• Internet, Iran, Technology

    Posted on January 31st, 2011

    Written by B.P.U Contributor

    Tags

    , , ,

    Stealth Computer Virus Disables Iran’s Reactor’s

    Stealth Computer Virus Disables Iran’s Reactor’s

    In the 20th century, this would have been a job for James Bond.

    The mission: Infiltrate the highly advanced, securely guarded enemy headquarters where scientists in the clutches of an evil master are secretly building a weapon that can destroy the world. Then render that weapon harmless and escape undetected.

    But in the 21st century, Bond doesn’t get the call. Instead, the job is handled by a suave and very sophisticated secret computer worm, a jumble of code called Stuxnet, which in the last year has not only crippled Iran’s nuclear program but has caused a major rethinking of computer security around the globe.

    Intelligence agencies, computer security companies and the nuclear industry have been trying to analyze the worm since it was discovered in June by a Belarus-based company that was doing business in Iran. And what they’ve all found, says Sean McGurk, the Homeland Security Department’s acting director of national cyber security and communications integration, is a “game changer.”

    The construction of the worm was so advanced, it was “like the arrival of an F-35 into aWorld War I battlefield,” says Ralph Langner, the computer expert who was the first to sound the alarm about Stuxnet. Others have called it the first “weaponized” computer virus.

    Simply put, Stuxnet is an incredibly advanced, undetectable computer worm that took years to construct and was designed to jump from computer to computer until it found the specific, protected control system that it aimed to destroy: Iran’s nuclear enrichment program.

    The target was seemingly impenetrable; for security reasons, it lay several stories underground and was not connected to the World Wide Web. And that meant Stuxnet had to act as sort of a computer cruise missile: As it made its passage through a set of unconnected computers, it had to grow and adapt to security measures and other changes until it reached one that could bring it into the nuclear facility.

  • Breaking News, Egypt, Internet

    Posted on January 29th, 2011

    Written by B.P.U Contributor

    Tags

    , ,

    Egypt Shuts Down the Internet

    Egypt Shuts Down the Internet

    IDG News Service - “When countries block, we evolve,” an activist with the group We Rebuild wrote in a Twitter message on Friday.

    That’s just what many Egyptians have been doing this week, as groups like We Rebuild scramble to keep the country connected to the outside world, turning to landline telephones, fax machines and even ham radio to keep information flowing in and out of the country.

    Although one Internet service provider — Noor Group — remains in operation, Egypt’s government abruptly ordered the rest of the country’s ISPs to shut down their services just after midnight local time Thursday. Mobile networks have also been turned off in some areas.

    The blackout appears designed to disrupt organization of the country’s growing protest movement, which is calling for the ouster of Egyptian President Hosni Mubarak.

    “[B]asically, there are three ways of getting information out right now — get access to the Noor ISP (which has about 8% of the market), use a land line to call someone, or use dial-up,” Jillian York, a researcher with the Berkman Center for Internet & Society, said via e-mail.

    Egyptians with dial-up modems get no Internet connection when they call into their local ISP, but calling an international number to reach a modem in another country gives them a connection to the outside world.

  • The New Computer ‘Mark of the Beast’

    The New Computer ‘Mark of the Beast’

    Coming soon to your computer: “The Mark of the Beast?”

    President Obama is making plans to create and Internet identity for American. Howard Schmidt, the White House coordinator for Cybersecurity said “It’s “the absolute perfect spot in the U.S. government” to centralize efforts toward creating an “identity ecosystem” for the Internet”

    This new department of the Obama administration will be first to address the issue of Internet identity, even before the National Security Agency and the Department of Homeland security.

    Obama’s new “National Strategy for Trusted Identities in Cyberspace” will be drafted and released by this summer. Schmidt said: “We are not talking about a national ID card,” Locke said at the Stanford event. “We are not talking about a government-controlled system. What we are talking about is enhancing online security and privacy, and reducing and perhaps even eliminating the need to memorize a dozen passwords, through creation and use of more trusted digital identities.”

    It is possible that a Smart Card or some type of Digital Signature Certificate will be issued to willing participants that will identify a person during financial transactions or other Internet business.

    The Government promises that no centralized database will be kept of the information voluntarily given by those who sign up for the new digital signature. As if the government has ever kept any of your personal information private.

    Whatever the new Digital Signature becomes, it is for certain that this type of technology will be a part of the new world order brought by the one referred to in the Bible as “The Beast”.

  • Internet, Persecution, Technology, iPhone/iPad

    Posted on December 2nd, 2010

    Written by B.P.U Contributor

    Tags

    ,

    Design a Christian App on iTunes, Be Removed by Apple

    Design a Christian App on iTunes, Be Removed by Apple

    A Christian organization that recently had its Apple iPhone app removed from Apple’s App Store has sent a letter to protest the removal, asking CEO Steve Jobs to reconsider the decision.

    Late last week, Apple quietly removed the Manhattan Declaration app, which had been available since mid-October, after an online petition was circulated calling the app a “hate fest” and saying that the Manhattan Declaration pushes “hateful and divisive language.” The petition, which originated on Change.org, wished to tell Apple “that supporting homophobia and efforts to restrict choice is bad business.”

    Released in Nov. 2009, the wordy Manhattan Declaration “speaks in defense of the sanctity of life, traditional marriage, and religious liberty. It issues a clarion call to Christians to adhere firmly to their convictions in these three areas,” according to the declaration website. Manhattan Declaration spokeswoman Michelle Farmer told The Daily Caller that the statement and organization have never espoused any hateful rhetoric toward homosexuals or pro-choice advocates but that it does stand behind its belief and hopes that Jobs will listen to their concerns.

    “We’re making the argument that if [Jobs] would take a look at the Manhattan Declaration himself, he’d see it’s not written with any rancor. It’s written on a very even keel,” said Farmer. “It’s just appealing to things that people want to come together on, that millions of Americans agree on.”

  • America In Prophecy, Internet, Science, Signs

    Posted on November 19th, 2010

    Written by Rob Robinson

    Tags

    , ,

    Is China the Newest ‘Internet Terrorist’ Threat?

    Is China the Newest ‘Internet Terrorist’ Threat?

    On April 8, 2010, China re-routed email exchanges from the United States Department of Defense, U.S. Senate, NASA and the Department of Commerce.

    Claiming that the re-routing was “accidental”, there is little doubt that it was malicious intent that was the true motive says the Security Review Commission.

    Larry Wortzel, a member of the commission, said: “We don’t know what was done with the data when they got it. When I see things like this happen, I ask, who might be interested with all the communications traffic from the entire Department of Defense and federal government? It’s probably not a graduate student at Shanghai University.

    “What could you do if you had the stream of email traffic for 18 minutes to and from the US Joint Chiefs of Staff? Most importantly you would get the internet addresses of everybody that communicated.”