Quantcast

Articles

Get all-in-one coverage of Internet security and online privacy issues brought up by the industry’s leading experts at security conferences and seminars.

Common Darknet Weaknesses: An Overview of Attack Strategies

Adrian Crenshaw, a well-known InfoSec expert and author of Irongeek.com, provides a comprehensive overview of known darknets at AIDE Conference. Hello everyone! My name is Adrian Crenshaw, and my presentation today is Darknets: An Overview of Attack Strategies. First of all, a little bit about me, if...

The Mysterious Mister Hokum 5: Almost Made It

In conclusion to his DerbyCon presentation, Jason Scott tells the things he learned about Robert Hoquim from his family and how Aleshe’s life came to its end. I was talking to Aleshe’s brother about: “Where do you guys come from?” And here is a picture: Tom is on the bottom here, sitting in...

The Mysterious Mister Hokum 4: Fraud as a Desire Path

Jason Scott dwells on the contrast between what’s on the cover and what may be inside when it comes to technology, and focuses on John Aleshe’s background. How much scamming is out there? Well, this (see right-hand image), for instance, is the cover of the Atari Video Checkers program for the Atari...

The Mysterious Mister Hokum 3: Inexistent Devices for Sale

Moving on with early PC scams, Jason Scott enumerates a few cases where con artists would attempt to sell imaginary or non-functional equipment back in the day. Like I said, it was an expensive time, and there were a lot of promises. This (see right-hand image) is Radio Shack, who has turned out to be a...

The Mysterious Mister Hokum 2: Outbreak of Early Computer Frauds

Jason Scott moves on to tell further details about Robert Hoquim’s BBS fraud and some of the first shady computer deals that were widespread back in the 1970s. So, he became the ‘solve-all-your-problems’ amazing guy. He ended up taking everyone’s messages, and then quietly entering into these...

The Mysterious Mister Hokum

Well-known technology historian Jason Scott tells the extraordinary story of the con artist named John Paul Aleshe, aka Robert Hoquim, at DerbyCon conference. Welcome to The Mysterious Mister Hokum, presented to you by Jason Scott, proprietor of textfiles.com, documentary filmmaker, famous cat owner,...

Beyond Information Warfare 6: Possible Solutions

This part contains Winn Schwartau’s summary on what could be done to reduce the destructive impact of technology weaponization and other types of abuse. Swarming and self-organization. Is everybody familiar with John von Neumann’s Automaton theory? Quick brief comments, simple rule set: if I am here, in...

Beyond Information Warfare 5: Bio-Engineering and Distributed Intelligence

Winn Schwartau’s emphasis within this section is on advancement of bio-engineering and computer power increase, and the way these can possibly be weaponized. Some stuff is amazing these days, some of the new technologies. We are going to have bio-engineered prosthetics. And can we fuck with that...

Beyond Information Warfare 4: Exploitable Cutting-Edge Technology

Delving deeper into the weaponization aspect, Winn Schwartau gets down to describing such technologies as HERF, EMP, un-manned vehicles, and flying bots. Next thing I’m really interested in is EMP and HERF (see right-hand image). Why do I care about EMP and HERF? It makes some other technology useless –...

Beyond Information Warfare 3: Technology Weaponization

The concept of weaponizing new technologies is what Winn Schwartau covers in this section, focusing in particular on IPv6, voice simulation, and mobile. What we have to look at is life cycle (see right-hand image). One of the things that you get – there’s no magic here, there’s just standard life...