COMPUTERS/INTERNET/SECURITY | WHAT REALLY HAPPENED


COMPUTERS/INTERNET/SECURITY

Jul 10 11:54

Smart Meters and Domestic Surveillance

Catherine J. Frompovich, Guest
Waking Times

Talk about copycats! Whoa! Someone did a rather convincing job of that, I’d say. It’s the Internet site “Domestic Surveillance Directorate. Defending Our Nation. Securing The Citizen,” which identifies itself as a “parody” on the NSA (National Security Agency). The parody site does an excellent job, so I encourage readers to study it thoroughly, as it contains too much information to talk about here.

Jul 10 11:07

Katherine Archuleta ousted as OPM director after massive data hack

Katherine Archuleta, the chief human resources officer who oversaw arguably the worst data breach in federal history, was ousted Friday, just a day after she insisted she was staying in for the long haul.

Jul 10 10:43

A List of Companies was handed out on Floor of NYSE BEFORE trading began–CNN then pulls story 5 hours later!

I felt I needed to record a clip by CNN about the "tech glitch" where a CNN reporter clearly indicates that a list of "problematic stocks" was circulated to traders and stockbrokers on the floor before the market opened. This CNN news clip has since been removed, and I can't find it anywhere.

Jul 10 08:18

Amazon releases the ultimate Big Brother spy device that constantly listens to everything you say in your own home

Some of the most invasive new technology is being marketed as invaluable tools that "help" around your home or office, so-called "Internet of Everything" devices that have massive potential to serve as spy tools for snooping authorities.

One such device is being marketed by online retail giant Amazon. Called the Amazon Echo, it is a voice-activated "knowledge" device designed to respond to users' questions. But to do so, the device continually monitors all sounds for your voice, and as such, given its Internet connectivity, could serve as a surveillance device to anyone who has the ability to hack into it.

Jul 10 07:46

Second OPM hack puts 21.5 million people at risk

A second data breach at the US Office of Personnel Management has affected 21.5 million people, with the hackers stealing sensitive information such as Social Security numbers and putting them at risk of identity theft, the agency announced.

Jul 10 07:00

No One Is Safe: $300 Gadget Steals Encryption Keys out of the Air, and It’s Nearly Unstoppable

Just when you thought you were safe, a new hacking toy comes along and rocks your world. Imagine a tool exists that lets hackers pluck encryption keys from your laptop right out of the air. You can’t stop it by connecting to protected Wi-Fi networks or even disabling Wi-Fi completely. Turning off Bluetooth also won’t help you protect yourself.

Why? Because the tiny device that can easily be hidden in an object or taped to the underside of a table doesn’t use conventional communications to pull off capers. Instead it reads radio waves emitted by your computer’s processor, and there’s really nothing you can do to stop it.

Researchers at Tel Aviv University and another Israeli research center called Technion have created a terrifying new hacking tool that can steal encryption keys out of the air.

Jul 10 06:57

Broken cable reportedly disconnected US island territory from Internet

Northern Mariana Islands relies on a single under-sea fiber cable, which broke.

Jul 10 06:54

US govt hack includes 1.1 mn fingerprints

A cyberattack on the U.S. Office of Personnel Management (OPM) that saw 22.1 million personal records stolen also involved the loss of 1.1 million fingerprints, the OPM has noted in a statement.

The data was taken from people who have undergone background checks for security clearances.

The total number included some 19.7 million who applied for the clearances for federal roles, plus 1.8 million non-applicants, mostly spouses or co-habitants of applicants, the agency said.

The 1.1 million fingerprints stolen represents 0.3% of the US population, while the total of 22.1 million represents almost 7%.

Jul 10 05:57

Cyber Guard Exercise Simulated Attacks On Critical Infrastructure

WEBMASTER ADDITION: So maybe they broke into OPM's database, and China gets the blame. Because if you think about it, stealing blackmail information only has value if nobody knows the crime took place. The blackmailer is very selective and only steals what they need, to minimize the risk of detection. Stealing tens of millions of records is intended to be noticed! That is why I do not think China had anything to do with this.

Jul 09 14:46

Jim Sinclair: I Think the PPT Knew They Were Going to Be Overwhelmed & Pulled the Plug!

Scenario number three seems to me to be the meatiest. I spoke to Jim Sinclair while the market was in closure to see what his take was. He immediately said to me; “it’s like if in a casino and everyone starts winning, mysteriously either the lights go out of someone pulls a fire alarm …no more gambling! I think the PPT knew they were going to be overwhelmed, if this were the case and I was the chairman of the NYSE, I would run upstairs and pull the plug out of the wall. …Problem solved …for now!“.

Jul 09 14:08

New Internet Censorship Law Could Be Coming to South Africa

Only once in a while does an Internet censorship law or regulation come along that is so audacious in its scope, so misguided in its premises, and so poorly thought out in its execution, that you have to check your calendar to make sure April 1 hasn’t come around again.

Jul 09 13:23

France’s Biggest Bank Says Bitcoin Could Make Banks Redundant

By Derrick Broze

In another sign that the world is taking bitcoin seriously, an analyst with French bank BNP Paribas says bitcoin’s blockchain technology could make existing companies “redundant”.

In BNP’s magazine Quintessence, analyst Johann Palychata writes that the blockchain “should be considered as an invention like the steam or combustion engine.” Palychata writes that the blockchain has the potential to change the world of finance, if not the entire world...

Jul 09 12:53

Fed data hack reached staggering 21 million

Federal officials admitted Thursday that hackers got the most sensitive personal information from more than 21 million Americans, further raising the stunning estimate of damage from the cyber intrusion, which has caused chaos at the government’s main human resources agency.

Webmaster's Commentary: 

Notice that when THEIR privacy is being invaded, it's a bad thing! Too bad they are not as concerned when us ordinary "Little people" citizens have our Fourth Amendment rights violated by NSA!

Jul 09 12:35

Brainet: Scientists Establish Brain-to-Brain Networks in Mammals

By Nicholas West

The realization of full brain-to-brain and brain-to-computer-interface technology appears to be reaching an imminent reality. Neuroscientists at Duke University claim to have introduced "a new paradigm for brain-machine interfaces that investigates the physiological properties and adaptability of brain circuits, and how the brains of two or more animals can work together to complete simple tasks." This interface is being called a Brainet; and shows how both lower-level mammals such as rodents, as well as primates at the higher level can now exchange brain activity information in real-time...

Jul 09 11:29

Hillary Clinton’s claim that ‘everything I did [on e-mails] was permitted’

With her very careful language, Clinton skirts some of the important issues concerning her private e-mail account. She appears to be arguing her case on narrow, technical grounds, but that’s not the same as actually complying with existing rules as virtually everyone else understood them.

In reality, Clinton’s decision to use a private e-mail system for official business was highly unusual and flouted State Department procedures, even if not expressly prohibited by law at the time. Moreover, while she claims “everything I did was permitted,” she appears to have not complied with the requirement to turn over her business-related e-mails before she left government service. That’s a major misstep that she has not acknowledged.

We wavered between Two and Three Pinocchios, but Clinton’s excessive spin finally tipped us toward Three. She’s goes too far in suggesting her actions were ordinary–and did not stretch the limits of existing laws and regulations.

Jul 09 10:22

101 US Cities Have Pledged to Build Their Own Gigabit Networks

The US has a big and rather complicated internet speed problem. Its broadband infrastructure is woefully behind in speed and price compared to a broad swath of other countries, and much of this has to do with its tenacious commitment to maintaining the status quo: that is, giving big telecommunications companies a lot of our money without being able to demand a fair amount in return.

Jul 09 10:04

NYSE, SEC Suspect Software Update Triggered Trading Halt

A computer malfunction that knocked out trading at the New York Stock Exchange for more than three hours Wednesday probably stemmed from a software update that went awry, said two people briefed on a preliminary review.

Webmaster's Commentary: 

Oh yes, we believe the stock market updates its software in the middle of the trading day, rather than overnight when trading is not occurring. Yeah, we believe that. Just as we believe that humans are warming the Earth, Saddam had nuclear weapons, the unemployment rate is just 5.3%, the Lusitania wasn't carrying weapons, etc. etc. etc.

Jul 09 08:06

Gowdy: Hillary Had Three Subpoenas, Two Before Server Was Wiped

Representative Rep. Trey Gowdy said Hillary Clinton actually had three subpoenas, two of which were sent before her server was wiped on Wednesday’s “Hugh Hewitt Show.”

Jul 09 07:53

Federal workers sue over hacking of personnel records

The National Treasury Employees Union said on Wednesday it has sued a federal government hiring agency over recent cyberattacks, alleging it violated constitutional privacy rights of NTEU members by failing to keep their personnel records safe.

Webmaster's Commentary: 

Oh, so when it is government workers' privacy being violated, NOW it's a big stink!!!

Jul 09 07:11

NSA snooped on German chancellors for DECADES: Wikileaks

“The names associated with some of the targets indicate that spying on the Chancellery predates Angela Merkel as it includes staff of former Chancellor Gerhard Schröder (in office 1998–2002), and his predecessor Helmut Kohl,” Wikileaks claims. “This mirrors the US approach to its targeting of French officials, which showed interceptions extending back to President Sarkozy and President Chirac.”

Jul 09 06:53

Insanity on the Thames

UK Prime Minister David Cameron is a seriously deluded man. First, he apparently believes Facebook and Twitter users currently have "absolute privacy" in their communications. That is nonsense. Second, Cameron believes this nonexistent absolute privacy is unsustainable and intolerable. He wants to destroy it as soon as possible.

This is necessary, Cameron told Parliament, because tolerating such privacy would "leave a safe space" for terrorists to communicate with each other.

Contrary to Mr. Cameron's assurance, Britain certainly is trying to "search through everybody's emails and invade their privacy." The U.S. government is doing the same. This is a well-established fact known to anyone paying attention since Edward Snowden spilled the beans two years ago. For Mr. Cameron to say otherwise – while speaking to the Mother of Parliaments, no less – is a bald-faced lie.

Webmaster's Commentary: 

Banning encryption for the law abiding citizens will have no effect on terrorists or criminals because terrorists and criminals can create their own systems of encryption which NSA and CGHQ cannot break. I know, because over at my website we did just that. We created and issued 6 encryption challenges to the NSA, none of which were solved, and the NSA was well-motivated to break those codes to discourage others from creating their own encryption systems. I am not a professional encryption expert and only a moderately decent programmer, and if I can defeat the NSA, so can real terrorists and criminals, and that means that David Cameron is indeed lying. He wants to peek into the private affairs of law-abiding British people.

Jul 09 06:51

The End of Encryption? NSA & FBI Seek New Backdoors Against Advice from Leading Security Experts

FBI Director James Comey is set to testify against encryption before the Senate Intelligence Committee today.

Jul 09 05:56

Artificial intelligence takes the battlefield: Who is really running Jade Helm 2015?

There is more to the story than just training for martial law in states designated as “hostile states” – already a chilling pretext with overtones of greater federal power that could spiral out of control.

Jul 08 20:54

Attorney-General appeals for release of Kim Dotcom's devices to US

The Attorney-General's appeal to send Kim Dotcom's computers and other devices to the US continued in the Court of Appeal today, with the Crown arguing for cloned devices and their passwords to be released to the US.

Last December, the court ruled the search warrants executed in the high profile 2012 raid on the internet entrepreneur were valid, although Chief Justice Sian Elias issued a dissenting view.

Read also:
• New Mega constitution paves way for listing after backdoor route closed
• Mega's legal guns shoot down claims of 'content theft'

Appearing in the Court of Appeal before Justices Tony Randerson, Lynton Stevens and Douglas White today, Merran Cooke from the Crown Law Office sought to quash restrictions on sending the devices to the US.

Jul 08 20:53

What will happen to the Internet if Reddit shuts down

If Reddit went offline tomorrow, you would see immediate ripples across the Internet.

First, and perhaps least importantly, traffic to porn sites would plummet.

Later, major news, entertainment and e-commerce sites, including YouTube and Amazon, would feel a notable, if not debilitating, hit.

And then, concur a dozen Reddit power-users, academics and social media experts interviewed by The Washington Post, life would go on as normal across the Internet.

Read more:
• Reddit is in meltdown as controversial CEO Ellen Pao faces revolt
• How bigotry costs the US economy

To be clear, no one actually expects the Internet's "front page," and its 35th most popular website, to shut down - not now, anyway. But in the wake of Reddit's latest and most traumatic bout of internal drama, several pundits have found themselves pondering the hypothetical worst case: one in which the tensions between Reddit's leadership and its user base topple the site, entirely.

Jul 08 19:06

What In The World Just Happened To The New York Stock Exchange?

Do you believe that the New York Stock Exchange shut down because of a “technical glitch” on Wednesday? At 11:32 AM on Wednesday morning, trading on the New York Stock Exchange was halted due to “internal technical issues”, and it did not resume until 3:10 PM.

Jul 08 17:47

FBI Director Says Scientists Are Wrong, Pitches Imaginary Solution to Encryption Dilemma

Testifying before two Senate committees on Wednesday about the threat he says strong encryption presents to law enforcement, FBI Director James Comey didn’t so much propose a solution as wish for one.

Jul 08 14:41

MICROSOFT LAYS OFF 7,800 WHILE LOBBYING FOR MORE IMMIGRANT WORKERS

Tech giant Microsoft announced Wednesday that it will be laying off approximately 7,800 employees worldwide, bringing a denunciation from a federal lawmaker who says the firings expose the company’s calls for more immigration.

Jul 08 11:32

Researchers find previously unknown exploits among Hacking Team's leaked files

Researchers sifting through 400GB of data recently leaked from Hacking Team, an Italian company that sells computer surveillance software to government agencies from around the world, have already found an exploit for an unpatched vulnerability in Flash Player.
New York Stock Exchange shortly after trading was halted
Computer issues halt trading on New York Stock Exchange

A computer glitch halted trading on the New York Stock Exchange this morning.
Read Now

There are also reports of exploits for a vulnerability in Windows and one in SELinux, a Linux kernel security module that enforces access control policies. The flaws were supposedly used by the company's customers to silently deploy its software on computers belonging to surveillance targets.

Jul 08 11:29

FBI and Comey Find New Bogeyman for Anti-Encryption Arguments: ISIS

After months of citing hypothetical crimes as a reason to give law enforcement a magical key to unlock encrypted digital messages, FBI Director James Comey has latched onto a new bogeyman: ISIS.

In a speech he gave in October 2014 as part of his coordinated push to make the case that the FBI is “going dark,” Comey leaned on examples of kidnappers and child abusers who texted details of their violent plots that law enforcement agents weren’t privy to.

But, as The Intercept reported shortly after, those examples were largely bogus and had nothing to do with encryption.

Now, in a preview of his appearance Wednesday before the Senate Intelligence Committee, Comey is playing the ISIS card, saying that it is becoming impossible for the FBI to stop the group’s recruitment and planned attacks. (He uses an alternate acronym, ISIL, for the Islamic State.)

Webmaster's Commentary: 

Sure, all we have to do is get ISIS to not write their own encryption software, rely on the government-approved back-doored systems, and all will be just peaches and cream!!!!!!

Jul 08 11:26

New York Stock Exchange suspends trading

The New York Stock Exchange suspended trading at 11:32 a.m ET Wednesday. It's been down for over two hours.

In a brief announcement, the exchange said it was experiencing a "internal technical issue." The NYSE said later in a tweet that it's "not the result of a cyber breach."

NYSE President Thomas Farley told CNBC they hope to have trading resume between 2:30pm and 2:45pm ET.

The Department of Homeland Security told CNN that there is "no sign of malicious activity" at the NYSE or with an earlier outage experienced by United Airlines. The FBI says it reached out to NYSE and "no further law enforcement action is needed at this time."

Webmaster's Commentary: 
Jul 08 10:05

Nationwide Computer "Glitch" Grounds All United Airlines Flights

Seems like 'glitches' are becoming a little too common...

Jul 08 09:13

New York Stock Exchange shut down over tech glitch

The New York Stock Exchange had to shut down trading abruptly shortly before noon Wednesday over what officials said was a technical malfunction that froze computers on the market’s fabled trading floor.

One of the world’s biggest stock exchanges had seen shares trending down throughout the morning because of economic crises in Greece and China, but all trading halted at 11:32 a.m. as data on trades and prices apparently stopped coming into the traders’ computer screens.

Webmaster's Commentary: 

Could this be the start of the virtual 9-11?

The website for the Wall Street Journal was also down for a while!

Jul 08 09:13

VIRTUAL 9-11: Will the US & Israel Hack The US Banking System Computers and Falsely Blame It On Iran (or Syria or Russia or China)?

So what it looks like is being planned, and pre-sold to the American people with all these stories about celebrities' personal information being hacked and made public (an activity that produces no profit for the hackers other than news headlines), and the "Syrian" (nudge nudge wink wink) hack of the AP Twitter feed that shocked the US stock market, is that the US Government will itself take down the US financial computers, and blame it on Iran /Russia/ China/Al Qaeda/Syria/Arabs and others to be named as convenient. This gets Wall Street and Washington DC off the hook, because now the financial melt-down is an act of war, rather than the result of decades of Wall Street crime and corruption and the predations of Private Central Banks.

Optional Banner: 
WRH Exclusive
Jul 08 08:34

Berlin pours bucket of flat beer on Patriot missile hack report

Germany's Defence Department told Die Welt says it has "no evidence" of the attack and says such an attack is "extremely unlikely".

German public sector magazine Behoerden Spiegel says one attack vector may be the sensor shooter interoperability which provides real-time information between command and weapons systems.

Another could be the overall control chips which direct weapons guidance.

Together the magazine speculates attackers could have stolen data and accessed missile control.

Former MI5 agent and whistleblower, Annie Machon, told RT the usually highly secure US weapons could contain backdoors.

Jul 08 08:24

The impossible war on encryption

"Britain is not a state that is trying to search through everybody's emails and invade their privacy," according to Prime Minister David Cameron. "We just want to ensure that terrorists do not have a safe space in which to communicate."

Webmaster's Commentary: 

BULL BISCUITS! Of course they want to read everyone's email and the proof is that banning encryption will not find terrorists because terrorists can create their own systems of encryption strong enough to defeat the NSA and GCHQ. I know because we did it! We created 6 NSA code challenges and not one was solved. And I am not a professional encryption expert and only a moderately decent programmer.

So forbidding law abiding citizens from using encryption while being unable to read encryption created by real criminals and terrorists leaves us with the inescapable conclusion that David Cameron is in fact about to spy on all the law-abiding British people, to make sure they are not thinking those double-plus ungood thoughts!

Jul 08 05:19

Intentionally shifting the mystic morphic field

Researchers found within the computer informational field what appears to be proof of foreknowledge of 9/11. The huge spike in chatter regarding the events immediately prior to the strikes is completely anomalous. In other words, it goes on to say, for it to be just a coincidence is next to impossible.

Jul 07 19:53

Hackers ruin Bundestag computer network

A hacker attack on the Bundestag (German parliament) earlier in 2015 means that an entirely new network will have to be built after experts failed to fix the breach.

Jul 07 19:44

Prepare for a high severity flaw, OpenSSL warns users

Server admins and developers beware: The OpenSSL Project plans to release security updates Thursday for its widely used cryptographic library that will fix a high severity vulnerability.

OpenSSL implements multiple cryptographic protocols and algorithms including TLS (Transport Layer Security), which underpins encryption on the Web as part of protocols like HTTPS (HTTP Secure), IMAPS (Internet Message Access Protocol Secure) and SMTPS (Simple Mail Transfer Protocol Secure).

The project didn’t say which part of the library is affected, but high severity flaws in OpenSSL are usually a big deal, especially if they impact TLS.

Jul 07 19:41

Security gurus deliver coup de grace to US govt's encryption backdoor demands

Nowadays the entire e-commerce system relies on encryption, as does much of the mobile telephony industry and corporate systems. Introducing flaws would cause more harm than good, they argue, and would cripple US businesses, since who wants to buy technology with a back door?

The paper also points out that there are massive technical challenges in instituting an encryption key escrow service, such as the one suggested by the director of the FBI, James Comey. Such a system would lock the industry into a specific crypto system and poses a major question – who holds the master decryption key?

Any body, public or private, holding such keys would be an instant target for hacking attacks, the authors point out. As we've seen with cases like the Office of Personnel hack, the White House hack, and various successful hacks against US military targets, there are no government servers where such powerful tools would be safe and yet speedily accessible to law enforcement.

Jul 07 19:35

‘Hacking Team’ Hack Proves Governments Can Spy On Jailbroken iPhones

Apple released iOS 8.4 just last week, and the software was jailbroken the very next day. Millions of users jailbreak their phones, and we’ve discussed many of the awesome jailbreak tweaks out there that give jailbreakers access to features most iPhone users will never experience.

That great functionality comes at a price, however.

As Macworld reports, documents counted among the 400GB worth of leaked Hacking Team files reveal that the company built and sold software that is capable of spying on users with jailbroken iPhones and iPads. Even more worrisome is the fact that the firm created computer malware that can automatically jailbreak and infect a connected iPhone.

Hacking Team charged clients more than $55,000 for this particular piece of software, and one leaked document said the program is capable of monitoring Skype communications, WhatsApp messages and Viber conversations, as well as location, contact lists and call logs on infected iPhones.

Jul 07 13:59

Surveillance Company Hacking Team Exposed

A 400 gigabyte trove of internal documents belonging to surveillance company Hacking Team has been released online. Hacking team sells intrusive hacking tools that have allegedly been used by some of the most repressive regimes in the world.

Jul 07 12:37

NEW WRH WEBSITE - STATUS REPORT

Webmaster's Commentary: 

UPDATE: BUMP TO THE TOP:

This morning I loaded up the new website and major parts were broken. I was pulling (what little remains of) my hair out trying to figure out what I had done wrong, then remembered that Firefox installed an automatic update last night. Sure enough, when I looked at the new site using Chrome, the broken parts had magically healed. A quick check with several browsers shows the site's responsive theme displaying differently in every one! (It actually works on the iPhone).

I have only one more problem to solve before I launch the new site and I am hoping someone out there knows enough about responsive themes to force the node content to display as a single column as Chrome tries to display the "member-story" or "WRH exclusive" banners (which are larger) side by side with the scaled YouTube videos. Without the video scaling, it seems to work, but for some reason the responsive theme is trying to jam two very wide items into the limited horizontal space. Oh how I miss the days of newlines and page breaks, but such things are VERBOTEN in the current state of the art of web design!

Anyone know anything about how to tame a responsive theme that gets "creative" with placements? Thanks.

"And the Lord said, “Indeed the people are one and they all have one language, and this is what they begin to do; now nothing that they propose to do will be withheld from them. Come, let Us go down and there confuse their language, that they may not understand one another’s speech.” -- Genesis 11:6–7





Optional Banner: 
WRH Exclusive
Jul 07 09:03

The FBI Spent $775K on Hacking Team’s Spy Tools Since 2011

Hacking Team has generated a total of 697,710 Euros ($773,226.64) from the FBI since 2011, according to the hacked spreadsheets. In 2015, the FBI spent 59,855 Euros on “maintenance,” and in 2014 the agency spent the same amount on “license/upgrades.” No expenditure was recorded for the whole of 2013.

In 2012, however, the FBI allegedly spent 310,000 Euros for Hacking Team’s services, all on licenses or upgrades, and the year before it spent 268,000 Euros.

Jul 07 08:55

Quebec Is Getting Ready to Block Websites It Doesn't Like

Since the announcement in April, there has been surprisingly little public commentary about the Quebec plan. Quebec-based Internet providers may have privately raised concerns, but consumer groups have remained largely silent. That needs to change, since Quebec's plan to block access to gambling sites could easily expand to other areas.

Once blocking Internet content is established, it is easy to envision governments moving down a slippery slope, requiring the blocking of sites that are alleged to infringe copyright or blocking e-commerce sites that are not bilingual or do not pay provincial taxes. If that happened, the open Internet in Canada would be placed at risk of unprecedented government intervention into how Internet providers manage their networks and what sites Canadians are able to access.

Jul 07 08:47

Hacking Team used shockingly bad passwords

It didn't take long for those sifting through scores of the documents to discover how the hack might have happened.

The root passwords for Hacking Team's servers were inexplicably weak for their purpose. One of the passwords was simply "P4ssword," which would've taken any advanced password cracker just minutes to crack.

Other passwords grabbed from Hacking Team founder Christian Pozzi included "wolverine" and "universo," and other variations of dictionary words like "Passw0rd".

n/a

n/a
Jul 07 07:14

Foreclosure Mill Attorney J. Will Eidson Runs From Cameras During Inspection of Deutsche Bank Original Note.

8 July update from Ms. Erickson: The blank unendorsed note is what Valerie states proves is now a securities fraud instrument good or fake. The prospectus of the trust states it has to be endorsed into the trust. It says to send it in blank and then deposit it into the trust along with the assignment, that never happened and stayed on county records in Long Beach name until Rebecca Dietrich, a Chase employee signed by power of attorney for DBNTC seven years after the trust closed.

I have long wondered about this because a Note can't be in two places at once, think about it. I know there is some Decisional law on this so I'll start looking into it. I think Erbobo v. Wells Fargo touches on this:
http://stopforeclosurefraud.com/2013/05/02/kaboom-wells-fargo-bank-n-a...

Jul 06 18:43

San Francisco City Attorney Bans P2P Parking Apps, Threatens Users with Fines, Asks Apple to Remove from Global App Store

By Activist Post

The MonkeyParking app will have to delay their hopes of solving the parking problem in the greater San Francisco area because of a cease-and-desist order issued by the city.

MonkeyParking is one of several apps banned by the city that help drivers locate and reserve parking spots faster. The apps allow current occupants of a parking space to get paid to notify nearby drivers of their soon-to-be vacancy.

The city, clearly envious that they couldn't figure out a way to profit from solving a problem on their own, declared the apps illegal...

Jul 06 14:32

360-565-5147 - Did this number call you?

Fake Google Partners, the recording told me that my Google Business page was unverified. When I spoke to a rep he told me that my page needed "work" and when I nicely explained that my business is an actual Partner of Google and I have reps at the Google office that help me set up business pages for my business and my clients he hung up on me.

Webmaster's Commentary: 

These calls to "conform" your page to Google are a SCAM, one that is undeterred by the "do not call" list and obviously invisible to the NSA!

Jul 06 11:22

It’s Here: Oregon First State to Launch “Pay-by-the-Mile” Driving Track and Tax Scheme

The freedom of driving is about to get a lot less free in more ways than one.

“Rare American” David Hastings, Oregon hybrid car owner told Fox News, “I’m a statist who is happy to blindly contribute to the total tyranny that has almost completely surrounding us all and I see no potential downsides to a technological control grid where the government tracks my every move—”

No wait, sorry, it was, “I’ve been free-loading on the highways for 20 years driving electric cars or hybrid cars, getting at least 40 miles to the gallon. So I haven’t been paying my share.”

Mr. Hastings apparently cannot wait to pay more taxes to drive on state roads while being tracked by the government as he drives on those roads. In fact, he has volunteered for this in a state transportation taxing scheme that will eventually be mandatory not just in all of Oregon, but likely the entire country.

Jul 06 11:16

shockwave player has crashed - can't they fix this?

Webmaster's Commentary: 

For as long as I can recall, my browsing (and website debugging) keep getting interrupted by the browser freezing and the message "Shockwave Player Has Crashed" along with a button to push to send in a crash report, which I dutifully press.

Can they not fix this?

As you can see from this Google search page this has become a major productivity-killer, and like the ignition switches or cancer-linked Glyphosate, the response seems to be ignore the problem and imply it is politically incorrect to call attention to the faults.

We don't allow shockwave at WRH because it is a major security problem (and we got burned once with an advertiser), and I have to wonder with Adobe clearly uninterested in making it work properly, why does anyone still use it?

Jul 06 10:16

Hillary Clinton slams China while Chinese bash U.S. allegations of hacking

During an Independence Day campaign rally in New Hampshire, Democratic presidential hopeful Hillary Clinton accused the Chinese of stealing corporate secrets and pilfering U.S. government information. She received a chuckle from the assembled crowd on Saturday when she said that the Chinese were trying to "hack into everything that doesn't move in America."

But Chinese government officials on Sunday, through their state-run newspaper Xinhua, claim that there is a new wave of "China-bashing" in the U.S. by political leaders, the latest accusation being that China is responsible for the recent hacking into U.S. federal computer networks. The news service's editorial board claims these unfounded accusations are may have harmful effects on future Sino-U.S. relations.

Webmaster's Commentary: 

I'll wager a Euro that Hillary will next claim that the Chinese planted all that incriminating information on her private server!

Jul 06 09:41

Silverlight dumped in Microsoft plugin spring cleaning with Edge

Along with throwing out ActiveX, VBScript, and IE8 quirks mode, Microsoft has decided that Silverlight has no place in its upcoming Edge browser.

Jul 06 08:40

West is losing the Twitter battle with fanatics, says general

The Armed Forces must be prepared to use Facebook and Twitter to spread “lies” to help fight Isil, a senior British military commander has said.

Jul 06 08:22

5 Best Bitcoin Wallets To Protect Your Privacy

By Poly Paradyme

The right to privacy is in many ways ingrained into this country’s paradigm. For decades it has been a mainstream opinion that what we do privately and does not harm others is no one’s business. Our lives and privacy needs have grown into the cloud machine of the internet and our money has caught up with us in regards to Bitcoin.

This rise of digitized connectivity has also resulted in new ways for your privacy to be violated...

Jul 06 04:35

Hackers hacked: Malware firm's data leaked, ties with regimes exposed

An Italian company that sells hacking tools to various governments was apparently itself the target of a hacker attack, resulting in its internal documents being leaked online and its deals with countries such as Sudan and Saudi Arabia exposed.

...

Among Hacking Team’s clients in invoices and other documents, dozens of countries are mentioned, including Egypt, Ethiopia, Morocco, Nigeria, Sudan, Chile, Colombia, Ecuador, Honduras, Mexico, Panama, the United States, Azerbaijan, Kazakhstan, Malaysia, Mongolia, Singapore, South Korea, Thailand, Uzbekistan, Vietnam, Australia, Cyprus, the Czech Republic, Germany, Hungary, Italy, Luxemburg, Poland, Russia, Spain, Switzerland, Bahrain, Oman, Saudi Arabia and the UAE.

Jul 05 13:43

A Censorship-Free Reddit Being Built On Decentralized Blockchain

The only problem is that reddit’s servers are hosted by a central organization. Because humans have interests, and no two humans’ interests align perfectly, it is often the case that the interests of reddit, Inc. come into conflict with reddit, the users. Sometimes this means too much advertising, but more generally it’s that reddit, Inc. focuses a little more on converting content into money so they can pay their bills and give a return to their investors, and a little less on building better tools and giving a better experience for the users of reddit. And the users don’t get paid for their labor.

Jul 05 08:55

Wikileaks Exposes How TISA Will Gut Financial Regulations All Over the World

It’s almost impossible to keep anything secret these days – not even the core text of a hyper-secret trade deal, the Trade in Services Agreement (TiSA), which has spent the last two years taking shape behind the hermetically sealed doors of highly secure locations around the world. According to the agreement’s provisional text, the document is supposed to remain confidential and concealed from public view for at least five years after being signed! But now, thanks to WikiLeaks, it has seeped to the surface.

Jul 04 21:08

This 20-year-old Student Has Written 100 Malware Programs in Two Years

TSPY_BANKER.NJH is a Trojan capable to identify when a user enters any of a target bank's URLs into their browser. The malware then shuts down the browser window (if it is running on Google Chrome), displays an error message, and then opens a fake Chrome window.

Once the victim enters the login details into the fake window, the information is sent back to the attackers address via email.

Jul 04 10:25

Peacekeeper 2.0 - Smartphone App Ushers in Peer-to-Peer Protection

By Activist Post

The state of police work in the U.S. continues to be called into question...

People are beginning to look to technology as a possible solution.

We previously reported on a community response app called Peacekeeper. Designed for smartphones, the app was built to encourage connectivity with your neighbors, family and friends in order to establish a network filled with people who already have earned your trust. The creators call this concept "Peer-to-Peer Protection."

As Americans celebrate the concept of independence, today July 4th, please read the latest updates on this project, watch their video, and learn how we can work together to fundamentally decrease our misplaced dependence on centralized security...

Jul 04 09:41

New Reporting: US Spied on German Media

While previous revelations showed that German officials have been the target of U.S. government spying, new reporting indicates that German press was targeted as well.

Both CNN and The Intercept reported Friday on incidents that took place in the summer of 2011 involving the CIA station chief in Berlin, who also represented the NSA at the U.S. Embassy; a top German government intelligence official, Günter Heiss; another senior intelligence official, Hans Josef Vorbeck; and the German news magazine Der Spiegel.

The publications' new stories detail an incident Heiss confirmed in testimony to the German parliament on Thursday.

Jul 04 09:18

Video: We take down hundreds of ISIS sites, fight w/o guns – ‘Anonymous’ hacker

Media propaganda has proven key to ISIS’ success. International efforts to stem the jihadists online have had little effect.

Jul 03 17:47

Azure Australia went TITSUP for about seven hours

Australia East region users had 'Inability to connect' on Friday

Jul 03 14:04

‘Cameron’s anti-encryption moves ill-thought out, leave no safe spaces to communicate’

Britain’s Prime Minister David Cameron wants to tackle terror at home by opening up people’s private chats, calling for measures to allow intelligence services to read your online conversations. The former leader of the Pirate Party in the UK thinks David Cameron’s anti-encryption moves are ill-thought out, and could spell disaster.

Jul 03 13:05

Exposed: Establishment-Funded ‘Security Network’ Spying On Users

An experiment by a Swedish researcher reveals that an online network used to ensure secure Internet communications may itself be under surveillance. Tor is free open source software and a popular open network used to anonymize communications on the Internet.

In 2013 it received more than $1,800,00 in funding from the US government and previous sponsors include; Google, The Ford Foundation and DARPA.

Jul 03 09:35

Why Nothing You Do On Your Phone Will Protect You From Surveillance, Spying, Hacking & Tracking

Jul 03 09:34

Stop Cell Phone Tracking, Spying, Stalking, Hacking and Eavesdropping


BUYER BEWARE - Soft cases are unreliable. We've tested a lot of products and most of them don't work reliably. We will show you how to prove that to yourself with your own simple test. THIS APPLIES TO ALL SIGNAL BLOCKING POUCHES, POCKETS AND BAGS THAT USE SIGNAL "BLOCKING" FABRIC TO "BLOCK" SIGNALS; the kind of material on the outside doesn't matter.

Jul 03 08:30

Former Merkel aide defends himself over NSA claims

The former head of Angela Merkel's chancellery, Ronald Pofalla, has blamed the media for misinterpreting the ongoing NSA affair. Finding no fault in his behavior, he instead voiced concern about Germany's security.

Jul 03 07:28

Government Trolls Are Using "Psychology-Based Influence Techniques" On YouTube, Facebook And Twitter

Have you ever come across someone on the Internet that you suspected was a paid government troll? Well, there is a very good chance that you were not imagining things. Thanks to Edward Snowden, we now have solid proof that paid government trolls are using “psychology-based influence techniques” on social media websites such as YouTube, Facebook and Twitter. Documents leaked by Snowden also reveal that government agents have been conducting denial-of-service attacks, flooding social media websites with thinly veiled propaganda and have been purposely attempting to warp public discourse online. If we do not stand up and object to this kind of Orwellian behavior, it is only going to get worse and worse.

Jul 02 22:02

TISA Leaks Part Deux: More Evidence of Concerted Attack on Democracy

A WikiLeaks analysis shows how 52-nation Trade in Services Agreement threatens both net neutrality and personal data privacy.

Jul 02 09:50

Admission of Hillary Clinton’s classified emails opens door for feds to seize her servers

The State Department on Wednesday conceded that two dozen of Hillary Rodham Clinton’s emails did contain classified information, a fact that could trigger a U.S. policy that authorizes the government to take control of her private server and sanitize the contents.

A former senior intelligence official told The Washington Times the policy also requires the government to check other Internet paths her secret information could have taken.

Jul 02 09:41

US spying went beyond Merkel, ministers targeted: report

New documents released by WikiLeaks show that the United States did not just tap German Chancellor Angela Merkel’s phone but also eavesdropped on several ministers, the German daily Sueddeutsche Zeitung reported on Wednesday.

German-US relations were badly strained after fugitive US intelligence contractor Edward Snowden in 2013 revealed widespread US foreign surveillance, although a probe into the alleged tapping of Merkel’s mobile phone was dropped last month over a lack of evidence.

But according to the latest revelations the US National Security Agency (NSA) did not limit its snooping activities to Merkel, and showed particular interest in the activities of the ministries of finance, economy and agriculture, Sueddeutsche Zeitung wrote.

Jul 02 09:32

Germany appoints senior judge to inspect list of NSA targets

Germany on Wednesday named a former senior judge as special investigator to inspect a list of targets that German intelligence tracked on behalf of the U.S. National Security Agency (NSA), causing a political uproar.

Critics have accused Chancellor Angela Merkel's staff of giving the German BND foreign intelligence agency the green light to help the NSA spy on European firms and officials, triggering a scandal that has dented Merkel's popularity.

Jul 02 09:25

Amazon just wrote a TLS crypto library in only 6,000 lines of C code

Dubbed s2n for "signal to noise," the new library comprises just over 6,000 lines of C code. By comparison, OpenSSL consists of more than 500,000 lines of code, with around 70,000 of them devoted to TLS alone.

"Naturally with each line of code there is a risk of error, but this large size also presents challenges for code audits, security reviews, performance, and efficiency," AWS chief security officer Stephen Schmidt said in a blog post announcing s2n.

By implementing TLS from scratch in a leaner library that leaves out "seldom used options and extensions," AWS hopes to make it easier to spot and address security vulnerabilities in the code.

Jul 02 09:24

Europol vs ISIS: Battleground social media

The EU's law enforcement agency is taking on Islamic State's PR machine. Islamists have been getting the upper hand online, and have been recruiting thousands of foreigners for months. Now, Europol is finally creating a team to try and crush the social media propaganda of ISIS.

Jul 02 09:22

LG won't fix malware slinging bloatware update hole

The Budapest University of Technology and Economics' Security Evaluation and Research Laboratory (SEARCH-LAB) says "malicious attackers controlling the network are able to install arbitrary applications" on LG's Android phones, thanks to a flaw in their software update mechanism.

The Lab says the flaw impacts "all Android based LG Smart Phones", thanks to the "Update Centre" LG installs on its hardware to handle upgrades to the non-standard apps it uses to pollute handsets with bloatware add value in a crowded market. SEARCH-LAB says it informed LG of the flaw in November 2014.

"The Update Center application communicates with the host www.lgcpm.com through HTTPS," the SEARCH-LAB team write. "However, the SSL certificate of the server is not verified by the Update Center application at all, thus the connection can be hijacked by a man-in-the-middle attack."

Jul 02 09:13

NSA: Visualize Everything

The National Security Agency, while primarily occupied by sweeping up billions of phone calls, emails, texts and social media messages each day, wants better visual information about the earth and its residents, too, Admiral Michael Rogers said Wednesday.

"Signals intelligence ... ain't enough, you guys," the NSA chief told a gathering of contractors in the geospatial intelligence business. "We gotta create a much broader picture."

We need "the ability to visualize," he explained, because "man is fundamentally a visual creature."

Jul 02 09:02

Sloppy Cyber Threat Sharing Is Surveillance by Another Name

Cybersecurity is a serious problem, but it’s not going to get better with Congress doing whatever it politically can instead of doing what it should. It’s not going to get better by neutering the few privacy protections we have. Good security is supposed to keep your information safe. But these laws will make your private emails and information vulnerable. Lawmakers have got to start listening to experts, and experts are saying the same thing. Don’t just do something, do the right thing. And if you can’t do the right thing, then don’t do anything at all.

Jul 02 08:59

German media: Obama, NSA tactics a reminder of Nazi's Gestapo in Europe

The revelation of this latest information on spying has created a significant political uprising in Germany, a nation that has been historically victimized by spies in its midst. In the past, the German people had more than their share of experience with espionage due to the tactics of Adolph Hitler's Gestapo and then the communist-government's Stasi in East Germany. Experts believe this history of domestic spying has created a fear of any sort of spying or eavesdropping which explains the reaction when one of Chancellor Merkel's cell phones was allegedly bugged by the Obama administration.

Jul 02 08:46

ANTI-PIRACY LAWFIRM DEFRAUDED RIGHTSHOLDERS OUT OF MILLIONS

A lawfirm well known for its anti-piracy activities defrauded its entertainment industry clients out of millions, an investigation has found. Following an independent study by auditing company Deloitte, it's been revealed that an owner of the Johan Schlüter Law Firm illegally pocketed at least $15m. A police investigation is now underway.

Jul 02 08:42

XKEYSCORE: NSA’S GOOGLE FOR THE WORLD’S PRIVATE COMMUNICATIONS

One of the National Security Agency’s most powerful tools of mass surveillance makes tracking someone’s Internet usage as easy as entering an email address, and provides no built-in technology to prevent abuse. Today, The Intercept is publishing 48 top-secret and other classified documents about XKEYSCORE dated up to 2013, which shed new light on the breadth, depth and functionality of this critical spy system — one of the largest releases yet of documents provided by NSA whistleblower Edward Snowden.

Webmaster's Commentary: 

Welcome to Amerika, the land of the surveilled and the home of the cowed!!

Jul 02 08:21

‘Meganet’, Part 2: Kim Dotcom plans crowdfunded replacement to internet (Ft. Max Keiser)

Kim Dotcom plans on creating a replacement to the internet, called ‘Meganet’. The service will be totally encrypted.

Jul 02 01:17

Man Grabbed, Crushed to Death By Factory Robot: “This is Just the Start… Machines Will Take Over Our Lives”

“This is just the start…machines will take over our jobs, lives and world.”

That was one man’s reaction to news that a deadly accident during the installation of an assembly line robot at a Volkswagen plant in Germany led to the robot coming to life, grabbing a man and slamming him against a metal plate.

A scene out of the movie Terminator just happened for real. A robot killed a contractor at one of Volkswagen’s production plants in Germany, the automaker said.

Webmaster addition: The media is trying to make this our as a murder, when this was clearly a malfunction.

Jul 01 21:09

End Of Privacy: ICANN Is Considering Forcing Website Owners To Go Public

Webmaster addition: ICANN already demands a public record for owners of websites such as this one. DomainsByProxy was set up to allow government agencies to create phony websites and conceal their true source and no doubt there will be a similar exception made for any new rules as well.

Jul 01 20:19

It’s Not Just the Navy, the Entire US Government Uses Outdated Software

This week, it was the U.S. Navy’s turn to be jeered, after it was reported that it was still paying Microsoft $9 million per year to use Windows XP—a 14-year old software system that had already stopped receiving security updates for a full year.

The most distressing part of these recent security breaches is that the use of archaic technology is the rule, not the exception, in the U.S. government.

For example, the technology deployed by the government for the management of high-stakes military facilities, are often decades old. In 2014, a tour of a nuclear missile silo in Wisconsin found that the command launches were still run on floppy disks from the 1980s. In 2012, the Army began migrating its tech platforms to Windows 7—from Windows XP, having decided to skip Vista altogether.

Jul 01 17:25

Uber is your Big Brother: It tracks you everywhere, even when you're not using the Uber app

However, there is another issue with the Uber smartphone app that has raised serious concerns among the public and various privacy groups: Uber tracks and records information regarding the location of passengers who use the service even when the app is not in use.

In the first years of its operations, Uber came under fire over charges that the company had "casually" used the information it gathered with its "God View" technology, which gives the company the capability of monitoring the location of all its drivers as well as users who have flagged its vehicles. The company even reportedly shared some of this data with third parties who did not work for Uber.

Recently, however, it has been revealed that Uber's updated policy tracks passengers and allows access to their personal information.

SHARE THIS ARTICLE WITH YOUR SOCIAL MEDIA