from the red-hands-in-the-cookie-jar dept.
Fuzzzy writes "For a long time, people have suspected that Israeli ISPs are blocking or delaying P2P traffic. However, no hard evidence was provided, and the ISPs denied any interference. Today Ynetnews published a report on comprehensive research that for the first time proves those suspicions. Using Glasnost and Switzerland, an Internet attorney / blogger found evidence of deep packet inspection and deliberate delays. From the article: 'Since 2007 Ynet has received complaints according to which Israeli ISPs block P2P traffic. Those were brought to the media and were dismissed by the ISPs. Our findings were that there is direct and deliberate interference in P2P traffic by at least two out of the three major ISPs and that this interference exists by both P2P caching and P2P blocking.'"
from the rockets-falling-out-of-the-sky dept.
Nrbelex writes "The New York Times reports in this week's Science section that hardware and software trojan kill switches in military devices are an increasing concern, and may have already been used. 'A 2007 Israeli Air Force attack on a suspected, partly-constructed Syrian nuclear reactor led to speculation about why the Syrian air defense system did not respond to the Israeli aircraft. Accounts of the event initially indicated that sophisticated jamming technology was used to blind the radars. Last December, however, a report in an American technical publication, IEEE Spectrum, cited a European industry source in raising the possibility that the Israelis might have used a built-in kill switch to shut down the radars. Separately, an American semiconductor industry executive said in an interview that he had direct knowledge of the operation and that the technology for disabling the radars was supplied by Americans to the Israeli electronic intelligence agency, Unit 8200.'"