Saturday, December 21, 2013

Full transcript: President Obama’s December 20 news conference



PRESIDENT OBAMA: Major Garrett.

Q: That's quite a lead-in, Mr. President. Thank you.

Rick Leggett, who is the head of the NSA task force on Edward Snowden, told "60 Minutes" that it was, quote, "worth having a conversation about granting Edward Snowden amnesty." To what degree, sir, were you pleased that he floated this trial balloon? And under what circumstances would you consider either a plea agreement or amnesty for Edward Snowden?

And what do you say to Americans, sir, who after possibly being alerted to Judge Leon's decision earlier this week, reading the panel recommendations, believe Edward Snowden set in motion something that is proper and just in this country about the scope of surveillance, and should not be considered by the government a criminal?

PRESIDENT OBAMA: I've got to be careful here, Major, because Mr. Snowden is under indictment. He has been charged with -- with crimes, and that's the province of the attorney general and ultimately, a judge and a jury. So I -- I can't weigh in specifically on this case at this point. I'll -- I'll make -- I'll try to see if I can get at the -- the spirit of the question, even if I can't talk about the specifics.

I have said before and I believe that this is an important conversation that we needed to have. I have also said before that the way in which these disclosures happened have been -- have been damaging to the United States and damaging to our intelligence capabilities.

And I think that there was a way for us to have this conversation without that damage.

I'll give you just one specific example.

The -- the fact of the matter is that the United States, for all our warts, is a country that abides by rule of law, that cares deeply about privacy, that cares about civil liberties, that cares about our Constitution. And as a consequence of these disclosures, we've got countries who actually do the things that Mr. Snowden says he's worried about, very explicitly -- engaging in surveillance of their own citizens, targeting political dissidents, targeting and suppressing the press, who somehow are able to sit on the sidelines and act as if it's the United States that has problems when it comes to surveillance and intelligence operations. And that's a pretty distorted view of what's going on out there.

So I think that, as important and as necessary as this debate has been, it is also important to keep in mind that this has done unnecessary damage to U.S. intelligence capabilities and U.S. diplomacy. But I will leave it up to the courts and the attorney general to weigh in publicly on the specifics of Mr. Snowden's case.

Q: But sir, if I could follow up, Mr. Leggett is setting this in motion, at least raising this as a topic of conversation. You, sir, would, I'm certain, be consulted if there was ever going to be a conversation about amnesty or a plea bargain for Edward Snowden.

PRESIDENT OBAMA: I said -- I think that's true, Major. And I guess what I'm saying is there's --

Q: Would you rule it out forever, that you would never consider it?

PRESIDENT OBAMA: What I'm saying is, is that there's a difference between Mr. Leggett saying something and the president of the United States saying something.

Q: That's why I'm trying to get you (to say it ?).

PRESIDENT OBAMA: That's exactly right. (Laughter.)

...

PRESIDENT OBAMA: Ed Henry.

Q: Thank you, Mr. President.

I want to follow up on that because -- and merry Christmas, by the way.

PRESIDENT OBAMA: Merry Christmas, Ed.

Q: When Edward Snowden first started leaking the information, you made a statement on June 7th in California. And you claimed to the American people that you had already reformed many of these surveillance programs, that you came to office, quote, "my team evaluated them; we scrubbed them thoroughly; we actually expanded some of the oversight." And you did expand some of the things.

PRESIDENT OBAMA: Yes.

Q: You also said, we may have to rebalance some, there may be changes. But you concluded with, quote, "you can complain about Big Brother and how this is a potential program run amok, but when you actually look at the details, then I think we've struck the right balance."

That was only six months ago. Now, there's judges are saying no; your own panel is saying no; even you're saying no, we haven't really struck the right balance, perhaps, that changes have to be made.

My question is, were you wrong then because you were not fully read in, not just on these programs, but on other programs, outside of the ones you just talked about, where we were potentially listening in on the German leaders, the Brazilian leaders and others, that suggest there were abuses, number one?

And number two, if you -- if you were fully read in on these programs, is it another example of what Judy was -- Julie was getting at, with this question of credibility with the American people, that just like on health care, you like your plan; you can keep it? On surveillance, you looked the American people in the eye six months ago and said, we've got the right balance. And six months later, you're saying, maybe not.

PRESIDENT OBAMA: Well, hold on a second, I -- I think it's important to note that, when it comes to the right balance on surveillance, these are a series of judgment calls that we're making every single day because we've got a whole bunch of folks whose job it is to make sure that the American people are protected.

And that's a hard job because if something slips, then the question that's coming from you the next day at a press conference is, Mr. President, why didn't you catch that; why did the intelligence people allow that to slip; isn't there a way that we could have found out that in fact this terrorist attack took place.

Q: (Inaudible) -- why did you say that you struck the right balance.

PRESIDENT OBAMA: So the -- so the point is, Ed, not that my assessment of the 215 program has changed in terms of technically how it works. What is absolutely clear to me is that given the public debate that's taken place and the disclosures that have taken place over the last several months that this is only going to work if the American people have confidence and trust.

Now, part of the challenge is, is that because of the manner in which these disclosures took place, in dribs and drabs, oftentimes shaded in a particular way, and because of some of the constraints that we've had in terms of declassifying information and getting it out there, that that trust in how many safeguards exist and how these programs are run has been diminished. So what's going to be important is to build that back up. And I take that into account in weighing how we structure these programs.

So let me just be very specific on the 215 program. It is possible, for example, that some of the same information that the intelligence community feels is required to keep people safe can be obtained by having the private phone companies keep these records longer and to create some mechanism where they can be accessed in an effective fashion.

That might cost more. There might need to be different checks on how those requests are made. There may be technological solutions that have to be found to do that.

And the question that we're asking ourselves now is, does that make sense not only because of the fact that there are concerns about potential abuse down the road with the metadata that's being kept by a government, rather than private companies, but also does it make sense to do because people right now are concerned that maybe their phone calls are being listened to, even if they're not, and we've got to factor that in.

So I -- I -- my point is -- is that the environment has changed in ways that I think require us to take that into account. But the analysis that I've been doing throughout has always been, you know, periodically looking at what we're doing and asking ourselves, are we doing this in the right way; are we making sure that we're keeping the American can people safe, number one; are we also being true to our civil liberties and our privacy and our values?

Q: Well, I understand it's a tough job.

PRESIDENT OBAMA: Right.

Q: And God forbid there's another terror attack. Every one of us is going to be second-guessing you, and that is extremely difficult, to be in the Oval Office.

PRESIDENT OBAMA: That's OK. I volunteered.

Q: But as you said, you took that on.

PRESIDENT OBAMA: Yeah.

Q: You put it on your back. And so my question is, do you have any personal regrets? You're not addressing the fact the public statements you've made to reassure the public -- your director of national intelligence, James Clapper, months ago went up, got a question from a Democrat, not a Republican, about whether some of this was going on, and he denied it.

PRESIDENT OBAMA: But does -- but Ed --

Q: Doesn't that undermine the public trust?

PRESIDENT OBAMA: -- Ed, you're conflating, first of all, me and -- and Mr. Clapper --

Q: He's director of national -- and he's still on the job.

PRESIDENT OBAMA: I understand. I understand. But what I'm -- what I'm saying is this: that yes, these are tough problems that I am glad to have the privilege of tackling.

Your initial question was whether the statements that I made six months ago are ones that I don't stand by. And what I'm saying is that the statements I made then are entirely consistent with the statements that I make now, which is that we believed that we had scrubbed these programs and struck an appropriate balance, and there had not been evidence, and there continues not to be evidence that the particular program had been abused in how it was used and that it was a useful tool, working with other tools the intelligence community has, to ensure that if we have a thread on a potential terrorist threat, that that can be followed effectively.

What I have also said, though, is that in light of the disclosures that have taken place, it is clear that whatever benefits the configuration of this particular program may have may be outweighed by the concerns that people have on its potential abuse. And if that's the case, there may be another way of skinning the cat.

So we just keep on going at this stuff and saying, can we do this better? Can we do this more effectively? I think that the panels' recommendations are consistent with that. So if you -- if you had a chance to read the overall recommendations, what they were very clear about is, we need this intelligence. We can't unilaterally disarm.

There are ways we can do it, potentially, that gives people greater assurance that there are checks and balances -- that there's sufficient oversight and sufficient transparency. Programs like 215 could be redesigned in ways that give you the same information when you need it without creating these potentials for abuse, and that's exactly what we should be doing, is to evaluate all these things in a very clear, specific way and moving forward on changes.

And that's what I intend to do.

Q: (Off mic) -- you have no regrets?

PRESIDENT OBAMA: That's what I intend to do.

Wednesday, December 4, 2013

Cryptolocker Malware


You may have read about the Cryptolocker malware, a new ransomware Trojan that encrypts your files and demands money to return them.
In the past, we have witnessed similar malware like the famous GPCode that used RSA keys for encryption. Back in 2008, we cracked the 660 bit RSA key used by GPCode and provided the victims with a method to decrypt and recover their data. Later, the GPCode authors upgraded the RSA key to 1024 bits, putting it perhaps only in the realm of NSA’s cracking power.
Cryptolocker uses a solid encryption scheme as well, which so far appears uncrackable. For each victim, it connects to its command-and-control (C2) to download an RSA public key that is used to encrypt the data. For each new victim, another unique key is created and only the Cryptolocker authors have access to the decryption keys. 
The attackers give you roughly three days to pay them, otherwise your data is gone forever. A multitude of payment options are available, including Bitcoin: To make sure the victim gets the message, they set a pretty scary wallpaper on the infected machine: To connect to the C2 servers, Cryptolocker uses a domain generation algorithm that produces 1000 candidate unique domain names every day.
Dimiter Andonov from ThreatTrack Security reverse- engineered the algorithm and Kaspersky Lab sinkholed three domains to measure the number of worldwide victims. In total, we've had 2764 unique victim IP's contacting the sinkholed domains. The highest number was recorded on Wednesday October 16, with 1266 unique IP addresses.
Below you can find the distribution of victims per country - top 30. The most affected countries are the UK and US, followed by India, Canada and Australia: It’s important to point out the statistics indicate the number of victims that haven’t had their files encrypted yet. If they act quickly after the infection and clean their system with an anti-malware tool, then the data might not be encrypted at all.

Steganography


Steganography is the art and science of communicating which hides the existence of the communication. Steganographic technologies are an important part of the future of Internet security and privacy on open systems such as the Internet. This book's focus is on a relatively new field of study in Steganography and it takes a look at this technology by introducing the readers various concepts of Steganography and Steganalysis. The book has a brief history of steganography and it surveys steganalysis methods considering their modeling techniques. Some new steganography techniques for hiding secret data in images are presented. Furthermore, steganography in speeches is reviewed, and a new approach for hiding data in speeches is introduced.

    Tuesday, December 3, 2013

    Java Tuktorial


    The preceding section showed graphically the primary algorithms used for arrays. Now we’ll see how to write programs to carry out these algorithms, but we first want to cover a few of the fundamentals of arrays in Java. If you’re a Java expert, you can skip ahead to the next section, but even C and C++ programmers should stick around. Arrays in Java use syntax similar to that in C and C++ (and not that different from other languages), but there are nevertheless some unique aspects to the Java approach. Classes LowArray and LowArrayApp In lowArray.java, we essentially wrap the class LowArray around an ordinary Java array. The array is hidden from the outside world inside the class; it’s private, so only LowArray class methods can access it. There are three LowArray methods: setElem () and getElem(), which insert and retrieve an element, respectively; and a constructor, which creates an empty array of a specified size. Another class, LowArrayApp, creates an object of the LowArray class and uses it to store and manipulate data. Think of LowArray as a tool and LowArrayApp as a user of the tool. We’ve divided the program into two classes with clearly defined roles. This is a valuable first step in making a program object oriented. A class used to store data objects, as is LowArray in the lowArray.java program, is sometimes called a container class. Typically, a container class not only stores the data but also provides methods for accessing the data and perhaps also sorting it and performing other complex actions on it. Class Interfaces We’ve seen how a program can be divided into separate classes. How do these classes interact with each other? Communication between classes and the division of responsibility between them are important aspects of object-oriented programming.


    Definition of Object-Oriented Programming


    This section is for those of you who haven’t been exposed to object-oriented programming. However, caveat emptor. We cannot, in a few pages, do justice to all the innovative new ideas associated with OOP. Our goal is merely to make it possible for you to understand the example programs in the text. If, after reading this section and examining some of the example code in the following chapters, you still find the whole OOP business as alien as quantum physics, you may need a more thorough exposure to OOP. See the reading list in Appendix B, “Further Reading,” for suggestions.


    OOP was invented because procedural languages, such as C, Pascal, and early versions of BASIC, were found to be inadequate for large and complex programs. Why was this? There were two kinds of problems. One was the lack of correspondence between the program and the real world, and the other was the internal organization of the program.

    Monday, December 2, 2013

    Arithmetic Operators


    +  = Addition Subtraction

    *  = Multiplication

    /  = Division (but remember,since,expansion,only,supports,integer,arithmetic, results are integers.)

    % = Modulo, which simply means, “ remainder.”

    ** = Exponentiation

    Linux Commands Line


    Up to this  point,  we have seen a series  of mysterious commands,  each with its  own mysterious options and arguments.  In this chapter, we will attempt to  remove some of that mystery and even create some of our own commands.  The commands introduced in this chapter are:

    ● type – Indicate how a command name is interpreted

    ● which – Display which executable program will be executed

    ● man – Display a command's manual page

    ● apropos – Display a list of appropriate commands

    ● info – Display a command's info entry

    ● whatis – Display a very brief description of a command

    ● alias – Create an alias for a command

    Management Files And Directories


    Linux Management Files And Directories :

    ● cp – Copy files and directories

    ● mv – Move/rename files and directories

    ● mkdir – Create directories

    ● rm – Remove files and directories

    ● ln – Create hard and symbolic links

    Directories Found On Linux Systems


    /home
    In normal configurations, each user is given a directory in /home.  Ordinary users can only write files in their home directories.  This limitation protects the system from errant user activity.

    /lib
    Contains shared library files used by the core system programs.  These are similar to DLLs in Windows.

    /lost+found
    Each formatted partition or device using a Linux file system, such as ext3, will have this directory.  It is used in the case of a partial recovery from a file system corruption event. Unless something really bad has happened to your system, this directory will remain empty.

    /media
    On modern Linux systems the /media directory will contain the mount points for removable media such USB 
    drives, CD-ROMs, etc. that are mounted automatically at insertion.

    /mnt
    On older Linux systems, the /mnt directory contains mount points for removable devices that have been mounted manually.

    /opt
    The /opt directory is used to install “optional” software.  This is mainly used to hold commercial software products that may be installed on your system.

    /proc
    The /proc directory is special.  It's not a real file system in the sense of files stored on your hard drive.  Rather, it is a virtual file system maintained by the Linux kernel.  The “files” it contains are peepholes into the kernel itself.  The files are readable and will give you a picture of how the kernel sees your computer.

    /root
    This is the home directory for the root account. 

    /sbin
    This directory contains “system” binaries.  These are programs that perform vital system tasks that are generally reserved for the superuser.

    /tmp
    The /tmp directory is intended for storage of temporary,  transient files created by various programs.  Some
    configurations cause this directory to be emptied each time the system is rebooted.

    /usr
    The /usr directory tree is likely the largest one on a Linux system.  It contains all the programs and support files used  by regular users.

    /usr/bin
    /usr/bin contains the executable programs installed by your Linux distribution.  It is not uncommon for this directory to hold thousands of programs. 

    /usr/lib
    The shared libraries for the programs in /usr/bin.

    /usr/local
    The /usr/local tree is where programs that are not included with your distribution but are intended for system-
    wide use are installed.  Programs compiled from source code are normally installed in /usr/local/bin.  On a newly installed Linux system, this tree exists, but it will be empty until the system administrator puts something in it.

    /usr/sbin
    Contains more system administration programs. 

    /usr/share
    /usr/share contains all the shared data used by programs in /usr/bin.  This includes things like default configuration files, icons, screen backgrounds, sound files, etc.


    /usr/share/doc
    Most packages installed on the system will include some  kind of documentation.  In /usr/share/doc, we will
    find documentation files organized by package.

    /var
    With the exception of /tmp and /home, the directories we have looked at so far remain relatively static, that is, their  contents don't change.  The /var directory tree is where data that is likely to change is stored.  Various databases, spool files, user mail, etc. are located here.

    /var/log
    /var/log contains log files, records of various system activity. These are very important and should be monitored from time to time.

    /var/log/messages.  Note that for security reasons on  some systems, you must be the superuser to view log files .


    Sunday, December 1, 2013

    Multimedia Forensics


    This publication describes techniques and theories involved in binary image AW. The authentication of  binary  images is necessary in practice because most of scanned and computer-generated document images are binary. These documents must be protected against fraudulent alterations and impersonations. one or non-halftone. Halftone images are binary representations of grayscale images. Halftoning techniques simulate  shades of gray by scat-tering proper amounts of black and white pixels. 


    On the other hand, non-halftone binary images may be composed of characters, drawings, schematics, diagrams, cartoons, equations, and so forth. In many cases, a watermarking algorithm developed for  halftone images cannot be applied to non-halftone images and vice versa. DH or steganography is a technique used to embed a sequence of bits in a cover image with small visual deterioration and the means to extract it afterwards. Most DH techniques in the literature are designed for grayscale and color images and they cannot be directly applied to binary images. Many of continuous-tone DHs modify the quantization index (Chen& Wornell, 2001)

    Operating System Concepts


    An operating system is a program that acts as an intermediary between the user of a computer and the computer hardware. The purpose of an operating system is to provide an environment in which a user can execute programs in a convenient and efficient manner. Understanding the evolution of operating systems gives us an appreciation for what an operating system does and how it does it. We trace the development of operating systems from the first hands-on systems, through multiprogrammed and time-shared systems, to current handheld and real-time systems. 

    The operating system must ensure the correct operation of the computer system. The hardware must provide appropriate mechanisms to prevent user programs from interfering with the proper operation of the system.  We describe the basic computer architecture taht makes it possible to write a correct operating system.  The operating system provides certain services to programs and to the users of those programs in order to make their tasks easier. The services differ from one operating system to another, but we identify and explore some common classes of these services. 

     

    © 2013 Personal Computers. All rights resevered. Designed by Templateism

    Back To Top