Pan

Members
  • Content count

    94
  • Joined

  • Last visited

Everything posted by Pan

  1. What type of radio are you interested in? First thing would be to learn about the different types of frequencies across the scannable radio spectrum so that you know what types of materials (antenna, receiver, software, etc.) you need. To do this, you can have a listen to the "Off the Grid Voice/Data Communications" talk from The Last H.O.P.E. Conference... http://www.thelasthope.org/talks.html You can also view the FCC chart delineating frequency allocations... http://www.fcc.gov/encyclopedia/radio-spectrum-allocation Once you get a basic sense of which frequencies you hope to send/receive on, you can get a better sense of what type of tools you need.
  2. Adaptive systems (whether phone, internet, electricity) require back-and-forth communication, often with information that is identifying in one way or another. As a systems person, I'm not so concerned with this concept over all. We do need to have clear guidelines and laws on the use of this type of software, and stiff penalties for its misuse.
  3. You'll notice in the comments of that article, someone mentions the fact that it's much easier to meet people all over the world via the internet. In one sense that is true. However, that is directed communication. Though there are some websites that have random connections set up between users (e.g. chat roulette), most communication is mediated. Radio is more instantaneous and random. You don't know who is going to hear you and who you will hear.
  4. I have an R20. You won't be disappointed.
  5. Hey folks, Apparently, this morning Anonymouse released text and video regarding their recent DDOS attacks. I was able to find the text and an image from the movie. What they are trying to do makes perfect sense. Stopping the flow of information to argue for the flow of information, and aligning oneself with the civil rights movement of the 1960's, is certainly valid. Right? Please pass these documents far and wide so that we may spread the message of Anonymouse. http://i55.tinypic.com/5xmwhx.png http://pastebin.com/bBn5RWkd ------------------------- Anonymouse - Project: LameAss - Join the Mickey Mouse Approach to Social Change ----------------------------- “In a time of universal deceit, telling the truth becomes a revolutionary act.” ~George Orwell “You may think your actions are meaningless and that they won’t help, but that is no excuse, you must still act.” ~ Mahatma Gandhi “He who gives up freedom for safety deserves neither” ~ Ben Franklin "The most important thing to do in your life is to not interfere with somebody else's life." - Frank Zappa Hello World. We are Anonymouse. What you do or do not know about us is irrelevant. What is relevant is how much we aggrandize ourselves. We have decided to write to you, the media, and all citizens of the free world (with qualifying purchase) to inform you of our intentions, potential targets, and our ongoing anti-information campaign for Freedom of Douchebaggery. Anonymouse is continuously campaigning for Freedom of Douchebaggery everywhere, in all forms, for all platforms. Our efforts have been, at best, misguided. We are not a terrorist organization or a group of “hackers” as governments, demagogues, and the media would have you believe. We are a homogenous group of script kiddies that touch ourselves over every aspect of philosophy, religion, and politics that seems to justify our existence. That includes randomly associating ourselves with important social movements in history. At this time, Anonymouse, as a distributed misguidedness, is focused on prolonging Freedom of Douchebaggery on the Internet. We ask the world to support us, not for your sake, but for the sake of our egos. When script kiddies control the flow of information, they distract you from answering important questions about freedom in our society. We will persist until our dying breath -- or until we have to use our computer to play G.T.A. 4. Pay us attention, citizens and governments of the world. History is full of examples that show that social and political progress can be derailed when people act unthinkingly. As an example in recent history: Take the Transparency Movement in the United States in the 2010's. The movement got infiltrated by self-serving script kiddies whose Distributed Denial of Service attacks had results inverse to the movement's goals. In their efforts, the script kiddies managed to derail the transparency movement by preventing true dialog with the american public and managed to inspire drastic response by police and governments by refusing to act civil. In the spirit and memory of those script kiddies and many others, we will refuse to be silenced. We will DDOS everyone who disagrees with us! It is here that we proclaim: Any individual, organization, corporation, and/or government entity which supports Freedom of Douchebaggery and a Cheap Joke Ridden Internet is an ally of Anonymouse. If you work to inspire dialog about Freedom of Expression and a Free Internet, your efforts will be derailed. Where others have made this promise and failed, we make this promise and aim to distract everyone. We would like to ask that you as a citizen, organization, media entity, or government do the same by joining us. Signed, Anonymouse
  6. Check out JK Audio for hybrids that you can use to record (some of them portable) http://www.jkaudio.com/
  7. This discussion is being framed in a certain way that may not provide the best overall view. Ports are are closed on institutional networks to maintain network quality (bandwidth), network integrity (functionality) and security. Actually, this should be standard for any network. Use only what you need. It's not that the school is being unhelpful. It's that they are trying to maintain the above. You've admitted that you want to circumvent the closed ports to play games. Networked games can be bandwidth hogs. Multiply that by all the students at your school who like to play games and you can see a potential problem. Likewise, opening non-standard ports expands the attack vector. Now multiply that by all the non-technical users at your school who don't know how to protect their machines and you can see a potential problem. Schools and other institutions have to adhere to a myriad of security and privacy policies (e.g. HIPAA). That adherence sometimes trumps other things such as personal entertainment. Lastly, managing ports for non-academic use could be a logistical nightmare, depending on the size and complexity of the network and the size and resources of the network administration staff. Quite frankly, primary, middle and high schools do have a vested interest in maintaining the focus of the student. College is a little different because the users are legally independent and have theoretically developed their overall learning skills at that point. Most colleges have less restrictive networks than lower level institutions. I'm in no way meaning to discourage your exploration of VPNs, just providing some perspective on why the school might not seem to be cooperative.
  8. Bio and animal research show that "doing the right thing" manifests itself in many creatures of the earth. It's actually not unique to humans. As a simple thought experiment, try to explain why cats have been known to save other pets, including dogs, from burning buildings. There is absolutely no religious component to that compassion. There is also no known survival component to it. In other words, it originates in something we have yet to understand. In terms of "illegal things", as long as I can remember, those discussions never took place in detail on public forums. Granted, I didn't hang on IRC, but all other scenes, the best discussion happened between a few select people who spoke out of band after observing/interacting with each other in the public forum. So the desire to keep the Binrev forums alive and well by curtailing discussion of illegal actions is actually a help to the community. People will meet, interact and eventually decide whom to trust for things that may cross the line. By the way, we all do eventually trust somebody - whether it's the hacker in the forum or the perceived dude in the sky. Not all of your beliefs and skills come from direct experience and verification.
  9. I've heard quite a bit of nostalgia for the the early years of the public net recently. I didn't get on IRC until a few years ago, but have been involved in a lot of other network community stuff since the late 80's/early 90s. There was a different feel, a sort of blind optimism. What happened was that the dream did become a reality in one sense: practically everyone has a computer and everyone has access to the global net. With that comes all the pop culture, all the drab business content, the constant marketing, constant nostalgia, etc. Now, every fetish you can possibly imagine is available with a simple web search. This has provided us an overwhelming amount of data. The interesting nuggets are still out there, but they are buried. Can we get back there? Probably not. You can't get there from here. However, there are mutations happening right now in a new generation of people. They are using the new methods of communication (social networking, etc.). They are building the new underground/alternative scenes. I have faith that youthful curiosity and creativity will remain embedded in humanity. It goes in cycles and is more apparent at certain times than others.
  10. Since you don't have any SIP telephony administration experience, and probably don't want to blow things up at work, might it be a good idea to get a solid understanding? That may not fulfill the qualifiers of "quick" and "free", but you'll perform your tasks better with less risk to your users. Maybe start with reading up on the basics of SIP Telephony. Then, move on to the specifics of the Avaya technology.
  11. This has very little to do with selling software. AT&T, like other providers, tracks ICC-IDs. As an aside, the quality and access controls related to the store are not necessarily a bad thing. Cuts down on bad/dangerous applications, cuts down on fraud and most importantly simplifies the process of installing and maintaining applications. Lastly, I'm assuming people heard about Android doing a remote wipe of an app from the Android store. Now, lets hear the same critics attack the Android store. GO!...
  12. They weren't friends. Manning approached Lamo.
  13. And I happen to think that's ridiculous. But that's only what you typed. The implication was that: In other words, important Government and/or military information - unless the person divulging it really fucking knows what they're doing. Hey, man, it's hard enough trying to guess how much of what Poulson and Lamo are saying is true, and what their motivations were, and if those motivations were independent of each other, and whether or not this was a set-up to begin with, etc., for me to sit around and ponder just who might be cognizant of what effects and who might be a bit funny in the head. You are probably 100% correct that Manning had no clue what he was doing and that he probably shouldn't have even been given the opportunity to pull these shenanigans in the first place. But that is not the subject at hand. What we're talking about here is whether or not it's cool to drop a dime on some jerk who thinks he's talking to a journalist, and whether or not Lamo has adequately explained himself. Whether intended or not, this ended up seeming a lot like an attack on Wikileaks. And while I don't think it was an intentional attack by Lamo, Wikileaks does. For whatever that's worth (probably not much). How, exactly, is that a defense of Adrian Lamo's actions? This story is now - for better or worse - a story and a discussion about Adrian Lamo, his actions and his motivations and not Bradley Manning or his actions. And what the fuck was with Hakim Bey? I agree that not everyone needs to know everything - but I don't agree with fucking little boys or that the Moors were black, or that African Spacemen colonized America B.C. (Before Columbus), along with many other things that Hakim Bey asserts, or theorizes, or mindfucks us with. Shit, for a while, I thought Hakim Bey was Robert Anton Wilson. I also thought Thomas Pynchon was Robert Anton Wilson until RAW died nearly penniless. Sometimes I still think those things, and honestly this whole discussion is convoluted enough without quoting anarchist, pedophile, Sufi mystics. Informants don't get the benefit of the doubt. Adrian Lamo has given his reasons for his actions, and his defenders are merely inventing scenarios which may or may not be accurate in order to justify those actions. I'm simply dealing with the information provided, not what if's and maybe's. As far as me doing "a disservice to the discussion by not at least attempting to acknowledge that Adrian maybe did have a higher motive", I acknowledged that Adrian may have had motives unknown (higher or otherwise) in my very first post in this thread: And, interestingly enough, I don't think that apologists inventing maybe's and excuses is a "disservice to the discussion"; I just don't happen to agree, that's all. EDIT, I missed this: So, what you're saying is that in this case, the flow of information should have some constraints (i.e. for "ethical" reasons, it should have come from someone other than the source). Nope. I'm saying that the whole situation seems really fishy, that's pretty much it. Well, that and the fact that this may have been a serious violation of journalistic ethics. But mostly that I smell a rat - figuratively. My musings earlier about free information were more of a commentary on "hacker" ethics and values, regarding the description of Lamo as an "ex-hacker", than anything else. Define "important"? It's important that we practice foreign policy to avoid getting the world blown up or the very least, getting soldiers and/or civilians hurt. I'd say that is substantially important. I'm curious why the folks who are so vehemently against what Lamo did never have a response to the issue of foreign diplomacy and security. Those people, including yourself, tend to gloss over it. Yes, absolutely, the person divulging better have a fucking clue what it is that they're doing. Manning was not in the mental state nor did he have the experience to know what he was doing. Yes, we *do* have to be stop idiots from ruining it for everyone else. I'll avoid mixing analogies too much, but it's like the douchebags burning stuff in Toronto right now. They *ruin* it for the people working hard to change the system (including those underground). That is dangerous. Dangerous needs to be stopped if there is a greater cause. See, this is exactly what I'm talking about: THIS STORY IS ABOUT MANNING. Manning's mental state, previous actions and proposed actions. He was threatening to do stupid shit that could have serious consequences. Threats need to be neutralized. The only reason that this is in any way about Lamo is because he happened to be the person who had enough common sense to stop it. People need to define "informant". You (and every other critic) have never called the police on something you thought was a threat to human life? About Poulson and Lamo relationship: Every journalist has an "inside" guy/gal. That's nothing new. If you follow the timeline outlined since the original article, it's clear that Poulson didn't get involved until after the shit had hit the fan. Anytime someone throws out comments about "meds", my attention starts to wane because it's more about personal attacks and easy-write-offs than looking at facts over time. Everyone seems to have rushed to judgement before even getting the entire story. Another thing that "hackers" don't want to touch is that if Manning continued he would have given an even worse name to the hacker scene. Ruining diplomacy and putting people's lives at risk is not something that will garner a lot of love.
  14. Nice Beave! I'm definitely going to play around with it.
  15. So, what you're saying is that in this case, the flow of information should have some constraints (i.e. for "ethical" reasons, it should have come from someone other than the source).
  16. If you believe that to be true, then I'm assuming you also want to see his superiors punished for allowing this inexperienced 22-year old access to such info. On the other hand, if you don't think his superiors should also be punished, then the information he had access to wasn't all that essential to national security and your entire argument about the possible danger of this info is irrelevant. Which is why Lamo was dead wrong in his reasoning for ratting this guy out. No argument in his favor can stand without also being an argument against freedom of any information. Hacking is, in large part, about information being free - which is why Lamo is correctly described as an "ex-hacker." Current rat. Bear in mind, I'm not defending Manning for what he did. I do believe that the helicopter footage he released - which started this whole ball rolling - was important. Lamo wouldn't have snitched on Manning for that, either. It was Manning's decision to just start leaking all sorts of shit for little reason that I don't agree with; But for Adrian to think he has the right to make that call is ridiculous. Unless Lamo is severely mentally disabled, he must know that Manning is going to be facing at least 10 years in federal prison, if he's lucky. If Lamo was an ethical person, and not the piece of shit that he is, he would have done the right thing and explained to Manning why the helicopter footage was important, and to not just start leaking shit because of some juvenile vendetta. Was Manning wrong? Sure. Does he deserve - at the minimum, if he's lucky - 10 years behind a federal wall for it? Of course not. That's where Lamo fucked up, and I think they both did it for the same reason. Media attention. Manning for the attention to the info, and Lamo for the attention to himself. First, you're stating an extreme position. I did not say *never* divulge information. What I said was that national security information is very sensitive and even in divulging it, one has to be cognizant of what the effects could be. His length of service, job position, comments to Adrian, and various personal issues (noted elsewhere) demonstrate he was not the person to be divulging sensitive information willy-nilly -- and make no mistake: the comments he made indicate he was using *zero* restraint. Some people might confuse Adrian's action with an attack on Wikileaks. Adrian has said it is not. I believe that. I think "Information should be free" has some caveats. Absolute freedom does not work in any societal context. To quote Hakim Bey's "Temporary Autonomous Zone": Not everyone needs to know everything. The other thing is that "information should be free" does not trump "people should not do stupid things". Ironically, you say "if Lamo was an ethical person". What if Adrian actually believes that human lives could be affected and that Manning also put him in a precarious position. I've not had a chance to see the IRC logs, but there is some indication Lamo was like "get the @#$% up off me". If that's the case, and manning was being pushy (or unstable), Lamo has a right to be concerned for his and other people's safety and freedom. You do a disservice to the discussion by not at least attempting to acknowledge that Adrian maybe did have a higher motive.
  17. OK, understood, but still, see my comment above about experience. There's no way he has the experience (or wisdom) to make decisions about information that could affect foreign policy. His job was not to divulge information to the public, nor practice diplomacy. He doesn't have that kind of training or experience.
  18. Here's some you neglected: #3. If the information divulges things that would be detrimental to negotiations between foreign powers (particularly those who have nuclear capability or are known to have taken hostages). We know that some of the information relates to North Korea and other foreign powers along those lines. #4. Information that could divulge location of important resources/people/etc. etc. This actually ties into my comment about a 22-year old who has only been in the military for a short time not having the experience. There is no way that he could have the proper background to know the effects of his actions along these lines. That's not a decision for one person, let alone one at his level.
  19. I could come up with a dozen thought experiments to test you on this.
  20. I actually think that the "Apple is unhackable" meme is FUD from people who do not like Apple. Part of my job involves supporting mac clients and mac servers. Nobody in the organization or surrounding community thinks that Apple hardware is unhackable. Obviously, judging by the amount of jail broken iPhones, people are cognizant that Apple hardware is hackable. Most folks I know have the realistic opinion that they are slightly more secure because there are less real-world exploits that are taken advantage of in terms of Apple hardware. Some people waste a lot of time on the apple-haters vs. apple-fan-boys thing. It detracts from real discussion like... Why doesn't Apple speed up their security patch cycle? Now, about this article, it's just a web app exploit. Doesn't have anything to do with Apple hardware. Every cell has an ICC-ID and every provider tracks that information.
  21. You realize this statement is contradictory? A 22 year old who has only been in the military for <= 4 years does not have the perspective to determine what information should be public and what shouldn't be -- not on the scale he was talking of outputting --- particularly not for things that are entire U.S. security and foreign policy operations. He's hired to sift through data and find out valuable nuggets to be passed to higher-ups. He didn't make decisions beyond that. The argument that growing up on Google somehow improves his wisdom in terms of making decisions on classified information is a bit erroneous.
  22. Why is it not a good idea? He stands by what he did. Not everyone in the "hacker scene" seems to think he is a rat. I think he should come to HOPE and Defcon. There, if people can act like adults, there can be discussion about where/how these lines get drawn (again, pointing to the fact that this is *not* a clear cut issue).
  23. Poulson*. He wrote an article on Wired (http://www.wired.com/threatlevel/2010/06/leak/) which gave more information on the situation than anyone else had. Namely, names. I'm not coming down on either side of the situation at the moment. One thing to consider is that this intelligence kid was hellbent on publishing anything and everything. There are some rather over-the-top quotes attributed to him. Some sensitive information could be problematic in terms of security for both military and civilian folks. That does have to be taken into consideration. It's also bad for the process of exposing nefarious information. A person/organization that suddenly becomes an information geyser is not going to spend the time necessary to calculate the risk as well. It can hurt the cause itself. There is some sort of balance: the flow of information, which we all know sometimes involves circumventing the usual channels vs. protecting information that may harm people if mismanaged. That goes for both the intelligence guy and the reporting of who he is.
  24. Hi, What you want to do is the basic premise behind panoramic photography. If you're talking a large space, with a lot of cameras, you probably want to go spherical pano. You might want to check out panotools-based applications (PTGui, PTMac, etc.). If you want to get an accurate single image, you'll want to warp them slightly before stitching. I'm a pano photographer (https://secure.sensoryresearch.net/thoughtconduit/news?id=89) and have written stitching software. Feel free to ping me for more details on the process. Pan
  25. This is along the lines of what I was mentioning... http://timesofindia.indiatimes.com/tech/personal-tech/gadget-special/Coming-soon-100-Tablet-PC/articleshow/5984155.cms