COMPUTERS/INTERNET/SECURITY | WHAT REALLY HAPPENED


COMPUTERS/INTERNET/SECURITY

Feb 29 07:21

Google screening missed hundreds of malicious Android apps, researchers say

Malicious apps that have breached Google's defences and made it onto the Play store have netted 1.2 million victims, often hijacking phones to place fraudulent clicks on pornography sites.

ESET researcher Peter Stancik says his team found some 343 malicious Android applications that were uploaded to the official Google Play store since August.

Feb 29 07:20

Reinvented ransomware shifts from pwning PC to wrecking websites

A new ransomware variant appears to be ripping through WordPress sites encrypting data and demanding a payment of half a bitcoin to release files.

The website variant of CTB Locker is encrypting all files on WordPress-powered sites and replacing the index.php with a file that displays instructions for paying the ransom.

It even sports a chat room support feature where verified victims can exchange words with ransomware scum.

Feb 28 17:32

Google Unveils Neural Network with “Superhuman” Ability to Determine the Location of Almost Any Image

Here’s a tricky task. Pick a photograph from the Web at random. Now try to work out where it was taken using only the image itself. If the image shows a famous building or landmark, such as the Eiffel Tower or Niagara Falls, the task is straightforward. But the job becomes significantly harder when the image lacks specific location cues or is taken indoors or shows a pet or food or some other detail.

n/a

n/a
Feb 28 08:25

Hackers took over California hospital, demanded millions in ransom money to restore digital files

In dystopian views of human society, there's always a fear of losing control. Computers and robots are already everywhere, taking care of what used to be the responsibility of humans. In the hands of the right individuals, they can be made to serve a different purpose, one that doesn't necessarily follow the greater good, but rather the agenda of a small group of individuals. The future is now.

On February 5, something similar happened to a Californian hospital. The computerized systems of Hollywood Presbyterian Medical Center were suddenly frozen by a software demanding payment in order to give the administrators control of their own system. For more than a week, the institution could not perform CT scans, deliver chemotherapy treatment or deal with emergency cases. Employees were keeping up with the work through fax machines, pens, papers and calls from their personal phones. This is what happens when you fully relinquish control.

Webmaster's Commentary: 

And the NSA/FBI/CIA could not do a thing about it, could they? But by golly they want to make sure they can spy on you law-abiding citizens whenever they feel like it!

Feb 28 08:24

State Dept. releases 800 new Clinton emails

State Department officials released roughly 800 of Hillary Clinton's private emails Friday evening, just hours before the South Carolina Democratic primaries begin.

The 1,500 pages of emails in the latest batch did not contain any "top secret" emails, an agency spokesman said. The State Department withheld 22 emails from a trove of emails made public earlier this year because they included "top secret" information.

n/a

n/a

n/a
Feb 27 11:07

About 80,000 Affected By Computer Hack At UC Berkeley

Police and FBI were notified of the attack, along with at-risk current and former employees, students and vendors.

BERKELEY, CA - Tens of thousands of current and former people affiliated with the University of California at Berkeley are being notified of a computer attack that poses a risk to their personal information, university officials said Friday.

The attack occurred in late December 2015 when one or more people gained access to computers that are part of the Berkeley Financial System. The system is used for purchasing and non-salary payments, such as student financial awards and work-related travel reimbursements, according to university officials.

Investigators completed compiling the names and contact information for those affected Thursday.

Webmaster addition: And just after Berkeley voted in favor of BDS!

Feb 27 10:21

IRS Says Cyberattacks on Taxpayer Accounts More Extensive Than Previously Reported

Tax data for about 700,000 households might have been stolen

Webmaster's Commentary: 

Well, that proves the hackers work for the government, or they would have changed those accounts to have huge refunds! :)

Feb 27 09:03

Medical superbugs: Two German hospitals hit with ransomware

Infection forces patients onto phones and medicos onto faxes

Feb 27 08:26

FBI vs. Apple: Fake Fight?

A few of the reports mention the "10-times you're out" problem, where the phone data is deleted automatically after 10 incorrect password attempts. Still, the FBI could clone the phone's memory and just use brute-force to make different attempts on cloned phones. It's just a 4-digit PIN, so there's only 10,000 different PINs to try. This means that they'd only have to make the clone 1000 times, though there's a 50% chance the PIN will be in the 1st half of the numbers attempted, so on average only 500 10-try attempts will be needed. Sure, making 1000 (or even just 500) phone memory clones and testing them is time-consuming, but it certainly can't take longer than the time to sue Apple all the way to the Supreme Court.

Feb 26 16:05

Showdown: Justice Department Escalates Against Apple

The US Justice Department escalated its standoff with Apple today, filing a motion to compel Apple to create software that would facilitate the Federal Government’s breaking the encryption of an iPhone in the possession of one of the San Bernardino shooters. Apple has argued that no one could depend on being secure from the prying eyes of government should it comply with the Federal government’s orders. Wrote Apple CEO Tim Cook, in a letter to customers this week, “in the wrong hands, this software – which does not exist today – would have the potential to unlock any iPhone in someone’s physical possession.”

Feb 26 13:33

NSA TO SIDESTEP PRIVACY PROTECTIONS IN SHARING AMERICANS’ INTERCEPTED DATA WITH U.S. SPY AGENCIES

The Obama administration is on the verge of permitting the National Security Agency to share more of the private communications it intercepts with other U.S. intelligence agencies without first applying any privacy protections to them, according to officials familiar with the deliberations. The change would relax longstanding restrictions on access to the contents of the phone calls and email the security agency vacuums up around the world, including bulk collection of satellite transmissions, communications between foreigners as they cross network switches in the United States, and messages acquired overseas or provided by allies.

Feb 26 13:26

GERMAN GOVERNMENT TO USE TROJAN SPYWARE TO MONITOR CITIZENS

A spokesman for the German interior ministry announced on Monday that the government had approved the usage of Trojans to monitor suspected citizens. The interior ministry spokesman defended the government's decision, saying "basically we now have the skills in an area where we did not have this kind of skill." The program was already endorsed by members of the government in autumn 2015, the ministry said. Trojans are software programs, also known as malware, specially designed to get into users' computers. They are often used by hackers and thieves to gain access to somebody else's data.
Share | Comment

Feb 26 08:00

Apple iPhone 7 concept: Crazy flexible widescreen display and curved edges shown off in video

Crazy concept videos for Apple's iPhone have been around for as long as the iPhone has existed, but this one might take the cake for being the most outrageously barmy.

This impossibly bizarre concept design for the iPhone 7 would bring advances in curved and flexible displays to a logical (or should that be illogical?) conclusion: a screen that could stretch out to the size of tablet with the click of a button. Marvel at the impossibly impractical creation below:

Webmaster's Commentary: 

If Apple caves into the government on privacy, I won't buy it. I am going back to two Dixie cups and a waxed string to talk to my wife! :)

Feb 26 06:41

Facebook slams staff for defacing ‘Black Lives Matter’

Facebook CEO Mark Zuckerberg has rebuked his own staff for crossing out "Black Lives Matter" slogans on the walls of the company HQ in Menlo Park, San Francisco.

On several occasions, employees had replaced the slogan with "all lives matter" on a large signature wall in which staff are encouraged to write comments, according to an NBC News report, prompting Zuckerberg to issue a company-wide memo.

Feb 25 21:19

Poisoned Mind: Social Media in the 21st Century

Waking Times

According to an article on the website of ‘Radio Free Europe’, a nondescript modern 4-storey building on Savushkina Street, St. Petersburg, houses the innocuously titled ‘Internet Research Centre’.

Feb 25 18:05

Windows 10 Users Start Seeing Full-Screen Ads As Screen Savers

Just because you don’t have to lay out money for software, that doesn’t necessarily make it “free.” In the last few days, users of Windows 10 have noticed full-screen ads on their lock screen if they happen to be using “Windows Spotlight” to put pretty pictures there. Fortunately, you can banish the ads from your screen, without even having to pay.

n/a
Feb 25 10:41

Brazil is building $250m-worth undersea cable linking directly Europe to avoid US espionage – Tech giants like Google, Facebook likely to support

Brazil is constructing a dedicated underwater cable to link the southern American country's internet directly with Europe and avoid any espionage attempts by the US. The structure, which is estimated to cost up to $250m (£180m), will come into operation in late 2017 and is likely to be supported by tech giants Google and Facebook.

Feb 25 10:11

Spy agencies say Clinton emails closely matched top secret documents: sources

U.S. spy agencies have told Congress that Hillary Clinton's home computer server contained some emails that should have been treated as "top secret" because their wording matched sections of some of the government's most highly classified documents, four sources familiar with the agency reports said.

The two reports are the first formal declarations by U.S. spy agencies detailing how they believe Clinton violated government rules when highly classified information in at least 22 email messages passed through her unsecured home server.

Webmaster's Commentary: 

In other words, Hillary copied sections of classified documents into non-secure documents on her non-secure server.

Feb 25 09:32

Apple CEO Tim Cook claims FBI wants him to develop the 'software equivalent of CANCER' to unlock San Bernardino shooter's iPhone

Apple chief Tim Cook says the FBI is asking him to develop 'the software equivalent of cancer' in order to hack an iPhone belonging to one of the San Bernardino shooters.

'The only way to get information (...) would be to write a piece of software that we view as sort of the equivalent of cancer,' Cook told ABC News on Tuesday in his first interview since the court order came down last week.

'We think it's bad news to write. We would never write it. We have never written it - and that is what is at stake here. We believe that is a very dangerous operating system.'

Feb 25 09:01

Italy Summons US Envoy Over NSA Spying Reports

Italy has summoned the US ambassador to Rome following reports that the US National Security Agency (NSA) had tapped the telephones of former Prime Minister Silvio Berlusconi and his aides in 2011

Feb 25 08:47

Do You Really Want To Live In A World Where Computers Read Your Mind?

Not that we really have a say in the matter either way, but nothing about the question conjures up warm, gushy feelings. The government, via its Defense Advanced Research Projects Agency (DARPA), is spending $60 million on a direct brain-computer interface via neural implant that would allow computers to decode the human brain.

Webmaster's Commentary: 

Feb 25 06:54

Reuters Asks Even Stupider Questions about Apple-FBI Fight than Pew

In my post on Pew’s polling on whether Apple should have to write a custom version of its operating system so FBI can brute force the third phone, I gave Pew credit for several aspects of its question, but suggested the result might be different if Pew had reminded the people the FBI has already solved the San Bernardino attack.

Feb 25 06:29

Tim Cook: If The FBI Gets What It Wants, It Will Threaten Public Safety

Apple chief Tim Cook on Wednesday said that complying with a court order to help the FBI break into an iPhone belonging to one of the San Bernardino shooters would be "bad for America," and set a legal precedent that would offend many Americans.

"Some things are hard, and some things are right, and some things are both - this is one of those things," Cook told ABC News in his first interview since the court order came down last week. He added that the government was asking for "the software equivalent of cancer" and that he planned to talk to President Barack Obama directly about getting the dispute "on a better path."

Later asked whether Apple would be prepared to fight this case all the way to the U.S. Supreme Court, Cook said, “We would be prepared to take this issue all the way.”

Webmaster's Commentary: 

Folks, this is not about breaking encryption on one phone: this is about establishing precedent, and Cook understands that.

IF this is allowed to move forward, it will be about every phone the FBI, CIA, and DHS do not have the skills or personnel to decrypt.

And that could well mean yours, even if you have done absolutely nothing wrong; and as Shakespeare said, "Aye, there's the rub!!"

Feb 25 06:28

Apple Hires Former Solicitor General, Who Lost Wife In 9/11, To Defend It Against FBI

Two can play at the "pull on the heart strings about losses due to terror" game apparently. While the FBI has rolled out the "but the poor victims of San Bernardino" argument for why it wants to force Apple into hacking the security of its own customers, Apple has countered with a big gun of its own: it has hired former Solicitor General Ted Olson to defend the company against the FBI in this case. Olson is a mega-star in legal circles. He's argued tons of cases before the Supreme Court, and of course, was Solicitor General under George W. Bush (whose election he helped ensure in representing him in Bush v. Gore).

Feb 25 06:27

We Just Found Out The Real Reason The FBI Wants A Backdoor Into The IPhone

Whistleblower Edward Snowden tweeted last week that “crucial details [of the case] are being obscured by officials.” Specifically, he made the following trenchant points:

1) The FBI already has all of the suspect's communications records -- who they talked to and how -- as these are stored by service providers, not on the phone itself.

2) The FBI has received comprehensive backups of all the suspect's data until just 5 weeks before the crime.

3) Copies of the suspect's contacts with co-workers -- the FBI's claimed interest -- are available in duplicate from those co-workers' phones.

4) The phone in controversy is a government-issued work phone, subjected to consent-to-monitoring, not a secret terrorist communications device. The "operational" phones believed to be hiding incriminating information, recovered by the FBI during a search, were physically destroyed, not "shielded by Apple."

Feb 24 15:31

Judge Nap on New Email Ruling: 'I Don't Know How Hillary Escapes This'

Judicial Watch is seeking information about whether Clinton and her aides intentionally dodged public records laws by using a private email server.

Judge Andrew Napolitano weighed in this morning on FBN's "Varney & Co." and explained that this civil FOIA case moving slowly through the court system is a "nightmare" for Clinton.

Napolitano noted that separately, the FBI's investigation based on these documents continues.

He explained that a civil case allows for a far "broader latitude" for questioning witnesses than in a criminal case.

If Clinton's aides do not invoke the Fifth Amendment, Napolitano said that they could end up revealing information that could be used in the FBI's criminal probe.

"I don't know how she escapes this. I really don't. ... She cannot not know how grave her legal situation is," said Napolitano, adding that it's "probable" that Clinton receives a subpoena to testify.

Feb 24 14:05

New Sentry Electronic Fire Safe Opened in Seconds with No Sign of Entry

Webmaster's Commentary: 

But they LOOK cool. and that's all that matters!!! :)

Feb 24 13:22

Apple’s Little Secret: There Is Already A Backdoor Installed On Your iPhone

The current media frenzy about Apple’s stance on user privacy is likely to be a deliberately orchestrated distraction from the fact that the government already routinely accesses private information from Apple and Microsoft products.

Apple CEO Tim Cook’s “protests” against FBI’s demands are a ploy to distract the public from the reality that there’s already a backdoor on every new iPhone that ships around the globe: the ability to load and execute modified firmware without user intervention.

Webmaster's Commentary: 

You know, Apple's sales have been down, and this whole contrived "controversy" may be an attempt to boost Apple's sales.

Feb 24 12:12

Judge orders Clinton aides to be questioned under oath on emails

A federal judge ruled on Tuesday that U.S. State Department officials and aides to Hillary Clinton should be questioned under oath about whether the former secretary of state's use of a private email system was an effort to skirt open records laws.

The ruling by U.S. District Judge Emmet Sullivan is likely to add to the uncertainty hovering over Clinton, the front-runner for the Democratic nomination for the November U.S. presidential election, about the legal consequences of her decision to exclusively use a private email server in her New York home for her government work.

Feb 24 11:39

ATLAS: Next Generation of DARPA Humanoid Robot Released

By Nicholas West

The evolution of humanoid robots is happening at an ever-quickening pace. These advancements are occurring not only in their mechanics but also with the incorporation of artificial intelligence.

One of the humanoid robots that has garnered the most attention is ATLAS, developed for DARPA by Boston Dynamics...

Feb 24 10:56

German Govt Has New Trojan Horse Malware To Spy On Citizens’ Calls, Typing AND See Through Their Cameraphones

Germany’s Federal government has announced it’s new “trojan horse” computer software which will allow it to spy on citizens computers and smartphones.

The German Interior Ministry has formally announced that they have created a new “Bundestrojaner” or government trojan horse software to enable them to track the communications of anyone that downloads it according to the German press, in addition to purchasing an “off the shelf” tool from a company which is said to help authoritarian regimes track their citizens.

Feb 24 10:15

Reality Check: McAfee Claims FBI wants to end all encryption not just hack 1 iPhone

Feb 24 10:12

Military-Funded Study Predicts When You’ll Protest on Twitter

Ever get angry, go to Twitter, and shoot off a protest tweet tagged #Arabspring, #AppleVsFBI, #syrianconflict or something else in solidarity with a cause? Whether the tweet is part of a violent movement, a peaceful action, or simply a response to a debate, military and national security types have an interest in predicting how big any given protest movement might become. A new study by researchers at Arizona State University, Texas A&M, and Yahoo, funded in part by the Office of Naval Research, can predict with 70 percent accuracy the likelihood that your next tweet will be part of a protest.

Patrick Tucker is technology editor for Defense One. He’s also the author of The Naked Future: What Happens in a World That Anticipates Your Every Move? (Current, 2014). Previously, Tucker was deputy editor for The Futurist for nine years. Tucker has written about emerging technology in Slate, The ... Full Bio

Webmaster's Commentary: 

I tend not to tweet; and whatever is on my Facebook page is absolute, and sheer, vanilla.

Everything I have to say can pretty much be read from my posts here.

And to anyone in any US "alphabet soup" agency reading this (which MUST count as punishment duty), know this: I am a Christian pacifist activist who never advocates violence.

Deal with it!! :-)

Feb 24 09:30

CIA leaker: Clinton 'given a pass' for emails

A former CIA officer serving jail time for leaking documents to the New York Times accused federal officials of setting a double standard by apparently refusing to aggressively prosecute Hillary Clinton.

Clinton was “a high ranking official who should know better, but completely given a pass, and almost an apologetic pass,” Jeffrey Sterling, who was found guilty of leaking classified information to Times reporter James Risen last year, said in an interview with the Washington Post published on Monday.

“So how should us regular citizens feel, especially with heightened concerns about national security?”

Feb 23 20:19

Linux Mint Is Back Up

How to check if your ISO is compromised?

If you still have the ISO file, check its MD5 signature with the command “md5sum yourfile.iso” (where yourfile.iso is the name of the ISO).

The valid signatures are below:

6e7f7e03500747c6c3bfece2c9c8394f linuxmint-17.3-cinnamon-32bit.iso
e71a2aad8b58605e906dbea444dc4983 linuxmint-17.3-cinnamon-64bit.iso
30fef1aa1134c5f3778c77c4417f7238 linuxmint-17.3-cinnamon-nocodecs-32bit.iso
3406350a87c201cdca0927b1bc7c2ccd linuxmint-17.3-cinnamon-nocodecs-64bit.iso
df38af96e99726bb0a1ef3e5cd47563d linuxmint-17.3-cinnamon-oem-64bit.iso

If you still have the burnt DVD or USB stick, boot a computer or a virtual machine offline (turn off your router if in doubt) with it and let it load the live session.

Once in the live session, if there is a file in /var/lib/man.cy, then this is an infected ISO.

What to do if you are affected?

Feb 23 17:54

Military-Funded Study Predicts When You’ll Protest on Twitter

It’s no simple problem for the obvious reason that the telltale heart beats but for the guilty. “The ways in which protest-related events affect a person are not observable, resulting in a lack of knowledge of factors operating at that time causing his next post to be a declaration of protest,” the researchers write in their study, published as part of the proceedings of the Association for the Advancement of Artificial Intelligence conference earlier this month.

Feb 23 17:13

U.S. judge orders discovery to go forward over Clinton’s private email system

A federal judge on Tuesday ruled that State Department officials and top aides to Hillary Clinton should be questioned under oath about whether they intentionally thwarted federal open records laws by using or allowing the use of a private email server throughout Clinton’s tenure as secretary of state from 2009 to 2013.

The decision by U.S. District Judge Emmet G. Sullivan of Washington came in a lawsuit over public records brought by Judicial Watch, a conservative legal watchdog group, regarding its May 2013 request for information about the employment arrangement of Huma Abedin, a longtime Clinton aide.

Officials with the State and Justice departments said that they were aware of the order but declined to comment further, citing the ongoing litigation. Discovery orders are not readily appealable. An attorney for Abedin declined to comment.

n/a
Feb 23 16:19

Windows 10 updates forcing PCs to use Microsoft products on default - and you can't change it back

It seems that the saga of Windows 10 problems is never-ending – users are now reporting that the latest Windows 10 update automatically switches a user's chosen programs over to Microsoft alternatives without permission, and users can't reset the defaults back to the programs they want to use.

If you're a windows user, you probably have certain programs that you prefer to use. For example, you might prefer to use the Google Chrome web browser over Firefox to surf the web, or you might be using a photo editing program like IrfanView or Adobe Photoshop, or you might be opening all video files using VLC.

Unfortunately, that's not going to be possible if your computer has downloaded the forced cumulative update KB3135173 that was pushed out between 15-21 February, which is causing users' default programs to revert back to Microsoft alternatives, such as Chrome reverting back to Edge, or IrfanView reverting back to the Microsoft Photos app.

Feb 23 13:35

The False Smart Meter Narrative And Lessons from St. Louis Radioactive Clouds

By Patricia Burke

Insightful students of history readily note parallels between the Manhattan-Rochester coalition’s covert research on radiation weaponry in the 1950s, and the smart meter narrative in the U.S. today.

Unethical human experimentation took place on vulnerable populations in Missouri in the decades following WWII. The public narrative was that scientists were researching whether they could shield American cities from Russian warplanes using harmless smokescreen cloud dispersals.

In truth, college students were not privy to the true nature of the tests which were to spray low-income predominantly black neighborhoods in St. Louis with radioactive materials, for scientists studying offensive weaponry...

Feb 23 13:34

Bill Gates Says Apple Is Wrong for Not "Helping" the FBI, Built Back Doors into All Windows Software Since 1999

He's twisting the narrative to make it seem like this skeleton key, once in existence, wouldn't be used again and again on other people's phones (and will be forever).

His argument isn't even a very good one.

This is about setting a precedent for having our 4th Amendment rights trampled on even further in this country, and as we all know, Gates is the poster boy for that.

The average person's privacy in the technological age means less than nothing to billionaire Bill, whose programmers reportedly "accidentally" built National Security Agency back doors into all Windows software starting in 1999.

(read more)

Feb 23 11:45

WIKITOON

NSA Targets World Leaders for US Geopolitical Interests

Feb 23 10:03

German government to use Trojan spyware to monitor citizens

A spokesman for the German interior ministry announced on Monday that the government had approved the usage of Trojans to monitor suspected citizens.

Feb 23 09:32

Apple’s iPhone: the Backdoor Is Already There

Ostensibly software patches were intended to fix bugs. But they can just as easily install code that compromises sensitive data. I repeat: without user intervention. Apple isn’t alone in this regard. Has anyone noticed that the auto-update feature deployed with certain versions of Windows 10 is impossible to turn off using existing user controls?

Feb 23 09:27

Danish police want to track everyone’s movements on the net

The national police force, Rigspolitiet, wants the ability to track every user’s digital footprints.

“Tracking online movements will help them to identify and arrest criminals, as crime and communication about crime is increasingly taking place in cyberspace,” Rigspolitiet commissioner Jens Henrik Højbjerg told DR Nyheder.

Højbjerg is publicly supporting Søren Pind, who said last month that he would draft a law that created a system of online surveillance.

Feb 23 08:55

What Every Twitter User Needs To Know

Feb 23 07:58

8 FREE ALTERNATIVE OPERATING SYSTEMS TO WINDOWS

Fed up with your old and boring Windows operating system? Are you thinking about changing to something unique? Do you prefer to challenge the forefront in an operating platform? Do you like to figure out what the structure of that operating system is likely to be like in its future release? Or maybe you want to test a platform that your mates are working with, to determine if you can add it to your personal computer. This article provides you with brief descriptions of different types of free operating systems that you can install and run on your PC. And these include platforms that are open source, so it’s also possible to customize or tweak the platform.

Feb 23 07:16

Trump: ‘Boycott Apple if they don’t give the code’

Republican presidential front-runner Donald Trump let people know just he feels about the chance of Apple standing up to government requests to unlock an iPhone used by the alleged San Bernardino shooter.

Feb 22 15:51

Judge Grants EFF Right To Investigate NSA’s Illegal Surveillance of Americans

By Brianna Acuesta

It’s been eight years since the Electronic Frontier Foundation first filed its lawsuit against the National Security Agency, but they were just recently granted permission to conduct an investigation into the agency’s surveillance of Americans.

In the case, Jewel v. NSA, the EFF is representing AT&T customers against the NSA in order to stop the dragnet surveillance they have been involved in with users’ communications records...

Feb 22 15:05

No, The FBI Does Not 'Need' The Info On Farook's iPhone; This Is Entirely About The Precedent

No, The FBI Does Not 'Need' The Info On Farook's iPhone; This Is Entirely About The Precedent

Over and over again as people keep talking about the Apple / FBI encryption stuff, I keep seeing the same line pop up. It's something along the lines of "but the FBI needs to know what's on that phone, so if Apple can help, why shouldn't it." Let's debunk that myth. The FBI absolutely does not need to know what's on that phone. It might not even care very much about what's on that phone. As the Grugq ably explained last week, there's almost certainly nothing of interest on the phone. As he notes, Farook destroyed his and his wife's personal phones, indicating that if there were anything truly important, he would have destroyed the last phone too.

Feb 22 14:47

A Hacker’s Paradise: Top 20 Cities with Most Malware Infections

If people could see the delight in a hacker’s eyes when they come across an easy target, they might mistake those hackers for an 8-year-old watching Star Wars for the first time. Easy target for hackers are places where it is easier for them to push/inject a high-jacking program onto the victim’s computer. This job can be easily done through a malware.

Enigma Software, the anti-virus firm, released a list of cities where there are most chances of getting a malware infection. However, you need not read too much into the list as there is no correlation between a person’s physical location and malware infection. But, you must be extra careful while visiting such cities and using the public computer or using your flash drives on such computer. The chances of a malware affecting your system increase dramatically if you’re in such cities. So, you just need to be extra careful.

Webmaster's Commentary: 

Because the NSA can't do a thing about these guys!

Feb 22 13:20

WAKE-UP CALL: WHY WE CAN NO LONGER ASSUME WIRELESS TECHNOLOGY IS SAFE

Wireless technology has become an integral part of our culture. It has connected us to people and information and has also brought us incredible convenience and economic benefits. Just think how this technology has expanded in just the eight years since the iPhone was introduced. We have seen ubiquitous WiFi, tablet computers, wireless smart meters, the smart home, wearable tech, and now the Internet of Things. This latest development will connect everything we own to the internet via pulsed microwave radiation.

Feb 22 12:45

5D Quartz Coin Can Store All Human History For 14 Billion Years

Nicknamed the “Superman memory crystal,” a new storage device made of nanostructured glass can archive 360 terabytes worth of information for billions of years. Created by scientists at the University of Southampton using femtosecond laser writing, the sliver of fused quartz coin can withstand temperatures up to 157 degrees Celsius (350 degrees Fahrenheit). It is an example of 5D optical data storage.

Webmaster's Commentary: 

I want one! :)

Feb 22 12:35

WAKE-UP CALL: WHY WE CAN NO LONGER ASSUME WIRELESS TECHNOLOGY IS SAFE

Wireless technology has become an integral part of our culture. It has connected us to people and information and has also brought us incredible convenience and economic benefits. Just think how this technology has expanded in just the eight years since the iPhone was introduced. We have seen ubiquitous WiFi, tablet computers, wireless smart meters, the smart home, wearable tech, and now the Internet of Things. This latest development will connect everything we own to the internet via pulsed microwave radiation.

Feb 22 11:56

NO, THE FBI DOES NOT 'NEED' THE INFO ON FAROOK'S IPHONE; THIS IS ENTIRELY ABOUT THE PRECEDENT

Over and over again as people keep talking about the Apple / FBI encryption stuff, I keep seeing the same line pop up. It's something along the lines of "but the FBI needs to know what's on that phone, so if Apple can help, why shouldn't it." Let's debunk that myth. The FBI absolutely does not need to know what's on that phone. It might not even care very much about what's on that phone. As the Grugq ably explained last week, there's almost certainly nothing of interest on the phone. As he notes, Farook destroyed his and his wife's personal phones, indicating that if there were anything truly important, he would have destroyed the last phone too

Feb 22 11:36

19-Year-Old’s Free AI Lawyer Has Appealed $3 Million in Tickets

it shouldn’t really come as a surprise that a robot is now entering the lawmaking field. What should impress you though is that a 19 year old, British programmer called Joshua Browder (who is currently a freshman at Stanford University) created it, and that it has apparently already handled numerous parking ticket appeals in the UK, successfully and for free.

Parking ticket appeals, a legal process where violators try to get out of paying the fine, can cost anywhere from $400 to $900.

Finding a lawyer that will do that for you is already difficult and the entire process may prove to be more expensive than just settling the fine in the first place. Since Browder launched his AI lawyer in 2015, it has already appealed 3 million worth of tickets.

Feb 22 10:20

Microsoft 'loves' Linux? Then stop attacking open source

Cui Bono re:Linux Mint Hack!

According to Satya Nadella, Microsoft loves Linux. He said as much, complete with pictures -- and his team backs him up. In itself, it's a remarkable statement.

Nadella's predecessor, Steve Ballmer, described open source in the darkest terms, characterizing it (with the GNU GPL) as a commercial cancer and never retracting the slur. In many ways, that dark prophecy has come true for Microsoft, which has seen its rent-seeking business model steadily eroded by open source. Though it still has a cash cow to milk, Microsoft's monopolies no longer frighten anyone.

Feb 22 10:13

We cannot trust our government, so we must trust the technology. "Apple’s battle with the FBI is not about privacy v security, but a conflict created by the US failure to legitimately oversee its security service", posts Snowden.

America’s national security agencies insist on wielding unaccountable power coupled with “trust us, we’re the good guys”, but the majority of users have no such trust. Terrorism is real, and surveillance can sometimes help prevent it, but the only path to sustainable accommodation between technologies of secrecy and adequately informed policing is through a root-and-branch reform of the checks and balances in the national security system.

Feb 22 09:59

FBI 'let technicians reset San Bernardino terrorist's iCloud password' - potentially ruining a chance to access its information

The FBI have rebutted claims that San Bernardino County technicians reset an iPhone belonging to one of the December 2 shooters, without the agency's consent.

An FBI spokeswoman said in a statement Saturday that their investigators had in fact 'worked cooperatively with the county of San Bernardino' in order to exploit the 'crucial data' stored in the iCloud account.

But this claim differs from court filings from the Justice Department, who said the county officials 'in an attempt to gain access to some information in the hours after the attack, was able to reset the password remotely, but that had the effect of eliminating the possibility of an auto-backup', reported ABC.

Webmaster's Commentary: 

In other words, the government botched getting into the iPhone and the FBI is screaming at Apple to come fix the mess for them.

Feb 22 09:19

United Nations CITO: Artificial intelligence will be humanity's final innovation

Artificial intelligence, said United Nations chief information technology officer Atefeh Riazi, might be the last innovation humans create.

"The next innovations," said the cabinet-level diplomat during a recent interview at her office at UN headquarters in New York, "will come through artificial intelligence."

Webmaster's Commentary: 

"You know, we don't really need these humans cluttering up our world, do we?" -- HAL 9000

Feb 22 09:15

Inside the New Microsoft, Where Lie Detection Is a Killer App

The lie detector, cobbled together from algorithms and a 14-pronged headset that measures brain waves, is a kind of party trick Marsman deploys to show software developers how to use Microsoft’s Azure Machine Learning tools. Boisterous and known to spout Harry Potter references, Marsman plays a crucial role for a company that was early to machine learning but is now competing with Google and Amazon to commercialize the technology.

Webmaster's Commentary: 

Great! We need to mandate that all politicians and CEOs wear these things when they give speeches!

Feb 22 09:08

Linux Mint website hacked, malicious ISO offered on Saturday

In a surprising announcement, Clement Lefebvre -- head of the Linux Mint project -- said that the Linux Mint website had been compromised and that the hackers were able to edit the site to point to a malicious ISO of Linux Mint 17.3 Cinnamon edition on Saturday 20th, February.

If you downloaded the Cinnamon edition prior to Saturday or downloaded a different version/flavour (including Mint 17.3 Cinnamon via torrent or direct HTTP link) you aren't affected. It's worth mentioning that since the issue was caught, everything has since returned back to normal now so it's safe to download the Linux Mint ISOs again.

Webmaster's Commentary: 

Linux Mint's main website is still offline.

Feb 22 08:16

CREEPY PICTURE SHOWS ZUCK-BOTS PLUGGED INTO THE MATRIX

The image above looks like concept art for a new dystopian sci-fi film. A billionaire superman with a rictus grin, striding straight past human drones, tethered to machines and blinded to reality by blinking plastic masks. Golden light shines down on the man as he strides past his subjects, cast in gloom, toward a stage where he will accept their adulation. Later that night, he will pore across his vast network and read their praise, heaped upon him in superlatives, as he drives what remains of humanity forward to his singular vision.

Feb 22 08:06

Software, not wetware, now the cause of lousy Volvo drivers

Volvo has issued a recall for cars that have buggy software.

The code flaw means that engines in about 59,000 2016-model series 60 and 70 cars sometimes stop, for no apparent reason.

The engines then restart.

Feb 22 08:03

Linux Mint forums hacked: All users urged to reset passwords

Backdoored downloads not full extent of problem

Feb 22 04:27

Davos Elite Reveal Orwellian Plan to Decode Your Brain and Read Your Mind

Still think we aren’t living in the Matrix? In his fiction-turned-fact novel 1984, George Orwell wrote “Nothing was your own except the few cubic centimetres inside your skull.”

Apparently even that won’t hold for long.

Feb 21 17:40

How companies are secretly tracking employees’ health and private lives with ‘big data’ to save money

US companies are hiring ‘big data’ organizations to track employees’ search queries, medical claims, prescriptions and even voting habits to get insight into their personal lives, it emerged this week, raising concerns about potential data leakage and discrimination. Businesses such as Walmart favorite Castlight Health, which produces a healthcare management app for employees, are gathering up user information about their clients’ employees,The Wall Street Journal (WSJ) wrote on Wednesday.

Feb 21 15:46

Linux Mint hacked: malware-infected ISOs linked from official site

Downloaded Linux Mint on February 20th? Check for infection NOW

Feb 21 15:46

Gird your coins: A phishing tsunami is smashing into America

Don't let crooks plunder your paycheck … that's our job, says IRS

Feb 21 12:39

Man Sues Smart TV Company Over Illegal Spying

A man from Indiana is suing the manufacturer of his smart TV set over claims that the television is ‘secretly spying’ on him and passing confidential information onto third parties.

Feb 21 09:15

EMF Health Alert Issued by Former Silicon Valley Tech Expert: “Wireless Wake-Up Call”

By Kevin Samson

Jeromy Johnson gives a powerful lecture about his own experiences with Electromagnetic Hypersensitivity. There is growing awareness about the threat posed by our modern day gadgets and smart meters, even while new city-wide WiFi initiatives are rolled out. Johnson also offers (tech) solutions...

n/a
Feb 20 09:19

ENCRYPTION TRUTH: What The FBI Aren’t Telling You About Their Battle With Apple And San Bernardino

The FBI ruling stipulates that Apple must provide access for one time only. However, cyber security experts and technology companies insist this is a virtual impossibility and a guarantee that cannot be made.

In theory, the decryption of the phone would be opened via a newly created operating system that would give the FBI a backdoor into the device. But according to many skeptics, this type of backdoor feature could set a very dangerous precedent, while possibly making it much easier for invaders (either government, or hacker) mining for data well into the future.

In addition, the new iOS (not yet in existence) proposed in the wake of the San Bernardino shooting would give US law enforcement agencies broader access to consumer communications and other private information according to many in the tech industry. This reality was confirmed by Apple’s chief executive Cook, who outlined the staggering privacy implications this past Tuesday:

Feb 20 09:18

USING THIS PHONE PASSCODE STRATEGY WILL TAKE THE FBI 127 YEARS TO CRACK YOUR ENCRYPTED DATA

This report is based on the assumption that Apple is on the up-and-up about their refusal to create backdoor tools for the FBI. As we know, however, intelligence agencies are experts at disinformation, so for all we know it is possible that backdoors already exist and what we have witnessed this week insofar as the encryption debate is concerned could be a psy-op designed to convince the public that their encryption is unhackable by government agencies. From a security perspective, we must assume that no electronic device is safe from prying eyes, as most theories on these matters are based on publicly known technologies and do not take into account top secret developments with quantum computing or advanced DARPA initiatives.

Feb 20 09:17

Bypassing encryption codes and changing the law: Leaked memo reveals how spies have been trying to access your cell phone

A secret memo has revealed the government's strategy for breaking into cell phones - from bypassing encryption codes to changing the law.

According to a 'decision memo' from the National Security Council, seen by Bloomberg, security agents were ordered to start finding ways to hack into encrypted devices last November.

Feb 20 09:03

San Bernardino Shooter's iCloud Password Changed While iPhone was in Government Possession

The password for the San Bernardino shooter's iCloud account associated with his iPhone was reset hours after authorities took possession of the device.

The Justice Department acknowledged in its court filing that the password of Syed Farook's iCloud account had been reset. The filing states, "the owner [San Bernardino County Department of Public Health], in an attempt to gain access to some information in the hours after the attack, was able to reset the password remotely, but that had the effect of eliminating the possibility of an auto-backup."

Webmaster's Commentary: 

Were they trying to plant something in the phone, and botched it up?

Feb 20 08:57

California judge rules EFF can collect evidence against NSA in mass surveillance case

A US digital rights group is celebrating a “big victory” as a California judge has authorized it to conduct a discovery against the NSA and collect factual evidence of the agency’s “warrantless” surveillance.

“We had been barred from doing so since the case was filed in 2008,” the Electronic Frontier Foundation (EFF) said in a press release.

It has been eight years since the group filed its Jewel v. NSA suit, targeting the NSA on behalf of a former AT&T customer, Carolyn Jewel. According to the EFF and five plaintiffs it represents, AT&T has collected and routed copies of internet traffic to a secret room in San Francisco controlled by the NSA.

The EFF’s complaint, aimed at “NSA in cooperation with AT&T”, predated the public’s awareness of Edward Snowden, the former intelligence contractor, who exposed the agency’s surveillance operations in 2013.

Feb 20 07:10

World's Busiest Airport Tells TSA; Get Act Together

The world's busiest airport just told the TSA to get its act together or be replaced

Atlanta's Hartsfield-Jackson International Airport, the world's busiest, has issued a warning to the US Transportation Safety Administration to get its act together or be replaced.

(*Gedemoudahea !)

Feb 19 16:04

Apple vs. the FBI: Inside the Battle Snowden Calls “The Most Important Tech Case in a Decade”

A major debate over privacy and online encryption has erupted after the computer giant Apple announced it will resist a court order to help the FBI break into an iPhone recovered from one of the San Bernardino shooters.

Feb 19 12:20

COMPANY CLAIMS FLYING CARS JUST TWO YEARS AWAY

Traffic can be a real grind. For those travelling between work and home by car every day, the seemingly endless cycle of gas-brake-repeat at a snail’s pace can wear thin. But commuters of the very-near future may be granted some respite by taking to the skies in a flying car.

Feb 19 12:06

FBI Wins Court Order Forcing Apple to Install Backdoor in iPhone Security Systems

The Obama administration secured a court order from a California-based federal judge on Tuesday to force tech giant Apple to develop special software designed to compromise encryption security features embedded in the iPhone’s iOS 9 operating system.

The court decision, utilizing an obscure and antidemocratic law from the 18th century, is part of efforts to utilize last year’s attack in San Bernardino, California to intensify the assault on democratic rights and expand the police-state spying powers of the government.

Webmaster's Commentary: 

Now the government will have to plant something really spectacular on that phone. Otherwise they are going to look silly making such a fuss over nothing.

Feb 19 11:28

WHAT HAPPENS IF YOU DON'T REGISTER YOUR DRONE WITH THE FAA TODAY

If you own a drone, today is your last day to register with the federal government—at least, if you're planning on complying with its new and controversial regulations for small remote-control aircraft. Registration is mandatory for all pilots owning drones weighing more than half a pound, and costs $5. It also involves adding your name, address and contact information to a government database, which will soon be publicly searchable by an FAA-assigned registration number via the agency's website.

Feb 19 10:47

Secret Memo Details U.S.’s Broader Strategy to Crack Phones

In a secret meeting convened by the White House around Thanksgiving, senior national security officials ordered agencies across the U.S. government to find ways to counter encryption software and gain access to the most heavily protected user data on the most secure consumer devices, including Apple Inc.’s iPhone, the marquee product of one of America’s most valuable companies, according to two people familiar with the decision.

Webmaster's Commentary: 

The reason this has become such a hot issue is because the American people know they cannot trust this government with their private data, and daily are reminded that the government either cannot or refuses to catch the real cyber-criminals (heck, they can;t even enforce the do-not-call list). So, clearly, the attack on encryption is an attack on our privacy so that government people can steal our business secrets (as they were caught doing at the Seattle APEC) or copy sexy pictures of our spouses and children to .... relax with (as Snowden has confirmed they do).

n/a
Feb 18 14:32

Ken O'Keefe - TSA Denied Flight to Anarcapulco for Refusing Body Scanner at LAX

Brother O'Keefe is currently stuck in the great ole US of A... homeland insecurity deemed him a threat to the imminent self-destruction of banker nation, wouldn't let him through with a ball rub, rather they forced him to be irradiated, and he missed his flight. Please share far and wide.

Feb 18 09:11

Israel Demands Governments Regulate Social Media & Ban “Anti-Semitism”

Following up on a recent blog post highlighting the ADL’s collaboration with the social media giant Twitter, we have yet another example of the organized Jewish community’s concerted efforts to censor the Internet and crack down on “anti-Semitism,” i.e., criticizing and/or exposing Israels' government!

Webmaster's Commentary: 

Feb 18 08:27

Donald Trump slams Apple for refusing to help FBI hack San Bernardino shooter's iPhone

U.S. Republican presidential candidate, reality TV star and apparent data security buff Donald Trump has some thoughts on Apple's objection to a federal court order demanding that it help the FBI unlock an iPhone in connection with December's San Bernardino shootings.

Webmaster's Commentary: 

Oh, Donald, Donald, Donald...

The FBI is not asking Apple to unlock this one phone. The FBI is asking Apple to create a tool that will allow the government to unlock ALL iPhones, everywhere, at any time, to spy on law-abiding citizens (while real criminals and terrorists simply use their own systems of encryption which the NSA cannot break).

After all this hub-bub I am expecting the government to have to make up some grand story about what is on that iPhone or they are going to look pretty willy making such a fuss over nothing!

Feb 18 07:59

Los Angeles hospital paid $17,000 ransom to hackers to regain control of computers

A Los Angeles hospital paid $17,000 to hackers to regain control of their computers, it has been revealed.

Hollywood Presbyterian Medical Center was hacked on February 5 with ransomware.

The cyber criminals had demanded $3.4million to give back the massive computer system, but accepted a lower fee - the cash equivalent of 40 bitcoins.

Webmaster's Commentary: 

Proving once again that the NSA/FBI/CIA cannot actually find any real criminals or terrorists. Hence the war on encryption is a war on the privacy of law abiding citizens.

Feb 17 17:31

Ken O'Keefe: TSA Denied Flight to Anarcapulco for Refusing Body Scanner at LAX

I am not surprised that the Orwellian TSA (Homeland Security) have denied me the ability to board a flight from LAX to Acapulco because I opted out of the body scanner procedure.

Feb 17 15:02

Apple - A Message to Our Customers

When the FBI has requested data that’s in our possession, we have provided it. Apple complies with valid subpoenas and search warrants, as we have in the San Bernardino case. We have also made Apple engineers available to advise the FBI, and we’ve offered our best ideas on a number of investigative options at their disposal.

We have great respect for the professionals at the FBI, and we believe their intentions are good. Up to this point, we have done everything that is both within our power and within the law to help them. But now the U.S. government has asked us for something we simply do not have, and something we consider too dangerous to create. They have asked us to build a backdoor to the iPhone.

Webmaster's Commentary: 

Here is the problem. We The People simply cannot trust the US Government to confine its back door access to criminal/terror investigation. The Seattle APEC scandal proved US agents steal business secrets from law-abiding citizens, and Edward Snowden confirmed that government agents copy off sexy pictures of our spouses and children for their own personal ... amusement.

I am on Apple's side in this, especially since we proved that real criminals and real terrorists can easily create their own systems of encryption the US Government cannot break.

Feb 17 14:52

“Too Dangerous to Create”: Apple Defies FBI Order to Build Backdoor Software To Unlock Any iPhone

The intelligence community is pressuring the tech world to help them break encryption systems and create a backdoor into privately held devices.

Specifically, the FBI wants us to make a new version of the iPhone operating system, circumventing several important security features, and install it on an iPhone recovered during the investigation. In the wrong hands, this software — which does not exist today — would have the potential to unlock any iPhone in someone’s physical possession.

Read more at SHTFplan.com

Feb 17 13:37

The FBI Just Released an Orwellian Video Game to Propagandize Children

By Justin Gardner

The Federal Bureau of Investigation (FBI) is expanding its counter-terrorism efforts by launching a propaganda site for children, complete with a comically primitive video game that no kid would want to play.

The stated purpose of the FBI’s new program, called “Don’t Be A Puppet: Pull Back the Curtain on Violent Extremism,” is to “keep young people…from embracing violent extremist ideologies in the first place.”...

Feb 17 12:25

The electronic pickpocket: ‘Scammer steals hundreds of pounds by touching victims’ pockets with sales device – and transferring cash from their contactless payment credit cards’

A brazen thief has allegedly been spotted committing a crime which exposes the risks of owning a contactless payment card.

The scammer, reportedly photographed in Russia, was seen on a train using a payment device to scan contactless cards through unsuspecting victims' pockets and bags.

While contactless card payments can only be made up to £30, devices are able to 'store' more than £400 without a connection to a landline or wireless internet.

Feb 17 12:01

GCHQ intel used to develop Stuxnet, claims new documentary

The super worm known as Stuxnet was but a cog in an active US war program in which hundreds of thousands of network implants and backdoors in Iran networks were actively maintained to facilitate a devastating barrage of hacking attacks, a documentary claims.

Zero Days, due to screen at the Berlin Film Festival today, claims that Stuxnet was just one part of an operation called "Olympic Games" that is itself part of a wider effort dubbed "Nitro Zeus" that involves hundreds of US defence personnel.

Nitro Zeus may also involve Israel, the film alleges.

Reports from those who've seen or been briefed on the film suggest it alleges that Stuxnet's authors attempted to keep the program covert by restricting the malware to infect only Iranian machines.

Forte Mead hackers worked furiously to mop-up infected computers after a leak became apparent.

Feb 17 11:58

Auschwitz creates ‘Remember’ app to correct ‘Polish death camp’ misnomer

The Auschwitz-Birkenau Memorial and Museum has announced the release of a new app called ‘Remember’, created to help users avoid the use of terms such as ‘Polish death camp’ or ‘Polish extermination camp’, calling the error to the writer’s attention and suggesting more appropriate wording.

This is an important distinction for the Polish people. The use of the term ‘Polish death camp’ implies Polish responsibility for atrocities committed by the German Third Reich on Polish soil. Auschwitz was built by the German Third Reich in occupied Poland, and the implication that the Polish people were involved or responsible for Auschwitz is “very painful to bear for the Poles”, according to Dr Piotr M. A. Cywi?ski, the director of the Auschwitz Museum. “The Auschwitz camp was built by the German state on the territory of occupied Poland which were forcibly incorporated into the Third Reich.

Feb 17 09:38

FLASHBACK - Rivero challenges the NSA

The NSA justifies its surveillance of all our computer and phone data with the claim they need it to detect and track terrorists. Obviously the Boston Bombing proves this is an epic fail, even given the admission by the FBI that they did in fact have recorded phone calls for the Tsarnaev brothers to listen to.

I maintain that the NSA spying is wholly about controlling the American people, looting their business secrets for cronies, and has no impact on real terrorists (as opposed to fake acting a theater role to sell us a war) because real terrorists and drug criminals have known all along that public communications are open to monitoring.

This brings us to the issue of encryption to protect our privacy.

Webmaster's Commentary: 

I am reposting this in the face of a continued push by the government to ban encryption or to force you to use encryption which the government can read, all supposedly so the government can find criminals and terrorists.

This is, of course, nonsense.

One only need look at the epidemic of computer crime that is being committed with impunity to know that the NSA/CIA/FBI are not able to find these people, and there is a very good reason for that.

Real criminals and terrorists are able to create their own systems of encryption which the NSA cannot break.

This article details how we proved that. Over the course of a year, we created and issued 6 separate encryption challenges, none of which were ever solved.

Now, the NSA had a powerful motive to defeat these challenges, in order to discourage citizens from writing their own encryption systems. Once people know it is possible, even easy, to create encryption systems the NSA cannot break, they will start to do it. That was the whole point of this exercise.

Hence, the government war on encryption is not about crime and terror; it is a war on your right to privacy.

Optional Banner: 
WRH Exclusive
Feb 17 09:30

Apple's Tim Cook: We'll fight 'iPhone backdoor' demands from FBI

Apple CEO Tim Cook says the company will fight a court order that demands it make a custom version of iOS for the FBI.

Feb 17 08:14

GCHQ intel used to develop Stuxnet, claims new documentary

The super worm known as Stuxnet was but a cog in an active US war program in which hundreds of thousands of network implants and backdoors in Iran networks were actively maintained to facilitate a devastating barrage of hacking attacks, a documentary claims. Zero Days, due to screen at the Berlin Film Festival today, claims that Stuxnet was just one part of an operation called "Olympic Games" that is itself part of a wider effort dubbed "Nitro Zeus" that involves hundreds of US defence personnel.

Feb 17 08:12

U.S. PLANNED MAJOR CYBER ATTACK ON IRAN IF NUCLEAR TALKS FAILED

The U.S. was planning to carry out a major cyber attack against Iran in the event that negotiations over a landmark deal to pull back Tehran’s nuclear program failed, The New York Times reported late Tuesday.

According to an upcoming documentary and to military and intelligence officials, the plan, code-named Nitro Zeus, would have targeted the Islamic Republic’s air defenses, electrical power grid and communications systems if the failure of the talks sparked a conflict.

The plan was shelved after the talks between Tehran and six world powers ended in success in July 2015, the Times reported.

Feb 16 16:30

Republicans stand down for FBI investigation of Clinton server

Republicans are refusing to use the Benghazi playbook to go after Hillary Clinton’s private email server.

Instead of launching formal investigations or propping up a new special committee to investigate the emails — as they did with the 2012 Libya terror attack — House Republicans have gone out of their way to avoid formal inquiries into allegations that classified information was mishandled on Clinton’s personal machine.

Webmaster's Commentary: 

For the GOP to be protecting Hillary over her server supports the theory that Hillary was indeed selling US secrets to foreign governments using her private server to deliver and her "charitable" foundation to collect and launder the payments. The GOP is not protectring Hillary out of love, but to save their own jobs, because a serving Secretary of State running an espionage operation out of the State Department is a scandal capable of bringing down the entire Federal Government.

And it should!

Feb 16 12:11

Cheney: Hillary’s Private Email Server Raises Questions About Her Fitness To Be President

Monday on Fox News’ “Special Report” with Brett Baier, Cheney said Clinton’s decision to use a private email server “raises questions in my mind anyway about the fitness of Secretary Clinton’s service as commander in chief.”

Asked about the almost 1700 emails that are now classified on Clinton’s private email server, Cheney said, “All I know is what I see in the press, but it’s a very serious matter.”

“You have a secretary of state who should know better, all of us who hold those positions, I did at Defense or as vice president. You’re briefed thoroughly and reminded constantly of the sensitivity of the materials you’re dealing with,” Cheney said.

Feb 16 12:08

JERRY SHENK: Hillary Clinton’s email scandal is different

Shady land deals, Rose law firm records, cattle futures, allegations of sexual abuse, infidelities, Oval Office assignations and even Bill’s proven acts of perjury and subornation of perjury pale in comparison to Hillary’s alleged criminal violations of national security laws. (“Alleged” is included only to satisfy America’s legal standard of “innocent until proven guilty.”)

But Hillary is guilty: The security classifications of her emails aside, the proof is the unequivocal evidence of an illegal, unsecured, private server on which she conducted all of her official business while Secretary of State.

Feb 16 11:55

Los Angeles: Hackers demand $3m bitcoin ransom from hospital to unlock vital files

An internal emergency has been declared at a major US hospital in Los Angeles following a widespread ransomware-style cyberattack which has left staff unable to access vital patient data, it has been revealed.

The Hollywood Presbyterian Medical Centre, located in the heart of LA, is now dealing with hackers who are reportedly demanding over 9000 bitcoins - which equates to roughly $3.6m – to release the encryption keys to computer systems that hold patient data, X-Ray scans, CT scans and crucial lab work.

Webmaster's Commentary: 

More proof that the NSA (CIA, FBI. yadda yadda) cannot actually find and deal with real computer criminals. The war on encryption is a war on your privacy and nothing more.

Feb 16 10:02

THE NSA’S SKYNET PROGRAM MAY BE KILLING THOUSANDS OF INNOCENT PEOPLE

In 2014, the former director of both the CIA and NSA proclaimed that “we kill people based on metadata.” Now, a new examination of previously published Snowden documents suggests that many of those people may have been innocent. Last year, The Intercept published documents detailing the NSA’s SKYNET programme. According to the documents, SKYNET engages in mass surveillance of Pakistan’s mobile phone network, and then uses a machine learning algorithm on the cellular network metadata of 55 million people to try and rate each person’s likelihood of being a terrorist.

Feb 16 09:30

CIA knew of impending ISIS attack days before Paris: 'System was blinking red' shortly before terrorists slaughtered 130 people in French capital

The CIA knew ISIS was planning an imminent attack just days before the barbaric terror group slaughtered 130 people in Paris.

CIA Director John Brennan told 60 Minutes that the 'system was blinking red' shortly before ISIS launched its horrific gun and bomb attack in the French capital.

Brennan said the intelligence agency was aware of an impending atrocity but was unable to intercept encrypted messages the terrorists were using in the build-up to the massacre.

Webmaster's Commentary: 

This is a renewed push to end privacy for law abiding citizens either by banning encryption or forcing them to use encryption the government can peek into. However, this spying on the law abiding citizens is about spying on the law abiding citizens, and will have no effect on terrorists who will simply create their own systems of encryption. I know, because we did it. Over the course of a year we created six code challenges in which we created our own encryption methods and challenged everyone, especially the NSA, to break them. None were solved, and I am not an encryption expert and only a moderately competent programmer. If I can defeat the NSA, so can real criminals and terrorists. Hence, the push to spy on the law abiding citizens is all about surveillance, to make sure we are not thinking bad thoughts about the fuhrer, to steal our business secrets for political cronies, and to whack off over naked pictures of our spouses and children.

SHARE THIS ARTICLE WITH YOUR SOCIAL MEDIA