COMPUTERS/INTERNET/SECURITY | WHAT REALLY HAPPENED

COMPUTERS/INTERNET/SECURITY

Mar 26 09:22

WIKILEAKS - Petreus Snuff Film leads to Keystone Kops Harrasment in Iceland

WikiLeaks is currently under an aggressive US and Icelandic surveillance operation. Following/photographing/filming/detaining.

If anything happens to us, you know why: it is our Apr 5 film. And you know who is responsible.

Two under State Dep diplomatic cover followed our editor from Iceland to http://skup.no on Thursday.

One related person was detained for 22 hours. Computer's seized.That's http://www.skup.no

We have been shown secret photos of our production meetings and been asked specific questions during detention related to the airstrike.

We have airline records of the State Dep/CIA tails. Don't think you can get away with it. You cannot. This is WikiLeaks.

Mar 26 09:06

U.S. must stop spying on WikiLeaks

Over the last few years, WikiLeaks has been the subject of hostile acts by security organizations. In the developing world, these range from the appalling assassination of two related human rights lawyers in Nairobi last March (an armed attack on my compound there in 2007 is still unattributed) to an unsuccessful mass attack by Chinese computers on our servers in Stockholm, after we published photos of murders in Tibet. In the West this has ranged from the overt, the head of Germany's foreign intelligence service, the BND, threatening to prosecute us unless we removed a report on CIA activity in Kosovo, to the covert, to an ambush by a "James Bond" character in a Luxembourg car park, an event that ended with a mere "we think it would be in your interest to...".

Mar 25 21:10

Hacker gets 20 years for stealing credit card data

A computer hacker from Miami who orchestrated one of the largest theft of credit and debit card numbers in U.S. history was sentenced Thursday to 20 years in prison after he apologized for leading a scheme that cost companies, banks and insurers nearly $200 million.

Webmaster's Commentary: 

One down ...

Mar 25 09:54

FLASHBACK - Israel recruits 'army of bloggers' to combat anti-Zionist Web sites

The Immigrant Absorption Ministry announced on Sunday it was setting up an "army of bloggers," to be made up of Israelis who speak a second language, to represent Israel in "anti-Zionist blogs" in English, French, Spanish and German.

Mar 25 07:16

Malware delivered by Yahoo, Fox, Google ads

Malware that exploits holes in popular applications is being delivered by big ad delivery platforms including those run by Yahoo, Fox, and Google, according to Prague-based antivirus firm Avast.

Viruses and other malware were found to be lurking in ads last year on high-profile sites like The New York Times and conservative news aggregator Drudge Report.com, and this year on Drudge, TechCrunch and WhitePages.com. The practice has been dubbed "malvertising."

Mar 24 21:23

The REAL reason Google is leaving China

Given that Facebook, Twitter and YouTube have no access to the Chinese Internet market, the White House believes that Google alone cannot play a large role in China as it did in Georgia and Iran.

Mar 24 10:48

Truth Has Fallen and Taken Liberty With It

There was a time when the pen was mightier than the sword. That was a time when people believed in truth and regarded truth as an independent power and not as an auxiliary for government, class, race, ideological, personal, or financial interest.

Today Americans are ruled by propaganda. Americans have little regard for truth, little access to it, and little ability to recognize it.

Truth is an unwelcome entity. It is disturbing. It is off limits. Those who speak it run the risk of being branded “anti-American,” “anti-semite” or “conspiracy theorist.”

Truth is an inconvenience for government and for the interest groups whose campaign contributions control government.

Truth is an inconvenience for prosecutors who want convictions, not the discovery of innocence or guilt.

Mar 23 09:47

Six Delusions of Google's Arrogant Leaders

Google's CEO went to Abu Dhabi this week and preached. He sermonized about Google's exceptional virtue — its indifference to profit and supreme trustworthiness. His speech should have been shocking. Except that delusional self-righteousness is now routine at Google

Mar 22 23:33

Internet tops TV viewing in Canada: Ipsos poll

For the first time ever, Canadians are spending more time surfing the web than they are watching television, a new poll shows.

Webmaster's Commentary: 
Mar 22 07:12

Dodgy BitDefender update bricks systems

A dodgy update from BitDefender on Saturday bricked Win 64-Bit systems after it was applied.

Rogue signature updates meant that multiple Windows and BullGuard files were falsely flagged as infected with a Trojan (now identified as Trojan-FakeAlert-5) and quarantined. Affected systems were subsequently left with applications that wouldn't work on boxes that were incapable of successfully rebooting.

The ropey update was available for around three and half hours before it was pulled. BitDefender has apologised for the snafu and issued advice on restoring borked systems.

Mar 22 06:42

US Forest Service admits putting surveillance cameras on public lands

Last month, Herman Jacob took his daughter and her friend camping in the Francis Marion National Forest. While poking around for some firewood, Jacob noticed a wire. He pulled on it and followed it to a video camera and antenna.

The camera didn't have any markings identifying its owner, so Jacob took it home and called law enforcement agencies to find out if it was theirs, all the while wondering why someone would station a video camera in an isolated clearing in the woods.

He eventually received a call from Mark Heitzman of the U.S. Forest Service.

In a stiff voice, Heitzman ordered Jacob to turn it back over to his agency, explaining that it had been set up to monitor "illicit activities." Jacob returned the camera but felt uneasy.

Mar 21 09:09

How a lawsuit over school laptops evolved

Now a law firm and forensics experts are trying to count how many times the software was activated - and figure out if it was ever used to spy on students instead of tracking missing computers.

Webmaster's Commentary: 

We know this was the case. The camera was activated on a laptop NOT reported stolen or missing. Therefore the camera was being used to spy in the kid. The issue came to light because whoever was using the camera to spy on the student (in the privacy of his own room) mistook come candy for illegal drugs and showed a captured image to the student's parents, who initiated the lawsuit.

Mar 19 09:47

ANOTHER FACEBOOK GROUP - THE AMERICAN TAX REVOLT/IMPEACHMENT TEA PARTY

Webmaster's Commentary: 

Be careful what you say in these groups. By now they are probably filled with all kinds of government informants.

Mar 19 08:44

Data mining project benefits investigators, scares privacy experts

It's a project that worries privacy-rights advocates and other critics. They wonder if Asher's real reason for donating some of his technology to government agencies is to get access to confidential data like firearms registries, tax information, even health records — information that could be a boon to businesses and an unprecedented intrusion into the lives of millions of Americans.

"He wants to have every scrap of personal data that he can acquire on any and everybody,'' says Marion Hammer, a past president of the National Rifle Association. "I know that he has people working to find ways to get data from state agencies and of course there is data that we would never want him to get his hands on.''

Webmaster's Commentary: 

So, once again, "protecting the children" becomes the justification for further intrusion into o0ur private lives.

Now, I am all for protecting children, but this system of data mining has no more to do with protecting children than "Cap and Trade" has to do with the environment or Obamacare has to do with your health.

Mar 19 08:37

Colorado Springs man allegedly sabotaged TSA computers

A former employee of the Transportation Security Administration has been indicted by the Denver federal grand jury for attempting to sabotage TSA computers that enable TSA airport personnel to spot potential terrorists before they board airliners.

Mar 19 07:48

Siemens Plans 4,200 Layoffs from IT Division

Engineering and industrial-technology conglomerate Siemens announced March 18 it will lay off 4,200 employees in the IT division, in what some news sources are claiming is preparation for an IT division spinoff. Siemens said it plans to invest $500 million euros in SIS, its IT solutions and services business, by 2012.

Webmaster's Commentary: 

I guess we know the reason for that recent corporate image ad campaign!

Mar 18 11:16

Texas Man Accused of Disabling 100 Cars Over Internet

A man fired from a Texas auto dealership used an Internet service to remotely disable ignitions and set off car horns of more than 100 vehicles sold at his old workplace, police said Wednesday.

The Texas Auto Center dealership in Austin installs GPS devices that can prevent cars from starting. The system is used to repossess cars when buyers are overdue on payments, said Jeremy Norton, a controller at the dealership where Ramos-Lopez worked. Car horns can be activated when repo agents go to collect vehicles and believe the owners are hiding them.

Webmaster's Commentary: 

I'll bet you didn't know your car could be sabotaged over the internet, did you?

Mar 18 11:10

Defacing Facebook: A Security Case Study PDF

This paper describes Facebook’s security mechanisms and presents a cross-site scripting vulnerability in Facebook Markup Language that allows arbitrary JavaScript to be added to application users’ profiles. The profile in the code can then defeat their anti-
request forging security measures and hijack the sessions of viewers.

Mar 18 11:07

Emergency Internet control bill gets a rewrite

During a closed-door meeting on Capitol Hill on Wednesday attended by about a dozen industry representatives, CNET has learned, Rockefeller's staff pitched a revised version of his controversial cybersecurity legislation.

It says that after the president chooses to "declare a cybersecurity emergency," he can activate a "response and restoration plan" involving networks owned and operated by the private sector. In an attempt to limit criticism, instead of spelling out the plan's details, the latest draft simply says that it must be developed by the White House in advance.

Webmaster's Commentary: 

Folks, when the US Government does shut down the alternative media, then it really will be time to start (as Claire Wolfe put it) shooting the bastards!

Mar 18 10:52

Narus' New Scary Data Mining Tool Will Know Too Much, Sooner Than You Think

And remember, this is just what they are willing to TELL you...

Narus is best known as the creator of NarusInsight, an network monitoring device that... AT&T allegedly used... to wiretap customer data... Hone works in tandem with NarusInsight... it can do some pretty “scary” things.... analyze VOIP conversations, biometrically identify someone’s voice or photograph and then associate it with different phone numbers....

It uses artificial intelligence to analyze e-mails and can link mails to different accounts... sift through millions of profiles searching for... statistically likely matches... Another component can trace the location of someone using a mobile device such as a laptop or phone.

This, they say, is a year away. Really?

Mar 18 10:34

Password-stealing virus targets Facebook

Hackers have flooded the Internet with virus-tainted spam that targets Facebook's estimated 400 million users in an effort to steal banking passwords and other sensitive information. According to anti-virus software maker McAfee, the emails tell recipients the passwords on their Facebook accounts have been reset, urging them to click on an attachment to obtain new login credentials. If the attachment is opened, it downloads several types of malicious software, including a program that steals passwords. Hackers have long targeted Facebook users, sending them tainted messages via the social networking company's internal email system.

Mar 18 09:01

Madoff Computer Programmers Indicted: Jerome O’Hara, George Perez Rigged Computer, Feds Say

Two former employees accused of helping fraudulent Wall Street financier Bernard Madoff (MAY’-dawf) program an old computer to generate false records have been indicted. Wednesday’s indictment accuses computer programmers Jerome O’Hara and George Perez of conspiracy, falsifying records of a broker dealer and falsifying records of an investment adviser.

Webmaster's Commentary: 

How come they haven't indicted the computer programmers who rigged the CRU's computer codes to show a "hockey stick?"

Mar 18 07:41

EFF Posts Documents Detailing U.S. Law Enforcement Collection of Data From Social Media Sites

The Justice Department released a presentation entitled “Obtaining and Using Evidence from Social Networking Sites.” The slides, which were prepared by two lawyers from the agency’s Computer Crime and Intellectual Property Section, detail several social media companies’ data retention practices and responses to law enforcement requests. The presentation notes that Facebook was “often cooperative with emergency requests” while complaining about Twitter’s short data retention policies and refusal to preserve data without legal process. The presentation also touches on use of social media for undercover operations.

Mar 18 05:34

Dreidel-Club Power Drive

We talked at length about the subject of the “new media” and the growing influence and power of social media within society. See your Who Rules America, Web-based 2.0 transcript for more on that. Big news today across the country was that last week Facebook surpassed Google as the most visited website in the United States...

Mar 17 13:02

Undercover Feds on Social Networking Sites Raise Questions

The next time someone tries to “friend” you on Facebook, it may turn out to be an undercover fed looking to examine your private messages and photos, or surveil your friends and family. The Electronic Frontier Foundation has obtained an internal Justice Department document that describes what law enforcement is doing on social networking sites.

The 33-page document shows that law enforcement agents from local police to the FBI and Secret Service have been logging on to MySpace and other sites undercover to communicate with suspects, read private postings and view photos and videos that are restricted to a user’s friends.

Mar 17 11:01

Huffington Post's Ventura Censorship Backfires

Did you know that Adam Lambert has a bulge in his crotch? Were you aware that the world's shortest man recently died? Are you informed enough to know that Jessica Simpson says men are "undressing her with their eyes"?

Sorry, let me rephrase all that: Do you give a shit about any of that retarded "news"? I sure as hell don't, but these were among the many absurd storys I found on the front page of a tabloid called the Huffington Post.

Mar 17 10:45

Lords pass controversial internet piracy bill

Legislation to tackle internet piracy, including bans for illegal file-sharers, has been passed by the Lords.

The Digital Economy Bill is now expected to be rushed through the Commons before the general election.

Peers had earlier rejected a bid by ministers to include wide-ranging powers over future online piracy law.

But despite criticism, the government said it was still committed to giving courts the power to block websites which are infringing copyright.

The bill, put forward by Business Secretary Lord Mandelson, has been welcomed by the music industry because it includes plans to suspend the internet accounts of people who persistently download material illegally.

Mar 17 09:24

CYBER WARS ~~ ‘PRINCES LEAH’ IS A FRAUD

There can be much glass strewn along the path of activists. This is why integrity counts a lot. This is why most activists take the risks of being who they are, though it would be easier to just be a shadow or a pen-name: because they know that there is no integrity in anonymity and operating under their own names will cause them some grief, but it has the power of honesty behind it. In anonymity one can say or do anything. One can even change their identity when they want to, when the “game gets boring” or make a series of identities to “spice things up” or when they need to attempt a new tactic or especially engage in unethical behaviour.

Mar 17 09:02

Bloggers battle corruption in Russia

Russians typically shrug their shoulders at the lavish lifestyles of government officials, assuming nothing can be done about bureaucrats who take bribes and pocket state funds.

But when Russia's interior ministry announced plans to buy a golden bed, it raised an outcry -- and revealed the potential of the Internet for stirring up outrage against entrenched corruption.

Webmaster's Commentary: 

Americans shrug their shoulders at the lavish lifestyles of government officials, assuming nothing can be done about bureaucrats who take bribes and pocket state funds.

... for the moment.

Mar 16 19:00

Lords pass controversial internet piracy bill

Legislation to tackle internet piracy, including bans for illegal file-sharers, has been passed by the Lords.

The Digital Economy Bill is now expected to be rushed through the Commons before the general election.

Mar 16 08:20

US Army considered attack on Wikileaks

It is claimed that leaked documents show the US Army felt sufficiently threatened by security breaches on Wikileaks that it considered ways it might wreck the site.

A 2008 report by the Army Counterintelligence Center, classified Secret, calls for a mole hunt and prosecutions to undermine potential sources' trust in Wikileaks.

Mar 16 08:01

Shameful Anti-Free Speech Lobby Labels Questioning Government “Hate”

Shameful Zionist propaganda lobby group The Simon Wiesenthal Center has issued a report which smears people who question government as racists and terrorists, labeling conspiracy theories “hate” in the latest crusade against free speech on the Internet.

...

In reality, the only peddlers of “hate” are the Simon Wiesenthal Center itself. Their latest report is yet another salvo in the long-standing agenda to silence what they characterize as “conspiracy theories,” but what in fact constitute legitimate criticism of the abuses committed by Israel against Palestinians.

Mar 15 11:47

U.S. Intelligence Planned to Destroy WikiLeaks

“The possibility that current employees or moles within DoD or elsewhere in the U.S. government are providing sensitive or classified information to Wikileaks.org cannot be ruled out”. It concocts a plan to fatally marginalize the organization. Since WikiLeaks uses “trust as a center of gravity by protecting the anonymity and identity of the insiders, leakers or whisteblowers”, the report recommends “The identification, exposure, termination of employment, criminal prosecution, legal action against current or former insiders, leakers, or whistlblowers could potentially damage or destroy this center of gravity and deter others considering similar actions from using the Wikileaks.org Web site”.

Mar 12 12:08

Airline Stops Video Chat Because You 'Could Communicate With a Terrorist'

Other in-flight wifi uses were OK, since terrorist don't tweet or email.

Mar 12 07:52

Elvis Presley’s Ultra-Secure, 2008 Passport?

Elvis died in 1977.

But that didn’t prevent hackers from inserting his digital photo into a U.K. passport, and using it at a self-service passport machine at Amsterdam’s Schiphol airport to gain clearance to board a plane.

Mar 11 17:20

Internet helped Flight 253 suspect radicalize, attack plane 'within weeks'

The Internet allowed extremists to contact, recruit, train and equip the suspect responsible for the attempted Flight 253 bombing on Christmas Day "within weeks," a top Pentagon official told lawmakers Wednesday.

That relatively brief timeframe only speaks to how quickly extremist groups have "optimized" the Web and developed a "highly evolved" process by which to develop terrorist networks, added Garry Reid, deputy assistant secretary of Defense for Special Operations and Combating Terrorism.

Webmaster's Commentary: 

Yeah, like it is possible to talk some random stranger into a suicide mission over the net.

Sheesh.

Mar 11 14:29

FINI BACKS INTERNET'S NOBEL PRIZE BID

House Speaker Gianfranco Fini on Thursday threw his weight behind an initiative launched by an Italian tech magazine to award the Internet with this year's Nobel Peace Prize.

Webmaster's Commentary: 

We seem to be the only entity actually interested in peace!

Mar 11 10:01

Cell-All: Super Smartphones Sniff Out Suspicious Substances

The Cell-All initiative may be one such savior. Spearheaded by the Department of Homeland Security’s Science and Technology Directorate (S&T), Cell-All aims to equip your cell phone with a sensor capable of detecting deadly chemicals at minimal cost—to the manufacturer (a buck a sensor) and to your phone’s battery life. “Our goal is to create a lightweight, cost-effective, power-efficient solution,” says Stephen Dennis, Cell-All’s program manager.

Webmaster's Commentary: 

Between the chemicals in really cheap cosmetics and methane from body, ummm, "venting" I predict ten million false positives a day on this system.

Mar 11 09:12

Operation Titstorm – Anonymous declares war on Australian Censorship

From The New Zealand Herald

.... “Operation Titstorm”, part of an assault targeting a range of government servers.... launched by hackers aligned with an internet protest group known as Anonymous.... Although the Australian government knew about the planned assault last Friday, it was powerless to prevent it.... The federal government plans to introduce a mandatory filtering system by early 2011 that would block a list of banned websites... some pornographic films are being rejected by censors because they feature women with small breasts who could be confused with under-age girls. Anonymous said in an email: “No government should have the right to refuse its citizens access to information solely because they perceive it to be ‘unwanted’.”

Polls have found that the Australian public strongly supports the planned restrictions.

The flyer through which Anonymous published the event states "emails/faxes should focus on small-breasted porn, cartoon porn, and female ejaculation, the 3 types banned so far" - even if you buy the implied assumption that 'small breasted porn's women's only attraction lies in their resemblence to children,' this does not explain why female ejaculation is on the list....

Mar 11 09:03

Facebook pushing 'Suicide Machine' into an open-source afterlife

"Web 2.0 Suicide Machine" is no more - at least as we have come to know it - and at least for now.

When last we checked in on the Suicide Machine back in January, it was merrily assisting soon-to-be-former members of Facebook, Twitter, MySpace and LinkedIn to automatically, speedily -- and ceremoniously -- eliminate the "friends" they had accumulated using those services. More than 3,000 people had bid a virtual farewell to some quarter of a million accumulated acquaintances.

Webmaster's Commentary: 

As a side note, I thin that social networking sites have had their day. Overall volume of traffic on the social network sites I use is clearly dropping, and I think the reason is that computers allow you to be very selective about what you are looking at, but social networks after a while are like being back in the real world, in a room full of people all yammering away whether you want to pay attention or not.

I find it rather amazing that the operators of the social networking sites are willing to go to such extremes to prevent people from leaving as freely as they joined.

Mar 11 08:38

New Zealand's internet filter goes live

The Department of Internal Affairs' (DIA) internet filter is now operational and is being used by internet providers (ISPs) Maxnet and Watchdog.

Thomas Beagle, spokesperson for online freedom lobby Tech Liberty says he's "very disappointed that the filter is now running, it's a sad day for the New Zealand internet".

Mar 11 08:19

Cryptome Rocks What's Left Of the Free World

The transcript of recent emails regarding Paypal's shutting down Cryptome's account make for VERY INTERESTING READING (links for further research at source):

From a phone call with PayPal

Mar 11 08:01

Former TSA analyst charged with computer tampering

A U.S. Transport Security Administration analyst has been indicted with tampering with databases used by the TSA to identify possible terrorists who may be trying to fly in the U.S.

Douglas James Duchak, 46, was indicted by a grand jury Wednesday with two counts of damaging protected computers. According to a federal indictment, Duchak tried to compromise computers at the TSA's Colorado Springs Operations Center (CSOC) on Oct. 22, 2009, seven days after he'd being given two weeks notice that he was being dismissed. He was also charged with tampering with a TSA server that contained data from the U.S. Marshal's Service Warrant Information Network.

n/a
Mar 10 12:01

Just How Fast Is Cisco’s New Router? Really Freaking Fast!

That’s fast.

You could also use speed like that to download the entire Library of Congress in about a second, fill up your iTunes library with over 4 billion MP3 files in about a minute, or download every movie ever made in 4 minutes, SVI says.


Now we´re talking speed.

Mar 10 08:58

U.S. Spies Want to Find Terrorists in World of Warcraft

Be careful who you frag. Having eliminated all terrorism in the real world, the U.S. intelligence community is working to develop software that will detect violent extremists infiltrating World of Warcraft and other massive multiplayer games, according to a data-mining report from the Director of National Intelligence.

Webmaster's Commentary: 

Are you @#$%ing kidding me?

The DHS people are so desperate to find terrorists (real ones, not the CIA and Mossad phonies) that they are now spending YOUR tax dollars to search for people merely PLAYING terrorist in computer games?!?!?

Mar 10 08:06

Hackers target freshly uncovered Internet Explorer hole

Microsoft on Tuesday warned that hackers are targeting a freshly-uncovered weakness in some earlier versions of its Internet Explorer (IE) Web browser software.

Microsoft said it is investigating a hole that cyber attackers are taking advantage of in IE 6 and IE 7.

Mar 09 19:35

Patients' medical records go online without consent

Patients’ confidential medical records are being placed on a controversial NHS database without their knowledge, doctors’ leaders have warned.

Those who do not wish to have their details on the £11 billion computer system are supposed to be able to opt out by informing health authorities.

But doctors have accused the Government of rushing the project through, meaning that patients have had their details uploaded to the database before they have had a chance to object.

Mar 09 12:58

Senate Staffers Warned to Stay Clear of Drudge Report

The Senate's official gatekeeper, said the Drudge Report, a conservative news aggregator, and whitepages.com "are responsible for the many viruses popping up throughout the Senate," according to an e-mail to the Environment and Public Works Committee.

Mar 09 12:45

Bogus Web site tries to swindle Madoff victims -- again!

Talk about adding insult to injury.

A bogus Web site is targeting victims of Bernard Madoff's record Ponzi scheme in an apparent identity-theft scam, the Securities Investor Protection Corp warned today.

The site claims that $1.3 billion in Madoff money was recently found hidden in Malaysia, and displays photos of huge stacks of cash allegedly stashed by the mega-crook.

The so-called "International Securities Investor Protection Corporation" urges burned investors to submit claims by filling out an online form and mailing in a copy of "your most recent brokerage account statement."

Mar 09 11:54

Citibank exposes 600,000 customers' Social Security numbers

n/a

n/a
Mar 09 08:24

On Memories and Memory Cards

My memory cards readers are systematically short-circuited every two or three weeks; I even took one of them to be checked out at an electronic laboratory, and they found out what I have suspected. Nobody else in the internet kiosks where I work experiences this problem. The shops selling the readers claim (and I believe them) the readers are reliable. Moreover, the events are strangely coordinated with certain articles I publish or emails I send. Remarkable such occasions were after the email described in the Skype article and yesterday, after I published the “Who is a Jew?” article. I have no doubt these are intentional attacks – in the category of harassment – perpetrated by Israel. Yet, I cannot complain on them since they would be classified as “circumstantial.”

Mar 08 10:53

iPad: Perfectly flawed

Webmaster's Commentary: 

I see I wasn't the only one to think this is an iFlop!

Mar 08 08:13

On Iran, Skype and a Fallen Prince

He claimed having be contacted by his relatives and threatened to be cut his allowance if he didn’t cooperate by making this call to me. Then he informed me that Arik’s website was taken off-line. I checked out that immediately and found this information correct. It was clear his claim of being blackmailed by people cooperating with Israel was true. It was also clear that Skype was collaborating with the American politician and the security services.

n/a
Mar 08 01:13

Privacy International: UK's new ISP interception plans will be illegal

Media Release from Privacy International.

It has been reported in the press that Virgin Media is planning to deploy the trials across 40% of its customer base without either obtaining a warrant or seeking the consent of all parties involved in the communications.

Mar 07 14:34

PROOF OF ORGANIZED ONLINE ADAM GADAHN PROPAGANDA CAMPAIGN

Webmaster's Commentary: 

Take a close look at this screen capture from Twitter. Note the exact same tweets being posted over and over again using multiple identities, with photos that look like they were clipped from the ads of dating services.

We saw this exact same pattern during the failed coup plot against Iran last year.

This proves that the flood of tweets about Adam Gadahn's arrest is a staged propaganda event. He is being promoted as this major terror arrest even though the reality is that he has done nothing at all except pose for video cameras!

UPDATE: Whatever was being planned with "Emmanuel Gadahn" appears to have collapsed. The Pakistanis are now saying that the man they arrested is not Adam Gadahn (Pearlman), leaving CNN and the rest of the news networks to clean the egg off of their faces following the constant pounding about "American Al Qaeda" (nudge nudge wink wink). Given the earlier certitude, a genuine mistake seems unlikely. Given the obvious propaganda push, I think that whatever was being planned had the plug pulled.

Mar 06 12:07

Spanish police arrest ringleaders who infected 13m PCs with credit-card stealing virus

Spanish police have arrested three men accused of masterminding one of the biggest computer crimes to date, which created a network of 13million virus-infected computers.

Good

Mar 06 08:20

Digital economy bill likely to be pushed through before election

The digital economy bill will become law before Parliament is dissolved at the beginning of April ahead of a likely general election in May, senior media industry figures believe.

That will usher in controversial laws enabling rights owners to cut off or restrict internet access for users who download films and music illegally.

The bill contains measures designed to combat piracy. If it becomes law it will compel internet service providers including Carphone Warehouse and Virgin Media to pass on information about persistent offenders to rights holders.

Mar 05 13:01

Microsoft Turns Evil: Pitches Web-Use Tax for Security

A top Microsoft executive on Tuesday suggested a broad Internet tax to help defray the costs associated with computer security breaches and vast Internet attacks, according to The Hill.

Mar 05 09:33

“FARC” computers go back to the future!

Interpol’s Report Confirms that the Supposed FARC Computers Were Manipulated.

Mar 05 07:09

NVIDIA pulls 196.75 driver amid reports it's frying graphics cards

It would seem StarCraft II Beta players were among the first to notice low frame rates while using the latest drivers from NVIDIA, and further digging has uncovered that the automated fan-controlling part of said firmware was failing to act as intended. The result? Overheated chips, diminished performance, and in some extreme cases, death (of the GPU, we think the users will be okay). The totality of it is that you should avoid the 196.75 iteration like the plague, and NVIDIA has temporarily yanked the update while investigating the reported issues.

Mar 05 06:00

Details of “Einstein” Cyber Shield Disclosed by White House

The Obama administration lifted the veil Tuesday on a highly-secretive set of policies to defend the U.S. from cyber attacks.

It was an open secret that the National Security Agency was bolstering a Homeland Security program to detect and respond to cyber attacks on government systems, but a summary of that program declassified Tuesday provides more details of NSA’s role in a Homeland program known as Einstein.

Mar 04 10:41

Argos exposes customers' credit-card numbers in emails

High street retailer Argos has compromised its customers' security by sending their credit-card details - including the vital security code - in unencrypted emails.

The company has been including the customer's full name, address, credit-card number and three-digit CCV security code in order confirmation emails, which are sent once a customer has placed an order on the Argos website. Although the credit-card details don't appear in the text of the email itself, they are contained - in plain text - in the HTML code of the order confirmation.

Mar 04 08:05

Feds weigh expansion of Internet monitoring

Greater federal involvement in privately operated networks may spark privacy or surveillance concerns, not least because of the NSA's central involvement in the Bush administration's warrantless wiretapping scandal. Earlier reports have said that Einstein 3 has the ability to read the content of emails and other messages, and that AT&T has been asked to test the system. (The Obama administration says the "contents" of communications are not shared with the NSA.)

Webmaster's Commentary: 

And of course Obama keeps all his promises!

Mar 04 07:45

DNS Down

This site is dedicated to the proposition, that one day, DNS will NOT be available. Due to malicious hackers, UN intervention (so called "Net Neutrality" laws or treaties, "Internet Fairness Doctrines", or other MISmanagement interventions (content firewalls), or just plain old fashioned WAR, if the DNS system goes down, or your sites are blocked, even though the whole internet isn't, you're down...but maybe not. With a new twist on an old technology, you won't even feel a glitch. If you DOWNLOAD our products, you will have your own private DNS SERVER, which taken together, are impervious to DNS problems.

Webmaster's Commentary: 

The only problem with a local DNS is that it does not get automatic updates. If a website you know and love like WRH changes their IP (as we did a few weeks back) you will have to manually change the local hosts file.

But as a backup to a "terrorist" (nudge nudge) take-down of DNS, this might be handy to hang onto!

Mar 04 07:06

Microsoft: ISPs should quarantine infected PCs

Scott Charney, Microsoft's corporate vice president of trustworthy computing, said quarantining systems was the only effective way of dealing with the threat of botnets on consumer PCs.

Webmaster's Commentary: 

Oh? I thought firing squads for the botnet creators might work and cost a lot less!

Mar 03 18:54

FAA = I can't say it..

"An air traffic controller who brought his son to work let the youngster read a few routine messages to pilots — and then brought in another child the next day — in an incident that amused pilots but not the Federal Aviation Administration.

Authorities suspended the controller and a supervisor Wednesday after a recording of the radio calls was posted on the Internet, then reported by a Boston television station."

n/a
Mar 03 13:35

Determine whether your PC is part of a botnet

Mar 03 12:13

SECURITY ALERT: U. S. Census Scam

Webmaster's Commentary: 

Computer crooks are using the census in their phishing schemes!

Mar 03 12:09

Spanish police arrest masterminds of 'massive' botnet

Spanish police have arrested three men responsible for one of the world's biggest networks of virus-infected computers. All are Spanish citizens with no criminal records and limited hacking skills. It is estimated the so-called Mariposa botnet was made up of 13 million computers in 190 countries. It included PCs inside more than half of Fortune 1000 companies and more than 40 major banks.

Webmaster's Commentary: 

Waterboard his computer.

Make him watch!

Mar 03 10:07

HOW FACEBOOK SAVED A PALESTINIAN VILLAGE

The Israel Defense Forces called off a raid in Palestinian territory after a soldier posted details, including the time and place, on the social networking website Facebook, Army Radio reported on Wednesday.

The soldier – since relieved of combat duty – described in a status update how his unit planned a “clean-up” arrest raid in a West Bank area, Army Radio said.

Mar 03 06:28

Cyberwar Hype Intended to Destroy the Open Internet

He’s talking about changing the internet to make everything anyone does on the net traceable and geo-located so the National Security Agency can pinpoint users and their computers for retaliation if the U.S. government doesn’t like what’s written in an e-mail, what search terms were used, what movies were downloaded. Or the tech could be useful if a computer got hijacked without your knowledge and used as part of a botnet.

Webmaster's Commentary: 

What McConnell really means by "losing the cyberwar" is that the internet is now the high ground in the war for the truth, and the US Government and ABCNNBBCBS are losing their ability to lie the public into whatever the current agenda happens to be. The collapse of the Global Warming Cult underscored the collapse of trust in the government and corporate media, along with the inability to scare Americans into yet another war in Iran.

If they cannot lie to us, they cannot rule us.

THAT is what they are really losing on the internet!

Mar 03 05:28

Spying on Americans has become Big Business

Alex also talks with John Young, webmaster of Cryptome, a website that covers news on freedom of speech, cryptography, spying, and surveillance. The ISP Network Solutions shuttered Young's site earlier in the week after he posted a document summarizing Microsoft's dealings with law enforcement agencies.

Mar 02 13:33

Firefox Extension wars – NoScript vs. AdBlockPlus

One of the dirtiest secrets of the Internet is that it runs on ads for monetization. All of us who surf the web and use systems had lots and lots of free lunches because of advertisements being shown on web sites. The only difference to TV is that they are less obtrusive and you can choose to ignore or skip them (for now).

Self-righteous developers who do not quite grasp this dirty secret use all kind of tricks to remove adversiting from web sites they surf. This could be because of not wanting to support the corporate machine but also because of security reasons. Ad code on the internet is dire – it is built to support every possible imaginable environment and work around restrictions of setups – the ads need to show, no matter what.

Mar 02 08:48

US government rescinds 'leave internet alone' policy

The US government’s policy of leaving the Internet alone is over, according to Obama’s top official at the Department of Commerce.

Instead, an “Internet Policy 3.0” approach will see policy discussions between government agencies, foreign governments, and key Internet constituencies, according to Assistant Secretary Larry Strickling, with those discussions covering issues such as privacy, child protection, cybersecurity, copyright protection, and Internet governance.

The outcomes of such discussions will be “flexible” but may result in recommendations for legislation or regulation, Strickling said in a speech at the Media Institute in Washington this week.

Mar 02 08:38

'Free iPad' scam spreading on Facebook and Twitter, warns Sophos

It's a day for scams. Think you've been given the chance to sign up as an iPad tester via Facebook? No you haven't - it's a scam which actually signs you up to a premium rate mobile service, warns the security company Sophos.

"Facebook pages with names such as "iPad Researchers Wanted - Get An iPad Early And Keep It!" and "The Mega iPad Giveaway!" prey on the public's desire to own a free iPad," notes Sophos.

Mar 02 08:25

Topeka, Kansas shows Google it can grovel

All that what missing was a promotional video of Dorothy Gale clicking her ruby slippers and whispering, "There's no place like Google; there's no place like Google ..."

Webmaster's Commentary: 

I would appreciate Google a lot more if they followed the crawl-delay directive in the robots.txt file!

Mar 02 08:15

Germany’s Top Court Overturns Anti-Terrorism Data Law

Germany’s highest court overturned a two-year-old anti-terrorism law that requires telecommunications providers such as Deutsche Telekom AG to store Internet and phone data for six months, saying the rules violate privacy.

n/a
Mar 02 06:33

UK to kill off Internet cafes

THE GLORIOUS BRITISH GOVERNMENT, upon which the sun finally set almost 100 years ago, has decided that having open WiFi networks is bad for the general population and it wants them all shut off.

Mar 01 17:44

TigerText can erase sent text messages. Is it really the 'perfect app for cheating'?

The app was released last week for the iPhone, and the company expects to roll out apps for Blackberry and Android in the next few weeks.

Mar 01 07:31

Facial recognition phone application described as a 'stalker's dream'

A prototype camera phone application that enables the user to find names and numbers of complete strangers has been labelled a 'stalker's dream'.

The application, called Recognizr, has been developed to find personal information through facial recognition software.

The user simply has to take a picture of a person and hit the 'Recognize' button.

The photo is then compared to shots on social networking sites including Facebook and Twitter before personal information, which can include phone numbers, addresses and email addresses, is sent to the user.

Feb 28 12:13

Australia censorship debate censored on Communications minister’s website

If you’re planning to censor free speech on the internet, what better approach to take than to, er, censor debate about how you’re planning to censor free speech on the internet? Brilliant.

Feb 28 12:12

THE TRUTH IS THERE FOR YOU TO SEE, BUT NOT NECESSARILY ON YOUTUBE

If it’s anti-zionist or anti-Israel, you can be sure it will be removed. That is how YouTube operates. After all, they themselves are controled by zionists so it seems natural for them to defend (by censorship) anything that is true about Israel today.

If it is pro Israel it is there to stay.

Feb 28 11:12

How mobile phones let spies see our every move

Government’s secret Celldar project will allow surveillance of anyone, at any time and anywhere there is a phone signal

n/a
Feb 27 09:58

Massive Twitter Phish Attack Hits Ministers, Banks

Micro-blogging giant Twitter was affected by a serious phishing attack which resulted in a flood of spam messages coming from hacked accounts, with most of them belonging to some high-profile UK cabinet ministers and a few banks.

It was reported that the Twitter accounts of British MP Ed Miliband, Secretary of State for Energy and Climate Change and the Labour Party Deputy Leader Harriet Harman were sending links to websites selling fake medicine after being compromised by the phishing attack.

Popular telephone banking service FirstDirect was also affected by the attack, which sent out links to suspicious websites that tricked the unsuspecting users into giving their Twitter log-in credentials.

n/a
Feb 26 15:42

The First Summit Of It's Kind: Bashar,Ahmedinejad & Nasrallah

Hezbollah Secretary General Sayyed Hasan Nasrallah, Iranian President Mahmoud Ahmadinejad and Syrian President Bachar Assad were finally united in one and only one picture

Feb 25 20:52

Senator Al Franken is Requesting User Caps on Internet Bandwidth

Google can’t make money delivering video content that costs them NOTHING over the net for free, what do you think will happen to internet rates when you REQUIRE NBCUniversal/Comcast to deliver content that costs millions of dollars per hour for free ?

Feb 25 13:44

www.cryptome.org is alive and well!

We would like to notify you that Microsoft has contacted us regarding www.cryptome.org. Microsoft has withdrawn their DMCA complaint. As a result www.cryptome.org has been reactivated and this matter has been closed. Please allow time for the reactivation to propagate throughout the various servers around the world.

Feb 25 13:23

Microsoft downs site after top-secret guide published

The noted government whistleblowing website Cryptome has been taken down after Microsoft saw red over its publication of a top-secret Internet surveillance guide normally shown only to law enforcement agencies.

The 22-page Global Criminal Compliance Handbook contains a reasonably detailed rundown on the information gathered by Microsoft from its various Windows Live operations, including Hotmail, Messenger, MSN Groups, and even the gaming platform, Xbox Live. The guide explains the information that is retained by Microsoft from customer activities, for how long it is saved, and how it can be accessed by police and security services in accordance with US legal requirements.

Feb 25 10:06

Cell phones show human movement predictable 93% of the time

We'd like to think of ourselves as dynamic, unpredictable individuals, but according to new research, that's not the case at all. In a study published in last week's Science, researchers looked at customer location data culled from cellular service providers. By looking at how customers moved around, the authors of the study found that it may be possible to predict human movement patterns and location up to 93 percent of the time. These findings may be useful in multiple fields, including city planning, mobile communication resource management, and anticipating the spread of viruses.

Webmaster's Commentary: 

These findings are also useful in confirming that you are indeed being tracked with your cell phone.

As for the findings, that is hardly surprising. Most of us spend our entire lives shuffling between our slave pit, our pen, and the shopping mall.

SHARE THIS ARTICLE WITH YOUR SOCIAL MEDIA