Aug 25 08:20

Donald Trump: Hillary Clinton set up email server with 'premedication'

Donald Trump intended to say Wednesday that Hillary Clinton's use of an email server during her tenure at the State Department was an act of "premeditation."

But when he flubbed the line and instead suggested it was due to "premedication," he embraced that possibility as well.

"Hillary Clinton created an illegal private email server -- deliberately, willfully and with total premedication -- premeditation," Trump said, correcting himself. He then added: "Could be the first way was right actually."

"You know, I might like the first way better. 'Premedication,' that's a very -- premedication, I think I like it. Wow," Trump continued as the crowd cheered him on.

Webmaster's Commentary: 

That's one of Trump's qualities, he can think on his feet. He doesn't need a handler to whisper in his ear, "You're okay. Keep talking", the way Hillary does.

Aug 24 19:21

Use a VPN or Your Google Searches Are Public

Our research and development team recently stumbled onto something which puts the AOL search debacle to shame. The discovery we’ll describe should serve as a serious and urgent warning. If Google searches are not conducted through a VPN or Tor, you are running the risk that those searches are made public and linked to your IP address.

Aug 24 19:19

Germany, France demand golden key AND strong encryption just when you thought politicians had clued in to basic reality

In a new level of dumb, Germany and France are demanding strong encryption for all citizens at the same time as they demand this strong encryption to be breakable. They also demand messaging providers of end-to-end encryption to provide police with keys they don’t have, and for terrorists to stop using freely available strong encryption without a messaging provider. You really couldn’t sound dumber if you tried.

Aug 24 16:29

North Korea launches a Netflix-style streaming service called Manbang

Some days, life just throws you a giggle. Today is one of those days.

The Democratic People’s Republic of Korea (aka North Korea) has announced a new Netflix-style on-demand streaming service. It’s called Manbang.

In Korean, ‘manbang’ means ‘everything.’ In English-speaking countries, it has some different connotations. Obviously.

Aug 24 16:25

BU researcher creates images from single photons

“It’s natural to think of light intensity as a continuous quantity, but when you get down to very small amounts of light, then the underlying quantum nature of light becomes significant,” says Vivek Goyal, an associate professor of electrical and computer engineering at Boston University’s College of Engineering. “When you use the right kind of mathematical modeling for the detection of individual photons, you can make the leap to forming images of useful quality from extremely small amounts of detected light.”

Goyal’s study, “Photon-Efficient Imaging with a Single-Photon Camera,” was a collaboration with researchers at MIT and Politecnico di Milano. Funded by the National Science Foundation, it combined new image formation algorithms with the use of a single-photon camera to produce images from about one photon per pixel.

Aug 24 14:40

Clinton to be Questioned Under Oath on Origins of Email Server

Hillary Clinton will soon face questions under oath about the reasons she set up and maintained a private email server during her four years as secretary of state. -- Tom Fitton, president of Judicial Watch, told the Washington Examiner that his group is preparing a set of written questions for Clinton as part of the Freedom of Information Act lawsuit that has already extracted hundreds of documents from the State Department.

Aug 24 14:33


The United States has been kidnapped by the National Security Act, as shown so well, in this interaction between Congressman Jason Chaffetz (R-UT) and Charles McCullough, Intelligence Community Inspector General (ODNI OIG), during a hearing of the United States House Committee on Oversight and Government regarding the High Security nature of Hillary Clinton's emails.

When asked by Rep. Chaffetz which intelligence agency is in possession of the "hot" emails, McCullough responds that those who have "ownership" of them will not release any information about them, as they are characterized as "ORCON" (Originator Controlled). Furthermore, McCullough cannot say which actual agency is in possession of these emails, "In an open hearing."

Aug 24 13:52

Homeland Security: DHS To Monitor Visa-Waiver Applicants’ Social Media

The process for visa-waiver applicants has been under fire from US citizens and politicians alike. But one program in particular, monitoring the social media presence of foreign visitors, is being targeted by a wide coalition of civil liberties groups.

Aug 24 09:49

Did Hillary Clinton Violate the Espionage Act?

Contributions, either directly, or indirectly to Clinton’s Foundation are more than a “Conflict of Interest”. Since her job description was to specifically protect US interests, any remuneration could be prosecuted under the Espionage Act of 1917. In the words of Woodrow Wilson:

“There are citizens of the United States, … who have poured the poison of disloyalty into the very arteries of our national life; who have sought to bring the authority and good name of our Government into contempt, to destroy our industries wherever they thought it effective … to strike at them, and to debase our politics to the uses of foreign intrigue …

They have formed plots to destroy property, they have entered into conspiracies against the neutrality of the Government, they have sought to pry into every confidential transaction of the Government in order to serve interests alien to our own.”

Webmaster's Commentary: 


Aug 24 08:34

Yahoo now censoring!

Webmaster's Commentary: 

I am getting emails from readers saying that when they access using Yahoo, they get a warning message that the link is not authorized by Yahoo, and that visiting my site is risky!

Aug 24 08:21

University hit 21 times in one year by ransomware

Universities and NHS trusts in England have been hit hard by ransomware in the last year, according to Freedom of Information requests carried out by two cybersecurity firms.

Bournemouth University, which boasts a cybersecurity centre, has been hit 21 times in the last 12 months.

Twenty-eight NHS Trusts said they had been affected.

Aug 24 08:10

Pokémon Go loses its luster, sheds more than 10 million users

Engagement, downloads, and time spent in the app are fading fast.

Aug 24 08:07

Hacked hookup site Ashley Madison's security was laughable

The report finds the site's security practices were a treat: the company stored its VPN password on Google Drive, making it easy to obtain for anyone who accessed any employee's machine. Once an attacker was on the inside, they'd find that some passwords were stored as plain text, in emails (apparently the idiots used “here's your password” emails at some point), and in text files on the company's servers.

“In addition, encryption keys were stored as plain, clearly identifiable text on ALM [Avid Life Media, the company that once ran AshMad - Ed] systems, potentially putting information encrypted using those keys at risk of unauthorized disclosure. Finally, a server was found with an SSH key that was not password protected. This key would enable an attacker to connect to other servers without having to provide a password”, the report adds.

Aug 24 08:06

Kelly File 8/17/16 FULL: Hillary's Top Secret Classified Emails Released

Webmaster's Commentary: 

She had to copy the information to put it on unsecured server

Aug 24 08:05

Google broke its own cloud by doing two updates at once

Right hand, meet left hand. Then both do a facepalm

Aug 24 07:58

Encryption under fire in Europe as France and Germany call for decrypt law

A fresh chapter of the crypto wars looks to be opening up in Europe, after the French and German interior ministers took to a podium yesterday to lobby for a law change that would enable courts to demand that Internet companies decrypt data to help further criminal investigations.

So, in other words, to effectively push for end-to-end encryption to be outlawed. Yes we’ve been here before — many times.

Aug 24 07:54

Windows 10 tip: Shut down OneDrive completely

Windows 10 and OneDrive are sewn together tightly. So tightly, in fact, that OneDrive gets its own node in File Explorer, and the OneDrive sync client runs automatically at startup.

You don't have to use OneDrive's cloud storage. Maybe you prefer a cloud service from another provider, or perhaps you're philosophically opposed to storing files in the cloud. Regardless of the reason, if you don't want to use OneDrive, you are free to ignore it.

When the sync client pops up asking you to sign in, just click Cancel.

That option does, however, leave the OneDrive icon in the navigation pane of File Explorer. To make it disappear, you need to make a simple registry edit.

Aug 24 07:30

Windows 10 cumulative update KB 3176934 breaks PowerShell

Microsoft's update for version 1607 doesn't fix two widespread problems with Windows 10 Anniversary Update, and it breaks PowerShell DSC operations

Aug 23 17:03

20% of scientific papers on genes contain gene name conversion errors caused by Excel

According to three scientists, Mark Ziemann, Yotam Eren, and Assam El-Osta, Microsoft Excel has trouble converting gene names. In the scientific article, titled “Gene name errors are widespread in the scientific literature,” article’s abstract section, the scientists explain:

“The spreadsheet software Microsoft Excel, when used with default settings, is known to convert gene names to dates and floating-point numbers. A programmatic scan of leading genomics journals reveals that approximately one-fifth of papers with supplementary Excel gene lists contain erroneous gene name conversions.”

Aug 23 16:58

NSA-linked Cisco exploit poses bigger threat than previously thought

An exploit dubbed ExtraBacon contains code that prevents it from working on newer versions of Cisco Adaptive Security Appliance (ASA), a line of firewalls that's widely used by corporations, government agencies, and other large organizations. When the exploit encounters 8.4(5) or newer versions of ASA, it returns an error message that prevents it from working. Now researchers say that with a nominal amount of work, they were able to modify ExtraBacon to make it work on a much newer version. The finding means that ExtraBacon poses a bigger threat than many security experts may have believed.

Aug 23 12:30

New York Times Tech Columnist Calls on Google to Hide Hillary Health Info

New York Times tech columnist Farhad Manjoo is calling on Google to “fix” its search engine results to hide evidence of Hillary Clinton’s failing health.

“Go online and put down, ‘Hillary Clinton illness,’ and take a look at the videos yourself,” Rudy Giuliani recently said on Fox News, during an argument about how sick Clinton really is.

Aug 23 10:01

Judge Orders Written Testimony From Hillary Clinton on Emails

A federal judge on Friday ordered Hillary Clinton to provide written testimony under oath about why she set up a private computer server to send and receive emails while secretary of state, ensuring that the issue will continue to dog her presidential campaign until the eve of the election.

In a brief ruling issued on Friday afternoon, the judge, Emmet G. Sullivan of Federal District Court in Washington, approved a motion by the conservative advocacy organization Judicial Watch to pursue its vigorous campaign to expose Mrs. Clinton’s use of the private server. In addition to requiring her testimony in writing, the judge allowed the group to depose a senior State Department aide who had warned two subordinates not to question her email practices.

Aug 23 08:32

Shocking Netflix SCAM hits Apple iPhone users

The scam email, which is designed to look like an invoice from Apple, claims you have recently purchased and downloaded a Netflix app from the iTunes Store.

Apple customers are told they have been billed more than £36 for a Netflix subscription purchased from the App Store.

However the fake invoice is another clever ploy to scare people into clicking the prominent Cancel and Manage Subscriptions link at the foot of the email.

This link does not appear on official Apple invoice emails. However the one in this scam email links to a fraudulent webpage.

Aug 23 07:36

Colin Powell Just Revealed The DEVASTATING TRUTH About Hillary’s Email Scandal!

But Powell, who had said last week in a statement that he had no recollection of the conversation, told Page Six at Saturday’s Apollo in the Hamptons event, “The truth is she was using it (her personal email) for a year before I sent her a memo telling her what I did [during my term as Secretary of State].

“Her people have been trying to pin it on me.”

When asked why Clinton’s team were attempting to blame him, he responded, “Why do you think?”

Aug 23 07:35

REPORT: Hillary’s Top Aide Left BUSTED For Mishandling Classified Info!

Bombshell e-mails released on Monday have revealed that Hillary Clinton’s top aide at the State Department, Huma Abedin, carelessly left sensitive materials in the front seat of her car.

Abedin e-mailed a personal assistant asking for a “favor” involving “a bunch of burn stuff in the pocket of my front seat.”

She asked the assistant to move the material to her vehicle’s trunk, presumably realizing that the “burn stuff” is highly sensitive material that needs to be destroyed by the State Department.

Aug 23 07:20

Microsoft's maps lost a city because it used bad Wikipedia data

Microsoft has laid part of the blame for Bing Maps' mis-location of the Australian city of Melbourne by a whole hemisphere on Wikipedia.

Yes, Wikipedia, “the free encyclopaedia that anyone can edit.”

Aug 23 07:17

'NSA' hack okshun woz writ by Inglish speeker trieing to hyde

The script appeared to be written by an author with slippery command of English, riddled with grammatical and structural errors.

Argamon, a researcher with Taia Global and computer science professor at the Illinois Institute of Technology says initial analysis of the sentence structure and in grammatical errors indicates a false flag as errors appear to have been deliberately introduced by a native English speaker

"The texts contain a variety of different grammatical errors that are not usual in the English of US native speakers," Argamon says in analysis.

"While no one of these factors is dispositive, the cumulative effect of these multiple lines of evidence leads to the conclusion that the author is most likely a native speaker of US English who is attempting to sound like a non-native speaker by inserting a variety of random grammatical errors."

Aug 23 07:15

Kaspersky launches its own OS on Russian routers

Kaspersky Labs has finished building its eponymously-named operating system after four years of quiet development.

Little information about the OS has made it onto the English-speaking side of the internet. Kaspersky Labs Russia told Vulture South to wait a few weeks for the English press release for information.

What we do know is that in 2012 ebullient Kaspersky Lab chief executive officer Eugene Kaspersky described the OS as a ground-up build to help protect industrial control systems.

Aug 23 05:46

10 Orwellian moments found in the newly leaked private NSA newsletters

The Intercept recently began releasing batches of top secret internal newsletters from the most important division of the NSA, the Signals Intelligence Directorate, or SIGINT.

Aug 22 16:15

Anti-Piracy Operations Are Fabricating Links To Non-Existent Torrents In DMCA Notices

The anti-piracy groups understood just enough about how the torrent cache sites worked, that they automated sending takedowns based on torrent hashes on the assumption that those torrents would also show up via the cache sites. Okay, understandable. But here's the problem: they never checked to see if those links ever existed. Hell, it sounds like they never even visited again for at least the past two years.

And yet they sent takedowns for links there.

So how can these companies actually claim that they know these "files" are infringing, when they clearly never even checked the links, let alone the fact that the site they're accusing of infringement, hasn't even been up for two years?

The TorrentFreak article notes that this is not a one-off thing. They found other anti-piracy groups sending takedowns for more non-existent torrents on the same non-existing sites.

Aug 22 16:14

Windows 10 update is breaking millions of webcams - how to fix it

Microsoft said it is working to fix the problem, but it is not yet clear when the issue will be resolved.

In the meantime you can revert to the previous version of Windows if you really need your webcam to work. You have 10 days after you've updated your computer to the new software to roll back to the previous version.

To downgrade to an earlier version of Windows go to Settings -> Updates and Security -> Recovery. Under the "Go back to an earlier build" section click "Get started".

Microsoft will here ask you why you are choosing to revert your software then click "Next". Follow the steps on the screen and your device will have returned to Windows 10 version 1511.

Aug 22 14:54

Rivero challenges the NSA

The US Government insists their demand for a ban on strong encryption or back doors into all of our electrinic devices is to stop crime and terror.

But over the course of a year, as documented on this page, What Really Happened issued six encryption challenges based on systems of encryption created and programmed here on an air-gapped computer.

Now, I am not an encryption expert, and only a moderately decent programmer. The NSA would have a strong motive to break my codes to discourage others from creating their own systems of encryption.

None were ever solved.

Aug 22 11:06


Easy means of delivering secrets using the weak private email server. Easy means of accepting payment through a "charitable" foundation!

This is a perfect setup to repeat the 1996 selling of secrets for cash. In other words, a perfect espionage operation, running out the US State Department, with the weak email server providing the secrets and a charitable foundation to accept and launder the payments! Hillary doesn't have to physically steal the files, the way Jonathan Pollard did. Hillary doesn't have to scratch an X on a mailbox, the way Aldrich Ames did. Hillary doesn't have to tape bundles of stolen documents underneath a park bridge, like Robert Hannsen did!

It is time to look past the small scandal of the private email server at what may be a far larger scandal hidden behind it!

Webmaster's Commentary: 

Optional Banner: 
WRH Exclusive
Aug 22 10:36

Join the Hillary HACKATHON!

Webmaster's Commentary: 

This is Hillary Clinton's official web page. Use the "view source" option in your browser to see the actual encoding and read the message at the top. Given that it will probably vanish as soon as I hit the "send" button, here is a screencap.

The link in the message,, does to job openings at the Hillary campaign, and they are looking for software people, including Android experts for their "hackathon!"

Aug 22 10:06

Windows 10 Anniversary Update kills webcams, no fix until September

One of the big issues with the Windows 10 Anniversary Update is that it has broken some webcams. While Microsoft has apologized for the problem, there won't be a fix until September.

Aug 22 10:05

TIME Argues ‘Trolling’ Demands Formal Policing of the Internet

TIME magazine has written yet another horrible article, this one basically calling for the Internet to be controlled and censored because of too many “trolls.”

Webmaster's Commentary: 

The trolls are all working for the establishment!

Aug 22 09:58

FBI finds 15,000 more Clinton documents

The FBI has found thousands of documents Hillary Clinton failed to turn over to the State Department when she stepped down as secretary of state — ensuring more legal trouble for the Democratic presidential candidate and further mandatory disclosures.

The FBI uncovered nearly 15,000 documents in its year-long investigation into Clinton’s private email server, the Washington Post reported.

The documents, which could include email attachments and duplicates, have been sent over to the State Department.

“FBI found almost 15,000 new Clinton documents. When will State release them? Court hearing today,” Judicial Watch President Tom Fitton said on Twitter.

Aug 22 09:16

The Direct Democracy President

In my opinion, Trump is likely to be the first direct-democracy president. He’ll do what the public wants and avoid doing what they dislike. The public expects its leaders to try and change their minds about things, but in the end the public will decide and the leaders will follow.

Aug 22 08:59

I did not go down without a fight.

there is a line herethe banner is here

August 21 2016

I did not go down without a fight.

I have tried to do everything I can to get this web site back to normal, and have been blocked in every effort. I have tried everything I can to get the message window working, and it works when they let it. I have set up new servers, new code, new EVERYTHING and have been blocked at every turn, every path, every solution, everything I can possibly think of.
YES, THEY LET THIS WEB SITE LOAD, but I am now blocked from posting any page or file that is more than 4k in size, which happens to be the content of a single packet. Any more than that, and it will be blocked.

This is the way it will all end. Everyone will be snuffed without a whimper, with no way to post anything that differs from the controlled "mainstream." Perhaps they are using me to figure out how to crush everyone else. Denying anything be posted to the web site but small comments would work.

Webmaster's Commentary: 

It seems I am not the only independent media site under attack these days!

Aug 22 08:22

Colin Powell Says Hillary Clinton's 'People Have Been Trying to Pin' Email Scandal on Him

On Friday, the New York Times reported that Clinton told FBI officials former Secretary of State Colin Powell had advised her to use a personal email account while she held the Secretary of State office herself.

"Her people have been trying to pin it on me," Powell, 79, told PEOPLE Saturday night at the Apollo in the Hamptons 2016 Night of Legends fête in East Hampton, New York.

"The truth is, she was using [the private email server] for a year before I sent her a memo telling her what I did," Powell added.

Aug 22 07:38

Colin Powell Just Revealed The DEVASTATING TRUTH About Hillary’s Email Scandal!

But Powell, who had said last week in a statement that he had no recollection of the conversation, told Page Six at Saturday’s Apollo in the Hamptons event, “The truth is she was using it (her personal email) for a year before I sent her a memo telling her what I did [during my term as Secretary of State].

“Her people have been trying to pin it on me.”

Aug 22 07:16

Microsoft can't tell North from South on Bing Maps

City of Melbourne, population four million, placed in the wrong hemisphere

Aug 22 07:14

Five-storey Blue Screen Of Death spotted in Thailand

Windows crashing and producing the Blue Screen of Death (BSOD) is seldom pleasant, or convenient.

It's also seldom as conspicuously displayed as in the image below, which The Register found on Facebook late last week. By your correspondent's reckoning, that there is a five-storey BSOD.

Aug 22 07:04

Colin Powell Says Clinton’s ‘People’ Are Trying to Pin Email Scandal on Him

As previously reported, the FBI revealed in notes to Congress regarding its investigation into the Democratic presidential nominee’s private server use that she claimed that Powell was the one who encouraged her to use a personal email.

In a statement Friday, Powell said he did email Clinton a “memo describing his use of his personal AOL email account for unclassified messages and how it vastly improved communications within the State Department.”

Aug 21 11:23

Facebook Falsely Claims Colin Powell Cleared Hillary In Email Case

Facebook’s “Trending Topics” section is at it again. Saturday morning the site ran a headline in the section declaring, “Colin Powell: Former Secretary of State Confirms He Recommended Using Personal Email to Hillary Clinton.” The only problem is Powell made no such declaration and he denied Clinton’s claim.

Webmaster's Commentary: 

Maybe we should call it "Fakebook!"

Aug 21 11:04

Colin Powell: Hillary Clinton LIED About Me Telling Her to Use Private Email Server

Aug 21 10:28


A Russian hack of Darth Soros makes eminent sense, and even more sense, than on the DNC. Soros' role, especially since his emails were released, in the Ukrainian mess, is well-known, as is Russia's outlawing of NGO groups (such as Soros'). From the Russian point of view, such groups are nothing but gangs, racketeering operations, and front groups for "revolutionary" activities enjoying the protection of western law, governments, and powerful patronage. In this context, a Russian hack of the NSA to send messages also makes sense.

Aug 21 10:27


Well, in the past week, so many people sent articles concerning the recent hacks of the Democratic National Committee, and the various "groups" and activities sponsored by Darth Soros, that the above "Dot-connecting" doesnt' appear to be so speculative any longer:

Aug 21 10:11

NSA Blackmailing Obama? | Interview with Whistleblower Russ Tice

Aug 21 09:54

Dallas Police Department Attempt To Block Release Of Info Related To Bomb Robot

By Derrick Broze

On July 7, Micah Xavier Johnson attacked a group of police officers in Dallas, Texas, killing five officers and injuring two others. Johnson was reportedly upset about the police shootings of black men and wanted to target white officers. After hours of negotiations, Dallas Police Chief David Brown decided to send in a robot armed with a brick of C-4 explosive. The robot detonated the bomb near Johnson on the campus of El Centro College in downtown Dallas. Johnson was killed in the explosion.

“Our bomb robot detonated a bomb where the suspect was,” Brown said at the time. “Other options would have subjected officers to great danger.”...

Aug 21 09:19

GCHQ could be behind 'super-spyware' attack – Security expert on Regin, incredibly advanced virus

Aug 20 11:47

What has happened to Ron Gibson?

Webmaster's Commentary: 

Ron Gibson maintains video archives of popular independent media shows on his YouTube channel (including WRH) but has suddenly stopped as of the 16th. Emails to him have remained unanswered. A lot of people are asking why the archives have stopped.

Now, maybe he is on a vacation, but you can all understand why some people are worried about him. So, if anyone knows Ron, drop me a line just to let me know he is okay.


Aug 20 11:29

Glaring Hypocrisy Interview: Police Seize Holocaust & 9/11 Truther Alfred Schaefer’s Computers, Papers, etc.

The above video is a 29-minute interview, recorded Friday, August 19, 2016, with Alfred Schaefer, a German-Canadian Holocaust and 9/11 truther and video producer.

Early Thursday morning, Alfred and his wife Elfriede’s house was visited by two German criminal police officers who, after providing a search warrant, took possession of Alfred’s computer equipment (e.g., Mac, drives, iPad), various papers and even his iPod.

Aug 20 10:22

UK surveillance powers have gone ‘further than any other Western democracy’ - MP

Britain has gone “further than any other Western democracy” in its expansion of surveillance powers and its ability to collect bulk data without justifiable reason, a British MP has said.

Aug 20 09:20

Can Technology Liberate Us From The State?

By Emily Pont

In a society ruled by violent, coercive and oppressive institutions comprised of elite charlatans, loving nothing better than to regulate and collectivize us like cattle, steal from us in the form of taxation, and strip us of our individual liberty, sovereignty and freedom until we are left unwilling pawns in the state’s destruction, it is crucial that we practice resistance. We must rise up against the hand of the state, dismantling the throne of our oppressors.

Aug 20 09:12

Company Owned by Pro-Israel Clinton Mega-Donor Haim Saban Just Bought Gawker Media's Assets

Pro-Israel mega-donor, media tycoon and die-hard Hillary Clinton backer Haim Saban is expanding his empire through his company’s acquisition of Gawker Media Group’s digital assets for $135 million.

Aug 20 09:03

BEX ALERT - Obama Signs Executive Order Banning The Pledge Of Allegiance In Schools Nationwide

Webmaster's Commentary: 


Check out

Someone is creating fake corporate media sites and loading them with bogus stories to try to discredit the independent media.

The earlier claimed ABC page with a live Hillary/Trump poll (now taken down) was also a hoax.


Optional Banner: 
WRH breaking
Aug 20 08:30

Chuck Grassley Wants Answers From Loretta Lynch

"At this point, the American people and Congress are owed answers."

Webmaster's Commentary: 

Aug 20 08:06

The Federal Reserve Just Made a Facebook Page … And It’s Getting Destroyed by Trolls

By Carey Wedler

The Federal Reserve bank is well known for its secrecy. But in an attempt to reach out to the people it claims to serve, the monolithic bank just created a Facebook page . . . and it’s probably really regretting that decision.

Unlike Twitter, where the Fed decides which comments to reply to — and, therefore, which show up publicly on its page — its public Facebook page, launched Thursday morning, is not as restrictive. In fact, the Board of Governors of the Federal Reserve System page has been relentlessly trolled since it went up...

Aug 20 07:58

Hillary Clinton Vows To Shut Down Alternative Media

Hillary Clinton has threatened to shut down alternative news websites in America if she is elected President of the United States.

Aug 19 19:42

How the NSA snooped on encrypted Internet traffic for a decade

In a revelation that shows how the National Security Agency was able to systematically spy on many Cisco Systems customers for the better part of a decade, researchers have uncovered an attack that remotely extracts decryption keys from the company's now-decommissioned line of PIX firewalls.

The discovery is significant because the attack code, dubbed BenignCertain, worked on PIX versions Cisco released in 2002 and supported through 2009. Even after Cisco stopped providing PIX bug fixes in July 2009, the company continued offering limited service and support for the product for an additional four years. Unless PIX customers took special precautions, virtually all of them were vulnerable to attacks that surreptitiously eavesdropped on their VPN traffic.

Aug 19 09:54

The NSA Built a Secret, Warrantless, Shadow “Social Network” and You’re Already On It

By Matt Agorist

For roughly the last decade and a half, the NSA has been caught in lie after unscrupulous lie. Every time they are caught spying on Americans, the secret agency first denies it — then justifies it. The NSA has now been caught again. And, again, they denied it and are now justifying it.

This time, their unscrupulous spying involves a shadow “social network” that combs data from all social networks and your online data to create a graph of everyone and everyone they know. If you’re wondering where your invite to join this shadow network came from, you never got it. However, you’ve already joined.

NSA even has a website for this network on which they gladly display all the information they collect. It’s called GETPRSM and it’s scary...

Aug 19 07:23

Clinton Says Advised by Colin Powell to Use Private Email Server For Business

US Democratic presidential nominee Hillary Clinton told Federal Bureau of Investigations (FBI) agents that former Secretary of State Colin Powell advised her to use a private email server during her tenure as a Secretary of State, local media reported.

Webmaster's Commentary: 

I'll bet Colin Powell will have a comment about this one!

Aug 18 18:04

Court rules that ISPs do not need to give up information on alleged pirates, copyright infringers

An American Internet Service Provider (ISP) has received validation that it does not have to give up personal details of alleged copyright infringers. The Eastern Virginia District Court has denied copyright holder BMG Rights Management a permanent injunction against Cox Communication that would force the ISP to match personally identifiable information such as email address, physical address, and name to an IP address that has been accused of copyright infringement. In this case, BMG was trying to force Cox Communication to actively spy on allegedly pirating users and “verify” that they had stopped pirating.

Aug 18 14:59


Walabot is a handheld 3D-imaging device that plugs into your Android phone and allows you to see through walls, objects, and materials. The parent technology, Vayyar, was originally developed for breast cancer screening, providing something much more portable than a mammogram machine, and making it cheaper, easier, and safer for women to be scanned. But the makers believe there are many more potential applications.

“Looking into skin tissue is difficult,” explained Malcolm Berman, director of marketing at Vayyar, in an interview with Digital Trends. “If you can see through that, then you can see through many other things.”

The 3D imaging is created using radio frequency technology, the same technique we use for Wi-Fi, mobile networks, and radar systems. Vayyar is able to use RF to see through solid objects and Berman claims it emits a fraction of the radiation that our cellphones do. There are antennas in the Walabot firing out signals and sensors to pick up the reflections.

Aug 18 14:48

The NSA cyber-weapon auction is a total smokescreen — here's what's really going on

A group calling itself the "Shadow Brokers" claimed earlier this week that it hacked into the US National Security Agency and stole an apparent treasure trove of exploits and hacking tools that it is now trying to auction off.

But experts say that this is all a smokescreen for a not-so-subtle message from Moscow to Washington: Don't mess with us.

"It's a smokescreen, there's nothing real about this," John Schindler, a former NSA analyst and counterintelligence officer, told Business Insider. "This is Moscow's way of upping the ante in the spy war, and sending a message no one can miss [which is] 'we have you penetrated, we've got you by the balls, don't push us.'"

Webmaster addition: More Russia bashing.

Aug 18 13:08

In Black Robes, CERN Scientists Stage “Mock Human Sacrifice” At Shiva Statue

Somebody decided to gather together a bunch of black robes and stage a mock human sacrifice in front of CERN’s occultic Shiva statue – and catch it all on film for a hoax video they may hoped would fool online critics.

Read more at SHTF

Aug 18 12:31

BEX ALERT - Democrats' new warning: Leaks could include Russian lies

The move could help inoculate Hillary Clinton against an October cyber surprise.

Webmaster's Commentary: 

Desperation on the cusp of madness!

Aug 18 11:06

How Trolls Are Ruining the Internet

They’re turning the web into a cesspool of aggression and violence. What watching them is doing to the rest of us may be even worse

Webmaster's Commentary: 

"Not OUR paid trolls, of course, or those of the candidates! We're talking about those ... other people ... with ... opinions! " -- Dime Magazine

Aug 18 10:12

Cisco confirms NSA-linked zeroday targeted its firewalls for years

Company advisories further corroborate authenticity of mysterious Shadow Brokers leak.

Aug 18 09:52

Clinton Foundation hired cyber firm after suspected hacking: sources

Bill and Hillary Clinton's charitable foundation hired the security firm FireEye to examine its data systems after seeing indications they might have been hacked, according to two sources familiar with the matter.

So far, no message or document hacked from the New York-based Clinton Foundation has surfaced in public, the sources said.

One of the sources and two U.S. security officials said that like hackers who targeted the Democratic National Committee, Hillary Clinton’s presidential campaign and the Democrats' congressional fundraising committee, the hackers appear to have used “spear phishing” techniques to gain access to the foundation's network.

Webmaster's Commentary: 

Aug 18 09:26

The Shadow Brokers auction demonstrates why it is a bad idea to hoard security holes

The Shadow Group getting its hands on what increasingly look like actual tools used by one of the most advanced government sponsored threat actors shows that no one is immune to leaks. Hoarding such tools, or keeping zero day exploits secret, will eventually become a major problem to individuals and organisations. It is only a matter of time before the secrets get leaked. The information is going to eventually get into the wild, so it is safer to inform the affected companies of the zero day exploits.

Microsoft just unintentionally demonstrated why backdoors are a bad idea when it accidentally released configuration files that made Microsoft technologies vulnerable to some kinds of attacks.

Aug 18 09:02


Linux fans are typically outspoken about the OS, and are quick to argue the benefits with OSX and Windows users. They have developed a reputation for being champions of open source and anonymity when computing. Tails and Tor users are not only fans of the OS, but are also focused on security. The NSA recently became interested in these users’ activity, reportedly labeling Linux Journal Readers and Tor and Tails users as extremists, according to Techspot.

Aug 18 08:03

10 Orwellian Moments Found In The Newly Leaked Private NSA Newsletters

After reading hundreds of them, here is my list of the most Orwellian SIDtoday NSA newsletters:

Aug 18 07:42

This bag of tricks may help stop a Locky ransomware infection

A malware researcher has found a few tricks to stop one of the latest types of ransomware, called Locky, from infecting a computer without using any security programs.

Webmaster's Commentary: 

Normally I am against the death penalty. But I cannot help but think that if we were to catch just one of these cybercriminals and crucify them live on an internet video feed (if they are healthy, it will take them a week to die) that a large part of this problem might just go away!

Aug 18 07:33

Windows 10 needs proper privacy portal says EFF

The Electronic Frontier Foundation (EFF) has called on Microsoft to offer a “single unified screen” on which Windows 10 users can control how Windows 10 deals with their personal information and monitors their use of the OS.

The organisation has listed the long list of nasty nagware tactics Microsoft used to get people running Windows 10, labelling some “questionable tactics to cause users to download a piece of software that many didn’t want.”

It's not keen on the nagware bundled alongside patches, suggesting that tactic reduced trust in patches and therefore potentially exposed users who don't act promptly when important fixes arrive.

Aug 18 07:29

FireEye warns 'massive' ransomware campaign hits US, Japan hospitals

The dangerous and as-yet-undefeated Locky ransomware is being hurled at hospitals across the United States and Japan in a 'massive' number of attacks, according to FireEye researcher Ronghwa Chong.

Locky is a popular ransomware variant that will encrypt files in a way that forces users to pay ransoms or cut their losses and purge data.

This month the already increasingly hammered health sector is copping a massive spray of phishing attacks bearing the Locky ransomware

Aug 17 08:55


In a series of messages posted to Twitter , Snowden suggested the leak was the fruit of a Russian attack on an NSA-controlled server and could be aimed at heading off U.S. retaliation over allegations that the Kremlin is interfering in the U.S. electoral process.

Aug 17 08:24

Shark bosses sink teeth into booming ransomware market

Cybercrooks are harnessing the “ransomware-as-a-Service” (RaaS) business model to mount a new scam.

Coders distributing a ransomware builder to aspiring attackers that can be used on condition that a 20 per cent cut of any ransom payments it generates is returned to the original coders.

Aug 17 07:36

Clickbait 'hitman' at Sean Adl-Tabatabai's Yournewswire writing outrageous attacks on David Icke must have a twin then? Right?

Sean Adl-Tabatabai is a former webmaster at who left years ago to start an alleged ‘alternative’ website in California called which has become notorious among serious researchers for its clickbait headlines with no sources to support the headline. Every click = money.

He appears to hate me with a vengeance and has taken every opportunity to try to damage me through his ridiculous website and it must have been incredibly frustrating that he has not been able to do so – not least because people can see his motivations from 100 miles away.

Webmaster's Commentary: 

That there are disruptors infiltrating the independent media has been obvious for a long time. Sorcha Faal is one of the better known ones. Sean is another.

Aug 17 07:05

Judicial Watch: New Documents Show Top Clinton Aide Alerted On Email Inquiry

Judicial Watch today released 10 pages of new State Department records that include an email sent by State Department spokesman Brock Johnson alerting Cheryl Mills, Hillary Clinton’s then Chief of Staff, that a “significant” Freedom of Information Act (FOIA) request had been made for records showing the number of email accounts used by then-Secretary of State Hillary Clinton.

Aug 17 07:03

Clinton’s Top Aide Cheryl Mills Answers More Questions Under Oath; Reveal She and Pagliano Were Concerned that Guccifer Hack of Blumenthal’s Emails Could Compromise Clinton’s Unsecured Email System

Judicial Watch today released the responses by former Clinton Chief of Staff Cheryl Mills to Judicial Watch interrogatories, revealing that shortly after “Guccifer” hacked the email account of long-time Clinton advisor Sidney Blumenthal, Mills and former State Department IT official Bryan Pagliano discussed the danger of Guccifer’s actions compromising Clinton’s unsecure email system:

Aug 16 18:14

Microsoft to end decades-old pick-a-patch practice in Windows 7

As of October, Microsoft's switching older editions to the update model pioneered by Windows 10, and slammed by some customers

Aug 16 15:30

FBI Seeks Developer to Build an App to Help the Government Spy on Us

Are you an app developer? Are you covert as hell? Do you think we should all throw our privacy cautions to the wind? Boy, does the FBI have the job for you: design an app to help the government spy.

The Department of Justice posted a job opportunity last month to create something called a Smartphone-Based Audio Recorder. The technical requirements draft describes an app that would allow an FBI agent to "surreptitiously capture audio and video" on their smartphone. It describes two scenarios this piece of spy tech would be needed in — one is to collect live audio covertly (read: spy), and the other is to use the app as a recorder alternative to overtly record audio and video during an interview (read: not spy).

Aug 16 13:19

Government surveillance of Internet users increasing each year

A new report from search giant Google has revealed how many times governments and courts have asked it to hand over information about users.

The annual transparency report shows that in 2014, 35,365 requests were made, and 40,677 were made in 2015.

Aug 16 12:36

London ‘Thought Police’ Special Unit To Track Down Online Trolls

A generously funded “online hate crime hub” has been set up to tackle online vitriol by identifying suspects and encouraging citizens to report them to police, but critics fear the newly-established unit might endanger freedom of speech.

Aug 16 12:02

America’s Biggest Ally Now Has Special “Thought Police” Unit to Track Down Online Trolls

By Claire Bernish

Thought police now patrol social media platforms and online forums to quash putatively ‘abusive’ vitriol with the help of feckless civilians urged to end freedom of speech under the guise of rooting out hate.

Expected to run for two years at a cost of $2.2 million (£1.7 million) — of which the Home Office will contribute $581,000 (£450,000) — the London Mayor’s Office for Policing And Crime (MOPAC) believes severely curtailing free speech is necessary due to “the increasing role that online hate played in targeting individuals and communities.”...

Aug 16 11:19

18 U.S. Code § 793 - Gathering, transmitting or losing defense information

Whoever, being entrusted with or having lawful possession or control of any document, writing, code book, signal book, sketch, photograph, photographic negative, blueprint, plan, map, model, instrument, appliance, note, or information, relating to the national defense, (1) through gross negligence permits the same to be removed from its proper place of custody or delivered to anyone in violation of his trust, or to be lost, stolen, abstracted, or destroyed, or (2) having knowledge that the same has been illegally removed from its proper place of custody or delivered to anyone in violation of its trust, or lost, or stolen, abstracted, or destroyed, and fails to make prompt report of such loss, theft, abstraction, or destruction to his superior officer—
Shall be fined under this title or imprisoned not more than ten years, or both.

Webmaster's Commentary: 

This is where FBI Director James Comey lied to the American people when he said he would not recommend charges because he did not find evidence that Hillary intended to do wrong. Comey dismissed Hillary's actions as reckless, careless, and negligent, but as 18 U.S. Code § 793 states, intent to do harm is not required, and exposure of national secrets through negligence is a crime, punishable by ten years in prison.

Aug 16 08:38

George Soros was Hacked! — Thousands of Files Expose Election Manipulation & More

In June, Open Society Foundations, the group owned and operated by the unscrupulous George Soros, reported a data breach by hackers to the Federal Bureau of Investigation. For over a month, the foundation nervously waited to see what had been taken. And, on Saturday, the site DC Leaks released the hacked information containing more than 2,500 files from the raft of organizations run by this shady billionaire.

Webmaster's Commentary: 

And scarcely a word in the corporate media!

Aug 16 08:33

Australian university students spend $500 to build a census website to rival their governments existing $10 million site

Two first year university students have designed an alternative to the ABS Census website in just 54 hours.

Austin Wilshire, 18, and Bernd Harzer, 24, created the site during the Queensland University of Technology's Code Network Winter hack-a-thon at the weekend.

Aug 16 08:21

Cell-Jamming Technology Is Being Turned against Journalists

Technology developed to jam cellphones during the Iraq War may be getting deployed against journalists reporting on protests against the political establishment in the United States.

While police and government surveillance of protests, including monitoring of cellphone use, is well-documented, efforts to block signals at protests remains an oft-repeated, but never proven, rumor.

It may be impossible to definitively prove that authorities are using cellphone “jamming” technology, but journalists working with both mainstream and independent media reported unusual difficulties accessing the internet during recent protests at the gates of the Democratic National Convention, consistent with the effects this very real technology could have.

Aug 16 08:05

GOP lays out case for charging Clinton with perjury

A pair of leading House Republicans on Monday laid out detailed instructions for the Justice Department to file perjury charges against Democratic presidential nominee Hillary Clinton.

More than a month after first requesting the department open a criminal probe into Clinton for alleged misstatements she made under oath, the GOP heads of the House Judiciary and Oversight committees told a federal prosecutor specifically where they believed Clinton had lied to Congress about her email setup at the Department of State.

In at least four separate occasions during a marathon appearance before the House Select Committee on Benghazi, the lawmakers alleged, the former secretary's claims were at odds with what the FBI has now discovered to be the truth about her private server.

Aug 16 07:48

Cortana: The spy in Windows 10

Microsoft also claims that Windows 10 SP1 is safer than ever, which I find even less assuring than the promise not to exploit all that Cortana data. Think about this: You can use Cortana from the lock screen. That’s right; Cortana is active and listening to when your PC is locked. Well, it’s supposed to be locked, but if it’s able to listen, how locked down is it, really? Not very!

Microsoft calls this a feature that gives you the ability to ask your PC simple questions without logging in. But I call anything that lets me input data into a PC without being logged into it a bug. It’s a security hole begging to be exploited. Windows, which God knows has had more than enough security problems, now has a new attack surface.

Fortunately, you can fix this one easily. Just open Cortana’s Settings and turn off the “Use Cortana even when my device is locked.”

Aug 16 07:40

Aussie cops ran child porn site for months, revealed 30 US IPs

Turns out the FBI isn't the only agency to take over a child pornography website and bust some of its participants. Australian authorities have apparently employed similar tactics against Americans—revealing at least 30 targets.

Aug 16 07:34

Linux traffic hijack flaw also affects most Android phones, tablets

About 80 percent of all Android devices are affected, but "exploitability is hard."

Aug 16 07:31

Two university students take just 54 hours to build a Census website that WORKS - for $10 MILLION less than the ABS' disastrous site

Two first year university students have designed an alternative to the ABS Census website in just 54 hours.

Austin Wilshire, 18, and Bernd Harzer, 24, created the site during the Queensland University of Technology's Code Network Winter hack-a-thon at the weekend.

The pair took a little over two days to make the site, and it cost them less than $500 - far less than the $10 million the Australian government spent on their site.

The ABS' Census site crashed for over 24 hours on the night the servers were overloaded when millions of Australians logged on to fill out the survey - taken every five years.

Their project - titled 'Make Census Great Again' - used 'serverless architecture' by hosting their site on Amazon servers - meaning it could not get overloaded.

Aug 16 07:18

George Soros hacked, over 2,500 internal docs released online

Last Thursday, as Bloomberg was gingerly setting the stage, and the preemptive damage control for what was about to be a historic leak, it did everything in its power to deflect attention from the key topic, namely that prominent liberal billionaire and Hillary suppo

Aug 15 18:25

RT Besieged by DDoS Attacks Days After US Think Tank Called for Cyber Terrorism

Hackers bombarded RT with a well-planned series of Distributed Denial of Service (DDoS) attacks one week after the Atlantic Council wrote an article suggesting preemptive cyber terrorism against RT and the Moscow Metro.

Webmaster's Commentary: 

Welcome to my world.

Aug 15 16:37

Google AdSense abused to distribute Android spyware

A banking trojan targeting Android users is spreading through malicious ads as part of an ongoing campaign.

The scenario by which the malware spreads is all too familiar to long-suffering Windows fans, but may well come as an unpleasant shock to smartphone users.

Worse yet, Android users can get infected by the Svpeng Trojan simply by visiting mainstream websites, as researchers from Kaspersky Lab explain:

By simply viewing their favourite news sites over their morning coffee users can end up downloading last-browser-update.apk, a banking Trojan detected by Kaspersky Lab solutions as Trojan-Banker.AndroidOS.Svpeng.q. There you are, minding your own business, reading the news and BOOM! – no additional clicks or following links required. And be careful – it’s still out there!

Aug 15 15:56

Government surveillance of Internet users increasing each year

A new report from search giant Google has revealed how many times governments and courts have asked it to hand over information about users.

The annual transparency report shows that in 2014, 35,365 requests were made, and 40,677 were made in 2015.

Aug 15 15:41

George Soros Hacked, MSM Blames Russia; Many “Dissident” Orgs Revealed In Leaks

By Brandon Turbeville

George Soros has been hacked and, according to the Western mainstream press, the Russians did it! In fact, that is the entirety of the story for most of the mainstream outlets – that the Russians hacked such an important American figure and therefore made their power play over American elections yet again. This Russian hack comes after Russians hacked the DNC, Hillary Clinton, hired Donald Trump to destroy the country and invented a time machine enabling them to go back in time and prevent the election of Barack Obama. It doesn’t matter that there is as much evidence for the latter as there is for the former, the mainstream outlets are wild with speculation and neo-McCarthyism...

Aug 15 14:46

"the first person in the world to be publicly identified a confirmed PRISM target...

a pro-democracy activ1ist.

a middle-aged former tax man and a pro-democracy activist. But four years ago, a botched operation launched by New Zealand spies meant he suddenly found himself deemed a potential terrorist — his passport was revoked, his home was raided, and he was placed on a top-secret National Security Agency surveillance list.

Aug 15 13:59

Mysterious Group Hacks The NSA

The latest hack revealed over the weekend has nothing to do with the Democratic Party or George Soros, and instead a mysterious hacker group by the name “The Shadow Brokers” claims to have hacked the Equation Group - a government cyberattack hacking group associated with the NSA, and released a bunch of the organization's hacking tools. The hackers are also asking for 1 million bitcoin (around $568 million) in an auction to release more files.

“Attention government sponsors of cyber warfare and those who profit from it!!!!” the hackers wrote in a manifesto posted on Pastebin, on GitHub, and on a dedicated Tumblr.

Aug 15 13:53

Judge Jeanine: Now we know why Hillary used private email

Aug 15 13:43

Government surveillance of Internet users increasing each year

A new report from search giant Google has revealed how many times governments and courts have asked it to hand over information about users.

The annual transparency report shows that in 2014, 35,365 requests were made, and 40,677 were made in 2015.

Aug 15 09:52

Hillary’s Unsecured Email EXPOSES U.S. Spy… Leading to His EXECUTION

As reported by the Washington Examiner, “I’m not going to comment on what he may or may not have done for the United States government, but in the emails that were on Hillary Clinton’s private server, there were conversations among her senior advisors about this gentleman. The senator said this lapse proves she is not capable of keeping the country safe.

“That goes to show just how reckless and careless her decision was to put that kind of highly classified information on a private server. And I think her judgment is not suited to keep this country safe,” he said.

Here’s what they said to expose the brave spy Amiri, leading to his death:

The scientist’s name shows up in Clinton’s emails back in 2010, just nine days before he returned to Iran.

Aug 15 09:05

PokemonGo Ransomware installs Backdoor Account and Spreads to other Drives

With the popularity of PokemonGo, it was inevitable that a malware developer would create a ransomware that impersonates it. This is the case with a new Hidden-Tear ransomware discovered by Michael Gillespie that impersonates a PokemonGo application for Windows and targets Arabic victims.

Aug 15 09:03

Windows 10 may freeze after installing the Anniversary Update

Microsoft has received a small number of reports of Windows 10 freezing after installing the Anniversary Update on systems with the operating system stored on a solid-state drive (SSD) and apps and data stored on a separate drive. This issue does not occur when starting Windows 10 in Safe Mode.

Aug 15 07:47


Though Israel’s reputation as a true democracy has certainly come under fire, its advocates proudly point to its freewheeling press as an exemplar of the values of liberal Zionism. But even this last holdout of Israeli democracy israpidly receding, particularly in traditional domestic print and broadcast media and, more recently, among foreign-headquartered social media platforms.

Aug 14 16:18

Massive hack of Soros files released

The files of George Soros’s Open Society Institute have been hacked over a period of years, with 2,576 just published on the mysterious DCLeaks site.

Aug 14 16:13

Guy tricks Windows tech support scammers into installing ransomware

Kwiatkowski got an idea… an awful idea. He got a wonderful, awful idea.

He’d already noticed that the remote control software the scammer was using allowed him to send and receive files. So he turned to his inbox, where he had several samples of Locky ransomware variants. He grabbed one, renamed it to look like a digital photo, and fired it over.

Kwiatkowski feigned vision trouble and suggested that Dileep just have a look at a picture of the credit card instead. It certainly sounds like he did, though, strangely, the picture must’ve been corrupted… because nothing came up on his screen when he double-clicked it.

That’ll soon change, though. A ransom notice ought to be appearing any time now.