Member since: Fri Sep 8, 2006, 12:47 PM
Number of posts: 9,483
Number of posts: 9,483
- 2013 (99)
- 2012 (99)
- 2011 (5)
- December (5)
- Older Archives
Cheap 3D printer works with steel
Next: a printed gun that's dangerous and affordable
By Richard Chirgwin, 9th December 2013
The one thing that made 3D printed guns tolerable to the non-gun-owning community was that they were made of plastic, because metal 3D printers were costly. Now, a bunch of scientists from Michigan Tech are showing off a cheap 3D printer that fabricates in metal.
Metal 3D printing isn't new, but it's been expensive until now. The open-source Michigan project, here, offers a bill of materials costing just under $US1,200 to build the 3D printer, controlled by a Linux computer.
The printer, described in detail here, produces steel components, and while its creators describe it as “a work in progress”, they've already successfully produced simple shapes like sprockets.
Steel is melted for printing using a low-cost gas-metal arc welder under the control of a simple open source micro-controller, and models can be created in Blender or OpenSCAD, or anything else that can output an STL file.
I wouldn't trust a barrel made by this method, but it looks like it could print a workable receiver
Posted by friendly_iconoclast | Tue Dec 10, 2013, 12:18 AM (2 replies)
Hammond supporters publish alleged list of foreign targets that FBI had him hack
List includes gov't sites from Turkey, Iran, Brazil, Slovenia, and more.
by Cyrus Farivar - Nov 15 2013, 3:04pm EST
During the sentencing hearing of convicted hacker Jeremy Hammond on Friday, the young Chicagoan began to read from his prepared statement, saying that he had been directed to hack various foreign government websites by Anonymous leader turned FBI informant Sabu.
In court, Hammond said that “these intrusions, all of which were suggested by Sabu while cooperating with the FBI, affected thousands of domain names and consisted largely of foreign government websites, including those of Turkey, Iran—” before the judge cut him off and said that the list of targets was to be redacted.
However, shortly after the hearing concluded, Jacob Appelbaum, a well-known American computer security researcher currently living in Berlin, began tweeting what he claimed was the unredacted list of targets, based on a Pastebin post. Appelbaum later linked to that version of Hammond’s statement, which was not redacted.
Said list can be found at:
Text from a previously unpublished statement which seems to clarify above redactions:
“Sabu also supplied lists of targets that were vulnerable to “zero day exploits” used to break into systems, including a powerful remote root vulnerability effecting the popular Plesk software. At his request, these websites were broken into, their emails and databases were uploaded to Sabu’s FBI server, and the password information and the location of root backdoors were supplied. These intrusions took place in January/February of 2012 and affected over 2000 domains, including numerous foreign government websites in Brazil, Turkey, Syria, Puerto Rico, Colombia, Nigeria, Iran, Slovenia, Greece, Pakistan, and others. A few of the compromised websites that I recollect include the official website of the Governor of Puerto Rico, the Internal Affairs Division of the Military Police of Brazil, the Official Website of the Crown Prince of Kuwait, the Tax Department of Turkey, the Iranian Academic Center for Education and Cultural Research, the Polish Embassy in the UK, and the Ministry of Electricity of Iraq.
Sabu also infiltrated a group of hackers that had access to hundreds of Syrian systems including government institutions, banks, and ISPs. He logged several relevant IRC channels persistently asking for live access to mail systems and bank transfer details. The FBI took advantage of hackers who wanted to help support the Syrian people against the Assad regime, who instead unwittingly provided the U.S. government access to Syrian systems, undoubtedly supplying useful intelligence to the military and their buildup for war.
All of this happened under the control and supervision of the FBI and can be easily confirmed by chat logs the government provided to us pursuant to the government’s discovery obligations in the case against me. However, the full extent of the FBI’s abuses remains hidden. Because I pled guilty, I do not have access to many documents that might have been provided to me in advance of trial, such as Sabu’s communications with the FBI. In addition, the majority of the documents provided to me are under a “protective order” which insulates this material from public scrutiny. As government transparency is an issue at the heart of my case, I ask that this evidence be made public. I believe the documents will show that the government’s actions go way beyond catching hackers and stopping computer crimes.”
Very clever of the Feds- hack other countries without any messy links to *.gov or *.mil
Posted by friendly_iconoclast | Sat Nov 16, 2013, 05:49 PM (2 replies)
Poland peels back layers on secret CIA prison for suspected terrorists
By Roy Gutman
McClatchy Newspapers August 13, 2012
STARE KIEJKUTY, Poland — On an idyllic lake surrounded by woods and a double row of mesh-and-razor-wire fences about 100 miles north of Warsaw, there stands a secluded villa that the CIA once used to interrogate – and allegedly torture – top al Qaida suspects.
On the grounds of the Polish intelligence-training academy and nicknamed “Markus Wolf” for the former East German spy chief, it’s the focal point for a top-secret probe that Polish prosecutors have launched into how their government tolerated rampant violations of international and Polish law.
If former officials are brought to trial, or if the stacks of classified files in the prosecutors’ offices are made public, the result will be revelations about an American anti-terrorism operation whose details U.S. officials are fighting to keep secret.
Already the prosecutor has charged Zbigniew Siemiatkowski, Poland’s former interior minister and intelligence chief, with unlawful detention and corporal punishment for allowing the CIA to operate at Stare Kiejkuty from December 2002 to September 2003.
Posted by friendly_iconoclast | Thu Nov 14, 2013, 10:16 PM (0 replies)
Or just good old fashioned thoughtcrime?
S'okay, I've run into people like you before:
friendly_iconoclast Donating Member (1000+ posts) Send PM | Profile | Ignore Sat Feb-28-09 06:34 PM
Professor Called Police After Student Presentation
This happened at Central Connecticut State University
Professor Called Police After Student Presentation
Posted by admin on 2/24/09 • Categorized as News
For CCSU student John Wahlberg, a class presentation on campus violence turned into a confrontation with the campus police due to a complaint by the professor.
On October 3, 2008, Wahlberg and two other classmates prepared to give an oral presentation for a Communication 140 class that was required to discuss a “relevant issue in the media”. Wahlberg and his group chose to discuss school violence due to recent events such as the Virginia Tech shootings that occurred in 2007.
Shortly after his professor, Paula Anderson, filed a complaint with the CCSU Police against her student. During the presentation Wahlberg made the point that if students were permitted to conceal carry guns on campus, the violence could have been stopped earlier in many of these cases. He also touched on the controversial idea of free gun zones on college campuses.
That night at work, Wahlberg received a message stating that the campus police “requested his presence”. Upon entering the police station, the officers began to list off firearms that were registered under his name, and questioned him about where he kept them.
They told Wahlberg that they had received a complaint from his professor that his presentation was making students feel “scared and uncomfortable”.
“I was a bit nervous when I walked into the police station,” Wahlberg said, “but I felt a general sense of disbelief once the officer actually began to list the firearms registered in my name. I was never worried however, because as a law-abiding gun owner, I have a thorough understanding of state gun laws as well as unwavering safety practices.”
Professor Anderson refused to comment directly on the situation and deferred further comment.....
Strange seeing such thoughts expressed by the same person who once wrote:
No roll back on free speech. What a stupid notion. If the point of view / person cannot stand challenge and ridicule, then it is a sure sign that it is dogma and NEEDS to swept out.
I guess some free speech is freer than other free speech for you...
Posted by friendly_iconoclast | Thu Nov 14, 2013, 12:21 AM (0 replies)
Selectman Barry Greenfield introduced an enforcement discussion Wednesday that he hopes will lead to the safeguarding of guns in town — keeping them out of the hands of children.
The selectman said state law requires Massachusetts gun owners to keep their firearms locked away or rendered inoperable.
The problem, he said, is that police do not have the authority, granted by a local ordinance, to enforce the law and inspect the safeguarding of guns at the homes of the 600 registered gun owners in town.
The selectman said he has spoken with Swampscott Police Chief Ron Madigan about this.
"We need the ability to enforce the state law," the selectman said.
Apparently, this fuckwit is unfamiliar with the Fourth Amendment...
Posted by friendly_iconoclast | Wed Nov 13, 2013, 10:42 PM (16 replies)
(More formally, "Moms Demand Action for Gun Sense in America")
Much like Mothers Against Drunk Driving was created to reduce drunk driving, Moms Demand Action for Gun Sense in America (www.momsdemandaction.org) was created to demand action from legislators, state and federal; companies; and educational institutions to establish common-sense gun reforms. We are a non-partisan grassroots movement of American mothers demanding new and stronger solutions to lax gun laws, loopholes and policies that for too long have jeopardized the safety of our children and families.
Shannon Watts's Overview
Founder at Moms Demand Action for Gun Sense in America
Freelance Senior Consultant/Counselor at Fleishman-Hillard
Founder and President at VoxPop Public Relations
Vice President, Corporate Communications at WellPoint
And not exactly run by a progressive, either:
...At WellPoint, Troughton led a team of 40 public relations professionals responsible for implementing communications programs for the 14 states in which the company operates, as well as the company's business units.
Previously, Ms. Troughton served as director of Global Communications for GE Healthcare, a $15 billion medical diagnostics and device business within General Electric.
Troughton also served as director of Public and Corporate Affairs for Monsanto Company in St. Louis where she led external initiatives designed to generate positive, proactive media coverage of the company's agriculture biotechnology products.
In addition, Troughton was vice president of Corporate and Public Affairs at Fleishman-Hillard public relations agency in Kansas City, Missouri, where she developed strategic issues and crisis management programs to help protect and enhance the reputation of public and private organizations and corporations.
A 'grassroots' organization that just happened to be founded by someone with decades of
experience in the PR industry and who ran her own firm?
Suuuure it is.
P.S.- Troughton Watts also produced this gem:
"An assault weapon enables humans to shoot 10 rounds in one minute"
Posted by friendly_iconoclast | Fri Nov 8, 2013, 02:10 PM (42 replies)
Seems like the guy who pretty much invented it didn't have a problem
with white guys playing it...
And it looks like some of the guys in Antibalas (the premier Afrobeat band around)
are a little melanin-challenged:
Posted by friendly_iconoclast | Mon Oct 28, 2013, 08:13 PM (1 replies)
How The NSA Deploys Malware: An In-Depth Look at the New Revelations
October 8, 2013 | By Dan Auerbach
We've long suspected that the NSA, the world's premiere spy agency, was pretty good at breaking into computers. But now, thanks to an article by security expert Bruce Schneier—who is working with the Guardian to go through the Snowden documents—we have a much more detailed view of how the NSA uses exploits in order to infect the computers of targeted users. The template for attacking people with malware used by the NSA is in widespread use by criminals and fraudsters, as well as foreign intelligence agencies, so it's important to understand and defend against this threat to avoid being a victim to the plethora of attackers out there.
Deploying malware over the web generally involves two steps. First, as an attacker, you have to get your victim to visit a website under your control. Second, you have to get software—known as malware—installed on the victim's computer in order to gain control of that machine. This formula isn't universal, but is often how web-based malware attacks proceed.
In order to accomplish the first step of getting a user to visit a site under your control, an attacker might email the victim text that contains a link to the website in question, in a so-called phishing attack. The NSA reportedly uses phishing attacks sometimes, but we've learned that this step usually proceeds via a so-called “man-in-the-middle” attack.1 The NSA controls a set of servers codenamed “Quantum” that sit on the Internet backbone, and these servers are used to redirect targets away from their intended destinations to still other NSA-controlled servers that are responsible for the injection of malware. So, for example, if a targeted user visits “yahoo.com”, the target's browser will display the ordinary Yahoo! landing page but will actually be communicating with a server controlled by the NSA. This malicious version of Yahoo!'s website will tell the victim's browser to make a request in a background to another server controlled by the NSA which is used to deploy malware...
...The NSA has a set of servers on the public Internet with the code name “FoxAcid” used to deploy malware. Once their Quantum servers redirect targets to a specially crafted URL hosted on a FoxAcid server, software on that FoxAcid server selects from a toolkit of exploits in order to gain access to the user's computer. Presumably this toolkit has both known public exploits that rely on a user's software being out of date, as well as zero-day exploits which are generally saved for high value targets.2 The agency then reportedly uses this initial malware to install longer lasting malware.
Also discussed here:
Posted by friendly_iconoclast | Wed Oct 9, 2013, 10:57 PM (2 replies)
I suspect certain member names are being used by multiple posters, and am wondering
if the admins are OK with this.
Posted by friendly_iconoclast | Thu Oct 3, 2013, 04:45 PM (1 replies)
Do Texas Starbucks have '30.06 signs' posted prohibiting guns?
For those unfamiliar, they would look like this:
In Texas, anything else is not a legal prohibition on the carriage of concealed weapons.
Unless a SB in Texas has one of these by the front door, concealed handguns are still allowed there.
Without one of those in every Lone Star Starbucks, you can be certain that Howard Schultz
merely offered up some fine words that have gulled the credulous
into thinking they've achieved something...
Posted by friendly_iconoclast | Thu Oct 3, 2013, 04:40 PM (12 replies)