Has the media — or the American public at large — become too complacent with the “off-the-record fundraiser”?
Raising money under a cloak of silence suggests that candidates have one version of their pitch that they offer ordinary voters and another, more candid one the public isn’t allowed to hear. That’s the appeal of events limited to mega-donors, and it isn’t a good thing, says Melanie Sloan, executive director of Citizens for Responsibility and Ethics in Washington. “What,” she asks, “do they tell their big donors that they don’t tell the rest of us?”
Hmmm I wonder… Just kidding. YES.
Even if you’ve managed to find an Internet connection for yourself, it won’t be that helpful in reaching out to your fellow locals if they can’t get online to find you. If you’re trying to coordinate a group of people in your area and can’t rely on an Internet connection, cell phones, or SMS, your best bet could be a wireless mesh network of sorts–essentially, a distributed network of wireless networking devices that can all find each other and communicate with each other. Even if none of those devices have a working Internet connection, they can still find each other, which, if your network covers the city you’re in, might be all you need. At the moment, wireless mesh networking isn’t really anywhere close to market-ready, though we have seen an implementation of the 802.11s draft standard, which extends the 802.11 Wi-Fi standard to include wireless mesh networking, in the One Laptop Per Child (OLPC) XO laptop.
This is some serious shit.
Read the article. Consider your options. Be ready.
STOP WARS. It’s that simple.
As photographed in Freisberg, Germany.
IMSI stands for “International Mobile Subscriber Identity”. The technology is essentially a mobile phone tower with “a malicious operator”. It mimics the behavior of a cell tower and tricks mobile phones into sending data to it, instead of to the tower.
As such it is considered a Man In the Middle (MITM) attack. It is used as an eavesdropping device used for interception and tracking of cellular phones and usually is undetectable for the users of mobile phones.
Once it has made a connection with the phone and tricked it into thinking it is a mobile tower, the IMSI catcher forces the phone to drop its encryption, enabling easy access to the contents of the device. The tool then lets the attacker listen in on mobile conversations and intercept all data sent from a mobile phone, remaining undetected. In some cases the tool also allows the operator to manipulate messages.
This could definitely be a big problem!