Jul 24 09:51

Universal Pictures finds pirated Jurassic World on own localhost, fires off a DMCA takedown

Universal Pictures France appears to have tracked down one source of pirated copies of dino-flick Jurassic World: the loopback address of one of its own boxen.

In a Digital Millennium Copyright Act (DMCA) notice obtained by Chilling Effects, an entity called TMG on behalf of Universal's French limb demanded that Google remove from its search results links to, and in order to prevent access to allegedly purloined copies of the disaster flick.

Also on the list is As most Reg readers will know, the IPv4 address is reserved for the computer you're working from, aka the "localhost." Which means the "pirate" link Universal wants to squash is in its very own bit barn.

Jul 24 08:26

The Clandestine Mass Surveillance Network You’ve Never Heard Of

The Pakistani Government has been significantly expanding their surveillance network, and a Privacy International report has revealed to the public for the first time the details of their mass surveillance scheme. The report, entitled “Tipping The Scales: Surveillance And Security In Pakistan,” has disclosed that there has been a drive by ISI (Pakistan’s Inter-Services Intelligence) to capture all of the country’s incoming and outgoing communications.

Jul 24 08:20

Technocracy: The Framework for Global Domination

By James White

As one begins reading Patrick Wood's "Technocracy Rising," the key programs, organizations, and global conglomerates outlined in the book will be quite familiar; with many readers knowing most of the names of the key participants in the global push for a world run by a “Technocratic Elite.” Surprisingly, these people do things right out in the open.

Technocracy is not new, as the utopian dream of a world run by men of science has been “alive and well” for many decades. As you can probably surmise from the title of Pat Wood’s book, technology plays a vital role in the Technocrats’ evil plan of world domination...

Jul 24 08:00

Training Israel's cyber warriors

Graduates of the cyber warfare course in the Computer Services Directorate have built a model city they use to rehearse diverse missions like halting the cooling process in a nuclear reactor, remotely taking over trains and traffic lights to cause accidents, taking control of stock exchange computers, cutting electricity, disabling radar systems at airports, and even taking control of anti-air missile systems in order to fire them at cities they were meant to protect.

The IDF is looking towards the war of the future.

Jul 24 07:02

Get root on an OS X 10.10 Mac: The exploit is so trivial it fits in a tweet

You can bypass Apple's space-age security and gain administrator-level privileges on an OS X Yosemite Mac using code that fits in a tweet.

Yosemite, aka version 10.10, is the latest stable release of the Mac operating system, so a lot of people are affected by this vulnerability. The security bug can be exploited by a logged-in attacker or malware on the computer to gain total unauthorized control of the Mac.

Jul 24 06:59

All wristjobs are as insecure as $#@%, reveals unsurprising research

A study by Hewlett Packard (HP) has revealed that a hefty 100 per cent of smartwatches contain significant security vulnerabilities.

As part of HP's extended shuftie over the Internet of Things thing, the company has unveiled a new report (PDF) in which it confirms that wristjob wearing wallies are even wider open to cyberattacks than they are to being ridiculed in The Register.

The study said that it could not find a single smartwatch which didn't show shoddy security implementations, including naff authentication, and what can only be described as a cultural allergy to crypto.

Jul 24 05:00

Now car hackers can bust in through your motor's DAB RADIO

Car brakes and other critical systems can be hacked via car infotainment systems, security researchers at NCC Group have revealed.

The ingenious hack, demonstrated in an off-road environment, works by sending attack data via digital audio broadcasting (DAB) radio signals.

This is similar to a hack that allowed security researchers Chris Valasek and Charlie Miller to take control of a Jeep Cherokee after sending data to its entertainment and navigation systems via a mobile phone, as previously reported.

Car owners are strongly advised to apply a patch developed by Chrysler to guard against attacks that facilitate remote control of a car's engine, brakes and more from distance, simply by knowing the car's public IP address.

Jul 24 04:57

Thousands of Apps Secretly Run Ads That Users Can't See

There may be much more advertising in apps than it seems. Thousands of mobile applications are secretly running ads that can't be seen by users, defrauding marketers and slowing down smartphones, according to a new report by Forensiq, a firm that tracks fraud in online advertising.

Over the course of the 10-day study, one percent of all devices observed in the U.S. ran at least one app committing this kind of fraud; in Europe and Asia, two to three percent of devices encountered fake ads. Forensiq identified over 5,000 apps that display unseen ads on both Apple and Android devices. Advertisers are paying about $850 million for these ads each year, according to the report, and the apps with the highest rate of ad fraud can burn through 2 gigabytes of data per day on a single device.

The sheer amount of activity generated by apps with fake ads was what initially exposed the scam.

Jul 24 04:51

Geniuses Representing Universal Pictures Ask Google To Delist For Piracy is, of course, the IP address a machine uses to refer to itself. It's also known as "localhost." In other words, it basically means "home."

This is obviously a case of these companies setting up some kind of automated system, working off of an obviously flawed algorithm, that is causing these errors, rather than having real people going through to see if the targets for these takedown notices are actually infringing. Why do we allow this kind of collateral damage in the DMCA system?

Jul 23 15:59

Thousands of Apps Secretly Run Ads That Users Can’t See

There may be much more advertising in apps than it seems. Thousands of mobile applications are secretly running ads that can’t be seen by users, defrauding marketers and slowing down smartphones, according to a new report by Forensiq, a firm that tracks fraud in online advertising.

Jul 23 11:09

Wanted: Members Paid Reddit Upvote Group - easy $5 to $10

We have a paid reddit group. Essentially you will be required to upvote/downvote reddit threads that we post and also do that for comments. The threads will be posted in our Skype group and will mostly be from one subreddit (r/worldnews)

Pay will be $1/per thread that we post. This involves upvoting/downvoting thread and upvoting/downvoting comments as well. We will give you full instructions once you join. It would only take a few minutes of your time, and you will get an easy $5 per day if you do this for five threads, and a $10 limit per user per day.

It's preferred if you are available between 9-3 Israeli time(GMT +3), but we will be posting threads 24 hrs a day so we are flexible as long as you are on skype a few hours per day.

If you're interested: Contact me via skype at lenoraavraham.

Spots are limited and this post will be Updated/Deleted once we are full.

Webmaster's Commentary: 

Here is a screencap just in case WarriorForum deletes this.

Jul 23 08:25

Smart Meters, Wi-Fi and Cell Phones Can Cause Brain Cancers

By Catherine J. Frompovich

Every pro-‘smart’ technology proponent – be it manufacturer, supplier, utility or Public Utility Commission – invariably likes to trot out ‘safety’ studies done 50 or more years ago on the then emerging radar technology that was considered ‘safe’. Why? Furthermore, what does that apparent ‘conspiracy’ say about keeping current and up to date on the very real science of how non-ionizing radiofrequencies (RFs) and electromagnetic frequencies (EMFs) cause harm to humans – the brain, in particular – and especially, children’s brains and bodies? ...

Jul 22 15:02

U.S. unlikely to blame China publicly over OPM data breach - officials | Reuters

While it privately points the finger at China for massive hacking into the personal data of millions of federal employees, the U.S. government does not plan to publicly blame Beijing, U.S. officials said on Wednesday.

President Barack Obama's administration is still debating how it should respond to the breaches, which American officials acknowledge were huge and damaging. China denies any involvement in hacking U.S. databases.

Jul 22 14:58

Liberty Movement Needs More Innovations To Counter Technological Tyranny

There is no centralized system so trustworthy, no political establishment so free of corruption that the blind faith of the citizenry is warranted. If free people do not remain vigilant they will be made slaves by their own leadership. This is the rule, not the exception, and it applies to America as much as any other society.

Jul 22 10:47

Makerspaces and the Future of Healthcare

By Brian Berletic

Bangkok-based makerspace Maker Zoo just recently gave a talk at the invitation of Bangkok's Queen Sirikit National Institute of Child Health (QSNICH). The talk was meant to give an introduction to healthcare professionals about the tools and techniques used by makers to develop prototypes at breakneck speed and for a fraction of the cost of traditional processes and to talk a little about the potential collaboration between healthcare institutions and makerspaces...

Jul 22 09:08

What Will Happen When Smart Meters Catch Fire on Natural Gas Line Meters?

By Catherine J. Frompovich

An unbelievable exercise in stupidity, in my opinion, occurs with regard to Smart Meters (SMs). By now, I think most people know of their fire and explosion vulnerabilities due to the materials used and construction design, which really are not as safe as we are told. That’s been proven by Canadian firefighter Brian Thiesen and electric utility company whistleblowers regarding many AMI SM brands.

However, the most asinine part about SMs, I think, is this—at least in the PECO / Philadelphia, PA metropolitan area: The proximity to natural gas line meters of fire-and-explosion-prone electric AMI SMs. Since AMI SMs are known to arc, and being only a foot or two away from the incoming natural gas line and meter, what’s the potential for spectacular SM fires and/or explosions to both electric and natural gas meters? ...

Jul 22 08:21

LifeLock's stock value cut in half on FTC accusation of settlement breach, deceptive claims

The FTC said LifeLock violated a 2010 settlement with the agency and 35 states by continuing to make deceptive claims about its services and failing to take steps to protect users' data. The FTC has asked the U.S. District Court for the District of Arizona to impose an order requiring the company to provide redress to consumers.

In the previous settlement, the FTC settlement required the company to pay $12 million in consumer refunds.

Webmaster's Commentary: 

I will tell you how to cut the identify theft problem in half. Find just one of these cyber-criminals, and crucify them live on national TV. If they are reasonable healthy it should take them at least a week to die. That will end half the identify theft problem. Then, when we fire the NSA, that will get rid of the other half!

Jul 22 07:55

Three Israelis arrested in relation to JPMorgan hack, securities fraud

U.S. and Israeli authorities arrested four people in Israel and Florida on Tuesday in connection with several fraud schemes tied to last summer's massive data breach at JPMorgan Chase & Co, according to news reports.

The hacking of JPMorgan's computers compromised information in 83 million household and small business accounts, making it one of the largest such breaches in history.

Jul 21 18:18

Hackers Have the Power to Remotely Hijack Half a Million Chrysler Cars

An ongoing investigation into the security of Chrysler vehicles bears some pretty startling conclusions. In a couple of weeks, security researchers will reveal the details of a zero-day exploit that affects some 471,000 cars. Put bluntly: Hackers can take complete control of the cars from thousands of miles away.

Jul 21 18:11

Hackers Remotely Kill a Jeep on the Highway—With Me in It

This wasn’t the first time Miller and Valasek had put me behind the wheel of a compromised car. In the summer of 2013, I drove a Ford Escape and a Toyota Prius around a South Bend, Indiana, parking lot while they sat in the backseat with their laptops, cackling as they disabled my brakes, honked the horn, jerked the seat belt, and commandeered the steering wheel. “When you lose faith that a car will do what you tell it to do,” Miller observed at the time, “it really changes your whole view of how the thing works.” Back then, however, their hacks had a comforting limitation: The attacker’s PC had been wired into the vehicles’ onboard diagnostic port, a feature that normally gives repair technicians access to information about the car’s electronically controlled systems.

A mere two years later, that carjacking has gone wireless.

Jul 21 12:32

Time Warner Cable SUCKS!

Tired of TWC "customer service" reps hanging up on you when you yell at them or tell them they don't know what they doing? Bitch about TWC here.

Webmaster's Commentary: 

Okay, so this morning I sit on hold for 27 minutes to get a technician on the line to talk about the dropped connections. And I get this lady in the Caribbean. That is 1/4 the way around the globe! After realizing that nobody has a clue what is causing what is becoming a wide-spread problem I suggested telling my cable modem to drop from 300mbps down to 100mbps and see if that clears it up.

According to Time Warner Oceanic's own speed test, I am now running at just 30mbps, 1/10th of what I am paying for and 1/3 of what I had before! Well done, Time Warner. You have me a faster modem I didn't want and didn't order and now have a much slower connection than I did before!

Jul 21 10:44

‘Canadian police: one can be shot without explanation’

Jul 21 10:40

Millions of adulterers are about to get BUSTED!

Divorce lawyers all over America are rejoicing today while shopping for a new Porsche as the worst nightmare of those who use the internet to engage in finding partners for extramarital sexual flings has been realized.

Popular online flesh bazaar has reportedly been hacked and the intimate data on up to 37 million users compromised. Yes, THIRTY SEVEN MILLION. The website’s tagline, “Life is short, have an affair” pretty much tells all one needs to know about its views on marriage and morality.

Jul 20 17:38

Top 6 reasons Drupal really sucks -- Developer Edition

A couple weeks ago I wrote a post on why customers complain about Drupal -- the short version is that they either had incorrect expectations, or "developers" who were in over their heads. Nothing wrong with Drupal there. There are some very legitimate downsides to Drupal from a technical perspective, however. Here are our top 6, and why they're not enough to keep us from recommending and using Drupal for nearly all our work:

Jul 20 16:23

Suelo: The Man Who Quit Money

Daniel Suelo lives in caves in the canyonlands of Utah. He survives by harvesting wild foods and eating roadkill.

He has no job, no bank account and does not accept government welfare. In fact, Suelo has no money at all.

Suelo may have shunned all the trappings of modern American life, but he is not an isolationist.

Since abandoning money in 2000, the former cook from Moab, Utah has remained an active member of his community and avid blogger.

Jul 20 15:42

Fuck Drupal!

Obviously other folks are having problems with Drupal.

Jul 20 15:22

Patch! Microsoft emits emergency fix for THIRD Hacking Team hole

It's 2015, and bad font files in webpages will still pwn your machines

Jul 20 15:20

Spyware-spewing Wi-Fi drone found on Hacking Team, Boeing's todo list

Leaked emails have exposed plans by Hacking Team and a Boeing subsidiary to deliver spyware via drones for sale to government agencies.

The scheme proposed the use of unmanned aerial vehicles (UAVs or drones) to deliver Hacking Team's Remote Control System Galileo spyware via Wi-Fi networks from above. Boeing subsidiary Insitu and representatives of Hacking Team enthusiastically discussed the deal after meeting up at the International Defense Exposition and Conference (IDEX) in Abu Dhabi back in February.

Jul 20 11:21

Why Java Sucks

Webmaster's Commentary: 

These days you can do a web search on "Why [insert software name] sucks" and get a ton of results. Driven by corporate greed, the state of the art in software development has become chaotic, factionalized, and decadent, in that it is so obfuscated it has become impossible to develop product in a timely manner, as I myself dealt with when trying to get the Drupal 7 version of this site up and running. (I totally wasted this last weekend trying to install a php debugger which in the end refused to operate because of Windows "security" requirements.)

Little wonder that the US is losing its leadership in IT (along with the NSA scandal)!

Jul 19 19:49

50 Years of Moore’s Law: IEEE Spectrum Report

“In 2014, semiconductor production facilities made some 250 billion billion (250 x 1018) transistors. This was, literally, production on an astronomical scale. Every second of that year, on average, 8 trillion transistors were produced. That figure is about 25 times the number of stars in the Milky Way and some 75 times the number of galaxies in the known universe.”

Jul 19 18:47

President Obama: “The Internet Is Not A Luxury, It Is A Necessity”

A lot of people are aware that third-world countries still need Internet access. That’s why there’s Facebook’s sometimes controversial What not a lot of people are aware of is that one out of every four people living in the U.S. don’t have Internet at home.

Jul 19 18:07

Scientists Make International Appeal on Dangers of WiFi

Waking Times

Dr. Martin Blank, PhD of Colombia University leads a group of concerned scientists in an important appeal about the safety of wi-fi and other electromagnetic signals. To put it bluntly, these devices are causing cell damage and ending many of our lives prematurely, and these scientists want you to know about it.

Jul 19 16:02

Microsoft to spoofed Skype users: Change your account passwords NOW

An unknown number of frustrated Skype customers have been pestered by spoof messages on the Microsoft service for weeks, but the company is yet to close what appears to be a gaping hole in its software.

Instead, Redmond has advised Skype users to change their account passwords.

But complaints are building up about the lack of communication coming out of the Microsoft camp regarding what seems to be a Skype security flaw.

Jul 19 15:59

Creator Of Internet Privacy Device Silenced: "Effective Immediately We Are Halting Further Development"

Earlier this year an inventor by the name of Benjamin Caudill announced a device he dubbed the ProxyHam which was going to literally change everything about how those concerned with privacy could connect to the internet. However, just hours before Caudill was to reveal a fully-functioning ProxyHam at the DefCon hacking conference his presentation was abruptly cancelled - No reason was given and Caudill posted several cryptic Tweets that left many baffled; the device had been disappeared, the company was cancelling production on retail units, and the source code and blueprints would no longer be released to the public.

Jul 19 09:12

Israel and U.S. Will Cooperate on Cybersecurity

The U.S. deputy secretary of Homeland Security and the top Israeli official handling cybersecurity cosigned a statement committing to U.S-Israel cooperation in the area.

Webmaster's Commentary: 

It is now legal for Israel's hackers to wreck US websites.

Jul 18 16:16

The Creator of This Amazing Internet Privacy Device Has Been Silenced By The Government: “Effective Immediately We Are Halting Further Development”

Data collection and invasive monitoring of American citizens has been at theforefront of government activities for decades. After revelations by Edward Snowden in recent years, the fringe conspiracy theorists who warned of Big Brother surveillance and had been laughed at by the general population were finally proven right.

Jul 18 10:04

New Search Engine Filters Out CIA's Mainstream Media

By Bernie Suarez

A new search engine is now available for the average truth seeker and critical thinker to enjoy a clean, unbiased search of a topic without interference and contamination with CIA's mainstream media, mental junk food, propaganda "news". This fresh new approach to searching online for information will now catch news infected with mainstream media and purge it out of the search engine system to keep your news options clear and focused on what actually happened...

Jul 18 08:02

Password manager Mitro will shutter itself on 31 August

You've got six weeks to migrate all your creds. Chop, chop

Jul 18 07:58

GOOGLE GMAIL ATE MY LINUX: Gobbled email enrages Torvalds

Linux kernel supremo Linus Torvalds has published a scathing open letter to Google's Gmail team after discovering that the service had incorrectly marked hundreds of his incoming email threads as spam – including ones containing kernel patches.

"Something you did recently has been an unmitigated disaster," Torvalds wrote in post to his Google+ page on Friday. In a later update to his post, he added that after going over some 3,000 email threads in his spam box, he had to manually mark 1,190 threads as "not spam."

Finnish-American firebrand Torvalds pretty much coordinates Linux kernel development entirely via email to and from his herd of developers, so losing messages is a disaster for him.

Jul 17 15:11

Loan application data hacked, company responds: Meh, not our customers

Hacker collective Rex Mundi has stolen 24,000 financial records from Belgian loan company AFC Kredieten, it claims, and if the company doesn't pay up before Friday at 8pm, it will publish every loan applicant record in its possession.

As proof that they have successfully hacked the company, Rex Mundi has already published some personal accounts and left a banner notification on the AFC Kredieten website.

If it goes through with its threat, it will make AFC Kredieten the 18th company to have data revealed by the blackmailers. According to the collective, “the companies we targeted have only one thing in common: mediocre IT security protocols or poorly-designed web applications".

Jul 17 15:09

Hackers invade systems holding medical files on 4.5 million US patients

UCLA Health hospitals say hackers may have accessed personal information and medical records on 4.5 million patients.

The California medical group admitted today that miscreants infiltrated its computer systems as long ago as September. It is possible the intruders accessed databases holding patient names, addresses, dates of birth, social security numbers, medical records, health plan numbers, details of medical conditions, lists of medications, and medical test results.

Jul 17 13:25

Miami Cops Actively Working to Sabotage Traffic App 'Waze' With Fake Submissions

By Michael Carney

Police in Miami are taking a page out of the vigilante playbook of many Los Angeles communities in an effort to sabotage the crowdsourced traffic app, Waze.

Members of law enforcement around the nation have voiced fears that Waze, which includes reports of police sightings, complete with time and location, represents a threat to their safety...

Jul 17 09:03

Wicked WikiLeaks leaks considered harmful: Alert over malware lurking in dumped docs

Unfortunately, no one appears to have had the time to scrub the five million Stratfor emails, which date back to 2004, clean of malware.

Josh Wieder, a sysadmin who found a load of bad code in the Stratfor leaks, fears journalists, activists, researchers and anyone else curious enough to peruse the disclosed data may end up infecting themselves with a software nasty.

El Reg has verified that the documents identified by Wieder are dangerous. It's possible there are more infected files lurking in WikiLeaks' databases of unfiltered data.

For example, take this internal memo dated February 2011 about Cyrenaica and Tripolitania, two regions of conflict-torn Libya. The attached Microsoft Word document triggers malware alarms on VirusTotal because it includes a code-execution exploit for Microsoft Office on Windows and Mac (CVE-2010-3333).

Jul 17 08:34

NY Times: We Hack Everyone with WebRTC

The NY Times has recently come under fire for exploiting a known web vulnerability against all website visitors involving WebRTC.

The NY Times is collecting every local IP even VPN users by taking advantage of a well documented exploit against WebRTC. The Times is even using clunky and poorly written JavaScript to carry out their attack.

Jul 16 19:47

Phone fraudsters pose as experts from Apple: Criminals trick users into handing over bank details after ringing them at home to warn their data is at risk

A surge in fraud has been fuelled by conmen stealing hundreds of thousands of pounds from computer users by posing as engineers for legitimate companies such as Apple and Microsoft.

In an elaborate phone scam, fraudsters pretending to be computer security experts working for top companies telephone trusting people at home to tell them they are at risk of a threat.

The cyber-criminals trick the unsuspecting victims into believing they have a technical problem with their devices which can be fixed remotely for a small fee.

They then deceive the person into handing over their debit or credit card details to pay for so-called ‘repairs’ – but instead fleece money from their accounts.

Jul 16 17:12

Software flaws on Marine F-35s no bar to combat, Pentagon says

Five years after the first F-35s were supposed to be declared combat-ready, the Pentagon's top weapons buyer says the fighter jet's operating software is ready to go "with some minor workarounds" that need to be remedied later.

Webmaster's Commentary: 

I wonder how the pilots expected to take the plane into combat feel about the "workarounds?"

Jul 16 15:12

Creepy : 2016 campaign tech monitoring what you do online — instantaneously…

Presidential campaigns this time around have a new technological ace in the hole — you. -- Building off two decades of digital wizardry, the campaigns are getting ready to monitor and analyze most of what you do online instantaneously. And if you forward certain political emails to your Aunt Maggie in Iowa or your old college roommate in Ohio, they’ll reward you for doing it.

Jul 16 14:48

Bloke thrown in the clink for hacking SIXTY PER CENT of Americans

A Vietnamese crook has started a 13-year stretch behind bars for hacking into corporate America, and offering to sell personal information on 200 million US citizens.

Hieu Minh Ngo, 25, pleaded guilty to wire fraud, identity fraud, and access device fraud charges, and four counts of computer fraud and abuse. Judge Paul J. Barbadoro, in the US district court of New Hampshire, sentenced Ngo this week.

The court heard that Ngo ran an identity-theft operation in Vietnam: he hacked into US companies to obtain people's personal records, and sold that private information to criminals and other scumbags. Such information included victims' names, dates of birth, social security numbers, phone numbers, copies of driving licenses, and bank card numbers – a perfect gift for identity thieves and fraudsters.

Jul 16 11:09

Scammers hit APPLE users with crash warnings

iPhone and iPad users have reported receiving pop-up notifications telling them that their software has crashed and that they must dial a support helpline to fix it. -- Scammers have targeted Safari, the default web browser for iOS devices, telling users in the US to ring the helpline and pay between $19 and $80 to fix it.

Jul 16 10:15

Now open for public test drive: search engine filters out media propaganda and government disinfo

The world's first anti-propaganda search engine is now open for a 24-hour public test drive., dubbed "the search engine for truth seekers," filters out mainstream media propaganda and government disinformation, favoring independent media websites, blogs and reference sites.

Jul 16 08:59

Federal Reserve Spies on France

Following last week's eavesdropping reports, WikiLeaks shared new documents with Libération and Mediapart. This time, the new documents reveal that the NSA was spying on France's best performing companies for economic intelligence purposes.

Webmaster's Commentary: 

The NSA isn't looking for criminals and terrorists. We already proved the NSA cannot break any codes created by real criminals and terrorists. The NSA is spying on law abiding citizens to steal their business secrets, and if they are doing it to the French, they are doing it to YOU!

Jul 16 08:58

Exclusive: U.S. directs agents to cover up program used to investigate Americans

A secretive U.S. Drug Enforcement Administration unit is funneling information from intelligence intercepts, wiretaps, informants and a massive database of telephone records to authorities across the nation to help them launch criminal investigations of Americans.

Although these cases rarely involve national security issues, documents reviewed by Reuters show that law enforcement agents have been directed to conceal how such investigations truly begin - not only from defense lawyers but also sometimes from prosecutors and judges.

Webmaster's Commentary: 

So the spying is not about terror, but about finding reasons to prosecute Americans, all in defiance of the Fourth Amendment!

Jul 16 08:17

Thousands of Smart Meter Fires: New Whistleblower and Court Evidence

By Brian Thiesen

The situation with smart meter fires is worse than we thought — and now we know why. This new investigative video tells all. In studying and doing presentations and making videos on ‘smart’ meters for nearly 5 years now, personally I had my doubts I would learn anything new when I first connected with a utility worker whistleblower...

Jul 16 06:34

Windows 10: you'll get UPDATES LIKE IT or NOT – unless you have Enterprise Edition

Microsoft's intention is that users will be always up-to-date, not only with security patches, but also with feature updates.

This makes it easier for the company to keep pace with changing technology, and provides developers with a more consistent target for applications.

The downside is that feature upgrades can potentially break applications, or drivers for peripherals such as printers and scanners. Those who value stability above having the latest features may prefer to install security updates only.

Windows 10 does allow this, but only for businesses running the Enterprise Edition of Windows.

Jul 15 20:35

Leaked Emails Detail How Spyware Could Track Your Bitcoin History

Is the government spying on your bitcoin spending habits? It’s more possible than you might think.

Documents leaked earlier this month in the data-breach that hit Hacking Team S.r.l., the Italy-based spyware firm, confirmed what many had suspected: authoritarian regimes were using spying software purchased from overseas to crack down on political dissenters.

But evidence of political repression wasn’t the only takeaway from the 400 GB trove of data leaked in the breach. The company was also selling tools to spy on how people use their bitcoins and other digital currencies.

Jul 15 19:06

India ponders home-baked chips for defence and nuke plants

India is reportedly pondering a new policy that would see only home-baked silicon used in its military, space program and atomic energy industry.

Sources have told the Times of India that government officials have raised the idea with representatives of the three industries mentioned above. Just why is open to speculation. Russia's decision to replace x86 CPUs with ARM silicon offers one explanation because the exploits of Edward Snowden mean the nation fears back doors in chips designed or built in the USA.

Jul 15 19:02

Apple proffers FREE iCLOUD SUBS to tackle Greek debt crisis

iThingy flinger Apple has decided enough is enough with poor old Greece, helping solve the EU nation's debt crisis with an offer of free iCloud services - for a month, anyway.

In an email obtained by iPhoneHellas the company said it would offer the one-month only deal to customers currently unable to maintain their subscription due to the apparent breakdown of its economy.

Greece is currently blocking payments to Apple as part of a plan to prevent overseas transfers and subsequently avoid banks from crashing.

"To prevent interruption in your iCloud service during the current fiscal crisis, and to make sure you have access to your content, we've extended your iCloud storage plan for an extra 30 days at no additional cost," said global humanitarian multinational Apple in its all-heart email.

Jul 15 15:16

‘Flash’ in pan: Firefox ban on Adobe plugin lasts 2 days, calls for its end remain

Mozilla is allowing Adobe Flash to run on its Firefox browser again, after blocking the plugin for two days over security vulnerabilities. Tech experts have called for an end to Flash, widely loathed for security and compatibility reasons.

Jul 15 13:19

TurboTax Drops Cloud Backup Option for Desktop Users

If you used the desktop version of TurboTax during the most recent tax filing season and backed up your return online, you may want to make sure you have a copy of it stored on your computer.

Intuit, the maker of TurboTax tax preparation software, has notified some desktop customers that it is discontinuing a service that allowed them to store a copy of their return on TurboTax’s cloud system. (Desktop customers install the tax software on their own computer, by buying a CD-ROM or a download, rather than preparing their returns on the TurboTax website.)

Users have until July 21 to gain access to their tax returns on the cloud and resave them on their own computer if they need to do so.

Customers received an email notifying them of the change.

Jul 15 09:09

Jade Helm 15 Begins with Black Outs! Power Outages Planned for July 15-20th

The strangest, largest, longest military exercise begins in America today. It is all but quite in fact, there is no media access, and all across California the cell service is down, power outages, and more. Jade Helm 15 begins with a Black Out, just as many thought it would.

Jul 15 08:44

UK Confuses Gullible Reporter Into Believing It Changed Its Position On Encryption

The real story here is that this is a really dumb idea that will make the internet less safe -- but there is no change in position by Cameron. Just a confused reporter for a publication that apparently has no reporters or editors who understand the subjects they're writing about.

Jul 15 08:38

Scam artists created a fake Bloomberg News website to pump and dump Twitter stock

A still-unknown fraudster published a fake news story today on a website designed to look identical to Bloomberg News. The site was convincing enough to send Twitter stock soaring up nearly 8 percent after it claimed the company was being acquired for $31 billion and suggested Google was the buyer. It was most likely part of a pump and dump scheme, where the actor behind the bad information quickly sold their Twitter stock as the price rose.

Jul 15 08:04

The US Government is Wiretapping WAY More Americans Than it Wants to Admit

Before Edward Snowden released his notorious NSA leaks, national intelligence officials swore they were not spying on millions of innocent people. As they lied through their teeth, ongoing revelations embarrassingly exposed their dishonesty. Now, yet another deception has come to light, revealing that the government has once again lied about the extent of its invasive policies. According to a 2014 year-end report by the Administrative Office of the U.S. Courts (AO), “a total of 3,554 wiretaps were reported as authorized in 2014, with 1,279 authorized by federal judges and 2,275 authorized by state judges.” While this official number is already high, Albert Gidari, one of the country’s top privacy attorneys, noticed a discrepancy between the AO’s numbers and those detailed by private companies.

Webmaster's Commentary: 

And those are just the "authorized" wiretaps.

Jul 15 07:52

China Intercepts U.S. Restrictions with Homegrown Supercomputer Chips

System designer for the multiple iterations of the Tianhe machines, Dr. Yutong Lu, revealed this week that the Tianhe-2 supercomputer, which raked in yet another number one placement by a long stretch on the bi-annual list of the top 500 most powerful supercomputers, will be receiving its upgrade in the following year. However, due to the trade restrictions, they won’t be boosting their supercomputer with more Xeon Phi cores. Rather, the novel architecture they developed will deliver the system the extra 45 petaflops it needs to continue its reign at the top of the list for the foreseeable future.

Jul 15 05:54


Social media operators such as Twitter, Facebook and YouTube would have to notify federal authorities of online "terrorist activity," according to the text of a bill approved by the Senate Intelligence Committee and seen by Reuters on Wednesday.

Jul 14 12:38

The FBI Asked Hacking Team for Help Unmasking a Tor User

Documents leaked as part of the massive breach of Hacking Team have revealed that the Federal Bureau of Investigation (FBI) bought spying software from the controversial Italian surveillance-software company.

Jul 14 10:44

WHATREALLYHAPPENED.INFO is based in the United Kingdom and devoted to free inquiry into historical events.
Disclaimer: We link to a wide variety of sites, videos, etc. You may, will, disagree strongly with some of them, since they represent differing viewpoints; you may even find some offensive. Our linking to them in no way implies our support for any views expressed in them. It implies only that we think that viewing them may help us or you to a better understanding of the issues, even where we reject what is said.

This site exists to promote an open scientific, evidenced-based approach to historical enquiry. We do not believe or reject anything, though naturally we do form opinions. However, they are just that: opinions based on our current understanding of the facts. We are not emotionally attached to them and we would have no problem with changing our current positions on any subject if the evidence suggested we should.

Webmaster's Commentary: 

Imitation is the sincerest form of flattery! :)

Jul 14 09:38

Senate to Vote on Requiring Social Media to Report Suspicious Activity to Feds

By Kristen Anderson

On Wednesday July 15th, 2015, the Senate will vote on a measure that would require social media sites such as Facebook, Twitter, and YouTube to report suspected terrorist activity to Federal authorities. This is part of the Intelligence Authorization Act of 2016...

Webmaster addition: Soooooooooo .. they adnit the NSA spy system doesn't really work after all!

Jul 14 08:23

UK to ban encrypted messenger services to combat the specter of ISIS

British Prime Minister David Cameron hopes to have access to all means of electronic communication by anyone in the country and ban the use of encrypted apps such as Facebook Messenger, Snapchat and iMessage unless they agree to provide backdoors.

Jul 14 07:21

Firefox has blocked all versions of Flash Player by default until adobe gets their sh*t together

Webmaster addition: Don't turn flash back on until they get rid of all those "Shockwave player has crashed" problems.

Jul 14 07:11

Kuwait Mandates DNA Database For All Residents

By Brandon Turbeville

Never a country known for its human rights and civil liberties, Kuwait is now attempting to take the lead in the Gulf for the country most integrated with the technological control grid and biometric surveillance state...

Jul 13 15:19

Report: Evidence of 2011 US cyberattack on defense giant EADS in Germany

"Bild am Sonntag" said on Sunday that it inspected a "confidential letter" provided by Germany's foreign intelligence services - the BND - to the domestic intelligence agency - the Verfassungsschutz - outlining a "suspected" attack on European arms manufacturer European Aeronautic Defence and Space Company (EADS) from American soil.

"From a foreign intelligence service, the BND received information about a suspected data tap at EADS Germany," the letter is reported to have said.

The German news outlet claimed that it was the first shred of evidence of a 2011 cyberattack on the French-German manufacturer, headquartered in Munich, since the onset of collaboration between the US National Security Agency (NSA) and the BND.

Jul 13 12:02

Leaked Documents Show FBI, DEA, & Army Can Control Your Computer

Leaked emails from an Italian-based hacking company reveal that government agencies engage in surveillance more invasive than previously thought, spending millions of dollars on spyware and malware software to accomplish their questionable goals. Tellingly, their use of the product places them squarely in the same category as other repressive regimes around the world.

Jul 13 10:54

FBI Director Comey is a Maniac

Comey, in a brief op-ed appearing on the prominent national security blog Lawfare, said that "there are lots of good things" about universal strong encryption, such as expanded privacy and protection from cybercriminals. But those benefits must be balanced against the potential risks created by making it more difficult for the government to access the digital communications and data of those suspected of wrongdoing, he said...

"I really am not a maniac (or at least my family says so)," Comey said. "But my job is to try to keep people safe. In universal strong encryption, I see something that is with us already and growing every day that will inexorably affect my ability to do that job." – National Journal, July 6, 2015

Webmaster's Commentary: 

Comey's ban on strong encryption cannot work against real criminals and terrorists who can easily create their own methods of encryption which the government cannot break. Comey wants to ban YOU, the law-abiding citizen from using strong encryption so that the government can steal your business secrets, go on fishing expeditions for civil forfeiture opportunities or blackmail material, scare you into silence about what is going on, and whack off to naked pictures of your spouses and children!

Jul 13 10:30

Godfather Ellison’s Protection Racket

On Friday, two business journals ran stories on Oracle’s latest tactic for selling its lagging cloud services. The articles should serve as a warning to business readers, as they say in effect, “If you’re using Oracle software to run your businesses, you should consider running an internal audit to ascertain you’re in compliance, because you don’t want to be caught out of compliance if Redwood City’s goon squad pays a visit.”

It appears that one of the tactics being used by Larry Ellison and his minions to sell the cloud is a new twist on the old protection racket. This shouldn’t surprise. Ellison didn’t become California’s richest person by playing nice — it doesn’t work that way.

Webmaster's Commentary: 

Sure, if the computer industry can't actually write good software, just use politics and pressure to close the deal!

Remember the Obamacare website? They spent 3/4 of a billion dollars building it and it is as screwed up as the new WRH!

Jul 13 10:29

Flash HOLED AGAIN TWICE below waterline in fresh Hacking Team reveals

Two more serious Adobe Flash vulnerabilities have emerged from the leaked Hacking Team files, ones which allow malefactors to take over computers remotely – and crooks are apparently already exploiting at least one of them to infect machines.

Webmaster's Commentary: 

Why does anyone still use that piece of crap? I get "shockwave player has crashed" messages all day long in all my browsers!

Jul 10 18:48

iMessage, WhatsApp and Snapchat could be banned in UK in the coming weeks because the messages cannot be decoded by the government.

WhatsApp could soon be banned in the UK, owing to the strict laws on social media and online messaging services.
According to, UK Prime Minister David Cameron is now looking at new legislation that plans ‘to stop people from sending any form of encrypted messages’.

Jul 10 12:33

Israeli Facebook users launch 'Death to Arabs' campaign

A number of Israeli activists have launched a racist campaign against Arabs on Facebook, calling it "Death to Arabs", Quds Press reported on Wednesday.

Jul 10 11:55



The battle between the NSA, FBI and other government agencies who are pushing to outlaw encryption and those who want privacy is the same battle fought by the Founding Fathers more than 2oo years ago.

After all, the NSA is doing to modern Americans what King George did to Colonial America … which was one of the main reasons the Founders launched the Revolution. And see this.

And Benjamin Franklin was called a traitor (like Edward Snowden) for blowing the whistle on the government’s actions.


While encryption might seem like a new affair, it is actually very old school … and something which the Founding Fathers extensively used.

Webmaster's Commentary: 

The current demand for only the encryption that only US government agencies can decipher, is a clear demonstration of a government terrified of its own citizens.

And, as Mike demonstrated, 6 times on this website, none of the alphabet soup agencies in the US were able to decipher the encryption he created.

And please rest assured, the "bad guys" (drug dealers, etc.) already have encryption in place which is pretty bullet proof at this point, and unreachable by Federal authorities.

Jul 10 11:54

Smart Meters and Domestic Surveillance

Catherine J. Frompovich, Guest
Waking Times

Talk about copycats! Whoa! Someone did a rather convincing job of that, I’d say. It’s the Internet site “Domestic Surveillance Directorate. Defending Our Nation. Securing The Citizen,” which identifies itself as a “parody” on the NSA (National Security Agency). The parody site does an excellent job, so I encourage readers to study it thoroughly, as it contains too much information to talk about here.

Jul 10 11:07

Katherine Archuleta ousted as OPM director after massive data hack

Katherine Archuleta, the chief human resources officer who oversaw arguably the worst data breach in federal history, was ousted Friday, just a day after she insisted she was staying in for the long haul.

Jul 10 10:43

A List of Companies was handed out on Floor of NYSE BEFORE trading began–CNN then pulls story 5 hours later!

I felt I needed to record a clip by CNN about the "tech glitch" where a CNN reporter clearly indicates that a list of "problematic stocks" was circulated to traders and stockbrokers on the floor before the market opened. This CNN news clip has since been removed, and I can't find it anywhere.

Jul 10 08:18

Amazon releases the ultimate Big Brother spy device that constantly listens to everything you say in your own home

Some of the most invasive new technology is being marketed as invaluable tools that "help" around your home or office, so-called "Internet of Everything" devices that have massive potential to serve as spy tools for snooping authorities.

One such device is being marketed by online retail giant Amazon. Called the Amazon Echo, it is a voice-activated "knowledge" device designed to respond to users' questions. But to do so, the device continually monitors all sounds for your voice, and as such, given its Internet connectivity, could serve as a surveillance device to anyone who has the ability to hack into it.

Jul 10 07:46

Second OPM hack puts 21.5 million people at risk

A second data breach at the US Office of Personnel Management has affected 21.5 million people, with the hackers stealing sensitive information such as Social Security numbers and putting them at risk of identity theft, the agency announced.

Jul 10 07:00

No One Is Safe: $300 Gadget Steals Encryption Keys out of the Air, and It’s Nearly Unstoppable

Just when you thought you were safe, a new hacking toy comes along and rocks your world. Imagine a tool exists that lets hackers pluck encryption keys from your laptop right out of the air. You can’t stop it by connecting to protected Wi-Fi networks or even disabling Wi-Fi completely. Turning off Bluetooth also won’t help you protect yourself.

Why? Because the tiny device that can easily be hidden in an object or taped to the underside of a table doesn’t use conventional communications to pull off capers. Instead it reads radio waves emitted by your computer’s processor, and there’s really nothing you can do to stop it.

Researchers at Tel Aviv University and another Israeli research center called Technion have created a terrifying new hacking tool that can steal encryption keys out of the air.

Jul 10 06:57

Broken cable reportedly disconnected US island territory from Internet

Northern Mariana Islands relies on a single under-sea fiber cable, which broke.

Jul 10 06:54

US govt hack includes 1.1 mn fingerprints

A cyberattack on the U.S. Office of Personnel Management (OPM) that saw 22.1 million personal records stolen also involved the loss of 1.1 million fingerprints, the OPM has noted in a statement.

The data was taken from people who have undergone background checks for security clearances.

The total number included some 19.7 million who applied for the clearances for federal roles, plus 1.8 million non-applicants, mostly spouses or co-habitants of applicants, the agency said.

The 1.1 million fingerprints stolen represents 0.3% of the US population, while the total of 22.1 million represents almost 7%.

Jul 10 05:57

Cyber Guard Exercise Simulated Attacks On Critical Infrastructure

WEBMASTER ADDITION: So maybe they broke into OPM's database, and China gets the blame. Because if you think about it, stealing blackmail information only has value if nobody knows the crime took place. The blackmailer is very selective and only steals what they need, to minimize the risk of detection. Stealing tens of millions of records is intended to be noticed! That is why I do not think China had anything to do with this.

Jul 09 14:46

Jim Sinclair: I Think the PPT Knew They Were Going to Be Overwhelmed & Pulled the Plug!

Scenario number three seems to me to be the meatiest. I spoke to Jim Sinclair while the market was in closure to see what his take was. He immediately said to me; “it’s like if in a casino and everyone starts winning, mysteriously either the lights go out of someone pulls a fire alarm …no more gambling! I think the PPT knew they were going to be overwhelmed, if this were the case and I was the chairman of the NYSE, I would run upstairs and pull the plug out of the wall. …Problem solved …for now!“.

Jul 09 14:08

New Internet Censorship Law Could Be Coming to South Africa

Only once in a while does an Internet censorship law or regulation come along that is so audacious in its scope, so misguided in its premises, and so poorly thought out in its execution, that you have to check your calendar to make sure April 1 hasn’t come around again.

Jul 09 13:23

France’s Biggest Bank Says Bitcoin Could Make Banks Redundant

By Derrick Broze

In another sign that the world is taking bitcoin seriously, an analyst with French bank BNP Paribas says bitcoin’s blockchain technology could make existing companies “redundant”.

In BNP’s magazine Quintessence, analyst Johann Palychata writes that the blockchain “should be considered as an invention like the steam or combustion engine.” Palychata writes that the blockchain has the potential to change the world of finance, if not the entire world...