Mar 19 13:53

Good News: Microsoft Hired More Women. Bad News: They Were Scantily Clad 'Schoolgirls'

Microsoft faces the glare of women everywhere after addressing its gender hiring issues in the worst way possible by booking scantily clad “Irish Catholic schoolgirls” for its St Patrick’s Day party at the Game Developers Conference in San Francisco.

Mar 19 11:11

Comcast failed to install Internet for 10 months then demanded $60,000 in fees

Nearly a year ago, a Silicon Valley startup called SmartCar signed up for Comcast Internet service. SmartCar founder and CEO Sahas Katta was moving the company into new office space in Mountain View, California, and there was seemingly no reason to think Comcast might not be able to offer him Internet access.

Mar 19 10:30

LIVE Stream: Donald Trump Rally in Phoenix, AZ .

Webmaster's Commentary: 

Currently showing MoveOn/Brown Shirts Matter thugs blocking the roads so that people cannot get to Trump rally!

Mar 19 09:46

Just Google it: Anyone could have 'hacked' and doxxed Trump like Anonymous

While some are impressed by the activities of Anonymous, others are not blown away. The BBC decided to see how easy it was to obtain the same information about Donald Trump as Anonymous, and found that it was child's play. It was so simple, in fact, that there was no need to even do any digging for his cell phone number, as Trump had already shared it with everyone on Twitter -- although it's hard to imagine there isn't another number in use by now.

Information such as the contact details for Trump's 'secret' business HQ is readily available on The Trump Organization website -- little more than a Google search for 'Trump' takes you there. Trump's date of birth? Look no further than his Wikipedia page for this info. Ditto details about his kids, place of birth and parents.

The BBC takes great delight in knocking Anonymous down a peg or two by pointing out the ease with which Anonymous' info can be obtained.

Mar 19 09:36

See This Fleet of Drone Billboards Being Developed in Switzerland: Project Skye

By Nicholas West

The realization of a true Minority Report world continues unimpeded. We are continuously tracked physically and economically in order to reduce human beings to nothing more than walking data fields from which to extract and use information in any way seen fit to exploit. Biometrics for targeted marketing, predictive policing, predictive health algorithms, and interactive programs are making the real world seem more like a virtual reality simulation.

Enter the digital billboard ... now via drone...

Mar 19 08:37


IT’S BEEN EIGHT months since a pair of security researchers proved beyond any doubt that car hacking is more than an action movie plot device when they remotely killed the transmission of a 2014 Jeep Cherokee as I drove it down a St. Louis highway. Now the FBI has caught up with that news, and it’s warning Americans to take the risk of vehicular cybersabotage seriously.

Webmaster's Commentary: 

Maybe it is not such a great idea to have cell-phone, wifi, bluetooth as a car accessory.

Mar 19 07:56

WikiLeaks to Facebook: “Stop Censoring Our Hillary Clinton Email Release” Searchable Database

By Baran Hines

Whistleblower organization WikiLeaks delivered a clear message to social media giant Facebook on Friday, demanding the tech company stop censoring their content. The activist group posted a message to their Twitter account, saying “stop censoring our Hillary Clinton email release,” with a saved screenshot of a Facebook error message on the attempted post...

Mar 19 07:48


Hillary Clinton’s recent statement on her potential prosecution, “it’s not going to happen,” then refusing to address the question at all in a recent debate, led to speculation about a backroom deal with the White House to shield Hillary from prosecution as long as Mr. Obama is in the Oval Office. After mid-January, however, all bets would be off. In that case, winning the White House herself could be an urgent matter of avoiding prosecution for Ms. Clinton.

Mar 19 07:01

Smartphones and other technology keep changing how we bank

(*So we don't know whether we're coming or going by the time the money starts disappearing from our accounts .)

Mar 18 12:26

San Francisco Legislators Dodging Public Records Requests With Self-Destructing Text Messages

You can call it irony. Or bullshit. But what you can't call it is good government. Cory Weinberg of The Information reports San Francisco legislators [warning: paywalled link] are using one of those infamous tools o' terrorism -- messaging service Telegram -- to dodge open records requests.

Mar 18 12:23

Exposing the Libyan Agenda: A Closer Look at Hillary’s Emails

Of the 3,000 emails released from Hillary Clinton’s private email server in late December 2015, nearly a third were from her close confidante Sidney Blumenthal, the Clinton aide who gained notoriety when he testified against Monica Lewinsky. One of these emails, dated April 2, 2011, reads in part:

Qaddafi’s government holds 143 tons of gold, and a similar amount in silver . . . . This gold was accumulated prior to the current rebellion and was intended to be used to establish a pan-African currency based on the Libyan golden Dinar. This plan was designed to provide the Francophone African Countries with an alternative to the French franc (CFA).

In a “source comment,” the original declassified email adds:

Mar 18 11:19

Hillary Has an NSA Problem

Now, over two months later, I can confirm that the contents of Sid Blumenthal’s June 8, 2011 email to Hillary Clinton, sent to her personal, unclassified account, were indeed based on highly sensitive NSA information. The Agency investigated this compromise and determined that Mr. Blumenthal’s highly detailed account of Sudanese goings-on, including the retelling of high-level conversations in that country, was indeed derived from NSA intelligence.

Webmaster's Commentary: 

The important element to this story is that those top secret documents were on isolated networks, not connected to the regular internet. There is no way those documents could "accidentally" be emailed to Hillary's server. Someone copied those documents onto a flash drive and walked them outside the secure area, then copied them onto Hillary's server.

Mar 18 10:22

Apple Encryption Engineers, if Ordered to Unlock iPhone, Might Resist

If the F.B.I. wins its court fight to force Apple’s help in unlocking an iPhone, the agency may run into yet another roadblock: Apple’s engineers.

Apple employees are already discussing what they will do if ordered to help law enforcement authorities. Some say they may balk at the work, while others may even quit their high-paying jobs rather than undermine the security of the software they have already created, according to more than a half-dozen current and former Apple employees.

Webmaster's Commentary: 

This is the government, throwing its weight around like a typical dictatorship, getting what it wants only because it wants it and not because it will accomplish anything.

After all the news reporting about government back-doors does anyone think real criminals or terrorists will ever use those devices or rely on the "approved" encryption? Of course not! Edward Snowden confirms that the NSA has never succeeded in preventing a terror attack, and the tsunami of ransomware and other cyber attacks proves that criminals are already their own systems of encryption, which are in fact very easy to create.

So what we have here is the government wasting billions of dollars to spy on law-abiding Americans who are not doing anything, while the real criminals and terrorists rampage across our society unhindered!

Mar 18 09:24

Video: The Next Neoliberal Battle In Cuba: Its Internet

On Thursday, President Obama recommended Google take over an internet system that used to be in the hands of the Venezuelan government.

Mar 17 15:58

Modern Warfare Just Changed Forever — Laser Weapons are Ready for Use — TODAY

By Matt Agorist

As if autonomous drones launching Hellfire missiles at targets acquired through the collection of metadata weren’t horrifying enough, the US military now has its own death rays — no kidding...

Mar 17 15:21

Anonymous releases Donald Trump's personal details after cyber hackers declare 'total war' on presidential hopeful

The 'hactivist' collective Anonymous has released a new video threatening the billionaire and linking to documents showing his phone number and social security number

Mar 17 14:40

How Microsoft copied malware techniques to make Get Windows 10 the world's PC pest

Microsoft uses techniques similar to aggressive malware to promote its “Get Windows 10” offer.

As many readers have discovered, the persistent and constantly changing methods Microsoft uses to continually reintroduce its “Get Windows 10” tool, or GWX, onto computers means it’s extremely difficult to avoid.

Mar 17 12:08

AceDeceiver: First iOS Trojan Exploiting Apple DRM Design Flaws to Infect Any iOS Device

We’ve discovered a new family of iOS malware that successfully infected non-jailbroken devices we’ve named “AceDeceiver”.

What makes AceDeceiver different from previous iOS malware is that instead of abusing enterprise certificates as some iOS malware has over the past two years, AceDeceiver manages to install itself without any enterprise certificate at all. It does so by exploiting design flaws in Apple’s DRM mechanism, and even as Apple has removed AceDeceiver from App Store, it may still spread thanks to a novel attack vector.

Webmaster's Commentary: 

And where is the NSA, which justified its violations of the 4th Amendment by claiming it protects our nations IT infrastructure from attack?

Mar 17 11:41

This Is the Only Reason That Clinton Is Not in Prison

Why isn’t Lynch holding Clinton accountable? Simple, she is going to be the President and lead us down the final path of destruction.


Clinton must be kept free to do what she does best and that is why she not in prison and she must fulfill her destiny to destroy the United States.

Mar 17 10:40

The Man Who's Building a Computer Made of Brains

Google, Facebook, and IBM have all gone all-in on brain-like computers that promise to emulate the mind of a human. The ability to learn and recognize patterns is viewed as a key next step in the evolution of AI. But Oshiorenoya Agabi believes the brain-like processors are missing one key component: actual brains.

Or, at least, living neurons. His startup, Koniku, which just completed a stint at the biotech accelerator IndieBio, touts itself as “the first and only company on the planet building chips with biological neurons.” Rather than simply mimic brain function with chips, Agabi hopes to flip the script and borrow the actual material of human brains to create the chips. He's integrating lab-grown neurons onto computer chips in an effort to make them much more powerful than their standard silicon forebears.

Mar 17 10:30

Millions menaced as ransomware-smuggling ads pollute top websites

Top-flight US online publishers are serving up adverts that attempt to install ransomware and other malware on victims' PCs.

Websites visited by millions of people daily –,,,,,, and more – are accidentally pushing out booby-trapped adverts via ad networks, warn infosec researchers.

Webmaster's Commentary: 

And this right after the UK Culture Minister advocated government ban ad-blockers!

And once again, the not-as-mighty-as-they-like-to-pretend NSA, always eager to viol;ate the 4th Amendment and spy on law abiding citizens, is proving to be very "limp" when it comes to real computer criminals.

Mar 17 10:10

ALERT: Major websites hit by dangerous “malvertising” ransomware. Pay up, or you don’t get into your files!

The New York Times, BBC, and some other major websites were hit by dangerous ads called “malvertising” ransomware.

It could infect your computer just by visiting the site. You do not even have to click on the ads.

Surfing the net may put your computer hostage and demand you pay up.

If you do not, you will not be able to get into your files.

The attack on the media sites was delivered through multiple ad networks, and it targeted security holes in out-of-date versions of Silverlight, Flash and other software, according to the researchers.

The ransomware didn’t require visitors to the websites to interact with the ads, according to Malwarebytes Senior Security Researcher Jerome Segura, and it was aimed at visitors with outdated programs.

Webmaster's Commentary: 

And once again the NSA is shown to the world as being rather "limp" in the face of these cyber-criminals.

And yes, the WRH server is being attacked this morning again.

Mar 17 09:29

Encrypted email provider ProtonMail opens to public, adds Android and iOS apps

ProtonMail, the Swiss provider of an end-to-end encrypted email service, announced Thursday that it was exiting beta and opening registrations to the general public. Additionally, the company announced free mobile apps for both Android and iOS.

Encryption is, without a doubt, leading conversations around information security. Following the Snowden revelations, and the more recent war between Apple and the FBI, ProtonMail couldn't have picked a more turbulent environment in which to go public. However, that could work in their favor, as increased questions about privacy have driven more people to seek encryption solutions.

Webmaster's Commentary: 

The fact that it is Swiss does not guarantee that it is not back-doored by the NSA. If you really have something to hide, write your own encryption system.

Mar 17 09:20


Judicial Watch said it wants answers from:

Stephen D. Mull, executive secretary of the State Department from June 2009 to October 2012. He suggested that Clinton be issued a State Department BlackBerry, which would protect her identity and would also be subject to FOIA requests;

Lewis A. Lukens, executive director of the executive secretariat from 2008 to 2011. He emailed with Patrick Kennedy and Cheryl Smith about setting up a computer for Clinton to check her email account;

Patrick F. Kennedy, under secretary for management since 2007 and the secretary’s principal adviser on management issues, including technology and information services;

Donald R. Reid, senior coordinator for security infrastructure, Bureau of Diplomatic Security since 2003. He was involved in early discussions about Clinton using her BlackBerry and other devices to conduct official State Department business;

Mar 17 09:18

How to beat ransomware: Prevent, don't react

The first step in ransomware prevention is to recognize the different types of ransomware you can be hit with. Ransomware can range in seriousness from mildly off-putting to Cuban Missile Crisis severe.

Mar 17 08:38

PIC Windows 10 RANT!!

Mar 17 06:53

Encryption is dead! Quantum computing and the NSA

Yesterday an article was published on Intellihub which referenced the fact that in my March 2nd article I beat both Edward Snowden and former National Coordinator for Security, Infrastructure Protection and Counterterrorism Richard Clarke in announcing that the FBI had the means to access the encrypted communications of the alleged San Bernardino shooters without the assistance of Apple, in my March 2nd Intellihub article

Mar 16 18:48

US Founders Would Be ‘Appalled’ By US Government Request

Apple Inc says the US government officials can do anything they “dream up” and have requests that would appall the country’s founders.

Mar 16 15:21

‘Founders Would Be Appalled’: Apple Accuses FBI, DoJ Of Trying To ‘Rewrite History’

Apple has accused the US government of “attempts to rewrite history”, saying that Founding Fathers “would be appalled” by Department of Justice and FBI’s requests. The corporation is fighting demands to unlock the San Bernardino shooter’s iPhone.

Mar 16 15:13

‘Thunderstorm Spiral': Pentagon Trains for Underground War/Disaster In Densely-Populated MegaCities

Increasingly, the Pentagon is looking at the likelihood – perhaps the inevitability – of war/conflict inside of a destabilized or decimated megacity urban center like New York – and even underground.

In the program titled ‘Thunderstorm Spiral,’ the US government solicits demonstrations to tackle the challenges of megacities and underground environments, which will become increasingly prevalent as populations continue to grow.


Mar 16 11:11


Clinton and her top aides had access to a Pentagon-run classified network that goes up to the Secret level, as well as a separate system used for Top Secret communications.

The two systems - the Secret Internet Protocol Router Network (SIPRNet) and the Joint Worldwide Intelligence Communications System (JWICS) - are not connected to the unclassified system, known as the Non-Classified Internet Protocol Router Network (NIPRNet). You cannot email from one system to the other, though you can use NIPRNet to send emails outside the government.

Somehow, highly classified information from SIPRNet, as well as even the super-secure JWICS, jumped from those closed systems to the open system and turned up in at least 1,340 of Clinton's home emails - including several the CIA earlier this month flagged as containing ultra-secret Sensitive Compartmented Information and Special Access Programs, a subset of SCI.

Webmaster's Commentary: 

Back in 1996, when Bill Clinton was running for re-election, he authorized the transfer of highly sensitive technology to China. This technology had military applications and allowed China to close the gap in missile performance with the United States. The transfers were opposed and severely criticized by the Defense Department.

At the same time Bill Clinton was transferring this technology to China, huge donations began to pour into his re-election campaign from the US companies allowed to sell the technology to China, and from American citizens of Chinese descent. The fact that they were US citizens allowed them to donate to political campaigns, but it later emerged that they were acting as conduits for cash coming in from Asian sources, including Chinese Intelligence Agencies! The scandal became known as China-gate!

This establishes a history of the Clintons treating US secrets as their own personal property, selling them to raise money for campaigns.

Now then, let us consider a private email server with weak security, at least one known totally open access point, no encryption, and outside the control and monitoring systems of the US government, on which are parked many of the nation's most closely guarded secrets! Security experts agree that Hillary's server had worse security than the Ashley Madison website!

Now, consider a charitable foundation owned by the Clintons (which actually does very little charitable work). Being a charitable foundation, it is allowed to accept "donations" from foreign sources, and roughly 40% of the cash that has poured into the Clinton Foundation has come from foreign sources. Many of those foreign sources received preferential treatment from Secretary of State Hillary Clinton, sufficient for attorney Larry Klayman to file a RICO lawsuit against the foundation (which as of last report was thrown out of court by a Clinton-appointed judge who refused to recuse himself over the obvious conflict of interest)!

Easy means of delivering secrets. Easy means of accepting payment! And now there is confirmation that Hillary did have a private "off the books" spy network, centered on Sidney Blumenthal, while she was secretary of state!

This is a perfect setup to repeat the 1996 selling of secrets for cash. In other words, a perfect espionage operation, running out the US State Department, with the weak email server providing the secrets and a charitable foundation to accept and launder the payments! Hillary doesn't have to physically steal the files, the way Jonathan Pollard did. Hillary doesn't have to scratch an X on a mailbox, the way Aldrich Ames did. Hillary doesn't have to tape bundles of stolen documents underneath a park bridge, like Robert Hannsen did!

It is time to look past the small scandal of the private email server at what may be a far larger scandal hidden behind it!

And the longer the government and corporate media avoids this question, the more complicit they look!


Mar 16 10:59

Hillary Clinton Email Archive

On March 16, 2016 WikiLeaks launched a searchable archive for 30,322 emails & email attachments sent to and from Hillary Clinton's private email server while she was Secretary of State. The 50,547 pages of documents span from 30 June 2010 to 12 August 2014. 7,570 of the documents were sent by Hillary Clinton. The emails were made available in the form of thousands of PDFs by the US State Department as a result of a Freedom of Information Act request.

Webmaster's Commentary: 

A free WRH coffee mug to anyone who finds a new and previously unreported scandal!

Mar 16 10:20

Drone Wars: “Unmanned Warrior 2016” Drills in October Off Scottish Coast

By Nicholas West

The global drone arms race continues to heat up as nation after nation tries to keep pace with what the U.S. military has initiated...

The latest push to integrate drones onto the battlefield and prepare for a possible future where drone meets drone, sans humans, comes from Great Britain’s Royal Navy...

Mar 16 09:33

Lebanon telecoms minister links illegal internet to Israeli spy networks

Telecommunications Minister Boutros Harb vowed Wednesday to hunt down illegal internet providers, saying they were linked to Israel and thus posed a danger to Lebanon’s national security.

Mar 16 09:08

The 7 biggest myths about artificial intelligence

AI is often associated with Terminator-like scenarios that depict machines taking over the world. Here are some of the biggest misconceptions we have about this technology.

Webmaster's Commentary: 

Mar 16 05:45

Self-Driving Cars Programmed to Sacrifice As They Hit the Road: "Someone Is Going to Die"

Self-driving cars are poised to take over U.S. roads and destroy American jobs… and they will also kill people, even if by accident.

The robot car revolution hit a speed bump on Tuesday as senators and tech experts sounded stern warnings about the potentially fatal risks of self-driving cars.“There is no question that someone is going to die in this technology,” said Duke University roboticist Missy Cummings in testimony before the US Senate committee on commerce, science and transportation. “The question is when and what can we do to minimize that.”


Mar 15 18:17

Snowden Bombshell: Unconstitutional Mass Surveillance “Never Stopped a Single Terrorist Attack”

Bulk data gathering programs used by US intelligence have no effect in combating terrorism and have failed to prevent any attacks in their 10 years of operation, whistleblower and former NSA contactor Edward Snowden, claims in a recent interview.

Mar 15 17:50

Windows 7 users complain of unprovoked Windows 10 auto-upgrades

As Microsoft auto-upgrades more PCs to Windows 10, some users are complaining that they weren’t adequately notified.

Reports of unwanted Windows 10 upgrades have been circulating for the past few days on Reddit and Twitter, after the last Patch Tuesday. These users say they never approved or initiated the upgrade, and were dragged away from their Windows 7 (or perhaps Windows 8) installs anyway.

Webmaster's Commentary: 

After the last patch, Microsoft tried to upgrade Claire's choir lap[top to Windows 10, but we already tried that and reverted.

Mar 15 16:35

The Matrix of Technocracy: The Roots of the Conspiracy

By Jon Rappoport

Many independent researchers, writers, and broadcasters have exposed the operation called technocracy. I want to give particular thanks to Patrick Wood, whose investigations are essential. His most recent book is "Technocracy Rising."

Consider the term “scientific humanism.” The Oxford Dictionary offers this definition: “A form of humanist theory and practice that is based on the principles and methods of science; specifically the doctrine that human beings should employ scientific methods in studying human life and behaviour, in order to direct the welfare and future of mankind in a rational and beneficial manner…Origin mid-19th century.”

Two items jump out from the page: “…in order to direct the welfare and future of mankind,” and “Origin mid-19th century.”

The first phrase obviously refers to a plan...

Mar 15 10:29

The Government Wants Apple To Turn Over The iOS Source Code So It Can Spy On Any iPhone

The latest filing in the legal war between the planet’s most powerful government and its most valuable company gave one indication of how the high-stakes confrontation could escalate even further.

In what observers of the case called a carefully calibrated threat, the U.S. Justice Department last week suggested that it would be willing to demand that Apple turn over the "source code" that underlies its products as well as the so-called "signing key" that validates software as coming from Apple.

Together, those two things would give the government the power to develop its own spying software and trick any iPhone into installing it. Eventually, anyone using an Apple device would be unable to tell whether they were using the real thing or a version that had been altered by officials to be used as a spy tool.

Webmaster's Commentary: 

This is a very clumsy attempt by the (alleged) US Justice Department to throw the 4th Amendment to the Constitution under a bus; I hope apple sticks to its guns on this.

Mar 15 09:39

Paedophiles hiding behind Anonymous mask to lure children and share explicit content

Hackers and cyber activists are exposing paedophiles online after they discovered sexual predators were hiding behind the guise of Anonymous members in order to lure victims and share explicit content.

Webmaster's Commentary: 

How do you know they are not real Anonymous members?

Mar 15 09:17

Apple Fight Could Escalate With Demand For ‘Source Code’

The latest filing in the legal war between the planet’s most powerful government and its most valuable company gave one indication of how the high-stakes confrontation could escalate even further.

Mar 15 09:00

Could Hillary Clinton face the same fate as David Petraeus?

Could Hillary Clinton's handling of classified information while secretary of state sink her presidential hopes?

It's a question that has dogged her campaign for over a year - but opinions are divided over whether the allegations made against her constitute a crime or are just the latest partisan sideshow.

Webmaster's Commentary: 

One of Hillary's emails from June 17, 2011, shows Hillary instructing a subordinate, Jake Sullivan, to strip the classification headers off of a document so that it can be sent to her by non-secured means. That is a felony violation of 18 USC 793. On that alone Hillary should be indicted and prosecuted.

Remember China-gate from 1996? Then President Bill Clinton authorized the sale of sensitive US technology to China and Chinese money was donated to his re-election campaign!

Was Hillary playing the same game, selling US secrets delivered via a private server with weaker security than the Ashley Madison website in exchange for "donations" to her "charitable" foundation?

It is time to look past the server itself to what may be the biggest spy scandal in US history!

Mar 15 07:44


It was a ridiculous interview – full of the usual spin and lies – but it did show how even the most powerful politicians are being rocked by the internet these days.

And how this is puncturing their gassy rhetoric.

They can’t get away with pontificating about freedom while passing secret orders to rip away freedoms and privacy. They actually have to make arguments to justify the fascism they’re trying to push. And it’s very hard to make those arguments as O’Bomber is finding out,

In a pre-Internet era, Barack would have turned the FBI loose to intimidate the pertinent parties just the way they did with Ma Bell. But there are too many companies making too many products and he and other politicians have lost the old tools of intimidation.

And so he tries to justify the unjustifiable. It comes across as complicated whining:

Webmaster's Commentary: 

The internet and independent media have stripped the establishment of their ability to lie to the public with impunity. With that gone, the people of the world see the US Government for what it truly is, making its eventual collapse inevitable.

Dear tyrants. You should have complied with that contract with America, the Constitution, or you would not be in this mess. So stop blaming freedom-loving people because we are onto your lies, frauds, and deceptions, and look in a mirror to find the villain.

You did it to yourselves.

Mar 15 07:41

#Anonymous declares 'total war' on Donald Trump  #OpTrump

Webmaster's Commentary: 

So Anonymous aren't the good guys after all! Only a few days after the ultra-rich meet on Jekyll Island to stop Trump, Anonymous leaps into the fray!

Mar 14 19:42

Ironic: CCTV systems slide open a backdoor into your biz network

Closed circuit TV systems, designed to protect organisations' physical assets, commonly create holes for hackers to exploit and tunnel their way into enterprise systems.

Research carried out by independent consultant Andrew Tierney on behalf of Cloudview – a video surveillance company based in Hampshire, England – found major vulnerabilities in traditional DVR-based CCTV systems and cloud-based video systems.

The security flaws inherent in almost all CCTV systems make it all too easy for intruders to hijack connections to and from the devices' IP addresses, putting enterprises' data at risk while leaving operators in breach of EU Data Protection regulations.

Mar 14 15:19

Exposing The Libyan Agenda: A Closer Look At Hillary’s Emails

Critics have long questioned why violent intervention was necessary in Libya. Hillary Clinton’s recently published emails confirm that it was less about protecting the people from a dictator than about money, banking, and preventing African economic sovereignty.

Mar 14 14:17

The Potential Problems With Artificial Intelligence

By Brian Berletic

Artificial intelligence (AI) is, simply put, intelligence exhibited by software and machines. Intelligence itself could be defined as the ability to learn and solve problems. In nature, evolution has endowed many species with intelligence, and human beings in particular with a relatively formidable ability to learn and solve problems...

Our natural, human intelligence has given rise to exponential technological progress; and, amid that progress, we have begun to create an artificial intelligence through computer science unconfined by natural evolution, biological limitations, and thus able to accelerate exponentially faster than our own intelligence has developed...

Mar 14 14:16

Microsoft Has Just Blackmailed Linux Twice in One Single Week and the Media Didn’t Notice or Just Ignored It Because of Microsoft’s Charm Offensives

Microsoft loves Linux enough to strangle it to death with patents while the media isn’t paying attention and instead telling us that Microsoft is now a buddy or “pal” of GNU/Linux

Mar 14 11:15

WhatsApp Strong Encryption Frustrates US Prosecutors

The Justice Department has opened another front in the war against secure encryption by going after WhatsApp.

The DOJ is frustrated with the popular messaging app’s strong encryption and might go after its parent company, Facebook, in a case similar to Apple-iPhone Vs FBI.

Webmaster's Commentary: 

Real criminals and terrorists know not to use the devices in the first place, or have developed their own encryption. This attack on the 4th Amendment is all about making sure law-abiding citizens are not thinking double-plus ungood thoughts about their anointed leaders!

Mar 14 09:57

The Seven Most Vitriolic Passages in DOJ’s Response to Apple

In case there was ever any doubt, the Justice Department declared war on Apple on Thursday.

Prosecutors demanded that a federal judge force Apple to unlock San Bernardino killer Syed Rizwan Farook’s iPhone in a brief that bristled with so much venom that Apple’s top lawyer, Bruce Sewell, said it “reads like an indictment.”

Sewell, Apple’s senior vice president of legal and global security, was outraged.

“In 30 years of practice, I don’t think I’ve seen a legal brief that was more intended to smear the other side with false accusations and innuendo, and less intended to focus on the real merits of the case,” he said.

“For the first time we see an allegation that Apple has deliberately made changes to block law enforcement requests for access. This should be deeply offensive to everyone that reads it.”

Webmaster's Commentary: 

This is an assault against the 4th Amendment, pure and simple.

Apple is quite correct in fighting this, tooth and nail.

Mar 14 09:14

New police radar gun to catch people who text while driving

A Virginia-based company has been working on a device that will enable police to determine whether or not a driver is using his or her cell phone for texting while on the road.

Mar 14 08:02

As Twitter, Facebook and YouTube ramp up selective censorship, alternative search is more important than ever!

Love or hate social media, there is no doubt that it has become one of – if not the – most powerful ways to communicate and share opinions.

But questions are being asked as to whether those responsible for running of social media organizations, such as Facebook, Twitter and YouTube, are censoring information based on their own ideological viewpoints – or views that they are being paid to promote.

Mar 14 07:56

Microsoft's done a terrible job with its Windows 10 nagware

Why else would Redmond use security updates for 'more approachable' nagging?

Remember that Windows 7 laptop I allowed to upgrade to Windows 10? Then after a week's worth of disasters I reverted it back to Windows 7. I installed the GWX Control Panel to block further nags and attempts to force an upgrade only to have the latest Microsoft patch to Windows 7 (25 files in total) re-install the update feature. As a side note, the reversion turns out not to work properly. If you go from either Win7 or Win8 to Win10, then back, the tasks system gets totally hosed and unrecoverable.

Nice job, Redmond. You are really impressing the hell out of computer geeks!

Mar 14 07:53

Hey Windows 10, weren't you supposed to help PC sales?

Very few if any ever thought Windows 10 would truly reinvigorate the PC industry, and they were right - IDC has pulled down forecasts on traditional device sales for 2016.

The analyst has clipped unit expectations by a couple of per cent, claiming global notebooks and desktops shipments into channels are now on course to decline 5.4 per cent to 260.9 million.

Mar 14 05:29

NSA’s data to be shared with police

Data collected by the National Security Administration on the private communications of U.S. citizens will now be shared with law enforcement agencies, writes Radley Balko in the Washington Post.

Mar 13 10:26

REPOST - Rivero challenges the NSA

The US Government insists their demand for a ban on strong encryption or back doors into all of our electrinic devices is to stop crime and terror.

But over the course of a year, as documented on this page, What Really Happened issued six encryption challenges based on systems of encryption created and programmed here on an air-gapped computer.

Now, I am not an encryption expert, and only a moderately decent programmer. The NSA would have a strong motive to break my codes to discourage others from creating their own systems of encryption.

None were ever solved.

If I can beat the NSA, it means real criminals and terrorists can defeat the NSA and keep their communications private.

Hence, the real agenda of the government is not to stop crime and terror but to monitor the American people to make sure they are not thinking those double-plus ungood thoughts about how this nation is being run!

Webmaster's Commentary: 

Mar 13 09:46

President Obama urges SXSW audience not to be 'absolutists' on encryption

As a practiced politician, Obama avoided coming down too hard on any one side, and he said he wasn't able to discuss the ongoing FBI vs. Apple case at all. But by and large his message was that sacrificing some degree of privacy for the sake of our safety has served the country well for hundreds of years, and he expects we'll figure out a way to do so digitally as well.

Webmaster's Commentary: 

We already proved that the NSA cannot find real criminals and terrorists able to create their own encryption. The real issue is that the government is scared that the people are waking up to what has been going on in this country and they want to scan all of our communications for "double-plus ungood" thinking!

Mar 13 09:23

Federal Judge Inadvertently Confirms Existence of NSA Spying Program

After he was arrested, Hasbajrami was told his emails to another individual were swept up by the PRISM program. He filed a motion to have the evidence against him dismissed, because the warrantless surveillance program violated his reasonable expectation of privacy. If his motion had succeeded, the New York Law Journal cites his attorneys saying his guilty plea would have been vacated.

In a ruling handed down on February 18 but not made public until this week, Federal District Court Judge John Gleeson ruled against Hasbajrami, saying the collection of email evidence against him was “reasonable in light of the Fourth Amendment’s protections.”

The ruling noted that under the relevant law, the FISA Amendments Act of 2008, prosecutors are not required to specify the exact people and places they plan to keep under surveillance when they apply to the Foreign Intelligence Surveillance Court.

Mar 13 08:25

IPhone Just The Beginning: Obama Just Announced He Wants A Backdoor To Everything

While visiting South By Southwest (SXSW) on Friday, President Barack Obama argued that the government should be given a backdoor to all encrypted smartphones and communications devices. Although Obama repeatedly played the child molester and terrorist cards, he never confronted the possibility of U.S. intelligence agencies abusing their power at a level far more technologically advanced than the KGB, Stasi, or SAVAK.

Mar 12 16:00

The FBI Has a 'Devastating Witness' Who Could Ruin Hillary's Presidential Bid

We'll be the first to admit that it's difficult to imagine Hillary Clinton facing legal consequences for anything she does -- whether it's related to her private e-mails or destroying Libya.

Aside from the fact that she's a Clinton, and therefore above the law, there are plenty of indicators which suggest that Hillary will never see her long-overdue day in court. For example, Howard J. Krongard, a former Inspector General of the Department of State, insists that the FBI's probe into Hillary's private e-mail server "will never get to an indictment".

But the investigation has taken a number of interesting turns since Krongrad made those remarks in the beginning of February.

Mar 12 10:30

Obama makes case for gov access to all digital devices to prevent terrorism and tax cheats

Without mentioning the government’s case against Apple directly, President Barack Obama told a Texas audience that mobile devices should be built such a way that the government can access them in order to prevent a terrorist attack or enforce tax laws.

Webmaster's Commentary: 

The latter is the real goal; to know where your money is so the government can grab it when they need to!

Mar 12 08:25

Facebook admits to continuously eavesdropping on smartphone microphones

Webmaster addition: It may not be Facebook, but the cell phone company, or anyone else with electronic access to your cell phone.

Mar 12 08:22

Source: Clinton IT specialist revealing server details to FBI, 'devastating witness'

Former Hillary Clinton IT specialist Bryan Pagliano, a key witness in the email probe who struck an immunity deal with the Justice Department, has told the FBI a range of details about how her personal email system was set up, according to an intelligence source close to the case who called him a “devastating witness.”

Webmaster's Commentary: 
Mar 11 23:01

Source: Clinton IT specialist revealing server details to FBI, 'devastating witness'

Former Hillary Clinton IT specialist Bryan Pagliano, a key witness in the email probe who struck an immunity deal with the Justice Department, has told the FBI a range of details about how her personal email system was set up, according to an intelligence source close to the case who called him a “devastating witness.”

The source said Pagliano told the FBI who had access to the former secretary of state’s system – as well as when – and what devices were used, amounting to a roadmap for investigators.

Mar 11 09:08

The iPhone Is Just the Beginning: FBI Already Accessing Your DNA

By Jake Anderson

Private genetic databases like 23andMe and are increasingly used by people for genealogy tracing and medical diagnostic tests. With a million customers each, the two companies receive a great deal of attention from privacy advocates, who for years warned the government would eventually seek access to citizens’ DNA in order to assist with law enforcement.

They were right, and yet another conspiracy theory becomes conspiracy fact…

Mar 11 08:31

Loretta Lynch: DOJ Not Required to Take FBI Advice on Hillary Prosecution

The Department of Justice would not be required to have to prosecute Hillary Clinton even if the FBI were to recommend charges be filed against her for the use of a private email server when she was secretary of state, Attorney General Loretta Lynch has indicated.

Webmaster's Commentary: 

Mar 11 07:25

Mystery 'Dude' Rattles Turkish Stock Traders With Massive Bets

There’s a specter haunting stock traders in Istanbul that some are calling “the dude.”

A mystery investor who first appeared a year and a half ago with $450 million of bets on a single day, almost double the market average, is now executing major transactions with increasing frequency, scaring away competitors who can’t figure out when he or she will strike next, traders and bankers said.

Webmaster's Commentary: 

When the Stock Market becomes weaponized, it is time to get out!

Mar 11 07:10

How a hacker's typo helped stop a billion dollar bank heist

Four requests to transfer a total of about $81 million to the Philippines went through, but a fifth, for $20 million, to a Sri Lankan non-profit organization was held up because the hackers misspelled the name of the NGO, Shalika Foundation.

Webmaster's Commentary: 

See, kids; spelling DOES matter! :)

Mar 10 16:16

Flash – aaah-aarrgh! Patch now as hackers exploit fresh holes

Adobe has urged users to patch their Windows, OS X and Linux editions of Flash Player to address 23 security vulnerabilities, including one that is actively being targeted in the wild.

The March update includes a number of fixes for vulnerabilities that could, if exploited, allow an attacker to remotely execute code on a targeted system simply by loading a malformed Flash file. In other words, visiting a booby-trapped webpage, or viewing a Flash ad, could inject malware into your computer.

One of those flaws, CVE-2016-1010, is being used for what Adobe calls "limited, targeted attacks."

Users running Flash Player and earlier for Windows, OS X and Linux should look to update the software.

Mar 10 15:47

THE FIX IS IN! Lynch indicates DOJ not required to charge Clinton

Attorney General Loretta Lynch indicated Wednesday that the law doesn't require the Justice Department to pursue criminal charges against Hillary Clinton for her use of a private email system, even if the FBI recommends criminal charges.

Mar 10 15:14

When Google Meets The Pentagon

The United States is, indisputably, the world’s foremost killing entity, and it has been since its genocidal inception., The killing is relentless — in more recent times wreaking destruction in Iraq as well as being deeply involved in the current carnage in Syria.

Mar 10 14:17

DOJ accuses Apple of deliberately raising tech barriers in San Bernardino iPhone case

The Justice Department has accused Apple of "false" and "corrosive" rhetoric in a court filing, marking the latest bout in the battle between the government and the technology company over access to the work iPhone of one of the San Bernardino shooters.

"Apple deliberately raised technological barriers that now stand between a lawful warrant and an iPhone containing evidence related to the terrorist mass murder of 14 Americans," the DOJ wrote in the filing.

Mar 10 13:36

Hillary Clinton’s Destruction of Emails Was a Federal Crime

So: on the face of it, what Secretary Clinton did was evidence-tampering and thus a federal crime, but to expect it to be prosecuted to the full extent of the law, or even at all, would seem to be unlikely. It might be, in the American system, permissible crime.

Mar 10 13:28

New Documents Reveal Details of Federal Aerial Surveillance Programs

By Derrick Broze

New documents reveal that the several federal agencies have been operating surveillance flights over the United States since at least 2009.

The Electronic Frontier Foundation recently received new records related to the U.S. Marshals aerial surveillance program...

Mar 10 12:40

FLASHBACK - SHE LIED! State Dept. Finds Discarded Benghazi Emails on HIllary's Home Server

Mar 10 10:01

Spike in ransomware spam prompts warnings

Like many other ransomware programs, Locky encrypts data on an infected machine and then asks for a payment before providing a decryption key. Currently Locky asks for 3 bitcoins (£885) as payment.

The first versions of Locky hid the malicious attachment that did the encrypting in add-ons or macros for Microsoft Word. Now, say security firms, its creators have switched to using attachments written in Javascript.

"We are currently seeing extraordinary (sic) huge volumes of Javascript attachments being spammed out," said Rodel Mendrez, a security expert at Trustwave in a blogpost.

The switch to Javascript has helped Locky avoid being spotted by anti-virus software, said Trustwave.

At peak spamming times, wrote Mr Mendrez, about 200,000 messages an hour carrying ransomware attachments were hitting its junk mail spotting servers.

Mar 10 09:48

Internet Explorer security patch includes an ad-generator for upgrading to Windows 10

After diving into the documentation for yesterday’s security patch for Internet Explorer, InfoWorld’s Woody Leonhard found something entirely not security related was included in the patch. Security update KB 3139929 for Internet Explorer also installs another update called KB 3146449. It is the second update that Leonhard takes issue with, because it doesn’t appear to be security related.

Instead this new update is an “ad generator” of sorts, which promotes upgrading to Windows 10 in Internet Explorer on Windows 8.1 and Windows 7 PCs. Microsoft’s documentation for KB 3146449 states “this update adds functionality to Internet Explorer 11 on some computers that lets users learn about Windows 10 or start an upgrade to Windows 10.”

Mar 10 09:34

Missing Clinton E-Mail Claims Saudis Financed Benghazi Attacks

This missing e-mail from February 16, 2013 only exists in the original leak and states that French and Libyan intelligence agencies had evidence that the In Amenas and Benghazi attacks were funded by “Sunni Islamists in Saudi Arabia.” This seems like a rather outlandish claim on the surface, and as such was only reported by conspiracy types and fringe media outlets. Now, however, we have proof that the other three e-mails in the leak were real correspondence from Blumenthal to Clinton that she not only read, but thought highly enough of to send around to others in the State Department.

Mar 10 09:13

Apple: 'FBI could force us to turn on iPhone cameras and microphones'

If the FBI wins in its case against Apple to help it unlock the San Bernardino killer’s iPhone 5C, it won’t be long before the government forces Apple to turn on users’ iPhone cameras and microphones to spy on them, according to the company’s head of services Eddy Cue.

Mar 10 08:38

No #OpISIS? Twitter Shuts Down Anonymous Accounts ‘For Harassing’ Extremists

Twitter has banned around 125000 accounts linked to Islamic State, but activists from the ‘Anonymous’ hackers group, which targets the feeds of ISIS supporters.

Mar 10 08:21

Facebook 'Like' button may be against the law, German court rules

A German court has ruled that a shopping site's use of the Facebook 'Like' button was not legal, since users were not properly warned that their personal data was being shared with the social network.

Mar 10 08:01

Hillary's fury at being asked during Democratic debate if she will drop out if she is indicted over emails: 'I am not even going to answer that'

Hillary Clinton refused to entertain a question tonight about her email scandal and whether she would drop out of the race if she's indicted.

'Oh for goodness - that is not going to happen. I am not going to even answer that question,' she angrily told Univision's Jorge Ramos during tonight's Democratic debate.

Mar 10 07:16

Our Nation Depends on Restoring Product Liability

At the height of its power, ancient Rome created many new technologies which allowed it to become the supreme power over their portion of the world. These accomplishments included the invention of concrete, improved metallurgy, medicine, hygiene, plumbing, and sewage. As each of these were developed, Rome came to be dependent on them. As Rome went into decline, their ability to maintain their technologies started to fade. Aqueducts stopped delivering water. Public health failed. Metal rusted. Concrete cracked. Eventually the failure of those systems on which Rome was dependent hastened its eventual fall.

As Mark Twain said, History doesn't repeat, but occasionally it rhymes, and we are seeing in the United States and indeed the entire world many repeats of that same recipe for decline and fall.

The one aspect I wish to address is the current state of computers and software.

Webmaster's Commentary: 

I am reposting this because once again I have purchased a piece of computer equipment that failed right out of the box. A web search reveals many people are having the same problem I did, yet the item is still on the store racks, with the manufacturer and retailer blaming each other for the problem. At the end, I am out my money, three very frustrating hours, and still did not accomplish the task at hand.

Optional Banner: 
WRH Exclusive
Mar 09 19:34

FBI Lies About Needing Apple’s Help To Break Into IPhone: Snowden

US whistleblower Edward Snowden says the FBI’s claim to need Apple to break into a terrorist’s iPhone is a sham.

The former contractor with the US National Security Agency was speaking from Moscow to a conference on the threat Big Data and mass surveillance poses to democracy.

Mar 09 17:38

Pentagon admits to deploying spy drones over U.S.

In a newly released report, the pentagon admits that it has deployed drones to spy over U.S. territory for non-military missions over the last decade, but says the missions are rare and in accordance with the law.

Mar 09 16:16

Microsoft wants to monopolise games development on PC. We must fight it

With its new Universal Windows Platform (UWP) initiative, Microsoft has built a closed platform-within-a-platform into Windows 10, as the first apparent step towards locking down the consumer PC ecosystem and monopolising app distribution and commerce.

In my view, this is the most aggressive move Microsoft has ever made. While the company has been convicted of violating antitrust law in the past, its wrongful actions were limited to fights with specific competitors and contracts with certain PC manufacturers.

This isn’t like that. Here, Microsoft is moving against the entire PC industry – including consumers (and gamers in particular), software developers such as Epic Games, publishers like EA and Activision, and distributors like Valve and Good Old Games.

Mar 09 14:14

Who Is a Threat To You? “Dangerous People to Avoid After the Collapse”

Who can you trust, turn to or rely upon during a collapse?

... if a reward or a position of power is offered, this person is far-too-willing to turn you in and turn you over...

... it's pretty obvious what THIS person wants, but it may still suprise you how far they are willing to go to get it...

... just because THIS individual has a badge doesn't mean they won't steal your stuff or take your life...



Mar 09 13:21

Social Media Monitoring Sees Immigrants Deported Over Terror Threats

Authorities are turning to social media accounts of immigrants to determine visa eligibility. An Egyptian flight school student had his visa revoked after writing a Facebook comment about killing Donald Trump.

Mar 09 11:30


What if presidents in world-leading nations, the ones that get to decide who's a "bad guy" and who's a "good guy," more directly embraced the deaths they cause? Reagan Gorbachev isn't asking that question. The Hotline Miami-styled "top-down action stealth game" just came to PC and Xbox One and despite starring two historical figures is, "is not a political game," just "historical." The duo was used as an obvious metaphor for teamwork across fraught relations (it's a one- to two-player game and I imagine the latter is the better way to play). "We wanted to make a game that required two unique and disparate characters to work together towards a common goal.

Mar 09 10:37

Warrantless StingRay surveillance deemed unconstitutional, proving cops are breaking the law

Thanks to the Maryland Court of Special Appeals, the warrantless use of cell-site simulators, known as Stingrays, is now considered a violation of the Fourth Amendment.

Mar 09 09:16

Hillary and Servergate: The email Saga

Over the past week or so we have learned that the person who set up and maintained Hillary’s server has received immunity from the Department of Justice. This is significant. Why? Because the DoJ doesn’t usually give away freebies and this indicates that the individual in question may have already given evidence — or possibly testimony to a closed-door grand jury investigation.

Mar 09 09:06

GeForce drivers 364.47 are causing catastrophic errors

Following a storm of error reports, Nvidia has pulled GeForce drivers v364.47 from general release. Malfunctions range from your basic stuttering to black screens, blue screens and crashes that leave you stuck in infinite boot loops. Rather ominously, the odd member on the GeForce forums has been requesting warranty advice. I'll wager that the Nvidia office resembles one of the nastier planes of hell around now.

Mar 09 07:25

Snowden: FBI's claim it can't unlock the San Bernardino iPhone is 'bullshit'

The FBI says that only Apple can deactivate certain passcode protections on the iPhone, which will allow law enforcement to guess the passcode by using brute-force.

Talking via video link from Moscow to the Common Cause Blueprint for a Great Democracy conference, Snowden said: “The FBI says Apple has the ‘exclusive technical means’ to unlock the phone. Respectfully, that’s bullshit.”

Snowden then went on to tweet his support for an American Civil Liberties Union report saying that the FBI’s claims in the case are fraudulent.

Webmaster's Commentary: 

The FBI has already stepped on their own ... foot. The justification to force Apple to unlock the iPhone is that it "might" contain the identity of a suspect in the San Bernardino shootings. Except that we were all told there were only two shooters, not three (as witnesses reported) and those two suspects are dead. The iPhone in question isn't even a personal phone of the suspects but an employer-supplied iPhone, making the suggestion that it contains personal information rather dubious. This is a fishing expedition by the FBI; the very sort of activity the Fourth Amendment forbids.

Mar 09 07:22

Big Tech Bosses Meet in Secret on Private Island to Stop Donald Trump

According to the Huffington Post, the tech elite in attendance includes Apple CEO Tim Cook, Google co-founder Larry Page, the creator of Napster and Facebook investor Sean Parker, as well as billionaire entrepreneur Elon Musk of Tesla Motors. A New York Times spokeswoman also confirmed its editor recently attended the American Enterprise Institute's annual World Forum conference.

However, the conference is fiercely off the record, so it's not really known what was talked about or by whom. However, the speculation that the tech giants joined discussions on how to stop US presidential front runner Donald Trump from reaching the White House will get tongues wagging.

Mar 08 17:13

Navy Caught Conducting Secret Electromagnetic Warfare Testing in Public in Washington State

By Claire Bernish

Exposure to electromagnetic frequency radiation has been shown by medical studies and the Navy to cause numerous health problems, including corneal damage, tubular degeneration of testicles, brain heating, sterility, altered penile function, death, cranial nerve disorders, seizures, convulsions, depression, insomnia, chest pain, and sparking between dental fillings. And that list is far from complete.

That being said, electromagnetic warfare testing and training has been covertly conducted by the U.S. Navy on public roads in Washington State — for over five years...

Mar 08 16:50

Worst Passwords of 2015

Mar 08 16:40

Why Is GCHQ Boss Encouraging Activists And Journalists To Use The Tor Network?

During a speech at MIT, GCHQ chief Robert Hannigan suspiciously praised the Tor network, and encouraged the use of the technology which offers anonymous protection to whistleblowers, hacktivists and journalists.

Mar 08 13:58

Facebook To Hand Staff £280mn In Bonuses ‘To Cut Corporation Tax Bill’

Facebook’s 850 UK employees can expect huge bonuses in the near future as the social media giant looks to sidestep corporation tax by paying out £280 million by the end of 2018.

Workers in Facebook’s London office could receive an estimated £690,000 each, according to a Sunday Times report.

Mar 08 11:39

Rep. Castro Bizarrely Claims That Clinton Has Been Cleared By DOJ In Secret Server Scandal

Mar 08 10:15

Monopoly Board Game Goes Cashless: Barcodes Introduced to Track Players and Transactions

By Kevin Samson

When events that were formally considered conspiracy theories become the foundation of popular culture, you know an entirely new reality is being created. The 5th bestselling board game in the world is now embracing the onset of the cashless society...

Mar 08 08:53

GOOGLE: Put Palestine On Your Maps!

The country of Palestine does not appear on Google maps. Why not? Israel, established on Palestinian land, is clearly designated. But there is no mention of Palestine. According to Google, Palestine does not exist.

The omission of Palestine is a grievous insult to the people of Palestine and undermines the efforts of the millions of people who are involved in the campaign to secure Palestinian independence and freedom from Israeli occupation and oppression.

This is an important issue, as Google Maps are now regarded as definitive by people around the world, including journalists, students and others carrying out research into the Israel-Palestine situation.

Webmaster's Commentary: 
Mar 07 15:58

Guccifer to be extradited to US

Hacker ‘Guccifer,’ who uncovered Clinton’s private emails, to be extradited to US
Perhaps most notably,Marcel Lehel, a 42-year-old hacker better known by his pseudonym “Guccifer,” was the first source to uncover Hillary Clinton’s improper use of a private email account while she was Secretary of State, which the FBI is investigating as a potential danger to national security.

In March 2013, the hacker released to RT and several other news outlets the four memos that had been sent to Clinton from her former political adviser Sidney Blumenthal. The memos contain information regarding the September 11, 2012 attacks on the US diplomatic mission in Benghazi, Libya, as well as the January 2013 hostage crisis in In Amenas, Algeria.

Lehel was indicted by the Department of Justice in 2014 on charges of wire fraud, unauthorized access to a protected computer, cyberstalking, aggravated identity theft and obstruction of justice.>>>

Mar 07 15:04

Clinton: I’m the ‘most transparent public official in modern times’

Hillary Clinton says she's the "most transparent" public official of modern times, slamming critics of her email practices in a new interview.

“I said, ‘make them all public,’” she said of her State Department emails on CNBC’s "Closing Bell" on Friday. "I’ve been the most transparent public official in modern times as far as I know.

Webmaster's Commentary: 

Mar 07 10:23

UN human rights chief backs Apple in FBI encryption row

Zeid Ra'ad Al Hussein, high commissioner for human rights at the United Nations, has warned that a "Pandora's box" will be opened if Apple co-operates with the FBI.

Mar 07 10:00

Facebook Suspends Filmmakers Page after Campaign by Anti-fracking Activists

FACEBOOK has removed posts and suspended the page of a journalist covering a controversial court case after a targeted campaign by anti-fracking activists.

Webmaster's Commentary: 

But Facebook is allowing the "Assassinate Donald Trump" page to remain!

Mar 07 09:49

Hillary Clinton: Email controversy 'moving toward a resolution'

Hillary Clinton predicted that the controversy over her use of a private email server while secretary of state is nearing its end.

"I think we're getting closer and closer to wrapping this up," Clinton said Sunday in an interview with CBS' John Dickerson on "Face the Nation."

Despite her optimism, the investigation has continued. Her comments come after a former State Department staffer was given immunity to cooperate with a Justice Department investigation into those emails.

Clinton said she's "delighted" that Bryan Pagliano, the staffer who helped set up her server, is cooperating with the investigation.

And she deflected concerns that her email use will lead to indictments that could damage her Democratic presidential campaign.

Webmaster's Commentary: 

The DOJ is going to say the whole mess was some underling's fault, fry them up to provide a show for the public, and let Hillary skate ... again.

Mar 07 09:21

Apple users hit with first ever Mac ransomware: Hackers are demanding $400 to unlock files on infected computers

Apple customers were targeted by hackers over the weekend in the first campaign against Mac computers.

Called KeRanger, hackers infected the computers with this malicious software through a tainted copy of a popular program known as Transmission.

Security researchers said on their blog that KeRanger is programmed to stay quiet for three days after infecting a computer.

It then connects to the attacker's server, starts encrypting files so they can't be accessed and demands a ransom of 1 bitcoin, or about $400, to unlock the computer.

Mar 07 08:35

These New Quantum Dot Crystals Could Replace Silicon In Super-Fast, Next-Gen Computers

Solid, crystalline structures of incredibly tiny particles known as quantum dots have been developed by engineers in the US, and they’re so close to perfect, they could be a serious contender for a silicon alternative in the super-fast computers of the future.

Mar 07 04:50

Hillary Clinton ISISTS Immunity For Staffer Who Set Up Private Email Is Good News

Hillary Clinton insists immunity for staffer who set up private email is good news

Hillary Clinton insists immunity for staffer who set up private email is good news

(*Three Times For The 'NORMAL' Mind ! )

Mar 07 04:08

First Live Ransomware Targeting Mac

Apple users beware: First live ransomware targeting Mac found 'in the wild'
Researchers have discovered what they say is the first real-world ransomware targeting Macs, and if you've downloaded torrenting software recently, you may be at risk.

Sorry Mac fans -- now you're no better off than regular old PC users.

Security researchers have discovered what they believe to be the first ever ransomware attack targeted at Apple users that actually made it out 'into the wild.' And in bad news for downloading fiends, it's being spread through torrenting software.