Friday, May 31, 2013

Need A Job? The NSA’s Utah Spy Center Is Hiring

Kokesh Calls Off Armed March On Washington, D.C.; Now Wants July 4th March On State Capitals

Holder Signed Off on Warrant Identifying Fox News Reporter as Criminal Conspirator |

Why is Eric Holder in charge of reviewing Eric Holder's surveillance of journalists policy?

Holder: We've Droned 4 Americans, 3 by Accident. Oops. |

Oregon Man Fires Warning Shot At Felon Attempting To Break Into Home, Gets Hauled To Jail :

Scientists poke frozen mammoth, liquid blood squirts out

Mars pebbles prove water history

California Legislature Prepares To Track Ammo Buyers With Forced Background Checks

It’s Time To Fire Eric Holder :

Sheriff Joe Arpaio Appeals Court Ruling: If We’re Guilty Of Profiling, So Are The Feds :

Test: Most ‘Honey’ Isn’t Real

Illegal GM Wheat in Oregon Under Investigation

Native Ohioans' speaking patterns help scientists decipher famous moon landing quote

Tuesday, May 28, 2013

A list of the U.S. weapons designs and technologies compromised by hackers

The following is reproduced from the nonpublic version of the
Defense Science Board report "Resilient Military Systems and the Advanced Cyber Threat":

Table 2.2 Expanded partial list of DoD system designs and technologies compromised via cyber exploitation

SYSTEM DESIGNS

Terminal High Altitude Area Defense

Patriot Advanced Capability-3

Extended Area Protection and Survivability System (EAPS)

F-35

V-22

C-17

Hawklink

Advanced Harpoon Weapon Control System

Tanker Conversions

Long-term Mine Reconnaissance System

Global Hawk

Navy antenna mechanisms

Global Freight Management System

Micro Air Vehicle

Brigade Combat Team Modernization

Aegis Ballistic Missile Defense System

USMC Tracked Combat Vehicles

Warfighter Information Network-Tactical (WIN-T)

T700 Family of Engines

Full Authority Digital Engine Controller (FADEC)

UH-60 Black Hawk

AMRAAM (AIM-120 Advanced Medium-Range Air-to-Air Missile)

Affordable Weapons System

Littoral Combat Ship

Navy Standard Missile (SM-2,3,6)

P-8A/Multi-Mission Aircraft

F/A and EA-18

RC-135 Detect./Collect.

Mk54 Light Weight Torpedo

TECHNOLOGIES

Directed Energy

UAV video system

Specific Emitter identification

Nanotechnology

Dual Use Avionics

Fuze/Munitions safety and development

Electronic Intelligence Processing

Tactical Data Links

Satellite Communications

Electronic Warfare

Advanced Signal Processing Technologies for Radars

Nanostructured Metal Matrix Composite for Light Weight Ballistic Armor

Vision-aided Urban Navigation & Collision Avoidance for Class I Unmanned Air Vehicles (UAV)

Space Surveillance Telescope

Materials/processing technologies

IR Search and Track systems

Electronic Warfare systems

Electromagnetic Aircraft Launch

Rail Gun

Side Scan sonar

Mode 5 IFF

Export Control, ITAR, Distribution Statement B,C,D Technical Information

CAD drawings, 3D models, schematics

Software code

Critical technology

Vendor/supply chain data

Technical manuals

PII (email addresses, SSN, credit card numbers, passwords, etc.)

Attendee lists for program reviews and meetings

This Man Has Collected 200 Years of Beautiful, Odd, and Historic Bikes

Researchers find 400 year old Ice Age plants in Arctic able to grow anew as glaciers retreat

US Military Weapons Designs Stolen by Chinese Hackers -

Darwin Awards Winner - 2013 Dumbest Funny Motorcycle Scooter Accident - YouTube

Monday, May 27, 2013

13 Obama Tax Hikes on the Middle Class in 2013 - YouTube

Appeals Court Spurns Obama’s UnConstitutional Recess Appointments :

US entertainment industry to Congress: make it legal for us to deploy rootkits, spyware, ransomware and trojans to attack pirates!

US spy device 'tested on NZ public' - National - NZ Herald News

Palin On Obama’s IRS Attack Dog: ‘Will We Stand For This?’ :

NBC Reporter Helps Confirm Obama’s Birth Certificate Altered – 2/26/2013