Mar 17 14:33

NY Supreme Court Signals Support For Transparency On Cellphone Surveillance

By Derrick Broze

The New York State Supreme Court is preparing to make an important decision regarding cellphone surveillance and what New York police can legally keep a secret.

The opposition to “stingray” cellphone surveillance, and the support of transparency are both experiencing growth throughout the United States. Recent bills passed in Arizona and New Hampshire are part of a trend that has been steadily increasing in the United States. The public and the political class are becoming aware of the true level of intrusion possible as a result of arming local, state, and federal police with military grade surveillance equipment, with very little oversight...

Mar 17 14:30

Google Army To Flag ‘Conspiracy Theory’ Websites In Fight Against Alt. Media

Google has hired a 10,000 strong social justice army to flag sites from their search results that they deem “conspiracy”, “offensive”, or “fake news.”

Mar 17 09:34

Star Trek Themed Kirk Ransomware Brings us Monero and a Spock Decryptor!

Boldly going where no man has gone before, the Kirk Ransomware brings so much nerdy goodness to the table that it could make anyone in IT interested. We have Star Trek, Low Orbital Ion Cannons, a cryptocurrency payment other than Bitcoin, and a decryptor named Spock! Need I say more?

Mar 17 09:15


A 25-year-old software engineer named Edward Mackowiak who worked for Apple has reportedly shot himself in the head at the company headquarters in Cupertino. His death was quickly ruled a suicide just hours later after police found no evidence of foul play at the scene.

What’s strange is how the company refused to give any details about what Mackowiak actually did there. The only information about his job was on a hastily removed Linkedin page. Gizmodo reports it was sparse as well, simply listing him as a software engineer at Apple. His Twitter account has also been quickly deleted. It’s as if the guy himself is being digitally erased post haste.

Webmaster's Commentary: 

Maybe he stumbled across the CIA back doors!

Mar 17 09:14

Russian bank tells DOJ mysterious Trump computer connections may have been hacker hoax

A Russian bank has reported to U.S. authorities that mysterious communications resumed recently between one of its computers and an email server tied to President Trump’s business empire, and it has developed evidence the new activity may be the work of a hacker trying to create a political hoax, Circa has learned.

Alfa Bank is asking the U.S. Justice Department for help solving the mystery and pledged its full cooperation.

Mar 17 09:11

FLASHBACK: FBI ‘Granted FISA Warrant’ Covering Trump Camp’s Ties To Russia

Two separate sources with links to the counter-intelligence community have confirmed to Heat Street that the FBI sought, and was granted, a FISA court warrant in October, giving counter-intelligence permission to examine the activities of ‘U.S. persons’ in Donald Trump’s campaign with ties to Russia.

Webmaster's Commentary: 

The Obama camp is trying to insist there was no surveillance on the Trump campaign, but the existence of a FISA warrant contradicts that!

Mar 17 08:51

A $6 Linux computer that plays Doom: Could this tiny Chinese clone challenge the Raspberry Pi Zero?

Another day, another would-be Raspberry Pi challenger, this time the tiny LicheePi Zero, which sells for as little as $6.

Like its namesake, the Raspberry Pi Zero, the single-board computer is aimed at electronics hobbyists who want to build their own gadgets.

On paper, it has a faster and more modern processor than the Raspberry Pi Zero, the cheapest Raspberry Pi board, as well as offering Wi-Fi connectivity at a lower price. However, there are also several potential drawbacks to this Chinese-made competitor.

Mar 17 07:41

Hillary's Hackers, Awan Brothers Saga Deepens

Awan Brothers From Pakistan: They Ran DNC Congress Computers, Committed Treason

Mar 17 07:23

Suspicious cellular activity in D.C. suggests monitoring of individuals' smartphones

As the discussion over wiretapping and foreign hacking still dominates the conversation in Washington, an unusually high amount of suspicious cell phone activity in the nation’s capital has caught the attention of the Department of Homeland Security, raising concerns that U.S. officials are being monitored by a foreign entity.

The issue was first reported in the Washington Free Beacon, but a source at telecom security firm ESD America confirmed the spike in suspicious activity to CBS News.

Based on the type of technology used, the source continued, it is likely that the suspicious activity was being conducted by a foreign nation.

The news comes the same week that two Democratic lawmakers wrote to Kelly saying they were “deeply concerned” about hacking vulnerabilities in U.S. cellular networks.

Webmaster's Commentary: 

Notice that this is not at all sourced, and we read that breathless statement that " is likely that the suspicious activity was being conducted by a foreign nation."

I have to chuckle, and ask myself, "Who are they going to blame for this"?!?

Intelligent people understand to keep their cell conversations light, fluffy, and not of any real import; in fact, Mike and I think that surveilling our phones is punishment duty for newbies at any of the alphabet soup agencies.

And the reality is, that the "baddies" already have their phones encrypted to the point where no one can mess with them.

Mar 17 07:21

GAMING company Tabcorp has been fined $45 million for breaching anti-money laundering and anti-terrorism financing laws.

AUSTRAC CEO Paul Jevtovic addressed the media in Sydney today, where he said that it sends an “unequivocal message” to gaming companies.

Mar 17 07:19

Top 15 Discoveries & Implications of Wikileaks CIA Vault 7 – So Far

Vault 7 has been the subject of a curious and cryptic set of tweets from Wikileaks over the course of the past month or so. Now we know why. In bombshell news, in the greatest leak in Wikileaks history, in the greatest leak in CIA history, a total of 8,761 documents has been released in a series that has been dubbed Vault 7. Even for seasoned conspiracy researchers, the documents are fascinating and horrible at the same time. It confirms the suspicions and knowledge of many investigators. Now we have the proof to substantiate our hunches and intuition. The CIA has been caught with its pants down: spying on its citizens, bypassing encryption to steal their messages, hacking into their electronic devices to listen on their conversations, using US consulates abroad to conduct spying operations, remotely hacking into vehicles (to perform undetectable assassinations) and much more.

Mar 17 07:14

Windows 10: Fears that Microsoft is about to force updates over metered connections

Some Windows fans are worried that the upcoming Windows 10 Creators Update could mean costly data bills.

Windows 10 currently treats Windows Updates on cellular networks differently to those over Wi-Fi because Microsoft knows these updates can be large and result in sizeable bills if they take place on a so-called metered connection, such as a cellular network.

For this reason Windows 10 only downloads 'priority updates'.

But, as SuperSite Windows reports, the latest Windows Insider fast ring build of the Windows 10 Creators update notes a change to the language used.

Mar 17 07:13

This laptop-bricking USB stick just got even more dangerous

Remember that USB stick that would destroy almost anything in its path, from laptops, photo booths, kiosks, to even cars?

Now there's a new version, and it's even more dangerous than before.

Webmaster's Commentary: 

This is another reason why you shouldn't plug in USB sticks you find on the street.

Mar 16 15:36

Tech Expert Warns That AI Could Become “A Fascist’s Dream”

In her March 12 talk at the 2017 SXSW Conference, Kate Crawford of Microsoft Research warned that artificial intelligence is ripe for abuse. Crawford, who researches the social impact of large-scale data systems and machine learning, described how encoded biases in AI systems could be abused to target certain populations and centralize power in the hands of authoritarian regimes.

“Just as we are seeing a step function increase in the spread of AI, something else is happening: the rise of ultra-nationalism, rightwing authoritarianism and fascism,” she said in Dark Days: AI and the Rise of Fascism, her SXSW session.

Crawford believes the issue is that AI is often invisibly coded with human biases that often correspond with the characteristics of fascist movements: to demonize outsiders, track populations, centralize power, and claim neutrality and authority without accountability. AI can be a potent tool in achieving those goals, especially if it is coded with human biases.

Mar 16 15:32

Have a Kaby Lake/Ryzen CPU and Windows 7 or 8? Say goodbye to Windows Updates

Microsoft really wants you to run Windows 10. So while the company continues to offer security updates and bug fixes for Windows 7 and Windows 8.1 (and Windows Vista for a few more weeks), the company announced last year that it would not support those operating systems for devices with the latest Intel and AMD chips.

Up until now that’s basically just meant that if you were running Windows 8.1 or earlier on a PC with an Intel Kaby Lake or AMD Bristol Ridge or Ryzen processor you wouldn’t get officially supported drivers.

But now Microsoft is going a step further: Windows Update won’t work on Windows 7 or Windows 8.1 computers with the most recent Intel or AMD chips.

Mar 16 15:28

Samsung Leaking Customer Information

I entrusted Samsung with my data, and that is who I hold solely responsible for safeguarding it. If Samsung’s business partner is leaking that information, Samsung needs to remedy the situation.

As I was writing this up, I was going to redact some of my information (or at least my wife’s signature) but it wouldn’t make much of a difference. Four months after I disclosed this to Samsung, the information is still there for anyone to retrieve. Please don’t try to sell me a warranty for my tv.

Mar 16 15:23


Previously, users could opt out of downloading updates when they were on a metered connection like paid Wi-Fi or a data plan, to help protect them from accidentally blazing through their bandwidth allowance or racking up a hefty bill. Users who wanted to delay or prevent an update for other purposes could set their connection as metered to take advantage of this feature.

However, the latest build of Windows 10 makes a major change to the relationship between metered connections and new updates, according to a report from Windows Super Site. Now, updates that are “required to keep Windows running smoothly” will be downloaded whether or not the user is working with a metered connection.

There’s currently no word on which updates will be classified as essential.

Mar 16 15:19

Your YouTube habits can be tracked by third parties, Israeli expert shows

Even when they promise anonymity and encryption, video host sites can’t entirely hide users’ activities from governments, advertisers, hackers

Mar 16 14:12

After CIA Smart TV Spying Revelations, Samsung to Release New TV That “Never Turns Off”

Just like we’ve recently been seeing ads all over the place for Amazon’s Echo following the Wikileaks Vault 7 revelations that internet-connected electronics in the home can be exploited by government agencies and turned into covert spy devices, Samsung is picking a really strange time to announce the release of its upcoming new television that never turns off.

Mar 16 09:51

Dormant Linux kernel vulnerability finally slayed

A recently resolved vulnerability in the Linux kernel that had the potential to allow an attacker to gain privilege escalation or cause denial of service went undiscovered for seven years.

Positive Technologies expert, Alexander Popov, found a race condition in the n_hdlc driver that leads to double-freeing of kernel memory. This Linux kernel flaw might be exploited for privilege escalation in the operating system. The (CVE-2017-2636) bug was evaluated as dangerous with a CVSS v3 score of 7.8, towards the higher end of the scale which runs from 1-10.

The vulnerability affects the majority of popular Linux distributions including RHEL 6/7, Fedora, SUSE, Debian, and Ubuntu.

Mar 16 09:28

Female Physicist Creates World’s First Government-Approved Birth Control App

The first and only internationally certified contraceptive app is now awaiting approval by the U.S. Food and Drug Administration. If approved, Natural Cycles would provide Americans a government-approved drug-free and therefore side-effect-free alternative in a market saturated with hormonal and abortive birth control.

Mar 16 08:38

World Health Organization: Smart Meters Are Making People Ill

Smart meters cause a “cornucopia of health issues” for occupants of the 57 million American homes equipped with the new technology, according to the World Health Organization and

Mar 15 16:21

This Creepy Facial Recognition App Lets Users Find Strangers On Facebook By Taking Their Picture

A facial recognition app that can identify strangers from a photograph has been created by a British entrepreneur.

Mar 15 10:59

Over 33mn US employee records, including military personnel, had their data hacked

A database containing more than 33 million records of corporate and government employees has been leaked online, including records from the Department of Defense, US Postal Service, Wal-Mart, and Ohio State University.

The database belongs to Dun & Bradstreet which licenses information on businesses and corporations for use in credit decisions, business-to-business marketing, and supply chain management. In 2013, they held over 225 million business records from companies around the globe.

The leak of the 52.2 Gigabyte corporate database from the business services firm contains millions of people’s names, work email addresses, phone numbers, and the companies they work for, along with their job titles, ZDNet reports.

Mar 15 09:36

Facebook, Twitter could pay $53 mn for hate speech, fake news in Germany

German authorities have circulated further steps aimed at fighting hate speech and so-called fake news posts on social media sites such as Facebook and Twitter proposing fines of up to 50 million euros ($53 million).

German Justice Minister Heiko Maas announced plans to introduce a new law that would oblige social networks to publish quarterly accountability reports, which would include information on how effectively cases of hate speech and fake news reported by users on social networks are being considered, the German Justice Ministry reported on Tuesday.

Apart from that, social media companies would have to take down offensive posts within 24 hours after a complaint is submitted. As of today, it takes at least a week to delete these kind of posts.

Mar 15 09:23

Russian National Extradited to US for Allegedly Developing Malware Toolkit - DOJ

"Vartanyan, also known as 'Kolypto'…allegedly developed, improved, and maintained the pernicious 'Citadel' malware toolkit, was arraigned in federal court following his extradition from Norway in December 2016," the DOJ noted. The defendent allegedly uploaded four dozen files essential for Citadel to operate.

The Justice Department explained that Citadel was designed to infect computer systems and steal financial account credentials and personal information.

Webmaster's Commentary: 

"And that's OUR job!" -- Cocaine Importation Agency

Mar 15 08:32

Google chief blasted by MPs after revealing the giant ‘NEVER tries to block terrorist or paedo content’ on its YouTube site

A HUMILIATED Google chief revealed the giant never pro-actively tries to block terrorist or paedo content from its YouTube site.

In an extraordinary Commons showdown, Google, Facebook and Twitter were accused of “commercial prostitution” and failing to protect Brits from hate crime.

Webmaster's Commentary: 

But any content that questions the official story on anything gets taken down!

Mar 15 08:30

Greetings World, We are Anonymous.

The “full wrath” of the United States Central Intelligence Agency (CIA) will soon descend upon all of America after the deadliest secret lies of this “Deep State” spy agency currently at war with President Donald Trump, have now been exposed for the entire world to see, and whose next “false flag” terror attack to cover up their crimes may come as soon this coming week.

The international whistle blowing organization Wikileaks released the largest ever in history publication of over 8,000 CIA top secret documents (Vault 7: CIA Hacking Tools Revealed) revealing that this “Deep State” spy agency has, in fact, created and cast a vast electronic surveillance net around the entire US unrivaled in modern times and that has turned even the most innocuous devices (televisions, phones, computers, smart devices, automobiles, etc.) into illegal spying tools.

Mar 15 08:26

FBI won't release iPhone hacking tool and is still using it to 'gather intelligence information'

The FBI used a third-party tool to unlock an iPhone used by San Bernardino shooter Syed Farook. Despite opposition, the FBI won't release any details of the tool.

Mar 15 07:23

What You Do On Your Cell Phone Could Come Back To Haunt You

As far as Big Brother is concerned, nothing that you do on your cell phone is ever private. And if the government really wants to see what is on your cell phone, they are going to get that information one way or another, even if that means resorting to physical violence.

Mar 15 06:56

U.S. nuclear program runs on floppy disks

Webmaster's Commentary: 

Well, that oughta give everyone a warm feeling of security!

The electronic piano at my wife's church still uses 3.5 inch floppies, and it is getting to be a pain to find those!

Mar 15 00:50

Twitter Has Been Hacked! #TwitterHack

Twitter has been hacked, although the direct cause is unknown.

Thousands of accounts per hour were posting the following message:

? #Nazialmanya????#Nazihollanda Bu size ufakbir????#OSMANLITOKADI #16Nisan da görü?mek üzere Nemi yazd?m????????Türkçe Ö?REN #RT

The hacked accounts also posted a link to a video in Turkish.

Mar 14 16:45

Kodi users will be threatened with 10 YEARS in PRISON

The Government's Digital Economy Bill could hand copyright trolls the opportunity to threaten online users with prison sentences of up to 10 years.

According to a new campaign page by the Open Rights Group – a digital campaigning organisation that aims to protect the rights to privacy and free speech online – the Bill criminalises minor copyright infringement.

Open Rights Group want to change the Digital Economy Bill so that it is more specific.

The Government wants to use the Bill to increase penalties for criminals running websites that allow people to download copyright-protected material.

However the proposed legislation will criminalise any infringement where money has not been paid for copyrighted content, or where it can be proven that there is a "risk of loss".

That could include people who fileshare, or send copyrighted material as a GIF.

Mar 14 16:34

Warning as mystery gases in Northern Lights play HAVOC with GPS systems and drones

SCIENTISTS are warning of an unknown "new instability mechanism" that could play havoc with GPS systems, mobile phones and drones following a new study.

Mar 14 15:28

The US Government Now Has Less Cash Than Google

In the year 1517, one of the most important innovations in financial history was invented in Amsterdam: the government bond.

It was a pretty revolutionary concept.

Governments had been borrowing money for thousands of years… quite often at the point of a sword.

Mar 14 12:35

If You Notice These Signs, Your Cell Could Well Be Tapped!

Whether we like it or not, most of us have grown used to the possibility of our phones being spied upon. Dystopian novels such as George Orwell's Nineteen Eighty-Four are so ingrained in our minds that a study carried out back in 2014 concluded that 74% of Americans thought that they shouldn't give up privacy for the sake of safety.

Nevertheless, there's a considerable argument that many of us have given up on their our privacy. And thanks to laws, such as the so-called "Snooper's Charter" in the UK, state surveillance is increasing. However, let's not forget that other parties can tap into your cell phones - most troublingly, hackers and extortionists, but also your employer, an ex-partner, or even, in the case of celebrities, the press. They could be listening to your calls, reading and sending texts and emails, or altering the information on your interface.

Here are six things that you should watch out for.

Mar 14 11:48

The Internet Will Soon be Under Complete Agenda Driven Control, It’s Time for an Alternative

The internet will soon be a “safe space”, free from “hatred”, free from “Fake News”, free from “hurtful rhetoric” and of course, free from any views or opinions that do not fit the “progressive narrative”.

Mar 14 10:50

List: Malware found preinstalled on millions of Android phones used by 2 companies

Galaxy Note 2
Galaxy S7
Galaxy S4
Galaxy Note 4
Galaxy Note 5
Galaxy Note 8
Xiaomi Mi 4i
Galaxy A5
ZTE x500
Galaxy Note 3
Galaxy Note Edge
Galaxy Tab S2
Galaxy Tab 2
Oppo N3
vivo X6 plus
Asus Zenfone 2
OppoR7 plus
Xiaomi Redmi
Lenovo A850

Mar 14 10:27

Vibrator maker ordered to pay out C$4m for tracking users' sexual activity

The We-Vibe 4 Plus is a £90 bluetooth connected vibrator, which can be controlled through an app. It is marketed as a way to “allow couples to keep their flame ignited – together or apart”. Its app-enabled controls can be activated remotely, allowing, for instance, a partner on the other end of a video call to interact.

But the app came with a number of security and privacy vulnerabilities, which added up to produce something that many would feel uncomfortable about using.

The app that controls the vibrator is barely secured, allowing anyone within bluetooth range to seize control of the device.

In addition, data is collected and sent back to Standard Innovation, letting the company know about the temperature of the device and the vibration intensity – which, combined, reveal intimate information about the user’s sexual habits.

Mar 14 09:18


The Central Council of Jews in Germany welcomed the new law.

Mar 14 09:09

US military leak exposes 'holy grail' of security clearance files

A unsecured backup drive has exposed thousands of US Air Force documents, including highly sensitive personnel files on senior and high-ranking officers.

Security researchers found that the gigabytes of files were accessible to anyone because the internet-connected backup drive was not password protected.

Webmaster's Commentary: 


Mar 14 08:57

Trump in Danger, CIAgate, ObamaGate, Drones, and Car Control. Michael Rivero - March 13, 2017

Mar 14 08:52

Former CIA Officer CONFIRMED Obama wiretapping Trump-Micheal Scheuer

Mar 14 08:50

Rand Paul Is Right: NSA Routinely Monitors Americans’ Communications Without Warrants

ON SUNDAY’S Face the Nation, Sen. Rand Paul was asked about President Trump’s accusation that President Obama ordered the NSA to wiretap his calls. The Kentucky senator expressed skepticism about the mechanics of Trump’s specific charge, saying: “I doubt that Trump was a target directly of any kind of eavesdropping.” But he then made a broader and more crucial point about how the U.S. government spies on Americans’ communications — a point that is deliberately obscured and concealed by U.S. government defenders.

Paul explained how the NSA routinely and deliberately spies on Americans’ communications — listens to their calls and reads their emails — without a judicial warrant of any kind:

Webmaster's Commentary: 

Welcome to Amerika, a country which has morphed from "the land of the free and the home of the brave" to the land of the surveilled and the home of the cowed, and Code Napoleon law (where one is considered guilty until proven innocent) is king!!

Mar 14 08:41

Spying is lying, spies tell lies

In recent articles, I’ve highlighted items from the latest WikiLeaks data-dump of CIA files. For example:

Mar 14 08:07

How to Stop Cell Phone GPS Tracking

Webmaster's Commentary: 

Here is the important part. Methods such as shown in this and the below video are already known to real criminals and terrorists, just like real criminals and terrorists can create encryption systems the NSA cannot break. Hence, your smart phones constant keeping track is aimed at YOU, the law-abiding American citizen who is doing nothing wrong.

Mar 14 07:57

Alumininum Foil How Many Layers To Block A Cell Phone Frequency

Mar 13 12:52

BIGGER THAN SNOWDEN: Wikileaks ‘Vault 7’ Classified CIA leak – What Does It Mean?

Whilst a lot of the information and methodology outlined in ‘Year Zero’ is of no surprise to security analysts and researchers since the Edward Snowden (image, left) revelations, once again the public has explicit confirmation of how one of the most powerful intelligence agencies in the world, aided by their international counterparts like GCHQ, have been infiltrating and scooping vast quantities of private information from Apple and Android devices right up to Samsung ‘Smart TV’ technology where false ‘stand-by’ modes and live microphones can be executed to record information and send it back to the appropriate servers.”

Mar 13 09:55

As many as 48 million Twitter accounts aren't people, says study

A big chunk of those "likes," "retweets," and "followers" lighting up your Twitter account may not be coming from human hands. According to new research from the University of Southern California and Indiana University, up to 15 percent of Twitter accounts are in fact bots rather than people.

The research could be troubling news for Twitter, which has struggled to grow its user base in the face of growing competition from Facebook, Instagram, Snapchat and others.

Researchers at USC used more than one thousand features to identify bot accounts on Twitter, in categories including friends, tweet content and sentiment, and time between tweets. Using that framework, researchers wrote that "our estimates suggest that between 9% and 15% of active Twitter accounts are bots."

Mar 13 09:36

Ex-CIA Robert David Steele Reachs Out To President Trump - Warns Of Eric Schmidt Of Google Censoring The Internet Of Trump Supporters.

I just watched an interview of Robert David Steele with RT. Of course, those of you familiar with Steele know he is an ex-CIA agent and author of great recognition. I have no doubt he is legitimate and sincere. I further believe he was no stooge to allow himself to be set up; therefore, he has maintained his reputation and dignity. This video interview is another one of shocking revelations and predictions that are warnings most of all to President Trump and to the American people.

Mar 13 09:17


It is run out of a quiet, unassuming office on a tree-lined avenue in Bethesda, Maryland. The rows of hip restaurants are offering young urban professionals all the grande-iced-sugar-free-vanilla-soy-lattes they could ever need. However, this serene suburban idyll belies the fact that serious work for the police state is taking place out of view. Nestled in a suite just upstairs from the Asian fusion and seafood restaurants is a company that is transforming the way law enforcement, intelligence agencies and even giant corporations communicate within their organizations and with each other.

Mar 13 08:32

Malware expert says ‘fingerprint’ switch shows past attacks blamed on Russia, China are work of CIA

According to the leaked information, the CIA’s malware allows the intelligence agency to not only steal hacking techniques, but also to leave false “fingerprints” to make it appear as if others were responsible for the attack.

Speaking in a livestream on Thursday, Assange announced that WikiLeaks will give tech companies access to the methods used by the CIA in its hacking operations. Assange then said that after the revelation, an anti-virus expert approached WikiLeaks to say that attacks previously blamed on Russia, China and Iran have now been pinned on the CIA.

“The technology is designed to be unaccountable, it’s designed to be untraceable, it’s designed to hide itself. It’s designed to throw off people looking to see where there are fingerprints that might demonstrate who authored that technology," Assange explained.

Mar 13 08:29

FBI Used Best Buy’s “Geek Squad” to Gather Evidence on Americans - Windows 10 is spying

According to new court documents, the FBI used Best Buy’s “Geek Squad” technicians to conduct surveillance on American citizens.

Mar 13 08:15

Linux in Munich: 'No compelling technical reason to return to Windows,' says city's IT chief

The man who runs Munich's central IT says there is no practical reason for the city to write off millions of euros and years of work to ditch its Linux-based OS for Windows.

The city authority is widely expected to swap Linux for Windows, due to support among Munich's ruling SPD-CSU coalition for phasing out the use of open-source software.

Webmaster's Commentary: 

Yes, let us trade our open source software for a commercial product from a company with a long association with US spy agencies!!!!!!!!!!

Someone got bought!

Mar 13 08:12

WikiLeaks Release Confirms What “Conspiracy Theorists” Have Known For Years

By Brandon Turbeville

The recent WikiLeaks release is promising to be a much bigger bombshell than anything Edward Snowden ever released. Unlike Snowden, however, the corporate press in the West is not devoting 24/7 coverage with all the bells and whistles of an intentional push to promote the story. Instead, it is largely the alternative and independent press that is giving attention to the recent WikiLeaks announcement. Interestingly enough, the mainstream press reports are largely focusing on accusations that WikiLeaks has “joined the Trump administration” or that the leaker of the information is a traitor...

Mar 13 08:06

Dennis Kucinich: I Support Trump’s Assertion of Wiretapping – It Happened to Me Too

Former Representative Dennis Kucinich says he is no fan of President Trump but says he agrees with his assertion that Trump Tower was wiretapped.

Kucinich said he was wiretapped in 2010 because he opposed the Obama invasion of Libya.

Mar 13 08:04


Sharyl Attkisson shared with WND a detailed and harrowing description of what it was like to experience a reality straight out of Orwell: The reporter claims she was spied on by the Obama administration while investigating its scandals.

What tipped her off?

Imagine what it must be like to watch your computer turn itself on and off.

“That’s one visible sign I noticed over many months,” Attkisson told WND in an email interview.

“At the time, I suspected it was some sort of phishing program seeking my passwords and contacts, and was confident my computer had sufficient protections. I never suspected it was connected to an intrusion of my systems until sources and forensics told me that it was.”

She also watched a different computer that she used delete files by itself.

Mar 13 07:51

Intel buys driverless car technology firm Mobileye

US chipmaker Intel is taking a big bet on driverless cars with a $15.3bn (£12.5bn) takeover of specialist Mobileye.

Intel will pay $63.54 a share in cash for the Israeli company, which develops "autonomous driving" systems.

Mar 13 07:29

Official: America auto-scanned visitors' social media profiles. Also: It didn't work properly

The US Department of Homeland Security used software to scan social media accounts of people visiting America, but it didn't work properly.

That's the conclusion of a study by the department's inspector general. In a heavily redacted report [PDF] that surfaced this week, the watchdog revealed that in December 2015, US Citizenship and Immigration Services ran a pilot program to check social media streams both manually and automatically for any signs of wrongdoing.

The tests were repeated in April and August 2016 using different software tools to rifle through online profiles for troublemakers. The exact software programs used were not named.

"In reviewing the pilot, USCIS concluded that the tool was not a viable option for automated social media screening and that manual review was more effective at identifying accounts," the report states.

Mar 13 07:21

WIKI-LIES (Cont...) It's the self-policing web encyclopaedia that has banned the Mail as a source. But as these deeply disturbing accounts reveal, its pages are littered with inaccuracies - and God help the victims who dare complain

An investigation by this paper has revealed how Wikipedia banned the Daily Mail as a source after just 53 out of its 30 million editors voted to do so. Their spurious argument was that the Mail could not be trusted to be accurate. But — as the internet’s inventor Sir Tim Berners-Lee says online ‘fake news’ must be tackled — what about the accuracy of information on Wikipedia? Here, two writers describe their Kafkaesque experiences when they found their entries were littered with mistakes . . .

Webmaster's Commentary: 

I myself had a similar experience with WikiPedia years ago. Someone put up an article about me that was frankly quite unflattering. Using the edit function I made one and only one change. I changed "Antisemite" to "critic of Israel's government" which is more accurate. When I check back the next day, my change had been undone and I found the article locked against editing! When I asked why I could not correct the article, WikiPedia declared that I, Michael Rivero, was not a recognized authority on the subject of "Michael Rivero." I went public, and the article was deleted, along with a similar unflattering article about I have been an "unperson: at WikiPedia ever since! This was all going on at the same time WikiPedia articles about the Roman and Medieval warming periods were being re-written to make those events seem less significant and thus less of a threat to the human-caused global warming scam!

Mar 12 19:39

Quietly but decisively, Trump's FCC is delivering big favors for big broadband companies

In what may be his most far-reaching act, Pai announced Feb. 27 that the FCC would take a hands-off approach to the AT&T-Time Warner merger, an $85-billion deal between a content distributor and content producer that could remake both industries. That leaves jurisdiction over the merger to the Department of Justice, which is unlikely to block it. President Trump has said he opposes the merger, but he also held a closed-door meeting with AT&T CEO Randall Stephenson just before the inauguration, so whether he will intervene to block the deal remains unknown.

Mar 12 19:32

Malware infecting Androids somewhere in the supply chain

Smartphones from Samsung, LG, Xiaomi, ZTE, Oppo, Vivo, Asus and Lenovo have been spotted sporting malware they apparently carried when they were shipped.

The malware discovered by Check Point Software Technologies included info-stealers, ransomware like Slocker; Loki, which shows “illegitimate advertisements” to generate revenue while stealing device information; and information stealers.

Check Point says it found infections in 38 Android devices. Since the malware wasn't in the vendor's ROM, the company's researcher Oren Koriat reckons they were added in the supply chain between vendor and customer.

Mar 12 10:45

Microsoft’s ads in Windows 10 are getting out of control

There was an old Arabian fable of a camel, a man, and tent. In this tale, the camel asks the man for permission to stick its nose into his tent – after all – it’s cold outside in the desert and it would be unreasonable to claim that the nose would cause sufficient discomfort to the man. After this request was acquiesced to, further requests followed. “Oh can I just stick my shoulder in?”, “How about my hump”, “At this stage, you wouldn’t begrudge me my tail?”. Each request was small and unobtrusive, but at the end of it, the camel had control of the tent and the man did not.

That’s how I feel about Microsoft’s loading of Windows 10 with ads.

Mar 12 09:31

Vault 7 Leak Was an Inside Job - Former CIA Deputy Director

Former CIA Deputy Director Mike Morell says the recent CIA "Vault 7" leak "absolutely" was an inside job.

Mar 12 09:27


Mar 12 09:24

iPhone, Android devices totally defeated by CIA “zero day” exploits… massive collection of CIA spyware revealed in secret document dump

The latest dump follows what Wikileaks characterized as “an introductory disclosure” in February of the year the spy agency began targeting French political parties and candidates in the lead-up to elections held there in 2012. The whistleblower website said that CIA documents indicate that all major French political parties and candidates were “targeted for infiltration by the CIA’s human (HUMINT) and electronic (SIGINT) spies” beginning seven months out from the balloting.

Mar 12 09:23

Apple iOS and Microsoft Windows have “gaping holes” that were exploited by the CIA to install spyware on anyone’s computer, anywhere in the world

As revealed in a statement to the public and the press on Wednesday, Wikileaks noted that the CIA’s capabilities include penetrating Apple iOS and Microsoft Windows, both of which come with “gaping holes” that the agency managed to exploit to install spyware on any computer anywhere in the world.

Mar 12 09:23


Rand’s report is based on unprecedented access to a database of zero days from a company that sells them to governments and other customers on the “gray market.” The collection contains about 200 entries — about the same number of zero days some experts believe the government to have. Rand found that the exploits had an average lifespan of 6.9 years before the vulnerability each targeted was disclosed to the software maker to be fixed, or before the vendor made upgrades to the code that unwittingly eliminated the security hole.

Some of the exploits survived even longer than this. About 25 percent had a lifespan of a decade or longer. But another 25 percent survived less than 18 months before they were patched or rendered obsolete through software upgrades.

Mar 12 09:04

Iraqi-funded Muslim spy who worked for U.S. House Democrats had Debbie Wasserman Schultz’s email password

About five weeks ago, it was reported that dozens of Democrats in the U.S. House of Representatives had allowed four Muslim spies to have access to sensitive security information that they weren’t legally authorized to see, and had paid each of them a salary of $160,000 a year. The Democrats had ignored various red flags, such as their shady real estate dealings, massive amounts of debt, and criminal activities, because they did not want to be accused of “Islamophobia.” You can read about it here and here.

Then about two weeks later, we were given an update with new information: at the same time that these House Democrats allowed these Muslim spies to steal U.S. security secrets and paid them salaries of $160,000 a year, these Muslim spies accepted a $100,000 payment from an Iraqi politician. And again, these House Democrats looked the other way, because they did not want to be accused of “Islamophobia.”

Mar 12 09:03

Evidence of Obama administration wiretapping Trump compelling

The New York Times front-page story was titled, “Trump, Offering No Evidence, Says Obama Tapped His Phones.” CNN’s news crawl proclaimed, “Trump’s baseless wiretap claim.” And the Washington Post, not to be outdone, exclaimed, “Trump, citing no evidence, accuses Obama of ‘Nixon/Watergate’ plot to wiretap Trump Tower.”

Mar 12 08:58


Years ago, I had the occasion to meet a former NSA/CIA contractor, Dennis Montgomery, who was then serving as a consultant for Sheriff Joe Arpaio of Maricopa County in Arizona. Montgomery revealed to me, as he had to Arpaio’s investigators, that these intelligence agencies, then run primarily by James Clapper, the former Director of National Intelligence (DNI) and John Brennan, the former director of the CIA, had been for years “harvesting” the confidential information of scores of prominent Americans, such as the chief justice of the Supreme Court, other justices, 156 judges, prominent businessmen such as Donald Trump, and even me. Indeed, anyone who was in the public eye or an activist was within the sights of the intelligence agencies.

Mar 12 08:36

It’s Time To Start Ranting Against Our Abusers

Has someone you know had their Identity stolen? They can thank the CIA.

Has the life of patients in a local hospital been threatened with ransomware attacks? They can thank the CIA.

Have you noticed that the average age of a first time heroin user in America is 14? You can thank the CIA for lowering the price of opium coming out of Afghanistan.

Have you noticed the rapid growth in the number of drug gang members armed with military grade weapons? You can thank the CIA for arming the gangs who work with them distributing heroin and cocaine across America.

Mar 12 08:34

The Trump Investigation: Essential Criminal Probe or Politically-Motivated Witch Hunt?

If Donald Trump is found guilty of illegal behavior in his connections with Russia, then he should be prosecuted to the full extent of the law. But shouldn’t the same rule apply to Obama? Shouldn’t Obama be held responsible if he authorized an illegal investigation of the Trump campaign in order to destroy a political enemy?

A widely-circulated article in the New York Times casts suspicion on the Trump campaign’s alleged ties to Russia. The article titled “Obama Administration Rushed to Preserve Intelligence of Russian Election Hacking” strongly insinuates that Russian “tampering” might have helped the campaign “tip the election in Mr. Trump’s favor.”

These are serious charges and Congress is currently taking steps to investigate whether there’s any substance to the allegations or not.

But a careful reading of the Times article also reveals disturbing details about the overzealous manner in which the White House attempted to build its case against Trump.

Mar 12 08:32

Inventor of the World Wide Web issues dire warning on its 28th anniversary and says fake news and government surveillance threatens to destroy it

Tim Berners-Lee wrote the blueprint for what would become the World Wide Web, and said he is alarmed at what has happened to it in the last year.

In a statement issued from London, Berners-Lee said: 'Over the past 12 months, I've become increasingly worried about three new trends which I believe we must tackle in order for the web to fulfill its true potential as a tool which serves all of humanity.'

Mar 12 08:27

Wiretapping at Trump Tower: ‘A scandal bigger than Watergate’ – former Trump adviser Stone

Mar 12 08:20

Lavrov Bursts Out Laughing When Asked About CIA Hacking: ‘Where Do I Begin?’

Pro tip from Russia's Foreign Minister: Leave your phone at home when you're negotiating Syrian ceasefires

Mar 12 08:19

CIA’s Frankfurt Spy HQ Could Be Source of ‘Ties’ Between Putin and Trump

Evidence suggests that alleged "ties" between Putin and Trump could have been manufactured in Frankfurt, Germany by the CIA.

The "Vault 7" Wikileaks dump of more than 8,000 CIA files confirmed that the American consulate in Frankfurt, Germany is a "base for covert and overt CIA operatives. It also provided a window into how American spies operate in Europe and – most importantly -- why Frankfurt has been so valuable for a specialized form of computer espionage."

Here's where things get interesting.

U.S. media outlets are peddling a story about "odd" links between Russia's Alfa Bank and the Trump Organization. The allegation is that unusually high internet traffic was recorded between the two institutions.

But according to Alfa Bak, the "odd" internet traffic isn't even real, and came from "mainland Europe":

Mar 12 08:18

Southern Belle Lindsey Graham Runs From Russian Journalist: ‘I’m Not Aware of Any CIA Hacking!’ (VIDEO)

Lindsey is a very busy Senator. Yesterday he was house-training his lapdogs.

Today (and by "today" we really mean "Tuesday, after Wikileaks released Vault 7") he's hiding from Russians and their pesky questions:

Mar 12 08:05

BEX ALERT - Russia 'behind latest CIA data breach on Julian Assange's Wikileaks'

RUSSIA was behind the latest classified CIA data dump on Wikileaks, experts said last night, with some warning that Britain’s security services might be the next target.

Webmaster's Commentary: 

Now, some common sense.

When Bletchley Park broke the ENIGMA code, it was classified as ultra top secret. Clearly, had the Germans known ENIGMA was broken, they would have changed the system. Even after the war, the fact that the US and UK could read ENIGMA messages was classified, as the US and UK made presents of captured ENIGMA machines to friendly governments to use, not knowing the US and UK could read their encrypted messages.

The same applies here. If Russia had all this data on CIA capability, they would never reveal it, as they would want CIA to go on using systems Russia knew about and could evade when necessary, rather than have CIA (or NSA) start changing things!

Hence, Russia is NOT the source of the WikiLeaks information. This claim is just more Russia-bashing!

Mar 12 07:44

Death of Michael Hastings: Uncontrolled Speeding Car – CIA Documents Say They Can Kill This Way [VIDEOS]

Was Michael Hastings assassinated? Did Mercedes have a role in his death?

Mar 12 06:58

Suspect In House IT Security Probe Also Had Access To DNC Emails

Imran Awan — the lead suspect in a criminal probe into breaches of House of Representatives information security systems — possessed the password to an iPad used by then-Democratic National Committee Chairperson Debbie Wasserman Schultz when DNC emails were given to WikiLeaks, The Daily Caller News Foundation Investigative Group has learned.

Wasserman Schultz resigned the DNC post in the wake of WikiLeaks posting damaging internal emails, blaming the scandal on hacking by Russians.

Imran and his family members, all of whom worked as IT professionals for members of Congress, were banned from the House network Feb. 2, 2017, by the House Sergeant at Arms, but Wasserman Schultz has declined to fire him and circumvented the ban by having him “advise” her office.

Mar 11 19:50

Credit Card Stealer Disguises as Google Chrome Browser

A new malicious application tries to disguise itself as the Google Chrome browser to fool victims into entering their payment card details. The app is still active at the time of writing and sends collected user details to an AOL email address.

Discovered today by MalwareHunter, this application goes above and beyond of what other card stealers have attempted, most of which are half-baked efforts, often easy to recognize as malicious applications thanks to their quirky graphics and misaligned designs.

This app, named "Betaling - Google Chrome.exe", tries to pass as the Google Chrome browser and does a good job at it. Betaling uses the standard Chrome icon and window layout, complete with an address bar, and even an HTTPS lock icon to trick users they're on a real website.

Mar 11 11:47

'Password rules are bullsh*t!' Stackoverflow Jeff's rage overflows

As an absolute minimum people should be aiming for 10-character passwords, he said. Only five of the top 25 most-used passwords are over 10 characters, so going into double figures is a smart move and should be enforced by developers.

"These days, given the state of cloud computing and GPU password hash cracking, any password of 8 characters or less is perilously close to no password at all," he said.

Mar 11 09:07


In 2009, the Library of Congress commissioned a research report into the degradation ofCD-ROMs in storage as a way of assessing the integrity of the media in its collection: the news isn't pretty.

The standards for certifying a CD-ROM did not "place any requirement on the chemical or physical stability of the disc," so depending on the manufacturer and process, the discs you've put away on shelves may have wildly different material properties.

The study involved taking a trove of discarded/duplicate CD-ROMs from the LoC's collection and subjecting them to "accelerated aging" processes to see how many errors emerged as the media aged. Keeping discs dry and cool helped reduce error rates, but even so there's a lot of bitrot there.

Webmaster's Commentary: 

IF you are still preferring to use CD-ROMS, the word you are looking for on the packaging is the word "Archival", with some reasonable expectation of a decent shelf life.

Mar 10 18:04

New Hampshire House Passes Bill Banning Support For Warrantless Federal Spying Programs

By Michael Boldin

The New Hampshire House has passed a bill that would ban “material support or resources” to warrantless federal spying. The vote was 199-153.

Rep. Neal Kurk and Rep. Carol McGuire, along with two cosponsors, introduced House Bill 171 (HB171). The legislation would prohibit the state or its political subdivisions from assisting a federal agency in the collection of electronic data without a warrant...

Mar 10 16:51

Alert: Your Cell Phone is Spying on You! 4 Ways to Block Your Cell Phone and Prevent Being Monitored

“We are all just prisoners here…of our own device…” – “Hotel California,” by The Eagles

Mar 10 13:11

Disruptive Technologies Expose Unnecessary Government Regulations

In this video, Vin Armani shows how disruptive technology, like self-checkout kiosks and Uber, are exposing government regulations as an unnecessary protection racket.

Mar 10 12:00


The script has flipped big time.

Thanks to the media’s investigation into the Trump campaign, speculation is growing that it is the Obama administration that could end up investigated for accusations one of its targets called “worse than Watergate.”

Democrats are suddenly worried their “Russia hacked the election” narrative may boomerang into a catastrophe of their own making.

Mar 10 11:51

Pence: US will 'use the full force of the law' on WikiLeaks if CIA leak legit

Vice President Pence on Thursday vowed that the Trump administration would "use the full force of the law" to go after those involved in WikiLeaks's latest document dump if the materials it released are shown to be valid CIA documents.

"Trafficking in national security information, as is alleged WikiLeaks has done here, is a very serious offense," Pence said during an interview on Fox News's "Special Report."

"It represents a compromise of the security of the American people," he said.

Webmaster's Commentary: 

No, it's a compromise of the spook-state spying on us all.

I wonder who Pence is working for? It is now clear that Spicer got his talking points about WikiLeaks from Pence. Trump better watch Pence closely!

Mar 10 10:14

Thieves can steal your smartphone PIN code in SECONDS using thermal cameras (and Android users are at greater risk)

Thieves have uncovered a new way to find out your smartphone pin code.

After you tap in the digits, scammers can use thermal camera to take picture of the heat marks from where your fingers have just tapped the screen.

They can even work out the order that you typed in your code because each heat spot gets fainter over time.

And Android users who use a finger-drawn pattern to unlock their phone are the highest risk of falling victim to this new scam, scientists have revealed.

Mar 10 10:08

Twitter is now marking entire profiles as 'sensitive'

Twitter is trying to take on its troll problem in 2017, but the campaign is not without problems.

In addition to a range of tools aimed at filtering abusive tweets, the platform is running a test in which entire accounts are being marked as sensitive.

Webmaster's Commentary: seems to be having issues as well. I cannot login today.

Mar 10 10:07

China urges US to stop hacking other countries following #Vault7 release

Beijing has called on the US to stop its hacking practices against China and other countries, following a WikiLeaks release which reportedly exposes the CIA’s extensive hacking capabilities and lists Chinese routers as targets.

Mar 10 10:05


Facebook Admits Censorship of Conservative & Nationalist News

Mar 10 09:53

CIA planned on hacking cars to murder people with “undetectable assassinations”

In America, the people are justifiably growing more and more weary of the government. Secret meetings and backroom deals have practically become commonplace, and corruption has reached unprecedented levels. Take the IRS scandal for example, where the Internal Revenue Service was caught explicitly targeting conservative organizations and denying them tax-exempt status. This was not only a blatant example of corruption and federal overreach, but also a devastating blow to the trust level between the people and the government.

Similarly, in 2013, Edward Snowden famously revealed the unconstitutional spying and surveillance that was taking place within the National Security Agency. At first, the NSA attempted to cover their tracks by telling the public that the data collection only involved phone numbers and email addresses, not the actual content of those emails or phone conversations. It was soon revealed, however, that this was not true.

And so it goes.

Webmaster's Commentary: 

Mar 10 09:34

Vault 7: CIA Hacking Tools Revealed

Webmaster's Commentary: 

Apparently links to this page are mysteriously vanishing from blogs and forums across the internet. Let's see how long this stays up.

Mar 10 09:23

This USB firewall protects against malicious device attacks

This pocket-sized firewall is a nifty tool for the privacy-minded and super paranoid that aims to protect against USB-based attacks.

Webmaster's Commentary: 

I want one! On the other hand, there is another solution!

Mar 10 09:11

FBI Director Comey's Full Speech: "Even Our Communications With Our Spouses & Our Clergy Members Are Not Absolutely Private In America"

FBI director James B. Comey gave a speech on cyber security at Boston College on March 8. Short provocative snippets of his speech are circulating on the internet, particularly a clip where he says that "Even our memories are not absolutely private." But here is his speech in its' entirety. Comey did indeed say some outrageous things, particularly where he said that the conversations with our spouses and even our clergyman are not private and can be compelled by the government to reveal what was said. To his credit, towards the end of his speech, Comey did say that maybe he is wrong, and that he, and the FBI, should be humble.

Mar 10 08:46

Is Qualcomm, Microsoft collaboration a sign of less Intel dominance to come?

Judging from technology-watching sites, Intel has something to worry about and it involves a rather well known place on the technology map called Redmond, Washington. Look for the sign that says Microsoft. There.

"Intel's dominance could be further eroded as Microsoft looks to alternative chip makers for its cloud hardware," said MIT Technology Review.

Webmaster's Commentary: 

As WikiLeaks reminds us that all our electronics have back doors, it is worth recalling that Intel makes many of their chips in Israel, and who knows what back doors they added themselves.

Mar 10 08:37

"Mr. Clapper Doesn't Have The Best Record With Facts" - Chaffetz | Obama Wiretapping Trump Scandal

Mar 10 08:27

McAfee on #Vault7: The CIA has failed its mandate to protect the American people

Among other things, WikiLeaks alleged that the CIA failed to follow the Obama administration commitment not to hoard “zero day” exploits, vulnerabilities in software that the general IT community, including software producers, are unaware of. The White House pledged to promptly report such vulnerabilities to producers so that they could patch them.

The failure is akin to deliberately deny ill people medicine that government has, told RT John McAfee, the creator of McAfee antivirus, a decision that he called “horrific”.

“The CIA has confirmed that they knew of ‘zero day’ exploits years in advance of the manufacturers of the software finding out,” he said. “Basically, by not fixing those faults it puts customers of Google, Apple, Microsoft and many other American manufacturers at risk, it puts their reputation at risks, and it costs us all billions of dollars.”

Mar 10 08:25

FBI Used Best Buy's Geek Squad To Increase Secret Public Surveillance

Recently unsealed records reveal a much more extensive secret relationship than previously known between the FBI and Best Buy's Geek Squad, including evidence the agency trained company technicians on law-enforcement operational tactics, shared lists of targeted citizens and, to covertly increase surveillance of the public, encouraged searches of computers even when unrelated to a customer's request for repairs.

Mar 10 08:22

Microsoft to close its social network on a week's notice – and SIX people complain

Low-profile was an experiment, not a flop. Promise

Mar 10 08:19

Facebook Works on Making Computers Predict the Future

Facebook’s chief artificial-intelligence specialist is working to develop software that can use data to predict the future.

Webmaster's Commentary: 

You know, like those climate computers that told us snowfalls were a thing of the past back in 2000.

Mar 10 08:07

What was Trump's friend Nigel Farage doing visiting Julian Assange at the Ecuadorean embassy just two days after WikiLeaks dump of CIA documents?

Nigel Farage visited the Ecuadorian embassy today, sparking rumours of a meeting with WikiLeaks founder Julian Assange.

The friend of Donald Trump, and formerly the leader of pro-Brexit party Ukip, was seen leaving the building in Knightsbridge, west London, where Assange has been holed up for the last five years.

He refused to say whether he had met Assange, who has hosted a number of famous and controversial figures during his time inside the embassy.

Mar 10 07:55

Illegal Obama Wiretaps Of Trump Are Real

Mar 10 07:28

Welcome to Totalitarian America President Trump!

President Trump joins the very crowded list of opponents of the American State which includes the Tea Party, tax resistors, non-interventionists, immigration opponents, traditional family advocates, and a host of others who have been spied upon, persecuted and badgered by federal “intelligence” authorities. While Congress conducted some feeble hearings and investigations of the shenanigans of the US spy agencies during the interminable Obummer Administration, no real action or reform was taken to reign in the eavesdropping and spying by the national security state on American citizens.

Mar 09 17:57

Wikileaks Blows the Doors off of Silicon Valley

Wikileaks has published Vault 7 which contained thousands of documents. Wikileaks now says the CIA has hacked into Apple and Android smartphones, Windows computers and Samsung smart TVs.

Mar 09 16:33

Critical bug in Apache Struts 2 framework targeted by massive attacks over last 48 hours

A simple and reliable bug has been found in a widely used web app framework, which is now being increasingly exploited by hackers and malicious agents to spread malware, and collect server bots. Exploits targeting the bug are publicly available online, and even though a patch has been released, many sites are still vulnerable.

Security researchers are warning they’ve seen a spike in attacks that utilize an Apache Struts 2 vulnerability over the last 48 hours since a patch for the bug has been put out. It’s unclear why attackers are becoming much more active after a vulnerability was officially taken care of, but many sites are reportedly still at risk.

The hackers taking advantage of this exploit can use it to disable a server’s firewall, upload payloads and execute any commands on the target system.

Mar 09 15:50

Power Down

If the spyware/"smart" product has a big battery you're still hosed; your iphone can still happily store everything you say for retransmission later. The TV - I'm not sure what sort of battery it might have. Its probably just the one for keeping the clock alive during power down. You notice that most things these days don't need to have their clocks set? That's because of batteries.

Mar 09 12:40

Former Intel Officer: Ex-NSA Officials Carried Out DNC Hack to Expose Hillary

The DNC hack was carried out by former NSA officials who wanted to expose Hillary Clinton, but then it was made to look as if the Russians were responsible, according to former intelligence officer Lieutenant Colonel Tony Shaffer.

Appearing on Sean Hannity’s show last night, Shaffer told Hannity that the DNC hack and the Podesta email hack, which Democrats blamed on Russia, were actually carried out by disgruntled ex-intel officers who wanted to bring down Hillary Clinton.

Mar 09 12:30

Digital Carjackers Show Off New Attacks

Mar 09 12:16

The film's global earnings are expected to peak at around $320 million globally, having earned a mere $34.8 million in North America.

On Wednesday the CIA was pushed to admit that it had become aware of an attack on its systems last year - but said it didn't know the exact nature of the breach.

That admission only caused more concern at the House Intelligence Committee, a spokesperson for which told The New York Post: 'If it's true that the CIA knew about it since the end of last year... we should have been informed.'

And on Thursday WikiLeaks founder Julian Assange asked why the CIA hadn't owned up and worked with tech companies to make their products secure from the loose hacking tools.

Mar 09 12:05

17 Examples of CIA Criminality — MSM no longer interested in fuming about spies and hacking.

Even with our pragmatic worldview, the western media consistently performs well below our already extremely low expectations. It’s now been roughly 24 hours since Wikileaks released more than 8,000 documents detailing the CIA’s “global covert hacking program”. And the leaks (known as “Vault 7?) haven’t even finished yet. As the Independent notes, “when taken together, Vault 7 will make up the biggest intelligence publication in history.”

Mar 09 11:33

How to remove redirect (Virus Removal Guide)

If your web browser is randomly being redirected to the advertisements then it is possible that your computer is infected with an adware program.

The adware responsible for the pop-ups is bundled with other free software that you download off of the Internet. Unfortunately, some free downloads do not adequately disclose that other software will also be installed and you may find that you have installed adware without your knowledge.

Webmaster's Commentary: 

I am getting complaints about this pop-over obliterating my website on smart phones, and it appears this malware has reached epidemic proportions!

Interestingly, the IP goes to Amazon Web Services!

Mar 09 10:13

It’s official: Prenda copyright trolls made their own porn, seeded on Pirate Bay

So there you go—it was all true, and just as dirty as the craziest conspiracy theories suggested. Lawyers were creating quick porn films to use as "bait," uploading them to BitTorrent sharing sites, and then suing the downloaders and pressuring them into settlements. Hansmeier and Steele's operation pulled in more than $6 million before it was shuttered.

Mar 09 10:08

WikiLeaks will share CIA hacking tools with tech companies: Assange

WikiLeaks will provide technology companies with exclusive access to CIA hacking tools that it possesses, to allow them to patch software flaws, founder Julian Assange said on Thursday.

The anti-secrecy group published documents on Tuesday describing secret Central Intelligence Agency hacking tools and snippets of computer code. It did not publish the full programs that would be needed to actually conduct cyber exploits against phones, computers and Internet-connected televisions.

"Considering what we think is the best way to proceed and hearing these calls from some of the manufacturers, we have decided to work with them to give them some exclusive access to the addition technical details that we have so that the fixes can be developed and pushed out, so people can be secure," Assange said during a press conference broadcast via Facebook Live.

Mar 09 10:06

Wayfaring Traveler

The Wayfaring Traveler Story

Wayfarer has traveled the world in a rich, long life.
She's sunk roots in the fertile soil of her Blue Ridge Mountain
organic farm, in pink granite of a Maine islandAcadia, and the
Rocky Mountains of the wild Southwest.
A carpe diem sort of life, and what mattered finally?
Meet-your-eye-people, truth in a handshake,
the call of the wild, and seize-the-day.

Webmaster's Commentary: 

This is a website run by a friend. Although seemingly innocuous, it too is being interfered with in these dark times, and she is unable to login to her own blog at this point.

Here is her email...

Dear friends & fam,

Am now interestingly blocked from logging in to the wayfaringtraveler blog after many interference patterns; the site still seems to be on line. I had wondered if the Mt. of Beatitudes piece, with coda re gurgle machinations, would be the last story permitted.

Yesterday, had a long and fascinating phone conversation with a friend outside the conus. We were not careful about keywords which excite jackboot response. Was it something we said?!

Hi ho bigbro. And high-five to flea-pless and good reads.

Mar 09 10:06

Microsoft now puts ads in Windows 10 File Explorer, because of course

Microsoft made a lot of changes in Windows 10 that helped it put the mistakes of Windows 8 in the rear view mirror. Not all of Microsoft’s ideas are good, though. The company has shown a tendency to get a little too casual with how it promotes its services within Windows. You might even call these “ads.” Microsoft would, of course, dispute that description. Some of these things that look very much like ads have started showing up in File Explorer. Specifically, Windows 10 has started nagging people to buy a subscription to OneDrive.

Mar 09 10:03

Shock report: 92 per cent of US government websites totally suck

A new report into nearly 300 websites run by the US government has reached an unsurprising conclusion: they suck.

What may be startling, however, is just how much they suck. According to the Information Technology and Innovation Foundation (ITIF), a dramatic 92 per cent of the websites they reviewed had a significant flaw or failing – whether in terms of security, accessibility or speed.

One of the authors, researcher Alan McQuinn, noted that many of the websites – 297 chosen because they were in the top one million most-accessed websites as defined by Alexa – don't even meet the US government's own requirements which are themselves some ways behind typical corporate best practices.

Mar 09 09:49

16 Year Congressman: CIA Leak Shows We’re “Sliding Down the Slippery Slope Toward Totalitarianism, Where Private Lives Do Not Exist”

That the CIA has reached into the lives of all Americans through its wholesale gathering of the nation’s “haystack” of information has already been reported.

It is bad enough that the government spies on its own people. It is equally bad that the CIA, through its incompetence, has opened the cyberdoor to anyone with the technological skills and connections to spy on anyone else.

The constant erosion of privacy at the hands of the government and corporations has annihilated the concept of a “right to privacy,” which is embedded in the rationale of the First, Third, Fourth, Ninth and Fourteenth Amendments to the U.S. Constitution.

It is becoming increasingly clear that we are sliding down the slippery slope toward totalitarianism, where private lives do not exist.

We have entered a condition of constitutional crisis that requires a full-throated response from the American people.