State Rep. Sharon Cissna made headlines around the country a year ago when she refused an airport security pat-down in Seattle and said she'll never go through an invasive check again. Now the Anchorage Democrat is pushing a package of four bills in an attempt to reform airport security across Alaska.[thenewstribune.com]
It looks like the guy that comes walking up at approx 00:48 (the lede says he's an ex-cop) is using the two girls to keep the bouncers from finding his concealed weapon. The backup guy either knows him or has his hackles come up because he has the pat-down guy keep searching him. After the the ex-cop gets through (that's how it looks, anyway) he comes back out to toss the drink he had with him (clubs all over the world won't let you bring your own drinks in with you) and decides to mess with the back-up guy by pulling his gun on him. Unfortunately, the back-up guy was ready for it, directed that gun away from him while drawing his own gun and pap-papping the ex-cop on or about the C-7, dropping him like the proverbial sack of poo. From the video, it doesn't look like the ex-cop really intended to do anything, but the bouncer likely didn't know it ...
Hmmm ... I wonder why they would confess to something like that ...
Pesce, who is better known locally for being a judge on the ABC's The New Inventors series and co-inventor of Virtual Reality Markup Language, said that "it has become clear that Twitter users require a secure communication channel; one that, even when subpoenaed, would not easily give up its secrets".[zdnet.com.au]
Kinda makes you wonder if they're actually 'losing' them, don't it?
Naturally, they're talking about Japan ...
As the Arab Spring hits its first anniversary, tech activists around the globe are continuing their efforts to enable secure communications—especially in areas of the world that are in conflict or transition. After all, it's become an open secret that governments ranging from Assad's Syria to local American law enforcement to the newly created government of South Sudan are actively trying to find out what is being said and transmitted over their airwaves and networks.[arstechnica.com]
The world is justifiably concerned about a nuclear capable Iran, but the Islamic Republic's prime ally, the Russian Federation, is putting into active service a weapon with more destructive capability than Tehran could ever dream of possessing. While Iran's main target is America's ally Israel, Moscow still aims its atomic weaponry primarily at the United States.[rightsidenews.com]
"Internet hijinks" ... I love it ...Cryptome, a sort of proto-WikiLeaks website best known for exposing the CIA analyst who found Osama Bin Laden, announced this week that its entire website had been hacked. But, in a surprising response from Cryptome founder John Young—a man suspicious even of tap water—no foul play was suspected. At least no more foul than the usual Internet hijinks.[betabeat.com]
Gee, I bet there's a real battle over who 'gets' to ride in them ...
If their religious literature is to be believed, the Hindu folks are inherently peaceful right up to the moment they decide to provide you with a whole new definition of the concept of 'total war'. Fortunately, they're also are natural allies ...
Seems like potentially fertile ground ...
Also:Russia announced that its SSBNs (nuclear powered ballistic missile boats) would resume long range "combat patrols" later this year. In recent years, there have been only about ten such patrols a year, each lasting three months or less. Most have not gone far from Russian waters and some were not even made by SSBNs.[strategypage.com]
In a fresh illustration of growing turmoil among ethnic Tibetans in Sichuan Province, three livestock herders have set themselves on fire to protest what they saw as political and religious repression at the hands of the Chinese authorities, according to a Tibetan rights group and an ethnic Tibetan living in Beijing. [nytimes.com]
Tibetan Buddhism sure presents a sharp contrast to what passes for religion in the Middle East ...
German academics said they had cracked two encryption systems used to protect satellite phone signals and that anyone with cheap computer equipment and radio could eavesdrop on calls over an entire continent. Hundreds of thousands of satellite phone users are thought to be affected.[telegraph.co.uk]
Heavy emphasis on 'back up your drive before you start in case something goes wrong' ...
It's a good thing, too, because they're subjects rather than citizens and not allowed proper defensive weapons ...
MoD insiders believe that, after an independence vote, ministers in London would be forced to strike a deal with Scottish leaders allowing the Navy to go on using Coulport, where missiles and warheads are stored, and Faslane, where the subs are based, until an alternative was ready.[thisisplymouth.co.uk]
Encryption keys on smartphones can be stolen via a technique using radio waves, says one of the world's foremost crypto experts, Paul Kocher, whose firm Cryptography Research will demonstrate the hacking stunt with several types of smartphones at the upcoming RSA Conference in San Francisco next month.[computerworld.co.nz]
The security contractor for the Energy Department's Oak Ridge National Laboratory in Tennessee is investigating reports that one of its security guards was sleeping and had also been using an unauthorized cell phone while they were supposed to be guarding a sensitive nuclear facility with bomb-grade material.[pogoblog.typepad.com]
Almost every day we read about some new data leak and, as a result, almost every IT company seeks new and better security solutions. One answer that makes a lot of sense to me is the self-encrypting drive (SED), a drive which contains the hardware itself so that all data written to it is encrypted.[pcmag.com]
Also:India on Monday became the world's sixth country after the US, Russia, France, the UK and China to operate nuclear-powered submarines when the Russian Akula-II class submarine `K-152 Nerpa' was commissioned into Indian Navy as INS Chakra on a 10-year lease under a secretive almost $1-billion contract inked in 2004.[indiatimes.com]
This is interesting ...A credit card shown at the Consumer Electronics Show in Las Vegas comes with its own keypad embedded on the front of the card. The goal is to make it extremely difficult for thieves to use the lost or stolen card, but it requires you to type in a unique security number every time you complete a transaction.[moneyville.ca]
All of the customers were required to reset their passwords, but this isn't the first time, and certainly won't be the last, that a website gets breached. So, this is the perfect time to remind everyone on the importance of strong passwords. Whether you're joining a site or resetting a password, make sure you always consider the following eight steps.[businessinsider.com]
The National Security Agency's SELinux Project has announced the first release of SE Android, a security enhanced version of Google's Android operating system. SEAndroid is the name of both a project to identify, and find solutions for, critical gaps in Android security and of a reference implementation of a security enhanced Android.[h-online.com]
The new handheld and vehicular devices come with improved encryption as well as the ability to jump between frequencies, making it more difficult for an enemy to eavesdrop on conversations between field commanders, according to Col. Ronen Schneider, head of the IDF Army HQ’s C4I Division.[jpost.com]
In December, seven people died in an explosion in Yazd. On November 28, a bomb seems to have gone off in nuclear facilities in Isfahan. On November 12, 17 people were killed by an explosion near Tehran. On July 23, a scientist called Darioush Rezaeinejad was shot through the throat outside his daughter's kindergarten. On November 29, 2010, Majid Shahriari was killed in the same way as Roshan, with a bomb planted in his car. Fereydoun Abbasi-Davani was also attacked, but survived. On January 12, another motorcycle bomber killed Masoud Alimohammadi.[abc.net.au]
If the purpose of the action is to create terror, then the act is terrorism. If the purpose is action is to eliminate a utility and the terror is incidental, than it may just be an expedient methodology. The level of physicist that could legitimately aid in development of a nuke program is always in short supply and difficult to replace which makes them legitimate targets, and who knows how convoluted a plan has to be to be effective in this particular environment. It might be terrorism, but the fact that they're using explosives on these so-called 'civilians' and that there may be collateral casualties, in and of itself, certainly doesn't make the case that it is.
I can't wait to hear this guy's explanation ...
Also:iTwin derives its name from the fact that you need two iTwin devices for it to work. When paired with one another, the devices allow users to share files over the Internet using Advanced Encryption Standard (AES) 256 bit encryption. Plug in one to a Mac or PC, assign it files and folders that you want to be accessible, and when the other device is plugged into a second Mac or PC, those folders and files can then be accessed by that machine.[macobserver.com]
At CES, Singapore-based ST Electronics was showing off a new security device that can be installed in nearly any notebook computer to protect its data from prying eyes—Digisafe DiskCrypt, a hard-disk enclosure that turns any 1.8-inch micro-SATA device into removable and fully encrypted storage. The enclosure, which is the size of a 2.5" drive, can be used as a drop-in replacement for existing drives.[arstechnica.com]