COMPUTERS/INTERNET/SECURITY | WHAT REALLY HAPPENED


COMPUTERS/INTERNET/SECURITY

Jul 25 10:17

Canada Claims Authority to Censor Your Internet Searches

The Canadian Supreme Court today ruled the country has the authority to demand Google censor and remove links to certain web pages or online content.

The idea that governments can force Google to deindex links to pages is unfortunately not new (see the European Union's "right to be forgotten"). What matters internationally in this case is the government is forcing Google to remove links from searches regardless of where the Internet user is. That is to say: Canada is demanding the authority to censor the internet outside of its physical borders and control what people who are not Canadian citizens can find online.

Jul 25 10:16

NSA Officials and Computer Expert: Forensic Evidence Proves DNC Emails Were LEAKED, Not Hacked

Preface by Washington's Blog: We asked top NSA whistleblower Bill Binney what he thought about a report claiming that the DNC emails were transferred too quickly to have been accessed by a hacker, and could only have been copied by a DNC leaker. This article is his response. Background here and here.

MEMORANDUM FOR: The President

FROM: Veteran Intelligence Professionals for Sanity (VIPS)

SUBJECT: Was the “Russian Hack” an Inside Job?

Executive Summary

Forensic studies of “Russian hacking” into Democratic National Committee computers last year reveal that on July 5, 2016, data was leaked (not hacked) by a person with physical access to DNC computers, and then doctored to incriminate Russia.

After examining metadata from the “Guccifer 2.0” July 5, 2016 intrusion into the DNC server, independent cyber investigators have concluded that an insider copied DNC data onto an external storage device, and that “telltale signs” implicating Russia were then inserted.

Webmaster's Commentary: 

Translation: the alleged "Russian hacking" of last November's election never actually happened; it was simply a convenient lie, concocted at the top levels of the DNC, with which the Democrats tried to spin their appalling losses in 2016.

There's no "there" there.

Jul 25 09:49

FEDS DEPLOY MASSIVE ‘PRE-CRIME’ DRAGNET ON MILLIONS OF AMERICANS

And the greatest danger of all is over the horizon. Once the government discovers a new technology to intrude on the lives of ordinary citizens, a pretext will no doubt be developed after the next terrorist incident or insider attack to use it in ever widening circles as new threats are allegedly discovered. When that happens, we can confidently expect Patriot Act III, with a provision allowing continuous surveillance of any and all possible suspects. And there is actually a precedent. Back in 2003, the Pentagon under George W. Bush was already tinkering with what if referred to as Total Information Awareness to examine predictive behavior, described at the time as the “biggest surveillance program in the history of the United States.”

Webmaster's Commentary: 

George Orwell was not just a brilliant author; he was also a prophet, and we are seeing his dystopian universe come to chilling fruition in the 21st century.

Jul 25 09:09

The 45 minutes that cost global giant Reckitt £100m: 15,000 laptops, 2,000 servers, 500 systems crippled in hacking attack

A devastating cyber-attack that cost the maker of Durex and Dettol an estimated £100million crippled the company in just 45 minutes and wiped out swathes of its global computer network, its boss has revealed.

Reckitt Benckiser chief executive Rakesh Kapoor laid bare how the Petya ransomware virus rendered 15,000 laptops, 2,000 servers and 500 computer systems unusable in three-quarters of an hour – and the company has still not fully recovered.

Jul 25 08:55

FBI and NSA outsource their harassment of Targeted Individuals and Watchlisted Individuals to private firms

Now there are a few private companies, think of Blackwater” on a cyber-level, which are also master’s of intrusion, hacking, identity theft, spoofing and 24/7 harassment of anyone who has been illegally and unconstitutionally watch-listed as a domestic threat. However NSA still has the budget, the tech-toys, the software and extra-judicial tactics which trump any of the subsequently mentioned private groups.

One of the companies which acts as a hired gun for the federal government (and thus has the luxury of operating without any oversight, is James Bimen and Associates, based in Fairfax, Virginia. This corporation is right down the street from several acronym agencies, has developed special tools for the FBI and is tasked to hack into computers and phones of watch-listed individuals (WLIs) and Targeted Individuals (TIs).

Jul 25 08:28

Intel Vets Challenge ‘Russia Hack’ Evidence

In a memo to President Trump, a group of former U.S. intelligence officers, including NSA specialists, cite new forensic studies to challenge the claim of the key Jan. 6 “assessment” that Russia “hacked” Democratic emails last year.

Jul 25 07:46

Apple Users, Beware! A Nearly-Undetectable Malware Targeting Mac Computers

An unusual piece of malware that can remotely take control of webcams, screen, mouse, keyboards, and install additional malicious software has been infecting hundreds of Mac computers for more than five years—and it was detected just a few months back.

Dubbed FruitFly, the Mac malware was initially detected earlier this year by Malwarebytes researcher Thomas Reed, and Apple quickly released security patches to address the dangerous malware.

Now months later, Patrick Wardle, an ex-NSA hacker and now chief security researcher at security firm Synack, discovered around 400 Mac computers infected with the newer strain of the FruitFly malware (FruitFly 2) in the wild.

Wardle believes the number of infected Macs with FruitFly 2 would likely be much higher, as he only had access to some servers used to control FruitFly.

Jul 25 07:44

Roombas have been busy mapping our homes, and now that data could be up for sale

Over the past couple of years, Roombas haven’t just been picking up dust and chauffeuring cats around, they’ve also been mapping the layout of your home. Now, Colin Angle, the chief executive of Roomba maker iRobot, has said he wants to sell the data from these maps in order to improve the future of smart home technology.

Jul 25 07:36

Hacker Steals $8.4 Million in Ethereum (4th Heist In A Month)

An unknown hacker has just stolen nearly $8.4 Million worth of Ethereum – one of the most popular and increasingly valuable cryptocurrencies – in yet another Ethereum hack that hit Veritaseum's Initial Coin Offering (ICO).

This incident marks as the fourth Ethereum hack this month and second cyber attack on an ICO, following a theft of $7 Million worth of Ether tokens during the hack of Israeli startup CoinDash's initial coin offering last week.

A few days ago, a hacker also stole nearly $32 Million worth of Ethereum from wallet accounts by exploiting a critical vulnerability in Parity's Ethereum Wallet software, which followed a $1 Million worth of Ether and Bitcoins heist in crypto currency exchange Bithumb earlier this month.

Jul 25 05:01

Welcome to the Era of Artificial Intelligence and Technological Deceit

The era of artificial intelligence and technological deceit is upon us.

Pretty soon, computer wizardry and artificial intelligence will allow video footage to be created that is practically indiscernible from the real deal. Add to this holograph technology, and soon, a person could appear to be speaking, live, in front of you, and you’d never even know it was all fake.

Let's look at three technologies that bring the possibility of deception to dizzying heights. If you think "fake news" and media manipulation is bad now, you ain't seen nothin' yet.

Jul 25 04:02

CHINA FORCES MUSLIM MINORITY TO INSTALL SPYWARE ON THEIR PHONES

Chinese authorities in the province of Xinjiang are forcing locals of the Uyghur Muslim minority to install an app on their phones that will allow the government to scan their device for "terrorist propaganda," local media reports. In reality, the app creates MD5 hashes for the user's files and matches them against a database of known terrorist content.

Jul 24 17:44

Net Neutrality Regulations Are Pushed by Large Corporations

In this video, Vin Armani explains why you’ve been tricked into supporting net neutrality. Some big corporations don’t want a free market. They want a protected market with barriers. Lawmakers seem hungry to regulate the Internet. It’s a dangerous combination that infects most industries. Don’t let it happen to the Internet.

Jul 24 17:24

32M Becomes First-Ever Company to Implant Micro-Chips in Employees

Marketing solution provider Three Square Market (32M) has announced that it had partnered with Swedish biohacking firm BioHax International for offering implanted microchips to all their employees on 1st August, according to the company's website.

Although the programme is optional, the company wants at least more than 50 of its employees to undergo the Biohacking procedure.

Like previous bio hacks, the chips will be implanted underneath the skin between the thumb and forefinger, and will also use near-field communications (NFC) — the same technology that makes contactless credit cards and mobile payments possible — along with radio-frequency identification (RFID).

According to the company, the implanted chips would allow its employees to log into their office computers, pay for food and drink from office vending machines, open doors and use the copy machine, among other purposes.

Jul 24 16:08

Hackers Nab $32mn In Ethereum Cryptocurrency

Some $32 million worth of ether cryptocurrency has been stolen by hackers. Ether, a digital currency, resides on the ethereum network and is now a rival to Bitcoin. The monumental theft was carried out due to a bug on a wallet software program.

Jul 24 13:22

EXCLUSIVE: FBI Says ‘Awan Brothers’ Hard Drives Were Smashed After Confiscated As Law Enforcement Evidence

Reports of the FBI seizing computer hard drives form the home of the congressional IT director and aide of Florida Democratic Rep. Debbie Wasserman Schultz are accurate, according to FBI sources: with the exception of one major detail. The computer hard drives were not damaged when they were confiscated, FBI sources said.

The FBI, who is working in some capacity to assist with the Capitol Police on the Awan investigation, confirm the hard drives and other computer equipment have been damaged but are pointing the finger at the Capitol Police’s chain of custody with the evidence. The FBI, they said, would not damage evidence and stressed if someone went to the trouble of destroying evidence before a seizure they normally would discard of it as well, federal sources said.

Capitol Police officials would not respond to requests for comment.

Jul 24 09:23

BLACKSTONE GROUP TO BUY STAKE IN ISRAELI FIRM BEHIND GOV SURVEILLANCE SOFTWARE

The Israeli company has become a world leader in cyber infiltration and has been used against activists and dissidents the world over.

Jul 24 09:18

THERE'S A REASON YOU SHOULD BE TERRIFIED OF IRIS SCANNERS AND IPHONE FACIAL RECOGNITION – BUT IT'S NOT THE REASON YOU THINK

Last week, high street lender TSB announced that it was becoming the first bank in Europe to introduce iris recognition on its mobile banking app, allowing you to transfer money, check your balance and make payments, quite literally, in the blink of an eye.

Jul 24 08:38

NSA Officials and Computer Expert: Forensic Evidence Proves DNC Emails Were LEAKED, Not Hacked

Forensic studies of “Russian hacking” into Democratic National Committee computers last year reveal that on July 5, 2017, data was leaked (not hacked) by a person with physical access to DNC computers, and then doctored to incriminate Russia.

After examining metadata from the “Guccifer 2.0” July 5, 2016 intrusion into the DNC server, independent cyber investigators have concluded that an insider copied DNC data onto an external storage device, and that “telltale signs” implicating Russia were then inserted.

Key among the findings of the independent forensic investigations is the conclusion that the DNC data was copied onto a storage device at a speed that far exceeds an Internet capability for a remote hack. Of equal importance, the forensics show that the copying and doctoring were performed on the East coast of the U.S. Thus far, mainstream media have ignored the findings of these independent studies.

Jul 24 08:34

Clinton Email Scandal: Now A Key Witness' Emails Have Mysteriously Vanished

Hillary Clintons email troubles just keep getting weirder and
weirder -- and harder for anyone but the most die-hard Clinton
fans to ignore.

The latest twist is news that four years worth of State
Department emails from Clintons top IT staffer, Bryan Pagliano,
cant be found.

The Department has searched for Mr. Paglianos email pst file
and has not located one that covers the time period of Secretary
Clintons tenure, said States Elizabeth Trudeau.

State was, however, able to find Pagliano emails for his recent
work at the Department as a contractor, but the files are from
after Secretary Clinton left the Department.

In other words, only those emails he sent after Clinton left
State can be found. How convenient.

Jul 24 08:24

FBI Seized Smashed Hard Drives From Wasserman Schultz IT Aide’s Home

FBI agents seized smashed computer hard drives from the home of Florida Democratic Rep. Debbie Wasserman Schultz’s information technology (IT) administrator, according to two sources with knowledge of the investigation.

Pakistani-born Imran Awan, long-time right-hand IT aide to the former Democratic National Committee (DNC) Chairwoman, has since desperately tried to get the hard drives back, an individual whom FBI investigators interviewed in the case told The Daily Caller News Foundation’s Investigative Group.

Jul 24 07:59

Windows 10 and a bump in the road to Windows as a Service

The discovery last week that millions of PCs that upgraded to Windows 10 might be cut off from support much earlier than expected is one unexpected consequence of Microsoft's ongoing shift to Windows as a Service.

Under the old model, it was pretty easy to understand where you stood with Windows, because Microsoft has long published the dates after which it will stop supporting various versions of its software.

Jul 24 06:40

Debian patches plenty in new version 9.1

26 security fixes for 55 packages. You know what to do!

Jul 24 06:38

Sweden leaked every car owners' details last year, then tried to hush it up

Falkvinge writes Sweden's government has been trying to handle the huge leak of sensitive data away from the public eye.

The story goes back to 2015, when Sweden's transport agency awarded IBM a contract to manage its databases and networks.

...

The leak seems to have happened over email after the transport agency e-mailed the entire database in clear text messages to marketers that subscribe to it – and when the error was discovered, the agency merely sent a new list and told subscribers to delete the old list themselves.

Jul 24 06:33

Sweden Accidentally Leaks Personal Details of Nearly All Citizens

Another day, Another data breach!

This time sensitive and personal data of millions of transporters in Sweden, along with the nation's military secrets, have been exposed, putting every individual's as well as national security at risk.

Who exposed the sensitive data? The Swedish government itself.

Swedish media is reporting of a massive data breach in the Swedish Transport Agency (Transportstyrelsen) after the agency mishandled an outsourcing deal with IBM, which led to the leak of the private data about every vehicle in the country, including those used by both police and military.

The data breach exposed the names, photos and home addresses of millions of Swedish citizen, including fighter pilots of Swedish air force, members of the military's most secretive units, police suspects, people under the witness relocation programme, the weight capacity of all roads and bridges, and much more.

Jul 24 06:27

Source Code For SLocker Android Ransomware That Mimics WannaCry Leaked Online

Bad news for Android users — Source code of for one of the oldest mobile and popular Android ransomware families has been leaked online, making it available for cyber criminals who can use it to develop more customised and advanced variants of Android ransomware.

Jul 24 05:25

Scott Adams: How “Confident” are Intelligence Agencies that Russia Interfered with the Election?

Remember when all seventeen intelligence agencies agreed that Russia interfered with our elections?

Turns out it was only four.

Do you know how you get four agencies to agree on something of this nature? It’s easy. One publishes an opinion and the other three loyal agencies assume it is credible, so they support it. Do they all do independent investigations?

I kinda doubt it.

Jul 23 21:08

Let the robots take our jobs and pay for a universal basic income

As developments in artificial intelligence and robotics advance, there is going to be a severe and swift disruption of many working classes. Large swaths of laborers are going to lose their jobs, leading to unprecedented levels of unemployment.

To account for this problem, having access to basic needs should become a right, not a privilege for the non-automated classes. It should be the responsibility of the corporations that have taken away working-class jobs to grant families this right—and the best solution would be in the form of a universal basic income.

The following video explains, amongst other things, why a universal basic income is doomed to fail:

Jul 23 09:43

‘Fight For The Future’ Offers $15K To Leftist Cells Fighting TrumpIAN MILES CHEONG

“Fight for the Future,” a progressive non-profit organization that claims to “seek to expand the internet’s transformative power for good,” is offering as much as $15,000 a month to fund leftist activism against Donald Trump. Prospective members are expected to establish “A-Teams,” or cells dedicated to specific issues.

Jul 23 08:39

REPORT: Armies of Cyber-Troops Manipulating Public Opinion

The Computational Propaganda Research Project (COMPROP) investigates the interaction of algorithms, automation and politics. This work includes analysis of how tools like social media bots are used to manipulate public opinion by amplifying or repressing political content, disinformation, hate speech, junk or fake news.

In their most recent report COMPROP have identified how organisations, often with public money, have created a system to help ‘define and manage what is in the best interest of the public.’

Webmaster's Commentary: 

Meaning the best interests of the government and corporations.

Jul 23 08:06

Facial recognition surveillance is here — but privacy protections are not

In a little publicized section of Trump’s Immigration Executive Order, the president ordered Department of Homeland Security (DHS) to “expedite the completion and implementation of a biometric entry exit tracking system.” The purpose of the tracking system is to confirm who is entering and exiting the country to, for example, identify people who have overstayed their visas. Congress has already provided up to a billion dollars over the next ten years to implement the program.

Jul 22 16:41

SCAM WARNING: Website is tricking students out of thousands in fees

Newcastle University has put out an alert over a website calling itself “Newcastle International University” which has copied its branding, colours and fonts as well as animation, blogs and photos as well as details of dozens of courses.

The site appears to target unsuspecting students to hand over online their course fees as one section allows people to apply and pay for courses with requests for their personal information and passport and bank details.

The warning from the real Newcastle University said: "We have been made aware of an unofficial website which is fraudulently using the Newcastle University brand and accepting credit card payments to apply for courses.

"The website 'newcastle international university' is in no way associated with the University and we are advising anyone who finds the website not to submit any personal details. All students should use our official website http://www.ncl.ac.uk/."

Jul 22 10:41

Wisconsin Company To Implant Microchips In Employees

"It's the next thing that's inevitably going to happen, and we want to be a part of it," Three Square Market Chief Executive Officer Todd Westby said. The company designs software for break room markets that are commonly found in office complexes.

Jul 22 09:54

PATREON BANNED MY ACCOUNT??

Jul 22 09:32

Kansas data breach gives hackers access to millions of Social Security numbers

Hackers who breached a Kansas Department of Commerce data system in March had access to more than 5.5 million Social Security numbers in 10 states, along with another 805,000 accounts that didn't include the Social Security numbers, according to records obtained from the agency.

The department will be required to pay for credit monitoring for most of the victims of the hacking, according to records obtained through an open records request by the Kansas News Service.

Besides Kansas, the other states affected by the hack are Arkansas, Arizona, Delaware, Idaho, Maine, Oklahoma, Vermont, Alabama and Illinois.

Jul 22 09:18

IBM warns of malware on USB drives shipped to customers

IBM has urged customers to destroy USB drives which shipped with some of its Storewize storage systems because they may contain malware.

In a support advisory, the company has said an unspecified number of USB flash drives containing the Storewize initialisation tool for V3500, V3700, and V5000 Gen 1 systems are infected with malicious code.

Jul 22 08:46

Windows 10 shares your files with the internet... here's how to turn it off

By default, a Windows 10 update will use your bandwidth to share files on your PC with other PCs. This walk-through shows how to disable that feature--or tone it down a bit.

Jul 22 08:42

Spend ONE EURO on referendum and we’ll CUT FUNDS: Madrid in huge threat to Catalonia

THE Spanish government has increased the pressure on Catalonia and its bid for independence by threatening to cut the funding it gives to the Spanish region.

A spokesman for Mariano Rajoy’s administration in Madrid, Méndez de Vigo, said that the government would slash funds from the FLA - the Liquidity Fund for the Autonomous Communities - in the event of any “disobedience” from the Catalan separatists.

Jul 21 17:34

Twitter comes under fire as it emerges paedophiles are using live streaming app Periscope to groom children as young as nine

Twitter has come under fire after it emerged that paedophiles are using its Periscope live streaming app to groom children as young as nine.

They are bombarding the youngsters with sexual questions and requests, asking them to lift up their shirts and take off their clothes.

The app – which has more than 10million users – allows people to film themselves on their mobile phones and broadcast to strangers over the internet.

People watching then can send the ‘broadcasters’ messages, which flash up on the screen for everyone to see.

It is supposed to be restricted to children over the age of 13, but users can simply state they are older.

Children as young as nine are broadcasting to strangers from their bedrooms and even from school, the BBC reported.

Jul 21 12:39

They See You: FBI Warns About Dangers Of Internet-Connected Toys

While many American parents think ‘smart toys’ are a great idea, the FBI has issued an unprecedented warning that internet-enabled items may pose a privacy and safety risk for children by harvesting personal information.

Jul 21 10:30

BREAKING: YouTube Sued By Creators in Class-Action Lawsuit

YouTube creators ZombieGoBoom are leading a class-action lawsuit against YouTube, claiming the streaming service intentionally demonetized and removed creator content in order to appease advertisers.

Jul 21 09:33

Rare Earth Mania And China/US Trade Spat 2.0?

Unfortunately for the rest of the world, especially the US, China has a monopoly on the rare earths market with 85-90% of global production.

REEs are strategically important due to their (small but critical) applications in products used for the defense and technology sectors - including today’s mainstay of human existence, the mobile phone. China’s dominance arose from undercutting almost every other mining and processing player in the decades prior to its WTO entry.

The current story behind the higher prices is that China is getting serious (again) about the environmental impact of REE mining, and is making renewed efforts to curb significant levels of illegal production. On Monday, managing director of Australian-based rare earth producer, Lynas Corp (who just happened to note how her company is “highly leveraged to any increase in price for NdPr”) commented.

Jul 21 09:17

“Smart” Toothbrushes Are Equipped With Interactive Wireless Displays—Radio Transmitters

By Catherine J. Frompovich

Do you brush your teeth with a ‘smart’ toothbrush?

Did you know there are ‘smart’ toothbrushes?

According to the package information that comes with the Oral-B Triaction/Precision 5000/5500, it contains an “interactive wireless display,” i.e., a radio transmitter that puts out electromagnetic frequencies. Holy moly—one more smart device to track us, even while brushing our teeth...

Jul 21 08:27

Launch Live PlayerTHE CLINTONSFBI turns over 7,000 documents from Weiner laptop in Clinton-tied case

The FBI has turned over 7,000 new documents from Anthony Weiner’s private laptop to the State Department as part of a watchdog group's lawsuit related to last year's Hillary Clinton email case.

Judicial Watch and State Department representatives appeared in federal court in Washington, D.C., on Thursday over the group's Freedom of Information Act suit seeking Clinton emails from her tenure at the State Department.

It emerged during the hearing that the 7,000 new documents were turned over. The trove is expected to contain some emails sent by Weiner’s estranged wife, Clinton aide Huma Abedin.

In this Sept. 20, 2011 file photo, Huma Abedin, top, deputy chief of staff and aide to Secretary of State Hillary Rodham Clinton, right, during a meeting with leaders for the Open Government Partnership in New York.Expand / Collapse
Huma Abedin and then-Secretary of State Hillary Clinton in New York in September 2011. (AP)

Webmaster's Commentary: 

This effectively puts Hillary Clinton out of a run for President in 2020, but she is working to establish control of the Democratic Party to insure that a Clintonista gets "anointed" as the Democrat's candidate, to attempt to keep a lid on the bigger scandals in which she is involved.

Bernie Sanders, if he has one shred of decency left in him, needs to fight against this, so the the Democrat's choice will be an authentic one in 2020; not the kind of campaign which saw the life squeezed out of it, thorough corruption, as was his Presidential campaign in 2016.

Jul 21 07:52

Feds Shut Down AlphaBay; Sessions Warns Criminals "You Cannot Hide" On Dark Web

More than three years after the FBI shut down the Silk Road, the pioneering dark-web marketplace for drugs and illegal goods, the FBI and DEA – working with international law-enforcement agencies - have busted two more dark-web marketplaces that facilitated the sales of illicit items like drugs, weapons and stolen data, according to the Department of Justice.

AlphaBay and Hansa, two of the largest illegal marketplaces on the dark web, have been shut down and their operators arrested during a collaboration between US and European police agencies, according to the BBC. Investigations were led by the FBI and DEA in partnership with Europol.

Jul 21 07:37

Hackers are using hotel Wi-Fi to spy on guests, steal data

The DarkHotel hacking group has returned -- but this time they're focusing on a different target, using a new strain of Inexsmar malware.

Webmaster's Commentary: 

Jul 20 13:05

NEW DOCUMENTS SHOW MASSACHUSETTS PROSECUTORS CONDUCT SWEEPING WARRANTLESS SURVEILLANCE

Your call records, showing who you’ve called and texted, when, and how long the calls lasted. Your IP logs, showing where you access websites from—whether it’s home, work, a friend’s house, or on the go via your mobile phone. Your banking and credit card information. The email address you used to sign up for online services. Records showing every time you’ve logged on to your favorite social networking site, and how long those sessions lasted.

Jul 20 12:31

VW's settlement in emissions scandal reaches $1.3 billion

California says Volkswagen will pay the state another $154 million in penalties and costs over the automaker's emissions scandal.

California's Air Resources Board says the increase in a consent decree filed Thursday brings VW's total settlement in California to $1.3 billion.

Volkswagen Group of America acknowledges rigging 11 million of its vehicles with software used to cheat on vehicle emissions tests.

Jul 20 08:52

Nationwide Outage Hits Bank of America: Customers Unable To Access Accounts

In an apparent nationwide system outage, Bank of America customers have been shut out from accessing their accounts and online banking on Wednesday afternoon. As of 4pm ET the outage was continuing with most online systems still frozen.

Jul 20 08:49

Wasserman Schultz May Start Cooperating With House Hacking Probe

Rep. Debbie Wasserman Schultz is “negotiating” with the Capitol Police over whether to stop blocking access to a computer seized from her as part of a criminal cybersecurity investigation, Fox News reported Wednesday.

Soon after resigning as head of the Democratic National Committee in wake of it being hacked, the Florida Democrat’s top information technology (IT) aide, Pakistan-born Imran Awan, was named as the lead suspect in a separate information breach involving House data.

But instead of cooperating with Capitol Police, she used a hearing on the law enforcement group’s budget to threaten “consequences” for Police Chief Matthew R. Verderosa unless he returns her a computer taken in the investigation. Wasserman Schultz appeared visibly distraught in the televised hearing.

Jul 20 07:51

?Millions of IoT devices hit by 'Devil's Ivy' bug in open source code library

Devil's Ivy is likely to remain unpatched for a long time: "code reuse is vulnerability reuse".

Jul 20 07:41

Your iPhone could be HACKED unless you update right now

iPhone owners should update their smartphone as soon as possible.

Apple has rolled-out a new operating system update – iOS 10.3.3 – that patches a number of vulnerabilities in the software, including some that could enable remote code execution on the device.

This would allow a hacker to take control of your iPhone, thanks to a bug in the Broadcom Wi-Fi chip.

Hackers would have complete control over the device, allowing them to access your data and features remotely.

Jul 20 07:39

WhatsApp WARNING - This new virus secretly FILMS YOU and shares your ENTIRE web history

WhatsApp users should be on the look-out for a dangerous new form of malware that disguises itself as the successful messenger.

Dubbed GhostCtrl, the malware disguises itself as a number of popular apps, including WhatsApp and Pokemon Go to trick users into downloading the virus.

As soon as the fraudulent app is downloaded, a malicious software package is installed to takeover the device.

This creates a backdoor into the device, enabling cybercriminals to siphon data, including call logs, text messages, contact details, phone numbers, GPS location data and web browser history.

GhostCtrl is also capable of gathering information about core details of the device, like software version, Wi-Fi information, battery level, and more.

Worse still, GhostCtrl can be used to secretly film and record the victim using the smartphone’s built-in camera and microphone.

Jul 20 07:13

Hackers Stole $32 Million in Ethereum; 3rd Heist in 20 Days

On Wednesday, Smart contract coding company Parity issued a security alert, warning of a critical vulnerability in Parity's Ethereum Wallet software, which is described as "the fastest and most secure way of interacting with the Ethereum network."

Exploiting the vulnerability allowed attackers to compromise at least three accounts and steal nearly 153,000 units of Ether worth just almost US$32 million at the current price.

Jul 20 07:11

Critical Code Injection Flaw In Gnome File Manager Leaves Linux Users Open to Hacking

A security researcher has discovered a code injection vulnerability in the thumbnail handler component of GNOME Files file manager that could allow hackers to execute malicious code on targeted Linux machines.

Dubbed Bad Taste, the vulnerability (CVE-2017-11421) was discovered by German researcher Nils Dagsson Moskopp, who also released proof-of-concept code on his blog to demonstrate the vulnerability.

The code injection vulnerability resides in "gnome-exe-thumbnailer" — a tool to generate thumbnails from Windows executable files (.exe/.msi/.dll/.lnk) for GNOME, which requires users to have Wine application installed on their systems to open it.

Jul 19 15:51

FLASHBACK - DNC Affiliates Increase Involvement In Seth Rich Case After Wheeler Claims

Last week, Fox 5 DC's report incited a storm of controversy after former D.C. police homicide detective Rod Wheeler stated that there was tangible evidence on murdered Democratic National Committee (DNC) staffer Seth Rich's laptop suggesting that he was communicating with Wikileaks prior to his death.

Jul 19 15:34

10 Surprising Ways the Government is Spying on You (VIDEO)

It does seem that our dystopian future is going to be (is) a mix of both 1984 and A Brave New World.

Jul 19 15:09

Targeted, custom ransomware menace rears its ugly head

Matt Hillman, a principal security researcher at MWR InfoSecurity, said the custom ransomware associated with these attacks is typically getting distributed through phishing emails rather than software exploits. The attacks are targeted against banking and infrastructure firms worldwide.

"This ransomware is targeted at big organisations because the amount they are prepared to pay is greater," Hillman explained. "Hackers are timing their attack to add pressure," for example by launching assaults just before sales quarters close or a major announcement or industry event.

The attacks are more geared at making money than causing disruption, unlike the recent NotPetya outbreak.

Jul 19 15:05

Millions of IoT systems wide open to hackers after devs drop the gSOAP

Security researchers investigating internet-connected video cameras have uncovered a bug that could conceivably leave millions of devices open to easy pwnage.

The team from embedded security specialists Senrio was looking into the code running an M3004-V network camera from Axis Communication. They found a serious hole that would allow an attacker to either shut down the camera or hijack the feed.

Cases such as this are very common in a world infected with Internet of Sh!t devices.

Jul 19 14:33

CIA Plans To Destroy Old Files Related To Leaks

A CIA proposal to destroy files deemed no longer of historical importance has been authorized. Critics are questioning how honest the agency will be when it comes to the purging of potentially serious files.

The National Archives and Records Administration (NARA) has authorized the move to dump CIA documents that include classified information that was leaked, according to the Daily Beast.

Jul 19 13:28

Facial Recognition Coming To Police Body Cameras As Artificial Intelligence And Machine Learning Takes Over

AN APPROACH TO MACHINE LEARNING INSPIRED BY THE HUMAN BRAIN IS ABOUT TO REVOLUTIONIZE STREET SEARCH. EVEN IF THE COP WHO PULLS YOU OVER DOESN’T RECOGNIZE YOU, THE BODY CAMERA ON HIS CHEST EVENTUALLY JUST MIGHT.

Jul 19 10:44

FLASHBACK 2015 - Unbeknownst to Clinton, IT firm had emails stored on cloud; now in FBI’s hands

A Connecticut company, which backed up Hillary Clinton‘s emails at the request of a Colorado firm, apparently surprised her aides by storing the emails on a “cloud” storage system designed to optimize data recovery.

The firm, Datto Inc., said Wednesday that it turned over the contents of its storage to the FBI on Tuesday.

A Republican Senate committee chairman, Wisconsin Sen. Ron Johnson, also has asked the firm to provide the committee copies of any data from Clinton’s account still in its possession.

Webmaster's Commentary: 

Apparently the FBI, under Comey, ignored this request.

Jul 19 09:58

They See You: FBI Warns About Dangers Of Internet-Connected Toys

While many American parents think ‘smart toys’ are a great idea, the FBI has issued an unprecedented warning that internet-enabled items may pose a privacy and safety risk for children by harvesting personal information.

Jul 19 09:27

CoinDash crowdfunding hack further dents trust in crypto-trading world

More than $7m was stolen by hackers on Monday from folks investing in a cryptocurrency startup.

Israel-based CoinDash – which bills itself as an "an operating system" for "interacting, handling and trading crypto assets" – launched what's called an initial coin offering. This is a process in which people buy virtual tokens from a fledgling biz, such as CoinDash. These tokens are vital to whatever service the company is offering. As the startup grows, these tokens are supposed to increase in value. Buying the tokens early is akin to buying shares during a normal business's IPO. It's a way of crowdfunding investment.

Well, on Monday, $7m of that investment, all in the Ethereum cyber-currency, went not to CoinDash in exchange of tokens, but to hackers, it's claimed. Security and financial technology experts voiced concerns that this latest online heist only serves to undermine confidence in digital currency trading platforms.

Jul 19 09:05

Segway hoverboard hijack hack could make hipsters eat pavement

The latest two-wheel transporter toy from Segway was disturbingly easy to hack, with miscreants requiring just seconds to take control of a vehicle, we're told.

Researchers at hacking house IOActive probed the Chinese Segway miniPro, and said they found the wireless link between the machine and its accompanying mobile app was insecure – allowing anyone in radio range to potentially reconfigure and commandeer passing rides.

Jul 19 09:03

New Linux Malware Exploits SambaCry Flaw to Silently Backdoor NAS Devices

Remember SambaCry?

Almost two months ago, we reported about a 7-year-old critical remote code execution vulnerability in Samba networking software, allowing a hacker to remotely take full control of a vulnerable Linux and Unix machines.

We dubbed the vulnerability as SambaCry, because of its similarities to the Windows SMB vulnerability exploited by the WannaCry ransomware that wreaked havoc across the world over two months ago.

Despite being patched in late May, the vulnerability is currently being leveraged by a new piece of malware to target the Internet of Things (IoT) devices, particularly Network Attached Storage (NAS) appliances, researchers at Trend Micro warned.

Jul 19 07:37

Troops, Trolls and Troublemakers: A Global Inventory of Organized Social Media Manipulation

Cyber troops are government, military or political party teams committed to manipulating public opinion over social media. In this working paper, we report on specific organizations created, often with public money, to help define and manage what is in the best interest of the public. We compare such organizations across 28 countries, and inventory them according to
the kinds of messages, valences and communication strategies used. We catalogue their organizational forms and evaluate their capacities in terms of budgets and staffing. This working paper summarizes the findings of the first comprehensive inventory of the major organizations behind social media manipulation.

We find that cyber troops are a pervasive and global phenomenon. Many different countries employ significant numbers of people and resources to manage and manipulate public opinion online, sometimes targeting domestic audiences and sometimes targeting foreign publics.

Jul 19 07:17

Windows 10 no longer supported? How to tell if your PC is eligible for latest version

Millions of three- and four-year-old PCs are being blocked from installing the latest Windows 10 feature update. Is your PC at risk? Here are two ways to check for potential problems.

Jul 18 17:48

They See You: FBI Warns About Dangers Of Internet-Connected Toys

While many American parents think ‘smart toys’ are a great idea, the FBI has issued an unprecedented warning that internet-enabled items may pose a privacy and safety risk for children by harvesting personal information.

Smart toys and entertainment devices for children typically contain sensors, microphones, cameras, data storage chips and multimedia capabilities such as speech recognition or global positioning (GPS).

Jul 18 13:43

Facial Recognition Coming To Police Body Cameras

Device-maker Motorola announced Monday that would partner with artificial intelligence software startup Neurala to build “real-time learning for a person of interest search” on Motorola products such as the Si500 body camera for police, the AI firm announced in a press release today.

Jul 18 10:44

Extra copyright for news sites

Anyone using snippets of journalistic online content must first get a license from the publisher. This new right for publishers would apply for 20 years after publication.

Example:
The automatic link previews social networks generate when users share links (showing the article headline, a thumbnail picture and a short excerpt) would require a license, as well as anyone analysing news content on the web like news aggregators, media monitoring services and fact checking services.

Intent:
The Commission wants to generate income for European publishers by allowing them to charge internet platforms for displaying snippets of their content to users. Stated targets are Google, Facebook, Twitter and Pinterest, who use such snippets in the course of linking to news articles.

Webmaster's Commentary: 

So, we have to stop linking to EU media sources!

Jul 18 10:11

WALMART JUST MADE SOME CHANGES DEMS ARE GOING TO HATE, THIS WILL SHAKE UP THE WAY YOU SHOP FOREVER!

Previously we reported on a robot burger flipper replacing line cooks in California. Now Walmart is replacing registers with a monolithic tower in Tulsa. Zach Ferguson for Western Journalism reports, Small-time grocery store-turned-mega-chain Walmart is rolling out massive self-serving kiosks that obtain customers’ online orders.

Jul 18 10:05

Welp, even ships are hackable now

Large shipping vessels and aircraft are often equipped with VSAT systems, allowing crewmembers to send and receive messages and access the Internet during voyages. Turns out, some of these VSAT systems are profoundly insecure, and could allow an attacker to gain access, and disrupt communications.

Security researcher x0rz discovered that many VSAT systems can be reached from the public Internet. Not only does this mean they can be tracked through services like Shodan, but some are configured in a way that could see a remote attacker gain access using default credentials.

Duuuuuude, default creds everywhere. I'm connected to a motherfucking ship as admin right now. Hacking ships is easy ???? pic.twitter.com/UmLPIveTah

— x0rz (@x0rz) July 18, 2017

Jul 18 09:30

Why you should delete your old phone number on Facebook: Simple profile recovery trick that relies on outdated details lets anyone break into your account

If someone finds one of your old phone numbers, they can easily access your account using a simple trick, a security expert has found.

A flaw in Facebook's account recovery system, which lets users log in using their phone number if they lose their password, leaves accounts exposed to hackers.

If a hacker buys an old number that is still linked to a Facebook account, they can easily gain access the profile through the account recovery system.

Jul 18 09:06

THE U.S. IS POISED TO SEPARATE MILITARY CYBER COMMAND FROM THE INTELLIGENCE COMMUNITY

After nearly a year of unsubstantiated claims that Russia hacked the U.S. election, the U.S. government is now poised to create an independent Military Cyber Command eventually splintered off from the NSA, Reuters reported.

The agency was created in 2009 under then President Barack Obama, but it seeks to stem out and become separate from the NSA while still keeping some employees of the spying agency.

This comes after President Donald Trump and Russian President Vladimir Putin agreed to create a joint cyber security force, a move that many Democrats are adamant about blocking.

The goal of separating the Military Cyber Command from the rest of the intelligence community?

To wage cyber war against the Islamic State and other individuals and groups deemed to be “enemies of the state,” according to anonymous U.S. officials not authorized to speak on the matter; further noting that the plans aren’t finalized and are subject to change.

Jul 18 08:25

The Future Of Artificial Intelligence: Why The Hype Has Outrun Reality

A panel of experts at the recent 2017 Wharton Global Forum in Hong Kong outlined their views on the future for artificial intelligence (AI), robots, drones, other tech advances and how it all might affect employment in the future. The upshot was to deflate some of the hype, while noting the threats ahead posed to certain jobs.

Their comments came in a panel session titled, “Engineering the Future of Business,” with Wharton Dean Geoffrey Garrett moderating and speakers Pascale Fung, a professor of electronic and computer engineering at Hong Kong University of Science and Technology; Vijay Kumar, dean of engineering at the University of Pennsylvania, and Nicolas Aguzin, Asian-Pacific chairman and CEO for J.P.Morgan.

Jul 18 08:15

UAE Hacked Qatari Websites, US Intelligence Sources Confirm

The United Arab Emirates was behind an effort to hack Qatari government news and social media websites, sparking a diplomatic dispute among Arab states, US intelligence officials say.

Jul 18 08:10

Robot Security Guard "Commits Suicide" In Mall Fountain

The Knightscope K5 security robot was supposed to patrol the Georgetown Waterfront, a ritzy shopping-and-office complex along the Washington Harbour in D.C. Looking like a mutant hybrid of R2D2 and a Dalek, the K5 was built to be a crime-fighting robot that could rove the streets and monitor for suspicious activity. It has been used in some offices and malls across America.

But, in the absurdist take of NY Mag, "the pressure was too much for the rolling robot, which can turn, beep, and whistle in order to maintain order."

At one point today, it had had enough, rolled into fountain and drowned itself.

Webmaster's Commentary: 

I wonder what the robot knew about the Clintons! :)

Jul 18 04:58

INDIA: CASHLESS TRANSACTIONS A THING OF PAST IN AP

Cashless transactions are fast becoming a thing of the past. People are reluctant to use cashless facilities, which has made the government’s much-hyped campaign a failed episode.

Jul 17 17:22

The U.S. Is Poised To Separate Military Cyber Command From The Intelligence Community

By Aaron Kesel

After nearly a year of unsubstantiated claims that Russia hacked the U.S. election, the U.S. government is now poised to create an independent Military Cyber Command eventually splintered off from the NSA, Reuters reported.

The agency was created in 2009 under then president Barack Obama, but it seeks to stem out and become separate from the NSA while still keeping some employees of the spying agency.

Jul 17 15:38

$10bn cryptocurrency devaluation in 24 hours, Bitcoin hit hard

Cryptocurrency investors have suffered heavy losses following a dramatic drop in the price of Bitcoin and Ethereum in recent days.

Bitcoin fell to around $1,863 and Ethereum to around $133 over the weekend – 38 percent and 67 percent off their all-time high respectively. Bitcoin, in particular, suffered heavy losses since hitting a high of $3,018 on June 12.

By Monday, Bitcoin had recovered slightly to $2,129 while Ethereum also rose to $176.

Jul 17 15:31

Delete your Myspace profile NOW: Major security vulnerability lets criminals easily hack old accounts

For millions of MySpace users, it has likely been years since they last logged into their account.

The once-popular social network, which launched in 2003, was quickly replaced by the likes of Facebook, Twitter and Instagram and has since faded into obscurity.

But those who still have a MySpace account are being urged to delete their account after a security expert found that old profiles are easy to hack into by criminals using basic personal details.

Jul 17 15:23

Police Body Cameras to be Equipped with Facial Recognition

By Nicholas West

Given the steady roll-out of biometrics in banking, personal computing, and travel as of late, it seemed to be just a matter of time before police were equipped the latest biometric ID technology...

Jul 17 15:13

Peter W. Smith, GOP Operative Who Sought Clinton’s Emails From Russian Hackers, Committed Suicide, Records Show

A Republican donor and operative from Chicago’s North Shore who said he had tried to obtain Hillary Clinton’s missing emails from Russian hackers killed himself in a Minnesota hotel room days after talking to The Wall Street Journal about his efforts, public records show.

Jul 17 15:12

HTC so sorry it jammed pop-up adverts into your smartphone keyboards

HTC, which needs all the love it can get these days, has enraged its customers by bunging adverts into the onscreen keyboard on its phones.

Outrage over the tacky money-grab exploded online at the weekend after folks spotted banner advertisements appearing in the TouchPal keyboard that came with the HTC 10. These are annoying at the best of times, but when you're trying to type, screen acreage is very limited and adverts are a serious disadvantage to easy use.

Jul 17 15:10

Cisco plugs command-injection hole in WebEx Chrome, Firefox plugins

Cisco has patched its Chrome and Firefox WebEx plugins to kill a bug that allows evil webpages to execute commands on computers.

A malicious page, when visited by a vulnerable Windows machine, can exploit the security flaw (CVE-2017-6753) to run arbitrary commands and code with the same privileges as the browser. In other words, the page can abuse the installed plugins to hijack the PC.

The hole is present in the Chrome and Firefox plugins for Cisco WebEx Meetings Server and Cisco WebEx Centers, and affects products including WebEx Meeting Center, Event Center, Training Center and Support Center. Internet Explorer and Edge are not considered vulnerable, and both OS X and Linux versions of Chrome and Firefox are also safe.

Jul 17 14:43

High School Enacts ‘Digital Detox’ On Students

Officials at a British school announced they will implement strict rules on the technologies students are allowed to use during the day to help stymie addiction to social media, the Guardian reported Monday.

Jul 17 13:53

PENTAGON STUDY DECLARES AMERICAN EMPIRE IS ‘COLLAPSING’

In the first of a series, we report on stunning new evidence that the U.S. Department of Defense is waking up to the collapse of American primacy, and the rapid unraveling of the international order created by U.S. power after the Second World War. But the Pentagon’s emerging vision of what comes next hardly inspires confidence. We breakdown both the insights and cognitive flaws in this vision. In future pieces we will ask the questions: What is really driving the end of the American empire? And based on that more accurate diagnosis of the problem, what is the real solution?

Jul 17 11:29

UAE Hacked Qatari Websites, US Intelligence Sources Confirm

The United Arab Emirates was behind an effort to hack Qatari government news and social media websites, sparking a diplomatic dispute among Arab states, US intelligence officials say.

Jul 17 08:29

Indonesia Blocks Access To Telegram Over ‘Terrorist Propaganda’ Concerns

Indonesia is blocking access to web versions of the encrypted messaging service, Telegram, citing concerns the app is being used to spread “terrorist propaganda.”

Jul 17 08:24

Three Microsoft Outlook patches unpatched, users left to DIY

Microsoft has withdrawn at least three of the patches released at the end of June and early July, but left it to users to find out for themselves.

The three patches – KB 4011042, KB 3191849 and KB 3213654 – fixed the same file-handling bugs in Outlook's 2010, 2013 and 2016 editions. Attachments containing “...” (ellipsis) or exclamation points were blocked; e-mails with unsafe file extensions in the subject, ditto; and attachments using ShowLevel1Attach caused errors.

The three have been updated to say the update "is not currently available. This article will be updated as soon as the update is available again", so rather than give users a heads-up, Microsoft is telling you to watch the pages for news.

A couple of weeks ago, Redditors started discussing crashes after the updates were released, and quotes Microsoft that this was the reason for their removal.

Jul 17 07:27

Microsoft cuts off Windows 10 support early for some PCs

An entire generation of PCs, most only three or four years old, are now unable to receive new feature updates to Windows 10. If Microsoft doesn't deliver a patch within the next six to nine months, those PCs could be cut off from security fixes.

Jul 17 06:22

FACIAL RECOGNITION COMING TO POLICE BODY CAMERAS

An approach to machine learning inspired by the human brain is about to revolutionize street search. Even if the cop who pulls you over doesn’t recognize you, the body camera on his chest just might in the future.

Jul 16 17:45

Virus WARNING - Ransomware threatens to upload YOUR photos to PORN sites, how to avoid it

Dubbed Karo, the malicious software holds users to ransom, threatening to leak personal and financial data online.

Unlike the majority of ransomware, which encrypts users’ files and withholds the key until the ransom is paid, Karo compels a much higher rate of payment amongst victims by using social engineering.

In addition to threatening to permanently delete affected files, Karo also threatens to leak personal and financial data online, as well as distribute any nude photos found on the victim’s computer to the victim’s contacts and to pornographic websites.

According to analysis conducted by phishing threat management firm PhishMe, the Karo ransomware does not actually have the ability to extract the information it threatens to leak from the victims’ computer.

Jul 16 10:41

THIS CNN HACK CAN'T TAKE THE HEAT... THEN SHE MAKES A STUNNING MOVE WITH HER TWITTER ACCOUNT

V Saxena for The Conservative Tribune reports, When faced with taunts and bullying, grown men and women typically hold their heads up high and withstand the pressure like champions. But for CNN reporter Alisyn Camerota, that apparently was too much for her.

Jul 16 09:21

video: Points For "Good Behaviour": Canadian Government Introduces the Creepiest App Ever

Yes, the Canadian government has rolled out an app that gives you points for eating well and exercising and taking quizzes about the flu shot and other healthy activities! And everyone seems totally fine with this. Welcome to the future, everyone, because the totalitarian states of tomorrow will be more carrot then stick, and we will all be pigeons in a virtual Skinner box. What could go wrong?

Jul 16 07:50

Homeland Security says Americans who don't want faces scanned leaving the country "shouldn't travel"

Congress allowed the government to scan faces of foreign nationals to keep track of visa overstays. But now that's set to be extended to Americans, worrying some privacy advocates.

But now the agency wants to scan the faces when anyone -- including Americans -- leaves the US.

"The only way for an individual to ensure he or she is not subject to collection of biometric information when traveling internationally is to refrain from traveling," says the document.

Six major US airports, including Boston, Atlanta, and New York's Kennedy Airport, have completed trials started under the previous Obama administration, with an aim to have the system fully operational by next year. CBP says that it won't know exactly who is overstaying visas until face scans are also carried out at US land and sea ports.

The assessment says facial scans will be deleted after two weeks, but can be retained for longer.

Privacy advocates argue that it's inching towards a surveillance state.

Webmaster's Commentary: 

"...Inching toward a surveillance state"?!? We're already there, folks!!

Welcome to the Unhinged, Surveilled States of Amerika: your face scan, please!!

And BTW, if the Department of Homeland Security really wants to stop terror in its tracks, here is precisely the way to do it: stop mucking about in other people's countries, to expropriate resources to which the United States and its corporate minions have absolutely no moral right; stop regime changing countries to insure they are western-centric, and stop insisting that those resources only get sold in US dollars.

You're welcome!! :-)

Jul 16 07:22

Feds Concede Can’t Search Cloud Data at Border for US Citizens

NBC News reported last week that Customs and Border Protection (CBP) concedes it lacks authority to access data stored only on the cloud when its agents examine the electronic devices of US citizens crossing the border. The NBC news report, Border Patrol Says It’s Barred From Searching Cloud Data on Phones, was based on a CBP Letter, dated June 20, sent in response to written questions posed to CBP acting commissioner Kevin McAleenan by Senator Ron Wyden. Last April, Wyden and Senator Ron Paul introduced the Protecting Data at the Border Act that require border officials get a warrant based on probable cause before they could to search or seize cellphones at the border.

Jul 15 15:59

Russian AK-47 Gun Maker Turns to Future of Autonomous Weapons

By Nicholas West

The Kalashnikov AK-47 is certainly one of the most iconic automatic weapons ever devised. Today, nearly 70 years after its debut, worldwide demand continues to rise so rapidly that the company announced earlier in the year that they were hiring 1,700 employees to meet projected sales.

While the AK-47 is known for its bare-bones utility, Kalashnikov is clearly seeing the present trend in warfare that is leading to a future where an increasing number of robots will share the battlefield with humans, and will be empowered with a rising degree of autonomy via artificial intelligence...

Jul 15 07:47

Pentagon Studies Weapons That Can Read Users’ Mind

The troops of tomorrow may be able to pull the trigger using only their minds. As artificially intelligent drones, hacking, jamming, and missiles accelerate the pace of combat, some of the military’s leading scientists are studying how mere humans can keep up with the incredible speed of cyber warfare, missiles and other threats.

Jul 14 17:06

Rising Budget Stakes for Space Warfare

As a backdrop to the Russia-gate hysteria and the heightened fear of China is a budget war over how much U.S. taxpayer money to pour into space warfare, explains Jonathan Marshall. By Jonathan Marshall There’s a civil war being fought on our nation’s soil, right in our capital. It pits the Secretary of Defense and senior generals against a bipartisan band of militant legislators who accuse the Pentagon of standing pat while Russian and China work to achieve military superiority over the United States in space.

Jul 14 10:12

DHS Outlines Mandatory Biometric ID at Airports for Foreign Travel

By Nicholas West

What at first seemed like creeping tip-toe incrementalism toward the use of biometric ID for travel is quickly becoming a warp-speed reality.

Over the past couple of months I’ve been covering some disturbing developments at national airports that seem to show an acceleration of the plan to use biometric identification in a variety of ways...

SHARE THIS ARTICLE WITH YOUR SOCIAL MEDIA