Oct 01 08:33


On September 20th, Senate Judiciary Committee Chairman Patrick Leahy (D-VT) introduced legislation — S. 3804, the Combating Online Infringement and Counterfeits Act — that seeks to give the Department of Justice the power to shut down websites anywhere in the world that are found to infringe on intellectual property rights. This would be accomplished by ordering U.S. domain registrars and registries to stop resolving infringing sites’ domain names. While this bill has the noble-sounding goal of preventing online piracy, handing the federal government authority over the Internet would set a troubling precedent that would imperil Internet freedom in America and across the world.

Webmaster's Commentary: 

This can actually be defeated by amateur DNS servers set up all across the world, especially in those nations now willing to defy the United States, possibly even Iceland! Those who know how can actually set up their own local DNS servers to allow themselves and their friends to continue to access the patriot websites. The copyright infringers and pirates already do this, which means that this new law, like all the others, portrays itself as fighting cr4ime while actually seeking to return the general population to a state of deaf, dumb, and blindness, wholly dependent on ABCNNBBCBS to tell them what is going on in the world.

It won't work and it never has, but the tyrants playing by last century's rules are panicking. My concern is that if the virtual revolution is attacked, it will move from the virtual to the real world (as we are already seeing across Europe).

Oct 01 07:57

Stuxnet worm could have been inside job

Delegates at the Virus Bulletin 2010 conference in Vancouver have heard that the Stuxnet worm could have been an inside job.

Graham Cluley, senior technology consultant at Sophos, told that the worm may have been written by someone with detailed knowledge of Siemens' computer systems, possibly a current or former employee.

Mikko Hyppönen, chief research officer at F-Secure, told that, based on the evidence he'd seen, the Stuxnet worm looks like a government attack, although conference presentations focused on the technical details of the attack rather than the motive.

Oct 01 07:05

Israeli cyber unit responsible for Iran computer worm – claim

Computer experts have discovered a biblical reference embedded in the code of the computer worm that has pointed to Israel as the origin of the cyber attack.

The code contains the word "myrtus", which is the Latin biological term for the myrtle tree. The Hebrew word for myrtle, Hadassah, was the birth name of Esther, the Jewish queen of Persia.

In the Bible, The Book of Esther tells how the queen pre-empted an attack on the country's Jewish population and then persuaded her husband to launch an attack before being attacked themselves.

Israel has threatened to launch a pre-emptive attack on Iran's facilities to ensure that the Islamic state does not gain the ability to threaten its existence.

Oct 01 06:38

House Democrats shelve net neutrality proposal

Joelle Tessler
Associated Press

House Democrats have shelved a last-ditch effort to broker a compromise between phone, cable and Internet companies on rules that would prohibit broadband providers from blocking or degrading online traffic flowing over their networks.

Oct 01 02:13

DARPA develops Helmet of Obedience

It looks like our ever-diligent friends at DARPA have been busy creating a contingency plan for the OathKeeper movement. Thanks to a newly-developed pain modulator and behavior modification helmet, any US troops who decide they will obey the Constitution rather than the commands of the global puppet masters will now be getting some remote-controlled motivational persuasion.

Oct 01 01:54

Stuxnet & "Cyber Storm III' Cyber Attack Wargame are unrelated, nothing to see here...

New York Times asks: In a Computer Worm, a Possible Biblical Clue

But first from CyberSpaceWar/defencetalk: US keyboard warriors were doing battle Tuesday with a simulated cyberattack on government and private computer networks that undermines basic trust in the Internet. The "Cyber Storm III" exercise involves participants from seven US government departments, including the Pentagon, 11 US states, 60 private companies and 12 international partners.

Sep 30 18:54

Inside Stuxnet: Researcher drops new clues about origin of worm

The mysterious Stuxnet worm took center stage at the Virus Bulletin 2010 conference with a prominent security researcher dropping a raw hint that Israel may be behind the industrial-strength malware attack.

Sep 30 16:43

In a Computer Worm, a Possible Biblical Clue

Deep inside the computer worm that some specialists suspect is aimed at slowing Iran’s race for a nuclear weapon lies what could be a fleeting reference to the Book of Esther, the Old Testament tale in which the Jews pre-empt a Persian plot to destroy them.

Sep 30 16:33

Obama Working on Plan to Wiretap Skype, Facebook, BlackBerrys

The Obama administration wants to force all communications companies to make their networks compliable with wiretapping orders from law enforcement, a change that would primarily affect the likes of Facebook, Skype, BlackBerrys and similar encrypted systems.

Phone and broadband companies already are required under the 1994 Communications Assistance to Law Enforcement Act to ensure their operations can allow for eavesdropping by police and federal agents. But more recent communications like BlackBerrys, which encrypt emails, make it difficult for the government to intercept messages that may involve terrorist plots.

The White House has been working with the FBI, the Department of Justice and the National Security Agency to develop a plan that would be submitted to Congress sometime next year.

Sep 30 10:24

Millions of Computers Hit by Virus Across China

Jakarta Globe

Bejing. A computer virus dubbed the world’s “first cyber superweapon” and which may have been designed to attack Iran’s nuclear facilities has found a new target — China.

The Stuxnet computer worm has wreaked havoc in China, infecting millions of computers around the country, state media reported this week.

Sep 30 09:20

Authorities Plan To Trawl Phone Calls And E Mails For Signs Of “Resentment Toward Government”

Do you resent the government for enforcing Obamacare or raising your taxes? Write about it in an email or talk about it on the phone and you could be placed under surveillance as a potential terrorist, if frightening new technology being shopped to law enforcement agencies is implemented.

Webmaster's Commentary: 

Since the Republicans resent the Democrats and the Democrats resent the Republicans, that puts pretty much every registered voter on the "terrorist" watch list, doesn't it?

Sep 29 19:24

Internet's creator slams 'blight' of web disconnection laws


Tim Berners-Lee, the man credited with inventing the world wide web, warned Tuesday of the "blight" of new laws being introduced across the globe allowing people to be cut off from the Internet.

"There's been a rash of laws trying to give governments and Internet service providers (ISPs) the right and the duty to disconnect people," he told a conference on web science at the Royal Society in London.

Sep 29 16:44

FBI agents seek the right to tap texts, emails and websites

US intelligence services would be allowed to tap text messages, emails and networking websites under new powers being considered by Barack Obama's administration.

The FBI says extremists and drug cartels are increasingly communicating online rather than using telephones, leaving US investigators struggling to keep track of them.

A new bill requesting the additional powers to investigate suspected criminals and terrorists will be presented next year. It is likely to face stiff opposition from civil liberties advocates who say the security services have historically abused extensions of power.

James Dempsey, of the pressure group Centre for Democracy and Technology, said: "They are really asking for the authority to redesign services that take advantage of the unique architecture of the internet."

Sep 29 12:48

Engineers Slam Internet 'Censorship' Bill Ahead of Key Senate Panel Vote

Editor's Note: If you disagree with this bill, sign the petition here:

Judson Berger -- FOX News

Internet entrepreneurs are in a panic over a fast-tracking Senate bill they say will censor the Web, stifle Silicon Valley startups, damage the United States' credibility on free speech and ultimately trigger the creation of an alternate-universe Internet.

The West Coast engineers say they were blindsided last Monday when the Combating Online Infringement and Counterfeits Act was introduced in the Senate Judiciary Committee. The bill, which could come up for a vote as early as Thursday, has a bipartisan roster of co-sponsors who say it will be a tool for stopping the worst offenders in the world of online piracy.

Sep 29 10:13

University of Chicago Law Prof's Blog About Struggling on $400Gs Draws Fire

A prominent college law professor's posting of his family's finances on the Web to make the case that they're struggling to make ends meet -- despite their estimated $400,000-plus income -- has lit the fuse of an online debate that he claims has made him the target of an "online lynch mob."

Todd Henderson, a corporate law professor at the University of Chicago -- and a neighbor of President Obama -- says that since he posted his finances online he's been barraged with comments such as "die yuppie scum," forcing him to shut down his blog out of fear for his family.

Webmaster's Commentary: 

Yeah, our heart @#%ing bleeds for people who make almost a half mil a year crying about how tough life is.

For a law professor, this was pretty insensitive, not to mention stupid. Maybe that's why the legal system is so screwed up in this country.

Sep 29 08:34

FBI drive for encryption backdoors is déjà vu for security experts

The FBI now wants to require all encrypted communications systems to have backdoors for surveillance, according to a New York Times report, and to the nation's top crypto experts it sounds like a battle they've fought before.

Webmaster's Commentary: 

Here's the deal...

Criminals and terrorists (real ones; not these Israeli phonies running around wearing towels they stole from Holiday Inn on their heads) have the resources to set up private channels and create their own unbreakable encryption systems. The FBI push for back door encryption to be forced on the masses is to watch the people of the United States, to ward off a popular uprising, and to steal confidential personal data with which the FBI agents can make a fast buck. Here is a well-documented case of such behavior!




Sep 29 08:28

Gilad Atzmon: Roger Waters and the Bombs of David

May I suggest to Foxman and his notorious ADL that the rest of humanity also has a wish : we want to see an end to the terror imposed by the Jewish state, in the name of the Jewish people, Foxman included. We also want to see an end of Jewish institutional pressure being exercised on so many Western political groups, parties and governments.

Sep 29 06:42

US launches 'Cyber Storm III' to test preparedness against cyber attack


ARLINGTON: The United States and a dozen other countries are staging a huge cyber exercise to test the preparedness of their computer networks against a simulated attack, Homeland Security Secretary Janet Napolitano has announced.

Sep 28 19:21

Censorship of the Internet Takes Center Stage in "Online Infringement" Bill

Senator Patrick Leahy yesterday introduced the "Combating Online Infringement and Counterfeits Act" (COICA). This flawed bill would allow the Attorney General and the Department of Justice to break the Internet one domain at a time — by requiring domain registrars/registries, ISPs, DNS providers, and others to block Internet users from reaching certain websites. The bill would also create two Internet blacklists. The first is a list of all the websites hit with a censorship court order from the Attorney General. The second, more worrying, blacklist is a list of domain names that the Department of Justice determines — without judicial review — are "dedicated to infringing activities." The bill only requires blocking for domains in the first list, but strongly suggests that domains on the second list should be blocked as well by providing legal immunity for Internet intermediaries and DNS operators who decide to block domains on the second blacklist as well. (It's easy to predict that there will be tremendous pressure for Internet intermediaries of all stripes to block these "deemed infringing" sites on the second blacklist.)

And it's not clear what a user would see in this situation — would it look like a "404 message," that simply says a site or page could not be found, without explaining why? Would users receive some kind of notice clarifying that the site they were seeking was made inaccessible at the behest of the government? Generally speaking, the bill forces all the Internet "middlemen" to act as if a part of the Internet doesn't exist, even though that page may otherwise be completely available and accessible.

Sep 28 15:16

Age of Censorship and Internet Trade Wars

Francis Anthony Govia
Activist Post

Sep 28 14:37

Feds want backdoors built into VoIP and email

Developers of email, instant-messaging and voice-over-internet-protocol applications would be forced to redesign their services so their contents can be intercepted by law enforcement agents armed with legal wiretap orders under federal legislation reported on Monday by The New York Times.

The legislation would, among other things, require cellphone carriers, websites and other types of service providers to have a way to unscramble encrypted communications traveling over their networks, the report said. It specifically mentions companies such as Research in Motion and Skype, which are popular in part because their cellular communications and VoIP services respectively are widely regarded as offering robust encryption that's impractical if not impossible for government agents to crack.

Sep 28 14:03

Has the West declared cyber war on Iran?

Computers can go wrong, and everyone is used to it. But that's at home. We assume that the machines controlling the infrastructure that makes everything tick – power stations, chemical works, water purification plants – have rock-solid defences in place to deal with unexplained crashes or virus attacks by malicious strangers.

Now, though, a new kind of online sabotage has reached its zenith with a self-replicating "worm" that started on a single USB drive and has spread rapidly through industrial computer systems around the world.

Sep 28 10:12

Fresh ACS:Law file-sharing lists expose thousands more

The personal details of a further 8,000 people alleged to have shared music or films illegally have appeared online.

A list of more than 8,000 Sky broadband subscribers and a second of 400 PlusNet users surfaced following a security breach of legal firm ACS:Law.

It comes after a database of more than 5,000 people suspected of downloading adult films emerged on Monday.

The UK's Information Commissioner said ACS:Law could be fined up to half a million pounds for the breaches.

Sep 28 09:03

Pentagon Accused Of Launching Supervirus Attack On Iran

Webmaster's Commentary: 

Whether it is Israel or the US or both that committed this act of industrial sabotage, the question the mainstream media is refusing to ask is what would have happened if these bozos made a mistake and instead of shutting down the power station they triggered a Chernobyl-style melt down and showered the Mideast with radiation, poisoning the cities, poisoning the people, and poisoning the oil fields on which we are still dependent? Is anyone actually thinking these things through? Or are we ruled by leaders who do not care if they blow up the world as long as those gosh-darned Muslims get it first?

One thing is clear. Since this computer weapon has to be inserted using an infected USB flash drive, there is a foreign spy on the staff at the power station.

Sep 28 08:53

US to spy on Internet messaging

The Obama White House is backing new regulations that would compel popular Internet messaging services like Facebook, Skype and Blackberry to open up their systems to FBI surveillance, the New York Times reported Monday, citing federal law enforcement and national security officials.

Webmaster's Commentary: 

I wouldn't worry about it. Odigo received an advanced warning of the 9-11 attacks and gave the FBI the IP address of the message sender and even with the message and the IP the FBI couldn't figure out where the message came from, so how will they handle half a billion text messages about my BFF!

Sep 28 08:36

Israel Suspected in Worm Sabotage of Iran's First Nuclear Plant

The New York Times quotes a former U.S. intelligence office as saying that the attack was the work of Israel’s equivalent of America’s National Security Agency, known as Unit 8200. According to IEEE Spectrum's December issue, Israel had previously used a cyber-attack to shut off radar systems in Syria, allowing it to evaluate what it believed to be an under-construction nuclear reactor.

Sep 28 07:44

Anti-Net Neutrality Bill Gets Leaked From Waxman’s Office

Rep. Henry Waxman, Chairman of the House Committee on Energy and Commerce, the committe that oversees telecommunications was leaked on yesterday. Now we have a copy of Waxman’s plan to subvert Net Neutrality. Copy of the leaked Bill (in legalese) not yet submitted to congress. Leak Source is

Let’s say the internet is made of tubes. This bill gives the tube companies license to start selling premium tubes. Big shiny tubes. However anyone with the misfortune not to partner with the tube company will find themselves stuck in the smaller, collapsing tube system.

Sep 27 10:29

Money transfers could face anti-terrorism scrutiny

Ellen Nakashima
The Washington Post

The Obama administration wants to require U.S. banks to report all electronic money transfers into and out of the country, a dramatic expansion in efforts to counter terrorist financing and money laundering.

Officials say the information would help them spot the sort of transfers that helped finance the al-Qaeda hijackers who carried out the Sept. 11, 2001, attacks. They say the expanded financial data would allow anti-terrorist agencies to better understand normal money-flow patterns so they can spot abnormal activity.

Sep 27 09:45


Want to earn tons of cool badges and prizes while competing with you friends to see who can be the best American? Download the SnapScouts app for your Android phone (iPhone app coming soon) and get started patrolling your neighborhood.

Webmaster's Commentary: 

Use your smart phone to be just like the Nazi neighborhood informants! Be a REAL American today!

Sep 27 08:50

Israel Cyber-Attacks Iranian Nuke Plant With Stuxnet Computer Virus

Sep 27 06:32

Wiretapped phones, now Internet?

Charlie Savage
The New York Times

Federal law enforcement and national security officials are preparing to seek sweeping new regulations of the Internet, arguing that their ability to wiretap criminal and terrorism suspects is "going dark" as people increasingly communicate online instead of by telephone.

Sep 27 06:27

Short passwords 'hopelessly inadequate', say boffins

The availability of password-cracking tools based on increasingly powerful graphics processors means that even carefully chosen short passwords are liable to crack under a brute-force attack.

A password of less than seven characters will soon be "hopelessly inadequate" even if it contains symbols as well as alphanumerical characters, according to computer scientists at the Georgia Tech Research Institute. The security researchers recommend passwords at least 12 characters long.

Sep 27 06:23

Apple claims to own the word 'pod'

All we are saying is give peas a chance

Sep 27 06:21

New law to 'ease internet wiretaps'

Broad new regulations being drafted by the Obama administration would make it easier for law enforcement and national security officials to eavesdrop on internet and email communications like social networking websites and BlackBerry phones, a US newspaper has reported.

It said the White House plans to submit a bill next year that would require all online services that enable communications to be technically equipped to comply with a wiretap order.

That would include providers of encrypted email, such as BlackBerry, networking sites like Facebook and direct communication services like Skype.

Sep 26 22:03

U.S. should be able to shut Internet, former CIA chief says

SAN ANTONIO (Reuters) - Cyberterrorism is such a threat that the U.S. president should have the authority to shut down the Internet in the event of an attack, Former CIA Director Michael Hayden said.

Sep 26 13:29

Computer attacks linked to a wealthy group or nation

Lolita C. Baldor
Associated Press

WASHINGTON — A powerful computer code attacking industrial facilities around the world, but mainly in Iran, probably was created by experts working for a country or a well-funded private group, according to an analysis by a leading computer security company.

The malicious code, called Stuxnet, was designed to go after several "high-value targets," said Liam O Murchu, manager of security response operations at Symantec Corp. But both O Murchu and U.S. government experts say there's no proof it was developed to target nuclear plants in Iran, despite recent speculation from some researchers.

Sep 26 00:17

Iran 'first victim of cyberwar'

Kevin Hogan, senior director of security response at computer security giant Symantec, said 60 per cent of computers worldwide infected by the Stuxnet worm were in Iran, suggesting its industry was the target.

And European digital security company Kaspersky Labs said the attack could only be conducted "with nation-state support".

"Stuxnet is a working and fearsome prototype of a cyber-weapon that will lead to the creation of a new arms race in the world," it said in a statement about the virus which attacks control systems produced by German company Siemens.

The comments have stirred speculation that Iran's first nuclear power station, at Bushehr, may have been targeted in a state-backed attempt at sabotage or espionage.

Sep 25 15:44

US Cyber Command/Mossad? Stuxnet worm 'targeted high-value Iranian assets'

One of the most sophisticated pieces of malware ever detected was probably targeting "high value" infrastructure in Iran, experts have told the BBC.

Stuxnet's complexity suggests it could only have been written by a "nation state", some researchers have claimed.

Sep 25 10:29

September 10, 2001: Military ‘Infocon’ Alert Level Reduced because of Perceived Lower Threat of Computer Attacks

The US military reduces the Information Operations Condition (Infocon) to Normal—the lowest possible threat level—less than 12 hours before the 9/11 attacks commence, reportedly due to reduced fears of attacks on computer networks.

Level Reduced Due to 'Decreased Threat' - The Infocon level is lowered to Normal, meaning there is no special threat, at 9:09 p.m. this evening. The reason for this, according to historical records for the 1st Fighter Wing at Langley Air Force Base, Virginia, is “a decreased threat from hacker and virus attacks on the computer networks across the US.” [Colorado Springs Gazette, 5/3/2001; 1st Fighter Wing History Office, 12/2001]

Sep 25 08:42

CIA used pirated, inaccurate software to target drone attacks: lawsuit

The CIA used illegally pirated software to direct Predator drone attacks, despite apparently knowing the software was inaccurate, according to documents in an intellectual property lawsuit.

The lawsuit, working its way through a Massachusetts court, alleges that the CIA purchased a pirated and inaccurate version of a location analysis program, which may have incorrectly located targets by as much as 42 feet.

Webmaster's Commentary: 

42 feet means you hit the house next door!

Sep 24 16:07

FBI investigating 'Here you have' worm

Representatives from the FBI's Miami field office spoke with IDG News Service this week seeking information on the hacker behind the worm. A hacker using the name Iraq Resistance has exchanged a number of e-mails with IDG over the past two weeks discussing the incident.

Webmaster's Commentary: 

I am going ot go out on a limb here and speculate that this hacker isn't in or has anything to do with Iraq.

Sep 24 10:57

Airborne Laser Goes Off-Target Due to Software Bug

An airborne laser built for the U.S. Missile Defense Agency failed to destroy a target missile when a software glitch threw off its precision aiming during its latest field test.

Webmaster's Commentary: 

"Meanwhile, in other news, government sources have concluded that the mysterious hole that appeared drilled through Mount Wilson, north of Pasadena, must be the work of Al Qaeda!!

Sep 24 07:18

Censorship of the Internet Takes Center Stage in "Online Infringement" Bill

This is a censorship bill that runs roughshod over freedom of speech on the Internet. Free speech is vitally important to democracy, which is why the government is restricted from suppressing speech except in very specific, narrowly-tailored situations. But this bill is the polar opposite of narrow — not only in the broad way that it tries to define a site "dedicated to infringing activities," but also in the solution that it tries to impose — a block on a whole domain, and not just the infringing part of the site.

Webmaster's Commentary: 

The fastest way to bring down a dictatorship is to force it to act like one where everybody can see it!

Sep 24 02:52

Jones - Israel-Bashers Are 'Scum'

In a recent Youtube clip, talk show host Alex Jones describes himself as the most influential leader of the Patriot/Tea Party revolt, next to Rep. Ron Paul. Many would disagree. Yet he inarguably has the power to influence and mislead many.

Sep 23 14:35

Stuxnet Suspicions Rise: Has a Cyberwar Started?

The Stuxnet worm has been rattling security experts for quite some time with its complexity and ingenuity. New suspicions have been raised recently that the worm was used to sabotage a nuclear reactor in Iran. That, coupled with the worm's behavior, has led to some speculation that Stuxnet is a state-sponsored weapon.

Sep 23 09:42

Stuxnet worm 'targeted high-value Iranian assets'

One of the most sophisticated pieces of malware ever detected was probably targeting "high value" infrastructure in Iran, experts have told the BBC.

Sep 23 08:32

Feds Target Americans As Terrorists In Effort To Break Back Of Big Government Resistance

The feds are up to their old tricks once again – demonizing American citizens who are politically engaged and use the Internet as domestic terrorists in a transparent ploy to chill free speech and immobilize resistance to big government – when in actual fact every major terror plot in the United States was provocateured, contrived or directly facilitated by the federal government itself.

Sep 23 08:02

Bill would let feds block pirate websites worldwide

Copyright enforcement as censorship

Dan Goodin -- The Register

US lawmakers have introduced legislation that would allow the federal government to quickly block websites anywhere in the world if they are dedicated to sharing copyrighted music or other protected content.

The “Combating Online Infringement and Counterfeits Act” would empower the US Department of Justice to shut down, or block access to, websites found to be “dedicated to infringing activities.” Sites that use domain names registered by a US-based company, or a top-level-domain administered by a US-based company, would find their internet addresses frozen.

Sep 23 07:38

Seeing The Internet As An 'Information Weapon'

Using the term "mass psychologic brainwashing," the agreement said that the dissemination of information "harmful to the spiritual, moral and cultural spheres of other states" should be considered a "security threat."

Sep 22 08:42

4chan invades Tea Party website

A website run by the conservative Tea Party movement was overrun by the denizens of 4chan on Tuesday.

Website vulnerabilities on the official website allowed pranksters to divert surfers landing on the photo section of the site to smut and shock sites. It's unclear what website security shortcomings were exploited in that attack and whether these are now closed.

Webmaster's Commentary: 

Donald Segretti would be proud!

The entrenched political parties are clearly terrified of the Tea Party movement.

Sep 22 08:15

Leading Stuxnet theory points toward sabotage and SCADA inside players

Because of the geopolitical circumstances surrounding the location where most attacks were recorded (Iran), the current hypothesis points toward Bushehr and other nuclear plants as the lead targets.

Webmaster's Commentary: 

Obviously, Israel has to lead the list of suspects behind this cyber-attack. They are desperate to maintain their nuclear monopoly in the region. But what if they make a mistake? It is one thing to try to keep a reactor from operating, but what if the hackers trigger a Chernobyl-style meltdown. From this moment on, any disaster that befalls Iran's power station will inevitably bring suspicion onto Israel, given their long history of dirty-trick operations!

Sep 22 08:08

Stuxnet malware is 'weapon' out to destroy ... Iran's Bushehr nuclear plant?

Cyber security experts say they have identified the world's first known cyber super weapon designed specifically to destroy a real-world target – a factory, a refinery, or just maybe a nuclear power plant.

Sep 21 09:30

Phone app monitors Israeli settlements in Palestinian territories

Sep 21 08:18

Twitter "MouseOver" Hack is Spreading a Malicious Code

The code is often lurking in the user name -- and sometimes the tweet itself is entirely blank. It can hijack clicks on the compromised page, taking users to a malicious non-Twitter site. PC Magazine reports that one affected user was the wife of a former British Prime Minister, whose Twitter feed now redirects users to a Japanese porn site. And CNN discovered another victim: White House press secretary Robert Gibbs. Tuesday he tweeted, "My Twitter went haywire - absolutely no clue why it sent that message or even what it is...paging the tech guys..."

Webmaster's Commentary: 

As another aid flotilla heads towards Gaza, just who has the most to gain by shutting down Twitter right now?

As a side note, the non-web interfaces to Twitter like "tweetdeck" seem unaffected.

Sep 21 07:45

Fake iPhone jail-breaking tool packed with malware

Webmaster's Commentary: 

The most effective computer security tool is a bullet in the brain of the cyber-criminals. Everything else is just part of the protection racket.

Sep 21 06:43

US Lawmakers seek power to 'shut down' Web sites in other countries


A bill introduced in the US Senate on Monday would give US law enforcement authorities more tools to crack down on websites engaged in piracy of movies, television shows and music.

The Combating Online Infringement and Counterfeits Act has received support from both parties and was introduced by Senator Patrick Leahy, a Democrat from Vermont, and Senator Orrin Hatch, a Republican from Utah.

Sep 20 08:48

The truth about iPad: It's only good for two things

To my close friends and colleagues, I’ve been more candid. I’ve often said, “The iPad is only good for two things: Reading and Scrabble.”

Sep 20 07:08

Global ‘internet treaty’ proposed

Claudine Beaumont
The Telegraph

The proposal was presented at the Internet Governance Forum in Lithuania last week, and outlined 12 “principles of internet governance”, including a commitment from countries to sustain the technological foundations that underpin the web’s infrastructure.

The draft law has been likened to the Space Treaty, signed in 1967, which stated that space exploration should be carried out for the benefit of all nations, and guaranteed “free access to all areas of celestial bodies”.

Under the proposed terms of the law, there would be cross-border co-operation between countries to identify and address security vulnerability and protect the network from possible cyber attacks or cyber terrorism.

Sep 19 09:28



Never has a nation funded a foreign spy organization's efforts to catalog potential intelligence assets, operatives and, at the same time, take over the job of watching themselves. This is one of the greatest intelligence coups in history. Combine this with control of America’s airport security and total control of America's communications networks, everything, mobile, internet, even landlines….we might as well pull down the flag and roll over.

Sep 18 18:35

Time/CNN's Captain Obvious Asks: Have Cell Phones Become Personal Tracking Devices?

Time/CNN's Breaking News Study in Forgone Conclusions: What Your Cell Phone Could Be Telling the Government

Related 2007 Story at Conclusion of Article Predating Time's "Groundbreaking" News?

Smart phones do many things these days: surf the Internet, send e-mail, take photos and video (and — oh, yes — send and receive calls). But one thing they can do that phone companies don't advertise is spy on you. As long as you don't leave home without your phone, that handy gadget keeps a record of everywhere you go — a record the government can then get from your telephone company.

Sep 17 09:15

HTC EVO vs iPhone 4 Trilogy

Mikes rant at the beginning of yesterdays show reminded me of this.

Start to pick up speed at 0:59

Sep 17 09:03

Weapon Software Glitch Hits Close to Home

In July, TheStreet reported a story detailing how an intellectual property dispute between two Boston-area companies uncovered allegations that the CIA bought faulty software for its unmanned aerial weapons program.

Now comes apparent proof the military is, indeed, dealing with software glitches in its unmanned "drones." The New York Times reported that a U.S. Navy drone earlier this month made its way into restricted airspace near Washington, D.C., because operators lost remote control of it for about 20 minutes. The reason for the scary error, according to Navy officials, was a "software issue" that thwarted the drone's automatic homing feature. When operators lost contact with it, the Northrop Grumman(NOC)-manufactured drone just kept flying the wrong way.

Sep 17 08:14

Dark Patterns - how websites trick you into doing things you don't really want to do!

Sep 17 07:42

Google Is Now Officially Evil

Sorry, Google, but according to the lawsuit Skyhook filed against you today, you've crossed the line. Your "don't be evil" mantra is now officially a joke.

The evidence?

Today, Skyhook announced that it is suing Google for interfering with its business, costing the small company sums exceeding "tens of millions of dollars."

In short, Skyhook says that Google effectively forced Motorola to cancel a deal with Skyhook in which Skyhook would have provided location-based services in Motorola phones -- because Google wanted Motorola to use Google's own location services instead.

Sep 16 21:54

Pentagon re-opens probe into 100s of employees with child porn & other warwhore updates

Last week, Kenneth deGraffenreid, a former high-ranking counterintelligence official, told John Cook it was "absurd" the Pentagon didn't investigate the child porn allegations, because it left the defense establishment vulnerable to espionage. [and a first class paid junket to USrael]

"What a sophisticated case officer is looking for is someone who has potential vulnerabilities," he said. "They look for something like that, and a taste for child pornography is powerful stuff. So I would be very worried that they didn't investigate all of the cases. It sounds absurd on the face of it, that you'd have this information and only investigate some of the cases. You don't put five locks on three of your doors and none on the last one."

Sep 16 11:18

Secular Israelis outraged about holy day Internet blackout

Ultra-Orthodox Cabinet ministers are leading the charge to enforce the religious prohibition on spending money on Jewish holy days. But for non-religious residents, tourists and foreign workers, the planned ban joins two leading ills of Israeli life — red tape and religious restrictions — in a marriage of inconvenience.

Sep 16 10:36

Is Stuxnet the 'best' malware ever?

The Stuxnet worm is a "groundbreaking" piece of malware so devious in its use of unpatched vulnerabilities, so sophisticated in its multipronged approach, that the security researchers who tore it apart believe it may be the work of state-backed professionals.

Webmaster's Commentary: 

Given that Iran bore the brunt of this cyber-attack, that kinda narrows down the list of potential suspects!

Sep 16 08:38

The face that launched a global advertising scam

Theuriau has, over the past few months, also become the face of one of the most brazen series of cyber identity thefts. To many web surfers, she is not Melissa, but more likely ''Karen'' or ''Amy'' - her image stolen for use in bogus advertising. She is being used variously to promote Swipe penny auctions, acai berry diets, colon cleansing and slimming teas. None of it with her knowledge or permission.

Many of the sites have connections back to Canadian internet entrepreneur Jesse Willms, some of whose companies were sued last year by Oprah Winfrey and Dr Mehmet Oz for using the television show hosts' images without permission, and in a manner that implied they endorsed the products.

Sep 16 08:38

Claimed HDCP master key leak could be fatal to DRM scheme

High-bandwidth Digital Content Protection (HDCP), the copy protection system used to prevent the making of perfect digital copies of audio and video data sent over DisplayPort, HDMI, and DVI interfaces, may have been blown out of the water if a post made to yesterday is what it claims to be. The post purports to contain the HDCP "master key," a 40×40 matrix of 56-bit numbers, which is used by the HDCP licensing company, Digital Content Protection (DCP), to generate the private keys used in all HDCP devices.

Sep 15 15:11

Google engineer fired for snooping on underage teens

David Barksdale, a former Google employee, was a site reliability engineer (SRE) at Google’s Kirkland, Washington office. SREs are able to gain access to private data on a fairly regular basis, in order to properly troubleshoot and fix problems anywhere in the Google-verse. According to Valleywag, Barksdale abused his powers as an SRE by snooping on various underage teens he met at a technology group in Seattle. He gained access to their Gmail inboxes, chat transcripts, and Google Voice phone conversations, among other things. The snooping does not seem sexual in nature, and is being looked at as simply a privacy breach, with no malicious intent.

Webmaster's Commentary: 

If there was no malicious intent, then how did the parents find out about the snooping in the first place?

Sep 15 13:49

Mossad in America

The Israeli government claims that it does not spy on the United States are intended for the media and popular consumption. The reality is that Israel’s intelligence agencies target the United States intensively, particularly in pursuit of military and dual-use civilian technology. Among nations considered to be friendly to Washington, Israel leads all others in its active espionage directed against American companies and the Defense Department. It also dominates two commercial sectors that enable it to extend its reach inside America’s domestic infrastructure: airline and telecommunications security.

Sep 15 11:06

Ubuntu 10.04

I'm running the new Ubuntu 10.04 Desktop 64 bit OS on an Inspiron. It is smooth and fast. It even has an email program with it. Try it! You will like it. Don't cost nothin.

Sep 15 08:56

Flashback: Professional Trolls

People are reporting that they're getting these comments from a company called Netvocates. The company will defend your organization's reputation by sending people to fill blog comments with defenses.

Sep 13 08:14


Webmaster's Commentary: 


We are all aware that Righthaven LLC is suing all websites it can for copyright infringement from Stephens Media. The obvious solution is simply to never read anything from Stephens Media, lest we inadvertently copy something we ought not to. This plugin for Firefox makes sure you never see anything owned by Stephens Media on any of their websites anywhere in the world. Better safe than sorry!

I am sure this will make Stephens Media very happy indeed to know they are permanently safe from ever having any of their materials copied or for that matter even read by anyone ever again anywhere in the world!

Please spread this useful tool everywhere you can. There is also a version for Chrome

Sep 13 07:30

Spammers Make 57,000 Fake Web Sites a Week

According to a three-month study by antivirus developer PandaLabs, these cyber-criminals are creating around 57,000 new fake websites every week. That's close to 3 million per year. And all of it is being done to exploit major brands.

Webmaster's Commentary: 

But loyal Americans will ignore the cyber-criminals and hate the Muslims as ordered!

Sep 13 07:14

Gorilla Design Studio Presents: Using the Hosts File

Webmaster's Commentary: 


A non-browser specific means of blocking your computer from seeing Stephens Media websites, in order to protect yourself from the lawsuits by Righthaven LLC. This does not require a plugin, but does require some technical expertise. However, if done correctly, it is 100% safe. If anyone has a complete list of the domains currently represented by Righthaven LLC please send it in and I will make a permanent resource here at WRH.

Sep 13 02:23

Concern grows over foreign involvement in spy's death

The 31-year-old maths and computer expert would have been regarded as a valuable asset for his knowledge of the inner-workings of GCHQ, the government's listening post in Cheltenham, and for his work on preventing cyber attacks on the banking and transport infrastructure.

It is understood Mr Williams's job at the time of his death was creating computer defences in the City of London. Williams would have had access to information which other countries would want to obtain.

The intelligence source said: "His job was to defend the banking system on which Britain's banking, commerce and all our public services depend. It was the kind of work that would have made him prime target for recruitment.

Sep 12 09:52

Can You Handle The Heat?

Awesome news for people wearing sweatpants while posting lists of their favorite Smurfs (present company included): the Associated Press informed its members this week that they can cite blogs as a news source.

Webmaster's Commentary: 

Dear AP (and for that matter ABCNNBBCBS), feel free to use any original writings on this website as a source free of charge, as long as you don't "tinker" it to change the meaning and include a credit.

Sep 12 09:31

Latest "gift" from those who hate the internet

Sep 12 09:05

Oh come ON, now! This is just plain silly!

Sep 11 07:31

Israel whining about anti-semtisim in blogs that merely report the truth about Israel

Webmaster's Commentary: 

"Whine whine whimper whine pity us you are all so mean what did we ever do to you Nazi Nazi Hitler Hitler holocaust holocaust God intended us to have all the Palestinians' lands and you just aren't with the @#%$ing program schmucks give us your money and we will stop calling you bad names!"

Sep 10 12:22


Hi you guys.. . I am a member of the news repeaters.. Here is how you join this elite group.. Have you ever noticed that the very hottest posters have websites that direct the traffic to their own advertisers?
In this way they reward themselves for their efforts.. And because of their efforts we have high quality and timely posts..

Mike Rivero has a great business model.. To encourage people to post great articles by allowing them to re-direct the traffic to their own sites.. The plan is working great.. White Hot posts from great websites making WRH the very best source of 'Truther News'

Alex2245, ActivistPost, PoliticalTheatrics, sabbah, johnu78, portos, suman,, My Catbird Seat

Sep 10 09:28

Facebook users 'are insecure, narcissistic and have low self-esteem'

Using Facebook is the online equivalent of staring at yourself in the mirror, according to a study.

Those who spent more time updating their profile on the social networking site were more likely to be narcissists, said researchers.

Facebook provides an ideal setting for narcissists to monitor their appearance and how many ‘friends’ they have, the study said, as it allows them to thrive on ‘shallow’ relationships while avoiding genuine warmth and empathy.

Sep 09 12:53

Website pulled on US church that wants to burn Korans

The small Florida church that has sparked global outrage with its plan to hold a Koran-burning event had its website pulled from the Internet on Thursday by its host.

Dan Goodgame, a spokesman for the San Antonio, Texas-based web hosting firm Rackspace, told AFP the evangelical Dove World Outreach Center church had, "violated the Offensive Content section of its Acceptable Use policy."

Sep 09 11:11

Foreign report: Israel has one of world's largest 'eavesdropping' intel bases

Israel has one of the largest signals intelligence (SIGINT) bases in the world in the western Negev, Le Monde Diplomatique reported. The base, near Kibbutz Urim, is central to the activities of the main Israel Defense Forces signals intelligence unit, 8200, the report says.

According to the report, the base has 30 antennas and satellite dishes of different sizes and types, capable of eavesdropping on telephone calls and accessing the e-mail of "governments, international organizations, foreign companies, political groups and individuals."

One of the base's main purposes is to listen to transmissions from ships passing in the Mediterranean, the report says. The base is also the center of intelligence activity that "taps underwater communication cables, mostly in the Mediterranean, connecting Israel with Europe."

Sep 09 09:37

NSA: U.S. Must Secure the Internet


According to National Security Agency (NSA) Director Gen. Keith Alexander, the United States federal government has the overarching duty and responsibility in securing the Internet to safeguard against cyber-criminal activities. Top military officials concurred with Alexander, but the government still has yet to provide details of how it intends to tackle Internet security issues. According to site Threat Post, Alexander "expressed confidence that the country's information security apparatus was up to the task, but acknowledged the difficulty of securing the Internet, a network that many security experts see as hopelessly broken and flawed by design."

Sep 08 15:06

5 Things That Are Being Automated That Probably Shouldn't Be

Trading stocks is a tedious, mass-number-crunching game. Why not make computers do it for you?
Because they will fuck it up.
Just a few months ago, on May 6, the Dow dropped about 1,000 points in minutes, which is usually about the kind of rate that kicks off something like the Great Depression. Stockbrokers barely had enough time to get their office windows open before the word spread that it was a false alarm.
The cause?

Sep 08 07:27

Traffic Jam

The Web has been hailed as the most measurable medium ever, and it lives up to the hype. The mistake was to assume that everyone measuring everything would produce clarity. On the contrary, clear media standards emerge where there’s a shortage of real data about audiences.

Sep 07 09:42

Cyber Warfare: US Military Hackers and Internet Spies

US gets ready to knock the world offline

Sep 06 08:54

U.S. and Israel spying behind BlackBerry woe: Dubai police

Concerns over Israeli access to BlackBerry data, and the use of the device by the United States to spy on the United Arab Emirates are behind the Gulf state's moves to curb the smartphone, Dubai's police chief said.

Sep 05 09:43

U.S. and Israel spying behind BlackBerry woe: Dubai police

"The Unites States is the primary beneficiary of having no controls over the BlackBerry, as it has an interest to spy on the UAE," Dhahi Khalfan Tamim said in remarks carried by the website of the daily al-Khaleej on Friday.

"The West has accused us of curbing the liberties of BlackBerry users, while America, Israel, Britain and other countries are allowed access to all transferred data," Tamim added.

Sep 05 07:18

Kinect's Israeli partner sees a remoteless world

TEL AVIV, Israel (AP) -- Inon Beracha envisions a world where your movements control the gadgets and devices around you. There's no remote control to lose, no buttons to push. The air conditioner senses your presence and changes the temperature to your liking.

Controlling your surroundings with the wave of a hand sounds like magic, but Beracha's company, PrimeSense, is already making headway, thanks to a little help from video games.

Sep 04 10:02

Adult services censored on Craigslist

The section that usually reads "adult services" was replaced by the word "censored."

It was not immediately clear whether Craigslist removed the adult services and replaced them with the "censored" section that had a link that was not active. But for users who accessed the account outside the U.S., the erotic services link was still active.

Webmaster's Commentary: 

"Americans should not have sex. They should get their orgasms killing Israel's enemies!" -- Official White Horse Souse

Sep 04 09:47

Daily Paul / Michael Nystrom Sued by Righthaven LLC in Massive Blogger Copyright Shakedown

Righthaven's standard shakedown seems to go as follows: The firm goes trolling the web, looking for content that from the Las Vegas Review-Journal that has been reposted on other blogs or websites. Once it finds a match, it acquires the copyright from the Review-Journal, then - without first contacting the accused blogger / website owner - files a lawsuit in Nevada Federal court. The standard damages seem to be for $75,000 and forfeiture of the domain name to Righthaven. I assume that is what I am being sued for as well, though I have yet to see it.

Webmaster's Commentary: 

The financial realities of being a blogger being what they are, I cannot imagine that Righthaven LLC actually thinks they can make any money off of these lawsuits, and confiscation of the domain names adds a further indicator that this is simply a covert means to shut down dissent on the web by targeting the blogs which are exposing corruption. In an age of lies, telling the truth is a revolutionary act!

Now, I agree that simply copying an entire article into a site is not appropriate without permission of the copyright holder, but excerpting for the purpose of comment/criticism and linking to the original source are as of this writing still considered fair use.

That being said, Righthaven LLC has a clear financial motive to join blogs that allow member posts to plant entire stores for the express purpose of creating an opportunity for litigation (much as the Canadian Human Rights Council was caught doing), and indeed I have had to kick a few members off of this website who refused to quit posting entire articles without permissions.

This is an attack on free speech using the copyright laws as a weapon of tyranny. At some point the blogs will have to go underground, and we should be prepared to do so.

Sep 03 07:17


Webmaster's Commentary: 

A rather unique music video, best viewed in Google Chrome

Aug 31 22:30

Full-Body Scanners Installed at Lindbergh Field

Workers at Lindbergh Field have begun installing the full-body scanners inside Terminal One.

The scanners, which are being placed in 11 airports across the country by the end of the year, are funded by the American Recovery and Reinvestment Act.

Transportation officials will be demonstrating the technology in San Diego on Tuesday….

Aug 31 17:15

Instructions for installing WRH iPhone app (beta 0.3)!

Webmaster's Commentary: 

Podcasts fixed in this version