The U.K. Metropolitan police are accused of collaborating with Indian police and hackers to illegally access the emails of hundreds of activists and journalists.
A secret unit of the Metropolitan police has been partnering with hackers to monitor the emails of hundreds of political activists and journalists, according to a whistleblower familiar with the unit. The individual claims that the secret unit worked with Indian police and hackers to steal the passwords for the emails of activists, reporters, and photographers...
China has called on Russia and other BRICS nations to commit themselves to the concept of cyber sovereignty, which would allow governments to control their national cyber space in a manner that only they deem appropriate. The idea for an agreement on national cyber sovereignty was proposed by Beijing following its first ever white paper spelling out the view that governments are entitled to the right to control and regulate the Internet on their national territory. Additionally, Beijing made no bones about plans to enhance its cyber warfare capacity as a counter-measure to the exponential growth of threats coming from cyber space. "Cyber attacks, cyber espionage, and surveillance have become major issues confronting all countries," said Long Zhou, coordinator for the Foreign Ministry’s cyber affairs division. The concept of cyber sovereignty, however, is not new.
70% of the people disprove of Comey. Nunes says the FBI not involved in the investigation. Evidence is now growing against Obama, Clapper, Brennan and Rogers. Wikileaks releases nightskies 1.2, which shows the CIA has control of Macs and Iphones.
WikiLeaks has revealed the CIA’s alleged ability to infiltrate and control iPhones through a tool called NightSkies, which is physically installed onto factory fresh iPhones and allows the CIA to monitor and download files from targets’ phones undetected.
The revelation is part of WikiLeaks’ latest Vault 7 release named ‘Dark Matter.’
NightSkies works in the background and grants “full remote command and control,” to the CIA, allowing it to upload and download files from iPhones, including details from the owner’s phonebook, text messages and call logs, and to execute actions on the phones as it wishes.
Cybellum security researchers have uncovered a new attack mechanism that can be used to take control of your antivirus and turn it into a malware. Called DoubleAgent, this attack exploits an old and undocumented vulnerability in Windows operating system. This Zero Day code injection technique affects all major antivirus vendors and has the power to hijack permissions.
The man who served as former president George W Bush's most senior ethics lawyer has suggested that the FBI is "uncovering evidence of treason" by far right US news websites over their links with Russia.
Richard Painter tweeted a link to an article suggesting that the Bureau was looking into news outlets like Breitbart News, InfoWars and the Kremlin-backed RT News and Sputnik News, to see whether they worked with Russian-backed operatives to disseminate stories favouring Donald Trump during the presidential election. at times when his campaign appeared to be struggling.
Sources told US publisher, McClatchy that online "bots" had created created millions of social media posts linking to articles on the sites, some of which were completely false, while other contained a mixture of fact and fiction.
This strikes me as desperation on the cusp of madness.
I have linked to all the resources indicated above, when I have been able to vet that the information came from multiple sources, and believed, to the best of my knowledge, that the information presented was factually based.
But when it becomes, "alleged treason" to tell the truth, the best you can, on a blog, you know your government has gone full tilt-boogie Orwell on you.
And that George Bush even had an "ethics layer", in his lying about the reasons reasons the US government had to war in Afghanistan and Iraq, is hysterically hypocritical, and worth a great laugh, but Richard Painter CANNOT expect to be taken seriously by any thinking American on these charges, after the dark, and brutal, legacy of Bush's presidency.
So now, this now thoroughly embarrassed, morally bankrupt, and completely irrelevant man is desperately attempting to forward the US Deep State Narrative of Russia being the "bad guy" in the geopolitical arena, and a country the US government and military needs to wagewar against.
I have to wonder just how much of Painter's stock portfolio is invested in companies which comprise the US Military/Industrial Complex, to make these accusations.
Yesterday we reported that an international group of hackers claim they have breached Apple’s iCloud user database and stolen 300 million usernames and passwords. The group has threatened to initiate a widespread factory reset on April 7th, 2017, potentially wiping out data on tens of millions of iPhones and iCloud accounts should Apple fail to pay a ransom.
But that breach by nefarious hackers, while serious, is nothing compared to what your trusted operating system provider may be doing on your personal computer.
According to a recent report, if you are a Windows 10 user then every single keystroke you have ever typed on your computer may have been logged and sent to Microsoft.
Google Maps is about to chart out more than just streets and roads. They’re going to locate methane leaks in cities. A collaboration between scientists, advocacy groups and Google found that equipping the cars with methane sensors helped locate natural gas leaks.
As tensions between the U.S and North Korea continue to escalate, with the most recent provocation coming from Kim Jong Un last night, the Wall Street Journal has just reported that Federal prosecutors are building potential cases that would accuse North Korea of directing the theft of $81 million from Bangladesh’s account at the Federal Reserve Bank of New York last year.
President Obama’s Director of National Intelligence (DNI) James Clapper and his Central Intelligence Agency (CIA) director John Brennan oversaw a secret supercomputer system known as “THE HAMMER,” according to former NSA/CIA contractor-turned whistleblower Dennis Montgomery.
Clapper and Brennan were using the supercomputer system to conduct illegal and unconstitutional government data harvesting and wiretapping. THE HAMMER was installed on federal property in Fort Washington, Maryland at a complex which some speculate is a secret CIA and NSA operation operating at a US Naval facility.
Our value is founded on a unique and deep understanding of risks, vulnerabilities, mitigations, and threats. Domestic Surveillance plays a vital role in our national security by using advanced data mining systems to "connect the dots" to identify suspicious patterns.
Amid concerns of high-profile cyberattacks and disinformation campaigns ahead of key parliamentary elections in September, Germany's Federal Intelligence Agency (BND) has made a concerted effort to recruit young hackers.
The BND's mission includes obtaining intelligence as mandated by the federal government on key areas pertaining to foreign information, and it effectively aims to protect Germany and its interests. One of the tasks is to recognize and assess potentially-damaging espionage activities and prevent or minimize the fallout.
Or to rig the election for Merkel, whose poll numbers are falling.
The latest leaks from WikiLeaks' Vault 7 is titled “Dark Matter” and claims that the CIA has been bugging “factory fresh” iPhones since at least 2008 through suppliers. The full documents are expected to be released after a 10 a.m. EDT “press briefing” that WikiLeaks promoted on its Twitter.
So, all by its lonesome, the CIA has decided to eviscerate the 4th Amendment to the Constitution; and the Judicial, Executive and Legislative portions of our government are collectively impotent to stop them?!?
Folks, here's the deal for me.
I am a Christian Witness/Pacifist Activist who never advocates violence as a response to anything this government doe, but exhorts her government to resolve its geopolitical disputes with negotiations rather than through war; I am a published composer of religious music, and a choral conductor at my local Methodist church.
So will someone please explain to me, in a way that seems reasonable, as a completely non-violent, loving, and logical human being, why I should be targeted for surveillance?!? Is the short answer, "Just because they CAN??"
And the really hysterical/ironic part of all this, is that the actual baddies have already encrypted cell and other communications to the point where they are "bullet-proof" to all of the US's "alphabet soup" intelligence agencies.
If you have ever visited a blog or on-line discussion group on the Middle East you have doubtless had the misfortune to run into them.
They are known by the language they use: depraved sexual insults, bile, bigotry, threats, disinformation and character assassination. That’s right: I’m talking about “hasbarats,” Zionist trolls who infect the Internet with hasbara, pro-Israel propaganda. Of course, mainstream media hasbarats have been around for decades, as have “hasbaratchiks,” fifth-columns in foreign governments who subvert national policies to serve Israel. The Internet, though, is the latest, some might say the greatest, propaganda playground, and Israel cannot cope with factual, passionate, well-documented stories that expose its war crimes and unrepentant criminality.
The same day House Intelligence Committee chairman Devin Nunes gave a press conference disclosing that President Trump had been under "incidental surveillance," Attorney and FreedomWatch Chairman, Larry Klayman, sent a letter to the House Committee on Intelligence imploring them to pursue the claims and evidence presented under oath at a Washington DC FBI Field Office by his client - CIA / NSA Whistleblower Dennis Montgomery - who Klayman claims "holds the keys to disproving the false claims... ...that there is no evidence that the president and his men were wiretapped"
When Montgomery attempted to deliver this information through the appropriate channels two years ago, the former CIA and NSA contractor wasn't given the time of day:
Today, March 23rd 2017, WikiLeaks releases Vault 7 "Dark Matter", which contains documentation for several CIA projects that infect Apple Mac Computer firmware (meaning the infection persists even if the operating system is re-installed) developed by the CIA's Embedded Development Branch (EDB). These documents explain the techniques used by CIA to gain 'persistence' on Apple Mac devices, including Macs and iPhones and demonstrate their use of EFI/UEFI and firmware malware.
Among others, these documents reveal the "Sonic Screwdriver" project which, as explained by the CIA, is a "mechanism for executing code on peripheral devices while a Mac laptop or desktop is booting" allowing an attacker to boot its attack software for example from a USB stick "even when a firmware password is enabled". The CIA's "Sonic Screwdriver" infector is stored on the modified firmware of an Apple Thunderbolt-to-Ethernet adapter.
Malware posing as legitimate firmware for Siemens control gear has apparently infected industrial equipment worldwide over the past four years.
The cyber-nasty is packaged as software to be installed on Siemens programmable logic controllers (PLC), we're told. At least 10 industrial plants – seven in the US – were found running the infected firmware, a study by industrial cybersecurity firm Dragos claims.
According to the Texas-based biz, this particular malware was specifically thrown at industrial control equipment. Exactly what it does, or did, is not explained, although it is described as "crimeware".
Back in the 1990s when businesses started going online they frequently didn’t realize that their new networking gear came with simple default passwords like “admin”. So a whole generation of early hackers simply scanned the web for companies that had inadvertently exposed themselves in this way, siphoning off (probably, no one really knows) billions of dollars and causing various other kinds of mischief.
An organization affiliated with Google is offering tools that news organizations and election-related sites can use to protect themselves from hacking.
Jigsaw, a research arm of Google parent company Alphabet Inc., says that free and fair elections depend on access to information. . To ensure such access, Jigsaw says, sites for news, human rights and election monitoring need to be protected from cyberattacks.
Facebook has expanded the roll-out of its fact-checker tool to combat ‘fake news’ as more users report the appearance of the ‘disputed’ message alert. The pop-up lets users know when a story’s accuracy is questionable before they share it.
Ranking Member of the House Permanent Select Committee on Intelligence Rep. Adam Schiff (D-CA) and F.B.I. Director James Comey colluded during the intelligence hearing on Capitol Hill Monday, according to an online report.
It looks like the CIA isn’t the only organization capable of taking over your phone.
Hackers claiming to have compromised at least 300 million Apple account ID’s and passwords say they will initiate a complete wipe of iPhones and iClouds if the Cupertino, California based technology company doesn’t pay them a ransom.
The group, which goes by the name Turkish Crime Family, says Apple has until April 7th to come up with either $75,000 in BitCoin or $100,000 in iTunes gift cards.
According to Motherboard, the group posted a Youtube video proving they have compromised the credentials of millions of iCloud accounts, which could then be used to wipe an iPhone remotely and potentially locked users out of critical phone features.
On a heavily protected military base some 15 miles south of Washington, D.C., sits the massive headquarters of a spy agency few know exists. Even Barack Obama, five months into his presidency, seemed not to have recognized its name. While shaking hands at a Five Guys hamburger restaurant in Washington in May 2009, he asked a customer seated at a table about his job. “What do you [do]?” the president inquired. “I work at NGA, National Geospatial-Intelligence Agency,” the man answered. Obama appeared dumbfounded. “So, explain to me exactly what this National Geospatial…” he said, unable to finish the name. Eight years after that videotape aired, the NGA remains by far the most shadowy member of the Big Five spy agencies, which include the CIA and the National Security Agency.
One more time. It was the NSA with their net that catches everything that was the source of the leaks. Right before he left office Obama signed an E.O. that has the NSA pass what they Hoover up, to 16 other Federal Agencies.
There is where the leaks are coming from and it is on paper legal under Obama's E.O. If Trump hasn't canceled that E.O. He had better do so pronto!
WASHINGTON (AP) — The chairman of the House intelligence committee said Wednesday that the communications of Trump transition officials — possibly including President Donald Trump himself — may have been "monitored" after the election as part of an "incidental collection."
The FBI’s Counterintelligence Division is leading an investigation into the Google and Facebook cyber operation that rigged the 2008 and 2012 elections for Barack Obama, and attempted to rig the 2016 election in Hillary Clinton’s favor.
Five people employed by members of the House of Representatives remain under criminal investigation for unauthorized access to Congressional computers. Former DNC chair Debbie Wasserman Schultz employed at least one of those under investigation.
The criminal investigation into the five, which includes three brothers and a wife of one of the men, started late last year, as reported by Politico in February. The group is being investigated by US Capitol Police over allegations that they removed equipment from over 20 members’ offices, as well as having run a procurement scheme to buy equipment and then overcharge the House.
Cisco Systems said that more than 300 models of switches it sells contain a critical vulnerability that allows the CIA to use a simple command to remotely execute malicious code that takes full control of the devices. There currently is no fix.
WikiLeaks publishes docs from what it says is trove of CIA hacking tools
Cisco researchers said they discovered the vulnerability as they analyzed a cache of documents that are believed to have been stolen from the CIA and published by WikiLeaks two weeks ago. The flaw, found in at least 318 switches, allows remote attackers to execute code that runs with elevated privileges, Cisco warned in an advisory published Friday. The bug resides in the Cisco Cluster Management Protocol (CMP), which uses the telnet protocol to deliver signals and commands on internal networks. It stems from a failure to restrict telnet options to local communications and the incorrect processing of malformed CMP-only telnet options.
Washington Free Beacon senior writer Adam Kredo on Tuesday discussed the Department of Justice finding malware on servers for Trump Tower mimicking supposed Russian ties.
Kredo was talking with One America News Network's Liz Wheeler about the FBI investigating the Trump campaign for collusion with Russian ties.
Kredo first said that the investigation should go on, before discussing a rarely mentioned point.
"It wasn't very well reported, the Department of Justice revealed just last week that in fact some of these ties that they had witnessed between Trump Tower servers and Russian entities in fact, were stooged," Kredo said.
Kredo went on to explain that malware may have been installed on these servers to mimick contacts with Russian entities in an effort to portray that the Trump campaign had the Russian contacts.
Technology giant Microsoft is blocking Windows 7 and 8.1 updates on Intel's seventh generation Core i3, i5 and i7 AMD's seventh generation processor (Bristol Ridge) and Qualcomm's 8996 processors.
While trying to scan and download updates through Windows Update, error messages appear saying, "Windows could not search for new updates" and "code 80240037 Windows Update encountered an unknown error."
As explained in Microsoft Knowledge based article the errors occur as the new processor generations require the latest Windows version. For those on Windows 7 and 8.1, Microsoft recommends updating the devices to Windows 10.
So we are back to the "You vill use ze vindows ve TELL you to use, schwein!"
An influential British think tank and Ukraine’s military are disputing a report that the U.S. cybersecurity firm CrowdStrike has used to buttress its claims of Russian hacking in the presidential election.
The CrowdStrike report, released in December, asserted that Russians hacked into a Ukrainian artillery app, resulting in heavy losses of howitzers in Ukraine’s war with Russian-backed separatists.
But the International Institute for Strategic Studies (IISS) told VOA that CrowdStrike erroneously used IISS data as proof of the intrusion. IISS disavowed any connection to the CrowdStrike report. Ukraine’s Ministry of Defense also has claimed combat losses and hacking never happened.
The challenges to CrowdStrike’s credibility are significant because the firm was the first to link last year’s hacks of Democratic Party computers to Russian actors, and because CrowdStrike co-founder Dimiti Alperovitch has trumpeted its Ukraine report as more evidence of Russian election tampering.
Google has responded to a contagious YouTube advertising boycott which yesterday prompted a downgrade on Wall Street.
Pivotal Research Group downgraded Alphabet shares from "Buy" to "Hold" based on its response to the boycott, which now includes more than 200 big brands, as well as public sector ad spending. Marks & Spencer and Hargreaves Lansdown became the latest to hit pause yesterday.
The boycott follows a series of reports in The Times demonstrating that Google was running advertisements promoting big brands against jihadi and racist videos on YouTube, the world's second most popular website after Google's search page.
Vint Cerf, one of the fathers of the internet, has weighed in on Internet of Things security, warning that a Mirai botnet-style incident could happen again unless vendors start taking responsibility for their goods.
“The biggest worry I have is that people building [IoT] devices will grab a piece of open source software or operating system and just jam it into the device and send it out into the wild without giving adequate thought and effort to securing the system and providing convenient user access to those devices,” Cerf told the Association for Computing Machinery (ACM) organisation at its 50th Turing Award celebrations.
Cybercriminals behind the Necurs botnet have reactivated the zombie network and returned to their original business of using compromised machines as conduits for spam distribution.
In January, Cisco Talos reported that the Necurs botnet had gone offline, taking the typical volume of Locky ransomware-tainted spam emails with it.
Security researchers have once again detected an uptick of spam email from the Necurs botnet over recent days. Rather than distributing malware in the form of malicious attachments, it has shifted back to sending high volumes of penny stock pump-and-dump messages.
For most North Koreans, it's nonexistent. There are only 1,024 known IP addresses in the entire country. The Internet is typically reserved for government officials, a few foreign ambassadors and outside assistance groups, according to a North Korean defector-turned-journalist.
By comparison, the United States has 1.5 billion IP addresses.
It's important to note that it's not one IP address per device, so there could be thousands of devices hooked up to the Internet in North Korea. Still, it has one of the smallest Internet presences in the world.
A senior National Security Agency official appeared to confirm that North Korean computer hackers were behind a multi-million dollar heist targeting Bangladesh’s central bank last year.
Computer hackers attempted to steal $951 million, but only got away with $81 million, some of which was later recovered. After the theft, security firms quickly pointed the finger at North Korea. Other experts disputed that finding. But on Tuesday, NSA Deputy Director Rick Ledgett appeared to say North Korea was the culprit during a cryptic exchange at a Washington forum.
So, "North Korean Hacker" has joined "Russian Hacker" on the list of boogeymen we are supposed to automatically be afraid of!
Crowdstrike, the cybersecurity company working for the Democratic National Committee (DNC), released a report tying “Russian hacking” to an incident that never happened, yet ?even after the report had been debunked, FBI Director James Comey still referred to Crowdstrike as a “highly respected private company” at a Senate hearing.
Executives from Crowdstrike and Director Comey are both scheduled to testify in front of the House Intelligence Committee set for Monday morning at 10 am.
Specifically, Assange claimed, “The chairman of Google, Eric Schmidt, set up a company to run the digital component of Hillary Clinton’s campaign.”
Eric Schmidt did in fact create a company in the last quarter of 2015 called The Groundwork whose website is empty except for a single placeholder logo. Breitbart has previously reported on The Groundwork and how it was reportedly developed to install Clinton in the Oval Office. However, whether or not Google itself is a part of Schmidts’ involvement in The Groundwork remains unclear to the public.
According to investigative journalist Jerome Corsi reporting for Infowars, law enforcement sources out of Arizona have provided a database containing the “individual records of U.S. citizens under National Security Agency (NSA) electronic surveillance in the years 2004 through 2010,” thus proving once and for all that Donald J. Trump was, in fact, under surveillance during Barack Obama’s tenure as President.
But if that’s not enough to burst your bubble, what you are about to read next will, because the absolute bombshell report doesn’t stop there. As it turns out Infowars founder and popular radio talk show host Alex Jones was also under surveillance in Texas.
Jones said on the Sunday show that they had even listed an address in which he “secretly” does broadcasts from.
Last week, the New Mexico House gave final approval for a bill known as the Electronic Communication Privacy Act. If signed by the governor, the bill would not only protect privacy in New Mexico, but would also hinder at least two aspects of the federal surveillance state...
Google has found itself at the center of a British storm in recent days after major companies from supermarkets to banks and consumer groups pulled their adverts from its YouTube site after they appeared alongside videos carrying homophobic and anti-Semitic messages.
When you visit a website, online trackers and the site itself may be able to identify you – even if you’ve installed software to protect yourself. It’s possible to configure your browser to thwart tracking, but many people don’t know how.
Panopticlick will analyze how well your browser and add-ons protect you against online tracking techniques. We’ll also see if your system is uniquely configured—and thus identifiable—even if you are using privacy-protective software.
A White House panel has previously slammed the NSA, and said that mass spying is unnecessary.
Now, the United Nations’ Special Rapporteur on the Right to Privacy notes in a new report (with our comments)
Deeply concerning … the status of the right to privacy in the surveillance area of activity has not improved since the last [UN surveillance] report. [Indeed, it’s getting worse … and will only expand unless we fight for privacy.]
Summary?—?Twitter is shadow banning high profile accounts, generally populist accounts. Twitter has every right to “censor,” of course, with an exception. It is shareholder fraud to censor popular accounts, as this harms company growth. Jack Dorsey must take Twitter private or else tell his shareholders the truth?—?Twitter censors accounts that are critical of Hillary Clinton. (Even Bernie Sanders supporters have been shadow banned.)
Twitter is a publicly-traded corporation and thus its CEO Jack Dorsey has fiduciary obligations to his shareholders. Twitter is not Jack’s private little Super PAC. If Jack wants to censor influential and popular users, then he must disclose this to shareholders. He must tell them the truth, “I don’t care about shareholder value. I want to run Twitter like my personal blog and Super PAC.”
Why are we so worried about Congress repealing the FCC’s privacy rules for ISPs? Because we’ve seen ISPs do some disturbing things in the past to invade their users’ privacy. Here are five examples of creepy practices that could make a resurgence if we don’t stop Congress now.
The examples of companies which have done this before are highly unsettling.
Why are we so worried about Congress repealing the FCC’s privacy rules for ISPs? Because we’ve seen ISPs do some disturbing things in the past to invade their users’ privacy. Here are five examples of creepy practices that could make a resurgence if we don’t stop Congress now.
Russian daily Kommersant reports that the Bank of Russia detected malware that hides inside ATM’s operating memory which "forces" them to dispense cash to anyone who enters certain code on its keyboard.
Secret mass surveillance continued to spark global controversy this year, yet the National Security Agency’s dragnet programs unconstitutionally monitoring Americans are stretching into their second decade. Ignited by news reports in 2005, eight years before Edward Snowden’s revelations blew the lid off illegal and unconstitutional domestic spying in 2013, mounting concerns around the world about the threat to free expression made 2015 a watershed year in the battle to restore privacy.
A man suspected of maliciously tweeting a GIF to a magazine writer that induced an epileptic attack has been collared by the FBI.
In December, Kurt Eichenwald, a Newsweek journalist who has written about living with epilepsy, appeared on the US Fox News show Tucker Carlson Tonight to discuss his claims that the then-President-elect Donald Trump had spent time in a mental institution.
That evening, Eichenwald received a tweet from pseudo-anonymous Twitter user jew_goldstein that contained a strobing image and the words: "You deserve a seizure." The image, we're told, induced an epileptic fit in Eichenwald, who lives with his family in Dallas, Texas. His wife later called the police when she pieced together what had happened.
In this video, Vin Armani takes a deep dive into Vault 7 and discovers that the CIA’s technology isn’t nearly as scary as media reports have made out. Most of their “hacking” tools require a tech-savvy agent to be physically in the same room as the target device in order to install malware. And most of their malware is wiped out by the next routine software update by the device maker.
The New York State Supreme Court is preparing to make an important decision regarding cellphone surveillance and what New York police can legally keep a secret.
The opposition to “stingray” cellphone surveillance, and the support of transparency are both experiencing growth throughout the United States. Recent bills passed in Arizona and New Hampshire are part of a trend that has been steadily increasing in the United States. The public and the political class are becoming aware of the true level of intrusion possible as a result of arming local, state, and federal police with military grade surveillance equipment, with very little oversight...
Boldly going where no man has gone before, the Kirk Ransomware brings so much nerdy goodness to the table that it could make anyone in IT interested. We have Star Trek, Low Orbital Ion Cannons, a cryptocurrency payment other than Bitcoin, and a decryptor named Spock! Need I say more?
A 25-year-old software engineer named Edward Mackowiak who worked for Apple has reportedly shot himself in the head at the company headquarters in Cupertino. His death was quickly ruled a suicide just hours later after police found no evidence of foul play at the scene.
What’s strange is how the company refused to give any details about what Mackowiak actually did there. The only information about his job was on a hastily removed Linkedin page. Gizmodo reports it was sparse as well, simply listing him as a software engineer at Apple. His Twitter account has also been quickly deleted. It’s as if the guy himself is being digitally erased post haste.
A Russian bank has reported to U.S. authorities that mysterious communications resumed recently between one of its computers and an email server tied to President Trump’s business empire, and it has developed evidence the new activity may be the work of a hacker trying to create a political hoax, Circa has learned.
Alfa Bank is asking the U.S. Justice Department for help solving the mystery and pledged its full cooperation.
Two separate sources with links to the counter-intelligence community have confirmed to Heat Street that the FBI sought, and was granted, a FISA court warrant in October, giving counter-intelligence permission to examine the activities of ‘U.S. persons’ in Donald Trump’s campaign with ties to Russia.
The Obama camp is trying to insist there was no surveillance on the Trump campaign, but the existence of a FISA warrant contradicts that!
Another day, another would-be Raspberry Pi challenger, this time the tiny LicheePi Zero, which sells for as little as $6.
Like its namesake, the Raspberry Pi Zero, the single-board computer is aimed at electronics hobbyists who want to build their own gadgets.
On paper, it has a faster and more modern processor than the Raspberry Pi Zero, the cheapest Raspberry Pi board, as well as offering Wi-Fi connectivity at a lower price. However, there are also several potential drawbacks to this Chinese-made competitor.
As the discussion over wiretapping and foreign hacking still dominates the conversation in Washington, an unusually high amount of suspicious cell phone activity in the nation’s capital has caught the attention of the Department of Homeland Security, raising concerns that U.S. officials are being monitored by a foreign entity.
The issue was first reported in the Washington Free Beacon, but a source at telecom security firm ESD America confirmed the spike in suspicious activity to CBS News.
Based on the type of technology used, the source continued, it is likely that the suspicious activity was being conducted by a foreign nation.
The news comes the same week that two Democratic lawmakers wrote to Kelly saying they were “deeply concerned” about hacking vulnerabilities in U.S. cellular networks.
Notice that this is not at all sourced, and we read that breathless statement that "...it is likely that the suspicious activity was being conducted by a foreign nation."
I have to chuckle, and ask myself, "Who are they going to blame for this"?!?
Intelligent people understand to keep their cell conversations light, fluffy, and not of any real import; in fact, Mike and I think that surveilling our phones is punishment duty for newbies at any of the alphabet soup agencies.
And the reality is, that the "baddies" already have their phones encrypted to the point where no one can mess with them.
Vault 7 has been the subject of a curious and cryptic set of tweets from Wikileaks over the course of the past month or so. Now we know why. In bombshell news, in the greatest leak in Wikileaks history, in the greatest leak in CIA history, a total of 8,761 documents has been released in a series that has been dubbed Vault 7. Even for seasoned conspiracy researchers, the documents are fascinating and horrible at the same time. It confirms the suspicions and knowledge of many investigators. Now we have the proof to substantiate our hunches and intuition. The CIA has been caught with its pants down: spying on its citizens, bypassing encryption to steal their messages, hacking into their electronic devices to listen on their conversations, using US consulates abroad to conduct spying operations, remotely hacking into vehicles (to perform undetectable assassinations) and much more.
Some Windows fans are worried that the upcoming Windows 10 Creators Update could mean costly data bills.
Windows 10 currently treats Windows Updates on cellular networks differently to those over Wi-Fi because Microsoft knows these updates can be large and result in sizeable bills if they take place on a so-called metered connection, such as a cellular network.
For this reason Windows 10 only downloads 'priority updates'.
But, as SuperSite Windows reports, the latest Windows Insider fast ring build of the Windows 10 Creators update notes a change to the language used.
In her March 12 talk at the 2017 SXSW Conference, Kate Crawford of Microsoft Research warned that artificial intelligence is ripe for abuse. Crawford, who researches the social impact of large-scale data systems and machine learning, described how encoded biases in AI systems could be abused to target certain populations and centralize power in the hands of authoritarian regimes.
“Just as we are seeing a step function increase in the spread of AI, something else is happening: the rise of ultra-nationalism, rightwing authoritarianism and fascism,” she said in Dark Days: AI and the Rise of Fascism, her SXSW session.
Crawford believes the issue is that AI is often invisibly coded with human biases that often correspond with the characteristics of fascist movements: to demonize outsiders, track populations, centralize power, and claim neutrality and authority without accountability. AI can be a potent tool in achieving those goals, especially if it is coded with human biases.
Microsoft really wants you to run Windows 10. So while the company continues to offer security updates and bug fixes for Windows 7 and Windows 8.1 (and Windows Vista for a few more weeks), the company announced last year that it would not support those operating systems for devices with the latest Intel and AMD chips.
Up until now that’s basically just meant that if you were running Windows 8.1 or earlier on a PC with an Intel Kaby Lake or AMD Bristol Ridge or Ryzen processor you wouldn’t get officially supported drivers.
But now Microsoft is going a step further: Windows Update won’t work on Windows 7 or Windows 8.1 computers with the most recent Intel or AMD chips.
I entrusted Samsung with my data, and that is who I hold solely responsible for safeguarding it. If Samsung’s business partner is leaking that information, Samsung needs to remedy the situation.
As I was writing this up, I was going to redact some of my information (or at least my wife’s signature) but it wouldn’t make much of a difference. Four months after I disclosed this to Samsung, the information is still there for anyone to retrieve. Please don’t try to sell me a warranty for my tv.
Previously, users could opt out of downloading updates when they were on a metered connection like paid Wi-Fi or a data plan, to help protect them from accidentally blazing through their bandwidth allowance or racking up a hefty bill. Users who wanted to delay or prevent an update for other purposes could set their connection as metered to take advantage of this feature.
However, the latest build of Windows 10 makes a major change to the relationship between metered connections and new updates, according to a report from Windows Super Site. Now, updates that are “required to keep Windows running smoothly” will be downloaded whether or not the user is working with a metered connection.
There’s currently no word on which updates will be classified as essential.
Just like we’ve recently been seeing ads all over the place for Amazon’s Echo following the Wikileaks Vault 7 revelations that internet-connected electronics in the home can be exploited by government agencies and turned into covert spy devices, Samsung is picking a really strange time to announce the release of its upcoming new television that never turns off.
A recently resolved vulnerability in the Linux kernel that had the potential to allow an attacker to gain privilege escalation or cause denial of service went undiscovered for seven years.
Positive Technologies expert, Alexander Popov, found a race condition in the n_hdlc driver that leads to double-freeing of kernel memory. This Linux kernel flaw might be exploited for privilege escalation in the operating system. The (CVE-2017-2636) bug was evaluated as dangerous with a CVSS v3 score of 7.8, towards the higher end of the scale which runs from 1-10.
The vulnerability affects the majority of popular Linux distributions including RHEL 6/7, Fedora, SUSE, Debian, and Ubuntu.
The first and only internationally certified contraceptive app is now awaiting approval by the U.S. Food and Drug Administration. If approved, Natural Cycles would provide Americans a government-approved drug-free and therefore side-effect-free alternative in a market saturated with hormonal and abortive birth control.
A database containing more than 33 million records of corporate and government employees has been leaked online, including records from the Department of Defense, US Postal Service, Wal-Mart, and Ohio State University.
The database belongs to Dun & Bradstreet which licenses information on businesses and corporations for use in credit decisions, business-to-business marketing, and supply chain management. In 2013, they held over 225 million business records from companies around the globe.
The leak of the 52.2 Gigabyte corporate database from the business services firm contains millions of people’s names, work email addresses, phone numbers, and the companies they work for, along with their job titles, ZDNet reports.
German authorities have circulated further steps aimed at fighting hate speech and so-called fake news posts on social media sites such as Facebook and Twitter proposing fines of up to 50 million euros ($53 million).
German Justice Minister Heiko Maas announced plans to introduce a new law that would oblige social networks to publish quarterly accountability reports, which would include information on how effectively cases of hate speech and fake news reported by users on social networks are being considered, the German Justice Ministry reported on Tuesday.
Apart from that, social media companies would have to take down offensive posts within 24 hours after a complaint is submitted. As of today, it takes at least a week to delete these kind of posts.
"Vartanyan, also known as 'Kolypto'…allegedly developed, improved, and maintained the pernicious 'Citadel' malware toolkit, was arraigned in federal court following his extradition from Norway in December 2016," the DOJ noted. The defendent allegedly uploaded four dozen files essential for Citadel to operate.
The Justice Department explained that Citadel was designed to infect computer systems and steal financial account credentials and personal information.
The “full wrath” of the United States Central Intelligence Agency (CIA) will soon descend upon all of America after the deadliest secret lies of this “Deep State” spy agency currently at war with President Donald Trump, have now been exposed for the entire world to see, and whose next “false flag” terror attack to cover up their crimes may come as soon this coming week.
The international whistle blowing organization Wikileaks released the largest ever in history publication of over 8,000 CIA top secret documents (Vault 7: CIA Hacking Tools Revealed) revealing that this “Deep State” spy agency has, in fact, created and cast a vast electronic surveillance net around the entire US unrivaled in modern times and that has turned even the most innocuous devices (televisions, phones, computers, smart devices, automobiles, etc.) into illegal spying tools.
As far as Big Brother is concerned, nothing that you do on your cell phone is ever private. And if the government really wants to see what is on your cell phone, they are going to get that information one way or another, even if that means resorting to physical violence.
The Government's Digital Economy Bill could hand copyright trolls the opportunity to threaten online users with prison sentences of up to 10 years.
According to a new campaign page by the Open Rights Group – a digital campaigning organisation that aims to protect the rights to privacy and free speech online – the Bill criminalises minor copyright infringement.
Open Rights Group want to change the Digital Economy Bill so that it is more specific.
The Government wants to use the Bill to increase penalties for criminals running websites that allow people to download copyright-protected material.
However the proposed legislation will criminalise any infringement where money has not been paid for copyrighted content, or where it can be proven that there is a "risk of loss".
That could include people who fileshare, or send copyrighted material as a GIF.
Whether we like it or not, most of us have grown used to the possibility of our phones being spied upon. Dystopian novels such as George Orwell's Nineteen Eighty-Four are so ingrained in our minds that a study carried out back in 2014 concluded that 74% of Americans thought that they shouldn't give up privacy for the sake of safety.
Nevertheless, there's a considerable argument that many of us have given up on their our privacy. And thanks to laws, such as the so-called "Snooper's Charter" in the UK, state surveillance is increasing. However, let's not forget that other parties can tap into your cell phones - most troublingly, hackers and extortionists, but also your employer, an ex-partner, or even, in the case of celebrities, the press. They could be listening to your calls, reading and sending texts and emails, or altering the information on your interface.
Here are six things that you should watch out for.
The internet will soon be a “safe space”, free from “hatred”, free from “Fake News”, free from “hurtful rhetoric” and of course, free from any views or opinions that do not fit the “progressive narrative”.
The We-Vibe 4 Plus is a £90 bluetooth connected vibrator, which can be controlled through an app. It is marketed as a way to “allow couples to keep their flame ignited – together or apart”. Its app-enabled controls can be activated remotely, allowing, for instance, a partner on the other end of a video call to interact.
But the app came with a number of security and privacy vulnerabilities, which added up to produce something that many would feel uncomfortable about using.
The app that controls the vibrator is barely secured, allowing anyone within bluetooth range to seize control of the device.
In addition, data is collected and sent back to Standard Innovation, letting the company know about the temperature of the device and the vibration intensity – which, combined, reveal intimate information about the user’s sexual habits.