Archive for July, 2012

ASA vs DEA

I received a letter this AM with an important development in the ASA vs. DEA case.. Here it is in part from Steph Sherer Executive Director ASA..DD:
Late last week Americans for Safe Access (ASA) got some exciting news: the United States Court of Appeals for the D.C. Circuit agreed to hear oral arguments in Americans for Safe Access v. Drug Enforcement Administration. Ten years after original rescheduling petition was filed, the courts will finally review the scientific evidence regarding the therapeutic value of cannabis!
……………Last year, we appealed the Administration’s decision to deny our nine-year old rescheduling petition, knowing that the courts could still choose not to hear our case. The decision to hear oral arguments is huge. This appeal may lead to the first evidentiary hearings of the medical value of cannabis since 1994 – and a lot has happened since then!
………….ASA can make this happen. We have a strong legal team and recognized expertise in the field. We also have a comprehensive plan to use media, legislation, and strategic grassroots organizing to get the most out of this lawsuit……………
Victory on this front would literally be the turning point for safe access to medical cannabis nationwide! We can fight this fight and win – if people like you support the effort. Thank you for helping make it happen…………
Steph Sherer

Regarding U.S.A. Police or other officials of ‘authority’.

Not everything that agents of the FBI, the Department of Homeland Security, or local law enforcement decide to tell you is actually true. Not everything that they suggest that you do is actually a good idea.

Before you interact with any agents of the government, it is essential that you know your rights.

The National Lawyers Guild has a fantastic know-your-rights booklet available for download called “You Have the Right to Remain Silent” here:http://www.nlg.org/resources/know-your-rights/

The ACLU Nationwide has a fantastic, regularly updated “Know Your Rights” page with downloads here:http://www.aclu.org/drug-law-reform-immigrants-rights-racial-justice/know-your-rights-what-do-if-you

Iran nuclear facilities struck down by midnight ‘thunder’

via zdnet news

AAP
Michael Lee

By AAP and  |

Iran’s nuclear program has been hit by a cyber virus that has shut down key computerised functions at two facilities and played music by the rock band AC/DC at loud volumes, according to a report oninternet security website F-Secure.

The website earlier this week said that it was informed of the cyber attack by a scientist working at the Atomic Energy Organisation of Iran (AEOI), who sent F-Secure an email detailing the breach.

F-Secure had confirmed the email came from within AEOI.

The email said: “Our nuclear program has once again been compromised and attacked by a new worm … The automation network and Siemens hardware were attacked and shut down. I only know very little about these cyber issues as I am [a] scientist, not a computer expert.

“There was also some music playing randomly on several of the workstations during the middle of the night, with the volume maxed out. I believe it was playing ‘Thunderstruck’ by AC/DC.”

The two facilities in question are the Natanz facility, which was the target of the Stuxnet attack, and a facility located near Qom, Iran.

Iran’s cyber security experts working on the issue wrote to scientists, stating that they believe the attacker had access to the facilities’ VPN and had used the popular open-source exploitation framework Metasploit to gain access to its systems. Metasploit itself enables computers to be scanned, mostly autonomously, for known vulnerabilities, making it an easy way for attackers to infiltrate systems without necessarily understanding how the exploit works.

Iran’s nuclear program has been a frequent target of cyber attacks, which the country’s leaders have blamed on Israel and the United States.

Topics: SecurityMalware

About 

 

Michael Lee covers a gamut of news in the technology space from security and infrastructure to Government initiatives.

 

Kick off your day with ZDNet’s daily email newsletter. It’s the freshest tech news and opinion, served hot. Get it.

Related Stories

Talkback

4comments
Log in or register to join the discussion
  • They need to use safer software

    Why do they still use windows?
    frank0-3f91e

    26 July, 2012 05:33

    • RE: Windows?

      Where in the does it say what operating system they use? Nowhere
      edkollin

      26 July, 2012 17:50

      • it doesn’t, but name an alternative OS that allows

        a trivial breakin from metasploit (reference in the linked article).

        Last time I checked, all metaspoit aimed at was Windows.

        jessepollard

        29 July, 2012 11:48

  • Flagrant Theft Of Intellectual Property?

    Did AC/DC’s record company give permission for this use of their Intellectual Property? Or will they now have to sue the spooks?
    ldo17

    26 July, 2012 05:47

Do You Believe In Coincidence? Aurora Shooting Leak

 

This music video was released 4 days before the incident in Aurora. The song is pretty terrible though so if you want to see for yourself and don’t want to suffer through 4 minutes skip to the last 30 seconds or so of the video.

.Leak Video Below.

Did Your Brain Make You Do It?

By JOHN MONTEROSSO and BARRY SCHWARTZ

ARE you responsible for your behavior if your brain “made you do it”?

Cam Floyd

Often we think not. For example, research now suggests that the brain’s frontal lobes, which are crucial for self-control, are not yet mature in adolescents. This finding has helped shape attitudes about whether young people are fully responsible for their actions. In 2005, when the Supreme Court ruled that the death penalty for juveniles was unconstitutional, its decision explicitly took into consideration that “parts of the brain involved in behavior control continue to mature through late adolescence.”

Similar reasoning is often applied to behavior arising from chemical imbalances in the brain. It is possible, when the facts emerge, that the case of James E. Holmes, the suspect in the Colorado shootings, will spark debate about neurotransmitters and culpability. Continue reading

BIOS hacking

A BIOS lock is removed in less than a minute. 1. Open the case 2. Remove jumper 3. Power on/off pc 4. Place back jumper 5. BIOS ‘lock’ gone.

How to use Smartphone apps to manage your Loyalty Program

Punch cards, plastic cards on your key ring and loyalty cards may soon be a thing of the past. New Smartphone apps are not only going to replace them, they are also providing businesses with a ton of useful information about customers. Here is a look at a few loyalty-card apps that can help businesses attract new customers and reward their fans.

Cardstar allows users to register their cards and the bar-code information is stored on users’ phones. CardStar provides purchase data that helps business owners tailor promotions. So far more than 2 million consumers have downloaded the free app.

Cardagin targets mostly neighborhood businesses. Businesses can send daily coupons to individual customers, using information that each user has applied to Cardagin. The service can supply, for instance, a customer’s birthday or the type of sandwich he or she bought.

Checkout can be used as a loyalty card app or as a credit or debit app after users provide their bank card information. Businesses can keep tabs on loyalty members’ shopping activities and can offer promotions based on users’ ages, locations, and card activity.

Placepop offers location-based check-ins linked to a rewards card. Users can suggest rewards they would like to receive.

 

%d bloggers like this: