Sunday, January 11, 2015

FOI report on China business fails – Swedish newspaper Svenska Dagbladet

Försvarsmyndigheten suspected to sweep problems under the carpet, he believes.

It was envisaged last autumn and Contract Review SVT reported that Swedish Defence Research Agency (FOI), with the Royal Institute of Technology (KTH) as a decoy, was in the process of licensing the software Edge to China that could be used for the dictatorship of mass destruction.

FOI then had to appoint a committee who proposed pipeline from serious criticism. The report, from the investigator Stefan Ryding-Berg, “confirms the picture that I have had all along on this file. There is no basis to talk about any decoy construction, it is not about military equipment and there is no secret in this, “commented FOI’s director general Jan-Olof Lind.

But the aim was to get to the bottom the question?

Peter Öhman, associate professor at Sundsvall University and an expert on the audit and inspections, considers that there are grounds for suspecting that the investigation is neither meant to be independent or comprehensive.

– It almost seems like they’ve thought from the beginning how they could use this, it will appear that they have handled this matter well, he says.

In order to avoid an audit to be under suspicion should investigators did not handpicked by the principal. Nor should the task be limited. Here, both things happened, says Ohman. The investigator has been procured without competition and just received information from FOI – not from, for example, KTH, or ISP, providing arms export permits.

– The restriction of the mission impossible a comprehensive review of FOI’s behavior in this case. The investigator has not been able to turn every stone, says Ohman.

The restriction, he notes, “is strongly reminiscent of other cases where organizations have been criticized for trying to sweep difficult issues under the carpet.”

The purpose of sublicense Edge via KTH described in documents from FOI as a way to work with a partner such as China, that the institution “can not or will sign contracts with.” According to the documents contained information about the structure of the management team and Lind gave its approval to the arrangement. It denied by Lind.

Since the massacre at Tiananmen Square in 1989 prevail across the EU arms embargo on China.

LikeTweet

Thursday, January 8, 2015

As revealed the false base stations – New Technology

       

Aftenposten put in goes out the technical file have been used in the revelation that the false base stations, or so-called IMSI-catcher, in central Oslo on the newspaper’s website .

The magazine’s editor in chief Eskil Egil Hansen says in a statement that the purpose is to give the public an insight into how the newspaper proceeded.

The conclusion of the work presented in several articles from December 12 last year is that it most likely occurred interception of mobiles that existed in the area around the Storting, the Prime Minister’s Office, Ministry of Defense and Oslo financial centers over a period of October-December.

New measurements that the newspaper did 22 December shows that the false base stations now shut down.

Eskil Egil Hansen hope now that the newspaper’s publication of the extensive technical material to give the editors New clues which in turn can answer the question who or which actors were behind the interception. It is likely that equipment belonged to different players, according to Aftenposten.

The surveys also described in detail in a technical report.

This has been done is to measure and define the signals that are different from normal signals from base stations operators. This has been possible through the German mobile Crypto Phone 500 – working to reveal eavesdropping, and with the help of GPS data and constructed espionage equipment Falcon II.

Security experts from Aeger Group and CEPIA Technology has participated in the surveys.

Many of the discrepancies have been found in signal conditions have been natural, technical explanations after Aftenposten contacted including antenna researchers, police and operators.

But 122 results of 470 in the period October 10-November 21 is defined by Crypto Phone mobile phone as “very suspicious”.

The equipment that we used is described to be a demonstration edition of the Norwegian supplier Multisys.

The cell phone is a converted Samsung Galaxy whose software has been replaced with secure software that can analyze radio signals and manipulations of the cell phone. For example, it can check if the mobile encryption is turned off or if traffic is disconnected from the mobile networks, 3G and 4G and down to the 2G network. The latter suggests that the false base stations are in circulation.

Eskil Egil Hansen also believes that there are deficiencies in official work when it comes to reveal similar interception of Norwegian citizens, and calls the phenomenon “ansvarspulvrisering.”

Norwegian Justice Minister Anders Anundsen said yesterday in the Storting that a working group now be added between the authorities and he told me that Norwegian security police PST on tap sought for such base stations.

LikeTweet

Thunder Strike can take over a Mac – 99mac

A serious security flaw for Macs has been revealed at the conference Chaos Communication Congress that allows a malicious person can install a so-called backdoor on a computer simply by briefly have physical access to it. Through a prepared Thunderbolt accessories, new firmware – called firmware – installed on your computer when it starts up and loads it is called Option ROM.

A functional concept of the attack was demonstrated at the conference by Trammell Hudson, who discovered the deficiency. Hudson is an employee of the US technology-related hedge fund Two Sigma Investments, where he worked to secure the fund’s own Macs. This malware has been named Thunder Strike, by installing it through the Thunderbolt port.



Not possible to identify an attack

There are no known examples of the attack used in the open, but there are in the current situation no way to detect such an attack. This is because the Thunder Strike has the ability to install code in Mac’s EFI firmware by updating it. EFI (Extensible Firmware Interface) is the most basic program that runs when the computer starts, and is responsible for loading including accessories such as monitor, keyboard and built-in memory and other processes before the actual operating system is loaded.

The installed code replaces the encryption key that Macs use to verify that only approved firmware is installed. Thereafter, the connected Thunderbolt device to install firmware that can not be easily removed by someone who does not have the new encryption key. Since the malicious code is in the firmware, it will remain even after a reinstall of the operating system or even a hard drive formatting.

To install the Thunder Strike on one computer, thus nothing more than a few seconds of physical access to the computer. Although the machine is locked with a password is only required a reboot. Neither a firmware password or encryption with FileVault protects because the installation of option ROM occurs before these loaded by the computer.

The attack is installed through the Thunderbolt port.

Image: Trammel Hudson

Can be used by the NSA

Trammell Hudson’s presentation of Thunder Strike is available as a YouTube video, in which Hudson describes in detail the process. According to him, it is also easy to imagine how the Thunder Strike could be applied, for example, the US intelligence community NSA. Edward Snowden has previously revealed how the NSA can open the packets containing computer equipment sent by post. The NSA can open the package, modify the equipment and pass it on.

Another possible scenario is a walkaway computer in a hotel room, where agents can act staff and strike at the computer while they change Towels, says Hudson. Checks at border customs is another situation where computers often leaves the owner’s hands temporarily, and something that can not protect themselves against any efficient way.

Trammell Hudson says it’s Mac computers from 2011 onwards which are vulnerable to the attack, which was when Thunderbolt ports began to appear. He has tested six or seven different models.

Hudson has been in contact with Apple about the problem and say they have released an update to the latest Mac models Imac 5K and the new Mac Mini to Option ROM can no longer be installed during the update of the firmware. This update will also soon be released for older Macs.

This protects against Thunder Strike in its present version, but the computers could still be vulnerable to other variants, as Option ROM still be charged under a normal startup. Older Macs can still be attacked by an older version of the firmware is installed, which is susceptible to Thunder Strike.

A more drastic protection against attacks is to paste back the Thunderbolt port on their computer. This hinders access, but also of course to the Thunderbolt port can not be used for any other purpose.

LikeTweet

Monday, January 5, 2015

His company won the great prize – Norrköping Newspapers

Hypergene has for several years been praised for its rapid and profitable growth and was recently awarded the price Mara Tonga Ellen was presented by Finance Minister Magdalena Andersson. A great moment for the CEO and co-workers in Hypergene, headquartered in Malmö.

– We are super proud, says CEO Per Hidenius. We have shown that Hypergene have stamina and now we can say that we have managed to establish ourselves very well with large clients in both the public and private sectors.

Hypergene have created a software that makes it easy for companies to control , plan, report and analyze business. All 21 county boards in the country are among the customers and IT company expects to grow significantly in the public sector.

– We are the market leader among municipalities, says Per Hidenius. One of our success factors is that we develop the product together with our clients, it is appreciated.

Hypergene has managed to recruit the employees they ideally want to have and Per Hedenius appears repeatedly that success belongs to all of the 86 employees.

– We create fine office staff can thrive in and provides opportunities for personal development. The key is to have the sharpest colleagues, fun at work and feel that they contribute to customers’ development. Everyone should feel involved and we have a compensation model that will contribute to cooperation in Hypergene.

By Hidenius grew up Skärblacka and worked for seven years as financial manager at Odal Maskin in Norrköping. A business acquaintance attracted him to a new job in Stockholm and the same man persuaded him later to Malmö because he started an IT company where he wanted to Per would become president. Hypergene was born in 2000 and Per Hidenius has been around since 2005 and currently owns 22 percent of the company and he says that he is probably the only one in the whole company that does not have an academic degree.

– Satisfied customers are, of course, really important for us and now we are concentrating on continuing to grow substantially over the next five years, says Per Hidenius. After the prices we have been pouring in takeover deals tight but we have no plans to sell.

By Hidenius can already see that Hypergene qualifies as a Gazelle also in 2015 and Sweden branches will grow even more.

– We might make a utlandssatsning a few years but we plan primarily to help our Swedish customers in the Nordic markets in which they operate, says Per Hidenius.

LikeTweet

Saturday, January 3, 2015

Svend Dahl: A better world becomes – Västerbotten Courier

Chronicles In December, Skype, a new software which directly translates calls between English and Spanish. The news captures the two revolutions that the world is currently experiencing: globalization and digitization.

It is, as the Liberal critic Johan Norberg writes in the new book “Live and Let Die” (Hydra publishers), a development that make people’s lives richer. Trade and new production methods make goods cheaper. At the same network digitization people together in ways that were previously impossible.

It’s so new ideas are born, businesses started and we get the chance to cultivate interests, whether it’s about home brewing, steampunk jewelry or geocaching, together with others. It will be a richer, funnier and better society.

Meanwhile, the societal challenges, while much of what we take for granted demolished. It will set the policy to the test.

The political starting point must be to recognize and facilitate change. There are few reasons to protect companies that are challenged by new technologies and business ideas. Whether it’s old industrial giants who can not keep up with developments or, as happens in many parts of the world, dysfunctional taxi industries that face competition from the mobile app-based taxi service Uber.

However, there is every reason to protect individuals people from the negative impact that a rapid transformation of the economy with it.

In the international debate include, for example, a growing concern for what happens when both qualified and unqualified jobs can be handled by robots, which is Google’s attempt to driverless cars is a prime example. Earlier created the prosperity of the company with tens of thousands of employees, who were part of it by relatively high wages. In the digital economy can unimagined riches contrast is created in company with a few employees. The risk is that it leads to greatly increased inequality.

There have been, for example, the Economist magazine – hardly a bastion of left – to talk about basic income, or a citizen, as a possible reform. It goes against the ideals of Swedish politics, but could be a way to encourage entrepreneurship as well as a method to allocate a growing prosperity, when the direct link between wealth creation and the great majority wage labor declines.

Meanwhile, we know hardly anything about what jobs will be available in the future. Very few of the jobs that exist today were 100 years ago. And the same will of course happen again.

The Industrial Revolution transformed the society and brought with him the forerunner of the modern welfare states. In the same way, we must now ask ourselves what political solutions needed for people to fully benefit from the progress that globalization and digitization makes possible.

Svend Dahl

political scientists,

The head of the Liberal News Agency

LikeTweet