Pages

Friday, February 12, 2021

Cold War: The Croatian Six spent more than a decade in jail over a bomb plot. Now they want to clear their names

 Claire Lehmann of Quillette fame and others have edited the new Panics and Persecutions: 20 Tales of Excommunication in the Digital Age.


"Don't worry about the world coming to an end today.
It's already tomorrow in Australia!"


"Be Yourself. 



Supercharging intelligence on a global scale to target financial crime
Recently the Joint Chiefs of Global Tax Enforcement (J5) met virtually to discuss past achievements and the priorities for this year. Read J5 Chief Will Day’s latest LinkedIn article for an update.


A First Look at Zoombombing. Chen Ling, Utkucan Balcı, Jeremy Blackburn, Gianluca Stringhini. Computers and Society. arXiv:2009.03822 [cs.CY].

“Abstract—Online meeting tools like Zoom and Google Meethave become central to our professional, educational, and personal lives. This has opened up new opportunities for large scale harassment. In particular, a phenomenon known as zoombombing has emerged, in which aggressors join online meetings with the goal of disrupting them and harassing their participants.In this paper, we conduct the first data-driven analysis of calls for zoombombing attacks on social media. We identify ten popular online meeting tools and extract posts containing meeting invitations to these platforms on a mainstream social network, Twitter, and on a fringe community known for organizing coordinated attacks against online users, 4chan. We then perform manual annotation to identify posts that are calling for zoombombing attacks, and apply thematic analysis to develop a codebook to better characterize the discussion surrounding calls for zoombombing. During the first seven months of 2020,we identify over 200 calls for zoombombing between Twitter and 4chan, and analyze these calls both quantitatively and qualitatively. Our findings indicate that the vast majority of calls for zoombombing are not made by attackers stumbling upon meeting invitations or brute forcing their meeting ID, but rather by insiders who have legitimate access to these meetings,particularly students in high school and college classes. This has important security implications, because it makes common protections against zoombombing, such as password protection,ineffective. We also find instances of insiders instructing attackers to adopt the names of legitimate participants in the class to avoid detection, making countermeasures like setting up a waiting room and vetting participants less effective. Based on these observations, we argue that the only effective defense against zoombombing is creating unique join links for each participant



They argue that Vico Virkez may have been a pro-Yugoslav spy masquerading as a Croatian nationalist, setting up the six men in a bid to discredit the Croatian community in Australia.

"The legal team has been the beneficiary of research and work done by leading historians and journalists whose work will be drawn upon extensively to agitate for the case to be revisited," said barrister Sebastian De Brennan, who is representing the men.

The Croatian Six spent more than a decade in jail over a bomb plot. Now they want to clear their names



Scientists develop transparent wood that is stronger and lighter than glass CBC


German Institute Develops ‘Powerpaste’ That Stores Hydrogen Energy At 10x the Density of a Lithium Battery Hackaday


MARLIT: Artificial Intelligence Against Marine LitterEurasia Review (