COMPUTERS/INTERNET/SECURITY | WHAT REALLY HAPPENED X-Frame-Options: SAMEORIGIN

COMPUTERS/INTERNET/SECURITY

Aug 17 08:00

Hacker claims to steal data of 100 million T-mobile customers

The threat actor claims to have hacked into T-Mobile's production, staging, and development servers two weeks ago, including an Oracle database server containing customer data.

This stolen data allegedly contains the data for approximately 100 million T-Mobile customers and can include customers' IMSI, IMEI, phone numbers, customer names, security PINs, Social Security numbers, driver's license numbers, and date of birth.

"Their entire IMEI history database going back to 2004 was stolen," the hacker told BleepingComputer.

An IMEI (International Mobile Equipment Identity) is a unique number used to identify mobile phones, while an IMSI (International mobile subscriber identity) is a unique number associated with a user on a cellular network.

Aug 17 07:53

Wikipedia defaced to display Nazi SWASTIKA on pages about Justin Trudeau, Joe Biden, and Kamala Harris

Multiple Wikipedia pages, including those of prominent politicians, have temporarily had the usual informational text replaced with a nasty surprise: a full-screen Nazi swastika over a lurid red background.

The apparent hack job was spotted by social media users on Monday, with conservative author Ann Coulter posting a screenshot of the Nazi symbol to Twitter and speculating that Wikipedia had been “hacked.”

Aug 17 07:48

Critical bug impacting millions of IoT devices lets hackers spy on you

Security researchers are sounding the alarm on a critical vulnerability affecting tens of millions of devices worldwide connected via ThroughTek’s Kalay IoT cloud platform.

The security issue impacts products from various manufacturers providing video and surveillance solutions as well as home automation IoT systems that use the Kalay network for easy connectin and communication with a corresponding app.

A remote attacker could leverage the bug to gain access to the live audio and video streams, or to take control of the vulnerable device.

Aug 16 06:57

Excel is still a security headache after 30 years because of this one feature

Microsoft released Excel 4.0 for Windows 3.0 and 3.1 in 1992 and many companies still use this functionality in legacy operations. The problem is that bad actors have started using Excel sheets and macros as a new way to deliver malware.

Tal Leibovich, head of threat research at Deep Instinct, explained at a presentation during DEFCON 29 why this legacy scripting language has been the vehicle for a recent rise in malware delivery. Leibovich presented "Identifying Excel 4.0 Macro strains using Anomaly Detection" with Elad Ciuraru last week. Deep Instinct is a cybersecurity company specializing in endpoint protection and using deep learning to stop cyberattacks.

Security organizations first noticed a spike in March 2020 of this kind of attack. Microsoft released a new runtime defense against Excel 4.0 macro malware in March. Leibovich said that he has seen a substantial increase over the last two years of hackers using Excel 4.0 Macros in attacks.

Aug 15 22:43

Facebook post claiming 3-year-old died from Covid-19 at KKH ‘a total fabrication’, says Singapore health official

A Facebook post claiming that a three-year-old had died from Covid-19 at KK Women’s and Childrens Hospital (KKH) is “a total fabrication”, the Ministry of Health (MOH) said today (Aug 14).

“The Ministry of Health would like to call out a Facebook post circulating online that a three-year-old preschooler has died from Covid-19 at KKH, and that this death was deliberately not reported,” the ministry said in a post on Facebook.

“This is completely untrue and a total fabrication. As of August 14, there has been no child who has died from Covid-19 at KKH.”

Aug 15 12:10

Will $500M for Smart Cities in Historic US Senate Spending Bill Fund Biometric Surveillance?

By Jim Nash

Half a billion dollars was written into the $1.2 trillion infrastructure bill passed Wednesday by the U.S. Senate to pay cities to experiment with technologies for ‘Strengthening Mobility and Revolutionizing Transportation,’ which could include remote biometric systems, sensors and drones...

Aug 15 06:18

Another Mega Group Spy Scandal? Samanage, Sabotage, and the SolarWinds Hack

The devastating hack on SolarWinds was quickly pinned on Russia by US intelligence. A more likely culprit, Samanage, a company whose software was integrated into SolarWinds’ software just as the “back door” was inserted, is deeply tied to Israeli intelligence and intelligence-linked families such as the Maxwells.

In mid-December of 2020, a massive hack compromised the networks of numerous US federal agencies, major corporations, the top five accounting firms in the country, and the military, among others. Despite most US media attention now focusing on election-related chaos, the fallout from the hack continues to make headlines day after day.

The hack, which affected Texas-based software provider SolarWinds, was blamed on Russia on January 5 by the US government’s Cyber Unified Coordination Group. Their statement asserted that the attackers were “likely Russian in origin,” but they failed to provide evidence to back up that claim.

Aug 13 17:30

“Smart Farms” Cyberattackers Able to Impact Harvests, Damage Crops, Property, People and “destroy farmland for years”

By B.N. Frank

Cybersecurity experts continue to warn about significant risks and vulnerabilities associated with “Smart Farms” and Internet of Things (IoT) connected agriculture. Some in agriculture industry continue to invest in this technology anyway including John Deere.

More terrifying warnings courtesy of Threat Post...

Aug 13 09:39

Ransomware: Now attackers are exploiting Windows PrintNightmare vulnerabilities

Cyber criminals are exploiting Windows PrintNightmare vulnerabilities in their attempts to infect victims with ransomware – and the number of ransomware groups attempting to take advantage of unpatched networks is likely to grow.

The remote code execution vulnerabilities (CVE-2021-34527 and CVE-2021-1675) in Windows Print Spooler – a service enabled by default in all Windows clients and used to copy data between devices to manage printing jobs – allow attackers to run arbitrary code, enabling them to install programs, modify, change and delete data, create new accounts with full user rights and move laterally around networks.

Now ransomware gangs are taking advantage of PrintNightmare to compromise networks, encrypt files and servers, and demand payment from victims for a decryption key.

Webmaster's Commentary: 

Aug 13 07:11

"Winter Is Coming": Chipmakers In Longest Slide Since 2018 As Morgan Stanley Downgrades Semis

The semiconductor space has long been viewed as one of the best leading indicators of the modern technological economy (and capital markets), and with good reason: it was the first sector to bottom in March 2020 when it became apparent that China and various western central banks would inject trillions into the global economy, and had enjoyed a nearly relentless upward climb since then peaking just over a week ago on August 4, but then something snapped...

... and as shown in the next chart, the Semi Index is broadly lower again, having dropped for six consecutive sessions - the longest such streak since the October 2018 Fed "policy error" when stocks cracked after Powell threatened to tighten far more than markets expected, only to end his hiking cycle prematurely just two months later, resulting in the first bear market in a decade.

Aug 13 06:44

BREAKING EXCLUSIVE: Whistleblower Steps Forward — Provides Proof From Detroit TCF Center that Election Computers Were Connected Online — WITH PHOTO

A brave whistleblower stepped forward and shared an image of a computer that was used at the TCF Center to process absentee ballots from a recent Detroit election.

Aug 13 05:27

US Army using VR helmet to link biometrics with automated systems

The United States Army is using a new suite of biometric software tools as it works towards using the data to provide situational awareness to automated systems like drones, Federal News Network reports.

The Army Research Lab and Navy are using software that tracks a range of data including pupil size, eye movement, heart rate and breathing patterns, according to the report. Pupil size could be used to sense focus on a particular area, and mark it out for automated investigation. Heart rate biometrics could be used to sense when a soldier is in danger.

Aug 12 22:36

DR VLADIMIR ZELENKO ON "THE POISON DEATH SHOT" ~ TESTIFIES BEFORE RABBINIC COURT IN ISRAEL


Dr. Zelenko presents fact-based evidence re. the mrna shots to an astonished group of Rabbis.
"This is an artificially made bio-weapon." -- Dr. Zelenko
Worldometer websites Dr. Zelenko referred to:
https://www.worldometers.info/ AND https://www.worldometers.info/coronavirus/

Mirrored from FritjofPersson channel
https://www.bitchute.com/video/fkbvaMkO3MOI/

Also see:
COVID-19 Kill Shots & Lifespan - Dr. Vladimir Zelenko Interview
https://www.bitchute.com/video/W9FS2fza8zTQ/

Aug 12 18:24

NYPD Secret Surveillance Tools Include Facial-Recognition and Predictive Policing Software, X-ray Machines, “Stingray” Cell Site Simulators

By B.N. Frank

For many years, communities worldwide have been installing privacy invasive technology. Some communities have officially become privacy invasive “Smart Cities” though not all of them have or will. Nevertheless, privacy invasive technology continues to be installed in communities and many citizens have no idea how it’s being used and/or by whom.

Recently, civil rights groups revealed that the New York Police Department had a fund for purchasing surveillance technology that didn’t require approval by city council or other municipal officials. Makes you wonder if this is happening where you live too...

Aug 12 11:50

Urgent warning over new DPD delivery text scam – DON’T click the link

Text scams claiming to be from parcel delivery services have boomed over the past year as we relied more on online shopping during the pandemic. As many as three-fifths of British people have received fake messages from Royal Mail, UPS, Hermes and other delivery companies claiming there have been issues with a package.

Today, consumers have been warned of yet another sophisticated trick doing the rounds over text. Which? reported scammers are sending fake DPD SMS messages to mobile numbers. These very convincing texts alert recipients of a supposed unsuccessful delivery attempt. They provide a link to arrange redelivery – but experts are urging people not to click.

Opening the fake link will take you to an almost-perfect copy of the DPD website. There, you’ll be asked to enter personal details and make a payment to ensure redelivery. Entering your bank details could give the criminals access to your bank account – which they can wipe clean with ease.

Aug 12 11:45

Google bans another 9 Android apps, now you must delete them from your phone

MALICIOUS apps containing the Android Trojan "Flytrap" are causing havoc for thousands of victims lured in by free coupon codes and football voting. Google has now banned 9 of them and you must delete them from your phone.

...

The harmful apps offer fun services like coupon codes for Netflix and Google Ads as well as voting for football teams and players. Zimperium named the ones to avoid:

GG Voucher (com.luxcarad.cardid)
Vote European Football (com.gardenguides.plantingfree)
GG Coupon Ads (com.free_coupon.gg_free_coupon)
GG Voucher Ads (com.m_application.app_moi_6)
GG Voucher (com.free.voucher)
Chatfuel (com.ynsuper.chatfuel)
Net Coupon (com.free_coupon.net_coupon)
Net Coupon (com.movie.net_coupon)
EURO 2021 Official (com.euro2021)

Aug 12 11:43

Microsoft issues critical Windows 10 warning - update your PC immediately

WINDOWS 10 users are being urged to make sure their PCs are fully updated as 44 vulnerabilities are fixed in the latest upgrade.

Aug 12 10:39

Windows 10: Microsoft just revealed another Print Spooler bug

Microsoft's Windows 10 Print Spooler security is turning into a headache for the company and its 10 customers.

Branded bugs like Heatbleed from 2014 are a bit passé but the Windows 10 PrintNightmare bugs appear to be an apt choice: Microsoft released fixes in July and August and, just after its August 10 Patch Tuesday change to the Print Spooler service, it's disclosed yet another print spooler bug.

This one concerns a Windows Print Spooler remote code execution vulnerability, tagged as CVE-2021-36958.

Aug 12 06:49

In Arizona in December “8 Hard Drives, 3 Computers, and Several USB Flash Drives” Were Taken from “Elliott Kerwin” – Now He Has Mysteriously Disappeared

In December 2020 it was reported that some key election material was obtained at a raid at a house in Maricopa County only 2 days after the 2020 Election. Today the owner of the house and the material seized is all forgotten. Where did it go and where did he go?

Aug 12 06:47

They’re Destroying the Evidence: Lindell Symposium Reveals Voting Machine Companies Are Wiping Voting Machines Clean in Wisconsin, New Hampshire and Michigan as We Previously Reported (VIDEO)

As The Gateway Pundit previously reported — Back in July the election firm ‘Election Source’ notified officials throughout the state of Michigan that they will discreetly break the law by eliminating election data from voting machines on the 15th.

Attorneys immediately issued them a cease and desist order to prevent this destruction of evidence from happening.

Michigan’s Secretary of State Jocelyn asked the Michigan election officials to do things to cover up the 2020 Election fraud before, so this latest action by Election Source was not so shocking.

Aug 12 05:46

The DeFi hacker who stole $600 million in crypto is... giving it back?

Well that was unexpected.

The hacker responsible for one of the largest cryptocurrency thefts in history made waves Wednesday by returning (at least some of) the stolen funds. That's according to Poly Network, the decentralized finance (DeFi) platform that announced the $600 million heist the day before.

Late Wednesday morning, Poly Network confirmed that $260 million of the stolen funds had been transferred back to wallets it controls.

Aug 12 05:08

'The Russians have videos of me doing crazy f***ing sex!' Hunter Biden is seen in unearthed footage telling prostitute that Russian drug dealers stole ANOTHER of his laptops

Hunter Biden claimed Russians stole another one of his laptops for blackmail while he was close to overdosing in a Las Vegas hotel room, DailyMail.com can reveal.

The alleged incident would mean Hunter lost a total of three computers - the first abandoned at a Delaware computer store and the second seized by federal agents - each likely to hold sensitive information on President Joe Biden and the embarrassing pictures, videos and communications of his son.

The third laptop still appears to be missing – and was taken by Russian drug dealers after they partied with Hunter in Vegas, he told a prostitute in a conversation caught on camera.

After filming himself having sex with the woman using his laptop in January 2019, Hunter left the camera rolling as he recounted a Vegas bender in which he spent '18 days going round from penthouse suite to penthouse suite,' sometimes costing $10,000 a night.

Webmaster's Commentary: 

This might be more Russia-bashing, but if true, it means that Russia has a lever with which to bend Joe Biden, along with China.

Aug 11 19:06

[Video] REPLACED: The Energetic RISE Of Youtube Alternatives: Rumble, Bitchute, Odysee

People are abandoning YouTube for censorship free alternatives.

Aug 11 12:55

A Hacker Shows Us How Easy it is To Manipulate Voting Machines

Aug 11 09:16

Biology Is Blasphemy: Racist Reality Meets Anti-Racist Inanity

“Shocked, confused, and frankly horrified!” As Steve Sailer has reported, that’s how an anti-racist radiologist called Luke Oakden-Rayner sums up the reaction of himself and other medical researchers to a dark, dangerous, and deeply disturbing discovery in artificial intelligence (AI). What have they found? That AI has what Oakden-Rayner calls the “worst superpower.” It’s guilty of “medical racism,” because it can identify racial identity in X-rays and other medical images that, to human eyes, contain absolutely no clue as to race.

Aug 11 07:28

NSA AWARDS SECRET $10 BILLION CONTRACT TO AMAZON

The National Security Agency has awarded a secret cloud computing contract worth up to $10 billion to Amazon Web Services, Nextgov has learned.

The contract is already being challenged. Tech giant Microsoft filed a bid protest on July 21 with the Government Accountability Office two weeks after being notified by the NSA that it had selected AWS for the contract.

The contract’s code name is “WildandStormy,” according to protest filings, and it represents the second multibillion-dollar cloud contract the U.S. intelligence community—made up of 17 agencies, including the NSA—has awarded in the past year.

In November, the CIA awarded its C2E contract, potentially worth tens of billions of dollars, to five companies—AWS, Microsoft, Google, Oracle and IBM—that will compete for specific task orders for certain intelligence needs.

Aug 11 07:24

What Is Pegasus? A Cybersecurity Expert Explains How the Spyware Invades Phones and What It Does When It Gets In

End-to-end encryption is technology that scrambles messages on your phone and unscrambles them only on the recipients’ phones, which means anyone who intercepts the messages in between can’t read them. Dropbox, Facebook, Google, Microsoft, Twitter and Yahoo are among the companies whose apps and services use end-to-end encryption.

This kind of encryption is good for protecting your privacy, but governments don’t like it because it makes it difficult for them to spy on people, whether tracking criminals and terrorists or, as some governments have been known to do, snooping on dissidents, protesters and journalists. Enter an Israeli technology firm, NSO Group.

Aug 10 18:21

O (no!) Canada: Fast-moving Proposal Creates Filtering, Blocking and Reporting Rules—And Speech Police to Enforce Them

By Corynne McSherry and Katitza Rodriguez

Policymakers around the world are contemplating a wide variety of proposals to address “harmful” online expression. Many of these proposals are dangerously misguided and will inevitably result in the censorship of all kinds of lawful and valuable expression. And one of the most dangerous proposals may be adopted in Canada. How bad is it? As Stanford’s Daphne Keller observes, “It’s like a list of the worst ideas around the world.” She’s right.

These ideas include:

- broad “harmful content” categories that explicitly include speech that is legal but potentially upsetting or hurtful
- a hair-trigger 24-hour takedown requirement (far too short for reasonable consideration of context and nuance)
- an effective filtering requirement (the proposal says service providers must take reasonable measures which “may include” filters, but, in practice, compliance will require them)

Aug 10 13:40

New “Glowworm attack” recovers audio from devices’ power LEDs

Researchers at Ben-Gurion University of the Negev have demonstrated a novel way to spy on electronic conversations. A new paper released today outlines a novel passive form of the TEMPEST attack called Glowworm, which converts minute fluctuations in the intensity of power LEDs on speakers and USB hubs back into the audio signals that caused those fluctuations.

The [email protected] team—consisting of Ben Nassi, Yaron Pirutin, Tomer Gator, Boris Zadov, and Professor Yuval Elovici—analyzed a broad array of widely used consumer devices including smart speakers, simple PC speakers, and USB hubs. The team found that the devices' power indicator LEDs were generally influenced perceptibly by audio signals fed through the attached speakers.

Aug 10 10:25

Attackers Started Exploiting a Router Vulnerability Just 2 Days After Its Disclosure

Juniper Threat Labs found evidence that a vulnerability that "potentially affects millions of home routers" was being actively exploited by hackers just two days after it was revealed to the public.

On Aug. 3, Tenable researcher Evan Grant publicly disclosed the vulnerability in question, which has been assigned the identifier CVE-2021-20090, alongside several other security flaws. Juniper said it "identified some attack patterns that attempt to exploit this vulnerability in the wild coming from an IP address located in Wuhan, Hubei province, China" starting on Aug. 5.

The attacker was reportedly attempting to deploy a variant of the Mirai botnet that's powered numerous high-profile distributed-denial of service (DDoS) attacks since July 2016. This doesn't appear to be the first time the attacker exploited a publicly disclosed vulnerability in their efforts to deploy this botnet—Juniper said it started tracking similar activity on Feb. 18.

Aug 10 10:15

BREAKING: Lindell’s Symposium Hit with Cyber Attack — Shut Down — But Backup Plan Kicks in, Program Slightly Delayed– HUGE ANNOUNCEMENT AT 7 PM (VIDEO)

Mike Lindell announced this morning that the symposium was already under cyber attack.

The event had a backup plan, the program was delayed but will continue.

Mike also said there is a HUGE ANNOUNCEMENT today at 7 PM.

CodeMonkeyZ, Ron Watkins, is at the conference and made a similar announcement earlier this morning.

Aug 10 07:43

Check These Settings Before You Lose Your iPhone so You Can Find It Later

It sucks when you end up losing your iPhone. Maybe you forgot it at the cafe, or it was stolen from the train station. Fortunately, it can be easy to track your iPhone (as long as it’s juiced up, and active). And if you already have a passcode enabled, the Find My iPhone feature is enabled automatically. Here’s how to find your lost or stolen iPhone.

Aug 10 07:41

Blake Masters: Big Tech Is an ‘Extension of the Surveillance State’

Blake Masters, the tech leader running in the Republican senate primary in Arizona, blasted Apple for abandoning its previously robust commitment to user privacy with its announcement that it will scan users’ photo libraries for illegal imagery.

The candidate, who previously worked for conservative tech entrepreneur and early Trump supporter Peter Thiel, said users need a “new set of legal protections” to protect them from being “constantly spied on and exploited.”

Masters previously condemned PayPal for its plan to share Americans’ financial transaction data with the far-left Anti Defamation League, calling it an “obvious pretext to suppress any dissent.”

Aug 10 07:21

Apple Tries to Calm Blowback Against Intruding on iPhone Users’ Privacy

Recently, Apple announced a new addition to its upcoming iOS 15 and iPadOS 15 firmware for iPhones and iPads. The new feature will allow Apple to scan user photos stored in Apple’s iCloud service and determine if they contain sexually explicit images involving children. Following a blowback against the Masters of the Universe scanning the devices of its customers, the company is now promising it will not abuse the feature or allow governments to dictate what types of data iPhones are scanned for.

Apple claims that the way it detects CSAM (Child Sexual Abuse Material) is “designed with user privacy in mind,” and it is not directly accessing iCloud users’ photos but rather utilizing a device-local, hash-based lookup and matching system to cross-reference the hashes of user photos with the hashes of known CSAM.

Webmaster's Commentary: 

So, all the perverts need to do is slightly resize their images, and the hashing won't work.

Aug 10 06:54

FEMA and FCC Plan Nationwide Emergency Alert Test for Aug. 11 Test Messages Will be Sent to TVs and Radios Along with Select Cell Phones That Have Opted-in to Receive Test Messages

FEMA, in coordination with the Federal Communications Commission, will conduct a nationwide test of the Emergency Alert System (EAS) and Wireless Emergency Alerts (WEA) this summer.

The national test will consist of two portions, testing WEA and EAS capabilities. Both tests will begin at 2:20 p.m. ET on Wednesday, Aug. 11.

The Wireless Emergency Alert portion of the test will be directed only to consumer cell phones where the subscriber has opted-in to receive test messages. This will be the second nationwide WEA test, but the first nationwide WEA test on a consumer opt-in basis. The test message will display in either English or in Spanish, depending on the language settings of the wireless handset.

The Emergency Alert System portion of the test will be sent to radios and televisions. This will be the sixth nationwide EAS test.

Aug 10 06:46

The most secure browser for transmitting sensitive data is definitely not Chrome

Tor.

Yep, that's the answer. The most secure browser for encrypted data is Tor. But there's a catch, and it's a big one. You might work within a company LAN that doesn't allow for the Tor browser to function. And unless you can get your IT department to open up the network to allow Tor to function, you're out of luck.

But for everyone else, Tor is definitely the browser to beat when it comes to encrypted transmitted data.

Aug 10 05:56

Pegasus: Spyware scandal lays bare cracks in Israel's cyber security 'success' story

Revelations about the extent of the penetration of the NSO Group's Pegasus spyware software have sparked off a fierce debate in Israel and abroad about the workings of the country's much-vaunted cyber security sector.

Israeli cyber companies have long been able to maintain a strong brand because of the notoriety of the Israeli intelligence services, especially Mossad and the military SIGINT unit 8200, and the perceived ability of such companies to recruit graduates of these services to their ranks.

A less discussed aspect of this sector is whether it is financially successful. Former Israeli prime minister Benjamin Netanyahu spoke frequently about cyber as a cornerstone of the Israeli high-tech sector and the economy in general, but the Haaretz newspaper found extensive evidence that Israeli offensive cyber technology, and specifically NSO, played a major role in Netanyahu's foreign policy.

Aug 09 05:39

You met Pegasus, on phones, now meet Toka, on any net connected device

The abuse of the Pegasus software by autocratic regimes has been known for several years, though, through recent revelations, it appeared to gain much traction in the mainstream media, owing to the high number of civilians who have reportedly been under surveillance through its use.

The continuation of the long standing scandal surrounding the abuse of Pegasus has also brought considerable controversy and notoriety to the Israeli company that developed it, the NSO group.

While the NSO group has become infamous, other Israeli companies, with even deeper ties to Israel's intelligence apparatus have been selling software that not only provides the exact same services to governments, to intelligence agencies, but purports to go even farther than that.

Aug 09 05:06

They're Normalizing Robot Police By Calling Them "Dogs"

Hawaii police are defending their use of pandemic relief funds for a robotic “police dog” made by Boston Dynamics which scans homeless people’s eyes to see if they have a fever.

“If you’re homeless and looking for temporary shelter in Hawaii’s capital, expect a visit from a robotic police dog that will scan your eye to make sure you don’t have a fever,” says a new report from Associated Press.

“That’s just one of the ways public safety agencies are starting to use Spot, the best-known of a new commercial category of robots that trot around with animal-like agility.”

Aug 08 07:33

Serious Warning Issued For Millions Of Apple iPhone Users

While Apple is currently facing criticism for upcoming privacy changes, a more immediate financial danger to millions of iPhone and iPad users has been exposed. And it is an area where Apple is a repeat repeat, repeat, repeat, repeat offender.

Following revelations that Apple has facilitated iOS scams with profits “measured in billions”, the company has now been spotted promoting new scams in its App Store which can cost users hundreds of dollars per year. And some of the examples are jaw dropping.

As iOS developer Beau Novelle notes, “One of them doesn’t even do anything” despite the fact it charges users almost $700 per year. With fellow iOS coder Simeon doing a deep dive on one example which lets users access the app for free once they have submitted their payment details, then automatically starts charging $12.99 per week after three days.

Aug 07 05:50

Pegasus: Tunisia's Ghannouchi targeted by Saudi Arabia

Rached Ghannouchi, the speaker of Tunisia's parliament and head of the Ennahda party, was targeted by Saudi Arabia for surveillance using the NSO Group's Pegasus spyware, Middle East Eye can reveal.

Ghannouchi is one of 50,000 numbers found on a list acquired by investigative NGO Forbidden Stories and Amnesty International that is believed to be made up of phones that the Israeli tech company’s clients have targeted since 2016.

Forbidden Stories told Ghannouchi his phone was on the list two weeks ago. It is his primary number, one of two he uses, and one he has used for 10 years. The number is not in the public domain.

Aug 06 13:53

Apple to permanently scan users’ photos and messages for abusive content

Apple announced on Thursday plans to scan users’ iPhones for child sexual abuse content in an effort to “protect children from predators who use communication tools to recruit and exploit them,” in addition to limiting the spread of Child Sexual Abuse Material (CSAM).

According to Apple’s announcement, new operating system technology will allow the company to identify known CSAM images, allowing Apple to report the incidents to the National Center for Missing and Exploited Children, an agency that collaborates with law enforcement to combat child sexual abuse nationwide.

Webmaster's Commentary: 

I just put this on my iPhone.

Aug 06 11:44

Open Source Mobile OS Alternatives To Android

It’s no exaggeration to say that open source operating systems rule the world of mobile devices. Android is still an open-source project, after all. But, due to the bundle of proprietary software that comes along with Android on consumer devices, many people don’t consider it an open source operating system.

So, what are the alternatives to Android? iOS? Maybe, but I am primarily interested in open-source alternatives to Android.

I am going to list not one, not two, but several alternatives, Linux-based mobile OSes.

Aug 06 05:50

'Privacy Company' Apple Plans To Monitor All US iPhones For Evidence Of Child Porn

As the old saying goes: If you aren't doing anything illegal, then you have nothing to fear from surveillance.

Smartphones already act like tracking devices broadcasting the whereabouts of their owners, but Apple is about to open the door to far more advanced forms of smartphone-based voluntary surveillance by launching a new program designed to detect and report iPhone users who are found to have child pornography - known by the academic-speak acronym CSAM - which stands for Child Sexual Abuse Materials. According to a handful of academics who were offered a sneak preview of the company's plans - then promptly spilled the beans on Twitter, and in interviews with the press.

Aug 05 17:09

Apple’s Plan to “Think Different” About Encryption Opens a Backdoor to Your Private Life

By India McKinney and Erica Portnoy

Apple has announced impending changes to its operating systems that include new “protections for children” features in iCloud and iMessage. If you’ve spent any time following the Crypto Wars, you know what this means: Apple is planning to build a backdoor into its data storage system and its messaging system.

Child exploitation is a serious problem, and Apple isn’t the first tech company to bend its privacy-protective stance in an attempt to combat it. But that choice will come at a high price for overall user privacy. Apple can explain at length how its technical implementation will preserve privacy and security in its proposed backdoor, but at the end of the day, even a thoroughly documented, carefully thought-out, and narrowly-scoped backdoor is still a backdoor.

Aug 05 13:49

Apple plans to scan US iPhones for child abuse imagery

Apple intends to install software on American iPhones to scan for child abuse imagery, according to people briefed on its plans, raising alarm among security researchers who warn that it could open the door to surveillance of millions of people’s personal devices.

Apple detailed its proposed system—known as “neuralMatch”—to some US academics earlier this week, according to two security researchers briefed on the virtual meeting. The plans could be publicized more widely as soon as this week, they said.

Aug 05 12:52

16 Civil Society Organizations Call on Congress to Fix the Cryptocurrency Provision of the Infrastructure Bill

By Rainey Reitman and Hayley Tsukayama

The Electronic Frontier Foundation, Fight for the Future, Defending Rights and Dissent and 13 other organizations sent a letter to Senators Charles Schumer (D-NY), Mitch McConnell (R-KY), and other members of Congress asking them to act swiftly to amend the vague and dangerous digital currency provision of Biden’s infrastructure bill.

Aug 04 13:47

IT’S ALL RIGGED: Facebook’s “fact checkers” are funded by vaccine corporations

It will come as no surprise to anyone who has been paying attention that Facebook’s “fact checkers” are being paid off by vaccine corporations to censor the truth on social media about the dangers and ineffectiveness of Wuhan coronavirus (Covid-19) “vaccines.”

Aug 04 07:24

Google will kill off very old versions of Android next month

Google has started emailing users of very old Android devices to tell them it's time to say goodbye.

Starting September 27, devices running Android 2.3.7 and lower will no longer be able to log in to Google services, effectively killing a big portion of the on-rails Android experience. As Google puts it in an official community post, "If you sign in to your device after September 27, you may get username or password errors when you try to use Google products and services like Gmail, YouTube, and Maps."

Aug 03 13:40

British navy group: ‘Potential hijack’ of ship off UAE coast

The British navy warned Tuesday of a "potential hijack" of a ship off the coast of the United Arab Emirates in the Gulf of Oman, without elaborating.

The incident comes amid heightened tensions between Iran and the West over its tattered nuclear deal and as commercial shipping in the region has found itself in the crosshairs over it. Most recently, the U.S., the U.K. and Israel have blamed Iran for a drone attack on an oil tanker off Oman that killed two people. Iran has denied being involved.

The British military's United Kingdom Maritime Trade Operations initially warned ships Tuesday that "an incident is currently underway" off the coast of Fujairah. Hours later, they said the incident was a "potential hijack." They did not elaborate.

The U.S. military's Mideast-based 5th Fleet and the British Defense Ministry did not immediately return calls for comment. The Emirati government did not immediately acknowledge the incident.

Aug 03 13:05

Warship positions faked including UK aircraft carrier

A carrier strike group led by HMS Queen Elizabeth had its automatic identification system (AIS) position faked, researchers discovered.

AIS is a key maritime safety system used to track vessel movements.

Nearly 100 naval ships may have had their AIS position altered, environmental groups SkyTruth and Global Fishing Watch found.

The ships included vessels from European and US navies, including 11 from the Royal Navy.

The Ministry of Defence (MOD) said there was no "operational impact" on the strike group, which also featured smaller vessels from the Dutch and Belgian navies, but any manipulation of AIS "could result in a serious incident".

"We are aware of manipulation of AIS tracking data placing carrier strike group vessels in areas where they were not", the MOD said.

Aug 03 11:52

Warship positions faked including UK aircraft carrier

A carrier strike group led by HMS Queen Elizabeth had its automatic identification system (AIS) position faked, researchers discovered.

AIS is a key maritime safety system used to track vessel movements.

Nearly 100 naval ships may have had their AIS position altered, environmental groups SkyTruth and Global Fishing Watch found.

The ships included vessels from European and US navies, including 11 from the Royal Navy.

The Ministry of Defence (MOD) said there was no "operational impact" on the strike group, which also featured smaller vessels from the Dutch and Belgian navies, but any manipulation of AIS "could result in a serious incident".

"We are aware of manipulation of AIS tracking data placing carrier strike group vessels in areas where they were not", the MOD said.

Aug 03 09:00

THE PENTAGON IS EXPERIMENTING WITH USING ARTIFICIAL INTELLIGENCE TO “SEE DAYS IN ADVANCE”

“Remember the one about better broadband Internet options for rural customers? haha”

And now…

Global Information Dominance Experiments (GIDE) use Starlink.

Aug 03 07:57

Caitlin Johnstone: How long before we humans are being policed by robots?

The elites are seeking to normalize the use of police robots by calling them ‘dogs’ – but the machines are the vanguard of a dystopian future that will see them cement their power in place forever.

Hawaii police are defending their use of pandemic relief funds for a robotic “police dog” made by Boston Dynamics which scans homeless people’s eyes to see if they have a fever.

“If you’re homeless and looking for temporary shelter in Hawaii’s capital, expect a visit from a robotic police dog that will scan your eye to make sure you don’t have a fever,” a new report from AP says. “That’s just one of the ways public safety agencies are starting to use Spot, the best-known of a new commercial category of robots that trot around with animal-like agility.”

Aug 03 06:16

Pentagon is using artificial intelligence to predict the future and give it 'days of advanced warning' on attacks on sensitive sites like the Panama Canal

The Pentagon is stealing a page from Minority Report with an experimental artificial-intelligence program that can look 'days in advance' and predict possible attacks on vulnerable locations.

The Global Information Dominance Experiments, or GIDE, use machine learning to sift through vast amounts of data to notice tiny changes that humans might miss - such as the number of cars increasing or decreasing in a parking lot - which might indicate an evolving threat.

The program can then alert human agents who can take a closer look at the location.

Webmaster's Commentary: 

So, all the enemy has to do is set the date for the attack with a pair of dice and the system breaks down?

Aug 02 18:33

The Cryptocurrency Surveillance Provision Buried in the Infrastructure Bill is a Disaster for Digital Privacy

By Rainey Reitman

The forthcoming Senate draft of Biden’s infrastructure bill—a 2,000+ page bill designed to update the United States’ roads, highways, and digital infrastructure—contains a poorly crafted provision that could create new surveillance requirements for many within the blockchain ecosystem. This could include developers and others who do not control digital assets on behalf of users.

While the language is still evolving, the proposal would seek to expand the definition of “broker” under section 6045(c)(1) of the Internal Revenue Code of 1986 to include anyone who is “responsible for and regularly providing any service effectuating transfers of digital assets” on behalf of another person. These newly defined brokers would be required to comply with IRS reporting requirements for brokers, including filing form 1099s with the IRS. That means they would have to collect user data, including users’ names and addresses...

Aug 02 10:14

PwnedPiper PTS Security Flaws Threaten 80% of Hospitals in the U.S.

Cybersecurity researchers on Monday disclosed a set of nine vulnerabilities known as "PwnedPiper" that left a widely-used pneumatic tube system (PTS) vulnerable to critical attacks, including a possibility of complete takeover.

The security weaknesses, disclosed by American cybersecurity firm Armis, impact the Translogic PTS system by Swisslog Healthcare, which is installed in about 80% of all major hospitals in North America and in no fewer than 3,000 hospitals worldwide.

"These vulnerabilities can enable an unauthenticated attacker to take over Translogic PTS stations and essentially gain complete control over the PTS network of a target hospital," Armis researchers Ben Seri and Barak Hadad said. "This type of control could enable sophisticated and worrisome ransomware attacks, as well as allow attackers to leak sensitive hospital information."

Aug 02 07:43

SCIENCE WRITER SUSPENDED FROM TWITTER FOR QUOTING RESULTS OF PFIZER CLINICAL TRIAL

Twitter suspended the account of science writer and former New York Times reporter Alex Berenson for sharing the newly-released results of the "pivotal" Pfizer clinical trial which completely undermine the narrative of our medical establishment

Aug 02 07:28

FLORIDA SHERIFF’S OFFICE NOW NOTIFYING PEOPLE IT WILL BE INFLICTING ITS PRE-CRIME PROGRAM ON THEM

The Pasco County (FL) Sheriff’s Office has been swamped with negative press coverage centering on its predictive policing program. The Office claims it’s not "predictive policing," but rather "intelligence-led policing." Whatever you call it, it sucks.

Aug 02 06:42

3D Printed Soft Robo-Hand Can Play Nintendo Super Mario Bros. And Win

What if Americans become too obese and lazy that they had robots play video games for them one day?

University of Maryland researchers have 3D printed a soft robotic hand capable of playing Super Mario Bros. on the Nintendo Entertainment System (NES). The soft robotic hand is flexible and powered by air rather than electricity.

The breakthrough in soft robotics is led by University of Maryland assistant professor of mechanical engineering Ryan D. Sochol and his team, who 3D print a fully functional soft robotic hand with "integrated fluidic circuits" that allowed it to be programmed and play NES.

"Previously, each finger of a soft robotic hand would typically need its own control line, which can limit portability and usefulness," said co-first author Joshua Hubbard. "But by 3D printing the soft robotic hand with our integrated fluidic transistors, it can play Nintendo based on just one pressure input."

Aug 02 06:37

Need A Divorce? There's An App For That, And They Just Raised $2 Million

750,000 divorces happen, on average, every year in the U.S.

While some call that a shame, others see it as a total addressable market. Take, for example, online divorce startup Hello Divorce. They have just raised $2 million to help couples streamline to the inevitable: splitting up. The company provides a combination of software and legal services that start at $99 and average at about $2,000.

The company's seed rounding of funding was "led by CEAS, with additional funds coming from Lightbank, Northwestern Mutual Future Ventures, Gaingels and a group of individuals including Clio CEO Jack Newton, WRG’s Lisa Stone and Equity ESQ led by Ed Diab," according to TechCrunch.

Aug 02 05:39

The War on Freedom: How Tyranny Overran the United States

The super-rich already had their consultants come up with detailed studies on how to divide up citizens by religion, by ethnic identity, by cultural signifiers, and by class so that they are incapable of unity even in the face of the complete takeover of the economy, the media, education and the political process. -- Nothing will get better until citizens recognize the cause of this nightmare was not the legacy of the Bushes, the Clintons, the Obamas or the Trumps, although they all played their role, but rather the end of the self-reliant and informed citizen with access to the writings of experts with a deep commitment to the scientific method and to ethical principles.

Aug 01 13:35

SpaceX and Other Internet Service Providers Asked to Return Money Former FCC Chair Shouldn’t Have Given Them

By B.N. Frank

According to a group of telecom experts (The Irregulators) who filed a lawsuit filed against the Federal Communications Commission (FCC), Americans have been overcharged for decades for telecommunications services that millions still haven’t received. Over the years, Irregulator Bruce Kushnick has written dozens of articles about how the corrupt and “captured” Federal Communications Commission (FCC) made this possible. Of course legislators made this possible too. Now the current acting FCC chair has accused the previous FCC chair of “mismanaging” taxpayer money...

Aug 01 11:35

Remote print server gives anyone Windows admin privileges on a PC

A researcher has created a remote print server allowing any Windows user with limited privileges to gain complete control over a device simply by installing a print driver.

In June, a security researcher accidentally revealed a zero-day Windows print spooler vulnerability known as PrintNightmare (CVE-2021-34527) that allowed remote code execution and elevation of privileges.

While Microsoft released a security update to fix the vulnerability, researchers quickly figured out ways to bypass the patch under certain conditions.

Since then, researchers have continued to devise new ways to exploit the vulnerability, with one researcher creating an Internet-accessible print server allowing anyone to open a command prompt with administrative privileges.

Aug 01 05:40

Pegasus: Flying on the wings of Israeli ‘cyber-tech diplomacy’?

What was the role of the Israeli state in the spread of an insidious piece of malware? Plus, PR companies and the work they do with controversial governments.

A global cyber-surveillance scandal – spyware developed in Israel – has put the government there under the media microscope, and its story does not add up.

Jul 31 08:24

Have The Social Media Companies Become Way Too Powerful?

Do you remember the early days of the Internet? It was like “the wild west”, and that could be bad, but in many ways it was also very good. The Internet was very decentralized at that time, and information could flow very freely. For the very first time, ordinary people could communicate with others all over the globe on a massive scale, and I believe that was an incredibly positive development for humanity. Unfortunately, the elite were absolutely horrified by this free flow of information and they became obsessed with restricting it. Today, highly advanced algorithms have been designed to shape our behavior online. We are increasingly being funneled to just a handful of immensely powerful corporate-owned websites, and information on those sites is heavily monitored, controlled and censored.

Jul 31 08:23

27 Groups Urge Congress To Close FBI ‘Backdoor Search’ Loophole

Over two dozen advocacy groups on Monday sent a letter urging members of Congress to back a measure that, if enacted, would close the so-called “backdoor search” loophole that allows warrantless surveillance of U.S. citizens’ data by government agencies including the FBI and CIA.

The letter (pdf), led by Demand Progress and signed by 27 groups, calls on House leaders to support an amendment to H.R. 4505 – the Commerce, Justice, Science, and Related Agencies Appropriations Act for Fiscal Year 2022 – proposed by Reps. Zoe Lofgren (D-Calif.), Pramila Jayapal (D-Wash.), Thomas Massie (R-Ky.), and Warren Davidson (R-Ohio).

If passed, the amendment would prohibit the use of funds for the warrantless search of Americans’ communications acquired under Section 702 of the Foreign Intelligence Surveillance Act of 1978 (FISA), which the letter’s authors call a “controversial foreign intelligence authority that acquires an untold number of Americans’ Fourth Amendment-protected information.”

Jul 31 07:37

Big Tech Is Out of Control and Threatens to Annihilate Our Liberties

Big Tech is out of control — and the time to save our liberties and freedoms is quickly running out.

This month, White House press secretary Jen Psaki made a stunning admission: the Federal Government is directly colluding with Facebook to flag "problematic" social media content on its platform.

"In terms of actions that we have taken or we’re working to take, I should say, from the federal government, we’ve increased disinformation research and tracking,” she revealed during a press conference. “Within the Surgeon General’s Office, we’re flagging posts for Facebook that spread disinformation."

Jul 31 07:28

Robotic police dogs: Useful hounds or dehumanizing machines?

If you’re homeless and looking for temporary shelter in Hawaii’s capital, expect a visit from a robotic police dog that will scan your eye to make sure you don’t have a fever.

That’s just one of the ways public safety agencies are starting to use Spot, the best-known of a new commercial category of robots that trot around with animal-like agility.

The handful of police officials experimenting with the four-legged machines say they’re just another tool, like existing drones and simple wheeled robots, to keep emergency responders out of harm’s way as they scout for dangers. But privacy watchdogs — the human kind — warn that police are secretly rushing to buy the robots without setting safeguards against aggressive, invasive or dehumanizing uses.

In Honolulu, the police department spent about $150,000 in federal pandemic relief money to buy their Spot from robotics firm Boston Dynamics for use at a government-run tent city near the airport.

Jul 30 23:36

Home car charger owners urged to install updates

Security researchers have discovered failings in two home electric car chargers.

The researchers were able to make the chargers switch on or off, remove the owner's access, and show how a hacker could get into a user's home network.

Most of the faults have now been fixed but owners are being told to update their apps and chargers, to be safe.

Jul 30 11:50

How Amazon’s $10 Billion Contract Squabble with the Pentagon Reveals the Shady Nature of Military Contracts

By Peter Jacobsen

Earlier this month the US Department of Defense (DOD) canceled a $10 billion Joint Enterprise Defense Infrastructure (JEDI) contract awarded to Microsoft in 2019. The goal of the contract was to modernize the Department’s IT operations using cloud computing.

The JEDI cancellation occurred following a lawsuit from Amazon after the company was denied the contract. Amazon alleges that they were rejected because the Department of Defense was pressured by then President Donald Trump to “screw Amazon.” The motivation for this move, it was claimed, was driven by Trump’s personal animus for then-CEO Jeff Bezos, who also owns The Washington Post.

Jul 29 19:23

DHS’s Flawed Plan for Mobile Driver’s Licenses

By Adam Schwartz and Alexis Hancock

Digital identification can invade our privacy and aggravate existing social inequities. Designed wrong, it might be a big step towards national identification, in which every time we walk through a door or buy coffee, a record of the event is collected and aggregated. Also, any system that privileges digital identification over traditional forms will disadvantage people already at society’s margins...

Jul 29 13:52

New destructive Meteor wiper malware used in Iranian railway attack

In a new report by SentinelOne, security researcher Juan Andres Guerrero-Saade revealed that the cyberattack on Iran utilized a previously unseen file wiper called Meteor.

A wiper is malware that intentionally deletes files on a computer and causes it to become unbootable.

Unlike ransomware attacks, destructive wiper attacks are not used to generate revenue for the attackers. Instead, their goal is to cause chaos for an organization or to distract admins while another attack is taking place.

Jul 29 13:50

NSA shares guidance on how to secure your wireless devices

Hijacked wireless devices, including laptops, tablets, mobile, and wearable accessories, can lead to the compromise of personal and corporate data, such as credentials and sensitive documents.

To mitigate these risks, the NSA recommends avoiding public Wi-Fi networks as they expose traffic data to theft or manipulation, disabling Bluetooth and NFC radios while in public and not in use to avoid exposing info that can be used to hack the device.

"Users should consider additional security measures, including limiting/disabling device location features, using strong device passwords, and only using trusted device accessories, such as original charging cords," the NSA added.

Jul 29 13:07

Fighting the Urban Surveillance Infrastructure

By Amanda Bowers

The government uses a vast multi-layered system of surveillance to keep tabs on people. From cell phones to traffic cameras – big brother is always watching (and listening). It is also generally believed that there is collusion between the government and big tech.

So what do we do about it?...

Jul 29 11:44

Video game allows player to “disinfect” cities of anti-lockdown protesters and “save lives” by blowing them up with thermite grenades

Video gamers who support the government’s fascist Wuhan coronavirus (Covid-19) dictates have a new opportunity to murder those who oppose lockdowns, face masks, and “vaccines” – at least digitally.

The Steam gaming platform has made available to its users a three-minute, first-person-shooter video game called “STAYHOMER” that has one simple objective: to blow up as many anti-lockdown protesters as you can with thermite grenades.

The setting is cast in the streets of Tokyo, where a large contingent of protesters has gathered to oppose the government’s stay-at-home orders for the Fauci Flu. The job of the protagonist is to blast the crowd with “disinfectant,” also known as deadly grenades that will “purify” them all into non-existence.

Jul 29 11:32

MEMORY HOLE: USA Today buries its own report that says vaccinated individuals have “higher levels” of coronavirus than the unvaccinated

After earlier reporting that people who have been “vaccinated” for the Wuhan coronavirus (Covid-19) can still become infected with and spread deadly disease, USA Today reportedly scrubbed this information from its website, effectively memory holing its own reporting.

Jul 29 11:29

Apple broke bad news to iPhone fans

We've known this was a problem.

I expected that if there was any time when Apple top brass would mention it, it would be during the earnings call.

And that's when it happened.

Read More

Apple, like most other tech firms, is feeling the pinch due to component shortages.

A word that came up a lot during the call was "constraints." It was up to Apple CFO Luca Maestri to break the bad news.

Jul 29 05:44

Report: ‘Extensive’ Gay Hookup App Usage Compromises Vatican Security

Location-based homosexual and heterosexual hookup apps are widely used within Vatican walls, an investigative report revealed late Tuesday, which can open the Holy See to blackmail and other security risks.

The report by the Pillar, an online Catholic news agency, raised particular concerns of vulnerability to China, which until 2020 owned the gay hookup app Grindr, one of the services whose use in the Vatican was uncovered.

The Pillar revealed that at least 16 different mobile devices emitted signals from Grindr on at least four days between March and October 2018 within the areas of the Vatican City State not open to the public.

Jul 29 05:24

Mexico says officials spent $61 million on Pegasus spyware

Mexico’s top security official said Wednesday that two previous administrations spent $61 million to buy Pegasus spyware that has been implicated in government surveillance of opponents and journalists around the world.

Public Safety Secretary Rosa Icela Rodríguez said records had been found of 31 contracts signed during the administrations of President Felipe Calderón in 2006-2012 and President Enrique Peña Nieto in 2012-18. Some contracts may have been disguised as purchases of other equipment.

The government said many of the contracts with the Israeli spyware firm NSO Group were signed with front companies, which are often used in Mexico to facilitate kickbacks or avoid taxes.

Last week, the government's top anti-money laundering investigator said officials from the two previous administrations had spent about $300 million in government money to purchase spyware. But that figure may reflect all spyware and surveillance purchases, or may include yet-unidentified contracts.

Jul 28 08:50

Get patching: US, UK, and Australia issue joint advisory on top 30 exploited vulnerabilities

At the end of almost seven months in 2021, one of the 30 most exploited vulnerabilities dates from 2017, according to the US Cybersecurity and Infrastructure Security Agency (CISA), the Australian Cyber Security Centre (ACSC), the United Kingdom's National Cyber Security Centre (NCSC), and the US FBI.

CVE-2017-11882 is the holder of the dubious honour, and it is due to a stack buffer overflow in the equation editor of Microsoft Office, which can lead to remote code execution (RCE). It is an exploit that vendors have been banging on about for years already.

The quartet of agencies said on Wednesday that the easiest way to fix this hole, and the 29 others listed, would be to patch systems.

Jul 28 08:17

Facebook-owned apps can track and harvest your data even if you aren’t actively using them

Many smartphone apps track people’s data, including their current locations, even when they are not actively using them. Experts say one of the worst offenders is Facebook Messenger, the social media company’s dedicated messaging app.

Experts are now encouraging people to do their research and think about what personal data they could be giving away by downloading and signing up to apps like Facebook Messenger.

“I am mindful about who to invite into my home so I’d think the same about what I have on my phone and be conservative with the apps you download,” said Michael Huth, chief research officer and co-founder of a personal privacy-oriented browser with its own search engine and app.

Huth advised people to downgrade what Facebook Messenger can access from their smartphones. The Facebook app can harvest all sorts of data from its users if they do not do so, especially if they are unaware of what the app can access.

Jul 28 05:52

"Greatest Danger To National Security" - Ed Snowden Exposes The 'Insecurity' Industry

Prior to this week’s Pegasus Project, a global reporting effort by major newspapers to expose the fatal consequences of the NSO Group—the new private-sector face of an out-of-control Insecurity Industry—most smartphone manufacturers along with much of the world press collectively rolled their eyes at me whenever I publicly identified a fresh-out-of-the-box iPhone as a potentially lethal threat.

Jul 28 05:49

Biden Says Cyberattacks Could Lead to a ‘Real Shooting War’ With a Major Power

The US is constantly accusing countries like Russia and China of carrying out cyberattacks, and comments from President Biden on Tuesday suggest he could use these claims as a pretext for military intervention. He warned that if Washington ended up in a “real shooting war with a major power,” it could be the result of a cyberattack on the US.

“You know, we’ve seen how cyber threats, including ransomware attacks, increasingly are able to cause damage and disruption to the real world,” Biden said in a speech during a visit to the Office of the Director of National Intelligence. “I think it’s more likely we’re going to end up — well, if we end up in a war, a real shooting war with a major power, it’s going to be as a consequence of a cyber breach of great consequence.”

Webmaster's Commentary: 

Setting the stage for a false-flag "Cyber Pearl Harbor?"

Jul 27 13:29

EFF Sues U.S. Postal Service For Records About Covert Social Media Spying Program

Washington D.C.—The Electronic Frontier Foundation (EFF) filed a Freedom of Information Act (FOIA) lawsuit against the U.S. Postal Service and its inspection agency seeking records about a covert program to secretly comb through online posts of social media users before street protests, raising concerns about chilling the privacy and expressive activity of internet users.

Under an initiative called Internet Covert Operations Program, analysts at the U.S. Postal Inspection Service (USPIS), the Postal Service’s law enforcement arm, sorted through massive amounts of data created by social media users to surveil what they were saying and sharing, according to media reports. Internet users’ posts on Facebook, Twitter, Parler, and Telegram were likely swept up in the surveillance program...

SHARE THIS ARTICLE WITH YOUR SOCIAL MEDIA