COMPUTERS/INTERNET/SECURITY | WHAT REALLY HAPPENED


COMPUTERS/INTERNET/SECURITY

Jun 23 08:44

Can't activate Windows 10? Microsoft adds troubleshooter to resolve common complaints

New feature aimed at helping users who are unable to activate their copy of Windows 10 after upgrading their PC.

Webmaster's Commentary: 

So, Microsoft forces working Windows 7 and 8 computers to upgrade ... to something that won't even start?!? Isn't life under fascism grand!!!

Jun 23 08:37

Mobile ad firm fined $950k for secretly collecting Americans’ location data via WiFi

A mobile advertising company has been fined $950,000 for using WiFi signals to collect the location data of hundreds of millions of unsuspecting consumers, including children. The company used private location info to send geo-targeted advertising.

The US Federal Trade Commission (FTC) estimated that Singapore-based InMobi reached more than one billion devices worldwide, accessing consumers via thousands of popular applications. Nearly 20 percent of those affected are located in North America.

Webmaster's Commentary: 

Odd how the US Government can go after a foreign ad company but won't do anything about Hillary's private email server!

Jun 23 08:33

FLASHBACK - Hillary Clinton has endangered us all

As Secretary of State, Mrs. Clinton dealt with classified information every day, some of it SCI and SAP. Yet, she claims that she never sent or received any information marked classified at the time she had her hands on it. How would she do business as America’s chief diplomat without ever sending or receiving classified information? What she was probably doing was telling her staff to delete the classification levels from the top and bottom of each email and page and then send them to her. To remove the classification levels from documents is a felony.

The other part of her argument that is ludicrous is her consistent statement that she never handled information on her non-secure server that was classified at the time. She knows that to have done so, is a felony. Classified information is not an egg. It doesn’t incubate then hatch and then suddenly become classified one day. It’s either classified from day one or it isn’t.

Jun 23 07:55

Snooper's charter: GCHQ will be licensed 'to hack a major town'

Legislation will permit security services to hack all phones and laptops in an entire town, as long as it is overseas

Jun 23 07:38

Robots to Pay “Social Security” Under EU Tax Proposal

The EU is studying a proposal that would count robots as people for tax purposes.

n/a
Jun 22 14:47

HOW DID GOOGLE BECOME THE INTERNET’S CENSOR AND MASTER MANIPULATOR, BLOCKING ACCESS TO MILLIONS OF WEBSITES?

Google, Inc., isn't just the world's biggest purveyor of information; it is also the world's biggest censor. The company maintains at least nine different blacklists that impact our lives, generally without input or authority from any outside advisory group, industry association or government agency. Google is not the only company suppressing content on the internet. Reddit has frequently been accused of banning postings on specific topics, and a recent report suggests that Facebook has been deleting conservative news stories from its newsfeed, a practice that might have a significant effect on public opinion – even on voting. Google, though, is currently the biggest bully on the block.

Jun 22 14:12

Emails: Key security features disabled on Clinton's server

State Department staffers wrestled for weeks in December 2010 over a serious technical problem with then-Secretary Hillary Clinton's home email server, causing them to temporarily disable security features that left the server more vulnerable to hackers, according to emails released Wednesday.

Just weeks later, according to previously disclosed emails, hackers attacked the server, forcing Clinton's staff to shut it down. The next day, one of Clinton's closest aides, Huma Abedin, wrote to other high ranking staff: "Don't email hrc (Clinton) anything sensitive. I can explain more in person."

Jun 22 13:58

Lynch Dodges Question About Special Counsel For Hillary

Yesterday on Meet The Press, Chuck Todd asks Attorney General Loretta Lynch if she should recuse herself from the Clinton FBI/DoJ email investigation and appoint a special counsel in order to assure absolute integrity and avoid the appearance of a conflict of interest in the case.

Joseph Digenova and others have called for a special prosecutor.

Jun 22 12:39

Clinton IT specialist invokes 5th more than 125 times in deposition

Hillary Clinton IT specialist Bryan Pagliano invoked the Fifth more than 125 times during a 90-minute, closed-door deposition Wednesday with the conservative watchdog Judicial Watch, a source with the group told Fox News.

The official said Pagliano was working off an index card and read the same crafted statement each time.

“It was a sad day for government transparency,” the Judicial Watch official said, adding they asked all their questions and Pagliano invoked the Fifth Amendment right not to answer them.

Pagliano was a central figure in the set-up and management of Clinton’s personal server she used exclusively for government business while secretary of state. The State Department inspector general found Clinton violated government rules with that arrangement.

Webmaster's Commentary: 


Jun 22 11:38

FAKE SATOSHI NAKAMOTO TRYING TO PATENT ALL SORTS OF BITCOIN RELATED IDEAS

Earlier this week I got knocked out by some pretty serious food poisoning. The few times I would try to do some work or pop in on Twitter, all I was seeing was people mocking the London Review of Books' somewhat insane 35,000-word-long profile of Craig Wright, the guy who earlier this year claimed to be the real Satoshi Nakamoto. While he even convinced Gavin Andresen (the guy who really turned Nakamoto's original work into actual Bitcoin), many others quickly pointed out that Wright's "proof" appeared to be a giant scam. Why write a 35,000-word profile on a guy who isn't Satoshi Nakamoto? I don't know, but thankfully the food poisoning and the few snarky tweets I saw saved me from digging into the entire thing and wasting an afternoon. Fusion posted a much shorter summary of the piece, in case you're wondering.

Jun 22 11:30

As quietly as possible, the government is renewing its assault on your privacy

Having failed to secure an anti-encryption bill, the FBI and justice department are now engaged in a multi-pronged attack on all sorts of other privacy rights

Jun 22 10:20

The Roots of Today’s Tyranny: Total Information Awareness

By Derrick Broze

To understand the roots of the oppression, erosion of liberties, and invasion of privacy that has become the new norm for Americans, we must go back to the days following the terror attacks of September 11, 2001.

Immediately following the attacks of September 11, 2001, President George W. Bush was promising Americans that he would exact revenge on those who dare attack the empire. Dubya’s program of “Shock and Awe” gave the American public an upfront look at what the U.S. military was prepared to do to the enemies of “freedom and democracy.” The bombing of Iraq was only the beginning of a larger conflict that the Bush Administration dubbed “The Global War on Terror.”

The War on Terror did not end in the physical battlefield, however...

Jun 22 10:03

Anonymous - Google manipulating Hillary Clinton search results

Jun 22 09:43

Judge halts Clinton email lawsuit, for now

A federal judge has put on hold a lawsuit related to Hillary Clinton's private email server, rejecting both the Justice Department's bid to resolve the case in the government's favor and a conservative group's demand to force the State Department to turn over more information about the issue.

In staying the Freedom of Information Act suit Tuesday, U.S. District Court Judge Reggie Walton cited ongoing discovery in two other cases filed by the watchdog group Judicial Watch. In one of those cases, several top aides to Clinton have given depositions or are scheduled to give depositions before the end of this month.

In the suit Walton halted Tuesday, Judicial Watch had sought details on why Undersecretary of State for Management Patrick Kennedy and former State Department Legal Adviser Harold Koh corresponded with Clinton at her private address, but apparently did not ensure her emails were searched in response to pending FOIA requests.

Webmaster's Commentary: 

Someone owns Reggie Walton!

Jun 22 09:42

TECH AIDE WHO SET UP HILLARY EMAIL TO TESTIFY

The IT tech who set up the private email server through which Hillary Clinton conducted official government business while she was secretary of state, including top secret communications, will be deposed in a lawsuit.

But the video interview Wednesday in a case brought by Judicial Watch likely won’t yield much, if any, information.

It’s because Bryan Pagliano has said he will plead the Fifth and not answer questions, even though he’s already been granted an immunity deal.

Webmaster's Commentary: 

Jun 22 09:38

Ed Klein, author of anti-Clinton books: FBI sources believe Hillary is ‘guilty as sin’ on emails

Author Ed Klein, known for his anti-Clinton books, says he has Justice Department sources who think Democratic presidential front-runner Hillary Clinton clearly broke the law by using a secret email account during her time as secretary of state.

Mr. Klein said it’s his understanding from his Justice Department and FBI sources “that they believe she’s guilty as sin.”

“I think we’re dealing with a very volatile situation on the Democratic side,” Mr. Klein said on “Tim Constantine’s Capitol Hill Show.”

Jun 22 06:16

GETTING A NEW DRIVER’S LICENSE? BRACE YOURSELF FOR FBI FACE RECOGNITION ANALYSIS.

Last week, the General Accountability Office (GAO) released a report describing the FBI’s facial recognition systems and powers. The report revealed that the FBI has agreements with 16 states to grant the FBI’s Facial Analysis, Comparison, and Evaluation (FACE) Services Unit access to driver’s license images, and that the Bureau is in active negotiation with 18 states to do the same. Massachusetts is one of the states reportedly negotiating such an agreement.

Jun 22 04:33

BREAKING: YOUTUBE IS DOWN

Back up now.

Jun 21 14:50

Clinton Foundation Breached by Hackers…

Webmaster addition: Note they are still pushing "Russian hackers" even though Guccifer 2.0, a single individual who is not Russian, is dumping the stolen files onto the internet.

Jun 21 14:45

Children As Young As 1 Targeted By Sexual Predators Online – NSPCC

The internet was used in more than 3,000 sex crimes against children in England and Wales over the past year, according to the NSPCC. The youngest victim was a one-year-old infant.

Jun 21 13:51

DNC Researched Clinton Speeches, Travel Records

Along with Clinton’s tax returns, personal financial disclosure reports, and U.S. Senate travel records, the DNC dossier included copies of contract documents related to the presidential candidate’s paid speeches.

In addition to a “standard” $225,000 fee, Clinton required a “chartered roundtrip private jet” that needed to be a Gulfstream 450 or a larger aircraft. Depending on its outfitting, the Gulfstream jet, which costs upwards of $40 million, can seat 19 passengers and “sleeps up to six.” Clinton’s contract also stipulated that speech hosts had to pay for separate first class or business airfare for three of her aides.

As for lodging, Clinton required “a presidential suite” and up to “three (3) adjoining or contiguous rooms for her travel aides” and up to two extra rooms for advance staff. The host was also responsible for the Clinton travel party’s ground transportation, meals, and “phone charges/cell phones.”

Jun 21 11:46

FLASHBACK - Software Is Called Capable of Copying Any Human Voice

AT&T Labs will start selling speech software that it says is so good at reproducing the sounds, inflections and intonations of a human voice that it can recreate voices and even bring the voices of long-dead celebrities back to life.

Webmaster's Commentary: 

Right now, AG Lynch is saying the government may release the actual phone calls from Orlando, but after this much time, we cannot rule out the possibility or more fakery!

Jun 21 10:02

Clinton Broke Laws Obama Has Been Prosecuting People For Breaking

One of the Clinton campaign's primary defenses so far has been to claim that the law regarding the handling of classified material is being wrongly implemented, and that, in practice, information is being overclassified.

This is overclassification run amok. We adamently oppose the complete blocking of the release of these emails. https://t.co/77s6mtm0JA

-- Brian Fallon (@brianefallon) January 29, 2016

That is a very sound and reasonable position. Unfortunately, it stands diametrically opposed to the position the Obama Justice Department has taken. In what many refer to as The War On Whistleblowers, the Obama Administration has investigated and prosecuted those who give embarrassing and politically damaging information to the press for violating the law concerning the handling of classified information.

Jun 21 09:42

HILLARY THE SPY? - UPDATED INFO!

Let us start with an historical fact. Treason and betrayal by the highest levels is a common feature of history, whether it is Judas vs Jesus, Brutus vs Julius Caesar, Benedict Arnold, the Rosenbergs, Jonathan Pollard, Aldrich Ames, Robert Hanssen. It is just a fact of life. It does happen.
Back in 1996, when Bill Clinton was running for re-election, he authorized the transfer of highly sensitive technology to China. This technology had military applications and allowed China to close the gap in missile performance with the United States. The transfers were opposed and severely criticized by the Defense Department.

Webmaster's Commentary: 

The change in Donald Trump's campaign manager has led to speculation that Trump will be more aggressive in going after Hilary Clinton's scandals. As this article illustrates, Trump has a lot of facts to work with!

Optional Banner: 
WRH Exclusive
Jun 21 08:17

GUCCIFER 2.0 - DOSSIER ON HILLARY CLINTON FROM DNC

It’s not a report in one file, it’s a big folder of docs devoted to Hillary Clinton that I found on the DNC server.

The DNC collected all info about the attacks on Hillary Clinton and prepared the ways of her defense, memos, etc., including the most sensitive issues like email hacks.

Webmaster's Commentary: 

This dump includes the emails proving the corporate media is trying to win the White House for Hillary. It also demonstrates that Hillary's computers are not secure. And it wasn't Russia that did the hack!

Jun 21 08:01

Facebook hires longtime Netanyahu adviser

Jordana Cutler, who is currently the Chief of Staff at the Israeli embassy in Washington DC, and a longtime adviser to Netanyahu, has been named as head of policy and communications at Facebook’s Israel office.

Jun 20 17:38

What Could Go Wrong? Crime Fighting Robots Now Equipped with Self-Defense Instincts

By Claire Bernish

Once thought to be too approachable for their own good — as in, able to efficaciously perform the tasks they’ve been designed to do — robots are now being programmed with self-defense capabilities.

Now, robots which, say, patrol for criminal or suspicious activity come with a blend of humanoid characteristics and self-defense programs which prevent them from being perceived as too cute — or too menacing.

“Because of all the doomsday scenarios people imagine with robots, their makers have to insert some cuteness,” explained Golden Krishna, a designer with Alphabet’s Google, as reported by the Wall Street Journal...

Jun 20 16:36

Blackout: California In Power Grid Emergency: “All Customers Should Expect 14 Days Without Power”

The entire Los Angeles metropolitan area and most of Southern California can expect blackouts this summer.

California will have its first test of plans to keep the lights on this summer…

With record-setting heat and air conditioning demand expected in Southern California, the state’s power grid operator issued a so-called “flex alert,” urging consumers to conserve energy to help prevent rotating power outages – which could occur regardless.

Read more at SHTF

Jun 20 15:04

Smartphone Users Are Paying For Their Own Surveillance

In the movie Sneakers, a motley gang of security experts chase after a little black box that can crack any form of encryption. Though the idea of a digital skeleton key may seem like the stuff of Hollywood thrillers, there are researchers at the University of Michigan who’ve recently created just that. They’ve built a stealthy hardware back door that can be inserted into the blueprints of a computer chip to give intruders complete access to a system after executing an obscure series of commands.

n/a

n/a
Jun 20 11:57

The 18 scariest computer viruses of all time

Webmaster's Commentary: 

And the NSA didn't do a thing about any of them!

Jun 20 10:55

Judge Nap: 'Hard to Believe' Lynch & Obama Haven't Discussed Hillary's Emails

Judge Andrew Napolitano said this morning that he finds it very hard to believe that the Justice Department and the White House haven't discussed the investigation into Hillary Clinton's private emails.

The Fox News senior judicial analyst was asked for his take on the Fox News Sunday interview in which Attorney General Loretta Lynch maintained that she's never discussed the case with the president or anyone at the White House.

Jun 20 07:52

Facebook Has Been Listening To Everything You Say — Here’s How To Stop It

Recently, an expert has come out to claim that Facebook may be listening in on your conversations. Kelli Burns, a mass communication professor at the University of South Florida, believes the app might be using people’s microphones to gather data on the content of people’s conversations.

Jun 19 23:57

Ransomware Plague: Blame It All on Unauthorized Access Rather Than Bitcoin Cryptocurrency

Ransoming computer data is nearly as old as the Internet and is definitely older than Bitcoin cryptocurrency. A recent outbreak of the ransomware has involved a number of attacks on health care institutions and became a hot topic far beyond tech news.

A classical ransomware would deprive the victims of access to their data applying a private key encryption. The key is only available to the attackers until after the victims buy it. For a long while, any particular technique has not dominated among ransom payment methods. The crooks behind the cyber extortion would accept money via bank transfers, all sorts of vouchers and cell phone credits. However, gradually Bitcoin became a prevailing ransom payment technique. Nowadays, most of the cases involve Bitcoins and exclude any other options.

Jun 19 10:23

Reddit Will Adjust Algorithm To Censor Trump Supporters Following Orlando Shootings

In the aftermath of the Orlando shootings, mass censorship on /r/News, Reddit’s main forum for discussing breaking news, led to a massive user exodus to /r/The_Donald, a community known for its commitment to free speech. According to The Daily Beast, more than 11,712 subscribed to the Trump-supporting subreddit on Sunday alone, making it the most successful day in the community’s relatively short history.

Jun 19 09:21

Trump: Bernie hanging in because FBI may indict Clinton

Donald Trump says the reason Sen. Bernie Sanders refuses to concede to presumptive Democratic nominee Hillary Clinton because he wants to see if the FBI will indict her.

"One thing about Bernie, he doesn't give up," Trump said at a rally Saturday in Las Vegas.

Jun 19 09:07

EXPOSED! Hillary TOLD Islamic Terrorists Where To Kill Ambassador Chris Stevens!

After fighting the release for months, new emails reveal that Hillary Clinton used her private home server to transmit classified details of exactly where American Ambassador Chris Stevens was before the terrorist attacks in Benghazi, Libya.

Because her emails could have been easily intercepted by foreign entities, Hillary Clinton likely handed over details of his location to Islamic terrorist killers.

Jun 19 08:07

Huge Scandal Erupts Inside NATO: Alliance Member Germany Slams NATO "Warmongering" Against Russia

but even more troubling, was NATO's assessment that it may now have grounds to attack Russia when it announced that if a NATO member country becomes the victim of a cyber attack by persons in a non-NATO country such as Russia or China, then NATO’s Article V “collective defense” provision requires each NATO member country to join that NATO member country if it decides to strike back against the attacking country.

Jun 19 08:03

Attorney General Loretta Lynch Denies Ever Speaking to Obama About Hillary’s Email

Wallace: The first day that Clinton was endorsed, you met with the President at the White House. Did you any way shape or form discuss it with the President?

Lynch: We have never discussed the case. I have never spoken about it with the White House or the President. That’s not the relationship that I have with people and it would be inappropriate to do that.

Jun 19 07:46

Facebook Accused of Listening to Everything You Say — Here’s How to Stop It

By Jay Syrmopoulos

Recently, an expert has come out to claim that Facebook may be listening in on your conversations. Kelli Burns, a mass communication professor at the University of South Florida, believes the app might be using people’s microphones to gather data on the content of people’s conversations.

Facebook admits that the app is capable of listening to what’s happening around it — but claims the feature simply identifies what people are listening to or watching as means of conveniently posting about it...

Jun 18 21:10

New Intel CPUs Have NSA Exploitable Secret Hidden Backdoor

New Intel CPUs come with a built in secret backdoor that allows remote control and all of it’s hardware even while your computer is turned off.

Hardware security export Damien Zammit revealed some startling revelations in a recent SoftPedia about the secret backdoor built in to new Intel CPUs that no one can touch or disable.

The backdoor, called the Intel Management Engine (ME) is works as a secret subsystem inside your computer’s CPU and runs constantly even when your computer is not turned on.

It works but setting up a TCP/IP server and since the subsystem has complete uncontrolled access to your computer’s hardware, including the network card and memory, it works without the knowledge of your computers operating system and can not be disabled by the OS or by your computer’s firewall.

Jun 18 15:11

New Intel CPUs Have NSA Exploitable Secret Hidden Backdoor

New Intel CPUs come with a hidden backdoor that can allow hackers or the NSA to control your computer remotely even while PC is turned off.

Hardware security export Damien Zammit revealed some startling revelations in a recent SoftPedia about the secret backdoor built in to new Intel CPUs that no one can touch or disable.

The backdoor, called the Intel Management Engine (ME) is works as a secret subsystem inside your computer's CPU and runs constantly even when your computer is not turned on.

It works but setting up a TCP/IP server and since the subsystem has complete uncontrolled access to your computer's hardware, including the network card and memory, it works without the knowledge of your computers operating system and can not be disabled by the OS or by your computer's firewall.

Jun 18 13:39

Harvard Study Confirms Media Blackout Torpedoed Sanders Chances

A study commissioned by Harvard has analyzed primary coverage of thousands of news statements issued by the largest corporate media outlets in the United States.

It found that coverage of Bernie Sanders at crucial parts of the race was too insignificant to make serious inroads to be successful in the campaign.

Furthermore, by the time coverage did pick up on Bernie it was far too late and even then the coverage was far less than given to any of the other candidates including not only Hillary Clinton but also lagging behind the top 5 GOP candidates –Trump, Bush, Cruz, Rubio, and Carson.

In fact Hillary received 3 times more coverage and after analyzing the data Harvard found that Hillary Clinton was the only candidate whose campaign generated an unfair balance of news coverage.

Jun 18 13:36

Microsoft Jumps in the Weed Game, Kohl-Welles Wants the County to Police Pesticides on Pot, and More

Forget Big Pharma and Big Tobacco. Microsoft is getting into the weed game. KIND Financial, a Los Angeles-based cannabis compliance software company, announced yesterday that it is partnering with Microsoft to launch a seed-to-sale tracking program.

Given the nascent state of the seed-to-sale traceability software industry, we may be witnessing the birth of its proverbial 800-pound gorilla.

Jun 18 08:59

Reddit Will Adjust Algorithm To Censor Trump Supporters Following Orlando Shootings

Reddit has announced a change to its algorithm on /r/all, the page that is meant to rank the most popular posts trending across the site’s user-run communities. According to Reddit, the algorithm will be changed to promote more “diversity” on the subreddit. The change is an explicit response to the Islamic terrorist attacks in Orlando, Florida. In their aftermath, /r/all was dominated by posts from /r/The_Donald, the primary community for Trump supporters on the site.

Jun 18 08:05

FLASHBACK - HILLARY THE SPY? - UPDATED INFO!

Let us start with an historical fact. Treason and betrayal by the highest levels is a common feature of history, whether it is Judas vs Jesus, Brutus vs Julius Caesar, Benedict Arnold, the Rosenbergs, Jonathan Pollard, Aldrich Ames, Robert Hanssen. It is just a fact of life. It does happen.

Back in 1996, when Bill Clinton was running for re-election, he authorized the transfer of highly sensitive technology to China. This technology had military applications and allowed China to close the gap in missile performance with the United States. The transfers were opposed and severely criticized by the Defense Department.

Webmaster's Commentary: 

Optional Banner: 
WRH Exclusive
Jun 17 18:28

Odds Hillary Won Without Widespread Fraud: 1 in 77 Billion Says Berkeley, Stanford Studies

After applying various statistical models to subsets of 2016 primary voting data several academic researchers conclude Hillary Clinton’s win was only possible through widespread vote fraud.

Widespread allegations of election fraud and voter suppression across the United States during the 2016 Democratic Primary has sparked the interest of several academic researchers and what they discovered in their research is disturbing.

The researchers each performed independent studies in which a few different statistical was applied to analyze various subsets of vote data and of the studies came to the same conclusion.

Namely that Hillary’s win was could have only been possible a result of widespread election fraud.

Jun 17 14:40

You Acer holes! PC maker leaks payment cards in e-store hack

Acer's insecure customer database spilled people's personal information – including full payment card numbers – into hackers' hands for more than a year.

The PC maker has started writing to customers [PDF] warning that their personal records were siphoned off from its online store by crooks between May 12, 2015 and April 28, 2016.

Acer did not say how many customers had their details swiped.

The lost data includes customer names, addresses, card numbers, and three-digit security verification codes on the backs of the cards. Acer says that no passwords or social security numbers were obtained by the thieves, which will be of no comfort whatsoever to the victims.

Jun 17 12:18

NY Electronic Communications Privacy Act Passed

By Mike Maharrey

A New York Assembly committee has passed an electronic data protection bill that would end warrantless collection of cell phone data and ban the use “stingrays” to track the location of phones and sweep up electronic communications without a warrant in most situations. Passage of the bill would not only protect privacy in New York, but would also hinder at least two aspects of the federal surveillance state.

A coalition of 13 assembly members introduced Assembly Bill 9235 (A9235) on Feb 4. The legislation would help block the use of cell site simulators, known as “stingrays.”...

Jun 17 12:16

FLASHBACK - IS ISRAEL BLACKMAILING AMERICA?

What follows is the original article I wrote when the news story first broke regarding the existence of a system to tap into any phone in America built into the surveillance system used by law enforcement authorities. Several cases were cited where investigations ranging from drug running and money laundering to the events of 9/11 had been compromised by leaks from the company that operated the phone taps as well as phone data from an associated company that handles billing services for almost every phone in America.

The focus of the article was a single question. Could Israel be blackmailing the entire US Government and media.

Optional Banner: 
WRH Exclusive
Jun 17 10:17

Will Hillary Survive Barrage of Email Leaks From Russia and WikiLeaks?

Richard Ben-Veniste is actually a long-time defender of Hillary’s. According to Wikipedia, He was the Democrat’s chief counsel (1995–1996) on the Senate Whitewater Committee and took the successful position that the Clintons had done nothing criminal when participating in the failed Whitewater development.

Now he is defending Hillary again in the pages of USA Today. This is symptomatic of a larger societal theme that is developing to defend Hillary.

Jun 17 08:40

Sanders Supporters Vindicated: Proof DNC Used Media To Rig Election for Hillary

corporate media’s fatuous prattling over Hillary Clinton likely tipped the elections in her favor, we now have solid proof — leaked emails show the DNC colluded with mainstream outlets to heavily favor Clinton.

“Our goals in the coming months will be to frame the Republican field and the eventual nominee early and to provide a contrast between the GOP field and HRC,” reads an email dated May 26, 2015, referencing the former secretary of state by her initials, posted by “Guccifer 2.0” — after the Romanian hacker who allegedly accessed Clinton’s private email server multiple times.

One of the strategies listed for “positioning and public messaging” states, “Use specific hits to muddy the waters around ethics, transparency and campaign finance attacks on HRC.”

Jun 17 08:11

Losing Control: The Dangers of Killer Robots

By Bonnie Docherty, Harvard University

New technology could lead humans to relinquish control over decisions to use lethal force. As artificial intelligence advances, the possibility that machines could independently select and fire on targets is fast approaching. Fully autonomous weapons, also known as “killer robots,” are quickly moving from the realm of science fiction toward reality...

Jun 17 07:55

Self-Learning Robot Escapes Testing Ground (And Goes Missing For 45 Minutes)

Webmaster's Commentary: 

Right out of "Short Circuit!"

Jun 17 07:48

Intel x86s hide another CPU that can take over your machine (you can't audit it)

Recent Intel x86 processors implement a secret, powerful control mechanism that runs on a separate chip that no one is allowed to audit or examine. When these are eventually compromised, they'll expose all affected systems to nearly unkillable, undetectable rootkit attacks.

Jun 17 07:38

Kill Flash now. Or patch these 36 vulnerabilities. Your choice

One bug being exploited right now in the wild

Jun 17 07:02

Lenovo Bloatware Haunts OEM Laptops

You might be at risk if you are using a brand computer and you haven’t uninstalled all the software that came preinstalled with it, such as Lenovo bloatware. Not only can the preinstalled software slow your computer down, it can also allow unauthorized access to your private data.

Jun 16 19:40

New Report: FBI Can Access Hundreds of Millions of Face Recognition Photos

Today the federal Government Accountability Office (GAO) finally published its exhaustive report on the FBI’s face recognition capabilities. The takeaway: FBI has access to hundreds of millions more photos than we ever thought. And the Bureau has been hiding this fact from the public—in flagrant violation of federal law and agency policy—for years. According to the GAO Report, FBI’s Facial Analysis, Comparison, and Evaluation (FACE) Services unit not only has access to FBI’s Next Generation Identification (NGI) face recognition database of nearly 30 million civil and criminal mug shot photos, it also has access to the State Department’s Visa and Passport databases, the Defense Department’s biometric database, and the drivers license databases of at least 16 states. Totaling 411.9 million images, this is an unprecedented number of photographs, most of which are of Americans and foreigners who have committed no crimes.

Jun 16 17:22

Federal Judge Allows FBI To Hide Documents Related to Seattle Surveillance Cameras

By Derrick Broze

A federal court has ruled that the city of Seattle cannot release information related to hidden surveillance cameras operated by the FBI.

On Monday, U.S. District Judge Richard issued a temporary restraining order preventing Seattle from releasing any further information about the purpose and location of surveillance cameras hidden throughout the city. The ruling comes after the U.S. Department of Justice sued Seattle officials for releasing some documents related to surveillance cameras the Federal Bureau of Investigations had placed on utility poles. The bureau has argued that disclosing details could damage ongoing investigations...

Jun 16 15:53

Spam King Dethroned: 2 1/2 Years Behind Bars & Hefty Fine For Leading FB ‘Phisher’

Sanford Wallace, the self-styled “Spam King,” will spend the next two and a half years in prison for compromising half a million Facebook accounts and using them to send over 27 million spam messages between November 2008 and March 2009.

Jun 16 12:36

Guccifer2: Hacker Releases Thousands Of Emails and Docs: “Enough Evidence To Indict Hillary”

One of the bigger news items to hit yesterday was that the Democratic National Committee accused Russian government hackers of penetrating the DNC’s computer network and gaining access to the entire database of opposition research on GOP presidential candidate Donald Trump. The DNC further said that no financial, donor or personal information appears to have been accessed or taken, suggesting that the breach was traditional espionage, not the work of criminal hackers.

It appears that was not entirely true, because barely 24 hours later, the alleged “Russian” hackers has emerged under the Guccifer2 handle, and instead of a group of government operatives and/or spies appears to be a “lone” hacker who incidentally adds, “DNC chairwoman Debbie Wasserman Schultz said no financial documents were compromised. Nonsense! Just look through the Democratic Party lists of donors!”

Jun 16 11:20

The U.S. Air Force Lost 12 Years Of Investigations Thanks To A Corrupted Computer File

The U.S. Air Force Inspector General tracks all their investigations on fraud, abuse, and everything else down to office disputes in a database maintained by Lockheed Martin. Now it looks like somebody broke it, destroying data collected since 2004.

Webmaster's Commentary: 

Suuuuuuuuuuuuuuuuuuuuure!

Jun 16 10:35

HERE IS HOW YOU PROVE HUNDREDS OF PUBLICATIONS RELEASED THE PULSE SHOOTING REPORT SIX HOURS BEFORE IT HAPPENED: TYPE "20 DEAD 40 injured pulse" into Google and tell it to only return results from the 11th.

They will "Berenstain" this quickly now that I posted it. Hopefully you will get a chance before they do.

If you catch this before they wipe it, you will discover that the original story was supposed to be 20 dead and 40 injured, and that it was released to the MSM 6 hours early and damn near everybody published it six hours early. Google scrubbed a lot of it, and an AI or something went through and over wrote all reports (including date updates to the 12th, but the ghost is still there, take a look at this!:

Jun 16 10:21

FLASHBACK - VIRTUAL 9-11: Will the US & Israel Hack The US Banking System Computers and Falsely Blame It On Iran (or Syria or Russia or China)?

Such a cyber false-flag also gives the US Government the excuse to take total control of the internet so that those pesky truth-seeking bloggers don't give the slaves uppity ideas that this is just another war-starting hoax like the attack on the USS Liberty or 9-11 or the Boston bombing.

Webmaster's Commentary: 

This sudden surge in NATO's "concern" over cyber-attacks suggests WW3 may transition into the "hot" mode with a massive cyber-attack against US computers. But, given that the NSA cannot find ransomware creators, nobody will really know who the cyber-attackers really are, nor will anyone likely accept the official scapegoat!

Optional Banner: 
WRH Exclusive
Jun 16 09:38

Severe cyber-attack could be a case for NATO action – Stoltenberg

NATO could respond to a powerful cyber-assault with conventional weapons, the military alliance’s secretary-general told German media. NATO member states are expected to declare cyberspace a warfare domain, along with air, land, sea and space.

Webmaster's Commentary: 

If the NSA can't find the ransomware writers, how could the government possibly find the source of a cyber attack, or expect anyone to believe them when they claim they had!

Jun 16 09:22

MORE CLINTONIAN EVASIONS FROM HILLARY'S SENIOR STAFF

A shocking new video re-enactment of a senior Hillary Clinton staffer's under-oath testimony was released today at ClintonEmailsOnFilm.com. The filmed re-enactment of Ambassador Stephen Mulls testimony is the second video in a series by controversial LA filmmaker Phelim McAleer. The series re-enacts the sworn testimony of Hillary Clinton's senior staff regarding her "illegal" home-brew email server--which potentially left US state secrets vulnerable to hacking.

Jun 16 08:44

NATO Says It Might Now Have Grounds To Attack Russia

NATO is now alleging that because Russian hackers had copied the emails on Hillary Clinton’s home computer, this action of someone in Russia taking advantage of her having privatized her U.S. State Department communications to her unsecured home computer and of such a Russian’s then snooping into the U.S. State Department business that was stored on it, might constitute a Russian attack against the United States of America, and would, if the U.S. President declares it to be a Russian invasion of the U.S., trigger NATO’s mutual-defense clause and so require all NATO nations to join with the U.S. government in going to war against Russia, if the U.S. government so decides.

Webmaster's Commentary: 


I hope this is just an attempt to bluff Putin into not releasing Hillary's emails!

n/a
Jun 15 15:56

Google AI Spits Out Dark Poetry After Reading Thousands of Romantic Books

After reading 3,500 books on love and love poetry, Google’s Artificial Intelligence wrote one of the creepiest poems.

Jun 15 15:32

Admins in outcry as Microsoft fix borks Group Policy

After Patch Tuesday comes Facepalm Wednesday

Jun 15 13:31

The FBI's Facial Recognition Software Has Never Been Properly Tested For Accuracy

Since 2011 the FBI has used facial recognition software to identify people during criminal investigations. The agency combs through a database of over 411 million photos, including everything from mugshots to driver’s licenses. Today, the Government Accountability Office (GAO) released a report that’s critical of the technology.

The GAO is concerned about not only the privacy implications, but also the accuracy of the FBI’s facial recognition technology. The report found that the FBI has never tested the accuracy of searches that are asked to yield fewer than 50 photo matches.

Put more simply, if someone from the FBI has a photo of a suspect and runs it through facial recognition while requesting just 2 potential matches, they have no way of knowing if those matches are any more accurate than the next 48 in line. Put even more simply, a lot of innocent people could potentially be identified positively as suspects.

Jun 15 07:39

Judicial Watch: Court Should Not Seal Clinton IT Official Immunity Agreements

Judicial Watch today announced that it filed an opposition motion to Clinton email witness Bryan Pagliano’s attempt to file immunity agreements ex parte and under seal. Also, Judicial Watch asked the court to deny Pagliano’s effort to avoid videotaping of his deposition, during which he plans to assert his Fifth Amendment right.

Webmaster's Commentary: 

The fact that Pagliano is pleading the 5th tells us there is something criminal about the way that email server was set up. The attempt to block video of his deposition is because video of him taking the 5th will be blasted all over the internet, reminding everyone that some dark secret lurks behind that email server.

Jun 15 07:35

Clinton IT Official Confirms Immunity Agreement in Court Filing

Judicial Watch today announced that Clinton email witness Bryan Pagliano attorneys confirm for the first time that Mr. Pagliano has “use” immunity agreements with federal prosecutors investigating the Clinton email matter. The admission comes in a court filing filed at 4:55 pm:

In December 2015, Mr. Pagliano proffered testimony to the DOJ in connection with an ongoing DOJ investigation. A short time later, Mr. Pagliano and the DOJ entered into an agreement granting Mr. Pagliano limited “use” and “derivative use” immunity consistent with 18 U.S.C. § 6001 et seq. for that testimony and other testimony offered in connection with the same investigation. In response to the Court’s Order, Mr. Pagliano has today filed copies of his use immunity agreements with the Government, with a Motion asking the Court to maintain those documents ex parte and under seal.

Webmaster's Commentary: 

Jun 15 07:34

Federal Judge Orders Videotaping of Clinton IT Witness’ Testimony

Judicial Watch today announced that a court order was issued by Judge Emmet G. Sullivan requiring the testimony of Bryan Pagliano, the Clinton State Department IT official who reportedly provided support for the Clinton email system, be videotaped during his upcoming deposition and that the transcript be made public. The court also confirmed that a Justice Department criminal investigation is underway related to the Clinton email issue.

Jun 15 07:22

Julian Assange Warns WikiLeaks Will Publish "Enough Evidence" To Indict Hillary Clinton

Asked about the FBI investigation itself, and how Assange believed that would end, Assange said that there have been enough emails released that could lead to an indictment.

"Unfortunately I think what's going to happen is that the FBI is going to go 'we have accumulated a lot of material about Hillary Clinton, we could proceed to an indictment'", but Loretta Lynch, head of the DOJ won't end up indicting.

"She's not going to indict Hillary Clinton... It's not possible that could happen, but the FBI could push for concessions from [a] new Clinton government in exchange for its lack of indictment." Assange added.

Jun 15 07:19

Truth in malvertising: How to beat bad ads

Malvertising, or malicious advertising, is the use of online advertising to distribute malware with little to no user interaction required. You could be researching business trends on a site like NYTimes.com and, without ever having clicked on an ad, be in trouble. A tiny piece of code hidden deep in the ad directs your computer to criminal servers. These servers catalog details about your computer and its location, and then select the “right” malware for you.

Malvertising purposefully targets legitimate websites with high traffic, instead of trying to trick people into visiting malicious sites. In the less than 10 years since it’s been on the scene, malvertising has impacted major websites with traffic in the hundreds of millions (if not billions), including Yahoo!, NYTimes.com, bbc.com, and AOL.

Webmaster's Commentary: 

Funny how the NSA can't find these criminals. I guess they are too busy whacking off to the pictures of your naked lovers they steal from your computers.

Jun 14 16:00

NATO has declared the cyberspace as "operational domain, just like air, sea & land"

NATO General Secretary Jens Stoltenberg said Tuesday that the alliance had decided to designate cyberspace as an official operational domain of warfare, such as land, sea and air. Earlier, a member of the Congress Permanent Select Intelligence Committee (HPSCI) claimed that any cyberattack on American surveillance satellites could be considered an act of war, suggesting that the US should respond to hackers with weapons.

Jun 14 12:49

FBI’s Probe Of Clinton Email Server Is A ‘Criminal Investigation,’ Judge Says

The FBI’s investigation into Hillary Clinton’s private email server is “criminal” in nature, U.S. District Court judge Emmet Sullivan said in a court filing on Tuesday.

Sullivan was responding to a plea from attorneys for former State Department information technology specialist Bryan Pagliano who asked that details of an immunity deal he made with the FBI to discuss Clinton’s server be kept secret.

Jun 14 11:27

Russia Is Reportedly Set To Release Clinton's Intercepted Emails

Reliable intelligence sources in the West have indicated that warnings had been received that the Russian Government could in the near future release the text of email messages intercepted from U.S. Presidential candidate Hillary Clinton’s private e-mail server from the time she was U.S. Secretary of State. The release would, the messaging indicated, prove that Secretary Clinton had, in fact, laid open U.S. secrets to foreign interception by putting highly-classified Government reports onto a private server in violation of U.S. law, and that, as suspected, the server had been targeted and hacked by foreign intelligence services.

Webmaster's Commentary: 

Jun 14 09:22

United States of PSYOPS: Call them paranoid; call them delusional

Increasing numbers of highly credible and educated individuals, both in the US and globally, have been coming forward to report electronic harassment

Jun 14 09:20

TWELVE YEARS of US Air Force complaints lost in database crash

Backups never fail until you REALLY need them

Jun 14 06:52

EU to Target Internet as Part of Counter-Radicalization Plan

The European Union plans to target the internet in its efforts to try to stop young people developing extremist views.

Interior Affairs Commissioner Dmitris Avramopoulos said Tuesday that the internet is "our most important battleground" against radicalization.

He said, "The recent attack in Orlando perfectly demonstrated (that) the perpetrator was strongly radicalized on his own, purely by using the internet."

Webmaster's Commentary: 

There is absolutely no basis for that last comment. But we know the elites are terrified that the people of the world are waking up to the true nature of society. While there is a free internet, the elites cannot lie to the people with impunity. They are losing control, and they do not like it one bit!

Jun 14 06:45

Julian Assange Says WikiLeaks Set To Release More Clinton Emails, US DOJ Will Block Indictment

“Unfortunately I think what’s going to happen is that the FBI is going to go ‘we have accumulated a lot of material about Hillary Clinton, we could proceed to an indictment‘”.

“She’s [Loretta Lynch] not going to indict Hillary Clinton…It’s not possible that could happen, but the FBI could push for concessions from new Clinton government in exchange for its lack of indictment.”

Webmaster's Commentary: 

Jun 13 19:05

Orlando Shooter Was a DHS Security Contractor: “Has ISIS Infiltrated Homeland Security?”

Has Homeland Security been infiltrated?

The Orlando nightclub terrorist who pledged allegiance to ISIS worked almost a decade for a major Department of Homeland Security contractor, raising alarms that ISIS sympathizers and agents have infiltrated the federal agency set up after 9/11 to combat terrorists.

“G4S supports the U.S. Department of Homeland Security, Customs and Border Protection (CPB), with its operations at the U.S. ­ Mexico border and with U.S. Immigration and Customs Enforcement (ICE) to transport illegal immigrants in selected urban areas,” the company says in a brochure.

There are clearly larger questions about the stunning mass shooting that took place at an Orlando nightclub, now considered the largest of its kind in U.S. history.

Read more at SHTFplan

Jun 13 14:08

Hired Hackers Find Over 100 Bugs In Pentagon Computer Systems

Hackers contracted by the Defense Department to test the security of its less-sensitive computer systems have found more than 100 vulnerabilities, the Pentagon admitted.

Jun 13 13:51

Billionaire George Soros Preparing For Economic Collapse: “Trading Moves Big and Bearish”

Is there really a great collapse coming, and a more permanent shift to Americans and westerners becoming more like serfs?

Why is George Soros selling stocks, buying gold and making “a series of big, bearish investments”? If things stay relatively stable like they are right now, these moves will likely cost George Soros a tremendous amount of money. But if a major financial crisis is imminent, he stands to make obscene returns. So does George Soros know something that the rest of us do not?

[...] Mr. Soros also argues that there remains a good chance the European Union will collapse under the weight of the migration crisis, continuing challenges in Greece and a potential exit by the United Kingdom from the EU.

Read more at SHTFplan.com

Jun 13 13:13

Washington State Accidentally Released a Boatload of Personal Data on Pot License Applicants

The leak happened in early May as a result of a public records request filed by John Novak of the Washington cannabis watchdog site 420 Leaks. Novak was seeking information on I-502 retail applications from medical collectives. According to the Cannabist, the WSLCB first sent Novak the wrong records and asked him to delete them. But then, instead of sending the requested licensee information with appropriate redactions, the WSLCB accidentally sent the un-redacted versions of those files.

Jun 13 09:51

Fighting Malevolent AI: Artificial Intelligence, Meet Cybersecurity

By Roman V. Yampolskiy, University of Louisville

With the appearance of robotic financial advisors, self-driving cars and personal digital assistants come many unresolved problems. We have already experienced market crashes caused by intelligent trading software, accidents caused by self-driving cars and hate speech from chat-bots that turned racist.

Today’s narrowly focused artificial intelligence (AI) systems are good only at specific assigned tasks. Their failures are just a warning: Once humans develop general AI capable of accomplishing a much wider range of tasks, expressions of prejudice will be the least of our concerns...

Jun 13 09:30

Manatee shelter dog trained to sniff out child pornography

Child pornographers can easily hide photos and videos of children on tiny computer hardware making it difficult for law enforcement to find. But the Manatee County Sheriff's Office has a new crime fighting tool: a four-legged deputy that can sniff out the evidence and she didn't cost taxpayers.

The newest deputy is K-9 Gia, a 14-month-old puppy who is a specialist in electronic detection. She can sniff out computer hardware used by child pornographers.

Webmaster's Commentary: 

... and anyone else backing up harmless and legal data.

Jun 13 08:53

BLACKBERRY: WE'RE HERE TO KICK ASS AND SELL OUT USERS TO LAW ENFORCEMENT. AND WE'RE (ALMOST) ALL OUT OF USERS.

Back in mid-April, it was discovered that Canadian law enforcement (along with Dutch authorities) had the ability to intercept and decrypt BlackBerry messages. This level of access suggested the company had turned over its encryption key to the Royal Canadian Mounted Police. BlackBerry has only one encryption key for most customers -- which it maintains control of. Enterprise users, however, can set their own key, which cuts BlackBerry out of the loop completely. BlackBerry CEO John Chen -- despite publicly criticizing Apple for locking law enforcement out of its phone with default encryption -- refused to provide specifics on this apparent breach of his customers' trust. Instead, he offered a non-denial denial, stating that BlackBerry stood by its "lawful access principles."

Jun 13 08:47

WIKIPEDIA WARNS AGAINST FRENCH ATTEMPT TO EXTEND EU PRIVACY LAW GLOBALLY

Wikipedia co-founder Jimmy Wales has said an attempt by France to give an online privacy ruling global force is opening up a “disastrous can of worms” and could spur global censorship.

Jun 13 08:32

Jimmy Carter’s Former Strategist And Pollster: ‘Clinton Cash’ Scandal Is “Worse Than Watergate” .. “They Were Selling Out The National Interests Of The United States Directly To Adversaries And Others For Money.”

“This is the greatest scandal in the history of the United States,” he said. “They all ought to be indicted. This is worse than Watergate.”

Jun 13 08:00

Surveillance Technology Deployment Curve

I coined this phrase to describe the lag-time between the actual deployment of technology and the subsequent intentional disinformative release of news of that technology in regards to surveillance.

Jun 13 07:09

WikiLeaks to publish more Hillary Clinton emails - Julian Assange

Assange said it was highly unlikely that the US attorney general, Loretta Lynch, would indict Clinton. “She’s not going to indict Hillary Clinton, that’s not possible. It’s not going to happen. But the FBI can push for concessions from a Clinton government,” he said.

Jun 13 07:03

Facebook accidentally declared the Philippines at war yesterday

To celebrate Independence Day in the Philippines this year, Facebook created a banner for users to share across the social network. Unfortunately, it also suggested that the country is at war.

As The Philippine Star reports, Facebook's celebratory graphic featured an image of the Philippine flag with an inverted color scheme — red on top, and blue on the bottom. According to Philippine law, the flag should only be displayed in that configuration during times of war; during peacetime, it's flown with blue on top and red on bottom.

Jun 13 07:01

Microsoft to buy LinkedIn for $26.2 billion

Microsoft has purchased the social networking service LinkedIn for $26.2 billion, equating to $196 per share. The network’s co-founder has described the deal as a “re-founding moment” for the service.

The two companies have entered what they call a “definitive agreement” that will see Jeff Weiner staying on as CEO of LinkedIn but will now be answerable to Microsoft boss Satya Nadella.

Jun 12 19:53

New criminal gadget can clone up to 15 contactless bank cards a second from victims who are simply standing nearby

The hi-tech device steals details such as the card number and the person's name and address contained on the credit or debit card.

The scanner - called the Contactless Infusion X5 - extracts the information where it can be written onto blank cards, which can then be used by thieves to go on spending sprees.

Jun 12 09:54

NSA Looking to Exploit Internet of Things, Including Biomedical Devices, Official Says

THE NATIONAL SECURITY AGENCY is researching opportunities to collect foreign intelligence — including the possibility of exploiting internet-connected biomedical devices like pacemakers, according to a senior official.

“We’re looking at it sort of theoretically from a research point of view right now,” Richard Ledgett, the NSA’s deputy director, said at a conference on military technology at Washington’s Newseum on Friday.

Biomedical devices could be a new source of information for the NSA’s data hoards — “maybe a niche kind of thing … a tool in the toolbox,” he said, though he added that there are easier ways to keep track of overseas terrorists and foreign intelligence agents.

When asked if the entire scope of the Internet of Things — billions of interconnected devices — would be “a security nightmare or a signals intelligence bonanza,” he replied, “Both.”

Jun 12 09:02

New era of journalism: People against the gatekeepers

What does the post-mainstream era hold for journalism? Can censorship exist in an era of total access to information? Where does freedom of expression begin and where does it end?
These were just three of the important questions addressed at the "New Era of Journalism" conference held in Moscow this week, an event which brought together leading journalists from 32 countries and also featured a video link up with Wikileaks founder and editor-in-chief Julian Assange from the Ecuadorian Embassy in London.

Opening the proceedings, Dmitry Kiselev, Director General of the Rossiya Segodnya news organization, said that since 2001 the US had interfered with and destroyed a number of countries around the world with wars and interventions based on lies. These lies, such as the blatantly false claim that Iraq had WMDs which could be launched within 45 minutes, were promoted by US State Department/NATO-friendly news channels and other media as proven facts which they clearly were not.

Webmaster's Commentary: 

If there is one victory we can claim here on the internet, it is that we have forever removed the ability of government to lie to their people with impunity. Absent that, there will be fewer wars.

Already we see the elites trying to roll the world back to pre-internet days, much as the elites in Gutenberg's time tried to roll back his making books affordable to the middle classes. But like that previous effort, the attempt to reverse progress is doomed to fail. The elites will have to adjust to the new reality of a public aware and on the lookout for their lies, or they will stop being the elites.

Jun 12 08:52

Judge Jeanine Paving The Way For Comey To Cave On Clinton?

She then says, “The sad news is the fix is in, folks, and I just told you why. But then you say Judge, how could the fix be in if, as you say, FBI Director Comey is such an honorable guy? I say it because there would be a Constitutional crisis in this country if an indictment were to happen. And Jim Comey, as ethical as he is, respects the United States government too much to let that happen.”

Pirro appeared to be offering an exit, an excuse for Comey to capitulate, a foundation for an argument through which he can save face as he cowers to the establishment crime syndicate.

Webmaster's Commentary: 

Obviously yes. And to turn the argument back on her, how is the "best interest of the country” served by allowing criminals to continue to run the government?

Jun 12 08:27

An Ivy League professor explains how a 1980s game theory experiment suggests how morality could have evolved

And it all goes back to game theory.

Back in the 1980s, Robert Axelrod, a political scientist, organized a tournament where a bunch of computer programs played a repeated prisoner's dilemma against each other.

For those unfamiliar, the prisoner's dilemma is a game in which two "rational" people might choose not to cooperate with each other, even though it would be in their best interest to do so. The basic premise is that there are two criminal accomplices being held in separate cells and interrogated. Both prisoners have the option to cooperate and keep their mouths shut or to defect and say the other guy did the crime.

Jun 12 07:52

NSA Looking to Exploit Internet of Things, Including Biomedical Devices, Official Says

The National Security Agency is researching opportunities to collect foreign intelligence — including the possibility of exploiting internet-connected biomedical devices like pacemakers, according to a senior official. “We’re looking at it sort of theoretically from a research point of view right now,” Richard Ledgett, the NSA’s deputy director, said at a conference on military technology at Washington’s Newseum on Friday.

Jun 11 16:11

Be on the lookout for keystroke-logging USB chargers

..."highly stealthy keystroke loggers" are disguising themselves as USB phone chargers to log and decrypt keystrokes typed into wireless keyboards then transmit the data to the bad guys over cellular networks.

Jun 11 09:38

Must See: How Google Manipulates Search Results In Favor Of Hillary Clinton

An under-the-radar startup funded by billionaire Eric Schmidt has become a major technology vendor for Hillary Clinton’s presidential campaign, underscoring the bonds between Silicon Valley and Democratic politics.

The Groundwork, according to Democratic campaign operatives and technologists, is part of efforts by Schmidt—the executive chairman of Google parent-company Alphabet—to ensure that Clinton has the engineering talent needed to win the election. And it is one of a series of quiet investments by Schmidt that recognize how modern political campaigns are run, with data analytics and digital outreach as vital ingredients that allow candidates to find, court, and turn out critical voter blocs.

Jun 11 09:38

Vermont Governor Signs Sweeping Privacy Law, Hinders Several Federal Surveillance Programs

By Mike Maharrey

Vermont Gov. Peter Shumlin has signed a sweeping bill that establishes robust privacy protections in the state into law. It not only limits warrantless surveillance and helps ensure electronic privacy in Vermont, it will also hinder several federal surveillance programs that rely on cooperation and data from state and local law enforcement.

The new law bans warrantless use of stingray devices to track the location of phones and sweep up electronic communications, restricts the use of drones for surveillance by police, and generally prohibits law enforcement officers from obtaining electronic data from service providers without a warrant or a judicially issued subpoena...

SHARE THIS ARTICLE WITH YOUR SOCIAL MEDIA