On Wednesday, the CIA released nearly 500,000 files recovered from the 2011 raid on Osama bin Laden's compound in Abbottabad, Pakistan hideout. According to the CIA's web page
, the files are "temporarily unavailable pending resolution of a technical issue." From Wired
Hailed by researchers and international relations experts as a valuable gesture of transparency, the stash offers a window into the former Al-Qaeda leader's approach and plans, and insight into the terrorist group's global organizational structure, global network, and allies.
It also contains hallmarks of any person who uses the internet: copies of venerable film classics like Ice Age: Dawn of the Dinosaurs and Final Fantasy VII, episodes of Tom and Jerry, an IMAX version of Mysteries of Egypt, a download of the Charlie Bit My Finger viral YouTube video, a Mr. Bean episode, and 28 crocheting tutorials—including one for an "iPod Sock."
“It’s like, ‘ooh Osama bin Laden is a Tom and Jerry fan!’ And maybe he is, it’s quite possible. I like Tom and Jerry, too,” says Bill Roggio, a senior fellow at the Foundation for Defense of Democracies and the editor of its Long War Journal, which got early access to the trove from the CIA. “But I suspect a lot of the sort of frivolous or the personal stuff was more for his family...."
Other gems include a lot of clip art, a video called "HORSE_DANCE," numerous episodes of a Jackie Chan television show, image files of the Yahoo logo, a few "funny cat" videos, and an image of a cute stuffed animal monkey.
And yes, there was also porn.
A team of computer scientists, psychologists and neuroscientists used eye-tracking and fMRI to measure how users perceived security warnings, such as warnings about app permissions and browser warnings about insecure pages and plugin installations.
Konrad Rieck has data-mined the nine top security conferences, compiling a decade-by-decade list of the papers most often cited in the presentations delivered at these events: top of the pile is Random Oracles are Practical: A Paradigm for Designing Efficient Protocols (Sci-Hub mirror), from the 1993 ACM Conference on Computer and Communications Security. Rieck has […]
A former executive from the data-mining dark operator Cambridge Analytica ‘visited Julian Assange in February last year and told friends it was to discuss what happened during the US election,’ the Guardian reported today. Brittany Kaiser worked as a director there until not long ago, and is reported “to have channelled cryptocurrency payments and donations […]
The human eye is a powerful thing, but it’s not so great at seeing in the dark or around tight spaces, which is partially why most of us struggle with unplugging drains, cleaning under the fridge, and other hard-to-reach jobs. This 1080p HD Waterproof WiFi Wireless Endoscopic Camera, however, gives you the flexibility necessary to get […]
Macs are undeniably some of the most versatile computers on the market, but they can do so much more than what their stock apps allow. For those looking to get the most out of their Mac hardware, the Pay What You Want 2018 Super Mac Bundle features 10 of the industry’s top apps, including photo editors and […]
Salesforce has reinvented the way companies manage customer information, close deals, and ultimately drive revenue, so it should come as no surprise that it’s one of the more valuable skills you can list on your resume today. In fact, according to research from Burning Glass, this platform is now the 7th most in-demand software skill, beating out […]