COMPUTERS/INTERNET/SECURITY | WHAT REALLY HAPPENED


COMPUTERS/INTERNET/SECURITY

Apr 06 09:56

New York judge rules that divorce papers can now be served through Facebook

A Brooklyn woman scored a judge’s approval to legally change her relationship status to “single” via Facebook.

In a landmark ruling, Manhattan Supreme Court Justice Matthew Cooper is allowing a nurse named Ellanora Baidoo to serve her elusive husband with divorce papers via a Facebook message.

Apr 06 08:12

Automakers Say You Don’t Really Own Your Car

Most of the automakers operating in the US filed opposition comments through trade associations, along with a couple of other vehicle manufacturers. They warn that owners with the freedom to inspect and modify code will be capable of violating a wide range of laws and harming themselves and others. They say you shouldn’t be allowed to repair your own car because you might not do it right. They say you shouldn’t be allowed to modify the code in your car because you might defraud a used car purchaser by changing the mileage. They say no one should be allowed to even look at the code without the manufacturer’s permission because letting the public learn how cars work could help malicious hackers, “third-party software developers” (the horror!), and competitors.

Apr 06 08:10

US, Saudis Target Internet Access in Yemen

In past wars of aggression, US have first targeted TV stations and radio communications bases, but in the 21st century, targeting internet access is essential in order to keep real information from circulating between the target nation and the outside world, but also between citizens attempting to coordinate inside the target nation.

Aden is the access point for one of only two submarine fiber optic cables which connect Yemen to the rest of the world. That cable which connects Yemen to the US AFRICOM-controlled client state of Djibouti across the Gulf of Aden in east Africa, home of one of the Pentagon’s largest off-shore military bases. It has gone dark for the last three days and counting. This would indicate direct interference or sabotage.

Apr 06 07:54

Kuwait’s top court upholds jail term of activist

Kuwait’s Supreme Court has upheld a two-year prison term handed down to opposition activist, Ayyad al-Harbi, for posting Twitter messages considered offensive to the ruler of the Persian Gulf country.

The Sunday ruling came as online activists strongly censured the sentence given to Harbi, a journalist in his 20s at the country’s Sabr news website who has remained in captivity since May 2014 following an appeals court ruling that upheld the original jail term.

The journalist’s online supporters further argued that he had only re-posted on Twitter a verse written by Iraqi poet Ahmad Matar in which he slammed corrupt Arab dictators.

Apr 06 06:47

Bill to Ban Undetectable 3-D Printed Guns Is Coming Back

Since Congressman Steve Israel first called for legislation that would ban 3-D printed guns, those plastic-printed firearms have evolved from a few simple components to a full one-shot pistol to rifles and multi-shot revolvers, with more advances on the horizon. Israel’s bill, meanwhile, has gone nowhere, leaving a widening gap between DIY weapons and the law.

Apr 06 06:43

Last Week Tonight with John Oliver: Government Surveillance (Edward Snowden as guest)

There are very few government checks on what America’s sweeping surveillance programs are capable of doing. John Oliver sits down with Edward Snowden to discuss the NSA, the balance between privacy and security, and dick-pics.

Apr 05 17:52

Woman Arrested For Posting Selfie With Gun on Facebook

Henrico, VA– Be careful what you post on Facebook, or you could be charged with a crime over your smiling selfie. This is something 26-year-old Kristin Holmes learned the hard way this week when she was arrested and charged with a crime she referred to as “Facebook Thugging,” for posting of a photo of herself with a handgun. It’s not just photos that can get you in trouble though, the Fraternal Order of Police is warning that in Virginia, you can be charged with this crime even for swearing.

Apr 05 09:02

New Encryption Software Gets Thumbs-Up From Snowden

In the USA today, the NSA justifies its blanket surveillance on all of our digital data on the basis that they are supposedly “tracking terrorists.” Yes, that is the only reason that is given, but intelligent citizens know better – they know that this is nothing more than a modern, openly fascist system of control designed to track and target anyone whom the government deems a threat to their control system.

With all the resources and unlimited funds which the US federal government has at its disposal, can encryption really work to protect your privacy?

Here’s one product which is showing promise…

A long-awaited security audit of computer software assumed to be impervious to state-sponsored surveillance now suggests that the program, TrueCrypt, is free of any government-sanctioned vulnerabilities or backdoors.

Apr 05 08:42

ZIO BEX ALERT ~~ ZIONIST ‘COPYCAT’ HACKS ISRAELI SITE

In what appears to be a zionist copycat site of Anonymous, AnonGhost is claiming to have hacked the Website of Meretz, a zionist ‘left’ wing political party in Israel.

What seems to be the giveaway as to who is behind this group can be found on their FaceBook Page, in the form of this image …

Apr 04 12:28

AMC goes after “The Walking Dead” spoiler pirates

And AMC didn’t stop at a takedown notice

Apr 04 10:26

8 Things You Wouldn’t Think Are Spying on You, but Are

The next time you take a trip to the mall, make sure you give those mannequins a big smile. The surveillance industry’s latest recruit—joining the ranks of the Statue of Liberty, vending machines, Kinect, and a litany of other seemingly innocuous retail products—is store mannequins. The $245 billion dollar luxury goods industry currently avails itself of five companies in Europe and the U.S. that use the EyeSee polystyrene frame mannequins, whose eyes are equipped with police grade face-recognition cameras.

Apr 04 08:03

Israel’s propagandists shoot themselves in the foot as they shoot off their mouths

They are known by the language they use: depraved sexual insults, bile, bigotry, threats, disinformation and character assassination. That’s right: I’m talking about “hasbarats,” Zionist trolls who infect the Internet with hasbara, pro-Israel propaganda. Of course, mainstream media hasbarats have been around for decades, as have “hasbaratchiks,” fifth-columns in foreign governments who subvert national policies to serve Israel. The Internet, though, is the latest, some might say the greatest, propaganda playground, and Israel cannot cope with factual, passionate, well-documented stories that expose its war crimes and unrepentant criminality.

Apr 04 07:03

8 things you wouldn’t think are spying on you, but are

The next time you take a trip to the mall, make sure you give those mannequins a big smile

Apr 03 17:44

In the robotic near-future, most “will live off government-provided income”

If you think the jobs market and larger economy are bad now, just wait for the future

Apr 03 16:38

A Minute with Federal Counsel in Meyer v. U.S. Bank. Bankruptcy/Foreclosure Appeal

Friday, April 3, 2015

A KingCast/Mortgage Movies Minute with Federal Counsel in Meyer v. U.S. Bank.

U.S. Bank et al. got smacked in the Bankruptcy Court and now appeals. Plaintiff/Appellee Attorney Richard Jones asks "If I provide documents to this Court which contained material misrepresentations, would this Court let me off the hook?"

Judge Martinez:
"At what point does the Magistrate have an affirmative duty to investigate the veracity of these documents that are put before it?"

Richard Jones, Esq.:"Under the Deed of Trust Act strict compliance is required. Substantial compliance is insufficient. The problem Judge Overstreet was facing is NWTS did not even have procedure to investigate. That is material and goes to the Public Impact -- they were flying blind" (as admitted by Jeff Stenman -- see Ha Dao Jeff Stenman videos at Affordable Video Depo).

Judge Martinez:

Apr 03 14:58

Man beats child porn rap by proving unintentional downloading

Every day, the popular uTorrent client is used by the masses to legally or illegally download all manner of torrent files. With that comes the risk of computer infections or a lawsuit from a copyright holder.

A suburban Illinois man got way more than what he bargained for after the history buff downloaded files on World War II ordnance. What 40-year-old Wojciech Florczykowski of Schaumburg got in 2011 was an extreme visit from the FBI and ultimately a charge of child-porn possession.

Apr 03 14:55

After Obama's cybersecurity order threatens Snowden fund, bitcoin donations spike

A new executive order is said to have made it illegal to donate to Edward Snowden's fund, which didn't go down so well with one good-spirited community.

Apr 03 13:57

How Google AdSense Censors the News

The Internet's largest ad network won't support sites that show what happened at Abu Ghraib—but company reps say they're only enforcing the rules.

Apr 03 12:37

Google Pays $8.5 Million in Illegal Data Sharing Suit

Google will pay $8.5 million, most of it to nonprofit organizations, to settle a class action that claimed that it illegally divulged users' search information to third parties, a federal judge ruled.

Apr 03 11:22

14-Year-Old Windows XP Still Has More Users Than Windows 8.x

Microsoft ended support for Windows XP a year ago, but that hasn't stopped nearly two out of every 10 Windows users from clinging to the legacy operating system, according to data collected by Net Applications. What's even more interesting about Windows XP's 16.94 percent of the desktop PC market is that it once again has eclipsed the number of Windows 8 and 8.1 users combined.

Apr 03 09:49

CDC building ‘police state’ registry system to track your vaccination status

Imagine a world in which the government has free access to your private medical records for the purpose of ensuring your compliance with official

Apr 03 08:57

The Cybersecurity Bill CISA: Big Brother Just Got Bigger

Ted Baumann
Activist Post

Yesterday I fell for an April Fools’ joke for the first time (that I can remember, at least).

A blog post, ostensibly from Georgia Tech, announced a new program to award credit to students who use their smartphones while logged on to the campus Wi-Fi system. “Every website visit, post, tweet, photo, and yes, even yaks are available and tied to a user,” it said. “Grades are assigned using machine learning that has been trained to recognize intellectually valid content. The student receives a monthly report of their progress. The more they use the Internet, the faster they graduate.”

At first I thought, “So much for digital privacy on campus.” When I realized I’d been had, I chuckled, seeing my bamboozlement as a by-product of age.

Apr 03 08:57

AUD$250,000 Crypto Throwdown

We appreciate that if and when modern cryptographic systems/programs are broken, it is usually due to implementation errors (and sometimes misinterpretation of specifications themselves), and not the underlying crypto itself. To that end, through September 30th, 2015 we are proudly sponsoring this "Crypto Throwdown" and welcome any and all to break the methods and/or our implementation in toplip, our x86_64 linux command line encryption utility. Full source code is available to toplip itself, along with extensive documentation on our design and the resultant output contained here in our throwdown.

Apr 03 08:41

FBI Uncovers Another Of Its Own Plots, Senator Feinstein Responds By Saying We Should Censor The Internet

The "Anarchist's Cookbook" is itself a government hoax, published and sold to create the impression that there is a dangerous underground of anarchists justifying greater FBI powers and funding. However, anyone who is a real expert in explosives will tell you that the recipes given in the book are missing key stabilizing ingredients, and are intended to trick some poor idiot into blowing up his garage, which would then provide headlines for the "crazed lone nut bombing anarchist" to feed the propaganda. If you have a copy of that book, PLEASE DO NOT TRY THOSE RECIPES FOR YOURSELF!

Apr 03 06:56

Sony buys OnLive streaming game service, which will shut down later this month

In a bid to beef up its own PlayStation Now service, Sony is acquiring OnLive's patents for an undisclosed sum. Everything else is being shut down.

Apr 03 06:52

This Guy Could Have Deleted Everything on YouTube, but He Resisted

Smart tech firms like Google and Facebook routinely pay hackers and miscellaneous security geeks to find (and report) security flaws. This way, companies can plug the holes before someone less scrupulous can use them to mess with our data online. It’s a good system, and as Hismatullin, one such geek, details in a personal blog post, he recently landed a whopper: the ability to instantly delete any video on YouTube. All it took was sending a very, very short string of text to the site, and no matter whose video you’d targeted, it’d vanish as if the owner himself had trashed it.

Apr 02 15:40

Google fails to dismiss privacy lawsuit over Google Wallet

In a decision on Wednesday night, U.S. District Judge Beth Labson Freeman in San Jose, California said Google must face claims it breached users' contracts; breached an obligation to deal with users fairly and in good faith; and violated a California consumer protection law. She dismissed two other claims.

Apr 02 15:33

Censorship Order That Threatened Websites and Message Boards Overturned

Our right to express opinions online—for instance, to criticize copyright trolls and their demands for money in hopes of scaring them away—are protected by the First Amendment. The Georgia Supreme Court correctly underscored these protections in a ruling late last week about the state’s anti-stalking law. The panel overturned a trial judge’s astonishing order directing a website owner to remove all statements about a poet and motivational speaker who had a sideline business of demanding thousands of dollars from anyone who posted her prose online—a practice that had sparked plenty of criticism on the web.

Apr 02 14:41

Google Patents Directed Energy Nanoparticle Wearable Device

Do we really want our modern-day version of Skynet shooting directed energy into our bodies that target nanoparticles in our blood?

Apr 02 14:10

Net neutrality emails raise suspicions

The notes have identical wording to those organized by a group called American Commitment, which is led by Phil Kerpen, a former top aide at the Koch brothers-backed Americans for Prosperity.

On Monday, American Commitment boasted that it helped direct more than 1.6 million messages earlier this month from more than half a million voters to members of the House and Senate. Some of the messages encouraged lawmakers to defund the FCC’s new rules requiring Internet providers to treat all Web traffic equally.

The flood of traffic seemed to raise some lawmakers’ eyebrows, including Democratic Rep. Jackie Speier of California, whose office soon determined some of the messages had come from constituents who didn’t recall sending them.

Apr 02 12:00

Cell Tower Problems to Know About

Something is cropping up all over Los Angeles, California, like poisonous mushrooms, with equally toxic effects, but it’s not poisonous mushrooms.

It’s the standard cell tower, along with RF and EMF public relations pitches that are generated. Let’s hear what’s really happening in everyday, on-the-ground life, especially in ‘cell tower haven’ Los Angeles, California.

Concerned Los Angelinos feel there are several issues regarding all the cell towers being constructed in their area, but the most prominent concerns are health effects from EMFs and Constitutional 4th Amendment privacy matters. Numerous groups around the USA also are working on these very same issues. Maybe readers will become activists after having read this information. Those 4th Amendment Constitutional issues are being considered by a member of Congress on behalf of the LA activists. I hope to report more on that as things develop.

Apr 02 09:29

OBAMA DICTATES NATIONAL "CYBER SECURITY" EMERGENCY

It's business as usual in Washington. President Obama has just signed another Executive Order declaring a National Emergency to deal with cyber threats:

*OBAMA ORDER CREATES NEW AUTHORITY TO RESPOND TO CYBER THREATS TO BE USED IN 'TARGETED MANNER'
*OBAMA ORDER ALLOWS SANCTIONS FOR CYBER THREATS
This new authority, yet another layer of government oversight, we are sure is for your own protection and in Obama's words will "augment work to fight cyber threats." All your internet is belong to us...

Webmaster's Commentary: 

Why do I get the sinking feeling here that this is NOT for the good of We the People, but completely for the good of a rabidly paranoid, out-of-control government, incapable of dealing with any logical, reasoned criticism?

Apr 02 09:24

THIS BRAIN IMPLANT GIVES BLIND RATS A COMPASS-LIKE SENSE OF DIRECTION

The brains abilities of perception arent necessarily limited to the five traditionally recognised senses; other stimuli can help it make sense of the world. In a new study published in Current Biology, researchers in Japan found that rats could cope without one of the main sensessightwhen they were given another sense to help them navigate.

Apr 02 07:42

Australia's immigration department bans email autocomplete after G20 leak

Australia’s immigration department implemented a new email policy just weeks ago after learning the Guardian was aware of an embarrassing blunder that exposed the personal details of world leaders.

On Monday the Guardian reported an employee of the department had inadvertently disclosed the passport numbers, visa details and other personal identifiers of the world leaders attending the G20 summit in Brisbane after an email was mistakenly sent to an organiser of the Asian Cup football tournament because of an autocomplete function.

World leaders including US president Barack Obama, Russian president Vladimir Putin, Indian prime minister Narendra Modi and German chancellor Angela Merkel were among those affected by the breach.

Apr 02 07:00

Pirate Bay Clone Offloads Banking Trojan via Wordpress Blogs

A new report from Malwarebytes reveals that various badly maintained WordPress blogs are being injected with an iframe that points to thepiratebay.in.ua. The Pirate Bay clone, which uses the popular Open Bay script, was found to offload an exploit kit to unsuspecting visitors.

Apr 01 15:26

Leaked TPP investment chapter reveals serious threat to user safeguards

A newly leaked chapter of the Trans-Pacific Partnership (TPP) agreement from Wikileaks has confirmed some of our worst fears about the agreement

Apr 01 11:54

Federal Agents Arrested for Bitcoin Money Laundering and Fraud

Two former federal agents have been charged with money laundering, wire fraud, and related offenses during their investigation of the online black market, Silk Road. Former DEA special agent Carl Force allegedly abused his authority by stealing from the government and selling sensitive information to the target of their investigation, while former Secret Service special agent Shaun Bridges reportedly diverted over $800,000 Silk Road bitcoins into his personal account instead of confiscating the funds as government property. By taking advantage of encrypted communications, multiple aliases, and hacked administrator accounts, these federal agents operated in the shadows and above the law

Apr 01 10:05

Meet the man who can stop the TPP’s Internet censorship plan

A huge leak just revealed that the TPP would establish a secretive, shadowy international court that could be used by Big Media giants to kick Internet users around the world offline.

Apr 01 09:42

Obama Signs Order Creating New Cyber Sanctions Program

President Barack Obama on Wednesday created the first-ever sanctions program to penalize overseas hackers who engage in cyber spying and companies that knowingly benefit from the fruits of that espionage, potentially including state-owned corporations in Russia and China.

"Cyberthreats pose one of the most serious economic and national security challenges to the United States," Obama said in a statement after signing an executive order creating the sanctions.

Apr 01 09:06

AI INTERNS: SOFTWARE ALREADY TAKING JOBS FROM HUMANS

People have talked about robots taking our jobs for ages. Problem is, they already have – we just didn't notice FORGET Skynet. Hypothetical world-ending artificial intelligence makes headlines, but the hype ignores what's happening right under our noses. Cheap, fast AI is already taking our jobs, we just haven't noticed.

Apr 01 09:01

AT&T charges more for fiber internet if Google's not in your town

Only weeks ago, AT&T announced gigabit fiber broadband service in Kansas City for $70/month. Granted, customers have to give up their right to privacy to get that rate, but at least it’s the same price being charged by Google Fiber, which also happens to operate in KC. But when it comes toAT&T’s impending gigabit offering in Cupertino — the land of Apple — that $70/month rate is nowhere to be found; probably because Google Fiber is not around.

Apr 01 08:35

Hillary Clinton’s Legal Downfall to the U.S. Presidency

Hillary Rodham Clinton, as an attorney who, therefore, cannot plead ignorance of the law, has broken one specific law of the United States that, probably, should have her fined and/or in jail—or both! And with no exceptions, exemptions or presidential pardons! That law is U.S. Code Title 18, Part 1, Chapter 101, Section 2071.

Paragraph (a) specifically states that the perpetrator should be fined or imprisoned for 3 years, or both.

Paragraph (b) says such a perpetrator is thereby disqualified from holding any office under the United States of America.

Apr 01 08:30

Plot thickens in Hillary Clinton's Benghazi email probe

Former Secretary of State Hillary Clinton, the news media's heir apparent to the U.S. presidency admitted that all of the emails on her unauthorized private server have been permanently deleted. Her attorney, David Kendell claims the server had been wiped clean before turning over documents to the special committee investigating Benghazi. And Clinton's army of attack dogs, including James Carville, Lanny Davis and attorney Kendell, are predicting the investigation of Clinton and her shenanigans will go nowhere, according to Sunday television news shows.

Webmaster's Commentary: 

I agree that Hillary is not likely to face any real legal consequences for her actions, even though under 18 U.S. Code Section 2071 (b) her mishandling of government documents disqualifies her from holding any office. However, politics is perception, and this story will still be fresh in everyone's mind as we head into the primaries next year. Even the Democratic leadership is mumbling about her "unwinnability' to the point where they are openly talking about bringing back Al "Global Warming" Gore as their star candidate, despite the likelihood of another hard winter before the next election.

Apr 01 08:11

Benghazi panel summons Clinton

Rep. Trey Gowdy, chairman of the Select Committee on Benghazi, sent a request to Clinton's personal attorney, David E. Kendall, requesting that Clinton appear before the committee no later than May 1 for a transcribed interview about the server and email.

The request comes after Kendall told Gowdy that the server had been wiped clean and that it would be impossible to recover the 30,000 emails Clinton deleted last year.

Apr 01 08:11

Google Says 5% Of Visitors To Its Sites Have Ad Injectors Installed

When it comes to malware, ad injectors may seem relatively benevolent at first. They put an ad on your Google Search page that didn’t belong there, for example. That’s annoying, but doesn’t seem dangerous. But ad injection was pretty much what Lenovo’s Superfish was doing and that created plenty of security issues for users. Indeed, the research, which is based on the analysis of 100 million pageviews across Google’s sites from Chrome, Firefox and Internet Explorer, classified about a third of these injectors as “outright malware.”

Given that these kinds of ad injectors are often bundles with legitimate software — and desktop developers and download sites often see them as a relatively easy way to make a bit of extra money with their installers and download wrappers — it’s easy enough to install one of them inadvertently.

Apr 01 08:02

20 Reasons Why Hillary Would Wipe Her Server Clean

3. If she gave the Benghazi Committee electronic access to the emails, they could easily determine whether any had been edited or altered. It would have been extremely difficult to delete just some of the information in the emails. If she tried to doctor them, the system would likely show when it was last edited. Any edits after she left the State Department would be highly suspicious and the earlier versions could probably be retrieved anyway. So, it would be much easier to give out only hard copies, which can be easily doctored without detection and which would be difficult to search electronically.

Apr 01 07:12

What is the WINSXS directory in Windows 2008 and Windows Vista and why is it so large?

A commonly asked question among people looking at a Windows Vista or Windows Server 2008 installation is “why is the WinSxS folder so big?!” To answer that question I need to first describe componentization, and how components are managed in Windows Vista.

Webmaster's Commentary: 

So basically Microsoft designed these systems to eventually overflow their own disks to "encourage" the customer to buy a new machine!

Apr 01 07:07

US military creates fake online personas to influence Social Media

Mar 31 18:52

AT&T wants $139 a month, or your privacy, for superfast Internet

On Monday, Cupertino became the first West Coast city to offer AT&T’s GigaPower, which promises Internet speeds so fast customers can download 25 songs in less than a second.

But that speed comes at a price: $139 a month, or $110 for those who allow AT&T to monitor their browsing habits.

With its Internet Preferences program, AT&T hopes to turn customer data into extra revenue. The company plans to compile the information about online activity — what users are Googling, which sites they favor, and what products they click on — to sell higher-priced personalized advertisements.

Mar 31 16:01

Google ‘Thought Police’ to rank websites based on their “truth”

In the near future the pro Obama search giant plans to rank websites based on their so-called truthfulness

Mar 31 15:06

Two feds who investigated Silk Road accused of stealing from it, too

Two federal agents whose work helped to shut down the Silk Road online drug marketplace have been accused of stealing from the Darknet market during the investigation. The criminal complaint (PDF), unveiled today, reveals a remarkable level of corruption within the investigation into the drug marketplace, which hosted more than $200 million in transactions.

Government prosecutors have charged former DEA agent Carl Force and former Secret Service agent Shaun Bridges with wire fraud and money laundering. Force is also charged with stealing government property and "conflict of interest."

Mar 31 14:59

Facebook tracks logged-out users in ‘violation’ of EU law, study says

study commissioned by the Belgian Privacy Commission (BPC) has found that Facebook is tracking all users of its social networking site, even if they’ve opted out of tracking.

The research also found that logged out users, and people who don’t have an account at all, were having their Web movements tracked by Facebook through its use of social plugins, primarily the ‘Like’ button.

Mar 31 14:46

AD Networks Ripe for Abuse via Malvertising

Major websites have been identified as hosting malvertising, cutting a wide swathe across the Internet, including big news and entertainment sites, search engines and many more. The scale at which campaigns can ramp up is undeniable–if hackers so choose. Their profits from these campaigns too are not limited to click fraud, which until the last six to nine months has been the most damaging outcome of malvertising forays.

Almost all campaigns lead to exploit kits, and some kits such as Angler are rigged with ransomware that can force users to cough up a few hundred dollars via Bitcoin to regain control of their machines, or worse, unlock files encrypted by the malware. Invincea, for example, told Threatpost it has discovered that malvertising displaying on popular real estate resource Zillow.com was recently redirecting users to sites hosting Cryptowall ransomware.

Mar 31 11:31

FACEBOOK ACCUSED OF TRACKING ALL USERS EVEN IF THEY DELETE ACCOUNTS, ASK NEVER TO BE FOLLOWED

A new report claims that Facebook secretly installs tracking cookies on users’ computers, allowing them to follow users around the internet even after they’ve left the website, deleted their account and requested to be no longer followed.

Mar 31 08:25

What is Open Source Lab Equipment?

by Brian Berletic

One of the biggest obstacles to getting into biology, particularly genetics and synthetic biology, is the cost of equipment and expendables. A handful of large companies make the unique, precise equipment required for laboratories; and because supply and demand is small, the cost is very high.

Usually, this price barrier would make biology inaccessible to regular people, that was until personal manufacturing and open source hardware weighed in...

Mar 30 16:23

Black America’s State of Surveillance

Ten years ago, on Martin Luther King Jr.’s birthday, my mother, a former Black Panther, died from complications of sickle cell anemia. Weeks before she died, the FBI came knocking at our door, demanding that my mother testify in a secret trial proceeding against other former Panthers or face arrest. My mother, unable to walk, refused.

Mar 30 14:44

The FBI used to recommend encryption. Now they want to ban it

he FBI wants to make us all less safe. At least that’s the implication from FBI director Jim Comey’s push to ban unbreakable encryption and deliberately weaken everyone’s security. And it’s past time that the White House makes its position clear once and for all.

Comey was back before Congress this week - this time in front of the House Appropriations Committee - imploring Congressmen to pass a law that would force tech companies to create a backdoor in any phone or communications tool that uses encryption.

He also revealed the Obama administration may be crafting such a law right now. “One of the things that the administration is working on right now is what would a legislative response look like that would allow us … with court process to get access to that evidence”, he said.

Mar 30 14:38

GitHub suffers 'largest DDoS' attack in site's history

US coding website GitHub is fending off a DDoS onslaught focused on shutting down anticensorship tools.

Mar 30 14:37

The NSA had considered ceasing mass surveillance before Snowden

Associated Press sources claim that some sage bodies at the NSA felt that the incredible cost of dragnet snooping on innocent communications for the occasional mention of terror chat outweighed the benefits.

Officials were concerned that it cost too much money, was ineffective, unpopular and not a key tool in the fight against terrorism. Higher level officials, or presumably just more people, disagreed, and the system that we have come to know and be appalled by continued.

Mar 30 12:31

Your Location has been Shared 5,398 Times in Last 14 Days

Do you realize how often your smartphone is sharing your location data with various companies? It is more than 5000 times in just two weeks. That is little Shocking but True!

Mar 30 12:01

FEDS CHARGED WITH STEALING MONEY DURING SILKROAD INVESTIGATION

The charges against the agents could end up causing complications for the government’s case against Ross Ulbricht, also known as “Dread Pirate Roberts”, the Silk Road founder. Ulbricht was found guilty last year of aiding drug trafficking with his site. He is awaiting sentencing. As a result of the case against Ulbricht and others, the federal government seized bitcoin that it said at the time was valued at over $33 million.

Mar 30 11:49

Don’t See Evil

As it turns out, the national security state has been involved with Google from the very beginning: even in those fabled grad school days when Google was nothing but a research project, as investigative reporter Nafeez Ahmed has shown. Founder Sergey Brin’s work at Stanford University on what would later become Google received funding and even oversight from the CIA and the Pentagon through a program created to seed and incubate technology research that could later prove useful for information warfare.

Now, as discussed below, Google may even be actively taking part in that information warfare, especially the branch known as “perception management,” and in addition to its participation in mass surveillance.

Mar 30 09:47

New Pirate Bay Blockade Foiled by Simple Dns Trick

The world's newest blockade of The Pirate Bay has been thwarted in a matter of minutes. After a court in Spain ordered the country's ISPs to block the notorious site on Friday, users who tweaked their connections to use Google's DNS instead of the one provided by their service provider were back on the site in seconds.

Mar 30 09:41

ISRAEL TO BE ERASED FROM CYBERSPACE

A video released this week by the Anonymous hacker collective vowed to inflict an “Electronic Holocaust” on Israel.

The video shows a masked individual in a suit delivering a prepared statement, in which he announces April 7 as the date of a concerted attack on Israel’s online servers. “As we did many times, we will take down your servers, government websites, Israeli military websites, and Israeli institutions,” he said.

“We will erase you from cyberspace in our Electronic Holocaust.”

Mar 30 08:40

What is the Deep Web

A cool infographic about the other side of the Internet – the one that cannot be accessed via search engines

Mar 30 08:17

The US Government Wants Your Data (Almost) More Than Any Other Country–Combined

Be careful what you search for–the US government seems to be pretty hungry for knowledge on its residents’ interests.

Mar 30 08:08

Hidden Patterns of America Revealed

PBS is exploring the hidden patterns and rhythms that make America work, visualizing it in a series called America Revealed. Check out some of the stunning examples below to get a taste.

Internet distribution in the U.S.

Mar 30 07:08

Big Brother Is Here: Facebook Reveals Its Master Plan - Control All News Flow

In recent months, Facebook has been quietly holding talks with at least half a dozen media companies about hosting their content inside Facebook rather than making users tap a link to go to an external site. Given the enormity of what Facebook is trying to achieve - and since all of the leverage seems to reside with Facebook it is likely to succeed - this single company’s ability to control access to news and what is trending and deemed important by a huge section of humanity will be extraordinary.

Mar 29 12:42

Exclusive: Before leak, NSA mulled ending phone program

WASHINGTON (AP) — The National Security Agency considered abandoning its secret program to collect and store American calling records in the months before leaker Edward Snowden revealed the practice, current and former intelligence officials say, because some officials believed the costs outweighed the meager counterterrorism benefits.

The internal critics pointed out that the already high costs of vacuuming up and storing the "to and from" information from nearly every domestic landline call were rising, the system was not capturing most cellphone calls, and program was not central to unraveling terrorist plots, the officials said. They worried about public outrage if the program ever was revealed.

Mar 29 10:51

FreeRadioOnMyPhone.org

Today’s smartphones already have an FM receiver! This means that all listeners would have easy access to radio for the entertainment they love and information they need, but wireless carriers are dragging their feet and won’t activate the FM chips that are in every smartphone. FM radio doesn't require an internet connection and won't drain your phone's battery. We need your help to make sure carriers hear this message: We shouldn’t be forced to pay to stream local radio – especially in emergencies – it should be FREE and at our fingertips. TAKE ACTION today!

Mar 29 09:38

The U.S. Is Now Putting Bounties On The Heads of Hackers

SM Gibson
Activist Post

Russian hacker Evgeniy Bogachev was indicted ten months ago in Pittsburgh, Pennsylvania on multiple federal charges relating to cyber criminal activity. The only problem is that the Department of Justice has no idea where he is.

Since then, the DOJ has employed an age-old technique that they are hoping will entice someone to turn in the 31-year-old to US authorities. They have placed a hefty bounty on his head...

Mar 29 09:00

IRS Scandal Deja Vu: Hillary Clinton's Email Server "Wiped Clean"

If, as one claims, one is innocent of i) using a personal email account to send out confidential information and/or to take advantage of one's political position to abuse opponents and ii) deleting said confidential emails against government regulations, what would one do when faced with a government subpoena demand? If one is the IRS' Lois Lerner, one would claim, against subsequently revealed facts, that a hardware error led to a permanent loss of all demanded emails, even though by email protocol definition, said emails are always stored on at least one off-site server. Or, if one is Hillary Clinton, one would just format the entire server.

Mar 29 08:15

IT Independence is National Security

Ulson Gunnar
Activist Post

The NSA’s “Equation Group” is apparently behind the infection with malware of hard drive firmware on computers used by nations considered “enemies” by the United States. The installation of the malware is believed to have required access to trade secrets of IT manufacturers as well as physical access to the soon-to-be infected computers.

Popular Science in their article "The World’s Most Sophisticated Malware Ever Infects Hard Drive Firmware" suggests that the NSA intercepted computers in transit through global logistical chains.

However, a simpler and more logical explanation remains, though it is one manufacturers vehemently deny; that the NSA had/has direct access to the factory floors of several IT giants. These include Western Digital Corporation, Seagate Technology, Toshiba Corporation, IBM, Micron Technology and Samsung Electronics...

Mar 29 07:43

US government takes $67 million from Kim Dotcom

Megaupload streaming service mogul Kim Dotcom has just been slapped with a civil penalty from the US government. The lawsuit will cost him $67 million worth of assets, including cars, property and luxury goods.

Mar 29 04:43

Seven People Injured In A Shootout At A Residence In Florida

Shooting leaves 7 wounded early Saturday inside to party on spring break in Florida.

Seven people participating in a college party were injured, three of them seriously, in a shooting registered this morning in a residence of Panama City Beach, in northwest Florida, local authorities said.

The Sheriff's Office Bay County confirmed the arrest of the main suspect, 22-year Jamichel David Daniels, Alabama, who was arrested for attempted murder and six charges against him.

http://whatisusa.info/seven-people-injured-in-a-shootout-at-a-residenc...

Mar 29 04:32

Train Crash In Los Angeles Leaves 21 People Injured

Two of the injured were in critical condition, one was in the train and the other inside the vehicle

A light rail two cars collided Saturday in downtown Los Angeles. At least 21 people were injured, officials said, and one of them is in serious condition.

http://whatisusa.info/train-crash-in-los-angeles-leaves-21-people-inju...

Mar 28 11:29

Leave Facebook if you don't want to be spied on, warns EU

The European Commission has warned EU citizens that they should close theirFacebook accounts if they want to keep information private from US security services, finding that current Safe Harbour legislation does not protect citizen’s data.

Mar 28 10:06

Congressional Rep. John Carter Discovers Encryption; Worries It May One Day Be Used On Computers To Protect Your Data

Here's a suggestion: if you're a Congressional Representative whose job it is to regulate all sorts of important things, and you state in a hearing "I don't know anything about this stuff" before spouting off on your crazy opinions about how something must be done... maybe, just maybe educate yourself before confirming to the world that you're ignorant of the very thing you're regulating. We famously saw this during the SOPA debate, where Representatives seemed proud of their own ignorance. As we noted at the time, it's simply not okay for Congress to be proud of their own ignorance of technology, especially when they're in charge of regulating it. But things have not changed all that much apparently.

Mar 28 08:05

Government Secrecy At All-Time High

US Supreme Court Justice Brandeis said:

Publicity is justly commended as a remedy for social and industrial diseases. Sunlight is said to be the best of disinfectants; electric light the most efficient policeman.

But there’s no longer much sunlight to disinfect the corruption of the government or the powers-that-be.

More and more commonly, the government prosecutes cases based upon “secret evidence” that they don’t show to the defendant … or sometimes even the judge hearing the case.

As just one example, government is “laundering” information gained through mass surveillance through other agencies, with an agreement that the agencies will “recreate” the evidence in a “parallel construction” … so the original source of the evidence is kept secret from the defendant, defense attorneys and the judge. A former top NSA official says that this is the opposite of following the Fourth Amendment, but is a “totalitarian process” which shows that we’re in a “police state”.

Mar 28 07:30

Visions of a New CISPA

The bill specifically authorizes, if not downright encourages, companies to monitor the activities of their customers. This includes e-mail and other communications data.

Mar 28 07:23

Congress Wants to Eliminate Protections for Some of Your Most Sensitive Records

A November report from the Pew Research Center found that 82 percent of Americans consider location information gathered by their phones to be “sensitive” or “very sensitive,” and 75 percent feel that way about the numbers they have called or texted. But a forthcoming bill from Congress could dramatically reduce the security of that information—amid a number of high-profile data breaches.

The threat comes from a bill—scheduled to be introduced in the House this week—called (incongruously) the “Data Security and Breach Notification Act of 2015.” As I explained in testimony before the House of Representatives last week, counter to its name, this piece of legislation would actually eliminate key legal protections for phone, cable, and satellite records.

Mar 28 07:20

AT&T’s plan to watch your Web browsing—and what you can do about it

The personalized offers don't just appear on websites, they also come "via e-mail or through direct mail," AT&T says. "If you search for concert tickets, you may receive offers and ads related to restaurants near the concert venue. After you browse hotels in Miami, you may be offered discounts for rental cars there. If you are exploring a new home appliance at one retailer, you may be presented with similar appliance options from other retailers... if you search for a car online, you may receive an e-mail notifying you of a local dealership's sale."

You can't opt out from AT&T's e-mail spam without paying the higher price, so worried customers should make sure not to give AT&T a preferred e-mail address.

Mar 27 16:41

Trey Gowdy: Hillary Clinton wiped her server clean

Hillary Clinton wiped “clean” the private server housing emails from her tenure as secretary of state, the chairman of the House committee investigating the 2012 terrorist attacks in Benghazi said Friday.

“While it is not clear precisely when Secretary Clinton decided to permanently delete all emails from her server, it appears she made the decision after October 28, 2014, when the Department of State for the first time asked the Secretary to return her public record to the Department,” Rep. Trey Gowdy (R-S.C.), chairman of the Select Committee on Benghazi, said in a statement.

Mar 27 16:33

Special ops troops using flawed intel software

Special operations troops heading to war zones are asking for commercial intelligence analysis software they say will help their missions. But their requests are languishing, and they are being ordered to use a flawed, in-house system preferred by the Pentagon, according to government records and interviews.

Over the last four months, six Army special operations units about to be deployed into Afghanistan, Iraq and other hostile environments have requested intelligence software made by Palantir, a Silicon Valley company that has synthesized data for the CIA, the Navy SEALs and the country's largest banks, among other government and private entities.

But just two of the requests have been approved, in both cases by the Army after members of Congress intervened with senior military leaders. Four other requests made through U.S. Army Special Operations Command in Fort Bragg, North Carolina have not been granted.

Mar 27 16:01

YouTube's experimental 4K, 60 frames per second video will crush your computer

My editor, PCWorld's resident graphics card junkie, tried watching the 4K videos on a system with Nvidia's magical Titan X GPU and an octa-core Core i7 chip hooked up to a 4K G-Sync monitor. You can't get much better than that, but even with all that hot hardware his 25Mbps Internet connection meant the PC choked on the download.

Mar 27 12:52

PRIVATE EMAILS REVEAL EX-CLINTON AIDE’S SECRET SPY NETWORK

Starting weeks before Islamic militants attacked the U.S. diplomatic outpost in Benghazi, Libya, longtime Clinton family confidante Sidney Blumenthal supplied intelligence to then Secretary of State Hillary Clinton gathered by a secret network that included a former CIA clandestine service officer, according to hacked emails from Blumenthal’s account. The emails, which were posted on the internet in 2013, also show that Blumenthal and another close Clinton associate discussed contracting with a retired Army special operations commander to put operatives on the ground near the Libya-Tunisia border while Libya’s civil war raged in 2011.

Mar 27 11:09

DEFENSE DEPARTMENT KEEPS LOSING 'SENSITIVE' EXPLOSIVES GEAR, THEN FINDING IT FOR SALE ON EBAY

The Pentagon may not know where some very sensitive equipment has disappeared to, but a variety of private resellers seem to have some idea where it might be found. A leaked US Naval Criminal Investigative Service (NCIS) document obtained by The Intercept details the agency's inability to keep track of its explosives-detecting equipment, bequeathed to it by the Defense Department's Joint Improvised Explosive Device Defeat Organization (JIEDDO).

Mar 27 10:11

AntiWar.com and WeAreChange Under Attack

WEBMASTER ADDITION: WRH is also being interfered with, with Google delisting "All Wars Are Bankers' Wars" in Europe, and outright refusing membership in AdSense, which is weird because YouTube has been running advertising on my YouTube videos, for which I do not get paid because I do not have an AdSense account!

Mar 27 10:07

What Prevented Smart Meter Opt-outs in Pennsylvania?

Catherine J. Frompovich
Activist Post

Back in the summer of 2014, something very calculated apparently happened in the Pennsylvania state legislature that ought to be investigated by the Commonwealth’s Attorney General and the Pennsylvania State Ethics Commission. What happened was a crime against the democratic principles of governance, i.e., deliberately dis-allowing constituents, voters—and citizens in general—to exercise their right of redress and input regarding issues that affect them, their lives, and the safety of their possessions. The particular issue at hand was Opt-out provisions from Smart Meters, which was not originally written into PA Law 129 in 2008, but in committee ‘strong-armed’ into “sine die” by State Representative and Committee Chair, Robert W. Godshall...

Mar 27 09:55

Facebook and the military industrial surveillance complex

Earlier this week the European Commission’s attorney Bernhard Schima told the Court of Justice of the European Union (CJEU) the US-EU Safe Harbor framework does not work.

The framework process supposedly protects personal data. In 2013, however, it was discovered the NSA and its British counterpart — the GCHQ, short for Government Communications Headquarters — had siphoned off data transfers by tapping directly into under sea cable networks.

Mar 27 09:14

British users can sue Google in UK over “secret tracking”

The UK Court of Appeal's ruling clears the way for the group known as "Safari Users Against Google's Secret Tracking" to proceed with its claim for compensation. The group alleges, "Google deliberately undermined protections on the Safari browser so that they could track users' internet usage and to provide personally tailored advertising based on the sites previously visited."

The claimants in the original High Court case said they suffered "by reason of the fact that the information collected from their devices was used to generate advertisements which were displayed on their screens. These were targeted to their apparent interests (as deduced from the information collected from the devices they used). The advertisements that they saw disclosed information about themselves. This was, or might have been, disclosed also to other persons who either had viewed, or might have viewed, these same advertisements on the screen of each Claimant's device."

Mar 27 09:08

27 March: Problems at Facebook

Facebook is having issues since 10:25 AM EDT. Are you also affected? Leave a message in the comments.

Webmaster's Commentary: 

Latest NSA malware had a bug? :)

Mar 27 08:24

U.S. government allows itself to copy all your old emails

As the government continues to widen its electronic surveillance in the ongoing fight against "terrorism," Americans are witnessing the slow, steady erosion of their constitutional right to privacy embodied within the Constitution's Fourth Amendment.

As reported by McClatchy Papers, the federal government now has the authority -- somehow -- to read emails that are more than six months old, and without a court-issued warrant. So, if ever there was an incentive to clear out your inbox and your trash, this is certainly it.

Mar 27 08:19

NSA and Facebook Work Together

Earlier this week the European Commission’s attorney Bernhard Schima told the Court of Justice of the European Union (CJEU) the US-EU Safe Harbor framework does not work.

The framework process supposedly protects personal data. In 2013, however, it was discovered the NSA and its British counterpart — the GCHQ, short for Government Communications Headquarters — had siphoned off data transfers by tapping directly into under sea cable networks.

In fact, according to a lawyer representing the Austrian government before the CJEU, Safe Harbor is better suited for pirates than the protection of data of EU citizens. In other words, the system was designed to be hijacked by the NSA and GCHQ.

Mar 27 07:56

President TripAdvisor: “We Compete With Google”

The American company TripAdvisor Inc. 14 years of the little-known site with tips for travelers and feedback into a business that combines multiple services with annual revenues of more than $ 944 million. The site came up with Harvard graduate, the programmer Stephen Kaufer – today he is the president and CEO of TripAdvisor Inc.

http://whatisusa.info/president-tripadvisor-we-compete-with-google/

Mar 27 04:10

It Transmits Live Video From Your Ios Periscope

Twittter acquired Periscope 100 million.

The service live broadcast of Periscope, acquired by Twitter in January for $ 100 million, already has an official app for iOS devices.

Integrated with the micro blogging platform, the service allows streaming from a smartphone looking stomp on a segment initiated by Meerkat, an opponent who managed to grab the attention of users by enabling the creation of live video from an iPhone.

http://whatisusa.info/it-transmits-live-video-from-your-ios-periscope/

Mar 27 04:01

Internships With The National Park Service In Historic Places

The Foundation shall elect twenty undergraduate and graduate students to work with the team of NPS.

Hispanic Access Foundation, in cooperation with the National Park Service (NPS) launched the Latin Legacy Program: Internship Program 2015, known in English as the Latino Heritage Internship Program, or LHIP.

This professional internship program has been designed by the NPS in order to prepare the next generation of protecting our public lands and historic sites, the availability of these, and the participation of the Latino community in conservation.

http://whatisusa.info/internships-with-the-national-park-service-in-hi...

Mar 27 03:26

President TripAdvisor: “We Compete With Google”

The American company TripAdvisor Inc. 14 years of the little-known site with tips for travelers and feedback into a business that combines multiple services with annual revenues of more than $ 944 million. The site came up with Harvard graduate, the programmer Stephen Kaufer – today he is the president and CEO of TripAdvisor Inc. In his interview with media, he told company’s plans for the Russian market, and Uber partnership with Facebook and the scheme of earnings TripAdvisor.

http://whatisusa.info/president-tripadvisor-we-compete-with-google/

Mar 26 16:04

Hackers Use an Android App for Sex Extortion

In a report provided to The New York Times on Monday, Trend Micro’s researchers detailed a new Android app that criminals are using to pressure their victims into paying blackmail fees.

Researchers said the extortionists first lure their victims through a number of online chatting tools like Skype, or KakaoTalk, an Asian chat service. Once the trap is set, they feign audio or messaging problems to persuade their target to download one of four malicious Android apps that can siphon off a phone number, stored passwords and address books.

In some cases, the Android app turned the victim’s device into a recording device. It also intercepted incoming and outgoing telephone calls and text messages.

Mar 26 15:51

EU: Don’t use Facebook if you’re worried about NSA snooping

The best way for preventing such spying operations, for anyone worried about NSA snooping, would be to stop using certain U.S.-based online services, including Facebook, at least until they open data centers in Europe.

“You might consider closing your Facebook account, if you have one,” European Commission attorney Bernhard Schima told attorney-general Yves Bot at the CJEU on Tuesday, suggesting that personal data transferred from Europe to the U.S. isn’t necessarily protected under the U.S.-EU pact, even though the Framework should ensure data privacy and security.

Mar 26 15:22

Special ops troops using flawed intel software

Special operations troops heading to war zones are asking for commercial intelligence analysis software they say will help their missions. But their requests are languishing, and they are being ordered to use a flawed, in-house system preferred by the Pentagon, according to government records and interviews.

Mar 26 11:38

2007 NBC News Report Predicts We’ll All Be Microchipped, Tracked, and Traced Everywhere We Go by 2017

So in just two years’ time, we’re all set to be microchipped, iris scanned, facially recognized, and fingerprinted everywhere we go for just about any reason including buying stuff just like in the movie Minority Report.

Isn’t it clear yet we are all being herded like cattle in one big technocratic open-air prison?

Mar 26 11:35

Wall Street Ends Lower; Investors On The Lookout

Stocks on Wall Street ended lower on Tuesday for a second day, after investors weigh up the news of companies and the latest report on consumer prices.

Indications that the dollar could resume its recent rally also unnerved investors.

The construction showed a different trend, with a close higher after sales of new US homes rose in February to its highest pace in seven years.

http://whatisusa.info/wall-street-ends-lower-investors-on-the-lookout/

Mar 26 11:27

US Stock Market Remains Negative Trend

Shares on the stock exchange in the United States remained lower on Thursday half-day operations, the fourth day the markets recorded negative behavior.

Casualties were more pronounced in European and Asian markets.

The Dow Jones industrial average fell 21 points (0.1%) to stand at 17,696 units at 11:45 am New York.

http://whatisusa.info/us-stock-market-remains-negative-trend/

SHARE THIS ARTICLE WITH YOUR SOCIAL MEDIA