So, how exactly does a network analyst like Edward Snowden get access to
top secret information stored at the NSA? Sure, as a contractor you get a
password so you can analyze the network, but you can only go so deep into
the servers without tapping the fiber optic at the data center itself in
Silk Road 2 says it has been hacked resulting in the loss of ALL its customers'
Karma, dudes. :-)
From: s3raph...@yahoo.com s3raph...@yahoo.com
Sent: Friday, February 14, 2014 4:23 PM
Subject: [FairfieldLife] RE: Black Hats and White Hats
Silk Road 2 says it has been hacked resulting in the loss
...without permission from your carrier, is still a crime. It's difficult
to find another issue that has such overwhelming and bipartisan support,
and it's difficult to understand why Congress still refuses to act.
'One Year Later, Unlocking Your Phone Is Still A Crime'
Snowden wasn't a NSA analyst. He had a security clearance which meant he could
work for a company that received jobs from the NSA. Hundreds of thousands of
Americans has this level of security clearance, which is why the covert
drone-operations in Pakistan can be run by civilians and never be
On 2/5/2014 10:39 AM, nablusoss1008 wrote:
Snowden wasn't a NSA analyst. He had a security clearance which meant
he could work for a company that received jobs from the NSA.
Is it vast? Yes. Was it secret? Check. Does it arguably run outside the
normal checks and balances of government?
That's funny. Even more funny and absurd is how the whole thing is a complete
and absurd mess about which the Monty Pyton ( Bless their hearts) would be able
to make a briliant film.
From the article:
Six witnesses and three lawmakers revealed a security clearance system so
Bitcoin Millionaire Charlie Shrem Arrested:
A coalition of U.S. prosecutors from the Drug Enforcement Agency, the
Internal Revenue Service and the U.S. attorney general's office arrested
him today. The prosecutors allege that Shrem, along with a co-conspirator
Robert Faiella, schemed to sell over
'The US Department of Justice has filed criminal charges against the people
allegedly behind two popular Android piracy websites, Snappzmarket and
Appbucket. Both sites offered large catalogs of free app downloads, giving
pirates a way to avoid paying for premium apps on Google Play.'
RAMNICU VALCEA, Romania — It's easy to tell which kids in this town have
helped to make it a global center for criminal hacking and Internet scams.
They're the pupils who come to school wearing the best clothes and gold
jewelry in a region of Romania where chickens are raised in yards and roads
Last year, the Austin resident and former UT law student posted plans for
a 3D-printed plastic handgun online along with a video demonstrating the
weapon. He took the plans down days later, after the State Department
ordered them removed. Now, Wilson has moved into another realm growing
This hack has all the earmarks of a middle-man conspiracy:
On Friday, a Target spokeswoman backtracked from previous statements and
said criminals had made off with customers’ encrypted PIN information as
well. But Target said the company stored the keys to decrypt its PIN data
This hack has all the earmarks of an inside job:
Target confirmed on Monday that the company is partnering with Secret
Service to investigate the breach, and said its point-of-sale terminals in
U.S. stores were infected by malware, or malicious software. Target said it
was restricted in the
Addressing the important issues!
According to what I've read, the NSA doesn't even know how many
documents were collected and purloined by Edward Snowden. But, one does
wonder how an organization of thousands of spies wouldn't be able to
spot another spy among their own. Apparently Snowden
The Darkside Hacker
Kevin Mitnick, known as the Darkside Hacker, was at one time the
most-wanted computer criminal in the United States. Law enforcement
officials convinced a judge that he had the ability to start a nuclear war
by whistling into a pay phone. One state attorney told the judge that
Massive Hacker Attack!
According to SpiderLabs, ...'123456’ was the most widely used password and
‘password’, ‘123,’ and ‘11’ were also among the top entries. Three of
the most used passwords are 'password', 'sex' and 'god', not particularly
in that order. Admins love to use 'god' as their
The programmer is God and Hackers are the prophets of Information
So, if you are a hacker, it would be evil to not share your data and your
code with the rest of the world, to save mankind from ignorance - a moral
imperative for the hacker. The hacker's world view is libertarian- they
Reuters - A computer hacker was sentenced on Monday to three years and five
months in prison for stealing the personal data of about 120,000 Apple Inc
iPad users, including big-city mayors, a TV network news anchor and a
Hollywood movie mogul...
'U.S. computer hacker gets three-and-a-half years
On Thursday, the 21-year old San Antonio native will enter La Tuna Federal
Correction Institute in Anthony, TX to begin a one-year and one day
sentence for breaching Sony Pictures Entertainment in May 2011 as a member
of Anonymous offshoot, LulzSec.
'The $600,000 Joyride'
San Antonio Current:
Mail list logo