COMPUTERS/INTERNET/SECURITY | WHAT REALLY HAPPENED


COMPUTERS/INTERNET/SECURITY

Mar 28 17:07

Hillary’s State Department was wrapped up with allegations of sexual misconduct, pedophilia, and cover-up: Report

According to the NBC’s Today, State Department internal memos suggest that the department, during Hillary Clinton’s tenure, may have “called off or interviewed an investigation” into sexual misconduct and even pedophilia.

Mar 28 16:20

The Raspberry Pi is now the third best-selling computer of all time

The Raspberry Pi is now the third best-selling general purpose computer of all time, MagPi magazine says, edging out the Commodore 64 in the all-time rankings. Over 12.5 million DIY boards have been shifted in the last five years.

The top two in the list are, as you might expect, the PC and the Mac - but even if the Raspberry Pi has little hope of ever overtaking those two computing juggernauts, it's still a huge achievement for the basic little system.

Mar 28 16:06

Alabama bill would require porn filters on all Internet devices

The bill by Williams would make it a Class A misdemeanor, punishable by up to one year in jail, to sell an Internet access device without a filter to block out obscene material, child pornography, “images used for sexual cyberharassment” or sites used for prostitution or human trafficking. Selling a device without a filter to a minor would be a Class C felony, punishable by one to 10 years in prison.

Filters would be “active” and could be turned off only after the $20 state fee is paid. The seller could charge an additional fee for deactivation as well.

Mar 28 16:02

Potent LastPass exploit underscores the dark side of password managers

Developers of the widely used LastPass password manager are scrambling to fix a serious vulnerability that makes it possible for malicious websites to steal user passcodes and in some cases execute malicious code on computers running the program.

The flaw, which affects the latest version of the LastPass browser extension, was briefly described on Saturday by Tavis Ormandy, a researcher with Google's Project Zero vulnerability reporting team. When people have the LastPass binary running, the vulnerability allows malicious websites to execute code of their choice. Even when the binary isn't present, the flaw can be exploited in a way that lets malicious sites steal passwords from the protected LastPass vault. Ormandy said he developed a proof-of-concept exploit and sent it to LastPass officials. Developers now have three months to patch the hole before Project Zero discloses technical details.

Mar 28 14:03

Twitter Censors Search Terms, Offers No Transparency and Mixed Results

Twitter has upped its censorship game and is now blocking certain terms from showing up on the platform’s built-in search engine. The added filters are part of the company’s plans to reduce harassment on the service. Some of these filters were deployed earlier this month when users were given the option to mute certain types of accounts.

Mar 28 10:44

Border searches of electronic devices prompt FOIA lawsuit against Trump administration

Dramatic increase in border searches of electronic devices prompt FOIA lawsuit against Trump administration
A group of First Amendment attorneys has filed suit against the federal government after a surge in electronic device data searches at US border crossings.

On Monday, the the Knight First Amendment Institute (KFAI) at Columbia University filed a Freedom of Information Act (FOIA) lawsuit against the Department of Homeland Security (DHS) and Immigration and Customs Enforcement (ICE), seeking “statistical, policy, and assessment records regarding the government’s searches” involving electronic devices.

Mar 28 08:41

This Map Will Show If Your Web Traffic Passes Through an NSA Listening Post

IXmaps wants to “make visible the secret, dangerous, often illegal forms of surveillance that are increasingly becoming part of everyday life.”

Internet data pinballs across national borders, and for Canadians this means potentially exposing it to eavesdropping by US-based corporations and the National Security Agency.

Now, an interactive mapping tool named Internet Exchange Mapping (IXmaps), re-launched for public use today, will show you how—and how easily—you data can be spied on by tracing the oftentimes byzantine routes data takes when traversing the internet.

Mar 28 07:54

Apple iCloud hack threat gets worse: Here's what we've learned

Hackers are threatening to remotely wipe an unknown number of iPhones, iPads, and Macs unless Apple pays a ransom. The picture is becoming clearer. This is what you need to know.

Webmaster's Commentary: 

This threat, if carried out, will cause millions if not billions in damage to Americans' productivity. Clearly this is a real threat.

So .... where is the NSA? Isn't it their job to protect the IT infrastructure?

Mar 28 07:42

Trump was wiretapped "a zillion times"And so were you

Computer expert Dennis Montgomery developed software programs that could breach secure computer systems and collect massive amounts of data.

That system, THE HAMMER, according to the audio tapes, accessed the phone calls, emails and bank accounts of millions of ordinary Americans.

The tapes also reveal that the Foreign Intelligence Surveillance court (FISA), Supreme Court Chief Justice John Roberts, 156 other judges, members of Congress, and Donald J. Trump were targeted by the HAMMER.

One of the audio tapes made public by Federal Judge G. Murray Snow revealed that Brennan and Clapper particularly targeted and wiretapped Donald Trump a “zillion times.”

Mar 28 07:41

Microsoft faces new class-action lawsuit over its Windows 10 upgrade policy

Multiple Illinois residents have sued Microsoft over its Windows 10 upgrade program. They allege the company’s invasive upgrade practices cost them time, money, and substantial inconvenience by forcing them to deal with various unhelpful Microsoft tech support options, upgrades that were installed without the user understanding that they had an option to avoid it, and in some cases, loss of data or hardware functionality resulting from compatibility issues that Microsoft’s Windows 10 upgrade wizard failed to detect.

The class-action lawsuit against Microsoft claims more than 100 members collectively seeking $5 million in damages excluding cost and interest.

Webmaster's Commentary: 

Count me in!!!!!!!!!

Mar 28 07:38

World+dog had 1.4 BEEEELLION of its data records exposed last year

Almost 1.4 billion data records were compromised worldwide during 2016, a whopping increase of 86 per cent compared to the year before.

Mar 28 07:36

Hacker targeting Palestine Solidarity Campaign claimed to be Mossad

Whoever was behind a cyber attack on the UK’s Palestine Solidarity Campaign earlier this month defaced its social media in the name of an Israeli spy agency, it has emerged.

The attack was reported to police, the campaign said in a statement.

A spokesperson for the campaign has provided The Electronic Intifada with new details about the attack.

Mar 28 03:50

Digital Spies in Your Home (Not Mine)

I have no need to control my appliances by voice command. I have no need to monitor them. I am not going to pay for the privilege of having government agencies and private companies invade my home and record my activities. I suggest you adopt the same attitude.

Mar 27 18:50

Uber’s autonomous cars drove 20,354 miles and had to be taken over at every mile, according to documents

During the week ending March 8, the 43 active cars on the road only drove an average of close to 0.8 miles before the safety driver had to take over for one reason or another.

This metric, called miles per intervention, includes all the times drivers have had to take back control from the system over the course of a week.

The reasons for these interventions can vary, but that can include navigating unclear lane markings, the system overshooting a turn or driving in inclement weather. The stat excludes “accidental disengagements, end-of-route disengagements and early takeovers.”

...

Then there’s what the company calls “critical” interventions. This is how many times a safety driver had to take over to avoid harmful events — incidents that would have resulted in a car hitting a person or causing more than around $5,000 in property damage if a driver didn’t take over.

Mar 27 15:22

Twitter Temporarily Censored Drudge Report Tweets Behind ‘Sensitive Content’ Filter

Earlier today, users on Twitter reported that tweets from the official account of the Drudge Report were being hidden from users behind a “sensitive content” filter.

A screenshot published on the British news site Westmonster revealed the filtering of the Drudge Report, one of the largest and highest-profile conservative sites on the web.

Mar 27 12:56

Is Twitter Now Censoring Drudge Report?

In an extraordinary development, Westmonster has found that the world famous Drudge Report has been marked as “sensitive material” by Twitter, with some users now having to OPT IN in order to see tweets. Hardly any tweets from Drudge were visible today when we first logged in.

Mar 27 12:41

FBI FACE RECOGNITION TECHNOLOGY HAS 'NO LIMITS,' CONGRESSIONAL HEARING REVEALS

If Congress doesn't take legislative action, the FBI's vast and growing facial recognition database could someday soon allow the government to track Americans' "every move" in a breathtaking, nationwide violation of the Fourth Amendment.

That was the takeaway of a scathing hearing in the Congressional Oversight Committee on the FBI's use of facial recognition technology last week.

In June, the FBI's use of such technology was the subject of a damning report from the Government Accountability Office (GAO), which revealed that the agency's use of the technology was much more far-reaching than privacy advocates had suspected: 30 million photos are contained in the database, and the agency has access to hundreds of millions more—and the majority of subjects committed no crimes.

Mar 27 10:44

"They're Like The Praetorian Guard" - Whistleblower Confirms NSA Targeted Congress, The Supreme Court, & Trump

NSA whistleblower William Binney told Tucker Carlson on Friday that the NSA is spying on "all the members of the Supreme Court, the Joint Chiefs of Staff, Congress, both House and Senate, as well as the White House."

Binney, who served the NSA for 30 years before blowing the whistle on domestic spying in 2001, told Tucker he firmly believes that Trump was spied on.

"They're taking in fundamentally the entire fiber network inside the United States and collecting all that data and storing it, in a program they call Stellar Wind," Binney said.

"That's the domestic collection of data on US citizens, US citizens to other US citizens," he said. "Everything we're doing, phone calls, emails and then financial transactions, credit cards, things like that, all of it."

Mar 27 10:44

"Much Worse Than Watergate", Former CIA Officer Admits Trump 'Wiretapping' Likely True

The "political appointees" in the intelligence community knew exactly what they were surveilling for, former CIA officer Col. Tony Shaffer told Fox News, adding that the case is "much worse than Watergate by an order of magnitude."

Mar 27 10:43

The Evidence That Russia Hacked The DNC Is Collapsing

These alleged “hacker groups” are not associated with any known individuals in any way connected to Russian intelligence: instead, they are identified by the tools they use, the times they do their dirty work, the nature of the targets, and other characteristics based on the history of past intrusions.

Yet as Jeffrey Carr and other cyberwarfare experts have pointed out, this methodology is fatally flawed. “It’s important to know that the process of attributing an attack by a cybersecurity company has nothing to do with the scientific method,” writes Carr:

“Claims of attribution aren’t testable or repeatable because the hypothesis is never proven right or wrong. Neither are claims of attribution admissible in any criminal case, so those who make the claim don’t have to abide by any rules of evidence (i.e., hearsay, relevance, admissibility).”

Mar 27 06:12

iPhone-havers think they're safe. But they're not

Mobile malware is at the highest level yet recorded, infecting 1.35 per cent of all mobile devices in October, according to a study by Nokia out today. The high water mark in October compares to figures of 1.06 per cent in April 2016.

While Android smartphones and tablets remained the top mobile target (81 per cent), iOS-based devices were also affected, particularly through spyphone applications, in the second half of the last year (4 per cent). Spyphone surveillance software (sometimes marked as spousal or child monitoring tech) tracks a user's calls, text messages, social media applications, web searches, GPS locations or other activities.

Mar 26 09:40

BexAlert ~~ FACTCHECKING FAKE NEWS SITES

Way too much bull on the Net >>>>> BEWARE!

Webmaster's Commentary: 

In recent weeks there has been a noticeable increase in bovine excrement poured onto the internet to "jam" the discussions. The recent story about Vince Foster being exhumed is just one example. There are a whole bunch of newly-created websites spewing junk to try to damage the credibility of the independent media, and we must be very careful.

Remember; the other side loves to play dirty!

Mar 26 09:37

Automation Threatens Jobs But Offers Financial Freedom

By Brian Berletic

Despite sensational headlines and opportunistic politicking regarding the threat automation poses to socioeconomic stability, with a fully informed, properly educated population, more opportunities than threats lie ahead of us in the near future.

Automation has since the Industrial Revolution replaced human jobs with machines. As technology advances and automation evolves, the socioeconomic landscape of human civilization has evolved with it...

Mar 26 09:10

GiftGhostBot scares up victims' gift-card cash with brute-force attacks

Cybercrooks are using a bot to automate the process of breaking into and draining online gift card accounts.

The software nasty, named GiftGhostBot, attempts to steal cash from money-loaded gift cards provided by a variety of retailers around the globe, according to Distil Networks.

Any website – from luxury retailers to supermarkets to major coffee distributors – with gift card processing capabilities could be a target. Distil has seen this attack on almost 1,000 websites since it first detected it late last month.

Fraudsters are using the bespoke cybercrime tool to generate lists and lists of account numbers, and request the balance for each number. Whenever this brute-force attack throws up an actual balance, rather than an error or zero, the account number is automatically logged.

The criminals can then either resell these confirmed account numbers on the dark web or use them to purchase goods.

Mar 26 09:08

'Windows 10 destroyed our data!' Microsoft hauled into US court

Three people in Illinois have filed a lawsuit against Microsoft, claiming that its Windows 10 update destroyed their data and damaged their computers.

The complaint [PDF], filed in Chicago's US District Court on Thursday, charges that Microsoft Windows 10 is a defective product and that its maker failed to provide adequate warning about the potential risks posed by Windows 10 installation – specifically system stability and data loss.

Microsoft "failed to exercise reasonable care in designing, formulating, and manufacturing the Windows 10 upgrade and placing it into the stream of commerce," the complaint claims. "As a result of its failure to exercise reasonable care, [the company] distributed an operating system that was liable to cause loss of data or damage to hardware."

Mar 26 09:04

US Will Keep Ground Troops in Libya

In a press briefing at the Pentagon today, African Command leader Gen. Thomas Waldhauser announced that the US intends to keep ground troops in Libya for the foreseeable future to support “friendly forces,” and to “degrade” the ISIS forces that remain in the country.

Waldhauser did not specify how many US troops are in Libya now, or how many will stay, but did estimate that there were less than 200 ISIS fighters left in Libya. The US had announced the end of the anti-ISIS campaign in Libya back in December, but never fully withdrew from the country.

The US forces were in Libya trying to help the “unity” government defeat ISIS in the city of Sirte. US officials repeatedly claimed the city was totally surrounded, and that no ISIS fighters would get away, though when the fighting finally ended, a substantial number of ISIS fighters did in fact get away.

Webmaster's Commentary: 

Translation: this is "military-speak" for the reality that the US government is never leaving Libya because of the oil and the oil pipelines.

Mar 26 08:57

5G Technology: A Health Crisis Waiting To Happen

By Paul A. Philips

5G technology involves the nationwide rollout of thousands of antennas to be used in conjunction with the various supporting appliances and applications in the wireless mobile network. There are, however, serious growing health, safety and environmental concerns over this developing technology...

Mar 26 08:49

BOMBSHELL SCANDAL! Republicans Have The SMOKING GUN That Will Put Obama In JAIL!

Republicans on the Intelligence Committee said Nunes has a “smoking gun” that will “leave no doubt” about Obama spying on Donald Trump for political reasons!

Mar 26 08:31

NSA Whistleblower: Trump Was Right On Wiretap Bill Binney – Tucker Carlson Tonight Fox News 3/24/17

Mar 26 08:30

NSA collected US email records in bulk for more than two years under Obama

The Obama administration for more than two years permitted the National Security Agency to continue collecting vast amounts of records detailing the email and internet usage of Americans, according to secret documents obtained by the Guardian.

Mar 26 07:22

THEY CAN SEE A ‘STICK OF BUTTER FROM SPACE’ — THE BILLION DOLLAR SPY AGENCY YOU’VE NEVER HEARD OF

While most Americans would consider the CIA, and perhaps the NSA, household names, one U.S. spy agency — whose headquarters surpasses the U.S. Capitol in size — has managed to keep to the shadows while possessing cutting edge tools of the surveillance trade.
Called the National Geospatial-Intelligence Agency (NGA), even former President Barack Obama didn’t know of its existence when he first took office — despite that the agency employs some 15,400 people.

“So, what do you [do]?” Obama asked a customer at a Washington, D.C., Five Guys hamburgers in May 2009.

“I work at NGA, National Geospatial-Intelligence Agency,” he answered.

“Outstanding,” then-president Obama asserted. “How long have you been doing that?”

“Six years.”

“So, explain to me exactly what this National Geospatial …” Obama asked, unable to recall the agency’s full name.

Timidly, the man replied, “Uh, we work with, uh, satellite imagery.”

Webmaster's Commentary: 

Except that this operation was done to give the illusion, and create the narrative, that Seal Team 6 actually assassinated Ben Ladin, when he really died of complications from an illness in 2001.

Proof Ben Laden died in 2001

So what we have here is another alphabet soup spy agency whose primary task is to use technology in creating fantasy as government narrative, which US citizens are supposed to absorb as gospel, and sheepishly believe.

But after 9/11, and the invasions and occupations of Afghanistan and Iraq, I cannot believe anything the government tells me, because I understand that it is lying to support a specific geopolitical agenda, and that is most generally centered around expropriating resources to which it has utterly no moral right; insuring that the government of the country from which those resources are taken is Western-centric; and insuring that those resources are only sold in US dollars.

Forgive my sang-froid on this, but that is simply the reality here.

Mar 25 09:16

WIKILEAKS PUBLISHED A LIST OF CONSUMER ELECTRONICS "TARGETED" BY THE CIA — YOUR SMART PHONE AND COMPUTER ARE PROBABLY ON IT

Wikileaks has now posted “Identifying Hacking Targets of the CIA” which lists out “companies, products, tools, and terms that are mentioned in the Vault 7: CIA Hacking Tools Revealed publication to date,” in order to inform people as to whether or not their smart phones, computers, gaming systems, television sets etc. can easily be turned into covert surveillance devices by the Central Intelligence Agency.

We are trying to determine which are CIA hacking targets and need help reviewing the documents associated with each company/product to determine if it is vulnerable to CIA hacking.

Hint: the majority of modern consumer tech is.

Webmaster's Commentary: 

Imagine my (complete absence of) shock!!

Mar 25 09:09

‘HUNT & KILL ALL WHITE WOMEN’ FACEBOOK POST DEEMED NOT HATE SPEECH

The way in which Facebook polices content on its network is under scrutiny again after it was revealed that a post in which a user called for white women to be “hunted and killed” was deemed to not be a violation of community standards.

“White women should be hunted and killed then we won’t get white babies who think the(y) own the world,” the user posted.

When the post was reported by another user for “hate speech,” Facebook responded with the message, “We reviewed the comment you reported for displaying hate speech and found it doesn’t violate our Community Standards.”

Meanwhile, posts by Christians that simply state bible passages in discussions about homosexuality are being removed, while pages devoted to showing grisly mock images of President Trump being assassinated are not taken down.

Webmaster's Commentary: 

Any criticism of Israel, no matter how accurate and justified, is also taken down by Facebook. Seen.life appears to follow the idea of freedom of speech.

Mar 25 09:08

US Senate votes 50-48 to do away with broadband privacy rules; let ISPs and telecoms to sell your internet history

Despite widespread disapproval from constituents, S.J.Res 34 has passed the United States Senate with a vote of 50-48, with two absent votes. Earlier today, at 12:25 Eastern March 23, 2017, the US Senate voted on S.J.Res 34, and will use the Congressional Review Act to strip away broadband privacy protections that kept Internet Service Providers (ISPs) and telecoms from selling your internet history and app data usage to third parties. S.J.Res 34 was first introduced by 23 Republican Senators earlier this month and its blitz approval is a giant blow to privacy rights in the United States.

Webmaster's Commentary: 

"Privacy? You don't need no stinkin' privacy! We OWN you! Get used to it. We only allow you to exist so that we can make money off of you ... any way we care to do it!" Got that, slaves?" -- Das FED

Mar 25 07:52

Senate puts ISP profits over your privacy

The Senate just voted to roll back your online privacy protections. Speak up now to keep the House from doing the same thing.

Mar 24 19:45

MY LAST EVER VIDEO?

Mar 24 16:23

Google boycott over extremist content could spell the end for automated ad placements

The feud sparked by Google's failure to remove extremist content from its site Youtube could lead to the end of automated ad placement, experts have warned.

Household names including Marks and Spencer and McDonald's have pulled advertising from Google’s YouTube as part of a growing international boycott.

Now analysts have predicted that brands could turn against large internet firms that use automated ad placement based on artificial intelligence.

Mar 24 15:28

Whistleblower Reveals UK Police Hacking Emails Of Journalists, Activists

By Derrick Broze

The U.K. Metropolitan police are accused of collaborating with Indian police and hackers to illegally access the emails of hundreds of activists and journalists.

A secret unit of the Metropolitan police has been partnering with hackers to monitor the emails of hundreds of political activists and journalists, according to a whistleblower familiar with the unit. The individual claims that the secret unit worked with Indian police and hackers to steal the passwords for the emails of activists, reporters, and photographers...

Mar 24 14:15

Why do Beijing and Moscow embrace cyber sovereignty? Globalism stops here

China has called on Russia and other BRICS nations to commit themselves to the concept of cyber sovereignty, which would allow governments to control their national cyber space in a manner that only they deem appropriate. The idea for an agreement on national cyber sovereignty was proposed by Beijing following its first ever white paper spelling out the view that governments are entitled to the right to control and regulate the Internet on their national territory. Additionally, Beijing made no bones about plans to enhance its cyber warfare capacity as a counter-measure to the exponential growth of threats coming from cyber space. "Cyber attacks, cyber espionage, and surveillance have become major issues confronting all countries," said Long Zhou, coordinator for the Foreign Ministry’s cyber affairs division. The concept of cyber sovereignty, however, is not new.

Mar 24 13:57

The Narrative Has Been Set For The Collapse And The Next Event

70% of the people disprove of Comey. Nunes says the FBI not involved in the investigation. Evidence is now growing against Obama, Clapper, Brennan and Rogers. Wikileaks releases nightskies 1.2, which shows the CIA has control of Macs and Iphones.

Mar 24 11:00

CIA’s NightSkies tool can hack, remotely control iPhones without user knowing

WikiLeaks has revealed the CIA’s alleged ability to infiltrate and control iPhones through a tool called NightSkies, which is physically installed onto factory fresh iPhones and allows the CIA to monitor and download files from targets’ phones undetected.

The revelation is part of WikiLeaks’ latest Vault 7 release named ‘Dark Matter.’

NightSkies works in the background and grants “full remote command and control,” to the CIA, allowing it to upload and download files from iPhones, including details from the owner’s phonebook, text messages and call logs, and to execute actions on the phones as it wishes.

Webmaster's Commentary: 

I am going back to a pre-NSA phone!

Mar 24 10:36

General Tom McInerney

Brief mp3 interview with the General is historic.

The FISA warrants were just “a cover” - Obamas’ AG Loretta Lynch already had an archive of surveillance data on Candidate Donald Trump. and much more !

Mar 24 10:11

DoubleAgent Attack Turns Your Antivirus Into Malware And Hijacks Your PC

Cybellum security researchers have uncovered a new attack mechanism that can be used to take control of your antivirus and turn it into a malware. Called DoubleAgent, this attack exploits an old and undocumented vulnerability in Windows operating system. This Zero Day code injection technique affects all major antivirus vendors and has the power to hijack permissions.

Mar 24 09:01

Beware! Major flaws in millions of Google Nest security cameras means burglars can switch them off remotely

Installing CCTV is just one way to protect your home.

But the feeling of safety afforded by one such system could be an illusion - according to a security researcher.

Two flaws have been discovered with the Nest range of security cameras which could allow burglars to switch off the device's with ease before entering your home.

And despite reporting the issues to Google - Nest's parent company - last year, nothing appears to have been done.

Mar 24 08:53

Row over US ISP customer data sales

US politicians have voted to remove rules that demanded ISPs got permission from customers before selling their browsing histories.

The US Senate voted by a narrow majority to repeal the rules that were first approved in October 2016.

Politicians who called for the rules to be dropped said they were "harmful".

The decision was called a "crushing loss" for privacy by digital rights group the Electronic Frontier Foundation (EFF).

Mar 24 08:27

FBI has uncovered 'evidence of treason' among alt-right websites, says George W Bush's ethics lawyer

The man who served as former president George W Bush's most senior ethics lawyer has suggested that the FBI is "uncovering evidence of treason" by far right US news websites over their links with Russia.

Richard Painter tweeted a link to an article suggesting that the Bureau was looking into news outlets like Breitbart News, InfoWars and the Kremlin-backed RT News and Sputnik News, to see whether they worked with Russian-backed operatives to disseminate stories favouring Donald Trump during the presidential election. at times when his campaign appeared to be struggling.

Sources told US publisher, McClatchy that online "bots" had created created millions of social media posts linking to articles on the sites, some of which were completely false, while other contained a mixture of fact and fiction.

Webmaster's Commentary: 

This strikes me as desperation on the cusp of madness.

I have linked to all the resources indicated above, when I have been able to vet that the information came from multiple sources, and believed, to the best of my knowledge, that the information presented was factually based.

But when it becomes, "alleged treason" to tell the truth, the best you can, on a blog, you know your government has gone full tilt-boogie Orwell on you.

And that George Bush even had an "ethics layer", in his lying about the reasons reasons the US government had to war in Afghanistan and Iraq, is hysterically hypocritical, and worth a great laugh, but Richard Painter CANNOT expect to be taken seriously by any thinking American on these charges, after the dark, and brutal, legacy of Bush's presidency.

So now, this now thoroughly embarrassed, morally bankrupt, and completely irrelevant man is desperately attempting to forward the US Deep State Narrative of Russia being the "bad guy" in the geopolitical arena, and a country the US government and military needs to wagewar against.

I have to wonder just how much of Painter's stock portfolio is invested in companies which comprise the US Military/Industrial Complex, to make these accusations.

Mar 24 08:10

Security Alert: Windows 10 Has Been Quietly Logging EVERY KEYSTROKE You Type And Sending It To Microsoft (This Is How To Stop It)

Yesterday we reported that an international group of hackers claim they have breached Apple’s iCloud user database and stolen 300 million usernames and passwords. The group has threatened to initiate a widespread factory reset on April 7th, 2017, potentially wiping out data on tens of millions of iPhones and iCloud accounts should Apple fail to pay a ransom.

But that breach by nefarious hackers, while serious, is nothing compared to what your trusted operating system provider may be doing on your personal computer.

According to a recent report, if you are a Windows 10 user then every single keystroke you have ever typed on your computer may have been logged and sent to Microsoft.

Mar 23 16:23

Google Maps & Local Utilities Team Up To Fight Methane Leaks

Google Maps is about to chart out more than just streets and roads. They’re going to locate methane leaks in cities. A collaboration between scientists, advocacy groups and Google found that equipping the cars with methane sensors helped locate natural gas leaks.

Mar 23 10:57

BEX ALERT - U.S. Prepping Case Linking North Korea To $81MM New York Fed Bank Heist

As tensions between the U.S and North Korea continue to escalate, with the most recent provocation coming from Kim Jong Un last night, the Wall Street Journal has just reported that Federal prosecutors are building potential cases that would accuse North Korea of directing the theft of $81 million from Bangladesh’s account at the Federal Reserve Bank of New York last year.

Webmaster's Commentary: 

North Korea is way behind the times with regard to the internet. As of 2014 they only had one block of IP addresses, or 1024 IP addresses for the whole country!

Not exactly a hotbed of hacker activity, and let us not forget the CIA's "UMBRAGE" program, which is set up to frame third parties for hacker attacks.

Mar 23 10:54

Whistleblower Tapes: Trump Wiretapped “A Zillion Times” By ‘The Hammer,’ Brennan’s and Clapper’s Secret Computer System

President Obama’s Director of National Intelligence (DNI) James Clapper and his Central Intelligence Agency (CIA) director John Brennan oversaw a secret supercomputer system known as “THE HAMMER,” according to former NSA/CIA contractor-turned whistleblower Dennis Montgomery.

Clapper and Brennan were using the supercomputer system to conduct illegal and unconstitutional government data harvesting and wiretapping. THE HAMMER was installed on federal property in Fort Washington, Maryland at a complex which some speculate is a secret CIA and NSA operation operating at a US Naval facility.

Mar 23 10:35

The NSA & Your Data: If You Have Nothing to Hide, You Have Nothing to Fear

Welcome to the Domestic Surveillance Directorate

...

Our value is founded on a unique and deep understanding of risks, vulnerabilities, mitigations, and threats. Domestic Surveillance plays a vital role in our national security by using advanced data mining systems to "connect the dots" to identify suspicious patterns.

Mar 23 09:49

How Germany's foreign intelligence agency recruits young hackers

Amid concerns of high-profile cyberattacks and disinformation campaigns ahead of key parliamentary elections in September, Germany's Federal Intelligence Agency (BND) has made a concerted effort to recruit young hackers.

The BND's mission includes obtaining intelligence as mandated by the federal government on key areas pertaining to foreign information, and it effectively aims to protect Germany and its interests. One of the tasks is to recognize and assess potentially-damaging espionage activities and prevent or minimize the fallout.

Webmaster's Commentary: 

Or to rig the election for Merkel, whose poll numbers are falling.

Mar 23 09:39

Super Snowden Whistleblower Releases 600,000,000 Pages Of Illegal NSA Spying

Mar 23 09:12

WIKILEAKS RELEASES "NIGHTSKIES 1.2": PROOF CIA BUGS "FACTORY FRESH" IPHONES

The latest leaks from WikiLeaks' Vault 7 is titled “Dark Matter” and claims that the CIA has been bugging “factory fresh” iPhones since at least 2008 through suppliers. The full documents are expected to be released after a 10 a.m. EDT “press briefing” that WikiLeaks promoted on its Twitter.

Webmaster's Commentary: 

So, all by its lonesome, the CIA has decided to eviscerate the 4th Amendment to the Constitution; and the Judicial, Executive and Legislative portions of our government are collectively impotent to stop them?!?

Folks, here's the deal for me.

I am a Christian Witness/Pacifist Activist who never advocates violence as a response to anything this government doe, but exhorts her government to resolve its geopolitical disputes with negotiations rather than through war; I am a published composer of religious music, and a choral conductor at my local Methodist church.

So will someone please explain to me, in a way that seems reasonable, as a completely non-violent, loving, and logical human being, why I should be targeted for surveillance?!? Is the short answer, "Just because they CAN??"

And the really hysterical/ironic part of all this, is that the actual baddies have already encrypted cell and other communications to the point where they are "bullet-proof" to all of the US's "alphabet soup" intelligence agencies.

Mar 23 08:44

Israel’s propagandists shoot themselves in the foot as they shoot off their mouths

If you have ever visited a blog or on-line discussion group on the Middle East you have doubtless had the misfortune to run into them.

They are known by the language they use: depraved sexual insults, bile, bigotry, threats, disinformation and character assassination. That’s right: I’m talking about “hasbarats,” Zionist trolls who infect the Internet with hasbara, pro-Israel propaganda. Of course, mainstream media hasbarats have been around for decades, as have “hasbaratchiks,” fifth-columns in foreign governments who subvert national policies to serve Israel. The Internet, though, is the latest, some might say the greatest, propaganda playground, and Israel cannot cope with factual, passionate, well-documented stories that expose its war crimes and unrepentant criminality.

Mar 23 08:32

Wikileaks Releases "NightSkies 1.2": Proof CIA Bugs "Factory Fresh" iPhones

The latest leaks from WikiLeaks' Vault 7 is titled “Dark Matter” and claims that the CIA has been bugging “factory fresh” iPhones since at least 2008 through suppliers.

Webmaster's Commentary: 

SELL YOUR APPLE STOCK NOW!!!!!!!

Mar 23 08:28

BOMBSHELL: CIA Whistleblower Leaked Proof Trump Under "Systematic Illegal" Surveillance Over Two Years Ago: FBI Sat On It

The same day House Intelligence Committee chairman Devin Nunes gave a press conference disclosing that President Trump had been under "incidental surveillance," Attorney and FreedomWatch Chairman, Larry Klayman, sent a letter to the House Committee on Intelligence imploring them to pursue the claims and evidence presented under oath at a Washington DC FBI Field Office by his client - CIA / NSA Whistleblower Dennis Montgomery - who Klayman claims "holds the keys to disproving the false claims... ...that there is no evidence that the president and his men were wiretapped"

When Montgomery attempted to deliver this information through the appropriate channels two years ago, the former CIA and NSA contractor wasn't given the time of day:

Mar 23 08:23

Hackers Breach Apple, Threaten To Wipe Out 300 Million iPhones In April

Hackers have breached over 300 million Apple account ID’s and passwords and are threatening to wipe out the data on all of the iPhones connected to the accounts unless Apple pay them a ransom.

Mar 23 07:17

Vault 7: Projects - Dark Matter

Today, March 23rd 2017, WikiLeaks releases Vault 7 "Dark Matter", which contains documentation for several CIA projects that infect Apple Mac Computer firmware (meaning the infection persists even if the operating system is re-installed) developed by the CIA's Embedded Development Branch (EDB). These documents explain the techniques used by CIA to gain 'persistence' on Apple Mac devices, including Macs and iPhones and demonstrate their use of EFI/UEFI and firmware malware.

Among others, these documents reveal the "Sonic Screwdriver" project which, as explained by the CIA, is a "mechanism for executing code on peripheral devices while a Mac laptop or desktop is booting" allowing an attacker to boot its attack software for example from a USB stick "even when a firmware password is enabled". The CIA's "Sonic Screwdriver" infector is stored on the modified firmware of an Apple Thunderbolt-to-Ethernet adapter.

Mar 22 20:35

Malware 'disguised as Siemens firmware drills into 10 industrial plants'

Malware posing as legitimate firmware for Siemens control gear has apparently infected industrial equipment worldwide over the past four years.

The cyber-nasty is packaged as software to be installed on Siemens programmable logic controllers (PLC), we're told. At least 10 industrial plants – seven in the US – were found running the infected firmware, a study by industrial cybersecurity firm Dragos claims.

According to the Texas-based biz, this particular malware was specifically thrown at industrial control equipment. Exactly what it does, or did, is not explained, although it is described as "crimeware".

Mar 22 20:34

Unbuntu splats TITSUP bug spread in update

Ubuntu has since rolled back that fix, so sysadmins can now re-patch lib6 and associated libraries to get their DNS fixed.

Mar 22 16:57

Don’t Hide Your Gold Coins Where Your Thermostat Can See

Back in the 1990s when businesses started going online they frequently didn’t realize that their new networking gear came with simple default passwords like “admin”. So a whole generation of early hackers simply scanned the web for companies that had inadvertently exposed themselves in this way, siphoning off (probably, no one really knows) billions of dollars and causing various other kinds of mischief.

Mar 22 15:45

Google Affiliate Offers Tools To Safeguard Elections

An organization affiliated with Google is offering tools that news organizations and election-related sites can use to protect themselves from hacking.

Jigsaw, a research arm of Google parent company Alphabet Inc., says that free and fair elections depend on access to information. . To ensure such access, Jigsaw says, sites for news, human rights and election monitoring need to be protected from cyberattacks.

Mar 22 14:29

Devin Nunes CONFIRMS Surveillance Of Trump Transition Press Conference 3/22/17

Mar 22 14:04

Facebook Expands Roll-Out of Fact-Checker in ‘Fake News’ Crackdown

Facebook has expanded the roll-out of its fact-checker tool to combat ‘fake news’ as more users report the appearance of the ‘disputed’ message alert. The pop-up lets users know when a story’s accuracy is questionable before they share it.

Mar 22 13:44

Youtuber affirms F.B.I. collusion with Dems at intelligence hearing

Ranking Member of the House Permanent Select Committee on Intelligence Rep. Adam Schiff (D-CA) and F.B.I. Director James Comey colluded during the intelligence hearing on Capitol Hill Monday, according to an online report.

Mar 22 13:22

Massive Breach Threatens To Wipe Out 300 Million iPhones On April 7th Unless Apple Pays Ransom

It looks like the CIA isn’t the only organization capable of taking over your phone.

Hackers claiming to have compromised at least 300 million Apple account ID’s and passwords say they will initiate a complete wipe of iPhones and iClouds if the Cupertino, California based technology company doesn’t pay them a ransom.

The group, which goes by the name Turkish Crime Family, says Apple has until April 7th to come up with either $75,000 in BitCoin or $100,000 in iTunes gift cards.

According to Motherboard, the group posted a Youtube video proving they have compromised the credentials of millions of iCloud accounts, which could then be used to wipe an iPhone remotely and potentially locked users out of critical phone features.

Mar 22 12:31

The Multibillion-Dollar U.S. Spy Agency You Haven’t Heard of

On a heavily protected military base some 15 miles south of Washington, D.C., sits the massive headquarters of a spy agency few know exists. Even Barack Obama, five months into his presidency, seemed not to have recognized its name. While shaking hands at a Five Guys hamburger restaurant in Washington in May 2009, he asked a customer seated at a table about his job. “What do you [do]?” the president inquired. “I work at NGA, National Geospatial-Intelligence Agency,” the man answered. Obama appeared dumbfounded. “So, explain to me exactly what this National Geospatial…” he said, unable to finish the name. Eight years after that videotape aired, the NGA remains by far the most shadowy member of the Big Five spy agencies, which include the CIA and the National Security Agency.

Mar 22 12:20

GOP lawmaker: Trump communications may have been 'monitored'

One more time. It was the NSA with their net that catches everything that was the source of the leaks. Right before he left office Obama signed an E.O. that has the NSA pass what they Hoover up, to 16 other Federal Agencies.
There is where the leaks are coming from and it is on paper legal under Obama's E.O. If Trump hasn't canceled that E.O. He had better do so pronto!

WASHINGTON (AP) — The chairman of the House intelligence committee said Wednesday that the communications of Trump transition officials — possibly including President Donald Trump himself — may have been "monitored" after the election as part of an "incidental collection."

Mar 22 12:08

FBI Investigating Google & Facebook For ‘Rigging Elections’ For Democrats

The FBI’s Counterintelligence Division is leading an investigation into the Google and Facebook cyber operation that rigged the 2008 and 2012 elections for Barack Obama, and attempted to rig the 2016 election in Hillary Clinton’s favor.

Mar 22 12:06

5 congressional staffers in criminal probe over unauthorized computer access

Five people employed by members of the House of Representatives remain under criminal investigation for unauthorized access to Congressional computers. Former DNC chair Debbie Wasserman Schultz employed at least one of those under investigation.

The criminal investigation into the five, which includes three brothers and a wife of one of the men, started late last year, as reported by Politico in February. The group is being investigated by US Capitol Police over allegations that they removed equipment from over 20 members’ offices, as well as having run a procurement scheme to buy equipment and then overcharge the House.

Mar 22 11:05

A simple command allows the CIA to commandeer 318 models of Cisco switches

Cisco Systems said that more than 300 models of switches it sells contain a critical vulnerability that allows the CIA to use a simple command to remotely execute malicious code that takes full control of the devices. There currently is no fix.

WikiLeaks publishes docs from what it says is trove of CIA hacking tools
Cisco researchers said they discovered the vulnerability as they analyzed a cache of documents that are believed to have been stolen from the CIA and published by WikiLeaks two weeks ago. The flaw, found in at least 318 switches, allows remote attackers to execute code that runs with elevated privileges, Cisco warned in an advisory published Friday. The bug resides in the Cisco Cluster Management Protocol (CMP), which uses the telnet protocol to deliver signals and commands on internal networks. It stems from a failure to restrict telnet options to local communications and the incorrect processing of malformed CMP-only telnet options.

Webmaster's Commentary: 

YIKES!! And there is no "fix" for this?!?

Mar 22 10:36

California: Making ‘Misleading Political Statements’ Online Is Now Illegal

Lawmakers in California are proposing a harsh new law that will make it illegal for anybody to operate a website that makes controversial political statements to the public.

Mar 22 10:23

DOJ Found Malware in Trump Tower Servers ‘Mimicking’ Contacts to Russian Entities

Washington Free Beacon senior writer Adam Kredo on Tuesday discussed the Department of Justice finding malware on servers for Trump Tower mimicking supposed Russian ties.

Kredo was talking with One America News Network's Liz Wheeler about the FBI investigating the Trump campaign for collusion with Russian ties.

Kredo first said that the investigation should go on, before discussing a rarely mentioned point.

"It wasn't very well reported, the Department of Justice revealed just last week that in fact some of these ties that they had witnessed between Trump Tower servers and Russian entities in fact, were stooged," Kredo said.

Kredo went on to explain that malware may have been installed on these servers to mimick contacts with Russian entities in an effort to portray that the Trump campaign had the Russian contacts.

Mar 22 08:50

Microsoft forcing Windows 7 and 8.1 users to install Windows 10

Technology giant Microsoft is blocking Windows 7 and 8.1 updates on Intel's seventh generation Core i3, i5 and i7 AMD's seventh generation processor (Bristol Ridge) and Qualcomm's 8996 processors.

While trying to scan and download updates through Windows Update, error messages appear saying, "Windows could not search for new updates" and "code 80240037 Windows Update encountered an unknown error."

As explained in Microsoft Knowledge based article the errors occur as the new processor generations require the latest Windows version. For those on Windows 7 and 8.1, Microsoft recommends updating the devices to Windows 10.

Webmaster's Commentary: 

So we are back to the "You vill use ze vindows ve TELL you to use, schwein!"

Mar 22 08:47

Cyber Firm at Center of Russian Hacking Charges Misread Data

An influential British think tank and Ukraine’s military are disputing a report that the U.S. cybersecurity firm CrowdStrike has used to buttress its claims of Russian hacking in the presidential election.

The CrowdStrike report, released in December, asserted that Russians hacked into a Ukrainian artillery app, resulting in heavy losses of howitzers in Ukraine’s war with Russian-backed separatists.

But the International Institute for Strategic Studies (IISS) told VOA that CrowdStrike erroneously used IISS data as proof of the intrusion. IISS disavowed any connection to the CrowdStrike report. Ukraine’s Ministry of Defense also has claimed combat losses and hacking never happened.

The challenges to CrowdStrike’s credibility are significant because the firm was the first to link last year’s hacks of Democratic Party computers to Russian actors, and because CrowdStrike co-founder Dimiti Alperovitch has trumpeted its Ukraine report as more evidence of Russian election tampering.

Mar 22 08:33

Windows 10 is recording EVERYTHING you type, but here's how you can stop it

WINDOWS 10 has a secret keylogger that tracks what you type - and it is enabled as soon as the software is downloaded and installed.

...

Ever since Windows 10 was first launched in 2015, the software automatically enables a secret keyboard logger.

Microsoft says the feature tracks "your typing and handwriting info to improve typing and writing services".

...

To disable the feature you first need to click Start, and then select Settings.

You then have to choose Privacy and then select General.

To turn the feature off you then have to turn off "Send Microsoft info about how I write to help us improve typing and writing in the future".

Mar 22 08:31

Anti virus software could be HACKING your computer, and this is why

Windows PC users have been warned that their anti virus software may not be quite as secure as previously thought.

Researchers have discovered that anti-virus apps and services can be hijacked and turned into malware using a particularly nasty attack.

The attack, which affects some of the world’s leading anti-virus software services, can affect any computers running Windows 10, as well as past generations of Microsoft’s software.

The attack, named DoubleAgent, was discovered by researchers at security firm Cybellum, which says it exploits a 15-year old vulnerability in Windows.

Mar 22 08:16

Google's stock rating downgraded as YouTube ad boycott contagion goes global

Google has responded to a contagious YouTube advertising boycott which yesterday prompted a downgrade on Wall Street.

Pivotal Research Group downgraded Alphabet shares from "Buy" to "Hold" based on its response to the boycott, which now includes more than 200 big brands, as well as public sector ad spending. Marks & Spencer and Hargreaves Lansdown became the latest to hit pause yesterday.

The boycott follows a series of reports in The Times demonstrating that Google was running advertisements promoting big brands against jihadi and racist videos on YouTube, the world's second most popular website after Google's search page.

Mar 22 08:14

Fix crap Internet of Things security, booms Internet daddy Cerf

Vint Cerf, one of the fathers of the internet, has weighed in on Internet of Things security, warning that a Mirai botnet-style incident could happen again unless vendors start taking responsibility for their goods.

“The biggest worry I have is that people building [IoT] devices will grab a piece of open source software or operating system and just jam it into the device and send it out into the wild without giving adequate thought and effort to securing the system and providing convenient user access to those devices,” Cerf told the Association for Computing Machinery (ACM) organisation at its 50th Turing Award celebrations.

Mar 22 08:13

World's worst botnet fiends switch from ransomware to stock scam spam

Cybercriminals behind the Necurs botnet have reactivated the zombie network and returned to their original business of using compromised machines as conduits for spam distribution.

In January, Cisco Talos reported that the Necurs botnet had gone offline, taking the typical volume of Locky ransomware-tainted spam emails with it.

Security researchers have once again detected an uptick of spam email from the Necurs botnet over recent days. Rather than distributing malware in the form of malicious attachments, it has shifted back to sending high volumes of penny stock pump-and-dump messages.

Mar 22 08:11

Linux-using mates gone AWOL? Netflix just added Linux support

If your Linux-using mates suddenly disappear for a day or two, we can explain why: Netflix has just revealed it's fully and formally available on the OS.

As the streamer points out, Chrome's worked for in-browser playback since 2014. But not officially.

As of Tuesday, however, “users of Firefox can also enjoy Netflix on Linux.”

Mar 22 08:09

Plusnet slapped with £880k fine for billing ex customers

Broadband provider Plusnet has been slapped with a £880,000 fine from Ofcom for continuing to bill former customers.

More than 1,000 ex-customers were overcharged £500,000 by BT-owned Plusnet, after it continued to bill for landline and broadband services that had been cancelled.

The penalty is the result of an investigation opened last May and was caused by an error in Plusnet’s billing system meaning cancelled lines were still recognised as "live".

Mar 22 08:04

A peek into North Korea's Internet

For most North Koreans, it's nonexistent. There are only 1,024 known IP addresses in the entire country. The Internet is typically reserved for government officials, a few foreign ambassadors and outside assistance groups, according to a North Korean defector-turned-journalist.

By comparison, the United States has 1.5 billion IP addresses.

It's important to note that it's not one IP address per device, so there could be thousands of devices hooked up to the Internet in North Korea. Still, it has one of the smallest Internet presences in the world.

Mar 22 07:46

NSA Official Suggests North Korea Was Culprit in Bangladesh Bank Heist

A senior National Security Agency official appeared to confirm that North Korean computer hackers were behind a multi-million dollar heist targeting Bangladesh’s central bank last year.

Computer hackers attempted to steal $951 million, but only got away with $81 million, some of which was later recovered. After the theft, security firms quickly pointed the finger at North Korea. Other experts disputed that finding. But on Tuesday, NSA Deputy Director Rick Ledgett appeared to say North Korea was the culprit during a cryptic exchange at a Washington forum.

Webmaster's Commentary: 

So, "North Korean Hacker" has joined "Russian Hacker" on the list of boogeymen we are supposed to automatically be afraid of!

Mar 22 07:39

Microsoft Outlook, Skype, OneDrive hit by another authentication issue

Two weeks ago, a widespread authentication issue prevented a number of Microsoft users from accessing their cloud services. It looks like it's happening again

Mar 22 07:38

Fix Is In: Comey Praised DNC-Hired Cybersecurity Firm Even After Botched Report

Crowdstrike, the cybersecurity company working for the Democratic National Committee (DNC), released a report tying “Russian hacking” to an incident that never happened, yet ?even after the report had been debunked, FBI Director James Comey still referred to Crowdstrike as a “highly respected private company” at a Senate hearing.

Executives from Crowdstrike and Director Comey are both scheduled to testify in front of the House Intelligence Committee set for Monday morning at 10 am.

Mar 21 16:45

Arrest Of Twitter User Could Have Serious Implications For The World Of Internet Trolling

John Rivello was arrested Friday months after he allegedly sent a tweet that caused journalist Kurt Eichenwald to suffer a seizure.

This arrest appears to be the first of its kind and presents serious implications for the world of internet trolling, which seeks to annoy fellow users.

Mar 21 09:46

Google ‘Directly Engaged’ In Clinton Campaign, Says Julian Assange

Specifically, Assange claimed, “The chairman of Google, Eric Schmidt, set up a company to run the digital component of Hillary Clinton’s campaign.”

Eric Schmidt did in fact create a company in the last quarter of 2015 called The Groundwork whose website is empty except for a single placeholder logo. Breitbart has previously reported on The Groundwork and how it was reportedly developed to install Clinton in the Oval Office. However, whether or not Google itself is a part of Schmidts’ involvement in The Groundwork remains unclear to the public.

Mar 21 09:13

Report: Law Enforcement Leaks Database To Journalist Containing Trump Wiretap Info

According to investigative journalist Jerome Corsi reporting for Infowars, law enforcement sources out of Arizona have provided a database containing the “individual records of U.S. citizens under National Security Agency (NSA) electronic surveillance in the years 2004 through 2010,” thus proving once and for all that Donald J. Trump was, in fact, under surveillance during Barack Obama’s tenure as President.

But if that’s not enough to burst your bubble, what you are about to read next will, because the absolute bombshell report doesn’t stop there. As it turns out Infowars founder and popular radio talk show host Alex Jones was also under surveillance in Texas.

Jones said on the Sunday show that they had even listed an address in which he “secretly” does broadcasts from.

Mar 21 08:22

To The Governor: New Mexico Passes Electronic Communications Privacy Act

By Michael Maharrey

Last week, the New Mexico House gave final approval for a bill known as the Electronic Communication Privacy Act. If signed by the governor, the bill would not only protect privacy in New Mexico, but would also hinder at least two aspects of the federal surveillance state...

Mar 21 07:51

MASSIVE BACKFIRE! Comey Reveals Democrats Were Behind Hack Investigation Delay

Mar 21 06:59

Google to revamp policies, hire staff after UK ad scandal

Google has found itself at the center of a British storm in recent days after major companies from supermarkets to banks and consumer groups pulled their adverts from its YouTube site after they appeared alongside videos carrying homophobic and anti-Semitic messages.

Mar 20 21:59

Panopticlick

When you visit a website, online trackers and the site itself may be able to identify you – even if you’ve installed software to protect yourself. It’s possible to configure your browser to thwart tracking, but many people don’t know how.

Panopticlick will analyze how well your browser and add-ons protect you against online tracking techniques. We’ll also see if your system is uniquely configured—and thus identifiable—even if you are using privacy-protective software.

Mar 20 16:17

HACKING WARNING: Con-artists target gig ticket purchases and trivia quizzes in new scams

Games, quizzes and trivia are another way to make money off unsuspecting victims.

Sometimes cold-texts will comes through the the option to text ‘STOP’ to cease receiving them, but this is also a scam and will cost money, sometimes up to £2 a text.

The report said: “With trivia scams, the first few questions will be very easy.

“This is meant to encourage you to keep playing. However, the last one or two questions you need to answer in order to clim your ‘prize’ could be very difficult or impossible. Do not enter.

“If you try to claim your prize, you may have to call a premium rate number (that begins with 0906 for example).

“You may then have to listen to a long recorded messages and there’s unlikely to be a prize at the end of it. Do not phone back to claim.”

Mar 20 13:52

UN Report on Mass Surveillance: “Trying To Appear Tough On Security By Legitimising Largely Useless, Hugely Expensive And Totally Disproportionate Measures Which Are Intrusive On So Many People’s Privacy”

A White House panel has previously slammed the NSA, and said that mass spying is unnecessary.

Now, the United Nations’ Special Rapporteur on the Right to Privacy notes in a new report (with our comments)

Deeply concerning … the status of the right to privacy in the surveillance area of activity has not improved since the last [UN surveillance] report. [Indeed, it’s getting worse … and will only expand unless we fight for privacy.]

Mar 20 13:37

Mike Cernovich: Twitter — Either Go Private and be a Super PAC or Tell Shareholders the Truth about Shadow Bans

Summary?—?Twitter is shadow banning high profile accounts, generally populist accounts. Twitter has every right to “censor,” of course, with an exception. It is shareholder fraud to censor popular accounts, as this harms company growth. Jack Dorsey must take Twitter private or else tell his shareholders the truth?—?Twitter censors accounts that are critical of Hillary Clinton. (Even Bernie Sanders supporters have been shadow banned.)

Twitter is a publicly-traded corporation and thus its CEO Jack Dorsey has fiduciary obligations to his shareholders. Twitter is not Jack’s private little Super PAC. If Jack wants to censor influential and popular users, then he must disclose this to shareholders. He must tell them the truth, “I don’t care about shareholder value. I want to run Twitter like my personal blog and Super PAC.”

Mar 20 10:00

FIVE CREEPY THINGS YOUR ISP COULD DO IF CONGRESS REPEALS THE FCC’S PRIVACY PROTECTIONS

Why are we so worried about Congress repealing the FCC’s privacy rules for ISPs? Because we’ve seen ISPs do some disturbing things in the past to invade their users’ privacy. Here are five examples of creepy practices that could make a resurgence if we don’t stop Congress now.

Webmaster's Commentary: 

The examples of companies which have done this before are highly unsettling.

Mar 20 09:57

Five Creepy Things Your ISP Could Do if Congress Repeals the FCC’s Privacy Protections

Why are we so worried about Congress repealing the FCC’s privacy rules for ISPs? Because we’ve seen ISPs do some disturbing things in the past to invade their users’ privacy. Here are five examples of creepy practices that could make a resurgence if we don’t stop Congress now.

Mar 20 07:15

iPhone users - Whatever you do, do NOT take part in this DANGEROUS new Siri prank

If someone tells you to say the number 108 to Siri – the virtual assistant that ships with the Apple iPhone – whatever you do, don't do it.

The troublesome prank, which has been doing the rounds on social media throughout the last week, should be avoided at all costs.

That's because saying 108 to Siri will immediately connect you to your local emergency services.

The prank works because 108 is the Indian equivalent of the 999 emergency number in the UK.

Mar 20 07:06

Russian ATMs Spit Out Cash After Malware Attack

Russian daily Kommersant reports that the Bank of Russia detected malware that hides inside ATM’s operating memory which "forces" them to dispense cash to anyone who enters certain code on its keyboard.

Mar 19 20:08

Flashback: Dragnet NSA Spying Survives: 2015 in Review

Secret mass surveillance continued to spark global controversy this year, yet the National Security Agency’s dragnet programs unconstitutionally monitoring Americans are stretching into their second decade. Ignited by news reports in 2005, eight years before Edward Snowden’s revelations blew the lid off illegal and unconstitutional domestic spying in 2013, mounting concerns around the world about the threat to free expression made 2015 a watershed year in the battle to restore privacy.

Mar 19 13:44

Germany Threaten Facebook With ‘Huge Fines’ If They Don’t Remove Alternative News

Germany will impose fines of up to 50 million euros if Facebook don’t remove alternative news content from their platform.

Mar 19 11:49

Bloke cuffed after 'You deserve a seizure' GIF tweet gave epileptic a fit

A man suspected of maliciously tweeting a GIF to a magazine writer that induced an epileptic attack has been collared by the FBI.

In December, Kurt Eichenwald, a Newsweek journalist who has written about living with epilepsy, appeared on the US Fox News show Tucker Carlson Tonight to discuss his claims that the then-President-elect Donald Trump had spent time in a mental institution.

That evening, Eichenwald received a tweet from pseudo-anonymous Twitter user jew_goldstein that contained a strobing image and the words: "You deserve a seizure." The image, we're told, induced an epileptic fit in Eichenwald, who lives with his family in Dallas, Texas. His wife later called the police when she pieced together what had happened.

Mar 18 15:16

Advertisers Flee As Google Allows Antisemitic Youtube Videos Produced By Former Kkk Leader To Play For Profit

GOOGLE IS FAILING TO REMOVE VIRULENT ANTISEMITIC CONTENT FROM ITS YOUTUBE VIDEO PLATFORM IN AN APPARENT BREACH OF ITS OWN GUIDELINES AND THE LAW.

Google (and Facebook and Youtube etc. are losing users because of their obvious censorship, which is why they are losing advertisers.

But let's blame the anti-Semites to protect the censorship, shall we?

Mar 18 09:12

The Truth is Vault 7 is Empty! Government is Totally Incompetent!

In this video, Vin Armani takes a deep dive into Vault 7 and discovers that the CIA’s technology isn’t nearly as scary as media reports have made out. Most of their “hacking” tools require a tech-savvy agent to be physically in the same room as the target device in order to install malware. And most of their malware is wiped out by the next routine software update by the device maker.

Mar 17 14:33

NY Supreme Court Signals Support For Transparency On Cellphone Surveillance

By Derrick Broze

The New York State Supreme Court is preparing to make an important decision regarding cellphone surveillance and what New York police can legally keep a secret.

The opposition to “stingray” cellphone surveillance, and the support of transparency are both experiencing growth throughout the United States. Recent bills passed in Arizona and New Hampshire are part of a trend that has been steadily increasing in the United States. The public and the political class are becoming aware of the true level of intrusion possible as a result of arming local, state, and federal police with military grade surveillance equipment, with very little oversight...

Mar 17 14:30

Google Army To Flag ‘Conspiracy Theory’ Websites In Fight Against Alt. Media

Google has hired a 10,000 strong social justice army to flag sites from their search results that they deem “conspiracy”, “offensive”, or “fake news.”

Mar 17 09:34

Star Trek Themed Kirk Ransomware Brings us Monero and a Spock Decryptor!

Boldly going where no man has gone before, the Kirk Ransomware brings so much nerdy goodness to the table that it could make anyone in IT interested. We have Star Trek, Low Orbital Ion Cannons, a cryptocurrency payment other than Bitcoin, and a decryptor named Spock! Need I say more?

Mar 17 09:15

FLASHBACK - WHY DID THIS YOUNG APPLE SOFTWARE ENGINEER JUST COMMIT SUICIDE AT HIS COMPANY’S HQ?

A 25-year-old software engineer named Edward Mackowiak who worked for Apple has reportedly shot himself in the head at the company headquarters in Cupertino. His death was quickly ruled a suicide just hours later after police found no evidence of foul play at the scene.

What’s strange is how the company refused to give any details about what Mackowiak actually did there. The only information about his job was on a hastily removed Linkedin page. Gizmodo reports it was sparse as well, simply listing him as a software engineer at Apple. His Twitter account has also been quickly deleted. It’s as if the guy himself is being digitally erased post haste.

Webmaster's Commentary: 

Maybe he stumbled across the CIA back doors!

Mar 17 09:14

Russian bank tells DOJ mysterious Trump computer connections may have been hacker hoax

A Russian bank has reported to U.S. authorities that mysterious communications resumed recently between one of its computers and an email server tied to President Trump’s business empire, and it has developed evidence the new activity may be the work of a hacker trying to create a political hoax, Circa has learned.

Alfa Bank is asking the U.S. Justice Department for help solving the mystery and pledged its full cooperation.

SHARE THIS ARTICLE WITH YOUR SOCIAL MEDIA