Article: Cybersecurity Threats: What Are DDoS Attacks and How Can You Avoid Them?

Advanced Cyber I/O, Cyber-Security, Software

Cybersecurity Threats: What Are DDoS Attacks and How Can You Avoid Them?

Cybersecurity threats have become more complex with time, with several factors such as integrated networks, multiple hosts, and extensive IT infrastructures contributing to this issue. Distributed denial of service (DDoS) is one such appealing strategy regularly deployed by hackers.

With people relying more and more on online services, it is now critical to improve our network security. By the end of 2020, major companies like PUBG, Blizzard, and Bitcoin were all hit by DDoS attacks [1]. The global pandemic has played a role in this increase because of less secure home environments [2]. Attacks became more complex and targeted organizations across different industry verticals.

Read full article

Article: Myanmar citizens find ways around crackdown on internet

Access, Advanced Cyber I/O, Autonomous Internet, Governance

File picture: PexelsMyanmar citizens find ways around crackdown on internet

hundreds of thousands of protesters and citizens in Myanmar are finding different ways to communicate online, downloading tools to bypass censorship restrictions and turning to alternative media sources and underground networks, according to new research.

They have moved to a mirror site of Facebook on the dark web, used apps that rely on Bluetooth technology to continue messaging each other and turned to lesser known social media platforms to stay connected, according to Recorded Future Inc., a closely held cybersecurity firm based near Boston.

Read full article

Stephen E. Arnold: When A Cell Phone Is Like A Cattle Chip

Advanced Cyber I/O

Policeware vendors once commanded big, big bucks to match a person of interest to a location. Over the last decade prices have come down. Some useful products cost a fraction of the industrial strength, incredibly clumsy tools. If you are thinking about the hassle of manipulating data in IBM or Palantir products, you are in the murky field of prediction. I have not named the products which I think are the winners of this particular race.

The focus of this write up is the useful information derived from the deplatformed Parler social media outfit. An enterprising individual named Patri10tic performed the sort of trick which Geofeedia made semi famous. You can check the map placing specific Parler uses in particular locations based on their messages at this link. What’s the time frame? The unusual protest at the US Capitol.

Continue reading “Stephen E. Arnold: When A Cell Phone Is Like A Cattle Chip”

Defdog: Attack On Parler A Criminal Conspiracy? Update

Advanced Cyber I/O

Sure looks like a Deep State conspiracy.

k33p !7 m0v!n@bitburner

PARLER GOT FUCKING OWNED BAD…and I mean BAD

This group of Internet Warriors then used that account, to create a handful of other ADMINISTRATION accounts, and then created a script that ended up creating MILLIONS of fake administration accounts.”   Source & related images of text
Continue reading “Defdog: Attack On Parler A Criminal Conspiracy? Update”

Martin Geddes: Reflections on Web 3.0 – Mind Shift Needed

Advanced Cyber I/O, Civil Society, Ethics

As received and aggregated from various emails as Web 3.0 Apostles get to work.

The core problem is the relationship between the human and the data about/from the human.

This is a paradigm shift. The end of IT (information technology; human as computer peripheral to be harvested for AI training data). The start of HT (human at centre, and sovereign control over identity).

Until people become conscious of the paradigm they are in they cannot break out of it. The hardest thing for a fish to describe is water. Continue reading “Martin Geddes: Reflections on Web 3.0 – Mind Shift Needed”

Martin Geddes: Death of the Current Internet Assured

Advanced Cyber I/O, Autonomous Internet, IO Impotency

The current Internet has an irrational pricing model that is disconnected from true cost economics. As a result there are huge implicit and invisible transfers between different users and uses. Specifically there is no accounting for differences in quality; quantity alone is not the same as cost or benefit.

A handful of people in the world know how to fix this.

Powerful Mobile Phone Surveillance Tool Operates In Obscurity Across The Country

Advanced Cyber I/O

Powerful Mobile Phone Surveillance Tool Operates In Obscurity Across The Country

UNTIL NOW, the Bartonville, Texas, company Hawk Analytics and its product CellHawk have largely escaped public scrutiny. CellHawk has been in wide use by law enforcement, helping police departments, the FBI, and private investigators around the United States convert information collected by cellular providers into maps of people’s locations, movements, and relationships. Police records obtained by The Intercept reveal a troublingly powerful surveillance tool operated in obscurity, with scant oversight. Continue reading “Powerful Mobile Phone Surveillance Tool Operates In Obscurity Across The Country”

IPR Center, Amazon Launch ‘Operation Fulfilled Action’ to Stop Counterfeits

Advanced Cyber I/O

IPR Center, Amazon Launch ‘Operation Fulfilled Action’ to Stop Counterfeits

WASHINGTON–(BUSINESS WIRE)–The U.S. government’s National Intellectual Property Rights Coordination Center (IPR Center) and Amazon today announced the launch of a joint operation to prevent counterfeit goods from entering the U.S. and help protect American consumers. U.S. Customs and Border Protection (CBP) and DHL are also supporting the operation.

“The IPR Center plays a critical role in securing the global supply-chain to protect the health and safety of the American public,” said IPR Center Director Steve Francis. “However, our efforts are increased with partners like Amazon to identify, interdict, and investigate individuals, companies, and criminal organizations engaging in the illegal importation of counterfeit products. This joint operation is our latest public-private initiative bringing us one step closer to border security.”

Read Full Article

Penguin: Another Shit OSINT Industry Analysis

Advanced Cyber I/O, Commercial Intelligence, IO Impotency, Open Source

This is crap. None of these people — particularly Palantir — are anywhere near useful.  Web 3.0 is gong to by-pass all existing offerings and be 80% human 20% online.

Open Source Intelligence (OSINT) Market SWOT Analysis, by Key Players: Palantir Technologies, Expert System, Exalead Dassault Systemes, Thales Group, Cybelangel, Intrinsic Technologies, Sail Labs Technology, Digimind, KB Crawl, Verint, Recorded Future, Datalkz,