I wouldn’t trust them with my security. Why should you?

In June 1943 in the middle of WWII, US Congressman Andrew May visited Pear Harbour for a top-secret briefing on how the naval battle in the Pacific was progressing. Part of the briefing was the disclosure that US submarine losses were very light because the Japanese didn’t know how deep US subs could actually dive, … Continue reading

The ultimate hack.

An article this week in India’s Economic Times newspaper reported on a formal complaint lodged with the Delhi police of sexual harassment from an employee of The Energy and Resources Institute (TERI) against one of its directors, a certain RK Pachauri, who also happens to be the chairman of the IPCC. Obviously there’s no conflict of … Continue reading

How to hunt somebody down on the internet – Part 2.

In a previous article, I covered the two other methods of attempting to determine the identity of an anonymous individual on the internet; namely using their IP address or applying an appropriate technique of social engineering. Here, I’ll be covering the third; what I call the fist analysis approach. The first part of it will be giving … Continue reading

How to hunt somebody down on the internet – Part 1.

What I’m going to show you here requires no technical skills – anyone with a basic knowledge of surfing the net can do it. What is does require though, is some imagination, patience and a degree of persistence. It’s totally legal and is not hacking, though it uses some of the techniques of the reconnaissance … Continue reading

So, was climategate a hack after all?

This is going to be one of those difficult articles to write, just to make it easy to read. It’s going to get technical at points, because it has to, so there’s going to be more than a few detours to explain things, but bear with me. It’s Sunday afternoon, I’m wearing sunglasses indoors, it’s a … Continue reading

Oh, what a wonderful MSM.

I’ve been following the various investigations into the hacking of voice mail and other criminal activities by elements of the mainstream media (MSM) in the UK. They longer they go on, the more varied and widespread the abuses are being found to be; email break ins, computer break ins and the routine bribing of law … Continue reading

Internet security 2 : There’s a lot more going on than you’d think.

In a previous article here, I gave some information about what basic precautions you should take in order to enjoy the web safely. I’d like to drop down to a slightly lower level and tell you a few more simple things you can do to make surfing the web a lot safer. They won’t be technical … Continue reading

Why Climategate was not a computer hack.

Why Climategate was not a computer hack. In the year since the Climategate material became public, I’ve read many articles on the effect the publication has had on the AGW debate. When it is referred to as a hack in them, I usually don’t bother reading any further. If the writer of the article is … Continue reading

Internet Security 1 : Let’s be safe out there.

There are a number of reasons why you should always blog anonymously and very few against it. There are some fanatics in the AGW debate whose activities go far beyond what would be termed acceptable behaviour both in the blogosphere or outside it. Indeed, if they were traced and they can be, they could end … Continue reading