COMPUTERS/INTERNET/SECURITY | WHAT REALLY HAPPENED


COMPUTERS/INTERNET/SECURITY

Apr 13 19:27

‘Redirect to SMB’ vulnerability allows login theft, even in Windows 10

Security researchers have identified a new variant on an old hacking technique to steal Windows user credentials, including the victim’s username, hashed password and domain – and it works just fine on the Windows 10 preview release too. Applications vulnerable to the technique include those made by Apple, Oracle, Symantec, Adobe and Box, with several popular security and antivirus suites susceptible. Microsoft has never addressed the historical exploit on which the new attack is based, even though it was made public 18 years ago.

Apr 13 17:01

Flashback - Vote Fraud 2004: How Ohio was "Delivered" to Bush

Q - "Do you have an opinion whether or not the Ohio presidential election was hacked?"

A - "Yes, I would say it was, I mean, if you have exit polling data that is significantly off from the vote then it's probably hacked."

Apr 13 16:59

Prosecutors suspect man hacked lottery computers to score winning ticket

Eddie Raymond Tipton, 51, may have inserted a thumbdrive into a highly locked-down computer that's supposed to generate the random numbers used to determine lottery winners, The Des Moines Register reported, citing court documents filed by prosecutors. At the time, Tipton was the information security director of the Multi-State Lottery Association, and he was later videotaped purchasing a Hot Lotto ticket that went on to fetch the winning $14.3 million payout.

In court documents filed last week, prosecutors said there is evidence to support the theory Tipton used his privileged position inside the lottery association to enter a locked room that housed the random number generating computers and infect them with software that allowed him to control the winning numbers.

Apr 13 05:03

The government hides surveillance programs just because people would freak out

Government agencies will go to great lengths to keep their data collection a secret, strictly to avoid the bad press they know would be coming

Apr 13 04:59

The NSA wants tech companies to give it 'front door' access to encrypted data

NSA director suggested tech companies could provide an encryption key in pieces

Apr 12 10:16

Google’s certificate change could hurt China’s e-economy

When is a sanction not a sanction? Probably when it has been issued by Google. Last week the ongoing geopolitical deep freeze between the US and China took another turn after the Mountain View giant removed certificate authority (CA) CNNIC from its list of trusted CAs. That move could yet throw a potentially large spanner into China’s internet economy.

Apr 12 09:34

Eighth-Grader Arrested, Charged With Cybercrimes For Changing Teacher's Desktop Wallpaper

Cybersecurity has become a prominent issue, with hacks and breaches plaguing corporations, governments, and individuals. But instead of blaming the cyberwar divisions of nation states or sophisticated hacking rings the source of the problem might be a lot closer to home. Is anyone looking at the teens?

Apr 12 07:17

Researchers Test Crowdsourcing Smartphone Data for Earthquake Warning

Of all the negative uses and health hazards of smartphones, this one might actually be a good use of the tech...

Smartphones and other personal electronic devices could, in regions where they are in widespread use, function as early warning systems for large earthquakes according to newly reported research. This technology could serve regions of the world that cannot afford higher quality, but more expensive, conventional earthquake early warning systems, or could contribute to those systems...

Apr 11 09:31

How Robots & Algorithms Are Taking Over

In September 2013, about a year before Nicholas Carr published The Glass Cage: Automation and Us, his chastening meditation on the human future, a pair of Oxford researchers issued a report predicting that nearly half of all jobs in the United States could be lost to machines within the next twenty years. The researchers, Carl Benedikt Frey and Michael Osborne, looked at seven hundred kinds of work and found that of those occupations, among the most susceptible to automation were loan officers, receptionists, paralegals, store clerks, taxi drivers, and security guards. Even computer programmers, the people writing the algorithms that are taking on these tasks, will not be immune. By Frey and Osborne’s calculations, there is about a 50 percent chance that programming, too, will be outsourced to machines within the next two decades.

Apr 11 06:39

Long arm of the law closing in on Hillary!

Thursday, my organization, Freedom Watch, went where no congressional committee had the guts to go before: We took real action to get a federal court to immediately seize the hard drives of Hillary Clinton’s private email server. (See freedomwatchusa.org.)

I asked the court to appoint a forensic expert to inspect and recreate the missing email evidence from Clintons’ tenure as secretary of state. We did this without any of the power or funding of Congress and without the years of delay on Capitol Hill. Forget about Trey Gowdy and the Government Oversight and Reform Committee. Unlike Gowdy, who has accomplished little to nothing and indeed dithered as Hillary was busy destroying evidence, we are not pursuing Hillary for show, but to uncover her illegal dough!

Apr 10 18:33

Judge: IP-Address Doesn’t Identify a Movie Pirate

The filmmakers behind the action movie "Manny" have filed hundreds of lawsuits against BitTorrent pirates this year, but not all have been successful. In a prominent ruling Florida District Court Judge Ursula Ungaro refused to issue a subpoena, arguing that IP-address evidence is not enough to show who has downloaded a pirated movie.

Apr 10 18:11

Facebook Admits to Tracking People Who Don't Use Facebook, Blames a Bug

Facebook has admitted it tracks some non-users—but says it’s only a bug and that a fix is underway. At the end of Mar?ch, Belgian researchers reported that Facebook drops a long-lasting cookie onto your machine, tracking you across pages with its social plugins, even if you’ve opted into a do-not-track system or aren’t a registered user of the site. At the time, Facebook said the report was inaccurate, though it would not say which specific aspects were incorrect.

Apr 10 17:58

Eighth Grader Charged With Felony Cybercrime For Changing Teacher’s Desktop Wallpaper

A middle school student who said he was just trying to play a prank on a teacher he didn't like was charged with a cybercrime Wednesday after authorities said he hacked into his school's secure computer network. The Pasco County Sheriff's Office has charged Domanik Green, an eighth-grader at Paul R. Smith Middle School, with an offense against a computer system and unauthorized access, a felony. Sheriff Chris Nocco said Thursday that Green logged onto the school's network on March 31 using an administrative-level password without permission. He then changed the background image on a teacher's computer to one showing two men kissing.

Apr 10 11:48

Department of Defense Blocks Millions of Computers From Viewing Alternative News

What began as a rumor that the military brass was ordering soldiers not to view news about the whistle blower revelations that the NSA is spying on all Americans has swelled into a confirmed military-wide censorship campaign using a high-tech computer filtering system.

The US News and World Report is reporting that the DoD is blocking access to all articles related to the NSA scandal from all DoD computers. The filter reportedly effects millions of computers and potentially thousands of alternative news and civil liberties websites.

Webmaster's Commentary: 

Moi?!?

Apr 10 11:44

US lawmakers assembling secret ‘encyclopedia of spying’

In an effort to keep track of the US government’s sprawling spy efforts, a Senate oversight committee has been compiling a ‘secret encyclopedia’ of surveillance programs ever since the 2013 Snowden revelations.

Webmaster's Commentary: 

Weren't they supposed to already know?!?

Apr 10 10:05

Rights groups demand justice as new details on DEA spying program revealed

As new reporting by USA Today on Wednesday exposed the scope of the U.S. Drug Enforcement Administration's two-decade secret surveillance operation against American citizens

Apr 10 09:14

BALTIMORE PD HAS DEPLOYED STINGRAY DEVICES OVER 4,300 TIMES, INSTRUCTED BY FBI TO WITHHOLD INFO FROM COURTS

As the AP notes, the number of deployments admitted to here is the largest ever made public. This doesn't necessarily mean the rate of usage (more than once a day, on average) is out of the ordinary, however. Thanks to the very restrictive non-disclosure agreement the FBI forces law enforcement agencies to sign (while falsely claiming "the FCC made us do it!"), information on cell tower spoofers has very rarely been disclosed.

Apr 10 08:50

U.S. Agencies Block Technology Exports for Supercomputer in China

U.S. officials are blocking technology exports to facilities in China associated with the world’s fastest supercomputer, a blow to Intel Corp. and other hardware suppliers that adds to the list of tech tensions between the two countries.

Apr 10 07:47

International cybersquad takes down ‘Beebone’ botnet

By taking control of the server, authorities can now keep the botnet’s administrators from using a vast network of hacked computers to launch attacks. Security experts say that upwards of 12,000 machines have already been compromised since 2009, however, and that the operators of the zombie network had executed malicious programs through those computers to steal user data, including passwords and financial information.

Infected machines, according to the US Computer Emergency Response Team (US-CERT), could be ordered to “distribute malicious software, harvest users' credentials for online services, including banking services, and extort money from users by encrypting key files and then demanding payment in order to return the files to a readable state.” The compromised machines would download and run other malicious program, including ransomware and rootkits, and then rapidly change form after an infection in order and before spreading in order to evade detection.

Apr 09 18:36

TripAdvisor censors complaints about hotels in Israel’s settlements

The popular website TripAdvisor not only promotes hotels in the settlements that Israel is building in the occupied West Bank, it censors travelers who complain about such complicity with illegal activities.

Apr 09 14:13

Feds Suspend Funding for Los Angeles Cell Towers

Catherine Frompovich
Activist Post

This is an update on the cell tower situation in Los Angeles, California...

Even more news is breaking regarding those ‘mushroom-like-cropping-up’ cell towers. Activists in LA report to me that

"the US Federal government suspended funding of the Los Angeles arm of the deadly federal surveillance tower roll out!! According to Fierce Wireless Magazine, we gave First Net a "black eye" which they may or may not recover from." ...

Apr 09 12:12

5 Clues Hidden in Computer Files That Can Get You Busted

Which brings us to Merck & Co., the pharmaceutical company most famous for the arthritis medication Vioxx, which was pulled from the market after it was revealed that long term use of the drug caused heart attacks (even if it still worked really well on the whole). Merck was swiftly flooded with almost 7,000 lawsuits after the recall, but in their defense, it's not like anyone knew Vioxx would kill people.

Actually, Merck had specifically known that exact thing for years. And the bizarre thing is, they almost told everyone about it, but changed their minds at the last minute and then poorly covered up their tracks. Thanks, again, to their Word document's revision history.

Apr 09 10:34

Facebook hit with class action lawsuit over facial recognition data

A new class action lawsuit claims Facebook violated its users' privacy rights in acquiring what it describes as the largest privately held database of facial recognition data in the world.

According to a report from Courthouse News Service, lead plaintiff Carlo Licata, of Cook County, claims the social network violated Illinois privacy laws by not providing him with written notification that his biometric data was being collected or stored.

Furthermore, Licata claims that it's also unlawful to collect biometric data in the state without clearly stating the purpose for which that data is being collected, along with notification of how long it would be stored for.

Apr 09 07:39

Pentagon steps up special ops monitoring of social media sites

U.S. military special operations forces are elite commandos who are sent on high-risk, high-reward missions all over the world, on a regular basis. As such, they have increasingly turned to a method of open-source intelligence collection that is becoming vital to the success of their missions: The monitoring of social media and other Internet-based outlets that can provide crucial information and data.

Webmaster's Commentary: 

Dear US Government. I hate to be the one to break this to you, but people lie on social media, especially if they are trying to impress a potential date! People exaggerate what they are doing. They take pictures of other peoples' expensive cars and claim them as their own. They post years-old selfies and claim they are current. Social media is not and never was a reliable source of hard intelligence about anyone. You have spent billions of dollars and violated the Fourth Amendment to build a search engine into the populations' self-indulgent fantasies.

Apr 09 07:33

HP drops out of the public cloud storm

HP has invested billions in its cloud offerings. Now, out of the blue sky, HP is leaving the public cloud business behind.

Webmaster's Commentary: 

In this era of massive spying on our business secrets (and John Oliver's dick) nobody trusts the cloud for data storage. Nor should they. This is another way in which the tyrannical policies of Washington DC has slammed an already crippled economy.

Apr 08 19:53

Windows 10 nagware patch KB 3035583 now marked 'important' on some PCs

Life would be so much simpler if Microsoft would tell us what it's trying to put on our PCs. Earlier this week the mystery patch KB 3035583 was unveiled by German site heise.de as a shill for Windows 10. The patch is all about advertising Windows 10 and upgrading to Windows 10, from Windows 7 and 8.1 PCs. Now readers report the patch is marked as "Important" and installs by default through Automatic Update.

Apr 08 19:47

Over 1 million WordPress sites may be affected by a flaw in WP Super Cache plugin

A caching plugin currently used by over one million WordPress sites was susceptible to a cross-site scripting (XXS) vulnerability that could allow an attacker to inject a backdoor or add a new administrator. If you use the WP Super Cache plugin, then make sure it is updated to the newest version, 1.4.4, which the developers released to resolve the remotely exploitable vulnerability reported to them by Sucuri.

Apr 08 19:44

Not So Incognito: One Million Swedish PCs Hit by Google Chrome Spyware

The newspaper quoted IT expert Cristian Mariolini, who explained that a hidden "spy code" had been installed inside the Webpage Screenshot program, which is used by the Google Chrome browser. The program is touted as a "quick and easy decision" to take screenshots and save them on the computer. The software has already been installed by at least 1.2 million Swedish internet users.

Mariolini said that his IT security company Sentor MSS detected that the spyware was sending users' browsing information to a server registered in the United States.

The researchers traced the IP address and the phone number of the server to a private individual living in Israel, the newspaper said.

Apr 08 19:42

Police chief: “Paying the Bitcoin ransom was the last resort”

A small town police department just outside of Boston finally agreed to pay a $500 ransom to regain access to a police server that it had been locked out of after being infected with CryptoLocker ransomware.

Apr 08 17:43

U.S. Aerospace Command Moving Comms Gear Back to Cold War Bunker

The US military command that scans North America’s skies for enemy missiles and aircraft plans to move its communications gear to a Cold War-era mountain bunker, officers said. The shift to the Cheyenne Mountain base in Colorado is designed to safeguard the command’s sensitive sensors and servers from a potential electromagnetic pulse (EMP) attack, military officers said.

Apr 08 11:50

Snowden Says U.S. Gov't Has Your Nude Photos

April 07, 2015 - In an interview with HBO's John Oliver, Edward Snowden says the U.S. government is collecting information from private citizens including nude pictures.

Apr 08 11:41

Saying ‘No’ to Big Bro’

• State senator, parents, families uniting to end microchipping of all Texas students.

A Texas state senator is standing up for personal freedom and privacy rights by introducing legislation that would ban schools from forcing radio-frequency identification (RFID) chips on students for the purpose of tracking their whereabouts during school hours.

Apr 08 10:34

U.S. Government Tracked Billions of American Phone Calls BEFORE 9/11

In case you didn't know, mass surveillance started before 9/11…

Apr 08 08:01

Federal judge orders entrepreneur to commit his own Facebook identity theft or go to jail

The winners of the bankruptcy proceedings, however, wish to use the "Jeremy Alcede Entrepreneur" account to promote the business they have been granted via the bankruptcy proceedings. Without those 10,800+ likes, 5,000 friends and who knows how many followers, they may not be able to successfully generate the business and cash flow necessary to keep the business afloat. So they asked Judge Jeff Bohm to force Alcede to turn over the account to them, allowing them to post messages in the name of Jeremy Alcede to Alcede's friends and followers, effectively impersonating Alcede.

Per the court order, Alcede is even being ordered by a judge to accept a Facebook friend! (When was the last time a court judge ordered you to friend someone you didn't consider a friend at all?)

Apr 08 07:56

Russian Hackers Accused Of Cyberattacks Against The White House

The intrusion was carried out through computers around the world.

United States suspects that Russian hackers are the authors of cyberattacks suffered by the Department of State, through which would have gotten access to sensitive White House computer system elements, according to U.S. officials who were informed of the investigation revealed to CNN.

http://whatisusa.info/russian-hackers-accused-of-cyberattacks-against-...

Apr 08 07:08

Russia Didn’t Carry Out White House Computer Hack, Peskov Says

Russia rejected a report that its government had been involved in hacking a non-classified White House computer network.

“It has become a kind of sport to blame everything on Russia,” Kremlin spokesman Dmitry Peskov told reporters on a conference call on Wednesday.

Apr 08 06:10

U.S. plan to shut down cell phones and internet in energency. Court ruled no disclosure. Flashback: U.S. condemns cell phone and internet shut down in Egypt and Syria

It seems the courts through a Freedom of information act lawsuit is standing by the U.S. government and not allowing the release of the U.S. governments plan to shut down the internet and cell phone service (plan SOP303) in times of emergencies. In other words if there was civil unrest.

The reason why the lawsuit was filed in the first place was due to when all cell phone service was cut in San Francisco during the BART unrest.

EPIC asked the court to revisit its ruling, arguing that the decision, "if left in place, would create an untethered 'national security' exemption'" in FOIA law. On Friday, the court ordered (PDF) the government to respond—a move that suggests the appellate court might rehear the case.

Apr 07 23:46

Russian Hackers Accused Of Cyberattacks Against The White House

The intrusion was carried out through computers around the world.

United States suspects that Russian hackers are the authors of cyberattacks suffered by the Department of State, through which would have gotten access to sensitive White House computer system elements, according to U.S. officials who were informed of the investigation revealed to CNN.

http://whatisusa.info/russian-hackers-accused-of-cyberattacks-against-...

Apr 07 19:17

Firefox disables “opportunistic encryption” to fix HTTPS-crippling bug

The bug was introduced in Firefox 37, which was released last week and introduced a new feature that could encrypt Web connections even when servers didn't support HTTPS protocols. While opportunistic encryption lacks some of the crucial protections of the transport layer security protocol, it was still hailed by many as a watershed moment that moved the world closer to an Internet where all data receives end-to-end encryption. That in theory could make it harder for criminal and state-sponsored adversaries to monitor or manipulate the communications of end users.

Now, Mozilla developers have disabled opportunistic crypto in the just-released Firefox 37.0.1 after they discovered that the implementation released last week introduced a critical bug. The vulnerability, which resides in functionality related to opportunistic crypto, in some cases gave attackers an easy way to present fake TLS certificates that wouldn't be detected by the browser.

Apr 07 13:18

FAA hit by cyberattack, finds no damage

The Federal Aviation Administration discovered malicious software from email in its computer system in early February, but the agency said Tuesday it found no damage from the cyberattack.

Apr 07 12:53

SOP 303 MOBILE-PHONE KILL-SWITCH: COURT MULLS REVEALING SECRET GOVERNMENT PLAN TO CUT CELL PHONE SERVICE

EPIC originally asked for the document in 2011 in the wake of the shut down of mobile phone service in the San Francisco Bay Area subway system during a protest. The government withheld the information, EPIC sued and won, but the government then appealed and prevailed.?

A federal appeals court is asking the Obama administration to explain why the government should be allowed to keep secret its plan to shutter mobile phone service during "critical emergencies."

The Department of Homeland Security came up with the plan—known as Standing Operating Procedure 303—after cellular phones were used to detonate explosives targeting a London public transportation system.

Apr 07 10:49

Facebook hit with class action lawsuit over facial recognition data

A new class action lawsuit claims Facebook violated its users’ privacy rights in acquiring what it describes as the largest privately held database of facial recognition data in the world.

Apr 07 09:51

Taking Back Their Power from Smart Meters in Pennsylvania

Catherine J. Frompovich
Activist Post

In 2008 the Commonwealth of Pennsylvania Legislative body passed, and then-Governor Ed Rendell signed into Pennsylvania Law – PA HB2200, which became Act 129 of 2008. That unethical and vested-interest law mandated AMI Smart Meters (SMs) replace perfectly safe analog meters on all residences with utility companies servicing 100,000 customers.

However, that bill/law is flawed legally insofar as it does not provide an Opt-out from Smart Meters...

Apr 07 09:34

Could your online porn habits be publicly released?

Porn viewers’ online browsing habits could be exposed by hackers – leading to the biggest internet privacy scandal since nude celebrity photos were leaked last year.

Apr 07 09:31

Facebook hit with class action lawsuit over facial recognition data

A new class action lawsuit claims Facebook violated its users' privacy rights in acquiring what it describes as the largest privately held database of facial recognition data in the world.

Apr 07 08:50

The Whitehouse’s New Executive Order On Cyber Crime is (Unfortunately) No Joke

by Nadia Kayyali and Kurt Opsahl

On the morning of April 1st, the Whitehouse issued a new executive order (EO) that asserts that malicious “cyber-enabled activities” are a national threat, declares a national emergency, and establishes sanctions and other consequences for individuals and entities. While computer and information security is certainly very important, this EO could dangerously backfire, and chill the very security research that is necessary to protect people from malicious attacks...

Apr 07 08:07

Monkeys 'hinder India internet drive'

The federal government has planned to lay 700,000 km (435,000 miles) of broadband cable to connect India's 250,000 village clusters within three years.

But officials in the city in Uttar Pradesh state are struggling to stop monkeys from eating the fibre-optic cables, the Reuters news agency reports.
"We cannot move the temples from here. We cannot modify anything here, everything is built up. The monkeys, they destroy all the wires and eat all the wires," communications engineer AP Srivastava told the news agency.

Apr 07 08:05

Court mulls revealing secret government plan to cut cell phone service

A federal appeals court is asking the Obama administration to explain why the government should be allowed to keep secret its plan to shutter mobile phone service during "critical emergencies."

The Department of Homeland Security came up with the plan—known as Standing Operating Procedure 303—after cellular phones were used to detonate explosives targeting a London public transportation system.

SOP 303 is a powerful tool in the digital age, and it spells out a "unified voluntary process for the orderly shut-down and restoration of wireless services during critical emergencies such as the threat of radio-activated improvised explosive devices."

Apr 07 05:10

John Oliver interviews Edward Snowden. U.S. citizens real concerns? They only care if their 'dick' pictures are seen by government.

June 1st the govt. votes on continuing the Patriot Act.

It is important for people to stand up for their freedoms. If we don't stand up we lose it all. We can't live in fear as the government wants us to, just so they can spy on every single person and everything we do. Understand this is not about fighting terrorism, this is about knowing everything about every single citizen.

Every citizen is considered guilty by the government and they spy on every thing we do and spend. John Oliver makes the conversation funny and shows how people are not concerned unless it involves pictures of dicks. Yes... I wrote that correctly.

Must watch video.

Apr 07 01:24

YouTube Kids app uses deceptive advertising

YouTube Kids app uses deceptive advertising, says consumer groups who urge FTC investigation

The new YouTube Kids mobile app targets young children with unfair and deceptive advertising and should be investigated, a group of consumer advocates told the Federal Trade Commission in a letter Tuesday.

Google introduced the app in February as a "safer" place for kids to explore videos because it was restricted to "family-focused content."

But the consumer activists say the app is so stuffed with advertisements and product placements that it's hard to tell the difference between entertainment and commercials.

Apr 06 20:15

The Chart That Shows How Everything Is Becoming a Computer

One of the winners of the mobile revolution has been ARM Holdings, which designs microchips for a variety of devices, from smartphones to fridges to cars ARM chips have become popular over the past decade for their relatively low power consumption, which is especially crucial for portable, battery-operated devices. (Intel, which is still the dominant chip company for desktop, laptop, and server PCs, has missed most of this trend. But it has kept trying.

Apr 06 17:51

Exclusive: TSA Are Quietly Training Armed Officers for Airports

Truthstream Media

While TSA unions are pushing for a policy allowing armed TSA agents, Homeland Security is quietly funding their training and “qualification” across the country.

Documents at FedBiz Opps show that DHS has been contracting the use of firing ranges in close proximity to airports in numerous American cities for its personnel.

The solicitations state that:

“DHS will provide all ammunition, targets, and firearms instructors.”

and:

"TSA reserves the right to inspect all proposed sites to ensure compliance with all requirements set forth above."

Read more at Truthstream Media.com

Apr 06 14:55

Content creators leave social networks when messaging is easy

Industry reports estimate that just 10 per cent of Twitter users broadcast 90 per cent of the network's tweets...

Apr 06 14:51

Update for Windows 7 and 8.1 silently installs Windows 10 downloader

It appears Microsoft is serious when it comes to upgrading Windows 7 and Windows 8.1 users to Windows 10. The upgrade will be free in the first year and it appears Microsoft will take that time to convince users to upgrade. Users that don’t want to receive the upgrade “advertisements” should simply not install the recommend update. If Microsoft however decides to make KB3035583 an important update it will install automatically with other Windows update.

Apr 06 13:47

Turkey reverses decision to block Twitter

Turkish authorities have reversed the decision to block Twitter after the micro-blogging site complied with requests on publication of images of a prosecutor killed by leftist armed men last week, the semi-official news agency Anadolu reported.

Apr 06 12:01

Sandy Hook Elementary School: closed in 2008, a stage in 2012

Several web sites, including The Last Great Stand and Fellowship of the Minds, have reported that, by using the Wayback machine (which enables earlier versions of web sites to be accessed, even though they are not current), it is possible to demonstrate that Sandy Hook Elementary School had no internet activity from 2008 until late 2012 in striking contrast to other elementary schools:

Apr 06 11:26

Edward Snowden Talks Government Spying and 'Dick Pics' with John Oliver

In a sit-down interview with John Oliver, host of HBO's comedy news show Last Week Tonight, that aired on Sunday, NSA whistleblower Edward Snowden said that people should not curb their online habits just because the U.S. government is conducting mass surveillance across the internet.

Apr 06 10:50

GOOGLE-BACKED BITCOIN EXCHANGE BUTTERCOIN IS SHUTTING DOWN

Bitcoin exchange site Buttercoin is closing down, according to an announcement posted on the company’s site. In contrast to many cryptocurrency exchanges in the past that have closed down due to scams or heists, Buttercoin is ending services due to lack of funding. “We remain 100% secure & solvent with all customer funds accounted for,” the announcement said.

Apr 06 10:38

Cops Arrest Woman For Cursing On Facebook

A Facebook feud ends with a Chesterfield woman in police custody. She was charged with harassment by computer.

"I feel like it's ridiculous because we were all guilty," said 26-year-old Kristin Holmes. "And I admit...I was childish and argued as well. Everybody was arguing."

Apr 06 09:56

New York judge rules that divorce papers can now be served through Facebook

A Brooklyn woman scored a judge’s approval to legally change her relationship status to “single” via Facebook.

In a landmark ruling, Manhattan Supreme Court Justice Matthew Cooper is allowing a nurse named Ellanora Baidoo to serve her elusive husband with divorce papers via a Facebook message.

Apr 06 08:12

Automakers Say You Don’t Really Own Your Car

Most of the automakers operating in the US filed opposition comments through trade associations, along with a couple of other vehicle manufacturers. They warn that owners with the freedom to inspect and modify code will be capable of violating a wide range of laws and harming themselves and others. They say you shouldn’t be allowed to repair your own car because you might not do it right. They say you shouldn’t be allowed to modify the code in your car because you might defraud a used car purchaser by changing the mileage. They say no one should be allowed to even look at the code without the manufacturer’s permission because letting the public learn how cars work could help malicious hackers, “third-party software developers” (the horror!), and competitors.

Apr 06 08:10

US, Saudis Target Internet Access in Yemen

In past wars of aggression, US have first targeted TV stations and radio communications bases, but in the 21st century, targeting internet access is essential in order to keep real information from circulating between the target nation and the outside world, but also between citizens attempting to coordinate inside the target nation.

Aden is the access point for one of only two submarine fiber optic cables which connect Yemen to the rest of the world. That cable which connects Yemen to the US AFRICOM-controlled client state of Djibouti across the Gulf of Aden in east Africa, home of one of the Pentagon’s largest off-shore military bases. It has gone dark for the last three days and counting. This would indicate direct interference or sabotage.

Apr 06 07:54

Kuwait’s top court upholds jail term of activist

Kuwait’s Supreme Court has upheld a two-year prison term handed down to opposition activist, Ayyad al-Harbi, for posting Twitter messages considered offensive to the ruler of the Persian Gulf country.

The Sunday ruling came as online activists strongly censured the sentence given to Harbi, a journalist in his 20s at the country’s Sabr news website who has remained in captivity since May 2014 following an appeals court ruling that upheld the original jail term.

The journalist’s online supporters further argued that he had only re-posted on Twitter a verse written by Iraqi poet Ahmad Matar in which he slammed corrupt Arab dictators.

Apr 06 06:47

Bill to Ban Undetectable 3-D Printed Guns Is Coming Back

Since Congressman Steve Israel first called for legislation that would ban 3-D printed guns, those plastic-printed firearms have evolved from a few simple components to a full one-shot pistol to rifles and multi-shot revolvers, with more advances on the horizon. Israel’s bill, meanwhile, has gone nowhere, leaving a widening gap between DIY weapons and the law.

Apr 06 06:43

Last Week Tonight with John Oliver: Government Surveillance (Edward Snowden as guest)

There are very few government checks on what America’s sweeping surveillance programs are capable of doing. John Oliver sits down with Edward Snowden to discuss the NSA, the balance between privacy and security, and dick-pics.

Apr 05 17:52

Woman Arrested For Posting Selfie With Gun on Facebook

Henrico, VA– Be careful what you post on Facebook, or you could be charged with a crime over your smiling selfie. This is something 26-year-old Kristin Holmes learned the hard way this week when she was arrested and charged with a crime she referred to as “Facebook Thugging,” for posting of a photo of herself with a handgun. It’s not just photos that can get you in trouble though, the Fraternal Order of Police is warning that in Virginia, you can be charged with this crime even for swearing.

Apr 05 09:02

New Encryption Software Gets Thumbs-Up From Snowden

In the USA today, the NSA justifies its blanket surveillance on all of our digital data on the basis that they are supposedly “tracking terrorists.” Yes, that is the only reason that is given, but intelligent citizens know better – they know that this is nothing more than a modern, openly fascist system of control designed to track and target anyone whom the government deems a threat to their control system.

With all the resources and unlimited funds which the US federal government has at its disposal, can encryption really work to protect your privacy?

Here’s one product which is showing promise…

A long-awaited security audit of computer software assumed to be impervious to state-sponsored surveillance now suggests that the program, TrueCrypt, is free of any government-sanctioned vulnerabilities or backdoors.

Apr 05 08:42

ZIO BEX ALERT ~~ ZIONIST ‘COPYCAT’ HACKS ISRAELI SITE

In what appears to be a zionist copycat site of Anonymous, AnonGhost is claiming to have hacked the Website of Meretz, a zionist ‘left’ wing political party in Israel.

What seems to be the giveaway as to who is behind this group can be found on their FaceBook Page, in the form of this image …

Apr 04 12:28

AMC goes after “The Walking Dead” spoiler pirates

And AMC didn’t stop at a takedown notice

Apr 04 10:26

8 Things You Wouldn’t Think Are Spying on You, but Are

The next time you take a trip to the mall, make sure you give those mannequins a big smile. The surveillance industry’s latest recruit—joining the ranks of the Statue of Liberty, vending machines, Kinect, and a litany of other seemingly innocuous retail products—is store mannequins. The $245 billion dollar luxury goods industry currently avails itself of five companies in Europe and the U.S. that use the EyeSee polystyrene frame mannequins, whose eyes are equipped with police grade face-recognition cameras.

Apr 04 08:03

Israel’s propagandists shoot themselves in the foot as they shoot off their mouths

They are known by the language they use: depraved sexual insults, bile, bigotry, threats, disinformation and character assassination. That’s right: I’m talking about “hasbarats,” Zionist trolls who infect the Internet with hasbara, pro-Israel propaganda. Of course, mainstream media hasbarats have been around for decades, as have “hasbaratchiks,” fifth-columns in foreign governments who subvert national policies to serve Israel. The Internet, though, is the latest, some might say the greatest, propaganda playground, and Israel cannot cope with factual, passionate, well-documented stories that expose its war crimes and unrepentant criminality.

Apr 04 07:03

8 things you wouldn’t think are spying on you, but are

The next time you take a trip to the mall, make sure you give those mannequins a big smile

Apr 03 17:44

In the robotic near-future, most “will live off government-provided income”

If you think the jobs market and larger economy are bad now, just wait for the future

Apr 03 16:38

A Minute with Federal Counsel in Meyer v. U.S. Bank. Bankruptcy/Foreclosure Appeal

Friday, April 3, 2015

A KingCast/Mortgage Movies Minute with Federal Counsel in Meyer v. U.S. Bank.

U.S. Bank et al. got smacked in the Bankruptcy Court and now appeals. Plaintiff/Appellee Attorney Richard Jones asks "If I provide documents to this Court which contained material misrepresentations, would this Court let me off the hook?"

Judge Martinez:
"At what point does the Magistrate have an affirmative duty to investigate the veracity of these documents that are put before it?"

Richard Jones, Esq.:"Under the Deed of Trust Act strict compliance is required. Substantial compliance is insufficient. The problem Judge Overstreet was facing is NWTS did not even have procedure to investigate. That is material and goes to the Public Impact -- they were flying blind" (as admitted by Jeff Stenman -- see Ha Dao Jeff Stenman videos at Affordable Video Depo).

Judge Martinez:

Apr 03 14:58

Man beats child porn rap by proving unintentional downloading

Every day, the popular uTorrent client is used by the masses to legally or illegally download all manner of torrent files. With that comes the risk of computer infections or a lawsuit from a copyright holder.

A suburban Illinois man got way more than what he bargained for after the history buff downloaded files on World War II ordnance. What 40-year-old Wojciech Florczykowski of Schaumburg got in 2011 was an extreme visit from the FBI and ultimately a charge of child-porn possession.

Apr 03 14:55

After Obama's cybersecurity order threatens Snowden fund, bitcoin donations spike

A new executive order is said to have made it illegal to donate to Edward Snowden's fund, which didn't go down so well with one good-spirited community.

Apr 03 13:57

How Google AdSense Censors the News

The Internet's largest ad network won't support sites that show what happened at Abu Ghraib—but company reps say they're only enforcing the rules.

Apr 03 12:37

Google Pays $8.5 Million in Illegal Data Sharing Suit

Google will pay $8.5 million, most of it to nonprofit organizations, to settle a class action that claimed that it illegally divulged users' search information to third parties, a federal judge ruled.

Apr 03 11:22

14-Year-Old Windows XP Still Has More Users Than Windows 8.x

Microsoft ended support for Windows XP a year ago, but that hasn't stopped nearly two out of every 10 Windows users from clinging to the legacy operating system, according to data collected by Net Applications. What's even more interesting about Windows XP's 16.94 percent of the desktop PC market is that it once again has eclipsed the number of Windows 8 and 8.1 users combined.

Apr 03 09:49

CDC building ‘police state’ registry system to track your vaccination status

Imagine a world in which the government has free access to your private medical records for the purpose of ensuring your compliance with official

Apr 03 08:57

The Cybersecurity Bill CISA: Big Brother Just Got Bigger

Ted Baumann
Activist Post

Yesterday I fell for an April Fools’ joke for the first time (that I can remember, at least).

A blog post, ostensibly from Georgia Tech, announced a new program to award credit to students who use their smartphones while logged on to the campus Wi-Fi system. “Every website visit, post, tweet, photo, and yes, even yaks are available and tied to a user,” it said. “Grades are assigned using machine learning that has been trained to recognize intellectually valid content. The student receives a monthly report of their progress. The more they use the Internet, the faster they graduate.”

At first I thought, “So much for digital privacy on campus.” When I realized I’d been had, I chuckled, seeing my bamboozlement as a by-product of age.

Apr 03 08:57

AUD$250,000 Crypto Throwdown

We appreciate that if and when modern cryptographic systems/programs are broken, it is usually due to implementation errors (and sometimes misinterpretation of specifications themselves), and not the underlying crypto itself. To that end, through September 30th, 2015 we are proudly sponsoring this "Crypto Throwdown" and welcome any and all to break the methods and/or our implementation in toplip, our x86_64 linux command line encryption utility. Full source code is available to toplip itself, along with extensive documentation on our design and the resultant output contained here in our throwdown.

Apr 03 08:41

FBI Uncovers Another Of Its Own Plots, Senator Feinstein Responds By Saying We Should Censor The Internet

The "Anarchist's Cookbook" is itself a government hoax, published and sold to create the impression that there is a dangerous underground of anarchists justifying greater FBI powers and funding. However, anyone who is a real expert in explosives will tell you that the recipes given in the book are missing key stabilizing ingredients, and are intended to trick some poor idiot into blowing up his garage, which would then provide headlines for the "crazed lone nut bombing anarchist" to feed the propaganda. If you have a copy of that book, PLEASE DO NOT TRY THOSE RECIPES FOR YOURSELF!

Apr 03 06:56

Sony buys OnLive streaming game service, which will shut down later this month

In a bid to beef up its own PlayStation Now service, Sony is acquiring OnLive's patents for an undisclosed sum. Everything else is being shut down.

SHARE THIS ARTICLE WITH YOUR SOCIAL MEDIA