"Soldiers have cameras on their rifles or helmets, but that's only half the equation. They don't recognize anything," said ACAGI CEO Peter Spatharis. "If our system sees somebody it knows, it tells you, and it tells others so quick decisions can be made."
WeeBits Buzz will contain Blogs for both the consumer and professional. Blogs that make you think.
Wednesday, September 27, 2006
CNN: Searching for an Unfriendly Face
"Soldiers have cameras on their rifles or helmets, but that's only half the equation. They don't recognize anything," said ACAGI CEO Peter Spatharis. "If our system sees somebody it knows, it tells you, and it tells others so quick decisions can be made."
Introducing the Online Meth Registry
Approved
Illinois
Minnesota
Montana
Tennessee
Proposed
Georgia
Maine
Oklahoma
Oregon
Washington
West Virginia
Read at the following websites:
Friday, September 01, 2006
Social Engineering
Wednesday, August 30, 2006
Terms of Service and Our First Amendment Rights
Saturday, August 12, 2006
Our Schools are Deplorable
Friday, August 04, 2006
Iowa Supreme Court upholds HIV-spreading conviction
DES MOINES, Iowa (AP) -- A man convicted of having unprotected sex with four people while knowing he carried the virus that causes AIDS was denied appeals Friday by the Iowa Supreme Court.
The court said Adam Donald Musser, who is serving 50 years in prison for criminal transmission of HIV, deserved a long sentence because intentionally exposing someone to the virus "is just like the first-degree robber who attempts to inflict serious injury on his victim."
read rest here ...
CNN: Iowa Supreme Court upholds HIV-spreading conviction
Iowa has good sense. The only way to stop the spread of this in the USA is to hand over a long sentence for exposing someone to the virus, after they had already found out they had the deadly and very costly disease and then upholding the conviction. Being firm is the way to handle this. This has nothing to do with free speech or the pursuit of happiness. It has to do with the protection of the public.
Wednesday, July 19, 2006
Top Stories: US : Confirmed: Hezbollah Terror Operatives, "Sleeper Cells" Poised in the U.S.
17 July 2006: Operatives of the Lebanese Islamic terrorist organization Hezbollah, the same group presently firing missiles into Israel and labeled as one of the most dangerous Islamic terrorist group in the world, are believed "to be planning to activate sleeper cells located in New York and other larger cities inside the U.S." to stage attacks Americans. "The FBI and Justice Department have launched urgent new probes in New York and other cities targeting members of the Lebanese terror group." Law-enforcement and intelligence officials stated that "about a dozen hard-core supporters of Hezbollah have been identified in recent weeks as operating in the New York City area (alone)."
Sunday, July 02, 2006
House vote slaps news organizations
Thursday, June 29, 2006
UFO buffs say official denial 'alien to us'
Case closed for alien aficionados? Not so.
Far from alleviating UFO buffs' suspicions that governments are concealing what they know, the report has intensified them.
"I just e-mailed the MoD explaining my disgust at their latest UFO report," an Internet UFO forum member wrote, saying the Ministry was in denial. Click below to read more at CNN.
Monday, June 26, 2006
FreeNode was Hijacked here is freenodes response.
[11:29pm:51] <+alex323> What are the consequences for those found responsible?
[11:33pm:43] <@HedgeMage> emes: are you ready?
[11:50pm:21] <+nenolod> m_services.c says:
[11:50pm:21] <+nenolod> if (IsHoneypot(sptr) || !(acptr = find_person(NICKSERV, NULL)))
[11:50pm:21] <+nenolod> so does /quote NickServ really provide any real protection?
[11:50pm:23] <+nenolod> and
[11:52pm:46] <+WhiteNoise> You mention that you believe that < 25 users had their passwords compromised. How did you arrive at this estimate? How much confidence should we place in that low a figure?
[11:57pm:04] <+blackmanheartiez> DCC SEND welcome-our-new-gnaa-overlords 0 0 0
[11:57pm:06] <+blackmanheartiez> LOL
[11:57pm:07] <+blackmanheartiez> DCC SEND welcome-our-new-gnaa-overlords 0 0 0
[11:57pm:46] <+DosBubba> I would like to thank Freenode for taking the time to gather the whole of IRC, it has been our pleasure to take part in such a trolling opportunity.
[11:57pm:48] <+DosBubba> IRC was founded on the principles of trolling, and we thank Freenode from the bottom of our hearts for carrying the fine tradition into the 21st century - hopefully beyond.
[11:57pm:48] <+DosBubba> Remember: /server -m irc.vaccus.com -j #chat Attacks will continue if you don't join.
[12:04am:09] <+avillia> Also: <GNAA joke/plug>.
[12:08am:26] <+openbysource> long. take for example right now so many of us in the queue at freenode-social.
[12:10am:21] <+SushiGeek> Yes I do
[12:10am:24] * Astinus smiles
[12:12am:19] <+nf> Do you have any reason to believe that there may be an insider providing information to various outside parties, that could be a threat?
[12:13am:40] <+Teratogen> thanks
[12:14am:05] <@HedgeMage> Since most of these seem to be repeats, we're going to close for now. I'd like to reiterate that we encourage all concerned users to change passwords
Wednesday, June 21, 2006
People are giving up
Saturday, June 10, 2006
Microsoft Changes WGA Following Spyware Allegations
Monday, June 05, 2006
ways of protecting your identity
I am often asked what the surest way to protect your identity online, and on your computer? Answer: (Some wont like my answer) Don't go online. Or if this is not possible, restrict the websites and businesses to the amount of information they have on you online and offline. But still this is no guarantee that your identity will be safe. Greed and human error causes the most identity thefts.
The most safest of ways is for the Government to restrict access to our personal information. Plus those that do have access should be forced to protect our information better. I mean blunt force with the heaviest of fines imposed on those that don't. Perhaps even the loosing of a license to have our personal information on file is also in order? In other words you have to pay for a special license in order to have full access to certain information, plus inspections, and so on in order to store our personal information. If you don't pass inspection then you get no license, and if a surprise inspection is carried out and you fail, if you have these computers networked and online or even local, they must be shut down, or taken off the net, fixed and pass a inspection before you are allowed to go back online. Plus all of the special licenses are public, so that way a person can check the data base and know exactly what the business can ask for, and have a public record of their inspection. This will get rid of quite a bit, or all the fraud going on I believe. Also anyone with access with your personal information should not have a personal license to handle your information if they have been convicted of any crime, or have debts, or any type of lean against them. They must be in good standing. This should be across the board in good standing regardless if they are local or political figures, or Government, etc. They have to be completely biased. Plus carry their own license in order to run their business handling your personal information.
I was told this wouldn't work because it was time consuming. Horse chit! It's our information that we are loosing. Our lively hoods going down the drain. We should be protecting it at all cost.
Friday, May 05, 2006
Everyone Wants to 'Own' Your PC
You own your computer, of course. You bought it. You paid for it. But how much control do you really have over what happens on your machine? Technically you might have bought the hardware and software, but you have less control over what it's doing behind the scenes.
Using the hacker sense of the term, your computer is "owned" by other people.
It used to be that only malicious hackers were trying to own your computers. Whether through worms, viruses, Trojans or other means, they would try to install some kind of remote-control program onto your system. Then they'd use your computers to sniff passwords, make fraudulent bank transactions, send spam, initiate phishing attacks and so on. Estimates are that somewhere between hundreds of thousands and millions of computers are members of remotely controlled "bot" networks. Owned.
Tuesday, April 18, 2006
Computer Spyware Protection Act - Million of Dollars in Fines, Surreptitious Computer Techniques a Whole New Can of Worms For the Consumer to Worry About.
Ben Fenwick
Get ready for Microsoft, cable and phone companies, and quite a few other people to know a lot more about what you do on your computer
It's supposed to protect you from predators spying on your computer habits, but a bill Microsoft Corp. helped write for Oklahoma will open your personal information to warrantless searches, according to a computer privacy expert and a state representative.
Called the "Computer Spyware Protection Act," House Bill 2083 would create fines of up to a million dollars for anyone using viruses or surreptitious computer techniques to break on to someone's computer without that person's knowledge and acceptance, according to the bill's state Senate author, Clark Jolley.
"The bill has a clear prohibition on anything going in without your permission. You have to grant permission," said Jolley, R-Edmond. "You can look at your license agreement. It will say whether they have the ability to take that information or not."
But therein lies the catch.
If you click that "accept" button on the routine user's agreement, the proposed law would allow any company from whom you bought upgradable software the freedom to come onto your computer for "detection or prevention of the unauthorized use of or fraudulent or other illegal activities in connection with a network, service, or computer software, including scanning for and removing computer software prescribed under this act."
That means that Microsoft (or another company with such software) can erase spyware or viruses. But if you have, say, a pirated copy of Excel - Microsoft (or companies with similar software) can erase it, or anything else they want to erase, and not be held liable for it. Additionally, that phrase "fraudulent or other illegal activities" means they can:
-Let the local district attorney know that you wrote a hot check last month.
-Let the attorney general know that you play online poker.
-Let the tax commission know you bought cartons of cigarettes and didn't pay the state tax on them.
-Read anything on your hard drive, such as your name, home address, personal identification code, passwords, Social Security number . etc., etc., etc.
"I think in broad terms that is still a form of spying," said Marc Rotenberg, attorney and executive director of the Electronic Privacy Information Center in Washington, D.C. "Some people say, 'Well, it's justified.' I'm not so clear that should be the case. Particularly if the reason you are passing legislation is to cover that activity."
The bill is scheduled to go back before the House for another vote. Will the Oklahoma House, on behalf of all computer users in the state of Oklahoma, click "accept"?
Where did you go yesterday?
Computer users first accepted updates when anti-virus makers, such as Symantec Corp. or McAfee, began back in the Nineties offering regular updates in an attempt to stay current with the alarming number of viruses introduced over the Internet. This was followed by Windows ME and 2000 allowing updates to their programs via downloads. By the time Windows XP came out, regular online updates became part of the product one purchased.
At around the same time, the Napster phenomenon pushed music corporations, courts and lawmakers into taking action against online file sharing of music. Hip, computer-savvy listeners traded pirated MP3 recordings beyond count, leading to action by the music industry to go on a search and destroy mission against the online music traders, even in Oklahoma. In 2000, Oklahoma State University police seized a student's computer containing thousands of downloaded songs after he was traced by a recording industry group.
Anti-spyware bill author Jolley said that's what people like the OSU student get for sharing their information online.
"You have to look at the other side of that issue," Jolley said. "When they agreed to put their files online, they literally agreed to allow people to come on their computers and search the files online. On a P-to-P (peer-to-peer) network, you are inviting other people to see what you have. That's a risk you run by participating in file share."
Jolley said his spyware bill is supposed to stop "phishers" from stealing one's identity off of one's computer, is supposed to stop "Trojan horse" viruses from being installed on the computer and is supposed to make illegal a host of other techniques for spying on a user's personal information.
"It prohibits them from taking things as basic as your home address, your first name, your first initial in combination with your last name, your passwords, any personal identification numbers you have, any biometric information, any Social Security, tax IDs, drivers licenses, account balances, overdraft histories - there is a clear prohibition on that," Jolley said.
Indeed, Sections 4 and 5 of the act specifically forbid anyone from doing so without the user's permission.
However, Section 6 of the act says such a prohibition "shall not apply" to "telecommunications carrier, cable operator, computer hardware or software provider or provider of information service" and won't apply to those companies in cases of "detection or prevention of the unauthorized use of or fraudulent or other illegal activities."
Which means software companies updating a user's software or the cable company monitoring that user's activities on a broadband modem hookup can turn over that user's history of writing hot checks to the district attorney if the company feels like it, said Rotenberg.
"You go back to the old-fashioned wiretap laws," Rotenberg said. "There was an exception to allow telephone companies to listen in on telephone calls. The theory was that it was necessary to make sure that the service was working. Part of what's going on here is to significantly expand that exemption to a whole range of companies that might have reason for looking on your computer. The statute will give them authority to do so. I think it's too broad. I think the users in the end need to be able to allow that themselves."
Jolley insists his proposed law would not allow Microsoft, Symantec or Cox Communications to become "Big Brother."
"The goal of this is not to allow any company to go through and scan your computer," Jolley said. "If they are, it has to be for a specific purpose. If you don't want them doing that, don't agree to (the user's agreement)."
Which means, when a user accepts Microsoft's Windows operating system on that new computer, or Norton AntiVirus, or Apple's operating system or a host of other online-upgradable programs, that user agrees to being watched by the company.
Who on Earth would write such a law? It wasn't Jolley, or anyone in Oklahoma.
To read more of "The Watchers," pick up a Gazette.
MOUTHING OFF
"Now we are talking about Microsoft having the freedom to check your computer for any sort of illegal or fraudulent activity you might be participating in. Without your knowledge or consent. It is giving up your rights to privacy."
-State Rep. Mike Reynolds, R-Oklahoma City, about House Bill 2083. The bill gives software or online access companies freedom, without liability, to erase spyware and pirated software from users' computers, in addition to monitoring for fraudulent or illegal activities. ""
EVEN MORE MOUTHING OFF
Wednesday, March 22, 2006
IRS plans to allow preparers to sell data
Wednesday, March 15, 2006
Torn-up Credit Card Apps Not So Safe... Shredders are not either
Saturday, March 04, 2006
Project SERPO
Project SERPO has a website that claims that the USA is very much involved in ET research, and discovery. So much involved to where the USA launched in a UFO 12 military personnel to go to their planet stay for 13 years then come back to earth. Two of these personnel died on their planet. Two did not return to earth. Reasons were not given for them not returning. Is this all myth? A story that a few concocted to get attention? Or is this all for real?
If it is for real. I don't believe planet earth is in any danger. If we was, we would of met that danger many years ago when the first UFO reports, and pictures hit the news stands, and book stores. The postings on Serpo, are very intriguing. You have many military personnel, and even some top dogs stating that they can account for certain parts of other post being true because either their dad was there, or they was there, and or they had seen first hand this evidence. Some it seems to have come out of the closet so to speak, to now recount certain stories their dads told them, or other family members about ETs, and UFOs, and the Serpo project.
You have to visit Serpo and read through this. If your thinking maybe that this is all ludicrous and not worth your time or effort. Have a open mind. All the evidence is there, you can do your own research and decide on your own if there is any truth to it.
Below is a excerpt from American Chronicle Article
THEN AND NOW
The Project SERPO information, whether accurate or inaccurate, might make us think about the brave and dedicated people in our military, intelligence and scientific communities.
If extraterrestrial craft did crash in New Mexico in 1947, it would have posed a tremendous shock and worry for our national security authorities. If they did establish positive diplomatic relations with these visitors and an exchange program, that was quite an accomplishment.
If any of this is true, many people wonder about what has happened in the decades since. The reports of the U.S. acquiring advanced technology make sense. The secrecy surrounding the situation also makes sense.
What other information and experiences were gained by Americans involved in these kinds of programs? Did we stay on a moral and spiritually sound path in dealing with visitors from another planet?
The information on the serpo.org Web site and from many other sources gives us a few clues on these and other questions. If Anonymous and his friends and associates continue to provide us with more information, we can continue to think further about these kinds of ideas and concepts.
Again, whether true, false or partially true, these accounts of an alleged program like Project SERPO can help us grow as human beings and help us gain a better perspective on the dangers of our own making that we face.
If the stories are true, we could also learn more about the way physics, time and Nature function. We might learn about possibilities for further human development, our place in the Universe, Heaven and the mysteries of a Great Spirit.