New NATO head once hurled stones at the U.S. Embassy at anti-war protest. – Video


New NATO head once hurled stones at the U.S. Embassy at anti-war protest.
The man at the helm of the biggest military alliance in the world was reportedly opposed to war and attended rallies. Jens Stoltenberg is even said to have thrown rocks at a U.S. Embassy at...

By: IN THE NOW

See the rest here:

New NATO head once hurled stones at the U.S. Embassy at anti-war protest. - Video

Russian hackers target Nato, military secrets

Other Eastern European countries, such as Bulgaria, were also targeted, as well as NATO and the Organization for Security and Cooperation in Europe (OSCE).

Russian President Vladimir Putin has repeatedly poured scorn on North Atlantic Treaty Organization (NATO). According to FireEye, hacking NATO could give Moscow, "sensitive tactical and strategic intelligence concerning regional military capabilities and relationships".

The report comes amid heightened tension between the West and Russia, following Moscow's annexation of Crimea in March. The finger has been pointed at Russia for several widely reported cyberattacks, including a breach at JPMorgan that compromised the accounts of 76 million households and seven million small businesses.

Read MoreHow a Russian hacker snatched $100M from banks

In addition, cyber intelligence firm iSight Partners has recently reported that Russian hackers exploited a vulnerability in Microsoft Windows to spy on computers used by Nato and other western governments.

Attacks likely successful

FireEye said that the sophistication of the attacks detailed in its report meant that they were likely to have proved successful in the majority of cases.

"I think you would be nave to assume they haven't been successful. For the large percentage of hacks they are successful, because we know existing security architecture is insufficient in stopping these things," Jason Steer, director of technology strategy at FireEye, told CNBC by phone.

Identifying where hackers are from can be difficult because of clever movement of data and deliberately misleading use of language in malware. Russia is particular hard to pin down due to its hackers covert movements in cyberspace, said Steer.

Read MoreHackers aim to pull off cyber-heist worth $1 billion: Report

Link:

Russian hackers target Nato, military secrets

NATO secretary general: strong alliance needed to secure better ties with Russia

Published October 28, 2014

NATO Secretary General Jens Stoltenberg gives a policy speech entitled "A unique Alliance with a clear course" at an event hosted by the German Marshall Fund of the United States, in Brussels on Tuesday, Oct. 28, 2014. (AP Photo/Geert Vanden Wijngaert)(The Associated Press)

NATO Secretary General Jens Stoltenberg gives a policy speech entitled "A unique Alliance with a clear course" at an event hosted by the German Marshall Fund of the United States, in Brussels on Tuesday, Oct. 28, 2014. (AP Photo/Geert Vanden Wijngaert)(The Associated Press)

NATO Secretary General Jens Stoltenberg gives a policy speech entitled "A unique Alliance with a clear course" at an event hosted by the German Marshall Fund of the United States, in Brussels on Tuesday, Oct. 28, 2014. (AP Photo/Geert Vanden Wijngaert)(The Associated Press)

BRUSSELS NATO's new secretary general says only a strong Western alliance can negotiate better ties with Russia.

Jens Stoltenberg said Tuesday that his experience as Norway's prime minister was that robust defense capabilities and a strong trans-Atlantic bond were fundamental to bring about constructive relations with Russia.

In his first policy speech since taking office Oct. 1, Stoltenberg said there was no contradiction between wanting to keep NATO strong and continuing to attempt to engage with the leadership of Russian President Vladimir Putin.

"NATO is here to say. Russia is here to say. So we're going to have some kind of relationship," Stoltenberg said. The question, he said, is "what kind."

Read the original post:

NATO secretary general: strong alliance needed to secure better ties with Russia

New NATO chief plots course for 28-nation military pact

STUTTGART, Germany As NATOs first secretary-general to hail from a country that shares a border with Russia, Jens Stoltenberg says todays tensions with Moscow conjure memories from a Cold War childhood when NATO was there to protect us.

I remember visiting that border when it was completely closed back in the days of the Soviet Union. When looking across was like staring into something dark and scary, Stoltenberg, a former Norwegian prime minister now heading up the 28-nation alliance, said on Tuesday.

Nowadays, there is a visa-free zone between Norway and Russia, where hundreds of thousands of people cross the border each year. But Russias moves around Ukraine during the past year have threatened such progress and brought about echoes from the past, which NATO must be prepared to counter, Stoltenberg said during a speech at the German Marshall Fund in Brussels.

NATOs new top official laid out his priorities during his first major policy speech since assuming leadership of the 28-nation alliance earlier this month. Stoltenberg took up his post from Anders Fogh Rasmussen, his predecessor as the military alliances secretary-general who had been criticized by some NATO allies for his sharp comments about Moscows policies in Ukraine.

Much of Stoltenbergs speech also focused on Russia.

NATO does not seek confrontation with Russia. And nobody wants a new Cold War, 25 years since the fall of the Berlin Wall, he said. But we cannot and will not compromise on the principles on which our alliance and the security of Europe and North America rest. This is my firm conviction.

Going forward, Stoltenberg said his main goals will be pushing forward with a new action plan that aims to elevate NATOs overall state of readiness through the placement of equipment at strategic staging bases in eastern Europe, a new rapid-reaction force and a heightened presence of rotational forces on NATOs eastern frontier.

This is the biggest reinforcement of our collective defense since the end of the Cold War, Stoltenberg said. We are making our forces more agile. And able to deploy quickly whenever threats emerge. From any direction.

The size and shape of NATOs new spearhead reaction force, expected to be around 4,000 troops, will be decided when defense ministers meet in February.

At the same time, Stoltenberg struck a more conciliatory and diplomatic tone than Rasmussen, emphasizing the need to find ways to work with Moscow.

See the article here:

New NATO chief plots course for 28-nation military pact

SNL strikes again…lampooning the administration on the IRS…NSA…Ebola Little to – Video


SNL strikes again...lampooning the administration on the IRS...NSA...Ebola Little to
SNL strikes again...lampooning the administration on the IRS...NSA...Ebola Little to late SNL, this administration a joke since inception, just think of all those years of lost jokes It...

By: Werler Anson

Read more:

SNL strikes again...lampooning the administration on the IRS...NSA...Ebola Little to - Video

Posted in NSA

Startup Fights Fraud With Tools From Facebook, NSA

Tom Ryan wanted to build something that could identify criminal behavior inside massive mobile networks, stock trading services, ecommerce sites, and other online operations. So he turned to a pair of familiar names for help: Facebook and the NSA.

He didnt exactly knock on Facebooks front doorlet alone the NSAs. But he did adopt a pair of sweeping software systems built by these giants of the online age, systems that help them juggle the massive amounts of digital information streaming into their computer data centers.

Ryan grabbed an NSA tool called Accumulo, which likely plays a key role in the agencys notoriously widespread efforts to monitor internet traffic in the name of national security, and he paired it with a Facebook tool called Presto, used to quickly analyze the way people, ads, and all sorts of other things behave on the worlds largest social network. Both Facebook and the NSA, you see, have open sourced their software, meaning these tools are freely available to the world at large.

Ryan is the CEO of a small Silicon Valley startup called Argyle Data. Over the past sixteen months, he and his engineering team used Accumulo and Presto to fashion software that can root out fraud inside todays massive online operations, and theyve already deployed the thing with at least a few companies, including Vodafone, the British telecommunications giant that runs mobile phone networks across Europe.

Argyle is a nicely rounded metaphor for the recent evolution of the data-juggling technologies that drive our modern businesses. Over the past several years, massive web companies such as Google and Facebookas well as similarly ambitious operations like the NSAhave built a new breed of software that can store and analyze data across tens, hundreds, and even thousands of machines, and now, these software tools are trickling down to the rest of the business world. As a startup, Ryan says, you want to build on whats new, not whats old.

The poster child for this movement is a software system called Hadoop, which was inspired by work originally done at Google. But Hadoopat least as it was originally conceivedis now giving way to tools that operate at much faster speeds. Hadoop is a batch system, meaning you assign it a task and then wait a good while for the answer to come back. Newer systems are much better at operating at speed.

Argyles software is a prime example. Using machine learning and whats called deep packet inspection, it analyzes the individual packets of data that stream across a network, and if a piece of data meets certain criteriai.e. sets off certain flagsit gets shuttled into Accumulo, a massive database that can extend across myriad machines. It helps us scan tens of millions to hundreds of millions of transactions a second, Ryan says. Companies can then use a version of Presto to further analyze this data, executing specific queries in near real-time.

Christopher Nguyen, the CEO of a data analysis startup called Adatao who once worked with similar big data software inside Google, says that Arygles method isnt necessarily the best way to analyze such massive amounts of information at speed. But he agrees that this is part of a much much larger movement towards real-time big data tools, tools that also include something called Spark, developed at the University of California at Berkeley, and various other software contraptions.

At the same time, Argyles story underlines another aspect of this movement. At the NSA, you see, Accumulo is likely part of a surveillance effort that underpins our online privacy, and as the tools like this make it easier to collect and analyze such enormous amounts data, they may help push us towards a world where privacy is eroded even further. Vodafone, after all, is using Argyles software to closely analyze data streaming across European wireless networks used by the general public.

According to Seth Schoen, a staff technologist with the Electronic Frontier Foundation, laws typically allow companies to use tools along the lines of Argyleincluding deep packet inspectionto do things like fight fraud. But in the end, their affect on privacy boils down to the policy of each individual company. The good news with Argyle, as Ryan points out, is that the NSA built Accumulo so that organizations can closely control who, within their operation, has access to each individual piece of data. Its a trade off, Ryan says. Privacy is so important. But with more data-enrichment, you can improve the results of your analytics.

Read more from the original source:

Startup Fights Fraud With Tools From Facebook, NSA

Posted in NSA

People trust NSA more than Google, survey says

In a result consistent with previous polling, a new poll has respondents claiming they're more concerned about Google seeing all their private data than the government.

People claim to trust Google less than they trust the NSA. Are they telling the truth? TED 2014/YouTube screenshot by Chris Matyszczyk/CNET

People don't always say what they think. Especially in business and love.

Please, therefore, consider this question: whom would you trust more with your private data: the NSA, a company like Google, or your mom?

I ask because I'm looking at the results of a survey, conducted between October 9 and12, that asked just that. It asked simple questions, to which its sponsors hoped to get simple answers.

The results went like this. On a scale of 1 to 10 (10 being "I am shivering uncontrollably with fear") the idea of Google or a similar concern having access to all your private data got a concerned score of 7.39.

The idea of the NSA having its eyes and hands all over you? 7.06. What about your boss snooping? That merited a mere 6.85. While the notion of your parents knowing it all got a 5.93.

Of the options open to the respondents, they were most relaxed about their spouse or significant other seeing their everyday warts. This idea scored a mere 4.55.

The survey was created by Survata, a company whose purpose is to interrupt content by asking people to complete a survey before they get the whole content. Survata claims in its methodological explanation that it carefully vets those it thinks might offer insincerity.

I wonder, however. If these results are to be believed, then humanity is rife with those who speak out of several sides of their mouth. On the one hand, we claim to fear Google most, yet we allow it, Facebook and the like to crawl over our daily routines and information like summer flies enjoying a rancid grapefruit.

The rest is here:

People trust NSA more than Google, survey says

Posted in NSA

Startup Fights Fraud With Tools From FacebookAnd the NSA

Tom Ryan wanted to build something that could identify criminal behavior inside massive mobile networks, stock trading services, ecommerce sites, and other online operations. So he turned to a pair of familiar names for help: Facebook and the NSA.

He didnt exactly knock on Facebooks front doorlet alone the NSAs. But he did adopt a pair of sweeping software systems built by these giants of the online age, systems that help them juggle the massive amounts of digital information streaming into their computer data centers.

Ryan grabbed an NSA tool called Accumulo, which likely plays a key role in the agencys notoriously widespread efforts to monitor internet traffic in the name of national security, and he paired it with a Facebook tool called Presto, used to quickly analyze the way people, ads, and all sorts of other things behave on the worlds largest social network. Both Facebook and the NSA, you see, have open sourced their software, meaning these tools are freely available to the world at large.

Ryan is the CEO of a small Silicon Valley startup called Argyle Data. Over the past sixteen months, he and his engineering team used Accumulo and Presto to fashion software that can root out fraud inside todays massive online operations, and theyve already deployed the thing with at least a few companies, including Vodafone, the British telecommunications giant that runs mobile phone networks across Europe.

Argyle is a nicely rounded metaphor for the recent evolution of the data-juggling technologies that drive our modern businesses. Over the past several years, massive web companies such as Google and Facebookas well as similarly ambitious operations like the NSAhave built a new breed of software that can store and analyze data across tens, hundreds, and even thousands of machines, and now, these software tools are trickling down to the rest of the business world. As a startup, Ryan says, you want to build on whats new, not whats old.

The poster child for this movement is a software system called Hadoop, which was inspired by work originally done at Google. But Hadoopat least as it was originally conceivedis now giving way to tools that operate at much faster speeds. Hadoop is a batch system, meaning you assign it a task and then wait a good while for the answer to come back. Newer systems are much better at operating at speed.

Argyles software is a prime example. Using machine learning and whats called deep packet inspection, it analyzes the individual packets of data that stream across a network, and if a piece of data meets certain criteriai.e. sets off certain flagsit gets shuttled into Accumulo, a massive database that can extend across myriad machines. It helps us scan tens of millions to hundreds of millions of transactions a second, Ryan says. Companies can then use a version of Presto to further analyze this data, executing specific queries in near real-time.

Christopher Nguyen, the CEO of a data analysis startup called Adatao who once worked with similar big data software inside Google, says that Arygles method isnt necessarily the best way to analyze such massive amounts of information at speed. But he agrees that this is part of a much much larger movement towards real-time big data tools, tools that also include something called Spark, developed at the University of California at Berkeley, and various other software contraptions.

At the same time, Argyles story underlines another aspect of this movement. At the NSA, you see, Accumulo is likely part of a surveillance effort that underpins our online privacy, and as the tools like this make it easier to collect and analyze such enormous amounts data, they may help push us towards a world where privacy is eroded even further. Vodafone, after all, is using Argyles software to closely analyze data streaming across European wireless networks used by the general public.

According to Seth Schoen, a staff technologist with the Electronic Frontier Foundation, laws typically allow companies to use tools along the lines of Argyleincluding deep packet inspectionto do things like fight fraud. But in the end, their affect on privacy boils down to the policy of each individual company. The good news with Argyle, as Ryan points out, is that the NSA built Accumulo so that organizations can closely control who, within their operation, has access to each individual piece of data. Its a trade off, Ryan says. Privacy is so important. But with more data-enrichment, you can improve the results of your analytics.

Visit link:

Startup Fights Fraud With Tools From FacebookAnd the NSA

Posted in NSA

Gone To Pot – Several States Voting To Legalize Marijuana – Attack On Second Amendment? – F&F – Video


Gone To Pot - Several States Voting To Legalize Marijuana - Attack On Second Amendment? - F F
Gone To Pot - Several States Voting To Legalize Marijuana - Attack On Second Amendment? - Fox Friends =========================================== **Plea...

By: NSTP - Wake The Hell Up America!

View post:

Gone To Pot - Several States Voting To Legalize Marijuana - Attack On Second Amendment? - F&F - Video

Protect Second Amendment

I, like the vast majority of Chambers County residents, believe that our Second Amendment right to bear arms is unalienable and given to us by God, not the government. It is sacred to many of us, and we will fight to protect it.

Today is the day when we need to stand up for this right. Democrat House District 23 candidate Susan Criss wants to restrict these rights and make it harder for law-abiding citizens to own firearms in Chambers County.

kAmrC:DD 😀 2=D@ 282:?DE 4@>>@?D6?D6 @A6? 42CCJ =68:D=2E:@?[ 3FE[ >@DE 5:DEFC3:?8=J[ 25G@42E6D 7@C >@C6 DEC:?86?E 324<8C@F?5 4964< @? 8F? @H?6CD] %96D6 2C6 E96 D2>6 A@=:4:6D AFD965 3J q2C24< ~32>2]k^Am

kAmw6C @AA@?6?E #6AF3=:42? (2J?6 u2:C4=@E9[ @? E96 @E96C 92?5[ 😀 DEC@?8=J 6?5@CD65 3J E96 }2E:@?2= #:7=6 pDD@4:2E:@? 2?5 %6I2D $E2E6 #:7=6 pDD@4:2E:@?] (2J?6 8C6H FA 9F?E:?8 2?5 7:D9:?8 😕 r92>36CD r@F?EJ 2?5 D92C6D @FC G2=F6D] w6 H:== ?@E @?=J AC@E64E @FC 8F? C:89ED[ 3FE 2=D@ 96=A 6?24E A@=:4:6D E92E 2==@H FD E@ 36EE6C AC@E64E @FCD6=G6D]k^Am

kAm(6 ?665 E@ >2<6 @FC G@:46 962C5 2?5 >2<6 DFC6 E92E r92>36CD r@F?EJ :D?E C6AC6D6?E65 3J D@>6@?6 H9@ D92C6D E96 D2>6 G:6HD C682C5:?8 E96 $64@?5 p>6?5>6?E 2D q2C24< ~32>2] }@H 😀 E96 E:>6 E@ DE2?5 FA 2?5 7:89E] x 9@A6 E92E J@F H:== 42DE 2 G@E6 7@C (2J?6 u2:C4=@E9 D@ E92E H6 42? 92G6 D@>6@?6 2E E96 DE2E6 42A:E@= 5676?5:?8 @FC G2=F6D]k^Am

kAmkDEC@?8m%2>>J y6?<:?D[ 492:Ck^DEC@?8mk^Am

kAmkDEC@?8mr92>36CD r@F?EJk^DEC@?8mk^Am

kAmkDEC@?8m#6AF3=:42? !2CEJk^DEC@?8mk^Am

kAmkDEC@?8mk^DEC@?8mk^Am

See the article here:

Protect Second Amendment