May 18 07:23

NSA Chief Threatens War Against Cyber Attacks

"Abusive language being turned into actual abuse of humanity" - David Swanson

May 17 15:47

Flashback: STOP SOPA

May 17 15:43

SOPA, anyone? Entertainment Lobby Uses Hearing on Domain Names to Revive Awful Censorship Idea

Amidst a discussion of new top-level domain names (such as “.sucks”), a lawyer representing the Motion Picture Association of America (MPAA), the Recording Industry Association of America (RIAA), and other groups told the House Judiciary Committee’s Internet subcommittee that ICANN should force the companies that register domain names to suspend domains based on accusations of copyright infringement.

If this sounds familiar, that’s probably because it’s exactly the sort of system that the disastrous SOPA bill would have created—one where entire websites can be forced to go dark, without a day in court, because some material on the site is accused of infringing a copyright.

May 17 15:40

Apple Watch Vulnerability Lets Thieves Use Apple Pay Without Your PIN

No, your Apple Watch isn't totally hacker-proof, despite what some have claimed.

The basic idea behind its security is that the Watch can detect when it is removed from a wrist, and automatically requires a passcode to be entered if removed (if one is set up, which is a requirement for using Apple Pay). So we set out to trick the sensor into thinking it's still on a wrist while removing it. Taking that a step further, we wanted to see if we could use this "exploit" to bring up Apple Pay and make purchases with someone else's card.

We'll cut right to the chase—we got it to work without much effort. Here's how we did it, and what you can do to protect yourself if someone uses this technique on you.

May 17 15:35

MenuetOS, an operating system written entirely in assembly, hits 1.0

MenuetOS, a GUI-toting, x86-based operating system written entirely in assembly language, has hit version 1.0.

The milestone comes after almost a decade and a half of development for the operating system, which despite having an impressive graphical user interface is still compact enough to fit on a floppy disk (assuming you can find one).

May 17 15:12

Vulnerability In Car Keyless Entry Systems Allows Anyone To Open And Steal Your Vehicle

Hands-free car entry systems, which typically unlock car doors without requiring the pushing of any buttons when owners are close to their vehicles, provide great convenience. Unfortunately, however, people have begun marketing for sale devices that allow criminals to exploit a technological vulnerability in these systems, and crooks have been seen using “mystery devices” to open cars equipped with hands-free car entry systems. Once in a car, crooks can steal whatever is in it, and, while most of the recent issue has been just that, they can also potentially connect a device to the vehicle’s diagnostic port in an effort to download sufficient information in order to create a key to drive and steal the vehicle, a problem about which the British police are now warning.

Anyone wishing to protect the contents of his or her car from being taken, or perhaps the vehicle itself from being stolen, might want to take action.

May 17 15:05

Free home heating offered by e-Radiators

The e-Radiators stored in the test homes are being used to run complex calculations and other computer-intensive jobs for an array of companies and research institutions. Nerdalize will pay the bill for powering the radiators, allowing Eneco customers to stay warm for free. Nerdalize say that the scheme is also environmentally friendly, because energy is effectively used twice in the new system.

"The people's benefit is actually quite simple, what we do is we reimburse the electricity the server uses, and that we can do because of the computer clients on the other side, and in that way home owners actually get heating for free and compute users don't have to pay for the overhead of the data center, so it's pretty much a win-win situation," said Leupe.

Great idea.

May 17 15:01

Feds Say That Banned Researcher Commandeered a Plane

Chris Roberts, a security researcher with One World Labs, told the FBI agent during an interview in February that he had hacked the in-flight entertainment system, or IFE, on an airplane and overwrote code on the plane’s Thrust Management Computer while aboard the flight. He was able to issue a climb command and make the plane briefly change course, the document states.

“He stated that he thereby caused one of the airplane engines to climb resulting in a lateral or sideways movement of the plane during one of these flights,” FBI Special Agent Mark Hurley wrote in his warrant application (.pdf). “He also stated that he used Vortex software after comprising/exploiting or ‘hacking’ the airplane’s networks. He used the software to monitor traffic from the cockpit system.”

May 17 14:58


Developers considering adding a torrent search engine to their portfolio should proceed with caution, especially if they value their income streams. Following a complaint from the MPAA one developer is now facing a six month wait for PayPal to unfreeze thousands in funds, the vast majority related to other projects.

May 17 14:57

UK government quietly rewrites hacking laws to give GCHQ immunity

The UK government has quietly passed new legislation that exempts GCHQ, police, and other intelligence officers from prosecution for hacking into computers and mobile phones.

While major or controversial legislative changes usually go through normal parliamentary process (i.e. democratic debate) before being passed into law, in this case an amendment to the Computer Misuse Act was snuck in under the radar as secondary legislation. According to Privacy International, "It appears no regulators, commissioners responsible for overseeing the intelligence agencies, the Information Commissioner's Office, industry, NGOs or the public were notified or consulted about the proposed legislative changes... There was no public debate."

May 17 08:48

Court keeps cellphone network ‘kill switch’ a secret

The fuss revolves around a policy called Standard Operating Procedure 303, which is “a shutdown and restoration process for use by commercial and private wireless networks in the event of a national crisis,” according to the IT Law Wiki. The Electronic Privacy Information Center (EPIC) brought the suit after San Francisco officials blocked cellphone service to prevent a protest in 2011.

Webmaster's Commentary: 

This is a violation of the First Amendment right to Freedom of Speech and Freedom to Assemble. There is no law that overrides those rights. There cannot be, because under the Supreme Court Decision Marbury vs Madison, laws repugnant to the Constitution are automatically null and void. Thus, some official in San Francisco pulled the plug on the cell phone system just because they wanted to. By doing so, along with violation of one of the most basic rights Americans possess, they placed those Americans in emergency situations at risk from the loss of needed communications, plus caused untold economic harm to those Americans using their cell phones for business purposes during the outage. The responsible party needs to be removed from office and made PERSONALLY financially liable for the harm caused to life and property!

May 16 20:48

Security researcher tells FBI he took control of a commercial airliner - even making it fly sideways - by hacking into the entertainment system

A prominent hacker and security researcher who was kicked off a United Airlines flight last month had previously admitted to the FBI that he had taken control of a plane and made it fly sideways.

Chris Roberts told a special agent earlier this year that he had repeatedly hacked planes' in-flight entertainment systems while aboard the aircraft, a search warrant application by the FBI states.

In one case, he also reportedly claimed to have overwritten the plane's Thrust Management Computer code, allowing him to issue a climb command and make the plane serve sideways.

Following the interviews with the FBI agent on February 13 and 23 and March 5 - and another in April - Roberts had two of his laptops confiscated, along with several hard drives and USB sticks.

May 16 19:17

This Jet Engine was made by a 3D printer

Engineers have made a fully-functional jet engine using a 3D printer

One of the most exciting technologies to emerge in recent time, 3D printing has a become a popular but limited method of manufacturing - until now. Engineers at GE Aviation’s Additive Development Center in Cincinnati have made the world’s 3D printed first jet engine using one of the devices.

May 16 17:54

More than 1,000 plaintiffs file lawsuit to keep Japan out of TPP

More than 1,000 people filed a lawsuit against the government on Friday, seeking to halt Japan’s involvement in 12-country talks on a Pacific Rim free trade agreement, which they called “unconstitutional.” A total of 1,063 plaintiffs, including lawmakers, claimed in the case brought to the Tokyo District Court that the proposed Trans-Pacific Partnership would undermine their basic human rights under the Constitution.

May 15 13:59

What law says the text of the TPP must remain secret?

By Jon Rappoport

To the US Congress: reveal the contents of the TPP now

It seems like a case of mass hypnosis. People claiming they can’t say what’s in the TPP trade agreement. And mainstream media accept this premise.

“That’s right. Congress must stay silent.”

Pop quiz: who says the text of the TPP must remain secret?

Under what authority?

Members of Congress are scuttling around like weasels, claiming they can’t disclose what’s in this far-reaching, 12-nation trade treaty...

May 15 13:55

FBI’s covert air force of surveillance aircraft shrouded in secrecy and hidden in shell corporations

As reported by ARS Technica, as tensions surrounding the recent protests and violence in Baltimore began to subside, a small squadron of innocuous-looking aircraft circled overhead, keeping watch on the neighborhoods most affected by rioting and other acts.

May 15 13:30

NSA shares raw intelligence including Americans' data with Israel

The National Security Agency routinely shares raw intelligence data with Israel without first sifting it to remove information about US citizens, a top-secret document provided to the Guardian by whistleblower Edward Snowden reveals.

Details of the intelligence-sharing agreement are laid out in a memorandum of understanding between the NSA and its Israeli counterpart that shows the US government handed over intercepted communications likely to contain phone calls and emails of American citizens. The agreement places no legally binding limits on the use of the data by the Israelis.

May 15 12:32


The average human’s attention span is… oh look, a bird! According to scientists, the age of smartphones has left humans with such a short attention span even a goldfish can hold a thought for longer.

May 15 09:11

Signed into Law: Florida Bill Expands Limits on Drone Surveillance

By Michael Maharrey

Florida Gov. Rick Scott signed signed a bill into law yesterday that takes a second step against mass surveillance, expanding current limitations on the use of drones in the Sunshine State that will have a practical impact on the federal surveillance state...

May 15 09:02


“At first I couldn’t believe it, because Rubi Rivlin is the symbol of Israelism. But when we kept searching, we found that when my name is typed into Google it says I was born in Palestine, and the same is written about famous actress Natalie Portman, the Oscar winner who was also born in Jerusalem.”

May 15 08:34

Canadian Court to the Entire World: No Links For You!

The Supreme Court of British Columbia has ordered Google to remove entire domains from its search results—a decision that could have enormous global implications on free expression. This is the latest of several instances of courts exercising dangerous jurisdictional overreach, where they have applied local laws to remove content on the Internet. Not only did the Court order Google to delete the site from its search results on the Canadian “” domain, it went even further by demanding it censor the domain worldwide by deleting every instance of the site from its global index.

May 15 05:57


The US Surveillance State is scrambling to save itself in the wake of a federal ruling that declared the bulk collection of metadata under a provision of the Patriot Act, which is set to expire on June 1, illegal . But the reason for so many ‘experts’ touting the benefits of surveillance, goes beyond the basic desire to spy on Americans. Because, as you might imagine, “terrorism” is big business.

May 15 05:52


According to a recent survey, a majority of Americans are totally confused about cloud computing. The survey was conducted by Wakefield Research for Citrix, and included over 1000 participants. The results of the study showed that roughly 51 percent of those questioned believed that rain clouds caused interference with devices that were connected to “the cloud.”

May 15 05:50


CAREFUL WHAT YOU leave in your lockers, high school students and gym-goers. An invasion of 3-D printed robots may be coming, capable of popping one of the world’s most ubiquitous brands of combination locks in as little as half a minute.

May 14 16:06

Making the Leap from Consumer to Producer

By Brian Berletic

Consuming seems like a natural thing to many. We are born and raised in increasingly consumerist societies no matter where we live. The idea of "doing something yourself" strikes some as a shabby alternative to the super-sleek status symbols and ultra-convenient prepackaged everything waiting on the shelves for us.

However, at the same time, perhaps paradoxically, many of us feel there is something fundamentally wrong with this sort of society and in particular the dependency and sometimes outright laziness and ignorance bred by consumerism...

May 14 15:49

Minority Report: Your Iris Can Now Be Scanned From Across the Room

Biometrics has been coming for a long time, but as it is starting to be adopted everywhere, superficially for consumer verification and security purposes, the envelope is getting pushed as more invasive techniques are being developed and put in the hands of government, law enforcement agencies, and corporations.

Now someone has invented “long range” iris scans. In other words, they can literally scan your iris and identify you from across the room.

(read more)

May 14 10:37


The American crisis is just around the corner. Wall Street's bankers have finally triumphed. Financial vultures, in their rampage for wealth, power, and world control have nearly completely destroyed an imperfect but incredibly free and promising American society. What must we do if we are to survive individually and as a free people?

May 14 09:59

exas veteran imprisoned for 35 days for refusing to surrender his Facebook password; fed donuts and insulin injections

Texas entrepreneur and U.S. Army veteran Jeremy Alcede has been imprisoned for 35 days (and counting) over his refusal to turn over his Facebook account password as part of a business bankruptcy court order. Federal bankruptcy Judge Jeff Bohm of the Southern District of Texas ordered Alcede thrown in jail for an indefinite period of time until he surrenders his Facebook account password, potentially creating a dangerous precedent that threatens the privacy and control of all our social media accounts.

According to reports from those in direct contact with Alcede, he was fed donuts and processed cereal by the prison staff, causing his blood sugar to experience wild clinical swings. In response, the medical staff at the facility began administering insulin shots to control his blood sugar.

May 14 09:00

NSA Chief: We May Retaliate for Cyberattacks With Real Weapons

The head of the US National Security Agency has clarified that the United States may use physical retaliation against the perpetrators of a cyberattack.

May 14 08:09

China’s Secret Space Weapons Targeting U.S. : “Soon Every Satellite Will Be at Risk”

A new Pentagon report to Congress claims that China is pursuing a secret space weapons program to disable U.S. satellites, GPS and communication systems.

The United States is concerned that the Chinese regime’s “continued development of destructive space technologies” is a “threat to all peaceful space-faring nations,” states the Pentagon’s 2015 annual report to Congress on the Chinese regime’s military and security developments.

The report is particularly concerned with China’s use of directed-energy weapons, satellite jammers and other technology that can be used to take out the communications grid and weaken U.S. military positions.


May 14 07:30

Almost Half Of Brits View Wearable Tech As Treat To Privacy

Software programmers are being pushed to teach customers about wearable technologies in order to facilitate consumption, as a result of the latest research which shows that almost 50% of Brits believe that the tech presents a threat to their privacy.

May 14 07:18

House Votes to End N.S.A.’s Bulk Phone Data Collection

The House on Wednesday overwhelmingly approved legislation to end the federal government’s bulk collection of phone records, exerting enormous pressure on Senator Mitch McConnell of Kentucky, the Senate majority leader, who insists that dragnet sweeps continue in defiance of many of those in his Republican Party.

Under the bipartisan bill, which passed 338 to 88, the Patriot Act would be changed to prohibit bulk collection by the National Security Agency of metadata charting telephone calls made by Americans. However, while the House version of the bill would take the government out of the collection business, it would not deny it access to the information. It would be in the hands of the private sector — almost certainly telecommunications companies like AT&T, Verizon and Sprint, which already keep the records for billing purposes and hold on to them from 18 months to five years.

Webmaster's Commentary: 

In other words, your privacy is still being invaded; they just changed the signs on the doors.

May 14 07:09

Hackers are draining bank accounts via the Starbucks app

hieves are stealing money from people's credit cards, bank and PayPal accounts -- by first tapping into their Starbucks mobile app.

May 13 14:43

Fight for the Future

Congress is hours away from renewing the PATRIOT Act and allowing the NSA to continue mass spying on everyone for years.
Tell them: “End NSA mass spying! Overturn the PATRIOT Act.”

May 13 14:30

Docs: TSA Agents Laugh at Groping While Travelers Have “Breasts, Penis, Butt Crack” Fondled

The whole charade of preemptively screening every passenger – and carrying out retribution against those that object and speak out – is not supporting “national security,” it is swiftly turning America into a banana republic with goons at the gates.

The documents were uncovered by Judicial Watch, the accountability group who last year filed a lawsuit for more information on alleged sexual assaults at the hands of TSA.

July 5, 2013, “TSA Contact Center Record,” O’Hare Airport:

The female TSO then proceeded to roughly feel of [sic] her breast including her nipples. The TSO didn’t go under her arms or along her sides. She indicated that she did not receive a proper pat down. The search was limited to her breast…


May 13 14:29

Former U.S. Government Official: U.S. Is ALREADY at War with China and Russia

Former White House official Dr. Philippa Malmgren – former presidential adviser and member of the U.S. President’s Working Group on Financial Markets – said last December that the United States is already at war with China and Russia:

I was recently at a meeting with a lot of very senior people from the defense community, and their view is that we are already in a nose-to-nose confrontation (war) with China and Russia. But these (wars) are being conducted through cyberspace rather than through traditional conventional weapons.

May 13 14:14

51% of Americans believe storms affect cloud computing

A study has found that a large percentage of Americans are a little foggy on what cloud computing actually is.

A market survey (PDF) by Wakefield Research, for cloud computing firm Citrix, asked "1006 nationally representative American adults, aged 18 and older" what they know about the cloud. The results were, well, unsurprising really, when you consider how confusing tech terms can be for the non-tech-minded.

The biggest chunk of respondents — 29 per cent — thought that "the cloud" is something to do with meteorology, while only 16 per cent first thought of computing. A whopping 51 per cent believe that a storm could play havoc with cloud computing.

May 13 14:06

The secret corporate takeover hidden in the TPP

Corporations would be able to overturn laws and regulations that protect us NEW YORK (Project Syndicate) — The United States and the world are engaged in a great debate about new trade agreements. Such pacts used to be called “free-trade agreements”; in fact, they were managed trade agreements, tailored to corporate interests, largely in the U.S. and the European Union. Today, such deals are more often referred to as “partnerships,” as in the Trans-Pacific Partnership (TPP).

May 13 14:05

“The biggest company you’ve never heard of” acquired by major military contractor you’ve heard of

Last week, one of the biggest names in military-intelligence contracting, SAIC (Science Applications International Corporation) acquired “the biggest [military-intelligence] company you’ve never heard of,” Scitor, for $790 million. That quote about Scitor was told by a former NSA officer to investigative journalist Tim Shorrock, author of the definitive book on the military-intelligence complex, “Spies For Hire: The Secret World of Intelligence Outsourcing”. In the press release, SAIC describes its newest acquisition as “a leading national security provider focused on classified US Air Force and intelligence community programs,” with annual revenues of $600 million.

May 13 10:50

Are Parents Another Threat to Children's Privacy?

NYU Researchers Demonstrate that Children's Photos on Facebook and Instagram Can Be Used to Easily Trace Personal Information.

Most parents go to great lengths to keep their children safe online—but what if parents themselves, through the simple act of posting photos to Facebook and Instagram, are putting their own kids at risk every day?...

May 13 10:32

Former Israeli premier Barak joins biometric start-up

Former Israeli Prime Minister Ehud Barak has joined the board of a local startup that specializes in biometric identification technology.

FST Biometrics announced Monday that it had received a $15 million investment from GMF Capital, a firm led by Swiss investor Gary Fegel, and that Barak would serve as GMF's representative on the company board.

FST says it uses a combination of facial recognition and behavioral analytics in its products, and that its clients include governments and corporations. Its founder and chief executive is Aharon Zeevi Farkash, a former head of Israeli military intelligence.

Barak, a former Israeli military chief, served as prime minister from 1999 to 2001. More recently, he served as defense minister before retiring from politics in 2013.

May 13 08:14

Surveilling and censoring the internet in Pakistan

A new bill before parliament could severely limit internet freedom and raises concerns the state is legalising censorship and mass digital surveillance, rights activists say.

May 13 07:48

Bigger than Heartbleed, 'Venom' security vulnerability threatens most datacenters

Move over, Heartbleed. There's a new catastrophic vulnerability in town.

A security research firm is warning that a new bug could allow a hacker to take over vast portions of a datacenter -- from within.

The zero-day vulnerability lies in a legacy common component in widely-used virtualization software, allowing a hacker to infiltrate potentially every machine across a datacenter's network.

May 13 07:47


A technical fault at the internet hub AMS-IX in Amsterdam caused online problems in several places in the Netherlands for about an hour Wednesday afternoon. The internet hub, one of the most used internet exchanges in the world, announced they resolved the problem shortly after 1:30 p.m.

The cause of the problem, which took hold around 12:00 p.m. was not revealed. Not all of the internet traffic in the Netherlands was affected, as the hub makes use of 11 data centers, a spokesman for the internet hub told

Breakdowns in internet traffic at AMS-IX are not common, the hub said. “In any case, it never happened in the three years I’ve worked here,” a spokesman told newspaper NRC. A cyber attack was not initially ruled out, but the probable cause is human error.

May 12 21:50

Israel sentences Palestinian to 9 months for Facebook posts

The former secretary-general of Fatah in Jerusalem has been sentenced to nine months in an Israeli prison for activity on social media.

May 12 19:41

UK government will bring back Snooper’s Charter; Snowden warns of dangers

However, speaking from Russia at a conference in Australia on Friday evening, the whistleblower Edward Snowden warned against accepting this distinction: "The impacts of metadata can’t be overstated, they are collecting data on everyone regardless of wrongdoing. When you have metadata, it’s a proxy for content, so when politicians split hairs about metadata you should be very sceptical." He went on to say that adopting these data retention laws was a "radical departure from the operation of traditional liberal societies around the world," and pointed out that mass surveillance had not stopped the Sydney siege, the Boston marathon bombings, or the attack on the Charlie Hebdo magazine in France.

May 12 13:44

Sales Exec Says She Was Fired for Uninstalling GPS App That Tracked Her Constantly

According to the suit, which was spotted by Ars Technica, Intermex made employees install the Xora GPS app so the company could track them at all times. Myrna Arias claims that she told her boss, John Stubits, that she was fine with the tracking while she was on duty, but opposed to it during her off hours and weekends. The suit alleges that a group of co-workers agreed with this position. After doing some research about Xora, Arias uninstalled the app in April 2014.

After researching the app and speaking with a trainer from Xora, Plaintiff and her co-workers asked whether Intermex would be monitoring their movements while off duty. Stubits admitted that employees would be monitored while off duty and bragged that he knew how fast she was driving at specific moments ever since she installed the app on her phone.

May 12 12:41

Washington state limits Stingray surveillance in unanimously approved ‘pro-privacy’ law

An anti-surveillance bill that brings unprecedented restrictions to cell phone tracking technology, not unlike that achieved through devices sold as “Stingrays,” has been signed into law in Washington state.

Governor Jay Inslee, a Republican, added his signature to HB 1440 on Monday this week, authorizing a law that effective immediately requires police officers to obtain search warrants before deploying “cell site simulators,” or devices that mimic the behavior of mobile phone towers.

May 12 08:10

3D Printing Help for the Disabled, One Hand at a Time

By Brian Berletic

For the longest time if you lost a limb or were born without one, getting fitted with a prosthetic limb was a hopeless endeavor, particularly if you didn’t have the money for what passed as the “best.” Customization used to be costly regardless of the industry, and biomedical technology, including prosthetic limbs was no exception.

However, with 3D printing, has come the ability to make highly customizable objects with precise measurements both for cheap and very quickly...

May 12 07:55

Sens. Paul, Wyden Both Plan Filibuster of Patriot Act Renewal

With the deadline looming for the expiration of Section 215 of the Patriot Act, nominally the basis for NSA surveillance, two senators, Rand Paul (R – KY) and Ron Wyden (D – OR), are both planning filibusters of any attempt to renew it.

Webmaster's Commentary: 

Which sounds good until you realize that NSA will continue the spying regardless of the law. Indeed making the spying illegal only serves to lull the American people into a false sense of privacy to drop their guard about protecting their business secrets from government looting.

May 12 07:50

Verizon Agrees to Buy AOL for $4.4 Billion

Verizon Communications Inc. agreed to buy AOL Inc. in a $4.4 billion deal aimed at advancing the telecom giant’s growth ambitions in mobile video and advertising.

May 11 18:18

190 Scientists & Experts Urge UN to Deal with Emerging Wireless Public Health Crisis

190 scientists from 38 nations have submitted the International EMF Scientist Appeal to the United Nations, UN member states and the World Health Organization (WHO) requesting they adopt more protective exposure guidelines for electromagnetic fields (EMF) and wireless technology in the face of increasing evidence of risk from this rapidly increasing environmental pollutant.

The scientists who have signed the Appeal have collectively published over 2,000 peer-reviewed papers on the biological or health effects of non-ionizing radiation...

May 11 17:52

Canada, welcome to the US-style Surveillance State

By Jon Rappoport

Obama likes to say, “We’re all in this together.” Well, our 2 populations are now together as targets of spying.

The notorious Bill C-51 to expand spying on citizens in Canada has passed the House of Commons, by a vote of 183-96. It now moves to the Senate, where passage seems inevitable...

May 11 15:55

Woman fired for uninstalling app on company phone that tracked her 24 hrs a day

A California woman has sued her former employer, which fired her shortly after she disabled a GPS tracking feature on her company iPhone. The app was used to monitor employees even on their personal time, the lawsuit alleged.

May 11 14:24

Judicial Watch Files Seven New FOIA Lawsuits against State Department to Force Release of Clinton Emails, Other Secret Email Records

Judicial Watch announced that it has filed seven Freedom of Information Act (FOIA) lawsuits against the State Department in the U.S. District Court for the District of Columbia to obtain the release of documents about the Clinton email scandal, including emails of her top aide Huma Abedin and records about the Benghazi and Clinton Foundation scandals. JW filed one of the lawsuits yesterday and six today. Last week, Judicial Watch also filed a lawsuit for records on Hillary Clinton’s use of an iPad and iPhone.

May 11 12:54

Edward Snowden warns data retention laws are 'dangerous'

Former US National Security Agency analyst Edward Snowden has delivered a damning verdict on Australia’s new data retention laws, saying they are “radical” and “dangerous,” telling Australians “regardless of whether or not you’re doing anything wrong, you are being watched.”

May 11 12:20

Former Israeli PM Ehud Barak Joins Board of Biometrics Firm

By Brandon Turbeville

Former Israeli Prime Minister and Defense Minister, Ehud Barak has added another accomplishment to his bloody résumé now that he has accepted a new position with startup biometrics firm, FST Biometrics.

Barak recently joined the board of FST after the company received a $15 million investment from GMF Capital, which is headed by Gary Fegel, a well-known Swiss investor. Barak will now serve as FST’s representative to GMF Capital on GMF’s board...

May 11 12:04

Edward Snowden warns data retention laws are 'dangerous'

Former US National Security Agency analyst Edward Snowden has delivered a damning verdict on Australia's new data retention laws, saying they are "radical" and "dangerous," telling Australians "regardless of whether or not you're doing anything wrong, you are being watched."

May 11 10:27


Hesder is an Israeli yeshiva program which combines advanced Talmudic studies with military service in the Israel Defense Forces. Hesder is usually a program for the National Religious, but the new intiative focuses on the Haredim. Derech Chayim combines Torah studies and military service, as in all hesder yeshivot, but in addition, the students engage in technological studies, with an emphasis on cyber-warfare.

May 11 08:38

Stealthy Linux GPU malware can also hide in Windows PCs, maybe Macs

A team of anonymous developers who recently created a Linux rootkit that runs on graphics cards has released a new proof-of-concept malware program that does the same on Windows. A Mac OS X implementation is also in the works.

The developers are trying to raise awareness that malware can infect GPUs and that the security industry is not ready for it. Their goal isn’t to tip off malicious hackers, but the source code they released, while incomplete and buggy by design, could potentially be built upon and used for illegal purposes.

The problem the developers are trying to highlight lies not with the operating systems, such as Windows or Linux, nor with the GPU (graphics processor unit) vendors, but rather with existing security tools, which aren’t designed to scan the random access memory (RAM) used by GPUs for malware code.

May 11 08:33

Some SSDs Can Lose Data After Just A Few Days In Storage

Solid-state drives outclass hard drives as a storage medium in almost every way: they’re faster, less fragile, and can store more data per square inch. But according to some experts, SSDs suck at long-term storage of information, thanks to one particular problem: temperature.

Under optimal conditions, consumer-grade SSDs — the ones you’d find in most laptops — retain data for two years when not powered up. For enterprise SSDs, that drops to four months. Those numbers alone aren’t a problem — anyone cold-storing data for months on end is probably using tape drives anyway.

But what is a problem is SSDs stored under less-than-optimal conditions. For every rise of 9 degrees Farenheit in the ambient temperature, the data retention period is cut in half. So, that SSD that retains information for two years at 77 degrees will only keep it for a year if the thermometer hits 85.

May 11 08:31

Russia now selling home-grown CPUs with Transmeta-like x86 emulation

Russia joins China in seeking technological independence from the US.

May 10 13:21

Federal Courts Green Light Police Access to Cellphone Tower Records without a Warrant

A federal appeals court has ruled that law enforcement agencies may access tracking information on cell phones without a warrant. The 11th Circuit Court of Appeals ruled (pdf) Tuesday that police were justified in asking a mobile phone provider to hand over the records of Quartavious Davis, who was convicted of committing seven armed robberies in South Florida in 2010. As part of the evidence used against Davis, prosecutors presented data showing that Davis’ phone was using cell towers near sites of robberies.

May 10 09:50

World’s first anti-propaganda search engine launching soon

For the last six months, I have been working hard on the development of a breakthrough search engine that will finally offer a credible search alternative to the NSA-funded, surveillance-state search engines currently dominating the web.

Next week, I’ll be opening the webmaster URL submit page for the world’s first independent, anti-propaganda search engine that filters out corporate propaganda and government disinformation. The search engine is free to submit to and free to use. It’s funded entirely by advertising that appears on the search results page.

Uniquely, this independent search engine either bans or flags (with a warning) all corporate propaganda and government disinfo websites. Just as Google flags search result URLs containing malicious code that can infect your computer, we will flag search result URLs containing malicious propaganda that can infect your mind.

May 10 09:15

New Example of the Pentagon, DEA and Private Companies Conspiring to Beat Encryption, Track Everything You Do

Yet another report has surfaced describing how tools created by the companies selling software that can damage and hack into people’s computers are being deployed by U.S. security services. While the coverage surrounding this story focuses primarily on federal agencies it’s important to step back for a moment and view the big picture. In particular, looking at who builds, operates, and profits from mass surveillance technology offers insight into the nature of the global panopticon.

May 10 05:32

MIT and Harvard worked with NSA on SKYNET project

Newly published documents from the Edward Snowden archive show that researchers at MIT's Lincoln Lab and Harvard University have worked with the NSA on a program called SKYNET, which uses bulk location and call records to look for patterns and associations. The program appears to be directed at Pakistan, although the underlying technology could be used to analyze data collected on Americans through the Section 215 dragnets.

May 10 05:26

Porn and video game addiction are leading to ‘masculinity crisis’, says Stanford prison experiment psychologist

A leading psychologist has warned that young men are facing a crisis of masculinity due to excessive use of video games and pornography. Psychologist and professor emeritus at Stanford University Phillip Zimbardo has made the warnings, which form a major part of his latest book, Man (Dis)Connected.

May 09 11:00

Snowden says Australia watching its citizens ‘all the time,’ slams new metadata laws

NSA whistleblower Edward Snowden accused Australia of undertaking mass surveillance of its citizens and passing laws on the collection of metadata that he says do not protect society from acts of terrorism.

May 09 10:52

The Future of 3D Printing

By Brian Berletic

For emerging technologies it is not always easy to tell what the future holds for it. However, for 3D printing, this doesn't apply. 3D printing is actually not new at all. It has been around since at least as early as the 1980s.

Since the 1980s, 3D printing has been making it possible to prototype new ideas faster, more accurately, and more efficiently than ever before. Starting in the mid-2000s 3D printing went from a professional tool employed by large companies and design firms, to a form of personal manufacturing accessible to a larger number of regular people.

Looking at where 3D printing has been and where it is now, we can confidently predict where it is heading with some degree of accuracy...

May 09 10:30

Ex-NSA security staffer: Apple Macs are wide open to malware

Patrick Wardle, a former NSA staffer and NASA intern who now heads up research at crowd-sourced security intelligence firm Synack, found that Apple’s defensive Gatekeeper technology can be bypassed allowing unsigned code to run. Apple’s Gatekeeper utility is pre-installed in Mac OS X PCs and used to verify code. The tool is designed so that by default it will only allow signed code to run or, depending on settings, only packages from the Mac App Store.

May 09 08:21

Film the Police

Last month, video footage emerged that appeared to show something illegal: A U.S. marshal approached a woman who was filming him on duty, snatched her smartphone, and smashed it on the ground.

That incident only became news because someone else was filming the encounter. But not every bystander filming a police encounter can have a backup. What should a person do when there's no one else on the scene?

A new app tries to answer this question by offering, in effect, a different kind of backup. Called Mobile Justice CA, the app uploads all video footage as it’s being captured to servers owned by the American Civil Liberties Union (ACLU). Even if the phone is destroyed, the video will survive.

May 08 14:40

“Government Wants to Control Your Car” and Prevent You From ‘Tinkering’ Under DMCA Copyright

Think you own your car? Think again. Soon you won't even be allowed to work on it.

Modifications – performance enhancements – and even routine maintenance are to become illegal via the application (and enforcement) of the Digital Millennium Copyright Act (DMCA) to cars.

They are claiming propriety rights to the software embedded in the computer ...


May 08 14:29


No, the real solution is end-to-end encryption, preferably of the unbreakable kind.

And as luck would have it, you can have exactly that on your mobile phone, for the price of zero dollars and zero cents.

The Intercept’s Micah Lee wrote about this in March, in an article titled: “You Should Really Consider Installing Signal, an Encrypted Messaging App for iPhone.”

(Signal is for iPhone and iPads, and encrypts both voice and texts; RedPhone is the Android version of the voice product; TextSecure is the Android version of the text product.)

May 08 14:27

Hackers target critical XSS vulnerability in millions of Wordpress sites

The problem lies in plugins and themes which leverage the genericons package. An insecure file loaded with the package, dubbed example.html, is vulnerable to a Document Object Model (DOM)-based XSS vulnerability. Attackers modify the DOM environment in the victim's browser used by the original client-side script, causing code to run in an unexpected manner. Client-side code contained in the page then executes with the malicious changes, but the XSS payload is never sent server-side -- instead, executes directly in the browser.

Once exploited, the XSS flaw could be used to execute Javascript within a browser and hijack a Wordpress website if the owner is logged in as an administrator.

Dede says the XSS vulnerability is "very simple to exploit." However, the fix is also simple -- simply removing the genericons/example.html file resolves the issue. Wordpress website owners are recommended to do so immediately.

May 08 14:17

Facebook slyly promotes its net neutrality-violater Internet org among users

Facebook has started showing its users an ad which tricks them into thinking that supporting it means they stand behind net neutrality. The campaign pretends to be promoting free Internet for everyone, though it is actually trying to gather followers for Facebook’s plan to carve up the web into separate pieces.

May 08 10:53

Russia Unveils Homegrown PC Microprocessor Chips

Ever since Edward Snowden lifted the lid on the full extent of the NSA’s mass surveillance programs, foreign nations have been looking for alternatives to U.S. manufactured equipment. In the wake of Snowden’s revelations, one Russian firm announced its intention to build its own homegrown microprocessors, and today these have finally gone on sale.

May 08 10:50


Webmaster's Commentary: 

Work is proceeding, albeit slowly, on the new version of the on Drupal 7. Drupal 7 is proving to be a major headache with many flaws, even though supposedly Drupal 8 is in development.

The biggest headache is that the theme I use for the current website is not compatible with Drupal 7, so I am basically having to design a new site from scratch, while making it "liquid", which means changing layout based on the viewing device so that Google doesn't lower my ranking for being smartphone unfriendly (even though I can see the current site just fine on my iPhone 5 and my wife's iPad and Android device).

Sadly, this means the new site will be vastly different from what you are currently using and I know a lot of people will complain and say they prefer the current site. So do I. I would prefer not to be going through all this effort. But the hosting company requires my server the current versions of php, Apache, and SQL for "security reasons" and Drupal 6 does not run correctly on those platforms. The current site has a lot of problems as you already know. Search no longer works. Voting on articles and the paid membership system has been broken ever since the last "expert" I hired to work on the site, and so forth.

The going is slow but I hope to launch the new site with a minimum functionality sometime this month, then add more features and changes. But I am not going to rush this. I want to do it right and make certain everything works before switching over.

The biggest problems yet to solve (once the php for the theme itself is fine-tuned) are re-writing the "wrapper" than embeds the site's permanent articles in the new theme (that too is not compatible from D6 to D7) and migrating the existing users and articles databases from D6 to D7.

This is a huge amount of work, but in the end I think we will have a more stable and usable site to last us years into the future.

Thank you for your patience.

Optional Banner: 
WRH Exclusive
May 08 08:39

Appeals Court Strikes Down Bulk NSA Phone Spying

On June 11, 2013, the ACLU challenged "the constitutionality of the National Security Agency's mass collection of Americans' phone records (ACLU v. Clapper)."

It argued that doing so violates Fourth and First Amendment rights, saying:

"Because the NSA's aggregation of metadata constitutes an invasion of privacy and an unreasonable search, it is unconstitutional under the Fourth Amendment."

"The call-tracking program also violates the First Amendment, because it vacuums up sensitive information about associational and expressive activity."

May 08 08:15

Cellular Device Used To Detect Parasites In The Blood

Another cell telephone magnifying instrument that uses feature to consequently identify and measure disease by parasitic worms in a drop of blood has been produced via scientists. This up and coming era of CellScope innovation could cause restore endeavors to kill incapacitating infections in Africa by giving discriminating data to wellbeing suppliers in the field.

May 08 08:08

Want a $9 computer? Here's your chance

The cost of computing keeps getting lower as a project to launch a $9 machine takes to Kickstarter.

May 08 08:00

Courts Won't Stop Data-Hungry Feds

A federal appeals court in New York on Thursday ruled that the once-secret National Security Agency program that is systematically collecting Americans' phone records in bulk is illegal. The decision comes as a fight in Congress is intensifying over whether to end and replace the program, or to extend it without changes.

In a 97-page ruling, a three-judge panel for the United States Court of Appeals for the Second Circuit held that a provision of the USA Patriot Act known as Section 215 cannot be legitimately interpreted to allow the bulk collection of domestic calling records.

Webmaster's Commentary: 

The court stopped short of ordering a stop to the practice, in effect admitting to the American people that the government is violating the 4th Amendment (and hence illegitimate) but will go on spying on you because, heck, what can YOU do about it!

May 08 07:55

Why Microsoft is calling Windows 10 'the last version of Windows'

"Right now we’re releasing Windows 10, and because Windows 10 is the last version of Windows, we’re all still working on Windows 10." That was the message from Microsoft employee Jerry Nixon, a developer evangelist speaking at the company's Ignite conference this week. Nixon was explaining how Microsoft was launching Windows 8.1 last year, but in the background it was developing Windows 10. Now, Microsoft employees can talk freely about future updates to Windows 10 because there's no secret update in the works coming next. It's all just Windows 10. While it immediately sounds like Microsoft is killing off Windows and not doing future versions, the reality is a little more complex. The future is "Windows as a service."

May 08 07:47

eBay Takes Down Auctions For PS4s With P.T. Preinstalled On Them

According to reports, it seems that eBay is taking down auctions of the PlayStation 4 that has the game installed on it. Why is this? Apparently this has to do with a copyright issue where users aren’t allowed to sell items that might be copyrighted to someone else, in this case P.T. belongs to Konami and since Konami did not authorize the sale/distribution of the game via these eBay sellers, it is technically not allowed.

Webmaster's Commentary: 

That is like selling your record player, but you are required to smash the records!

May 07 15:54

German secret service BND reduces cooperation with NSA

German intelligence has drastically reduced its cooperation with the US National Security Agency in response to a growing fallout over their alleged joint surveillance of European officials and companies, according to media reports.

The BND, Germany’s foreign intelligence agency, ceased the online surveillance it is believed to have been carrying out on behalf of the NSA at its satellite listening station in Bad Aibling, Bavaria, at the start of the week, pending an investigation into the scandal. The end of the operation was reported by the national daily newspaper Süddeutsche Zeitung and other German media, citing sources close to a German parliamentary inquiry into the allegations.

May 07 15:30

POWER TO THE PEOPLE - The Internet is Giving Power To The Small People. Elite Are Scared!

May 07 12:28

Maine Bill Taking on NSA Spying Passes Committee 9-4

By Michael Maharrey

A Maine bill that would turn off support and resources to the NSA in the Pine Tree State passed out of committee by a surprisingly comfortable margin yesterday, despite intense opposition form the state attorney general...