COMPUTERS/INTERNET/SECURITY | WHAT REALLY HAPPENED


COMPUTERS/INTERNET/SECURITY

Nov 10 15:45

What Happens When the NSA Comes to Town

The NSA set up a facility in Utah, promising jobs and industry along with it. None of that came. Now, one surveillance scandal later, residents can vote to render the facility useless in the simplest way possible. Is it worth it?

Nov 10 12:51

Obama says FCC should reclassify internet as a utility

President Obama has come out in support of reclassifying internet service as a utility, a move that would allow the Federal Communications Commission to enforce more robust regulations and protect net neutrality. "To put these protections in place, I'm asking the FCC to reclassifying internet service under Title II of a law known as the Telecommunications Act," Obama says in a statement this morning. "In plain English, I'm asking [the FCC] to recognize that for most Americans, the internet has become an essential part of everyday communication and everyday life."

Nov 07 11:14

FLASHBACK 2013 - The Israeli Criminals Behind the NSA Spy Scandal

Jacob "Kobi" Alexander The founder and former chairman of Verint is wanted by the FBI for a long list of crimes. He is veteran Israeli intelligence officer.
Jacob "Kobi" Alexander, the former head of Comverse, the parent company of Verint, is a wanted criminal who has fled U.S. justice to Africa and probably subsequently to Israel. It is important to note that Kobi Alexander and Comverse were closely connected to Odigo, the Israeli messaging system that was used to warn Israelis to stay away from the World Trade Center on 9-11.
Furthermore, the NSA has used Israeli encryption software from RSA Security, Inc. since 2006, which means that Israelis hold the encryption keys to the entire NSA computer network. The Israelis obviously have easy access to everything at the NSA.

Webmaster's Commentary: 

So, the guy our incoming Attorney General helped avoid jail for stock options fraud is also an Israeli spy!

Nov 07 07:11

BEX ALERT - 'Trojan Horse' Bug Lurking in Vital US Computers Since 2011

DHS sources told ABC News they think this is no random attack and they fear that the Russians have torn a page from the old, Cold War playbook, and have placed the malware in key U.S. systems as a threat, and/or as a deterrent to a U.S. cyber-attack on Russian systems – mutually assured destruction.

Webmaster's Commentary: 

So let me see if I have this correct. DHS/NSA cannot find the people behind all these data thefts of credit card information, cannot find who is behind Cryptolocker and other malware, can't stop the flood of malware arriving in our email, but the US Government is absolutely certain they know that the Russians are behind this malware it took them three years to detect, just as the US Government is absolutely certain Putin shot down MH17, just as the US Government is absolutely certain Saddam had nuclear weapons, just as the US Government is absolutely certain Assad gassed his own Alawite supporters with Sarin gas right in front of the UN chemical weapons inspectors on the very day they arrived in Syria, just as the US Government is absolutely certain there were torpedoes in the Gulf of Tonkin, just as the US Government is absolutely certain there was a Spanish mine in Havana Harbor, just as the US Government is absolutely certain the Lusitania was NOT carrying weapons of war ... And you wonder why we have doubts?

Nov 06 16:17

Former SpaceX employee faces life in prison for running Silk Road 2.0

Federal authorities in the United States have announced charges against a California man arrested this week who is accused of operating the second incarnation of the infamous Silk Road online marketplace.

On Thursday, officials said that 26-year-old Blake Benthall of San Francisco, CA was apprehended a day earlier as the result of a 12-month-long investigation into Silk Road 2.0, a web-based black market that appeared online last year after its eponymous predecessor was pulled from the internet pursuant to a similar criminal probe.

The criminal complaint unsealed on Thursday suggests Benthall, a former software engineer for SpaceX, according to his Facebook, became involved in Silk Road 2.0 in November 2013 and assumed administrative duties of the site earlier this year up until his arrest this week.

Nov 06 13:42

BEX ALERT - 'Trojan Horse' Bug Lurking in Vital US Computers Since 2011

A destructive “Trojan Horse” malware program has penetrated the software that runs much of the nation’s critical infrastructure and is poised to cause an economic catastrophe, according to the Department of Homeland Security.

National Security sources told ABC News there is evidence that the malware was inserted by hackers believed to be sponsored by the Russian government, and is a very serious threat.

Nov 06 08:51

Is your TV watching you? Samsung's latest sets with built-in cameras spark concerns

Samsung's latest breed of plasmas and HDTVs may allow hackers, or even the company itself, to see and hear you and your family, and collect extremely personal data.

The new models, which are closer than ever to personal computers, offer high-tech features that have previously been unavailable, including a built-in HD camera, microphone set and face and speech recognition software.

Webmaster's Commentary: 
Nov 06 06:42

Faking it: 4 ways companies can deceive you online

CBC’s Marketplace investigated how companies artificially inflate their online credibility through paid testimonials and fake reviews.

Marketplace set up a fake business to test how easy it is to buy a good reputation online.

Nov 05 11:37

NSA Chief Bet Money on AT&T as It Spied on You

The former head of the world’s biggest spy agency didn’t just oversee the collection of billions of AT&T records. He also tried to make money off its customers.

At the same time Gen. Keith Alexander was running the National Security Agency, the United States’ biggest spying outfit, he was also trading stocks in an obscure technology company that had a sweetheart deal with one of the NSA’s most important sources of intelligence—the global phone and Internet giant AT&T.

Nov 04 12:16

Emoshape Provide Intelligent Machines with Emotions

EMOSHAPE (www.emospark.com) has announced the launch of a major technology breakthrough with an EPU (emotional processing unit); a patent pending technology which creates a synthesised emotional response in machines.

Webmaster's Commentary: 

They can skip greed and avarice. Wall Street has already created computers with those emotions! :)

Nov 04 07:48

Google ‘Polling place lookup’ strikes out

The Doodle on Google’s homepage this Election Day morning is a flag-adorned, spinning ballot box that when clicked brings one to a search box labeled “Polling place lookup.”

It’s a good thing I already know where to vote.

Nov 02 08:01

Govt Banhammer: UK internet abusers may face up to 2 yrs in jail

Webmaster's Commentary: 

This sounds like a long overdue idea but will likely stumble on the fact that most trolls are paid operatives for governments and corporations.

Nov 01 19:28

Americans pay more for slower Internet

Clocking in at the top of the list was Seoul, South Korea, where Internet users can get ultra-fast connections of roughly 1000 megabits per second for just $30 a month. The same speeds can be found in Hong Kong and Tokyo for $37 and $39 per month, respectively.

Residents of New York, Los Angeles and Washington, D.C. can get 500-megabit connections thanks to VZ, Tech30), though they come at a cost of $300 a month.

Nov 01 10:19

Google fined over Street View image of woman's cleavage

Google has been ordered to pay a Canadian woman $2,250 (£1,250) for an image on Street View that exposed her cleavage.

The image showed the woman, Maria Pia Grillo, sitting on a step outside her house, leaning forward with her elbows resting on her knees. In the picture she was wearing a low-cut top that left "part of her breast" exposed.

Although her face was blurred out, she was still identifiable – particularly as her car was parked in the driveway without the licence plate number blurred out.

Grillo filed a lawsuit in 2011 asking Google to blur out more of the image, including most of her body and her licence plate.

She also demanded to be paid $45,000 (£25,000) for the depression she had suffered, after her coworkers at "a well-known bank" discovered the image and derided her for it.

Webmaster's Commentary: 

Okay, so the woman puts on a revealing top, goes outside her home, sits in a position where the top is going to be revealing her breast to the world ... then sues anyone who actually looks?

I remember back at the height of the feminists "male bash" craze there was a woman who worked at the same animation shop I did who habitually dressed in very thin leotards that left little to the imagination ... and made sexual harassment complaints against any men she caught looking at her! This was called "empowerment."

Oct 31 10:53

FBI Holds Secret Meeting To Scare Congress Into Backdooring Phone Encryption

In September, both Apple and Google announced plans to encrypt information on iOS and Android devices by default. Almost immediately, there was a collective freakout by law enforcement types. But, try as they might, these law enforcement folks couldn't paint any realistic scenario of where this would be a serious problem. Sure, they conjured up scenarios, but upon inspection they pretty much all fell apart. Instead, what was clear was that encryption could protectusers from people copying information off of phones without permission, and, in fact, the FBI itself recommends you encrypt the data on your phone.

But it didn't stop FBI director James Comey from ignoring the advice of his own agency and pushing for a new law that would create back doors (he called them front doors, but when asked to explain the difference, he admitted that he wasn't "smart enough" to understand the distinction) in such encryption.

Webmaster's Commentary: 

Breakable encryption means the FBI can spy on law abiding citizens, but as we proved with our NSA challenges, real criminals and terrorists will remain invisible.

Oct 31 10:31

What happens when your friend’s smartphone can tell that you’re lying

In just a few weeks, the next installment of “The Hunger Games” will arrive in movie theaters. The latest in a long line of films to depict a future all-knowing or controlling government — think “1984” or “Minority Report” — the dystopian tale will likely be a runaway hit. But the power to seem all-knowing – or at least know more than do now – may soon lie in technology that’s already in the palm of your hand.

We are nearing a point where our smartphones will be able to recognize a face or voice, in real life or on-screen. And identification is only the most basic of the possibilities. Many app-makers are experimenting with software that can also analyze – able to determine someone’s emotions or honesty just by a few facial cues.

Webmaster's Commentary: 

Smart phones have the power to run voice-stress software. But what worries the powers that be is not that we will use it on each other, but on THEM!

Oct 31 09:55

Possible problems at Facebook

31 October: Problems at Facebook
Facebook is having issues since 9:00 AM EDT. Are you also affected? Leave a message in the comments.

Webmaster's Commentary: 

The good news. Facebook is now fully cooperating with NSA.

The bad news: The interface was written by the same people who did the Obamacare website! :)

Oct 31 09:42

Dating Website Sued for Making Fake Lovers

The Federal Trade Commission filed suit against a British-based dating company alleging that it created fake automated profiles to trick paid members into believing that they were receiving texts from other real people on its several dating websites.

The FTC alleged that JDI Dating created the fake profiles, tricking new users into thinking they were getting text messages from real humans. The profiles, though, were connected to automated "flirting" software.

Users were enticed to sign up by being offered free memberships to the various sites, and upon first login, the flirty texts would flood a new user's inbox. But new users were unable to reply to any messages unless they upgraded to the paid service. Fees from $10 to $30 a month were charged to a new user's credit card to give them the capability to engage in messaging other members.

Webmaster's Commentary: 

That is just mean!

Oct 31 08:07

Isolated computer to be hacked with only a cellphone at Denver cybersecurity conference

Security researchers at Ben Gurion University have found a way to infiltrate a closed network to lift data from an isolated computer using little more than a cellphone’s FM radio receiver.

To evade air-gap security measures, keylogging app Airhopper, as its known, uses radio frequencies to transmit data from a computer, all by exploiting the computer's display.

“This is the first time that a mobile phone is considered in an attack model as the intended receiver of maliciously crafted radio signals emitted from the screen of the isolated computer,” according to a release by Ben Gurion University.

Webmaster's Commentary: 

So, Israel's university TEACHES computer hacking!

Oct 30 11:18

How much is whatreallyhappened.com worth?

estimated worth, $ 13,805,000

Webmaster's Commentary: 

UPDATE: Only 24 hours after I posted the above link, the estimated value for whatreallyhappened.com has gone from $13.8 million to just over $10 million. I guess "someone" doesn't like there to be any indication of this website's popularity and reach to be out there!

Oct 30 09:04

Amazon-CIA $600 Million Deal Facing Scrutiny: ‘What’s the CIA Doing on Amazon’s Cloud?’

A billboard challenging Amazon to fully disclose the terms of its $600 million contract to provide cloud computing services for the Central Intelligence Agency has been unveiled at a busy intersection near Amazon’s Seattle headquarters.

The billboard’s launch — asking “the $600 million question: What’s the CIA Doing on Amazon’s Cloud?” — marks the escalation of a campaign by the online activist organizations RootsAction.org and ExposeFacts.org. The groups are calling for accountability from Amazon in an effort to inform the public of serious privacy implications of the Amazon-CIA collaboration. (ExposeFacts.org is a project of the Institute for Public Accuracy.)

Webmaster's Commentary: 

Given that CIA and Amazon are swapping tongue kisses these days, it becomes understandable why Alexa, owned by Amazon, is rigging the rankings of independent media websites lower and pushing up rankings of pro-government websites.

Oct 29 09:13

Legendary Hacker Leaks Government Plan To Take Over Internet

Oct 29 07:42

FB For Currency Scams? EU May Probe Bankers’ Social Media

Traders accused of currency manipulation at some of the world’s biggest banks may soon have their social media data handed over to authorities conducting the investigation.

All of the bankers’ communications will be handed over to investigators to discover if banks have been tampering with currency interbank rates on the $5.3 trillion-a-day foreign exchange market, Bloomberg reported citing unnamed source.

Oct 29 07:35

HTML5 reaches ‘recommendation’ status

The World Wide Web Consortium today has elevated the HTML5 specification to ‘recommendation’ status, giving it the group’s highest level of endorsement, which is akin to becoming a standard.

But Jeff Jaffe, CEO of the W3C, was quick to point out that work on the Web is far from complete.

HTML5 is a critical piece in terms of importance to the next generation of Web technology in general, according to Jaffe. “I think back to what the Web originally was, which was accessing static documents from Web pages. Today, it’s what we call the Open Web Platform for building distributed applications, characterized by rich media – video, audio and graphics – natively available in browsers,” he said.

Webmaster's Commentary: 

I experimented with HTML5 in writing Claire's music website and the overall portal to our online "empire." The problem I ran into is that various smart phones and tablets, although claiming to support HTML5, did not actually support the full specifications, only enough HTML5 to be able to advertise they supported HTML5, and in many cases the pages would not display correctly.

Oct 28 07:40

The highly sophisticated hacking of Sharyl Attkisson's computers

They met at a McDonald’s in Northern Virginia at the beginning of 2013, and the source (she dubs him Number One) warned her about the threat of government spying. During their next hamburger rendezvous, Big Mac told Attkisson, then a CBS News reporter constantly at odds with the Obama administration, that he was “shocked” and “flabbergasted” by his examination of her computer and that this was “worse than anything Nixon ever did.”

Oct 28 06:40

Snowden 2.0: Report says FBI Has Identified "Second Leaker" of Govt Secrets

The U.S. government has identified the person it believes is the so-called "second leaker" who has given over classified national security documents to some of the same journalists who have reported on many of the documents leaked by NSA whistleblower Edward Snowden this year, a news report claimed on Monday.

Webmaster's Commentary: 

Rather than let the FBI pick them off one at a time, everyone with secrets needs to go public at the exact same time.

Oct 28 06:33

Watch your attachments: Microsoft Office bug lets hackers take over computers

A dangerous new security vulnerability has been discovered in Microsoft’s Office software, threatening to hijack users of virtually every existing version of Windows.

The bug in question affects programs like Word, PowerPoint, and Excel – and could allow an intruder to gain access to and control over a user’s entire computer.

Already, Microsoft has discovered that hackers are using the bug to hack computers through PowerPoint. Windows users should be wary of opening PowerPoint files sent via email unless they completely trust the original source, the company wrote in an online security advisory. Even in cases involving trusted sources, it has advised to not open the files received unexpectedly.

Webmaster's Commentary: 

And the mighty NSA cannot find these crooks either, can they?

Oct 27 07:42

Hungarians revolt against internet tax (PHOTOS, VIDEO)

Furious with the government plan to impose tax on Internet data traffic, thousands of Hungarians rallied in front of the Economy Ministry in Budapest to protect the freedom of the internet from the 'anti-democratic' measure.

Tens of thousands gathered in front of the Economy Ministry building on Sunday, urging the politicians to scrap the plan that will see internet service providers (ISPs) pay 150 forints ($0.62) for every gigabyte of data traffic transferred over their networks.

Oct 27 07:24

Spy Wars: CIA Vs. Congress | Jesse Ventura Off The Grid - Ora TV

Oct 27 07:18

Kano: A kit to build a computer and a new creative generation

Kano's Alex Klein tells TechRepublic about why people of all ages, not just kids, want to understand the tech they take for granted.

Oct 27 07:14

CVS follows Rite-Aid, shuts off Apple Pay

Last Thursday drug store chain Rite Aid Inc. (RAD) reportedly stopped accepting payments made through the just launched Apple Pay system from Apple (AAPL). On Saturday, CVS Health (CVS) was reported to have followed suit at its CVS pharmacy stores.

The issue appears to be a conflict between Apple Pay and a mobile payment system called CurrentC that is being developed by a retailer-owned mobile technology outfit called Merchant Customer Exchange (MCX). Unlike Apple Pay, CurrentC does not use an NFC chip, but instead generates a QR code that is displayed on the merchant's checkout terminal. Customers who have already linked their bank accounts to the CurrentC system scan the QR code from the terminal and the transaction is completed.

Oct 26 11:16

French "hate speech" lawsuit leading to worldwide online censorship

A little over a year after a French court forced Twitter to remove some anti-Semitic content, experts say the ruling has had a ripple effect, leading other Internet companies to act more aggressively against hate speech in an effort to avoid lawsuits.

The 2013 ruling by the Paris Court of Appeals settled a lawsuit brought the year before by the Union of Jewish Students of France over the hashtag #UnBonJuif, which means “a good Jew” and which was used to index thousands of anti-Semitic comments that violated France’s law against hate speech.

Since then, YouTube has permanently banned videos posted by Dieudonne, a French comedian with 10 convictions for inciting racial hatred against Jews. And in February, Facebook removed the page of French Holocaust denier Alain Soral for “repeatedly posting things that don’t comply with the Facebook terms,” according to the company. Soral’s page had drawn many complaints in previous years but was only taken down this year.

Oct 26 07:30

US government surrenders control of ICANN - Fox News Live

Oct 25 10:04

Dems on FEC move to regulate Internet campaigns, blogs, Drudge

In a surprise move late Friday, a key Democrat on the Federal Election Commission called for burdensome new rules on Internet-based campaigning, prompting the Republican chairman to warn that Democrats want to regulate online political sites and even news media like the Drudge Report.

Oct 24 07:55

FTDI admits to bricking innocent users' chips in silent update

Hardware hackers and security researchers are furious at chip maker FTDI for issuing a silent update that bricks cloned FTDI FT232 [USB to UART] chips.

The chip is extremely common on a wide variety of devices and there is no way of knowing at this time which devices have cloned chips -- and the tainted supply chain could hit anyone.

FTDI appears to have used a recent Windows update to deliver the driver update to brick all cloned FTDI FT232s.

FTDI's surprise new driver reprograms the USB PID to 0, killing the chips instantly.

The hardware hackers at Hack A Day first reported that a recent driver update deployed over Windows Update is bricking cloned versions of the very common FTDI FT232 [USB to UART] chip.

In response to increasing anger and criticism from security researchers on Twitter, FTDI admitted using the remote kill switch and is adamant that this move is necessary to fight counterfeiting.

Webmaster's Commentary: 

Oh yes, let's punish the end user who may not even know his product has a counterfeit chip by killing his hardware!

Does FTDI not understand that the counterfeiters will go on selling their chips anyway not caring if they eventually fail? Look at the flood of fake 128G SD cards hitting the market. These are actually 8G chips reprogrammed to identify themselves as 128G to the computer. Every time a particular brand is identified as phony, the counterfeiters simply change their company name, change the packaging, and go right on selling their products, not caring that they will not actually work. FTDI's stunt will harm a lot of innocent end users and will not stop the counterfeiters. It won't even slow them down. Someone needs to be fired for this mistake!

Oct 23 10:59

Atlanta airport WiFi users are barred from transmitting “hateful or racially, ethnically or otherwise objectionable” material

The following constitutes examples of violations of this AUP. You agree NOT to use the Wi-Fi System to:

Transmit any material (by uploading, posting, email or otherwise) that is unlawful, threatening, abusive, harassing, tortuous, defamatory, obscene, libelous, invasive of another’s privacy, hateful or racially, ethnically or otherwise objectionable; ...

Webmaster's Commentary: 

That "otherwise objectionable" could mean pretty much anything, including WRH!

Oct 23 10:37

ZION’S INTERNET WAR

Over the past few years more than 5 million readers have been directed to this Blog via links at What Really Happened. These people are not strangers to what is known as a DOS Attack which renders a particular site ‘unavailable’ for a given time period. For years now, WRH readers have occasionally been denied access to the site because of these attacks. They have not been the only victim of these frequent attacks, other wonderful sites such as Uruknet have also suffered from them. One can show their appreciation to these sites by visiting them frequently and even better, by contributing financially to them. Their continued existence depends on your support.

Oct 23 10:15

'PhotoMath' app uses recognition technology to solve your math homework for you

Webmaster's Commentary: 

Works better than Common Core!

Oct 23 07:00

It’s Not Just Spying – How The NSA Has Turned Into A Giant Profit Center For Corrupt Insiders

Last week, two very important stories came out; one from Reuters and the other from Buzzfeed. They both zero in on how current NSA employees are using their expertise and connections to make big money in the private sector while still working at the NSA. Let’s start with the Reuters story, which covers former NSA-head Keith Alexander’s business relationship with the NSA’s current Chief Technical Officer, Patrick Dowd.

Before we get into the meat of this story, I want to set the stage with a little background. In case you forgot, Keith Alexander launched his own cyber-security firm, IronNet Cybersecurity Inc., earlier this year.

Oct 22 09:16

Fake news sites are using Facebook to spread Ebola panic

These sites claim to be satirical but lack even incompetent attempts at anything resembling humor. They’re really fake news sites, posting scary stories and capitalizing on the decontextualization of Facebook’s news feed to trick people into sharing them widely. On Facebook, where stories look pretty much the same no matter what publication they’re coming from, and where news feeds are already full of panicked school closures, infected ISIS bogeymen, and DIY hazmat suits, the stories can fool inattentive readers into thinking they’re real. Panicked, they share, spreading the rumor farther and sending more readers to the story, generating ad revenue for the site.

It’s proving to be a very successful strategy, particularly for a site called the National Report, which saw its traffic spike to 2 million unique visitors yesterday according to Quantcast.

Oct 21 12:26

nationalreport.net is a fake news site we have encountered before

The site nationalreport.net is best ignored. This is a site where leftist provocateurs post fake news stories in the hopes that patriotic conservatives will latch onto to them and embarrass themselves by passing them around as true.

Oct 20 15:59

Microsoft warns users to kill botched KB 2949927 patch

After yanking botched patch KB 2949927, which failed to install on some machines, Microsoft is now warning users to uninstall the update -- even though there has been no mention of problems after the patch is installed.

Microsoft released KB 2949927 as part of its ill-fated batch of October "Update Tuesday" patches. On Wednesday I wrote about the first patch that showed widespread problems, KB 2952664, which failed to install with error 80242016. I followed up on Thursday with details about four more patches causing problems:

Oct 20 13:19

Nearly half of cardholders likely to avoid stores hit by data breaches

As data breaches exposing consumer credit card, debit card and other personal information become more common, nearly half of cardholding shoppers say they're reluctant this holiday season to return to stores that have been hacked, according to a new survey by CreditCards.com.

Forty-five percent of respondents with credit or debit cards said they would definitely or probably avoid one of their regular stores over the holidays if that retailer had experienced a data breach. Sixteen percent said they definitely would not return to a retailer if the store had been hacked and 29 percent said they probably would not shop at such stores. Just one in eight said they are more likely to shop with credit cards this season.

Oct 19 07:00

FBI Director Warns Google and Apple "If You Don't Decrypt Phones, We'll Do It For You"

The Fourth Amendment to the US Constitution is crystal clear in meaning.

The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no warrants shall issue, but upon probable cause, supported by oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.

FBI Director, James Comey, an Obama appointment, does not give a damn what the Constitution says.

Oct 18 09:29

Kickstarter Freezes Anonabox Privacy Router Project for Misleading Funders

On Friday afternoon Kickstarter suspended the crowdfunding campaign for Anonabox, an initiative to sell a tiny, $45 router that would run all a user’s online traffic over the anonymity network Tor. The idea tapped into an explosive demand for simple privacy technology, and earned more than 10 times its modest goal in hours. But as funders shoveled more than half a million dollars into the project, they also began to pick apart Anonabox’s claims of creating custom hardware, as well as the promised security of its software. Soon, many were calling for the project to be cancelled, and asked others to report its shortfalls to Kickstarter staff, who now say they’ll cancel all investors’ pledges.1

Oct 18 08:00

Iran expert helping develop IoT platform

An Iranian expert and postdoctoral fellow at the University of British Colombia is helping develop a revolutionary platform for a new technology called the Internet of Things (IoT).

Ali Kashani, the Vancouver-based Energy Aware Technology’s vice president of software, is helping the company develop the Neurio platform, billed as a revolutionary new technology that makes an ordinary home smart.

The evolution of the IoT involves the embedding of sensors in physical objects. The sensors are, in turn, linked through networks to computers that analyze the vast amounts of data they produce.

Neurio’s development, however, has drawn upon the fact that all electronic devices have a power signature, hence just enlisting the help of a Wi-Fi power sensor.

Kashani has described Neurio as the “brain of the home,” not a “fancy” remote control, like other smart-home products.

Oct 18 08:00

Microsoft to cut 18K jobs worldwide

The US software giant Microsoft has announced plans to slash 18,000 jobs from its global workforce in 2015, the largest cuts in the company’s 39-year history.

Oct 18 07:00

Obama’s credit card denied at restaurant on New York City trip

President Obama came perilously close to having to wash some dishes on his recent trip to New York.

Mr. Obama revealed Friday that his credit card was rejected when he went to pay for his meal at a New York restaurant during the U.N. General Assembly gathering last month.

“Apparently they thought there was some fraud going on,” Mr. Obama joked at a meeting Friday with employees of the Consumer Financial Protection Board, adding that “even I am affected” by the difficulties of dealing with the American financial system. The remarks were picked up by the C-SPAN feed of the event.

Oct 17 12:45

Thousands Of MacBooks Made In 2011 Have Self-Immolating Graphics Cards

Models of Apple’s higher-end portable computer, the MacBook Pro, have come to the end of their three-year extended warranties. That leaves their owners at the mercy of Apple when something goes wrong, and at minimum thousands of the computers have had the same computer-killing problem with their graphics processing unit. Apple has not publicly admitted that the machines have a problem.

Of course, MacBook Pro owners are people who have spent at least $2,500 on a computer designed for serious graphics work. That means that they’re probably media professionals or serious amateurs, and able to make YouTube videos making fun of the situation with really great production values.

Oct 17 08:33

FBI director to citizens: Let us spy on you

The expanding options for communicating over the Internet and the increasing adoption of encryption technologies could leave law enforcement agents “in the dark” and unable to collect evidence against criminals, the Director of the FBI said in a speech on Thursday.

Webmaster's Commentary: 

I am going to take it from the above that FBI Director James B. Comey is tacitly admitting that our series of NSA encryption challenges did in fact defeat the NSA cryptographers.

So, Comey is trying to revive an idea from 1995 and declare that any encryption system not authorized for use by the government (meaning not including a back door for them to use) is a "weapon" whose purpose must be assumed to be criminal, and therefore punishable. Better copy off those code snippets in my challenge while you still can!

The new attitude is "Use A Secret Decoder Ring: Go To JAIL!"



The government wants us to trust them that they are only going to spy on criminals, but we already know this is a lie. The FBI and other US Intelligence agencies have been caught stealing personal data for cronies of the President and their own personal profit. The Fourth Amendment says that the government cannot peek into your personal life absent an actual accusation of a crime and given the tsunami of evidence that the government is not complying with its Constitutional limits, We The People have every right to secure our business secrets, photos of our scantily clad partners, my Aunt Mary's Top Secret Chocolate Chip Cookie recipe, and everything else from a government that is itself the biggest criminal organization in the country.

Oct 16 05:21

YouTube has potentially infected over 100,000 users during the past 30 days

YouTube has become a daily habit for millions all over the world, but it looks like there has been some malicious activity on the website -- which may have affected more than 100,000 users over a 30 day period.

According to Trend Micro, they have been monitoring the activity on YouTube over the past couple of months and have found that the attack comes in the form of ads that are present on the site. While the ads themselves have no malicious content, the issue seems to occur when the ad is clicked. Although these ads should be monitored and screened by YouTube, some have seemed to slip through the cracks, redirecting to malicious websites that could cause infections. While this all sounds fairly simple, the actually process for passing off a malicious site for something legitimate is fairly complex.

Oct 14 09:12

Chat logs reveal FBI informant’s role in hacking of Sun newspaper

The FBI is facing questions over its role in a 2011 hacking attack on Rupert Murdoch’s Sun newspaper in the UK after the publication of chat logs showed that a man acting as an agency informant played a substantial role in the operation.

In July 2011, a group of hackers known as Lulzsec – an offshoot of Anonymous – posted a fake story about the death of Murdoch, penetrated several News International (now News UK) corporate sites, and claimed to have obtained gigabytes of material from the company’s servers.

Oct 12 08:29

Edward Snowden Doc 'Citizenfour' Reveals Existence of Second NSA Whistleblower

In the key scene, journalist Glenn Greenwald visits Snowden at a hotel room in Moscow. Fearing they are being taped, Greenwald communicates with Snowden via pen and paper.

While some of the exchanges are blurred for the camera, it becomes clear that Greenwald wants to convey that another government whistleblower -- higher in rank than Snowden -- has come forward.

Oct 10 07:55

It's not just Munich: Open source gains new ground in Germany

While Munich city council's decision to replace Microsoft software with open-source alternatives made headlines, it is one of a number of municipalities across Germany to make such a move.

Across Germany at the national and local level authorities are running Linux and open-source software. The German federal employment office has migrated 13,000 public workstations from Windows NT to OpenSuse, and a number of German ubran areas are using or in the process of switching to open-source software on the desktop, including Isernhagen, Leipzig, Schwäbisch Hall and Treuchtlingen.

The latest town to make the switch is Gummersbach, with a population of about 50,000 in the state of North Rhine-Westphalia, which this summer completed its switch to Linux PCs from Windows XP.

Webmaster's Commentary: 

They are correct to do so, and I don't think anything illustrates that better than the problems I am having with Autodesk 3DS MAX on Windows 7. Now, I am no longer in the animation business, but I still like to play with it and occasionally make some illustrations for this website in 3D. But as of last night I am still unable to get the Autodesk installer to work. The only thing the installation log gives me is "Error 1603" which is described by computer experts as the most useless error code ever used by Microsoft, as it simply means the installer did not work (which we already know), but fails to explain what the problem might be. Autodesk's self-help pages claim it is a Microsoft problem. Microsoft ways Autodesk screwed up. Autodesk is cranking up for their cloud-based pay-by-the-month system and apparently could not care less if customers are unable to install the stand-alone systems. I have found hundreds of web articles from people dealing with this problem, all of whom offer suggestions of things to try, none of which have worked. If I were still in the animation business, I would be going out of business by now! This is yet another way the abuses of modern fascist-style corporate behavior is wrecking the national economy as a whole, and Germany is wise to drop Microsoft and Windows products for the more stable and open-source environment. Certainly, after this experience, I will not be looking at any Autodesk products ever again!

Oct 10 07:03

Sen. Wyden: NSA Tech Spying Hurts Economy

Google Chairman Eric Schmidt and other Silicon Valley executives say controversial government spying programs are undercutting the Internet economy and want Congress to step up stalled reform.

"We're going to end up breaking the Internet," warned Google Inc.'s Schmidt during a public forum Wednesday convened by U.S. Sen. Ron Wyden, D-Ore., who has been an outspoken critic of electronic data-gathering by the National Security Agency. Schmidt and executives from Facebook Inc, Microsoft Corp. and other firms say revelations of extensive NSA surveillance are prompting governments in Europe and elsewhere to consider laws requiring that their citizens' online data be stored within their national borders.

Oct 08 15:30

Federal Court Says the Government Can Impersonate You on Social Media — and There’s Not Much You Can Do About It

In June 2013, Arquiett filed a formal complaint against Sinnigen on the grounds that her privacy was violated. However, the U.S. District Court of the Northern District of New York ruled the DEA did nothing to overstep its authority.

“Defendants admit that Plaintiff did not give express permission for the use of photographs contained on her phone on an undercover Facebook page, but state the Plaintiff implicitly consented by granting access to the information stored in her cell phone and by consenting to the use of that information to aid in an ongoing criminal investigations,” the court said.

Therefore, the court went on to state, “Plaintiff does not have a First Amendment Right to Privacy in the photographs.”

Oct 08 09:25

DEFCON Router Hacking Contest Reveals 15 Major Vulnerabilities

It's clear from the fact that the list spans many different manufacturers that the problem is not unique to any one company.

Webmaster's Commentary: 

Maybe they stumbled on one of the NSA back doors!

Oct 08 07:51

US says it can hack into foreign-based servers without warrants

The US government may hack into servers outside the country without a warrant, the Justice Department said in a new legal filling in the ongoing prosecution of Ross Ulbricht. The government believes that Ulbricht is the operator of the Silk Road illicit drug website.

Monday's filing in New York federal court centers on the legal brouhaha of how the government found the Silk Road servers in Iceland. Ulbricht said last week that the government's position—that a leaky CAPTCHA on the site's login led them to the IP address—was "implausible" and that the government (perhaps the National Security Agency) may have unlawfully hacked into the site to discover its whereabouts.

Oct 08 07:16

Twitter sues US for right to disclose government requests

Internet giant Twitter is suing the Department of Justice in hopes that the United States government will let the web company publish more details about requests made for user data.

Oct 07 07:54

Windows 10's 'built-in keylogger'? Ha ha, says Microsoft – no, it just monitors your typing

Don't want Microsoft tracking you online and collecting data on your computing habits? Then you probably shouldn't install the Windows 10 Technical Preview, Redmond says.

The interwebs were abuzz on Monday over concerns about the Terms of Use and Privacy Policy of Microsoft's newly released, not-even-beta-yet OS, with some sites going as far as to claim that Windows 10 comes with a "built-in keylogger" to watch users' every move.

Turns out these Chicken Littles were right – sort of – but according to Microsoft they should have known about the data collection from the get-go, because they agreed to it.

Oct 07 07:07

Facebook Restores my account

Webmaster's Commentary: 

We kissed and made up, apparently. :)

Oct 06 11:27

My Facebook page, myself

I did a quick search and saw that Facebook had been requiring users to send in photos of their IDs to verify their identities for at least a year.

Without thinking, I picked up my phone to write a Facebook post to see if this had happened to anyone else. But, of course, I couldn't use Facebook on my phone either. I tried to enter my password and the little wheel spun futilely. This was serious.

So, I did what anyone else would do when locked out of Facebook: I posted on Twitter.

It turned out that at least five people I knew through Twitter were locked out of their Facebook accounts Tuesday. Some were thoroughly creeped out that Facebook would demand a copy of their IDs. Some decided this was their cue to shut their accounts once and for all.

Webmaster's Commentary: 

Thinking about it.

Oct 06 11:26

Facebook apologizes for locking a ‘small portion’ of users out of their accounts

On Monday afternoon, some Facebook users reported on Twitter and Hacker News that, for some unknown reason, they were locked out of their accounts. In the error message displayed, users were prompted to upload a photo ID in order to verify that they are the account holder. The company has issued a statement on the matter, saying:

Earlier this evening, we showed an account verification message to a very small portion of our users unnecessarily. We promptly removed the messages when we discovered the error. We’re sorry for any inconvenience we may have caused.

The issue has since been resolved.

Webmaster's Commentary: 

No it hasn't because this is exactly what I am seeing on my Facebook account! And I am still waiting to hear back from Facebook about why my account (which I don't even use that much) was locked.

Oct 06 11:24

3 On Your Side: Facebook Lock-out Issue

Recently, Karina says Facebook locked her out of her account without any explanation. The page was still up, but she could not log in.

“It asked me to submit a government-issued photo ID, so I automatically assumed it was a scam,” explains Moreno.

When she contacted Facebook, she was told it was not a scam — Facebook really needed a copy of her identification.

“Why should I have to submit it to a free social networking site?” she says she asked. “It’s absolutely ridiculous.”

We found a number of people complaining online about the same issue with Facebook.

Oct 06 11:23

Facebook apologises for locking out drag queens over user names

High quality global journalism requires investment. Please share this article with others using the link below, do not cut & paste the article. See our Ts&Cs and Copyright Policy for more detail. Email ftsales.support@ft.com to buy additional rights. http://www.ft.com/cms/s/0/284e9f1c-4a1b-11e4-bc07-00144feab7de.html#ix...

Facebook has apologised to its transgender and drag queen users, after suspending a number of their accounts under a policy that required people to use their “real” names.

The social network provoked an outcry from members of the LGBT community in recent weeks after it locked out users for operating pages under their stage names, such as Sister Roma and Lil Miss Hot Mess.

Webmaster's Commentary: 

I don't think that is why Facebook just locked my account. :)

Oct 05 07:26

ISRAEL FRAMING RUSSIA FOR ANTI-U.S. HACKER ATTACKS?

There it is! From the very same Yellow Press 'paper of record' that brought you the "Weapons of Mass Destruction" lie, and the "Assad gassed little children" lie, and the "Putin invaded Ukraine" lie, and the "ISIS beheadings" lie, comes the story of the cyber-bogeymen of Putin's Russia. This baseless accusation should be dismissed immediately upon first glance. It's not even worth the dignity of a rebuttal.

We would, however, like to address the question as to who the likely culprit might be. In crime-solving, precedent is a very important factor. Here's your precedent, brought to you by Israel's Main News Service, Ha'aretz:

Oct 04 07:06

Hackers’ Attack Cracked 10 Financial Firms in Major Assault

Questions over who the hackers are and the approach of their attack concern government and industry officials. Also troubling is that about nine other financial institutions — a number that has not been previously reported — were also infiltrated by the same group of overseas hackers, according to people briefed on the matter. The hackers are thought to be operating from Russia and appear to have at least loose connections with officials of the Russian government, the people briefed on the matter said.

Oct 04 06:23

Germany handed law-protected private data to NSA for years – reports

Intelligence service BND failed to protect the private data of German citizens as it handed over internet data collected at a Frankfurt traffic hub to the US, German media report citing secret documents.

The documents cited by VDR and EDR television and the newspaper Süddeutsche Zeitung, which broke the news together, were obtained from the federal government during an ongoing parliamentary investigation into US National Security Service spying on German soil.

Just like the NSA is forbidden by the law to spy on Americans, the BND is not allowed to spy on Germans. So when last year in was revealed that the two intelligence services had been collaborating to collect communication data at the De-Cix internet exchange node in Frankfurt, the BND had to produce explanations.

Oct 03 08:24

The J. P. Morgan breach is one part of a larger crisis

J. P. Morgan’s disclosure that hackers compromised the data of more than 76 million of its consumer patrons — and 7 million small business clients — may seem stunning.

But it reflects just a sliver of the withering bombardment the U.S. financial services sector has endured for at least the past three years.

Webmaster's Commentary: 

And where is the mighty NSA in all of this? Americans footed the bill for billions of dollars and were forced to surrender their Constitutional rights to create a system of total computer surveillance which was claimed to be intended to fight crime and terror. We have been hearing month after month after month of data breaches costing companies and individuals vast amounts of money. And not a single peep from the NSA. No identified cyber-criminals gleaned from all the data kept of all computer transactions in the nation (and much of the rest of the world). Nothing. Is the NSA totally incompetent? If so, we should shut them down, refund the money and restore the Bill of Rights. Or, as some suggest, is the NSA itself breaking into these data systems to feed its addiction to your data (and make a little party cash on the side)? If so, again, we should shut them down, refund the money and restore the Bill of Rights.

Oct 03 06:57

US Attorney General urges tech companies to leave back doors open on gadgets for police

US Attorney General Eric H. Holder Jr. on Tuesday urged tech companies not to lock police out of popular consumer gadgets, lest law enforcement's efforts to nab kidnappers or child predators be stymied.

Webmaster's Commentary: 

"I mean, sure, a lot of Americans, millions really, will have their bank accounts broken into and stuff, but it will be worth it to allow the police unfettered access to nude photos of their wives and daughters, I mean, criminals."

Oct 02 14:33

JPMorgan Says Data Breach Affected 76 Million Households

JPMorgan Chase & Co. (JPM), the biggest U.S. bank, said a previously disclosed data breach of its systems affected 76 million households and 7 million small businesses.

Customer names, addresses, phone numbers and e-mail addresses were taken, the New York-based bank said today in a regulatory filing. Internal bank information “relating to such users” also was compromised, the company said.

“There is no evidence that account information for such affected customers -– account numbers, passwords, user IDs, dates of birth or Social Security numbers –- was compromised during this attack,” the company said.

Webmaster's Commentary: 

Suuuure. The hackers broke in to steal information that was already public. We believe that!

And where is the NSA during all this computer crime?

Oct 01 08:30

Windows 8 Was So Bad That Microsoft Is Skipping Windows 9

On April 1, 2013, Infoworld published an article headlined, “Microsoft skips ‘too good’ Windows 9, jumps to Windows 10.’” A disclaimer at the top clarified that the story was an April Fool’s Joke, but it now appears that wasn’t necessary.

On Tuesday, Microsoft announced that it will indeed be skipping Windows 9 and jumping to Windows 10 as the name for its next operating system. No joke.

Sep 30 10:17

Grooveshark Found Guilty of Massive Copyright Infringement…

If you’re a Grooveshark user, you should probably start backing up your collection. In a decision released Monday, the United States District Court in Manhattan has found Grooveshark guilty of massive copyright infringement based on a preponderance of internal emails, statements from former top executives, direct evidence from internal logs, and willfully deleted files and source code.

Specifically, CEO Samuel Tarantino and co-founder and CTO Josh Greenberg will face the heaviest charges, which remain to be determined. The others were just scared rats: earlier, a number of top Grooveshark executives were removed from the defendant list in a settlement agreement, which now appears part of a clever exchange for cooperation. Oh and did they talk…

Sep 30 09:15

Trust in cloud security at all-time low: Execs still betting on the cloud

A new report on IT decision makers shows enterprise trust in cloud security at its lowest -- yet they're flocking to use it. OpenStack's Matt Joyce thinks it's fair to ask if everyone's gone nuts.

Sep 29 12:38

AT&T’s congestion magically disappears when it’s signing up new customers

AT&T yesterday began offering “double the data for the same price” to new customers and existing customers who sign new contracts, apparently forgetting that its network is so congested that speeds must be throttled when people use too much data.

Like other carriers, AT&T slows the speeds of certain users when the network is congested. Such network management is a necessary evil that can benefit the majority of customers when used to ensure that everyone can connect to the network. But as Federal Communications Commission Chairman Tom Wheeler has argued, the carriers’ selective enforcement of throttling shows that it can also be used to boost revenue by pushing subscribers onto pricier plans.

Sep 26 11:56

Apple shares lose £12bn as iPhone 6 is hit by new fault: Stock loses all gains it had made since launch of device last week

More than £12billion was wiped off the value of Apple yesterday after its latest iPhone was rendered unusable by a software update.

The 3.5 per cent drop in the share price meant the company’s stock lost all gains it had made since launching the iPhone 6 and iPhone 6 Plus last week.

Users of the brand new devices were cut off from telephone signal and data networks, meaning they could not make or receive calls and text messages or go on the internet away from wifi signal.

The update for the iOS 8.0.1 operating system also killed off the Touch ID function, a much-trumpeted feature that allows users to log on to their phone using their fingerprint.

Sep 26 09:25

Vaccine wars: the censoring of Rob Schneider

Yesterday, I reported on State Farm dropping Rob Schneider from their TV ads because he’s alerted people to vaccine dangers.

Because he has a view about vaccines that departs from the norm.

“Punch a hole in consensus reality and you can’t be a spokesman for our products.”

“Cause a ripple among the sleeping populace and you’re out.”

What’s next?

Well, I’ll tell you what could be next, based on the fact that the Internet runs via an interlocking system of commercial companies.

Some companies that facilitate emails to large lists, and website hosts, to say nothing of Facebook, which is already censoring information, could decide, under pressure, or voluntarily, to close down “controversial data.”

Sep 26 09:21

FBI blasts Apple, Google for locking police out of phones

Comey added that FBI officials already have made initial contact with the two companies, which announced their new smartphone encryption initiatives last week. He said he could not understand why companies would “market something expressly to allow people to place themselves beyond the law.”

Webmaster's Commentary: 

We would not be in this mess had "The Law" not placed itself beyond the Constitution!

Of course, this could also be a bluff to lull you into a false sense of privacy with these new phones and stimulate sales!

Sep 26 08:30

Photos: Robots and drones - here's what Intel's answer to the Raspberry Pi can do

The maker movement is thriving – with hobbyist technologists across the world packing low-cost computers and sensors into bespoke electronics that fuse art and technology.

The market is dominated by single-board computers and microcontrollers such as Raspberry Pi and Arduino, but new competitors are arriving all the time.

Intel's entry is Edison, a tiny single-board computers, little bigger than a postage stamp, measuring just 3.55 x 2.5 x 0.39cm.

Although it will be compared with the $35 Raspberry Pi model B+, it is designed to work as an embedded Linux board for electronic prototypes and products, rather than as a small-board computer running a full-blown Linux distro.

Webmaster's Commentary: 

I love technology when it works, and am old enough that some of the newer advances keep me in awe when I remember what I started with. This new desktop I built easily outpaces the Cray Supercomputers of the 1980s. Of course, back when computers were slow, software had to be efficient, but I have observed that as processors got faster, software companies got lazy, writing bloated, inefficient code, relying on the advances in hardware to keep their products usable.

Sep 26 05:28

Alternative Media Success Panics NeoCons

While most old people still cling to the corporate media worldview, the young are skewing ever-harder toward alternative perspectives. In Thursday’s Scottish independence referendum, for example, the London Daily Mirror reported that 71% of 16-17 year olds voted “yes” while those over 65 voted “no” by a 73%-27% margin.

Why does the vast majority of Scottish young people favor independence, while an equally crushing majority of old people opposes it?

Short answer: Old people still believe BBC propaganda, while the young do not.

Sep 25 11:41

Obamacare Website Costs Top $2 Billion, Almost Triple Government Estimates

What's the opposite of government efficiency? In a double-take-instigating headline, the federal government’s Obamacare enrollment system has cost about $2.1 billion so far, according to a Bloomberg Government analysis of contracts related to the project. BGOV’s analysis shows that costs for both healthcare.gov and the broader reform effort are far greater than anything publicly discussed. However, that pales into insignificance when considering health reform has cost American taxpayers $73 billion in the last four years... and counting.

Sep 25 11:39

Major Sell Program Trips 50-DMA, Sends Stocks Sliding

A "huge" institutional sell order, covering almost 200 individual stocks, is rumored to have been responsible for getting this morning's weakness across stocks going as equity indices catch down to bonds and credit. The S&P 500 broke key support at its 50-day moving-average (for first time in 2 months) and is back at 6 week lows. The Russell 2000 is now down 4.25% from the FOMC meeting last week...

Sep 25 09:59

Survey: Online trolls are 'everyday sadists'

If you've ever complained that the trolls junking up online comment sections are a bunch of sadistic psychopaths, you might be onto something.

An online survey by a group of Canadian researchers suggests that Internet trolls are more likely than others to show signs of sadism, psychopathy and "Machiavellianism": a disregard for morality and tendency to manipulate or exploit others.

Webmaster's Commentary: 

We kinda figured that out.

Sep 25 09:24

Do not open any emails with attachment "balance statement.htm!" It is malware

Webmaster's Commentary: 

Don't bother clicking the link to the FBI's list of current scams. It is not listed there. But I received no less than seven of these under various subject lines today, two of which were explicitly sent to wrh@whatreallyhappened.com. The rest just had "recipients" in the "to:" field. Examination of the htm file shows it loads a bunch of malware onto your computer.

Needless to say, I am making this threat known as a public service to our readers ... and beat the NSA to the announcement as well! :)

Sep 25 08:51

PR Firm Pulls ‘Emma Watson Naked Pics’ False Flag to Push For Internet Censorship

A PR firm has admitted to carrying out an online false flag against the 4chan forum in which it blamed the website for a threat to release naked pictures of actress Emma Watson as part of an appeal to President Barack Obama to censor the Internet.

Webmaster's Commentary: 

Anyone foolish enough to take nude pictures and put them on the web is just asking for trouble, and the reality is that more than a few stars intentionally plant nude pictures of themselves where they will be "discovered" as part of the campaign to increase their fame and "bankability." Setting that aside, this whole episode reminds us that the government and corporate media persist in trying to find ways to shut down the open and free internet and turn it into just another government and corporate controlled content and propaganda delivery system. Public Relations firms are paid vast amounts of money to engage in activities which for normal civilians would be punishable as crimes.

Sep 24 10:55

Home Depot Hack Is Letting Criminals Drain Money From People's Bank Accounts

Data breach at home improvement retailer Home Depot Inc has led to fraudulent transactions across the United States, draining cash from customer bank accounts, the Wall Street Journal said.

Webmaster's Commentary: 

And where is the mighty NSA in all this? The American taxpayer has been forced to surrender billions in tax dollars, not to mention the Bill of Rights, to create an all-encompassing data monitoring system we are told exists to find criminals and terrorists. Yet we have not heard a peep from the NSA in all these serious data breaches. Not once. And the NSA could certainly use some good PR right now!

So where are they?

Is this "We are watching you" a gigantic and costly bluff to scare the people into silent obedience? After all, the Nazis used the same trick to keep their population silent and uncomplaining as Germany was led to the slaughter.

Or, alternative theory; it is the NSA itself that is behind the data breaches. They certainly have the resources to carry out these crimes, and as already demonstrated, no regard for the laws of the land! Criminal activity in intelligence agencies is hardly new. The CIA was trafficking drugs from Vietnam, then later Central America, to fund operations they did not wish to tell Congress about. Maybe NSA is doing the exact same thing, with NSA employees "dipping into the take" to get the latest iPhone!

Because all these data breaches and not a word from the NSA makes no sense at all!

Sep 24 07:51

Your Smartphone Broadcasts Your Entire Life To The Secret Service

Intelligence services collect metadata on the communication of all citizens. Politicians would have us believe that this data doesn’t say all that much. A reader of De Correspondent put this to the test and demonstrated otherwise: metadata reveals a lot more about your life than you think.

Sep 24 07:27

Emma Watson nude photos threat a hoax

A website threatening to release nude photos of actress Emma Watson is a hoax, designed by somebody claiming to be a marketing firm determined to smear online message board 4chan.

Sep 22 12:51

Tor Challenge Inspires 1,635 Tor Relays

Good news for whistleblowers, journalists, and everyone who likes to browse the Internet with an added cloak of privacy: the Tor network got a little stronger. Tor—software that lets you mask your IP address—relies on an international network of committed volunteers to run relays to help mask traffic. And that network is stronger now, thanks to the 1,000+ volunteers who participated in our second-ever Tor Challenge.

Sep 21 13:41

The Internet Debate Pits Local Communities Against Broadband Giants

Internet service with modern connection speeds is not available in much of Bradley County, Tennessee. Some parts have no internet service at all. But local advocates and lawmakers are pushing the FCC to intervene on their behalf - against major broadband companies and their lobbyists.

Sep 21 10:09

Alt media success panics neocons

As Western mainstream media fall into the hands of lying billionaires, Zionists, and intelligence agencies (three categories with significant overlap) – and as neoconservatives script big media’s ignoble lies – a surging internet-based alternative media has arisen to challenge the elite’s false narratives. Thanks to alt-media, fewer and fewer people are buying the simplistic feel-good myths peddled by the mainstream.

Webmaster's Commentary: 

I blush!

Sep 20 07:46

"NSA shared Americans' private communications with Israel"

Sep 19 13:02

Teen with lymphatic malformations has profile photo deleted by Facebook

On Tuesday, Norwegian news site VG reported that a 16-year-old boy found his newest Facebook profile photo deleted automatically by the site, but not for containing offensive content or misrepresenting himself. Embret Henock Haldammen, a high school student in Kristiansand, Norway, had posted his latest school portrait weeks earlier, only to receive a notice stating that "the profile picture violated Facebook's policies."

Webmaster's Commentary: 

But Facebook is okay with setting a kitten on fire!

And of course, facebook is blocking all posts that reference the video of "All Wars Are Bankers' Wars" under the excuse that YouTube is a known security threat!

Sep 19 07:04

Home Depot breach affected 56M debit, credit cards

Home Depot said Thursday that a data breach that lasted for months at its stores in the U.S. and Canada affected 56 million debit and credit cards, far more than a pre-Christmas 2013 attack on Target customers.

The size of the theft at Home Depot trails only that of TJX Companies' heist of 90 million records disclosed in 2007. Target's breach compromised 40 million credit and debit cards.

Webmaster's Commentary: 

And where is the NSA in all this? After all that money and Constitutional violations, can;t they actually do something USEFUL?

Sep 18 12:39

Apple’s “warrant canary” disappears, suggesting new Patriot Act demands

Apple included language in its first Transparency Report to say that it had not been subject to a Section 215 Patriot Act request. That language is now gone.

Sep 18 06:58

Biggest attack on RT.com: Website hit by 10 Gbps DDoS

RT.com has been hit with the most powerful DDoS attack in the website's history, which reached 10 Gbps in strength. No group has claimed responsibility. RT has experienced cyber assaults in the past, prompted by its reporting on Manning and WikiLeaks.

The Wednesday attack was successfully deflected, but resulted in a temporary slowdown of the site.

“Thanks to the website’s reliable technical protection, RT.com was unavailable just for a few minutes, even though the DDoS attack has continued,” RT’s press service said in a statement.

The attack was identified as a UDP-flood type, and reached 10 gigabits per second.

Sep 18 06:40

NSA Attacks Student at University of New Mexico

Sep 18 06:26

Apple will no longer unlock most iPhones, iPads for police, even with search warrants

Apple said Wednesday night that it is making it impossible for the company to turn over data from most iPhones or iPads to police — even when they have a search warrant — taking a hard new line as tech companies attempt to blunt allegations that they have too readily participated in government efforts to collect user information.

Sep 17 07:31

The NSA and GCHQ Campaign Against German Satellite Companies

“Fuck!” That is the word that comes to the mind of Christian Steffen, the CEO of German satellite communications company Stellar PCS. He is looking at classified documents laying out the scope of something called Treasure Map, a top secret NSA program. Steffen’s firm provides internet access to remote portions of the globe via satellite, and what he is looking at tells him that the company, and some of its customers, have been penetrated by the U.S. National Security Agency and British spy agency GCHQ.

Stellar’s visibly shaken chief engineer, reviewing the same documents, shares his boss’ reaction. “The intelligence services could use this data to shut down the internet in entire African countries that are provided access via our satellite connections,” he says.

Sep 17 07:02

Federal government may seize and shut down all internet sites that don't push vaccines during a national emergency pandemic

Under an executive order signed by President Obama in 2012, the U.S. federal government now has the authority to seize and shut down all private websites which do not promote vaccines and pharmaceuticals during the coming Ebola pandemic the government expects to sweep across America.

Sep 15 15:32

The new Luddites: why former digital prophets are turning against tech

Neo-Luddism began to emerge in the postwar period. First after the emergence of nuclear weapons, and secondly when it became apparent new computer technologies had the power to change our lives completely.

Webmaster's Commentary: 

It isn't the new technologies that are the problem, but the misuse of those technologies by government and corporations.

Sep 15 14:17

US spies have two bases in New Zealand: Snowden

Renegade former American intelligence analyst Edward Snowden claims the US National Security Agency, for which he used to work, has a facility in Auckland and another in the north. "You are being watched."

Snowden, who is sheltering in Moscow from US attempts to extradite him on espionage charges, appeared by video link before a capacity crowd at the Kim Dotcom-organised Moment of Truth event in Auckland Town Hall last night.

Sep 15 11:42

Our Nation Depends on Restoring Product Liability

Sadly, we have seen a trend in recent decades for the government to protect corporations against the people, rather than protecting the people against corporations. Along with computers, other industries we are dependent on are being protected against product liability lawsuits, such as vaccine manufacturers, and other biotech corporations. This is a practice typically seen under fascist governments, and it never ends well.

The computers don't last. The software will not install. The aqueducts are leaking. The roads are cracking.

Rome is falling.

Optional Banner: 
WRH Exclusive
Sep 14 11:36

APPLE WATCH IS A HAZARD TO YOUR SEX LIFE

A July 2013 survey of British women found that that 62% of women have interrupted sexual intercourse to check their cell phone. Some 48% of men admitted to doing the same.

Sep 14 07:51

Despite Obama’s Pledge to Curb It, NSA Mass Surveillance Wins Rubber Stamp

In the face of congressional inaction, a federal court on Friday renewed an order allowing the government to collect phone records on virtually all calls within the United States.

The Foreign Intelligence Surveillance Court approved the Justice Department's request for another 90-day extension of the National Security Agency's controversial mass surveillance program, exposed publicly last summer by Edward Snowden and authorized under Section 215 of the post-9/11 Patriot Act. The spying authority is next set to expire on Dec. 5.

Sep 12 13:05

Naked Celebrity Photo Leak: Can You Be Bothered? Russell Brand

Webmaster's Commentary: 

Down in New Zealand, in what appears to have been a test, websites carrying the hacked nude celebrity photos were planting malware that shut the entire New Zealand network down for a day! So, I owuld advise you to focus your attention on naked pictures of your significant other and avoid being victimized!

Sep 11 10:54

City of Turin decides to ditch Windows XP for Ubuntu and €6m saving

€6m: the amount the municipality of Turin hopes to save over five years by switching from Windows XP to Ubuntu Linux in all of its offices.

The move will mean installing the open source operating system on 8,300 PCs, which will generate an immediate saving of roughly €300 per machine (almost €2.5m altogether, made up from the cost of Windows and Office licences) — a sum that will grow over the years as the need for the renewal of proprietary software licences vanishes, and the employees get used to the new machines.

Sep 10 12:17

5 million ‘compromised’ Google accounts leaked

A database of what appears to be some 5 million login and password pairs for Google accounts has been leaked to a Russian cyber security internet forum. It follows similar leaks of account data for popular Russian web services.

Webmaster's Commentary: 

And again, the NSA cannot find these crooks. Why? Are they the crooks themselves?

Sep 09 09:41

Off-the-grid texting device GoTenna attracts antisurveillance crowd

Daniel Levy, a Web developer living in the Puna District of Hawaii, lived through a 12-day blackout after a rather vicious hurricane earlier this summer. Many residents in his community were stuck powerless until the local utility company restored the grid, while some subsisted on solar energy. It was after that, Levy said, that he sought a solution and came upon GoTenna.

The gadget -- a small Bluetooth-enabled rod packed to the brim with modern radio innards -- lets you create your own private, secure communication network for sending messages without cell service using your smartphone. Though marketed toward outdoors and emergency situations like hiking and disaster relief, GoTenna is getting a boost from the cryptography community. Levy, whose neighborhood gets little to zero reliable cell service, happens to represent both. He's among the more than 25 percent of GoTenna preorder customers who paid for the product with the cryptocurrency Bitcoin.

Webmaster's Commentary: 

IF this works as advertized, it sounds like a very cool gizmo!!

Sep 09 08:38

INFOGRAPHIC - Internet Security Threats

Through their Global Intelligence Network, Symantec have put together their annual report for 2014. It looks at the types of internet security threats and number of attacks as well as vulnerabilities and effects of the attacks. Symantec’s Network is one of the most advanced of its kind; it’s made up of more than 41.5 million attack sensors!

Aside from the many attacks on personal devices, which can cause a great amount of stress and financial problems for the victim (see Ransomware!), attacks on businesses can be catastrophic. Risks to corporations include reputational damage and loss of trust, lawsuits and bankruptcy. 2013 has officially become known as the year of the Mega Breach. The average number of identities exposed in 2013 was 2,181,891 compared with 604,826 in 2012. This was probably down to the campaigns lasting longer, resulting in 8 incidents exposing over 10million IDs compared with only 1 in 2012.

Webmaster's Commentary: 

The real question is, "Where is the NSA?"

For months we have been told that thew NSA, at huge taxpayer expense, has been violating the Constitution to monitor all of our computer activity.

So why are they not able to find these cyber-criminals?

There is no question that the NSA could use some good publicity; to demonstrate that they provide a useful service for all their cost and Constitutional crimes.

So why don't they?

Is it all a gigantic bluff to try to scare us into silence? If so, it does not appear to be working.

Or is the NSA itself, already acting in a lawless fashion, committing these crimes or in league with those who do?

THIS IS A CALL TO RIVERO'S RANGERS!

Wherever you see any story about any data breach, please post the above!

Sep 09 08:35

Biggest credit card breach in history

First it was Target.

Now it's Home Depot in what may well prove to be the biggest credit card data breach in history.

What's going on?

It's pretty simple. The companies that run these systems are not investing enough in making them secure and are hoping that the bill for not doing so will never come due.

Webmaster's Commentary: 

The real question is, "Where is the NSA?"

For months we have been told that thew NSA, at huge taxpayer expense, has been violating the Constitution to monitor all of our computer activity.

So why are they not able to find these cyber-criminals?

There is no question that the NSA could use some good publicity; to demonstrate that they provide a useful service for all their cost and Constitutional crimes.

So why don't they?

Is it all a gigantic bluff to try to scare us into silence? If so, it does not appear to be working.

Or is the NSA itself, already acting in a lawless fashion, committing these crimes or in league with those who do?

THIS IS A CALL TO RIVERO'S RANGERS!

Wherever you see the story about the Home Depot (or any other) data breach, please post the above!

Sep 07 08:36

Celebrity photo leak: Fake links to nude photos cause nationwide internet crash in New Zealand

New Zealanders keen to view hacked photos of naked celebrities have been blamed for a nationwide internet meltdown involving the country's main provider.

It is believed a handful of computer users clicked links on Friday evening believing they would be taken to the illicit images, but instead caused them to inadvertently install malware, triggering a crippling internet attack.

Webmaster's Commentary: 

A test to take down the internet during the next false-flag attack?

There is no way the perpetrators of a new 9-11 can allow the independent media to operate during a false-flag, lest we find and report the signs of fraud. Remember that in the weeks ahead of 9-11, the FBI was shutting down Muslim websites here in the US, to prevent the victims of the coming frame-up from defending themselves while the official story was implanted into the population.

And the fact that this shut down was confined by the planted malware to only New Zealand suggests it was an operational test.

So don't start clicking links to see naked celebrities this next week.

" To act with my clothes on is a performance. To act with my clothes off is a documentary." -- Julia Roberts

Sep 07 08:25

Patriot Act’s absurd new spawn: Just when you thought it couldn’t get any worse

Congress may be preparing to reinforce two horrible FISA Court decisions and an abusive government search with no debate in the coming weeks: a decision to give national security orders unlimited breadth, one making it legal for the government to investigate Americans for activities protected under the First Amendment, and the FBI’s “back door” searches of Americans’ communication content collected under the FISA Amendment Act Section 702 authority.

Webmaster's Commentary: 

Congress is most likely giving this approval because they know what these governmental agencies have on them!

Remember Chief Justice Robert's "flip-flop" on Obamacare?!? I am still rather curious as to precisely what "inspired" his change of heart!! :-)

And right after, he slipped out of the country for awhile so he couldn't be questioned on his reversal.

Sep 05 07:39

Meet the Russian-made tool that grabs nude selfies from iCloud accounts

There’s a seedy trade in compromising photos stored in Apple iCloud accounts, and it is in part aided by a software program that cleanly collects the data.

Some of the nude celebrity photos are believed to have first been circulated on Anon-IB, a definitely not safe-for-work forum. As reported by Wired, the forum is full of offers for iCloud “ripping,” or downloading the entire contents of an account.

The software tool they’re using is Moscow-based Elcomsoft’s Phone Password Breaker, or EPPB, one of many forensic tools the company develops for law enforcement and other clients.

Sep 05 06:24

How Covert Agents Infiltrate the Internet to Manipulate, Deceive, and Destroy Reputations

By publishing these stories one by one, our NBC reporting highlighted some of the key, discrete revelations: the monitoring of YouTube and Blogger, the targeting of Anonymous with the very same DDoS attacks they accuse “hacktivists” of using, the use of “honey traps” (luring people into compromising situations using sex) and destructive viruses.

Sep 04 15:05

Newly Revealed NSA Program ICREACH Extends the NSA's Reach Even Further

Turns out, the DEA and FBI may know what medical conditions you have, whether you are having an affair, where you were last night, and more—all without any knowing that you have ever broken a law.

That’s because the DEA and FBI, as part of over 1000 analysts at 23 U.S. intelligence agencies, have the ability to peer over the NSA’s shoulder and see much of the NSA’s metadata with ICREACH.

Sep 04 09:29

GOP-backed fake news sites target Dems in congressional races

This month, the National Republican Congressional Committee debuted at least 20 websites in key congressional districts—from Central Valley, California, to Augusta, Georgia—that are designed, albeit amateurishly, to look like news sites. One of them, “South Michigan Update,” sports the headline “Byrnes Struggles to Escape Her Record,” referring to Democrat Pamela Byrnes in Michigan’s 7th District. Like the other NRCC sites, the featured post attacks the Democratic candidate in the race. The piece has a byline credit to “Geoff,” though, as The Washington Post pointed out, most of “Geoff’s” posts are rewrites of content from the NRCC site. The spare South Michigan site has one other item: a video ad for the 7th District’s Republican incumbent, Tim Walberg, that is featured under the header, “Most Viewed.”

Sep 02 07:10

Chattanooga: Fastest Internet in US

Yes, you read that right. Internet speeds as fast as 1 gigabit per second are the norm in the city of Chattanooga, Tennessee. Not the spot you might have predicted, would you. Certainly not the place I anticipated would have faster, better internet than anywhere else in the United States, and one of the faster internet speeds on the planet. Not only that, but the fast internet is helping to lead Chattanooga out of the economic doldrums.

Sep 01 09:47

Police State: US Government-Funded Database Created to Track “Subversive Propaganda” Online

The creation of the Truthy database by Indiana University researchers has drawn sharp criticism from free-speech advocates and others concerned over government censorship of political expression.

According to the award abstract accompanying the funding provided by the National Science Foundation (NSF), the Truthy project aims to demonstrate “why some ideas cause viral explosions while others are quickly forgotten.” In order to answer this and other questions, the resulting database will actively “[collect] and [analyze] massive streams of public microblogging data.”

Webmaster's Commentary: 

MOI, subversive?!?!? :-)

If telling the truth has become "subversive", this country might as well pack it in as the alleged "land of the free and the home of the brave". right now.

Aug 29 10:52

IN TIMES OF WAR: A PRAYER FOR PEACE - CLAIRE K. RIVERO

Webmaster's Commentary: 

I am reposting Claire's video as the US invades Iraq for the third time, Kiev fakes an invasion by Russia, Libya's US puppet rules are driven from office, and a new flood of TV commercials hits the corporate media networks reminding all 18 year-olds that they MUST register for selective service.

Optional Banner: 
WRH Exclusive
Aug 28 09:33

iFail: Why John Deasy's Risky iPad Gambit Crashed and Burned at LAUSD

Aug 28 08:29

What went wrong with Microsoft's August updates?

It's been a long time since Microsoft had a Patch Tuesday this bad. By Friday they were conceding problems with several updates. Not only did they withdraw four updates, but they recommended that users uninstall one of them.

Yesterday they reissued that update, but they also announced that it had its own set of new bugs, one of which can make windows inaccessible or invisible. Three of the four withdrawn updates are still withdrawn and two of those are also subject to the missing window bug. Two other updates, previously uninvolved with the August updates, also have this missing window bug.

Aug 27 14:59

Landmark civil rights legal records deleted from Pacer

Records of landmark US civil rights cases presided over by one of the country's most senior judges have been removed from the internet.

The state-run Public Access to Court Electronic Records (Pacer) service deleted numerous court documents deemed incompatible with a software upgrade.

These included appeals heard by Justice Sonia Sotomayor prior to her appointment to the Supreme Court.

A famous racial discrimination case was among the expunged files.

Webmaster's Commentary: 

Someone doesn't want those precedents to be available for lawyers! How Orwell can you get?

Aug 26 15:17

Bill Passes Allowing Police To Shut Off ALL Cell Phones … Remotely

Police and others would have the ability to shut off cell phones anytime they wanted under a bill passed by California’s state legislature, privacy experts say.

Senate Bill (SB) 962 would require manufacturers to add a “kill switch” to cell phones that would let authorities turn the device off remotely. The stated goal of the bill is to allow owners of smartphones to “kill” their phone if it’s stolen, but privacy experts say the bill’s language could be twisted. Additional language was needed, they add.

“If you give law enforcement a tool that can be abused, you’ll have an instance of asking for forgiveness rather than permission,” Jack Laperruque, an expert on privacy at the Center for Democracy and Technology, told The Hill. Laperruque believes authorities could use the kill switch to shut down communications during protests or incidents of civil unrest such as the riots in Ferguson, Missouri.

Aug 25 10:52

VIRTUAL 9-11: Will the US & Israel Hack The US Banking System Computers and Falsely Blame It On Iran (or Syria or Russia or China)?

So what it looks like is being planned, and pre-sold to the American people with all these stories about celebrities' personal information being hacked and made public (an activity that produces no profit for the hackers other than news headlines), and the "Syrian" (nudge nudge wink wink) hack of the AP Twitter feed that shocked the US stock market, is that the US Government will itself take down the US financial computers, and blame it on Iran /Russia/ China/Al Qaeda/Syria/Arabs and others to be named as convenient. This gets Wall Street and Washington DC off the hook, because now the financial melt-down is an act of war, rather than the result of decades of Wall Street crime and corruption and the predations of Private Central Banks. US banks have already been hit with cyber attacks, to set the stage.

Webmaster's Commentary: 

Reposted in light of Today's warming from Wall Street of an impending cyber-attack, along with the wag-the-ISIS from the corporate media.

Optional Banner: 
WRH Exclusive
Aug 23 08:43

Ditching Linux for Windows? The truth isn't that simple, says Munich

Munich city council demonstrated to the world that an organisation employing thousands could ditch Windows and move to Linux and free software.

When the project finished late last year about 15,000 staff at the German authority had been migrated to using Limux, a custom-version of Ubuntu, and OpenOffice.

But is the council's move to open source about to be scrapped in favour or returning to Microsoft?

No says the council, in spite of numerous reports to the contrary. Suggestions the council has decided to back away from Linux are wrong, according to council spokesman Stefan Hauf.

Webmaster's Commentary: 

Now I wonder who would plant the story that Munich was dumping LINUX to go back to Windows!!!

Aug 22 09:19

How to Spot – and Defeat – Disruption on the Internet

David Martin’s Thirteen Rules for Truth Suppression, H. Michael Sweeney’s 25 Rules of Disinformation (and now Brandon Smith’s Disinformation: How It Works) are classic lessons on how to spot disruption and disinformation tactics.

We’ve seen a number of tactics come and go over the years. Here are the ones we see a lot of currently.

Aug 22 08:33

Microsoft's Windows 9: Much ado about little, given cloud shift

In a short-term lens, Windows 9 is critical because:

Microsoft needs to put the Windows 8 launch to bed to get us talking about something other than Vista analogies;
The software giant needs to refine Windows to be both touch and non-touch friendly;
Windows needs to hook into Microsoft's platform and productivity mantra;
And Windows needs to lay the groundwork for a faster development cadence as well as a cloud approach.

In other words, Windows 9's codename Threshold is on target. Windows 9 is the bridge between Microsoft's past of big bang releases and a licensing model to one focused on the cloud, innovation that's easier to consume, and services.

Webmaster's Commentary: 

From Wikipedia: "Cloud computing is the delivery of computing as a service rather than a product, whereby shared resources, software, and information are provided to computers and other devices as a utility (like the electricity grid) over a network (typically the Internet)."

In other words, they are taking computing back to the model of the 1970s where all the software and data are on mainframes and your electronic devices are merely terminals. You are able to access your data and applications only so long as you continue to pay the monthly rental on them. But the real problem is the loss of all privacy as your data is not under your own control but that of large corporations which have a track record not only of cooperating with the government, but of skimping on security to save a few bucks to please the stockholders. As I read the articles about Windows 9 "Threshold", it appears its major selling point is that it is not Windows 8 and has little else to recommend it. his is not the product computer users want, but the product Microsoft demands you will buy.

The good news is that this will invigorate the LINUX and Open Source communities (which may explain why the IRS was targeting Open Source organizations right alongside Obama's political enemies!

Aug 21 11:48

global Internet conditions

Akamai monitors global Internet conditions around the clock. With this real-time data we identify the global regions with the greatest attack traffic, cities with the slowest Web connections (latency), and geographic areas with the most Web traffic (traffic density).

Webmaster's Commentary: 

Click on "attacks" in the Modes menu above the map. (It takes a minute to fully fill in the graphics)

Seems the US is a teensy bit over-represented as a target! Where is the NSA, which is supposed to be protecting the nation? Or is this the work of the NSA, stealing what is left of our privacy?

Aug 21 11:05

The Secret Playbook of Internet Trolls

Why would a Jew post vile anti-Semitic comments? Because normal people are offended by – and don’t want to be associated with – pure, naked anti-Semitism, and so they will avoid such discussions. If the discussion was originally criticizing a specific aspect of Israel policy, the discussion will break down, and the actual point regarding policy will be lost.

Similarly, anti-Semitic posts weaken websites by making them seem less reputable. Indeed, Common Dreams says that the troll’s anti-Semitic comments drove away many of that site’s largest donors … dealing a severe blow to its continued viability. That’s exactly what trolls spewing anti-Semitic bile are trying to do: shut down logical discussion and discredit and weaken sites which allow rational criticism of policy.

Aug 21 10:35

Got weapons? Nude body scanners easily defeated

Researchers are delivering a paper at a security conference Thursday highlighting how easy it is to get weapons through the nude body scanners that have been removed from US airports but have been placed at other government installations across the globe.

The report, given at the Usenix Security Symposium in San Diego, highlights the insecurity of the Rapiscan Secure 1000 Single Pose "backscatter" scanner that once was used throughout the nation's airports but are now deployed at US prisons and courthouses, as well as airports in Africa. The paper, "Security Analysis of a Full-Body Scanner," from researchers at the University of California-San Diego, University of Michigan, and Johns Hopkins University, confirms what even laymen researchers had already discovered: hiding weapons on the side of one's body defeats the machine (PDF).

Webmaster's Commentary: 

This whole TSA thing is a huge money-making scam!

Aug 21 08:15

Money And Power: The Real Reason For The NSA Spying On Everyone

We noted that Booz Allen Hamilton (yes, the last employer of one Ed Snowden) had hired former NSA director and also Director of National Intelligence Mike McConnell as its Vice Chairman. He was the leading voice out there screaming about the threat of "cyberwar" getting on TV and having lots of opinion pieces in big name publications -- all of which mentioned his former government jobs, but almost none of which mentioned that his current employer, Booz Allen Hamilton, stood to make billions selling "solutions" to the government. And, indeed, Booz Allen has been raking in the cash on "cybersecurity."

Aug 20 14:17

Canada's Hitchhiking Robot Completed Its Trip Without Getting Murdered

On July 27, a brave robot named hitchBOT bid goodbye to its creators on the shoulder of a highway in Halifax, Nova Scotia. With limbs made from pool noodles, a beer-cooler body, and legs clad in Wellington rain boots, this adorable hodgepodge of a robot was ready to embark on the adventure of a lifetime. It raised its best hitchhiker’s thumb, and waited to be picked up by its first benefactor in its 6,000-kilometer road trip across Canada.

When hitchBot set off, we at Motherboard worried that the trooper might meet a tragic end (and we weren't the only ones). But fortunately, our fears were groundless. Over the weekend, hitchBOT arrived at its final destination in Victoria, BC, intact and thriving after meeting dozens of new friends across the country.

Aug 20 11:19

Getting gouged by geeks

Webmaster's Commentary: 

I ... can ... identify...

Aug 20 09:51

The Double Identity of an "Anti-Semitic" Commenter

Like many other news websites, Common Dreams has been plagued by inflammatory anti-Semitic comments following its stories. But on Common Dreams these posts have been so frequent and intense they have driven away donors from a nonprofit dependent on reader generosity.

A Common Dreams investigation has discovered that more than a thousand of these damaging comments over the past two years were written with a deceptive purpose by a Jewish Harvard graduate in his thirties who was irritated by the website's discussion of issues involving Israel.

His intricate campaign, which he has admitted to Common Dreams, included posting comments by a screen name, "JewishProgressive," whose purpose was to draw attention to and denounce the anti-Semitic comments that he had written under many other screen names.

Webmaster's Commentary: 

We get a lot of that here as well. And there is nothing new in this tactic. Back in the 1930s, the ADL was able to solicit huge donations to oppose the American Nazi Party, a very small organization that nonetheless garnered a lot of media attention, which assisted ADL in raising more funds. Then the leader of the American Nazi Party was arrested for embezzling from his sponsor ... which turned out to be the ADL!

Israel needs the illusion of anti-Semitism for political reasons and if none is to be found, they just create it themselves!

Aug 20 07:52

BUSTED! Gov. Running #Ferguson Twitter Psyop

Webmaster's Commentary: 

It is a fact that the US Government has spent millions of your tax dollars buying special software that allows government propagandists to create and use hundreds of fake identities to flood social media with US Government propaganda.

That they are provably using this system now to fan up the racial tensions tells us that indeed Ferguson is an operation to try to trigger mass race riots leading to martial law. DO NOT FALL FOR IT!

Shortly after exposing the government propaganda accounts, this poster was issued a warning form Twitter, implying that calling attention to these manufactured government accounts would suspend his own twitter account!

Aug 20 07:18

Classified Information on Malaysia Airlines MH370 Case Stolen - Reports

Classified information from the computers of officials involved in the investigation into the disappearance of Malaysia Airlines MH370 has been stolen, The Star Online reported Wednesday.

The computers of the high-ranking officials are said to have been hacked and the stolen information was allegedly being sent to a computer in China before the Malaysian Science, Technology and Innovation Ministry blocked the transmissions, the website reported.

Webmaster's Commentary: 

This kind of skullduggery supports the theory that MH370 was shot down during a joint US/Thai military exercise, in an accident similar to that which killed TWA 800.

Aug 19 17:42

My prediction about Facebook came true

"The company is too important as a data-mining asset of the intelligence community to let it fall into disrepair and chaos."

Aug 18 14:04

Why Twitter's new verified feature is disastrous for #Ferguson

In an effort to encourage its verified users to engage with one another, Twitter announced mid last week that its verified users would get a new set of tools that lets them screen out conversations from non-verified users. The system essentially builds an underclass into the most democratic social network ever made, by giving its verified users preferential treatment.

Aug 18 10:12

Apple’s Cook Kicks Off ‘Made in USA’ Push With Mac Pro

Apple Inc. is taking orders today for the new Mac Pro personal computer, which is being built in Texas with components made domestically as part of Chief Executive Officer Tim Cook’s $100 million Made-in-the-USA push.

“We have begun manufacturing the Mac Pro in Austin,” Cook wrote in a posting yesterday on Twitter. “It’s the most powerful Mac ever.”

Webmaster's Commentary: 

Obviously, I hope this turns out to be a good product, and I am willing to accept one for testing and review! :)

Seriously, I would love to see the USA start to make quality products and I wish them success.

But...

Back when we were switching over to LED lights to get away from the toxic problems with the CFLs, I bought some of the Phillips LED lights, but mostly the CREE LED bulbs that are manufactured here in the US. So far, not a problem with the Philips lights. None. But we are seeing about a 30% failure rate for the CREE lamps over six months, including the glass globes simply falling off.

Aug 18 06:22

BUSTED! Governments Hire Web Trolls to Sway Public Opinion

Aug 16 08:31

Julie Bishop's mobile phone compromised while she negotiated access to MH17 crash site

The mobile phone of Foreign Affairs Minister Julie Bishop was compromised while she was overseas negotiating access to the Malaysia Airlines MH17 crash site, it has been revealed.

Ms Bishop travelled to Ukraine, the Netherlands and the United States during her two-week trip to secure access to the site in eastern Ukraine.

Aug 15 14:18

Senate must follow House’s lead on Internet access tax

Last month, the House of Representatives gave consumers a little love when lawmakers voted to make a long-standing ban on Internet access taxes permanent.

The moratorium, otherwise known as the Internet Tax Freedom Act, prohibits states or their political subdivisions from imposing taxes on Internet access or from applying multiple or discriminatory taxes on electronic commerce. But unless Majority Leader Harry Reid, D-Nev., and the U.S. Senate take up a measure to extend the ITFA protections, this important act will expire Nov. 1.

State and local governments who view the expiration of ITFA as a way to raise revenue through new taxes to replenish their overspent coffers are clamoring over this legislation.

Aug 15 08:11

Microsoft considered rebranding Internet Explorer to escape negative perception

Microsoft's Internet Explorer has a bit of a brand identity issue on its hands. Because of decisions made many, many years ago, Internet Explorer 6 has left a sour taste in the mouths of developers and consumers.

Aug 14 08:32

Law Enforcement Ask Public to Not Use Social Media During Emergencies

Police in Washington State are asking the public to stop tweeting during shootings and manhunts to avoid accidentally telling the bad guys what officers are doing.

Webmaster's Commentary: 

To judge by Ferguson, we are ALL "bad guys" now, so you will forgive us if we fail to comply.

Aug 08 09:27

Gaza Strip: Boycott Israeli Products App Gets 350,000 Supporters

An app that allows users to search for a product linked to targeted companies or countries in order to boycott them has seen a significant surge in users signing up to anti-Israel campaigns.

Buycott catalogues brands and their affiliations and lets users set up campaigns to either help or avoid funding certain causes. By scanning a product's barcode with their smartphone camera, consumers are able to determine which brands are associated with which campaigns.

Aug 08 07:22

All Four Internet Service Giants Allegedly Violated Last Remaining Net Neutrality Rule

T-Mobile, Verizon, AT&T and Sprint accused of violating transparency rule in throttling cases as FCC considers abolishing net neutrality

Aug 06 09:50

You’ll Be One of the ‘Things’ in the ‘Internet of Things’

And how secure are these devices that make you part of the Internet of Things? You don’t need to break a code; you don’t need to capture a server. “Hardcore hackers wouldn’t even bother with it,” said one of the hackers. “They’d find access too easy.” Read…. Google Glass Hacked, Can Record Everything You Stare At?

The “Internet of Things” is the next Big Thing. A universe of devices connected to data centers: your fridge, toaster, alarm clock, garage-door opener, pickup truck, self-driving car, thermostat, “intelligent toilet” (I had to learn how to use them in Japan), and other doodads.

Webmaster's Commentary: 

I don't know about you, but all this potential data gathering makes me more than a little edgy.

Aug 06 07:34

China Said to Exclude Apple From Procurement List

China’s government excluded Apple Inc. iPads and MacBook laptops from the list of products that can be bought with public money because of security concerns, according to government officials familiar with the matter.

Webmaster's Commentary: 

Thank you NSA for wrecking the American IT industry! Hope you are proud of yourselves!

Aug 06 06:18

FALSE-FLAG ALERT - Russian Gang Amasses Over a Billion Internet Passwords

Hold Security would not name the victims, citing nondisclosure agreements and a reluctance to name companies whose sites remained vulnerable. At the request of The New York Times, a security expert not affiliated with Hold Security analyzed the database of stolen credentials and confirmed it was authentic.

Aug 05 13:47

Justin.tv shuts down

Aug 04 11:53

Bill that would require smartphone kill switches is close to passage

A proposal backed by state Sen. Mark Leno, above, that would require kill switches on smartphones is supported by consumer groups, law enforcement and city governments including L.A., San Francisco, Santa Ana, Oakland and San Diego.

Webmaster's Commentary: 

So they can shut off all the smartphones in case the government is doing something they do not want photos and videos made of ... which is why you should dig out that old pocket digital camera and keep it handy if you are going to a protest.

Aug 04 11:21

‘Bomb Gaza’ Google Play app lets Android users carry out Israeli air strikes on Palestinians

Google is facing criticism for continuing to allow Android mobile users to download a game called “Bomb Gaza”, in which players are required to “drop bombs and avoid killing citizens”.

The app, which was uploaded on 29 July, has been installed up to 1,000 times and received at least one report as “inappropriate”, yet still remains available on Google’s Play store.

Webmaster's Commentary: 

Now can you imagine the reaction by the corporate media if someone posted an APP called "Bomb Israel?"

Aug 04 07:16

FACEBOOK STILL BLOCKING POSTS WITH THE URL TO THE YOUTUBE VIDEO OF "ALL WARS ARE BANKERS' WARS."

Aug 01 11:19

Firefox can't establish a connection to the server at facebook.com.

Webmaster's Commentary: 

UPDATE: Facebook is up and running again.

While we are at it, I have a major complaint regarding Facebook.

I have hit the maximum allowed number of followers, which is 5000. Many of these followers have closed their accounts with Facebook, but Facebook offers no automatic way to remove these expired friends, other than to page through 5000 names and delete them one at a time. There isn;t even a button to jump to the bottom of the friends list where most of these unused and expired friends are to be found, just the constant scrolling down the list of 5000 friends, which is slow to refresh.

I looked for some kind of tool or add-on to speed up this process and I did find two add-ons that were supposed to allow automated clean-up of unused and expired friends, but neither one worked, and follow up comments indicate Facebook is blocking these outside friends management tools. I also found one commercial software tool to automate Facebook, and while it has all kinds of tools for automated adding of friends, there was nothing to make it easy to delete expired/unused friends.

Needless to say, until I am able to delete these expired/unused friends, I cannot accept any new friend requests. And it occurs to me that oif Facebook is being used to harvest raw data about our networks of associates, the inability to easily delete expired/unused friends means that the mass of data being fed by Facebook to the NSA in in fact mostly useless garbage, purchased at the usual highly inflated taxpayer rates.

Anyone know a way to manage 5000 friends on Facebook THAT ACTUALLY WORKS??

Aug 01 09:29

Robert Campbell of Ottawa faces 181 international cyberbullying charges

Robert Campbell, a 42-year-old Ottawa man, faces nearly 200 charges of identity fraud, defamation and criminal harassment involving 38 people across Canada, the U.S. and U.K.

Ottawa police announced the charges Friday morning after an eight-month investigation involving law enforcement in B.C., Ontario, New Brunswick and Halifax, as well as Michigan in the U.S., and Hertfordshire and London in the U.K.

Campbell is facing:

27 counts of criminal harassment.
85 counts of defamation libel.
69 counts of identity fraud.

He is expected to appear in an Ottawa courtroom today.

At the courthouse on Friday morning, a woman who identified herself as Campbell's wife, but refused to give her name, told the CBC's Ashley Burke that she was shocked by the charges. She said she was "surviving" the news and that she didn't know what her husband was up to online.

Aug 01 09:27

Share! Blaine Cooper Banned From Facebook After Producing This Video Showing Drug Cartel Crossing Border

See the four videos about the complicity of the Border Patrol in Texas with regard to letting in drug-carrying illegal aliens. These are the four videos which got investigative news reporter, Blaine Cooper, banned from Facebook. His account has been frozen and his videos destroyed as Facebook does its part to support the subversion and treason being committed against the United States by the Obama administration.

Webmaster's Commentary: 

Given Facebook's blocking of "All wars are Bankers' Wars" I understand how this guy feels!

As my this moment Facebook is still showing major problems with their site.

Aug 01 07:59

Microsoft ordered to hand over overseas email, throwing EU privacy rights in the fire

A US judge has ordered Microsoft to hand over foreign data it stores back to the US, despite allegedly strong privacy protections in Europe to mitigate such processes.

The logic of the court is that because the US-headquartered software giant controls the data it stores overseas, its foreign subsidiary companies are just as applicable to US law.

Webmaster's Commentary: 

And the logic of the Europeans will be to cancel all Microsoft contracts immediately!

Reader comment: I am reminded of a pivotal scene in the movie "Judgment at Nuremberg" where Spencer Tracy, one of the U.S. judges, visits one of the Nazi judges played by Burt Lancaster in his jail cell. To paraphrase this speech, Tracy tells him that the moment when Nazism took over was when the judges quit upholding the law and what was right and started acting political. Here's another example of it in our own land.

Jul 31 10:22

CIA admits improperly hacking Senate computers

CIA Director John Brennan admitted that the agency did hack into the computers of Sen. Dianne Feinstein and other Senate staffers — an allegation he had denied in March.

Webmaster's Commentary: 

"Gee, shuckies; ya caught us. But before you make a big deal about it, allow me to show you some of the photos we took using your webcam of you and your secretary. I am certain you will agree these are images that should not be anonymously emailed to your wife ... and her divorce lawyer, right?"

Jul 31 08:46

Anonymous 'knocks out' Mossad website over Israel’s Gaza offensive

Hacker group Anonymous has reportedly taken down the website of the Israeli secret service Mossad in protest of Israel’s military incursion in Gaza. The ‘hacktivists’ have already targeted a number of organizations in their mission to stop the “genocide.”

Mossad’s website went offline at around 00:40 GMT and is still down at the time of writing. The Israeli government has yet to make any comment on the supposed hack attack.

Webmaster's Commentary: 

After so many hack attacks on my servers from Israel's supporters, it's nice to see them getting a taste of their own medicine!

Jul 30 12:46

Trading to Resume on Moscow Stock Exchange

Trading will begin again on the Moscow Stock Exchange at 5:50 p.m. after stopping abruptly on Wednesday afternoon, the stock exchange said in a statement.

Trading stopped at approximately 3:56 p.m. in Moscow, according to Interfax.

The stock exchange said in an earlier statement that the reasons for the interruption are being investigated.

Webmaster's Commentary: 

Hacking attack to try to shut them down?

Jul 29 10:38

Director of Israeli Aerospace Institute Conducts Campaign Disabling My Facebook Account

You are reading the blog of a dangerous man. A very dangerous man. Or so the Israeli pro-war propaganda machine believes. That’s why yesterday, an Israeli Facebook user named Tal Inbar began a campaign to get my Facebook account removed.

Jul 29 10:16

President Obama Needs to Cancel Executive Order 12333

We’re all too familiar with the bulk collection of cellphone metadata—information on whom you contact and when—that Edward Snowden revealed. However, Executive Order 12333 from 1981 (thanks, President Reagan) allows the NSA to collect the actual content from phone calls and Internet communications if they are amassed from outside U.S. borders. John Napier Tye, former section chief for Internet freedom in the State Department’s Bureau of Democracy, Human Rights, and Labor, recently wrote about this issue in The Washington Post.

Jul 28 17:41

How Israel Uses Twitter, Facebook & Tinder to Legitimize Murder | Brainwash Update

Jul 28 08:56

Microsoft wants you to forget Windows 8

As talk of the next Windows begins to build and some details of what most are calling for now either Windows 9 or Threshold come into focus, it's worthwhile to take a moment to remember Windows 8.

Because Microsoft will want everyone to forget it.

Jul 27 08:07

NSA Helps Saudi Arabia Crush Dissent … Like It Helps Crush Dissent at Home

Numerous high-level NSA whistleblowers say that NSA spying is about crushing dissent and blackmailing opponents … not stopping terrorism.

In addition, the NSA is giving the raw data on American citizens living in the U.S. to Israel. That doesn’t seem to be a good strategy for protecting America from terrorism.

Newly-published Snowden documents also show that the NSA is helping one of the world’s most brutal and repressive dictatorships – Saudi Arabia – to crush dissent.

Jul 26 19:14

Online anti-Semitism runs rampant in France

Since start of Israeli operation in Gaza, website moderators have been forced to censor 95% of comments made by French users.

Webmaster's Commentary: 

This tells us two things. First, public sentiment is running twenty to one against Israel. Two, Israel's supporters are openly suppressing freedom of speech.

Jul 26 11:15

Programmer Develops Twitter Bot to Troll Climate Change Deniers

Leck's bot, @AI_AGW, doesn't just respond to arguments directed at Leck himself, it goes out and picks fights. Every five minutes it trawls Twitter for terms and phrases that commonly crop up in Tweets that refute human-caused climate change. It then searches its database of hundreds to find a counter-argument best suited for that tweet—usually a quick statement and a link to a scientific source.

Webmaster's Commentary: 

And when someone comes back with the cite that proves the original report was a fraud, how does the bot respond? Or is actual accuracy not a factor to Leck's propaganda-o-tron?

The fact is that many of the so-called scientific papers supporting the push for a Carbon tax have been discredited, yet the promoters of this hoax still continue to use them to support their agendas. And the bottom line is that ten years ago the Carbonazis were claiming that snowfalls were a thing of the past (UK Independent, March 20, 2000) and following several hard winters in a row (and looks like we are headed into another one) are now claiming their scientific papers "prove" that a warming Earth causes more ice and snow, or that the global warming heat is "hiding" at the bottom of the ocean , which proves the authors of these scientific papers do not understand the basic principle of convection.

There is one good point to this story. Now that people know about Leck's propaganda-o-tron, they will not be fooled into thinking that the flood of social media supporting Al Gore and his carbon exchanges represents the honest view of their fellow citizens, but is just an automated bot trying to hijack the discussion.

Jul 26 09:30

‘Google must not be left to censor history’ – Wikipedia founder

The power to “censor history” should not be left in Google’s hands, Wikipedia Founder Jimmy Wales warned, after the search engine giant revealed it had approved over 90,000 so-called ‘right to be forgotten’ requests.

Wales said a European Court ruling allowing people to have links scrubbed from the search engine's index was "open-ended." He further slammed the law for being unclear.

“The law as it stands right now is quite confusing. We have this one ruling of the ECJ (European Court of Justice) which is very open-ended and very hard to interpret,” he told BBC Radio 4's Today program.

In May, the ECJ said links to irrelevant and outdated data should be erased from searches on request, sparking fears that news stories and other public information could be concealed from public view.

Jul 25 11:03

A rash of anti-Almond Milk articles flushes the liberal blog-o-sphere. Why?

It was only one month ago that the first anti-almond milk article appeared in U.S. News and World report which sparked the 'debate' online. The article received thousands of shares and swept across the internet at alarming speed.

So would it strike you as interesting if I told you that this 'source' article was written by Dietician Tamara Duker Freuman and that some deeper research into Ms. Freuman shows that she just so happens to be a paid 'Media spokesman' and consultant [PDF] with the Dairy industry? Or perhaps, when all the highly-subsidized overabundance of milk in U.S. public schools was being criticized, it was the same Ms. Freuman who not only came to Dairy's defense but actually advocated sugar-laden chocolate milk as a 'good thing' in schools?

Mrs. Duke remains on the payroll of Redwood hill Farms, which sells milks, cheeses, lactose-free creams, etc. and is headed by a woman by the name of Jennifer Lynn Bice.

Jul 25 09:32

US Social Security 'wasted $300 million on an IT BOONDOGGLE'

Members of the US Congress are demanding answers from the Social Security Administration (SSA) over an ongoing IT project that has racked up a $288m bill without deploying a field-ready product.

A trio of representatives from the House Oversight Committee said in a letter to the SSA that they had "serious problems" with the way it has handled a planned overhaul of the Disability Case Processing System (DCPS), which has been ongoing for six years.

The DCPS is considered to be a central part of the SSA and has long been due for an overhaul to replace aging technology in the system. In 2010 the administration commissioned an update project, contracting Lockheed Martin to build the system with a delivery date for 2015.

Jul 25 06:42

European Central Bank hacked, personal data stolen

Hackers have stolen personal information from the European Central Bank (ECB) in what seems to be a blackmail scheme. The stolen data includes email addresses and contact information taken from the organization's database.

“There had been a breach of the security protecting a database serving its public website,” ECB said in astatement on Thursday. “This led to the theft of email addresses and other contact data left by people registering for events at the ECB.”

Around 20,000 email addresses were stolen, according to media reports.

The hacked database serves the public website and gathers registrations for conferences and other visits. It is “physically separate from any internal ECB systems.”

Webmaster's Commentary: 

And the NSA can't find these guys either!

Jul 24 09:40

Microsoft will merge separate versions of Windows into one unified operating system

Microsoft CEO Satya Nadella has confirmed that his company will amalgamate all major versions of Windows into one operating system. Speaking on the company's quarterly earnings call today, Nadella told analysts Microsoft will "streamline the next version of Windows from three operating systems into one single converged operating system." Describing the implications of the change, Nadella said "this means one operating system that covers all screen sizes."

Webmaster's Commentary: 

This was the long range goal of Microsoft when they started Windows 8. They had to break it up on a platform basis just to get it out the door, but it was always understood that Microsoft wanted a single OS for all platforms to save development costs, no matter how inappropriate and wasteful it is for the end user.

Jul 23 12:22

White House Website Includes Unique Non-Cookie Tracker, Conflicts With Privacy Policy

While YouPorn quickly removed AddThis after the report was published, the White House website still contains AddThis code. Some White House pages obviously include the AddThis button, such as the White House Blog, and a link to the AddThis privacy policy.

Other pages, like the White House’s own Privacy Policy, load javascript from AddThis, but do not otherwise indicate that AddThis is present. To pick the most ironic example, if you go to the page for the White House policy for third-party cookies, it loads the “addthis_widget.js.” This script, in turn, references “core143.js,” which has a “canvas” function and the tell-tale “Cwm fjordbank glyphs vext quiz” phrase.

Jul 23 08:51

Apple engineered surveillance back door into 600 million iPhones

A highly skilled hacker who presented at the recent Hackers On Planet Earth (HOPE/X) conference in New York has dropped a massive bomb on the state of smartphone privacy. Jonathan Zdziarski, an active member in the iPhone development community who helped work on many early iOS "jailbreak" iterations, says Apple has deliberately engineered back door surveillance systems into the iPhone, allowing both the company and the government easy access to users' personal data.

Webmaster's Commentary: 

Ooooh, big shockeroonie that one!

NSA has back-doored EVERY SINGLE PIECE OF COMPUTER EQUIPMENT OUT THERE!

Once they start adding back doors, there is no way they would ever allow any one platform to remain private out of concern that this would be the platform of choice for people wishing to remain private.

Yes, it is a fine accomplishment that NerveGas found and identified the back-door and con firmed once again what we already knew abut a government violating the Bill of Rights and large corporations going along with this crime. And maybe this will shake up those few remaining Americans still desperately clinging to an image of benevolent and respectful government, but for those of us who have been watching the invasion of our privacy since the days of ECHELON, this comes as no surprise.

As we proved with our year-long series of NSA code challenges, real criminals and terrorists (not to mention foreign governments) can create encryption systems the NSA cannot break. So this massive spy system is all about keeping watch on YOU, the law-abiding American citizen, to make sure you are not thinking those double-plus ungood thoughts, to steal your business secrets, and to watch your wives and daughters walk around naked in front of their webcams!

That the smart phones are all compromised has been known all along and led to privacy products such as Privacy Case.



Click for larger image

Jul 23 08:50

PrivacyCase - The Original Privacy Case For Your Cell Phone.

Stories of cell phone spying, tracking, stalking, and eavesdropping fill the airwaves and the internet, leaving users of these devices increasingly concerned about the security of their confidential data, geo-location (GPS), and voice communications. Criminals can compromise your phone even when you think your phone is turned off by utilizing back doors originally built into your wireless devices for law enforcement use.

Until now, there was no reliable method to defend against these intrusions. The "PrivacyCase” stops them immediately by allowing you to control when and where your device is accessed. Our electronically shielded protective case was designed to provide users of wireless devices with a method to counteract the attempted hijacking of communications data & geo-location transmissions while preventing the device from being used to eavesdrop on the activities of the user.

Jul 22 09:34

5 Terrifying Smartphone Hacks You Won't Believe Are Possible

If you work a desk job, chances are you keep your smartphone handy on your desk while you're working. And why not? If you get a call, it's hard to pull your phone out of your pocket with your butt custom molded and sweat glued to your chair. The whole point of a mobile phone is convenience, so there's really no reason not to keep it right there by the keyboard.

Webmaster's Commentary: 

Let's not give the NSA any more ideas, shall we?

Jul 22 09:19

Dirty Dealing Harry Reid

Rather than write an article on this, I thought I would just post an email I received this morning. Harry Reid is up to his usual tricks. You remember him. He's the one who owns land close to the public land that Cliven Bundy was running his cattle on. Reid, with his son working with the Chinese, was hoping to make a fortune over selling land to them. Our land, by the way. Federal property does not belong to these crooks in D.C. but to all Americans.

Now he's trying to ram through legislation that would allow for taxing activity on the Internet. This is only the camels nose in the tent. Once it starts, where does it stop? Let's fight to keep our Internet free. It seems that these politicians are desperate for more money. More taxation without representation.

Webmaster's Commentary: 

It isn't just the money. They can write the internet taxes in a way where large corporations survive by passing the tax along to their users while small independent media websites (like this one) are forced out of business.

Jul 21 08:51

Typewriter manufacturers see boom in sales

German typewriter manufacturers are enjoying a boom in sales following the NSA spying scandal. A German defence manufacturer switched to typewriters last year, while last week a leading politician called for the government to use the old technology.

Jul 20 17:49

Exclusive: High-Level NSA Whistleblower Says Blackmail Is a Huge – Unreported – Part of Mass Surveillance

It is well-documented that governments use information to blackmail and control people.

Jul 20 08:44

One Of The NSA's Original Whistleblowers Says The Goal Is 'Total Population Control'

William Binney is one of the highest-level whistleblowers to ever emerge from the NSA. He was a leading code-breaker against the Soviet Union during the Cold War but resigned soon after September 11, disgusted by Washington’s move towards mass surveillance.

On 5 July he spoke at a conference in London organized by the Centre for Investigative Journalism and revealed the extent of the surveillance programs unleashed by the Bush and Obama administrations.

“At least 80% of fibre-optic cables globally go via the US”, Binney said. “This is no accident and allows the US to view all communication coming in. At least 80% of all audio calls, not just metadata, are recorded and stored in the US. The NSA lies about what it stores.”

Jul 17 12:47

Snowden: NSA Employees Routinely Pass Around Nude Photos Obtained Via Mass Surveillance

Snowden …. Made a startling claim that a culture exists within the NSA in which, during surveillance, nude photographs picked up of people in “sexually compromising” situations are routinely passed around.

Jul 17 07:10

Microsoft announces biggest layoff in history, cutting 18,000 jobs

Microsoft will cut a record 18,000 jobs next year, as the company’s new CEO Satya Nadella seeks to boost efficiency, according to a company memo on Thursday.

“The first step to building the right organization for our ambitions is to realign our workforce. With this in mind, we will begin to reduce the size of our overall workforce by up to 18,000 jobs in the next year,” Satya Nadella said in the memo published by Business Insider.

The number made redundant represents 14 percent of the entire Microsoft workforce.

Webmaster's Commentary: 

Microsoft made two big mistakes.

Mistake Number 1: Windows-8. Microsoft has become an arrogant corporation that thinks they should decide for the entire world how things work. A good example of that is the browser wars where Microsoft arbitrarily discarded much of the original HTML standards in Internet Explorer, counting on their market share to force everyone to adopt the Microsoft standard (from which Microsoft would collect license fees). As a web developer myself, I can attest to the fact that this doubles the work load of everyone writing pages as one has to create two blocks of code to embed media, one for Microsoft and one for everyone else. Microsoft didn't care. They were going to tell the world what to do and the world would pay Microsoft for the "favor." That it was less efficient and made web pages less efficient was irrelevant.

That same arrogance carried over into the tile interface on Windows-8 where Microsoft decided to abandon the window and desktop paradigm that has been an industry standard going all the way back to Xerox PARC (where Steve Jobs got the idea to use it for the MAC) and force everyone onto the tile interface with the idea that all computational devices from desktop down to cell phone would eventually use it, with Microsoft again collecting license fees. That it was less efficient and made the products harder to use was irrelevant. But the tile interface cratered in the customers' eyes and today on eBay you can find brand new tablets with the Win8 interface selling at 50% off. Microsoft forget the age-old adage, "The customer is always right!" They didn't want to sell us what we wanted. They wanted to sell us what they decided we should have. Their habit of releasing products and making the end user find and report the bugs to save them having to pay for better quality control did not help, nor did forcing everyone to buy new operating systems and updated applications every 5 years.

The second big mistake Microsoft made was to get into bed with the NSA. While Microsoft is hardly alone in that crime, Microsoft took the brunt of the hostile public backlash going back to Windows NT when a beta release that still contained the symbol tables that revealed NSA-KEY to the world.

Computer users were left with the impression that Microsoft was selling computer operating systems far less concerned with the productivity of the consumer than with spying for the US Government, and protecting the copyrights of media producers too quick to blame piracy for the poor sales of their declining offerings.

And now Microsoft is paying the price.

I have no sympathy for them. They did it to themselves. Personally I think it is time for Microsoft to go away and make room for new software companies that have a healthier respect for the customer and for the Bill of Rights. This latest sign of the decline of the great God of Redmond may signal a push towards Linux and open-source software, which probably explains why the IRS was targeting open-source organizations right alongside the Tea Party and political dissidents, to protect software corporations from the "threat" of people wanting to go back to writing their own bug-free and spy-free software.

Jul 16 09:50

Overwhelmed FCC Extends Deadline For Commenting On Net Neutrality

Today was supposed to be the deadline for filing comments with the FCC about its pending net neutrality proposal. But the Commission has just announced that, due to a surge in responses that is once again overwhelming its commenting system, the deadline has been extended to Friday.

“[W]e have seen an overwhelming surge in traffic on our website that is making it difficult for many people to file comments through our Electronic Comment
Filing System,” writes the FCC press secretary, who explains that the Commission “is committed to making sure that everyone trying to submit comments will have their views entered into the record.”

Thus, the deadline has been extended until midnight (presumably ET) Friday, July 18.

Webmaster's Commentary: 

"At which point the FCC will carefully tabulate all the comments, discard the results, and do what they have been told to do all along." -- Official White Horse Souse

Jul 16 07:40

Israel student union sets up “war room” to sell Gaza massacre on Facebook

As the death toll from Israel’s savage bombardment of Gaza continues to climb, Israel has once again turned to students to sell the slaughter online.

“Although they haven’t been called up to the army yet, they’ve decided to enlist in a civilian mission that is no less important – Israeli propaganda [hasbara],” Ynet’s Hebrew edition reported about a massive initiative organized by the Israeli student union branch at the Interdisciplinary Center Herzliya (IDC Herzliya), a prestigious private university.

Webmaster's Commentary: 


This seems like a good time to remind everyone reading the comments that the government of Israel pays people to post pro-Israel propaganda in social media.

Here are some stories about it.

Israel’s Government Is Paying College Students to Spread Pro-Israel Propaganda on Social MediaBack in August of last year, a statement from Israeli Prime Minister Benjamin Netanyahu’s office announced that the Israeli government would be giving scholarships to college students who, “engage international audiences online” by posting pro-Israel tweets/statuses etc. online. tinyurl.com/ldpczhw

Israel To Pay Students For Pro-Israeli Social Media Propaganda Israel has announced it will pay university students to circulate pro-Israeli information on social media networks, without having to identify themselves as working for the government. tinyurl.com/pwuzmrg

Israel to pay students to defend it onlineIsrael is looking to hire university students to post pro-Israel messages on social media networks — without needing to identify themselves as government-linked, officials said Wednesday.

The Israeli prime minister's office said in a statement that students on Israeli university campuses would receive full or partial scholarships to combat anti-Semitism and calls to boycott Israel online. It said students' messages would parallel statements by government officials. tinyurl.com/qh8jbe9

Students offered grants if they tweet pro-Israeli propaganda

In a campaign to improve its image abroad, the Israeli government plans to provide scholarships to hundreds of students at its seven universities in exchange for their making pro-Israel Facebook posts and tweets to foreign audiences.

The students making the posts will not reveal online that they are funded by the Israeli government, according to correspondence about the plan revealed in the Haaretz newspaper. tinyurl.com/o6d82wj

Israel Paying Students (30 pieces of silver?) to be Apologists for Israel

There are tons of rabid apologists lurking all about the social media

platforms ready to do Israel’s bidding while the IDF commits one crime against humanity after another in Gaza. Go ahead and Tweet something honest about what is going on and you’ll see what I mean. I wondered what motivated them, in the face of the undeniable, to continue their efforts to defend the indefensible. I should have known. I should have remembered. It’s money. It’s always been money. College students are being paid to be online apologists for the barbaric inhuman policies of Israel and the IDF. The more lies they post about glorious Israel, the higher up the corporate-styled ladder they climb, looking to achieve the ultimate goal… a free ride in college… proving once again: it’s never too early to sell-out. tinyurl.com/p2qxnn7