I will have to update my tool box this weekend.
Always exciting to get updates to the old stand-by’s.
So Mr.Assange has declined to surrend him self at this time. This should not be seen as a insult to the local police and the order, at this point the international law would take precedence. Once Ecuador has reviewed this application he will either leave or stay. If he stays he might never leave the embassy, and there is no way for the embassy to get him legally out of the country. Once he leaves the grounds he can be arrested. The other alternative is that he lives in the embassy for a really long time, years to decades.
Technically they could try and close the embassy then he could be taken in to custody.
The implications of this could be bad.
The short version is that they use cheap equipment ( sub $1,000 ) to create a fake GPS signal to confuse the drone. This could range from crashing it in to something like a building or the ground or misleading it to another zone for combat.
Civilian GPS is no encrypted, I wonder how well the military version is?
A NZ judge has ruled that the search warrants used to raid Mr.Dotcoms home were invalid. It seems that the warrants were too vague when it came to the material they were searching for.
The judge also ruled that the copy of the data that was taken was also unlawful.
I am very unsure of how all of this is supposed to play out?
Megaupload was not a US company or is Mr.Dotcom a US citizen, so I don’t get how he is being charged with breaking US law? The whole intent may have been to just destroy the business and him.
Mandiant has added a new tool to their repository.
It’s a memory analysis tool for Macs.
I can’t wait for an excuse to use it for something constructive. You will find tools like this extremely useful when investigating issues of possible infections or strange behaviour.
Fun little framework to play with.
I usually prefer *nix based tools but it’s always good to have a spare around.
Most interesting thing I have seen on this topic in a long time.
For quick reference here is the software he is using.
My spare machines never had a video card that was capable of running this, but I think I will see if I can get a hold of a card just to play around with it.
The performance comes from the architecture of the video card, it goes for parallel processing which just happens to work very well for making lots and lots of hashes at the same time.
A couple of the accused members have pleaded guilty, my thoughts are there was some sort of deal. But you never know if they did not want to have to go through a trial. It could also have implications on sentencing, making the difference between months and years.
Ryan Ackroyd’s evidence will take over 3,000 hours to review alone.
This happens far more then is reported.
Surprisingly Chinese government authorities have assisted with the investigation, typically this can be very difficult to have international law enforcement cooperate with issues like this.
I don’t think it’s surprising to hear that it was a government behind the development of the Flame malware. What I am shocked to hear is that there is sources directly confirming this.
This is a direct attack by governments against another government. In the non-cyber would this would be a full scale conflict at this point. Also considering the US governments official response to some form of cyber attack would be kinetic.
I have to wonder if there is some sort of response from Iran, do they have the ability to respond? Would they? Why is there no heated political response from Tehran?
Personally I think these kinds of activities have been going on for well over 5 years at least.