, 8182, Gatt, Platform, 1911, Geraldton, UKUSA, veggie, 3848, Morwenstow, Consul, Oratory, Pine Gap, Menwith, Mantis, DSD, BVD, 1984, Flintlock, cybercash, government, hate, speedbump, illuminati, president, freedom, cocaine, $, Roswell, ESN, COS, E.T., credit card, b9, fraud, assasinate, virus, anarchy, rogue, mailbomb, 888, Chelsea, 1997, Whitewater, MOD, York, plutonium, William Gates, clone, BATF, SGDN, Nike, Atlas, Delta, TWA, Kiwi, PGP 2.6.2., PGP 5.0i, PGP 5.1, siliconpimp, Lynch, 414, Face, Pixar, IRIDF, eternity server, Skytel, Yukon, Templeton, LUK, Cohiba, Soros, Standford, niche, 51, H&K, USP, ^, sardine, bank, EUB, USP, PCS, NRO, Red Cell, Glock 26, snuffle, Patel, package, ISI, INR, INS, IRS, GRU, RUOP, GSS, NSP, SRI, Ronco, Armani, BOSS, Chobetsu, FBIS, BND, SISDE, FSB, BfV, IB, froglegs, JITEM, SADF, advise, TUSA, HoHoCon, SISMI, FIS, MSW, Spyderco, UOP, SSCI, NIMA, MOIS, SVR, SIN, advisors, SAP, OAU, PFS, Aladdin, chameleon man, Hutsul, CESID, Bess, rail gun, Peering, 17, 312, NB, CBM, CTP, Sardine, SBIRS, SGDN, ADIU, DEADBEEF, IDP, IDF, Halibut, SONANGOL, Flu, &, Loin, PGP 5.53, EG&G, AIEWS, AMW, WORM, MP5K-SD, 1071, WINGS, cdi, DynCorp, UXO, Ti, THAAD, package, chosen, PRIME, SURVIAC
"APB: At Least Two Missing "Law Enforcement Personnel," Last Seen at Ibragim Todashev Homicide Scene". The 'law enforcement personnel' written out of the story are, of course, the assassination team.
To summarize, the FBI was disturbed by the first interview, as Todashev indicated he knew the brothers were set up. It was thus imperative to:
1. reinterview Todashev to find out what he knew, and more importantly, identify whoever else knew; and
2. liquidate Todashev.
Why didn't they just arrange for a drive-by shooting, or a home invasion/murder? They needed to interview him to find out who else they had to murder, and then immediately liquidate Todashev before he could talk to anyone else. The incompetence of the liquidation was probably caused by Todashev realizing what was going to happen, fighting for his life rather effectively (as he was a trained fighter), resulting in the panicked murder, and a most ludicrous attempt at a cover-up.
Intro: I was complaining on social networks that the LuxTrust hardware tokens are forced upon all teachers in my country. That's a huge problem because I got my mother in law on Linux and this thing is very very badly supported. Officially the website say "Ubuntu 10.04" supported. Funnily enough, their website also doesn't mention Windows 8 as supported. Anyway, they're a useless company in my eyes... I wish them the most ill possible.
Here is my little test run:
So, I decided to test the LuxTrust support under Ubuntu GNU/Linux 12.04 LTS i686[1]. I installed a virtual machine from the ISO, and from that blank slate, I wanted to try how "easy" this is. Well, there you go, I downloaded their "middleware".
The good news: Ubuntu Software center presented it as installable and it installed it without apparently problems after clicking the Install. Good! If this were enough, I'd say "it's supported"[2]. Let's test it. So, I go to CCP-Connect, one of the few banks known to work well with LuxTrust under Linux. The thing needs Java[3], and I as expected, and I don't have it installed. I get redirected, at once to http://www.oracle.com/java. The sheer number of options is intimidating. If I weren't very familiar with Java, I wouldn't have a clue what to select. Now, this might be P&T Luxembourg doing it wrong, but the site you should send end-users to is http://www.java.com/. Never send an end-user to a developer site, it's a horrible mistake.
Anyway, I do what is needed and surprise[4], there is no Oracle Java for Ubuntu. A RPM and a tar.gz. Now, if I weren't who I am, I would be blocked again. So, I download the tar.gz and I'll be honest to you, dropped right to the command line, tar zxvf later to
Now, going back to the banking site, it seems to run. I get to the point where I have to select their product and then a screen saying there is no signing stick. (Obviously, I don't have one.)
For kicks 'n giggles, I tried OpenJDK/JRE with the icedtea plugin. No surprise, but that doesn't work: gray pane instead of the applet, but other java applets works fine. So, Oracle Java mandatory. Heck, even Minecraft runs op OpenJDK for crying out loud!
At least their middleware didn't install some kind of daemon, which I what I would have expected with something called "Middleware".
Funny also: The Oracle Java VM warns you from running applets all the time, even the test applet on the java.com site. Scary. Well, not to me, but to a normal end user.
[1] i686 for a good reason, from what I read getting it to run is significantly harder on amd64.
[2] I knew that it wasn't going to work
[3] Wait, isn't that what dependencies are for... Naaaah, dependencies. Who uses that?
[4] Not really, I've been here before
[5] Probably better use update-alternatives for that one too!
How often does the FBI end up killing a "Person of Interest"? It runs counter to gathering information in pursuit of an investigation.
"There is no way to vote against corporate power. Citizens have no way to bring about the prosecution of Wall Street bankers and financiers for fraud, military and intelligence officials for torture and war crimes, or security and surveillance officers for human rights abuses. The Federal Reserve is reduced to printing money for banks and financiers and lending it to them at almost zero percent interest; corporate officers then lend it to us at usurious rates as high as 30 percent. I do not know what to call this system. It is certainly not capitalism. Extortion might be a better word. "
http://www.truthdig.com/report/print/rise_up_or_die_20130519/
The rabbit hole goes deeper. What he seaid in the earlier weeks, this year:
"The formula for a public assassination is: the character assassination before the physical assassination; so one has to be made killable before the eyes of the public in order for their eventual murder to then (be) deemed justifiable.
"And when the time arrives for these hits to be carried out, you're not going to see a CIA agent with a suit & tie, and a badge that says 'CIA'.
"What they will do is to out-source to local police departments in the region of their target, and to employ those that look like the target of interest to infiltrate the workings in order to set up the environment for the eventual assassination (character, physical/incarceration, exile) to take place."
http://sjlendman.blogspot.ca/2013/05/malcolm-shabazzs-suspicious-death.html
By HSBC. Everywhere you look. I'd love to get a few of these on the jetway gantries:
http://alternativebanking.nycga.net/files/2013/02/NewAdCampaignForHSBC2_web.jpg
And the Federalists were fascist bastards.
"By transforming democracy into a concept that encouraged uninhibited wealth accumulation rather than wealth equality, the founding elite (and subsequent generations of elites) tamed what they could not defeat. They turned democracy from a threat into an asset by making it into a concept that supported their own ideals and interests."
http://powerofnarrative.blogspot.com/2011/11/concerning-american-change-in.html
You must keep "anti-semitism" alive.
Hollywood Conservative Leader Turns Out to Be Holocaust Revisionist
Yeah. There's no disinformation network or false narratives planted in the media. Hal was just a fluke.
"After the tsunami there was great concern that many of the children left without families due to that disaster had disappeared into Asian, Middle Eastern sex trade rings."
http://www.dailykos.com/story/2005/09/22/151046/-Katrina-Missing-Children-The-Saudis-amp-Bush-A-Link
Why bring this up, after 8 years?
http://www.washingtontimes.com/news/2013/may/2/saudi-compound-virginia-investigated-human-traffic/
Math is like love -- a simple idea but it can get complicated. -- R. Drabek