COMPUTERS/INTERNET/SECURITY

Sep 14 18:33

Safeguard Busted in Florida on Foreclosure Trespass as Illinois Attorney General Expands Probe

Sunday, September 14, 2014

KingCast and Mortgage Movies See Safeguard Busted in Florida Foreclosure Trespass as Illinois Attorney General Expands Probe.

Dear Attorney Erkkila: We meet again, and this time the stakes are higher. I received notice today, one year to the date of Attorney General Lisa Madigan's press release, that your client has again run afoul of the law. Specifically they, along with Keller Williams representatives Greg Beam and/or Pat Kolar, unlawfully entered premises owned by one Nellie Blanco, as you can see by the current Deed and related government - issued tax and property information. In today's taped phone call to me, Greg Beam denied any specific knowledge and said that Pat Kolar was handling this matter. Pat Kolar did not return my taped phone call.

Sep 14 13:52

Local and State Police Involved in Sensitive Hemisphere Program

Federal, state, and local police, with the assistance of phone company employees embedded within DEA narcotics intelligence units, are utilizing an unclassified but “law enforcement sensitive” program, known as Hemisphere, which provides nearly unfettered access to an enormous database containing call records of all telephone calls passing through phone company switches likely owned by AT&T, according to a partially-redacted 24-slide presentation obtained by The Declaration.

Sep 14 12:19

Our Nation Depends on Restoring Product Liability

Sadly, we have seen a trend in recent decades for the government to protect corporations against the people, rather than protecting the people against corporations. Along with computers, other industries we are dependent on are being protected against product liability lawsuits, such as vaccine manufacturers, and other biotech corporations. This is a practice typically seen under fascist governments, and it never ends well.

The computers don't last. The software will not install. The aqueducts are leaking. The roads are cracking.

Rome is falling.

Optional Banner: 
WRH Exclusive
Sep 14 11:36

APPLE WATCH IS A HAZARD TO YOUR SEX LIFE

A July 2013 survey of British women found that that 62% of women have interrupted sexual intercourse to check their cell phone. Some 48% of men admitted to doing the same.

Sep 14 07:51

Despite Obama’s Pledge to Curb It, NSA Mass Surveillance Wins Rubber Stamp

In the face of congressional inaction, a federal court on Friday renewed an order allowing the government to collect phone records on virtually all calls within the United States.

The Foreign Intelligence Surveillance Court approved the Justice Department's request for another 90-day extension of the National Security Agency's controversial mass surveillance program, exposed publicly last summer by Edward Snowden and authorized under Section 215 of the post-9/11 Patriot Act. The spying authority is next set to expire on Dec. 5.

Sep 14 07:29

NSA, GCHQ have secret access to German telecom networks

US and UK intelligence services have secret access points for German telecom companies’ internal networks, Der Spiegel reports, citing slides created in the NSA’s ‘Treasure Map’ program used to get near-real-time visualization of the global internet. The latest scandal continues to evolve around the US’ NSA and the British GCHQ, both of which appear to be able to eavesdrop on German giants such as Deutsche Telekom, Netcologne, Stellar, Cetel and IABG network operators, according to Der Spiegel’s report based on material disclosed by Edward Snowden.

Sep 13 15:29

NSA denies whistleblower Snowden ‘raised concerns’ in emails

In response to a Freedom of Information request, the NSA denies that its former NSA contractor-turned whistleblower Edward Snowden ever raised concerns in emails to colleagues to his colleagues over the agency’s surveillance work.

Sep 13 14:22

US Government Ordered Yahoo! To Provide User Data

As the internet giant Yahoo! attempted to refuse compliance with requests by the NSA to access the online data for millions of the company’s users, the U.S. Justice Department threatened to fine the company a staggering $250,000 a day, according to new reporting based on previously secret court documents released on Thursday.

Sep 13 05:45

Proposed Anti-Terror Law in France Would Erode Civil Liberties

A proposed anti-terrorism law in France has freedom of expression advocates concerned. The bill, as our friends at La Quadrature du Net frame it, “institutes a permanent state of emergency on the Internet,” providing for harsher penalties for incitement or “glorification” of terrorism conducted online. Furthermore, the bill (in Article 9) allows for “the possibility for the administrative authority to require Internet service providers to block access to sites inciting or apologizing for terrorism” without distinguishing criteria or an authority to conduct the blocking.

Sep 12 15:25

Proposed Anti-Terror Law in Would Erode Civil Liberties

A proposed anti-terrorism law in France has freedom of expression advocates concerned. The bill, as our friends at La Quadrature du Net frame it, “institutes a permanent state of emergency on the Internet,” providing for harsher penalties for incitement or “glorification” of terrorism conducted online. Furthermore, the bill (in Article 9) allows for “the possibility for the administrative authority to require Internet service providers to block access to sites inciting or apologizing for terrorism” without distinguishing criteria or an authority to conduct the blocking.

Sep 12 14:59

US Government Ordered Yahoo! To Provide User Data Or Face $250,000 Fine - Per Day

As the internet giant Yahoo! attempted to refuse compliance with requests by the NSA to access the online data for millions of the company's users, the U.S. Justice Department threatened to fine the company a staggering $250,000 a day, according to new reporting based on previously secret court documents released on Thursday.

Sep 12 13:05

Naked Celebrity Photo Leak: Can You Be Bothered? Russell Brand

Webmaster's Commentary: 

Down in New Zealand, in what appears to have been a test, websites carrying the hacked nude celebrity photos were planting malware that shut the entire New Zealand network down for a day! So, I owuld advise you to focus your attention on naked pictures of your significant other and avoid being victimized!

Sep 12 11:22

Worldwide Censorship Suppliers Want More Censorship

The movement to save Net Neutrality by reclassifying broadband providers as common carriers got another boost via Wednesday’s Internet Slowdown protest. But the other side isn’t relenting. This week a number of phone and cable equipment suppliers sent a letter to Secretary of Commerce Penny Pritzker urging her to oppose reclassification.

The letter in itself is not surprising. The companies listed are business partners of the largest U.S. Internet providers — the same companies that support FCC Chairman Tom Wheeler’s plan to allow discrimination online.

Sep 12 04:19

US gov’t threatened Yahoo with $250K daily fine if it didn’t use PRISM

Yahoo reports that it is on the verge of releasing 1,500 pages of documents related to a long court battle over its participation in the PRISM program, a National Security Agency program revealed last summer as part of the Snowden leaks.

A leaked top-secret slide about PRISM shows that Yahoo was one of the first participants, having begun contributing to the database in March of 2008. It did so under severe duress. Company executives believed the government's demand for data was "unconstitutional and overbroad" and fought it in court.

Sep 11 14:33

The Era Of Widespread Biometric Indentification And Microchip Implants Is Here

Are you ready to have your veins scanned every time you use your bank account? Are you ready to use a "digital tattoo" or a microchip implant to unlock your telephone? Once upon a time we read about such technologies in science fiction novels, but now they are here. The era of widespread biometric identification and microchip implants is upon us, and it is going to change the way that we live. Proponents of these new technologies say that they will make our private information and our bank accounts much more secure. But there are others that warn that these kinds of "Big Brother technologies" will set the stage for even more government intrusion into our lives. In the wrong hands, such technologies could prove to be an absolute nightmare.

Sep 11 11:43

‘Internet Slowdown Day’: World Wide Web rises up to defend Net Neutrality

ONLINE PROTEST AIMS TO SHOW USERS WHAT’S AT STAKE IF KEY PRINCIPLE OF THE ‘OPEN INTERNET’ IS DESTROYED BY WORLD’S WEALTHIEST TELECOM COMPANIES

Sep 11 10:54

City of Turin decides to ditch Windows XP for Ubuntu and €6m saving

€6m: the amount the municipality of Turin hopes to save over five years by switching from Windows XP to Ubuntu Linux in all of its offices.

The move will mean installing the open source operating system on 8,300 PCs, which will generate an immediate saving of roughly €300 per machine (almost €2.5m altogether, made up from the cost of Windows and Office licences) — a sum that will grow over the years as the need for the renewal of proprietary software licences vanishes, and the employees get used to the new machines.

Sep 11 10:45

Microsoft accepts ‘contempt of court’ deal to appeal email privacy case

Microsoft Corp and the US government have reached a deal under which Microsoft has agreed to be held in contempt of court, as a procedural measure to move an email privacy case on to appeal.

The agreement is the latest step in an ongoing legal battle, in which Microsoft is fighting moves by the US government that would force the corporation to hand over a customer’s emails stored in a data centre in Ireland.

Sep 11 05:28

Meet The Ex-NSA And Ex-Unit 8200 Spies Cashing In On Security Fears

Before Edward Snowden smashed its digital doors wide open, the National Security Agency was seen as the mysterious keeper of an arsenal of dark-voodoo hacking weapons. Now we know the truth: NSA employees are almost too good at what they do–as are their counterparts at Israel’s elite military signal intelligence group, Unit 8200. Unlike people at most government agencies, NSAers and Unit 8200 alums include world experts in their craft, in this case hacking and defending networks and devices.

Sep 11 03:22

PLEASE READ: If People Were Countries.....

If People Were Countries.....
(or, how to avert nuclear war, public or private)

remember, everyone, when things get heated, to CALM DOWN.

there is a point in any conflictual communication where one feels one absolutely must raise one's (virtual) voice, lose one's cool; where not to do so is a detriment to oneself and the meaning in one's life.

soon as the emotional barbs are answered in kind, one might as well give up. 'Innocent until proven guilty' -- how one feels and where one draws the line of acceptable stretching of the truth is not as important.

-- 'to protect my honor' or to 'back up my principles' or 'to protect' others -- worse, to 'not lose face' --

these are the game changers, the seemingly unique and rare set of events that will suddenly convince a large number of people to get involved, people who steadfastly opposed getting involved up to that point.

sound familiar?

Sep 10 18:28

Why I Won't Buy an Apple Watch

I consider myself a tech enthusiast and early adopter, but I just don't see any current smartwatch that can enrich my daily life. The Apple Watch doesn't change that, at least not what I saw from the presentation.

And then there was the gaping hole in the Apple Watch announcement: battery life. Oh, there's a fancy MagSafe charger, but how often will you have to use it? Every night, most likely. I'm already a slave to my smartphone charger. Another device to babysit? No, thank you. Also missing: waterproof specs. If it can't stand up to some rain or the occasional spilled drink, it'll quickly become a $350 paperweight.

Sep 10 16:01

Israeli Think Tank Compromised to Serve Sweet Orange Exploit Kit

The official website of a prominent Israel-based, Middle East foreign policy-focused think tank, the Jerusalem Center for Public Affairs (JCPA), has been compromised and abused by attackers to distribute malware.

The Israeli think tank website JCPA – an independent research institute focusing on Israeli security, regional diplomacy and international law – was serving the Sweet Orange exploit kit via drive-by downloads to push malware onto the computers of the website's visitors by exploiting software vulnerabilities, researchers from security firm Cyphort reported on Friday.

Sep 10 15:58

Largest Pirate Bay Proxy & More Blocked By UK ISPs

Update: The operator of PirateProxy informs us that a new domain is up and operational at PirateProxy.bz

Sep 10 14:16

LAPD Blames Predictive Software For Misconduct And Abuse, Rather Than Its Own Disinterest In Holding Officers Accountable

The LASD is finally acknowledging that it let its officers (and prison guards) act with impunity for far too many years. The system could have worked -- at least in its limited capabilities -- but no one wanted to follow up on flagged officers. The situation there has deteriorated to the point that the LASD is looking at a few years of federal supervision.

Sep 10 13:24

5 Million Gmail User Accounts, Passwords Hacked

Time to change your password again. A database containing nearly 5 million Gmail user accounts and passwords was leaked on Bitcoin Security, a popular Russian website devoted to the cryptocurrency.

Sep 10 12:39

Senators and Other Experts to Appeals Court: NSA's Phone Records Program Is a Massive Invasion of Privacy

Smith v. Obama, a challenge to the NSA’s warrantless collection of phone records, currently before the Ninth Circuit Court of Appeals, has received some high-profile support. In six amicus briefs filed yesterday, a range of groups add depth to our argument that the NSA’s activities are an extraordinary invasion of the privacy of innocent Americans.

Sep 10 12:17

5 million ‘compromised’ Google accounts leaked

A database of what appears to be some 5 million login and password pairs for Google accounts has been leaked to a Russian cyber security internet forum. It follows similar leaks of account data for popular Russian web services.

Webmaster's Commentary: 

And again, the NSA cannot find these crooks. Why? Are they the crooks themselves?

Sep 09 15:18

The Era Of Widespread Biometric Indentification And Microchip Implants Is Here

Are you ready to have your veins scanned every time you use your bank account? Are you ready to use a "digital tattoo" or a microchip implant to unlock your telephone? Once upon a time we read about such technologies in science fiction novels, but now they are here. The era of widespread biometric identification and microchip implants is upon us, and it is going to change the way that we live. Proponents of these new technologies say that they will make our private information and our bank accounts much more secure. But there are others that warn that these kinds of "Big Brother technologies" will set the stage for even more government intrusion into our lives. In the wrong hands, such technologies could prove to be an absolute nightmare.

Sep 09 10:04

AT&T and Verizon say 10Mbps is too fast for “broadband,” 4Mbps is enough -- AT&T and Verizon have asked the Federal Communications Commission not to change its definition of broadband from 4Mbps to 10Mbps

AT&T and Verizon have asked the Federal Communications Commission not to change its definition of broadband from 4Mbps to 10Mbps, saying many Internet users get by just fine at the lower speeds.
"Given the pace at which the industry is investing in advanced capabilities, there is no present need to redefine 'advanced' capabilities," AT&T wrote in a filing made public Friday after the FCC’s comment deadline (see FCC proceeding 14-126). "Consumer behavior strongly reinforces the conclusion that a 10Mbps service exceeds what many Americans need today to enable basic, high-quality transmissions," AT&T wrote later in its filing. Verizon made similar arguments.

Sep 09 10:04

FBI’s Story of Finding Silk Road’s Server Sounds a Lot Like Hacking

To hear the FBI tell it, tracking down the secret server behind the billion-dollar drug market known as the Silk Road was as easy as knocking on a door. The bureau’s latest court filing in the case describes how the hidden site accidentally revealed its location to anyone who visited its login page, thanks to a software misconfiguration.

Sep 09 09:41

Off-the-grid texting device GoTenna attracts antisurveillance crowd

Daniel Levy, a Web developer living in the Puna District of Hawaii, lived through a 12-day blackout after a rather vicious hurricane earlier this summer. Many residents in his community were stuck powerless until the local utility company restored the grid, while some subsisted on solar energy. It was after that, Levy said, that he sought a solution and came upon GoTenna.

The gadget -- a small Bluetooth-enabled rod packed to the brim with modern radio innards -- lets you create your own private, secure communication network for sending messages without cell service using your smartphone. Though marketed toward outdoors and emergency situations like hiking and disaster relief, GoTenna is getting a boost from the cryptography community. Levy, whose neighborhood gets little to zero reliable cell service, happens to represent both. He's among the more than 25 percent of GoTenna preorder customers who paid for the product with the cryptocurrency Bitcoin.

Webmaster's Commentary: 

IF this works as advertized, it sounds like a very cool gizmo!!

Sep 09 08:38

INFOGRAPHIC - Internet Security Threats

Through their Global Intelligence Network, Symantec have put together their annual report for 2014. It looks at the types of internet security threats and number of attacks as well as vulnerabilities and effects of the attacks. Symantec’s Network is one of the most advanced of its kind; it’s made up of more than 41.5 million attack sensors!

Aside from the many attacks on personal devices, which can cause a great amount of stress and financial problems for the victim (see Ransomware!), attacks on businesses can be catastrophic. Risks to corporations include reputational damage and loss of trust, lawsuits and bankruptcy. 2013 has officially become known as the year of the Mega Breach. The average number of identities exposed in 2013 was 2,181,891 compared with 604,826 in 2012. This was probably down to the campaigns lasting longer, resulting in 8 incidents exposing over 10million IDs compared with only 1 in 2012.

Webmaster's Commentary: 

The real question is, "Where is the NSA?"

For months we have been told that thew NSA, at huge taxpayer expense, has been violating the Constitution to monitor all of our computer activity.

So why are they not able to find these cyber-criminals?

There is no question that the NSA could use some good publicity; to demonstrate that they provide a useful service for all their cost and Constitutional crimes.

So why don't they?

Is it all a gigantic bluff to try to scare us into silence? If so, it does not appear to be working.

Or is the NSA itself, already acting in a lawless fashion, committing these crimes or in league with those who do?

THIS IS A CALL TO RIVERO'S RANGERS!

Wherever you see any story about any data breach, please post the above!

Sep 09 08:35

Biggest credit card breach in history

First it was Target.

Now it's Home Depot in what may well prove to be the biggest credit card data breach in history.

What's going on?

It's pretty simple. The companies that run these systems are not investing enough in making them secure and are hoping that the bill for not doing so will never come due.

Webmaster's Commentary: 

The real question is, "Where is the NSA?"

For months we have been told that thew NSA, at huge taxpayer expense, has been violating the Constitution to monitor all of our computer activity.

So why are they not able to find these cyber-criminals?

There is no question that the NSA could use some good publicity; to demonstrate that they provide a useful service for all their cost and Constitutional crimes.

So why don't they?

Is it all a gigantic bluff to try to scare us into silence? If so, it does not appear to be working.

Or is the NSA itself, already acting in a lawless fashion, committing these crimes or in league with those who do?

THIS IS A CALL TO RIVERO'S RANGERS!

Wherever you see the story about the Home Depot (or any other) data breach, please post the above!

Sep 08 18:45

Thousands get 'Peter Pan virus' phishing email

The email typically states that a MasterCard whose last four digits are 7006 was used to make the £145 purchase. It invites people to open some e-tickets which it says are attached.

...

According to Derek Knight at the My Online Security blog, those who open the attachment may find they have downloaded viruses and malware such as Cryptolocker. Cryptolocker typically locks the recipient out of their computer until they pay a ransom to the scammers.

"Almost all of these have a password-stealing component. Many of them are also designed to specifically steal your Facebook and other social network login details."

Sep 08 18:05

Amazon Cuts Struggling Phone’s Price to 99 Cents

Sixty thousand people vied to attend the unveiling of Amazon’s first smartphone in late June.

If only the retailer could persuade those fans — or anyone, really — to actually buy the device. The Amazon Fire is threatening to become the Amazon Fizzle.

On Monday, Amazon took a drastic step to avert disaster, announcing that it would charge 99 cents for the phone, basically giving it away if users signed a two-year contract with AT&T, the exclusive carrier.

Amazon has money to burn, and a relentless determination. But some analysts still wondered if a price drop of almost $200 was enough.

Sep 08 14:14

Facebook’s value to top $200B

FACEBOOK MAY EVENTUALLY BE THE BIGGEST CORPORATION IN THE WORLD

Sep 07 18:02

Record Labels Take Down Kim Dotcom’s Official Album… From Mega

In what could be one of the most ironic anti-piracy mistakes this year, music industry group IFPI has asked Mega to take down Kim Dotcom's very own music album Good Times. Mega was asked to remove its founder's music twice, casting doubt over the accuracy of the record labels' takedown efforts.

Sep 07 17:44

Apollo 11: The computers that put man on the moon

The so-called Apollo Guidance Computer (AGC) used a real time operating system, which enabled astronauts to enter simple commands by typing in pairs of nouns and verbs, to control the spacecraft. It was more basic than the electronics in modern toasters that have computer controlled stop/start/defrost buttons. It had approximately 64Kbyte of memory and operated at 0.043MHz.

WEBMASTER ADDITION: For a simulation of the Apollo computer control panel, CLICK HERE!

Sep 07 10:04

Religious Sites Carry More Malware Than Porn Sites, Security Firm Reports

Religious and ideological websites can carry three times more malware threats than pornography sites, according to research from security firm Symantec. The firm’s annualInternet Security Threat Report also found that threats to mobile devices continue to grow, almost exclusively for Google’s Android mobile OS.

Sep 07 09:05

This Site Is Messed Up!

I can't edit posts here anymore. I can't make comments on investment watch anymore. WTF is going on Mike?
The mutant spider dog story is a joke goin all over the net. If there was a humor and satire tag I wouldn't have commented in the first place!
Man hire somebody to read the posts before they go up cause it's making the site look foolish!

WRH REPLY: Your membership is working. Obviously you were able to post this comment. The mutant story was clearly labeled as humor and satire. Any problems you are having are at your end.

Sep 07 08:41

How To Kick Surveillance Devices From Your Network

A new low-cost gadget claims to protect your WiFi network from snooping devices . . . even drones. According to product notes from Cyborg Unplug:

'Plug to Unplug' ... detects and kicks devices known to pose a risk to personal privacy from your local wireless network, breaking uploads and streams. Detected devices currently include: Google Glass, Dropcam, small drones/copters, wireless 'spy' microphones...

Sep 07 08:36

Celebrity photo leak: Fake links to nude photos cause nationwide internet crash in New Zealand

New Zealanders keen to view hacked photos of naked celebrities have been blamed for a nationwide internet meltdown involving the country's main provider.

It is believed a handful of computer users clicked links on Friday evening believing they would be taken to the illicit images, but instead caused them to inadvertently install malware, triggering a crippling internet attack.

Webmaster's Commentary: 

A test to take down the internet during the next false-flag attack?

There is no way the perpetrators of a new 9-11 can allow the independent media to operate during a false-flag, lest we find and report the signs of fraud. Remember that in the weeks ahead of 9-11, the FBI was shutting down Muslim websites here in the US, to prevent the victims of the coming frame-up from defending themselves while the official story was implanted into the population.

And the fact that this shut down was confined by the planted malware to only New Zealand suggests it was an operational test.

So don't start clicking links to see naked celebrities this next week.

" To act with my clothes on is a performance. To act with my clothes off is a documentary." -- Julia Roberts

Sep 07 08:25

Patriot Act’s absurd new spawn: Just when you thought it couldn’t get any worse

Congress may be preparing to reinforce two horrible FISA Court decisions and an abusive government search with no debate in the coming weeks: a decision to give national security orders unlimited breadth, one making it legal for the government to investigate Americans for activities protected under the First Amendment, and the FBI’s “back door” searches of Americans’ communication content collected under the FISA Amendment Act Section 702 authority.

Webmaster's Commentary: 

Congress is most likely giving this approval because they know what these governmental agencies have on them!

Remember Chief Justice Robert's "flip-flop" on Obamacare?!? I am still rather curious as to precisely what "inspired" his change of heart!! :-)

And right after, he slipped out of the country for awhile so he couldn't be questioned on his reversal.

Sep 07 07:07

Makers: Escaping the Pull of Big-Business

3D printers, DIY biology, and the maker movement is now too big to be laughed off or ignored. It is now something big-business intends to first try to co-opt, then fight and destroy. Through SOPA/ACTA and various other intellectual property schemes, we can see in many ways, the fight has already begun. Defining and defending worthy principles is now more necessary than ever - and recognizing the folly of following individuals - be they people, companies, or brands - is utter folly. A sense of pragmatic awareness of principles over people and parties may help makers succeed where politics has habitually failed.

Sep 06 18:57

SEPTEMBER 10 INTERNET SLOWDOWN -- BE PART OF THE SOLUTION

the above link goes to the page for webadmins, bloggers, etc, to get the slowdown code.

the regular Netizen's page is here.

do it now, while you sre thinking about it!

or think -- where would we be without the web...

WEBMASTER ADDITION: Oh sure; let's slow the net down the day before FOX claimed there will be an ISIS attack on America!

Sep 06 15:41

How your innocent smartphone passes on almost your entire life to the secret service

So the next time you hear a minister, security expert or information officer say ‘Oh, but that’s only metadata,’ think of Ton Siedsma – the guy you now know so much about because he shared just a week of metadata with us.

Sep 06 15:35

Malware Can Bypasses Chrome Extension Security Feature Easily

Researchers have uncovered a new social engineering trick that leads users to a malicious extension from Google Chrome impersonating to deliver Adobe’s Flash Player in order to lure victims in a click fraud campaign.

Security experts at TrendMicro believe that the malware is triggered by opening Facebook or Twitter via shortened links provided in any social networking websites. Once clicked, the links may lead victims to a site that automatically downloads the malicious browser extension.

Sep 06 09:12

My Stumbling Days Are About Over!

Stumble has turned off my account it would appear. The last 6 weeks have been really difficult getting stuff up.
I put up the Make sure your Congressman see's this before November of the father holding his child with a brainless open skull plus the article about the IDF bombing an orphanage and the dairy that supports it. A couple of minutes after that I can't get into my account or post anymore!
Stumble has been turning off sites and individual webpages left and right and it has really gotten bad since Gaza and Ukraine.
If I can get back up I will but if not I hope I directed some traffic to WRH and all the bloggers who post here and we woke some more people up!
DRIP! DRIP! DRIP!as we slowly wash this mountain of hate,injustice and inequity into the oceans!

Sep 06 05:25

Google silent on support for group opposing net neutrality and muni broadband

Common Cause and more than 50 other advocacy groups this week called on Google to end its affiliation with the American Legislative Exchange Council (ALEC), a group that has pushed state laws limiting the rights of cities and towns to create community-owned broadband networks. ALEC also opposes network neutrality rules that Google used to be a staunch supporter of and last month urged the FCC to quickly approve Comcast’s purchase of Time Warner Cable without imposing any regulatory conditions on the merger

Sep 06 05:23

When NSA and FBI call for surveillance takeout, these companies deliver

Not every Internet provider can handle the demands of a Foreign Intelligence Surveillance Act warrant or law enforcement subpoena for data. For those companies, Zack Whittaker reports on ZDNet, the answer is to turn to a shadowy class of companies known as “trusted third parties” to do the black bag work of complying with the demands of the feds.

Under the Communications Assistance for Law Enforcement Act (CALEA), phone companies and Internet providers can charge back the government for their efforts in responding to warrants. AT&T charges the CIA more than $10 million per year for access to its phone call metadata. But smaller ISPs who aren’t frequently hit with warrants can’t afford to keep the infrastructure or manpower on-hand to respond to requests—so they sign up with a “trusted third party” capable of doing the work as an insurance policy against such requests.

Sep 05 17:01

YouTube, then and now

Sep 05 14:22

Obamacare site hacked but nothing taken, HHS says

NEW YORK (CNN) — Hackers silently infected a Healthcare.gov computer server this summer. But the malware didn't manage to steal anyone's data, federal officials say.

A computer server that routinely tests portions of the website wasn't properly set up. It was never supposed to be connected to the Internet — but someone had accidentally connected it anyway.

That left it open to attack, and on July 8, malware slipped past the Obamacare security system, officials said.

Sep 05 07:39

Meet the Russian-made tool that grabs nude selfies from iCloud accounts

There’s a seedy trade in compromising photos stored in Apple iCloud accounts, and it is in part aided by a software program that cleanly collects the data.

Some of the nude celebrity photos are believed to have first been circulated on Anon-IB, a definitely not safe-for-work forum. As reported by Wired, the forum is full of offers for iCloud “ripping,” or downloading the entire contents of an account.

The software tool they’re using is Moscow-based Elcomsoft’s Phone Password Breaker, or EPPB, one of many forensic tools the company develops for law enforcement and other clients.

Sep 05 06:24

How Covert Agents Infiltrate the Internet to Manipulate, Deceive, and Destroy Reputations

By publishing these stories one by one, our NBC reporting highlighted some of the key, discrete revelations: the monitoring of YouTube and Blogger, the targeting of Anonymous with the very same DDoS attacks they accuse “hacktivists” of using, the use of “honey traps” (luring people into compromising situations using sex) and destructive viruses.

Sep 04 19:19

UK Police Abused Anti-Terror Law To Snoop On Journalist's Phone Records Concerning Minor Political Spat

It's not a surprise that surveillance laws will be abused. But it's worth highlighting when they're abused so egregiously.

Sep 04 15:05

Newly Revealed NSA Program ICREACH Extends the NSA's Reach Even Further

Turns out, the DEA and FBI may know what medical conditions you have, whether you are having an affair, where you were last night, and more—all without any knowing that you have ever broken a law.

That’s because the DEA and FBI, as part of over 1000 analysts at 23 U.S. intelligence agencies, have the ability to peer over the NSA’s shoulder and see much of the NSA’s metadata with ICREACH.

Sep 04 15:01

The Latest Snowden Leak Is Devastating to NSA Defenders

The NSA collected "medical records sent from one family member to another, résumés from job hunters and academic transcripts of schoolchildren. In one photo, a young girl in religious dress beams at a camera outside a mosque. Scores of pictures show infants and toddlers in bathtubs, on swings, sprawled on their backs and kissed by their mothers. In some photos, men show off their physiques. In others, women model lingerie, leaning suggestively into a webcam ..."

Have you ever emailed a photograph of your child in the bathtub, or yourself flexing for the camera or modeling lingerie? If so, it could be your photo in the Washington Post newsroom right now, where it may or may not be secure going forward. In one case, a woman whose private communications were collected by the NSA found herself contacted by a reporter who'd read her correspondence.

Sep 04 15:01

HEALTHCARE.GOV HACKED!

A hacker broke into part of the HealthCare.gov insurance enrollment website in July and uploaded malicious software, according to federal officials.

Sep 04 14:42

Topeka Goodwill Among 20 Stores Affected By Data Security Breach

Goodwill of Topeka is one of 20 stores in Kansas affected by what the company is calling a data security issue.

Sep 04 13:59

Beware: Facebook's "Soft Censorship"

The Land Destroyer Report maintained a Facebook page under the name Anthony Cartalucci. Since 2009 it was used to express my personal thoughts regarding the news of the day, as well as share relevant links with followers. Today, Facebook, without warning or opportunity to appeal, decided that the Facebook account must be changed over to a "page." By doing so, all those following my account no longer would receive updates, because of Facebook's "news feed" filters.

Sep 04 13:58

What Hackers Did to Celebs? The NSA’s Been Doing That to All of the U.S. Instead of Predicting ISIL

ISIL, appears to have surprised them last June by taking over 40% of the major country of Iraq, which the U.S. surely had under intensive surveillance.

Sep 04 13:28

Did Dem Senate Candidate Cyrus Habib and Perkins Coie Lawyers Pay to Scrub Negative Internet Info?

Tuesday, August 26, 2014

Cyrusgate? Did Perkins Coie Advise Cyrus Habib to Internet Scrub and to Ignore Four Troublesome Questions in the 48th Senate Race Against Michelle Darnell?

Update 4 Sept. 2014: I am 99% certain that Cyrus Habib and Perkins Coie scrubbed the Internet to have negative information about him deleted.

See that negative return in the lower left corner?
Apparently no negative information about Cyrus Habib
will be allowed online. Sorry, I must have missed the memo.

Sep 04 13:14

No! Your data is not safe!: Hackers Used Government Spyware to Data-rob iCloud

One sensationally reported incident this week exposes a dual threat: your data isn't safe on a corporate-controlled "cloud" and spying software made for police and government agencies makes it completely accessible.

Sep 04 09:29

GOP-backed fake news sites target Dems in congressional races

This month, the National Republican Congressional Committee debuted at least 20 websites in key congressional districts—from Central Valley, California, to Augusta, Georgia—that are designed, albeit amateurishly, to look like news sites. One of them, “South Michigan Update,” sports the headline “Byrnes Struggles to Escape Her Record,” referring to Democrat Pamela Byrnes in Michigan’s 7th District. Like the other NRCC sites, the featured post attacks the Democratic candidate in the race. The piece has a byline credit to “Geoff,” though, as The Washington Post pointed out, most of “Geoff’s” posts are rewrites of content from the NRCC site. The spare South Michigan site has one other item: a video ad for the 7th District’s Republican incumbent, Tim Walberg, that is featured under the header, “Most Viewed.”

Sep 04 05:11

Russian MP says Google is spying for Ukraine

A ruling party MP plans to ask Russian law enforcers to investigate Google’s alleged ties with the Ukrainian special services and possible leaking of Russian citizens’ personal data.

Evgeny Fyodorov of the United Russia party has accused Google of taking “an openly anti-Russian position” in an interview with popular daily Izvestia. He added that he possessed information that Google had signed a cooperation agreement with Ukrainian special services, in particular the Security Service of Ukraine or SBU.

“Google remains in the jurisdiction of the United States of America and the USA is now officially seeking to weaken Russia and destabilize the situation. This is a direct order for all organizations that fall under its control,” Fyodorov told reporters.

Sep 03 17:05

Newly Revealed NSA Program ICREACH Extends the NSA's Reach Even Further

Nadia Kayyali
Electronic Frontier Foundation

Turns out, the DEA and FBI may know what medical conditions you have, whether you are having an affair, where you were last night, and more—all without any knowing that you have ever broken a law.

That’s because the DEA and FBI, as part of over 1000 analysts at 23 U.S. intelligence agencies, have the ability to peer over the NSA’s shoulder and see much of the NSA’s metadata with ICREACH.

Metadata is transactional data about communications, such as numbers dialed, email addresses sent to, and duration of phone calls, and it can be incredibly revealing....

Sep 03 12:13

Nation’s poor remain hungry as Wall Street feasts

PERSISTENT RATES OF FOOD INSECURITY REVEAL VAST INEQUITIES OF SO-CALLED “ECONOMIC RECOVERY” IN US, SAY ANTI-POVERTY ADVOCATES

Sep 03 09:09

Child pornography among hacked celebrity photographs posted online

Many of the nude photographs of A-list celebrities stolen from cloud constitute child pornography, The Daily Dot reports.

Sep 03 06:35

States Rights, Local Democracy, and the Future of Broadband

In July, the Federal Communications Commission (FCC) stirred up a hornets’ nest by announcing it might overturn state prohibitions on municipally owned broadband networks. Republicans protested that Washington should keep its grubby hands off state authority. Giant cable and phone companies contended that local governments are incapable of managing telecommunications networks and the resulting failure will burden taxpayers.

Sep 02 15:45

Net neutrality activists are about to show you what an Internet 'slow lane' looks like

In a move out of the anti-SOPA campaign playbook, Fight for the Future and other net neutrality activist groups have set up the Battle for the Net coalition, which plans to launch an “Internet slowdown day” later this month.

No actual traffic will be slowed down. Instead, participating sites will display embeddable modules that include a spinning “loading” symbol and information about contacting the Federal Communications Commission (FCC), the White House, and members of Congress.

Sep 02 15:22

Ricky Gervais prompts furious online backlash after blaming the victims of celebrity iCloud scandal

Ricky Gervais has received a backlash on Twitter after suggesting that the celebrities who had their nude photos hacked were to blame - because they had taken and stored the photos in the first place.

The comedian posted a message to his 5.99million followers saying: 'Celebrities, make it harder for hackers to get nude pics of you from your computer by not putting nude pics of yourself on the computer.'

His comment was quickly criticised online, and he was forced to delete the tweet before backtracking on the controversial claim.

We are living in a world where common sense is controversial.

Sep 02 12:01

Dem Perkins Coie Lawyer Cyrus Habib Dodges Questions in Washington 48th Dist. Senate Bid, Michelle Darnell Answers!

http://www.scribd.com/doc/238446808/Michelle-Darnell-Answers-Four-Toug...

In full disclosure I am listed as a team member for Michelle Darnell's campaign because she paid me $250 to make her first 3 videos. I haven't been paid a dime since then yet I continue to document what I am seeing in this race because I feel like it and I have just enough of my own money and time to do so. I am not part of the control group and I make no decisions on policy or any of that. I am just the guy with the camera, documenting Ms. Darnell and Mr. Habib.

*********

Why is Cyrus Habib hiding? Isn't Transparency the hallmark of the Democratic Party?

Sep 02 11:50

VIDEO: Surveillance society; Biometric ID cards, GHCQ protests, Micro-chipped clothing

George Osborne scamming the British public (again), RFID chips in Adidas clothes, biometric ID cards and GHCQ protest.

Sep 02 10:46

NSA Data-Sweep Lawfulness Challenged in NY Appeal Hearing

The National Security Agency’s program of collecting phone records, deemed lawful by a Manhattanfederal judge, was challenged by the American Civil Liberties Union as the most sweeping surveillance operation ever directed against the American public by the government.

Sep 02 07:10

Chattanooga: Fastest Internet in US

Yes, you read that right. Internet speeds as fast as 1 gigabit per second are the norm in the city of Chattanooga, Tennessee. Not the spot you might have predicted, would you. Certainly not the place I anticipated would have faster, better internet than anywhere else in the United States, and one of the faster internet speeds on the planet. Not only that, but the fast internet is helping to lead Chattanooga out of the economic doldrums.

Sep 02 05:09

FBI, Apple Investigate Nude Photo Leak Targeting Jennifer Lawrence, Others

As long as the FBI has its priorities straight -- "May the odds be ever in their favor!" (Remember the childhood joke? FBI = Female Body Inspector.)

I bet that the NSA is feeling really bad-ass right now.

Sep 01 15:13

'Cloud' concerns after celebrity picture leaks

One expert said that private data "becomes much more difficult to control" when using cloud services.

"It is important for celebrities and the general public to remember that images and data no longer just reside on the device that captured it," said Ken Westin, security analyst at Tripwire.

"Although many cloud providers may encrypt the data communications between the device and the cloud, it does not mean that the image and data is encrypted when the data is at rest.

"If you can view the image in the cloud service, so can a hacker."

Sep 01 10:29

The Server Needs To Die To Save The Internet

Do we have the Internet we deserve? There’s an argument to say that yes, we absolutely do. Given web users’ general reluctance to pay for content. We are of course, paying. Just not with cold hard cash, but with our privacy — as digital business models rely on gathering and selling intel on their users to make the money to pay (the investors who paid) for the free service.

A UK startup called MaidSafe, based in the small town of Troon in Scotland, reckons the myriad problems with today’s Internet can be linked to a design quirk of its underlying architecture. And that the answer to solving the web’s most perennial issues, such as finding sustainable digital business models for content, safeguarding user data and privacy, and thwarting hacking, malware and overreaching surveillance, is to begin again — with a whole new re-architected Internet.

Sep 01 09:47

Police State: US Government-Funded Database Created to Track “Subversive Propaganda” Online

The creation of the Truthy database by Indiana University researchers has drawn sharp criticism from free-speech advocates and others concerned over government censorship of political expression.

According to the award abstract accompanying the funding provided by the National Science Foundation (NSF), the Truthy project aims to demonstrate “why some ideas cause viral explosions while others are quickly forgotten.” In order to answer this and other questions, the resulting database will actively “[collect] and [analyze] massive streams of public microblogging data.”

Webmaster's Commentary: 

MOI, subversive?!?!? :-)

If telling the truth has become "subversive", this country might as well pack it in as the alleged "land of the free and the home of the brave". right now.

Sep 01 07:44

‘Partner and Target’: NSA spying on NATO ‘friend’ Turkey

Documents leaked by NSA whistleblower Edward Snowden show that Turkey is one of the agency’s top spying objectives, on a par with Venezuela and more than arch-foe Cuba – despite Ankara’s close cooperation with Washington on intelligence.

Aug 31 10:35

The US government can brand you a terrorist based on a Facebook post

The US government’s web of surveillance is vast and interconnected. Now we know just how opaque, inefficient and discriminatory it can be.

Aug 31 08:37

The US government can brand you a terrorist based on a Facebook post. We can't let them make up the rules

The US government’s web of surveillance is vast and interconnected. Now we know just how opaque, inefficient and discriminatory it can be.

As we were reminded again just this week, you can be pulled into the National Security Agency’s database quietly and quickly, and the consequences can be long and enduring. Through ICREACH, a Google-style search engine created for the intelligence community, the NSA provides data on private communications to 23 government agencies. More than 1,000 analysts had access to that information.

This kind of data sharing, however, isn’t limited to the latest from Edward Snowden’s NSA files. It was confirmed earlier this month that the FBI shares its master watchlist, the Terrorist Screening Database, with at least 22 foreign governments, countless federal agencies, state and local law enforcement, plus private contractors.

Aug 31 07:45

NSA Expanding Spying Programs With Advanced Capabalities

August 30, 2014 - A US geo-political analyst says the recent report about the National Security Agency (NSA) secretly providing data to nearly two dozen US government agencies via a powerful search engine illustrates how the advancement of technologies has given US intelligence agencies more capability to further expand their vast spying programs.

Citing classified documents provided by former NSA contractor Edward Snowden, The Intercept investigative site reported Monday that the NSA built its own “Google-like” search engine and shares hundreds of billions of digital records with federal law enforcement and several other US government agencies.

Aug 31 07:25

Google's Self-Driving Car Can't Navigate Heavy Rain Or Most Roads

Apparently the famous Google self-driving car isn't that close to giving us hands-free transportation after all.

While Google's fleet has safely driven more than 700,000 miles, the autonomous model relies so heavily on maps and detailed data that it can't yet drive itself in 99 percent of the country, according to an MIT Technology Review report.

Aug 30 11:44

The 3D-printed key that can unlock anything

Lockpicking just became a whole lot easier. Engineers Jos Weyers and Christian Holler can use 3D printing technology to produce ‘bump’ keys capable of opening millions of locks, without ever having seen the original keys.

Their DIY software Photobump requires only a picture of the lock in question, and couple of pieces of readily available information such as lock’s depth, to design a ‘bump’ key that can pick even the most sophisticated of security locks.

Aug 30 10:49

The US government can brand you a terrorist based on a Facebook post. We can't let them make up the rules -- Innocent people’s lives are being ruined.

The US government’s web of surveillance is vast and interconnected. Now we know just how opaque, inefficient and discriminatory it can be.

Aug 30 06:19

Microsoft And Privacy Violations: U.S. Judge Rules Microsoft Must Handover Personal Data

“Microsoft has been told it must handover emails stored abroad to US prosecutors by a New York court. However, the software giant says it will fight the ruling, saying that an email deserves the same privacy protection as a paper letter sent by mail.

The company says they will not release any emails to US authorities, while it appeals the ruling, made by Chief Judge Loretta Preska of the US District Court in Manhattan. She said that Microsoft must hand over information, regardless of where it was stored.

"Microsoft will not be turning over the email and plans to appeal,” a Microsoft spokesperson told Reuters. "Everyone agrees this case can and will proceed to the appeals court. This is simply about finding the appropriate procedure for that to happen."

Aug 29 15:57

Obama's NSA review gives the lie to Britain's timid platitudes: a debate is possible

What a relief. It is, after all, possible to discuss the operations of modern intelligence agencies without having to prove one's patriotism, be turned over by the police, summoned by politicians or visited by state-employed technicians with instructions to smash up one's computers.

Aug 29 12:40

13 Million Nigerians To Receive Mastercard's Biometric ID Card

With the intention of producing a National Identity Management System (NIMS), 13 million Nigerians will be issued with eID cards. The cards will hold highly sensitive information including; health insurance status, tax information, driver licensing, birth and death records, and there plans to use the cards for border control.

Perhaps most disturbingly, the card will also function as a payment method and are backed by Mastercard and will hold biometric information including 10 fingerprints and a retinal scan. Along side the biometric data, the invasive cards will carry two photographs of the holder.

Aug 29 11:49

Supreme Court Finds Internet Speech Injunctions Violate the First Amendment

The Texas Supreme Court today ruled that orders preventing people who have been found liable for defamation from publishing further statements about the plaintiff are “prior restraints,” a remedy that the First Amendment rarely permits. Adopting a position advocated by EFF in an amicus brief, the court also delightfully quoted The Big Lebowski's Walter Sobchak: "For your information, the Supreme Court has roundly rejected prior restraint." It further rejected the argument that the ability of Internet publication to reach millions of readers almost instantaneously somehow required a change in First Amendment law.

Aug 29 10:52

IN TIMES OF WAR: A PRAYER FOR PEACE - CLAIRE K. RIVERO

Webmaster's Commentary: 

I am reposting Claire's video as the US invades Iraq for the third time, Kiev fakes an invasion by Russia, Libya's US puppet rules are driven from office, and a new flood of TV commercials hits the corporate media networks reminding all 18 year-olds that they MUST register for selective service.

Optional Banner: 
WRH Exclusive
Aug 29 07:54

Net Neutrality Activists Take the Senate by Storm

The partisan bickering on Capitol Hill can turn the most wide-eyed idealist into a disillusioned crank. But progress is possible even in this era of legislative gridlock. That’s why Free Press Action Fund members meet with their elected officials: to effect change.

Aug 29 07:31

Thought those embarrassing Facebook photos were forgotten? Think again: Site tests tool that scours old posts in seconds

You might think those embarrassing Facebook posts from the past are long gone, but a new feature could soon see them making an unwelcome return.

Facebook is reportedly testing a feature on its mobile app that allows users to search through old posts from friends using keywords about people or events.

The move could make it easier for people to find content otherwise thought to be buried in the deep, recesses of your Facebook feed.

Aug 29 07:15

AFP Accidentally Publishes Sensitive Metadata Online

The Australian Federal Police (AFP) faces embarrassment today after it emerged that authorities accidentally published highly sensitive information pertaining to criminal investigations and telecommunications interception activities.

Aug 29 07:11

Mass 3-Day Protest Outside GCHQ

A mass protest outside GCHQ is about to take place from Friday to Monday, in an effort to raise concerns about the increasing amount of surveillance citizens are subjected to by British and foreign Governments.

Aug 29 00:58

Big Brother Is Watching You: Paranoia, Surveillance, and the Drug War

Waking Times

Police have new tech to help them predict and enforce the law better than ever—but that also means enforcing the racial bias of drug arrests faster than ever, too.

Aug 28 18:10

Wall Street Admits That A Cyberattack Could Crash Our Banking System At Any Time

Wall Street banks are getting hit by cyber attacks every single minute of every single day. It is a massive onslaught that is not highly publicized because the bankers do not want to alarm the public. But as you will see below, one big Wall Street bank is spending 250 million dollars a year just by themselves to combat this growing problem. The truth is that our financial system is not nearly as stable as most Americans think that it is. We have become more dependent on technology than ever before, and that comes with a potentially huge downside. An electromagnetic pulse weapon or an incredibly massive cyberattack could conceivably take down part or all of our banking system at any time.

Aug 28 15:23

The truth behind social media-driven donation campaigns

Tactic often used to scam well-meaning people

Aug 28 15:20

How safe is your Money? Five Major U.S. Banks Hacked this month

The FBI is investigating five major bank security breaches this month that experts think may have come from state-sponsored hackers in Russia. The attacks, which happened earlier this month, gave hackers access to gigabytes of checking and savings account data that could be used to drain accounts.

Not safe in the banks regardless, but more reason to keep ONLY WHAT YOU NEED in there for bills etc...

Aug 28 11:45

VIDEO: Member of Online Gaming Group Arrested by SWAT - on Live Stream

SWATTING

- LOOK IN BOTTOM LEFT OF VIDEO

The report proved to be false, but the investigation caused nearby schools to enact security procedures and businesses to be evacuated.

Aug 28 10:25

NSA and GCHQ: snooping because we can

The crucial thing about the latest revelations from the secret documents leaked by the whistleblower Edward Snowden is their scope. When the Guardian first began publishing Mr Snowden’s documents seven months ago, it was immediately apparent that they described secret data-trawling operations by America’s NSA and Britain’s GCHQ of almost limitless reach.

Aug 28 10:07

Confidential Australia Data Retention Discussion Paper Leaked

It’s the secret industry consultation paper the Australian federal government didn’t want you to see.

Aug 28 09:51

How big telecom smothers city-run broadband

But a 1999 Tennessee law prohibits cities that operate their own Internet networks from providing access outside the boundaries where they provide electrical service. Bowling wanted to change that and introduced a bill in February that would allow them to expand.

Enlarge / State Sen. Janice Bowling, a Republican from Tullahoma, Tennessee, says she was surprised by AT&T’s adversarial reaction to her bill to allow cities to expand their broadband networks.

Allan Holmes/Center for Public Integrity

She viewed the network, which offers Tullahoma residents speeds about 80 times faster than AT&T and 10 times faster than Charter (according to advertised services), as a utility, like electricity, that all Tennesseans need.

Aug 28 09:40

BEX Alert!!! - "FBI examining whether Russia is tied to JPMorgan hacking"

The Federal Bureau of Investigation (FBI) is investigating whether Russians had any links with recent cyber intrusions against US banking giant JPMorgan Chase and other American banks.

The FBI is investigating whether the attacks, discovered in mid-August, were in retaliation for Western sanctions levied on Russia over the crisis in Ukraine, according to Bloomberg.

Aug 28 09:33

iFail: Why John Deasy's Risky iPad Gambit Crashed and Burned at LAUSD

Aug 28 08:29

What went wrong with Microsoft's August updates?

It's been a long time since Microsoft had a Patch Tuesday this bad. By Friday they were conceding problems with several updates. Not only did they withdraw four updates, but they recommended that users uninstall one of them.

Yesterday they reissued that update, but they also announced that it had its own set of new bugs, one of which can make windows inaccessible or invisible. Three of the four withdrawn updates are still withdrawn and two of those are also subject to the missing window bug. Two other updates, previously uninvolved with the August updates, also have this missing window bug.

Aug 28 07:23

NSA and GCHQ: snooping because we can

The crucial thing about the latest revelations from the secret documents leaked by the whistleblower Edward Snowden is their scope. When the Guardian first began publishing Mr Snowden’s documents seven months ago, it was immediately apparent that they described secret data-trawling operations by America’s NSA and Britain’s GCHQ of almost limitless reach.

Aug 28 06:10

'Unofficial' Microsoft Windows XP Service Pack 4 now Available for Download: Integrates all Features of Earlier Service Packs

Users downloading the unofficial Windows XP Service Pack 4 should keep in mind the fact that the package is not endorsed by Microsoft and is developed by an independent third-party developer.

However, the unofficial SP4 can be checked out for its 'enhanced security features' by XP users having no intentions of upgrading to newer Microsoft OSes such as Windows 7/8.

Aug 27 19:35

Privacy Concerns Raised over Disclosure of Tacoma Police Use of 'Cell Site Simulator'

The Tacoma Police Department confirmed Wednesday it has been using a sophisticated ‘cell site simulator’ for the past five years that enables it to zero in on a person’s cellular device, but said it does not snoop or collect data on the general public.

Aug 27 14:59

Landmark civil rights legal records deleted from Pacer

Records of landmark US civil rights cases presided over by one of the country's most senior judges have been removed from the internet.

The state-run Public Access to Court Electronic Records (Pacer) service deleted numerous court documents deemed incompatible with a software upgrade.

These included appeals heard by Justice Sonia Sotomayor prior to her appointment to the Supreme Court.

A famous racial discrimination case was among the expunged files.

Webmaster's Commentary: 

Someone doesn't want those precedents to be available for lawyers! How Orwell can you get?

Aug 27 13:55

Social self-censorship: Twitter, Facebook users don’t share opinions on political issues

Research on how Edward Snowden’s explosive leaks were shared on social media has found using Twitter and Facebook may actually encourage self-censorship.

The Pew Research poll finds that contrary to the hype, people may share less on social media when it comes to hot topics.

Aug 27 13:41

Poll: People are self-censoring discussion of the NSA on Facebook and Twitter

A newly released poll from Pew Research found a “spiral of silence” on the topic of mass NSA surveillance in which social media users are unwilling to discuss the issue online, particularly if their friends do not agree with them. Notably, this self-censorship was far more prevalent on the internet than in real life:

Aug 27 12:55

DRUDGE : “FEDS: RUSSIANS HACKED AMERICAN BANKS”

Russian hackers attacked the U.S. financial system in mid-August, infiltrating and stealing data from JPMorgan Chase & Co. (JPM) and at least one other bank, an incident the FBI is investigating as a possible retaliation for government-sponsored sanctions, according to two people familiar with the probe.

Aug 27 12:15

Justice Department confirms lost IRS emails are stored on backup drives

for weeks the IRS and Obama Administration told the American people a carefully crafted narrative regarding the whereabouts of emails containing information surrounding the targeting of specific groups and individuals based on their political party.

Aug 27 07:08

Amazon has sold no more than 35,000 Fire phones, data suggests

Amazon doesn’t give sales data for its devices, but figures from comScore and Chitika suggest only modest sales so far

Aug 27 06:57

How Cops and Hackers Could Abuse California’s New Phone Kill-Switch Law

“It’s great for the consumer, but it invites a lot of mischief,” says Hanni Fakhoury, staff attorney for the Electronic Frontier Foundation, which opposes the law. “You can imagine a domestic violence situation or a stalking context where someone kills [a victim's] phone and prevents them from calling the police or reporting abuse. It will not be a surprise when you see it being used this way.”

...

More importantly, however, the EFF continues to oppose it on grounds that it could be abused by law enforcement. The organization has focused in particular on the law’s failure to specify who can activate the kill switch and how it may be abused by others.

Aug 27 06:38

nationalreport.net is a fake news site we have encountered before

The site nationalreport.net is best ignored. This is a site where leftist provocateurs post fake news stories in the hopes that patriotic conservatives will latch onto to them and embarrass themselves by passing them around as true.

SHARE THIS ARTICLE WITH YOUR SOCIAL MEDIA