Implementing the President's Border Security and Immigration Enforcement Improvements Policies

Here's the original link to the memorandum, which is dated 25 January 2017.

Here's my local mirror of the same document.

Takeaways:

  • "It implements new policy designed to deter illegal immigration and facilitate the detection. apprehension. detention. and removal of aliens who have no lawful authority to enter or remain in the United States."
  • "Additional agents are needed to ensure operational control of the border. Accordingly, the Commissioner of CBP shall immediately begin the process of hiring 5,000 additional Border Patrol agents and to take all actions necessary to ensure that such agents enter on duty and are assigned …
Read more...

LRAD information archive.

For the past couple of years sonic weapons called LRADs (Long Range Accoustic Devices) have been increasingly deployed against protestors in the United States (here is footage from Pittsburgh shot in 2009 (warning: remove your earphones!)). A step up from mere marketing tricks that make you suspect that you're going mad, these sonic weapons pump out enough sound pressure to cause permanant hearing damage at a distance of a couple of hundred feet. Earplugs don't work because the sound is loud enough to be conducted into one's inner ears through the bones of the skull. Getting behind hard cover probably …

Read more...

Mirrored at the request of Telecomix: Final post from Sandmonkey!

A well-known blogger in Egypt who went by the handle of Sandmonkey who'd come under the scrutiny of the old Egyptian government was raided and taken into custody, and his blog was taken offline. Telecomix has asked that his final blog post be mirrored across the Net. I've mirrored the text from here verbatim.



Thursday, 3 Feb 2011
Egypt, right now!

I don't know how to start writing this. I have been battling fatigue for not sleeping properly for the past 10 days, moving from one's friend house to another friend's house, almost never spending a night in my home …

Read more...

The Next HOPE keynote speech online!

Due to the Department of Homeland Security sending some operatives to The Next HOPE to question Julian Assange of Wikileaks about the release of a certain piece of video footage from Iraq he did not come to the con to give the keynote address this afternoon. The guy who was spotted here and there around the con yesterday afternoon was, in fact, not Julian Assange (a few other people made the same mistake, I'm given to understand). In his stead a man with balls made of pure neutronium, Jacob Appelbaum of the Tor Project gave the keynote address. I've only …

Read more...

Post-reboot memory dumping software released.

Last week, a group of information security researchers released a whitepaper detailing a practical data extraction attack on DRAM after the power's been cut. Unfortunately, Applebaum et al didn't release the source code for the utilities they used in the lab. One Wesley McGrew read the paper and decided to apply the scientific method by reproducing their experiments. This required developing utilities to extract data from powered-down DRAM from scratch which he's done and released the source code for. The source is mostly in C with some in-line assembly. It's dense and you really have to understand what's going on …

Read more...

Working with software RAID in Linux.

This post assumes that you've worked enough with Linux to know about the existence of software RAID in the Linux v2.6 kernel series, though not necessarily much about it.

If you're not familiar with it, RAID (Redundant Array of Inexpensive Disks) is a set of techniques that replicate data across multiple hard drives on the assumption that, at some point, a drive is going to fail. If the data can be found in some form on another drive, the data is still available. Otherwise you're out of luck unless you made backups, and if you're really unfortunate, your machine …

Read more...