Dave Emory’s entire lifetime of work is available on a flash drive that can be obtained here.  The new drive is a 32-gigabyte drive that is current as of the programs and articles posted by 12/19/2014. The new drive (available for a tax-deductible contribution of $65.00 or more) contains FTR #827 . (The previous flash drive was current through the end of May of 2012 and contained FTR #748 .)
You can subscribe to e‑mail alerts from Spitfirelist.com HERE .
You can subscribe to RSS feed from Spitfirelist.com HERE .
You can subscribe to the comments made on programs and posts–an excellent source of information in, and of, itself HERE .
COMMENT: There is no shortage of depressing news these days. Just in case you were feeling secure, check out the details of an interesting cyber-attack. In what cyber security experts call a “man-in-the-middle attack,” e‑mail from a number of firms were rerouted to Kiev, Ukraine, before going to their intended destinations.
Among the firms successfully targeted was a UK contractor that makes nuclear warheads. Speculation has circulated that this may have enabled the attacker to gain information about the manufacture of nuclear weapons.
This is to be seen against the background  of statements by Andrei Biletsky–a member of the Ukrainian parliament and the commander of the Nazi Azov Battalion –that Ukraine is going to attempt to become a nuclear power .
Programs covering the Ukraine crisis are: FTR #‘s 777 , 778 , 779 , 780 , 781 , 782 , 783 , 784 , 794 , 800 , 803 , 804 , 808 , 811 , 817 , 818 , 824 , 826 , 829 , 832 , 833 , 837 .
It’s unclear how the Internet traffic for many British Telecom customers—including a defense contractor that helps make nuclear warheads —was diverted to servers in Ukraine before being passed along to its intended recipients.
The snag may have allowed adversaries to intercept or tamper with communications sent and received by the UK’s Atomic Weapons Establishment, one of the affected clients. Other organizations with redirected traffic include Lockheed Martin, Toronto Dominion Bank, Anglo-Italian helicopter company AgustaWestland, and the UK Department for Environment, according to a blog post  by researchers at Dyn, an online infrastructure consultancy.
The affected traffic appears to include email and virtual private network connections. The circuitous path caused the data “to travel thousands of miles to the Ukrainian capital of Kiev before turning around, retracing that route, and being delivered to its normal hub in London,” Ars Technica reports.
Sending the data to Kiev may have made it possible for employees with network access to Ukrainian telecom provider Vega to eavesdrop or manipulate data that wasn’t encrypted. . . . .
. . . . This sort of rerouting – called a man-in-the-middle attack — is the result of the implicit trust placed in the border gateway protocol  used to exchange data between large service providers and their customers, which include banks, governments, network service providers, aerospace companies, and other sensitive organizations.