COMPUTERS/INTERNET/SECURITY | WHAT REALLY HAPPENED


COMPUTERS/INTERNET/SECURITY

Aug 30 19:41

OneLogin breached, hacker finds cleartext credential notepads

Password attic OneLogin has been breached, and it's bad, because the service that suffered the breach is one often used by people to store credentials like admin password and software keys.

The online credential manager says a its Secure Notes facility was breached, allowing the intruder to read in cleartext notes edited between 2 June and 25 August this year.

Some 12 million customers use OneLogin.

It could be a dangerous breach for those affected. OneLogin suggests Secure Notes can be used to hold "information such as license keys and firewall passwords" making the stolen data a gift for network exploitation and lateral movement, should IT folks heed the advice and store sensitive credentials in the service.

Aug 30 18:14

Flashback: Secret Board Resolution Paved Way In ICANN Internet Globalization Agenda

Philip Corwin, Founding principal of Virtualaw LLC, and ICANN watchdog for the Internet Commerce Association, spoke out recently at the 49th ICANN meeting. ICANN (Internet Corporation for Assigned Names and Numbers) is in charge of assigning domain names and IP addresses on the internet. Until now, the United States has had contractual oversight for the organization. Singapore hosted the historic ICANN meeting, which discussed the future of internet governance after the United States ceded control. Singapore has a poor track record of internet freedom. Terence Lee writes in a paper for Surveillance and Society that internet regulation in Singapore “… hinges on an ideology of control with the sole aim of producing law-abiding, self-regulated and therefore, economically productive, docile and compliant citizens.”

Aug 30 15:38

Microsoft Services To Crack Down On 'Hate Speech'

The end may be nigh for trolls on Skype and Xbox. Microsoft is launching a customer support service that allows users to report hate speech. Conversely, the new system also includes an appeals forum to reinstate contested content.

For hate mongers on the internet, Microsoft would become judge, jury and executioner. On Friday, the software conglomerate rolled out a new system for airing grievances regarding hate speech posted on Microsoft-hosted services.

Aug 30 15:22

How Canvas Fingerprint Blockers Make You Easily Trackable

As many know, canvas fingerprinting is the most recent development in web tracking. In the past, the easiest way to prevent web tracking was to block out the method of tracking entirely. For example, to prevent cookie tracking, you simply disable cookies in your browser.

But when it comes to canvas fingerprinting, things are not so cut-and-dry. In fact, believe it or not, using a canvas fingerprint blocker can actually make you more trackable than if you weren’t using one.

Aug 30 15:09

BitTorrent Client Transmission Again Victimized by OS X Malware

Just five months after Transmission was infected with the first "ransomware" ever found on the Mac, the popular BitTorrent client is again at the center of newly uncovered OS X malware.

Researchers at security website We Live Security have discovered the malware, called OSX/Keydnap, was spread through a recompiled version of Transmission temporarily distributed through the client's official website.

OSX/Keydnap executes itself in a similar manner as the previous Transmission ransomware KeRanger, by adding a malicious block of code to the main function of the app, according to the researchers.

Aug 30 15:07

FBI director: 'There is no such thing as absolute privacy in America'

Welcome back, hope you had a great summer, let's get right back to our regularly scheduled cyber programming: A global war over encryption.

FBI Director James Comey, who has spent the last six months itching to get back into a public debate over the spread of encryption and mandated special backdoor government access to data, took to a spotlighted stage on Tuesday to pointedly criticize tech companies who offer default strong encryption on devices, saying he was preparing for the argument to extend into 2017 and beyond.

Aug 30 13:58

FBI Recovers 30 Benghazi Emails Deleted By Hillary

With Hillary Clinton continuing her run of days without a press conference, the nation is growing increasingly concerned as day after day more headlines - from even the mainstream media - cast shadows over her actions as Secretary of State. With more records reported to be released tomorrow, AP reports another nail in the coffin of Clinton honesty today as The State Department is forced to admit that The FBI has discovered dozens of emails related to Benghazi that Clinton failed to hand over.

Aug 30 13:15

Array of Things Allow Chicago To Spy On Entire City: “Wake Up And Realize We’re Just Servants”

Chicago is launching a creepy new campaign to blanket the mega-city in more surveillance through its Array of Things, creating a network of (at least) 500 sensors devices that will be shared in a growing Big Data cloud.

The data will be publicly ‘released’ and also shared with city officials, “policy makers”, scientists/experts, law enforcement and (surely) government agencies, all of whom will process and analyze the data.

[…] the fact is virtually every piece of electronic equipment (including appliances) can be controlled via apps and Internet-based systems. It is for this reason that Petraeus stated that the CIA will be able to read these devices via the Internet and even radio waves outside of the home.

Read more at SHTF

Aug 30 12:59

Blueprint for an Orwellian future? Chicago tests new data collection technology

The Array of Things project could be life changing. By using cameras, sound level monitors and air quality sensors, the network digitizes city living. But privacy experts fear potential problems with the program.

Aug 30 06:31

BEX ALERT - Russian hackers said to have targeted Arizona election system

Hackers targeted voter registration systems in Illinois and Arizona, and the FBI alerted Arizona officials in June that Russian hackers were behind the assault on the election system in that state.

The bureau told Arizona officials that the threat was “credible” and severe, ranking as “an 8 on a scale of 1 to 10,” said Matt Roberts, a spokesman for the secretary of state’s office.

As a result, Secretary of State Michele Reagan shut down the state voter registration system for almost a week.

It turned out that the hackers did not succeed in compromising the state system or even any county system, but rather had managed to steal the user name and password for one Gila County elections official.

Webmaster's Commentary: 

Is John McCain laying the groundwork to contest his electoral defeat by blaming Russia? And given that the official FBI recommendation for dealing with ransomware is to pay the ransom, I seriously doubt their ability to identify the voting system hackers.

Aug 29 19:02

Apple sued over shoddy iPhone touchscreens

Apple is being sued by a class of former iPhone 6 and 6 Plus owners who accuse the company of failing to address a design problem that caused the handset's touchscreen to malfunction.

A complaint [PDF] filed in the Northern California US District Court accuses Apple of violating both California state and US federal laws for selling and refusing to repair out-of-warranty handsets afflicted with an issue that causes the iPhone's touchscreen to become unresponsive or fail completely.

Aug 29 18:58

Tim Cook trousers $135m in Apple shares

CEO celebrates five years by getting even richer

Aug 29 16:21

Meet USBee, the malware that uses USB drives to covertly jump airgaps

In 2013, a document leaked by former National Security Agency contractor Edward Snowden illustrated how a specially modified USB device allowed spies to surreptitiously siphon data out of targeted computers, even when they were physically severed from the Internet or other networks. Now, researchers have developed software that goes a step further by turning unmodified USB devices into covert transmitters that can funnel large amounts of information out of similarly "air-gapped" PCs.

Aug 29 15:54

Facebook fires trending team, and algorithm without humans goes crazy

Module pushes out false story about Fox’s Megyn Kelly, offensive Ann Coulter headline and a story link about a man masturbating with a McDonald’s sandwich

Aug 29 15:23

Snooping Online: ‘Orwell’ Game Puts Users Into Shoes Of Data Collection Specialist

A new computer game is highlighting the extent to which governments can now snoop on us.

Aug 29 12:37

The iPhone 6 Is Falling Apart, Thanks To 'Touch Disease'

iPhone 6 owners are noticing a problem with their aging phones. The touchscreens are slowly getting less and less responsive until, suddenly, a grey bar starts flickering at the top and the touchscreen stops working altogether. It’s called ‘Touch Disease,” and it might be the ultimate fate of almost every iPhone 6.

The conspiracy-minded might note this problem is first appearing conveniently right when two years are up and a new iPhone is about to make its debut. We’ll take the high road and leave it there.

Aug 29 12:19

10 easy ways to prevent malware infection

One of the top delivery methods for malware today is by exploit kit. Exploit kits are sneaky little suckers that rummage around in your computer and look for weaknesses in the system, whether that’s an unprotected operating system, a software program that hasn’t been updated in months, or a browser whose security protocols aren’t up to snuff (we’re looking at you, Internet Explorer).

Here are some ways you can protect against exploits and shield your vulnerabilities:

Webmaster's Commentary: 

I still think the best idea is to catch just one cyber-scammer and crucify them live on national TV. If they are reasonably healthy it will take them a week to die. And that might dampen the enthusiasm of those who want to rip you off.

Aug 29 12:17

Parents, beware of this SMS scam

We’ve recently been alerted to a scam circulating within the UK and causing distress to parents or adults who knows someone by the name of “Sarah”.

The scam comes in the form of an SMS, which contains a message stating that “Sarah”, the purported sender, has been in a “small accident” and is asking the recipient to text back once they’ve received her message. The Teignmouth Police in Devon has shared the below tweet from someone who appears to have encountered the message himself:

SMS scams are not unheard of in the UK, and they use various social engineering tactics: some promise users with video games, glamour videos, and adult material, some simply wants to “catch up,” and some are designed to trick recipients into giving up their online account credentials, even two-factor verification codes. This particular scam is a great new addition to the SMS scam list in the UK, yet it’s not something we haven’t seen before elsewhere.

Aug 29 09:35

BREAKING: Leaked FBI alert, admits hackers penetrated US election systems

On Monday, an official FBI alert from August 18 was leaked to Yahoo News. The alert stated the FBI had uncovered evidence showing that at least two state election systems were penetrated by hackers in recent weeks. The FBI quickly issued warnings to election officials across the country to ramp up security on their systems.

Aug 29 09:21

LEAKED FBI ALERT, ADMITS HACKERS PENETRATED US ELECTION SYSTEMS

On Monday, an official FBI alert from August 18 was leaked to Yahoo News. The alert stated the FBI had uncovered evidence showing that at least two state election systems were penetrated by hackers in recent weeks. The FBI quickly issued warnings to election officials across the country to ramp up security on their systems.
It appears from the Flash Alert that the public was not supposed to know about it.

This FLASH has been released TLP: AMBER: The information in this product is only for members of their own organization and those with DIRECT NEED TO KNOW. This information is NOT to be forwarded on beyond NEED TO KNOW recipients.
The FBI then goes on to describe the nature of the attack and lists the IP addresses associated with the intrusion.

Webmaster's Commentary: 

These hacks validate the urgent need for this country to go back to paper ballots and easily obtainable photo IDs for American voting.

But Hillary has her million dollar hacker squad, who are doing their level best to silence anyone in the least bit critical of her, her history, and her candidacy; if they are doing this, why would her "Clintonhackistas" be above hacking voting boards, machines, and processes?!?

The short answer is, they wouldn't be, and rather than accuse a foreign country of doing this, the more logical reason for this may well be courtesy of her people.

Aug 29 09:15

Clinton Campaign uses ‘Snowden-approved’ encryption app to discuss Trump

The Clinton campaign has begun using a “Snowden-approved” encrypted messaging app in order to privately discuss Donald Trump.

Aug 29 09:09

Tesla patented the first drone and believed it could bring world peace

The invention would allow for self-propulsion of an unmanned vehicle for which he foresaw many potential uses

Aug 29 08:25

Ransomware: The smart person's guide

This guide covers the history of ransomware, the systems being targeted in ransomware attacks, and what you can do to avoid paying a ransom in the event of an attack.

Webmaster's Commentary: 

The official FBI recommendation is to pay the ransom. Are they getting a piece of the action?

Aug 29 07:52

The ‘Intelligent’ Robot That Became Racist

Researchers from Princeton University found that artificial intelligence systems may show signs of racism. During the study, the robot found the names of white Americans “pleasant”, while considering the names of black Americans “unpleasant,” according to the study.

Aug 29 07:40

Leaked FBI Alert, Admits Hackers Penetrated US Election Systems

By Matt Agorist

On Monday, an official FBI alert from August 18 was leaked to Yahoo News. The alert stated the FBI had uncovered evidence showing that at least two state election systems were penetrated by hackers in recent weeks. The FBI quickly issued warnings to election officials across the country to ramp up security on their systems.

It appears from the Flash Alert that the public was not supposed to know about it...

Aug 28 10:59

BREAKING: Benghazi Documents FINALLY Found – Hidden In Hillary’s Deleted Email File

This week, the State Department was forced to admit in court filings it had “received positive hits” for Benghazi-related documents among the nearly 15,000 Clinton emails uncovered by the FBI during its more than year-long investigation into Mrs. Clinton’s unauthorized use of a private server housed at her home during her tenure as President Obama’s first Secretary of State.

Judge Dimitrouleas gave the Department until September 13 to review the emails, in addition to other communications, and turn over responsive records, but Clinton’s former department claimed it cannot comply with the order by the deadline due to the large number of emails to be reviewed, estimating that it will take until well after the November 8 election.

Webmaster's Commentary: 

Here is a solution. The State Department turns over the emails as they find them, so at least part of them are available for the voters to see!

Aug 28 07:19

It’s ‘digital heroin’: How screens turn kids into psychotic junkies

There’s a reason that the most tech-cautious parents are tech designers and engineers. Steve Jobs was a notoriously low-tech parent. Silicon Valley tech executives and engineers enroll their kids in no-tech Waldorf Schools. Google founders Sergey Brin and Larry Page went to no-tech Montessori Schools, as did Amazon creator Jeff Bezos and Wikipedia founder Jimmy Wales.

Webmaster's Commentary: 

I'm seeing the same thing with an almost-2 neighbor child. I have talked about the problems with his mother and she is limiting his access to the pad (at which point he throws a tantrum). Too much of anything is a problem.

Aug 27 19:09

Google and Facebook could be forced to pay for news stories if they want to use publishers' content

The internet giants will have to reach deals with content providers, such as newspapers, before they can use excerpts of articles on their sites.

Officials at the European Commission in Brussels say the plans, which will be unveiled in September, are being drawn up to dilute the power of big online operators whose market share gives them an advantage in commercial negotiations.

Aug 27 19:08

Kindle crashes and broken PowerShell: Something isn’t right with Windows 10 testing

The reason that these things have broken is remarkable. The Cumulative Update doesn't include all the files it needed to. One missing file breaks DSC; a second missing file breaks implicit remoting. A revised package that includes these missing files will be released on August 30; although Microsoft recognizes that the problem exists, it isn't apparently important enough to rush out a fix, so it'll have to wait for the next Tuesday.

Once again, this speaks to an extraordinary lack of testing on Microsoft's part. Ensuring that a cumulative update includes all the files it's supposed to and doesn't break core PowerShell functionality is basic stuff.

Aug 27 12:54

Facebook News Team Fired – Was Breitbart Responsible?

Facebook has fired its Trending News team, responsible for curating the social media network’s “Trending News” list, after Breitbart Tech began to reveal their progressive biases last month. The team is set to be replaced by a team of engineers managing an algorithm.

Aug 27 11:56

Internet of things struggles as use of smart home gadgets flatlines

Figures from Deloitte show that the popularity of connected home gadgets has barely changed in the last year, despite manufacturers and retailers trying to boost sales.

Aug 27 11:46

WhatsApp is now sharing your phone number with Facebook - here's how to stop it

The first option to opt out is given when WhatsApp asks you to agree to its updated terms and conditions. Instead of tapping Agree selected "Read more about the key updates to our Terms and Privacy Policy".

In here there is a checkbox next to "Share my account info" that refers to the controversial new information sharing between WhatsApp and Facebook. Uncheck this box to remove the permission to do so.

If you have already accepted the new terms without deselecting this box you have 30 days to revoke the permission. In the app go to Settings -> Account -> Share my account info and uncheck the box.

Aug 27 10:33

NSA Whistleblowers: NSA Hack Was Likely An Inside Job

The probability is that an insider provided the data.

I say this because the NSA net is a closed net that is continuously encrypted. Which would mean, that if someone wanted to hack into the NSA network they would not only have to know weaknesses in the network/firewalls/tables and passwords but also be able to penetrate the encryption.

So, my bet is that it is an insider. In my opinion, if the Russians had these files, they would use them not leak them or any part of them to the world.

Aug 27 09:44

All the Ways Your Wi-Fi Router Can Spy on You

As people move through a space with a Wi-Fi signal, their bodies affect it, absorbing some waves and reflecting others in various directions. By analyzing the exact ways that a Wi-Fi signal is altered when a human moves through it, researchers can “see” what someone writes with their finger in the air, identify a particular person by the way that they walk, and even read a person’s lips with startling accuracy—in some cases even if a router isn’t in the same room as the person performing the actions.

Aug 27 09:23

Harvard Professor Creates Blueprint for Ending Cash in US; Calls for Immediate Phasing Out of $20 Bills

The attack on cash has entered a new stage. Kenneth Rogoff, the Thomas D. Cabot Professor of Public Policy at Harvard University and the former chief economist of the International Monetary Fund, is out with an essay this morning in the Wall Street Journal titled,The Sinister Side of Cash.

Aug 27 09:13

Hillary Clinton Enters The Media Wars

When I wrote the above, I had no idea that two days later Hillary Clinton would deliver a speech in Nevada specifically targeting a nebulous movement referred to as the “alt-right,” as well as several of the prominent websites associated with it. Never in a million years did I think Hillary herself would so publicly enter the Media Wars.

The speech itself was pretty bizarre. Although I found her effective on several fronts, I believe it will ultimately backfire by providing free publicity and fame to many of those she intended to demonize.

Webmaster's Commentary: 

"First they ignore you, then they laugh at you, then they fight you -- then you win. -- Gandhi

Aug 27 09:08

Tech firm brags about blocking FBI from recovering Clinton emails

A technology company that provided the program Hillary Clinton's team used to scrub her private server of emails bragged on its website Thursday that it had prevented the FBI from accessing deleted records.

BleachBit, the publicly-available application that was used to deleted some of Clinton's emails ahead of an FBI investigation, said it had not yet been served a subpoena over its involvement in the destruction of potentially classified records.

A headline on the company's website read: "BleachBit stifles investigation of Hillary Clinton."

Rep. Trey Gowdy brought the involvement of the program to light Thursday when he told Fox News that Clinton's emails were so fully deleted that "even God can't read them."

Aug 27 05:36

How to Hillary Clinton your own computer

If you aren’t an actual criminal like Clinton, more practical uses for the program range from cleaning out a computer you’re planning to sell to selectively deleting information that government agencies and corporations use to track your everyday web activity.

Aug 26 13:30

Facebook, Twitter & YouTube ‘Consciously Failing’ To Tackle Online Extremism – MPs

Social media giants Facebook, Twitter, YouTube, and others are “consciously failing” to combat extremist material promoting terrorism on their sites, an influential group of MPs claims.

The Home Affairs Select Committee have accused internet giants such as Google of “passing the buck” and allowing websites to become “recruiting platforms for terrorism.”

Aug 26 13:25

The Future of War Looks Like Hollywood: “Terminator-Like Machines to Fight in Battlefields”

The future might be unrecognizable, and the battlefield may soon become a place where humans don’t stand a chance.

The future of war will involve autonomous robots instead of humans, according to Air Force General and Vice Chair of the Joint of Chiefs of Staff Paul Selva, who warned enemies could build “Terminator”-like machines to fight in battlefields.

“I’m talking about a wholly-robotic system that decides whether or not, at the point of decision, it’s going to do lethal ops.”

Read more at SHTF

Aug 26 11:10

Europeans Are Escaping to 'Russian Facebook' to Avoid Censorship

Free speech in Germany has come under fire in recent months with an increasing amount of Germans being arrested jailed or fined for what the German state considers hate speech online. The German government has even enlisted the help of social media giants like Facebook to track down posts that are critical of Muslims or of mass migration. Now more German internet users are flooding to Russian Facebook equivalent VK network to avoid the censorship reports Die Welt. Once more known for being a favourite hangout for European political fringe groups, VK network has become the last bastion for many Germans who simply want to express their displeasure with the ongoing migrant crisis without fear of their comments being taken down or VK alerting police. While it is currently unknown how many Germans are using the service several high profile leaders in the anti-Islamisation PEGIDA movement like leader Lutz Bachmann and former member Tatjana Festerling, have accounts on the site.

Aug 26 10:14

BENGHAZI DOCUMENTS Found in Deleted Hillary Clinton Email Files: State Dept

The State Department revealed Benghazi related material was found in searches of the approximately 14,900 deleted Hillary Clinton emails recovered by the FBI that were sent to State as potentially work-related.

In March 2015 Hillary Clinton said she chose to delete only her personal emails:

Aug 26 10:13

Hillary Clinton Email about Benghazi NEVER TURNED OVER TO STATE DEPARTMENT!

Aug 26 09:43

Word Games: What the NSA Means by “Targeted” Surveillance Under Section 702

By Cindy Cohn

We all know that the NSA uses word games to hide and downplay its activities. Words like “collect,” “conversations,” “communications,” and even “surveillance” have suffered tortured definitions that create confusion rather than clarity.

There’s another one to watch: “targeted” v. “mass” surveillance.

Since 2008, the NSA has seized tens of billions of Internet communications. It uses the Upstream and PRISM programs—which the government claims are authorized under Section 702 of the FISA Amendments Act...

Aug 26 09:26

Apple Upgrades Security After Alleged Israeli Group’s Spyware Attack On Arab Activist

A botched hack attempt using “sophisticated spyware package” allegedly tailored by an Israeli group on the iPhone of an Arab activist has triggered Apple to issue an “important” security update for its mobile operating system, iOS.

The attackers tried to lure Ahmed Mansoor, a United Arab Emirates (UAE)-based human rights activist, with text messages embedding a suspicious link to “secrets” about detainees tortured in Arab jails.

Aug 26 08:28

FBI ADMITS CLINTON USED SOFTWARE DESIGNED TO "PREVENT RECOVERY" AND "HIDE TRACES OF" DELETED EMAILS

South Carolina Representative Trey Gowdy appeared on Fox News today and disclosed new details about the Clinton email scandal that seem to indicate intent to destroy evidence. Per the clip below, Gowdy reveals that Clinton used "BleachBit" to erase the "personal" emails from her private server.

For those not familiar with the software, BleachBit is intended to help users delete files in a way to "prevent recovery" and "hide traces of files deleted." Per the BleachBit website:

Beyond simply deleting files, BleachBit includes advanced features such as shredding files to prevent recovery, wiping free disk space to hide traces of files deleted by other applications, and vacuuming Firefox to make it faster.
During his appearance on Fox, Gowdy clearly indicates that Clinton's use of BleachBit undermines her claims that she only deleted innocuous "personal" emails from her private server.

Webmaster's Commentary: 

Imagine my (complete absence of) surprise at this!!

Aug 26 08:18

BOMBSHELL Report: In Hillary’s Deleted Emails They Found THIS About BENGHAZI

Judicial Watch President Tom Fitton stated, “It is astonishing that Hillary Clinton tried to delete and hide Benghazi emails and documents. No wonder federal courts in Florida and DC are ordering the State Department to stop stalling and begin releasing the 14,900 new Clinton emails.”

According to Rep. Trey Gowdy, it’d practically be a miracle if the emails had been recovered. He explained that the deleted emails were removed using a drastic cyber-measure called “BleachBit.”

“If she considered them to be personal, then she and her lawyers had those emails deleted,” Gowdy said, “They didn’t just push the delete button, they had them deleted so even God couldn’t read them.”

Aug 26 07:51

FBI Admits Clinton Used Software Designed To "Prevent Recovery" And "Hide Traces Of" Deleted Emails

South Carolina Representative Trey Gowdy appeared on Fox News today and disclosed new details about the Clinton email scandal that seem to indicate intent to destroy evidence.

Webmaster's Commentary: 

Most people concerned with privacy use similar tools. But here is Hillary's problem. All work-related emails are public records, and it is a crime to erase them. The FBI confirmed Hillary had not turned over all work-related emails to the State Department. So we are looking at yet another Title 18 violation on Hillary's part!

Aug 26 07:48

Federal spies suddenly intercepting 26 times more Canadian phone calls and communications

Interception of Canadians’ private communications by the federal electronic spy agency increased 26-fold last year, for reasons authorities won’t fully explain.

And despite commitments between Canada and its intelligence-sharing allies to respect the privacy of each nation’s citizens, the volume of information on Canadians collected by allied intelligence agencies and informally shared with Canada’s spies has grown to the point that it now requires a formal mechanism to cope with all the data.

Aug 26 07:33

A serious attack on the iPhone was just seen in use for the first time

Earlier this month, an Emirati human rights activist named Ahmed Mansoor got a suspicious text. It promised new details of torture in the country’s state prisons, along with a link to follow if he was interested. If Mansoor had followed the link, it would have jailbroken his phone on the spot and implanted it with malware, capable of logging encrypted messages, activating the microphone and secretly tracking its movements.

...

Citizen Lab linked the attack to a private Israeli spyware company known as NSO group, although it’s unclear how the exploits were first discovered.

Aug 26 07:24

A quarter of banks' data breaches are down to lost phones and laptops

Just 20 per cent were the result of hacking

Aug 26 07:24

‘Betrayal of trust'? WhatsApp to start sharing user data with Facebook, corporations

The world’s most popular messenger, the Facebook-owned WhatsApp, will give its users’ personal information to its parent company and plans to make it easier for businesses to contact subscribers. WhatsApp claims the changes won’t endanger privacy.

WhatsApp, which is used by over 1 billion people each month, published a statement as part of a revision of its terms and privacy policy.

Aug 26 07:22

Update your iPhones, iPads right now – govt spy tools exploit vulns

Apple has pushed out an emergency security update for iPhones, iPads and iPods after super sophisticated spyware was found exploiting three iOS vulnerabilities.

The iOS 9.3.5 upgrade plugs three holes that, according to researchers, are being used right now by the Pegasus surveillance kit – a powerful commercial malware package sold to governments for snooping on dissidents and journalists.

Pegasus exploits the bugs to inject itself into iThings. A victim simply has to click on a bad web link to start an infection. Once installed, Pegasus can read messages and emails, listen to calls, monitor social network posts, pull out Wi-Fi passwords, and so on. It essentially has comprehensive access to a poisoned handheld.

Aug 26 07:02

Find out what Facebook thinks about your political views

Facebook knows way too much about all of us, including our political views even if we haven't expressly provided that information. Don't believe it? Read this.

Webmaster's Commentary: 

I checked mine and it didn't even have politics, and what they did have about me was in large part totally wrong!

Aug 25 10:32

ARREST WARRANT ISSUED FOR DISTRICT ATTORNEY INVOLVED IN DEA'S CALIFORNIA WIRETAP WARRANT MILL

A judge issued an arrest warrant Tuesday for former Riverside County District Attorney Paul Zellerbach after he failed to appear at a court hearing to answer questions about an eavesdropping operation so vast it once accounted for nearly a fifth of all U.S. wiretaps.
[...]
"He should have been there," said Jan Ronis, the attorney who subpoenaed Zellerbach. "But he just blew us off. We could have had court today."

Aug 25 10:05

NASA’s outsourced computer people are even worse than you might expect

Agency's CIO holds off signing the "authority to operate" for systems and tools.

Aug 25 09:55

SMOKING GUN POSTED BY JIM STONE ABOUT HIDDEN TEXT ON MRS. C's CAMPAIGN SITE THAT BRAGS ABOUT HACKING THE VOTE & ASKING FOR PROGRAMMING HELP

Go to Hillary Clinton's campaign web site and on the front page, view the page source. Above the head statement, there is Hillary's campaign logo in ASCII art and hidden text that appears to brag about rigging the election:

Aug 25 09:48

Kindle Paperwhites turn Windows 10 PCs into paperweights: Plugging one in 'triggers a BSOD'

Plugging a Kindle Paperwhite into a PC running Windows 10 with the Anniversary Update installed sparks a full system meltdown, it is claimed.

Connecting the Amazon e-reader to a fully up-to-date W10 machine via USB triggers an immediate Blue Screen of Death, according to complaints on Microsoft's support forum. All the trouble started when people downloaded and installed the Anniversary Update, which arrived at the turn of the month. That's the same upgrade that has knackered millions of webcams and caused some systems to freeze up.

Aug 25 09:42

WhatsApp is to hand your phone number to Facebook

WhatsApp has updated its terms and privacy policy for the first time in four years as part of parent company Facebook’s plans to generate cash through app users' data.

While WhatsApp has been a separate service from Facebook since its acquisition for $16bn two years ago, the companies are now going to enjoy a cosier relationship.

If you’re a WhatsApp user you can expect the app to soon export more of your information to Facebook as the megacorp seeks to bleed some revenue from businesses by allowing them to advertise to you, without using third-party banner advertisements and spam.

Aug 25 09:34

Microsoft Excel blamed for gene study errors

Researchers trying to raise awareness of the issue claim that the spreadsheet software automatically converts the names of certain genes into dates.

Gene symbols like SEPT2 (Septin 2) were found to be altered to "September 2".

...

The researchers claimed the problem is present in "approximately one-fifth of papers" that collated data in Excel documents.

The trio, writing for the Melbourne-based academic institute Baker IDI, scanned 3,597 published scientific papers to conduct their study.

They found 704 of those papers contained gene name errors created by Excel.

Aug 25 08:20

Donald Trump: Hillary Clinton set up email server with 'premedication'

Donald Trump intended to say Wednesday that Hillary Clinton's use of an email server during her tenure at the State Department was an act of "premeditation."

But when he flubbed the line and instead suggested it was due to "premedication," he embraced that possibility as well.

"Hillary Clinton created an illegal private email server -- deliberately, willfully and with total premedication -- premeditation," Trump said, correcting himself. He then added: "Could be the first way was right actually."

"You know, I might like the first way better. 'Premedication,' that's a very -- premedication, I think I like it. Wow," Trump continued as the crowd cheered him on.

Webmaster's Commentary: 

That's one of Trump's qualities, he can think on his feet. He doesn't need a handler to whisper in his ear, "You're okay. Keep talking", the way Hillary does.

Aug 24 19:21

Use a VPN or Your Google Searches Are Public

Our research and development team recently stumbled onto something which puts the AOL search debacle to shame. The discovery we’ll describe should serve as a serious and urgent warning. If Google searches are not conducted through a VPN or Tor, you are running the risk that those searches are made public and linked to your IP address.

Aug 24 19:19

Germany, France demand golden key AND strong encryption just when you thought politicians had clued in to basic reality

In a new level of dumb, Germany and France are demanding strong encryption for all citizens at the same time as they demand this strong encryption to be breakable. They also demand messaging providers of end-to-end encryption to provide police with keys they don’t have, and for terrorists to stop using freely available strong encryption without a messaging provider. You really couldn’t sound dumber if you tried.

Aug 24 16:29

North Korea launches a Netflix-style streaming service called Manbang

Some days, life just throws you a giggle. Today is one of those days.

The Democratic People’s Republic of Korea (aka North Korea) has announced a new Netflix-style on-demand streaming service. It’s called Manbang.

In Korean, ‘manbang’ means ‘everything.’ In English-speaking countries, it has some different connotations. Obviously.

Aug 24 16:25

BU researcher creates images from single photons

“It’s natural to think of light intensity as a continuous quantity, but when you get down to very small amounts of light, then the underlying quantum nature of light becomes significant,” says Vivek Goyal, an associate professor of electrical and computer engineering at Boston University’s College of Engineering. “When you use the right kind of mathematical modeling for the detection of individual photons, you can make the leap to forming images of useful quality from extremely small amounts of detected light.”

Goyal’s study, “Photon-Efficient Imaging with a Single-Photon Camera,” was a collaboration with researchers at MIT and Politecnico di Milano. Funded by the National Science Foundation, it combined new image formation algorithms with the use of a single-photon camera to produce images from about one photon per pixel.

Aug 24 14:40

Clinton to be Questioned Under Oath on Origins of Email Server

Hillary Clinton will soon face questions under oath about the reasons she set up and maintained a private email server during her four years as secretary of state. -- Tom Fitton, president of Judicial Watch, told the Washington Examiner that his group is preparing a set of written questions for Clinton as part of the Freedom of Information Act lawsuit that has already extracted hundreds of documents from the State Department.

Aug 24 14:33

CLINTON EMAILS SO DANGEROUS, CONGRESS DOES NOT HAVE CLEARANCE

The United States has been kidnapped by the National Security Act, as shown so well, in this interaction between Congressman Jason Chaffetz (R-UT) and Charles McCullough, Intelligence Community Inspector General (ODNI OIG), during a hearing of the United States House Committee on Oversight and Government regarding the High Security nature of Hillary Clinton's emails.

When asked by Rep. Chaffetz which intelligence agency is in possession of the "hot" emails, McCullough responds that those who have "ownership" of them will not release any information about them, as they are characterized as "ORCON" (Originator Controlled). Furthermore, McCullough cannot say which actual agency is in possession of these emails, "In an open hearing."

Aug 24 13:52

Homeland Security: DHS To Monitor Visa-Waiver Applicants’ Social Media

The process for visa-waiver applicants has been under fire from US citizens and politicians alike. But one program in particular, monitoring the social media presence of foreign visitors, is being targeted by a wide coalition of civil liberties groups.

Aug 24 09:49

Did Hillary Clinton Violate the Espionage Act?

Contributions, either directly, or indirectly to Clinton’s Foundation are more than a “Conflict of Interest”. Since her job description was to specifically protect US interests, any remuneration could be prosecuted under the Espionage Act of 1917. In the words of Woodrow Wilson:

“There are citizens of the United States, … who have poured the poison of disloyalty into the very arteries of our national life; who have sought to bring the authority and good name of our Government into contempt, to destroy our industries wherever they thought it effective … to strike at them, and to debase our politics to the uses of foreign intrigue …

They have formed plots to destroy property, they have entered into conspiracies against the neutrality of the Government, they have sought to pry into every confidential transaction of the Government in order to serve interests alien to our own.”

Webmaster's Commentary: 

Finally!

Aug 24 08:34

Yahoo now censoring whatreallyhappened.com!

Webmaster's Commentary: 

I am getting emails from readers saying that when they access whatreallyhappened.com using Yahoo, they get a warning message that the link is not authorized by Yahoo, and that visiting my site is risky!

Aug 24 08:21

University hit 21 times in one year by ransomware

Universities and NHS trusts in England have been hit hard by ransomware in the last year, according to Freedom of Information requests carried out by two cybersecurity firms.

Bournemouth University, which boasts a cybersecurity centre, has been hit 21 times in the last 12 months.

Twenty-eight NHS Trusts said they had been affected.

Aug 24 08:10

Pokémon Go loses its luster, sheds more than 10 million users

Engagement, downloads, and time spent in the app are fading fast.

Aug 24 08:07

Hacked hookup site Ashley Madison's security was laughable

The report finds the site's security practices were a treat: the company stored its VPN password on Google Drive, making it easy to obtain for anyone who accessed any employee's machine. Once an attacker was on the inside, they'd find that some passwords were stored as plain text, in emails (apparently the idiots used “here's your password” emails at some point), and in text files on the company's servers.

“In addition, encryption keys were stored as plain, clearly identifiable text on ALM [Avid Life Media, the company that once ran AshMad - Ed] systems, potentially putting information encrypted using those keys at risk of unauthorized disclosure. Finally, a server was found with an SSH key that was not password protected. This key would enable an attacker to connect to other servers without having to provide a password”, the report adds.

Aug 24 08:06

Kelly File 8/17/16 FULL: Hillary's Top Secret Classified Emails Released

Webmaster's Commentary: 

She had to copy the information to put it on unsecured server

Aug 24 08:05

Google broke its own cloud by doing two updates at once

Right hand, meet left hand. Then both do a facepalm

Aug 24 07:58

Encryption under fire in Europe as France and Germany call for decrypt law

A fresh chapter of the crypto wars looks to be opening up in Europe, after the French and German interior ministers took to a podium yesterday to lobby for a law change that would enable courts to demand that Internet companies decrypt data to help further criminal investigations.

So, in other words, to effectively push for end-to-end encryption to be outlawed. Yes we’ve been here before — many times.

Aug 24 07:54

Windows 10 tip: Shut down OneDrive completely

Windows 10 and OneDrive are sewn together tightly. So tightly, in fact, that OneDrive gets its own node in File Explorer, and the OneDrive sync client runs automatically at startup.

You don't have to use OneDrive's cloud storage. Maybe you prefer a cloud service from another provider, or perhaps you're philosophically opposed to storing files in the cloud. Regardless of the reason, if you don't want to use OneDrive, you are free to ignore it.

When the sync client pops up asking you to sign in, just click Cancel.

That option does, however, leave the OneDrive icon in the navigation pane of File Explorer. To make it disappear, you need to make a simple registry edit.

Aug 24 07:30

Windows 10 cumulative update KB 3176934 breaks PowerShell

Microsoft's update for version 1607 doesn't fix two widespread problems with Windows 10 Anniversary Update, and it breaks PowerShell DSC operations

Aug 23 17:03

20% of scientific papers on genes contain gene name conversion errors caused by Excel

According to three scientists, Mark Ziemann, Yotam Eren, and Assam El-Osta, Microsoft Excel has trouble converting gene names. In the scientific article, titled “Gene name errors are widespread in the scientific literature,” article’s abstract section, the scientists explain:

“The spreadsheet software Microsoft Excel, when used with default settings, is known to convert gene names to dates and floating-point numbers. A programmatic scan of leading genomics journals reveals that approximately one-fifth of papers with supplementary Excel gene lists contain erroneous gene name conversions.”

Aug 23 16:58

NSA-linked Cisco exploit poses bigger threat than previously thought

An exploit dubbed ExtraBacon contains code that prevents it from working on newer versions of Cisco Adaptive Security Appliance (ASA), a line of firewalls that's widely used by corporations, government agencies, and other large organizations. When the exploit encounters 8.4(5) or newer versions of ASA, it returns an error message that prevents it from working. Now researchers say that with a nominal amount of work, they were able to modify ExtraBacon to make it work on a much newer version. The finding means that ExtraBacon poses a bigger threat than many security experts may have believed.

Aug 23 12:30

New York Times Tech Columnist Calls on Google to Hide Hillary Health Info

New York Times tech columnist Farhad Manjoo is calling on Google to “fix” its search engine results to hide evidence of Hillary Clinton’s failing health.

“Go online and put down, ‘Hillary Clinton illness,’ and take a look at the videos yourself,” Rudy Giuliani recently said on Fox News, during an argument about how sick Clinton really is.

Aug 23 10:01

Judge Orders Written Testimony From Hillary Clinton on Emails

A federal judge on Friday ordered Hillary Clinton to provide written testimony under oath about why she set up a private computer server to send and receive emails while secretary of state, ensuring that the issue will continue to dog her presidential campaign until the eve of the election.

In a brief ruling issued on Friday afternoon, the judge, Emmet G. Sullivan of Federal District Court in Washington, approved a motion by the conservative advocacy organization Judicial Watch to pursue its vigorous campaign to expose Mrs. Clinton’s use of the private server. In addition to requiring her testimony in writing, the judge allowed the group to depose a senior State Department aide who had warned two subordinates not to question her email practices.

Aug 23 08:32

Shocking Netflix SCAM hits Apple iPhone users

The scam email, which is designed to look like an invoice from Apple, claims you have recently purchased and downloaded a Netflix app from the iTunes Store.

Apple customers are told they have been billed more than £36 for a Netflix subscription purchased from the App Store.

However the fake invoice is another clever ploy to scare people into clicking the prominent Cancel and Manage Subscriptions link at the foot of the email.

This link does not appear on official Apple invoice emails. However the one in this scam email links to a fraudulent webpage.

Aug 23 07:36

Colin Powell Just Revealed The DEVASTATING TRUTH About Hillary’s Email Scandal!

But Powell, who had said last week in a statement that he had no recollection of the conversation, told Page Six at Saturday’s Apollo in the Hamptons event, “The truth is she was using it (her personal email) for a year before I sent her a memo telling her what I did [during my term as Secretary of State].

“Her people have been trying to pin it on me.”

When asked why Clinton’s team were attempting to blame him, he responded, “Why do you think?”

Aug 23 07:35

REPORT: Hillary’s Top Aide Left BUSTED For Mishandling Classified Info!

Bombshell e-mails released on Monday have revealed that Hillary Clinton’s top aide at the State Department, Huma Abedin, carelessly left sensitive materials in the front seat of her car.

Abedin e-mailed a personal assistant asking for a “favor” involving “a bunch of burn stuff in the pocket of my front seat.”

She asked the assistant to move the material to her vehicle’s trunk, presumably realizing that the “burn stuff” is highly sensitive material that needs to be destroyed by the State Department.

Aug 23 07:20

Microsoft's maps lost a city because it used bad Wikipedia data

Microsoft has laid part of the blame for Bing Maps' mis-location of the Australian city of Melbourne by a whole hemisphere on Wikipedia.

Yes, Wikipedia, “the free encyclopaedia that anyone can edit.”

Aug 23 07:17

'NSA' hack okshun woz writ by Inglish speeker trieing to hyde

The script appeared to be written by an author with slippery command of English, riddled with grammatical and structural errors.

Argamon, a researcher with Taia Global and computer science professor at the Illinois Institute of Technology says initial analysis of the sentence structure and in grammatical errors indicates a false flag as errors appear to have been deliberately introduced by a native English speaker

"The texts contain a variety of different grammatical errors that are not usual in the English of US native speakers," Argamon says in analysis.

"While no one of these factors is dispositive, the cumulative effect of these multiple lines of evidence leads to the conclusion that the author is most likely a native speaker of US English who is attempting to sound like a non-native speaker by inserting a variety of random grammatical errors."

Aug 23 07:15

Kaspersky launches its own OS on Russian routers

Kaspersky Labs has finished building its eponymously-named operating system after four years of quiet development.

Little information about the OS has made it onto the English-speaking side of the internet. Kaspersky Labs Russia told Vulture South to wait a few weeks for the English press release for information.

What we do know is that in 2012 ebullient Kaspersky Lab chief executive officer Eugene Kaspersky described the OS as a ground-up build to help protect industrial control systems.

Aug 23 05:46

10 Orwellian moments found in the newly leaked private NSA newsletters

The Intercept recently began releasing batches of top secret internal newsletters from the most important division of the NSA, the Signals Intelligence Directorate, or SIGINT.

Aug 22 16:15

Anti-Piracy Operations Are Fabricating Links To Non-Existent Torrents In DMCA Notices

The anti-piracy groups understood just enough about how the torrent cache sites worked, that they automated sending takedowns based on torrent hashes on the assumption that those torrents would also show up via the cache sites. Okay, understandable. But here's the problem: they never checked to see if those links ever existed. Hell, it sounds like they never even visited Zoink.it again for at least the past two years.

And yet they sent takedowns for links there.

So how can these companies actually claim that they know these "files" are infringing, when they clearly never even checked the links, let alone the fact that the site they're accusing of infringement, hasn't even been up for two years?

The TorrentFreak article notes that this is not a one-off thing. They found other anti-piracy groups sending takedowns for more non-existent torrents on the same non-existing sites.

Aug 22 16:14

Windows 10 update is breaking millions of webcams - how to fix it

Microsoft said it is working to fix the problem, but it is not yet clear when the issue will be resolved.

In the meantime you can revert to the previous version of Windows if you really need your webcam to work. You have 10 days after you've updated your computer to the new software to roll back to the previous version.

To downgrade to an earlier version of Windows go to Settings -> Updates and Security -> Recovery. Under the "Go back to an earlier build" section click "Get started".

Microsoft will here ask you why you are choosing to revert your software then click "Next". Follow the steps on the screen and your device will have returned to Windows 10 version 1511.

Aug 22 14:54

Rivero challenges the NSA

The US Government insists their demand for a ban on strong encryption or back doors into all of our electrinic devices is to stop crime and terror.

But over the course of a year, as documented on this page, What Really Happened issued six encryption challenges based on systems of encryption created and programmed here on an air-gapped computer.

Now, I am not an encryption expert, and only a moderately decent programmer. The NSA would have a strong motive to break my codes to discourage others from creating their own systems of encryption.

None were ever solved.

Aug 22 11:06

FLASHBACK - HILLARY THE SPY? - UPDATED INFO!

Easy means of delivering secrets using the weak private email server. Easy means of accepting payment through a "charitable" foundation!

This is a perfect setup to repeat the 1996 selling of secrets for cash. In other words, a perfect espionage operation, running out the US State Department, with the weak email server providing the secrets and a charitable foundation to accept and launder the payments! Hillary doesn't have to physically steal the files, the way Jonathan Pollard did. Hillary doesn't have to scratch an X on a mailbox, the way Aldrich Ames did. Hillary doesn't have to tape bundles of stolen documents underneath a park bridge, like Robert Hannsen did!

It is time to look past the small scandal of the private email server at what may be a far larger scandal hidden behind it!

Webmaster's Commentary: 

Optional Banner: 
WRH Exclusive
Aug 22 10:36

Join the Hillary HACKATHON!

Webmaster's Commentary: 

This is Hillary Clinton's official web page. Use the "view source" option in your browser to see the actual encoding and read the message at the top. Given that it will probably vanish as soon as I hit the "send" button, here is a screencap.

The link in the message, https://boards.greenhouse.io/hillaryforamerica, does to job openings at the Hillary campaign, and they are looking for software people, including Android experts for their "hackathon!"

Aug 22 10:06

Windows 10 Anniversary Update kills webcams, no fix until September

One of the big issues with the Windows 10 Anniversary Update is that it has broken some webcams. While Microsoft has apologized for the problem, there won't be a fix until September.

Aug 22 10:05

TIME Argues ‘Trolling’ Demands Formal Policing of the Internet

TIME magazine has written yet another horrible article, this one basically calling for the Internet to be controlled and censored because of too many “trolls.”

Webmaster's Commentary: 

The trolls are all working for the establishment!

Aug 22 09:58

FBI finds 15,000 more Clinton documents

The FBI has found thousands of documents Hillary Clinton failed to turn over to the State Department when she stepped down as secretary of state — ensuring more legal trouble for the Democratic presidential candidate and further mandatory disclosures.

The FBI uncovered nearly 15,000 documents in its year-long investigation into Clinton’s private email server, the Washington Post reported.

The documents, which could include email attachments and duplicates, have been sent over to the State Department.

“FBI found almost 15,000 new Clinton documents. When will State release them? Court hearing today,” Judicial Watch President Tom Fitton said on Twitter.

Aug 22 09:16

The Direct Democracy President

In my opinion, Trump is likely to be the first direct-democracy president. He’ll do what the public wants and avoid doing what they dislike. The public expects its leaders to try and change their minds about things, but in the end the public will decide and the leaders will follow.

Aug 22 08:59

I did not go down without a fight.

there is a line herethe banner is here

August 21 2016

I did not go down without a fight.

I have tried to do everything I can to get this web site back to normal, and have been blocked in every effort. I have tried everything I can to get the message window working, and it works when they let it. I have set up new servers, new code, new EVERYTHING and have been blocked at every turn, every path, every solution, everything I can possibly think of.
YES, THEY LET THIS WEB SITE LOAD, but I am now blocked from posting any page or file that is more than 4k in size, which happens to be the content of a single packet. Any more than that, and it will be blocked.

This is the way it will all end. Everyone will be snuffed without a whimper, with no way to post anything that differs from the controlled "mainstream." Perhaps they are using me to figure out how to crush everyone else. Denying anything be posted to the web site but small comments would work.

Webmaster's Commentary: 

It seems I am not the only independent media site under attack these days!

Aug 22 08:22

Colin Powell Says Hillary Clinton's 'People Have Been Trying to Pin' Email Scandal on Him

On Friday, the New York Times reported that Clinton told FBI officials former Secretary of State Colin Powell had advised her to use a personal email account while she held the Secretary of State office herself.

"Her people have been trying to pin it on me," Powell, 79, told PEOPLE Saturday night at the Apollo in the Hamptons 2016 Night of Legends fête in East Hampton, New York.

"The truth is, she was using [the private email server] for a year before I sent her a memo telling her what I did," Powell added.

Aug 22 07:38

Colin Powell Just Revealed The DEVASTATING TRUTH About Hillary’s Email Scandal!

But Powell, who had said last week in a statement that he had no recollection of the conversation, told Page Six at Saturday’s Apollo in the Hamptons event, “The truth is she was using it (her personal email) for a year before I sent her a memo telling her what I did [during my term as Secretary of State].

“Her people have been trying to pin it on me.”

Aug 22 07:16

Microsoft can't tell North from South on Bing Maps

City of Melbourne, population four million, placed in the wrong hemisphere

Aug 22 07:14

Five-storey Blue Screen Of Death spotted in Thailand

Windows crashing and producing the Blue Screen of Death (BSOD) is seldom pleasant, or convenient.

It's also seldom as conspicuously displayed as in the image below, which The Register found on Facebook late last week. By your correspondent's reckoning, that there is a five-storey BSOD.

Aug 22 07:04

Colin Powell Says Clinton’s ‘People’ Are Trying to Pin Email Scandal on Him

As previously reported, the FBI revealed in notes to Congress regarding its investigation into the Democratic presidential nominee’s private server use that she claimed that Powell was the one who encouraged her to use a personal email.

In a statement Friday, Powell said he did email Clinton a “memo describing his use of his personal AOL email account for unclassified messages and how it vastly improved communications within the State Department.”

Aug 21 11:23

Facebook Falsely Claims Colin Powell Cleared Hillary In Email Case

Facebook’s “Trending Topics” section is at it again. Saturday morning the site ran a headline in the section declaring, “Colin Powell: Former Secretary of State Confirms He Recommended Using Personal Email to Hillary Clinton.” The only problem is Powell made no such declaration and he denied Clinton’s claim.

Webmaster's Commentary: 

Maybe we should call it "Fakebook!"

Aug 21 11:04

Colin Powell: Hillary Clinton LIED About Me Telling Her to Use Private Email Server

Aug 21 10:28

FIRST THE DNC, THEN DARTH SOROS, NOW IT’S THE ...

A Russian hack of Darth Soros makes eminent sense, and even more sense, than on the DNC. Soros' role, especially since his emails were released, in the Ukrainian mess, is well-known, as is Russia's outlawing of NGO groups (such as Soros'). From the Russian point of view, such groups are nothing but gangs, racketeering operations, and front groups for "revolutionary" activities enjoying the protection of western law, governments, and powerful patronage. In this context, a Russian hack of the NSA to send messages also makes sense.

Aug 21 10:27

HACKS, SNOWDEN, DARTH SOROS, AND RUSSIA

Well, in the past week, so many people sent articles concerning the recent hacks of the Democratic National Committee, and the various "groups" and activities sponsored by Darth Soros, that the above "Dot-connecting" doesnt' appear to be so speculative any longer:

Aug 21 10:11

NSA Blackmailing Obama? | Interview with Whistleblower Russ Tice

Aug 21 09:54

Dallas Police Department Attempt To Block Release Of Info Related To Bomb Robot

By Derrick Broze

On July 7, Micah Xavier Johnson attacked a group of police officers in Dallas, Texas, killing five officers and injuring two others. Johnson was reportedly upset about the police shootings of black men and wanted to target white officers. After hours of negotiations, Dallas Police Chief David Brown decided to send in a robot armed with a brick of C-4 explosive. The robot detonated the bomb near Johnson on the campus of El Centro College in downtown Dallas. Johnson was killed in the explosion.

“Our bomb robot detonated a bomb where the suspect was,” Brown said at the time. “Other options would have subjected officers to great danger.”...

Aug 21 09:19

GCHQ could be behind 'super-spyware' attack – Security expert on Regin, incredibly advanced virus

Aug 20 11:47

What has happened to Ron Gibson?

Webmaster's Commentary: 

Ron Gibson maintains video archives of popular independent media shows on his YouTube channel (including WRH) but has suddenly stopped as of the 16th. Emails to him have remained unanswered. A lot of people are asking why the archives have stopped.

Now, maybe he is on a vacation, but you can all understand why some people are worried about him. So, if anyone knows Ron, drop me a line just to let me know he is okay.

Thanks.

Aug 20 11:29

Glaring Hypocrisy Interview: Police Seize Holocaust & 9/11 Truther Alfred Schaefer’s Computers, Papers, etc.

The above video is a 29-minute interview, recorded Friday, August 19, 2016, with Alfred Schaefer, a German-Canadian Holocaust and 9/11 truther and video producer.

Early Thursday morning, Alfred and his wife Elfriede’s house was visited by two German criminal police officers who, after providing a search warrant, took possession of Alfred’s computer equipment (e.g., Mac, drives, iPad), various papers and even his iPod.

Aug 20 10:22

UK surveillance powers have gone ‘further than any other Western democracy’ - MP

Britain has gone “further than any other Western democracy” in its expansion of surveillance powers and its ability to collect bulk data without justifiable reason, a British MP has said.

Aug 20 09:20

Can Technology Liberate Us From The State?

By Emily Pont

In a society ruled by violent, coercive and oppressive institutions comprised of elite charlatans, loving nothing better than to regulate and collectivize us like cattle, steal from us in the form of taxation, and strip us of our individual liberty, sovereignty and freedom until we are left unwilling pawns in the state’s destruction, it is crucial that we practice resistance. We must rise up against the hand of the state, dismantling the throne of our oppressors.

Aug 20 09:12

Company Owned by Pro-Israel Clinton Mega-Donor Haim Saban Just Bought Gawker Media's Assets

Pro-Israel mega-donor, media tycoon and die-hard Hillary Clinton backer Haim Saban is expanding his empire through his company’s acquisition of Gawker Media Group’s digital assets for $135 million.

Aug 20 09:03

BEX ALERT - Obama Signs Executive Order Banning The Pledge Of Allegiance In Schools Nationwide

Webmaster's Commentary: 

HOAX ALERT - THIS IS NOT A REAL ABC SITE.

Check out http://www.whois.com/whois/abcnews.com.co

Someone is creating fake corporate media sites and loading them with bogus stories to try to discredit the independent media.

The earlier claimed ABC page with a live Hillary/Trump poll (now taken down) was also a hoax.

Be alert. CHECK THE LEGITIMACY OF THE URL BEFORE YOU POST!

Optional Banner: 
WRH breaking

SHARE THIS ARTICLE WITH YOUR SOCIAL MEDIA