COMPUTERS/INTERNET/SECURITY | WHAT REALLY HAPPENED


COMPUTERS/INTERNET/SECURITY

Aug 16 12:36

London ‘Thought Police’ Special Unit To Track Down Online Trolls

A generously funded “online hate crime hub” has been set up to tackle online vitriol by identifying suspects and encouraging citizens to report them to police, but critics fear the newly-established unit might endanger freedom of speech.

Aug 16 12:02

America’s Biggest Ally Now Has Special “Thought Police” Unit to Track Down Online Trolls

By Claire Bernish

Thought police now patrol social media platforms and online forums to quash putatively ‘abusive’ vitriol with the help of feckless civilians urged to end freedom of speech under the guise of rooting out hate.

Expected to run for two years at a cost of $2.2 million (£1.7 million) — of which the Home Office will contribute $581,000 (£450,000) — the London Mayor’s Office for Policing And Crime (MOPAC) believes severely curtailing free speech is necessary due to “the increasing role that online hate played in targeting individuals and communities.”...

Aug 16 11:19

18 U.S. Code § 793 - Gathering, transmitting or losing defense information

Whoever, being entrusted with or having lawful possession or control of any document, writing, code book, signal book, sketch, photograph, photographic negative, blueprint, plan, map, model, instrument, appliance, note, or information, relating to the national defense, (1) through gross negligence permits the same to be removed from its proper place of custody or delivered to anyone in violation of his trust, or to be lost, stolen, abstracted, or destroyed, or (2) having knowledge that the same has been illegally removed from its proper place of custody or delivered to anyone in violation of its trust, or lost, or stolen, abstracted, or destroyed, and fails to make prompt report of such loss, theft, abstraction, or destruction to his superior officer—
Shall be fined under this title or imprisoned not more than ten years, or both.

Webmaster's Commentary: 

This is where FBI Director James Comey lied to the American people when he said he would not recommend charges because he did not find evidence that Hillary intended to do wrong. Comey dismissed Hillary's actions as reckless, careless, and negligent, but as 18 U.S. Code § 793 states, intent to do harm is not required, and exposure of national secrets through negligence is a crime, punishable by ten years in prison.

Aug 16 08:38

George Soros was Hacked! — Thousands of Files Expose Election Manipulation & More

In June, Open Society Foundations, the group owned and operated by the unscrupulous George Soros, reported a data breach by hackers to the Federal Bureau of Investigation. For over a month, the foundation nervously waited to see what had been taken. And, on Saturday, the site DC Leaks released the hacked information containing more than 2,500 files from the raft of organizations run by this shady billionaire.

Webmaster's Commentary: 

And scarcely a word in the corporate media!

Aug 16 08:33

Australian university students spend $500 to build a census website to rival their governments existing $10 million site

Two first year university students have designed an alternative to the ABS Census website in just 54 hours.

Austin Wilshire, 18, and Bernd Harzer, 24, created the site during the Queensland University of Technology's Code Network Winter hack-a-thon at the weekend.

Aug 16 08:21

Cell-Jamming Technology Is Being Turned against Journalists

Technology developed to jam cellphones during the Iraq War may be getting deployed against journalists reporting on protests against the political establishment in the United States.

While police and government surveillance of protests, including monitoring of cellphone use, is well-documented, efforts to block signals at protests remains an oft-repeated, but never proven, rumor.

It may be impossible to definitively prove that authorities are using cellphone “jamming” technology, but journalists working with both mainstream and independent media reported unusual difficulties accessing the internet during recent protests at the gates of the Democratic National Convention, consistent with the effects this very real technology could have.

Aug 16 08:05

GOP lays out case for charging Clinton with perjury

A pair of leading House Republicans on Monday laid out detailed instructions for the Justice Department to file perjury charges against Democratic presidential nominee Hillary Clinton.

More than a month after first requesting the department open a criminal probe into Clinton for alleged misstatements she made under oath, the GOP heads of the House Judiciary and Oversight committees told a federal prosecutor specifically where they believed Clinton had lied to Congress about her email setup at the Department of State.

In at least four separate occasions during a marathon appearance before the House Select Committee on Benghazi, the lawmakers alleged, the former secretary's claims were at odds with what the FBI has now discovered to be the truth about her private server.

Aug 16 07:48

Cortana: The spy in Windows 10

Microsoft also claims that Windows 10 SP1 is safer than ever, which I find even less assuring than the promise not to exploit all that Cortana data. Think about this: You can use Cortana from the lock screen. That’s right; Cortana is active and listening to when your PC is locked. Well, it’s supposed to be locked, but if it’s able to listen, how locked down is it, really? Not very!

Microsoft calls this a feature that gives you the ability to ask your PC simple questions without logging in. But I call anything that lets me input data into a PC without being logged into it a bug. It’s a security hole begging to be exploited. Windows, which God knows has had more than enough security problems, now has a new attack surface.

Fortunately, you can fix this one easily. Just open Cortana’s Settings and turn off the “Use Cortana even when my device is locked.”

Aug 16 07:40

Aussie cops ran child porn site for months, revealed 30 US IPs

Turns out the FBI isn't the only agency to take over a child pornography website and bust some of its participants. Australian authorities have apparently employed similar tactics against Americans—revealing at least 30 targets.

Aug 16 07:34

Linux traffic hijack flaw also affects most Android phones, tablets

About 80 percent of all Android devices are affected, but "exploitability is hard."

Aug 16 07:31

Two university students take just 54 hours to build a Census website that WORKS - for $10 MILLION less than the ABS' disastrous site

Two first year university students have designed an alternative to the ABS Census website in just 54 hours.

Austin Wilshire, 18, and Bernd Harzer, 24, created the site during the Queensland University of Technology's Code Network Winter hack-a-thon at the weekend.

The pair took a little over two days to make the site, and it cost them less than $500 - far less than the $10 million the Australian government spent on their site.

The ABS' Census site crashed for over 24 hours on the night the servers were overloaded when millions of Australians logged on to fill out the survey - taken every five years.

Their project - titled 'Make Census Great Again' - used 'serverless architecture' by hosting their site on Amazon servers - meaning it could not get overloaded.

Aug 16 07:18

George Soros hacked, over 2,500 internal docs released online

Last Thursday, as Bloomberg was gingerly setting the stage, and the preemptive damage control for what was about to be a historic leak, it did everything in its power to deflect attention from the key topic, namely that prominent liberal billionaire and Hillary suppo

Aug 15 18:25

RT Besieged by DDoS Attacks Days After US Think Tank Called for Cyber Terrorism

Hackers bombarded RT with a well-planned series of Distributed Denial of Service (DDoS) attacks one week after the Atlantic Council wrote an article suggesting preemptive cyber terrorism against RT and the Moscow Metro.

Webmaster's Commentary: 

Welcome to my world.

Aug 15 16:37

Google AdSense abused to distribute Android spyware

A banking trojan targeting Android users is spreading through malicious ads as part of an ongoing campaign.

The scenario by which the malware spreads is all too familiar to long-suffering Windows fans, but may well come as an unpleasant shock to smartphone users.

Worse yet, Android users can get infected by the Svpeng Trojan simply by visiting mainstream websites, as researchers from Kaspersky Lab explain:

By simply viewing their favourite news sites over their morning coffee users can end up downloading last-browser-update.apk, a banking Trojan detected by Kaspersky Lab solutions as Trojan-Banker.AndroidOS.Svpeng.q. There you are, minding your own business, reading the news and BOOM! – no additional clicks or following links required. And be careful – it’s still out there!

Aug 15 15:56

Government surveillance of Internet users increasing each year

A new report from search giant Google has revealed how many times governments and courts have asked it to hand over information about users.

The annual transparency report shows that in 2014, 35,365 requests were made, and 40,677 were made in 2015.

Aug 15 15:41

George Soros Hacked, MSM Blames Russia; Many “Dissident” Orgs Revealed In Leaks

By Brandon Turbeville

George Soros has been hacked and, according to the Western mainstream press, the Russians did it! In fact, that is the entirety of the story for most of the mainstream outlets – that the Russians hacked such an important American figure and therefore made their power play over American elections yet again. This Russian hack comes after Russians hacked the DNC, Hillary Clinton, hired Donald Trump to destroy the country and invented a time machine enabling them to go back in time and prevent the election of Barack Obama. It doesn’t matter that there is as much evidence for the latter as there is for the former, the mainstream outlets are wild with speculation and neo-McCarthyism...

n/a
Aug 15 13:59

Mysterious Group Hacks The NSA

The latest hack revealed over the weekend has nothing to do with the Democratic Party or George Soros, and instead a mysterious hacker group by the name “The Shadow Brokers” claims to have hacked the Equation Group - a government cyberattack hacking group associated with the NSA, and released a bunch of the organization's hacking tools. The hackers are also asking for 1 million bitcoin (around $568 million) in an auction to release more files.

“Attention government sponsors of cyber warfare and those who profit from it!!!!” the hackers wrote in a manifesto posted on Pastebin, on GitHub, and on a dedicated Tumblr.

Aug 15 13:53

Judge Jeanine: Now we know why Hillary used private email

Aug 15 13:43

Government surveillance of Internet users increasing each year

A new report from search giant Google has revealed how many times governments and courts have asked it to hand over information about users.

The annual transparency report shows that in 2014, 35,365 requests were made, and 40,677 were made in 2015.

Aug 15 09:52

Hillary’s Unsecured Email EXPOSES U.S. Spy… Leading to His EXECUTION

As reported by the Washington Examiner, “I’m not going to comment on what he may or may not have done for the United States government, but in the emails that were on Hillary Clinton’s private server, there were conversations among her senior advisors about this gentleman. The senator said this lapse proves she is not capable of keeping the country safe.

“That goes to show just how reckless and careless her decision was to put that kind of highly classified information on a private server. And I think her judgment is not suited to keep this country safe,” he said.

Here’s what they said to expose the brave spy Amiri, leading to his death:

The scientist’s name shows up in Clinton’s emails back in 2010, just nine days before he returned to Iran.

Aug 15 09:05

PokemonGo Ransomware installs Backdoor Account and Spreads to other Drives

With the popularity of PokemonGo, it was inevitable that a malware developer would create a ransomware that impersonates it. This is the case with a new Hidden-Tear ransomware discovered by Michael Gillespie that impersonates a PokemonGo application for Windows and targets Arabic victims.

Aug 15 09:03

Windows 10 may freeze after installing the Anniversary Update

Microsoft has received a small number of reports of Windows 10 freezing after installing the Anniversary Update on systems with the operating system stored on a solid-state drive (SSD) and apps and data stored on a separate drive. This issue does not occur when starting Windows 10 in Safe Mode.

Aug 15 07:47

TWITTER BOWS TO ISRAELI GOVERNMENT PRESSURE TO CENSOR TWEETS

Though Israel’s reputation as a true democracy has certainly come under fire, its advocates proudly point to its freewheeling press as an exemplar of the values of liberal Zionism. But even this last holdout of Israeli democracy israpidly receding, particularly in traditional domestic print and broadcast media and, more recently, among foreign-headquartered social media platforms.

Aug 14 16:18

Massive hack of Soros files released

The files of George Soros’s Open Society Institute have been hacked over a period of years, with 2,576 just published on the mysterious DCLeaks site.

Aug 14 16:13

Guy tricks Windows tech support scammers into installing ransomware

Kwiatkowski got an idea… an awful idea. He got a wonderful, awful idea.

He’d already noticed that the remote control software the scammer was using allowed him to send and receive files. So he turned to his inbox, where he had several samples of Locky ransomware variants. He grabbed one, renamed it to look like a digital photo, and fired it over.

Kwiatkowski feigned vision trouble and suggested that Dileep just have a look at a picture of the credit card instead. It certainly sounds like he did, though, strangely, the picture must’ve been corrupted… because nothing came up on his screen when he double-clicked it.

That’ll soon change, though. A ransom notice ought to be appearing any time now.

Aug 14 14:07

Twitter Suspends Account Of Guccifer 2.0, Hacker Behind DNC & DCCC Leaks

The Twitter account of Guccifer 2.0, the hacker who claimed responsibility for leaking a trove of Democratic National Committee documents, was suspended less than 24 hours after dumping fresh sensitive DNC data.

Aug 14 07:43

CLINTON COLLAPSE: INSIDERS SAY MAY DROP "SOON"

Insiders say the Hillary camp is panicked--possibly on the verge of collapse. Not only is Trump's polling far better than the media narrative shows but the even more predictive Social Media scene has collapsed to "landslide" proportions in favor of Donald Trump. While Brietbart and The Gateway Pundit had covered the publicly available data, we used some of our benefactors extensive resources to try to get a look inside the Social Media response center of the Clinton Campaign.

We'll tell you: the shop they run is tight. Fear--terror, really--of Mrs. Clinton goes a long way to keeping people in line--but now that the cracks have started we were able to compromise a key person inside the sequestered Media Room run by David Brock's "Internet Warrior Virgins" (his term, not ours).

This is what we learned.

Aug 13 16:29

Just How Bad Is (Social) Media Bias In This Election?

“They take away the hashtag that has negative tweets for Clinton and replace it with something that doesn’t so the average person doesn’t see what was really trending... This happens every day.”

Aug 13 12:09

Drug Sales On The Dark Web Have Tripled Since The Feds Shut Down Silk Road

By John Vibes

This week, it was reported that drug sales on the dark web have tripled since the infamous Silk Road was shut down in 2013.

Within hours of the Silk Road takedown, there were several competitors that were already on the dark web who were ready to move in on the newly available business.

Stijn Hoorens of the RAND corporation recently published a study showing how this growth has occurred despite government intervention...

Aug 13 10:00

MICROSOFT INADVERTENTLY DEMONSTRATES THE INTRINSIC SECURITY PROBLEM OF INCLUDING A UNIVERSAL BACKDOOR IN ITS SOFTWARE BY ACCIDENTALLY LEAKING ITS "GOLDEN KEY"

Microsoft has inadvertently demonstrated the intrinsic security problem of including a universal backdoor in its software after it accidentally leaked its so-called "golden key"—which allows users to unlock any device that's supposedly protected by Secure Boot, such as phones and tablets.

The key basically allows anyone to bypass the provisions Microsoft has put in place ostensibly to prevent malicious versions of Windows from being installed, on any device running Windows 8.1 and upwards with Secure Boot enabled.

And while this means that enterprising users will be able to install any operating system—Linux, for instance—on their Windows tablet, it also allows bad actors with physical access to a machine to install bootkits and rootkits at deep levels. Worse, according to the security researchers who found the keys, this is a decision Microsoft may be unable to reverse.

Webmaster's Commentary: 

Oops there!!!

Aug 13 09:58

Hacker Publishes House Democrats' Personal Information

A hacker has published the personal contact information of nearly every Democratic member of the US House of Representatives on his website.

The hacker known as “Guccifer 2.0” uploaded an Excel file on Friday that contains the cell phone numbers and private e-mail addresses of the Democrats.

Aug 13 09:57

The bandwidth bottleneck that is throttling the Internet

On 19 June, several hundred thousand US fans of the television drama Game of Thrones went online to watch an eagerly awaited episode — and triggered a partial failure in the channel's streaming service. Some 15,000 customers were left to rage at blank screens for more than an hour.

The channel, HBO, apologized and promised to avoid a repeat. But the incident was just one particularly public example of an increasingly urgent problem: with global Internet traffic growing by an estimated 22% per year, the demand for bandwidth is fast outstripping providers' best efforts to supply it.

Aug 13 09:54

Newspapers rethink paywalls as digital efforts sputter

Paywalls were supposed to help rescue newspapers from the crisis of sinking print circulation as readers shifted to getting their news online.

But with a few exceptions, they have failed to deliver much relief, prompting some news organizations to rethink their digital strategies.

Newspapers in the English-speaking world ended paywalls some 69 times through May 2015, including 41 temporary and 28 permanent drops, according to a study by University of Southern California researchers.

Paywalls "generate only a small fraction of industry revenue," with estimates ranging from one percent in the United States to 10 percent internationally, the study in July's International Journal of Communication said.

Aug 13 08:34

Amazon Social Justice Warrior Implicated In ‘Doxing’ Conspiracy

An online cabal of Social Justice Warriors (SJWs), including an “internet abuse specialist” who works for Amazon, have been implicated in a conspiracy to reveal a Twitter user’s personal information before unleashing an online “witch hunt” against them.

Aug 12 20:06

Terrorist-Fighting License Plate Readers Just Mobile Revenue Generators Cruising Poor Neighborhoods

We know what automatic license plate readers are good for: collecting massive amounts (billions of records) of plate/location data housed by private companies and accessed by law enforcement for indefinite periods of time. What we don't know is how effective ALPRs are at fighting/investigating crime. George Joseph at Citylab has done some digging into the effectiveness of license plate readers and hasn't found much that justifies the expense, much less the constant compilation of plate info.

Aug 12 14:01

Amazon Social Justice Warrior Implicated In ‘Doxing’ Conspiracy

An online cabal of Social Justice Warriors (SJWs), including an “internet abuse specialist” who works for Amazon, have been implicated in a conspiracy to reveal a Twitter user’s personal information before unleashing an online “witch hunt” against them.

Aug 12 13:24

SURPRISE: Vancouver Police Are Using Secretive “Stingray” Cellphone Surveillance

By Derrick Broze

Vancouver police have become the first Canadian police force to admit to using a controversial cellphone monitoring tool sometimes known as a Stingray.

Amidst mounting pressure from civil liberties groups, the Vancouver Police have confirmed that they have used a cell site simulator, popularly known as a “stingray,” on at least one occasion. The admission is the first of its kind by a municipal police force in Canada...

Aug 12 12:00

Was This Wartime Technology Really Deployed Against Journalists Inside the DNC?

Technology developed to jam cellphones during the Iraq War may be getting deployed against journalists reporting on protests against the political establishment in the United States.

While police and government surveillance of protests, including monitoring of cellphone use, is well-documented, efforts to block signals at protests remains an oft-repeated, but never proven, rumor.

It may be impossible to definitively prove that authorities are using cellphone “jamming” technology, but journalists working with both mainstream and independent media reported unusual difficulties accessing the internet during recent protests at the gates of the Democratic National Convention, consistent with the effects this very real technology could have.

Webmaster's Commentary: 

So, THIS is what the DNC thinks about the First Amendment; something to be broken and battered with high tech, if the narrative they are spewing has absolutely no relationship with reality.

Aug 12 11:56

‘War On Drugs Futile In Face Of Dark Web Marketplace,’ Say Campaigners

Britain’s war on drugs is failing, campaigners say, with the online narcotics market soaring in value and police finding themselves seizing 1,000 cannabis plants every day.

Researchers for think tank Rand Europe found the UK has the largest online drugs trade of any European nation, and is second only to the US.

Aug 12 08:58

FLASHBACK - Hillary Clinton camp now paying online trolls to attack anyone who disparages her online 

Many moons ago, David Brock, now the head of a Hillary Clinton Super PAC, used every resource available to ruin the life of Anita Hill and anyone who supported her. He would lie, cheat, and blatantly misrepresent facts if it meant getting Clarence Thomas through the Supreme Court nomination process.

Brock openly admitted it.

Now, it appears Brock, who is no doubt great at what he does, is using his same old tools, but for a new cause in a new technological era.

As head of the Correct The Record Super PAC for Hillary Clinton, David Brock has launched something called Barrier Breakers — an online mob of paid trolls designed to attack any and every person who says one cross word about Hillary Clinton on Facebook, Twitter, Instagram, Reddit, or elsewhere.

Webmaster's Commentary: 

Aug 12 07:55

Linux TCP Flaw allows Hackers to Hijack Internet Traffic and Inject Malware Remotely

The Transmission Control Protocol (TCP) implementation in all Linux systems deployed since 2012 (version 3.6 and above of the Linux kernel) poses a serious threat to Internet users, whether or not they use Linux directly.

This issue is troubling because Linux is used widely across the Internet, from web servers to Android smartphones, tablets, and smart TVs.

Researchers have uncovered a serious Internet flaw, which if exploited, could allow attackers to terminate or inject malware into unencrypted communication between any two vulnerable machines on the Internet.

The vulnerability could also be used to forcefully terminate HTTPS encrypted connections and downgrade the privacy of secure connections, as well as also threatens anonymity of Tor users by routing them to certain malicious relays.

Aug 12 06:39

Thieves can wirelessly unlock up to 100 million Volkswagens, each at the press of a button

Security researchers will demonstrate how crooks can break into cars at will using wireless signals that can unlock millions of vulnerable vehicles.

The eggheads, led by University of Birmingham computer scientist Flavio Garcia alongside colleagues from German engineering firm Kasper & Oswald, have managed to clone a VW Group remote control key fob after eavesdropping on the gizmos' radio transmissions.

The hack can be used by thieves to wirelessly unlock as many as 100 million VW cars, each at the press of a button. Almost every vehicle the Volkswagen group has sold for the past 20 years – including cars badged under the Audi and Skoda brands – is potentially vulnerable, say the researchers. The problem stems from VW’s reliance on a “few, global master keys.”

Aug 11 20:34

US couple sues IP mapping firm over 'digital hell'

A US couple is suing an internet mapping firm for $75,000 (£58,000) after years of "digital hell".

MaxMind matches IP addresses, which are used to connect devices to the internet, to physical locations. It has said these are not meant to be precise.

James and Theresa Arnold say it registered their home as the position of more than 600 million addresses.

They say this has led many people to wrongly believe a host of crimes were committed at the property.

Aug 11 15:00

When A Door Closes, A Window Opens: Closing Silk Road Leads To Surge In Online Drug Sales

Closing the online black market known as the Silk Road was a success for the FBI, but a short-lived one. Three years later, it seems that it did little to deter internet-facilitated drug purchases as new reports found more markets have opened in its place.

Aug 11 13:49

Apple Patents Remote ‘Kill Switch’ For IPhone Cameras

What to do about all those darn videos showing cops murdering people?

They make it much harder for law enforcement to lie about their own actions, and just get everyone all fired up. Why not ask Apple (for starters) to build in a “feature” on a future generation of iPhones that will allow cameras to be disabled remotely?

Aug 11 13:37

What Do They Know That We Don’t? World’s Billionaires Are Stockpiling Cash: “Taking Money Off the Table”

Many of these people literally helped to build the system we all now rely upon, and now they are holding cash, gold and other assets our of fear that stocks will crash and digital instruments of wealth could be undermined:

The world’s billionaires are holding more than $1.7 trillion in cash — the highest amount since one firm began recording the measure in 2010. Because of what they perceive to be growing risks in the economy and world, the world’s 2,473 billionaires are keeping 22.2 percent of their total net worth in cash.

Read more at SHTF

Aug 11 13:17

Pokémon GO Is 'Racist'

A new article from the Urban Institute, a Washington-based community-engagement research organization, calls out Pokémon GO’s failure to break down barriers and reach marginalized groups.

Aug 11 12:34

Clinton Is Fighting the Troll Wars With a Million Dollar Super-PAC Campaign

As the Los Angeles Times reports, a super-PAC called Correct the Record has hired a legion of “former reporters, bloggers, public affairs specialists, [and] designers” to go after anyone online who is critical of Hillary Clinton. And it’s a well-funded effort. According to Correct the Record, it’s “engaged” with roughly 5,000 people online so far.

“It is meant to appear to be coming organically from people and their social media networks in a groundswell of activism, when in fact it is highly paid and highly tactical,” Brian Donahue, chief executive of the consulting firm Craft Media/Digital, told the Los Angeles Times.

Webmaster's Commentary: 

Well, I guess if McDonald's turns you down, a job is a job!

Aug 11 11:24

Newly released Clinton emails shed light on relationship between State Dept. and Clinton Foundation

Judicial Watch, a conservative watchdog group, released 296 pages of emails from the Democratic presidential nominee, including 44 that Judicial Watch says were not previously handed over to the State Department by Clinton. The emails, many of which are heavily redacted, raise questions about the Clinton Foundation's influence on the State Department and its relations during her tenure.

Aug 11 11:23

Dems worried another hacked email trove could surface before November

Democratic Party officials reportedly are bracing for the possibility that another batch of damaging or embarrassing internal emails — the kind that cost the party chairman her job on the eve of the Democratic National Convention — could become public before the November presidential election.

Webmaster's Commentary: 

Maybe the Democratic party will play it safe and drop barbells onto the throats of all their IT people now, to prevent any more leaks! :)

Aug 11 07:40

FBI probe of Clinton's emails prompted by espionage fears, secret letters say

Two secret letters the FBI sent to the State Department have revealed for the first time that the bureau's investigation into Hillary Clinton's private email server, and the classified emails sent through it, stemmed from a so-called "Section 811" referral from the Intelligence Community's Inspector General (ICIG). The ICIG determined that classified, national security information in Clinton's emails may have been "compromised" and shared with "a foreign power or an agent of a foreign power."

Section 811 of the Intelligence Authorization Act of 1995 "is the statutory authority that governs the coordination of counterespionage investigations between Executive Branch departments or agencies and the FBI." A Section 811 referral is a report to the FBI about any unauthorized information that may have been disclosed to a foreign power.

Webmaster's Commentary: 

It is that "something else" I am most concerned with. :)

SHARE THIS ARTICLE WITH YOUR SOCIAL MEDIA