COMPUTERS/INTERNET/SECURITY | WHAT REALLY HAPPENED


COMPUTERS/INTERNET/SECURITY

May 12 12:53

Virtual Reality 360-Pics To Hit Your Facebook News Feed ‘In Coming Weeks’

Put your phone’s camera on standby, because Facebook is about to roll out a 360-degree photographic feature, opening a door for everyone to share moments in orb-like grandeur.

May 12 12:26

Comey: I feel 'pressure' to quickly finish Clinton email probe

Handling investigation 'well' is top priority, FBI director says, rejecting any 'external deadline'

(*somebody could have made the 'throat slit gesture' to him in the court room )

May 12 11:05

3rd Of UK Firms Would Hire Ex-Hackers To Plug Security Skills Gap

One third of firms polled in a recent survey said they would consider employing ex-hackers to make up for a crippling security skills shortfall.

The study carried out at SecureData’s customer conference in London found 97 percent think data security is critical to modern cyber strategy.

May 12 10:20

Google DeepMind's deal with the NHS is being investigated by the UK data watchdog

The Information Commissioner's Office (ICO) has confirmed it is investigating a controversial data-sharing agreement between Google DeepMind and an NHS Trust, Computer Weekly reports.

The data protection watchdog told Computer Weekly that an investigation into the partnership, which gives Google DeepMind access to 1.6 million patient records, has been launched off the back of at least one complaint from the general public.

May 12 10:14

Criminals exploit zero day Flash vulnerability

Adobe will this week patch a critical vulnerability in Flash Player that is being actively exploited in the wild.

Not information is available on the exploit (CVE-2016-4117) ahead of the patch that is set for release from tomorrow.

May 12 10:12

Compression tool 7-Zip pwned, pain flows to top security, software tools

Attackers can score user privileges thanks to heap corruption hassle

May 12 09:09

Russian Scientists Develop Incredible High-Density 'Quartz' Data Storage

Russian scientists at the Dmitry Mendeleev University of Chemical Technology in Moscow have apparently managed to create 'quartz coins' which can store vast amounts digital data for virtually billions of years.

Webmaster's Commentary: 

"No, no, no, no, no, no, no, no, no, NO! You have to design them to fail every two years and be replaced, or they simply will not fit into the American business model!!!!" -- Official White Horse Souse

May 12 09:08

In Hearing On Internet Surveillance, Nobody Knows How Many Impacted In Data Collection

The Senate Judiciary Committee held an open hearing Tuesday on the FISA Amendments Act, the law that ostensibly authorizes the digital surveillance of hundreds of millions of people both in the United States and around the world. Section 702 of the law, scheduled to expire next year, is designed to allow U.S. intelligence services to collect signals intelligence on foreign targets related to our national security interests.

May 12 07:37

HILLARY THE SPY? - UPDATED INFO!

Let us start with an historical fact. Treason and betrayal by the highest levels is a common feature of history, whether it is Judas vs Jesus, Brutus vs Julius Caesar, Benedict Arnold, the Rosenbergs, Jonathan Pollard, Aldrich Ames, Robert Hanssen. It is just a fact of life. It does happen.

Back in 1996, when Bill Clinton was running for re-election, he authorized the transfer of highly sensitive technology to China. This technology had military applications and allowed China to close the gap in missile performance with the United States. The transfers were opposed and severely criticized by the Defense Department.

Optional Banner: 
WRH Exclusive
May 12 07:12

Comey rebuffs Clinton claim FBI only conducting ‘security inquiry’ on emails

Hillary Clinton for months has downplayed the FBI investigation into her private email server and practices as a mere “security inquiry.”

But when asked Wednesday by Fox News about Clinton's characterization of the bureau's probe, FBI Director James Comey said he doesn’t know what "security inquiry" means -- adding, “We’re conducting an investigation. … That’s what we do.”

The FBI director reiterated that he’s “not familiar with the term security inquiry” when told that is the phrase Clinton has used.

May 12 04:02

Risky move: #AskNetanyahu quickly backfires for Israeli PM

In what could at best be described as a risky PR move, and at worst just asking for trouble, Israeli prime minister Benjamin Netanyahu opened himself up to the world of Twitter with an “Ask Netanyahu” social media campaign, yielding predictably funny results.

n/a

n/a
May 11 17:02

HILLARY THE SPY? - UPDATED INFO!

Let us start with an historical fact. Treason and betrayal by the highest levels is a common feature of history, whether it is Judas vs Jesus, Brutus vs Julius Caesar, Benedict Arnold, the Rosenbergs, Jonathan Pollard, Aldrich Ames, Robert Hanssen. It is just a fact of life. It does happen.

Back in 1996, when Bill Clinton was running for re-election, he authorized the transfer of highly sensitive technology to China. This technology had military applications and allowed China to close the gap in missile performance with the United States. The transfers were opposed and severely criticized by the Defense Department.

Webmaster's Commentary: 

Optional Banner: 
WRH Exclusive
May 11 13:19

Be nice to Hillary Clinton online — or risk a confrontation with her super PAC

Hillary Clinton's well-heeled backers have opened a new frontier in digital campaigning, one that seems to have been inspired by some of the Internet's worst instincts. Correct the Record, a super PAC coordinating with Clinton's campaign, is spending some $1 million to find and confront social media users who post unflattering messages about the Democratic front-runner.

n/a
May 11 12:17

Clinton IT staffer's hiring caused confusion among department managers

Bryan Pagliano, the former State Department IT specialist who managed Hillary Clinton's private email server, was hired by the State Department as a political appointee -- an unusual arrangement within his department that caused confusion among some managers.

A new set of emails from early 2009, which were released to the conservative legal watchdog group Judicial Watch as part of an ongoing Freedom of Information Act lawsuit, reveals conversations between top State Department officials about how the Bureau of Information Resource Management (IRM) could go about hiring Pagliano as an IT specialist under this arrangement.

Pagliano had previously worked as an IT director for Clinton's 2008 presidential campaign.

May 11 12:16

Networks Censor Latest Hillary E-Mail Bombshell, Instead Hype Anti-Wrinkle Gel

All three networks on Tuesday morning censored the bombshell news that all the e-mails from Hillary Clinton’s top IT staffer, the man who set up her private server, are missing. This is despite a combined eight hours of air time on ABC’s Good Morning America, CBS This Morning and NBC's Today. Instead of covering this important development, these same programs devoted eight minutes and 38 seconds to a new anti-aging gel. Not exactly the most pressing story.

Webmaster's Commentary: 

So, once again the independent media has to do the job the corporate media claims to do but never does. Grab all the articles about Bryan Pagliano’s emails you can find and flood your social media with them.

May 11 11:31

How to tell if you’re infected with malware

Picture this: you start your computer and wait. And wait. And wait some more. When your desktop finally shows its face, things don’t get any better. Your Internet is sluggish, your programs are taking forever to load, and your cursor is dragging 20 seconds behind your mouse. You might have tried to open too many programs at once. Or…

You might be infected.

Sometimes a malware infection is plain as day. Other times it’s a silent killer. If you want to know whether or not your machine is sick, you first need to understand the symptoms. So let’s take a look at the telltale signs.

May 11 11:30

Triumph Of Love: British Security Agency Loses Legal Bid To Force Hacker To Reveal Passwords

Campaigners have welcomed a UK court ruling against Britain’s National Crime Agency (NCA), which was demanding hacker Lauri Love disclose the passwords to his encrypted computers.

District Court Judge Nina Tempia, sitting at Westminster Magistrates’ Court, ruled against the NCA on Tuesday morning, saying the security agency tried to use the powers of the court to get round the law.

May 11 09:32

Clinton aide reported to have walked out of FBI interview

A senior aide to Hillary Clinton when she served as secretary of State briefly walked out of an interview with federal investigators when an FBI official began to discuss a topic considered off-limits, The Washington Post reported on Tuesday.

Webmaster's Commentary: 

"Yes, I will help you investigate what criminal and espionage activity may have been going on, so long as you agree not to ask me about what criminal and espionage activity may have been going on!" -- Hillary-drone

May 11 09:08

NATO AND THE PENTAGON WANT TO GET THEIR HANDS ON THE TECHNOLOGY BEHIND BITCOIN

Blockchain technology, the backbone of bitcoin, has a lot of applications. Finance firms want to use to cut down on administrative costs and trade faster. Estonia is using to securely track health records. Now it’s the military’s turn. Both the US Department of Defense (DoD) and NATO have put out requests for military-related apps built on blockchain, a decentralized digital ledger system. The ledger is stored in multiple copies across a large group and changes are sent out to all of them immediately, using a mathematical protocol that makes the ledger tamper-proof. That creates an immutable record of the information, and since everyone has a copy of the data, records are still safe even if a few people are hacked.

May 11 08:35

US Senate Launches Inquiry Over Facebook’s Alleged Political Bias In Trending News List

Facebook CEO Mark Zuckerberg has fallen under scrutiny from a US Senate committee over the alleged political bias of the site’s Trending news feature. A GOP senator questioned Facebook’s practice of filtering news, accusing it of “misleading” the public.

Webmaster addition: I think that all those who are trying to conceal, delete, or hack the servers of citizens should be hit with a civil rights suit for abridging the First Amendment.

May 11 05:22

BEX ALERT - Released Emails Show Use of Unclassified Systems Was Routine

Whatever the disposition of the investigation, the discussion of troops to Bahrain reveals how routinely sensitive information is emailed on unclassified government servers, reflecting what many officials describe as diplomacy in the age of the Internet, especially in urgent, fast-developing situations.

Webmaster's Commentary: 

The New York Times is not allowing comments on this piece of crap, or I would make the comment that unsecured servers are "routinely" used only for unclassified documents. Even the example given involves documents that were not classified at the time they were sent by conventional email, yet the New York Times is trying to equate this to Hillary's situation, to try to defend her.

Simple logic here...

The job of Secretary of State involves handling a lot of classified information. Hillary never used her secure government email account. If she didn't use her private server to handle the classified material (as she claims) ... then what server DID she use? Is there a third system out there?

Remember China-gate from 1996? Then President Bill Clinton authorized the sale of sensitive US technology to China and Chinese money was donated to his re-election campaign!

Was Hillary playing the same game, selling US secrets delivered via a private server with weaker security than the Ashley Madison website in exchange for "donations" to her "charitable" foundation?

It is time to look past the server itself to what may be the biggest spy scandal in US history!

May 10 15:30

Rivero challenges the NSA

The US Government insists their demand for a ban on strong encryption or back doors into all of our electrinic devices is to stop crime and terror.

But over the course of a year, as documented on this page, What Really Happened issued six encryption challenges based on systems of encryption created and programmed here on an air-gapped computer.

Now, I am not an encryption expert, and only a moderately decent programmer. The NSA would have a strong motive to break my codes to discourage others from creating their own systems of encryption.

None were ever solved.

If I can beat the NSA, it means real criminals and terrorists can defeat the NSA and keep their communications private.

Hence, the real agenda of the government is not to stop crime and terror but to monitor the American people to make sure they are not thinking those double-plus ungood thoughts about how this nation is being run!

Webmaster's Commentary: 

I forgot to put this up yesterday. Here is how I beat the NSA 6-0!

Optional Banner: 
WRH Exclusive
May 10 15:12

Hacker Arrested and Jailed After Exposing Flaws in Election Website

By Claire Bernish

A hacker in Florida exposed security vulnerabilities in one county’s elections web domains so officials could fix the problem — but, instead, he ended up behind bars.

Hacker, David Michael Levin, owner of Vanguard Cybersecurity, was arrested on Wednesday after the Florida Department of Law Enforcement received a referral from the Lee County Sheriff’s Office after his apparently misguided attempt to help prevent election fraud by pointing out online vulnerabilities...

May 10 13:52

Apple's notebook shipments plummet

Apple was clobbered by a huge tumble in notebook shipments last quarter.
The company's shipments fell 40 percent in the first quarter of 2016 over the final quarter of 2015, market researcher TrendForce said Tuesday.

n/a
May 10 12:28

RESEARCHERS CREATE ELECTRONICS THAT CAN DISSOLVE IN YOUR BRAIN

Imagine brain implants that completely dissolve and fade away after a period of time.

That’s just what a team of researchers at the University of Pennsylvania have developed. They’ve created sensors, made of layers of molybdenum and silicon, that can monitor brain signals (and even deliver signals), and then melt away without a trace.

The research was published online in the journal Nature Materials, and represents a great forward leap in biosensing technology. According to lead researcher Brian Litt, MD, it bypasses “the risks, cost, and discomfort associated with surgery to extract current devices used for post-operative monitoring.”

May 10 10:46

Here’s PROOF Hillary lied about being hacked

In other words, the email server that contained the former president’s personal files – including, perhaps, his White House doodles – was the same as the server Clinton used for storing classified government information.

And by releasing the doodles, Lazar lent credence to his claims that he repeatedly broke into the Clintons’ personal server. And Hillary Clinton’s failure to protect classified national security information should lead to criminal charges.

Lazar, apparently, wasn’t the only one to break into the server. He told Fox News last week he saw that the server had been accessed by at least 10 different IP addresses all over the world.

Hillary Clinton has tried to dismiss the hacker’s claim, but the new revelation gives the hacker serious credibility.

May 10 10:44

Emails From Hillary Clinton’s IT Director at State Department Appear to Be Missing

The State Department said today it can’t find Bryan Pagliano’s emails from the time he served as Secretary of State Hillary Clinton’s senior information technology staffer during her tenure there.

Pagliano would have been required to turn over any official communications from his work account before he left the government. State Department officials say he had an official email account, but that they can't find any of those records he would have turned over and continue to search for them.

“The Department has searched for Mr. Pagliano’s email pst file and has not located one that covers the time period of Secretary Clinton’s tenure,” State Department spokesman Elizabeth Trudeau said today, referencing a file format that holds email.

May 10 10:34

FLASHBACK - VIRTUAL 9-11: Will the US & Israel Hack The US Banking System Computers and Falsely Blame It On Iran (or Syria or Russia or China)?

So what it looks like is being planned, and pre-sold to the American people with all these stories about celebrities' personal information being hacked and made public (an activity that produces no profit for the hackers other than news headlines), and the "Syrian" (nudge nudge wink wink) hack of the AP Twitter feed that shocked the US stock market, is that the US Government will itself take down the US financial computers, and blame it on Iran /Russia/ China/Al Qaeda/Syria/Arabs and others to be named as convenient. This gets Wall Street and Washington DC off the hook, because now the financial melt-down is an act of war, rather than the result of decades of Wall Street crime and corruption and the predations of Private Central Banks. US banks have already been hit with cyber attacks, to set the stage.

May 10 09:58

‘Next Major Marketplace’: Siri Creators Unveil Viv, A Bot To Replace App Stores

Apple’s virtual assistant, known as Siri, is on the verge of becoming obsolete. Wowing users with conversation and instant knowledge is one thing, but Viv, the latest artificial intelligence bot from Siri’s creators, can do much more.

For as long as Siri has been around, four years, creators Dag Kittlaus and Adam Cheyer have been developing Viv, and on Monday, the public got its first look at what she … er, it can do.

May 10 09:40

Former Facebook Workers: We Routinely Suppressed Conservative News

Facebook workers routinely suppressed news stories of interest to conservative readers from the social network’s influential “trending” news section, according to a former journalist who worked on the project. This individual says that workers prevented stories about the right-wing CPAC gathering, Mitt Romney, Rand Paul, and other conservative topics from appearing in the highly-influential section, even though they were organically trending among the site’s users.

May 10 09:34

Prince of pop trash PerezHilton pwned, visitors hit with cryptxxx

Pop trash giant PerezHilton.com has served the world's most dangerous exploit kit to some of its 500,000 daily visitors.

The site is home to Hollywood and celebrity news and has been pwned before under hugely successful malvertising campaigns using the dominant Angler exploit kit.

May 10 08:39

Amazon Targets YouTube With New Online Video Posting Service

Amazon.com Inc. will let people post videos to its website and earn money from advertising, royalties and other sources, putting the company in more-direct competition with Google’s YouTube.

Amazon already offers movies and television programs over the Internet -- including its own original productions -- to compete with Netflix Inc. The new product will let Amazon give consumers more options about what to watch without an upfront fee because many of those posting videos will be paid based on how their content performs. Competing streaming services have been driving up the cost of this material.

Webmaster's Commentary: 

If Amazon promises not to censor videos or alter view counts I am ready to switch over!

May 10 08:20

‘Unprecedented’: UK Activist Fearing US Extradition, 99yr Sentence Awaits Landmark Court Ruling

UK authorities have hijacked a civil suit launched by a cybersecurity expert from Suffolk accused of hacking into the Federal Reserve, in a move that has sinister implications for journalists and others who rely on encrypted data storage and communications.

May 09 17:51

272 million emails hacked: Yours may be among them

So has one of your email accounts been hacked?By some accounts, there are over 2.5 billion email users in the world today, and there may be as many as 3.9 billion active email accounts.

May 09 16:27

Facebook's newest privacy problem: 'Faceprint' data

A court case moves forward over whether the social network is breaking the law for not asking your explicit permission for scanning and storing your facial features.

May 09 15:22

Twitter Bans US Intelligence Access To Dataminr Analytics – Report

Twitter has banned the US intelligence agencies from using a service called Dataminr, which searches through real-time tweets to detect newsworthy events, including terror attacks and protests.

n/a
May 09 14:51

JUDICIAL WATCH LAWSUIT UNCOVERS MORE HILLARY CLINTON EMAILS WITHHELD FROM STATE DEPARTMENT

Judicial Watch today released new State Department emails (one batch of 103 pages, the second of 138 pages) that again appear to contradict statements by former Secretary of State Hillary Clinton that, “as far as she knew,” all of her government emails were turned over to the State Department and that she did not use her clintonemail.com system until March 18, 2009.

Judicial Watch recently released Clinton State Department emails dating from February 2009 that also call into question her statements about her emails.

The documents were obtained by Judicial Watch in response a court order in a May 5,2015, Freedom of Information Act (FOIA) lawsuit filed against the State Department, after it failed to respond to a March 18 FOIA request (Judicial Watch, Inc. v. U.S. Department of State (No. 1:15-cv-00684)). The lawsuit seeks:

May 09 13:42

Editing Reality: Former Employees Admit Facebook Censors Conservative News

Now it's officially admitted.

We know Twitter works the same way and so does Google’s “breaking” and “trending” news. We can tell ourselves that people will go elsewhere to read and vet news, but come on. We live in a world where the average human attention span is now smaller than that of a goldfish.

To act like the Internet isn’t powerful enough to influence reality, including protests, politics and even the outcome of elections, is just wishful thinking.

(read more)

May 09 10:28

Why Did NBC News Sit on Explosive Story About Clinton's Alleged Hacked Email Server For Weeks?

According to the NBC News press release, Lazar was interviewed by reporter Cynthia McFadden from a Bucharest prison, where he admitted to also hacking into Clinton’s private e-mail account.

So, it stands to reason that McFadden conducted the interview before he was extradited to the U.S. which means NBC News was sitting on these explosive claims for more than one month. Which raises the question, why would a major news network sit on such an explosive allegation — especially when the claim directly relates to a presidential candidate and the biggest story the 2016 presidential election cycle?

The delay cost them what would’ve been a huge exclusive....We reached out to NBC News for clarification and a spokesman declined to comment at this time.

Webmaster's Commentary: 

May 09 10:00

Twitter Says No to Intelligence Agencies’ Plans for Social Media Surveillance

By Joe Wright

Over the past several years I have been reporting on the disturbing open-door policies that social media companies have been granting to data collectors of every stripe. These forums for public discussion, debate, and general communications have become a temping source of centralized information for any entity that trades in mining personal information – perhaps most of all, the U.S. government...

May 09 09:25

FBI Makes MASSIVE Move Against Hillary Clinton! It’s Happening!

Unfortunately, President Obama may be working behind the scenes to prevent criminal charges being filed. Hillary Clinton must be reminded that she is not above the law.

And considering the many laws she has broken, the American people deserve to learn the truth about Hillary before the elections in November.

Webmaster's Commentary: 

I have no confidence that the FBI will do their job. The FBI have been the protectors of the Clintons going all the way back to the murder of White House Deputy Counsel Vincent Foster and Hillary can blackmail the FBI with that to force their cooperation in more coverups. Already, we see the propaganda coming out that regardless of what Hillary did, she had no intention of doing wrong, therefore she is innocent. That is ridiculous. You probably don't intend to run a red light and kill a pedestrian, but if you do, you will probably go to jail.

In any event, Title 18 includes exposure of state secrets through negligence as a prosecutable crime and we have Hillary's June 17, 2011 email to Jacob Sullivan ordering him to strip the classification headers off of a document and send it to her via non-secure means. It doesn't matter what was in the document or even if Jacob did it nor not. The giving of that order is a violation of Title 18 Section 793.

Hillary's giving that order means she knew she was in possession of classified documents, at a time when the only email server she was using was her private server.

Title 18 also provides that anyone in violation of any section of Title 18 is BANNED FROM PUBLIC OFFICE!

May 09 08:07

How was this Windows Store app able to download adware to a Windows 10 PC?

Apps from the Windows Store run in a highly restricted sandbox and have to be approved before they can be listed. So why was this app able to automatically download an executable file that multiple virus scanners identified as potentially dangerous?

Webmaster's Commentary: 

The one thing we know for certain is that the promised increase in safety and security under Windows 10 is a myth!

May 09 08:01

Former Facebook Workers: We Routinely Suppressed Conservative News

Facebook workers routinely suppressed news stories of interest to conservative readers from the social network’s influential “trending” news section, according to a former journalist who worked on the project. This individual says that workers prevented stories about the right-wing CPAC gathering, Mitt Romney, Rand Paul, and other conservative topics from appearing in the highly-influential section, even though they were organically trending among the site’s users.

May 08 20:56

Police Surveillance System Downloads Your Cellphone Images, Sends Them to Investigator

Receiving Mail From a Former Criminal May Land Your Home a High-Threat Score From Law Enforcement

May 08 16:53

Google, Chrysler Team Up on Minivans; GM, Lyft Test Self-Driving Electric Taxis

It appears my allegedly optimistic path for self-driving vehicles on the roads by 2020 may not have been optimistic enough. Tests of self-driving taxis will take place within a year in a deal between GM and Lyft. In a second deal, Chrysler and Google have teamed up on a self-driving minivan. In Germany, self-driving trains will interconnect with self-driving autos to form self-driving door-to-door networks.

May 08 14:24

Facebook Sued Over Facial Recognition, Judge Refuses To Throw Case Out

Facebook’s motion to dismiss a lawsuit over its facial recognition software was denied on Friday, meaning that the three users who claim the social network’s photo-tagging system violates their privacy will now get a full hearing.

n/a
May 08 09:04

Israel enlists US Homeland Security to gag its own citizens online

There are two faces of Israel. One, which is presented to the world, shows a happy people in a land of contentment. The other, nowadays manifesting itself on Israeli social media, is full of discontent about the corruption and the mistreatment of citizens. Negative opinion polls soon “disappear” and are impossible to trace. This is especially the case where the issues concern the justice system, the welfare authorities or the police.

In Israel, it is a crime to “insult a public official’, even when the “insult” is nothing more than a blog or social media post questioning a decision or action. The fines are high, and those who write can also face a prison sentence of six months. Social media sites are constantly monitored by the authorities and the mere mention of a name can result in an arrest.

Life is becoming dangerous for activists who blog – patriots who advocate reform and campaign for justice by exposing corruption.

May 08 08:36

Microsoft Confirms 'Free' Windows 10 Will Become Expensive

Has the Windows 10 free upgrade offer been a success? I suspect history will see it as mixed.

On the plus side Microsoft says over 300M PCs now run Windows 10 just 10 months after launch. But on the other Microsoft has taken a $1.5BN hit to give these copies away, adoption hasn’t been greatly faster than Windows 7 and the company has been rightly savaged for some of the sneaky and often downright scandalous tactics it has employed to push users to upgrade.

All in all, I suspect there’s still a lot more to come from Windows 10 both good and bad...

May 07 18:48

FLOOD OF ABUSIVE PIRACY NOTICES CRASHED VERIZON’S MAIL SERVER

Verizon is taking a stand against the millions of invalid DMCA notices it receives for allegedly pirating subscribers. At one point the ISP received two million piracy warnings in one day from anti-piracy outfit Rightscorp, which effectively crashed one of Verizon's mail servers.

May 07 18:31

The connected car may be the dumbest idea ever, but it’s not going away

How long before every new car for sale is connected—and hackable?

May 07 10:51

NSA Silent on Spies’ Child Porn Problem

Two senior U.S. intelligence officials said recently that defense and intelligence employees have an “unbelievable” amount of child pornography on their work computers and devices, and that child porn has been found on the systems of the National Security Agency, the country’s biggest intelligence organization.

Webmaster's Commentary: 

May 07 10:12

Washington Post BEX - Hillary Clinton is going to be exonerated on the email controversy. It won’t matter.

Prosecutors and FBI agents investigating Hillary Clinton’s use of a personal email server have so far found scant evidence that the leading Democratic presidential candidate intended to break classification rules, though they are still probing the case aggressively with an eye on interviewing Clinton herself, according to U.S. officials familiar with the matter.

Webmaster's Commentary: 

The "she didn't mean to do wrong" defense will not fly. If you run a red light and kill a pedestrian, you still go to jail even though you did not mean to do it. And, under Title 18, revealing secrets through negligence is still a crime.

On June 17, 2011, Hillary ordered her subordinate, Jacob Sullivan, to strip the classification headers from a document and send it via non-secure means. That is a violation of Title 18 Section 793. It doesn't matter what was in the document. It doesn't even matter of Jacob carried out the order. It is Hillary's issuing of the order that is a violation!

Remember China-gate from 1996? Then President Bill Clinton authorized the sale of sensitive US technology to China and Chinese money was donated to his re-election campaign!

Was Hillary playing the same game, selling US secrets delivered via a private server with weaker security than the Ashley Madison website in exchange for "donations" to her "charitable" foundation?

It is time to look past the server itself to what may be the biggest spy scandal in US history!

This is a cover-up, no different than when Washington Post Managing Editor Bob Kaiser spiked the story about drug running out of Mena, Arkansas by the Bush and Clinton White Houses, as part oif the Iran-Contra scandal!



Click for larger image

Please copy and share the above.

May 06 16:07

Survival Communications After a Collapse: “Pringles Can And Broadband Routers Could Create a WiFi Network”

Has anyone ever tried this, or think it will work in off-grid or survival communities?

Your best option, then, may be to set up your own community computer network – and the most sensible technology would be Wi-Fi, as the components are easily available. “You could loot a PC World for broadband routers and then hit a garage or supermarket for some Pringles cans,” says Bloch. “With those, you can probably build a reasonable network across a scorched suburb.”

Why a Pringle can? Well, it can be used to create a cantenna which would be capable of boosting a Wi-Fi signal from your computer. “Some students in Kansas made a cantenna that transmitted over 100 miles a few years ago,” says Bloch.

Read more at SHTFplan.com

May 06 14:54

KB3035583 Disables Windows 10 Upgrade Blocking?

Reports are rolling in today about KB3035583, which was recently reclassified in WSUS as Important. Administrators who have gone through the manual pains of blocking the Windows 10 upgrade for Windows 7 computers are finding that this newly rebrandished update is erasing those efforts. This change is being reported for both non-domain and domain-joined PCs.

As reported, after the update is installed, the Windows 10 Upgrade icon starts showing back up in the Windows 7 system tray.

If you notice this happening, you can reapply the registry modifications to continue to block the upgrade and they should work

May 06 14:53

Flaw-ridden bloatware puts nearly every Lenovo PC at risk from hackers

A security flaw in software that's preinstalled on millions of Lenovo devices lets malware run at the system-level.

May 06 14:48

Researchers prove PC viruses can spread via microphones

When the so-called "badBIOS" virus was found in October, transmitting itself by audio broadcasts at inaudible frequencies, it seemed incredible - and now we have proof-of-concept.

May 06 14:44

Microsoft half-bricks Asus Windows 7 PCs with UEFI boot glitch

A recent Windows 7 update partially bricks computers that have an Asus motherboard fitted, it emerged this week.

Windows 7 machines that have installed Microsoft's KB3133977 update may trigger a "secure boot violation" during startup, preventing the PC from loading the operating system, Asus said.

Though the KB3133977 patch has been out for a while, Microsoft has only this week changed its classification from "optional" to "recommended", meaning for many users it now automatically installs through Windows Update – and then borks the PC.

n/a
May 06 12:05

FBI Seeks To Keep Its Nationwide Biometric Database A Secret From Citizens

By Nicholas West

The FBI’s Next Generation Identification Biometrics Database went live nationwide in 2014 without much fanfare from the general public. Naturally, establishment media wasn’t there to give attention to the massive endeavor, even though from its inception it threatened the privacy of every single American...

Over the ensuing years, the prevalence of biometrics has only increased in everything from banking, to drones, to student IDs, to facial recognition billboards in public space, to voice recognition security. At this point it is unclear just how many biometric images might be stored in the database now that there are even more sources from which to cull data. And the FBI is would like to keep it that way….

May 06 10:41

BEX ALERT - Officials: Scant evidence that Clinton had malicious intent in handling of emails

Prosecutors and FBI agents investigating Hillary Clinton’s use of a personal email server have so far found scant evidence that the leading Democratic presidential candidate intended to break classification rules, though they are still probing the case aggressively with an eye on interviewing Clinton herself, according to U.S. officials familiar with the matter.

Webmaster's Commentary: 

This is the start of the "she meant well" defense, which does not apply in this case. Title 18 stipulates that negligence constitutes a violation.

Hillary clearly violated Title 18 Sec 7934 when she instructed Jacob Sullivan to strip the classification headers from a document and send it non-secure.

May 06 10:35

This is What Government Sponsored Mass Surveillance is Doing to Your Mind

Waking Times

Big Brother is watching you and he wants you to believe that if you have nothing to hide, then you have nothing to fear. This is a lie.

May 06 09:37

WHY DID THIS YOUNG APPLE SOFTWARE ENGINEER JUST COMMIT SUICIDE AT HIS COMPANY’S HQ?

A 25-year-old software engineer named Edward Mackowiak who worked for Apple has reportedly shot himself in the head at the company headquarters in Cupertino. His death was quickly ruled a suicide just hours later after police found no evidence of foul play at the scene.

What’s strange is how the company refused to give any details about what Mackowiak actually did there. The only information about his job was on a hastily removed Linkedin page. Gizmodo reports it was sparse as well, simply listing him as a software engineer at Apple. His Twitter account has also been quickly deleted. It’s as if the guy himself is being digitally erased post haste.

May 06 09:33

Tips On How To Find Out All The Data Google Has On You (17 pics)

It's not easy to find your "Web & App Activity" page.

May 06 09:10

Now Microsoft is breaking Windows 7 to get users to upgrade to Windows 10

Microsoft has made a change to an update for Windows 7 that can prevent certain systems from booting. While you might expect me to say, "good news, the software giant has fixed the problem", in fact what Microsoft has done is switch the update from "optional", to "recommended". So, on some systems, it will now install, and break Windows 7 automatically.

There is good news though, and that’s you can solve the problem and get your computer working again by (can you guess?) upgrading to Windows 10. Hooray!

May 06 09:05

Updategate: Microsoft suggests updating to Windows 10 to patch Windows 7

So now, if you have one of the affected motherboard and you keep your security updates automatic like wot Microsoft recommends, then your machine will stop working properly.

We should add it's not permanently bricked, but it will take some mucking about in the BIOS to fix and that's a pain even for an experienced computer user.

Microsoft has, by offering a workaround, suggested heavily that it won't be fixing the problem, though we have asked the question, so expect a response in about a fortnight.

But the real kicker is this piece of advice: "Note The Secure Boot feature is supported in Windows 10. To learn more about the security advantages of this feature and about the upgrade path from Windows 7 to Windows 10, go to the following Windows website"

Holy toledo, this company really knows how to rub people up the wrong way.

Webmaster's Commentary: 

So, Microsoft puts out a patch that wrecks Windows 7 machines, and the recommended "fix" is to update to Windows 10!

May 06 07:17

LAPD hacks iPhone 5s, proves they don't need Apple backdoor

On March 18, the LAPD brought in a "forensic cellphone expert" who apparently was able to override the phone's security and reveal its contents. Neither the identity of the expert or the methods used to hack the phone were revealed. Also, the version of iOS that April Jace's phone was running at the time is also unknown.

May 05 19:47

Judicial Watch Lawsuit Uncovers More Hillary Clinton Emails Withheld from State Department

Judicial Watch today released new State Department emails (one batch of 103 pages, the second of 138 pages) that again appear to contradict statements by former Secretary of State Hillary Clinton that, “as far as she knew,” all of her government emails were turned over to the State Department and that she did not use her clintonemail.com system until March 18, 2009.

Judicial Watch recently released Clinton State Department emails dating from February 2009 that also call into question her statements about her emails.

The documents were obtained by Judicial Watch in response a court order in a May 5,2015, Freedom of Information Act (FOIA) lawsuit filed against the State Department, after it failed to respond to a March 18 FOIA request (Judicial Watch, Inc. v. U.S. Department of State (No. 1:15-cv-00684)). The lawsuit seeks:

Webmaster's Commentary: 

And yet CNN and the FBI still insist they have found nothing wrong!

May 05 15:05

Daisy-chained research spells malware worm hell for power plants and other utilities

World’s first PLC worm spreads like cancer

May 05 15:00

Stop resetting your passwords, says UK govt's spy network

No, seriously, it's a bad idea. Honestly

May 05 12:30

Hillary Unleashes Million-Dollar Professional Internet Troll Army

Hillary Clinton-aligned Super PAC, Correct the Record, is taking a page out of Vladimir Putin’s playbook by employing a $1 million dollar professional internet troll army to build a paid, positive consensus about the Clinton campaign.

Webmaster's Commentary: 

... or to harass and attack websites like this one, which is going on right now.

May 05 10:59

Apple can be evil, too: Don’t miss this tale of how it cleared a guy’s music files

And Apple Music seems to have been rolled out with a lot of problems. It’s not just a matter of losing a few songs: James Pinkstone lost 122 GB of music files, called Apple’s helpdesk, and was told by an employee named Amber that this is the way the program is supposed to work. Some of what he lost were his own musical compositions.

May 05 10:57

Clinton’s Email Security Procedures Won’t Be Released Until After the Election

The State Department says it won’t release any documents relating to Hillary Clinton’s email security procedures and protocol until after the November presidential election.

Webmaster's Commentary: 

So, we are free to imagine the worst! :)

May 05 10:56

How a FOIA Request into Hillary Clinton's Emails Revealed a Criminal Investigation

Clinton had characterized the FBI's investigation as "routine," but the DOJ now refers to it as a "law enforcement proceeding."

May 05 10:00

HILLARY THE SPY?

Let us start with an historical fact. Treason and betrayal by the highest levels is a common feature of history, whether it is Judas vs Jesus, Brutus vs Julius Caesar, Benedict Arnold, the Rosenbergs, Jonathan Pollard, Aldrich Ames, Robert Hanssen. It is just a fact of life. It does happen.

Back in 1996, when Bill Clinton was running for re-election, he authorized the transfer of highly sensitive technology to China. This technology had military applications and allowed China to close the gap in missile performance with the United States. The transfers were opposed and severely criticized by the Defense Department.

Webmaster's Commentary: 

Reposted in light of today's story where Guccifer admits breaking into Hillary's private server, that it was actually very easy, and more importantly, while inside, he spotted at least ten foreign-based IPs also inside the server!

Optional Banner: 
WRH Exclusive
May 05 09:26

US judge says Clinton may have to testify in email lawsuit

A federal judge in Washington on Wednesday ordered that Democratic presidential candidate Hillary Clinton may have to testify in a lawsuit related to the private email server she used while secretary of state.

U.S. District Judge Emmet Sullivan said the parties in the case, the State Department and conservative watchdog group Judicial Watch, also struck an agreement about the scope of the testimonies that some of Clinton's former top aides will give in the case.

Those testimonies, known as discovery, will take place over the next eight weeks and may yield information that would require Clinton herself to be deposed, Sullivan said in an order.

May 05 08:20

Windows 10 updates are now ruining pro-gaming streams

Perhaps there’s nothing more annoying than going in for the kill to suddenly be “pooped on” by a Windows 10 automatic installation taking out your computer mid-stream to your 130,000 or so followers.

After deciding to advertise during the weather by attempting to automatically install midway through a forecast, Windows 10 is starting to wreak havoc with gamers. Ex-professional Counter Strike player turned full-time streamer Erik Flom was rudely interrupted mid-game and live on Twitch by Windows 10 automatically installing on his PC.

“What. What!? How did this happen! Fuck you Windows 10!” Flom screamed at the PC. “Oh my God! You had one job PC. We turned off everything. Update faster you fuck!”

Initial outrage flowed into jubilation as it appeared Windows 10 was nearing completion, only for Flom to have his hopes dashed by a second installation countdown.

n/a
May 05 08:15

Did your UK biz just pay £1,500 to stop a DDoS? You've been had

Empty threats from faux hackers doing the rounds again

May 05 08:06

Suck on this: White hats replace Locky malware payload with dummy

Locky normally spreads using malicious and disguised JavaScript inside email attachments supposedly containing an invoice or similar. Malicious messages are sent to prospective marks in spam runs.

Those on Windows machines who open the malicious attachment are likely to become infected, a process that results in user files getting encrypted. If this happens it’s normally impractical to recover scrambled files without paying crooks a fee in exchange for the private encryption key needed to recover compromised data.

The hack by as yet unidentified white hats meant that in place of the expected ransomware, “victims” were served with a 12kb binary with the plain message “Stupid Locky” that isn’t a valid executable, anti-virus firm Avira reports.

May 05 07:21

#DropOutHillary: Twitter Blows Up With Anti-Clinton Tirade

In light of two GOP candidates dropping out of the presidential race, the Twitter community is calling on Democrat Hillary Clinton to follow suit. The hashtag #DropOutHillary has skyrocketed to No.1 in US trends, spewing funny memes and mockery.

May 05 06:21

THE U.S. NAVY NOW HAS AN UNMANNED DRONE WARSHIP. COULD IT BE HACKED AT SEA?

The U.S. Navy and the Defense Advanced Research Projects Agency (DARPA) are now testing a new unmanned drone warship. The first Navy drone ship is a 132-foot ACTUV (Antisubmarine warfare Continuous Trail Unmanned Vessel) known as Sea Hunter, which cost around $120 million to build. The military says more can now be produced for $20 million or so each. But some are concerned that with no humans at the controls, these “robot ships” could be hacked, pwned remotely, and used by America's enemies to attack the United States.

May 05 06:11

FACEBOOK BLACKLISTS TRENDING NEWS STORIES DAILY, CONTRACTORS SAY

Speaking on condition of anonymity to Gizmodo’s Michael Nunez, several journalists, hired by Facebook in 2014 to oversee its secretive “trending news” project, revealed new details on how the company handles the day’s news. Known internally as “news curators,” the contractors say they were given the ability to “deactivate” or blacklist any trending topic if it wasn’t being covered by minimally “three traditional news sources.” “A topic was often blacklisted if it didn’t have at least three traditional news sources covering it, but otherwise the protocol was murky—meaning a curator could ostensibly blacklist a topic without a particularly good reason for doing so,” Nunez writes, although curators insist the system wasn’t abused.

May 04 23:05

Apple loses trademark fight over 'iPhone' name in China - BBC News

The ruling comes shortly after to Apple's latest results which showed a 13% drop in revenue on slower iPhone sales. Sales in China had plunged by 26%.

Apple is also facing difficulties in other operations in China.

n/a

n/a
May 04 14:32

Armada Collective: Who are the hackers extorting bitcoin ransoms and what can we do?

Move aside Anonymous – a new mysterious group of hackers is taking numerous firms and webmail providers offline using Distributed Denial of Service (DDoS) attacks, promising to stop if the victims pay bitcoin ransoms.

Webmaster's Commentary: 

I just received the following threat.

---

FORWARD THIS MAIL TO WHOEVER IS IMPORTANT IN YOUR COMPANY AND CAN MAKE DECISION!

We are Armada Collective.

http://lmgtfy.com/?q=Armada+Collective

Your network will be DDoS-ed starting 12:00 UTC on 08 May 2016 if you don't pay protection fee - 10 Bitcoins @ 1BNfJDyC5vR3Q1NPW14wufnUp9hNB4nRmn

If you don't pay by 12:00 UTC on 08 May 2016, attack will start, yours service going down permanently price to stop will increase to 20 BTC and will go up 10 BTC for every day of attack.

This is not a joke.

Our attacks are extremely powerful - sometimes over 1 Tbps per second. And we pass CloudFlare and others remote protections! So, no cheap protection will help.

Prevent it all with just 10 BTC @ 1BNfJDyC5vR3Q1NPW14wufnUp9hNB4nRmn

Do not reply, we will not read. Pay and we will know its you. AND YOU WILL NEVER AGAIN HEAR FROM US!

Bitcoin is anonymous, nobody will ever know you cooperated.

UPDATE: My server company says this is a hoax/scam.

May 04 09:48

FLASHBACK - HILLARY THE SPY? - POST THIS EVERYWHERE!

Let us start with an historical fact. Treason and betrayal by the highest levels is a common feature of history, whether it is Judas vs Jesus, Brutus vs Julius Caesar, Benedict Arnold, the Rosenbergs, Jonathan Pollard, Aldrich Ames, Robert Hanssen. It is just a fact of life. It does happen.

Back in 1996, when Bill Clinton was running for re-election, he authorized the transfer of highly sensitive technology to China. This technology had military applications and allowed China to close the gap in missile performance with the United States. The transfers were opposed and severely criticized by the Defense Department.

Webmaster's Commentary: 

Optional Banner: 
WRH Exclusive
May 04 09:25

NEW RESEARCH LINKS CELL PHONES TO CANCER & OTHER ISSUES IN CHILDREN

The studies link cell phones to a slew of health issues in children. That’s why experts say parents and expecting mothers need to be extra careful. Cell phones are a part of our every day lives and a cause for concern for researchers who see them as a health risk — especially for infants and children. “The weight of the evidence is clear: cell phones do cause brain cancer,” said Dr. Devras Davis, president, Environmental Health Trust.

May 04 08:57

Has YOUR account been hacked? Hundreds of millions of passwords stolen from Google and Yahoo users in major security breach

If you have a Gmail, Hotmail or Yahoo email account, you may want to update your password.

A new report has found that Russia's criminal underworld is trading hundreds of millions of stolen usernames and passwords belonging to these accounts.

This is according to a Reuters investigation, which spoke to Alex Holden, founder and chief information security officer of Wisconsin-based Hold Security.

Holden, who last year uncovered the largest data breach to date, claims that the details of 272.3 million stolen accounts are now being traded.

Webmaster addition; Why? How useful is someone's Google account to a criminal? I think Hold Security is just grabbing some free publicity by cashing in on the present Russia-bashing fever.

May 03 16:56

Google Now Has Access To Millions of Patients’ Medical Records

By Michaela Whitton

A controversial deal between tech giant Google and the National Health Service (NHS) will allow artificial intelligence units access to 1.6 million confidential medical records. Since 2014, Google has partnered with several scientists in an attempt to understand human health, but a new report reveals the data gathering goes far beyond what was originally anticipated...

May 03 15:45

Security of critical phone database called into question

Federal officials fear that national security may have been jeopardized when the company building a sensitive phone-number database violated a federal requirement that only U.S. citizens work on the project.

The database is significant because it tracks nearly every phone number in North America, making it a key tool for law enforcement agencies seeking to monitor criminal or espionage targets.

Now Telcordia, a Swedish-owned firm, is being compelled to rewrite the database computer code — a massive undertaking — to assuage concerns from officials at the FBI and Federal Communications Commission that foreign citizens had access to the project. These officials fear that if other countries gain access to the code, they could reap a counterintelligence bonanza, learning the targets of U.S. law enforcement and espionage investigations.

May 03 15:42

First, there were wearables. Now, there are swallowables

In the evolution of computing, from the desktop computer to the smartphone to the watch, it seemed like just a matter of time before the technology would come to be swallowable — and now it is.

The innovation at the heart of it is an FDA-approved ingestible sensor housed in pills, designed to help patients adhere to the medications their doctors prescribe. Except the sensor isn't powered by a battery, it's powered by the gut of the patient swallowing it, using technology discovered two centuries ago.

"Make this mandatory!" - Official White Horse Souce

May 03 15:38

Windows 10 growth stalls in April

Microsoft's current OS grabbed a 14.35 percent slice of all Web traffic in April, according to Web tracker Net Market Share. That number showed almost no growth from the 14.15 percent in March and followed several months of relatively healthy gains.

May 03 15:35

Turns out that making TV sets smarter may not have been the world's brightest idea

Smart TVs are frequently plagued with confusing interfaces, buggy functions and inconsistent updates. They are sometimes mysteriously unable to run new streaming services and may never be updated to add new features to the ones they do run.

Worse, some TV makers focus on bringing new features only to their latest models in an effort to persuade people to buy new sets. Samsung's 2016 models, for instance, implicitly inform anyone who bought last year's sets that they've already been left behind. Those earlier customers won't be able to use their Samsung TVs to set mood lighting or check security cameras in a connected home.

Among the new features in LG's 2016 models: Magic Zoom, which will let viewers zoom in on video while it's playing — using a digital magnifying glass — to make out small text and other details. But LG won't say when, if ever, older TVs will get that.

May 03 15:28

Extreme photo-bombing: Bad ImageMagick bug puts countless websites at risk of hijacking

Whenever you upload a profile photo, a gallery of snaps, or a silly meme to a website, there's an extremely high chance that the site is using ImageMagick, an open-source collection of image processing tools, to resize, crop and tweak the pictures.

By feeding booby-trapped data – such as a poisoned selfie – to web services using ImageMagick, it may be possible to execute malicious code on the website's server. From there hackers can start infiltrating the system to steal secrets, snoop on people's accounts, and so on.

May 03 15:26

Yay! It's International Patch Your Scary OpenSSL Bugs Day!

Six security patches – two of them high severity – have been released today for OpenSSL 1.0.1 and 1.0.2.

Last week, the open-source crypto-library project warned that a bunch of fixes were incoming, and true enough, Tuesday’s updates address serious flaws that should be installed as soon as possible.

May 03 15:11

NSA to Spy On Own Employees Everywhere, All the Time

A National Security Agency official is seeking the ability to track employees on their personal computers, as well as at office workstations, to ensure they are not participating in illegal activities, including downloading child pornography, or leaking state secrets.

May 03 14:20

German nuclear plant infected with computer viruses, operator says

A nuclear power plant in Germany has been found to be infected with computer viruses, but they appear not to have posed a threat to the facility's operations because it is isolated from the Internet, the station's operator said on Tuesday.

Webmaster's Commentary: 

As the Iranians found out, the air-gapped computers running the systems can still be infected with flash drives. Back during Desert Storm, Iraq's military computers all crashed, even though they were not connected to the internet. The intrusion was reported to have been done via a Hewlett Packard printer that had been "modified" prior to delivery.

May 03 13:23

Snowden: "We Are Like Tagged Animals"

In a new piece out in The Intercept, whistleblower Edward Snowden has summed up what smart phones really are...

(read more)

May 03 09:48

This is what government sponsored mass surveillance is doing to your mind

Big Brother is watching you and he wants you to believe that if you have nothing to hide, then you have nothing to fear

May 03 08:55

Police Can Force You to Use Your Fingerprint to Unlock Your Phone

But they can’t make you cough up your passcode.

May 03 08:46

The ‘spying billboards’ that track you as you walk by

Anybody who walks or drives past new tracking billboards with a mobile phone in their pocket can be spied on without their knowledge or consent: a potential invasion of privacy that US Senator Charles E. Schumer wants the US Federal Trace Commission (FTC) to investigate.

May 03 08:18

World Jewish Congress slams YouTube over neo-Nazi videos

The World Jewish Congress (WJC) sent Philipp Justus, the managing director of the German unit of YouTube parent company Google, a letter demanding more decisive action to take down illegal material praising the Holocaust and Adolf Hitler.

Webmaster's Commentary: 

"But, but, but, your people posted those videos! We thought you WANTED them up there!!!!!" :)

May 03 06:19

Did you know that billboards are spying on you now?

Not only do billboards now interact with you and your smartphone to target you for marketing purposes, police are also using billboards to track you.

n/a
May 02 16:57

F-35s failed 'scramble test' because of buggy software

At Mountain View in Utah, the US Air Force decided too take the six F-35As out for a spin in a simulated scramble, but the results were disappointing:

“The Air Force attempted two alert launch procedures during the Mountain Home deployment, where multiple F-35A aircraft were preflighted and prepared for a rapid launch,” wrote Gilmore, “but only one of the six aircraft was able to complete the alert launch sequence and successfully takeoff”.

He continues: “Problems during start-up that required system or aircraft shut-downs and restarts – a symptom of immature systems and software – prevented the other alert launches from being completed”.

n/a
May 02 14:02

ISIS Releases New Kill List of 3,600 Random New Yorkers — FBI to Visit Each Personally

Now we’re supposed to believe that ISIS’ Caliphate Cyber Army has leaked the names and home and email addresses of 3,600 average people living in New York, urging terrorists to randomly target and kill them because… terror?

The info was reportedly posted on an ISIS-only channel along with the statement, “We want them #Dead” — because even terrorists know the importance of hashtags.

Meanwhile, this situation is being taken so seriously, it is being reported that police and the FBI are going to personally visit each person on the list and warn them that they have been personally threatened by ISIS… so they can… do…

What exactly?

(read more)

May 02 14:01

‘Now Live-Tweet Bay Of Pigs’: CIA Lambasted Online For Live-Tweeting Bin Laden Kill

The CIA ‘live-tweeted’ the raid on Osama bin Laden’s compound in Pakistan five years on, reporting the operation as if it were happening right now. Some found the social media exercise distasteful and arrogant.

n/a

SHARE THIS ARTICLE WITH YOUR SOCIAL MEDIA