COMPUTERS/INTERNET/SECURITY | WHAT REALLY HAPPENED


COMPUTERS/INTERNET/SECURITY

Dec 22 15:16

North Korea goes completely offline: Report

North Korea is having major Internet problems, just days after President Barack Obama promised a proportional response to the devastating hacks against Sony.

Dec 22 13:17

North Korea's internet is offline; massive DDOS attack presumed

North Korea’s addresses are managed by Star Joint Venture, the state-run Internet provider, which routes many of those connections through China Unicom, China’s state-owned telecommunications company.?

North Korea’s already tenuous links to the Internet went completely dark on Monday after days of instability, in what Internet monitors described as one of the worst North Korean network failures in years.

The loss of service came just days after President Obama pledged that the United States would launch a “proportional response” to the recent attacks on Sony Pictures, which government officials have linked to North Korea. While an attack on North Korea’s networks was suspected, there was no definitive evidence of it.

Webmaster's Commentary: 

So now when the US takes down the power grid, they will claim this is North Korea's "retaliation" for the DDOS attack.

Dec 22 09:02

How Obama Took Sony’s Crisis From Bad to Worse

But as much as Sony seemed to mishandle its sorry situation in recent days, the severity of the circumstances Sony faced are so extreme that it begs the question of whether anyone could have handled it better. Every step of the way Sony has been faced with no-win situations and just plain bad luck.

Just when things couldn’t have looked any worse for the studio, President Obama turned sharply critical of Sony in a news conference Friday, second-guessing its decision to withdraw “The Interview” from theaters.

Dec 22 08:37

The FBI told their story about North Korea attacking Sony. Before we retaliate, read what they didn’t tell you.

The government blames North Korea of the Axis of Evil for the attack on Sony, a claim quite like the bogus claims of the past we so credulously believed. No matter how often they lie to us, Americans believe what the government tells us. They lie, we believe, their lies are exposed — rinse, repeat. It makes us easy to govern, incapable of self-government, and quite different than our skeptical unruly forebearers. We can do better. This is a great day to begin. Read this and decide for yourself. This is the most complete collection of information I’ve found on this story.

Dec 22 08:09

Hacking Collective Anonymous Says FBI Is Lying, “North Korea Is Not Source Of Hack”

Having confirmed unequivocally, in a statement by the FBI and reiterated by President Obama, that “the North Korean government is responsible” for hacking Sony, it appears the YouTube-less ‘evidence’ the FBI provided is being questioned by the hacking-collective ‘Anonymous’ and former Lulzsec hacker Sabu. As The Daily Beast reports, the hackers blasted, the North Koreans “don’t have the technical capabilities,” and added “we all know the hacks didn’t come from North Korea, and “all of the evidence FBI cites would be trivial things to do if a hacker was trying to misdirect attention to DPRK.” Meanwhile, on Saturday afternoon, Guardians of Peace, the hacking group that’s so far claimed responsibility for wreaking havoc on Sony, posted a message online mocking the FBI’s investigation – a series of gyrating animated bodies shrieking, “You are an idiot!”

Webmaster's Commentary: 

GREAT MOMENTS IN THE HISTORY OF THE FBI.

"[Your information is] too precise, too complete to be believed. The questionnaire plus the other information you brought spell out in detail exactly where, when, how, and by whom we are to be attacked. If anything, it sounds like a trap."

FBI response to the top British spy, Dusko Popov (code named "Tricycle") on August 10, 1941, dismissing Popov's report of the complete Japanese plan for the attack on Pearl Harbor.

Pearl Harbor: The Verdict Of History by Gordon Prange, appendix 7 published in 1986. Based on records from the JOINT CONGRESSIONAL COMMITTEE on the Investigation of the Pearl Harbor Attack, Nov 15, 1945 to May 31, 1946.

Dec 22 08:03

Staples data breach exposes 1.16mn cards in 115 stores

The world’s largest office supply retailer Staples has revealed that up to 1.16 million of its clients’ payment cards might have been “affected” by a massive malware attack on the company’s point-of-sales systems.

“Staples’ data security experts detected that criminals deployed malware to some point-of-sale systems at 115 of its more than 1,400 US retail stores,” the company said in a press release.

Webmaster's Commentary: 

And the NSA couldn't find these guys, either!

Dec 22 07:24

N. Korea threatens US, demands apology for Obama’s ‘reckless rumors’ of Sony hack

N. Korea has demanded an apology from the US for “recklessly” circulating an unsubstantiated rumor about Pyongyang’s culpability in the recent Sony hack, warning the “proportional” response promised by Obama will be met with the “toughest counteraction.”

Dec 22 07:14

Why Canada's Internet Keeps Getting More Expensive

A Canadian reddit poster claiming to be a Shaw employee—one of Canada’s premier telcos—with news about new internet rates created a stir online this week by posting what looked like advance details of upcoming rate plans.

The rate plans appeared to change the pricing schemes so that new customers would pay equal money for slower service. Existing customers, whose rates will be going up anyway, would be grandfathered on their old plans—with updated prices showing an obvious path for upsell to the new rate tiers.

Webmaster's Commentary: 

Selling you less for more; that's the new western business model!

Dec 21 08:51

no evidence for sony hack!!!

Dec 21 08:28

Cyberattack on German steel mill inflicts serious damage

Unknown hackers have inflicted ‘serious damage’ to a German steel mill this year by breaking into internal networks and accessing the main controls of the factory, the German Federal Office for Information Security (BSI) revealed in its annual report.

The report says that the intrusion into the mainframe system caused significant damage to a blast furnace as the attackers managed to manipulate the internal systems and industrial components, causing outages that disrupted the controlled manner of operation.

Webmaster's Commentary: 

"Trust me, it's those North Korean, IRANIAN, Chinese, and Russian hackers (did I miss anyone) at work again!" -- Official White Horse Souse

Dec 21 08:10

Obama: North Korea’s attack ‘cybervandalism,’ not an ‘act of war’

President Obama said Sunday he does not consider North Korea’s attack on Sony Pictures to be an “act of war,” instead calling it an example of “cybervandalism” that must be met with a proportional response from the U.S. government.

Webmaster's Commentary: 

"Of course, if those gosh darn North Koreans (with help from Russia, China, and Iran) do something worse, like shut down the non-commercial internet or black out a few cities, that is another kettle of kimchee altogether!" -- Official White Horse Souse

Dec 20 15:45

North Korea Says They're Being Framed for Sony Cyber Attack

Guardians of Peace, the hacker group that previously took credit for the Sony cyber attack, mocked the FBI and their investigation that determined North Korea was "centrally involved" in the Sony hack. "The result of investigation by FBI is so excellent that you might have seen what we were doing with your own eye," the Guardians of Peace wrote in a statement posted on the file-sharing site Pastebin (via CNN). "We congratulate you success. FBI is the BEST in the world. You will find the gift for FBI at the following address. Enjoy." The hackers also included a link to a YouTube video titled "you are an idiot!"

Dec 20 08:01

ZeuS variant strikes 150 banks worldwide

Kaspersky has discovered a fresh ZeuS malware strain which has targeted financial institutions worldwide.

The company says the banking trojan's latest form has targeted a total of 150 different banks and 20 payment systems worldwide; focusing on the infiltration of online banking. In total, 15 countries have been attacked, including the United Kingdom, United States, Spain, Russia, Japan and Italy.

Webmaster's Commentary: 

It's North Korea ... and ... Iran. Yeah; that's it Iran. Iran did it. And also China. And Russia. And Venezuela. And all those guys we need to bomb." -- Official White Horse Souse

Dec 20 07:37

MEGA BEX ALERT - FOX News: Evidence in Sony hack attack suggests possible involvement by Iran, China or Russia, intel source says

The U.S. investigation into the recent hacking attack at Sony Pictures Entertainment has turned up evidence that does not point to North Korea as the "sole entity" in the case, but rather, raises the possibility that Iran, China or Russia may have been involved, an intelligence source told Fox News on Thursday.

Webmaster's Commentary: 

Dec 20 07:23

Sony hack: China may have helped North Korea, US states

US official states that North Korea responsible for hacking of Sony over The Interview film – and that Kim Jong-un's regime may have had Chinese help

Webmaster's Commentary: 

So, according to US Officials and FOX News, North Korea, China, Russia, Iran, (and everyone else the US needs an excuse to invade) secretly create the most potent cyber-army in the world, then expose the existence of that cyber-army with a pointless attack on a movie studio?

And if you believe THAT one, I have some of Saddam's nuclear weapons to sell you!

Dec 20 07:20

After Sony hack, is U.S. grid next?

Now that U.S. intelligence has blamed North Korea for the Nov. 24 cyber attack on Sony Pictures, there is growing concern that the Hermit Kingdom has the capability of bringing down the vulnerable U.S. national grid system.
Read more at http://www.wnd.com/2014/12/after-sony-hack-is-u-s-grid-next/#uM8SW1GrR...

Webmaster's Commentary: 

Yep; looks like the US is going to pull a 9-11 false-flag to get their wars going again!

This would be a good time for all the "white hat" hackers, who insist they use their powers only for good, to walk their talk and nail the real perpetrators of this war-starting hoax!

Dec 20 07:18

North Korea says did not hack Sony, wants joint probe with U.S.

North Korea said U.S. accusations that it was involved in a cyberattack on Sony Pictures were "groundless slander" and that it was wanted a joint investigation into the incident with the United States.

An unnamed spokesman of the North's foreign ministry said there would be "grave consequences" if Washington refused to agree to the joint probe and continued to accuse Pyongyang, the official KCNA news agency reported on Saturday.

On Friday, President Barack Obama blamed North Korea for the devastating cyberattack, which led to the Hollywood studio cancelling "The Interview", a comedy on the fictional assassination of North Korean leader Kim Jong Un.

Dec 19 16:20

Movie industry's evil plan to destroy the internet is going precisely nowhere

As well as finding out that Jennifer Lawrence earns less than her male counterparts, Hollywood studio execs are self-important a-holes and Sony Pictures has a password policy that a baby could break ... it turns out movie giants are also seeking to DESTROY THE INTERNET with a ten-page legal memo.

The memo [PDF], written by outside law firm Jenner & Block in August this year, looks into whether ISPs can be pressured into removing links to pirate content by using the legal language around telecommunications.

Dec 19 15:19

Blaming Iran for the Sony Hack

Dec 19 15:16

FLASHBACK - Federal Government Hires Internet TROLLS to Monitor and "Correct" Online Discussions

This subject is of big interest to me and I am happy to see other websites picking up the concerns and expressing them publicly. I have crossed paths with these undercover agents many times, on various websites and forums, and a I can tell you from my first hand experience that they are extremely effective.

They are usually intelligent and well informed people, and a couple of them operating on each section of a forum, are enough to kill a subject of major interest almost immediately.

Dec 19 14:01

North Korea denies involvement in Sony cyber attack

North Korea's UN mission on Friday denied involvement in a cyber attack on Sony Pictures after the US FBI said it had evidence that Pyongyang was behind the hacking.

"Our country has no relation with the hacker," North Korean political counsellor Kim Song told AFP.

"There is no relation. This is not worth a comment."

Dec 19 10:18

Think North Korea hacked Sony? Think about this

Unlike any hack attributed to North Korea in the past

North Korea has been blamed for a string of hacks in the past, and it’s generally accepted that the country has the capability to hack and attack companies. But no previous attack attributed to North Korea—or any nation-state—has been so public and so noisy. In the past, attacks happened, North Korea was suspected, and then sometimes the country was later blamed. It rarely said anything, except for an initial denial. This time around, the hacker group has posted messages online taunting Sony and telling the FBI they cannot be caught. Early on, they were also interacting with reporters.

Dec 19 08:54

Sony Hack: What They're Not Telling You

Webmaster's Commentary: 

The evidence indicates the SONY hack was done by disgruntled ex-employees of SONY itself. Yet the White House has hastily put together a frame-up of North Korea, and unlike the Benghazi attack, the movie that is supposed to be the root cause of it all actually does exist.

So what is going on?

One possibility is that SONY will reverse its decision (under covert pressure from the White House) and go ahead with the Christmas Day release of "The Interview." This will be followed by multiple bombings of movie theaters across America. Just like 9-11, this will be "justification" for war against the "attacker", which we are being assured is North Korea. War with North Korea opens the door to war with China and through China, Russia, all to protect the paper dollar from the Ruble and the Yuan. Millions will die and the world will go back to being enslaved to the private central bankers for another hundred years.

Dec 19 08:12

William Binney: The NSA’s Ultimate Goal is Total Population Control

“At least 80% of fibre-optic cables globally go via the US,” Binney said. “This is no accident and allows the US to view all communication coming in. At least 80% of all audio calls, not just metadata, are recorded and stored in the US. The NSA lies about what it stores.”

“The ultimate goal of the NSA is total population control,” said Binney, who believes the government is fighting for a future where surveillance is ubiquitous and government intrusion unlimited.

Dec 18 12:22

Google faces €15m fines over privacy breaches in Netherlands

The search giant has been ordered to change the way it collects data from users that is then used to target advertising, or face a significant fine.

Dec 18 11:20

ZIONISTS ARE FRAMING NORTH KOREA!

Those "unnamed sources" (Mossad, cough-cough) are at it again. This time they have solved the mystery of the hacked Hollywood E-mails and anonymous threats that Jewish Hollywood is all abuzz about. It was the North Koreans, these slimy sleuths assure us. As usual, Sulzberger's Slimes has accepted the baseless accusation at face value and gone full front-page retard with the bogus claims and threats.

Dec 18 09:05

The US Is Ready To Blame North Korea For The Sony Hack

The US government now reportedly believes that North Korea is directly to blame for the devastating and unprecedented attack on Sony, The New York Times reports.

The massive Sony data hack is likely retaliation for the controversial comedy "The Interview," which depicts the assassination of North Korean dictator Kim Jong Un.

US investigators have now parsed through enough evidence to claim that North Korea is "centrally involved."

Dec 18 08:32

NSA Firefoxed: Mozilla team-up with Tor to improve internet privacy

The internet browser Mozilla is teaming up with Tor to give internet users greater security online. The new Polaris project is designed to combat internet censorship and make NSA like intrusion’s a thing of the past.

Edward Snowden’s revelations concerning the extent of the National Security Agency’s spying on the general public, hit computer and internet enthusiasts hard. A poll conducted by Harris Poll on behalf of the internet company Mozilla last month, found that three quarters of those surveyed feel that their personal information on the web is less secure than it was one year ago.

Webmaster's Commentary: 

The comment in the article about the NSA not being able to find a TOR users identity is not entirely accurate. Recently it has come to light that if a user has the flash player installed on their computer, malicious code inside a flash object can detect the source IP of the request despite the onion network, which is why the current implementation of TOR recommends users not have the flash player installed. However I think that Mozilla and TOR will close that exploit (if they have not already done so).

As a general rule, everyone ought to be using anonymity tools and strong encryption, even if you do not really have anything to hide, to jam the NSA with added workload and confuse them as to who they should be looking at. For your local data protection or small-group communications, I strongly recommend investing the time to develop your own encryption methods using the code snippets in the NSA Challenge page as examples.

Dec 18 08:21

NSA and EFF to square off in court over internet surveillance

A digital rights group in the United States plans to argue in federal court this week that the National Security Agency’s internet surveillance operations violate the US Constitution’s ban against unlawful searches and seizures.

Six years after the Electronic Frontier Foundation brought suit against the NSA on behalf of a former AT&T customer, Carolyn Jewel, US District Court Judge Jeffrey White for the Northern District of California will hear an EFF attorney argue on Friday for summary judgment and attest that the intelligence agency’s data collection methods breach the Constitution’s Fourth Amendment clauses intended to protect private information.

Dec 18 07:22

You Won't believe What Facebook is Doing & You Could Be Their Next Target! Exclusive Victims Report

Dec 17 16:43

U.S. Links North Korea to Sony Hacking

American intelligence officials have concluded that the North Korean government was “centrally involved” in the recent attacks on Sony Pictures’s computers, a determination reached just as Sony on Wednesday canceled its release of the comedy, which is based on a plot to assassinate Kim Jong-un, the North Korean leader.

Senior administration officials, who would not speak on the record about the intelligence findings, said the White House was still debating whether to publicly accuse North Korea of what amounts to a cyberterrorism campaign. Sony’s decision to cancel release of “The Interview” amounted to a capitulation to the threats sent out by hackers this week that they would launch attacks, perhaps on theaters themselves, if the movie was released.

Dec 17 09:45

Delta Airlines Security Flaw Allows You To Use Another’s Boarding Pass

Delta Airlines intends to remain ahead of the competition when it comes to being on the cutting edge of technology, but even the best of intentions can result in an mistake or a flaw being discovered. Case in point, Delta Airlines’ glitch would allow you to actually access someone else’s boarding pass – without them being aware of it.

Dec 17 07:59

Online news sites to be blacked out during next major catastrophic event?

According to what I'm hearing from several sources in my network of contacts, the U.S. government is putting systems in place to black out online news sites like Natural News, Drudge Report, The Blaze and many others. A practice run that took place earlier this week in California has already achieved this result and confirmed the technical ability to make it happen at will.

Webmaster's Commentary: 
Dec 17 07:35

The FBI Used the Web’s Favorite Hacking Tool to Unmask Tor Users

For more than a decade, a powerful app called Metasploit has been the most important tool in the hacking world: An open-source Swiss Army knife of hacks that puts the latest exploits in the hands of anyone who’s interested, from random criminals to the thousands of security professionals who rely on the app to scour client networks for holes.

Now Metasploit has a new and surprising fan: the FBI. WIRED has learned that FBI agents relied on Flash code from an abandoned Metasploit side project called the “Decloaking Engine” to stage its first known effort to successfully identify a multitude of suspects hiding behind the Tor anonymity network.

Dec 17 07:03

Sony hit with class action suit over hacked employee info

On Monday, attorneys representing two former Sony workers filed paperwork in United States District Court for the Central District of California asking that a jury be assembled to weigh in on what could become a class action lawsuit between upwards of 15,000 current and past employees and the major motion picture company over the massive security breach suffered earlier this month.

According to the class action complaint, Sony should have been better prepared to protect against the hackers who recently pilfered troves of company data, especially in light of similar lapses suffered by the company in years past.

Dec 17 06:22

VIRTUAL 9-11: Will the US & Israel Hack The US Banking System Computers and Falsely Blame It On Iran (or Syria or Russia or China)?

Such a cyber false-flag also gives the US Government the excuse to take total control of the internet so that those pesky truth-seeking bloggers don't give the slaves uppity ideas that this is just another war-starting hoax like the attack on the USS Liberty or 9-11 or the Boston bombing.

Webmaster's Commentary: 

Reposted in light of the claim that the SONY Hackers are planning to bomb movie theaters now.

Optional Banner: 
WRH Exclusive
Dec 16 08:46

2014: The year Microsoft lost my loyalty

From productivity to email to operating systems to mobile to hardware, David Gewirtz is no longer actively using Microsoft products. He's not a Microsoft hater. The transition just happened organically as he adopted products that better served his needs.

Dec 16 07:52

Government Prosecutors Fear Liberty and Jury Nullification

I thought you’d be interested to know that the government has asked the judge to limit the defense by not allowing any of Ross’ political or philosophical beliefs to be introduced to the jury as they might influence the jury in his favor. The prosecution goes so far as to say that they fear that exposing the jury to his political thought could invite a jury nullification verdict.

The government obviously doesn’t want this trial to become about internet freedom, the drug war, or liberty. But these crucial issues are on trial along with Ross. This trial is poised to be the most important of 2015 in the fight for freedom. Obviously the government thinks so. They are doing their best to smear Ross and obstruct his defense.

I’m attaching an excerpt (bolds and highlights mine) from the prosecution’s motions illustrating what I’m saying. If you want the original document, just let me know.

This outrage needs to become known, so please spread the word!

Dec 16 07:37

Microsoft update blunders going out of control

This isn't the first time I've brought this up. In Summer of last year Microsoft had buggy Patch Tuesday updates three months in a row. There had been others that year, some of which crippled systems.

Dec 15 13:57

Amazon, HP, eBay join Microsoft bandwagon in warrant case

As extensively telegraphed by Microsoft, the company’s cast of supporters in its legal fight over a warrant seeking a customer’s emails just got a whole lot bigger.

Microsoft was joined by Amazon.com as well as Silicon Valley stalwarts Hewlett-Packard and eBay. Apple, AT&T, Cisco and Verizion, which all supported Microsoft in its lower court case, also weighed in again.

Google, a leader in the cloud-computing realm along with Microsoft and Amazon.com, was among the notable technology companies that haven’t weighed in.

Dec 15 12:19

Eric Schmidt: To Avoid NSA Spying, Keep Your Data In Google's Services

Google Chairman Eric Schmidt told a conference on surveillance at the Cato Institute that Edward Snowden's revelations on NSA spying shocked the company's engineers — who then immediately started working on making the company's servers and services more secure. Now, after a year and a half of work, Schmidt says that Google's services are the safest place to store your sensitive data.

Webmaster's Commentary: 

And if you believe THAT one, I have some of Saddam's nuclear weapons to sell you!

Dec 15 10:20

Microsoft update blunders going out of control

We have had an absolute deluge of problem updates from Redmond recently and some have been serious. What's up at Microsoft?

Webmaster's Commentary: 

What is going on is that Windows has become a bloated nightmare and as the economy shrinks, Microsoft has lost the ability to effectively maintain it all. This problem is hardly confined to Microsoft, and indeed Rome fell when it could no longer maintain the infrastructure it had built such as the roads and aqueducts.

Dec 15 08:33

Sony Attorney David Boies Threatens Media Over Hack Stories

Sony Pictures Entertainment lawyer David Boies sent a letter to news organizations Sunday, cautioning them against using information that hackers have leaked about the studio.

In the letter, first reported by The New York Times, Boies referred to leaked Sony documents as "stolen information" and demanded that the files be ignored, or destroyed if they had already been downloaded.

"We are writing to ensure that you are aware that SPE does not consent to your possession, review copying, dissemination, publication, uploading, downloading or making any use of the stolen information, and to request your cooperation in destroying the stolen information," the letter reads.

Dec 15 07:57

Hackers promise “Christmas present” Sony Pictures won’t like

This weekend, the “Guardians of Peace”—the cyber-attackers who brought Sony Pictures Entertainment’s network down in November and have since shared over a terabyte of the company’s internal data—made two more dumps of SPE data to file sharing sites and torrents. The second of the two, on Sunday, was the e-mail box of Sony Pictures Releasing International President Steven O’Dell. And the hackers promised a “Christmas present” soon of even more data if the company does not relent and meet their unspecified demands.

Webmaster's Commentary: 

This hack story is not being reported, it is being promoted! Coupled with the FBI warning that Iranian hackers are about to strike, I expect a virtual 9-11 to happen to justify a government clamp down on the internet!

Dec 15 07:15

How Congress Secretly Just Legitimized Questionable NSA Mass Surveillance Tool

We recently noted that, despite it passing overwhelmingly, Congress quietly deleted a key bit of NSA reform that would have blocked the agency from using backdoors for surveillance. But this week something even more nefarious happened, and it likely would have gone almost entirely unnoticed if Rep. Justin Amash's staffers hadn't caught the details of a new provision quietly slipped into the Intelligence Authorization Act, which effectively "legitimized" the way the NSA conducts most of its mass surveillance.

Dec 15 07:12

The NSA Revelations All in One Chart

This is a plot of the NSA programs revealed in the past year according to whether they are bulk or targeted, and whether the targets of surveillance are foreign or domestic. Most of the programs fall squarely into the agency’s stated mission of foreign surveillance, but some – particularly those that are both domestic and broad-sweeping – are more controversial.

Webmaster's Commentary: 

But the NSA still cannot find who hacked SONY! :)

Dec 15 06:51

Activists launch online initiative against ‘Internet Tax’

A group of Russian citizens has launched a petition seeking to prevent the adoption of a bill that would introduce a universal tax on the internet, collected by rights organizations representing authors of copyrighted films, music and books.

The anonymous authors of the motion claim that the universal tax is against the law as it would force the majority of internet users to pay for content that they never download or use.

Dec 15 06:47

“Net Neutrality”: The Citizens of the Internet Can Defeat the Telecom Mafia

In a claim that must have people laughing out loud, the telecom and broadband providers are fighting net neutrality by claiming that they will raise the rates of consumers! It is hard to believe that even telecom lobbyists, well-paid to mislead Congress and regulators, could make this claim without smirking as cable bills have been rising at four times the rate of inflation without net neutrality.

Dec 14 07:22

Visa, MasterCard sued for blocking donations to WikiLeaks

Lawyers representing the credit card processor used by WikiLeaks are suing Visa and MasterCard in the United States over the 2010 banking blockade that kept the anti-secrecy group from receiving funds.

On Monday this week, American attorneys for Icelandic hosting provider DataCell ehf filed suit in the US District Court for the Eastern District of Virginia in hopes of having a federal judge award the company upwards of $5 million for what it claims was a coordinated attempt between Visa and MasterCard to restrict funding to WikiLeaks after the secret-spilling organization started publishing classified US State Department cables over four years ago.

Dec 14 07:01

Reports reveal UK hacking of Belgian telecoms firm

New reports indicate that a British spy agency has hacked into the computers of Belgian telecoms firm, Belgacom, on a larger scale than previously thought.

Belgian newspaper De Standaard and The Intercept website on Saturday published detailed accounts of how the British surveillance agency, GCHQ, intruded into Belgacom’s networks.

The hacking first came to light in 2013 when Belgium asked Britain to respond to the espionage allegations.

Dec 14 06:48

Ron Paul: Scrap CIA, NSA, Bring Troops Home

Never one to hold back when it comes to corrupt big government agencies, former Congressman Ron Paul said Tuesday that the world would be a much better place if the CIA were completely abolished.

Responding in part to the release of the Summary of the forthcoming Senate report on CIA torture, and also to an impending possible government shutdown, Paul stated “my government shutdown would be something to be proud of.”

“Abolish the NSA, the TSA, the CIA and all spying on American citizens.” Paul urged.

Dec 14 06:44

Russia targeted by another large-scale cyber espionage campaign – Kaspersky Lab

Russian companies in oil, finance, military, and other sectors – as well as the country’s embassies abroad – have become the primary targets of a new espionage campaign, labeled ‘Cloud Atlas’ by global information security powerhouse Kaspersky Lab.

Enterprises in Belarus and Kazakhstan – which are Russia’s partners in the Eurasian Custom Union – are also affected. Another major target of the campaign is India, the Moscow-based company said.

According to Kaspersky Lab, Cloud Atlas infects corporate computers via RTF (Rich Text Format) files attached to emails.

Those behind the campaign have also launched attacks using MMS and SMS messages to infect Android, BlackBerry, and iOS devices.

Dec 13 10:47

GCHQ agents to hunt down child porn in ‘dark net’ – Cameron

A special unit of the British spy agency GCHQ has been tasked with roaming the “dark net” to locate child pornography images and weed out online abusers, according to Britain's Prime Minister David Cameron.

Webmaster's Commentary: 

FINALLY, something useful!

Dec 13 08:28

Sony Hackers Flash Disturbing New Warning on Staffers’ Computers (Exclusive)

This is the fourth known time the #GOP has contacted the studio. The group previously accessed dozens of Sony employee computer screens in late November, displaying a similarly ominous image when staff tried to log in for work. See a screenshot here.

Webmaster's Commentary: 

And the mighty NSA can't do a thing about it! I guess the people at NSA are too busy spying on our wives and daughters through our webcams or stealing our business secrets to actually bother themselves with actual computer criminals, right?

This is how we should respond to every single report of a hack anywhere, by proclaiming it as a total failure of the NSA and by extension the Federal Government.

For myself, this looks like a staged publicity stunt as a prelude for draconian controls over the internet, much like the pornography that flooded the internet (all of it traced back to US Government and military servers) that preceded the debate on the Exon Amendment.

Dec 13 07:31

Digital driver's licenses come with one small (big) problem

Iowa announces it is testing driver's licenses on phones. But what if a police officer asks to take your phone, so that he can check your license in his own vehicle?

Webmaster's Commentary: 

I recall when smart phones like the Treo had a slot for a microSD card. You could keep the pictures of your naked spouse on that and slide it out when you handed the phone to someone else, but for soooooooooooooome reason, that feature is no longer available.

Dec 13 07:28

Net Neutrality Activists Disrupt FCC Meeting

This morning at 10:40am, net neutrality demonstrators interrupted the FCC’s monthly meeting by unfurling a large banner reading “Reclassify Now!” behind the seated FCC commissioners. The activists, both union members, were escorted from the room by security after speaking out and asking FCC Chairman Tom Wheeler why he continues to delay Title II net neutrality, which should have been voted on at today’s meeting.

Dec 12 16:02

Beware viruses hidden in e-cigarette chargers

Whatever the pros and cons of smoking e-cigarettes, they have undoubtedly been a big hit with smokers looking to either kick their habit, or at least to mitigate its health risks.

Now, most businesses are very aware risks of the risks items such as USB thumb drives can be their systems, as these are a notorious vector for spreading computer viruses, and have instituted strict policies about their use (although personal users remain at high risk).

It now seems, however, that hackers in China have found a new means of infecting computers with viruses, using cheap pieces of hardware that many users would not even conceive of as threat – cheap e-cigarette chargers!

Dec 12 10:59

GOP rep attempted late bid to kill spy bill

Hidden in the law is “a troubling new provision that for the first time statutorily authorizes spying on U.S. citizens without legal process,” Amash told other lawmakers.

Dec 11 11:17

Congress Passes Bill Granting “Unlimited Access to Communications of Every American”

According to Congressman Justin Amash, Congress just passed a bill, (Dec 11th 2014) which grants the government and law enforcement “unlimited access to the communications of every American”.

When the Michigan lawmaker discovered that the Intelligence Authorization Act for FY 2015 had been amended with a provision that authorizes “the acquisition, retention, and dissemination” of all communications data from U.S. citizens, he desperately attempted to organize a roll call vote on the bill.

However, the legislation was passed yesterday 325-100 via a voice vote, a green light for what Amash describes as “one of the most egregious sections of law I’ve encountered during my time as a representative”.

The bill allows the private communications of Americans to be scooped up without a court order and then transferred to law enforcement for criminal investigations.

Webmaster's Commentary: 

I would like to remind the readers of the six NSA encryption challenges issued by this website, not one of which was solved. I am not a cryptographic expert, and only a moderately decent programmer, but I came up with six methods which defied decryption. The NSA would be well motivated to have broken my challenges in order to discourage people from starting to create their own codes. I, on the other hand, encourage people to create and use their own codes, both to defy the government's unconstitutional behavior, and to make it impossible for them to steal our business secrets, or nude pictures of our spouses or children. Inside the NSA encryption challenges are the code samples used to create the encryption methods, to use as a learning example.

Dec 11 08:50

Why Bad Software Succeeds

One of the hardest things to accept, as a justice-loving maker of software, is that a perfectly engineered and beautifully designed piece of software can go completely unused. Similarly, a lot of the software on which the world relies a great deal can be terrible — riddled with poor design decisions if not outright and undeniable bugs. This seems to be a fundamental frustrating truth about software.

Webmaster's Commentary: 

I have never been able to install 3DS MAX 2014 on my new windows 7 machine.

Dec 10 11:06

Kids' Privacy Under Threat: Mobile Apps Secretly Collect Data on Children

Mobile app makers ignore US federal privacy rulings, collecting vast amount of sensitive data through software aimed at kids. Using third-party "libraries" software developers often don't realize how much user data is being passing to advertisers.

Dec 10 09:06

Internet Censors Viral Sandy Hook Truth Documentary

Last Monday, an organization known as the Independent Media Solidarity released an epic documentary entitled “We Need to Talk About Sandy Hook,” which they hosted on their own site as well as on Youtube.

Within hours of the video’s upload, it was well on its way to going viral, however its success was short lived.

Shortly after Infowars began hosting the video the following Tuesday morning, it was suddenly removed from Youtube “due to a copyright claim by Lenny Pozner.”

(It should be noted the video was taken down despite carrying a message stating its materials are presented “in compliance with fair use principles,” and that “Use of copyright material in this video generates social benefits that greatly outweigh any cost to the copyright owner, and is therefore a protected form of speech.”)

Dec 09 09:29

Government In Action: Obama’s Administration Is Back On The Hunt For Internet Censorship In The US

A State Department official met with the czar of China’s infamous Internet censorship program in Washington DC yesterday, where she urged “co-operation” with the figure who helped implement prison sentences for online critics of the ruling Communist Party.

Dec 09 08:06

What Bad, Shameful, Dirty Behavior is U.S. Judge Richard Posner Hiding? Demand to Know.

Like so many federal judges, Judge Posner recognizes rights only when they belong to agents of the state or the economic elite. When it’s ordinary citizens at issue, he snidely rejects any such protections. Of course, this is exactly backwards: those exercising public power (police officers) have a lower entitlement to privacy than private individuals. But power-servants like Judge Posner view only actors of the state and those who serve it (such as himself) as entitled to these prerogatives. That’s become the corrupt essence of the U.S. justice system, and it’s perfectly expressed by Judge Posner’s radically divergent views based on whose privacy is at stake.

Dec 08 16:32

Sony Hackers Apparently Demand Studio Pull ‘The Interview’

A group calling itself GOP posted a message online on Monday that warned Sony to stop “immediately showing the movie of terrorism which can break the regional peace and cause the war.”

GOP — which stands for Guardians of Peace — did not specifically identify the movie. Authorities have been investigating whether the hacker attack is in some way be connected to “The Interview,” the movie that has generated condemnation from the government of North Korea.

Webmaster's Commentary: 

Yep; it's a false-flag!

Dec 08 14:17

Was there a secret Tory conspiracy to get rid of #CameronMustGo?

The Twitter hashtag that caught the imagination of the nation has been unceremoniously retired – despite the fact that it is still being used by thousands of British citizens who have had enough of the man it names, and his government.

That’s right – #CameronMustGo has gone.

It disappeared from Twitter‘s United Kingdom trends an astonishing 16 days after it was launched and – suspiciously – while it was still being tweeted at least once every three seconds [accurate at time of writing].

Users instantly smelled a rat – has Twitter been hacked? Or has it been corrupted by Cameron’s cronies?

Dec 08 11:55

Obama renews NSA snooping for 90 more days

President Obama has renewed the NSA’s phone-snooping program for another three months, with the administration saying Monday that it’s too important to let it expire right now, defying members of Congress who said it was time to ax the controversial program.

Dec 06 09:06

FinFisher dummy infection file NOT DETECTED by most anti-virus companies – Kaspersky included!

Bizzare, the FinFisher government spy application has been leaked to various torrent websites. We decided to download and analyze the package for more information.

We first took a look at the Dummy_Infection.exe file, is it really a virus? Yes, it is a virus. We scanned the virus via the VirusTotal domain, and guess what.

Only 6 companies were able to identify the FinFisher malware.

Does this mean that the other companies do not “WANT” to identify the malware?

Dec 05 14:46

Sen. Wyden puts forward a bill to ban data “backdoors”

The FBI didn't like that idea one bit and said so to Congress. On Thursday, Sen. Ron Wyden (D-Ore.) introduced a bill that, if passed, would make sure the companies can encrypt unmolested. The Secure Data Act would prohibit government agencies from requiring any "backdoors" be placed in US software or hardware.

Webmaster's Commentary: 

No, the Secure Data Act is intended to trick Americans into THINKING that government agencies cannot have any "backdoors", so that we don;t take precautions against government snooping.

Dec 05 07:43

Adding WRH to a local hosts file.

This is useful to do if the Domain Name Service is hacked or simply unavailable. IF YOU ARE NOT EXPERIENCED WITH SYSTEM-LEVEL CHANGES, PLEASE CONSULT AN EXPERT SO THAT YOU DO NOT DAMAGE YOUR OPERATING SYSTEM.

Webmaster's Commentary: 

I am reposting these instructions in light of recent reports that someone is testing ways to block the independent media websites from the internet ahead of some new false-flag event. These instructions will allow you to continue seeing WRH (or any other non-virtual IP website) without going through DNS, which is often a target of mischief makers. This method will not get around an outright router blockage. As it says above, if you do not know what you are doing, get someone who is an expert to help you. The IP for WRH is 173.236.29.251 .

Dec 05 07:06

INTIFADA MOVES FROM THE STREETS OF JERUSALEM TO THE INTERNET

At least that’s what the zionists want you to believe …. none of the following was reported in the Palestinian press leading me to believe that the ‘terrorists’ behind this are actually the zionists themselves.

The zionists have an ‘army’ of hackers who monitor pro Palestinian sites and render them ‘offline’ via DOS Attacks or other methods. My question is why have the sites reported about below not been targeted? Again, in my opinion, the answer is obvious.

Dec 04 16:44

Gov’t and ISP’s Master Plan for Throttling Online News Sites

In any forward operating theater of any war, the first battle to be waged is for the control of information, and hence, the US and other government have contingencies in place to block or obscure online news sources by way of regional internet hubs.

The idea is simple: keep citizens from seeing any alternative reporting or analysis in times of crisis or domestic strife, and to reinforce the corporate monopoly of information and commentary by state-sanctioned, or ‘trusted news sources’ only, namely, ABC, NBC, CBS, FOX News, MSNBC and CNN.

A number of top alternative news site (including this one) have noticed that our website has been offline in certain regions at certain times. Others have noticed, and documented, the same observations.

Dec 04 08:01

BEX ALERT - Iran hackers targeted airlines, energy firms: report

Iranian hackers have infiltrated some of the world's top energy, transport and infrastructure companies over the past two years in a campaign that could allow them to eventually cause physical damage, according to U.S. cyber security firm Cylance.

Webmaster's Commentary: 

Cylance is a tiny compny out of Irvine Californbia looking to make a name for itself, and what better way to garner headlines than to claim to have discovered those eeeeeeevil Iranian hackers are a threat!

Dec 04 07:33

Online news sites to be blacked out during next major catastrophic event?

According to what I'm hearing from several sources in my network of contacts, the U.S. government is putting systems in place to black out online news sites like Natural News, Drudge Report, The Blaze and many others. A practice run that took place earlier this week in California has already achieved this result and confirmed the technical ability to make it happen at will.

The recent outage of news sites experienced by internet users in California was reported by this article on BeforeItsNews.com and confirmed by The Washington Times, The Blaze and other sites. The Natural News reader service team also recorded numerous complaints from California users who were unable to reach our website even though our site was fully functional and serving pages worldwide.

Webmaster's Commentary: 

We got a few complaints here at WRH as well.

Dec 03 14:30

Poll: Nearly 4 in 10 say California Obamacare exchange not working well

Nearly four in 10 Californians say the state's health exchange isn't working well as the second open enrollment gets underway, a new survey shows.

The results from the Public Policy Institute of California survey may reflect persistent service problems experienced by some consumers as well as continued partisan opposition to the federal overhaul.

Dec 03 09:38

Exclusive: FBI warns of 'destructive' malware in wake of Sony attack

The Federal Bureau of Investigation warned U.S. businesses that hackers have used malicious software to launch a destructive cyberattack in the United States, following a devastating breach last week at Sony Pictures Entertainment.

Cybersecurity experts said the malicious software described in the alert appeared to describe the one that affected Sony, which would mark first major destructive cyber attack waged against a company on U.S. soil. Such attacks have been launched in Asia and the Middle East, but none have been reported in the United States. The FBI report did not say how many companies had been victims of destructive attacks.

"I believe the coordinated cyberattack with destructive payloads against a corporation in the U.S. represents a watershed event," said Tom Kellermann, chief cybersecurity officer with security software maker Trend Micro Inc. "Geopolitics now serve as harbingers for destructive cyberattacks."

Webmaster's Commentary: 

What possible motive, other than garnering headlines, does an attack that damages the computers at SONY serve?

Dec 02 09:29

Robots: About to make your job much more boring

Robots and artificial intelligence are expected to make work less of a chore - taking over repetitive tasks and freeing people to be more creative.

But as growing numbers of bots join the workforce over the next decade there's a risk the drudgery of the nine to five may actually increase for some workers.

Dec 02 09:13

Australian internet connections slowed down by submarine cable fault

Web pages loading slowly? A submarine fibre-optic cable fault between Perth and Singapore could be why.

Australia's second largest DSL internet service provider iiNet is among a number of Australian providers affected by the issue that started on the SEA-ME-WE 3 cable on Sunday.

"Our link between Perth and Singapore is currently not passing traffic," an iiNet spokesman told Fairfax Media. "This traffic is taking an alternate path via Sydney to Hong Kong.

As a result, iiNet said customers may experience slower than expected download and upload speeds, latency and packet-loss to destinations in Asia.

Webmaster's Commentary: 

We know that the US has been tapping undersea cables going back to Dr. John Craven and the US Navy's tapping of an undersea cable in the sea of Okhotsk. We also know the NSA is trying to spy on everyone, and I have to wonder if many of these undersea cable outages are botched attempts at installing taps.

Dec 01 09:50

Justices weigh limits of free speech over Internet

Anthony Elonis claimed he was just kidding when he posted a series of graphically violent rap lyrics on Facebook about killing his estranged wife, shooting up a kindergarten class and attacking an FBI agent.

But his wife didn't see it that way. Neither did a federal jury.

Elonis, who's from Bethlehem, Pa., was convicted of violating a federal law that makes it a crime to threaten another person.

In a far-reaching case that probes the limits of free speech over the Internet, the Supreme Court on Monday was to consider whether Elonis' Facebook posts, and others like it, deserve protection under the First Amendment.

Webmaster's Commentary: 

Common sense says that if you would not say it in person, don't post it to the net.

Dec 01 09:36

The Web Is Getting Slower, At Least in How We All Experience It

Afergan said that one way to see this phenomenon in action is to look at Web performance numbers over time for both desktop and mobile users. He said, “The last time the desktop metric was as slow as the current cellular metric is, it was ten years ago. Basically, we’ve lost a decade of innovation, by innovating.”

So as we have moved to an increasingly mobile first Web, we are seeing performance issues that bring back memories of modem connection tones and slow dial-up connections. We are even seeing the return of old-school performance tweaks, such as dynamic image optimization and caching. In a mobile first Web, high performance isn’t a given, even with a 4G network, if the user is in an area with poor coverage or interference.

Dec 01 08:35

2014: The year everyone's security took a hit

If 2013 was the year the world learned through whistleblower and former NSA contractor Edward Snowden that the United States and its Five Eyes allies were monitoring communications worldwide, then 2014 was the year that we learned how easily those agencies, and other actors no doubt, could do it.

Webmaster's Commentary: 
Nov 29 07:21

ZIONIST SHILLS get PAID "easy $" for posting comments, tweeting or clicking the LIKE button!!!

Nov 29 07:13

Snowden reveals British tapping US/Ireland communications

The main cable link between Ireland and America has been tapped by British intelligence, a new raft of papers released by National Security Agency whistleblower Edward Snowden reveals.

Nov 29 07:07

Anonymous posts KKK leader’s personal data online in ongoing war over Ferguson

Hacktivists aligned with the Anonymous movement have published credit card numbers and other personal information allegedly belonging to a leading Ku Klux Klan member amidst a grudge between the groups fueled by recent protests in Ferguson, Missouri.

Members of the loose-knit hacktivist collective have taken aim at the Klan in recent weeks after the KKK threatened to use lethal force against demonstrations descending on Ferguson to protest the August 9 killing of unarmed teenager Michael Brown by local police officer Darren Wilson. The feud between the groups has only escalated in the days since, though, and now Anons are circulating what they claim to be sensitive details about a powerful Klansman and his family.

Nov 28 08:22

Thanksgiving attack: Syrian hackers strike U.S. media websites

American,Canadian and European news organizations claimed on Thanksgiving Day that their websites were hacked by a group identifying themselves as the Syrian Electronic Army (SEA), a cyber-terrorist group that is allied with Syria's Assad regime.

Webmaster's Commentary: 

The hacks accomplished nothing but to attract attention, meaning this is a propaganda operation. And just because they claim to be Syrian doesn't mean they are. The hackers could easily be NSA or Mossad pushing the war on Syria propaganda.

Nov 27 08:52

Bell employees planted glowing online reviews of new Bell app

As soon as Bell Canada launched a new version of a phone app last week, the response online was electric; it quickly garnered glowing, five-star reviews on Apple's iTunes App Store.

CBC News has learned that some of those rave reviews were planted. Possibly half a dozen or more were written by Bell Canada employees – many in senior positions – none of whom disclosed their affiliation with the company.

Nov 25 06:11

'Regin' Spying Malware Linked to US, UK Intelligence Services: Reports

A sophisticated piece of malware that has been used to spy on governments, research facilities and private businesses around the world may have been developed by the US National Security Agency (NSA) and the British Government Communications Headquarters (GCHQ), The Intercept reported Tuesday.

Nov 20 12:41

Rivero challenges the NSA

Nobody got this. The coffee mug is still in the box. I am batting 1000 against the NSA's cryptographers! My first NSA challenge came out over a year ago. Had I been a real terrorist, I would have had ample time to carry out my nefarious plans.

This proves that the NSA cannot and does not track real criminals and terrorists, but exists to spy on law-abiding Americans citizens on behalf of a government grown paranoid over public awareness of their crimes and corruption.

Webmaster's Commentary: 

Posted for the audience of a radio interview I did this morning.

Nov 20 12:26

JEFF RENSE'S WEBSITE IS UNDER MASSIVE DOS ATTACK RIGHT NOW!

Webmaster's Commentary: 

Well, Jeff must have really ticked someone off because his website is under massive DOS attack right now, although nobody has any idea what the motive might be. But it is intense enough where the upstream providers are getting involved in trying to track down and block the attackers.

UPDATE: Jeff Rense's radio network has also been targeted.

And where is the mighty and omniscient NSA during all this? Aren't they supposed to be monitoring the internet for evildoers? :)

Nov 20 08:03

Rights groups release anti-surveillance tool

Four human rights groups have released a tool that lets users check whether their computer has been infected with surveillance software.

Amnesty International says the tool released on Thursday, called Detekt, is designed for right activists and journalists but will be freely available to anybody who fears their computer is being used to monitor them.

Webmaster's Commentary: 

Detekt is available HERE.

Of course, this could also be a giant hoax to convince us we are not being spied on. This tool reported finding no traces of spyware on my machine, which I have difficulty accepting at face value!

Nov 20 07:50

Utah lawmaker questions city water going to NSA

A Utah lawmaker concerned about government spying on its citizens is questioning whether city water service should be cut off to a massive National Security Agency data storage facility outside Salt Lake City.

Nov 20 07:13

Google Internet balloon drops in on farmer

Buyers of the earthly explanation for whatever fell from the sky in Roswell, N.M. back in 1947 are likely to appreciate the reaction of a South African farmer who recently came across what he assumed to be a crashed weather balloon.

In this case, however, the confusion proved only temporary.

Nov 19 11:43

Berners-Lee Behind New Private Communications Network For Ultra-Privacy Conscious

Web founder Tim Berners-Lee is one of the privacy advocates behind a newly launched service that combines social media, cloud storage, person-to-person, and group communications for privacy-conscious users.

Nov 19 07:36

FLASHBACK - The Double Identity of an "Anti-Semitic" Commenter

Like many other news websites, Common Dreams has been plagued by inflammatory anti-Semitic comments following its stories. But on Common Dreams these posts have been so frequent and intense they have driven away donors from a nonprofit dependent on reader generosity.

A Common Dreams investigation has discovered that more than a thousand of these damaging comments over the past two years were written with a deceptive purpose by a Jewish Harvard graduate in his thirties who was irritated by the website's discussion of issues involving Israel.

His intricate campaign, which he has admitted to Common Dreams, included posting comments by a screen name, "JewishProgressive," whose purpose was to draw attention to and denounce the anti-Semitic comments that he had written under many other screen names.

Webmaster's Commentary: 

We get a lot of that around here as well. Israelis have called our advertisers and clients and demanded they stop doing business with us. Sadly, the more cowardly among them have.

Nov 17 11:26

Why Quebec can't surf some major U.S. retailers' websites

Access to the websites of several large U.S.-based retailers have been blocked in Quebec because they did not comply with the province's language laws.

In recent weeks, retailers including Williams-Sonoma, Urban Outfitters, and Club Monaco blocked access in Quebec to parts of their retail websites.

Nov 17 07:17

#OpKKK: Anonymous hacks KKK websites, Twitter over Ferguson threats

Anonymous claims it has taken down several Ku Klux Klan websites and Twitter accounts as part of what internet hacktivists describe as a “cyber war”, inspired by KKK threats of using “lethal force” against Ferguson protesters.

Anonymous listed the KKK websites it put offline Sunday night on its Twitter feed, with reports on the attacks coming with the hashtag #OpKKK.

Nov 17 06:34

Obamacare Facebook page comments mostly from small group of supporters

Americans began heading anew this weekend to President Obama’s official Obamacare Facebook page to gather information on the new round of health care enrollment, share their experiences shopping for insurance on the federal exchange and voice their opinions on the president’s signature domestic achievement.

However, what some would view as a robust marketplace of ideas is actually controlled by just a few, an analysis of the Web page shows.

Sixty percent of the site’s 226,838 comments generated from September 2012 to early last month can be attributed to fewer than 100 unique profiles, according to an analysis completed by The Washington Times with assistance from an outside data analytics team. Many of those profiles belong to just one person who created multiple aliases or personas to widen her influence and multiply her voice.

Nov 16 09:15

Hackers Show How Simple It Is to Hack ATMs for Free Cash.

In 2005 it was discovered that the factory set master passcodes of the machines were printed inside the service manuals which were available online.

Webmaster's Commentary: 

The dumbing down of America has succeeded!

The losses from these weak systems get passed onto the rest of the bank customers. This is yet another reason to stop doing business with the banks, alongside negative interest rates and the coming bail-ins.

Nov 16 07:00

YouTube takes down account that had the "HAPPY HALLOWEEN WRH LISTENERS !!!" video!

Webmaster's Commentary: 

We are down to the "Let's throw tantrums because we can't figure out anything else to do" phase of the decline of the US.

Nov 15 07:06

JUSTICE DEPARTMENT ADMITS IT MISLED COURT ABOUT FBI’S SECRET SURVEILLANCE PROGRAM

The Justice Department acknowledged that it misled a federal Appeals Court during oral arguments last month in a case reviewing whether the government should be able to secretly conduct electronic surveillance of Americans without a warrant.

In a newly unsealed letter, a Justice Department lawyer told the U.S. Court of Appeals for the 9th Circuit that it spoke erroneously when describing the disclosure restrictions placed upon the FBI's use of so-called national security letters. NSLs, as they are often referred, can compel companies to hand over communications data or financial records of certain users to authorities conducting a national security investigation.

Nov 15 06:31

Youtube removes ITCCS historic postings detailing complicity of Harper cabinet minister Denis Lebel in Ninth Circle cult, and of child killing at elite Vancouver Club

Crucial evidence from the ITCCS exposing child trafficking and Ninth Circle rituals in Canada was removed yesterday by youtube without explanation.

The postings consisted of first hand evidence shared in interviews with Kevin Annett, the North American Field Secretary of the ITCCS. The evidence included the names of prominent church, judicial and government members of the Ninth Circle in Canada, and of a west coast child trafficking and cult sacrificial group known as the Twelve Mile Club.

Nov 14 17:06

Package Delivery Virus

Webmaster's Commentary: 

As we head into the holidays, scammers are using fake delivery notifications which appear to be from UPS, FedEx, USPS and such to trick you into downloading malware. Most ask you to click a link to schedule redelivery or provide confirmation information. None of the real delivery companies do this.

Nov 13 10:21

Republican Politicians Are Fighting Net Neutrality, but Their Constituents Support It

On Monday, President Obama came out in strong support of net neutrality and advised the FCC to reclassify Internet service as a utility under Title II of the Telecommunications Act. Later that day, FCC Chairman Tom Wheeler, an Obama appointee and former cable/telecom lobbyist, met with tech company representatives to say that he did not plan to follow all of the president’s proposals. Sounds about right.

Nov 13 08:41

IT buyers calling it quits with Silicon Valley

As enterprises discover the need to build their own software, they're ending the romance with Silicon Valley vendors.

Webmaster's Commentary: 

There are three immediate advantages to developing your own software.

1. You only write the software you need and don't have to deal with a bloated system with hundreds of features you don't use.

2. You can repair problems quickly without having to wait for whenever the software provider to issue a patch.

3. You can create your own systems of encryption so that the US Government isn't stealing your business secrets to fatten their own wallets, and by having your own code, you know the NSA doesn't have a back door hidden inside it somewhere.

Nov 13 08:23

Windows 8: Why Microsoft's giant gamble didn't pay off

In many ways, analysts say, Windows 8 didn't bridge the divide between tablets and PCs so much as fall into the chasm between them.

Nov 12 12:28

Net Neutrality Stands in the Way of Larger Corporate Profits

These digital conduits are essential parts of America’s utility infrastructure, nearly as basic as electricity and water pipes. They connect us (and our children) to worldwide knowledge, news, diverse viewpoints and other fundamental tools of citizenship. And, of course, we can buy and sell through them, be entertained, run our businesses, connect with friends, get up-to-the-minute scores, follow the weather and — yes indeed — pay our bills.

Yet while this digital highway is deemed vital to our nation’s well-being, access to it is not offered as a public service — i.e., an investment in the common good. Instead, it is treated as just another profit center for a few

Nov 11 11:14

Beyond Silk Road 2.0, over 400 'dark web' Tor sites seized by FBI

Last week's takedown of Silk Road 2.0 wasn't the end of seizures in the underground — law enforcement agencies have gone full throttle and shut down hundreds of sites in Operation Onymous.

In a joint operation by the 16-member states of Europol, the FBI, US Immigration and Customs Enforcement (ICE) and Homeland Security, more than 410 hidden services were unveiled and taken down. Operating on the Tor network, a system of anonymizing onion routers, .onion pages were closed down, and 17 administrators and service vendors were arrested.

In addition, over $1 million in Bitcoin, 180,000 euros in cash, drugs, gold and silver were seized by law enforcement over the weekend, according to Europol.

Webmaster's Commentary: 

I think the takedown of TOR is more about ending privacy on the web than it was about Silk Road 2.

Nov 11 08:21

Obama's call for net neutrality spells trouble for Time Warner Cable-Comcast deal

The fight for an open Internet just got a lot stronger, as President Obama waded into the fray and issued a call for utility-style regulation to limit the power of phone and cable companies.

The president isn’t likely to get his way entirely, with strong opposition already coming from those industries and Republicans in Congress. But Obama's move also reduces the odds that regulators will approve Comcast's (CMCSA) $45 billion take over bid for Time Warner Cable (TWC).

Nov 10 15:45

What Happens When the NSA Comes to Town

The NSA set up a facility in Utah, promising jobs and industry along with it. None of that came. Now, one surveillance scandal later, residents can vote to render the facility useless in the simplest way possible. Is it worth it?

Nov 10 12:51

Obama says FCC should reclassify internet as a utility

President Obama has come out in support of reclassifying internet service as a utility, a move that would allow the Federal Communications Commission to enforce more robust regulations and protect net neutrality. "To put these protections in place, I'm asking the FCC to reclassifying internet service under Title II of a law known as the Telecommunications Act," Obama says in a statement this morning. "In plain English, I'm asking [the FCC] to recognize that for most Americans, the internet has become an essential part of everyday communication and everyday life."

Nov 07 11:14

FLASHBACK 2013 - The Israeli Criminals Behind the NSA Spy Scandal

Jacob "Kobi" Alexander The founder and former chairman of Verint is wanted by the FBI for a long list of crimes. He is veteran Israeli intelligence officer.
Jacob "Kobi" Alexander, the former head of Comverse, the parent company of Verint, is a wanted criminal who has fled U.S. justice to Africa and probably subsequently to Israel. It is important to note that Kobi Alexander and Comverse were closely connected to Odigo, the Israeli messaging system that was used to warn Israelis to stay away from the World Trade Center on 9-11.
Furthermore, the NSA has used Israeli encryption software from RSA Security, Inc. since 2006, which means that Israelis hold the encryption keys to the entire NSA computer network. The Israelis obviously have easy access to everything at the NSA.

Webmaster's Commentary: 

So, the guy our incoming Attorney General helped avoid jail for stock options fraud is also an Israeli spy!

Nov 07 07:11

BEX ALERT - 'Trojan Horse' Bug Lurking in Vital US Computers Since 2011

DHS sources told ABC News they think this is no random attack and they fear that the Russians have torn a page from the old, Cold War playbook, and have placed the malware in key U.S. systems as a threat, and/or as a deterrent to a U.S. cyber-attack on Russian systems – mutually assured destruction.

Webmaster's Commentary: 

So let me see if I have this correct. DHS/NSA cannot find the people behind all these data thefts of credit card information, cannot find who is behind Cryptolocker and other malware, can't stop the flood of malware arriving in our email, but the US Government is absolutely certain they know that the Russians are behind this malware it took them three years to detect, just as the US Government is absolutely certain Putin shot down MH17, just as the US Government is absolutely certain Saddam had nuclear weapons, just as the US Government is absolutely certain Assad gassed his own Alawite supporters with Sarin gas right in front of the UN chemical weapons inspectors on the very day they arrived in Syria, just as the US Government is absolutely certain there were torpedoes in the Gulf of Tonkin, just as the US Government is absolutely certain there was a Spanish mine in Havana Harbor, just as the US Government is absolutely certain the Lusitania was NOT carrying weapons of war ... And you wonder why we have doubts?

Nov 06 16:17

Former SpaceX employee faces life in prison for running Silk Road 2.0

Federal authorities in the United States have announced charges against a California man arrested this week who is accused of operating the second incarnation of the infamous Silk Road online marketplace.

On Thursday, officials said that 26-year-old Blake Benthall of San Francisco, CA was apprehended a day earlier as the result of a 12-month-long investigation into Silk Road 2.0, a web-based black market that appeared online last year after its eponymous predecessor was pulled from the internet pursuant to a similar criminal probe.

The criminal complaint unsealed on Thursday suggests Benthall, a former software engineer for SpaceX, according to his Facebook, became involved in Silk Road 2.0 in November 2013 and assumed administrative duties of the site earlier this year up until his arrest this week.

Nov 06 13:42

BEX ALERT - 'Trojan Horse' Bug Lurking in Vital US Computers Since 2011

A destructive “Trojan Horse” malware program has penetrated the software that runs much of the nation’s critical infrastructure and is poised to cause an economic catastrophe, according to the Department of Homeland Security.

National Security sources told ABC News there is evidence that the malware was inserted by hackers believed to be sponsored by the Russian government, and is a very serious threat.

Nov 06 08:51

Is your TV watching you? Samsung's latest sets with built-in cameras spark concerns

Samsung's latest breed of plasmas and HDTVs may allow hackers, or even the company itself, to see and hear you and your family, and collect extremely personal data.

The new models, which are closer than ever to personal computers, offer high-tech features that have previously been unavailable, including a built-in HD camera, microphone set and face and speech recognition software.

Webmaster's Commentary: 
Nov 06 06:42

Faking it: 4 ways companies can deceive you online

CBC’s Marketplace investigated how companies artificially inflate their online credibility through paid testimonials and fake reviews.

Marketplace set up a fake business to test how easy it is to buy a good reputation online.

Nov 05 11:37

NSA Chief Bet Money on AT&T as It Spied on You

The former head of the world’s biggest spy agency didn’t just oversee the collection of billions of AT&T records. He also tried to make money off its customers.

At the same time Gen. Keith Alexander was running the National Security Agency, the United States’ biggest spying outfit, he was also trading stocks in an obscure technology company that had a sweetheart deal with one of the NSA’s most important sources of intelligence—the global phone and Internet giant AT&T.

Nov 04 12:16

Emoshape Provide Intelligent Machines with Emotions

EMOSHAPE (www.emospark.com) has announced the launch of a major technology breakthrough with an EPU (emotional processing unit); a patent pending technology which creates a synthesised emotional response in machines.

Webmaster's Commentary: 

They can skip greed and avarice. Wall Street has already created computers with those emotions! :)

Nov 04 07:48

Google ‘Polling place lookup’ strikes out

The Doodle on Google’s homepage this Election Day morning is a flag-adorned, spinning ballot box that when clicked brings one to a search box labeled “Polling place lookup.”

It’s a good thing I already know where to vote.

Nov 02 08:01

Govt Banhammer: UK internet abusers may face up to 2 yrs in jail

Webmaster's Commentary: 

This sounds like a long overdue idea but will likely stumble on the fact that most trolls are paid operatives for governments and corporations.

Nov 01 19:28

Americans pay more for slower Internet

Clocking in at the top of the list was Seoul, South Korea, where Internet users can get ultra-fast connections of roughly 1000 megabits per second for just $30 a month. The same speeds can be found in Hong Kong and Tokyo for $37 and $39 per month, respectively.

Residents of New York, Los Angeles and Washington, D.C. can get 500-megabit connections thanks to VZ, Tech30), though they come at a cost of $300 a month.

Nov 01 10:19

Google fined over Street View image of woman's cleavage

Google has been ordered to pay a Canadian woman $2,250 (£1,250) for an image on Street View that exposed her cleavage.

The image showed the woman, Maria Pia Grillo, sitting on a step outside her house, leaning forward with her elbows resting on her knees. In the picture she was wearing a low-cut top that left "part of her breast" exposed.

Although her face was blurred out, she was still identifiable – particularly as her car was parked in the driveway without the licence plate number blurred out.

Grillo filed a lawsuit in 2011 asking Google to blur out more of the image, including most of her body and her licence plate.

She also demanded to be paid $45,000 (£25,000) for the depression she had suffered, after her coworkers at "a well-known bank" discovered the image and derided her for it.

Webmaster's Commentary: 

Okay, so the woman puts on a revealing top, goes outside her home, sits in a position where the top is going to be revealing her breast to the world ... then sues anyone who actually looks?

I remember back at the height of the feminists "male bash" craze there was a woman who worked at the same animation shop I did who habitually dressed in very thin leotards that left little to the imagination ... and made sexual harassment complaints against any men she caught looking at her! This was called "empowerment."

Oct 31 10:53

FBI Holds Secret Meeting To Scare Congress Into Backdooring Phone Encryption

In September, both Apple and Google announced plans to encrypt information on iOS and Android devices by default. Almost immediately, there was a collective freakout by law enforcement types. But, try as they might, these law enforcement folks couldn't paint any realistic scenario of where this would be a serious problem. Sure, they conjured up scenarios, but upon inspection they pretty much all fell apart. Instead, what was clear was that encryption could protectusers from people copying information off of phones without permission, and, in fact, the FBI itself recommends you encrypt the data on your phone.

But it didn't stop FBI director James Comey from ignoring the advice of his own agency and pushing for a new law that would create back doors (he called them front doors, but when asked to explain the difference, he admitted that he wasn't "smart enough" to understand the distinction) in such encryption.

Webmaster's Commentary: 

Breakable encryption means the FBI can spy on law abiding citizens, but as we proved with our NSA challenges, real criminals and terrorists will remain invisible.

Oct 31 10:31

What happens when your friend’s smartphone can tell that you’re lying

In just a few weeks, the next installment of “The Hunger Games” will arrive in movie theaters. The latest in a long line of films to depict a future all-knowing or controlling government — think “1984” or “Minority Report” — the dystopian tale will likely be a runaway hit. But the power to seem all-knowing – or at least know more than do now – may soon lie in technology that’s already in the palm of your hand.

We are nearing a point where our smartphones will be able to recognize a face or voice, in real life or on-screen. And identification is only the most basic of the possibilities. Many app-makers are experimenting with software that can also analyze – able to determine someone’s emotions or honesty just by a few facial cues.

Webmaster's Commentary: 

Smart phones have the power to run voice-stress software. But what worries the powers that be is not that we will use it on each other, but on THEM!

Oct 31 09:55

Possible problems at Facebook

31 October: Problems at Facebook
Facebook is having issues since 9:00 AM EDT. Are you also affected? Leave a message in the comments.

Webmaster's Commentary: 

The good news. Facebook is now fully cooperating with NSA.

The bad news: The interface was written by the same people who did the Obamacare website! :)

Oct 31 09:42

Dating Website Sued for Making Fake Lovers

The Federal Trade Commission filed suit against a British-based dating company alleging that it created fake automated profiles to trick paid members into believing that they were receiving texts from other real people on its several dating websites.

The FTC alleged that JDI Dating created the fake profiles, tricking new users into thinking they were getting text messages from real humans. The profiles, though, were connected to automated "flirting" software.

Users were enticed to sign up by being offered free memberships to the various sites, and upon first login, the flirty texts would flood a new user's inbox. But new users were unable to reply to any messages unless they upgraded to the paid service. Fees from $10 to $30 a month were charged to a new user's credit card to give them the capability to engage in messaging other members.

Webmaster's Commentary: 

That is just mean!

Oct 31 08:07

Isolated computer to be hacked with only a cellphone at Denver cybersecurity conference

Security researchers at Ben Gurion University have found a way to infiltrate a closed network to lift data from an isolated computer using little more than a cellphone’s FM radio receiver.

To evade air-gap security measures, keylogging app Airhopper, as its known, uses radio frequencies to transmit data from a computer, all by exploiting the computer's display.

“This is the first time that a mobile phone is considered in an attack model as the intended receiver of maliciously crafted radio signals emitted from the screen of the isolated computer,” according to a release by Ben Gurion University.

Webmaster's Commentary: 

So, Israel's university TEACHES computer hacking!

Oct 30 11:18

How much is whatreallyhappened.com worth?

estimated worth, $ 13,805,000

Webmaster's Commentary: 

UPDATE: Only 24 hours after I posted the above link, the estimated value for whatreallyhappened.com has gone from $13.8 million to just over $10 million. I guess "someone" doesn't like there to be any indication of this website's popularity and reach to be out there!

Oct 30 09:04

Amazon-CIA $600 Million Deal Facing Scrutiny: ‘What’s the CIA Doing on Amazon’s Cloud?’

A billboard challenging Amazon to fully disclose the terms of its $600 million contract to provide cloud computing services for the Central Intelligence Agency has been unveiled at a busy intersection near Amazon’s Seattle headquarters.

The billboard’s launch — asking “the $600 million question: What’s the CIA Doing on Amazon’s Cloud?” — marks the escalation of a campaign by the online activist organizations RootsAction.org and ExposeFacts.org. The groups are calling for accountability from Amazon in an effort to inform the public of serious privacy implications of the Amazon-CIA collaboration. (ExposeFacts.org is a project of the Institute for Public Accuracy.)

Webmaster's Commentary: 

Given that CIA and Amazon are swapping tongue kisses these days, it becomes understandable why Alexa, owned by Amazon, is rigging the rankings of independent media websites lower and pushing up rankings of pro-government websites.

Oct 29 09:13

Legendary Hacker Leaks Government Plan To Take Over Internet

Oct 29 07:42

FB For Currency Scams? EU May Probe Bankers’ Social Media

Traders accused of currency manipulation at some of the world’s biggest banks may soon have their social media data handed over to authorities conducting the investigation.

All of the bankers’ communications will be handed over to investigators to discover if banks have been tampering with currency interbank rates on the $5.3 trillion-a-day foreign exchange market, Bloomberg reported citing unnamed source.

Oct 29 07:35

HTML5 reaches ‘recommendation’ status

The World Wide Web Consortium today has elevated the HTML5 specification to ‘recommendation’ status, giving it the group’s highest level of endorsement, which is akin to becoming a standard.

But Jeff Jaffe, CEO of the W3C, was quick to point out that work on the Web is far from complete.

HTML5 is a critical piece in terms of importance to the next generation of Web technology in general, according to Jaffe. “I think back to what the Web originally was, which was accessing static documents from Web pages. Today, it’s what we call the Open Web Platform for building distributed applications, characterized by rich media – video, audio and graphics – natively available in browsers,” he said.

Webmaster's Commentary: 

I experimented with HTML5 in writing Claire's music website and the overall portal to our online "empire." The problem I ran into is that various smart phones and tablets, although claiming to support HTML5, did not actually support the full specifications, only enough HTML5 to be able to advertise they supported HTML5, and in many cases the pages would not display correctly.

Oct 28 07:40

The highly sophisticated hacking of Sharyl Attkisson's computers

They met at a McDonald’s in Northern Virginia at the beginning of 2013, and the source (she dubs him Number One) warned her about the threat of government spying. During their next hamburger rendezvous, Big Mac told Attkisson, then a CBS News reporter constantly at odds with the Obama administration, that he was “shocked” and “flabbergasted” by his examination of her computer and that this was “worse than anything Nixon ever did.”

Oct 28 06:40

Snowden 2.0: Report says FBI Has Identified "Second Leaker" of Govt Secrets

The U.S. government has identified the person it believes is the so-called "second leaker" who has given over classified national security documents to some of the same journalists who have reported on many of the documents leaked by NSA whistleblower Edward Snowden this year, a news report claimed on Monday.

Webmaster's Commentary: 

Rather than let the FBI pick them off one at a time, everyone with secrets needs to go public at the exact same time.

Oct 28 06:33

Watch your attachments: Microsoft Office bug lets hackers take over computers

A dangerous new security vulnerability has been discovered in Microsoft’s Office software, threatening to hijack users of virtually every existing version of Windows.

The bug in question affects programs like Word, PowerPoint, and Excel – and could allow an intruder to gain access to and control over a user’s entire computer.

Already, Microsoft has discovered that hackers are using the bug to hack computers through PowerPoint. Windows users should be wary of opening PowerPoint files sent via email unless they completely trust the original source, the company wrote in an online security advisory. Even in cases involving trusted sources, it has advised to not open the files received unexpectedly.

Webmaster's Commentary: 

And the mighty NSA cannot find these crooks either, can they?

Oct 27 07:42

Hungarians revolt against internet tax (PHOTOS, VIDEO)

Furious with the government plan to impose tax on Internet data traffic, thousands of Hungarians rallied in front of the Economy Ministry in Budapest to protect the freedom of the internet from the 'anti-democratic' measure.

Tens of thousands gathered in front of the Economy Ministry building on Sunday, urging the politicians to scrap the plan that will see internet service providers (ISPs) pay 150 forints ($0.62) for every gigabyte of data traffic transferred over their networks.

Oct 27 07:24

Spy Wars: CIA Vs. Congress | Jesse Ventura Off The Grid - Ora TV

Oct 27 07:18

Kano: A kit to build a computer and a new creative generation

Kano's Alex Klein tells TechRepublic about why people of all ages, not just kids, want to understand the tech they take for granted.

Oct 27 07:14

CVS follows Rite-Aid, shuts off Apple Pay

Last Thursday drug store chain Rite Aid Inc. (RAD) reportedly stopped accepting payments made through the just launched Apple Pay system from Apple (AAPL). On Saturday, CVS Health (CVS) was reported to have followed suit at its CVS pharmacy stores.

The issue appears to be a conflict between Apple Pay and a mobile payment system called CurrentC that is being developed by a retailer-owned mobile technology outfit called Merchant Customer Exchange (MCX). Unlike Apple Pay, CurrentC does not use an NFC chip, but instead generates a QR code that is displayed on the merchant's checkout terminal. Customers who have already linked their bank accounts to the CurrentC system scan the QR code from the terminal and the transaction is completed.

Oct 26 11:16

French "hate speech" lawsuit leading to worldwide online censorship

A little over a year after a French court forced Twitter to remove some anti-Semitic content, experts say the ruling has had a ripple effect, leading other Internet companies to act more aggressively against hate speech in an effort to avoid lawsuits.

The 2013 ruling by the Paris Court of Appeals settled a lawsuit brought the year before by the Union of Jewish Students of France over the hashtag #UnBonJuif, which means “a good Jew” and which was used to index thousands of anti-Semitic comments that violated France’s law against hate speech.

Since then, YouTube has permanently banned videos posted by Dieudonne, a French comedian with 10 convictions for inciting racial hatred against Jews. And in February, Facebook removed the page of French Holocaust denier Alain Soral for “repeatedly posting things that don’t comply with the Facebook terms,” according to the company. Soral’s page had drawn many complaints in previous years but was only taken down this year.

Oct 26 07:30

US government surrenders control of ICANN - Fox News Live

Oct 25 10:04

Dems on FEC move to regulate Internet campaigns, blogs, Drudge

In a surprise move late Friday, a key Democrat on the Federal Election Commission called for burdensome new rules on Internet-based campaigning, prompting the Republican chairman to warn that Democrats want to regulate online political sites and even news media like the Drudge Report.

Oct 24 07:55

FTDI admits to bricking innocent users' chips in silent update

Hardware hackers and security researchers are furious at chip maker FTDI for issuing a silent update that bricks cloned FTDI FT232 [USB to UART] chips.

The chip is extremely common on a wide variety of devices and there is no way of knowing at this time which devices have cloned chips -- and the tainted supply chain could hit anyone.

FTDI appears to have used a recent Windows update to deliver the driver update to brick all cloned FTDI FT232s.

FTDI's surprise new driver reprograms the USB PID to 0, killing the chips instantly.

The hardware hackers at Hack A Day first reported that a recent driver update deployed over Windows Update is bricking cloned versions of the very common FTDI FT232 [USB to UART] chip.

In response to increasing anger and criticism from security researchers on Twitter, FTDI admitted using the remote kill switch and is adamant that this move is necessary to fight counterfeiting.

Webmaster's Commentary: 

Oh yes, let's punish the end user who may not even know his product has a counterfeit chip by killing his hardware!

Does FTDI not understand that the counterfeiters will go on selling their chips anyway not caring if they eventually fail? Look at the flood of fake 128G SD cards hitting the market. These are actually 8G chips reprogrammed to identify themselves as 128G to the computer. Every time a particular brand is identified as phony, the counterfeiters simply change their company name, change the packaging, and go right on selling their products, not caring that they will not actually work. FTDI's stunt will harm a lot of innocent end users and will not stop the counterfeiters. It won't even slow them down. Someone needs to be fired for this mistake!

Oct 23 10:59

Atlanta airport WiFi users are barred from transmitting “hateful or racially, ethnically or otherwise objectionable” material

The following constitutes examples of violations of this AUP. You agree NOT to use the Wi-Fi System to:

Transmit any material (by uploading, posting, email or otherwise) that is unlawful, threatening, abusive, harassing, tortuous, defamatory, obscene, libelous, invasive of another’s privacy, hateful or racially, ethnically or otherwise objectionable; ...

Webmaster's Commentary: 

That "otherwise objectionable" could mean pretty much anything, including WRH!

Oct 23 10:37

ZION’S INTERNET WAR

Over the past few years more than 5 million readers have been directed to this Blog via links at What Really Happened. These people are not strangers to what is known as a DOS Attack which renders a particular site ‘unavailable’ for a given time period. For years now, WRH readers have occasionally been denied access to the site because of these attacks. They have not been the only victim of these frequent attacks, other wonderful sites such as Uruknet have also suffered from them. One can show their appreciation to these sites by visiting them frequently and even better, by contributing financially to them. Their continued existence depends on your support.

Oct 23 10:15

'PhotoMath' app uses recognition technology to solve your math homework for you

Webmaster's Commentary: 

Works better than Common Core!

Oct 23 07:00

It’s Not Just Spying – How The NSA Has Turned Into A Giant Profit Center For Corrupt Insiders

Last week, two very important stories came out; one from Reuters and the other from Buzzfeed. They both zero in on how current NSA employees are using their expertise and connections to make big money in the private sector while still working at the NSA. Let’s start with the Reuters story, which covers former NSA-head Keith Alexander’s business relationship with the NSA’s current Chief Technical Officer, Patrick Dowd.

Before we get into the meat of this story, I want to set the stage with a little background. In case you forgot, Keith Alexander launched his own cyber-security firm, IronNet Cybersecurity Inc., earlier this year.

Oct 22 09:16

Fake news sites are using Facebook to spread Ebola panic

These sites claim to be satirical but lack even incompetent attempts at anything resembling humor. They’re really fake news sites, posting scary stories and capitalizing on the decontextualization of Facebook’s news feed to trick people into sharing them widely. On Facebook, where stories look pretty much the same no matter what publication they’re coming from, and where news feeds are already full of panicked school closures, infected ISIS bogeymen, and DIY hazmat suits, the stories can fool inattentive readers into thinking they’re real. Panicked, they share, spreading the rumor farther and sending more readers to the story, generating ad revenue for the site.

It’s proving to be a very successful strategy, particularly for a site called the National Report, which saw its traffic spike to 2 million unique visitors yesterday according to Quantcast.

Oct 20 15:59

Microsoft warns users to kill botched KB 2949927 patch

After yanking botched patch KB 2949927, which failed to install on some machines, Microsoft is now warning users to uninstall the update -- even though there has been no mention of problems after the patch is installed.

Microsoft released KB 2949927 as part of its ill-fated batch of October "Update Tuesday" patches. On Wednesday I wrote about the first patch that showed widespread problems, KB 2952664, which failed to install with error 80242016. I followed up on Thursday with details about four more patches causing problems:

Oct 20 13:19

Nearly half of cardholders likely to avoid stores hit by data breaches

As data breaches exposing consumer credit card, debit card and other personal information become more common, nearly half of cardholding shoppers say they're reluctant this holiday season to return to stores that have been hacked, according to a new survey by CreditCards.com.

Forty-five percent of respondents with credit or debit cards said they would definitely or probably avoid one of their regular stores over the holidays if that retailer had experienced a data breach. Sixteen percent said they definitely would not return to a retailer if the store had been hacked and 29 percent said they probably would not shop at such stores. Just one in eight said they are more likely to shop with credit cards this season.

Oct 19 07:00

FBI Director Warns Google and Apple "If You Don't Decrypt Phones, We'll Do It For You"

The Fourth Amendment to the US Constitution is crystal clear in meaning.

The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no warrants shall issue, but upon probable cause, supported by oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.

FBI Director, James Comey, an Obama appointment, does not give a damn what the Constitution says.

Oct 18 09:29

Kickstarter Freezes Anonabox Privacy Router Project for Misleading Funders

On Friday afternoon Kickstarter suspended the crowdfunding campaign for Anonabox, an initiative to sell a tiny, $45 router that would run all a user’s online traffic over the anonymity network Tor. The idea tapped into an explosive demand for simple privacy technology, and earned more than 10 times its modest goal in hours. But as funders shoveled more than half a million dollars into the project, they also began to pick apart Anonabox’s claims of creating custom hardware, as well as the promised security of its software. Soon, many were calling for the project to be cancelled, and asked others to report its shortfalls to Kickstarter staff, who now say they’ll cancel all investors’ pledges.1

Oct 18 08:00

Iran expert helping develop IoT platform

An Iranian expert and postdoctoral fellow at the University of British Colombia is helping develop a revolutionary platform for a new technology called the Internet of Things (IoT).

Ali Kashani, the Vancouver-based Energy Aware Technology’s vice president of software, is helping the company develop the Neurio platform, billed as a revolutionary new technology that makes an ordinary home smart.

The evolution of the IoT involves the embedding of sensors in physical objects. The sensors are, in turn, linked through networks to computers that analyze the vast amounts of data they produce.

Neurio’s development, however, has drawn upon the fact that all electronic devices have a power signature, hence just enlisting the help of a Wi-Fi power sensor.

Kashani has described Neurio as the “brain of the home,” not a “fancy” remote control, like other smart-home products.

Oct 18 08:00

Microsoft to cut 18K jobs worldwide

The US software giant Microsoft has announced plans to slash 18,000 jobs from its global workforce in 2015, the largest cuts in the company’s 39-year history.

Oct 18 07:00

Obama’s credit card denied at restaurant on New York City trip

President Obama came perilously close to having to wash some dishes on his recent trip to New York.

Mr. Obama revealed Friday that his credit card was rejected when he went to pay for his meal at a New York restaurant during the U.N. General Assembly gathering last month.

“Apparently they thought there was some fraud going on,” Mr. Obama joked at a meeting Friday with employees of the Consumer Financial Protection Board, adding that “even I am affected” by the difficulties of dealing with the American financial system. The remarks were picked up by the C-SPAN feed of the event.

Oct 17 12:45

Thousands Of MacBooks Made In 2011 Have Self-Immolating Graphics Cards

Models of Apple’s higher-end portable computer, the MacBook Pro, have come to the end of their three-year extended warranties. That leaves their owners at the mercy of Apple when something goes wrong, and at minimum thousands of the computers have had the same computer-killing problem with their graphics processing unit. Apple has not publicly admitted that the machines have a problem.

Of course, MacBook Pro owners are people who have spent at least $2,500 on a computer designed for serious graphics work. That means that they’re probably media professionals or serious amateurs, and able to make YouTube videos making fun of the situation with really great production values.

Oct 17 08:33

FBI director to citizens: Let us spy on you

The expanding options for communicating over the Internet and the increasing adoption of encryption technologies could leave law enforcement agents “in the dark” and unable to collect evidence against criminals, the Director of the FBI said in a speech on Thursday.

Webmaster's Commentary: 

I am going to take it from the above that FBI Director James B. Comey is tacitly admitting that our series of NSA encryption challenges did in fact defeat the NSA cryptographers.

So, Comey is trying to revive an idea from 1995 and declare that any encryption system not authorized for use by the government (meaning not including a back door for them to use) is a "weapon" whose purpose must be assumed to be criminal, and therefore punishable. Better copy off those code snippets in my challenge while you still can!

The new attitude is "Use A Secret Decoder Ring: Go To JAIL!"



The government wants us to trust them that they are only going to spy on criminals, but we already know this is a lie. The FBI and other US Intelligence agencies have been caught stealing personal data for cronies of the President and their own personal profit. The Fourth Amendment says that the government cannot peek into your personal life absent an actual accusation of a crime and given the tsunami of evidence that the government is not complying with its Constitutional limits, We The People have every right to secure our business secrets, photos of our scantily clad partners, my Aunt Mary's Top Secret Chocolate Chip Cookie recipe, and everything else from a government that is itself the biggest criminal organization in the country.

Oct 16 05:21

YouTube has potentially infected over 100,000 users during the past 30 days

YouTube has become a daily habit for millions all over the world, but it looks like there has been some malicious activity on the website -- which may have affected more than 100,000 users over a 30 day period.

According to Trend Micro, they have been monitoring the activity on YouTube over the past couple of months and have found that the attack comes in the form of ads that are present on the site. While the ads themselves have no malicious content, the issue seems to occur when the ad is clicked. Although these ads should be monitored and screened by YouTube, some have seemed to slip through the cracks, redirecting to malicious websites that could cause infections. While this all sounds fairly simple, the actually process for passing off a malicious site for something legitimate is fairly complex.

Oct 14 09:12

Chat logs reveal FBI informant’s role in hacking of Sun newspaper

The FBI is facing questions over its role in a 2011 hacking attack on Rupert Murdoch’s Sun newspaper in the UK after the publication of chat logs showed that a man acting as an agency informant played a substantial role in the operation.

In July 2011, a group of hackers known as Lulzsec – an offshoot of Anonymous – posted a fake story about the death of Murdoch, penetrated several News International (now News UK) corporate sites, and claimed to have obtained gigabytes of material from the company’s servers.

Oct 12 08:29

Edward Snowden Doc 'Citizenfour' Reveals Existence of Second NSA Whistleblower

In the key scene, journalist Glenn Greenwald visits Snowden at a hotel room in Moscow. Fearing they are being taped, Greenwald communicates with Snowden via pen and paper.

While some of the exchanges are blurred for the camera, it becomes clear that Greenwald wants to convey that another government whistleblower -- higher in rank than Snowden -- has come forward.

Oct 10 07:55

It's not just Munich: Open source gains new ground in Germany

While Munich city council's decision to replace Microsoft software with open-source alternatives made headlines, it is one of a number of municipalities across Germany to make such a move.

Across Germany at the national and local level authorities are running Linux and open-source software. The German federal employment office has migrated 13,000 public workstations from Windows NT to OpenSuse, and a number of German ubran areas are using or in the process of switching to open-source software on the desktop, including Isernhagen, Leipzig, Schwäbisch Hall and Treuchtlingen.

The latest town to make the switch is Gummersbach, with a population of about 50,000 in the state of North Rhine-Westphalia, which this summer completed its switch to Linux PCs from Windows XP.

Webmaster's Commentary: 

They are correct to do so, and I don't think anything illustrates that better than the problems I am having with Autodesk 3DS MAX on Windows 7. Now, I am no longer in the animation business, but I still like to play with it and occasionally make some illustrations for this website in 3D. But as of last night I am still unable to get the Autodesk installer to work. The only thing the installation log gives me is "Error 1603" which is described by computer experts as the most useless error code ever used by Microsoft, as it simply means the installer did not work (which we already know), but fails to explain what the problem might be. Autodesk's self-help pages claim it is a Microsoft problem. Microsoft ways Autodesk screwed up. Autodesk is cranking up for their cloud-based pay-by-the-month system and apparently could not care less if customers are unable to install the stand-alone systems. I have found hundreds of web articles from people dealing with this problem, all of whom offer suggestions of things to try, none of which have worked. If I were still in the animation business, I would be going out of business by now! This is yet another way the abuses of modern fascist-style corporate behavior is wrecking the national economy as a whole, and Germany is wise to drop Microsoft and Windows products for the more stable and open-source environment. Certainly, after this experience, I will not be looking at any Autodesk products ever again!

Oct 10 07:03

Sen. Wyden: NSA Tech Spying Hurts Economy

Google Chairman Eric Schmidt and other Silicon Valley executives say controversial government spying programs are undercutting the Internet economy and want Congress to step up stalled reform.

"We're going to end up breaking the Internet," warned Google Inc.'s Schmidt during a public forum Wednesday convened by U.S. Sen. Ron Wyden, D-Ore., who has been an outspoken critic of electronic data-gathering by the National Security Agency. Schmidt and executives from Facebook Inc, Microsoft Corp. and other firms say revelations of extensive NSA surveillance are prompting governments in Europe and elsewhere to consider laws requiring that their citizens' online data be stored within their national borders.

Oct 08 15:30

Federal Court Says the Government Can Impersonate You on Social Media — and There’s Not Much You Can Do About It

In June 2013, Arquiett filed a formal complaint against Sinnigen on the grounds that her privacy was violated. However, the U.S. District Court of the Northern District of New York ruled the DEA did nothing to overstep its authority.

“Defendants admit that Plaintiff did not give express permission for the use of photographs contained on her phone on an undercover Facebook page, but state the Plaintiff implicitly consented by granting access to the information stored in her cell phone and by consenting to the use of that information to aid in an ongoing criminal investigations,” the court said.

Therefore, the court went on to state, “Plaintiff does not have a First Amendment Right to Privacy in the photographs.”

Oct 08 09:25

DEFCON Router Hacking Contest Reveals 15 Major Vulnerabilities

It's clear from the fact that the list spans many different manufacturers that the problem is not unique to any one company.

Webmaster's Commentary: 

Maybe they stumbled on one of the NSA back doors!

Oct 08 07:51

US says it can hack into foreign-based servers without warrants

The US government may hack into servers outside the country without a warrant, the Justice Department said in a new legal filling in the ongoing prosecution of Ross Ulbricht. The government believes that Ulbricht is the operator of the Silk Road illicit drug website.

Monday's filing in New York federal court centers on the legal brouhaha of how the government found the Silk Road servers in Iceland. Ulbricht said last week that the government's position—that a leaky CAPTCHA on the site's login led them to the IP address—was "implausible" and that the government (perhaps the National Security Agency) may have unlawfully hacked into the site to discover its whereabouts.

Oct 08 07:16

Twitter sues US for right to disclose government requests

Internet giant Twitter is suing the Department of Justice in hopes that the United States government will let the web company publish more details about requests made for user data.

Oct 07 07:54

Windows 10's 'built-in keylogger'? Ha ha, says Microsoft – no, it just monitors your typing

Don't want Microsoft tracking you online and collecting data on your computing habits? Then you probably shouldn't install the Windows 10 Technical Preview, Redmond says.

The interwebs were abuzz on Monday over concerns about the Terms of Use and Privacy Policy of Microsoft's newly released, not-even-beta-yet OS, with some sites going as far as to claim that Windows 10 comes with a "built-in keylogger" to watch users' every move.

Turns out these Chicken Littles were right – sort of – but according to Microsoft they should have known about the data collection from the get-go, because they agreed to it.

Oct 07 07:07

Facebook Restores my account

Webmaster's Commentary: 

We kissed and made up, apparently. :)

Oct 06 11:27

My Facebook page, myself

I did a quick search and saw that Facebook had been requiring users to send in photos of their IDs to verify their identities for at least a year.

Without thinking, I picked up my phone to write a Facebook post to see if this had happened to anyone else. But, of course, I couldn't use Facebook on my phone either. I tried to enter my password and the little wheel spun futilely. This was serious.

So, I did what anyone else would do when locked out of Facebook: I posted on Twitter.

It turned out that at least five people I knew through Twitter were locked out of their Facebook accounts Tuesday. Some were thoroughly creeped out that Facebook would demand a copy of their IDs. Some decided this was their cue to shut their accounts once and for all.

Webmaster's Commentary: 

Thinking about it.

Oct 06 11:26

Facebook apologizes for locking a ‘small portion’ of users out of their accounts

On Monday afternoon, some Facebook users reported on Twitter and Hacker News that, for some unknown reason, they were locked out of their accounts. In the error message displayed, users were prompted to upload a photo ID in order to verify that they are the account holder. The company has issued a statement on the matter, saying:

Earlier this evening, we showed an account verification message to a very small portion of our users unnecessarily. We promptly removed the messages when we discovered the error. We’re sorry for any inconvenience we may have caused.

The issue has since been resolved.

Webmaster's Commentary: 

No it hasn't because this is exactly what I am seeing on my Facebook account! And I am still waiting to hear back from Facebook about why my account (which I don't even use that much) was locked.

Oct 06 11:24

3 On Your Side: Facebook Lock-out Issue

Recently, Karina says Facebook locked her out of her account without any explanation. The page was still up, but she could not log in.

“It asked me to submit a government-issued photo ID, so I automatically assumed it was a scam,” explains Moreno.

When she contacted Facebook, she was told it was not a scam — Facebook really needed a copy of her identification.

“Why should I have to submit it to a free social networking site?” she says she asked. “It’s absolutely ridiculous.”

We found a number of people complaining online about the same issue with Facebook.

Oct 06 11:23

Facebook apologises for locking out drag queens over user names

High quality global journalism requires investment. Please share this article with others using the link below, do not cut & paste the article. See our Ts&Cs and Copyright Policy for more detail. Email ftsales.support@ft.com to buy additional rights. http://www.ft.com/cms/s/0/284e9f1c-4a1b-11e4-bc07-00144feab7de.html#ix...

Facebook has apologised to its transgender and drag queen users, after suspending a number of their accounts under a policy that required people to use their “real” names.

The social network provoked an outcry from members of the LGBT community in recent weeks after it locked out users for operating pages under their stage names, such as Sister Roma and Lil Miss Hot Mess.

Webmaster's Commentary: 

I don't think that is why Facebook just locked my account. :)

Oct 05 07:26

ISRAEL FRAMING RUSSIA FOR ANTI-U.S. HACKER ATTACKS?

There it is! From the very same Yellow Press 'paper of record' that brought you the "Weapons of Mass Destruction" lie, and the "Assad gassed little children" lie, and the "Putin invaded Ukraine" lie, and the "ISIS beheadings" lie, comes the story of the cyber-bogeymen of Putin's Russia. This baseless accusation should be dismissed immediately upon first glance. It's not even worth the dignity of a rebuttal.

We would, however, like to address the question as to who the likely culprit might be. In crime-solving, precedent is a very important factor. Here's your precedent, brought to you by Israel's Main News Service, Ha'aretz:

Oct 04 07:06

Hackers’ Attack Cracked 10 Financial Firms in Major Assault

Questions over who the hackers are and the approach of their attack concern government and industry officials. Also troubling is that about nine other financial institutions — a number that has not been previously reported — were also infiltrated by the same group of overseas hackers, according to people briefed on the matter. The hackers are thought to be operating from Russia and appear to have at least loose connections with officials of the Russian government, the people briefed on the matter said.

Oct 04 06:23

Germany handed law-protected private data to NSA for years – reports

Intelligence service BND failed to protect the private data of German citizens as it handed over internet data collected at a Frankfurt traffic hub to the US, German media report citing secret documents.

The documents cited by VDR and EDR television and the newspaper Süddeutsche Zeitung, which broke the news together, were obtained from the federal government during an ongoing parliamentary investigation into US National Security Service spying on German soil.

Just like the NSA is forbidden by the law to spy on Americans, the BND is not allowed to spy on Germans. So when last year in was revealed that the two intelligence services had been collaborating to collect communication data at the De-Cix internet exchange node in Frankfurt, the BND had to produce explanations.

Oct 03 08:24

The J. P. Morgan breach is one part of a larger crisis

J. P. Morgan’s disclosure that hackers compromised the data of more than 76 million of its consumer patrons — and 7 million small business clients — may seem stunning.

But it reflects just a sliver of the withering bombardment the U.S. financial services sector has endured for at least the past three years.

Webmaster's Commentary: 

And where is the mighty NSA in all of this? Americans footed the bill for billions of dollars and were forced to surrender their Constitutional rights to create a system of total computer surveillance which was claimed to be intended to fight crime and terror. We have been hearing month after month after month of data breaches costing companies and individuals vast amounts of money. And not a single peep from the NSA. No identified cyber-criminals gleaned from all the data kept of all computer transactions in the nation (and much of the rest of the world). Nothing. Is the NSA totally incompetent? If so, we should shut them down, refund the money and restore the Bill of Rights. Or, as some suggest, is the NSA itself breaking into these data systems to feed its addiction to your data (and make a little party cash on the side)? If so, again, we should shut them down, refund the money and restore the Bill of Rights.

Oct 03 06:57

US Attorney General urges tech companies to leave back doors open on gadgets for police

US Attorney General Eric H. Holder Jr. on Tuesday urged tech companies not to lock police out of popular consumer gadgets, lest law enforcement's efforts to nab kidnappers or child predators be stymied.

Webmaster's Commentary: 

"I mean, sure, a lot of Americans, millions really, will have their bank accounts broken into and stuff, but it will be worth it to allow the police unfettered access to nude photos of their wives and daughters, I mean, criminals."

Oct 02 14:33

JPMorgan Says Data Breach Affected 76 Million Households

JPMorgan Chase & Co. (JPM), the biggest U.S. bank, said a previously disclosed data breach of its systems affected 76 million households and 7 million small businesses.

Customer names, addresses, phone numbers and e-mail addresses were taken, the New York-based bank said today in a regulatory filing. Internal bank information “relating to such users” also was compromised, the company said.

“There is no evidence that account information for such affected customers -– account numbers, passwords, user IDs, dates of birth or Social Security numbers –- was compromised during this attack,” the company said.

Webmaster's Commentary: 

Suuuure. The hackers broke in to steal information that was already public. We believe that!

And where is the NSA during all this computer crime?

Oct 01 08:30

Windows 8 Was So Bad That Microsoft Is Skipping Windows 9

On April 1, 2013, Infoworld published an article headlined, “Microsoft skips ‘too good’ Windows 9, jumps to Windows 10.’” A disclaimer at the top clarified that the story was an April Fool’s Joke, but it now appears that wasn’t necessary.

On Tuesday, Microsoft announced that it will indeed be skipping Windows 9 and jumping to Windows 10 as the name for its next operating system. No joke.

Sep 30 10:17

Grooveshark Found Guilty of Massive Copyright Infringement…

If you’re a Grooveshark user, you should probably start backing up your collection. In a decision released Monday, the United States District Court in Manhattan has found Grooveshark guilty of massive copyright infringement based on a preponderance of internal emails, statements from former top executives, direct evidence from internal logs, and willfully deleted files and source code.

Specifically, CEO Samuel Tarantino and co-founder and CTO Josh Greenberg will face the heaviest charges, which remain to be determined. The others were just scared rats: earlier, a number of top Grooveshark executives were removed from the defendant list in a settlement agreement, which now appears part of a clever exchange for cooperation. Oh and did they talk…

Sep 30 09:15

Trust in cloud security at all-time low: Execs still betting on the cloud

A new report on IT decision makers shows enterprise trust in cloud security at its lowest -- yet they're flocking to use it. OpenStack's Matt Joyce thinks it's fair to ask if everyone's gone nuts.

Sep 29 12:38

AT&T’s congestion magically disappears when it’s signing up new customers

AT&T yesterday began offering “double the data for the same price” to new customers and existing customers who sign new contracts, apparently forgetting that its network is so congested that speeds must be throttled when people use too much data.

Like other carriers, AT&T slows the speeds of certain users when the network is congested. Such network management is a necessary evil that can benefit the majority of customers when used to ensure that everyone can connect to the network. But as Federal Communications Commission Chairman Tom Wheeler has argued, the carriers’ selective enforcement of throttling shows that it can also be used to boost revenue by pushing subscribers onto pricier plans.

Sep 26 11:56

Apple shares lose £12bn as iPhone 6 is hit by new fault: Stock loses all gains it had made since launch of device last week

More than £12billion was wiped off the value of Apple yesterday after its latest iPhone was rendered unusable by a software update.

The 3.5 per cent drop in the share price meant the company’s stock lost all gains it had made since launching the iPhone 6 and iPhone 6 Plus last week.

Users of the brand new devices were cut off from telephone signal and data networks, meaning they could not make or receive calls and text messages or go on the internet away from wifi signal.

The update for the iOS 8.0.1 operating system also killed off the Touch ID function, a much-trumpeted feature that allows users to log on to their phone using their fingerprint.

Sep 26 09:25

Vaccine wars: the censoring of Rob Schneider

Yesterday, I reported on State Farm dropping Rob Schneider from their TV ads because he’s alerted people to vaccine dangers.

Because he has a view about vaccines that departs from the norm.

“Punch a hole in consensus reality and you can’t be a spokesman for our products.”

“Cause a ripple among the sleeping populace and you’re out.”

What’s next?

Well, I’ll tell you what could be next, based on the fact that the Internet runs via an interlocking system of commercial companies.

Some companies that facilitate emails to large lists, and website hosts, to say nothing of Facebook, which is already censoring information, could decide, under pressure, or voluntarily, to close down “controversial data.”

Sep 26 09:21

FBI blasts Apple, Google for locking police out of phones

Comey added that FBI officials already have made initial contact with the two companies, which announced their new smartphone encryption initiatives last week. He said he could not understand why companies would “market something expressly to allow people to place themselves beyond the law.”

Webmaster's Commentary: 

We would not be in this mess had "The Law" not placed itself beyond the Constitution!

Of course, this could also be a bluff to lull you into a false sense of privacy with these new phones and stimulate sales!

Sep 26 08:30

Photos: Robots and drones - here's what Intel's answer to the Raspberry Pi can do

The maker movement is thriving – with hobbyist technologists across the world packing low-cost computers and sensors into bespoke electronics that fuse art and technology.

The market is dominated by single-board computers and microcontrollers such as Raspberry Pi and Arduino, but new competitors are arriving all the time.

Intel's entry is Edison, a tiny single-board computers, little bigger than a postage stamp, measuring just 3.55 x 2.5 x 0.39cm.

Although it will be compared with the $35 Raspberry Pi model B+, it is designed to work as an embedded Linux board for electronic prototypes and products, rather than as a small-board computer running a full-blown Linux distro.

Webmaster's Commentary: 

I love technology when it works, and am old enough that some of the newer advances keep me in awe when I remember what I started with. This new desktop I built easily outpaces the Cray Supercomputers of the 1980s. Of course, back when computers were slow, software had to be efficient, but I have observed that as processors got faster, software companies got lazy, writing bloated, inefficient code, relying on the advances in hardware to keep their products usable.

Sep 26 05:28

Alternative Media Success Panics NeoCons

While most old people still cling to the corporate media worldview, the young are skewing ever-harder toward alternative perspectives. In Thursday’s Scottish independence referendum, for example, the London Daily Mirror reported that 71% of 16-17 year olds voted “yes” while those over 65 voted “no” by a 73%-27% margin.

Why does the vast majority of Scottish young people favor independence, while an equally crushing majority of old people opposes it?

Short answer: Old people still believe BBC propaganda, while the young do not.

Sep 25 11:41

Obamacare Website Costs Top $2 Billion, Almost Triple Government Estimates

What's the opposite of government efficiency? In a double-take-instigating headline, the federal government’s Obamacare enrollment system has cost about $2.1 billion so far, according to a Bloomberg Government analysis of contracts related to the project. BGOV’s analysis shows that costs for both healthcare.gov and the broader reform effort are far greater than anything publicly discussed. However, that pales into insignificance when considering health reform has cost American taxpayers $73 billion in the last four years... and counting.

Sep 25 11:39

Major Sell Program Trips 50-DMA, Sends Stocks Sliding