Home Blog Page 2192

NSA – Quantum Computing to Crack Encryption

44

Thursday July 24, 2014

Written by: FLU5CH

 

The internet uses and depends on a secure and uncrackable encryption method.

Without it people’s data could be easily seen, altered, traced and stolen including online purchases or money transfers. But there is no need to worry as this encryption is practically impossible to crack. The most common encryption method is RSA. RSA uses public keys and relies on the difficulty of computers to use a bruteforce type of method to keep on randomly trying different numbers until it gets the right one, the larger the prime number the longer the longer it will take a computer to get it correct. The prime numbers used in RSA range from 1024 to 4096 bits making the time to guess the answer near to infinite.Unbenannt

The RSA encryption method comes from how classical computers work, in a classical computer data is stored in electronicle states known as bits and is shown as either a 0 or a 1 each bit only stays in one state at any given time and this is what results in making brute force attacks considerably longer.

Now let’s talk about quantum computing, “the strange and counterintuitive behaviour of particles is used to encode and compute data sets”, quantum results such as super positioning states and entangled states to allow quantum computers to encode data in Qbits instead of regular bits. Qbits is basically a bit that can exists in multiple states at the same time allowing you to carry out multiple operations on the same bit. This allows the computer to now carry out mathematical algorithms.

Shor’s algorithm is an algorithm that allows the factorisation of prime numbers which cannot normally be done. This allows a cracking method that can much more easily crack any encryption method that relies on prime numbers.

The NSA’s $79.9 million program named “Penetrating hard targets” researches quantum computing and uses it to their expense. Currently the largest integer to ever be factorised with a quantum computer was 143 in 2009 by Nanyang Xu at the University of science and technology of China in Hefei. Whilst this is a long way from cracking a 1024 bit system it is practical that the NSA with all their time and money could make this happen a lot sooner than expected. In the future we will find out if the NSA manages to build a quantum computer and if they manage to crack a 1024 bit system.

Related articles:

NSA can spy on 98% of the world: http://anonhq.com/nsa-can-spy-on-98-percent-of-the-world/

Hackers create NSA spying kit: http://anonhq.com/hackers-recreate-the-nsa-spying-kit-using-junkyard-items/

The Inglorious Fruits & Vegetables – a Glorious Fight Against Food Waste

9

Wednesday July 23, 2014

Now you can eat five inglorious fruits and vegetables per day. As good as normal fruits, but 30% cheaper. The “Inglorious Früchterds” (Fruits & Vegetables) is a glorious fight against food waste. An amazing idea.
Watch yourself how it works:

Read More: http://www.trueactivist.com/the-inglorious-fruitsvegetables-all-supermarkets-should-do-this/

Government Caught Allowing Federal Informants to Continue Crime Spree

20

Wednesday July 23, 2014

Written by: 4symm3tr1c

In 2005, the government began an investigation into a fraudulent leasing scheme that led to the late 2007 indictments of Brickbanc executives Kirk McMahan and Adam Stuart Zuckerman, both of whom plead guilty by early 2008. But while both became federal informants, neither was willing to give up the easy money of fraud, and by 2009 the government was actively trying to protect their star witnesses by covering up their ongoing crimes.

Because of their immediate guilty plea in what the FBI had dubbed “Operation Lease Fleece,” and their willingness to provide substantial information to help convict their codefendants, both McMahan and Zuckerman were able to avoid prison until the last of the ongoing cases were accounted for. This put them on the street, under probation, and supposedly under the watch of US Deputy Attorney General Jennifer L. Waier and the Santa Ana FBI. Of the 23 indictments handed out, less than half had been resolved by 2011, four years after the fact, and six years after the investigation had been opened. While those cases were awaiting resolution, Waier refused to bring any additional charges against her witnesses, and as a result, they didn’t hesitate to break whatever laws they felt were inconvenient, or would prevent them from profiting at others’ expense.

Shortly after he was indicted, but before pleading guilty, Zuckerman began calling himself by his first and middle name (Adam Stuart) and Kirk McMahan simply changed the final “a” in his name to an “o” (Kirk McMahon). This allowed them to operate in the financial world without anyone knowing that they were felons, with convictions for defrauding financial institutions for personal gain.

A month prior to the official indictment, Zuckerman registered a corporation by the name of Amidah LLC, in Wyoming. Because of their laws governing corporate disclosure, Wyoming corporations do not need to make public their owner. Also registered in Wyoming, on the same day, was Page 10 Ventures (to his business associate Ryan Page), Shared Success, LLC, The X Banker, and later that year, Venture Pharma, LLC. Again, these moves allowed Zuckerman and McMahan to reenter the financial world without drawing attention to themselves, or alerting anyone to their criminal past.

The X Banker quickly entered the market Brickbanc had once occupied, claiming to secure loans for small businesses. But this time, instead of defrauding the lenders, the small business’ themselves were the target. Seeking loans and credit, and promised a money back guarantee, nothing was delivered except bills and excuses. None of the businesses received a refund, nor did they receive the funding they were assured X Banker could negotiate. On August 11th of 2009, Thomas Mrozek of the Department of Justice received an email containing information that Zuckerman had changed his name and was once again, committing fraud.

Also in 2009, McMahan and Zuckerman promised to raise several million dollars in funding for a protein powder company marketed towards the Crossfit market, called Progenex. As with all of the other businesses they promised to obtain funding for, they never came close to holding up their end of the deal. But this time, they had a contract that gave them equity, which provided them a steady revenue stream, instead of the constant turnover of dissatisfied clients.

The founder of the company walked, leaving it in the hands of the Lease Fleece felons, plus their new accomplices, Aaron Thomas and Ryan Page – wisely chosen to be the public faces of the company, due to their clean criminal records (a fact that is likely to change). Almost simultaneously, the Internet seemed to be exploding with revelations about who was running Amidah, Mercury Ventures, X Banker, and Progenex. Online, they were being exposed badly…which led them to their next criminal venture: the purchase of an illegal SQL Injection code, which would allow them to remove entries from sites like RipoffReport.com. At this point, they entered the reputation management business through the purchase of the code and the attempted purchase of a company called Rexxfield. To insure the success of their venture, they also entered the defamation business, using a variety of fake accounts to post poor reviews and attacks on various businesses, then contacting them afterwards, to offer their reputation fixing services.

On August 24, 2010, FBI Special Agent (retired) Richard Kincaid met with FBI Special Agent Paul Bonin, where he disclosed evidence of an ongoing criminal enterprise that he had gathered against Zuckerman and McMahan. On September 3rd, ,Kincaid turned over the physical evidence that substantiated his claims. Shortly thereafter, on September 22nd, journalist Glenn Puit sent a letter to USDA Waier. Deputy Attorney General Waier and the FBI still needed their cooperating informants, and despite overwhelming and incontrovertible evidence that they were violating their parole and running an ongoing criminal enterprise, the government took no action to revoke either of the defendants bonds or to bring further charges to the conditions of their release. Most of the original defendants still had ongoing cases, and it would destroy the credibility of the government’s witnesses to throw them in jail for crimes committed after the original indictment. Zuckerman and McMahan carried on with their various enterprises, secure in the knowledge that the government would do literally nothing to stop them, regardless of how overt their crimes.

In August of 2011, during McMahan’s initial sentencing hearing, a group of victims to his post-Lease Fleece crimes attempted to speak to the court. At that point, US Deputy Attorney General Jennifer Waier addressed the court, saying that the current victims had no standing to be heard. and asked that the judge ignore them, adding that their claims were unsubstantiated. This was over two years since she first became aware of McMahan and Zuckerman’s ongoing crimes. Because the judge wanted hear the new victims, sentencing was postponed, and Waier was put in charge of calling the witnesses at the postponement date. Instead, she successfully filed opposing motions to prevent them from being heard. She followed this up with a sealed motion that remains sealed to this day.

Numerous small businesses were illegally defrauded; they lost substantial sums of money, never received the financial outcome they were promised, and were denied the refund they had been guaranteed. The prosecuting attorney in the case, the Department of Justice, and federal law enforcement allowed it to happen. At their sentencing hearings, Ms. Waier talked about what “changed men” Zuckerman and McMahan were…conveniently leaving out all of the crimes they’d committed under her watch. Both ultimately served very little time.

They’d gotten away with everything, and it had been covered up successfully.

Until a couple of weeks ago, when Ben Smith, the District Attorney for SAC County Iowa, filed an application for a search warrant on a seemingly unrelated case. Although it is not the focus of the application, per se, and while addressing the case it directly relates to (a murder and witness intimidation), the scope of the warrant necessarily reveals the Zuckerman/McMahan crimes that had been ignored for years by law enforcement employees and agencies in California.

Those familiar with the case expect criminal charges to be leveled at most of the people named in the warrant application, as well as their unnamed (but known) accomplices. The only remaining question is whether the cover-up will be brought to light, and if so, will those who assisted in the commission of the various crimes at hand, by refusing to prosecute them, find themselves facing similar charges?

 

Links:

http://www.justice.gov/usao/cac/Pressroom/pr2007/141.html

http://www.leasingnews.org/PDF/KirkAMcMahan.pdf
http://leasingnews.org/PDF/McMahan_exhibitsA.pdf
http://leasingnews.org/PDF/McMahan_ExhibitsB.pdf

http://www.scribd.com/doc/233387848/Application-for-Search-Warrant

Hackers hijack Wall Street Journal’s Facebook account, posting crash reports of Air Force One

35

Tuesday July 22, 2014

Written by: Overlord

 

Unknown hackers managed to hack into the Facebook account for the Wall Street Journal and subsequently post crash reports regarding Air Force One, causing mass confusion among the United States. This was especially believable since it is following the recent shooting down of Malaysian Airline’s MH17 in the same area.

The Air Force One is the official air traffic control call sign of the United States Air Force aircraft carrying the President of the United States. AKA The Air Force one is the airplane designed and used for the purpose of transporting the President of the United States.

2nR5eFQ

The hackers’ first post stated that, “US Air Force One crash feared as air traffic controller loses contact with pilot over Russian air space,” scaring and confusing millions.

They later put news that Vice President Joe Biden of the United States would be addressing the nation in 15 minutes, further confusing and scaring the people of the United States.

The Wall Street Journal later deleted the fake posts and said that the posts were indeed fraudulent in an apology post. Some criticized the organization for having the simple password of “newyorktimes”

This is a very good example of the power and impact that social media has on our lives. Had these posts been made during trading hours there could have been a much different and much more severe consequence.

Four Palestinian children killed on Gaza beach by Israeli rockets

21

Tuesday July 22, 2014

Written by: Overlord

 

Four Palestinian children were killed while playing football on Gaza beach by rockets fired from an Israeli plane targeting Hamas militants. Numerous journalists witnessed the tragedy.

“This is a cowardly crime,” said Ashraf al-Qidra, spokesman for the Gaza Health Ministry.

The children were named Ahed Atef Bakr, Zakaria Ahed Bakr, Mohamed Ramez Bakr, and Ismael Mohamed Bakr. Mohamed Ramez was age 11, Ahed Atef and Zakaria Ahed were age 10, and Ismael Mohamed was age 9. The four boys killed were relatives and there is one more boy in the hospital.

“The kids were playing football on the beach,” said Ahmed Abu Hassera, who witnessed the horrific incident.  “When the first shell hit the land, they ran away but another shell hit them all. It looked as if the shells were chasing them.”

“We live by the coast. There was a headline on the news that four children were injured…  so we went looking for the kids and we could not find them, so we came  here to the hospital to look for them and we found them all, including my son… oh my God,” said the father of Zakaria to NBC.

mideast-israel-palestinians

The Israel Defense Forces (IDF), who have been targeting Hamas terrorists in the Gaza area, have denied targeting the children. “We do not target civilians,” said IDF representative Peter Lerner to RT, “we target Hamas terrorists. I have seen the footage of the incident, and indeed it does look tragic, and we will have to look at the circumstances.”

At first, the shots were believed to have come from a gunboat, but according to senior IDF officials the shots came from Israeli planes targeting Hamas militants, as told to Israel’s Haaretz Newspaper.

The number of Palestinians killed by the Israeli counter-offensive has become 220, 80% of which that have been civilians and one in every five Palestinians killed is a child.

Israeli forces have been dropping leaflets in the area and placing automated calls to Palestinian homes urging them to evacuate.

“Whoever disregards these instructions and fails to evacuate immediately, endangers their own lives as well as those of their families,” said the messages.

Human Rights Watch has condemned the actions of the Israel Operation, Protective Edge. The chief of the Human Rights Watch, Ken Roth, stated that the warnings serve as a waiver for further atrocities against human life.

Despite these warnings, most residents of Gaza either have nowhere to go or choose to stay in their homes as a show of defiance against Israel.

The ceasefire between Israel and Hamas ended after the Palestinians rejected Egypt as their mediator.

Israel began their counter-offensive early on Tuesday following the firing of 85 rockets at Southern Israel on July 7.

As a result of this rocket barrage, the IDF has said that a ground invasion of Gaza is now “likely.”