COMPUTERS/INTERNET/SECURITY | WHAT REALLY HAPPENED


COMPUTERS/INTERNET/SECURITY

Oct 23 10:37

ZION’S INTERNET WAR

Over the past few years more than 5 million readers have been directed to this Blog via links at What Really Happened. These people are not strangers to what is known as a DOS Attack which renders a particular site ‘unavailable’ for a given time period. For years now, WRH readers have occasionally been denied access to the site because of these attacks. They have not been the only victim of these frequent attacks, other wonderful sites such as Uruknet have also suffered from them. One can show their appreciation to these sites by visiting them frequently and even better, by contributing financially to them. Their continued existence depends on your support.

Oct 23 10:15

'PhotoMath' app uses recognition technology to solve your math homework for you

Webmaster's Commentary: 

Works better than Common Core!

Oct 23 07:00

It’s Not Just Spying – How The NSA Has Turned Into A Giant Profit Center For Corrupt Insiders

Last week, two very important stories came out; one from Reuters and the other from Buzzfeed. They both zero in on how current NSA employees are using their expertise and connections to make big money in the private sector while still working at the NSA. Let’s start with the Reuters story, which covers former NSA-head Keith Alexander’s business relationship with the NSA’s current Chief Technical Officer, Patrick Dowd.

Before we get into the meat of this story, I want to set the stage with a little background. In case you forgot, Keith Alexander launched his own cyber-security firm, IronNet Cybersecurity Inc., earlier this year.

Oct 22 09:16

Fake news sites are using Facebook to spread Ebola panic

These sites claim to be satirical but lack even incompetent attempts at anything resembling humor. They’re really fake news sites, posting scary stories and capitalizing on the decontextualization of Facebook’s news feed to trick people into sharing them widely. On Facebook, where stories look pretty much the same no matter what publication they’re coming from, and where news feeds are already full of panicked school closures, infected ISIS bogeymen, and DIY hazmat suits, the stories can fool inattentive readers into thinking they’re real. Panicked, they share, spreading the rumor farther and sending more readers to the story, generating ad revenue for the site.

It’s proving to be a very successful strategy, particularly for a site called the National Report, which saw its traffic spike to 2 million unique visitors yesterday according to Quantcast.

Oct 20 15:59

Microsoft warns users to kill botched KB 2949927 patch

After yanking botched patch KB 2949927, which failed to install on some machines, Microsoft is now warning users to uninstall the update -- even though there has been no mention of problems after the patch is installed.

Microsoft released KB 2949927 as part of its ill-fated batch of October "Update Tuesday" patches. On Wednesday I wrote about the first patch that showed widespread problems, KB 2952664, which failed to install with error 80242016. I followed up on Thursday with details about four more patches causing problems:

Oct 20 13:19

Nearly half of cardholders likely to avoid stores hit by data breaches

As data breaches exposing consumer credit card, debit card and other personal information become more common, nearly half of cardholding shoppers say they're reluctant this holiday season to return to stores that have been hacked, according to a new survey by CreditCards.com.

Forty-five percent of respondents with credit or debit cards said they would definitely or probably avoid one of their regular stores over the holidays if that retailer had experienced a data breach. Sixteen percent said they definitely would not return to a retailer if the store had been hacked and 29 percent said they probably would not shop at such stores. Just one in eight said they are more likely to shop with credit cards this season.

Oct 19 07:00

FBI Director Warns Google and Apple "If You Don't Decrypt Phones, We'll Do It For You"

The Fourth Amendment to the US Constitution is crystal clear in meaning.

The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no warrants shall issue, but upon probable cause, supported by oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.

FBI Director, James Comey, an Obama appointment, does not give a damn what the Constitution says.

Oct 18 09:29

Kickstarter Freezes Anonabox Privacy Router Project for Misleading Funders

On Friday afternoon Kickstarter suspended the crowdfunding campaign for Anonabox, an initiative to sell a tiny, $45 router that would run all a user’s online traffic over the anonymity network Tor. The idea tapped into an explosive demand for simple privacy technology, and earned more than 10 times its modest goal in hours. But as funders shoveled more than half a million dollars into the project, they also began to pick apart Anonabox’s claims of creating custom hardware, as well as the promised security of its software. Soon, many were calling for the project to be cancelled, and asked others to report its shortfalls to Kickstarter staff, who now say they’ll cancel all investors’ pledges.1

Oct 18 08:00

Iran expert helping develop IoT platform

An Iranian expert and postdoctoral fellow at the University of British Colombia is helping develop a revolutionary platform for a new technology called the Internet of Things (IoT).

Ali Kashani, the Vancouver-based Energy Aware Technology’s vice president of software, is helping the company develop the Neurio platform, billed as a revolutionary new technology that makes an ordinary home smart.

The evolution of the IoT involves the embedding of sensors in physical objects. The sensors are, in turn, linked through networks to computers that analyze the vast amounts of data they produce.

Neurio’s development, however, has drawn upon the fact that all electronic devices have a power signature, hence just enlisting the help of a Wi-Fi power sensor.

Kashani has described Neurio as the “brain of the home,” not a “fancy” remote control, like other smart-home products.

Oct 18 08:00

Microsoft to cut 18K jobs worldwide

The US software giant Microsoft has announced plans to slash 18,000 jobs from its global workforce in 2015, the largest cuts in the company’s 39-year history.

Oct 18 07:00

Obama’s credit card denied at restaurant on New York City trip

President Obama came perilously close to having to wash some dishes on his recent trip to New York.

Mr. Obama revealed Friday that his credit card was rejected when he went to pay for his meal at a New York restaurant during the U.N. General Assembly gathering last month.

“Apparently they thought there was some fraud going on,” Mr. Obama joked at a meeting Friday with employees of the Consumer Financial Protection Board, adding that “even I am affected” by the difficulties of dealing with the American financial system. The remarks were picked up by the C-SPAN feed of the event.

Oct 17 12:45

Thousands Of MacBooks Made In 2011 Have Self-Immolating Graphics Cards

Models of Apple’s higher-end portable computer, the MacBook Pro, have come to the end of their three-year extended warranties. That leaves their owners at the mercy of Apple when something goes wrong, and at minimum thousands of the computers have had the same computer-killing problem with their graphics processing unit. Apple has not publicly admitted that the machines have a problem.

Of course, MacBook Pro owners are people who have spent at least $2,500 on a computer designed for serious graphics work. That means that they’re probably media professionals or serious amateurs, and able to make YouTube videos making fun of the situation with really great production values.

Oct 17 08:33

FBI director to citizens: Let us spy on you

The expanding options for communicating over the Internet and the increasing adoption of encryption technologies could leave law enforcement agents “in the dark” and unable to collect evidence against criminals, the Director of the FBI said in a speech on Thursday.

Webmaster's Commentary: 

I am going to take it from the above that FBI Director James B. Comey is tacitly admitting that our series of NSA encryption challenges did in fact defeat the NSA cryptographers.

So, Comey is trying to revive an idea from 1995 and declare that any encryption system not authorized for use by the government (meaning not including a back door for them to use) is a "weapon" whose purpose must be assumed to be criminal, and therefore punishable. Better copy off those code snippets in my challenge while you still can!

The new attitude is "Use A Secret Decoder Ring: Go To JAIL!"



The government wants us to trust them that they are only going to spy on criminals, but we already know this is a lie. The FBI and other US Intelligence agencies have been caught stealing personal data for cronies of the President and their own personal profit. The Fourth Amendment says that the government cannot peek into your personal life absent an actual accusation of a crime and given the tsunami of evidence that the government is not complying with its Constitutional limits, We The People have every right to secure our business secrets, photos of our scantily clad partners, my Aunt Mary's Top Secret Chocolate Chip Cookie recipe, and everything else from a government that is itself the biggest criminal organization in the country.

Oct 16 05:21

YouTube has potentially infected over 100,000 users during the past 30 days

YouTube has become a daily habit for millions all over the world, but it looks like there has been some malicious activity on the website -- which may have affected more than 100,000 users over a 30 day period.

According to Trend Micro, they have been monitoring the activity on YouTube over the past couple of months and have found that the attack comes in the form of ads that are present on the site. While the ads themselves have no malicious content, the issue seems to occur when the ad is clicked. Although these ads should be monitored and screened by YouTube, some have seemed to slip through the cracks, redirecting to malicious websites that could cause infections. While this all sounds fairly simple, the actually process for passing off a malicious site for something legitimate is fairly complex.

Oct 14 09:12

Chat logs reveal FBI informant’s role in hacking of Sun newspaper

The FBI is facing questions over its role in a 2011 hacking attack on Rupert Murdoch’s Sun newspaper in the UK after the publication of chat logs showed that a man acting as an agency informant played a substantial role in the operation.

In July 2011, a group of hackers known as Lulzsec – an offshoot of Anonymous – posted a fake story about the death of Murdoch, penetrated several News International (now News UK) corporate sites, and claimed to have obtained gigabytes of material from the company’s servers.

Oct 12 08:29

Edward Snowden Doc 'Citizenfour' Reveals Existence of Second NSA Whistleblower

In the key scene, journalist Glenn Greenwald visits Snowden at a hotel room in Moscow. Fearing they are being taped, Greenwald communicates with Snowden via pen and paper.

While some of the exchanges are blurred for the camera, it becomes clear that Greenwald wants to convey that another government whistleblower -- higher in rank than Snowden -- has come forward.

Oct 10 07:55

It's not just Munich: Open source gains new ground in Germany

While Munich city council's decision to replace Microsoft software with open-source alternatives made headlines, it is one of a number of municipalities across Germany to make such a move.

Across Germany at the national and local level authorities are running Linux and open-source software. The German federal employment office has migrated 13,000 public workstations from Windows NT to OpenSuse, and a number of German ubran areas are using or in the process of switching to open-source software on the desktop, including Isernhagen, Leipzig, Schwäbisch Hall and Treuchtlingen.

The latest town to make the switch is Gummersbach, with a population of about 50,000 in the state of North Rhine-Westphalia, which this summer completed its switch to Linux PCs from Windows XP.

Webmaster's Commentary: 

They are correct to do so, and I don't think anything illustrates that better than the problems I am having with Autodesk 3DS MAX on Windows 7. Now, I am no longer in the animation business, but I still like to play with it and occasionally make some illustrations for this website in 3D. But as of last night I am still unable to get the Autodesk installer to work. The only thing the installation log gives me is "Error 1603" which is described by computer experts as the most useless error code ever used by Microsoft, as it simply means the installer did not work (which we already know), but fails to explain what the problem might be. Autodesk's self-help pages claim it is a Microsoft problem. Microsoft ways Autodesk screwed up. Autodesk is cranking up for their cloud-based pay-by-the-month system and apparently could not care less if customers are unable to install the stand-alone systems. I have found hundreds of web articles from people dealing with this problem, all of whom offer suggestions of things to try, none of which have worked. If I were still in the animation business, I would be going out of business by now! This is yet another way the abuses of modern fascist-style corporate behavior is wrecking the national economy as a whole, and Germany is wise to drop Microsoft and Windows products for the more stable and open-source environment. Certainly, after this experience, I will not be looking at any Autodesk products ever again!

Oct 10 07:03

Sen. Wyden: NSA Tech Spying Hurts Economy

Google Chairman Eric Schmidt and other Silicon Valley executives say controversial government spying programs are undercutting the Internet economy and want Congress to step up stalled reform.

"We're going to end up breaking the Internet," warned Google Inc.'s Schmidt during a public forum Wednesday convened by U.S. Sen. Ron Wyden, D-Ore., who has been an outspoken critic of electronic data-gathering by the National Security Agency. Schmidt and executives from Facebook Inc, Microsoft Corp. and other firms say revelations of extensive NSA surveillance are prompting governments in Europe and elsewhere to consider laws requiring that their citizens' online data be stored within their national borders.

Oct 08 15:30

Federal Court Says the Government Can Impersonate You on Social Media — and There’s Not Much You Can Do About It

In June 2013, Arquiett filed a formal complaint against Sinnigen on the grounds that her privacy was violated. However, the U.S. District Court of the Northern District of New York ruled the DEA did nothing to overstep its authority.

“Defendants admit that Plaintiff did not give express permission for the use of photographs contained on her phone on an undercover Facebook page, but state the Plaintiff implicitly consented by granting access to the information stored in her cell phone and by consenting to the use of that information to aid in an ongoing criminal investigations,” the court said.

Therefore, the court went on to state, “Plaintiff does not have a First Amendment Right to Privacy in the photographs.”

Oct 08 09:25

DEFCON Router Hacking Contest Reveals 15 Major Vulnerabilities

It's clear from the fact that the list spans many different manufacturers that the problem is not unique to any one company.

Webmaster's Commentary: 

Maybe they stumbled on one of the NSA back doors!

Oct 08 07:51

US says it can hack into foreign-based servers without warrants

The US government may hack into servers outside the country without a warrant, the Justice Department said in a new legal filling in the ongoing prosecution of Ross Ulbricht. The government believes that Ulbricht is the operator of the Silk Road illicit drug website.

Monday's filing in New York federal court centers on the legal brouhaha of how the government found the Silk Road servers in Iceland. Ulbricht said last week that the government's position—that a leaky CAPTCHA on the site's login led them to the IP address—was "implausible" and that the government (perhaps the National Security Agency) may have unlawfully hacked into the site to discover its whereabouts.

Oct 08 07:16

Twitter sues US for right to disclose government requests

Internet giant Twitter is suing the Department of Justice in hopes that the United States government will let the web company publish more details about requests made for user data.

Oct 07 07:54

Windows 10's 'built-in keylogger'? Ha ha, says Microsoft – no, it just monitors your typing

Don't want Microsoft tracking you online and collecting data on your computing habits? Then you probably shouldn't install the Windows 10 Technical Preview, Redmond says.

The interwebs were abuzz on Monday over concerns about the Terms of Use and Privacy Policy of Microsoft's newly released, not-even-beta-yet OS, with some sites going as far as to claim that Windows 10 comes with a "built-in keylogger" to watch users' every move.

Turns out these Chicken Littles were right – sort of – but according to Microsoft they should have known about the data collection from the get-go, because they agreed to it.

Oct 07 07:07

Facebook Restores my account

Webmaster's Commentary: 

We kissed and made up, apparently. :)

Oct 06 11:27

My Facebook page, myself

I did a quick search and saw that Facebook had been requiring users to send in photos of their IDs to verify their identities for at least a year.

Without thinking, I picked up my phone to write a Facebook post to see if this had happened to anyone else. But, of course, I couldn't use Facebook on my phone either. I tried to enter my password and the little wheel spun futilely. This was serious.

So, I did what anyone else would do when locked out of Facebook: I posted on Twitter.

It turned out that at least five people I knew through Twitter were locked out of their Facebook accounts Tuesday. Some were thoroughly creeped out that Facebook would demand a copy of their IDs. Some decided this was their cue to shut their accounts once and for all.

Webmaster's Commentary: 

Thinking about it.

Oct 06 11:26

Facebook apologizes for locking a ‘small portion’ of users out of their accounts

On Monday afternoon, some Facebook users reported on Twitter and Hacker News that, for some unknown reason, they were locked out of their accounts. In the error message displayed, users were prompted to upload a photo ID in order to verify that they are the account holder. The company has issued a statement on the matter, saying:

Earlier this evening, we showed an account verification message to a very small portion of our users unnecessarily. We promptly removed the messages when we discovered the error. We’re sorry for any inconvenience we may have caused.

The issue has since been resolved.

Webmaster's Commentary: 

No it hasn't because this is exactly what I am seeing on my Facebook account! And I am still waiting to hear back from Facebook about why my account (which I don't even use that much) was locked.

Oct 06 11:24

3 On Your Side: Facebook Lock-out Issue

Recently, Karina says Facebook locked her out of her account without any explanation. The page was still up, but she could not log in.

“It asked me to submit a government-issued photo ID, so I automatically assumed it was a scam,” explains Moreno.

When she contacted Facebook, she was told it was not a scam — Facebook really needed a copy of her identification.

“Why should I have to submit it to a free social networking site?” she says she asked. “It’s absolutely ridiculous.”

We found a number of people complaining online about the same issue with Facebook.

Oct 06 11:23

Facebook apologises for locking out drag queens over user names

High quality global journalism requires investment. Please share this article with others using the link below, do not cut & paste the article. See our Ts&Cs and Copyright Policy for more detail. Email ftsales.support@ft.com to buy additional rights. http://www.ft.com/cms/s/0/284e9f1c-4a1b-11e4-bc07-00144feab7de.html#ix...

Facebook has apologised to its transgender and drag queen users, after suspending a number of their accounts under a policy that required people to use their “real” names.

The social network provoked an outcry from members of the LGBT community in recent weeks after it locked out users for operating pages under their stage names, such as Sister Roma and Lil Miss Hot Mess.

Webmaster's Commentary: 

I don't think that is why Facebook just locked my account. :)

Oct 05 07:26

ISRAEL FRAMING RUSSIA FOR ANTI-U.S. HACKER ATTACKS?

There it is! From the very same Yellow Press 'paper of record' that brought you the "Weapons of Mass Destruction" lie, and the "Assad gassed little children" lie, and the "Putin invaded Ukraine" lie, and the "ISIS beheadings" lie, comes the story of the cyber-bogeymen of Putin's Russia. This baseless accusation should be dismissed immediately upon first glance. It's not even worth the dignity of a rebuttal.

We would, however, like to address the question as to who the likely culprit might be. In crime-solving, precedent is a very important factor. Here's your precedent, brought to you by Israel's Main News Service, Ha'aretz:

Oct 04 07:06

Hackers’ Attack Cracked 10 Financial Firms in Major Assault

Questions over who the hackers are and the approach of their attack concern government and industry officials. Also troubling is that about nine other financial institutions — a number that has not been previously reported — were also infiltrated by the same group of overseas hackers, according to people briefed on the matter. The hackers are thought to be operating from Russia and appear to have at least loose connections with officials of the Russian government, the people briefed on the matter said.

Oct 04 06:23

Germany handed law-protected private data to NSA for years – reports

Intelligence service BND failed to protect the private data of German citizens as it handed over internet data collected at a Frankfurt traffic hub to the US, German media report citing secret documents.

The documents cited by VDR and EDR television and the newspaper Süddeutsche Zeitung, which broke the news together, were obtained from the federal government during an ongoing parliamentary investigation into US National Security Service spying on German soil.

Just like the NSA is forbidden by the law to spy on Americans, the BND is not allowed to spy on Germans. So when last year in was revealed that the two intelligence services had been collaborating to collect communication data at the De-Cix internet exchange node in Frankfurt, the BND had to produce explanations.

Oct 03 08:24

The J. P. Morgan breach is one part of a larger crisis

J. P. Morgan’s disclosure that hackers compromised the data of more than 76 million of its consumer patrons — and 7 million small business clients — may seem stunning.

But it reflects just a sliver of the withering bombardment the U.S. financial services sector has endured for at least the past three years.

Webmaster's Commentary: 

And where is the mighty NSA in all of this? Americans footed the bill for billions of dollars and were forced to surrender their Constitutional rights to create a system of total computer surveillance which was claimed to be intended to fight crime and terror. We have been hearing month after month after month of data breaches costing companies and individuals vast amounts of money. And not a single peep from the NSA. No identified cyber-criminals gleaned from all the data kept of all computer transactions in the nation (and much of the rest of the world). Nothing. Is the NSA totally incompetent? If so, we should shut them down, refund the money and restore the Bill of Rights. Or, as some suggest, is the NSA itself breaking into these data systems to feed its addiction to your data (and make a little party cash on the side)? If so, again, we should shut them down, refund the money and restore the Bill of Rights.

Oct 03 06:57

US Attorney General urges tech companies to leave back doors open on gadgets for police

US Attorney General Eric H. Holder Jr. on Tuesday urged tech companies not to lock police out of popular consumer gadgets, lest law enforcement's efforts to nab kidnappers or child predators be stymied.

Webmaster's Commentary: 

"I mean, sure, a lot of Americans, millions really, will have their bank accounts broken into and stuff, but it will be worth it to allow the police unfettered access to nude photos of their wives and daughters, I mean, criminals."

Oct 02 14:33

JPMorgan Says Data Breach Affected 76 Million Households

JPMorgan Chase & Co. (JPM), the biggest U.S. bank, said a previously disclosed data breach of its systems affected 76 million households and 7 million small businesses.

Customer names, addresses, phone numbers and e-mail addresses were taken, the New York-based bank said today in a regulatory filing. Internal bank information “relating to such users” also was compromised, the company said.

“There is no evidence that account information for such affected customers -– account numbers, passwords, user IDs, dates of birth or Social Security numbers –- was compromised during this attack,” the company said.

Webmaster's Commentary: 

Suuuure. The hackers broke in to steal information that was already public. We believe that!

And where is the NSA during all this computer crime?

Oct 01 08:30

Windows 8 Was So Bad That Microsoft Is Skipping Windows 9

On April 1, 2013, Infoworld published an article headlined, “Microsoft skips ‘too good’ Windows 9, jumps to Windows 10.’” A disclaimer at the top clarified that the story was an April Fool’s Joke, but it now appears that wasn’t necessary.

On Tuesday, Microsoft announced that it will indeed be skipping Windows 9 and jumping to Windows 10 as the name for its next operating system. No joke.

Sep 30 10:17

Grooveshark Found Guilty of Massive Copyright Infringement…

If you’re a Grooveshark user, you should probably start backing up your collection. In a decision released Monday, the United States District Court in Manhattan has found Grooveshark guilty of massive copyright infringement based on a preponderance of internal emails, statements from former top executives, direct evidence from internal logs, and willfully deleted files and source code.

Specifically, CEO Samuel Tarantino and co-founder and CTO Josh Greenberg will face the heaviest charges, which remain to be determined. The others were just scared rats: earlier, a number of top Grooveshark executives were removed from the defendant list in a settlement agreement, which now appears part of a clever exchange for cooperation. Oh and did they talk…

Sep 30 09:15

Trust in cloud security at all-time low: Execs still betting on the cloud

A new report on IT decision makers shows enterprise trust in cloud security at its lowest -- yet they're flocking to use it. OpenStack's Matt Joyce thinks it's fair to ask if everyone's gone nuts.

Sep 29 12:38

AT&T’s congestion magically disappears when it’s signing up new customers

AT&T yesterday began offering “double the data for the same price” to new customers and existing customers who sign new contracts, apparently forgetting that its network is so congested that speeds must be throttled when people use too much data.

Like other carriers, AT&T slows the speeds of certain users when the network is congested. Such network management is a necessary evil that can benefit the majority of customers when used to ensure that everyone can connect to the network. But as Federal Communications Commission Chairman Tom Wheeler has argued, the carriers’ selective enforcement of throttling shows that it can also be used to boost revenue by pushing subscribers onto pricier plans.

Sep 26 11:56

Apple shares lose £12bn as iPhone 6 is hit by new fault: Stock loses all gains it had made since launch of device last week

More than £12billion was wiped off the value of Apple yesterday after its latest iPhone was rendered unusable by a software update.

The 3.5 per cent drop in the share price meant the company’s stock lost all gains it had made since launching the iPhone 6 and iPhone 6 Plus last week.

Users of the brand new devices were cut off from telephone signal and data networks, meaning they could not make or receive calls and text messages or go on the internet away from wifi signal.

The update for the iOS 8.0.1 operating system also killed off the Touch ID function, a much-trumpeted feature that allows users to log on to their phone using their fingerprint.

Sep 26 09:25

Vaccine wars: the censoring of Rob Schneider

Yesterday, I reported on State Farm dropping Rob Schneider from their TV ads because he’s alerted people to vaccine dangers.

Because he has a view about vaccines that departs from the norm.

“Punch a hole in consensus reality and you can’t be a spokesman for our products.”

“Cause a ripple among the sleeping populace and you’re out.”

What’s next?

Well, I’ll tell you what could be next, based on the fact that the Internet runs via an interlocking system of commercial companies.

Some companies that facilitate emails to large lists, and website hosts, to say nothing of Facebook, which is already censoring information, could decide, under pressure, or voluntarily, to close down “controversial data.”

Sep 26 09:21

FBI blasts Apple, Google for locking police out of phones

Comey added that FBI officials already have made initial contact with the two companies, which announced their new smartphone encryption initiatives last week. He said he could not understand why companies would “market something expressly to allow people to place themselves beyond the law.”

Webmaster's Commentary: 

We would not be in this mess had "The Law" not placed itself beyond the Constitution!

Of course, this could also be a bluff to lull you into a false sense of privacy with these new phones and stimulate sales!

Sep 26 08:30

Photos: Robots and drones - here's what Intel's answer to the Raspberry Pi can do

The maker movement is thriving – with hobbyist technologists across the world packing low-cost computers and sensors into bespoke electronics that fuse art and technology.

The market is dominated by single-board computers and microcontrollers such as Raspberry Pi and Arduino, but new competitors are arriving all the time.

Intel's entry is Edison, a tiny single-board computers, little bigger than a postage stamp, measuring just 3.55 x 2.5 x 0.39cm.

Although it will be compared with the $35 Raspberry Pi model B+, it is designed to work as an embedded Linux board for electronic prototypes and products, rather than as a small-board computer running a full-blown Linux distro.

Webmaster's Commentary: 

I love technology when it works, and am old enough that some of the newer advances keep me in awe when I remember what I started with. This new desktop I built easily outpaces the Cray Supercomputers of the 1980s. Of course, back when computers were slow, software had to be efficient, but I have observed that as processors got faster, software companies got lazy, writing bloated, inefficient code, relying on the advances in hardware to keep their products usable.

Sep 26 05:28

Alternative Media Success Panics NeoCons

While most old people still cling to the corporate media worldview, the young are skewing ever-harder toward alternative perspectives. In Thursday’s Scottish independence referendum, for example, the London Daily Mirror reported that 71% of 16-17 year olds voted “yes” while those over 65 voted “no” by a 73%-27% margin.

Why does the vast majority of Scottish young people favor independence, while an equally crushing majority of old people opposes it?

Short answer: Old people still believe BBC propaganda, while the young do not.

Sep 25 11:41

Obamacare Website Costs Top $2 Billion, Almost Triple Government Estimates

What's the opposite of government efficiency? In a double-take-instigating headline, the federal government’s Obamacare enrollment system has cost about $2.1 billion so far, according to a Bloomberg Government analysis of contracts related to the project. BGOV’s analysis shows that costs for both healthcare.gov and the broader reform effort are far greater than anything publicly discussed. However, that pales into insignificance when considering health reform has cost American taxpayers $73 billion in the last four years... and counting.

Sep 25 11:39

Major Sell Program Trips 50-DMA, Sends Stocks Sliding

A "huge" institutional sell order, covering almost 200 individual stocks, is rumored to have been responsible for getting this morning's weakness across stocks going as equity indices catch down to bonds and credit. The S&P 500 broke key support at its 50-day moving-average (for first time in 2 months) and is back at 6 week lows. The Russell 2000 is now down 4.25% from the FOMC meeting last week...

Sep 25 09:59

Survey: Online trolls are 'everyday sadists'

If you've ever complained that the trolls junking up online comment sections are a bunch of sadistic psychopaths, you might be onto something.

An online survey by a group of Canadian researchers suggests that Internet trolls are more likely than others to show signs of sadism, psychopathy and "Machiavellianism": a disregard for morality and tendency to manipulate or exploit others.

Webmaster's Commentary: 

We kinda figured that out.

Sep 25 09:24

Do not open any emails with attachment "balance statement.htm!" It is malware

Webmaster's Commentary: 

Don't bother clicking the link to the FBI's list of current scams. It is not listed there. But I received no less than seven of these under various subject lines today, two of which were explicitly sent to wrh@whatreallyhappened.com. The rest just had "recipients" in the "to:" field. Examination of the htm file shows it loads a bunch of malware onto your computer.

Needless to say, I am making this threat known as a public service to our readers ... and beat the NSA to the announcement as well! :)

Sep 25 08:51

PR Firm Pulls ‘Emma Watson Naked Pics’ False Flag to Push For Internet Censorship

A PR firm has admitted to carrying out an online false flag against the 4chan forum in which it blamed the website for a threat to release naked pictures of actress Emma Watson as part of an appeal to President Barack Obama to censor the Internet.

Webmaster's Commentary: 

Anyone foolish enough to take nude pictures and put them on the web is just asking for trouble, and the reality is that more than a few stars intentionally plant nude pictures of themselves where they will be "discovered" as part of the campaign to increase their fame and "bankability." Setting that aside, this whole episode reminds us that the government and corporate media persist in trying to find ways to shut down the open and free internet and turn it into just another government and corporate controlled content and propaganda delivery system. Public Relations firms are paid vast amounts of money to engage in activities which for normal civilians would be punishable as crimes.

Apr 05 12:43

Critical Infrastructure Exploits Being Packaged In Hacker Tools

In a bid to make critical infrastructure vendors to take cyber security threats seriously, researchers release Stuxnet inspired exploits.

Apr 05 09:30

US Launches Top Secret Rocket

The United States has successfully launched a multi-million-dollar rocket carrying an undisclosed cargo believed to be a top-secret spy satellite.

Apr 05 08:32

After Car-Tracking Smackdown, Feds Turn to Warrantless Phone Tracking

Prosectors are shifting their focus to warrantless cell-tower locational tracking of suspects in the wake of a Supreme Court ruling that law enforcement should acquire probable-cause warrants from judges to affix GPS devices to vehicles and monitor their every move, according to court records.

Apr 05 08:30

Working Quantum Computer Built Inside A Diamond

Scientists have created a working quantum computer inside a diamond that includes protection against decoherence noise that prevents it from functioning properly.

Apr 05 08:00

CIA Home Invasion: Smart TVs and the 'Internet of Things'

Brandon Turbeville
Activist Post

Recently, CIA Director David Petraeus made headlines with a speech given at the summit for In-Q-Tel, the CIA’s venture capital firm. In this talk, Petraeus discussed the emerging “internet of things” and the implications it will have for increased levels of surveillance. Petraeus explained that, because of the rise of gadgets which are connected and controlled by apps, intelligence agencies will no longer need to place spy devices inside your home – you will do it for them.

Apr 05 05:17

'Rude awakening' for Mac users as cyber attack infects 550,000 of Apple's 'virus free' machines - with UK and U.S. worst hit

A new computer trojan has infected 550,000 machines running Apple's Mac OS X - and many could still be vulnerable.

The infected machines are now part of a 'botnet' of zombie machines which can be controlled by cyber criminals and 'told' to download new malicious software.

The attack has been described as a 'rude awakening' for Mac users.

Apr 04 13:57

You Tube Now Banning Videos Critical Of Global Warming Alarmism

YouTube has censored a video critical of a global warming alarmists, who says global warming skeptics need to be treated, as a violation of community guidelines.

Apr 04 11:18

Worse Than SOPA: New CISPA Cybersecurity Bill Will Censor The Web

A new cybersecurity bill will allow the government to bypass privacy laws to monitor, censor, and stop any online activity deemed disruptive to the government or private parties.

Apr 04 11:05

Fascism Comes to the Internet: Introducing CISPA

Joe Wright
Activist Post

After nearly unprecedented pushback against bills SOPA and PIPA, their apparent defeat cannot yet be claimed. Most skeptics presumed that the defeat of the aforementioned would only serve to offer a compromised "SOPA light" at some point to circumvent criticism over government censorship. Well, it didn't take long...

Apr 04 09:55

Even worse than SOPA: New CISPA cybersecurity bill will censor the Web

H.R. 3523, a piece of legislation dubbed the Cyber Intelligence Sharing and Protection Act (or CISPA for short), has been created under the guise of being a necessary implement in America’s war against cyberattacks. But the vague verbiage contained within the pages of the paper could allow Congress to circumvent existing exemptions to online privacy laws and essentially monitor, censor and stop any online communication that it considers disruptive to the government or private parties. Critics have already come after CISPA for the capabilities that it will give to seemingly any federal entity that claims it is threatened by online interactions, but unlike the Stop Online Privacy Act and the Protect IP Acts that were discarded on the Capitol Building floor after incredibly successful online campaigns to crush them, widespread recognition of what the latest would-be law will do has yet to surface to the same degree.

Apr 04 08:42

Local Cops Following Big Brother's Lead, Getting Cell Phone Location Data Without a Warrant

EFF

New data from law enforcement agencies across the country has confirmed what EFF has long been afraid of: while police are routinely using cell phone location tracking information, only a handful of agencies are bothering to obtain search warrants.

Since 2005, we've been beating the drum loudly, warning that the government's attempts to track a person's physical location through their cell phone requires a search warrant.

As we've said again and again, because cell phone tracking can give the government a snapshot of a person's life through their movements, a search warrant is necessary to safeguard against privacy intrusions...

Mar 16 12:25

Santorum says he will move on Internet freedoms

first they come for your Porn

Mar 13 16:58

European Commission Blames Social Networks For ACTA Failure; Worried About Its Imminent Directive On Copyright Enforcement

He noted that opposition had increased in the run-up to January’s planned vote in the US Congress on two legislative initiatives -- the Stop Online Piracy Act (SOPA) and the Protect Intellectual Property Act (PIPA) -- aimed at increasing the protection of intellectual property rights on the Internet; in the end the vote had not been held, following a hostile campaign by social networks and the loss of White House support.
It's interesting to see De Gucht linking the growing hostility to ACTA with the storm generated by SOPA/PIPA, and giving the credit for stopping those US bills to a "hostile campaign" waged by social networks. You can tell this really worries him, because he says something similar about social networks and ACTA immediately afterwards:

Mar 13 16:06

Home Secretary approves extradition of student Richard O'Dwyer over pirate TV website

Theresa May has approved the extradition of a British student to the United States for running a website that provided links to pirated films and television shows.

Richard O’Dwyer, 23, a computer science student at Sheffield Hallam University, faces up to 10 years in a federal prison for operating TVShack for three years until December 2010.

Mr O’Dwyer’s mother, Julia, said her son had been “sold down the river by the government” in comments designed to embarrass David Cameron as he arrives in Washington for talks with President Barack Obama.

She warned that Britain’s extradition treaty with the United States meant American authorities could come for the young, the old and the ill “and our government is paving the way”.

Mar 13 15:52

UK Teenager arrested for comments made on Facebook page

A teenager has been arrested for allegedly making comments on Facebook about the deaths of six British soldiers in Afghanistan last week.
According to Sky News, Azhar Ahmed of Ravensthorpe (19) posted comments on his profile page, criticizing the level of attention British soldiers who died in a bomb blast received, compared to that received by Afghan civilians killed in the war.
He was arrested on Friday and charged over the weekend.
A West Yorkshire Police spokesman said: "He didn't make his point very well and that is why he has landed himself in bother."

Mar 13 15:44

Big Brother Spy Cameras To Prevent Uninsured Drivers From Getting Gas

Government officials are rolling out a hi-tech automatic number plate recognition (ANPR) cameras to crack down on millions of motorists who drive without insurance.

Dec 11 07:08

Gordon Duff: The Wiki-Weasel, We Thought We Had Seen It All…

THE “WIKI-WEASEL” VINDICATES BUSH, WAR, TORTURE AND…?
“Wikileaks is a big and dangerous US intelligence Con Job which will likely be used to police the Internet”….F. William Engdahl
“supporting WikiLeaks founder, Julius Assange and..calling for revolution due to government cover-ups are intended results of a counterintelligence reverse tactic”…Bob Levin, FBI whistleblower

Dec 11 06:48

Wikileaks Reneges Bradley Manning Promise

Immediately following Bradley's arrest in late June 2010, the whistle-blower website Wikileaks publicly solicited donations specifically for Bradley's legal defense expenses. In July 2010, Wikileaks pledged to contribute a "substantial amount" towards Bradley's legal defense costs. Since Bradley's selection of David Coombs as his civilian defense attorney in August 2010, the Bradley Manning Support Network has unsuccessfully attempted to facilitate the pledged Wikileaks contribution.

Dec 10 15:21

Anti-piracy lawyers 'knowingly targeted the innocent', says law body

A major law firm knew it sometimes had no reliable evidence of unlawful filesharing when it demanded hundreds of pounds damages from internet users, according to the solicitors' watchdog.

Dec 10 12:02

Wikileaks: A Big Dangerous US Government Con Job

The story on the surface makes for a script for a new Oliver Stone Hollywood thriller. A 39-year old Australian hacker holds the President of the United States and his State Department hostage to a gigantic cyber “leak,” unless the President leaves Julian Assange and his Wikileaks free to release hundreds of thousands of pages of sensitive US Government memos. A closer look at the details, so far carefully leaked by the most ultra-establishment of international media such as the New York Times, reveals a clear agenda. That agenda coincidentally serves to buttress the agenda of US geopolitics around the world from Iran to Russia to North Korea. The Wikileaks is a big and dangerous US intelligence Con Job which will likely be used to police the Internet.

Dec 10 08:46

If We Lose our Internet Freedoms Because of Wikileaks, You Should At Least Know Why

The TIME magazine article is curious because it seems that right off the bat they were telling us how to interpret Wikileaks in such a way that sounded strangely familiar to George W. Bush back just after 9/11…

“By March, more than one million leaked documents from governments and corporations in Asia, the Middle East, sub-Saharan Africa and the former Soviet Bloc will be available online in a bold new collective experiment in whistle-blowing. That is, of course, as long as you don’t accept any of the conspiracy theories brewing that Wikileaks.org could be a front for the CIA or some other intelligence agency.” TIME Jan. 2007

Webmaster's Commentary: 

Especially when there are blogs that were blowing whistles a decade earlier (WRH started as a sub-page on my business web site on March 11, 1994). This author is correct; TIME Magazine was promoting Julian Assange and WikiLeaks before they had actually done anything at all!

Dec 10 08:15

BREAKING: WikiLeaks Being Used to Justify "Patriot Act" Legislation For Internet

After all, if information is now the enemy, we must carefully police any and every aspect of this dangerous medium -- all for the safety and protection of 'we the people.'

Oh, we’ll still have the Internet, just like you can still fly. You’ll just have to be on the 'approved' list, screened, stamped, zapped, mugged and molested if you want to get 'on the net.' No biggie. Thanks Julian -- job well done.

Dec 10 07:51

Dutch Police Arrest Suspect in Pro-WikiLeaks Hacking

Cassell Bryan-Low and Jeannie Whalen
The Wall Street Journal

Dutch authorities said they arrested a 16-year-old boy suspected of being involved in attacks on the websites of MasterCard and Visa that were allegedly mounted by sympathizers of document-leaking website WikiLeaks . . .

n/a
Dec 09 21:52

Google Map Foreclosure Tricks

Google Maps Foreclosure Listings

1. Punch in any US address into Google Maps.

2. Your options are Earth, Satellite, Map, Traffic and . . . More. (Select “More”)

3. The drop down menu gives you a check box option for “Real Estate.”

4. The left column will give you several options (You may have to select “Show Options”)

5. Check the box marked “Foreclosure.”

I wanted to demonstrate the full extent of Foreclosures in the US, so after setting GMaps on foreclosure listings, I slowly zoomed out of the map. Voila! Most foreclosures that are for sale in the USA are now showing on your screen.

But the maps do reveal an entire nation littered with foreclosure sales. It is an ugly and graphic depiction of how much inventory is out there, and why housing is still many years away from being healthy.

Dec 09 18:11

Wikileaks Used To Justify Net Control Legislation

I knew this was going to happen. They can use Wiki as a reason to regulate the Internet. Either Kill it. Or bring down a lot of new rules and regulations.

Dec 09 11:06

Hacktivist Army Engages in Cyber War to Free Internet, Assange

LONDON – The website attacks launched by supporters of WikiLeaks show 21st-century cyber warfare evolving into a more amateur and anarchic affair than many predicted.

While most countries have plowed much more attention and resources into cyber security in recent years, most of the debate has focused on the threat from militant groups such as al Qaeda or mainstream state on state conflict.

Dec 09 10:42

NASA sells off old PCs, but forgets to remove the secret data

Nasa may be filled with scientists capable of putting man into space, but its IT department leaves a lot to be desired.

As with all companies and organizations, PCs need replacing and old hardware discarded. In the case of Nasa, it was selling off PCs as operations for the space shuttle program start to wind down. The only problem being no one removed the sensitive data contained on the hard drives.

Policies are in place to ensure nothing confidential ever leaves Nasa premises, but those policies were not being followed by staff.

Dec 09 09:59

AMERICA: Y UR PEEPS B SO DUM?

Ignorance and courage in the age of Lady Gaga

If you hang out much with thinking people, conversation eventually turns to the serious political and cultural questions of our times. Such as: How can the Americans remain so consistently brain-fucked? Much of the world, including plenty of Americans, asks that question as they watch U.S. culture go down like a thrashing mastodon giving itself up to some Pleistocene tar pit.

Dec 09 05:29

Here's A Message The TSA May Find More Difficult To Ignore

4th Amendment Printed On Underwear, tees, socks In X-Ray-Visible Ink. Other styles and messages;; all send a clear message.....

What I want to know is.... Why not just wear a hospital gown, or a sheet, and voilà ! No need to scan! No need to pat! Get your hands off of me, you filthy TSA!

Dec 09 01:05

WHY NGO MONITOR IS ATTACKING THE ELECTRONIC INTIFADA

NGO Monitor’s attack on The Electronic Intifada is part of a well-financed, Israeli-government endorsed effort to silence reporting about and criticism of Israel by attacking so-called “delegitimizers” — those who speak about well-documented human rights abuses, support boycott, divestment and sanctions (BDS), or promote full equality for Palestinians.

Dec 08 20:17

Patriot Act for Internet ahead?

As a result of WikiLeaks, the Obama Administration may introduce a new bill that would allow government officials the ability to spy on Americans through the internet. Meanwhile, an army of hackers rally behind WikiLeaks by shutting down MasterCard and PayPal because they stopped all payments to WikiLeaks. Investigative journalist Wayne Madsen says we could see massive government surveillance of our personal computers, phones and surveillance of our internet activities.

Dec 08 14:55

Assange Prosecution: A Brazen Effort to Kill Alternative Media

Now that Wikileaks founder Julian Assange is in custody, we can expect the U.S. government to request his extradition and prosecute the Australian for espionage. “Any such proceedings would set up a test of whether the First Amendment’s protection for a free press extends to a website with a worldwide audience,” notes McClatchy today.

In 1917 the United States enacted the Espionage Act, a law that has made it a crime to “willfully communicate” secret government information that could expose national secrets held by officialdom. Since the law was passed, however, the government has avoided prosecuting journalists for publishing classified information.

Dec 08 12:42

WikiLeaks: U.S. Military Contractors In Afghanistan Hired Child Prostitutes

Anything interesting to be had at the intersection of the WikiLeaks cache of diplomatic cables and those military contractors that cart off many millions of taxpayer dollars to facilitate their profit-seeking misadventures in the world's zones of forever war? Glad you asked! Here on these pages is the latest news of one of my favorite private military contractors, courtesy of David Isenberg:

Dec 08 12:40

Ron Paul: In a Free Society, We're Supposed to Know the Truth

Dr. Ron Paul
Campaign For Liberty

We may never know the whole story behind the recent publication of sensitive U.S. government documents by the Wikileaks organization, but we certainly can draw some important conclusions from the reaction of so many in government and media.

Dec 08 12:32

Wikileaks: Conspiracy Theory and the Assange Arrest

On a more curious and conspiratorial note, the Assange arrest is in the middle of the “news cycle downswing” of the Wikileak which has divided the journalist community. The third “dump” has received considerable attention for what was not “dumped,” and brought even more light on earlier Wikileaks which have now become suspect. Journalists either love Assange or believe he is a spy, part of a “psy-op” that is manipulating the press, partially through the convenient timing, not just of this arrest but earlier threats as well.

Dec 08 11:54

What Is BitTorrent

BitTorrent is a free speech tool.

Dec 08 11:43

BitTorrent

Dec 08 11:38

Will WikiLeaks’ Julian Assange, now arrested, take the ‘nuclear’ option?

WikiLeaks’ Julian Assange has threatened to release ‘key parts’ of secret US documents if anything happened to him or WikiLeaks.

Dec 08 10:20

BitTorrent Based DNS To Counter US Domain Seizures

The domain seizures by the United States authorities in recent days and upcoming legislation that could make similar takeovers even easier in the future, have inspired a group of enthusiasts to come up with a new, decentralized and BitTorrent-powered DNS system. This system will exchange DNS information through peer-to-peer transfers and will work with a new .p2p domain extension.

Webmaster's Commentary: 

"The more you tighten your grip, Tarkin, the more star systems will slip through your fingers. " ― Princess Leia to Grand Moff Tarkin

Dec 08 01:27

The "Hi Tech" Corporate Police State: "Reengineering" the Internet ... for Persistent Surveillance

The secret world of "cyber situational awareness" is a spymaster's wet dream, made all the more alluring by the advent of ultra high speed computing and the near infinite storage capacity afforded by massive server farms and the ubiquitous "cloud."

Lost in the debate surrounding privacy invasion and data mining however, is the key role that internet service providers (ISPs) play as intermediaries and gatekeepers. From their perch, ISPs peer deeply into and collect and analyze the online communications of tens of millions of users simultaneously, in real-time.

Concerted efforts to eliminate online anonymity, in managed democracies and authoritarian regimes alike, are greatly enhanced by the deployment of deep packet inspection (DPI) sensors and software on virtually all networks.

"To unpack this a little" they aver, "all data traffic that courses across the 'net is contained in individual packets that have header (i.e. addressing) information and payload (i.e. content) information. We can think of this as the address on a postcard and the written and visual content of a postcard."

All of which is there for the taking, "criminal evidence, ready for use in a trial," Cryptohippie chillingly informs.

Dec 07 16:38

Net neutrality, the FCC, Wikileaks and the future of internet freedom

Essentially, once the FCC has gained power and authority over the internet, it will use that power to push a Big Government / Big Business agenda that censors the truth, keeps people trapped in a system of disinformation, and silences anyone who challenges the status quo.

The FCC is poised to become the FDA of internet information, banning alternative speech and enforcing an information monopoly engineered by powerful corporations.

Think of the FCC as the new the Ministry of Truth from George Orwell's novel 1984.

Dec 07 15:28

WikiLeaks' Julian Assange cheats at video games!

WikiLeaks boss and head leaker, Julian Assange (pronounced with a French accent and slight sneer) will apparently be VAC-banned today according to top Steam sources.

Those sources tell BASHandSlash.com that Steam cyber-sleuths were pouring over claims filed by American gamers that the 39-year old had been using a wall-hack, chams and an aim-bot in an online session of Call of Duty Black Ops.

His GUID is expected to be banned either today or early next week.

Dec 07 11:26

More indications WikiLeaks is the 9-11 of the blogs; a fake event staged to justify protecting dictatorship from exposure.

'Never waste a good crisis" used to be the catchphrase of the Obama team in the runup to the presidential election. In that spirit, let us see what we can learn from official reactions to the WikiLeaks revelations.

The most obvious lesson is that it represents the first really sustained confrontation between the established order and the culture of the internet. There have been skirmishes before, but this is the real thing.

Webmaster's Commentary: 

The propaganda to "polish this turd" is on warp drive. WikiLeaks has only been around for a little over three years and is the manufactured and heavily promoted darling of the corporate media. But WikiLeaks is a newcomer. Other websites have been around for much longer. WRH traces its history back to 1994 when we blew the whistle on the murder of White House Deputy Council Vincent Foster. The corporate media has continued to pretend we do not exist even though our readership exceeds that of most newspapers and our radio show reaches around the globe on the internet and the entire North American continent on shortwave. Compared to us, WikiLeaks is the skirmish in a war we have been fighting all along.

Now, I am not saying this to whine about the lack of media coverage for WRH, because I don't really give a damn whether ABCNNBBCBS talks about me or not. But one needs to look at the intense coverage given WikiLeaks while hundreds of other websites and alternative news providers who have been around much longer and broken some really important stories, continue to be ignored.

WikiLeaks is a manufactured front, built over three years at heavy expense in time, money, and political capital. Every cheap public relations trick is being used to convince American web-surfers that Julian Assange is the go-to guy for reality, with Assange already dissing the 9-11 truth movement and reporting Mideast events spun to favor Israel. In desperation, they are even using a tawdry sex scandal to lure people into the WikiMania!

Dec 07 11:20

Popular Gaming Device Can be Used to Spy on You - Kinect is in Kontrol (VIDEO)

Jason Bermas in his first vlog breaks down the good the bad and the ugly of Microsoft's Kinect device

Dec 07 11:11

BREAKING: WikiLeaks Being Used to Justify "Patriot Act" Legislation For Internet

Senator Mitch McConnell called Assange a "high-tech terrorist" on NBC's Meet the Press Sunday and said, "if it‘s found that Assange hasn’t violated the law, then the law should be changed."

Over the weekend, an insightful article by Zen Gardner exposed how WikiLeaks resembles an establishment creation. The article correctly pointed out that the WikiLeaks storyline was conforming nicely to the elite's problem-reaction-solution method, with the solution of more tyranny for our safety.

WikiLeaks is being used to bring in the agenda on so many levels, but most importantly by setting the precedent of shutting down websites for politically "dangerous" content. Gardner writes:

Dec 07 09:36

Wikileaks defended by Anonymous hacktivists

Internet hacktivists have fired the latest salvo in the Wikileaks infowar.

Julian Assange has been arrested
BBC

A group called Anonymous has hit sites that have refused to do business with the controversial whistle-blowing site with a series of distributed denial-of-service attacks.

n/a
Dec 06 08:37

Is the Internet 9/11 Under Way?

What will the Wikileaks debacle herald?

You guessed it--the last bastion of freedom of information and expression, a free Internet, will topple. After all, if information is now the enemy, we must carefully police any and every aspect of this dangerous medium--all for the safety and protection of 'we the people'.

Oh, we'll still have the Internet, just like you can still fly. You'll just have to be on the "approved" list, screened, stamped, zapped, mugged and molested if you want to get "on the net". No biggie. Thanks Julian--job well done.

Dec 06 06:07

WikiLeaks is a Propaganda Front

Selling Wikileaks, Selling Hate for America

Last week, the Department of Homeland Security seized the domain names of roughly 70 websites for copyright infringement, placing their seal as the main page. There were no warrants, no court orders, and no court hearings before a judge. The DHS simply used their authority to grab websites on the basis they are perceived threats (apparently Osama Been Deadforawhile makes a good living with bootleg DVDs).

Dec 06 04:09

State Department Warns Students Against Discussing WikiLeaks on Facebook, Twitter

A State Department official warned students at Columbia University’s School of International and Public Affairs this week that discussing WikiLeaks on Facebook or Twitter could endanger their employment prospects.

The official, a former student of the school, called the career services office of his alma mater to advise students not to post links to WikiLeaks documents, nor to make comments on social networks such as Twitter and Facebook, as “engaging in these activities would call into question [a student's] ability to deal with confidential information, which is part of most positions with the federal government,” he was quoted as saying in an e-mail sent to students by the career services office on Tuesday.

Dec 05 16:53

Could your Facebook profile lead to higher insurance premium? Insurers snooping on online activity to calculate costs

Posting pictures of yourself partying on Facebook or bragging about your lazy Sundays could result in a more expensive insurance premium, it has emerged.

Insurers are planning to introduce 'predictive modelling' schemes - which monitor online data about people's social life and spending - in the UK after studying the results of U.S. trials.

Dec 05 16:04

Vid: Electronic Pickpocket can read RFIDs

News 3 exposes $100 technology that can read RFIDs and steal credit card information or from any other items storing personal information via Radio Frequency Identification simply by waving the device near the victim's wallet.

Dec 05 11:25

Government agencies restrict employee access to WikiLeaks

AFP

The White House told government agencies to take measures to prevent employees without proper authorization from accessing classified US diplomatic cables on WikiLeaks . . .

Dec 05 06:36

WikiLeaks cables reveal how US manipulated climate accord

Embassy dispatches show America used spying, threats and promises of aid to get support for Copenhagen accord

Damian Carrington
London Guardian

Hidden behind the save-the-world rhetoric of the global climate change negotiations lies the mucky realpolitik: money and threats buy political support; spying and cyberwarfare are used to seek out leverage . . .

Dec 04 15:21

Electronic Pickpocketing with RFID Readers (VIDEO)

News 3 exposes $100 technology that can read RFIDs and steal credit card information or from any other items storing personal information via Radio Frequency Identification simply by waving the device near the victim's wallet.

Dec 04 09:08

‘Hi Tech’ Corporate Police State: ‘Reengineering’ the Internet for Persistent Surveillance

As Canadian privacy watchdogs DeepPacketInspection.ca tell us, DPI offer ISPs “unparalleled levels of intelligence into subscribers’ online activities.”
“To unpack this a little” they aver, “all data traffic that courses across the ‘net is contained in individual packets that have header (i.e. addressing) information and payload (i.e. content) information. We can think of this as the address on a postcard and the written and visual content of a postcard.”
All of which is there for the taking, “criminal evidence, ready for use in a trial,” Cryptohippie chillingly informs.

Dec 04 06:35

Wave goodbye to Internet freedom

The Federal Communications Commission (FCC) is poised to add the Internet to its portfolio of regulated industries. The agency’s chairman, Julius Genachowski, announced Wednesday that he circulated draft rules he says will “preserve the freedom and openness of the Internet.” No statement could better reflect the gulf between the rhetoric and the reality of Obama administration policies.

Dec 03 09:32

Horror AVG update ballsup bricks Windows 7

An update from AVG on Wednesday night rendered 64 bit Windows 7 systems unstable after it was applied.

Several Register readers have been affected by the problem, which leaves machines in a continuous reboot loop.

AVG has pulled the problem update (3292) and published an advisory apologising for the cock-up and providing instructions on how to get hobbled systems back up and running again.

Dec 03 03:45

Wikileaks: US Hits Back At Israel

These are likely the first of many retaliatory moves by intelligence agencies around the world against Israel. As one informed source put it, "Israel overplayed its hand with these Wikileaks releases, now it will suffer the 'blow-back."

Dec 03 00:29

Feds Warrantlessly Tracking Americans’ Credit Cards in Real Time

http://www.wired.com/threatlevel/2010/12/realtime/

Federal law enforcement agencies have been tracking Americans in real-time using credit cards, loyalty cards and travel reservations without getting a court order, a new document released under a government sunshine request shows.

The document, obtained by security researcher Christopher Soghoian, explains how so-called “Hotwatch” orders allow for real-time tracking of individuals in a criminal investigation via credit card companies, rental car agencies, calling cards, and even grocery store loyalty programs. The revelation sheds a little more light on the Justice Department’s increasing power and willingness to surveil Americans with little to no judicial or Congressional oversight.

Dec 02 21:41

Race Is On to 'Fingerprint' Phones, PCs

David Norris wants to collect the digital equivalent of fingerprints from every computer, cellphone and TV set-top box in the world.

He’s off to a good start. So far, Mr. Norris’s start-up company, BlueCava Inc., has identified 200 million devices. By the end of next year, BlueCava says it expects to have cataloged one billion of the world’s estimated 10 billion devices.

Advertisers no longer want to just buy ads. They want to buy access to specific people. So, Mr. Norris is building a “credit bureau for devices” in which every computer or cellphone will have a “reputation” based on its user’s online behavior, shopping habits and demographics.

Dec 02 15:18

Canada - What Really Happened Wiki

Webmaster's Commentary: 

Wow!

Dec 02 10:58

Race Is On to 'Fingerprint' Phones, PCs

Tracking companies are now embracing fingerprinting partly because it is much tougher to block than other common tools used to monitor people online, such as browser "cookies," tiny text files on a computer that can be deleted.

Dec 02 03:04

Wikileaks founder Julian Assange has close links to the Economist, controlled by the Rothschild banking family

If Assange were a real activist, he would not be getting any coverage from the mainstream media, let alone so headlines every day in every well known corporate media outlet. The alleged hide and seek between Assange and the US government as well as Interpol is played out on the theatrical stage of the world’s media when it is well known the US government and Interpol can arrest anyone they want virtually any time they want given their immense resources.

Dec 02 02:55

Censors block WikiLeaks website; Interpol issues arrest order; Canada demands Assange be killed

For the past three days, the WikiLeaks website (http://wikileaks.org/) has been under a massive "distributed denial of service" attack, "exceeding 10 gigabits a second," according to the world's most widely used whistleblower website. Amazon shut down WikiLeaks servers, it reported today on Twitter. But that's the least of its problems. Yesterday, a senior advisor to the Canadian Prime Minister issued a televised fatwa on Julian Assange. Today, Interpol posted its call for arrest of the website's founder and Ecuador withdrew its offer of asylum.

Dec 02 02:03

WikiLeaks cables condemn Russia as 'mafia state' Kremlin relies on criminals and rewards them with political patronage, while top officials collect bribes 'like a personal taxation system'

http://www.guardian.co.uk/world/2010/dec/01/wikileaks-cables-russia-ma...

Russia is a corrupt, autocratic kleptocracy centred on the leadership of Vladimir Putin, in which officials, oligarchs and organised crime are bound together to create a "virtual mafia state", according to leaked secret diplomatic cables that provide a damning American assessment of its erstwhile rival superpower.

Dec 02 01:52

Julian Assange says WikiLeaks wants to expose China and Russia as much as US In interview, Assange denies US focus and says WikiLeaks can be force for opening up closed countries like China and Russia

http://www.guardian.co.uk/world/2010/dec/02/julian-assange-wikileaks-c...

WikiLeaks founder Julian Assange wanted to expose China's and Russia's secrets as much as those of the US, and believes Hillary Clinton should resign if she ordered diplomats to engage in espionage.

Dec 02 00:09

Report: Comcast Ditches Net Neutrality, Starts Demanding Money From Web Firms

It has Begun!!!!!!!

Comcast is no stranger to controversy, with a penchant for aggressive cost saving measures. It ran afoul of the U.S. Federal Communications Commission when it began throttling users' traffic, such as torrents or peer-to-peer connections (with regard for their legality).

Now Comcast appears to have landed itself in another mess with Level 3 Communications' Chief Legal Officer, Thomas Stortz, accusing it of demanding money in order to continue to allow Comcast customers to access Level 3's high speed video. In essence, if true, that would represent Comcast spitting in the face of the net neutrality movement, and making a bold move towards a "toll booth" web as Level 3 puts it.

Dec 01 18:55

Joan Veon When Central Banks Rule the World

Joan Veon When Central Banks Rule the World Part 1

Joan Veon When Central Banks Rule the World Part 2

Joan Veon When Central Banks Rule the World Part 3 Link: http://www.youtube.com/watch?v=dlaaQgW4GHw&feature=related

Joan Veon When Central Banks Rule the World Part 4 Link: http://www.youtube.com/watch?v=c3O--_S2hq4&feature=related

Joan Veon When Central Banks Rule the World Part 5 Link: http://www.youtube.com/watch?v=vCqAlgQnXj8&feature=related

Joan Veon When Central Banks Rule the World Part 6 Link: http://www.youtube.com/watch?v=nSD95z26kEU&feature=related

Joan Veon When Central Banks Rule the World Part 7 Link: http://www.youtube.com/watch?v=gZ4QlRBTFLY&feature=related

Joan Veon When Central Banks Rule the World Part 8 Link: http://www.youtube.com/watch?v=LMAyEsUAsEQ&feature=related

Joan Veon When Central Banks Rule the World Part 9 Link: http://www.youtube.com/watch?v=5H9d0FaZGpo&feature=related

Dec 01 11:56

Europe Falls Toward Enlightenment?

Conclusion: Is history in fact repeating itself? Is it retracing, in a sense, the events to which the Gutenberg press seems to have given rise: the Renaissance, the Reformation and even the populating of the New World? In Iceland, they are writing that tortured country's first constitution; we have a feeling it will be far more radical than the one the EU tried (and failed) to pass. In Britain, Ireland and Greece, students and union workers take to the streets to show their dissatisfaction with the "austerity" that the Euro-elites are trying with increasing desperation to establish. In the dank bowels of the EU parliament itself, UK's UKIP leader Nigel Farage – a dapper man now quite recovered from his unfortunate, private plane crash – rises and speaks to the assembled Eurocrats:

Dec 01 10:44

Disappearing Bank Accounts

If you don't have money outside the computerized banking system, you should do so now. You just never know when the system is going to go down. At such a time, the person, who does have cash, will be calling the tune. Remember, "He who has the gold makes the rules." Below, Simon Black reports on the major malfunction at one of Australia's largest banks

Dec 01 09:02

Race Is On to 'Fingerprint' Phones, PCs

Julia Angwin and Jennifer Valenentino-Devries
The Wall Street Journal

IRVINE, Calif.—David Norris wants to collect the digital equivalent of fingerprints from every computer, cellphone and TV set-top box in the world.

He's off to a good start . . .

Dec 01 06:28

How to Save Taxpayer Money: Bring in The Dogs, Not Naked Body Scanners

Brasscheck TV

This video exposes the blood-boiling waste and corruption that the new airport body-scanning machines represent. So far, at least $160 million in US Taxpayer money has been spent, with potentially billions more to be paid on these systems in the next few years.

Trained bomb sniffing dogs, in combination with the metal detectors *already being used* in airports would produce FAR more accurate readings of REAL threats to airline passengers, without the Gestapo-like humiliation, the illegal invasion of privacy and the toxic exposure to radiation from these devices . . .

Nov 30 19:17

Is Assange a Soros and CIA asset?

Two days ago 70 websites were closed down by the department of Justice. No judge, no jury and no court hearing. Their argument? They allowed torrent downloads.

So if it is so easy to close down websites why is Wikileaks still up and running? The Pentagon has a whole department dedicated to being able to stop cyber "terrorism" and Julian Assange can run rings around them with his Robin Hood antics.

The alleged perpetrator Pt. Manning who "stole" the secret documents is in solitary confinement and not even his family is allowed to visit him. We don't know his story but with the political situation in the US being what it is he will probably be called an enemy combatant and will not be allowed to have a court hearing and he will disappear into the system never to be heard from again.

Nov 30 19:08

Canada Surrenders Sovereignty and Privacy to U.S. Secure Flight Program

Dana Gabriel
Be Your Own Leader

Canada is under pressure from U.S. officials to further comply with American security rules which, in some cases, threatens its sovereignty and the privacy of its citizens.

As a result of the war on terrorism, the U.S. government now has more power to restrict air travel and is not only dictating North American, but also international security measures . . .

Nov 30 14:13

Google Blacklists Prison Planet.com

Google’s news aggregator has blacklisted Prison Planet and Infowars despite the fact that both websites are internationally known and now attract more traffic than many mainstream media websites, while Google-owned You Tube has frozen the Alex Jones Channel based on a spurious complaint about showing Wikileaks footage that has been carried on hundreds of other You Tube channels for months.

I just checked Google and had no problems getting to Alex Jones. The story may be a hoax.

Nov 30 11:28

EFF backs red-faced porn watchers vs. copyright trolls

The cases were filed by two different companies and involve different copyrighted adult material. However, the tactics are the same. In both cases, the owners of the adult movies filed mass lawsuits based on single counts of copyright infringement stemming from the downloading of a pornographic film, and improperly lump hundreds of defendants together regardless of where the IP addresses indicate the defendants live. Consistent with a recent spike in similar "copyright troll" lawsuits, the motivation behind these cases appears to be to leverage the risk of embarrassment associated with pornography to coerce settlement payments despite serious problems with the underlying claims.

Webmaster's Commentary: 

This amounts to extortion by those lawyers. They accuse innocent people of downloading copyrighted pornography hoping that the accused will pay up rather than face public exposure!

Shakespeare was right about lawyers.

Nov 30 10:18

Cyberattack Against WikiLeaks Was Weak

But Arbor Networks, which analyzes malicious network traffic crossing the internet’s backbones, reports that the DDoS generated between 2 and 4 Gbps of disruptive traffic, slightly above the average for all DDoS attacks, but well below the peak 60 to 100 Gbps consumed by truly massive attacks against other websites over the last year.

"Made you look!"

Nov 30 09:43

Anti-piracy lawyers 'knowingly targeted the innocent', says law body

A major law firm knew it sometimes had no reliable evidence of unlawful filesharing when it demanded hundreds of pounds damages from internet users, according to the solicitors' watchdog.

London-based Davenport Lyons threatened thousands of people with legal action for alleged copyright infringement between 2006 and 2009. They were told that by quickly paying around £500 damages, plus costs, they could avoid court.

Following complaints to the Solicitors Regulation Authority (SRA), Davenport Lyons now stands accused of deliberately ignoring concerns over the standard of its evidence.

n/a
Nov 30 01:41

WWW PLUS 20 (or How and Why We Are All Here).

On Christmas Day, 1990, in a lab at Cern in Geneva, Switzerland, Tim Berners-Lee finished building the tools to create the world wide web. This act, 20 years ago, set the agenda for far-reaching transformations in the political sphere, in economies everywhere, in social interaction, even in concepts of our own identity. And Berners-Lee succeeded in doing so for one reason: he released the technology for free.

This simple decision, taken by a computer scientist used to working in environments that promoted openness and transparency, eclipses any hype about subsequent Twitter revolutions, Facebook campaigns or political protests ascribed to the platform since. The invention of the web is comparable to Gutenberg's invention of the printing press in 1450.

Nov 29 11:04

TSA Training Film

*WARNING* (Adult Humor).
Alternative Universe - Season One/Episode One - "TSA Training Film" (2010). (Synopsis: Government Agencies Acclimate Public To Coming Stasi Police State, Using The Fear Of Terrorism As A Mechanism.)... (Comedy/Adult)..

Nov 29 08:52

Facebook infested with new worm; More proof site is insecure?

Facebook is littered with a worm, seemingly the same one under different names, created by randomly generated developers, which is spreading links all over the site.

Applications like S22BZ5 created by randomly assigned pseudonym ‘Jackson Lasseter’ has nearly 300 people under the grips of the worm. Others, such as replicated application B5DA8G, 9IHJ35 and AU0ZVE have just under 1,000 people inadvertently spreading the worm.

n/a

n/a
Nov 29 01:57

Lt. Col. Anthony Shaffer of Able Danger on WikiLeaks Self Promotion

Shaffer - "Let me state again - and be clear here - I do not believe WiliLeaks is a legitimate whistle-blowing organization - they seems more focused on being disruptive, than working to enhance oversight of/or resolution of key military and diplomatic issues, as an objective."

Nov 28 21:38

HOW 250,000 US EMBASSY CABLES WERE LEAKED

An innocuous-looking memory stick, no longer than a couple of fingernails, came into the hands of a Guardian reporter earlier this year. The device is so small it will hang easily on a keyring. But its contents will send shockwaves through the world’s chancelleries and deliver what one official described as “an epic blow” to US diplomacy. The 1.6 gigabytes of text files on the memory stick ran to millions of words: the contents of more than 250,000 leaked state department cables, sent from, or to, US embassies around the world.

Nov 28 12:01

Flashback: "Whistleblower?" Czar Julian Assange: 9/11 was NOT a Conspiracy says the Pin-Up of Web-Age "Investigative" Journalists

Assange: "I'm constantly annoyed that people are distracted by false conspiracies such as 9/11, when all around we provide evidence of real conspiracies, for war or mass financial fraud."

Julian Assange's comments regarding 9/11 stick out like a sore thumb given that this "whistleblowers' whistleblower" is now feted with the title of "the most dangerous man alive". The reality is that the CIA could nullify the threat posed by Assange and his operation any which way it wants. Assange dismissing 9/11 as a "false conspiracy" strongly suggests that that hasn't happened yet because he is useful to the PTB in the form of controlled opposition.

July 2010

Nov 28 11:00

Our blacklist has failed us: Thai minister

A senior minister in Thailand's ICT authority, which oversees internet censorship in the country, said that blacklisting has failed and should be dropped.

Thongchai Sangsiri, director of computer forensics within Thailand's Ministry of Information and Communication Technology (MICT), told the Asia-Pacific Telecommunity cybersecurity forum in NSW today that its blacklists are verbose and have created onerous management problems for internet service providers.

"We would like [to] leave parents and teachers to decide what to filter … because [the current system] is too much to handle," Sangsiri said.

"The blacklists grow with many, many websites to become a burden on ISPs. Blacklisting doesn't work."

Nov 28 10:40

ON REALITY AND ITS ALTERNATES – BY DR. LAWRENCE DAVIDSON

Beck vs. Assange and What it all Means
Too many Americans, and their leaders as well, haven’t got an accurate sense of the real world. In part, that is why the U.S. government regularly formulates domestic and foreign policies that answer the demands of interest groups while harming the rest of us. Such policies fail in the long run. In doing so they open political space for both charlatans and truth tellers. And here they are in the persons of Glenn Beck and Julian Assange.

Nov 28 08:24

Patent Office Agrees To Facebook’s “Face” Trademark

Facebook is just a payment away from trademarking the word “Face.” As of today the U.S. Patent And Trademark Office has sent the social networking site a Notice of Allowance, which means they have agreed to grant the “Face” trademark to Facebook under certain conditions.

Nov 28 08:06

US Government seizure of the internet has begun; DHS takes over 76 websites

As part of a new expansion of government power over information, the Department of Homeland Security has begun seizing and shutting down internet websites (web domains) without due process or a proper trial. DHS simply seizes web domains that it wants to and posts an ominous "Department of Justice" logo on the web site.

Over 75 websites were seized and shut down last week, and there is no indication that the government will stop such efforts. Right now, their focus is websites that they claim "violate copyrights," yet the torrent-finder.com website that was seized by DHS contained no copyrighted content whatsoever. It was merely a search engine website that linked to destinations where people could access copyrighted content. Google also links to copyrighted content -- does that mean the feds will soon seize Google, too?

Nov 27 15:40

Police to get major new powers to seize domains (UK)

Editors Note: Once again we see a coordinated effort of similar policies and legislation being implemented simultaneously in different countries, as the system inches toward a standardized code of behavior (ACTA) to be decided by a global governing bureaucracy.

Thinq.co.uk
Police could soon have the power to seize any domain associated with criminal activity, under new proposals published today by UK domain registrar Nominet.

At present, Nominet has no clear legal obligation to ensure that .uk domains are not used for criminal activities. That situation may soon change, if proposals from the Serious and Organised Crime Agency (SOCA) are accepted . . .

Nov 27 08:20

Homeland Security shuts down dozens of Web sites without court order

The Homeland Security Department's customs enforcement division has gone on a Web site shutdown spree, closing down at least 76 domains this week, according to online reports.

While many of the web domains were sites that trafficked in counterfeit brand name goods, and some others linked to copyright-infringing file-sharing materials, at least one site was a Google-like search engine, causing alarm among web freedom advocates who worry the move steps over the line into censorship.

All the shut sites are now displaying a Homeland Security warning that copyright infringers can face up to five years in prison

Nov 27 06:55

U.S. Shuts Down Web Sites in Piracy Crackdown

Ben Sisario
NY Times

In what appears to be the latest phase of a far-reaching federal crackdown on online piracy of music and movies, the Web addresses of a number of sites that facilitate illegal file-sharing were seized this week by Immigration and Customs Enforcement, a division of the Department of Homeland Security.

Nov 26 06:02

Insurers use "Predictive Modeling", Spy on Internet Posts to Gauge Risks

Leslie Scism and Mark Maremont
Wall Street Journal

Life insurers are testing an intensely personal new use for the vast dossiers of data being amassed about Americans: predicting people's longevity . . .

n/a
Nov 25 07:00

Slim chance of nuclear cyber raid in closed North Korea

William Maclean
Reuters

Assuming Stuxnet is aimed at Iran's nuclear program, could a similar cyber bug be used to wreck a uranium enrichment plant unveiled by ally North Korea?

Nov 24 18:16

Endgame Legislation: Lame Duck Session Ushers in Tyranny

Eric Blair
Activist Post

When most of us think about "lame duck" Congressional sessions we think of a "do-nothing" government. However, this so-called lame duck session appears to be a time where legislation that has the most restrictions to individual rights is being rammed through.

It seems the members of government who have been recently voted out of office are vying for corporate jobs by pushing such legislation as the Food Safety Modernization Act and the Combating Online Infringement and Counterfeits Act which are now on the fast track to becoming law. Both of these laws reek of tyranny for the citizens and a means of corporate consolidation for the big boys . . .

SHARE THIS ARTICLE WITH YOUR SOCIAL MEDIA