Technology

BlueLock writes

March 20th, 2003 @ 5:46PM EST
New York, NY (AP): National Infrastructure Protection Center, a division of the Federal
Bureau of Investigation, today announced the apprehension and arrest of Reid Lauring, known
on the Internet under the hacker alias: digitron.

Sources say the FBI have made this
arrest in connection with a recent computer intrusion of Harvard University's Bio-Chemical
Department computers, in which sensitive biological and chemical data was stolen and is
believed to have been sold to a unknown third party.

FBI sources also say they are currently pursuing the investigation and arrest of another
hacker, Akael Sahir Rhamaan, who also goes by the hacker alias: Osek. They say he is not
connected with any terrorist organizations, however they believe he is the ringleader in
these attacks.
In an interview with George Marshoff, a Public Relations Representative of Harvard
University, he said the data is highly sensitive and could be used to create chemical and
biological weapons if fallen into the wrong hands.

Louis Lingg writes:
"The National Defense University has posted on its website the text of Shock and Awe: Achieving Rapid Dominance, published in 1996 and written by Harlan K. Ullman and James P. Wade with L.A. "Bud" Edney, Fred M. Franks, Charles A. Horner, Jonathan T. Howe, and Keith Brendley.

An excerpt from the book's Prologue:


Since before Sun Tzu and the earliest chroniclers of war recorded their observations, strategists

and generals have been tantalized and confounded by the elusive goal of destroying the adversary's

will to resist before, during, and after battle. Today, we believe that an unusual opportunity exists to

determine whether or not this long-sought strategic goal of affecting the will, understanding, and

perception of an adversary can be brought closer to fruition. Even if this task cannot be

accomplished, we believe that, at the very minimum, such an effort will enhance and improve the

ability of our military forces to carry out their missions more successfully through identifying and

reinforcing particular points of leverage in the conflict and by identifying and creating additional

options and choices for employing our forces more effectively.

First International Mobile IPR Workshop

Rights Management of Information Products on the Mobile Internet


Helsinki Institute for Information Technology HIIT

August Wednesday 27 - Thursday 28, 2003

Helsinki, Finland


http://www.hiit.fi/de/mobileipr/workshop/



MobileIPR Workshop welcomes papers on all aspects of rights management

related to information products such as music, electronic books, videos,

multimedia, games, or software distributed on the Mobile Internet

commercially or otherwise.

Anonymous Comrade writes:

"Little Sister 2003

Community Resistance, Security, Law and Technology"

May 9-11, 2003



Vancouver, British Columbia (Coast Salish Territory)

Martime Labour Centre

The Goal is Freedom:



We believe our greatest strength in defeating the security and legal

maneuvers used against us as community organizers is by unifying and

building common cause in our movements. This means building diverse

coalitions who are willing to support each other in order to create safe

spaces for oppposition to the policies and practices of governments and

corporations. Ultimately, as organizers, our goal is to resist the

injustices that our communities face, while retaining our physical and

emotional freedom.

gnat writes

"The website for the Committee for theLiberation of Iraq (CLI), a Washington insider group lobbying for war with Iraq, has had their website hacked! (See links at bottom for more information.)


It seems like the DNS has been somehow rerouted to www.salam2u.com rather than www.liberationiraq.org. The code that's doing is impressive too. It actually jumps you out of a google cache page, back to salam2u.



See for yourself



http://www.liberationiraq.org



and the google cache:



http://216.239.57.100/search?q=cache:dWU-YqxtT-oC: www.liberationiraq.org/+committee+liberation+iraq& hl=en&ie=UTF-8

Autonomous Geek writes "The POI (POSIX Organizing Initiative) in Portland, OR is putting out this draft conference call to gather interested parties and supporters together to plan the Portland Oregon Social Information Xchange for June, 2003.



What we would like you to do is read the preliminary ideas we have put

together, and let us know if you are interested in helping us organize

this conference, speaking at it, providing training or anything else.

http://www.cnn.com/2003/TECH/internet/01/31/intern et.saint/index.html



(CNN) -- Fed up with hackers, a flood of spam and lousy connections, Italian Roman Catholics have launched a search for a patron saint of the Internet. And they hope their online poll will yield a holy Web protector by Easter.



So far, about 5,000 visitors are casting their votes daily on
http://www.santiebeati.it, something that delights Monsignor James P. Moroney, an expert on prayer and worship for the U.S. Conference of Catholic Bishops.

jim writes: from Rethinking Marxism Volume 13, Number 3/4 (Fall/Winter 2001)


Protocol, or, How Control Exists after Decentralization


Alex Galloway

So far there is no Marxist theory of the media.

-Hans Magnus Enzensberger

The basic question asked by Empire is this: How does control exist after decentralization?

In former times the answer was clear. In what Michel Foucault called the sovereign societies of the classical era, characterized by centralized power and sovereign fiat, control existed as an extension of the word and deed of the master, assisted by violence and other coercive factors. Later, the disciplinary societies of the modern era took hold, replacing violence with more bureaucratic forms of command and control. Gilles Deleuze has extended this periodization into the present day by suggesting that after the disciplinary societies come the societies of control. Hardt and Negri (2000) fundamentally agree with this periodization, calling it instead the move from the modern disciplinary societies to societies of imperial control.

State to Save Billions on Software:

Crippling Licence Fees Will Be Avoided by Using Free
Open-Source Programs

http://www.bday.co.za/bday/content/direct/1,3523,1 266306-6099-0,00.html>

Information Technology Editor

When Microsoft introduced a new licensing model for its
software late last year, simmering resentment within
government finally boiled over.

hydrarchist writes:

The Wireless Commons Manifesto


We have formed the Wireless Commons because a global wireless network is within our grasp. We will work to define and achieve a wireless commons built using open spectrum, and able to connect people everywhere. We believe there is value to an independent and global network which is open to the public. We will break down commercial, technical, social and political barriers to the commons. The wireless commons bridges one of the few remaining gaps in universal communication without interference from middlemen and meddlers.

Syndicate content