COMPUTERS/INTERNET/SECURITY | WHAT REALLY HAPPENED


COMPUTERS/INTERNET/SECURITY

Apr 04 08:25

Swiss man faces defamation trial for ‘liking’ Facebook posts

A Swiss man is on trial for ‘liking’ Facebook posts that accused an animal rights activist of racism and anti-Semitism. The prosecution has accused him of defamation in the landmark case.

The 45-year-old defendant from Zurich is facing charges after becoming involved in an online argument within the animal rights community – by merely ‘liking’ eight Facebook posts.

Apr 04 07:55

Cyborgs at work: employees getting implanted with microchips

The syringe slides in between the thumb and index finger. Then, with a click, a microchip is injected in the employee's hand. Another "cyborg" is created.

What could pass for a dystopian vision of the workplace is almost routine at the Swedish startup hub Epicenter. The company offers to implant its workers and startup members with microchips the size of grains of rice that function as swipe cards: to open doors, operate printers, or buy smoothies with a wave of the hand.

The injections have become so popular that workers at Epicenter hold parties for those willing to get implanted.

Apr 04 07:45

Denmark Proves We Don't Need the FCC

The Danish reputation got a boost among the American left in last year's presidential election, when none other than Bernie Sanders himself plugged the country as a model for the United States to emulate. But admirers of the popular democratic socialist politician may be surprised to learn exactly how Denmark was able to become an international leader in ICT delivery. It wasn't super-charged regulation, top-down "net neutrality" rules, or major government subsidies that did the trick.

So how did Denmark do it? Deregulation. By virtually eliminating their equivalent of the Federal Communications Commission (FCC), Danes now enjoy some of the best ICT service on the planet.

Apr 04 07:38

Wi-Fi sex toy with built-in camera fails penetration test

Sex toy designer Svakom decided that a vibrator needed a camera on the end, and it also needed a Wi-Fi access point – with the utterly predictable result that the device is hackable.

Pen Test Partners – these jokes just write themselves, really – took a look at the device, and the researchers probably wish they hadn’t, because the Svakom Siime Eye is an early favourite for a hypothetical 2017’s Worst Internet-of-S**t Product award.

Looking at the Android app, Pen Test Partners’ (PTP’s) researchers first turned up “some hard-coded credentials, and a hard-coded IP address and port.”

The hard-coded credentials, admin:blank, make it “trivial” to connect to the dildo’s Web admin interface, PTP writes, and even better – the Web app serves the video from the camera, and because it’s an access point, an attacker within range can identify users.

It gets worse.

Apr 04 07:08

Amazon is a destroyer of jobs and the merchant economy

If this is progress, just how much more can our economy afford? The myth of cheap prices, conveniently seldom factors in the structural costs to society. Building an all inclusive monopoly based upon minimal employees and predatory prices ignores the long anti-trust history that helped create the middle class.

Apr 03 16:08

Europe supplants US as biggest source of child abuse hubs

Europe now hosts majority of child sex abuse images (60 per cent), pushing North America into second place (37 per cent), according to an annual report from the Internet Watch Foundation (IWF).

In contrast, UK now hosts less than 0.1 per cent of child sexual abuse imagery globally, something IWF credits as down to a "zero tolerance approach" by the UK internet industry.

The majority of all child sexual abuse URLs identified globally in 2016 (92 per cent) were hosted in five countries: the Netherlands (37 per cent), the United States (22 per cent), Canada (15 per cent), France (11 per cent), and Russia (7 per cent).

The biggest increase seen was in the Netherlands, which went from hosting 12,703 abuse URLs to 20,972.

Apr 03 16:03

Drive-by Wi-Fi i-Thing attack, oh my!

Apple hasn’t provided much detail, but you don’t want to ignore the latest iOS release – 10.3.1 – because it plugs a very nasty Wi-Fi vulnerability.

Cupertino has rushed out the emergency patch because: “An attacker within range may be able to execute arbitrary code on the Wi-Fi chip” – meaning, presumably, that malicious packets gave attackers a vector.

The fix for the bug, which Apple attributes to Gal Beniamini of Google’s Project Zero, was a buffer overflow fixed by better input validation.

The bug affected iPhone 5 and later, iPad 4th generation and later, and iPod touch 6th generation and later.

Apr 03 13:51

BOOGA BOOGA! Nuclear Power Plants On Alert Following Credible Cyber Threats: “Terrorists May Have Developed Ways Of Bypassing Safety Checks”

The global cyberwarfare scare washed ashore the British isles this weekend after UK nuclear power stations and airports were told to tighten defenses against terrorist attacks in the face of increased threats to electronic security systems, after intelligence agencies concluded terrorists could plant explosives in laptops and mobile phones that won’t be caught by normal security screenings.

Apr 03 12:09

Google Blood Money

A Mail on Sunday investigation today exposes how Google has cashed in on a sickening YouTube video that shows viewers how to kill someone in a stab vest like the one worn by PC Keith Palmer when he was murdered in the Westminster terror attack.

Apr 03 09:42

Fmr. FBI Asst. Director: Farkas Exposed ‘Conspiracy Cabal’ on Trump Surveillance

Evelyn Farkas, former deputy assistant secretary of defense, left the government in 2015 and now works as a fellow at the Atlantic Council. She told Brezinski that she urged her former colleagues to “preserve” the intelligence.

“It was more actually aimed at telling the [Capitol] Hill people, ‘Get as much information as you can and get as much intelligence as you can before President Obama leaves the administration,’ because I had a fear that somehow that information would disappear with the senior people who left,” she said. “So it would be hidden away in the bureaucracy.”

Just in case there was any ambiguity, Farkas made clear her concern was the incoming Trump administration.

Apr 03 09:33

DUBAI POLICE ARREST HACKERS WHO BROKE INTO "HIGHLY CONFIDENTIAL" WHITE HOUSE EMAILS

In a development that could have substantial implications to the ongoing "Russia hacked the US elections" narrative, United Arab Emirates media reports that Dubai police have arrested a group of foreign hackers that targeted five White House officials in an email blackmail scheme.

The Arabic-language Al Bayan newspaper and the television channel Dubai One reported the arrests on Monday according to AP. Dubai police did not answer repeated calls for comment.

The Al Bayan quoted Maj. Saud al-Khalidi of Dubai police as saying an "African gang", broke into the emails of the five senior officials and "got highly confidential information." He said the U.S. asked Dubai police for assistance. Al-Khalidi said that investigators tracked down the gang to an apartment in the emirate of Ajman and arrested three suspects. Those arrested are between 24 and 26 years of age and had a list of "5 million bank accounts," as well as hacking software and millions of dollars in assets, he said.

Webmaster's Commentary: 

How in the world could the emails of these US officials be so compromised that these hackers could get into them?!?!?!?

And what in the world would have have these specific White House officials so blackmailable?!?

Apr 03 09:20

Detailed Review Of DHS/FBI ‘Evidence’ Shows Russia Hacking Is Fake News

On December 29, 2016, the Hill posted an article discussing a 13 page report by the FBI and DHS claiming that their 13 page report was “evidence” of Russian hacking in US elections.
http://thehill.com/policy/national-security/312132-fbi-dhs-release-rep...

Wikileaks has repeatedly stated that the source of its leaks was a disgruntled Democratic Party insider.
http://www.dailymail.co.uk/news/article-4034038/Ex-British-ambassador-...

However, President Obama issued a press release on December 29 2016 using the DHS-FBI report to justify increasing sanctions against Russia.
https://www.whitehouse.gov/the-press-office/2016/12/29/statement-presi...

Apr 03 08:04

Dubai police say they arrest hackers after White House staff

State-owned media in the United Arab Emirates are reporting that Dubai police have arrested a group of foreign hackers that targeted five White House officials in an email blackmail scheme.

The Arabic-language Al Bayan newspaper and the television channel Dubai One reported the arrests Monday. Dubai police did not answer repeated calls for comment.

Al Bayan quoted Saud al-Khalidi of Dubai police as saying an "African gang" broke into the emails of the five senior officials and "got highly confidential information." He said the U.S. asked Dubai police for assistance.

Al-Khalidi was quoted as saying investigators tracked down the gang to an apartment in the emirate of Ajman and arrested three suspects.

Webmaster's Commentary: 

Did someone set up these patsies to lay a false bugging trail away from Obama?

Apr 03 08:03

Reg now behind invisible HTML5 Bitcoin paywall

Readers will be aware that these are tough times for the media. And The Register is no exception: like many other publishers we need to diversify our revenue base.

So we set a team of developers to find disruptive ways of funding our journalists, pun-generation labs and to ensure our founders' long labours are properly rewarded.

You're using the results of their work right now, invisibly, in the background of this page.

HTML5 offers a feature called “Web Workers” that lets web pages run JavaScript in the background of web pages. Those scripts have nothing to do with the user interface and can be invisible to users, other than the fact they consume some processor cycles.

The Register has used Web Workers to create a distributed bitcoin mining operation.

Apr 03 07:41

Trump praises 'bombshell' report on 'unmasking and the crooked scheme against us' as fingers point to 'very senior' Obama administration official

President Donald Trump drew the world's attention on Monday to 'amazing reporting' from Fox News that suggests the Obama administration spied on him before last year's election.

Apr 03 07:40

Android apps are 'secretly colluding' to spy on the private lives of MILLIONS of users 

Android apps are 'secretly colluding' to share information with one another without asking for permission, new research has found.

This data sharing could lead to security breaches with user location, contact details and other private information at risk.

Apps designed around the personalisation of ringtones, widgets, and emojis are the most at risk, the researchers said.

Apr 03 07:36

WikiLeaks founder Julian Assange avoids eviction from Ecuador embassy as left-wing presidential candidate claims victory

WikiLeaks founder Julian Assange dodged an eviction order in Ecuador's Sunday election, after the right-wing candidate who had vowed to kick him out of the country's London embassy was set to narrowly lose a presidential election.

Apr 02 12:04

Google has been recording your conversations and logging your history for future use

It’s no surprise to most that we are being spied on regularly now by many agencies in both the private and governmental sectors.

Find out how to stop it.

Apr 02 09:18

Spicer Skewers Media For Defending Dr. Farkas, Calls Her Public Admissions of Collecting Intelligence on Trump 'Devastating'

In today's press conference at the White House, Sean Spicer shifted the conversation away from the nothing-burger of who told Chairman Nunes about the Trump team being surveilled by the Obama administration to the public comments made by Dr. Farkas -- the former Deputy Assistant Secretary of Defense specializing in Russia, who said "get as much information as you can" to persons inside the intelligence apparatus -- for the purposes of preserving intel on the Trump team in an effort to hide it from the incoming administration.

Spicer called her comments alone 'devasting' and posited the notion that had the media been treating the Trump administration fairly, they'd be more concerned with the intelligence leaks coming out of the Obama administration -- surveilling Trump and his team -- for reasons that are, indelibly, unclear.

Apr 02 08:31

New Study Finds That Six Jobs Are Lost for Every Robot Added to the Workforce

A new paper from the National Bureau of Economic Research presents sobering statistics that illustrate the impact automation is already having on the workforce, noting that each industrial robot introduced between 1990 and 2007 lead to the loss of 6.2 jobs.

Apr 02 08:14

Shaffer: Trump Wiretap Case 'Worse Than Watergate'

Former CIA officer Col. Tony Shaffer said the basics of President Trump's claim to have been "wiretapped" are likely true, and that the incident is "worse than Watergate."

Noting it has been exactly two weeks since Trump tweeted that President Obama wiretapped his namesake tower, Shaffer said the "basic fundamental idea and claim is true."

Apr 02 08:12

PETITION - Demand DNC Allow FBI to Examine Allegedly Hacked Servers, Now!

If Russia hacked DNC servers, why hasn't the DNC given these computer servers to the FBI for analysis?

According to The Hill "FBI never examined hacked DNC servers itself: report" and "no U.S. intelligence agency has performed its own forensics analysis on the hacked servers." http://thehill.com/policy/national-security/312767-fbi-never-examined-...

According to CNN "DNC rebuffed request to examine computer servers" and "The Democratic National Committee "rebuffed" a request from the FBI to examine its computer services after it was allegedly hacked by Russia during the 2016 election."
http://www.cnn.com/2017/01/05/politics/fbi-russia-hacking-dnc-crowdstr...

Apr 02 08:11

A Cyber-Gulf of Tonkin

The “cyber-security” firm that everyone is depending on to make the case for Russia’s alleged “hacking” of the 2016 presidential election, CrowdStrike, has just retracted a key component of its analysis – but the “mainstream” media continues to chug along, ignoring any facts that contradict their preferred narrative.

As Voice of America – hardly an instrument of Russian propaganda! – reports:

“U.S. cybersecurity firm CrowdStrike has revised and retracted statements it used to buttress claims of Russian hacking during last year’s American presidential election campaign. The shift followed a VOA report that the company misrepresented data published by an influential British think tank.”

Apr 02 08:07

What Are Laboratory Rats Indicating About Wi-Fi Exposures The High Tech Industries Deny?

By Catherine J. Frompovich

Wi-Fi (Wireless Fidelity) is everywhere: Planes, trains, schools, workplaces, cafés, and even doctors’ offices, which I find quite unfathomable, since those microwave frequencies are harmful to the brain, i.e., one of the non-thermal radiation wave adverse health effects the industry’s associations, e. g., ICNIRP, deny but falsely promote as safe, in my opinion.

Microwave energies are in the gigahertz (GHz) range—think microwave ovens! Would you leave your microwave oven door open while it is cooking dinner? Then, apply that same logic to the exposures you experience in all the places stated in the paragraph above. We are living in a sea of unfettered microwave exposures which are not safe for the human brain...

Apr 01 10:03

Lawyers bringing defamation lawsuit against BuzzFeed use clickbait headline in official court document

Lawyers bringing a defamation claim on behalf of a Russian businessman against news website BuzzFeed have included a clickbait-style headline in an official court document.

Earlier this year, BuzzFeed published a leaked dossier about President Donald Trump’s relationship with Russia. Containing a number of unverified and salacious allegations, the report also seemingly falsely claimed that Aleksej Gubarev — a Russian technology executive — was involved in Russian hacking against the Democratic Party.

Unhappy that he had been name-checked in the report, Gubarev, via his Boston-based lawyers — Evan Fray-Witzer, Valentin Gurvits and Brady J. Cobb — commenced legal action against the media giant.

Apr 01 09:56

Tapping President Trumps Wires – A Spy Hunters Perspective PDF

On March 4, 2017, President Donald Trump, the 45th President of the United States, penned the following Tweet: “March 4 Early Saturday morning, while away at his Mar-a-Lago estate in Florida, Trump fired off his first tweet accusing Obama of wiretapping his phones at Trump Tower in New York during the election.”

That twitter message has spawned a daily furor of sound bites in the news media describing in great detail the denials, spins, double talk, within the ambit of congressional “concern”. Although when John LeCarre chose to use the word “circus” to describe the highest echelon of Britain’s MI6, it’s secret intelligence service, it is doubtful that he envisioned the acute relevance “circus” has today to describe the Alice in Wonderland drama being presented in the media regarding President Trump’s tweet.

Apr 01 09:51

URGENT: I'm probably fired and I have the biggest story in the world right now

Webmaster's Commentary: 

I am not sure this is the best approach to the problem that Lee could have done, but he does reveal that the issue of the DNC servers is a touchy one, even for Breitbart!

Apr 01 08:47

YouTube Caught Silencing... The Young Turks Critics? | Louder With Crowder

Apr 01 08:14

Google Acquiring Spotify In $41.1 Billion Cash, Equity Deal

Google is now planning to acquire Spotify in a deal valued at roughly $41.1 billion in cash and equity.

The acquisition, first reported by the Wall Street Journal this morning, creates a clear frontrunner in the music subscription space. It would also give Google a massive edge over competitors like Apple Music.

Apr 01 08:00

Verizon to pre-install a ‘Spyware’ app on its Android phones to collect user data

If the death of online privacy rules wasn’t enough for Internet Service Providers and advertisers to celebrate, Verizon has planned to pre-install spyware on customers’ Android devices in order to collect their personal data. The telecom giant has partnered with Evie Launcher to bring a new application called ‘AppFlash‘ — a universal search bar that will come pre-installed on the home screens of all Verizon Android handsets for quickly finding apps and web content.

Apr 01 04:29

Censorship Lie: "CEOs Complained about Ad Placement" (CIA kills Web Speech)

Since nobody watches TV anymore, TV is useless — it cannot control us with propaganda if nobody watches it. Thus, the Deep State needs a NEW pipeline to carry their venom and lies.

The only remaining pipeline is the internet — so the Deep State is evicting free thinkers from YouTube / Facebook / Twitter to make room for CNN and FOX web streaming.

Mar 31 11:07

Open-source developers targeted in sophisticated malware attack

Attackers have targeted developers present on GitHub since January with an information-stealing program called Dimnie

Webmaster's Commentary: 

Cio bono? Think about who hates the open-source movement.

Mar 31 10:10

Latest WikiLeaks release shows how the CIA uses computer code to hide the origins of its hacking attacks and 'disguise them as Russian or Chinese activity' 

WikiLeaks has published hundreds more files today which it claims show the CIA went to great lengths to disguise its own hacking attacks and point the finger at Russia, China, North Korea and Iran.

The 676 files released today are part of WikiLeaks' Vault 7 tranche of files and they claim to give an insight into the CIA's Marble software, which can forensically disguise viruses, trojans and hacking attacks.

WikiLeaks says the source code suggests Marble has test examples in Chinese, Russian, Korean, Arabic and Farsi (the Iranian language).

Mar 31 10:04

PayPal bans Brother Nathanael Kapner

Webmaster's Commentary: 

I thought we were past this nonsense!

Mar 31 09:51

Gizmodo found what looks to be FBI Director James Comey’s Twitter account

Either way, this shows how difficult it is to maintain bulletproof operational security.

Webmaster's Commentary: 

I would hope the FBI knows better than to communicate work-related info over social media!

But if they are, they are welcome to copy, modify, and use my NSA-proof encryption! :)

Mar 31 09:47

WHAT ARE LABORATORY RATS INDICATING ABOUT WI-FI EXPOSURES THE HIGH TECH INDUSTRIES DENY?

One of the recently published papers cited is “The effect of Wi-Fi EMF on object recognition tasks in male rats” Hassanshahi A, Shafeie SA, Fatemi I, Hassanshahi E, Allahtavakoli M, Shabani M, Roohbakhsh A, Shamsizadeh A. The effect of Wi-Fi electromagnetic waves in unimodal and multimodal object recognition tasks in male rats. Neurol Sci. 2017 Mar 22. doi: 10.1007/s10072-017-2920-y. [Epub ahead of print], which has remarkable findings that must be considered as to how they apply to human brains and behavioral tendencies, including interferences with or lack thereof, in view of Wi-Fi gigahertz EMF (electromagnetic frequency) exposures.

Why should everyone be concerned about Wi-Fi and GHz? Well, in the Hassanshahi et al article mentioned above, the rats developed cognition problems from Wi-Fi exposure, which should not be taken lightly or pushed under medical or scientific carpets!

Quoting from the Abstract of that published paper:

Mar 31 09:46

How to identify hidden cameras in private places

Webmaster's Commentary: 

Teensy cameras hidden inside innocuous objects are not great for security. What is best is a big honkin' too-big-not-to-notice camera that lets a potential intruder know they are being watched before they try to break in! (And yes, in the wake of the theft of my car and other crimes that have hit our area, we got together with our neighbors and put up a video surveillance system that watches each others' houses.)

As a side note, you can find devices similar to "spy finder" on eBay for a lot less money, and many include an RF detector as well.

Mar 31 09:40

Smile! You’ve just been identified by face recognition technology

Imagine a world where, as you drive into — or even walk through — New York City, your face is scanned and compared to a list of suspected terrorists or other serious criminals. Would this make you feel safe?

Now, imagine that the technology is error-prone, and may misidentify innocent people as suspects. What about now?

These are not rhetorical questions. New York is in the early stages of acquiring state-of-the-art face recognition technology to scan the faces of all drivers commuting between the boroughs of New York City.

The New York Police Department is already using face recognition to investigate crimes, and has done so since 2011. As of last year, its facial identification unit had conducted “more than 8,500 facial recognition investigations, with over 3,000 possible matches, and approximately 2,000 arrests,” according to a former NYPD official who helped establish the unit.

Webmaster's Commentary: 

Even if one doesn't have an overdue library book, one has reason to pause over a technology which could snare an absolutely innocent person as a criminal due to faulty software, identifying that person as a criminal.

Psychiatrists in New York may see a sudden uptick in agoraphobia, where people are literally afraid of going outside, for fear of being mistaken for a criminal.

But then again, this technological development dovetails nicely with the US government backsliding into Code Napoleon Law, where people were considered guilty until proven innocent.

Mar 31 09:31

THE PRIVATE CONTRACTORS USING VAULT 7 TOOLS FOR US GOV: US INTEL NEEDS A GROUND-UP REBUILD PART 1

He has been cited and republished by various academic blogs including Defending History, Michael Hudson, SWEDHR, Counterpunch, the Justice Integrity Project, among others.

The Vault 7 exposé by WikiLeaks neglected to mention the most important part of the disclosure. Sure, the CIA has all these tools available. Yes, they are used on the public. The important part is; it’s not the CIA that’s using them. That’s the part that needs to frighten you.

The CIA, by the definition of its mission, cannot use the tools in Vault 7, and definitely not on Americans. All the tools are unclassified, open-source, and can be used by anyone. It makes them not exactly usable for secret agent work. That’s what makes it impossible for them to use Vault 7 tools directly. Because of the possible exposure for the agency, use of the tools was farmed out.

Webmaster's Commentary: 

To the attackers constantly hacking Mike's site, because he will not stand for a government agenda which is not in the interests of We the People; he will always outsmart you, and figure out what you are doing differently to have caused his site to crash, and fix it.

And ultimately, because you are not on the right side of history, you will fail.

Mar 31 09:16

Hackers Post Fake Event Page on Hollande’s Facebook Account

The invitation to attend an "Hollande farewell party" on May 7 appeared on the president’s Facebook page on Thursday and the event announcement remained visible for at least an hour before it was removed, BFMTV said.

Mar 31 08:09

Bitcoin Payment System Can Help Revitalize Iran’s Economy: US Analyst

An American political analyst said the Bitcoin payment network can help the Islamic Republic of Iran develop both its domestic and foreign economy, adding that the system could “create many jobs” across the country...

Mar 31 08:05

WikiLeaks Reveals "Marble": Proof CIA Disguises Their Hacks As Russian, Chinese, Arabic...

"The source code shows that Marble has test examples not just in English but also in Chinese, Russian, Korean, Arabic and Farsi. This would permit a forensic attribution double game

Mar 30 15:39

Facebook Helps Pakistan Identify Thought Criminals

Facebook has signalled its intent to help Pakistan identify thought criminals even as one blogger faces the death penalty for the ‘crime’ of blaspheming against Islam.

The social media giant will work with the Pakistani government to block “blasphemous” content and has “already removed 85 per cent of anti-Islamic content from Pakistan in the last few weeks,” according to reports.

Mar 30 12:39

Credibility of Cyber Firm that Claimed Russia Hacked the DNC Comes Under Serious Question

This is nuts. Are all U.S. government agencies simply listening to what Crowdstike said in coming to their “independent” conclusions that Russia hacked the DNC? If so, that’s a huge problem. Particularly considering what Voice of America published yesterday in a piece titled, Cyber Firm at Center of Russian Hacking Charges Misread Data:

Mar 30 12:05

JAMES COMEY'S NEW IDEA: AN INTERNATIONAL ENCRYPTION BACKDOOR PARTNERSHIP

FBI Director James Comey is still pitching encryption backdoors, despite there being almost no one -- from the Intelligence Community to legislators around the world -- interested in what he's selling. Comey claims to be sitting on a pile of encrypted devices the FBI can't get into, even with help from outside contractors.

Mar 30 09:17

Democratic Rep: I Bought Underwear On The Internet Last Week

Mar 30 09:05

How many NSA spy hubs are scooping up your Internet data?

Not that knowing NSA's sigint locations will actually help you much...

Mar 30 08:52

Obama 'relaxed the rules on handling NSA intercepts of Americans to allow his aides to read intelligence reports'

Former President Barack Obama has been accused of relaxing rules on the handling of NSA intercepts to allow his aides to review intelligence reports.

Under the old set of guidelines the National Surveillance Agency routinely gathered signal intelligence and censored it before passing it on to other agencies.

But under the new rules, the raw data is passed on to other agencies who are then expected themselves to redact non-pertinent information concerning US citizens.

Because of the wide nature of the trawling involved, US citizens were routinely 'inadvertently' recorded communicating with foreign nationals who were being monitored.

Mar 30 08:23

FLASHBACK 2014 - Some experts question evidence North Korea is behind the Sony hack

Webmaster's Commentary: 

The media kept pushing "North Korea Hackers" on us, remember? Then it turned out it was an internal leak!

Mar 30 08:01

Prepare For Millions Of Jobs To Disappear Overnight Once Driverless Car And Robot & Drone Technology Perfected

Prime Air — a delivery system from Amazon designed to safely get packages to customers in 30 minutes or less using unmanned aerial vehicles, also called drones.

Mar 29 15:18

Digital Spies In Your Home

The Internet of Things is a buzz phrase for digital monitoring.

I am a fan of the IoT with respect to commercial enterprises such as airplane maintenance. But I will not let IoT consumer products into my home.

Mar 29 14:57

Internet Privacy Rules Removed By Congress

Internet providers will not be required to ask permission to sell customers’ browsing habits, including medical information, shopping habits and even pornography preferences after Congress voted to roll back Obama-era regulations.

Mar 29 11:05

What’s “Excessively Objectionable Or Crude” About This Antiwar App?

“Five years ago, I made a simple iPhone app. It would send you a push notification every time a U.S. drone strike was reported in the news. Apple rejected the app three times, calling it “excessively objectionable or crude content.”… —After 12 Rejections, Apple Accepts App

Mar 29 10:53

Twitter Might Now Be Censoring Drudge Report

A very troubling development noticed today on Twitter by Zerohedge should have everyone concerned:

IN AN EXTRAORDINARY DEVELOPMENT, WESTMONSTER HAS FOUND THAT THE WORLD FAMOUS DRUDGE REPORT HAS BEEN MARKED AS “SENSITIVE MATERIAL” BY TWITTER, WITH SOME USERS NOW HAVING TO OPT IN IN ORDER TO SEE TWEETS. HARDLY ANY TWEETS FROM DRUDGE WERE VISIBLE TODAY WHEN WE FIRST LOGGED IN.

Mar 29 10:34

iPhone users fooled by fake ransomware

Apple has issued an iPhone software update after reports of fake ransomware attacks where money was demanded in order to unlock the handset's browser.

A pop-up screen accused the phone owner of accessing illegal pornography or pirating music and could not be removed.

However the ransomware was fake - and clearing the browser cache was actually enough to restore full access.

It ran on JavaScript, a code commonly employed by many websites.

The attackers demanded £100 in the form of an iTunes gift card with the code sent via text message to a designated mobile number, said security firm Lookout in a blog about the malware.

Mar 29 09:26

WHERE I GOT MY RASPBERRY PI !

Webmaster's Commentary: 

This is the eBay seller I purchased my Raspberry Pi Zero kit from. I paid about $30 for it, which is amazing, but the more powerful versions run up closer to $100.

This Pi is fun. It reminds me of how I felt about computers when they first came out.

A note of caution: This is not for someone who expects a computer to do office work on. It can be used for that, but is really intended for computer hobbyists who want to "talk to the metal."

Here are some projects people are doing with the Pi!

Mar 29 09:17

20 awesome projects for Raspberry Pi

The DIY dream

Raspberry Pi — a tiny, stripped-down $35 computer — hit the market in 2011 with the intention of helping promote basic computer science skills in schools. It has become the DIY gadget-maker's go-to device. Tinkerers, hobbyists, educators and students — basically anyone who likes to build things — have taken to the Internet with project after project utilizing the Raspberry Pi.

In early 2015, a second generation, the Raspberry Pi 2, was introduced. And now it celebrates another milestone: 10 million units sold. To mark the occasion, the Raspberry Pi Foundation has launched a "Pi-in-a-Box" starter kit to get even more of us to learn about and use the low-cost computer. It'll go on sale in the U.K. for £99 and hit other markets soon.

Mar 29 09:15

The 265 members of Congress who sold you out to ISPs, and how much it cost to buy them

Republicans in Congress just voted to reverse a landmark FCC privacy rule that opens the door for ISPs to sell customer data. Lawmakers provided no credible reason for this being in the interest of Americans, except for vague platitudes about “consumer choice” and “free markets,” as if consumers at the mercy of their local internet monopoly are craving to have their web history quietly sold to marketers and any other 3rd party willing to pay.

Mar 29 09:15

"Something Stinks Here" - CrowdStrike Revises, Retracts Parts Of Explosive Russian Hacking Report

Last week, I published two posts on cyber security firm CrowdStrike after becoming aware of inaccuracies in one of its key reports used to bolster the claim that operatives of the Russian government had hacked into the DNC. This is extremely important since the DNC hired CrowdStrike to look into its hack, and at the same time denied FBI access to its servers.

Here’s the problem. Yes, the FBI has agreed with CrowdStrike’s conclusion, but the FBI did not analyze the DNC servers because the DNC specifically denied the FBI access. This was noteworthy in its own right, but it takes on vastly increased significance given the serious errors in a related hacking report produced by the company.

Mar 29 09:13

10 surprisingly practical Raspberry Pi projects anybody can do

Most of the Raspberry Pi coverage you’ll see around the web focuses on the more fantastical projects—magic mirrors, portable gaming handhelds, intelligent drones, and so forth. And for good reason! Those maker masterpieces show what sort of power the $35 mini-PC is capable of in the hands of someone with a little imagination and a bin full of spare electronics.

But most people won’t use the Raspberry Pi to whip together crazy creations.

In honor of Pi Day and the recent releases of the supercharged Raspberry Pi 3 and dirt-cheap Raspberry Pi Zero, we’re digging into the more practical projects possible with the Raspberry Pi, from media streaming to extending the range of your Wi-Fi network. It’s time to put that $35 computer to real work.

Mar 29 09:09

MISSION CREEP: GOOGLE HOME DEVICE COULD ALLOW GOVERNMENT TO LISTEN IN ON PRIVATE CONVERSATIONS

A professor at the University of Texas thinks that “mission creep” could one day lead to the government listening in on private conversations in people’s homes via the new Google Home device.

Google Home is a newly launched wi-fi connected “smart speaker” that responds to voice commands with relevant information via a virtual speaking assistant. The device is a rival to Amazon Echo, which performs many of the same functions.

According to Dr. Philip Doty, associate dean of the School of Information at the University of Texas, privacy advocates are right to be concerned, especially in light of revelations that the CIA allegedly hacked Samsung Smart TVs to record private conversations.

“We now have a third party presence which not only can listen to us but can record us and share that information with retail giants, with third party information brokers and potentially with government,” Professor Doty told KXAN.

Webmaster's Commentary: 

the answer is simple; just don't buy the unit, or anything like it, and let these devices become the Edsels of the 21st century!!

Mar 29 08:53

THE TRANSFORMATION OF OUR NATION INTO A SURVEILLANCE STATE IS ALMOST COMPLETE

The headlines are awash with the recent tensions with North Korea, and most are focused intently upon this act of the play that has been running hot for several years, now. Akin to the proverbial frog in cold water, however, we are not paying as much attention to the surveillance state that is continuing to wrap its tentacles around us. Eurasia is our ally, Eastasia is our enemy…and nobody notices that the chocolate ration has been diminished. While everyone focuses on what is reported in the headline news, everybody misses what is happening right before their eyes.

Webmaster's Commentary: 

There are moments when I wish to heaven that Mike and I could immigrate to somewhere normal; unfortunately, at our age, and with our finances, that option will remain impossible for us.

Mar 29 08:40

DOT CREATING A NATIONWIDE SPYING DATABASE OF EVERYONE'S CELL PHONES, BLUETOOTH DEVICES AND LICENSE PLATES

A recent article in the Marin Independent Journal, reveals how Transportation Authorities (DOT's) across the country, are secretly spying on everyone's cellphones, GPS devices and Bluetooth devices. They claim spying is cheaper than other alternatives..

A new study using data collected from mobile devices, details the increasing flow of vehicles into Marin from the East Bay and San Francisco. The DOT claims that "only mobile signals are tracked, not the user’s identity."

Don't believe it.

Spying on motorists electronic devices is cheaper

The Transportation Authority of Marin (TAM) also claims that spying on everyone's cell phones, Bluetooth connected devices and license plates is cheaper than mail surveys.

Webmaster's Commentary: 

In an obvious, frontal assault on the 4th Amendment to the Constitution, which prevents unreasonable search and seizure against the US's citizens, this approach will NOT keep the American people safe from harm's way.

This creates "data overload", where information cannot be useful, because there is just too much of it to make any sense, and the baddies have already encrypted their communications to the point where the US government's "alphabet soup" cannot decrypt it.

Mar 29 08:03

Cyber Firm Rewrites Part of Disputed Russian Hacking Report

U.S. cybersecurity firm CrowdStrike has revised and retracted statements it used to buttress claims of Russian hacking during last year's American presidential election campaign. The shift followed a VOA report that the company misrepresented data published by an influential British think tank.

Webmaster's Commentary: 

The Hillary campaign, the DNC, and the corporate media, all cited the Crowdstrike report as absolute unassailable proof Russia hacked the DNC computers, even though the Hillary campaign had refused to allow the FBI or anyone else access to the servers to verify the claim.

Oops!


Mar 29 07:52

Disastrous National Security Breach in U.S. Congress.

The Awans set up an external server and copied information from Congressional computers to their off-site server.

Mar 29 07:35

Your online privacy protections just got killed

The House of Representatives voted Tuesday to repeal Internet privacy protections

Mar 29 06:56

'Trash-80' escapes the dustbin of history with new TRS-80 emulator

Run the classic Model III on Windows

Mar 29 06:54

Strange Mirai botnet brew blamed for powerful application layer attack

Hackers have created a potent new variant of the Mirai IoT malware.

The latest variant is capable of launching application layer attacks rather than simply flooding targeted sites with junk traffic. The new botnet has already been used to hit a US college with a two-day-long attack late last month, DDoS mitigation outfit Imperva Incapsula reports.

The public availability of the Mirai source code has led to hackers to experiment with different variants of the malware over recent months. The latest variant is far from the first such variant but is nonetheless noteworthy because of its potency.

Mar 28 17:07

Hillary’s State Department was wrapped up with allegations of sexual misconduct, pedophilia, and cover-up: Report

According to the NBC’s Today, State Department internal memos suggest that the department, during Hillary Clinton’s tenure, may have “called off or interviewed an investigation” into sexual misconduct and even pedophilia.

Mar 28 16:20

The Raspberry Pi is now the third best-selling computer of all time

The Raspberry Pi is now the third best-selling general purpose computer of all time, MagPi magazine says, edging out the Commodore 64 in the all-time rankings. Over 12.5 million DIY boards have been shifted in the last five years.

The top two in the list are, as you might expect, the PC and the Mac - but even if the Raspberry Pi has little hope of ever overtaking those two computing juggernauts, it's still a huge achievement for the basic little system.

Mar 28 16:06

Alabama bill would require porn filters on all Internet devices

The bill by Williams would make it a Class A misdemeanor, punishable by up to one year in jail, to sell an Internet access device without a filter to block out obscene material, child pornography, “images used for sexual cyberharassment” or sites used for prostitution or human trafficking. Selling a device without a filter to a minor would be a Class C felony, punishable by one to 10 years in prison.

Filters would be “active” and could be turned off only after the $20 state fee is paid. The seller could charge an additional fee for deactivation as well.

Mar 28 16:02

Potent LastPass exploit underscores the dark side of password managers

Developers of the widely used LastPass password manager are scrambling to fix a serious vulnerability that makes it possible for malicious websites to steal user passcodes and in some cases execute malicious code on computers running the program.

The flaw, which affects the latest version of the LastPass browser extension, was briefly described on Saturday by Tavis Ormandy, a researcher with Google's Project Zero vulnerability reporting team. When people have the LastPass binary running, the vulnerability allows malicious websites to execute code of their choice. Even when the binary isn't present, the flaw can be exploited in a way that lets malicious sites steal passwords from the protected LastPass vault. Ormandy said he developed a proof-of-concept exploit and sent it to LastPass officials. Developers now have three months to patch the hole before Project Zero discloses technical details.

Mar 28 14:03

Twitter Censors Search Terms, Offers No Transparency and Mixed Results

Twitter has upped its censorship game and is now blocking certain terms from showing up on the platform’s built-in search engine. The added filters are part of the company’s plans to reduce harassment on the service. Some of these filters were deployed earlier this month when users were given the option to mute certain types of accounts.

Mar 28 10:44

Border searches of electronic devices prompt FOIA lawsuit against Trump administration

Dramatic increase in border searches of electronic devices prompt FOIA lawsuit against Trump administration
A group of First Amendment attorneys has filed suit against the federal government after a surge in electronic device data searches at US border crossings.

On Monday, the the Knight First Amendment Institute (KFAI) at Columbia University filed a Freedom of Information Act (FOIA) lawsuit against the Department of Homeland Security (DHS) and Immigration and Customs Enforcement (ICE), seeking “statistical, policy, and assessment records regarding the government’s searches” involving electronic devices.

Mar 28 08:41

This Map Will Show If Your Web Traffic Passes Through an NSA Listening Post

IXmaps wants to “make visible the secret, dangerous, often illegal forms of surveillance that are increasingly becoming part of everyday life.”

Internet data pinballs across national borders, and for Canadians this means potentially exposing it to eavesdropping by US-based corporations and the National Security Agency.

Now, an interactive mapping tool named Internet Exchange Mapping (IXmaps), re-launched for public use today, will show you how—and how easily—you data can be spied on by tracing the oftentimes byzantine routes data takes when traversing the internet.

Mar 28 07:54

Apple iCloud hack threat gets worse: Here's what we've learned

Hackers are threatening to remotely wipe an unknown number of iPhones, iPads, and Macs unless Apple pays a ransom. The picture is becoming clearer. This is what you need to know.

Webmaster's Commentary: 

This threat, if carried out, will cause millions if not billions in damage to Americans' productivity. Clearly this is a real threat.

So .... where is the NSA? Isn't it their job to protect the IT infrastructure?

Mar 28 07:42

Trump was wiretapped "a zillion times"And so were you

Computer expert Dennis Montgomery developed software programs that could breach secure computer systems and collect massive amounts of data.

That system, THE HAMMER, according to the audio tapes, accessed the phone calls, emails and bank accounts of millions of ordinary Americans.

The tapes also reveal that the Foreign Intelligence Surveillance court (FISA), Supreme Court Chief Justice John Roberts, 156 other judges, members of Congress, and Donald J. Trump were targeted by the HAMMER.

One of the audio tapes made public by Federal Judge G. Murray Snow revealed that Brennan and Clapper particularly targeted and wiretapped Donald Trump a “zillion times.”

Mar 28 07:41

Microsoft faces new class-action lawsuit over its Windows 10 upgrade policy

Multiple Illinois residents have sued Microsoft over its Windows 10 upgrade program. They allege the company’s invasive upgrade practices cost them time, money, and substantial inconvenience by forcing them to deal with various unhelpful Microsoft tech support options, upgrades that were installed without the user understanding that they had an option to avoid it, and in some cases, loss of data or hardware functionality resulting from compatibility issues that Microsoft’s Windows 10 upgrade wizard failed to detect.

The class-action lawsuit against Microsoft claims more than 100 members collectively seeking $5 million in damages excluding cost and interest.

Webmaster's Commentary: 

Count me in!!!!!!!!!

Mar 28 07:38

World+dog had 1.4 BEEEELLION of its data records exposed last year

Almost 1.4 billion data records were compromised worldwide during 2016, a whopping increase of 86 per cent compared to the year before.

Mar 28 07:36

Hacker targeting Palestine Solidarity Campaign claimed to be Mossad

Whoever was behind a cyber attack on the UK’s Palestine Solidarity Campaign earlier this month defaced its social media in the name of an Israeli spy agency, it has emerged.

The attack was reported to police, the campaign said in a statement.

A spokesperson for the campaign has provided The Electronic Intifada with new details about the attack.

Mar 28 03:50

Digital Spies in Your Home (Not Mine)

I have no need to control my appliances by voice command. I have no need to monitor them. I am not going to pay for the privilege of having government agencies and private companies invade my home and record my activities. I suggest you adopt the same attitude.

Mar 27 18:50

Uber’s autonomous cars drove 20,354 miles and had to be taken over at every mile, according to documents

During the week ending March 8, the 43 active cars on the road only drove an average of close to 0.8 miles before the safety driver had to take over for one reason or another.

This metric, called miles per intervention, includes all the times drivers have had to take back control from the system over the course of a week.

The reasons for these interventions can vary, but that can include navigating unclear lane markings, the system overshooting a turn or driving in inclement weather. The stat excludes “accidental disengagements, end-of-route disengagements and early takeovers.”

...

Then there’s what the company calls “critical” interventions. This is how many times a safety driver had to take over to avoid harmful events — incidents that would have resulted in a car hitting a person or causing more than around $5,000 in property damage if a driver didn’t take over.

Mar 27 15:22

Twitter Temporarily Censored Drudge Report Tweets Behind ‘Sensitive Content’ Filter

Earlier today, users on Twitter reported that tweets from the official account of the Drudge Report were being hidden from users behind a “sensitive content” filter.

A screenshot published on the British news site Westmonster revealed the filtering of the Drudge Report, one of the largest and highest-profile conservative sites on the web.

Mar 27 12:56

Is Twitter Now Censoring Drudge Report?

In an extraordinary development, Westmonster has found that the world famous Drudge Report has been marked as “sensitive material” by Twitter, with some users now having to OPT IN in order to see tweets. Hardly any tweets from Drudge were visible today when we first logged in.

Mar 27 12:41

FBI FACE RECOGNITION TECHNOLOGY HAS 'NO LIMITS,' CONGRESSIONAL HEARING REVEALS

If Congress doesn't take legislative action, the FBI's vast and growing facial recognition database could someday soon allow the government to track Americans' "every move" in a breathtaking, nationwide violation of the Fourth Amendment.

That was the takeaway of a scathing hearing in the Congressional Oversight Committee on the FBI's use of facial recognition technology last week.

In June, the FBI's use of such technology was the subject of a damning report from the Government Accountability Office (GAO), which revealed that the agency's use of the technology was much more far-reaching than privacy advocates had suspected: 30 million photos are contained in the database, and the agency has access to hundreds of millions more—and the majority of subjects committed no crimes.

Mar 27 10:44

"They're Like The Praetorian Guard" - Whistleblower Confirms NSA Targeted Congress, The Supreme Court, & Trump

NSA whistleblower William Binney told Tucker Carlson on Friday that the NSA is spying on "all the members of the Supreme Court, the Joint Chiefs of Staff, Congress, both House and Senate, as well as the White House."

Binney, who served the NSA for 30 years before blowing the whistle on domestic spying in 2001, told Tucker he firmly believes that Trump was spied on.

"They're taking in fundamentally the entire fiber network inside the United States and collecting all that data and storing it, in a program they call Stellar Wind," Binney said.

"That's the domestic collection of data on US citizens, US citizens to other US citizens," he said. "Everything we're doing, phone calls, emails and then financial transactions, credit cards, things like that, all of it."

Mar 27 10:44

"Much Worse Than Watergate", Former CIA Officer Admits Trump 'Wiretapping' Likely True

The "political appointees" in the intelligence community knew exactly what they were surveilling for, former CIA officer Col. Tony Shaffer told Fox News, adding that the case is "much worse than Watergate by an order of magnitude."

Mar 27 10:43

The Evidence That Russia Hacked The DNC Is Collapsing

These alleged “hacker groups” are not associated with any known individuals in any way connected to Russian intelligence: instead, they are identified by the tools they use, the times they do their dirty work, the nature of the targets, and other characteristics based on the history of past intrusions.

Yet as Jeffrey Carr and other cyberwarfare experts have pointed out, this methodology is fatally flawed. “It’s important to know that the process of attributing an attack by a cybersecurity company has nothing to do with the scientific method,” writes Carr:

“Claims of attribution aren’t testable or repeatable because the hypothesis is never proven right or wrong. Neither are claims of attribution admissible in any criminal case, so those who make the claim don’t have to abide by any rules of evidence (i.e., hearsay, relevance, admissibility).”

Mar 27 06:12

iPhone-havers think they're safe. But they're not

Mobile malware is at the highest level yet recorded, infecting 1.35 per cent of all mobile devices in October, according to a study by Nokia out today. The high water mark in October compares to figures of 1.06 per cent in April 2016.

While Android smartphones and tablets remained the top mobile target (81 per cent), iOS-based devices were also affected, particularly through spyphone applications, in the second half of the last year (4 per cent). Spyphone surveillance software (sometimes marked as spousal or child monitoring tech) tracks a user's calls, text messages, social media applications, web searches, GPS locations or other activities.

Mar 26 09:40

BexAlert ~~ FACTCHECKING FAKE NEWS SITES

Way too much bull on the Net >>>>> BEWARE!

Webmaster's Commentary: 

In recent weeks there has been a noticeable increase in bovine excrement poured onto the internet to "jam" the discussions. The recent story about Vince Foster being exhumed is just one example. There are a whole bunch of newly-created websites spewing junk to try to damage the credibility of the independent media, and we must be very careful.

Remember; the other side loves to play dirty!

Mar 26 09:37

Automation Threatens Jobs But Offers Financial Freedom

By Brian Berletic

Despite sensational headlines and opportunistic politicking regarding the threat automation poses to socioeconomic stability, with a fully informed, properly educated population, more opportunities than threats lie ahead of us in the near future.

Automation has since the Industrial Revolution replaced human jobs with machines. As technology advances and automation evolves, the socioeconomic landscape of human civilization has evolved with it...

Mar 26 09:10

GiftGhostBot scares up victims' gift-card cash with brute-force attacks

Cybercrooks are using a bot to automate the process of breaking into and draining online gift card accounts.

The software nasty, named GiftGhostBot, attempts to steal cash from money-loaded gift cards provided by a variety of retailers around the globe, according to Distil Networks.

Any website – from luxury retailers to supermarkets to major coffee distributors – with gift card processing capabilities could be a target. Distil has seen this attack on almost 1,000 websites since it first detected it late last month.

Fraudsters are using the bespoke cybercrime tool to generate lists and lists of account numbers, and request the balance for each number. Whenever this brute-force attack throws up an actual balance, rather than an error or zero, the account number is automatically logged.

The criminals can then either resell these confirmed account numbers on the dark web or use them to purchase goods.

Mar 26 09:08

'Windows 10 destroyed our data!' Microsoft hauled into US court

Three people in Illinois have filed a lawsuit against Microsoft, claiming that its Windows 10 update destroyed their data and damaged their computers.

The complaint [PDF], filed in Chicago's US District Court on Thursday, charges that Microsoft Windows 10 is a defective product and that its maker failed to provide adequate warning about the potential risks posed by Windows 10 installation – specifically system stability and data loss.

Microsoft "failed to exercise reasonable care in designing, formulating, and manufacturing the Windows 10 upgrade and placing it into the stream of commerce," the complaint claims. "As a result of its failure to exercise reasonable care, [the company] distributed an operating system that was liable to cause loss of data or damage to hardware."

Mar 26 09:04

US Will Keep Ground Troops in Libya

In a press briefing at the Pentagon today, African Command leader Gen. Thomas Waldhauser announced that the US intends to keep ground troops in Libya for the foreseeable future to support “friendly forces,” and to “degrade” the ISIS forces that remain in the country.

Waldhauser did not specify how many US troops are in Libya now, or how many will stay, but did estimate that there were less than 200 ISIS fighters left in Libya. The US had announced the end of the anti-ISIS campaign in Libya back in December, but never fully withdrew from the country.

The US forces were in Libya trying to help the “unity” government defeat ISIS in the city of Sirte. US officials repeatedly claimed the city was totally surrounded, and that no ISIS fighters would get away, though when the fighting finally ended, a substantial number of ISIS fighters did in fact get away.

Webmaster's Commentary: 

Translation: this is "military-speak" for the reality that the US government is never leaving Libya because of the oil and the oil pipelines.

Mar 26 08:57

5G Technology: A Health Crisis Waiting To Happen

By Paul A. Philips

5G technology involves the nationwide rollout of thousands of antennas to be used in conjunction with the various supporting appliances and applications in the wireless mobile network. There are, however, serious growing health, safety and environmental concerns over this developing technology...

Mar 26 08:49

BOMBSHELL SCANDAL! Republicans Have The SMOKING GUN That Will Put Obama In JAIL!

Republicans on the Intelligence Committee said Nunes has a “smoking gun” that will “leave no doubt” about Obama spying on Donald Trump for political reasons!

Mar 26 08:31

NSA Whistleblower: Trump Was Right On Wiretap Bill Binney – Tucker Carlson Tonight Fox News 3/24/17

Mar 26 08:30

NSA collected US email records in bulk for more than two years under Obama

The Obama administration for more than two years permitted the National Security Agency to continue collecting vast amounts of records detailing the email and internet usage of Americans, according to secret documents obtained by the Guardian.

Mar 26 07:22

THEY CAN SEE A ‘STICK OF BUTTER FROM SPACE’ — THE BILLION DOLLAR SPY AGENCY YOU’VE NEVER HEARD OF

While most Americans would consider the CIA, and perhaps the NSA, household names, one U.S. spy agency — whose headquarters surpasses the U.S. Capitol in size — has managed to keep to the shadows while possessing cutting edge tools of the surveillance trade.
Called the National Geospatial-Intelligence Agency (NGA), even former President Barack Obama didn’t know of its existence when he first took office — despite that the agency employs some 15,400 people.

“So, what do you [do]?” Obama asked a customer at a Washington, D.C., Five Guys hamburgers in May 2009.

“I work at NGA, National Geospatial-Intelligence Agency,” he answered.

“Outstanding,” then-president Obama asserted. “How long have you been doing that?”

“Six years.”

“So, explain to me exactly what this National Geospatial …” Obama asked, unable to recall the agency’s full name.

Timidly, the man replied, “Uh, we work with, uh, satellite imagery.”

Webmaster's Commentary: 

Except that this operation was done to give the illusion, and create the narrative, that Seal Team 6 actually assassinated Ben Ladin, when he really died of complications from an illness in 2001.

Proof Ben Laden died in 2001

So what we have here is another alphabet soup spy agency whose primary task is to use technology in creating fantasy as government narrative, which US citizens are supposed to absorb as gospel, and sheepishly believe.

But after 9/11, and the invasions and occupations of Afghanistan and Iraq, I cannot believe anything the government tells me, because I understand that it is lying to support a specific geopolitical agenda, and that is most generally centered around expropriating resources to which it has utterly no moral right; insuring that the government of the country from which those resources are taken is Western-centric; and insuring that those resources are only sold in US dollars.

Forgive my sang-froid on this, but that is simply the reality here.

Mar 25 09:16

WIKILEAKS PUBLISHED A LIST OF CONSUMER ELECTRONICS "TARGETED" BY THE CIA — YOUR SMART PHONE AND COMPUTER ARE PROBABLY ON IT

Wikileaks has now posted “Identifying Hacking Targets of the CIA” which lists out “companies, products, tools, and terms that are mentioned in the Vault 7: CIA Hacking Tools Revealed publication to date,” in order to inform people as to whether or not their smart phones, computers, gaming systems, television sets etc. can easily be turned into covert surveillance devices by the Central Intelligence Agency.

We are trying to determine which are CIA hacking targets and need help reviewing the documents associated with each company/product to determine if it is vulnerable to CIA hacking.

Hint: the majority of modern consumer tech is.

Webmaster's Commentary: 

Imagine my (complete absence of) shock!!

Mar 25 09:09

‘HUNT & KILL ALL WHITE WOMEN’ FACEBOOK POST DEEMED NOT HATE SPEECH

The way in which Facebook polices content on its network is under scrutiny again after it was revealed that a post in which a user called for white women to be “hunted and killed” was deemed to not be a violation of community standards.

“White women should be hunted and killed then we won’t get white babies who think the(y) own the world,” the user posted.

When the post was reported by another user for “hate speech,” Facebook responded with the message, “We reviewed the comment you reported for displaying hate speech and found it doesn’t violate our Community Standards.”

Meanwhile, posts by Christians that simply state bible passages in discussions about homosexuality are being removed, while pages devoted to showing grisly mock images of President Trump being assassinated are not taken down.

Webmaster's Commentary: 

Any criticism of Israel, no matter how accurate and justified, is also taken down by Facebook. Seen.life appears to follow the idea of freedom of speech.

Mar 25 09:08

US Senate votes 50-48 to do away with broadband privacy rules; let ISPs and telecoms to sell your internet history

Despite widespread disapproval from constituents, S.J.Res 34 has passed the United States Senate with a vote of 50-48, with two absent votes. Earlier today, at 12:25 Eastern March 23, 2017, the US Senate voted on S.J.Res 34, and will use the Congressional Review Act to strip away broadband privacy protections that kept Internet Service Providers (ISPs) and telecoms from selling your internet history and app data usage to third parties. S.J.Res 34 was first introduced by 23 Republican Senators earlier this month and its blitz approval is a giant blow to privacy rights in the United States.

Webmaster's Commentary: 

"Privacy? You don't need no stinkin' privacy! We OWN you! Get used to it. We only allow you to exist so that we can make money off of you ... any way we care to do it!" Got that, slaves?" -- Das FED

Mar 25 07:52

Senate puts ISP profits over your privacy

The Senate just voted to roll back your online privacy protections. Speak up now to keep the House from doing the same thing.

Mar 24 19:45

MY LAST EVER VIDEO?

Mar 24 16:23

Google boycott over extremist content could spell the end for automated ad placements

The feud sparked by Google's failure to remove extremist content from its site Youtube could lead to the end of automated ad placement, experts have warned.

Household names including Marks and Spencer and McDonald's have pulled advertising from Google’s YouTube as part of a growing international boycott.

Now analysts have predicted that brands could turn against large internet firms that use automated ad placement based on artificial intelligence.

Mar 24 15:28

Whistleblower Reveals UK Police Hacking Emails Of Journalists, Activists

By Derrick Broze

The U.K. Metropolitan police are accused of collaborating with Indian police and hackers to illegally access the emails of hundreds of activists and journalists.

A secret unit of the Metropolitan police has been partnering with hackers to monitor the emails of hundreds of political activists and journalists, according to a whistleblower familiar with the unit. The individual claims that the secret unit worked with Indian police and hackers to steal the passwords for the emails of activists, reporters, and photographers...

Mar 24 14:15

Why do Beijing and Moscow embrace cyber sovereignty? Globalism stops here

China has called on Russia and other BRICS nations to commit themselves to the concept of cyber sovereignty, which would allow governments to control their national cyber space in a manner that only they deem appropriate. The idea for an agreement on national cyber sovereignty was proposed by Beijing following its first ever white paper spelling out the view that governments are entitled to the right to control and regulate the Internet on their national territory. Additionally, Beijing made no bones about plans to enhance its cyber warfare capacity as a counter-measure to the exponential growth of threats coming from cyber space. "Cyber attacks, cyber espionage, and surveillance have become major issues confronting all countries," said Long Zhou, coordinator for the Foreign Ministry’s cyber affairs division. The concept of cyber sovereignty, however, is not new.

Mar 24 13:57

The Narrative Has Been Set For The Collapse And The Next Event

70% of the people disprove of Comey. Nunes says the FBI not involved in the investigation. Evidence is now growing against Obama, Clapper, Brennan and Rogers. Wikileaks releases nightskies 1.2, which shows the CIA has control of Macs and Iphones.

Mar 24 11:00

CIA’s NightSkies tool can hack, remotely control iPhones without user knowing

WikiLeaks has revealed the CIA’s alleged ability to infiltrate and control iPhones through a tool called NightSkies, which is physically installed onto factory fresh iPhones and allows the CIA to monitor and download files from targets’ phones undetected.

The revelation is part of WikiLeaks’ latest Vault 7 release named ‘Dark Matter.’

NightSkies works in the background and grants “full remote command and control,” to the CIA, allowing it to upload and download files from iPhones, including details from the owner’s phonebook, text messages and call logs, and to execute actions on the phones as it wishes.

Webmaster's Commentary: 

I am going back to a pre-NSA phone!

Mar 24 10:36

General Tom McInerney

Brief mp3 interview with the General is historic.

The FISA warrants were just “a cover” - Obamas’ AG Loretta Lynch already had an archive of surveillance data on Candidate Donald Trump. and much more !

Mar 24 10:11

DoubleAgent Attack Turns Your Antivirus Into Malware And Hijacks Your PC

Cybellum security researchers have uncovered a new attack mechanism that can be used to take control of your antivirus and turn it into a malware. Called DoubleAgent, this attack exploits an old and undocumented vulnerability in Windows operating system. This Zero Day code injection technique affects all major antivirus vendors and has the power to hijack permissions.

Mar 24 09:01

Beware! Major flaws in millions of Google Nest security cameras means burglars can switch them off remotely

Installing CCTV is just one way to protect your home.

But the feeling of safety afforded by one such system could be an illusion - according to a security researcher.

Two flaws have been discovered with the Nest range of security cameras which could allow burglars to switch off the device's with ease before entering your home.

And despite reporting the issues to Google - Nest's parent company - last year, nothing appears to have been done.

Mar 24 08:53

Row over US ISP customer data sales

US politicians have voted to remove rules that demanded ISPs got permission from customers before selling their browsing histories.

The US Senate voted by a narrow majority to repeal the rules that were first approved in October 2016.

Politicians who called for the rules to be dropped said they were "harmful".

The decision was called a "crushing loss" for privacy by digital rights group the Electronic Frontier Foundation (EFF).

Mar 24 08:27

FBI has uncovered 'evidence of treason' among alt-right websites, says George W Bush's ethics lawyer

The man who served as former president George W Bush's most senior ethics lawyer has suggested that the FBI is "uncovering evidence of treason" by far right US news websites over their links with Russia.

Richard Painter tweeted a link to an article suggesting that the Bureau was looking into news outlets like Breitbart News, InfoWars and the Kremlin-backed RT News and Sputnik News, to see whether they worked with Russian-backed operatives to disseminate stories favouring Donald Trump during the presidential election. at times when his campaign appeared to be struggling.

Sources told US publisher, McClatchy that online "bots" had created created millions of social media posts linking to articles on the sites, some of which were completely false, while other contained a mixture of fact and fiction.

Webmaster's Commentary: 

This strikes me as desperation on the cusp of madness.

I have linked to all the resources indicated above, when I have been able to vet that the information came from multiple sources, and believed, to the best of my knowledge, that the information presented was factually based.

But when it becomes, "alleged treason" to tell the truth, the best you can, on a blog, you know your government has gone full tilt-boogie Orwell on you.

And that George Bush even had an "ethics layer", in his lying about the reasons reasons the US government had to war in Afghanistan and Iraq, is hysterically hypocritical, and worth a great laugh, but Richard Painter CANNOT expect to be taken seriously by any thinking American on these charges, after the dark, and brutal, legacy of Bush's presidency.

So now, this now thoroughly embarrassed, morally bankrupt, and completely irrelevant man is desperately attempting to forward the US Deep State Narrative of Russia being the "bad guy" in the geopolitical arena, and a country the US government and military needs to wagewar against.

I have to wonder just how much of Painter's stock portfolio is invested in companies which comprise the US Military/Industrial Complex, to make these accusations.

Mar 24 08:10

Security Alert: Windows 10 Has Been Quietly Logging EVERY KEYSTROKE You Type And Sending It To Microsoft (This Is How To Stop It)

Yesterday we reported that an international group of hackers claim they have breached Apple’s iCloud user database and stolen 300 million usernames and passwords. The group has threatened to initiate a widespread factory reset on April 7th, 2017, potentially wiping out data on tens of millions of iPhones and iCloud accounts should Apple fail to pay a ransom.

But that breach by nefarious hackers, while serious, is nothing compared to what your trusted operating system provider may be doing on your personal computer.

According to a recent report, if you are a Windows 10 user then every single keystroke you have ever typed on your computer may have been logged and sent to Microsoft.

SHARE THIS ARTICLE WITH YOUR SOCIAL MEDIA