Aug 08 11:39

Amazon Echo is the ultimate spy device that records everything you say

The world’s largest retailer is under fire for releasing a device that, according to some experts, is little more than a spying tool for government surveillance.

Aug 08 11:13

Erik Prince: Hillary Clinton ‘Very Likely Caused’ Iranian Nuclear Scientist’s Death

Bannon asked if Hillary Clinton should be considered complicit in the execution of Iranian nuclear physicist Shahram Amiri, on charges of spying for the United States, who was discussed in some of the emails on Clinton’s unsecured private server.

“The physicist that came out, he defected, he was a treasure trove of information, but the CIA and the Clinton State Department botched it while he was in the States, left him pretty much unsupported,” Prince replied, calling it a major mistake to leave Amiri’s family in Iran.

“The second time he calls home, the Iranian intelligence service answers the phone. Undoubtedly, they leveraged him. When the guy talks about psychological trauma here in the United States, I’m sure it’s because the Iranians were telling him all the things they were going to do to his family if he didn’t come home,” said Prince.

Aug 08 09:13

'Sauron' spyware attacking targets in Belgium, China, Russia and Sweden

A previously unknown hacking group called Strider has been conducting cyber espionage against selected targets in Belgium, China, Russia and Sweden, according to Symantec.

The security firm suggested that the product of the espionage would be of interest to a nation state's intelligence services.

Strider uses malware known as Remsec that appears primarily to have been designed for espionage, rather than as ransomware or any other nefarious software.

Aug 08 08:00

My Job Churning Out The Garbage Behind Clickbait Titles

You're not going to fall for this internet misinformation circle jerk. You want real talk, so you strap on your Comments Codpiece and scroll straight to the bottom of the article. Guess what? Those people might not be legit either.

"There are services that will pay people to post on your blog or forum, very much like paying kids to come to your birthday party and pretend to be your friend," Jen says. "The one I used was called Postloop. I loved them because they paid reliably and you could cash out immediately instead of once a week. So if you were desperate to make a little extra to cover a bill or something, they were easy. The way [it] works is you sign up and choose some topics you might be interested in. They match you with forums, which you must post in, meeting a certain frequency and post length requirement so you don't look too spammy. Assuming you fit within their guidelines, you make a meager amount of money from the chatting."

Aug 08 07:50

Either Give Fair Coverage Or We Pull Your FCC Licenses!

Republicans are used to unfair reporting from the news media because the press in the US is mostly Jewish owned and both pro-Israel and pro-Wall Street. But this year has been rather astounding. When Bernie Sanders supporters converged on Debbie Wasserman Schultz to blame her for rigging the primaries for Hillary, MSNBC said 99% applauded the former head of the DNC. I saw the raw video of Sanders supporters booing her and yelling, “Bernie. Bernie.” The TV audience never saw the anti-Hillary protesters outside the convention center chanting, “Lock her up! Lock her up!”

Aug 08 07:18

Executed Iranian Scientist Mentioned in Clinton's Privately-Stored Emails

Recently executed Iranian nuclear scientist Shahram Amiri was mentioned in emails exchanged between US Democratic Party candidate Hillary Clinton and her advisers while she was secretary of state and stored on a private server, US Senator Tom Cotton said.

Aug 08 06:05

Clinton's private server held emails about nuclear 'spy' executed in Iran: Aides discussed scientist 'friend' and his decision to return home after defecting to the U.S. for $5m

Hillary Clinton used her private email server to discuss details of the Iranian nuclear scientist who has executed for giving information to the CIA.

Shahram Amiri, who was hanged on Sunday for 'revealing secrets to the enemy', was in the US and allegedly informing on Tehran's extensive nuclear program during the Democrat's controversial reign as Secretary of State.

At the time she stressed researcher had been there of his 'own free will' and was described as 'our friend' in correspondences.


Amiri worked for a university affiliated with Tehran's extensive nuclear program.

He is said to have had an in-depth knowledge of Iran's nuclear program and was kept at a secret location after returning to the country.

According to CBS, he told officials in interviews he was being held against his will by Saudi and U.S. spies.

But American officials said he was set to receive millions for informing.

Aug 08 05:47

Android bug fear in 900 million phones

Serious security flaws that could give attackers complete access to a phone's data have been found in software used on tens of millions of Android devices.

The bugs were uncovered by Checkpoint researchers looking at software running on chipsets made by US firm Qualcomm.

Qualcomm processors are found in about 900 million Android phones, the company said.

However, there is no evidence of the vulnerabilities currently being used in attacks by cyberthieves.

Aug 07 23:51

Iranian Scientist Who Provided U.S. with Info Executed Today – He Was Mentioned in Hillary Email

Hillary Clinton recklessly discussed, in emails hosted on her private server, an Iranian nuclear scientist who was executed by Iran for treason, Sen. Tom Cotton, R-Ark., said Sunday.

Read more:

Aug 07 18:59

Windows 10 Anniversary Update is borking boxen everywhere

Microsoft's response: Have you tried uninstalling it and installing it again?

Aug 07 15:43

Princeton Professor Shows How Easy It Is To Hack An Election In Just 7 Minutes

By Claire Bernish

A professor from Princeton University and a graduate student just proved electronic voting machines in the U.S. remain astonishingly vulnerable to hackers — and they did it in under eight minutes.

In fact, Professor Andrew Appel and grad student Alex Halderman took just seven minutes to break into the authentic Sequoia AVC Advantage electronic voting machine Appel purchased for $82 online — one of the oldest models, but still in use Louisiana, Pennsylvania, New Jersey, and Virginia...

Aug 07 12:53

PLC-Blaster Worm Targets Industrial Control Systems

Security researchers at Black Hat USA described a proof-of-concept worm that targets weaknesses within automated industrial control systems used to manage critical infrastructure and manufacturing. The worm, according to OpenSource Security, has the capability to autonomously search for and spread between networked programmable logic controllers (PLCs).

Webmaster's Commentary: 

Shades of STUXNET!

Aug 07 12:52

Windows 10 Anniversary Update deleting Linux partitions?

Many folks who are running Windows 10 on their computers, usually have a Linux partition installed as well. Regular folks do it, developers do it, and then the few who prefer to use Linux but are forced to use Windows. But here’s the thing, it would appear as if the Windows 10 Anniversary Update is removing Linux partition.

Alan Pope, Ubuntu Community manager at Canonical, took to Twitter recently to complain that he has seen several reports of folks claiming the Windows 10 Anniversary Update has been deleting partitions containing Linux operating systems.

Webmaster's Commentary: 

"You VILL use our operating system, dummkopf. UND YOU WILL LIKE IT!!!!!!!"

Aug 07 12:23

Cotton: Clinton discussed executed Iranian scientist on email

Hillary Clinton recklessly discussed, in emails hosted on her private server, an Iranian nuclear scientist who was executed by Iran for treason, Sen. Tom Cotton, R-Ark., said Sunday.


The scientist shows up in Clinton's emails back in 2010, just nine days before he returned to Iran.

Webmaster's Commentary: 

And now he has been executed! Did Iran learn he was a spy for the US from Hillary's weak private server?

Aug 07 12:19

Jeanine SLAMS James Comey

Aug 07 10:42

The First "Bitcoin Bail-In": All Bitfinex Users To Lose 36% In "Shared Loss" After Historic Hack

Adding insult to injury for those who "held" their BTC at the hacked exchange, Bitfinex announced it would pull a page right out of Europe's bank resolution mechanism, saying that all of its users will lose 36% of their deposits after it concluded its review the massive hack, in what is set to be the first ever "bitcoin bail-in."

Aug 07 09:04

Trust Hillary With Nuclear Launch Codes? She Can’t Even Secure Her Emails…

No one seems to be stating the obvious: The email hacking has taken place on Obama’s watch. In addition, why is it that whoever did the hacking were able to find the so-called missing emails but the FBI and other agencies could not?

The Democrats are in panic mode. They’re blaming Trump and the Russians which is just another way of blaming Obama. Trump didn’t hack the servers. His masterful press conference the other day made fools of the media, Obama, and Hillary. Why would anyone want this woman as President when she left the door open to a seemingly secure server? Maybe she’ll do the same thing with the nuclear launch codes.

Aug 07 07:54

US think-tank suggests cyber-attacks on Moscow Metro, St. Pete power grid, RT offices

Page 12, paragraph 7 and I quote: “Poland should announce that it reserves the right to deploy offensive cyber operations (and not necessarily in response just to cyber attacks). The authorities could also suggest potential targets, which could include the Moscow metro, the St. Petersburg power network, and Russian state-run media outlets such as RT.”

Aug 06 09:38

Commentary: The world's best cyber army doesn’t belong to Russia

National attention is focused on Russian eavesdroppers’ possible targeting of U.S. presidential candidates and the Democratic Congressional Campaign Committee. Yet, leaked top-secret National Security Agency documents show that the Obama administration has long been involved in major bugging operations against the election campaigns -- and the presidents -- of even its closest allies.

The United States is, by far, the world’s most aggressive nation when it comes to cyberspying and cyberwarfare. The National Security Agency has been eavesdropping on foreign cities, politicians, elections and entire countries since it first turned on its receivers in 1952. Just as other countries, including Russia, attempt to do to the United States. What is new is a country leaking the intercepts back to the public of the target nation through a middleperson.

Aug 06 00:58

Fighting Clickbait: Facebook Changes Its News Feed Algorithm Again

Facebook introduced improvements to its news feed algorithm to minimize the number of clickbait headlines published on the network.

In an article from its official newsroom blog page, the social network stated it wants more authentic communication on its website and that it continues to work hard to give more place for stories that are considered genuine by its users.

To deal with the matter, FB is changing the News Feed by updating how the system recognizes phrases which are frequently used in clickbait headlines. Thousands upon thousands of headlines are labeled as clickbait if the following key points are found:

  • If the headline consists of facts needed to understand what the content material of the article is.
Aug 05 16:48

Getting Ready For ‘Black Hat’ Global Hacker Conference: Leave All Devices At Home

Some of the highest profile hackers and cyber-security specialists have converged on Las Vegas for the Black Hat hacker conference.

Aug 05 14:30

CGI's StormyOne How To Defeat Vote Fraud, Or, Silent Death of the TruVote System

"TruVote allows voters to touch their candidates' names on a computer screen and receive receipts of their vote at the end of the process. They can then go to a Web site, punch in their voter validation number and make sure their vote was recorded." (The, 14 March 2004).

Aug 05 12:33

This Company Has Built a Profile on Every American Adult

Forget telephoto lenses and fake mustaches: The most important tools for America’s 35,000 private investigators are database subscription services. For more than a decade, professional snoops have been able to search troves of public and nonpublic records—known addresses, DMV records, photographs of a person’s car—and condense them into comprehensive reports costing as little as $10. Now they can combine that information with the kinds of things marketers know about you, such as which politicians you donate to, what you spend on groceries, and whether it’s weird that you ate in last night, to create a portrait of your life and predict your behavior.

Aug 05 09:54

FLASHBACK - First "Shocking" Deposition In Clinton Email Case Reveals She Did Not Use A Password

He was asked why he had proposed this solution, and he said it was “For ease of access” and, “as far as I knew, there was no requirement for her to be connected to our system” (even though he had earlier said that her having an email address assigned to her in the State Department’s system, the OpenNet system, was “required”). He said that the “ease of access” would be because of there being “fewer passwords.”

He was asked whether doing things this way was necessary in order for her to be able to access the Internet from the State Department, and he said, ”the Internet is available” to employees at the office, just as anywhere.

He was asked about the inconvenience of the State Department’s passwords system, and he said that he eliminated her need for any passwords:

A: She wouldn’t have had a password.
Q: So the computer would have just been open and be able to use without going through any security features?
A: Correct.

Aug 05 09:53

Clinton Campaigners Use Pokemon Go to Literally “Lure” Voters

By Tony Cartalucci

Some could have been excused for dismissing initial qualms surrounding the GPS-based augmented reality game, Pokemon Go. The game has swept the world, but its development is surrounded by disturbing connections between its developer Niantic, its former parent company Google, and the US State Department.

But while many before could only speculate as to the reason the US State Department may have been interested in developing such a game, it appears now there is at least a partial answer...

Aug 05 09:10

Hackers turn to dodgy ads as malvertising risk increases by 400 per cent

THE USE OF DODGY AD CAMPAIGNS, otherwise known as malvertising, increased by a whopping 400 per cent during the first six months of 2016, according to security company RiskIQ.

Malvertising relates to malware-riddled adverts served usually on dodgy websites that can infect a user's machine if they visit the site. People are often tricked into visiting such sites via phishing emails or spam on social media sites.

RiskIQ logged 1.7 million malvertising-related incidents between January and June, compared with just 368,000 in the same period in 2015. The 2014 figure was 250,000, underlining the dramatic growth over the past two years.

Aug 05 09:04

Washington Post to use robo-reporters to write Olympics news

THE WASHINGTON POST, Amazon founder Jeff Bezos' own media plaything, is planning to use artificial intelligence (AI) software to generate news reports and populate Twitter feeds during the Olympics.

The software will produce real-time news reports that will automatically end up on the newspaper's website and Twitter feeds.

Aug 05 08:50

Ransomware has left almost 10 per cent of UK firms 'unable to operate'

MORE THAN HALF of UK businesses have been hit by ransomware, according to security outfit Malwarebytes, and almost 10 per cent were left "entirely unable to operate" as a result.

Malwarebytes surveyed 540 CIOs, CISOs and IT chiefs at organisations with an average headcount of 5,400 in the UK, US, Germany and Canada. Around 40 per cent have been affected by ransomware and a third lost revenue as a result.

The majority of ransomware attacks come via a single end point, and 46 per cent begin, unsurprisingly, with a dodgy email.

What’s more, the crooks are clearly reaping the rewards of such attacks as 40 per cent of all firms pay the ransom to get the data unlocked.

Aug 05 08:38

Amazon Echo is the ultimate spy device that records everything you say

"In many ways the Echo is a law enforcement dream," writes Matt Novak for Paleo Future, a division of Gizmodo. Novak filed a Freedom of Information Act (FOIA) request with the FBI back in March to find out if the federal agency had ever wiretapped an Amazon Echo, to which the agency responded that it could "neither confirm nor deny" – essentially an admission of guilt.

"Years ago agencies like the FBI would need to wiretap a phone conversation or place bugs inside homes, practices that can be cost prohibitive and labor intensive. Today, you just need some software to tap into a device's microphone. And if that device is 'always listening' for a command, all the better for someone who wants to hear what's going on."

Aug 05 08:23

WATCH: US Marines Are Getting Land Drones With Heavy Machine Guns and Tiny UAVs

The US Marine Corps has spent years developing multiple unmanned combat robots, and last month it took them for a test drive.

Aug 05 08:12


The FBI wants the ability to surreptitiously turn your smartphone into a video- and audio-recording device without your knowledge, and it is calling on the high-tech industry to supply it with an app to perform those surveillance functions.

Webmaster's Commentary: 

My understanding is that they already have this capability.

Aug 05 07:35

Bahrain's internet shutdown marks a 'new form of information control'

On July 23rd, people in the village of Duraz, Bahrain began having serious internet problems — mobile networks ground to a halt and landline connections were unusable. The outages continued for nearly three weeks, occurring from 7PM to 1AM every night, and they began just three days after residents took to the streets of Duraz in peaceful protest against the government. Bahrain's three telecoms offered no explanation for the localized blackout, saying only that they were working to fix it, but a new report suggests that it was ordered by the government, in what researchers call "a new form of information control."

Aug 05 07:31

Google slammed for removing Palestine from its maps

The Palestinian Journalists’ Forum has denounced Google for deleting the name of Palestine from its maps and replacing it with Israel.

In a statement released yesterday, the forum said Google’s decision to remove Palestine from its maps on 25 July “is part of the Israeli scheme to establish its name as a legitimate state for generations to come and abolish Palestine once and for all.”

“The move is also designed to falsify history, geography as well as the Palestinian people’s right to their homeland, and a failed attempt to tamper with the memory of Palestinians and Arabs as well as the world.”

The forum said the move was “contrary to all international norms and conventions”, stressing that Google should back track on its actions.

Aug 05 07:26

Hackers unleash smart Twitter phishing tool that snags two in three users

Just. Don't. Click. On. Dodgy. ShortURLs. People.

Aug 04 18:36

Very peed off: Ohio urologists stay zipped after embarrassing leak

150GB of patient, internal files stolen? You gotta be kidney me – no, urine for a shock

Aug 04 15:05

Police: Parking in Newport Beach, CA Makes You Part of a Criminal Investigation

By Mike Maharrey

If you park your car in Newport Beach, police will likely scan your license plate with an automated license plate reader (ALPR). According to police, this automatically makes you the subject of a criminal investigation.

In an effort to find out what police do with all of the data they collect using automatic license plate readers (ALPRs), local activist Mike Glenn filed an open records request. The police refused to release the information...

Aug 04 14:53

Rikers Island Inmate Amazes Facebook With Livestream From Cell, Shows Off Improvised Knife

A Rikers Island inmate livestreamed his life behind bars at one of America’s most notorious prisons. He showed off his cell, food and even a self-made weapon to Facebook, in a video that failed to attract management’s attention.

Aug 04 13:16


A 23-year-old woman, and mother of a 5-year-old child, is dead. She was killed by police officers who came to serve a warrant for failure to appear charges stemming from a March 11th traffic stop. That this ever escalated to the point where bullets started flying is incomprehensible. Then again, much of what the woman, Korryn Gaines, did was incomprehensible. Gaines apparently considered herself a "sovereign citizen," which meant she chose not to recognize whatever laws she felt weren't worth following -- like registering her vehicle, insuring it, and equipping it with valid plates. Instead, she chose to make plates of her own out of cardboard that made some sort of statement about her sovereign citizen status. The traffic stop on March 11th escalated into an altercation with officers, resulting in more charges being added to the traffic violations.

Aug 04 09:51

Is Creating “Superhumans” the Next Arms Race?

By Nicholas West

The very nature of any arms race is a study in one-upmanship that is presumed to be necessitated by that which came before. A perfect current example is the global drone arms race. But what happens when a country starts tinkering with genetics?...

Aug 04 09:51

Hillary Clinton Exposed: Unfit for security clearance

Aug 04 08:04

They're back! Car hackers take control of Jeep’s steering and braking

Charlie Miller and Chris Valasek show how an attack can take control of steering, press the gas pedal and even kill the brakes while the vehicle is driving at high speeds

Webmaster's Commentary: 

Is that how Michael Hastings was killed? (And boy am I glad I drive a 17 year old car!!!!)

Aug 04 07:46

Does dropping malicious USB sticks really work? Yes, worryingly well…

Good samaritans and skinflints beware!

Plugging in that USB stick you found lying around on the street outside your office could lead to a security breach.

This is no secret, of course. We have all (hopefully) been aware of the dangers of inserting an unknown USB device into our computers for some time. Heck, the technique has even made it into the Mr Robot TV series.

But what may not be widely known is just how successful the tactic can be for allowing hackers to compromise your computer systems.

Aug 04 07:34

Intel's smartwatches are so hot right now – too hot: Basis Peak recalled for skin burns, blistering

Intel has recalled every single one of its Basis Peak smartwatches – as well as urging people to stop using them – because they can become dangerously hot.

Chipzilla has told everyone who bought a Peak to send back the watch along with any and all accessories for a full refund. Keeping it is not an option: by the end of the year, Intel will switch off its Peak cloud services, which the devices synchronize to, rendering the wrist-puters useless.

Aug 04 07:33

Forget card skimmers, chip-card shimmers will be your next nightmare

America's belated move to EMV (Europay, MasterCard and Visa) chip-equipped cards won't be the panacea some had hoped. As it turns out, the cards are just as easy to clone as their magnetic stripe predecessors.

At the Black Hat 2016 security conference in Las Vegas this week, engineers from Rapid7 demonstrated how a few small pieces of electronics could be used to stage a man-in-the-middle attack against an ATM.

The shimmer device is so named because it is inserted in the card slot like a shim, and it then takes a snapshot of the transaction data as a request for cash is processed.

Aug 04 07:29

Classic Shell, Audacity downloads infected with retro MBR nuke nasty

Classic Shell and Audacity downloads were booby-trapped with an old-school software nasty this week that knackered victims' Windows PCs.

Hackers were able to inject some retro-malware into the popular applications' installers hosted on, an official home for Classic Shell and Audacity releases among other software projects.

When victims fetched the tainted downloads and ran them, rather than install the expected app, the computer's Master Boot Record (MBR) was replaced with code that, during the next reboot or power on, displayed a cheeky message and prevented the machine from starting up properly. The drive's partition table was also likely damaged.

Aug 04 06:45

EX CIA Agent Pissed at James Comey! Undercover CIA Will Hurd Confronts FBI Director

Aug 04 06:31

UPDATE - VIRTUAL 9-11: Will the US & Israel Hack US Computers and Falsely Blame It On Iran or Syria or Russia or China (or at least to stop us saying bad things about Hillary)?

Such a cyber false-flag also gives the US Government the excuse to take total control of the internet so that those pesky truth-seeking bloggers don't give the slaves uppity ideas that this is just another war-starting hoax like the attack on the USS Liberty or 9-11 or the Boston bombing. At the very least, the government could return the dissemination of information back to the sole monopoly of the corporate media, so the independent media stops reminding the voters of Hillary Clinton's crimes and corruptions!

Optional Banner: 
WRH Exclusive
Aug 03 20:51

Comcast wants to sell your Web history to advertisers

Did you know that in some parts of the country, Internet providers such as AT&T offer a special deal on broadband prices? The plans lower your monthly payments, but there's a catch: To qualify for them, you have to agree to let the carrier track your Web history, search activity and other valuable behavioral data that can be used for advertising purposes.

Now, Comcast is telling regulators it wants the flexibility to offer these types of plans, too. In a meeting Monday with the Federal Communications Commission, officials from the cable company argued that it and other Internet providers shouldn't be prohibited from trading discounts for data.

Aug 03 20:43

New attack steals SSNs, e-mail addresses, and more from HTTPS pages

The HTTPS cryptographic scheme protecting millions of websites is vulnerable to a newly revived attack that exposes encrypted e-mail addresses, social security numbers, and other sensitive data even when attackers don't have the ability to monitor a targeted end user's Internet connection.

The exploit is notable because it doesn't require a man-in-the-middle position. Instead, an end user need only encounter an innocuous-looking JavaScript file hidden in an Web advertisement or hosted directly on a webpage.

Aug 03 16:54

Neural “Smart” Dust Connects Brain and Computer (Wireless Mind Control)

By Nicholas West

Neural Dust – “Smart Dust” – has entered the mainstream via the Independent’s article: “Tiny implant could connect humans and machines like never before.” It is implied to be a new technology that can wirelessly link a human brain to a computer via the implantation of a device the size of a grain of sand. However, I wrote about this in 2013, drawing upon research from many years previous. This invention is clearly nothing new; but when the mainstream media begins highlighting something that is literally wireless mind control, it’s worth taking note...

Aug 03 10:01

Global surveillance industry database helps track big brother worldwide

Offering a groundbreaking glimpse of the global surveillance industry—the tools it employs, the extent of its reach, and the accountability it largely evades—human rights watchdog organization Privacy International on Tuesday released a searchable database and accompanying report that track Big Brother worldwide.

Aug 03 09:18

Almost half of US businesses hit by ransomware, says study

The threat of ransomware is becoming widespread among corporations, with almost half of U.S. businesses suffering an attack from the nasty form of malware recently, according to a new survey.

Security firm Malwarebytes sponsored the study, which found in June that 41 percent of U.S. businesses had at least encountered between one to five ransomware attacks in the previous 12 months.

Another 6 percent saw six or more attacks.

The study surveyed corporations in the U.S., Canada, U.K. and Germany to gauge how ransomware affected their operations.

Aug 03 09:16


"Without instruments capable of restricting transfers and shining a light on the companies and the trade, surveillance technologies developed in and traded from the West will further undermine privacy and facilitate other abuses," says report. (Photo: Alan Levine/flickr/cc) Offering a groundbreaking glimpse of the global surveillance industry—the tools it employs, the extent of its reach, and the accountability it largely evades—human rights watchdog organization Privacy International on Tuesday released a searchable database and accompanying report that track Big Brother worldwide.

Aug 03 08:32

Microsoft won't fix Windows flaw that lets hackers steal your username and password

The flaw is widely known, and it's said to be almost 20 years old. It was allegedly found in 1997 by Aaron Spangler and was most recently resurfaced by researchers in 2015 at Black Hat, an annual security and hacking conference in Las Vegas.

The flaw wasn't considered a major issue until Windows 8 began allowing users to sign into their Microsoft accounts -- which links their Xbox, Hotmail and Outlook, Office, and Skype accounts, among others.

Overnight, the attack got larger in scope, and now it allows an attacker to conduct a full takeover of a Microsoft account.

Webmaster's Commentary: 

20 years old? Is it a bug, or one of those ubiquitous NSA back doors?

Aug 03 07:35

BOMBSHELL: Khizr Khan linked to Hillary’s email server!

What’s perhaps interesting is that also on this website that he has now deleted, Khan revealed that he spent nearly a decade working for the mega-D.C. law firm Hogan & Hartson—now Hogan Lovells LLP—which connects him directly with the government of Saudi Arabia and the Clintons themselves. Saudi Arabia, which has retained the firm that Khan worked at for years, has donated between $10 million and $25 million to the Clinton Foundation. Hillary Clinton, despite the repeated urging of Trump, has refused to return the Clinton Cash money to the Saudis. What’s more, Hogan Lovells also did Hillary Clinton’s taxes—and helped acquire the patents for parts of the technology she used in crafting her illicit home-brew email server that the FBI director called “extremely careless” in handling classified information.

Aug 03 07:33

Bitcoin price plummets after exchange loses $65 million to hackers

The price of the virtual currency bitcoin fell sharply Tuesday after Hong Kong-based digital-currency exchange Bitfinex said it was hacked, resulting in the possible theft of $65 million worth of bitcoin.

Aug 03 07:23

FLASHBACK - AP Fact Check: Hillary Clinton Email Claims Collapse Under FBI Investigation

Key assertions by Hillary Clinton in defense of her email practices have collapsed under FBI scrutiny.

The agency's yearlong investigation found that she did not, as she claimed, turn over all her work-related messages for release. It found that her private email server did carry classified emails, also contrary to her past statements. And it made clear that Clinton used many devices to send and receive email despite her statements that she set up her email system so that she only needed to carry one.

Webmaster's Commentary: 

Despite this, Hillary over last weekend insisted she had not only been honest with Congress and the people about the email server! Even the staunchest Hillary supporters in the media pointed out that this was a lie. Hillary then tried to backtrack, saying that her recollection was that James Comey said she was truthful, then her campaign backtracked yet again saying that Hillary didn't really lie; it was just her honest opinion that she voiced!

We understand just fine!

Click for larger image to print and share.

Aug 02 19:09

Your battery status is being used to track you online

A little-known web standard that lets site owners tell how much battery life a mobile device has left has been found to enable tracking online, a year after privacy researchers warned that it had the potential to do just that.

Aug 02 15:16

America’s Electronic Voting Machines Are Scarily Easy Targets

By now states have had plenty of warning since a damning report by the Brennan Center for Justice about our voting machine vulnerabilities came out last September. Surely matters must have improved since then. -- Well, not exactly. In fact, not really at all...

Aug 02 14:23

FBI Agent Caught Spying For China Draws Comparisons to Hillary ( China gave millions in “speaking fees” to Clinton Foundation)

An FBI employee pled guilty in court for passing along sensitive information to the Communist Chinese government even as known Chinese agent Hillary Clinton is allowed to continue running for president.

Aug 02 12:27

Whistleblower’s Stunning Claim: “NSA Has All Of Hillary’s Deleted Emails, It May Be The Leak”

It would be truly ironic if instead of the Democrat hack originating at the Kremlin, as the media and Hillary have already concluded is the case without any actual proof, the true source of Hillary’s hacked and leaked emails is none other than an unknown crusader at the NSA itself, another “Snowden”, determined to see the downfall of Clinton after her actions exposed national security to unprecedented risk for years. Alas, we will never know: as we reported yesterday, it is the NSA that has been tasked with determining if Putin was responsible. We doubt it will find anything, however, we are certain that it won’t find itself to be the culprit.

Aug 02 11:36

What to do about lawless government hacking and the weakening of digital security

In our society, the rule of law sets limits on what government can and cannot do, no matter how important its goals. To give a simple example, even when chasing a fleeing murder suspect, the police have a duty not to endanger bystanders. The government should pay the same care to our safety in pursuing threats online, but right now we don’t have clear, enforceable rules for government activities like hacking and “digital sabotage.” And this is no abstract question—these actions increasingly endanger everyone’s security.

Aug 02 11:26

Windows 10 Anniversary Update: This design needs a dictator

Windows 10 doesn’t look very "Swiss" at all, though. In fact, its predecessors, Windows 8 and 8.1 and (especially) Windows Phone were much more "Swiss": spare, bold and confident. By contrast, Windows 10 looks a nervous Nellie. The wireframe glyphs which were chosen because they scale better across devices are much harder to identify correctly.

Webmaster's Commentary: 

Beware of geeks bearing glyphs!

Aug 02 09:36


Let us start with an historical fact. Treason and betrayal by the highest levels is a common feature of history, whether it is Judas vs Jesus, Brutus vs Julius Caesar, Benedict Arnold, the Rosenbergs, Jonathan Pollard, Aldrich Ames, Robert Hanssen. It is just a fact of life. It does happen.

Back in 1996, when Bill Clinton was running for re-election, he authorized the transfer of highly sensitive technology to China. This technology had military applications and allowed China to close the gap in missile performance with the United States. The transfers were opposed and severely criticized by the Defense Department.

Webmaster's Commentary: 

With WikiLeaks releasing over 20,000 Hillary emails clearly marked classified, it is time for a repost!

Optional Banner: 
WRH Exclusive
Aug 02 09:27

Court Rules Whole Site Blocking Justifiable in Piracy Fight

Forcing ISPs to block entire websites to tackle Internet piracy is justifiable, a court in India has ruled. The decision by the Delhi High Court means that copyright holders will not have to target specific URLs when attempting to stop infringement on sites that are involved in widespread piracy.

Aug 02 09:25

Madame President Clinton’s Coming War on the Blogosphere, and Your Countermeasures

Now that Hillary (“Hitlery”) Rodham Clinton (HRC) has received the Democratic Party nomination for president, there is a strong likelihood that she will win the election in November and then be enthroned as president in January of 2017. I predict that she willwaste no time in launching an onslaught of punitive new policies via executive orders, presidential memoranda, and policy directives promulgated through her cabinet and Federal agencies to eviscerate our Constitutional rights (most notably the 1st and 2nd Amendments). A key goal this campaign will be silencing dissent in the alternative press and the American blogosphere. Given HRC’s history in government “service”, her outlook on life, her socialist agenda, and her vindictiveness, I anticipate that any or all of the following measures will be undertaken by the HRC Administration:

Aug 02 08:45


Researchers at the University of Salamanca (USAL) have developed a ‘Sentiment Analysis’ (SA) algorithm that monitors Twitter and Facebook.

Psychologist, Paul Ekman has worked with the CIA, DOD and DHS for years, helping develop facial emotion detection, click here to read more.

Our government is also using ‘Emotive Analytics‘ (EA), to arrest and imprison innocent people!

Ekman has provided training to a whole series of people who were guards at Abu Ghraib prison, too, in how to extract information and truth without torture. “They used my [facial analysis] work, and it was very successful,” Ekman said.

It’s only a matter of time, before police use Emotive Analytics to arrest Americans.

What is SA?

SA trains algorithms to extract subjective emotions and feelings from texts. SA is based on the ‘Bayes theorem‘ and ‘Granger causality’.

Webmaster's Commentary: 

Absoflippinglutely unbelievable.

One more reason to never tweet, ever.

And remember, folks; "dangerous sentiments", in the current police state of Amerika is anything the government has defined in those ways.

Aug 02 08:30

Did Putin Out the Dems? Did American Spooks Out Trump?

If Washington wants to blame Putin for hacking and leaking the DNC emails through Guccifer 2.0 and Julian Assange’s WikiLeaks, American intelligence agencies should present their evidence to Congress or directly to the American people. Any conscientious journalist would demand that they do this, or at least highlight that his sources have offered no proof, though I would not hold my breath waiting for anything like that to happen.

The stakes here could hardly be higher. All governments lie, as journalist I.F. Stone taught us during the first Cold War, and the untruths, half-truths, and bullshit now get deeper by the day. This should come as no surprise. In my view, which does not appear to be widely shared, this is all part of the buildup to a new period of sustained confrontation between the United States and Russia, primarily in Eastern Europe and the Middle East.

Aug 02 08:28

FBI Opts to Investigate Source of DNC Leaks, Rather Than Rigged Primary

Trump spoke to the press about his alleged involvement with the email leaks. Though he denied any involvement, he also redirected attention back to the content of the documents and their implications, going on to say he hopes they find the rest of the emails missing from Clinton’s server. He was immediately labeled a traitor and a threat to national security by the Clinton campaign, as well as by all the media outlets in her pocket.

Yet Trump is not the one who was reckless with classified information, Hillary — that was you. He’s not the one who was exposed leading his party on a mission to squash anyone in the way — that was the woman you just hired as honorary chair.

Aug 02 07:52

Assange Did It: WikiLeaks Dispenses 23,000 Hillary Emails Marked “C” for Confidential (Classified)

WikiLeaks founder Julian Assange told us a month ago that the next batch of leaked Hillary Clinton emails could lead to an indictment.

Now, over 23,000 cables were just put out for the world to see.

Webmaster's Commentary: 

Which means FBI Director Comey lied when he said only 110 e-mails in 52 e-mail chains were classified!

Aug 02 06:55

A guide to online security for activists

The last year has seen an uptick in digital threats faced by individuals and organizations around the world, and those working on the question of Palestine are no exception.

Over the past few months, there have been attacks on boycott, divestment and sanctions (BDS) movement websites, threatening emails to activists and new information emerging on Israel’s surveillance capabilities.

Aug 01 20:35

Verizon Buys Yahoo For Under $5 Billion

Yahoo, which was once worth $125 billion, sold its core operating business for $4.8 billion in what Brian Solomon from Forbes described as, “the saddest $5 billion deal in tech history.”

Aug 01 16:40

‘Brazen, Extortionate’: Photographer Sues Getty Images For $1bn After Copyright Claim On Her Work

Photographer Carol M. Highsmith is suing Getty Images for $1 billion in damages for using her images after she was slapped with a lawsuit from a company which screamed infringement after she published one of her own photos on her website.

Aug 01 13:12

Flashback 2013 -"NSA shares raw intelligence including Americans' data with Israel"

(Note: We all know who DEFINITELY has a "safe copy" of all those Hillary Clinton e-mails . . and much more!!!. . . lol)

Aug 01 12:39

EXCLUSIVE – NSA Whistleblower: Agency Has All of Clinton’s Deleted Emails

The National Security Agency (NSA) has “all” of Hillary Clinton’s deleted emails and the FBI could gain access to them if they so desired, William Binney, a former highly placed NSA official, declared in a radio interview broadcast on Sunday.

Aug 01 10:36

'Webcam hackers caught me wanking, demanded $10k ransom'

One day in Melbourne, when the sun was out and the birds were singing, Matt opened an email and was greeted with a video of a man wanking.

The man was him.

"There I was in all my glory," he told triple j's Veronica & Lewis.

He had been hacked. A 'ransomware' program had infected his computer allowing the hackers to film him through the webcam. He had been filmed in a compromising situation.

Now they wanted money.

Aug 01 10:25

Windows 10 now on over 21% of all desktops, says NetMarketShare

Looking at it from the other side, 79% of people refused the free "upgrade".

Aug 01 09:54

Hackers can remotely bug almost ANY machine: Malware hijacks office equipment to create spying devices

Your computer, phone and even printer could be spying on you.

Experts have warned everyday machines such as these may be used to bug any kind of building remotely.

A new king of malware uses circuits found on most devices and radio frequency waves to turn them into listening devices, without the hackers even accessing the machines.

The malware, named 'Funtenna' by lead researcher Ang Cui from Red Balloon Security, would be hard to detect because no traffic logs would catch data leaving the premises.

Aug 01 09:40

US Election Shocker: Is This How The Vote Will Be Rigged?

By Jon Rappoport

Votes are being counted as fractions instead of as whole numbers.

As we know, there are a number of ways to rig an election. Bev Harris, at, is exploring a specific “cheat sheet” that has vast implications for the Trump vs. Hillary contest.

It’s a vote-counting system called GEMS...

Aug 01 09:02

Is Twitter "Shadow-Banning" Donald Trump?

While Twitter is censoring Trump, it has repeatedly been accused of gaming its algorithms in support of Hillary. Back in February, users were irate after the social media giant appeared to censor the anti-Hillary hashtag #WhichHillary after it started trending.

The revelation that Twitter is shadow banning Trump comes on the heels of Google claiming that a ‘technical bug’ was to blame for Donald Trump not appearing when users searched for “presidential candidates”.

Aug 01 08:15

Whistleblower's Stunning Claim: "NSA Has All Of Hillary's Deleted Emails, It May Be The Leak"

Speaking on Aaron Klein's Sunday radio program, “Aaron Klein Investigative Radio,” broadcast on New York’s AM 970 The Answer and Philadelphia’s NewsTalk 990 AM, Binney raised the possibility that the hack of the Democratic National Committee’s server was done not by Russia but by a disgruntled U.S. intelligence worker concerned about Clinton’s compromise of national security secrets via her personal email use.

Aug 01 08:10

How to avoid ransomware attacks: 10 tips

As ransomware increasingly targets healthcare organizations, schools and government agencies, security experts offer advice to help IT leaders prepare and protect.

Webmaster's Commentary: 

And the same government that cannot find and arrest these cyber-criminals insists you take their word for it that Russia was behind the DNC hack.

Aug 01 07:55

Israeli Intelligence Debunks Notion of Russia Hacking DNC Emails

No evidence links Russia to hacking DNC emails. Accusations suggesting otherwise are baseless – the latest bashing episode, for geopolitical purposes, shifting attention from Hillary’s disturbing record, and electoral rigging of the primaries.

Israeli military intelligence/Mossad connected DEBKAfile said “an analysis by (its) intelligence and cyber defense sources has determined that” DNC emails hacking “almost certainly (was) not carried out by (Russia’s GRU) cyber warfare branch.”

Its determination is contrary to unjustifiable assertions by senior DNC officials, Obama, the Clinton campaign, administration-connected cyber espionage experts and mainstream media – pointing fingers the wrong way.

Putin spokesman Dmitry Peskov categorically denied Russian “direct or indirect interference in (America’s) election process,” adding:

Aug 01 07:34

America's Longest War Gets Longer

Anti-Russian hysteria in America reached its apogee this week as Democrats tried to divert attention from embarrassing revelations about how the Democratic Party apparatus had rigged the primaries against Bernie Sanders by claiming Vlad Putin and his KGB had hacked and exposed the Dem’s emails.

This was rich coming from the US that snoops into everyone’s emails and phones across the globe. Remember German chancellor Angela Merkel’s cell phone being bugged by the US National Security Agency?

Aug 01 07:04

Police 3D-printed a murder victim's finger to unlock his phone

Police in Michigan have a new tool for unlocking phones: 3D printing. According to a new report from Flash Forward creator Rose Eveleth, law enforcement officers approached a professor at Michigan State earlier this year to reproduce a murder victim’s fingerprint from a prerecorded scan. Once created, the 3D model would be used to create a false fingerprint, which could be used to unlock the phone.

Jul 31 19:43

Windows 10 pain: Reg man has 75 per cent upgrade failure rate

Support for older systems less than satisfactory

Jul 31 09:48

US Cyberwar on Russia?

On Saturday, Tass reported what looks like Washington’s dirty handiwork, perhaps complicit with NATO and Israel, saying:

Russia’s “Federal Security Service (FSB) revealed virus software for cyber-spying in computer networks of about 20 organizations located in Russia.”

The attack targeted “information resources of the state authorities, scientific and defense companies, enterprises of the defense industry and other objects of the country’s critically important infrastructures.”

“(C)learly, it was a targeted virus spread, planned and made professionally. Specialists say the malicious software, judging by the style of programming, names of files, parameters of their use and by methods, is similar to the software, which was used in much-spoken-about earlier revealed cyber-spying, revealed both in territory of the Russian Federation and around the globe.”

Jul 31 09:20

Assange won't implicate Russia in DNC email leak

"We don't give any material away as to who our sources are," he added. "It's a security matter for us as to who our sources are."

Instead, Assange focused on the content of the emails, which appeared to show senior DNC officials working to undermine the presidential campaign of Vermont Sen. Bernie Sanders in favor of Democratic rival Hillary Clinton and resulted in the resignation of DNC Chairwoman Debbie Wasserman Schultz.

Webmaster's Commentary: 

"So there was vote fraud. Everybody does it! You should stop thinking about what was in those emails or else you are a Russian stooge! If you are a loyal American, all you will think is 'Evil Russians!', 'Evil Russians!', 'Evil Russians!', 'Evil Russians!', 'Evil Russians!', 'Evil Russians!', 'Evil Russians!!!!!!'" -- Shrillary

Jul 31 08:38

Russia says spyware found in state computer networks

Russia's intelligence service said on Saturday that the computer networks of 20 organizations, including state agencies and defense companies, have been infected with spyware in what it described as a targeted and coordinated attack.

The Federal Security Service, the FSB, said the malware and the way the networks were infected were similar to those used in previous cases of cyber espionage found in Russia and other countries. The agency did not say who it suspected of being behind the attacks

Webmaster's Commentary: 

Stuxnet Part deux!?!?!

Jul 30 16:53

Pokémon Go Is a Govt. Surveillance Psyop

Intelligence agencies may see Google Maps and Street View as just a skeleton of the whole picture. Getting more data, particularly off the street and inside buildings, requires tons of man hours.

Enter Pokemon GO, where if you are an intel agency and you want photos of the inside of a home or business, you just spawn desirable Pokemon or related objects there. And let totally unaware and distracted citizens take the photos for you, with devices they paid for. And those citizens pay for the experience.

Jul 30 11:26

Clinton campaign breached by hackers

Hillary Clinton’s campaign network was breached by hackers targeting several large Democratic organizations, Reuters reports.

Clinton’s campaign spokesperson Nick Merrill confirmed the hack in a statement. “An analytics data program maintained by the DNC, and used by our campaign and a number of other entities, was accessed as part of the DNC hack. Our campaign computer system has been under review by outside security experts. To date, they have found no evidence that our internal systems have been compromised,” he said.

Webmaster's Commentary: 

When Hillary tried to point at Russia over the WikiLeaks data, there was nothing to support it.

Therefore, I think this latest hack was done solely for the purpose of planting clues to frame Russia.

Jul 30 10:52


Microsoft is facing two more lawsuits over the company’s questionable Windows 10 upgrade tactics. Both suits are seeking class-action status.

The first suit was filed in U.S. District Court in Florida. It alleges that Microsoft’s Windows 10 upgrade prompts “violated laws governing unsolicited electronic advertisements,” as reported by The Seattle Times. The suit also says Microsoft’s tactics are against the Federal Trade Commission’s rules on deceptive and unfair practices.

The second suit was filed in June in Haifa, Israel alleging that Microsoft installed Windows 10 on users’ computers without consent. Microsoft already paid out a $10,000 award in a previous U.S. suit over similar circumstances.

Webmaster's Commentary: 


Jul 30 08:41

Clinton Campaign Also Hacked In Attacks On Democrats: Sources

The computer network used by Democratic presidential nominee Hillary Clinton’s campaign was hacked as part of a broad cyber attack on Democratic political organizations, people familiar with the matter told Reuters.

The hack appears to have been carried out by Russian intelligence services, a federal law enforcement official told the New York Times.

The latest attack, which was disclosed to Reuters on Friday, follows reports of two other hacks on the Democratic National Committee, or DNC, and the party’s fundraising committee for candidates for the U.S. House of Representatives.

A Clinton campaign spokesman said in a statement late on Friday that an analytics data program maintained by the DNC and used by the campaign and a number of other entities “was accessed as part of the DNC hack.”

Webmaster's Commentary: 

Forgive me, but is this the best the DNC can do?!? Accusing Russia of these hacks?!?

Either you have incontrovertible evidence, or you don't; and it looks as though they have zero evidence, whatsoever, to link Russia to these hacks.

They just made it up out of thin air, period, end of discussion, do deflect accusations of lousy computer security (just like Hillary Clinton's non-secure, non-governmental servers)!!

Jul 30 08:01

FLASHBACK - Clinton Email Scandal: Latest Batch Exposes Two Big New Problems For Hillary

As the AP reports, "the emails ... show that the State Department technical staff disabled software on their systems intended to block phishing emails that could deliver dangerous viruses."

Jul 29 17:50

Clinton campaign denies reports that its computer system was hacked

The Clinton presidential campaign said Friday that an “analytics data program” maintained by the Democratic National Committee had been hacked but that its computer system had not been compromised, denying news reports Friday that the campaign had become the third Democratic Party organization whose systems had been penetrated.

So far, campaign computer experts “have found no evidence that our internal systems have been compromised,” campaign spokesman Nick Merrill said in a statement.

Jul 29 15:48

Illinois Governor Signs Bill Requiring Warrant For “Stingray” Surveillance

By Derrick Broze

Illinois has become the latest state to pass legislation designed to limit the use of cell phone surveillance tools by requiring law enforcement to obtain a warrant before using the devices.

On Friday July 22, Illinois Governor Bruce Rauner signed legislation which creates new limits on how law enforcement can use surveillance devices known as cell site simulators, or “stingrays.” According to the Tenth Amendment Center, the new law will prohibit the use of stingrays except to locate or track the location of a communications device or to identify a communications device...

Jul 29 12:56

British Spies Used a URL Shortener to Honeypot Arab Spring Dissidents

A shadowy unit of the British intelligence agency GCHQ tried to influence online activists during the 2009 Iranian presidential election protests and the 2011 democratic uprisings largely known as the Arab Spring, as new evidence gathered from documents leaked by Edward Snowden shows. The GCHQ’s special unit, known as the Joint Threat Research Intelligence Group or JTRIG, was first revealed in 2014, when leaked top secret documents showed it tried to infiltrate and manipulate—using “dirty trick” tactics such as honeypots—online communities including those of Anonymous hacktivists, among others.

Jul 29 08:40

What Makes People Choose Hedonistic Foods Over Healthful Ones?

By Karen Foster

When hunger strikes, we often eat with our eyes and it creates a fine line between eating those foods which we consider pleasurable or healthy. This then often forms the the connection between the mind and the mouth dictating our health and weight. A series of five studies suggests that when one sees a self-indulgent food on a touch screen, the hedonistic centers of our brain are facilitated...

Jul 29 08:38

iTunes users targeted with £20 purchase refund scam - how to protect yourself

Apple's iTunes customers are being warned to delete "scam" emails that are being sent to some customers claiming they have been charged more than £20 to download a song.

Reports have surfaced on social media of iTunes users receiving an email claiming to be from Apple, detailing an alleged recent song purchase from the iTunes Store that costs £23.34.

However, the aim appears to be to encourage them to click a link within the email to 'cancel and manage subscriptions', but in fact leads to a fraudulent website that asks users to enter their personal details.

Apple customers have also reported receiving emails claiming to be from iTunes that include a bill for Netflix.

Jul 29 06:50

No, We Don’t Know Yet That Russia is Behind DNC Email Hacks. Here’s Why.

There is a strong narrative underway. It was propelled largely by Clinton’s campaign manager, Robby Mook, and members of the Democratic National Committee after news broke over the weekend that thousands of embarassing internal emails were posted to WikiLeaks. The theory goes that the Russian government is behind the hack because they want to meddle in U.S. politics to help Donald Trump (who is “cozy” with Vladimir Putin).

Different media organizations continue to cite “government sources” as confirmation of Russia’s evil intentions. (Russia has denied any involvement). And, if you actually examine the facts, you will see that we simply don’t have enough yet to prove this theory out. Yes, there are some indicators that it could be Russia. Yes, there is reportedly metadata hidden in early documents that show they were edited with Russian language settings. Yes, Crowd Strike, a cyber firm hired by the DNC, claims that they found two hacker groups associated

Jul 29 06:07

Amazon's Alexa can lock your front door if you own this smart lock

What could possibly go wrong?

Jul 29 06:01

Security experts have cloned all seven TSA master keys

The TSA, for their part, doesn’t care, telling The Intercept that “The reported ability to create keys for TSA-approved suitcase locks from a digital image does not create a threat to aviation security. These consumer products are ‘peace of mind’ devices, not part of TSA’s aviation security regime.”

In other words, you might as well not use locks at all.

Jul 29 05:58

Google search connects Trump's book to Hitler's 'Mein Kampf'

Google’s search function has been thrust into the spotlight again for connecting Donald Trump and Adolf Hitler. On Wednesday, typing the name of Trump’s 2015 book “Crippled America” into a Google image search, in addition to bringing up images of that book, displayed images of Adolf Hitler’s 1920s manifesto “Mein Kampf.” (The "Mein Kampf" images have since been removed.)

Google has been in the spotlight before for a connection between Trump and the infamous Nazi leader. In June, Googling the phrase “When was Hitler born” also produced an image of Donald Trump and listed his birthday. In that case, Google said it removed the Trump image, and a recent search confirms that the candidate’s image is no longer connected with Hitler’s birthday.

Jul 28 16:05

National Weather Service Accused Of Spying On Its Unionized Employees

It looks like the National Weather Service is observing more than just clouds and wind. Its employees have filed charges against management alleging the federal agency is conducting illegal surveillance of private discussions on the union’s Facebook page.

Jul 28 15:02

Dear Russia: Can You Find Hillary’s 30,000 Missing E-Mails? (Trump taunts humorless Hill)

‘Russia, if you’re listening, I hope you’re able to find the 30,000 emails that are missing,’ Trump said. ‘I think you’ll be rewarded mightily by our press!’

Jul 28 13:40


image credit: Cryptome According to a NYC. gov page, CityBridge was chosen in 2014 to offer free private Wi-Fi to NYC residents. CityBridge is a consortium of companies that includes Intersection, Qualcomm, and CIVIQ Smartscapes – to develop and operate the LinkNYC network. (the above pic. shows one of two surveillance cameras) These kiosks, called ‘Links,’ will provide the public with a fast, private Wi-Fi network providing free domestic calling, two USB charging ports, a tablet for accessing the internet, and a red 911 button to contact emergency services. New York city plans on installing nearly10,000 spying kiosks.

Jul 28 13:30

BEX ALERT - How Donald Trump Made the U.S. a Target For Russia’s New Brand Of Warfare

Webmaster's Commentary: 

Recall just WHO created STUXNET!

Jul 28 11:46


In a public meeting at FCC headquarters on July 14, the agency which once served the people instead acted like tyrannical thugs, in an escalating series of remarkable events.

First, they prevented wireless science advocates from displaying a simple sign, violating their First Amendment rights in a public venue. Then, a security guard forcefully prevented a t-shirt from being taken out of a bag, by a former Congressional candidate with opposing views.

Next, a Bloomberg reporter had his credentials confiscated — almost unbelievably — for merely talking with the former Congressional candidate.


Webmaster's Commentary: 

It's always "profits uber alles" for this country's government, at this state.

Jul 28 10:24

Banking trojan being distributed via 'legitimate' PayPal accounts

Hackers are using PayPal to distribute the Chtonic banking trojan, a variant of Zeus, according to security company Proofpoint.

The emails are ‘legitimate' but low in volume, and are not filtered by anti-spam or antivirus software because they come via genuine PayPal accounts.

"The sender does not appear to be faked. Instead the spam is generated by registering with PayPal (or using stolen accounts) and then using the portal to request money," said Proofpoint in a security advisory.

Jul 28 10:22

PetNet smart pet feeders break, leaving pets without food

The Petnet Smartfeeder, a $149 internet-connected pet food machine, has suffered server issues causing pets to go hungry as scheduled meals have failed to dispense and manual feeding from the corresponding iOS app didn't work for some users.

As tweeted by a Petnet customer, the company issued an email to users stating: “we are experiencing some difficulties with one of our third party servers.” The servers, rented by Petnet from Google, were down for about 10 hours.

As a result, the company told users: “you may experience a loss of scheduled feeds and failed remote feedings".

In a knock to confidence for early adopters of the emergent ‘Internet of Things’, the startup advised owners of Smartfeeder devices: “please ensure that your pets have been fed manually until we have resolved this issue".

Jul 28 09:35

Amazon Delivery Drones Are Just The First Step To A Highway In The Sky

By Andy Miah, University of Salford

Amazon recently announced plans to test a drone delivery system in parts of the UK that are hard to access with conventional delivery methods. While much attention has focused on the service it would provide to Amazon customers, the really interesting story is what this agreement with the British government tries to achieve on a much broader level.

If successful, it will essentially create a high-altitude floating highway between 200 and 400 feet above the ground, within which a whole range of activities could be performed...

Jul 28 07:43


When Hillary Clinton sent classified emails from her unsecure, personal server, lied and got caught they said... Everybody does it.

When thousands of emails and documents suddenly disappeared from the IRS on hard drives conveniently eaten by the dog they said... Nothing to see... Move along.

When the CIA Director got his email hacked by a teenager who smokes pot every day they said... Dude, he smokes pot?

When the Russians (maybe) hacked the DNC showing the party to be a bunch of frat boy jerks more interested in scoring with chicks, bad mouthing Bernie Sanders and collecting cash from stupid donors they said...


Webmaster's Commentary: 

Jul 28 07:27

Siberian candidate?

Who would have thought Russia and Vladimir Putin would play such an important role in the American presidential election? The media treadmill claims Trump is under Putin’s spell. And Hillary Clinton is blaming the Russian president for yet another scandal. Russia is a one-size-fits-all political tool.

Webmaster's Commentary: 

Again, I want to remind everyone that the same government and unnamed "security experts" blamed the Sony Pictures hack on then-top villain North Korea, only to have it later come out it was an internal leak by a disgruntled employee, are the same government and unnamed "security experts" blaming Russia for the DNC leak.

Jul 28 01:26

Trump's Loophole Regarding Russia's Assistance Hacking Criminal Email

Treaty between the Government of the United States of America and the Russian Federation on Mutual Legal Assistance in Criminal Matters, signed at Moscow on June 17, 1999, and a related exchange of notes.
Date Received from President

Jul 27 14:58

Facebook Fails to Show Up for Seventh Tax Summons From IRS

Facebook Inc. officials failed to show up after getting seven summonses from the Internal Revenue Service demanding internal corporate records on one of its offshore tax strategies, according to an IRS court filing.

Webmaster's Commentary: 

"That's okay. I'll get a pardon from President Hillary for blocking all those DNC email links." -- Zookerburg

Jul 27 14:18

Assange Promises To Leak ‘A Lot More’ Materials On US Presidential Elections

WikiLeaks possesses “a lot more” documents to surprise American voters ahead of the upcoming presidential elections – and will not hesitate to make them public.

Jul 27 13:20

Federal Judge Rules Hidden Microphones in Public Do Not Violate Constitution

By Derrick Broze

A federal judge has ruled that law enforcement may continue to place recording devices in public place because it does not violate the constitutional guarantee against warrantless searches and privacy protections.

On Friday July 22, U.S. District Judge Phyllis Hamilton issued a 17-page ruling which found the practice of placing recording devices on the steps of courthouses in Oakland and Martinez, California to be “unsettling,” but not in violation of the Fourth Amendment. The four defendants in the federal criminal fraud case are accused of rigging real estate bids throughout Alameda and Contra Costa Counties...

Jul 27 11:45

Bad news for Bob the Builder: Watch Hadrian X the robo-builder create an entire house in just two days

It can lay 1,000 bricks an hour and work around the clock, 24 hours a day

A robotic 'hand' lays the brick, and applies adhesive instead of mortar, which improves the thermal efficiency

It 3D scans its surroundings to work out exactly where to place bricks - and is simply parked next to site

Webmaster's Commentary: 

Not sure I would care to live in that house, but still, pretty cool!

Jul 27 10:57

Wikileaks Assange Denies Russian Hacker Help / DNC official IT Tech shot in back and not robbed

Webmaster's Commentary: 

Reward for information on the killers is now $50,000.

Maybe Seth was the one who leaked the DNC emails to WikiLeaks?

Jul 27 10:57

KeySniffer: Hackers can snag wireless keyboard keystrokes from 250 feet away

From hundreds of feet away, attackers can see everything that is being typed as well as type directly on a PC due to flawed wireless keyboards from at least eight vendors.

Jul 27 10:37

If Russian Intelligence Did Hack the DNC, the NSA Would Know, Snowden Says

Glenn Greenwald told WNYC on Monday, while there may never be conclusive evidence that the Democratic National Committee was hacked by Russian intelligence operatives to extract the trove of embarrassing emails published by WikiLeaks, it would hardly be shocking if that was what happened.

“Governments do spy on each other and do try to influence events in other countries,” Glenn noted. “Certainly the U.S. government has a very long and successful history of doing exactly that.”

Even so, he added, given the ease with which we were misled into war in Iraq by false claims about weapons of mass destruction — and the long history of Russophobia in American politics — it is vital to cast a skeptical eye over whatever evidence is presented to support the claim, made by Hillary Clinton’s aide Robby Mook, that this is all part of a Russian plot to sabotage the Democrats and help Donald Trump win the election.

Webmaster's Commentary: 

Putin has absolutely no love of Clinton, due to her warmongering and lying; however, I seriously doubt that he would ever sign off on something so ham-fisted that it could be pointed back at Russian cyber-warfare.