groschen to an inspiring longer term discourse here and tnx for
your patience
Ergebenste Grüße
Erich M.
but really, if the US can't produce the killer WMD,err cyberwar
evidence this time around they they should stop while they are
ahead before they come out of this looking like fools
might have offended anyone on list with the strict note in
my previous posting.
Erich M.
post/scrypt: Ahem yes and whenever Kevin Mandia turns up at a
prominent malware battlefield scene such as now you may confidently
expect that some news about a state sponsored attack will follow.
Al
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 2014-12-19 13:05, Joseph Lorenzo Hall wrote:
Any ideas on which narrative (or combination thereof) is
right?
Both miss IMHO the point. This was clearly a politically
motivated attack by a nation state intended to create the
severest
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 2014-12-18 19:11, Noah Shachtman wrote:
One the one hand, I see US officials leaking word that the North
Koreans were involved...
http://www.nytimes.com/2014/12/18/world/asia/us-links-north-korea-to-sony-hacking.html
On the other, I see
a hombase there in an
admin range.
Servus zur guten Nacht
Erich M.
post/scrypt: For anybody still interested here are links to PPTs from
2008 [English]
http://moechel.com/doqs/olympic_surveillance.pdf
and 2010 [German] on topic, both including a functional description
of the ETSI surveillance interface
.
Interestingly there were only very few reports [compared to other
regions] on net surveillance based arrests.
That coincided with Squire Snowden's gallant information operations on
Mediterranean fiber optic cables
Servus
Erich M.
postscrypt: oe3emb now qsy 40m
- -BEGIN PGP SIGNED MESSAGE-
Hash
On 06/19/2013 03:40 PM, Griffin Boyce wrote:
Michael Azarkevich michael.azarkev...@gmail.com
mailto:michael.azarkev...@gmail.com wrote:
I find it hard to believe the list is authentic. It has words like
Java, Quiche and Redheads for gods sake. Also, they misspelled
the name of
, 2013, at 9:50 AM, Erich M. er...@moechel.com wrote:
On 03/07/2013 09:26 AM, Griffin Boyce wrote:
How far is the distance being covered, and in what kind of
terrain (flat plains, hills)? HAM might not even be necessary
if it's fairly close (relatively speaking). GMRS radios can
cover several
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 12/06/2012 01:40 PM, Asher Wolf wrote:
* DPI-based policing of peer-to-peer traffic * Services-based
billing
That is all in, Asher, but everything starts on these 90 or so pages
with identifying crypto protocols and the matching of
/12/12 2:21 AM, Erich M. wrote:
On 12/06/2012 01:40 PM, Asher Wolf wrote:
* DPI-based policing of peer-to-peer traffic * Services-based
billing
That is all in, Asher, but everything starts on these 90 or so
pages with identifying crypto protocols and the matching of
signatures to non
On 07/27/2012 02:53 PM, Fabio Pietrosanti (naif) wrote:
tnx to the other voices that tuned in meanwhile, I agree on close to all
Andre R. posted
National Security Agencies of which Nation?
German Bundesnachrichtendienst in this case. See more below on Ipoque,
Utimaco and a venerable SIGINT
11 matches
Mail list logo