Posts Tagged security

The Reason For An Armed Citizenry

From Bearing Arms:

The Second Amendment was created with one purpose in mind, and – let’s be honest here – that purpose wasn’t hunting or even self-defense from criminals. While our Founding Fathers supported the right to have arms for those purposes, the primary motivation for the Second Amendment was to protect this country.
That thinking played into the potentially apocryphal comment made by Japanese Admiral Yamamoto, who argued that invading the United States would be a disaster because “there would be a rifle behind every blade of grass.” I say it’s potentially apocryphal because no one has been able to confirm that the admiral actually said this, but it’s the kind of valid observation of America that Yamamoto was known to make.

, , , , , , , , ,

No Comments

Lawmakers Give Teachers Choice To Be Armed

From WANE News:

The state representative from Seymour said his bill would not require teachers to take handgun training but would allow the school district to tap into state money to pay for that training.

, , , , , ,

No Comments

Former CBS Reporter Sues Govt For Hacking Her Computer

From Real Clear Politics:

A federal appeals court recently heard oral arguments in my lawsuit against former Attorney General Eric Holder, unnamed “John Doe” federal agents at the FBI and Justice Department, and others. At issue are the intrusions into my computers while I worked as an investigative reporter for CBS News, revealed by multiple forensic investigations showing use of proprietary government surveillance programs. 

, , , , , , , , , ,

No Comments

Australia Wants Backdoors In Software

From Signal:

One of the myriad ways that the “Assistance and Access” bill is particularly terrible lies in its potential to isolate Australians from the services that they depend on and use every day. Over time, users may find that a growing number of apps no longer behave as expected. New apps might never launch in Australia at all.

, , , , , , , , ,

No Comments

QT Hiring Armed Employees

From Guns.com:

The QuikTrip Corporation, with some 750 locations in a dozen states, is advertising for full-time store clerks in the Tulsa area who double as armed security. In short, besides an ability to “provide quality customer service,” among the primary role of the $35 per hour job is to protect the location and those in it. The chain has reportedly trialed the concept in Wichita, Kansas and it has already seen success.

, , , , , , , ,

No Comments

Gun Free Zones

From Bearing Arms:

A former Delta Air Lines baggage handler was sentenced Thursday to 30 months in prison for allegedly smuggling guns onto passenger planes at Hartsfield-Jackson International Airport.

, , ,

No Comments

Angry FBI Agents Likely Source Of Leaked Emails

From Fox News:

“There are probably 100 FBI agents who worked on the investigation of Mrs. Clinton– hardworking men and women in field who gathered evidence and interviewed witnesses–…and are furious at the decision not to prosecute her,” Napolitano said on The Kelly File.

, , , , , , , , , , ,

No Comments

Choosing A Strong Password Is Easier Than You Think

From EFF:

Randomly-generated passphrases offer a major security upgrade over user-chosen passwords. Estimating the difficulty of guessing or cracking a human-chosen password is very difficult. It was the primary topic of my own PhD thesis and remains an active area of research. (One of many difficulties when people choose passwords themselves is that people aren’t very good at making random, unpredictable choices.)

Measuring the security of a randomly-generated passphrase is easy. The most common approach to randomly-generated passphrases (immortalized by XKCD) is to simply choose several words from a list of words, at random. The more words you choose, or the longer the list, the harder it is to crack. Looking at it mathematically, for k words chosen from a list of length n, there are kn possible passphrases of this type. It will take an adversary about kn/2 guesses on average to crack this passphrase. This leaves a big question, though: where do we get a list of words suitable for passphrases, and how do we choose the length of that list?

In general choosing four five-letter words is better than one long word with number substitutions and some weird characters thrown in. It’s easier to remember and vastly harder for a computer to guess.

, , , , , , ,

No Comments

UK Cops Fear Prosecution If They Carry And Use Firearms

From GOP USA:

Police chiefs are struggling to recruit enough officers willing to carry a gun to tackle a Paris-style terror attack, because they fear they will be treated as criminal suspects if they use their weapon in the line of duty, the country’s top firearms officer has warned.

After November’s terrorist gun and bomb attacks on Paris, senior security officials believe Britain needs an extra 1,500 armed officers. But because half won’t make it through rigorous training and selection, police chiefs need 3,000 volunteers to come forward.

, , , , , , ,

No Comments

How Did The FBI Break Into iPhone?

From the EFF:

In addition, this new method of accessing the phone raises questions about the government’s apparent use of security vulnerabilities in iOS and whether it will inform Apple about these vulnerabilities. As a panel of experts hand-picked by the White House recognized, any decision to withhold a security vulnerability for intelligence or law enforcement purposes leaves ordinary users at risk from malicious third parties who also may use the vulnerability. Thanks to a lawsuit by EFF, the government has released its official policy for determining when to disclose security vulnerabilities, the Vulnerabilities Equities Process (VEP).

, , , , , , ,

No Comments

The European Union Is Not a Security Union

The European Union Is Not a Security Union is republished with permission of Stratfor.”

Summary

In the wake of any shocking event, national governments and officials of the European Union invariably call for more cooperation between member states to prevent anything similar happening in the future. The response to the March 22 terrorist attacks in Brussels has been no different.

Following the attacks, the governments of Germany, Italy, France and members of the European Commission demanded a global response to the terrorist threat. The commission’s president, Jean-Claude Juncker, even proposed the creation of a “security union” to combat terrorism at the continental level. In a March 24 meeting, ministers at the EU Justice and Home Affairs Council highlighted the need to share information among member states to fight terrorism. But despite the calls for greater cooperation among EU members, the national interests of individual member states will prevail in the long run, limiting the possibility of integration within the bloc on security issues. Read the rest of this entry »

, , , , , , , , ,

No Comments

The Apple Case Could Violate The Thirteenth Amendment

If Apple is compelled to create a program that doesn’t exist for the government, that would be a type of slavery.

From Reason.com:

Instead, the DOJ has obtained the most unique search warrant I have ever seen in 40 years of examining them. Here, the DOJ has persuaded a judge to issue a search warrant for A THING THAT DOES NOT EXIST, by forcing Apple to create a key that the FBI is incapable of creating.

There is no authority for the government to compel a nonparty to its case to do its work, against the nonparty’s will, and against profound constitutional values. Essentially, the DOJ wants Apple to hack into its own computer product, thereby telling anyone who can access the key how to do the same.

If the courts conscripted Apple to work for the government and thereby destroy or diminish its own product, the decision would constitute a form of slavery, which is prohibited by our values and by the Thirteenth Amendment.

, , , , , , , , , , , , ,

No Comments

Apple, Privacy and the FBI

It’s way more complicated than the pundits are saying. To be fully informed read these articles.

From the EFF:

…the FBI’s demands reflect a familiar pattern of security agencies leveraging the most seemingly compelling situations—usually the aftermath of terror attacks—to create powers that are later used more widely and eventually abused. The government programs monitoring the telephone system and Internet, for example, were created in the wake of the 9/11 attacks. Those programs came to undermine the rights of billions of people, doing more damage to our security than the tragic events that prompted their creation.

ArsTechnica discusses Fifth Amendment issues:

But the Fifth Amendment goes beyond the well-known right against compelled self-incrimination. The relevant part for the Apple analysis is: “nor be deprived of life, liberty, or property, without due process of law; nor shall private property be taken for public use, without just compensation.”

The idea here is that the government is conscripting Apple to build something that it doesn’t want to do. That allegedly is a breach of its “substantive due process.” The government is “conscripting a company’s employees to become agents for the government,” as one source familiar with Apple’s legal strategy told Ars. The doctrine of substantive due process, according to Cornell University School of Law, holds “that the 5th and 14th Amendments require all governmental intrusions into fundamental rights and liberties be fair and reasonable and in furtherance of a legitimate governmental interest.”

Reason discusses the political battle over encryption:

This incident is only the latest conflict in a years-long encryption and security war waging between privacy- and security-minded groups and the law enforcement community. As more communications are digitized, authorities have been calling for industry assistance to build so-called government “backdoors” into secure technologies by hook or by crook.

Those in law enforcement fear a scenario where critical evidence in a terrorism or criminal case is beyond the reach of law enforcement because it is protected by strong encryption techniques that conceal data from anyone but the intended recipient. Hence, leaders at agencies like the Department of Justice, the Department of Homeland Security, and the National Security Agency, along with President Obama, have weighed in against strong encryption.

, , , , ,

No Comments

TSA Fails 75% Of The Time

From Today.com:

In the wake of the Russian Metrojet crash and the Paris terror attacks, security while flying in the U.S. is of greater concern than ever. Yet in Atlanta, a man said he accidentally carried a loaded gun onto a commercial flight and the TSA never found it.

The TSA is mostly just security theater to make it seem like people are safe. This is worse than doing nothing because now people have a false sense of security.

, , , , ,

No Comments

Bill Whittle: America Was Designed To Be Free

Bill Whittle:

, , , , , , , , , , , , ,

No Comments