COMPUTERS/INTERNET/SECURITY | WHAT REALLY HAPPENED


COMPUTERS/INTERNET/SECURITY

Oct 31 09:42

Dating Website Sued for Making Fake Lovers

The Federal Trade Commission filed suit against a British-based dating company alleging that it created fake automated profiles to trick paid members into believing that they were receiving texts from other real people on its several dating websites.

The FTC alleged that JDI Dating created the fake profiles, tricking new users into thinking they were getting text messages from real humans. The profiles, though, were connected to automated "flirting" software.

Users were enticed to sign up by being offered free memberships to the various sites, and upon first login, the flirty texts would flood a new user's inbox. But new users were unable to reply to any messages unless they upgraded to the paid service. Fees from $10 to $30 a month were charged to a new user's credit card to give them the capability to engage in messaging other members.

Webmaster's Commentary: 

That is just mean!

Oct 31 08:07

Isolated computer to be hacked with only a cellphone at Denver cybersecurity conference

Security researchers at Ben Gurion University have found a way to infiltrate a closed network to lift data from an isolated computer using little more than a cellphone’s FM radio receiver.

To evade air-gap security measures, keylogging app Airhopper, as its known, uses radio frequencies to transmit data from a computer, all by exploiting the computer's display.

“This is the first time that a mobile phone is considered in an attack model as the intended receiver of maliciously crafted radio signals emitted from the screen of the isolated computer,” according to a release by Ben Gurion University.

Webmaster's Commentary: 

So, Israel's university TEACHES computer hacking!

Oct 30 11:18

How much is whatreallyhappened.com worth?

estimated worth, $ 13,805,000

Webmaster's Commentary: 

UPDATE: Only 24 hours after I posted the above link, the estimated value for whatreallyhappened.com has gone from $13.8 million to just over $10 million. I guess "someone" doesn't like there to be any indication of this website's popularity and reach to be out there!

Oct 30 09:04

Amazon-CIA $600 Million Deal Facing Scrutiny: ‘What’s the CIA Doing on Amazon’s Cloud?’

A billboard challenging Amazon to fully disclose the terms of its $600 million contract to provide cloud computing services for the Central Intelligence Agency has been unveiled at a busy intersection near Amazon’s Seattle headquarters.

The billboard’s launch — asking “the $600 million question: What’s the CIA Doing on Amazon’s Cloud?” — marks the escalation of a campaign by the online activist organizations RootsAction.org and ExposeFacts.org. The groups are calling for accountability from Amazon in an effort to inform the public of serious privacy implications of the Amazon-CIA collaboration. (ExposeFacts.org is a project of the Institute for Public Accuracy.)

Webmaster's Commentary: 

Given that CIA and Amazon are swapping tongue kisses these days, it becomes understandable why Alexa, owned by Amazon, is rigging the rankings of independent media websites lower and pushing up rankings of pro-government websites.

Oct 29 09:13

Legendary Hacker Leaks Government Plan To Take Over Internet

Oct 29 07:42

FB For Currency Scams? EU May Probe Bankers’ Social Media

Traders accused of currency manipulation at some of the world’s biggest banks may soon have their social media data handed over to authorities conducting the investigation.

All of the bankers’ communications will be handed over to investigators to discover if banks have been tampering with currency interbank rates on the $5.3 trillion-a-day foreign exchange market, Bloomberg reported citing unnamed source.

Oct 29 07:35

HTML5 reaches ‘recommendation’ status

The World Wide Web Consortium today has elevated the HTML5 specification to ‘recommendation’ status, giving it the group’s highest level of endorsement, which is akin to becoming a standard.

But Jeff Jaffe, CEO of the W3C, was quick to point out that work on the Web is far from complete.

HTML5 is a critical piece in terms of importance to the next generation of Web technology in general, according to Jaffe. “I think back to what the Web originally was, which was accessing static documents from Web pages. Today, it’s what we call the Open Web Platform for building distributed applications, characterized by rich media – video, audio and graphics – natively available in browsers,” he said.

Webmaster's Commentary: 

I experimented with HTML5 in writing Claire's music website and the overall portal to our online "empire." The problem I ran into is that various smart phones and tablets, although claiming to support HTML5, did not actually support the full specifications, only enough HTML5 to be able to advertise they supported HTML5, and in many cases the pages would not display correctly.

Oct 28 07:40

The highly sophisticated hacking of Sharyl Attkisson's computers

They met at a McDonald’s in Northern Virginia at the beginning of 2013, and the source (she dubs him Number One) warned her about the threat of government spying. During their next hamburger rendezvous, Big Mac told Attkisson, then a CBS News reporter constantly at odds with the Obama administration, that he was “shocked” and “flabbergasted” by his examination of her computer and that this was “worse than anything Nixon ever did.”

Oct 28 06:40

Snowden 2.0: Report says FBI Has Identified "Second Leaker" of Govt Secrets

The U.S. government has identified the person it believes is the so-called "second leaker" who has given over classified national security documents to some of the same journalists who have reported on many of the documents leaked by NSA whistleblower Edward Snowden this year, a news report claimed on Monday.

Webmaster's Commentary: 

Rather than let the FBI pick them off one at a time, everyone with secrets needs to go public at the exact same time.

Oct 28 06:33

Watch your attachments: Microsoft Office bug lets hackers take over computers

A dangerous new security vulnerability has been discovered in Microsoft’s Office software, threatening to hijack users of virtually every existing version of Windows.

The bug in question affects programs like Word, PowerPoint, and Excel – and could allow an intruder to gain access to and control over a user’s entire computer.

Already, Microsoft has discovered that hackers are using the bug to hack computers through PowerPoint. Windows users should be wary of opening PowerPoint files sent via email unless they completely trust the original source, the company wrote in an online security advisory. Even in cases involving trusted sources, it has advised to not open the files received unexpectedly.

Webmaster's Commentary: 

And the mighty NSA cannot find these crooks either, can they?

Oct 27 07:42

Hungarians revolt against internet tax (PHOTOS, VIDEO)

Furious with the government plan to impose tax on Internet data traffic, thousands of Hungarians rallied in front of the Economy Ministry in Budapest to protect the freedom of the internet from the 'anti-democratic' measure.

Tens of thousands gathered in front of the Economy Ministry building on Sunday, urging the politicians to scrap the plan that will see internet service providers (ISPs) pay 150 forints ($0.62) for every gigabyte of data traffic transferred over their networks.

Oct 27 07:24

Spy Wars: CIA Vs. Congress | Jesse Ventura Off The Grid - Ora TV

Oct 27 07:18

Kano: A kit to build a computer and a new creative generation

Kano's Alex Klein tells TechRepublic about why people of all ages, not just kids, want to understand the tech they take for granted.

Oct 27 07:14

CVS follows Rite-Aid, shuts off Apple Pay

Last Thursday drug store chain Rite Aid Inc. (RAD) reportedly stopped accepting payments made through the just launched Apple Pay system from Apple (AAPL). On Saturday, CVS Health (CVS) was reported to have followed suit at its CVS pharmacy stores.

The issue appears to be a conflict between Apple Pay and a mobile payment system called CurrentC that is being developed by a retailer-owned mobile technology outfit called Merchant Customer Exchange (MCX). Unlike Apple Pay, CurrentC does not use an NFC chip, but instead generates a QR code that is displayed on the merchant's checkout terminal. Customers who have already linked their bank accounts to the CurrentC system scan the QR code from the terminal and the transaction is completed.

Oct 26 11:16

French "hate speech" lawsuit leading to worldwide online censorship

A little over a year after a French court forced Twitter to remove some anti-Semitic content, experts say the ruling has had a ripple effect, leading other Internet companies to act more aggressively against hate speech in an effort to avoid lawsuits.

The 2013 ruling by the Paris Court of Appeals settled a lawsuit brought the year before by the Union of Jewish Students of France over the hashtag #UnBonJuif, which means “a good Jew” and which was used to index thousands of anti-Semitic comments that violated France’s law against hate speech.

Since then, YouTube has permanently banned videos posted by Dieudonne, a French comedian with 10 convictions for inciting racial hatred against Jews. And in February, Facebook removed the page of French Holocaust denier Alain Soral for “repeatedly posting things that don’t comply with the Facebook terms,” according to the company. Soral’s page had drawn many complaints in previous years but was only taken down this year.

Oct 26 07:30

US government surrenders control of ICANN - Fox News Live

Oct 25 10:04

Dems on FEC move to regulate Internet campaigns, blogs, Drudge

In a surprise move late Friday, a key Democrat on the Federal Election Commission called for burdensome new rules on Internet-based campaigning, prompting the Republican chairman to warn that Democrats want to regulate online political sites and even news media like the Drudge Report.

Oct 24 07:55

FTDI admits to bricking innocent users' chips in silent update

Hardware hackers and security researchers are furious at chip maker FTDI for issuing a silent update that bricks cloned FTDI FT232 [USB to UART] chips.

The chip is extremely common on a wide variety of devices and there is no way of knowing at this time which devices have cloned chips -- and the tainted supply chain could hit anyone.

FTDI appears to have used a recent Windows update to deliver the driver update to brick all cloned FTDI FT232s.

FTDI's surprise new driver reprograms the USB PID to 0, killing the chips instantly.

The hardware hackers at Hack A Day first reported that a recent driver update deployed over Windows Update is bricking cloned versions of the very common FTDI FT232 [USB to UART] chip.

In response to increasing anger and criticism from security researchers on Twitter, FTDI admitted using the remote kill switch and is adamant that this move is necessary to fight counterfeiting.

Webmaster's Commentary: 

Oh yes, let's punish the end user who may not even know his product has a counterfeit chip by killing his hardware!

Does FTDI not understand that the counterfeiters will go on selling their chips anyway not caring if they eventually fail? Look at the flood of fake 128G SD cards hitting the market. These are actually 8G chips reprogrammed to identify themselves as 128G to the computer. Every time a particular brand is identified as phony, the counterfeiters simply change their company name, change the packaging, and go right on selling their products, not caring that they will not actually work. FTDI's stunt will harm a lot of innocent end users and will not stop the counterfeiters. It won't even slow them down. Someone needs to be fired for this mistake!

Oct 23 10:59

Atlanta airport WiFi users are barred from transmitting “hateful or racially, ethnically or otherwise objectionable” material

The following constitutes examples of violations of this AUP. You agree NOT to use the Wi-Fi System to:

Transmit any material (by uploading, posting, email or otherwise) that is unlawful, threatening, abusive, harassing, tortuous, defamatory, obscene, libelous, invasive of another’s privacy, hateful or racially, ethnically or otherwise objectionable; ...

Webmaster's Commentary: 

That "otherwise objectionable" could mean pretty much anything, including WRH!

Oct 23 10:37

ZION’S INTERNET WAR

Over the past few years more than 5 million readers have been directed to this Blog via links at What Really Happened. These people are not strangers to what is known as a DOS Attack which renders a particular site ‘unavailable’ for a given time period. For years now, WRH readers have occasionally been denied access to the site because of these attacks. They have not been the only victim of these frequent attacks, other wonderful sites such as Uruknet have also suffered from them. One can show their appreciation to these sites by visiting them frequently and even better, by contributing financially to them. Their continued existence depends on your support.

Oct 23 10:15

'PhotoMath' app uses recognition technology to solve your math homework for you

Webmaster's Commentary: 

Works better than Common Core!

Oct 23 07:00

It’s Not Just Spying – How The NSA Has Turned Into A Giant Profit Center For Corrupt Insiders

Last week, two very important stories came out; one from Reuters and the other from Buzzfeed. They both zero in on how current NSA employees are using their expertise and connections to make big money in the private sector while still working at the NSA. Let’s start with the Reuters story, which covers former NSA-head Keith Alexander’s business relationship with the NSA’s current Chief Technical Officer, Patrick Dowd.

Before we get into the meat of this story, I want to set the stage with a little background. In case you forgot, Keith Alexander launched his own cyber-security firm, IronNet Cybersecurity Inc., earlier this year.

Oct 22 09:16

Fake news sites are using Facebook to spread Ebola panic

These sites claim to be satirical but lack even incompetent attempts at anything resembling humor. They’re really fake news sites, posting scary stories and capitalizing on the decontextualization of Facebook’s news feed to trick people into sharing them widely. On Facebook, where stories look pretty much the same no matter what publication they’re coming from, and where news feeds are already full of panicked school closures, infected ISIS bogeymen, and DIY hazmat suits, the stories can fool inattentive readers into thinking they’re real. Panicked, they share, spreading the rumor farther and sending more readers to the story, generating ad revenue for the site.

It’s proving to be a very successful strategy, particularly for a site called the National Report, which saw its traffic spike to 2 million unique visitors yesterday according to Quantcast.

Oct 20 15:59

Microsoft warns users to kill botched KB 2949927 patch

After yanking botched patch KB 2949927, which failed to install on some machines, Microsoft is now warning users to uninstall the update -- even though there has been no mention of problems after the patch is installed.

Microsoft released KB 2949927 as part of its ill-fated batch of October "Update Tuesday" patches. On Wednesday I wrote about the first patch that showed widespread problems, KB 2952664, which failed to install with error 80242016. I followed up on Thursday with details about four more patches causing problems:

Oct 20 13:19

Nearly half of cardholders likely to avoid stores hit by data breaches

As data breaches exposing consumer credit card, debit card and other personal information become more common, nearly half of cardholding shoppers say they're reluctant this holiday season to return to stores that have been hacked, according to a new survey by CreditCards.com.

Forty-five percent of respondents with credit or debit cards said they would definitely or probably avoid one of their regular stores over the holidays if that retailer had experienced a data breach. Sixteen percent said they definitely would not return to a retailer if the store had been hacked and 29 percent said they probably would not shop at such stores. Just one in eight said they are more likely to shop with credit cards this season.

Oct 19 07:00

FBI Director Warns Google and Apple "If You Don't Decrypt Phones, We'll Do It For You"

The Fourth Amendment to the US Constitution is crystal clear in meaning.

The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no warrants shall issue, but upon probable cause, supported by oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.

FBI Director, James Comey, an Obama appointment, does not give a damn what the Constitution says.

Oct 18 09:29

Kickstarter Freezes Anonabox Privacy Router Project for Misleading Funders

On Friday afternoon Kickstarter suspended the crowdfunding campaign for Anonabox, an initiative to sell a tiny, $45 router that would run all a user’s online traffic over the anonymity network Tor. The idea tapped into an explosive demand for simple privacy technology, and earned more than 10 times its modest goal in hours. But as funders shoveled more than half a million dollars into the project, they also began to pick apart Anonabox’s claims of creating custom hardware, as well as the promised security of its software. Soon, many were calling for the project to be cancelled, and asked others to report its shortfalls to Kickstarter staff, who now say they’ll cancel all investors’ pledges.1

Oct 18 08:00

Iran expert helping develop IoT platform

An Iranian expert and postdoctoral fellow at the University of British Colombia is helping develop a revolutionary platform for a new technology called the Internet of Things (IoT).

Ali Kashani, the Vancouver-based Energy Aware Technology’s vice president of software, is helping the company develop the Neurio platform, billed as a revolutionary new technology that makes an ordinary home smart.

The evolution of the IoT involves the embedding of sensors in physical objects. The sensors are, in turn, linked through networks to computers that analyze the vast amounts of data they produce.

Neurio’s development, however, has drawn upon the fact that all electronic devices have a power signature, hence just enlisting the help of a Wi-Fi power sensor.

Kashani has described Neurio as the “brain of the home,” not a “fancy” remote control, like other smart-home products.

Oct 18 08:00

Microsoft to cut 18K jobs worldwide

The US software giant Microsoft has announced plans to slash 18,000 jobs from its global workforce in 2015, the largest cuts in the company’s 39-year history.

Oct 18 07:00

Obama’s credit card denied at restaurant on New York City trip

President Obama came perilously close to having to wash some dishes on his recent trip to New York.

Mr. Obama revealed Friday that his credit card was rejected when he went to pay for his meal at a New York restaurant during the U.N. General Assembly gathering last month.

“Apparently they thought there was some fraud going on,” Mr. Obama joked at a meeting Friday with employees of the Consumer Financial Protection Board, adding that “even I am affected” by the difficulties of dealing with the American financial system. The remarks were picked up by the C-SPAN feed of the event.

Oct 17 12:45

Thousands Of MacBooks Made In 2011 Have Self-Immolating Graphics Cards

Models of Apple’s higher-end portable computer, the MacBook Pro, have come to the end of their three-year extended warranties. That leaves their owners at the mercy of Apple when something goes wrong, and at minimum thousands of the computers have had the same computer-killing problem with their graphics processing unit. Apple has not publicly admitted that the machines have a problem.

Of course, MacBook Pro owners are people who have spent at least $2,500 on a computer designed for serious graphics work. That means that they’re probably media professionals or serious amateurs, and able to make YouTube videos making fun of the situation with really great production values.

Oct 17 08:33

FBI director to citizens: Let us spy on you

The expanding options for communicating over the Internet and the increasing adoption of encryption technologies could leave law enforcement agents “in the dark” and unable to collect evidence against criminals, the Director of the FBI said in a speech on Thursday.

Webmaster's Commentary: 

I am going to take it from the above that FBI Director James B. Comey is tacitly admitting that our series of NSA encryption challenges did in fact defeat the NSA cryptographers.

So, Comey is trying to revive an idea from 1995 and declare that any encryption system not authorized for use by the government (meaning not including a back door for them to use) is a "weapon" whose purpose must be assumed to be criminal, and therefore punishable. Better copy off those code snippets in my challenge while you still can!

The new attitude is "Use A Secret Decoder Ring: Go To JAIL!"



The government wants us to trust them that they are only going to spy on criminals, but we already know this is a lie. The FBI and other US Intelligence agencies have been caught stealing personal data for cronies of the President and their own personal profit. The Fourth Amendment says that the government cannot peek into your personal life absent an actual accusation of a crime and given the tsunami of evidence that the government is not complying with its Constitutional limits, We The People have every right to secure our business secrets, photos of our scantily clad partners, my Aunt Mary's Top Secret Chocolate Chip Cookie recipe, and everything else from a government that is itself the biggest criminal organization in the country.

Oct 16 05:21

YouTube has potentially infected over 100,000 users during the past 30 days

YouTube has become a daily habit for millions all over the world, but it looks like there has been some malicious activity on the website -- which may have affected more than 100,000 users over a 30 day period.

According to Trend Micro, they have been monitoring the activity on YouTube over the past couple of months and have found that the attack comes in the form of ads that are present on the site. While the ads themselves have no malicious content, the issue seems to occur when the ad is clicked. Although these ads should be monitored and screened by YouTube, some have seemed to slip through the cracks, redirecting to malicious websites that could cause infections. While this all sounds fairly simple, the actually process for passing off a malicious site for something legitimate is fairly complex.

Oct 14 09:12

Chat logs reveal FBI informant’s role in hacking of Sun newspaper

The FBI is facing questions over its role in a 2011 hacking attack on Rupert Murdoch’s Sun newspaper in the UK after the publication of chat logs showed that a man acting as an agency informant played a substantial role in the operation.

In July 2011, a group of hackers known as Lulzsec – an offshoot of Anonymous – posted a fake story about the death of Murdoch, penetrated several News International (now News UK) corporate sites, and claimed to have obtained gigabytes of material from the company’s servers.

Oct 12 08:29

Edward Snowden Doc 'Citizenfour' Reveals Existence of Second NSA Whistleblower

In the key scene, journalist Glenn Greenwald visits Snowden at a hotel room in Moscow. Fearing they are being taped, Greenwald communicates with Snowden via pen and paper.

While some of the exchanges are blurred for the camera, it becomes clear that Greenwald wants to convey that another government whistleblower -- higher in rank than Snowden -- has come forward.

Oct 10 07:55

It's not just Munich: Open source gains new ground in Germany

While Munich city council's decision to replace Microsoft software with open-source alternatives made headlines, it is one of a number of municipalities across Germany to make such a move.

Across Germany at the national and local level authorities are running Linux and open-source software. The German federal employment office has migrated 13,000 public workstations from Windows NT to OpenSuse, and a number of German ubran areas are using or in the process of switching to open-source software on the desktop, including Isernhagen, Leipzig, Schwäbisch Hall and Treuchtlingen.

The latest town to make the switch is Gummersbach, with a population of about 50,000 in the state of North Rhine-Westphalia, which this summer completed its switch to Linux PCs from Windows XP.

Webmaster's Commentary: 

They are correct to do so, and I don't think anything illustrates that better than the problems I am having with Autodesk 3DS MAX on Windows 7. Now, I am no longer in the animation business, but I still like to play with it and occasionally make some illustrations for this website in 3D. But as of last night I am still unable to get the Autodesk installer to work. The only thing the installation log gives me is "Error 1603" which is described by computer experts as the most useless error code ever used by Microsoft, as it simply means the installer did not work (which we already know), but fails to explain what the problem might be. Autodesk's self-help pages claim it is a Microsoft problem. Microsoft ways Autodesk screwed up. Autodesk is cranking up for their cloud-based pay-by-the-month system and apparently could not care less if customers are unable to install the stand-alone systems. I have found hundreds of web articles from people dealing with this problem, all of whom offer suggestions of things to try, none of which have worked. If I were still in the animation business, I would be going out of business by now! This is yet another way the abuses of modern fascist-style corporate behavior is wrecking the national economy as a whole, and Germany is wise to drop Microsoft and Windows products for the more stable and open-source environment. Certainly, after this experience, I will not be looking at any Autodesk products ever again!

Oct 10 07:03

Sen. Wyden: NSA Tech Spying Hurts Economy

Google Chairman Eric Schmidt and other Silicon Valley executives say controversial government spying programs are undercutting the Internet economy and want Congress to step up stalled reform.

"We're going to end up breaking the Internet," warned Google Inc.'s Schmidt during a public forum Wednesday convened by U.S. Sen. Ron Wyden, D-Ore., who has been an outspoken critic of electronic data-gathering by the National Security Agency. Schmidt and executives from Facebook Inc, Microsoft Corp. and other firms say revelations of extensive NSA surveillance are prompting governments in Europe and elsewhere to consider laws requiring that their citizens' online data be stored within their national borders.

Oct 08 15:30

Federal Court Says the Government Can Impersonate You on Social Media — and There’s Not Much You Can Do About It

In June 2013, Arquiett filed a formal complaint against Sinnigen on the grounds that her privacy was violated. However, the U.S. District Court of the Northern District of New York ruled the DEA did nothing to overstep its authority.

“Defendants admit that Plaintiff did not give express permission for the use of photographs contained on her phone on an undercover Facebook page, but state the Plaintiff implicitly consented by granting access to the information stored in her cell phone and by consenting to the use of that information to aid in an ongoing criminal investigations,” the court said.

Therefore, the court went on to state, “Plaintiff does not have a First Amendment Right to Privacy in the photographs.”

Oct 08 09:25

DEFCON Router Hacking Contest Reveals 15 Major Vulnerabilities

It's clear from the fact that the list spans many different manufacturers that the problem is not unique to any one company.

Webmaster's Commentary: 

Maybe they stumbled on one of the NSA back doors!

Oct 08 07:51

US says it can hack into foreign-based servers without warrants

The US government may hack into servers outside the country without a warrant, the Justice Department said in a new legal filling in the ongoing prosecution of Ross Ulbricht. The government believes that Ulbricht is the operator of the Silk Road illicit drug website.

Monday's filing in New York federal court centers on the legal brouhaha of how the government found the Silk Road servers in Iceland. Ulbricht said last week that the government's position—that a leaky CAPTCHA on the site's login led them to the IP address—was "implausible" and that the government (perhaps the National Security Agency) may have unlawfully hacked into the site to discover its whereabouts.

Oct 08 07:16

Twitter sues US for right to disclose government requests

Internet giant Twitter is suing the Department of Justice in hopes that the United States government will let the web company publish more details about requests made for user data.

Oct 07 07:54

Windows 10's 'built-in keylogger'? Ha ha, says Microsoft – no, it just monitors your typing

Don't want Microsoft tracking you online and collecting data on your computing habits? Then you probably shouldn't install the Windows 10 Technical Preview, Redmond says.

The interwebs were abuzz on Monday over concerns about the Terms of Use and Privacy Policy of Microsoft's newly released, not-even-beta-yet OS, with some sites going as far as to claim that Windows 10 comes with a "built-in keylogger" to watch users' every move.

Turns out these Chicken Littles were right – sort of – but according to Microsoft they should have known about the data collection from the get-go, because they agreed to it.

Oct 07 07:07

Facebook Restores my account

Webmaster's Commentary: 

We kissed and made up, apparently. :)

Oct 06 11:27

My Facebook page, myself

I did a quick search and saw that Facebook had been requiring users to send in photos of their IDs to verify their identities for at least a year.

Without thinking, I picked up my phone to write a Facebook post to see if this had happened to anyone else. But, of course, I couldn't use Facebook on my phone either. I tried to enter my password and the little wheel spun futilely. This was serious.

So, I did what anyone else would do when locked out of Facebook: I posted on Twitter.

It turned out that at least five people I knew through Twitter were locked out of their Facebook accounts Tuesday. Some were thoroughly creeped out that Facebook would demand a copy of their IDs. Some decided this was their cue to shut their accounts once and for all.

Webmaster's Commentary: 

Thinking about it.

Oct 06 11:26

Facebook apologizes for locking a ‘small portion’ of users out of their accounts

On Monday afternoon, some Facebook users reported on Twitter and Hacker News that, for some unknown reason, they were locked out of their accounts. In the error message displayed, users were prompted to upload a photo ID in order to verify that they are the account holder. The company has issued a statement on the matter, saying:

Earlier this evening, we showed an account verification message to a very small portion of our users unnecessarily. We promptly removed the messages when we discovered the error. We’re sorry for any inconvenience we may have caused.

The issue has since been resolved.

Webmaster's Commentary: 

No it hasn't because this is exactly what I am seeing on my Facebook account! And I am still waiting to hear back from Facebook about why my account (which I don't even use that much) was locked.

Oct 06 11:24

3 On Your Side: Facebook Lock-out Issue

Recently, Karina says Facebook locked her out of her account without any explanation. The page was still up, but she could not log in.

“It asked me to submit a government-issued photo ID, so I automatically assumed it was a scam,” explains Moreno.

When she contacted Facebook, she was told it was not a scam — Facebook really needed a copy of her identification.

“Why should I have to submit it to a free social networking site?” she says she asked. “It’s absolutely ridiculous.”

We found a number of people complaining online about the same issue with Facebook.

Oct 06 11:23

Facebook apologises for locking out drag queens over user names

High quality global journalism requires investment. Please share this article with others using the link below, do not cut & paste the article. See our Ts&Cs and Copyright Policy for more detail. Email ftsales.support@ft.com to buy additional rights. http://www.ft.com/cms/s/0/284e9f1c-4a1b-11e4-bc07-00144feab7de.html#ix...

Facebook has apologised to its transgender and drag queen users, after suspending a number of their accounts under a policy that required people to use their “real” names.

The social network provoked an outcry from members of the LGBT community in recent weeks after it locked out users for operating pages under their stage names, such as Sister Roma and Lil Miss Hot Mess.

Webmaster's Commentary: 

I don't think that is why Facebook just locked my account. :)

Oct 05 07:26

ISRAEL FRAMING RUSSIA FOR ANTI-U.S. HACKER ATTACKS?

There it is! From the very same Yellow Press 'paper of record' that brought you the "Weapons of Mass Destruction" lie, and the "Assad gassed little children" lie, and the "Putin invaded Ukraine" lie, and the "ISIS beheadings" lie, comes the story of the cyber-bogeymen of Putin's Russia. This baseless accusation should be dismissed immediately upon first glance. It's not even worth the dignity of a rebuttal.

We would, however, like to address the question as to who the likely culprit might be. In crime-solving, precedent is a very important factor. Here's your precedent, brought to you by Israel's Main News Service, Ha'aretz:

Oct 04 07:06

Hackers’ Attack Cracked 10 Financial Firms in Major Assault

Questions over who the hackers are and the approach of their attack concern government and industry officials. Also troubling is that about nine other financial institutions — a number that has not been previously reported — were also infiltrated by the same group of overseas hackers, according to people briefed on the matter. The hackers are thought to be operating from Russia and appear to have at least loose connections with officials of the Russian government, the people briefed on the matter said.

Oct 04 06:23

Germany handed law-protected private data to NSA for years – reports

Intelligence service BND failed to protect the private data of German citizens as it handed over internet data collected at a Frankfurt traffic hub to the US, German media report citing secret documents.

The documents cited by VDR and EDR television and the newspaper Süddeutsche Zeitung, which broke the news together, were obtained from the federal government during an ongoing parliamentary investigation into US National Security Service spying on German soil.

Just like the NSA is forbidden by the law to spy on Americans, the BND is not allowed to spy on Germans. So when last year in was revealed that the two intelligence services had been collaborating to collect communication data at the De-Cix internet exchange node in Frankfurt, the BND had to produce explanations.

Oct 03 08:24

The J. P. Morgan breach is one part of a larger crisis

J. P. Morgan’s disclosure that hackers compromised the data of more than 76 million of its consumer patrons — and 7 million small business clients — may seem stunning.

But it reflects just a sliver of the withering bombardment the U.S. financial services sector has endured for at least the past three years.

Webmaster's Commentary: 

And where is the mighty NSA in all of this? Americans footed the bill for billions of dollars and were forced to surrender their Constitutional rights to create a system of total computer surveillance which was claimed to be intended to fight crime and terror. We have been hearing month after month after month of data breaches costing companies and individuals vast amounts of money. And not a single peep from the NSA. No identified cyber-criminals gleaned from all the data kept of all computer transactions in the nation (and much of the rest of the world). Nothing. Is the NSA totally incompetent? If so, we should shut them down, refund the money and restore the Bill of Rights. Or, as some suggest, is the NSA itself breaking into these data systems to feed its addiction to your data (and make a little party cash on the side)? If so, again, we should shut them down, refund the money and restore the Bill of Rights.

Oct 03 06:57

US Attorney General urges tech companies to leave back doors open on gadgets for police

US Attorney General Eric H. Holder Jr. on Tuesday urged tech companies not to lock police out of popular consumer gadgets, lest law enforcement's efforts to nab kidnappers or child predators be stymied.

Webmaster's Commentary: 

"I mean, sure, a lot of Americans, millions really, will have their bank accounts broken into and stuff, but it will be worth it to allow the police unfettered access to nude photos of their wives and daughters, I mean, criminals."

Oct 02 14:33

JPMorgan Says Data Breach Affected 76 Million Households

JPMorgan Chase & Co. (JPM), the biggest U.S. bank, said a previously disclosed data breach of its systems affected 76 million households and 7 million small businesses.

Customer names, addresses, phone numbers and e-mail addresses were taken, the New York-based bank said today in a regulatory filing. Internal bank information “relating to such users” also was compromised, the company said.

“There is no evidence that account information for such affected customers -– account numbers, passwords, user IDs, dates of birth or Social Security numbers –- was compromised during this attack,” the company said.

Webmaster's Commentary: 

Suuuure. The hackers broke in to steal information that was already public. We believe that!

And where is the NSA during all this computer crime?

Oct 01 08:30

Windows 8 Was So Bad That Microsoft Is Skipping Windows 9

On April 1, 2013, Infoworld published an article headlined, “Microsoft skips ‘too good’ Windows 9, jumps to Windows 10.’” A disclaimer at the top clarified that the story was an April Fool’s Joke, but it now appears that wasn’t necessary.

On Tuesday, Microsoft announced that it will indeed be skipping Windows 9 and jumping to Windows 10 as the name for its next operating system. No joke.

Sep 30 10:17

Grooveshark Found Guilty of Massive Copyright Infringement…

If you’re a Grooveshark user, you should probably start backing up your collection. In a decision released Monday, the United States District Court in Manhattan has found Grooveshark guilty of massive copyright infringement based on a preponderance of internal emails, statements from former top executives, direct evidence from internal logs, and willfully deleted files and source code.

Specifically, CEO Samuel Tarantino and co-founder and CTO Josh Greenberg will face the heaviest charges, which remain to be determined. The others were just scared rats: earlier, a number of top Grooveshark executives were removed from the defendant list in a settlement agreement, which now appears part of a clever exchange for cooperation. Oh and did they talk…

Sep 30 09:15

Trust in cloud security at all-time low: Execs still betting on the cloud

A new report on IT decision makers shows enterprise trust in cloud security at its lowest -- yet they're flocking to use it. OpenStack's Matt Joyce thinks it's fair to ask if everyone's gone nuts.

Sep 29 12:38

AT&T’s congestion magically disappears when it’s signing up new customers

AT&T yesterday began offering “double the data for the same price” to new customers and existing customers who sign new contracts, apparently forgetting that its network is so congested that speeds must be throttled when people use too much data.

Like other carriers, AT&T slows the speeds of certain users when the network is congested. Such network management is a necessary evil that can benefit the majority of customers when used to ensure that everyone can connect to the network. But as Federal Communications Commission Chairman Tom Wheeler has argued, the carriers’ selective enforcement of throttling shows that it can also be used to boost revenue by pushing subscribers onto pricier plans.

Sep 26 11:56

Apple shares lose £12bn as iPhone 6 is hit by new fault: Stock loses all gains it had made since launch of device last week

More than £12billion was wiped off the value of Apple yesterday after its latest iPhone was rendered unusable by a software update.

The 3.5 per cent drop in the share price meant the company’s stock lost all gains it had made since launching the iPhone 6 and iPhone 6 Plus last week.

Users of the brand new devices were cut off from telephone signal and data networks, meaning they could not make or receive calls and text messages or go on the internet away from wifi signal.

The update for the iOS 8.0.1 operating system also killed off the Touch ID function, a much-trumpeted feature that allows users to log on to their phone using their fingerprint.

Sep 26 09:25

Vaccine wars: the censoring of Rob Schneider

Yesterday, I reported on State Farm dropping Rob Schneider from their TV ads because he’s alerted people to vaccine dangers.

Because he has a view about vaccines that departs from the norm.

“Punch a hole in consensus reality and you can’t be a spokesman for our products.”

“Cause a ripple among the sleeping populace and you’re out.”

What’s next?

Well, I’ll tell you what could be next, based on the fact that the Internet runs via an interlocking system of commercial companies.

Some companies that facilitate emails to large lists, and website hosts, to say nothing of Facebook, which is already censoring information, could decide, under pressure, or voluntarily, to close down “controversial data.”

Sep 26 09:21

FBI blasts Apple, Google for locking police out of phones

Comey added that FBI officials already have made initial contact with the two companies, which announced their new smartphone encryption initiatives last week. He said he could not understand why companies would “market something expressly to allow people to place themselves beyond the law.”

Webmaster's Commentary: 

We would not be in this mess had "The Law" not placed itself beyond the Constitution!

Of course, this could also be a bluff to lull you into a false sense of privacy with these new phones and stimulate sales!

Sep 26 08:30

Photos: Robots and drones - here's what Intel's answer to the Raspberry Pi can do

The maker movement is thriving – with hobbyist technologists across the world packing low-cost computers and sensors into bespoke electronics that fuse art and technology.

The market is dominated by single-board computers and microcontrollers such as Raspberry Pi and Arduino, but new competitors are arriving all the time.

Intel's entry is Edison, a tiny single-board computers, little bigger than a postage stamp, measuring just 3.55 x 2.5 x 0.39cm.

Although it will be compared with the $35 Raspberry Pi model B+, it is designed to work as an embedded Linux board for electronic prototypes and products, rather than as a small-board computer running a full-blown Linux distro.

Webmaster's Commentary: 

I love technology when it works, and am old enough that some of the newer advances keep me in awe when I remember what I started with. This new desktop I built easily outpaces the Cray Supercomputers of the 1980s. Of course, back when computers were slow, software had to be efficient, but I have observed that as processors got faster, software companies got lazy, writing bloated, inefficient code, relying on the advances in hardware to keep their products usable.

Sep 26 05:28

Alternative Media Success Panics NeoCons

While most old people still cling to the corporate media worldview, the young are skewing ever-harder toward alternative perspectives. In Thursday’s Scottish independence referendum, for example, the London Daily Mirror reported that 71% of 16-17 year olds voted “yes” while those over 65 voted “no” by a 73%-27% margin.

Why does the vast majority of Scottish young people favor independence, while an equally crushing majority of old people opposes it?

Short answer: Old people still believe BBC propaganda, while the young do not.

Sep 25 11:41

Obamacare Website Costs Top $2 Billion, Almost Triple Government Estimates

What's the opposite of government efficiency? In a double-take-instigating headline, the federal government’s Obamacare enrollment system has cost about $2.1 billion so far, according to a Bloomberg Government analysis of contracts related to the project. BGOV’s analysis shows that costs for both healthcare.gov and the broader reform effort are far greater than anything publicly discussed. However, that pales into insignificance when considering health reform has cost American taxpayers $73 billion in the last four years... and counting.

Sep 25 11:39

Major Sell Program Trips 50-DMA, Sends Stocks Sliding

A "huge" institutional sell order, covering almost 200 individual stocks, is rumored to have been responsible for getting this morning's weakness across stocks going as equity indices catch down to bonds and credit. The S&P 500 broke key support at its 50-day moving-average (for first time in 2 months) and is back at 6 week lows. The Russell 2000 is now down 4.25% from the FOMC meeting last week...

Sep 25 09:59

Survey: Online trolls are 'everyday sadists'

If you've ever complained that the trolls junking up online comment sections are a bunch of sadistic psychopaths, you might be onto something.

An online survey by a group of Canadian researchers suggests that Internet trolls are more likely than others to show signs of sadism, psychopathy and "Machiavellianism": a disregard for morality and tendency to manipulate or exploit others.

Webmaster's Commentary: 

We kinda figured that out.

Sep 25 09:24

Do not open any emails with attachment "balance statement.htm!" It is malware

Webmaster's Commentary: 

Don't bother clicking the link to the FBI's list of current scams. It is not listed there. But I received no less than seven of these under various subject lines today, two of which were explicitly sent to wrh@whatreallyhappened.com. The rest just had "recipients" in the "to:" field. Examination of the htm file shows it loads a bunch of malware onto your computer.

Needless to say, I am making this threat known as a public service to our readers ... and beat the NSA to the announcement as well! :)

Sep 25 08:51

PR Firm Pulls ‘Emma Watson Naked Pics’ False Flag to Push For Internet Censorship

A PR firm has admitted to carrying out an online false flag against the 4chan forum in which it blamed the website for a threat to release naked pictures of actress Emma Watson as part of an appeal to President Barack Obama to censor the Internet.

Webmaster's Commentary: 

Anyone foolish enough to take nude pictures and put them on the web is just asking for trouble, and the reality is that more than a few stars intentionally plant nude pictures of themselves where they will be "discovered" as part of the campaign to increase their fame and "bankability." Setting that aside, this whole episode reminds us that the government and corporate media persist in trying to find ways to shut down the open and free internet and turn it into just another government and corporate controlled content and propaganda delivery system. Public Relations firms are paid vast amounts of money to engage in activities which for normal civilians would be punishable as crimes.

Apr 05 12:43

Critical Infrastructure Exploits Being Packaged In Hacker Tools

In a bid to make critical infrastructure vendors to take cyber security threats seriously, researchers release Stuxnet inspired exploits.

Apr 05 09:30

US Launches Top Secret Rocket

The United States has successfully launched a multi-million-dollar rocket carrying an undisclosed cargo believed to be a top-secret spy satellite.

Apr 05 08:32

After Car-Tracking Smackdown, Feds Turn to Warrantless Phone Tracking

Prosectors are shifting their focus to warrantless cell-tower locational tracking of suspects in the wake of a Supreme Court ruling that law enforcement should acquire probable-cause warrants from judges to affix GPS devices to vehicles and monitor their every move, according to court records.

Apr 05 08:30

Working Quantum Computer Built Inside A Diamond

Scientists have created a working quantum computer inside a diamond that includes protection against decoherence noise that prevents it from functioning properly.

Apr 05 08:00

CIA Home Invasion: Smart TVs and the 'Internet of Things'

Brandon Turbeville
Activist Post

Recently, CIA Director David Petraeus made headlines with a speech given at the summit for In-Q-Tel, the CIA’s venture capital firm. In this talk, Petraeus discussed the emerging “internet of things” and the implications it will have for increased levels of surveillance. Petraeus explained that, because of the rise of gadgets which are connected and controlled by apps, intelligence agencies will no longer need to place spy devices inside your home – you will do it for them.

Apr 05 05:17

'Rude awakening' for Mac users as cyber attack infects 550,000 of Apple's 'virus free' machines - with UK and U.S. worst hit

A new computer trojan has infected 550,000 machines running Apple's Mac OS X - and many could still be vulnerable.

The infected machines are now part of a 'botnet' of zombie machines which can be controlled by cyber criminals and 'told' to download new malicious software.

The attack has been described as a 'rude awakening' for Mac users.

Apr 04 13:57

You Tube Now Banning Videos Critical Of Global Warming Alarmism

YouTube has censored a video critical of a global warming alarmists, who says global warming skeptics need to be treated, as a violation of community guidelines.

Apr 04 11:18

Worse Than SOPA: New CISPA Cybersecurity Bill Will Censor The Web

A new cybersecurity bill will allow the government to bypass privacy laws to monitor, censor, and stop any online activity deemed disruptive to the government or private parties.

Apr 04 11:05

Fascism Comes to the Internet: Introducing CISPA

Joe Wright
Activist Post

After nearly unprecedented pushback against bills SOPA and PIPA, their apparent defeat cannot yet be claimed. Most skeptics presumed that the defeat of the aforementioned would only serve to offer a compromised "SOPA light" at some point to circumvent criticism over government censorship. Well, it didn't take long...

Apr 04 09:55

Even worse than SOPA: New CISPA cybersecurity bill will censor the Web

H.R. 3523, a piece of legislation dubbed the Cyber Intelligence Sharing and Protection Act (or CISPA for short), has been created under the guise of being a necessary implement in America’s war against cyberattacks. But the vague verbiage contained within the pages of the paper could allow Congress to circumvent existing exemptions to online privacy laws and essentially monitor, censor and stop any online communication that it considers disruptive to the government or private parties. Critics have already come after CISPA for the capabilities that it will give to seemingly any federal entity that claims it is threatened by online interactions, but unlike the Stop Online Privacy Act and the Protect IP Acts that were discarded on the Capitol Building floor after incredibly successful online campaigns to crush them, widespread recognition of what the latest would-be law will do has yet to surface to the same degree.

Apr 04 08:42

Local Cops Following Big Brother's Lead, Getting Cell Phone Location Data Without a Warrant

EFF

New data from law enforcement agencies across the country has confirmed what EFF has long been afraid of: while police are routinely using cell phone location tracking information, only a handful of agencies are bothering to obtain search warrants.

Since 2005, we've been beating the drum loudly, warning that the government's attempts to track a person's physical location through their cell phone requires a search warrant.

As we've said again and again, because cell phone tracking can give the government a snapshot of a person's life through their movements, a search warrant is necessary to safeguard against privacy intrusions...

n/a
Mar 13 16:58

European Commission Blames Social Networks For ACTA Failure; Worried About Its Imminent Directive On Copyright Enforcement

He noted that opposition had increased in the run-up to January’s planned vote in the US Congress on two legislative initiatives -- the Stop Online Piracy Act (SOPA) and the Protect Intellectual Property Act (PIPA) -- aimed at increasing the protection of intellectual property rights on the Internet; in the end the vote had not been held, following a hostile campaign by social networks and the loss of White House support.
It's interesting to see De Gucht linking the growing hostility to ACTA with the storm generated by SOPA/PIPA, and giving the credit for stopping those US bills to a "hostile campaign" waged by social networks. You can tell this really worries him, because he says something similar about social networks and ACTA immediately afterwards:

Mar 13 16:06

Home Secretary approves extradition of student Richard O'Dwyer over pirate TV website

Theresa May has approved the extradition of a British student to the United States for running a website that provided links to pirated films and television shows.

Richard O’Dwyer, 23, a computer science student at Sheffield Hallam University, faces up to 10 years in a federal prison for operating TVShack for three years until December 2010.

Mr O’Dwyer’s mother, Julia, said her son had been “sold down the river by the government” in comments designed to embarrass David Cameron as he arrives in Washington for talks with President Barack Obama.

She warned that Britain’s extradition treaty with the United States meant American authorities could come for the young, the old and the ill “and our government is paving the way”.

Mar 13 15:52

UK Teenager arrested for comments made on Facebook page

A teenager has been arrested for allegedly making comments on Facebook about the deaths of six British soldiers in Afghanistan last week.
According to Sky News, Azhar Ahmed of Ravensthorpe (19) posted comments on his profile page, criticizing the level of attention British soldiers who died in a bomb blast received, compared to that received by Afghan civilians killed in the war.
He was arrested on Friday and charged over the weekend.
A West Yorkshire Police spokesman said: "He didn't make his point very well and that is why he has landed himself in bother."

Mar 13 15:44

Big Brother Spy Cameras To Prevent Uninsured Drivers From Getting Gas

Government officials are rolling out a hi-tech automatic number plate recognition (ANPR) cameras to crack down on millions of motorists who drive without insurance.

Dec 11 07:08

Gordon Duff: The Wiki-Weasel, We Thought We Had Seen It All…

THE “WIKI-WEASEL” VINDICATES BUSH, WAR, TORTURE AND…?
“Wikileaks is a big and dangerous US intelligence Con Job which will likely be used to police the Internet”….F. William Engdahl
“supporting WikiLeaks founder, Julius Assange and..calling for revolution due to government cover-ups are intended results of a counterintelligence reverse tactic”…Bob Levin, FBI whistleblower

Dec 11 06:48

Wikileaks Reneges Bradley Manning Promise

Immediately following Bradley's arrest in late June 2010, the whistle-blower website Wikileaks publicly solicited donations specifically for Bradley's legal defense expenses. In July 2010, Wikileaks pledged to contribute a "substantial amount" towards Bradley's legal defense costs. Since Bradley's selection of David Coombs as his civilian defense attorney in August 2010, the Bradley Manning Support Network has unsuccessfully attempted to facilitate the pledged Wikileaks contribution.

Dec 10 15:21

Anti-piracy lawyers 'knowingly targeted the innocent', says law body

A major law firm knew it sometimes had no reliable evidence of unlawful filesharing when it demanded hundreds of pounds damages from internet users, according to the solicitors' watchdog.

Dec 10 12:02

Wikileaks: A Big Dangerous US Government Con Job

The story on the surface makes for a script for a new Oliver Stone Hollywood thriller. A 39-year old Australian hacker holds the President of the United States and his State Department hostage to a gigantic cyber “leak,” unless the President leaves Julian Assange and his Wikileaks free to release hundreds of thousands of pages of sensitive US Government memos. A closer look at the details, so far carefully leaked by the most ultra-establishment of international media such as the New York Times, reveals a clear agenda. That agenda coincidentally serves to buttress the agenda of US geopolitics around the world from Iran to Russia to North Korea. The Wikileaks is a big and dangerous US intelligence Con Job which will likely be used to police the Internet.

Dec 10 08:46

If We Lose our Internet Freedoms Because of Wikileaks, You Should At Least Know Why

The TIME magazine article is curious because it seems that right off the bat they were telling us how to interpret Wikileaks in such a way that sounded strangely familiar to George W. Bush back just after 9/11…

“By March, more than one million leaked documents from governments and corporations in Asia, the Middle East, sub-Saharan Africa and the former Soviet Bloc will be available online in a bold new collective experiment in whistle-blowing. That is, of course, as long as you don’t accept any of the conspiracy theories brewing that Wikileaks.org could be a front for the CIA or some other intelligence agency.” TIME Jan. 2007

Webmaster's Commentary: 

Especially when there are blogs that were blowing whistles a decade earlier (WRH started as a sub-page on my business web site on March 11, 1994). This author is correct; TIME Magazine was promoting Julian Assange and WikiLeaks before they had actually done anything at all!

Dec 10 08:15

BREAKING: WikiLeaks Being Used to Justify "Patriot Act" Legislation For Internet

After all, if information is now the enemy, we must carefully police any and every aspect of this dangerous medium -- all for the safety and protection of 'we the people.'

Oh, we’ll still have the Internet, just like you can still fly. You’ll just have to be on the 'approved' list, screened, stamped, zapped, mugged and molested if you want to get 'on the net.' No biggie. Thanks Julian -- job well done.

Dec 10 07:51

Dutch Police Arrest Suspect in Pro-WikiLeaks Hacking

Cassell Bryan-Low and Jeannie Whalen
The Wall Street Journal

Dutch authorities said they arrested a 16-year-old boy suspected of being involved in attacks on the websites of MasterCard and Visa that were allegedly mounted by sympathizers of document-leaking website WikiLeaks . . .

n/a
Dec 09 21:52

Google Map Foreclosure Tricks

Google Maps Foreclosure Listings

1. Punch in any US address into Google Maps.

2. Your options are Earth, Satellite, Map, Traffic and . . . More. (Select “More”)

3. The drop down menu gives you a check box option for “Real Estate.”

4. The left column will give you several options (You may have to select “Show Options”)

5. Check the box marked “Foreclosure.”

I wanted to demonstrate the full extent of Foreclosures in the US, so after setting GMaps on foreclosure listings, I slowly zoomed out of the map. Voila! Most foreclosures that are for sale in the USA are now showing on your screen.

But the maps do reveal an entire nation littered with foreclosure sales. It is an ugly and graphic depiction of how much inventory is out there, and why housing is still many years away from being healthy.

Dec 09 18:11

Wikileaks Used To Justify Net Control Legislation

I knew this was going to happen. They can use Wiki as a reason to regulate the Internet. Either Kill it. Or bring down a lot of new rules and regulations.

Dec 09 11:06

Hacktivist Army Engages in Cyber War to Free Internet, Assange

LONDON – The website attacks launched by supporters of WikiLeaks show 21st-century cyber warfare evolving into a more amateur and anarchic affair than many predicted.

While most countries have plowed much more attention and resources into cyber security in recent years, most of the debate has focused on the threat from militant groups such as al Qaeda or mainstream state on state conflict.

Dec 09 10:42

NASA sells off old PCs, but forgets to remove the secret data

Nasa may be filled with scientists capable of putting man into space, but its IT department leaves a lot to be desired.

As with all companies and organizations, PCs need replacing and old hardware discarded. In the case of Nasa, it was selling off PCs as operations for the space shuttle program start to wind down. The only problem being no one removed the sensitive data contained on the hard drives.

Policies are in place to ensure nothing confidential ever leaves Nasa premises, but those policies were not being followed by staff.

Dec 09 09:59

AMERICA: Y UR PEEPS B SO DUM?

Ignorance and courage in the age of Lady Gaga

If you hang out much with thinking people, conversation eventually turns to the serious political and cultural questions of our times. Such as: How can the Americans remain so consistently brain-fucked? Much of the world, including plenty of Americans, asks that question as they watch U.S. culture go down like a thrashing mastodon giving itself up to some Pleistocene tar pit.

Dec 09 05:29

Here's A Message The TSA May Find More Difficult To Ignore

4th Amendment Printed On Underwear, tees, socks In X-Ray-Visible Ink. Other styles and messages;; all send a clear message.....

What I want to know is.... Why not just wear a hospital gown, or a sheet, and voilà ! No need to scan! No need to pat! Get your hands off of me, you filthy TSA!

Dec 09 01:05

WHY NGO MONITOR IS ATTACKING THE ELECTRONIC INTIFADA

NGO Monitor’s attack on The Electronic Intifada is part of a well-financed, Israeli-government endorsed effort to silence reporting about and criticism of Israel by attacking so-called “delegitimizers” — those who speak about well-documented human rights abuses, support boycott, divestment and sanctions (BDS), or promote full equality for Palestinians.

Dec 08 20:17

Patriot Act for Internet ahead?

As a result of WikiLeaks, the Obama Administration may introduce a new bill that would allow government officials the ability to spy on Americans through the internet. Meanwhile, an army of hackers rally behind WikiLeaks by shutting down MasterCard and PayPal because they stopped all payments to WikiLeaks. Investigative journalist Wayne Madsen says we could see massive government surveillance of our personal computers, phones and surveillance of our internet activities.

SHARE THIS ARTICLE WITH YOUR SOCIAL MEDIA