COMPUTERS/INTERNET/SECURITY | WHAT REALLY HAPPENED


COMPUTERS/INTERNET/SECURITY

n/a
Jun 20 11:57

The 18 scariest computer viruses of all time

Webmaster's Commentary: 

And the NSA didn't do a thing about any of them!

Jun 20 10:55

Judge Nap: 'Hard to Believe' Lynch & Obama Haven't Discussed Hillary's Emails

Judge Andrew Napolitano said this morning that he finds it very hard to believe that the Justice Department and the White House haven't discussed the investigation into Hillary Clinton's private emails.

The Fox News senior judicial analyst was asked for his take on the Fox News Sunday interview in which Attorney General Loretta Lynch maintained that she's never discussed the case with the president or anyone at the White House.

Jun 20 07:52

Facebook Has Been Listening To Everything You Say — Here’s How To Stop It

Recently, an expert has come out to claim that Facebook may be listening in on your conversations. Kelli Burns, a mass communication professor at the University of South Florida, believes the app might be using people’s microphones to gather data on the content of people’s conversations.

Jun 19 23:57

Ransomware Plague: Blame It All on Unauthorized Access Rather Than Bitcoin Cryptocurrency

Ransoming computer data is nearly as old as the Internet and is definitely older than Bitcoin cryptocurrency. A recent outbreak of the ransomware has involved a number of attacks on health care institutions and became a hot topic far beyond tech news.

A classical ransomware would deprive the victims of access to their data applying a private key encryption. The key is only available to the attackers until after the victims buy it. For a long while, any particular technique has not dominated among ransom payment methods. The crooks behind the cyber extortion would accept money via bank transfers, all sorts of vouchers and cell phone credits. However, gradually Bitcoin became a prevailing ransom payment technique. Nowadays, most of the cases involve Bitcoins and exclude any other options.

Jun 19 10:23

Reddit Will Adjust Algorithm To Censor Trump Supporters Following Orlando Shootings

In the aftermath of the Orlando shootings, mass censorship on /r/News, Reddit’s main forum for discussing breaking news, led to a massive user exodus to /r/The_Donald, a community known for its commitment to free speech. According to The Daily Beast, more than 11,712 subscribed to the Trump-supporting subreddit on Sunday alone, making it the most successful day in the community’s relatively short history.

Jun 19 09:21

Trump: Bernie hanging in because FBI may indict Clinton

Donald Trump says the reason Sen. Bernie Sanders refuses to concede to presumptive Democratic nominee Hillary Clinton because he wants to see if the FBI will indict her.

"One thing about Bernie, he doesn't give up," Trump said at a rally Saturday in Las Vegas.

Jun 19 09:07

EXPOSED! Hillary TOLD Islamic Terrorists Where To Kill Ambassador Chris Stevens!

After fighting the release for months, new emails reveal that Hillary Clinton used her private home server to transmit classified details of exactly where American Ambassador Chris Stevens was before the terrorist attacks in Benghazi, Libya.

Because her emails could have been easily intercepted by foreign entities, Hillary Clinton likely handed over details of his location to Islamic terrorist killers.

Jun 19 08:07

Huge Scandal Erupts Inside NATO: Alliance Member Germany Slams NATO "Warmongering" Against Russia

but even more troubling, was NATO's assessment that it may now have grounds to attack Russia when it announced that if a NATO member country becomes the victim of a cyber attack by persons in a non-NATO country such as Russia or China, then NATO’s Article V “collective defense” provision requires each NATO member country to join that NATO member country if it decides to strike back against the attacking country.

Jun 19 08:03

Attorney General Loretta Lynch Denies Ever Speaking to Obama About Hillary’s Email

Wallace: The first day that Clinton was endorsed, you met with the President at the White House. Did you any way shape or form discuss it with the President?

Lynch: We have never discussed the case. I have never spoken about it with the White House or the President. That’s not the relationship that I have with people and it would be inappropriate to do that.

Jun 19 07:46

Facebook Accused of Listening to Everything You Say — Here’s How to Stop It

By Jay Syrmopoulos

Recently, an expert has come out to claim that Facebook may be listening in on your conversations. Kelli Burns, a mass communication professor at the University of South Florida, believes the app might be using people’s microphones to gather data on the content of people’s conversations.

Facebook admits that the app is capable of listening to what’s happening around it — but claims the feature simply identifies what people are listening to or watching as means of conveniently posting about it...

Jun 18 21:10

New Intel CPUs Have NSA Exploitable Secret Hidden Backdoor

New Intel CPUs come with a built in secret backdoor that allows remote control and all of it’s hardware even while your computer is turned off.

Hardware security export Damien Zammit revealed some startling revelations in a recent SoftPedia about the secret backdoor built in to new Intel CPUs that no one can touch or disable.

The backdoor, called the Intel Management Engine (ME) is works as a secret subsystem inside your computer’s CPU and runs constantly even when your computer is not turned on.

It works but setting up a TCP/IP server and since the subsystem has complete uncontrolled access to your computer’s hardware, including the network card and memory, it works without the knowledge of your computers operating system and can not be disabled by the OS or by your computer’s firewall.

Jun 18 15:11

New Intel CPUs Have NSA Exploitable Secret Hidden Backdoor

New Intel CPUs come with a hidden backdoor that can allow hackers or the NSA to control your computer remotely even while PC is turned off.

Hardware security export Damien Zammit revealed some startling revelations in a recent SoftPedia about the secret backdoor built in to new Intel CPUs that no one can touch or disable.

The backdoor, called the Intel Management Engine (ME) is works as a secret subsystem inside your computer's CPU and runs constantly even when your computer is not turned on.

It works but setting up a TCP/IP server and since the subsystem has complete uncontrolled access to your computer's hardware, including the network card and memory, it works without the knowledge of your computers operating system and can not be disabled by the OS or by your computer's firewall.

Jun 18 13:39

Harvard Study Confirms Media Blackout Torpedoed Sanders Chances

A study commissioned by Harvard has analyzed primary coverage of thousands of news statements issued by the largest corporate media outlets in the United States.

It found that coverage of Bernie Sanders at crucial parts of the race was too insignificant to make serious inroads to be successful in the campaign.

Furthermore, by the time coverage did pick up on Bernie it was far too late and even then the coverage was far less than given to any of the other candidates including not only Hillary Clinton but also lagging behind the top 5 GOP candidates –Trump, Bush, Cruz, Rubio, and Carson.

In fact Hillary received 3 times more coverage and after analyzing the data Harvard found that Hillary Clinton was the only candidate whose campaign generated an unfair balance of news coverage.

Jun 18 13:36

Microsoft Jumps in the Weed Game, Kohl-Welles Wants the County to Police Pesticides on Pot, and More

Forget Big Pharma and Big Tobacco. Microsoft is getting into the weed game. KIND Financial, a Los Angeles-based cannabis compliance software company, announced yesterday that it is partnering with Microsoft to launch a seed-to-sale tracking program.

Given the nascent state of the seed-to-sale traceability software industry, we may be witnessing the birth of its proverbial 800-pound gorilla.

Jun 18 08:59

Reddit Will Adjust Algorithm To Censor Trump Supporters Following Orlando Shootings

Reddit has announced a change to its algorithm on /r/all, the page that is meant to rank the most popular posts trending across the site’s user-run communities. According to Reddit, the algorithm will be changed to promote more “diversity” on the subreddit. The change is an explicit response to the Islamic terrorist attacks in Orlando, Florida. In their aftermath, /r/all was dominated by posts from /r/The_Donald, the primary community for Trump supporters on the site.

Jun 18 08:05

FLASHBACK - HILLARY THE SPY? - UPDATED INFO!

Let us start with an historical fact. Treason and betrayal by the highest levels is a common feature of history, whether it is Judas vs Jesus, Brutus vs Julius Caesar, Benedict Arnold, the Rosenbergs, Jonathan Pollard, Aldrich Ames, Robert Hanssen. It is just a fact of life. It does happen.

Back in 1996, when Bill Clinton was running for re-election, he authorized the transfer of highly sensitive technology to China. This technology had military applications and allowed China to close the gap in missile performance with the United States. The transfers were opposed and severely criticized by the Defense Department.

Webmaster's Commentary: 

Optional Banner: 
WRH Exclusive
Jun 17 18:28

Odds Hillary Won Without Widespread Fraud: 1 in 77 Billion Says Berkeley, Stanford Studies

After applying various statistical models to subsets of 2016 primary voting data several academic researchers conclude Hillary Clinton’s win was only possible through widespread vote fraud.

Widespread allegations of election fraud and voter suppression across the United States during the 2016 Democratic Primary has sparked the interest of several academic researchers and what they discovered in their research is disturbing.

The researchers each performed independent studies in which a few different statistical was applied to analyze various subsets of vote data and of the studies came to the same conclusion.

Namely that Hillary’s win was could have only been possible a result of widespread election fraud.

Jun 17 14:40

You Acer holes! PC maker leaks payment cards in e-store hack

Acer's insecure customer database spilled people's personal information – including full payment card numbers – into hackers' hands for more than a year.

The PC maker has started writing to customers [PDF] warning that their personal records were siphoned off from its online store by crooks between May 12, 2015 and April 28, 2016.

Acer did not say how many customers had their details swiped.

The lost data includes customer names, addresses, card numbers, and three-digit security verification codes on the backs of the cards. Acer says that no passwords or social security numbers were obtained by the thieves, which will be of no comfort whatsoever to the victims.

Jun 17 12:18

NY Electronic Communications Privacy Act Passed

By Mike Maharrey

A New York Assembly committee has passed an electronic data protection bill that would end warrantless collection of cell phone data and ban the use “stingrays” to track the location of phones and sweep up electronic communications without a warrant in most situations. Passage of the bill would not only protect privacy in New York, but would also hinder at least two aspects of the federal surveillance state.

A coalition of 13 assembly members introduced Assembly Bill 9235 (A9235) on Feb 4. The legislation would help block the use of cell site simulators, known as “stingrays.”...

Jun 17 12:16

FLASHBACK - IS ISRAEL BLACKMAILING AMERICA?

What follows is the original article I wrote when the news story first broke regarding the existence of a system to tap into any phone in America built into the surveillance system used by law enforcement authorities. Several cases were cited where investigations ranging from drug running and money laundering to the events of 9/11 had been compromised by leaks from the company that operated the phone taps as well as phone data from an associated company that handles billing services for almost every phone in America.

The focus of the article was a single question. Could Israel be blackmailing the entire US Government and media.

Optional Banner: 
WRH Exclusive
Jun 17 10:17

Will Hillary Survive Barrage of Email Leaks From Russia and WikiLeaks?

Richard Ben-Veniste is actually a long-time defender of Hillary’s. According to Wikipedia, He was the Democrat’s chief counsel (1995–1996) on the Senate Whitewater Committee and took the successful position that the Clintons had done nothing criminal when participating in the failed Whitewater development.

Now he is defending Hillary again in the pages of USA Today. This is symptomatic of a larger societal theme that is developing to defend Hillary.

Jun 17 08:40

Sanders Supporters Vindicated: Proof DNC Used Media To Rig Election for Hillary

corporate media’s fatuous prattling over Hillary Clinton likely tipped the elections in her favor, we now have solid proof — leaked emails show the DNC colluded with mainstream outlets to heavily favor Clinton.

“Our goals in the coming months will be to frame the Republican field and the eventual nominee early and to provide a contrast between the GOP field and HRC,” reads an email dated May 26, 2015, referencing the former secretary of state by her initials, posted by “Guccifer 2.0” — after the Romanian hacker who allegedly accessed Clinton’s private email server multiple times.

One of the strategies listed for “positioning and public messaging” states, “Use specific hits to muddy the waters around ethics, transparency and campaign finance attacks on HRC.”

Jun 17 08:11

Losing Control: The Dangers of Killer Robots

By Bonnie Docherty, Harvard University

New technology could lead humans to relinquish control over decisions to use lethal force. As artificial intelligence advances, the possibility that machines could independently select and fire on targets is fast approaching. Fully autonomous weapons, also known as “killer robots,” are quickly moving from the realm of science fiction toward reality...

Jun 17 07:55

Self-Learning Robot Escapes Testing Ground (And Goes Missing For 45 Minutes)

Webmaster's Commentary: 

Right out of "Short Circuit!"

Jun 17 07:48

Intel x86s hide another CPU that can take over your machine (you can't audit it)

Recent Intel x86 processors implement a secret, powerful control mechanism that runs on a separate chip that no one is allowed to audit or examine. When these are eventually compromised, they'll expose all affected systems to nearly unkillable, undetectable rootkit attacks.

Jun 17 07:38

Kill Flash now. Or patch these 36 vulnerabilities. Your choice

One bug being exploited right now in the wild

Jun 17 07:02

Lenovo Bloatware Haunts OEM Laptops

You might be at risk if you are using a brand computer and you haven’t uninstalled all the software that came preinstalled with it, such as Lenovo bloatware. Not only can the preinstalled software slow your computer down, it can also allow unauthorized access to your private data.

Jun 16 19:40

New Report: FBI Can Access Hundreds of Millions of Face Recognition Photos

Today the federal Government Accountability Office (GAO) finally published its exhaustive report on the FBI’s face recognition capabilities. The takeaway: FBI has access to hundreds of millions more photos than we ever thought. And the Bureau has been hiding this fact from the public—in flagrant violation of federal law and agency policy—for years. According to the GAO Report, FBI’s Facial Analysis, Comparison, and Evaluation (FACE) Services unit not only has access to FBI’s Next Generation Identification (NGI) face recognition database of nearly 30 million civil and criminal mug shot photos, it also has access to the State Department’s Visa and Passport databases, the Defense Department’s biometric database, and the drivers license databases of at least 16 states. Totaling 411.9 million images, this is an unprecedented number of photographs, most of which are of Americans and foreigners who have committed no crimes.

Jun 16 17:22

Federal Judge Allows FBI To Hide Documents Related to Seattle Surveillance Cameras

By Derrick Broze

A federal court has ruled that the city of Seattle cannot release information related to hidden surveillance cameras operated by the FBI.

On Monday, U.S. District Judge Richard issued a temporary restraining order preventing Seattle from releasing any further information about the purpose and location of surveillance cameras hidden throughout the city. The ruling comes after the U.S. Department of Justice sued Seattle officials for releasing some documents related to surveillance cameras the Federal Bureau of Investigations had placed on utility poles. The bureau has argued that disclosing details could damage ongoing investigations...

Jun 16 15:53

Spam King Dethroned: 2 1/2 Years Behind Bars & Hefty Fine For Leading FB ‘Phisher’

Sanford Wallace, the self-styled “Spam King,” will spend the next two and a half years in prison for compromising half a million Facebook accounts and using them to send over 27 million spam messages between November 2008 and March 2009.

Jun 16 12:36

Guccifer2: Hacker Releases Thousands Of Emails and Docs: “Enough Evidence To Indict Hillary”

One of the bigger news items to hit yesterday was that the Democratic National Committee accused Russian government hackers of penetrating the DNC’s computer network and gaining access to the entire database of opposition research on GOP presidential candidate Donald Trump. The DNC further said that no financial, donor or personal information appears to have been accessed or taken, suggesting that the breach was traditional espionage, not the work of criminal hackers.

It appears that was not entirely true, because barely 24 hours later, the alleged “Russian” hackers has emerged under the Guccifer2 handle, and instead of a group of government operatives and/or spies appears to be a “lone” hacker who incidentally adds, “DNC chairwoman Debbie Wasserman Schultz said no financial documents were compromised. Nonsense! Just look through the Democratic Party lists of donors!”

Jun 16 11:20

The U.S. Air Force Lost 12 Years Of Investigations Thanks To A Corrupted Computer File

The U.S. Air Force Inspector General tracks all their investigations on fraud, abuse, and everything else down to office disputes in a database maintained by Lockheed Martin. Now it looks like somebody broke it, destroying data collected since 2004.

Webmaster's Commentary: 

Suuuuuuuuuuuuuuuuuuuuure!

Jun 16 10:35

HERE IS HOW YOU PROVE HUNDREDS OF PUBLICATIONS RELEASED THE PULSE SHOOTING REPORT SIX HOURS BEFORE IT HAPPENED: TYPE "20 DEAD 40 injured pulse" into Google and tell it to only return results from the 11th.

They will "Berenstain" this quickly now that I posted it. Hopefully you will get a chance before they do.

If you catch this before they wipe it, you will discover that the original story was supposed to be 20 dead and 40 injured, and that it was released to the MSM 6 hours early and damn near everybody published it six hours early. Google scrubbed a lot of it, and an AI or something went through and over wrote all reports (including date updates to the 12th, but the ghost is still there, take a look at this!:

Jun 16 10:21

FLASHBACK - VIRTUAL 9-11: Will the US & Israel Hack The US Banking System Computers and Falsely Blame It On Iran (or Syria or Russia or China)?

Such a cyber false-flag also gives the US Government the excuse to take total control of the internet so that those pesky truth-seeking bloggers don't give the slaves uppity ideas that this is just another war-starting hoax like the attack on the USS Liberty or 9-11 or the Boston bombing.

Webmaster's Commentary: 

This sudden surge in NATO's "concern" over cyber-attacks suggests WW3 may transition into the "hot" mode with a massive cyber-attack against US computers. But, given that the NSA cannot find ransomware creators, nobody will really know who the cyber-attackers really are, nor will anyone likely accept the official scapegoat!

Optional Banner: 
WRH Exclusive
Jun 16 09:38

Severe cyber-attack could be a case for NATO action – Stoltenberg

NATO could respond to a powerful cyber-assault with conventional weapons, the military alliance’s secretary-general told German media. NATO member states are expected to declare cyberspace a warfare domain, along with air, land, sea and space.

Webmaster's Commentary: 

If the NSA can't find the ransomware writers, how could the government possibly find the source of a cyber attack, or expect anyone to believe them when they claim they had!

Jun 16 09:22

MORE CLINTONIAN EVASIONS FROM HILLARY'S SENIOR STAFF

A shocking new video re-enactment of a senior Hillary Clinton staffer's under-oath testimony was released today at ClintonEmailsOnFilm.com. The filmed re-enactment of Ambassador Stephen Mulls testimony is the second video in a series by controversial LA filmmaker Phelim McAleer. The series re-enacts the sworn testimony of Hillary Clinton's senior staff regarding her "illegal" home-brew email server--which potentially left US state secrets vulnerable to hacking.

Jun 16 08:44

NATO Says It Might Now Have Grounds To Attack Russia

NATO is now alleging that because Russian hackers had copied the emails on Hillary Clinton’s home computer, this action of someone in Russia taking advantage of her having privatized her U.S. State Department communications to her unsecured home computer and of such a Russian’s then snooping into the U.S. State Department business that was stored on it, might constitute a Russian attack against the United States of America, and would, if the U.S. President declares it to be a Russian invasion of the U.S., trigger NATO’s mutual-defense clause and so require all NATO nations to join with the U.S. government in going to war against Russia, if the U.S. government so decides.

Webmaster's Commentary: 


I hope this is just an attempt to bluff Putin into not releasing Hillary's emails!

n/a
Jun 15 15:56

Google AI Spits Out Dark Poetry After Reading Thousands of Romantic Books

After reading 3,500 books on love and love poetry, Google’s Artificial Intelligence wrote one of the creepiest poems.

Jun 15 15:32

Admins in outcry as Microsoft fix borks Group Policy

After Patch Tuesday comes Facepalm Wednesday

Jun 15 13:31

The FBI's Facial Recognition Software Has Never Been Properly Tested For Accuracy

Since 2011 the FBI has used facial recognition software to identify people during criminal investigations. The agency combs through a database of over 411 million photos, including everything from mugshots to driver’s licenses. Today, the Government Accountability Office (GAO) released a report that’s critical of the technology.

The GAO is concerned about not only the privacy implications, but also the accuracy of the FBI’s facial recognition technology. The report found that the FBI has never tested the accuracy of searches that are asked to yield fewer than 50 photo matches.

Put more simply, if someone from the FBI has a photo of a suspect and runs it through facial recognition while requesting just 2 potential matches, they have no way of knowing if those matches are any more accurate than the next 48 in line. Put even more simply, a lot of innocent people could potentially be identified positively as suspects.

Jun 15 07:39

Judicial Watch: Court Should Not Seal Clinton IT Official Immunity Agreements

Judicial Watch today announced that it filed an opposition motion to Clinton email witness Bryan Pagliano’s attempt to file immunity agreements ex parte and under seal. Also, Judicial Watch asked the court to deny Pagliano’s effort to avoid videotaping of his deposition, during which he plans to assert his Fifth Amendment right.

Webmaster's Commentary: 

The fact that Pagliano is pleading the 5th tells us there is something criminal about the way that email server was set up. The attempt to block video of his deposition is because video of him taking the 5th will be blasted all over the internet, reminding everyone that some dark secret lurks behind that email server.

Jun 15 07:35

Clinton IT Official Confirms Immunity Agreement in Court Filing

Judicial Watch today announced that Clinton email witness Bryan Pagliano attorneys confirm for the first time that Mr. Pagliano has “use” immunity agreements with federal prosecutors investigating the Clinton email matter. The admission comes in a court filing filed at 4:55 pm:

In December 2015, Mr. Pagliano proffered testimony to the DOJ in connection with an ongoing DOJ investigation. A short time later, Mr. Pagliano and the DOJ entered into an agreement granting Mr. Pagliano limited “use” and “derivative use” immunity consistent with 18 U.S.C. § 6001 et seq. for that testimony and other testimony offered in connection with the same investigation. In response to the Court’s Order, Mr. Pagliano has today filed copies of his use immunity agreements with the Government, with a Motion asking the Court to maintain those documents ex parte and under seal.

Webmaster's Commentary: 

Jun 15 07:34

Federal Judge Orders Videotaping of Clinton IT Witness’ Testimony

Judicial Watch today announced that a court order was issued by Judge Emmet G. Sullivan requiring the testimony of Bryan Pagliano, the Clinton State Department IT official who reportedly provided support for the Clinton email system, be videotaped during his upcoming deposition and that the transcript be made public. The court also confirmed that a Justice Department criminal investigation is underway related to the Clinton email issue.

Jun 15 07:22

Julian Assange Warns WikiLeaks Will Publish "Enough Evidence" To Indict Hillary Clinton

Asked about the FBI investigation itself, and how Assange believed that would end, Assange said that there have been enough emails released that could lead to an indictment.

"Unfortunately I think what's going to happen is that the FBI is going to go 'we have accumulated a lot of material about Hillary Clinton, we could proceed to an indictment'", but Loretta Lynch, head of the DOJ won't end up indicting.

"She's not going to indict Hillary Clinton... It's not possible that could happen, but the FBI could push for concessions from [a] new Clinton government in exchange for its lack of indictment." Assange added.

Jun 15 07:19

Truth in malvertising: How to beat bad ads

Malvertising, or malicious advertising, is the use of online advertising to distribute malware with little to no user interaction required. You could be researching business trends on a site like NYTimes.com and, without ever having clicked on an ad, be in trouble. A tiny piece of code hidden deep in the ad directs your computer to criminal servers. These servers catalog details about your computer and its location, and then select the “right” malware for you.

Malvertising purposefully targets legitimate websites with high traffic, instead of trying to trick people into visiting malicious sites. In the less than 10 years since it’s been on the scene, malvertising has impacted major websites with traffic in the hundreds of millions (if not billions), including Yahoo!, NYTimes.com, bbc.com, and AOL.

Webmaster's Commentary: 

Funny how the NSA can't find these criminals. I guess they are too busy whacking off to the pictures of your naked lovers they steal from your computers.

Jun 14 16:00

NATO has declared the cyberspace as "operational domain, just like air, sea & land"

NATO General Secretary Jens Stoltenberg said Tuesday that the alliance had decided to designate cyberspace as an official operational domain of warfare, such as land, sea and air. Earlier, a member of the Congress Permanent Select Intelligence Committee (HPSCI) claimed that any cyberattack on American surveillance satellites could be considered an act of war, suggesting that the US should respond to hackers with weapons.

Jun 14 12:49

FBI’s Probe Of Clinton Email Server Is A ‘Criminal Investigation,’ Judge Says

The FBI’s investigation into Hillary Clinton’s private email server is “criminal” in nature, U.S. District Court judge Emmet Sullivan said in a court filing on Tuesday.

Sullivan was responding to a plea from attorneys for former State Department information technology specialist Bryan Pagliano who asked that details of an immunity deal he made with the FBI to discuss Clinton’s server be kept secret.

Jun 14 11:27

Russia Is Reportedly Set To Release Clinton's Intercepted Emails

Reliable intelligence sources in the West have indicated that warnings had been received that the Russian Government could in the near future release the text of email messages intercepted from U.S. Presidential candidate Hillary Clinton’s private e-mail server from the time she was U.S. Secretary of State. The release would, the messaging indicated, prove that Secretary Clinton had, in fact, laid open U.S. secrets to foreign interception by putting highly-classified Government reports onto a private server in violation of U.S. law, and that, as suspected, the server had been targeted and hacked by foreign intelligence services.

Webmaster's Commentary: 

Jun 14 09:22

United States of PSYOPS: Call them paranoid; call them delusional

Increasing numbers of highly credible and educated individuals, both in the US and globally, have been coming forward to report electronic harassment

Jun 14 09:20

TWELVE YEARS of US Air Force complaints lost in database crash

Backups never fail until you REALLY need them

Jun 14 06:52

EU to Target Internet as Part of Counter-Radicalization Plan

The European Union plans to target the internet in its efforts to try to stop young people developing extremist views.

Interior Affairs Commissioner Dmitris Avramopoulos said Tuesday that the internet is "our most important battleground" against radicalization.

He said, "The recent attack in Orlando perfectly demonstrated (that) the perpetrator was strongly radicalized on his own, purely by using the internet."

Webmaster's Commentary: 

There is absolutely no basis for that last comment. But we know the elites are terrified that the people of the world are waking up to the true nature of society. While there is a free internet, the elites cannot lie to the people with impunity. They are losing control, and they do not like it one bit!

Jun 14 06:45

Julian Assange Says WikiLeaks Set To Release More Clinton Emails, US DOJ Will Block Indictment

“Unfortunately I think what’s going to happen is that the FBI is going to go ‘we have accumulated a lot of material about Hillary Clinton, we could proceed to an indictment‘”.

“She’s [Loretta Lynch] not going to indict Hillary Clinton…It’s not possible that could happen, but the FBI could push for concessions from new Clinton government in exchange for its lack of indictment.”

Webmaster's Commentary: 

Jun 13 19:05

Orlando Shooter Was a DHS Security Contractor: “Has ISIS Infiltrated Homeland Security?”

Has Homeland Security been infiltrated?

The Orlando nightclub terrorist who pledged allegiance to ISIS worked almost a decade for a major Department of Homeland Security contractor, raising alarms that ISIS sympathizers and agents have infiltrated the federal agency set up after 9/11 to combat terrorists.

“G4S supports the U.S. Department of Homeland Security, Customs and Border Protection (CPB), with its operations at the U.S. ­ Mexico border and with U.S. Immigration and Customs Enforcement (ICE) to transport illegal immigrants in selected urban areas,” the company says in a brochure.

There are clearly larger questions about the stunning mass shooting that took place at an Orlando nightclub, now considered the largest of its kind in U.S. history.

Read more at SHTFplan

Jun 13 14:08

Hired Hackers Find Over 100 Bugs In Pentagon Computer Systems

Hackers contracted by the Defense Department to test the security of its less-sensitive computer systems have found more than 100 vulnerabilities, the Pentagon admitted.

Jun 13 13:51

Billionaire George Soros Preparing For Economic Collapse: “Trading Moves Big and Bearish”

Is there really a great collapse coming, and a more permanent shift to Americans and westerners becoming more like serfs?

Why is George Soros selling stocks, buying gold and making “a series of big, bearish investments”? If things stay relatively stable like they are right now, these moves will likely cost George Soros a tremendous amount of money. But if a major financial crisis is imminent, he stands to make obscene returns. So does George Soros know something that the rest of us do not?

[...] Mr. Soros also argues that there remains a good chance the European Union will collapse under the weight of the migration crisis, continuing challenges in Greece and a potential exit by the United Kingdom from the EU.

Read more at SHTFplan.com

Jun 13 13:13

Washington State Accidentally Released a Boatload of Personal Data on Pot License Applicants

The leak happened in early May as a result of a public records request filed by John Novak of the Washington cannabis watchdog site 420 Leaks. Novak was seeking information on I-502 retail applications from medical collectives. According to the Cannabist, the WSLCB first sent Novak the wrong records and asked him to delete them. But then, instead of sending the requested licensee information with appropriate redactions, the WSLCB accidentally sent the un-redacted versions of those files.

Jun 13 09:51

Fighting Malevolent AI: Artificial Intelligence, Meet Cybersecurity

By Roman V. Yampolskiy, University of Louisville

With the appearance of robotic financial advisors, self-driving cars and personal digital assistants come many unresolved problems. We have already experienced market crashes caused by intelligent trading software, accidents caused by self-driving cars and hate speech from chat-bots that turned racist.

Today’s narrowly focused artificial intelligence (AI) systems are good only at specific assigned tasks. Their failures are just a warning: Once humans develop general AI capable of accomplishing a much wider range of tasks, expressions of prejudice will be the least of our concerns...

Jun 13 09:30

Manatee shelter dog trained to sniff out child pornography

Child pornographers can easily hide photos and videos of children on tiny computer hardware making it difficult for law enforcement to find. But the Manatee County Sheriff's Office has a new crime fighting tool: a four-legged deputy that can sniff out the evidence and she didn't cost taxpayers.

The newest deputy is K-9 Gia, a 14-month-old puppy who is a specialist in electronic detection. She can sniff out computer hardware used by child pornographers.

Webmaster's Commentary: 

... and anyone else backing up harmless and legal data.

Jun 13 08:53

BLACKBERRY: WE'RE HERE TO KICK ASS AND SELL OUT USERS TO LAW ENFORCEMENT. AND WE'RE (ALMOST) ALL OUT OF USERS.

Back in mid-April, it was discovered that Canadian law enforcement (along with Dutch authorities) had the ability to intercept and decrypt BlackBerry messages. This level of access suggested the company had turned over its encryption key to the Royal Canadian Mounted Police. BlackBerry has only one encryption key for most customers -- which it maintains control of. Enterprise users, however, can set their own key, which cuts BlackBerry out of the loop completely. BlackBerry CEO John Chen -- despite publicly criticizing Apple for locking law enforcement out of its phone with default encryption -- refused to provide specifics on this apparent breach of his customers' trust. Instead, he offered a non-denial denial, stating that BlackBerry stood by its "lawful access principles."

Jun 13 08:47

WIKIPEDIA WARNS AGAINST FRENCH ATTEMPT TO EXTEND EU PRIVACY LAW GLOBALLY

Wikipedia co-founder Jimmy Wales has said an attempt by France to give an online privacy ruling global force is opening up a “disastrous can of worms” and could spur global censorship.

Jun 13 08:32

Jimmy Carter’s Former Strategist And Pollster: ‘Clinton Cash’ Scandal Is “Worse Than Watergate” .. “They Were Selling Out The National Interests Of The United States Directly To Adversaries And Others For Money.”

“This is the greatest scandal in the history of the United States,” he said. “They all ought to be indicted. This is worse than Watergate.”

Jun 13 08:00

Surveillance Technology Deployment Curve

I coined this phrase to describe the lag-time between the actual deployment of technology and the subsequent intentional disinformative release of news of that technology in regards to surveillance.

Jun 13 07:09

WikiLeaks to publish more Hillary Clinton emails - Julian Assange

Assange said it was highly unlikely that the US attorney general, Loretta Lynch, would indict Clinton. “She’s not going to indict Hillary Clinton, that’s not possible. It’s not going to happen. But the FBI can push for concessions from a Clinton government,” he said.

Jun 13 07:03

Facebook accidentally declared the Philippines at war yesterday

To celebrate Independence Day in the Philippines this year, Facebook created a banner for users to share across the social network. Unfortunately, it also suggested that the country is at war.

As The Philippine Star reports, Facebook's celebratory graphic featured an image of the Philippine flag with an inverted color scheme — red on top, and blue on the bottom. According to Philippine law, the flag should only be displayed in that configuration during times of war; during peacetime, it's flown with blue on top and red on bottom.

Jun 13 07:01

Microsoft to buy LinkedIn for $26.2 billion

Microsoft has purchased the social networking service LinkedIn for $26.2 billion, equating to $196 per share. The network’s co-founder has described the deal as a “re-founding moment” for the service.

The two companies have entered what they call a “definitive agreement” that will see Jeff Weiner staying on as CEO of LinkedIn but will now be answerable to Microsoft boss Satya Nadella.

Jun 12 19:53

New criminal gadget can clone up to 15 contactless bank cards a second from victims who are simply standing nearby

The hi-tech device steals details such as the card number and the person's name and address contained on the credit or debit card.

The scanner - called the Contactless Infusion X5 - extracts the information where it can be written onto blank cards, which can then be used by thieves to go on spending sprees.

Jun 12 09:54

NSA Looking to Exploit Internet of Things, Including Biomedical Devices, Official Says

THE NATIONAL SECURITY AGENCY is researching opportunities to collect foreign intelligence — including the possibility of exploiting internet-connected biomedical devices like pacemakers, according to a senior official.

“We’re looking at it sort of theoretically from a research point of view right now,” Richard Ledgett, the NSA’s deputy director, said at a conference on military technology at Washington’s Newseum on Friday.

Biomedical devices could be a new source of information for the NSA’s data hoards — “maybe a niche kind of thing … a tool in the toolbox,” he said, though he added that there are easier ways to keep track of overseas terrorists and foreign intelligence agents.

When asked if the entire scope of the Internet of Things — billions of interconnected devices — would be “a security nightmare or a signals intelligence bonanza,” he replied, “Both.”

Jun 12 09:02

New era of journalism: People against the gatekeepers

What does the post-mainstream era hold for journalism? Can censorship exist in an era of total access to information? Where does freedom of expression begin and where does it end?
These were just three of the important questions addressed at the "New Era of Journalism" conference held in Moscow this week, an event which brought together leading journalists from 32 countries and also featured a video link up with Wikileaks founder and editor-in-chief Julian Assange from the Ecuadorian Embassy in London.

Opening the proceedings, Dmitry Kiselev, Director General of the Rossiya Segodnya news organization, said that since 2001 the US had interfered with and destroyed a number of countries around the world with wars and interventions based on lies. These lies, such as the blatantly false claim that Iraq had WMDs which could be launched within 45 minutes, were promoted by US State Department/NATO-friendly news channels and other media as proven facts which they clearly were not.

Webmaster's Commentary: 

If there is one victory we can claim here on the internet, it is that we have forever removed the ability of government to lie to their people with impunity. Absent that, there will be fewer wars.

Already we see the elites trying to roll the world back to pre-internet days, much as the elites in Gutenberg's time tried to roll back his making books affordable to the middle classes. But like that previous effort, the attempt to reverse progress is doomed to fail. The elites will have to adjust to the new reality of a public aware and on the lookout for their lies, or they will stop being the elites.

Jun 12 08:52

Judge Jeanine Paving The Way For Comey To Cave On Clinton?

She then says, “The sad news is the fix is in, folks, and I just told you why. But then you say Judge, how could the fix be in if, as you say, FBI Director Comey is such an honorable guy? I say it because there would be a Constitutional crisis in this country if an indictment were to happen. And Jim Comey, as ethical as he is, respects the United States government too much to let that happen.”

Pirro appeared to be offering an exit, an excuse for Comey to capitulate, a foundation for an argument through which he can save face as he cowers to the establishment crime syndicate.

Webmaster's Commentary: 

Obviously yes. And to turn the argument back on her, how is the "best interest of the country” served by allowing criminals to continue to run the government?

Jun 12 08:27

An Ivy League professor explains how a 1980s game theory experiment suggests how morality could have evolved

And it all goes back to game theory.

Back in the 1980s, Robert Axelrod, a political scientist, organized a tournament where a bunch of computer programs played a repeated prisoner's dilemma against each other.

For those unfamiliar, the prisoner's dilemma is a game in which two "rational" people might choose not to cooperate with each other, even though it would be in their best interest to do so. The basic premise is that there are two criminal accomplices being held in separate cells and interrogated. Both prisoners have the option to cooperate and keep their mouths shut or to defect and say the other guy did the crime.

Jun 12 07:52

NSA Looking to Exploit Internet of Things, Including Biomedical Devices, Official Says

The National Security Agency is researching opportunities to collect foreign intelligence — including the possibility of exploiting internet-connected biomedical devices like pacemakers, according to a senior official. “We’re looking at it sort of theoretically from a research point of view right now,” Richard Ledgett, the NSA’s deputy director, said at a conference on military technology at Washington’s Newseum on Friday.

Jun 11 16:11

Be on the lookout for keystroke-logging USB chargers

..."highly stealthy keystroke loggers" are disguising themselves as USB phone chargers to log and decrypt keystrokes typed into wireless keyboards then transmit the data to the bad guys over cellular networks.

Jun 11 09:38

Must See: How Google Manipulates Search Results In Favor Of Hillary Clinton

An under-the-radar startup funded by billionaire Eric Schmidt has become a major technology vendor for Hillary Clinton’s presidential campaign, underscoring the bonds between Silicon Valley and Democratic politics.

The Groundwork, according to Democratic campaign operatives and technologists, is part of efforts by Schmidt—the executive chairman of Google parent-company Alphabet—to ensure that Clinton has the engineering talent needed to win the election. And it is one of a series of quiet investments by Schmidt that recognize how modern political campaigns are run, with data analytics and digital outreach as vital ingredients that allow candidates to find, court, and turn out critical voter blocs.

Jun 11 09:38

Vermont Governor Signs Sweeping Privacy Law, Hinders Several Federal Surveillance Programs

By Mike Maharrey

Vermont Gov. Peter Shumlin has signed a sweeping bill that establishes robust privacy protections in the state into law. It not only limits warrantless surveillance and helps ensure electronic privacy in Vermont, it will also hinder several federal surveillance programs that rely on cooperation and data from state and local law enforcement.

The new law bans warrantless use of stingray devices to track the location of phones and sweep up electronic communications, restricts the use of drones for surveillance by police, and generally prohibits law enforcement officers from obtaining electronic data from service providers without a warrant or a judicially issued subpoena...

Jun 11 08:37

Obama & Warren Endorsement Unacceptable In Face of Incomplete FBI Criminal Investigations of Clinton

Jun 11 08:09

KING: Hillary Clinton now paying trolls to attack people online

As head of the Correct The Record Super PAC for Hillary Clinton, David Brock has launched something called Barrier Breakers — an online mob of paid trolls designed to attack any and every person who says one cross word about Hillary Clinton on Facebook, Twitter, Instagram, Reddit, or elsewhere.

Jun 11 06:37

5 places that are censored on Google Maps

"Military secrets blacked out"
What lies at the heart of the secret government’s infrastructure around the world?

n/a

n/a
Jun 10 12:20

Fox News Poll: Majority thinks Clinton is lying about emails

American voters think Hillary Clinton put national security at risk by mishandling classified emails -- and that she’s lying about it.

By a 60-27 percent margin, they think she’s lying about how her emails were handled while she was secretary of state, according to the latest Fox News national poll of registered voters.

And by 57-32 percent, voters say U.S. safety was at risk because of Clinton’s mishandling of national secrets.

Webmaster's Commentary: 

Jun 10 11:11

Google accused of manipulating searches, burying negative stories about Hillary Clinton

An explosive report released Thursday suggests that Google manipulated its search engine to boost Democratic presidential hopeful Hillary Clinton by burying unflattering stories about her.

A video posted by SourceFed, a news and pop-culture website, accused Google of attempting to boost secretly Mrs. Clinton’s candidacy.

Jun 10 10:51

Emails in Clinton Probe Dealt With Planned Drone Strikes

At the center of a criminal probe involving Hillary Clinton’s handling of classified information is a series of emails between American diplomats in Islamabad and their superiors in Washington about whether to oppose specific drone strikes in Pakistan.

Webmaster's Commentary: 

This is the start of a "Limited hangout", confessing to a minor crime to throw off investigations into more serious ones! The public reaction is intended to be, "Drones? Is that what all the email server fuss was about?!?"

One very famous case of a limited hangout was when Ken Starr dangled Monica Lewinski and the stained blue dress in front of the American people to keep them from looking at the more serious matters of CIA cocaine and gun running to and from Nicaragua from Arkansas when Bill Clinton was governor.

Clearly, the WSJ is playing that same game again, throwing drone strikes at us so we don't look for the possibility that Hillary was selling US secrets off of that email server in exchange for "donations" to her "charitable" Foundation.

Jun 10 10:18

MALWARE ALERT - Urgent Firefox update

Webmaster's Commentary: 

Don't bother clicking the link. I disabled it.

I have seen several of these in recent days, pop-up ads screaming that you MUST update your Firefox (or Chrome, or IE or Opera, of Windows). These ads plant malware on your system. Always check the URLs you are requested to click and never accept a patch that is not coming from the original authors of a product.

The malware artists have declared war on the American people and as usual, the "mighty" NSA can't or won't do a thing about it, proving again (along with TSA) that US Government programs are costly, inconvenient, unconstitutional, and totally useless.

Jun 10 09:35

Even Steve Jobs Didn’t Let His Kids Use iPads: Why You Should Limit Technology Use for Your Kids

Quick Summary

1. A lack of creativity

2. A lack of curiosity and passion

3. A lack of patience

4. Lack of exercise

5. Decreased test scores

6. Lack of human connection

Jun 10 07:22

More corporate shared folders in cloud filled with malware, research finds

Internet file sharing has long been a prime route for malware to spread. The situation is one of the reasons (aside from the exposure of proprietary data) that many companies restrict the use of cloud file sharing to corporate-approved systems. But it turns out that those enterprise cloud folders are just as bad. As more companies sanction the use of cloud applications for collaboration and sharing data—even just between individuals' computers and mobile devices—those cloud apps have increasingly become fertile ground for malware.

Jun 10 07:21

Why you shouldn’t share links on Facebook

Earlier this week, security researchers at Checkpoint discovered a vulnerability that would have allowed attackers to change messages and links sent through Facebook messenger. Facebook quickly patched the bug … but did you know links sent privately through messenger can be read by anyone? Moreover, Facebook knows about this and has no plans to fix the issue.

Jun 10 07:14

Sir Tim Berners-Lee: Internet has become 'world’s largest surveillance network'

WORLD WIDE WEB CREATOR Sir Tim Berners-Lee has said that the internet has fallen into the hands of large corporations and governments and become the "world’s largest surveillance network".

Berners-Lee explained in an interview with The New York Times that his invention has steadily come under the control of powerful interests.

"It controls what people see. It creates mechanisms for how people interact. It's been great, but spying, blocking sites, repurposing people's content, taking you to the wrong websites completely undermines the spirit of helping people create," he said.

"The problem is the dominance of one search engine, one big social network, one Twitter for microblogging."

Jun 10 07:07

PC market sinking even faster than first thought, thanks to Windows 10

The abacus-shufflers of analyst firm IDC have revised their 2016 PC sales forecasts downwards.

The firm now says PC shipments “... are forecast to decline by 7.3% year over year”. That's “roughly two per cent below earlier projections as conditions have been weaker than expected.” The firm names “weak currencies, depressed commodity prices, political uncertainty, and delayed projects” as the weaker conditions impacting sales.

Windows 10 isn't helping matters either, because lots of people are availing themselves of free Windows 10 upgrades rather than buying a new PC. The firm also says that “while a large share of enterprises are evaluating Windows 10, the pace of new PC purchases has not yet stabilized commercial PC shipments.” Which sounds like plenty of organisations just aren't pulling the upgrade trigger fast enough to give the PC market a kick.

Jun 09 17:49

FBI Found Over 300 Classified Docs On Computer Of Petraeus’ Mistress

Newly released documents reveal that during the search of former CIA director David Petraeus’ home, the FBI discovered more than 300 classified documents on the personal computer of his biographer and mistress, Paula Broadwell.

n/a
Jun 09 15:34

ISIS-Aligned Hackers Leak Over 7,000 Americans' Names As Assassination Targets – Report

The Islamic State-aligned United Cyber Caliphate has placed nearly 8,000 Americans on its longest “kill list” to date. The assassination agenda also reportedly includes names of Canadians, Australians and Europeans.

Jun 09 13:46

Mark Zuckerberg’s Social Media Accounts Get Hacked, Password Was Only Two Letters

Does Facebook tech billionaire Mark Zuckerberg know something we don’t about account security and making strong passwords?

It seems recently that Mark ran into a bit of bad luck when several of his social media accounts were hacked, including his Twitter and Pinterest accounts. The hackers, who went by the monicker “OurMine Team,” also took credit for breaking into his Instagram account as well, although Facebook denied that one. Zuckerberg’s Facebook account was apparently untouched.

In one post which has since been deleted, they ragged on Zuckerberg for essentially having one of the easiest passwords to figure out of all time — consisting of only two, that’s right, two letters — which he used across multiple sites.

Jun 09 09:23

How Google Could Rig the 2016 Election

America’s next president could be eased into office not just by TV ads or speeches, but by Google’s secret decisions, and no one—except for me and perhaps a few other obscure researchers—would know how this was accomplished.

Research I have been directing in recent years suggests that Google, Inc., has amassed far more power to control elections—indeed, to control a wide variety of opinions and beliefs—than any company in history has ever had. Google’s search algorithm can easily shift the voting preferences of undecided voters by 20 percent or more—up to 80 percent in some demographic groups—with virtually no one knowing they are being manipulated, according to experiments I conducted recently with Ronald E. Robertson .

Jun 09 09:09

Lexus cars suffer Purple Screen of Death – code bug turns the air blue

US owners of later-model Lexus cars have had a frustrating day after an over-the-air update left the entertainment and navigation systems locked in a loop of restarts and flashing purple hues.

Lexus has blamed "errant data" that was broadcast to some Lexi sold after 2014, causing the system controlling navigation, audio, climate controls, and Bluetooth to reboot in a perpetual loop while making an annoying pinging sound.

Jun 09 09:07

Chrome's PDF reader has arbitrary code execution flaw

A Researcher at Cisco's Talos limb have discovered an arbitrary code execution flaw in PDFium, the PDF reader installed by default in Google's Chrome browser.

CVE-2016-1681, discovered by Talos' Aleksandar Nikolic, means that PDF that includes an embedded jpeg2000 image can trigger an exploitable heap buffer overflow.

The flaw looks like it is down to a tiny error by Chrome's developers, as Nikolic writes that “An existing assert call in the OpenJPEG library prevents the heap overflow in standalone builds, but in the build included in release versions of Chrome, the assertions are omitted.”

Jun 09 08:28

New Social Network Based on Blockchain Technology Wants to End Censorship

By Carey Wedler

As Facebook and other digital social platforms face repeated accusations of censorship, a new blockchain-based social networking platform is emerging — with the express purpose of combating censorship.

“We are basically living in an information age plagued by arbitrary censorship and digital amnesia, affecting every Internet user,” says AKASHA Project founder and CEO Mihai Alisie.

That digital amnesia, he argues, is a consequence of inefficient servers that fail to guarantee the permanence of information...

Jun 09 08:12

FLASHBACK - Hillary’s team copied intel off top-secret server to email

Somehow, highly classified information from SIPRNet, as well as even the super-secure JWICS, jumped from those closed systems to the open system and turned up in at least 1,340 of Clinton’s home emails — including several the CIA earlier this month flagged as containing ultra-secret Sensitive Compartmented Information and Special Access Programs, a subset of SCI.

Webmaster's Commentary: 

In short, this means that the classified information on Hillary's server did not arrive their by email, but by flash drive!

Jun 09 08:01

AP: Hillary Clinton Emails ‘Could Have Compromised CIA Names’

“Start with the entirely plausible view that foreign intelligence services discovered and rifled Hillary Clinton’s server,” said Stewart Baker, a Washington lawyer who spent more than three years as an assistant secretary of the Homeland Security Department and is former legal counsel for the National Security Agency.

If so, those infiltrators would have copies of all her emails with the names not flagged as being linked to the agency.

In the process of publicly releasing the emails, however, classification experts seem to have inadvertently provided a key to anyone who has the originals. By redacting names associated with the CIA and using the “B3 CIA PERS/ORG” exemption as the reason, “Presto — the CIA names just fall off the page,” Baker said.

The CIA declined to comment.

Jun 09 06:51

EU vote registration deadline extended

Cabinet Office minister Matt Hancock said the government would legislate to extend the cut-off until midnight on Thursday.

It follows a computer glitch which left some people unable to sign up before the original midnight Tuesday deadline.

Jun 09 06:22

BlackBerry hands over user data to help police 'kick ass,' insider says

A specialized unit inside mobile firm BlackBerry has for years enthusiastically helped intercept user data — including BBM messages — to help in hundreds of police investigations in dozens of countries, a CBC News investigation reveals.

Webmaster's Commentary: 

Hopefully, including the United States, and more specifically, Washington DC ... the State Department.

Jun 09 03:48

Continuity Preppers: FEMA, DHS In “Secret Orgy of Preparedness” at Secret Underground Mountain Bunker

While a growing community of individuals is set out to prepare for a collapse of society, and become known sometimes dismissively as “preppers,” the real preppers are in the highest levels of government, and they are ready to evacuate and continue the government even in the event of an all-out breakdown of society.

Not only is this secret continuity of government activity happening but it is accelerating rapidly.

But there’s a secret definition, written between the lines of the Constitution and public laws: Officialdom evacuating from disorderly and disobedient America before the citizenry catches up or catches on.

Read more at SHTFplan.com

n/a

n/a
Jun 08 15:21

Military Secretive About GPS Blackout Over California: “Testing Something That Disrupts GPS Over a Huge Area”

The U.S. military is planning a series of tests near the West Coast that will result in GPS outages all across the area.

The FAA put out a notice warning about disruptions that may affect aircraft in general, and particularly those reliant upon GPS that testing based at the Navy’s China Lake Naval Weapons Center, some 150 miles north of Los Angeles during June 9, 21,23, 28 and 30.

Read more at SHTFplan.com

Jun 08 14:54

Day 8 No Money on EBT Cards – Riots Next? – Get Prepared!

It interesting over the weekend I got several emails telling me about cell phones being down, internet being down, and get this, EBT cards not working and having no money associated to them.

This is a concern because when the US Government has payment failures, then there is possibly something happening that the press is not telling you about.

Now, we know that computers have problems and that states, counties and cities run on computers. But what is interesting is that since the beginning of 2016, The US government has had over 2,700 reports on downdetector.com showing that they have been late loading the money onto these EBT cards.

Folks, we are now going on 8 days where the Government has not paid the EBT payments so that people have food.

Why is this?

Are we looking a possible Venezuela event taking place here in the US?

n/a

SHARE THIS ARTICLE WITH YOUR SOCIAL MEDIA