David Westerfield

Gospel. Culture. Technology.

Category: Security Page 1 of 4

Cold War Redux

Cold War Redux http://www.youtube.com/watch?v=3iIgesHH9fg (New Russian ICBM test-fired) … I mean there are more spies in this country now than at the height of the Cold War after all http://www.cbsnews.com/8301-18560_162-57431837/more-spies-in-u.s-than-ever-says-ex-cia-officer/ … sending a message to the US/European/NATO alliance? Still makes me wonder if the real geo-political chess battle is merely East versus West and the Middle East has always just been caught in the middle. We have a NATO missile defense shield in Eastern Europe, we have bases in Iraq, Kuwait, Afghanistan, Kazakhstan, Turkey(?) to the south of Russia. Iran, China and Russia are regularly meeting, trading arms, having joint governmental conferences. Russia has been doing war games exercises near the arctic circle recently. Two Russian subs were spotted off the Atlantic coast last year doing reconnaissance. It has been reported that Russia is sending arms to Syria. If you want to see what is really going on in the world, you forget what the leaders say and watch what they do.

Nationally Renowned Law Scholar Jonathan Turley on Surveillance, Civil Liberties and Privacy Issues

Before going into this, it should be noted Christ is the sovereign King who rules all governments by the power of His word, including ours. These things are not happening in a vaccuum apart from Him. With that noted, it is also important to note that Christ has given us means and tools at our disposal to influence and change government for the benefit of all. Benjamin Franklin had this to say when asked what kind of government was being formed. Franklin replied, “A republic, if you can keep it.”

Our freedoms are being eroded right before our eyes as the nation is enthralled with the likes of the Kardashian’s, obsessed with football, or we have just stuck our heads in the sand either willfully or through pure ignorance. This is no different than the Roman population being distracted with circuses, gladiatorial sport and bread before the empire succumbed to the Visigoths sacking Rome in the fifth century. This entire clip is worth watching for every American, left right, Democrat, Republican, whoever. One smart man.

“A great civilization is not conquered from without until it has destroyed itself from within. ” – Ariel Durant

Dr. Jerome Corsi Speaks of ‘Global New Deal’ Being Forged

Part 1:

Read More

The Dawn of the Nanny State

Mom told she can’t watch friends’ kids – UPI

Found on Drudge Report:

Take it!

Take it!

Stop it!

This was not a drill … they used these LRAD sound weapons on the protesters at the G20 meeting in Pittsburgh … this is one such clip of its actual use:

The Global Illicit Economy

Eisenhower’s Farewell Address – 1961

Text (Archive) – MP3 (Archive) – Video

Our Computing Environment is Already Compromised

“The former cybersecurity director at DHS had some sobering words last week about the battle for cybersecurity. ‘We lost,’ the former director, now chief executive officer of NetWitness Corp., said at the Symantec Government Symposium in Washington. ‘We lost the cyber war over the last 15 years. Our computing environment is already compromised,’ and things are likely to get worse going forward because we do not really understand security. ‘We lack any meaningful metrics or measures to say how secure a system is.’ It no longer is true that the best minds are on the side of the hackers. The dark side of cyberspace has been co-opted by organized crime, entrepreneurs of questionable integrity and, possibly, terrorists. Much of the process of illegal hacking has been mechanized to the point that it involves automation, not innovation. Part of the problem was identified by the U.S. Computer Emergency Readiness Team director. ‘We lack a common language for discussing many of the elements of security. We need to reinvent not only how we do incident response, but how we talk about events,’ the director said at the symposium.”

A Certain Someone Got Schooled

Disturbing Actions in London – Radical Islam Rearing Its Head

http://www.aomin.org/aoblog/index.php?itemid=3079

If you want to see a picture of the future of Europe, then read this and watch the video. It is disturbing to say the least and has some cursing and violence in it so proceed with caution … just warning you in advance.

I post this because the video is such a very clear portrayal, from Muslims themselves who shot it during some recent riots in London, of the threat we face in the short and long term, and the impotence of the West to deal with the threat brewing from within its own borders. It apparently does not take much for a Muslim to go from moderate to radical. This video makes that abundantly clear.

“A great civilization is not conquered from without until it has destroyed itself within. The essential causes of Rome’s decline lay in her people, her morals, her class struggle, her failing trade, her bureaucratic despotism, her stifling taxes, her consuming wars.” – Will Durant on the history of Rome

May we learn from history. Rome was great … and it fell

Major DNS Internet Server Flaw – How it Affects the Average User

(Original): http://www.breitbart.com/article.php?id … _article=1
(Archived): http://www.westerfunk.net/archives/secu … et%20flaw/

(Original): http://isc.sans.org/diary.html?storyid=4780
(Archived): http://www.westerfunk.net/archives/secu … ervations/

Most of you will more than likely have no clue about this major flaw unless you read any of the tech headlines. Even then, there really should be no reason why you would know about it, or why it is important to you. But the consequences of this giant hole, if the internet servers are not patched, could potentially be devastating. And I would like to try and explain, to the average user, why this is a not a small problem by any stretch of the imagination. I emphasize the word “try” because I’m attempting to break the language down and make it easier to understand.

The flaw has to do with the internet servers you may have heard of called DNS servers. DNS stands for Domain Name Server. DNS servers function as a hostname to IP address resolver (e.g. www.google.com translating to 64.233.167.104, for arguments’ sake). So instead of looking up Google’s home page using an IP address (64.233.167.104), you enter in a name you can remember and it points to that particular IP address for you (www.google.com). That is a very simple description, but it will suffice to explain the issue at hand.

In comes the flaw: a hole exists within the widely used open source (i.e. free) DNS server software called BIND that allows an attacker to poison its DNS cache to change the hostname from it’s original IP to a different one. You say to me now, “what the … what are you saying?”

Let me try to explain. Whenever you look up www.google.com using your Internet Service Providers’ (ISP’s) DNS servers, that lookup request stays within the DNS server for a specified amount of time so it doesn’t have to keep looking up the IP address over and over again. The lookup request gets “cached” (or saved temporarily) in the servers’ memory. Basically, it makes the look up process much faster for you.

With that said, here’s the vulnerability: because of the hole that must be patched, hackers can currently insert or change www.google.com to point somewhere it was never intended to point. That’s a big problem.

And it only gets worse. A majority of us use the DNS servers provided by our ISP’s (e.g. AT&T, Charter, Verizon, etc.) who themselves use BIND (remember … the DNS server software?) to serve up DNS requests to users. Most of these ISP’s – yes, most – have YET to patch their servers and they remain highly exposed and vulnerable to, well, a massive attack by hackers.

Now here is how the attack would look from the average users’ point of view to, say, a banking site: you look up www.wellsfargo.com, get a page that looks like Wells Fargo’s, using their hostname even (ya know, www.wellsfargo.com). Yet you are pointed to (as an example) a foreign IP address to, oh, say, in Latvia. The fake Wells Fargo site employs the standard phishing tactic of asking you for your personal information to “verify” your identity. You input your information thinking it is your bank’s website. Yet all you are doing is giving your personal information to some hacker in Latvia who can then drain your account and steal your identity ultimately.

In all reality, this is a cyber national security threat, as our core DNS infrastructure remains highly exposed and ultimately could, in a worse-case scenario, hit the economy because of rampant fraud. Don’t think this could happen? Well, it’s likely ISP’s see how big the threat is now and are working vigorously to get their servers patched.

But, nevertheless, we should all take a sober look at what happened to OmniAmerican Bank within the past year (Archived) as an example of how the unforeseeable can happen, because there are people who are smart and determined enough to make it happen – even in a short amount of time.

Page 1 of 4

Powered by WordPress & Theme by Anders Norén