Fartashphoto's Blog

Twitter Exposes WikiLeaks Court Order

Posted in Uncategorized by fartashphoto on January 13, 2011
Advertisements

On Bail, In Jail: ‘Attack on Assange brings out more injustice’

Posted in Uncategorized by fartashphoto on December 15, 2010

The WikiLeaks founder has been granted bail by a British court – but with strict conditions. Assange will stay in jail until another hearing in the next two days, as Swedish prosecutors are appealing the bail decision. Stockholm wants to extradite Assange to answer questions over sexual assault allegations, which he denies. The WikiLeaks site is still operating and continues to publish confidential American diplomatic cables.

Brave Hero’s Exposing Corrupt U.S. Government Julian Assange and WikiLeaks

Posted in Uncategorized by fartashphoto on December 5, 2010

Julian Assange and WikiLeaks are Brave Hero’s Exposing U.S. Corrupt Government

Heaviest sentences ever ruled against Bloggers

Posted in Uncategorized by fartashphoto on December 3, 2010

Iranian blogger, Hossein Ronaqi Maleki’s 15-year prison term has been approved by an Islamic Republic appellate court.

RAHANA website that covers human rights news in Iran reports that Ronaqi has been kept in solitary confinement for over 11 months and was given 15 years in prison by a preliminary court.

The blogger known as “Babak Khoramdin” is charged with “membership in Iran Proxy, an internet group, propaganda against the regime, insulting the leader and the president.”

Hossein Ronaqi Maleki went on a hunger strike in September in protest to his sentence and the behavior of the judiciary officials in prison.

According to Reporters Without Borders this is the heaviest sentence to date for a blogger save the 19-and-a-half-year sentence given to another blogger, Hossein Derakhshan.

Reporters Without Borders announced that the Islamic Republic regards bloggers, like journalists, as its enemies and has been issuing heavier sentences for them.

Twitter, Consciousness and Oneness

Posted in Uncategorized by fartashphoto on December 2, 2010

“I see Twitter as a collective consciousness, or a personal Google. When you ask Google a question it tells you where to go to find the answer. When you ask twitter a question you get a personal response from a human.”

“Think about the slight but powerful shift here – to appear in Google a person has to write their content on a webpage, but to appear on Twitter search all you have to do is have a conversation. People don’t need to be publishers to contribute to this latent knowledge sink, all they have to do is talk to their friends and post their status and the tools will do the rest.” Ross Hill, Blogger said.

I think one of the most significant contributions Twitter is bringing to the evolution of Connected Consciousness (for lack of a better term – the new collective or common consciousness created by the mass connection of humans to the network.) For the first time in the history of our species, it is possible to massively communicate with massive numbers of human beings about pretty much anything. We are starting to realize the power of connecting human beings; well, we’ve always known that there is strength in numbers, but there’s magic in the network!

Twitter helps human beings feel the Unity and Oneness over Internet more than ever before. Distances don’t matter anymore.

Those of us who understand the Oneness Blessing and the impartation of the Spirit of Wholeness or Holy Spirit must be strong, honest, and even creative as we share our information, gifts and talents in ways which promote oneness.  For as long as we see ourselves as separate from the ONE, we will always see ourselves separate from ALL-that-is.

Stuxnet worm’s rooting deep

Posted in Uncategorized by fartashphoto on November 25, 2010

The enigmatic Stuxnet worm – which previously destroyed thousands of centrifuges used to enrich uranium – is currently attacking Iranian military systems.

According to DebkaFile, the ongoing digital raid is causing damage, disorder and confusion within the ranks of Iran’s armed forces.

For example, during a recent air defense exercise, Iranian security officials identified 6 foreign aircraft that had ostensibly infiltrated the country’s airspace. The aircraft soon dropped off the radar screen, having been “put to flight” by Iranian fighter jets.

Unsurprisingly, military sources later claimed a “misunderstanding” – insisting there had been no actual violation of Iranian airspace.

Rather, they clarified, Iranian fighters had “simulated” an enemy raid which was then appropriately repulsed.

“The foreign intruders had [indeed] shown up on the exercise’s radar screens, but when the fighter jets scrambled to intercept them, they found empty sky, meaning the radar instruments had lied,” a DebkaFile writer explained.

Did Israel Launch a Cyber Attack Against Iran? If Yes, Is It Legal?

Posted in Uncategorized by fartashphoto on November 20, 2010

Exclusive Report: Evidence of Iran Nuclear Weapons Program May Be Fraudulent

Stuxnet Cyber Worm Spreads

Posted in Uncategorized by fartashphoto on November 20, 2010

The Stuxnet computer worm originally designed to target Iran’s nuclear plants has spread around the world in the past few months, and now U.S. security experts are warning that the worm could be modified to attack industrial control systems around the world.

First Cyber Super Weapon

Posted in Uncategorized by fartashphoto on November 19, 2010

The Stuxnet worm, a complicated piece of malware apparently engineered to disrupt Iranian uranium enrichment, could be modified to attack more industries, according to experts speaking to the Senate Homeland Security and Governmental Affairs Committee.

The widespread interconnection of corporate networks and use of SCADA systems means that industrial infrastructure is increasingly vulnerable to software attack. Such control systems are used in virtually every industry—food production, vehicle assembly, chemical manufacturing—and are commonly exposed to insecure networks. This leaves them vulnerable to tampering, such as with Stuxnet, as well as intellectual property theft.

The Stuxnet worm was both complex, using a range of techniques to infect machines and spread through networks, and carefully targeted, with a payload specifically designed to attack Siemens SCADA software. Together, these properties together make it uniquely dangerous. Dean Turner, director of the Global Intelligence Network at Symantec Corp., told the committee that the “implications of Stuxnet are beyond any threat we have seen in the past.”

“The reality is that the current, porous state of our nation’s infrastructure means that it wouldn’t take malware as robust and sophisticated as Stuxnet to cripple many of our critical systems.” The committee continued, “Stuxnet has some 4,000 functions; by comparison, the software that runs the average email server has 2,000 functions. Stuxnet can even update itself automatically.”

Of the 44,000 known cases of Stuxnet infection, 60 percent are in Iran. As many as 1,600 computers in the United States have been infected. Stuxnet targets computers who use the Windows operating system and can do many things. Sean McGurk of the Department of Homeland Security summed up Stuxnet as a dangerous virus that appears invisible.

“This code can automatically enter a system, steal the formula for the product you are manufacturing, alter the ingredients being mixed in your product and indicate…everything is running as expected.”

Toward 2012 -Web Democracy

Posted in Uncategorized by fartashphoto on November 11, 2010

Ken Jordan is the co-founder of evolver and http://www.realitysandwich.com, he is a pioneer in the field of alternative social networks and strong advocate of an unregulated internet. This episode explores the initial motivations for creating the internet, and how it differs in its structure from previous means of mass communication.