COMPUTERS/INTERNET/SECURITY | WHAT REALLY HAPPENED


COMPUTERS/INTERNET/SECURITY

Jan 21 15:57

AMX backdoors US govt's comms system with Batman-inspired surveillance mode

AMX, which supplies communications kit for the White House, US military, and several of the largest corporations, built a superhero-themed surveillance backdoor into its products.

An analysis of the AMX NX-1200 communications controller by researchers at SEC Consult showed the device had a "setUpSubtleUserAccount" function.

It turns out this does exactly what it says – it sets up a hidden account with special abilities not even given to an administrator, such as packet-capture and sniffing, as well as access to the network interface. This powerful, all-seeing account can be accessed via the device's built-in web interface or via SSH using a hardcoded password.

That's a major issue, particularly because the US President has been seen using AMX equipment to talk to his military advisors.

Jan 21 14:45

FBI ran website sharing thousands of child porn images

For nearly two weeks last year, the FBI operated what it described as one of the Internet’s largest child pornography websites, allowing users to download thousands of illicit images and videos from a government site in the Washington suburbs.

The operation — whose details remain largely secret — was at least the third time in recent years that FBI agents took control of a child pornography site but left it online in an attempt to catch users who officials said would otherwise remain hidden behind an encrypted and anonymous computer network. In each case, the FBI infected the sites with software that punctured that security, allowing agents to identify hundreds of users.

Webmaster's Commentary: 

Sooooo ... the FBI is guilty of trafficking in child porn? ARREST THE BASTARDS!!!!!

Jan 21 10:31

Now California state wants to ban sale of encrypted smartphones

California: home of the world's biggest technology companies, terrible bagels, and the only place that can suffer both drought and floods at the same time.

Despite the state's deep tech roots, California's legislature is considering banning devices that come with unbreakable encryption.

California assembly member Jim Cooper (D-9th) introduced the legislation -- bill 1681 -- which requires any smartphone manufactured "on or after January 1, 2017, and sold in California after that date" to be "capable of being decrypted and unlocked by its manufacturer or its operating system provider."

Any smartphone that couldn't be decrypted on-demand would subject a seller to a $2,500 fine.

Jan 21 09:45

Why you should not develop apps for Windows 10

Since Windows 10 arrived, the sales of all of my apps, which have been very low compared to other apps stores, have gone down significantly, nearly to zero (even the one I upgraded to Windows 10).

Jan 21 09:09

Millions Unfriend Facebook

Facebook is not good at math. The forum is notorious for including lapsed subscribers when head counting. The network claims over one billion subscribers but these are not necessarily one billion users; those using the forum are likely a fraction of this figure.

Facebook is notorious for abruptly disabling accounts or imposing user bans for silly things like subscribers posting images of lightly clad ladies. The social forum was recently ridiculed for refusing to allow an image of the celebrated Little Mermaid figurine situated at Copenhagen’s harbour. Reason, the figurine’s nipples could be seen. Bizarrely, FB defended a user’s posting a video of him burning to death a tethered puppy.

Dual passport holder, Israeli-American Mark Zuckerberg, whilst cracking down on pro-ethnic European posts, offers free internet access to millions of illegal immigrants.

Webmaster's Commentary: 

Once again, we see Israeli support for the masses of refugees pouring into Europe!

Jan 21 08:50

More money for the rich, fewer jobs for everyone else: The price of the coming AI revolution

Financial analysts forecast AI and automation will drive "greater income inequality" and lower wages for low and middle-skilled workers.

Webmaster's Commentary: 

There is an obvious flaw in that concept.

Robots don't buy products! They don;t drive cars because they never go home. They don;t buy food, or big-screen TV sets, or even clothes!

No sales, no money.

Jan 21 08:47

Is Hillary Clinton Above The Law Now?

n/a
Jan 20 16:48

Teen hackers strike again: White House official becomes latest high-ranking victim

The president’s senior adviser on science and technology is the latest high-ranking government casualty of a group of teenage hackers with a pro-Palestine agenda. He joins the head of the CIA and the director of national intelligence as a hacking victim.

Jan 20 16:17

Hospital’s Windows XP Computers Cause Chaos After Getting Infected with Virus

Windows XP support came to an end in April 2014, but despite the numerous warnings issued by Microsoft, there still are a lot of companies that are yet to upgrade their computers.

The Royal Melbourne Hospital is one of them, and the network’s administrators found on their own how dangerous it is to run unsupported software when all Windows XP computers got infected with malware last week.

The virus first hit the hospital’s pathology department, so the staff had to manually perform a number of operations that were previously conducted automatically by Windows XP machines, including blood and tissue processing.

Furthermore, nurses and the food service worked together to make sure that each patient receives the proper meals, as computers that stored patient information were also infected.

n/a
Jan 20 16:07

Nest Thermostat Leaked Zip Codes Over the Internet

Nest may be the poster child for the so-called Internet of Things, but as it turns out, even one of the most popular connected devices—owned by Google’s parent company Alphabet, no less—isn't free from the sorts of security flaws plaguing other smart devices.

Researchers at Princeton University have found that, until recently, Alphabet’s popular Nest thermostat was leaking the zip codes of its users over the internet. This data was transmitted unencrypted, or in the clear, meaning that anyone sniffing traffic could have intercepted it, according to the researchers.

The researchers also studied several other smart devices, including the Sharx security camera, a PixStar smart photoframe, and Samsung’s SmartThings Hub.

Jan 20 16:05

Nielsen Wants to Watch You Talk to Your Facebook Friends About What You Watch on TV

ielsen is going to start tracking discussions that people have about TV on Facebook with their family and friends, even if that discussion isn’t marked as “public.” Nielsen still won’t be able to peer into Facebook messages you send directly to your friends, but it will see if you post a message on someone’s feed declaring your love for “The Real Housewives of Atlanta” or “Jessica Jones.”

Nielsen says it will create new social TV ratings that incorporate Facebook data later this year, and will rename its Twitter TV Ratings “Social Content Ratings” when that happens. Eventually, it says, it will also incorporate conversation from Instagram.

Jan 20 15:24

Who is hunting Angela Merkel?

The premeditated operation of New Year’s rapes, in Cologne and elsewhere, continues with a denunciation of the responsibility of the Federal Chancellor, Angela Merkel. A study of computer traffic certify that the Twitter accounts organizing this protest are based on the West Coast of the United States.

Jan 20 12:47

IRS Erases Hard Drive Despite Court Order

This is not the first time the agency has failed to preserve key information. The IRS also “accidentally” destroyed the hard drive belonging to Lois Lerner during investigations into the targeting of conservative groups. As many as 24,000 emails were lost forever when 422 backup tapes were wiped clean despite an agency-wide preservation order and congressional subpoena.

In the Lerner case, the IRS failed to take simple steps to ensure compliance with the order, according to a report by the House Oversight Committee.

Now, it appears that important information has once again disappeared because of IRS corruption, incompetence, or both.

Jan 20 11:15

MSNBC: Clinton Creating Conspiracy Theories to Explain Away Her Email Scandal

Webmaster's Commentary: 

The return of the "Vast Right-Wing Conspiracy!"

For our younger readers, the term "Vast Right-Wing Conspiracy" was used by then First Lady Hillary Clinton in 1998 as a catch-all dismissal of the scandals surrounding herself and President Bill Clinton, including Vince Foster, Monica Lewinsky, China-gate, travel-gate, Whitewater, etc.

The term quickly became an object of ridicule, satire, and abuse.

If Hillary is trying to resurrect this tactic, it signals that her campaign is in real trouble and she is panicking.

Hillary needs to be in the Big House, not the White House, and I still want to know if Hillary was using her weak private email server to sell US government secrets and collecting/laundering the payments through her "charitable" foundation!

Jan 20 10:45

Fake Mobile Phone Surveillance Towers Discovered across London

By Michaela Whitton

An investigation has uncovered at least 20 rogue telephone masts operating in London. The IMSI catchers — also known as Stingrays or cell-site simulators — mimic mobile phone masts and trick phones into logging on and giving access to the owners’ calls and data...

Jan 20 09:30

For fsck's SAKKE: GCHQ-built phone voice encryption has massive backdoor – researcher

The UK government's official voice encryption protocol, around which it is hoping to build an ecosystem of products, has a massive backdoor that would enable the security services to intercept and listen to all past and present calls, a researcher has discovered.

Dr Steven Murdoch of University College London has posted an extensive blog post digging into the MIKEY-SAKKE spec in which he concludes that it has been specifically designed to "allow undetectable and unauditable mass surveillance."

He notes that in the "vast majority of cases" the protocol would be "actively harmful for security."

Jan 20 09:15

Trojan-filled Chrome extensions for Steam boil off gamers' assets

Miscreants are slinging fraudulent Chrome extension trojans at gamers that, if installed, will empty victims’ Steam inventory.

Security researcher Bart Blaze warned that supposedly "helpful" Chrome extensions for Counter-Strike: Global Offensive (CS:GO) are actually scamware.

“Instead of being able to change your CS:GO Double theme, your items from your inventory are getting stolen; instead of trading with X or Y person you trust, the items go to the scammer rather than whoever you're trading with,” Blaze warned in a blog post on Tuesday.

The rogue extensions pose as “CS:GO Double Withdraw Helper”, “Csgodouble AutoGambling Bot” among other browser add-on themes.

Jan 20 08:47

How to see what government agency is spying on your phone

Jan 20 08:33

German high court rules Facebook "Friend Finder" is unlawful, calling the contact-scraping tool a deceptive marketing practice

Germany's highest court has declared unlawful a feature that encourages Facebook users to market the social media network to their contacts, confirming the rulings of two lower courts.

n/a
Jan 19 15:18

New 3D Printing Tech Lowers Cost of Producing Items at Home

By Kevin Samson

The marvel of 3D printing is still in its infancy, especially in regards to being understood by the masses. Its many applications, however, are already beginning to transform the medical and manufacturing fields – not to mention 3D-printed weapons – ushering in low-cost methods of production as well as increasing the diversity of products that can be designed.

But for 3D printing to transform the lives of everyday individuals, the cost of high-quality 3D printers that can produce useful items still needs to drop dramatically. While this has steadily been happening, the cost is still greatly prohibitive for most people.

A new technique is being studied at the University of Bristol, UK that takes us one step closer to producing useful items right from our homes while making a quantum leap in providing low-cost access to many more people...

Jan 19 12:16

FLASHBACK - HILLARY THE SPY?

Let us start with an historical fact. Treason and betrayal by the highest levels is a common feature of history, whether it is Judas vs Jesus, Brutus vs Julius Caesar, Benedict Arnold, the Rosenbergs, Jonathan Pollard, Aldrich Ames, Robert Hanssen. It is just a fact of life. It does happen.

Webmaster's Commentary: 

Time for a repost in light of today's revelation that documents classified above "Top Secret" were on Hillary's private email server!

This question of spying by the former Secretary of State using her email server to deliver and her "charitable" foundation to collect and launder payments must be asked, and demands an answer!

Please copy this article and forward it to all your connections.

Optional Banner: 
WRH Exclusive
Jan 19 12:04

Inspector General: Clinton emails had intel from most secretive, classified programs

Hillary Clinton's emails on her unsecured, homebrew server contained intelligence from the U.S. government's most secretive and highly classified programs, according to an unclassified letter from a top inspector general to senior lawmakers.

Fox News exclusively obtained the text of the unclassified letter, sent Jan. 14 from Intelligence Community Inspector General I. Charles McCullough III. It laid out the findings of a recent comprehensive review by intelligence agencies that identified "several dozen" additional classified emails -- including specific intelligence known as "special access programs" (SAP).

Webmaster's Commentary: 


Click for larger image

Feel free to copy and use!

Jan 19 11:44

Hyatt Hotel guests should be on credit card high alert

ROADSIDE BEDROOM FACILITATOR the Hyatt Hotel chain has released a whack of detail about a hack on the firm last year and warned that customers may have details that are lost in the wild.

The hack was reported by internet equaliser Brian Krebs in December. Hyatt provided a statement at the time, but Krebbs suggested that it was light on detail.

Jan 19 10:08

NEW CARS TO RECORD YOUR IRIS, FINGERPRINTS, VOICE AND BLOOD PRESSURE

Auto manufacturers are working with a company called Eyelock to put Myris‘ iris scanners in new cars. Click here to view the Myris Eyelock video. According to Biometricupdate.com, Eyelock’s iris authentication process takes less than five seconds to complete.

Webmaster addition: And if my eyes are bloodshot?????

Anyway, I can turn a key in less than half a second... unless it's a GM car, of course!

Jan 19 09:13

Shop online at Asda? Website vuln created account hijack risk

Walmart-owned store patches hole, but it was open for nearly 2 years

Jan 18 16:07

BUSTED: New York cop who posted horrifying, violent ‘filth’ on social media under investigation

An NYPD cop, who markets pro-police schwag to his fellow cops in his off time, is becoming internet infamous after he allegedly posted a ridiculously fascist and tyrannical shirt photo that praised the arresting of protestors and the money made while doing so.

Jan 18 14:11

World Economic Forum: Robots Will Eliminate 5 Million Jobs By 2020

By Joseph Jankowski

According to research by the World Economic Forum over five million jobs will be lost due to developments in genetics, artificial intelligence, robotics and other technological changes.

WEF founder Klaus Schwab and managing board member Richard Samans wrote in the newly released report titled “The Future of Jobs” that an estimated 7 million jobs will be lost with just 2 million gained as a result of technological change in 15 major developed and emerging economies...

Jan 18 13:51

Cars can be hacked by their tiny, plug-in insurance discount trackers

The latest way to remotely hack a car? By tapping into one of those plug-in tracking devices from insurance companies.

In some cases, hackers can send a text message -- and disable a car's brakes, according to research presented by computer security experts on Monday.

Jan 18 12:03

Skylake users given 18 months to upgrade to Windows 10

If you own a system with an Intel 6th generation Core processor—more memorably known as Skylake—and run Windows 7 or Windows 8.1, you'll have to think about upgrading to Windows 10 within the next 18 months. Microsoft announced today that after July 17, 2017, only the "most critical" security fixes will be released for those platforms and those fixes will only be made available if they don't "risk the reliability or compatibility" of Windows 7 and 8.1 on other (non-Skylake) systems.

Jan 18 10:29

RISE OF THE ROBOTS WILL ELIMINATE MORE THAN 5 MILLION JOBS

Over five million jobs will be lost by 2020 as a result of developments in genetics, artificial intelligence, robotics and other technological change, according to World Economic Forum research. About 7 million jobs will be lost and 2 million gained as a result of technological change in 15 major developed and emerging economies, WEF founder Klaus Schwab and managing board member Richard Samans said in "The Future of Jobs." The findings are taken from a survey of 15 economies covering about 1.9 billion workers, or about 65 percent of the world’s total workforce.

Jan 18 08:38

Paul Vernon, Cryptsy’s CEO, Seems To Have Flown To China

Bitcoin News Channel has just managed to dig up exclusive news regarding Cryptsy, the cryptocurrency exchange whose customers are currently unable to withdraw their coins out of its platform. Paul Vernon, the CEO of Cryptsy, seems to have just flown to Liaoning, China, according to an IP and geolocation report that has just been sent to Bitcoin News Channel BNC an hour ago.

Jan 18 07:44

Apple's anti-malware Gatekeeper still useless: Security bloke reveals lingering holes

Apple has flubbed attempts to patch flaws in OS X's anti-malware system Gatekeeper, leaving the defenses still easy to bypass.

Patrick Wardle, a former NSA staffer who now heads up research at crowdsourced security intelligence firm Synack, found a way to circumvent Gatekeeper last year. Gatekeeper is supposed to block dodgy apps from running, but it turns out it's easy for malicious programs to sidestep.

Apple patched Gatekeeper in November in response to Wardle's findings. However, subsequent work by the researcher ahead of this weekend's ShmooCon conference – an "East Coast hacker convention" – revealed the patch is “incredibly weak.” The update was “easy to bypass” in minutes, Wardle told El Reg.

Jan 18 07:39

Microsoft herds biz users to Windows 10 by denying support for Win 7 and 8 on new CPUs

In a stunning example of consensus-building, Microsoft has somehow persuaded the big names of silicon that it would be better for all concerned if they quietly euthanize Windows 7 and 8.1.

Accordingly, Redmond, Intel, Qualcomm and AMD have occupied the same room without injury long enough to promise that future products like Kaby Lake (Intel), 8996 (Qualcomm) and Bristol Ridge (AMD) will not be sullied with Windows 7 or 8.1 code.

n/a
Jan 18 05:47

Microsoft’s new PR idiocy: New PC can only use Windows 10 (not 7 nor 8.1)

Microsoft made this ridiculous “clarification” to the Windows support policy. With notice, older versions of Windows lose support on the latest PC hardware.

Yep, that's right: Now you can't downgrade to Windows 7 or 8.1 on Skylake CPUs (or later). There's a woolly, limited get-out-of-jail-free card for a short while, but this is just the latest ludicrous Microsoft scheme to get you onto Windows 10.

Jan 17 17:07

Paleomar Project

Select one of the times from the list on the left and check out what the Earth's climate was like millions of years ago.
Or view an animation that shows how the Earth's climatic belts have changed through time. View Climate Animation
We can determine the past climate of the Earth by mapping the distribution of ancient coals, desert deposits, tropical soils, salt deposits, glacial material, as well as the distribution of plants and animals that are sensitive to climate, such as alligators, palm trees & mangrove swamps.

More Info on how we determined the ancient climate.

ICE HOUSE or HOT HOUSE?
During the last 2 billion years the Earth's climate has alternated between a frigid "Ice House", like today's world, and a steaming "Hot House", like the world of the dinosaurs.

This chart shows how global climate has changed through time.

Jan 17 08:17

DHS and the Supreme Court collude to hide secret plan to shut off cell phone communication in American cities

The Department of Homeland Security’s plan to shut off cell phone service across large swaths of the country in the event of a major disaster or civil emergency will remain secret after the Supreme Court “set aside”

Jan 17 04:27

Benefits Of Using Linux

If your sick of being pushed around by Micro$oft then there is a solution(and its free).
Xubuntu Desktop with Debian linux is a good choice because its stable, lightweight and can be fully customised.
Download and make a bootable USB drive with Rufus
How to install Xubuntu to dual boot with Windows 7,8,10
Recommendations for the software centre:
Office:- LibreOffice Suite fully featured and can work with MSoffice Docs.
Media:- VLC-media player, Flowblade-video editor,Blender-3d modelling, Audacity-audio editor, Gimp-graphics, Cheese-webcam recording, SimpleScreenRecorder recording screen.
Internet:-Firefox browser, ThunderBird Mail, Filezilla-FTP, Atom for coding, Google Earth, Skype.

Jan 16 08:50

Mossad proxy faked violent Facebook anti-Semitism

An Israeli legal group with intimate ties to the state’s intelligence agencies has admitted to faking an ostensibly pro-Palestinian Facebook page and using it to post anti-Semitic statements including “Death to all the Jews.”

Jan 15 15:12

Evil OpenSSH servers can steal your private login keys to other systems – patch now

Malicious OpenSSH servers can silently steal people's private SSH keys as they try to login, it emerged today.

This means criminals who compromise one server can secretly grab keys needed to log into other systems from a user's computer – allowing crooks to jump from server to server.

The security cockup, present in the default configuration of OpenSSH, has been patched today, and all users and administrators are urged to update as soon as possible.

Jan 15 14:13

White House wants to ‘edit’ Daesh propaganda

Since our providers and tech makers in Silicon Valley are already deep in bed with the NSA to help spy on us, it should be little surprise that the White House now wants them to climb on board another Bill of Rights busting train and help “disrupt” ISIS online by editing the Internet.

Jan 15 11:51

Government pressurizing tech firms to join big brother state

The pressure on social media companies to limit or take down content in the name of national security has never been greater. Resolving any ambiguity about how much the Obama administration values the companies’ cooperation, the White House on Friday dispatched the highest echelon of its national security team.

Jan 15 09:48

Drone Laws to Require Owners To Buy Insurance, Get License Plates – Constant GPS Tracking

By John Vibes

Assemblyman Mike Gatto Southern of California lawmaker introduced legislation this week that would require owners of drones to get insurance and license plates, similar to the requirements for motor vehicles. The bill is called the Drone Registration/Omnibus Negligence-prevention Enactment (DRONE) Act of 2016 and would tighten the restrictions on personal drones even further than they have been already...

Jan 15 09:25

Clapper hacked: US Intelligence director’s personal e-mail and phone breached

The same entity that claims to be behind a recent hack of CIA Director John Brennan's personal email now claims to be behind a breach of the accounts of Director of National Intelligence James Clapper. The Office of the Director of National Intelligence confirmed to Motherboard that Clapper had been targeted, and that the case has been forwarded to law enforcement.

Jan 15 08:42

Android banking malware SlemBunk is part of a well-organized campaign

An Android Trojan that targets mobile banking users has evolved into a sophisticated, persistent and hard-to-detect threat, suggesting that it is part of a well-organized attack campaign.

Researchers from security firm FireEye first documented the Trojan in December and named it SlemBunk. Once installed, it starts monitoring the processes running on the device and when it detects that a mobile banking app is launched, it displays a fake user interface on top of it to trick users into inputting their credentials.

The Trojan can spoof the user interfaces of apps from at least 31 banks from across the world and two mobile payment service providers.

Jan 15 08:41

Want to save money by buying your own modem? Comcast will attack you with unstoppable pop-ups

Comcast has done plenty of things to frustrate subscribers over the years. In fact, some of the company’s recent moves are bad for all of us, not just for its own subscribers. The latest customer complaint making the rounds might be one of the most frustrating ones we’ve seen though, namely because it will likely only impact the savviest of Comcast’s Internet users, and it appears to be completely impossible to prevent.

That’s right, Comcast customers, get ready for an unstoppable wave of spam-like pop-ups in your web browser courtesy of your favorite Internet service provider.

Jan 15 08:00

Hyatt says hackers took card data from 250 of its hotels

The infection, which harvested data between July 13 and December 8 of last year, collected customer credit card numbers, names, expiration dates and verification codes.

Jan 14 16:51

Activist Forces Chicago Police to Disclose Details on Stingray Cellphone Surveillance

By Derrick Broze

In a rare victory against the secrecy that often shrouds state surveillance, a Cook County, Illinois judge has ordered the Chicago Police Department to allow her to review documents related to cellphone surveillance tools, which are sometimes known as “Stingrays.”...

Jan 14 16:36

Cisco fixes hard-coded password 'backdoor' flaw in Wi-Fi access points

Two of the vulnerabilities were considered 'critical," allowing an attacker to take complete over an affected device.

Jan 14 16:32

The US Government Has An Internet Killswitch - And It's None Of Your Business

On Monday the Supreme Court declined to hear a petition from the Electronic Privacy Information Center (EPIC) that sought to force the Department of Homeland Security to release details of a secret “killswitch” protocol to shut down cellphone and internet service during emergencies.

n/a
Jan 14 16:19

Yahoo dumps 13.5TB of users' news interaction data for machine eating

Yahoo! has publicly dumped a sample dataset for machine learning enthusiasts based on "anonymised" user interactions with the news feeds of several of its properties, ostensibly extending the research bridge between industry and academia.

The dataset contains ~110bn lines, coming in at 1.5TB bzipped, which decompresses to a whopping 13.5TB and covers the news item interactions of 20 million users between February and May 2015.

"Many academic researchers and data scientists don’t have access to truly large-scale datasets because it is traditionally a privilege reserved for large companies," said Suju Rajan, director of research at Yahoo! Labs.

Jan 14 14:02

Emails of Chelsea Clinton, Clinton Insiders Sought in New Lawsuit

A new Freedom of Information Act lawsuit against the State Department is requesting emails from Chelsea Clinton and other individuals from Hillary Clinton’s inner circle.

The Washington Examiner reported that conservative watchdog Citizens United filed the lawsuit in federal court Thursday. The suit requests emails sent from the name “Diane Reynolds,” the pseudonym under which Chelsea Clinton operated an email account on Hillary Clinton’s personal website domain.

The lawsuit comes just as Chelsea Clinton begins to play a larger role in her mother’s presidential campaign, launching attacks at Democratic challenger Sen. Bernie Sanders (I., Vt.) and headlining an upcoming fundraiser at a SoulCycle studio in New York City.

Jan 14 10:46

Before I Can Fix This Tractor, We Have to Fix Copyright Law

How many people does it take to fix a tractor? A year ago, I would have said it took just one person. One person with a broken tractor, a free afternoon, and a box of tools.

I would have been wrong.

When the repair involves a tractor's computer, it actually takes an army of copyright lawyers, dozens of representatives from U.S. government agencies, an official hearing, hundreds of pages of legal briefs, and nearly a year of waiting. Waiting for the Copyright Office to make a decision about whether people like me can repair, modify, or hack their own stuff.

Jan 14 08:31

Police sweeps of cellphone data in 'tower dumps' face charter challenge

Police powers to seize call records from tens of thousands of cellphone subscribers at once could be reined in with a court decision Thursday.

An Ontario judge will rule on a case brought by two of Canada's biggest telecommunications companies, arguing that sweeping "tower dumps" violate the Charter of Rights and Freedoms.

Jan 14 08:13

Best Buy Reports Disappointing Holiday Season, Stock Plummets

Best Buy’s 9-week comparable sales during the holiday season dropped 1.2%, which caused investors to become highly concerned

Best Buy Co. Inc. (NYSE:BBY) disclosed that its same-store sales (SSS), for the nine-week period ended January 2, 2016, have decreased 1.2%. The company’s stock reacted immediately to the news, and is trading down 7.75% at $27.01, as of 8:09 AM EST, in the pre-market trading hours today.

CEO Hubert Joly commented: “The Domestic decline was primarily driven by the mobile phone category, which was softer than both our expectations and the prior year.” The executive also mentioned that online revenue for the holiday period grew 12.6%.

Jan 14 08:12

Microsoft expands Get Windows 10 program to domains, publishes opt-out instructions

As the year-long free upgrade offer for Windows 10 nears the halfway mark, Microsoft is getting more aggressive, with new plans to begin displaying the GWX taskbar icon and upgrade prompts on business PCs that had previously been off-limits.

Webmaster's Commentary: 

"You will install this piece of trash, AND YOU WILL LIKE IT!!!!" -- Microblorch

Jan 14 08:00

Muslim College Professor Banned From Online Game Due To Terror Watch List Error

By John Vibes

A Muslim college professor was recently blocked from playing online games because his name was similar to one that is on the US terror watch list. Muhammad Zakir Khan is an assistant professor at Florida’s Broward College and he was recently banned from playing a game called Paragon because his name was allegedly on the terror watch list...

Jan 13 17:29

The US Government Has an Internet Killswitch — and It’s None of Your Business

By Derrick Broze

On Monday the Supreme Court declined to hear a petition from the Electronic Privacy Information Center (EPIC) that sought to force the Department of Homeland Security to release details of a secret “killswitch” protocol to shut down cellphone and Internet service during emergencies.

EPIC has been fighting since 2011 to release the details of the program, which is known as Standard Operating Procedure 303...

Jan 13 16:13

Fortinet tries to explain weird SSH 'backdoor' discovered in firewalls

Update your firmware or suffer the consequences

Jan 13 16:11

Yahoo wants settlement to make privacy abuse claim vanish

Yahoo has agreed to modify its privacy policy as part of a settlement of a class-action lawsuit, which alleges that it scans the emails of non-users for data to be used for advertising purposes. The plaintiffs will not get a payout, however.

Jan 13 16:11

Whatever Android-ChromeOS mashup looks like, it's gotta be better looking than this

If you've ever wondered what Android would look like as a desktop PC OS, then try this for size: Remix OS from China.

...

The end-user agreement has made a few people jumpy; for one thing, while using the software, "you're not allowed to spread rumor, disturb social order, or undermine social stability," and "you agree that you irrevocably waive any and all ownership, legal and moral rights to your user content," which is essentially extending Chinese rule over your desktop.

Jan 13 15:59

PC sales continue to tank – down globally again in the fourth quarter

Worldwide PC shipments have fallen again, down by 8.3 per cent in the fourth quarter of 2015, according to analysts at Gartner.

For the year, PC shipments totalled 288.7 million units, down by eight per cent on 2014 as the mid-year release of Windows failed to instigate a turnaround in PC sales.

Jan 13 15:48

Manjaro Linux

The Manjaro community is proud to present another update to the Gnome Edition installation media.

The Manjaro community is happy to announce a fresh release of the Fluxbox edition, including the latest packages of the Manjaro 15.12 “Capella” stable branch.

The Manjaro community is proud to announce the release of Manjaro i3 15.12. With this newest version of manjaro-i3 we deliver a complete set of command line applications together with their convenient and more beginner-friendly graphical alternatives.

Manjaro Mate-Desktop 1.12 released! After a month of testing, stable release comes finaly true!

After some developing a month and testing the up coming ISO build’s, stable Cinnamon ISO is there !

Jan 13 15:05

Former Federal Prosecutor Says Hillary Clinton Could Be Indicted Within 60 Days (Or FBI Will Revolt)

The leaking of the Clinton emails has been compared to as the next “Watergate” by former U.S. Attorney Joe DiGenova this week, if current FBI investigations don’t proceed in an appropriate manner. The revelation comes after more emails from Hilary Clinton’s personal email have come to light.

“[The investigation has reached] a critical mass,” DiGenova told radio host Laura Ingraham when discussing the FBI’s still pending investigation. Though Clinton is still yet to be charged with any crime, DiGenova advised on Tuesday that changes may be on the horizon. The mishandling over the classified intelligence may lead to an imminent indictment, with DiGenova suggesting it may come to a head within 60 days.

Webmaster's Commentary: 

When I see Hillary in handcuffs, then and only then will I believe this.

Jan 13 13:00

Anonymous blocks 300 Thai govt websites, protesting police conduct over tourist murders

Hacktivist collective Anonymous claims to have shut down hundreds of Thai government websites in protest at the investigation and trial of two Myanmar migrant workers found guilty of the 2014 murder of two British tourists.

Jan 13 10:20

FACEBOOK JOINS THE CENSORSHIP WAR AGAINST LATUFF

We were also suspended and got a couple of videos removed over a month ago. The new thing we have noticed is that pictures/videos can now be removed by Facebook even if they follow the so called community standards. This is scary because soon we will not be able to post anything, it seems. So yes we do believe Facebook’s pro-Israel policy is tightening the noose around our freedom of speech.”

Jan 13 10:20

Yahoo settles e-mail privacy class-action: $4M for lawyers, $0 for users

In late 2013, Yahoo was hit with six lawsuits over its practice of using automated scans of e-mail to produce targeted ads. The cases, which were consolidated in federal court, all argued that the privacy rights of non-Yahoo users, who "did not consent to Yahoo's interception and scanning of their emails," were being violated by a multi-billion dollar company.

Jan 13 09:34

French government considers law that would outlaw strong encryption

The French Parliament is considering a legislative provision that would ban strong encryption by requiring tech companies to configure their systems so that police and intelligence agencies could always access their data.

Webmaster's Commentary: 

... along with spies, hackers and other criminals who will find and use those back doors! Meanwhile, real criminals and terrorists will simply write their own systems of encryption which the police will not be able to break (we proved that on whatreallyhappened.com with six challenges to the NSA, all of which went unsolved) so the law-abiding citizens have their personal and business secrets exposed to no point whatsoever!

Jan 12 18:11

Government Software Calculates Your ‘Threat Score’ And Categorizes Citizens As Red, Yellow Or Green

Today, more than 90 percent of all local police departments and nearly all government agencies employ some sort of technological surveillance.

Jan 12 15:29

Twitter uses #IfIWereACop hashtag to take jabs at law enforcement

#IfIWereACop is trending, and it is providing equal parts humor, wish fulfillment and social commentary to Twitter users.

Twitter account @WorldOfHashtags created the hashtag as its part of its weekly event.

Jan 12 14:19

How to Test Your PC for Skylake Bug

The bug has apparently been stewing for weeks on forums at hardwareluxx.de and then Mersenne.org which created the software, Prime95, that is used to induce the bug. Prime95 is used to find prime numbers and is also very popular with performance and the overclocking community as a stress and performance test.

Besides the community post, Intel also confirmed to PCWorld the existence of the bug but placed an emphasis on the word “might” because there’s no guarantee you’ll hit the bug.

“Under some complex workload conditions, like those encountered when running applications such as Prime95, the processor may hang or cause unpredictable system behavior. Intel has released a fix that resolves the issue and we are working with external business partners to deploy this fix through BIOS updates,” an Intel official told PCWorld.

Jan 12 13:19

FLASHBACK - Reported two-month gap in Clinton emails coincides with escalating Libya violence

A reported two-month gap in emails from Hillary Clinton's private account during 2012 coincides with a period of escalating violence in Libya and the obtaining of a special exemption by her top aide, Huma Abedin, to work for both the State Department and the Clinton Foundation.

Jan 12 11:59

“After Armageddon”: Marine Shows How to Survive An Urban Disaster

Could you survive in an urban environment if the SHTF and everything you knew was gone?

Read more at SHTFplan.com

Jan 12 11:42

meet the micro

the first truly consumer 3D printer

Webmaster's Commentary: 

I just HAD to give this thing a plug! $349 for a home 3D printer? WOW!

Jan 12 11:34

How WiFi Will Be Used to Erase Civil Liberties

By Kevin Samson

Recent announcements in the UK and in New York City have shown that governments are working with private corporations to blanket entire cities with WiFi connectivity. Naturally they are appealing to people’s love of technology for entertainment and business to push this agenda forward.

However, beneath the surface is the development of tracking technologies that specifically use WiFi as a pervasive method of surveilling every single person who is in range – in some cases regardless of even having a connected device...

Jan 12 09:47

Intel confirms bug with Skylake CPUs

Intel has stepped up and confirmed that there is a bug in its sixth-gen Core products that have the codename Skylake. The bug in question can cause the system to hang under complex workloads. The only application that Intel has confirmed to cause the issue so far is Prime95.

The problem was originally identified back in December by testers who found random crashes of the Prime95 software during the 786k test on the new Intel processors. The software would fail sometimes after only a few minutes of operation and other times after hours of operation.

Lots of user testing went through hardware issues that could cause the failure and eventually the solution was found to be disabling hyper-threading, at least according to user reports.

Jan 12 09:39

Remix OS For PC

Jan 12 09:33

French government considers law that would outlaw strong encryption

The French Parliament is considering a legislative provision that would ban strong encryption by requiring tech companies to configure their systems so that police and intelligence agencies could always access their data.

Jan 12 09:29

Trend Micro AV gave any website command-line access to Windows PCs

PCs running Trend Micro's Antivirus on Windows can be hijacked, infected with malware, or wiped clean by any website, thanks to a vulnerability in the security software.

The design blunders were discovered by Google Project Zero bod Tavis Ormandy. A patch is now available to address the remote-code execution flaw, so Trend Micro users should update their software as soon as possible.

Jan 12 09:23

Microsoft’s Get Windows 10 nagware shows signs of sentience

Windows 7 and 8 installations are finding new ways to re-enable Microsoft’s intrusive “Get Windows 10” nagware, even when users disable it.

An additional background process has been detected that resets the Registry’s AllowOSUpgrade flag twice a day. Prophylactic measures taken by users to disable the nagware – such as these – therefore have limited use. The additional process has only been found by some users, and appears to arrive in a modified version of the KB patch which unleashes GWX.

Jan 12 09:16

Google researcher blasts Trend Micro for massive Antivirus security hole

Less then two weeks ago, we covered the significant security flaw in AVG’s Web TuneUp software, and the company’s back and forth with Google security researcher, Tavis Ormandy. Ormandy has found a new set of bugs in Trend Micro’s Windows anti-virus product — bugs that are, if anything, worse than what we saw with AVG. Unlike the AVG problems, which involved a (technically) optional toolbar, installing Trend Micro’s antivirus software is a significant security risk.

Ormandy found that installing Trend Micro Antivirus also installed a password manager. This software automatically launches on startup and has a “feature” that allows for arbitrary code execution.

Jan 12 07:59

Intel Skylake bug causes PCs to freeze during complex workloads

"Intel has identified an issue that potentially affects the 6th Gen Intel Core family of products. This issue only occurs under certain complex workload conditions, like those that may be encountered when running applications like Prime95. In those cases, the processor may hang or cause unpredictable system behaviour."

Webmaster's Commentary: 

So that's what happened to the Pentium floating point engineers!!! :)

Jan 12 02:43

Are You A Threat? Police Software Scans Your Social Media: “Very Dangerous For a Citizen”

What you say, and what is said about you is now more likely than ever to land you in trouble with the law:

As officers respond to calls, Beware automatically runs the address. The searches return the names of residents and scans them against a range of publicly available data to generate a color-coded threat level for each person or address: green, yellow or red.

“A police call is something that can be very dangerous for a citizen.”

Read more at SHTFplan.com

Jan 11 17:26

TVs Now 'Smart' Enough To Get Hijacked, Pick Up Malware

In a comment on Reddit this week, user “moeburn” raised the possibility of new malware circulating for Smart TVs:

My sister got a virus on her TV. A VIRUS ON HER GODDAMN TV.
It was an LG Smart TV with a built in web browser, and she managed to get a DNS Hijacker that would say “Your computer is infected please send us money to fix it” any time she tried to do anything on the TV.

The Reddit post included this image:

Jan 11 15:03

‘Insider Threat’ Program: Hundred Thousand Pentagon Personnel Under Total Surveillance

At least a hundred thousand military, civilian, and contractor personnel at the Defense Department have been subjected to a “continuous evaluation” or total surveillance of their electronic activities and communications. The surveillance is part of the department’s “Insider Threat” program and raises concerns about the extent to which whistleblower communications are being intercepted.

Jan 11 11:16

Little noticed Hillary email might contain NSA intercepts

While most of the attention on Hillary Clinton's emails dealt with a document that included instructions from Clinton to tamper with the headings of a possibly classified subject, another, even more explosive email is big news in Sudan and could potentially lead to criminal charges.

The email in question is from Sid Blumenthal, close Clinton friend and ally, who was in Libya trying to drum up business with the Libyan government for some business associates. To ingratiate himself with Secretary Clinton and get the State Department to intercede with the Libyan government on his behalf, he sent her "intelligence" briefs on what was happening on the ground in Libya and elsewhere in the Middle East.

One of them is explosive. It involves a conspiracy in the Sudanese government to ally themselves with some rebels in order to get their hands on some oil fields. The problems for Blumenthal and Clinton:

Jan 11 10:22

The new way police are surveilling you: Calculating your threat ‘score’

While officers raced to a recent 911 call about a man threatening his ex-girlfriend, a police operator in headquarters consulted software that scored the suspect’s potential for violence the way a bank might run a credit report.

The program scoured billions of data points, including arrest reports, property records, commercial databases, deep Web searches and the man’s social- media postings. It calculated his threat level as the highest of three color-coded scores: a bright red warning.

Jan 11 09:08

UK spying laws criticised by Government’s own watchdog as Theresa May’s claim that Snoopers' Charter doesn’t block encryption is scrutinised

The Government-appointed information watchdog has criticised Theresa May’s spying plans, arguing that they could lead to the exposure of personal information and are of “real concern”.

The upcoming Investigatory Powers Bill gives spies sweeping new powers, and forces internet companies to keep records on all of their users. Parts of the law also seem to suggest that the Government will make companies weaken their security so that intelligence agencies can read messages.

The Government has claimed that the law is written to keep people safe and that the powers are limited and safeguarded. But the Government’s own appointed figure has said that the powers could be damaging.

n/a
Jan 10 10:41

Saudi Arabia partially blocks access to Telegram Messenger — Telegram founder

Access to Telegram Messenger has been partially blocked in Saudi Arabia since Saturday evening, Pavel Durov, the CEO and founder of Telegram, said on his Twitter account on Sunday. "I confirm that Telegram traffic has been partially blocked in Saudi Arabia since yesterday’s evening," he wrote after one of the users had reported problems in the messenger operation. Durov noted he did not know why Telegram had been blocked. Iran blocked access to Telegram in October 2015 after Telegram ignored a request from Iran’s ministry of information and communications technologies to provide instruments for censorship of messages. In the meantime, there have been requests to block the messenger in Russia as well.

Jan 10 10:37

Google translates Russia to 'Mordor' and minister's name to 'sad little horse'

Language translation tool error converting ‘Russian Federation’ in Ukrainian to fictional dark land from Lord of the Rings down to automatic bug, says company

Webmaster's Commentary: 

Suuuuuuuuuuuuuuuuuuure!

Jan 10 10:20

State Dept. Releases Hillary's Emails Under Cover of Darkness

The State Department released almost 2,900 pages of Hillary Clinton's emails at 1:39 am ET on Friday; the previous instalment from the former Secretary of State revealed the real motivation for the military intervention that toppled Libyan leader Muammar Qaddafi.

Jan 10 09:30

Bombshell 1-Sentence Email From Hillary Just Released- It Could Be The Smoking Gun…

n the latest batch of emails to be released, a message sent by Clinton clears up that question by proving the secretary of state herself ordered an underling to send her some classified info over her unsecure email system. And she did so knowingly.

Webmaster's Commentary: 

Jan 09 17:26

Oops: How The NSA Helped Foreign Governments Spy On The US

If you still believe that the NSA is all about guarding you from terrorists, or even securing the US against foreign intelligence agencies, think again.

The FBI is investigating a recent security breach, with independent researchers believing that a back door created by the NSA had allowed foreign governments to spy on US government communications.

Jan 09 14:18

Oops: How The NSA Helped Foreign Governments Spy On The US

If you still believe that the NSA is all about guarding you from terrorists, or even securing the US against foreign intelligence agencies, think again. The FBI is investigating a recent security breach, with independent researchers believing that a back door created by the NSA had allowed foreign governments to spy on US government communications.

Jan 09 10:17

Smoking Gun: Email Suggests Hillary Broke Law

The latest batch of Hillary Clinton emails released by the State Department early Friday contain what may be the smoking gun that forces the Justice Department to charge the former secretary of state with a crime, according to former federal prosecutor Joseph diGenova.

“This is gigantic,” said diGenova. “She caused to be removed a classified marking and then had it transmitted in an unencrypted manner. That is a felony. The removal of the classified marking is a federal crime. It is the same thing to order someone to do it as if she had done it herself.”

Webmaster's Commentary: 


You look good in Orange, Hillary. The color suits you! :)

Jan 09 09:35

At least 1,340 Clinton emails now known to contain classified material

At least 1,340 emails that Hillary Clinton sent or received contained classified material, according to the State Department’s latest update from its ongoing review of more than 30,000 emails.

The State Department released a new batch of 3,007 pages of Clinton’s emails after 1:30 a.m. Friday in response to a court order. Of those, 66 contain classified information.

None of Clinton’’s emails was marked as classified during her tenure, State Department officials say, but intelligence officials say some material was clearly classified at the time. Her aides also sent and received classified information.

Jan 09 08:47

Amazon customer complains, finds 10-inch dildo in his shopping basket

On a fateful day in October 2015, Pedro—an IT contractor living in Ireland—was surfing Amazon.de for a specialised textbook he needed for a new extracurricular art class. He found the book, ordered it, but was disappointed when it arrived. The listing had said that the book was the current edition, but Amazon sent Pedro the previous edition.

Pedro got in touch with customer service to see about getting the proper version. A few days later, Amazon told Pedro that it had ultimately failed to find the right version of the textbook and that he should instead return the book for a full refund.

Pedro, who by this point had spent a long time looking for the correct version of the book and then more time waiting while Amazon looked for the book in its warehouse, wasn't happy with the overall shopping experience. He made his displeasure known by providing negative feedback on a customer satisfaction survey, and he figured that was the end of it.

Jan 08 13:01

Bombshell 1-Sentence Email From Hillary Just Released- It Could Be The Smoking Gun…

In the latest batch of emails to be released, a message sent by Clinton clears up that question by proving the secretary of state herself ordered an underling to send her some classified info over her unsecure email system. And she did so knowingly.

Jan 08 13:00

Latest batch of Clinton emails contains 66 more classified messages

The latest batch of emails released from Hillary Clinton's personal account from her tenure as secretary of state includes 66 messages deemed classified at some level, the State Department said early Friday.

In one email, Clinton even seemed to coach a top adviser on how to send secure information outside secure channels.

Jan 08 12:35

THE BELLS TOLL FOR HILLARY

The Federal Bureau of Investigation will recommend that the Justice Department bring criminal charges against Hillary Clinton and various of her aides, and soon. The evidence consists of materials that the Bureau has gathered in the course of its months-long investigation of Mrs. Clinton’s personal server. The recommendations will come very soon.

The charges will consist of some of the following:

1. Improper disclosure or retention of classified information.
2. Destruction of government records.
3. Lying to federal agents.
4. Lying under oath.
5. Obstruction of justice.

Webmaster's Commentary: 

I will believe it when I see Hillary hauled away in handcuffs, and not one second before. The FBI can recommend all they want, but it will be up to Obama's Attorney General Loretta Lynch whether or not to file charges, and I do not expect her to do so. But even so, obvious criminality and an Obama "get out of jail free" card will not look good to the voters!

Jan 08 12:18

Arab-Jew ‘forbidden’ kiss video mysteriously disappears from Facebook

A video of Arab and Jewish couples engaging in “forbidden” kisses has disappeared from Facebook, prompting claims of hacking and censorship.

The video by TimeOut Tel Aviv features six couples doing the “forbidden deed”, was a response to an Israeli Ministry of Education decision to exclude a book describing a love affair between a Jewish woman and an Arab man from school curricula.

Jan 08 11:12

Whoa: Hillary e-mail instructs aide to transmit classified data without markings

Has the State Department released a smoking gun in the Hillary Clinton e-mail scandal? In a thread from June 2011, Hillary exchanges e-mails with Jake Sullivan, then her deputy chief of staff and now her campaign foreign-policy adviser, in which she impatiently waits for a set of talking points. When Sullivan tells her that the source is having trouble with the secure fax, Hillary then orders Sullivan to have the data stripped of its markings and sent through a non-secure channel.

Webmaster's Commentary: 


Click for larger image

This confirrms reports from last summer that Hillary's staffers were stripping the classified emails of classification marks which is a FELONY! and the above emails shows that Hillary not only knew, but ordered the commission of that felony!

Optional Banner: 
WRH breaking
Jan 08 10:44

An Imminent Indictment? - Fmr U.S. Attorney: Hillary Clinton Charged Soon - Andrew Napolitano

Webmaster's Commentary: 

I would love to see it, but I doubt it. The FBI has been the Clintons' protectors going all the way back to the murder of White House Deputy Counsel Vincent Foster, the event which triggered my involuntary career change from visual effects expert to truth activist all those years ago! I suspect the FBI will declare that they cannot find any hard evidence of wrongdoing and the Hillary campaign will declare the matter closed, an example of GOP persecution of women, "in the past", and Hillary's campaign will move forward.

Jan 08 07:59

Confirmed: How to stop Windows 10 forcing itself onto PCs – your essential guide

A Redmond spokesperson today confirmed that support page is still valid – its instructions still work even though it was quietly published a few months ago. It involves digging into the Registry to disable the Windows 10 upgrade path, but it's not impossible nor particularly scary for a Register reader.

Make sure you follow all the steps, but essentially you have to:

Open the Registry Editor (search for regedit in the Start Menu and run it).
Set DisableOSUpgrade to 1 in HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
Set ReservationsAllowed to 0 in HKLM\Software\Microsoft\Windows\CurrentVersion\WindowsUpdate\OSUpgrade

Jan 08 07:52

Call of Duty terror jabber just mindless banter

Security bods laugh at fear-monger failure

n/a

n/a
Jan 07 14:07

Hard to Watch: Dad “sick to His Stomach” After 10-year-old Daughter’s “invasive” Tsa Pat Down

It really is hard to watch. Her father wrote that he felt like he was watching his 5th grade daughter get assaulted.

Jan 07 12:35

State Department misled on Hillary Clinton emails, investigation concludes

The top leadership of the State Department regularly botched open-records requests such as those for former Secretary Hillary Clinton’s emails, the department’s inspector general said in a report released Thursday that portrayed a staff who gave short shrift to its legal obligation to be transparent.

Department leaders ignored one request for Mrs. Clinton’s schedules “for several years,” and in another instance insisted it couldn’t find any records relating to Mrs. Clinton’s other emails — even though at the time, “dozens of senior officials” were aware of her unique email arrangement.

The inspector general said Mrs. Clinton’s chief of staff at the time, Cheryl Mills, who knew about her email account and server she kept at her New York home, was made aware of the request for information, but didn’t take any steps to clear the matter up or reveal the email account.

Jan 07 09:53

'You're updated!' Drupal says, with fingers crossed behind back

Drupal installations could be out of date and open to attack thanks to a borked update process that flags unpatched platforms as current.

Jan 07 09:50

Plain cruelty: Boffins flay Linux ransomware for the third time

Probably the world's most tragically determined blackhat developers have had their revitalised Linux.Encoder ransomware pwned again by meddling BitDefender whitehats.

The third iteration of the Linux.Encoder ransomware was unleashed on the world, infecting a paltry 600 servers before a crack team of security analysts returned to rip it apart.

Once again, instead of paying the VXers a Bitcoin to fund training them out of hopelessness, victims can run BitDefender's decryption utility to release their locked-up files free of charge.

Webmaster addition: Funny how NSA can't stop the ransomware people, but BitDefender can! :)

Jan 07 07:51

CIA Denies Request for Info on Edward Snowden

By Jon Rappoport

Matrix One: who is Edward Snowden?

Update: the CIA has just refused a FIOA request for information about its former employee, Edward Snowden.

The request was filed on November 15 by John Young, the owner of Cryptome.org. The CIA’s response, dated December 29, refers to Young’s query seeking “records granting Edward Joseph Snowden access to classified information…[and] records indicating Mr. Snowden[‘s] compliance with controls of classified information upon leaving the CIA.”

The CIA’s letter to Young states, “…the CIA can neither confirm nor deny the existence or nonexistence of records responsive to your request.” The CIA letter states that any other response would violate rules governing classification of data.

Bottom line: the CIA has nothing specific to say about Snowden’s status while he worked for the Agency.

Once again, the question of exactly who Edward Snowden is resurfaces...

SHARE THIS ARTICLE WITH YOUR SOCIAL MEDIA