COMPUTERS/INTERNET/SECURITY | WHAT REALLY HAPPENED


COMPUTERS/INTERNET/SECURITY

Jan 24 11:17

Bill Gates: Get on your knees and beg for your jobs

He might not have said it in so many words, though I wish that he had because only that kind of candor can get Americans to wakeup and do what is necessary to survive this stealth and brutal war, calculated to destroy their lives.

Microsoft cofounder Bill Gates isn’t going to sugarcoat things: The increasing power of automation technology is going to put a lot of people out of work. Business Insider reports that Gates gave a talk at the American Enterprise Institute think tank in Washington, DC this week and said that both governments and businesses need to start preparing for a future where lots of people will be put out of work by software and robots.

Webmaster's Commentary: 

Bill misses a key point. Software and robots do not earn wages to pour back into the economy. Bill's vision of the future is 300 million Americans starving in the streets while the factories and stores are filled with robots standing around with nothing to do!

Jan 24 11:04

How the CIA made Google

INSURGE INTELLIGENCE, a new crowd-funded investigative journalism project, breaks the exclusive story of how the United States intelligence community funded, nurtured and incubated Google as part of a drive to dominate the world through control of information. Seed-funded by the NSA and CIA, Google was merely the first among a plethora of private sector start-ups co-opted by US intelligence to retain ‘information superiority.’

Jan 23 12:28

The Sorry State of In-Flight Wi-Fi

I’ve finally found something on commercial flights that’s worse than airplane food: the Wi-Fi. It’s so slow and unreliable that it shouldn’t be allowed to call itself “Wi-Fi.” Renaming it Airplane Dial-Up would be unfair to dial-up.

Jan 23 10:07

How Covert Agents Infiltrate the Internet to Manipulate, Deceive, and Destroy Reputations

Among the core self-identified purposes of JTRIG are two tactics: (1) to inject all sorts of false material onto the internet in order to destroy the reputation of its targets; and (2) to use social sciences and other techniques to manipulate online discourse and activism to generate outcomes it considers desirable. To see how extremist these programs are, just consider the tactics they boast of using to achieve those ends: “false flag operations” (posting material to the internet and falsely attributing it to someone else), fake victim blog posts (pretending to be a victim of the individual whose reputation they want to destroy), and posting “negative information” on various forums.

Jan 23 09:40

Top Google executive predicts end of the internet

At the World Economic Forum in Davos, Switzerland, Google guru Eric Schmidt gave an answer regarding the evolution of the web. “I will answer very simply that the internet will disappear,” Schmidt said on Thursday.

“There will be so many IP addresses, … so many devices, sensors, things that you are wearing, things that you are interacting with that you won’t even sense it, it will be part of your presence all the time,” he explained. “Imagine you walk into a room, and the room is dynamic. And with your permission and all of that, you are interacting with the things going on in the room.”

Webmaster's Commentary: 

The internet that Schmidt wants to go away is the internet that improves person-to-person communications, where we can share the wrongdoings of governments and corporations. The "Dynamic" room model is all about dazzling us with new toys to keep us from looking into the wider outside world and looking carefully at what is going on.

Jan 22 13:46

BOMBSHELL: IRS Has Active Contract For MILLIONS With Company HHS FIRED Over Botched Healthcare.gov

Seven months after federal officials fired CGI Federal for its botched work on Obamacare website Healthcare.gov, the IRS awarded the same company a $4.5 million IT contract for its new Obamacare tax program.

Webmaster's Commentary: 

Adding insult to injury!

Jan 22 13:37

How Obama's Hacking Laws Could Make You a Criminal

Computer-security researchers fear President Barack Obama’s proposed changes to federal hacking laws could put them out of business, could make computers less secure overall, and could put some of them — and maybe even you — in prison.

"Under the new proposal, sharing your HBO GO password with a friend would be a felony," Nate Cardozo, an attorney with the Electronic Frontier Foundation in San Francisco, told an audience of researchers and IT pros Saturday (Jan. 17) at ShmooCon 2015, a security conference held annually in Washington, D.C.

Obama showcased the proposals in his State of the Union address Wednesday night (Jan. 20). The changes to the Computer Fraud and Abuse Act (CFAA), first implemented in 1984, might make many commonplace security-research practices — and media reporting on those practices — federal crimes. Even sharing passwords for online accounts would potentially be punishable.

Jan 22 13:34

The Hidden Threat To Free Speech in Obama’s State of the Union Address

President Obama proposed new laws to protect Americans and “especially our kids” from hackers during his State of the Union address. Swaddled in that almost tender-sounding language, though, was a plan that would strengthen the government’s ability to go after journalists like Barrett Brown.

In fact, the new cybersecurity legislation would further criminalize the kind of activity for which Brown is due to be sentenced in Dallas federal court on Jan. 22. Judge Sam A. Lindsay will decide whether to let Brown, 33, off with time served for the more than two years he’s already spent behind bars, or imprison him for a maximum of eight-and-a-half years. Brown struck a deal to plead guilty to, among other charges, a Computer Fraud and Abuse Act (CFAA) felony.

Jan 22 13:01

Joint Chiefs Chairman: Congress Must Pass Obama’s Cyber Bill

Even though the new Obama cybersecurity bill (itself mostly a copy of the failed CISPA bill) centers on civilian Internet infrastructure and giving the government easier access to individual Americans’ personal data, the Pentagon is finding ways to make it all about them.

Jan 22 12:42

New Facebook feature flags fake news

You've seen them in your feed: false reports of celebrity deaths, conspiracy theories presented as real news, promises of free iPads if you share a link, quotes attributed to the Pope that he never said.

Webmaster's Commentary: 

Note the inclusion of "conspiracy theories". Facebook is providing a button where anyone can flag a story as a hoax to get it banned. This gives the "megaphonies" the ability to silence any and all criticisms of Israel, with no recourse by the original poster.

We need a new censorship-free social media platform!

Jan 21 12:54

Health care website has leaks

The government's health insurance website is quietly passing along consumers' personal data to outside websites, just as President Barack Obama is calling for stronger cybersecurity protections.

It works like this: When you apply for coverage on HealthCare.gov, dozens of data companies may be able to tell that you are on the site. Some can even glean details such as your age, income, ZIP code, whether you smoke or if you are pregnant.

HealthCare.gov contains embedded connections to multiple data firms that the administration says generate analysis to improve the consumer experience. Officials say outside firms are barred from using the data to further their own business interests.

Still, ever-evolving technology allows for individual Internet users to be tracked, building profiles coveted by advertisers.

Jan 21 12:00

My Brush with French (and World) “Press Freedom”

Later in the month, I had the opportunity to take my first river cruise in Europe, on the Saone and Rhone Rivers in the south of France. I took my laptop with me to avail myself of the WiFi service that was available on the cruise boat.

I was still a bit excited about our success with the video and eager, should the opportunity arise, to share it with anyone I thought might be interested. The WiFi worked quite well generally, but when I attempted to view “Falling to Pieces for Israel,” I was greeted with this message: “This video is not available in your country.” At no time when I was in France was I able to see it.

Webmaster's Commentary: 

Read further down about how Kindle deletes books you have bought if the local government bans them. Good reason to go back to paper and ink books if you want to protect yourself from censorship!

Jan 21 11:40

Here's What Concerns Experts About Obama's State of the Union Cybersecurity Goals

Central to the problems with the recommended updates to the Computer Fraud and Abuse Act (CFAA) are vague terms that could easily be interpreted to prosecute innocents, no matter how weak their links to actual criminal activity. Anyone who "intentionally exceeds authorized access to a protected computer, and thereby obtains information from such computer" could be charged. That sounds acceptable on first inspection, but the definition of "exceeds authorized access" includes using a computer with proper authorization "to obtain or alter information" the relevant party is not entitled to look at, "or for a purpose that the accesser knows is not authorized by the computer owner".

Webmaster's Commentary: 

Or for that matter any of the Edward Snowden documents published in the European media.

Jan 21 09:35

The FCC's possible reclassification of ISPs signals hope for net neutrality

In January 2014, the FCC's net neutrality directives were struck down in the US Court of Appeals, a ruling that was expected because in 2002, the FCC reclassified ISPs as "information services," which prevents the agency from exerting much control over the infrastructure that powers these networks.

FCC Chairman Thomas Wheeler indicated that the agency will hold a vote on February 26, 2015, which is likely to return ISPs to being "telecommunication services" under Title II of the Communications Act of 1934. This will provide the FCC the legal authority to open access to utility poles to any interested company to build internet infrastructure, as well as prevent ISPs from throttling speeds from any remote servers, or prioritizing speeds from others in exchange for payment.

Jan 21 08:43

Google Maps Engine could be quietly coming to a halt soon

UPDATED: A Google spokesperson confirmed Maps Engine support will end on January 29, 2016.

Jan 20 09:34

The Digital Arms Race: NSA Preps America for Future Battle

Normally, internship applicants need to have polished resumes, with volunteer work on social projects considered a plus. But at Politerain, the job posting calls for candidates with significantly different skill sets. We are, the ad says, "looking for interns who want to break things."

Webmaster's Commentary: 

The links in red go to PDF files of US documents regarding the scope of cyber-warfare planned by the US Government.

Jan 19 08:22

The Digital Arms Race: NSA Preps America for Future Battle

The NSA's mass surveillance is just the beginning. Documents from Edward Snowden show that the intelligence agency is arming America for future digital wars -- a struggle for control of the Internet that is already well underway.

Jan 17 10:39

NY Post, UPI Twitter Accounts Hacked, Post Fake WWIII Alerts

Hackers infiltrated press agency UPI, posting a number of tweets which contained fake claims that a US Navy aircraft carrier, the USS George Washington, was engaged in active combat with Chinese vessels. The hackers also struck the New York Post.

Jan 16 12:01

FALSE FLAG ALERT - 19,000 French websites under attack

The French Defense Ministry and ANSSI, that country's version of the NSA, confirmed to CNNMoney that they have monitored a large wave of cyberattacks on all sorts of French websites.

Webmaster's Commentary: 

And JUST in time to push the Cybersecurity bill!

Jan 16 09:03

Disinformation of Charlie Hebdo: Analyzing a Fake BBC News Site

You may have noticed that a few media outlets have been reporting that a fake BBC website was setup to spread disinformation regarding the recent Charlie Hebdo attacks in Paris, France.On January 12, 2015 our advanced threat protection flagged the bbc-news[.]co[.]uk domain as a suspicious site. While we can’t say definitively what the motives are of the operators are, it is apparent that they are untrustworthy and potentially nefarious. The predictive classification that we used to identify and flag the site is showing the attack is very similar to former incidents that malicious actors have used in the past like the Boston Marathon malware incidents.

Webmaster's Commentary: 

The purpose was a "poison the well" propaganda stunt; to trick the public into thinking that the questions raised about Paris (and Boston) are not worth paying attention to.

Jan 16 07:41

FCC to vote on Obama’s call for government-run internet next month

The Federal Communications Commission (FCC) will vote in February to decide whether municipalities can bypass state laws to provide their own internet service – a policy that President Barack Obama threw his weight behind earlier this week.

The vote is controversial but has support from the Obama administration, and proponents say it would give the public more options and faster service. Many Republicans and opponents argue that permitting such behavior exceeds the FCC’s authority.

Jan 16 07:30

Announcement: Commenting On Blacklisted News

It has come to our attention that the 3rd party commenting system we are using here on BlacklistedNews.com, Disqus is reporting that site staff or moderators on our behalf are banning commenters.

This is not true, and seems to be either a issue with disqus itself or because it is cross platformed, some of you may be being banned or profiled by Disqus for comments you are making on other sites communities.

Webmaster's Commentary: 

The problem may be Disqus itself. I have noticed that every time I win a discussion, especially one regarding Israel, I get banned. Facebook's commenting facility is also blocking me on sites like the Detroit News. That is why comments on WRH are run internally, and I do not ban commenters unless they are obviously trying to cause trouble.

Jan 15 15:16

Exclusive: White House says net neutrality legislation not needed

The White House on Thursday said legislation was not necessary to settle so-called "net neutrality" rules because the Federal Communications Commission had the authority to write them.

Webmaster's Commentary: 

In other words, Obama just bailed on the promise of net neutrality he used to get support for the new incarnation of CISPA.

Jan 15 06:53

This USB wall charger secretly logs keystrokes from Microsoft wireless keyboards nearby

Privacy and security researcher Samy Kamkar has released a keylogger for Microsoft wireless keyboards cleverly hidden in what appears to be a rather large, but functioning USB wall charger. Called KeySweeper, the stealthy Arduino-based device can sniff, decrypt, log, and report back all keystrokes — saving them both locally and online.

Jan 14 14:33

CTB Locker and Critroni Ransomware Information Guide and FAQ

CTB Locker (Curve-Tor-Bitcoin Locker), otherwise known as Critroni, is a file-encrypting ransomware infection that was released in the middle of July 2014 that targets all versions of Windows including Windows XP, Windows Vista, Windows 7, and Windows 8. Just like other file encrypting malware, the media continues to affiliate this infection with CryptoLocker when in fact this appears to have been developed by a different group using new technologies such as elliptical curve cryptography and the malware communicating with the Command and Control server over TOR. As discovered by Kafeine, this malware also appears to be part of a kit being sold online for $3,000 USD, which includes support in getting it up and running. With that said, expect to see other ransomware released using this kit, but possibly with different interfaces. More information on how this malware is being sold can be found in Kafeine's article "Crypto Ransomware" CTB-Locker (Critroni.A) on the rise.

Webmaster's Commentary: 

One of our WRH readers just got hit with this.

Jan 14 12:29

UK Moves One Step Closer to Orwell’s 1984 Nightmare

In the United States, government officials responded to Apple and Droid’s new encryption services by throwing temper tantrums in speeches and making archaic arguments in court. In the United Kingdom, home of big brother and big brother to the U.S., they simply want to ban forms of communication they cannot intrude upon.

British Prime Minister David Cameron drew media attention this week when, in response to the Paris terrorist attacks, he said

“In our country, do we want to allow a means of communication between people which […] we cannot read?”

Jan 14 11:44

EU ministers push ISPs to censor web after Paris attacks

In the aftermath of the terrorist attacks on the offices of satirical newspaper Charlie Hebdo and a Jewish supermarket in Paris, EU ministers have issued a joint statement calling for ISPs to help to report and remove extremist material online.

The statement was signed by interior ministers from 11 European countries -- including the UK's Theresa May -- on 11 January, with French ministers and security representatives from the US, Canada and EU in attendance. It called for tighter internet surveillance and border controls.

Jan 14 11:17

Play Israeli Youths’ Hilarious New “Push the Bibi” Video Game!

In the age of the political gaffe, how could Israeli PM Bibi Netanyahu’s now-notorious push to the front of the memorial march in Paris last week not turn heads? Fellow Israelis did a collective facepalm and chided him for presenting “the pushy Israeli, the impolite Israeli” to the world during a moment of global mourning for the Charlie Hebdo cartoonists and hostages killed in Paris.

But few went as far as the as-yet-unnamed young creators of “Push the Bibi,” a fun-poking arcade-style game that lets you navigate the Prime Minister to the front of the march. Featuring an image of Bibi wearing a crown, flanked by an Israeli and French flag, the game feels a little like midtown Manhattan during rush hour, but with a layer of bad PR. If your Bibi reaches the coveted spot between Angela Merkel and Ibrahim Keita, the game announces “Game over! Don’t try again.”

Jan 13 08:21

Erosion of free speech? Cameron pledges to ban Snapchat and WhatsApp

PM David Cameron may block encrypted messaging platforms Snapchat and WhatsApp if the Conservatives win May’s general election, as part of the party’s agenda to bolster surveillance powers following last week’s terror attacks in Paris.

Jan 13 08:00

BOOGA BOOGA! U.S. Central Command Twitter account hacked: ‘ISIS is already here’

Hackers claiming to be with the Islamic State terror group infiltrated U.S. Central Command’s official Twitter account Monday.

Webmaster's Commentary: 

Anonymous tracked the source of the hacks to Maryland, home of the CIA and NSA.

Jan 13 07:35

DOJ calls for dismissal of Twitter transparency lawsuit over gov't records requests

The US Department of Justice has called for the dismissal of a lawsuit filed by Twitter, in which the social network alleges its First Amendment rights are violated when the government forbids it to reveal national security requests for user data.

Twitter’s lawsuit concerns the publishing of transparency reports that detail government requests for customer information. A deal struck in January 2014 between the Department of Justice (DOJ) and five technology companies relaxed restrictions on disclosure, but Twitter has argued that the deal did not go far enough in allowing the companies to reveal exactly how many orders it gets from the government and “what types of legal process have not been received.”

Jan 13 07:25

Scientists join Elon Musk & Stephen Hawking, warn of dangerous AI

Hundreds of leading scientists and technologists have joined Stephen Hawking and Elon Musk in warning of the potential dangers of sophisticated artificial intelligence, signing an open letter calling for research on how to avoid harming humanity.

Webmaster's Commentary: 

Jan 12 16:03

CENTCOM's Twitter, YouTube accounts hacked

A group calling itself the CyberCaliphate claimed responsibility for the hack.

A Twitter account from a group identifying itself as Anonymous said Monday it had tracked the source of the hack to Maryland, but that was not confirmed by official sources.

Jan 12 14:16

Obama Will Regulate Targeted Advertising to Students Because Markets Are Scary!

President Obama announced new consumer protection regulations aimed at protecting kids from corporations—evil, greedy corporations—that use students' data to try to sell them things they might actually want.

This is a terrifying prospect that requires immediate government intervention.

Jan 12 11:22

CentCom social media accounts hacked

The Twitter account for U.S. Central Command has been hacked, a U.S. Defense official tells NBC News.

CentCom is based at MacDill Air Force Base in Tampa.

Numerous tweets have been sent out from @CENTCOM threatening American soldiers. One tweet states "ISIS is already here, we are in your PCs, in each military base." Another says "American soldiers, we are coming, watch your back!"

The profile picture on the page cites ISIS, saying "i love you isis."

Jan 12 08:59

EU response to free speech killings? More internet censorship

In the wake of this week’s terrorist attacks in Paris, which began with the killing of 12 people at the offices of satirical publication Charlie Hebdo, the interior ministers of 12 EU countries have called for a limited increase in internet censorship.

The interior ministers of France, Germany, Latvia, Austria, Belgium, Denmark, Spain, Italy, the Netherlands, Poland, Sweden and the U.K. said in a statement (PDF) that, while the internet must remain “in scrupulous observance of fundamental freedoms, a forum for free expression, in full respect of the law,” ISPs need to help “create the conditions of a swift reporting of material that aims to incite hatred and terror and the condition of its removing, where appropriate/possible.”

Jan 09 16:44

Hidden in plain sight (revisited)


Ten months ago, the Rebel Website's editor "Rebel of Oz" published an article exposing the manipulations performed by leading website ranking firm Alexa for the purpose of reducing the search engine ranking of dissident websites. (http://therebel.website/en/editorial/...) After recently changing the domain name of the Rebel Website from therebel.org to therebel.website, Rebel of Oz revisited the matter. Here's what he has found out.

Webmaster's Commentary: 

Alexa is owned by Amazon, which just signed a huge deal with the CIA.

Jan 09 16:18

Cantor Fitzgerald: Apple Watch Will Be Biggest Product Launch In Company's History

Even after having a super holiday season sales, shares of Apple Inc. AAPL 0.11% have witnessed significant declines. However, Cantor Fitzgerald analyst Brian White thinks that the going will be great for Apple in 2015, especially after the Apple Watch release.

Webmaster's Commentary: 

They said the same thing about Google Glass.

Jan 09 13:55

Computer chaos feared over 2015's leap second

The year 2015 will have an extra second — which could wreak havoc on the infrastructure powering the Internet.

At 11:59 p.m. on June 30, clocks will count up all the way to 60 seconds. That will allow the Earth's spin to catch up with atomic time.

Webmaster's Commentary: 

This is a pathetic replay of the Y2K hoax.

Jan 09 08:06

Hundreds mourn the 'death' of Fidel Castro after rumours sweep Twitter (but are they confusing him with recently departed Fidel Castro Odinga from Nairobi?)

Twitter is abuzz with rumours that Cuba's former communist leader Fidel Castro has died, although the speculation has emerged close on the heels of the death of another high-profile person with the same name.

There has been no official confirmation that the 88-year old former leader of Cuba has died and social media has an impressive track record of prematurely announcing Castro's demise.

Jan 09 08:01

MI5 chief seeks new powers after Paris magazine attack

The head of MI5, Andrew Parker, has called for new powers to help fight Islamist extremism, warning of a dangerous imbalance between increasing numbers of terrorist plots against the UK and a drop in the capabilities of intelligence services to snoop on communications.

Webmaster's Commentary: 

Snooping on law-abiding citizens didn't stop this attack (assuming the official story is true, which I don't). And as you can see below, French Authorities were already tracking these two "terror" suspects before the shooting at Charlie Hebdo!

Jan 09 07:51

White House won't take action against Aaron Swartz's prosecutors

Two years to the week before Swartz, 26, took his own life while waiting to be tried in federal court on alleged Computer Fraud and Abuse Act (CFAA) violations, the office of United States President Barack Obama issued a response on Tuesday that answers two petitions posted on the White House website in early 2013, in which the prosecutors who charged the hacker were asked by thousands to be reprimanded over accusations of overreach.

Jan 08 10:21

Directors of FBI and Office of National Intelligence blame Sony hack on North Korea

The top intelligence official in the United States for the first time attributed the security breach suffered by Sony Pictures Entertainment to his North Korean counterpart and called it “the most serious cyberattack ever made against US interests.”

Webmaster's Commentary: 

Jan 08 09:33

FCC chair likely to take Obama’s lead on net neutrality

Speaking at an electronics show, the United States’ top telecom regulator dismissed complaints that tougher regulations would discourage providers from upgrading their networks, seemingly indicating he will back tough net neutrality regulations.

Federal Communications Commission Chairman Tom Wheeler told audiences at the Consumer Electronics Show show in Las Vegas that net neutrality proposals do not currently go far enough to protect consumers. Policy analysts took that as a hint that Wheeler is leaning towards President Barack Obama’s position on net neutrality, calling for Title II regulations for broadband providers that would regulate them as if they were utilities.

Jan 08 07:55

90's kids rejoice as Internet Archive releases 2,300 MS-DOS games for free

By today's standards, classic MS-DOS games like Castle Wolfenstein and Lemmings seem rather rudimentary in terms of how they look on-screen.

A young Xbox One player today might scoff at the pixelating stylings of Prince of Persia for the Apple II, but computer games from the late '80s and '90s hold a special place in the hearts of anyone who grew up in or discovered PC gaming around that time.

Jan 07 12:53

With Power of Social Media Growing, Police Now Monitoring and Criminalizing Online Speech

Criminal cases for online political speech are now commonplace in the UK, notorious for its hostility to basic free speech and press rights. As The Independent‘s James Bloodworth reported last week, “around 20,000 people in Britain have been investigated in the past three years for comments made online.”

But the persecution is by no means viewpoint-neutral. It instead is overwhelmingly directed at the country’s Muslims for expressing political opinions critical of the state’s actions.

Jan 07 08:11

In Europe, Pirates Are Writing The Copyright Law

The collateral damage to liberties has been immense, and has spilled far outside the net. In the US, people are complaining that copyright monopoly law is now unintentionally preventing them to modify items they legally own, such as cars or games consoles. They’re absolutely wrong: that was the exact intention with the most recent round of revisions to copyright monopoly law – to limit property rights and to lock people out of their own possessions. (The copyright monopoly is, and has always been, a limitation on property rights.)

Jan 06 09:12

New 3d Print: Oahu

After making my SF Bay print, I thought I’d turn to the Hawaiian islands: I lived on Oahu for a time and have many fond memories. I was always shocked by its beauty constrained by size: I’m pretty sure you could drive around it twice in one day if you tried. Printed on my Makerbot Replicator (1) . Download the files to print over on Thingiverse.

Jan 06 09:01

Former Acting HHS Cyber Security Director Sentenced to 25 Years in Prison for Engaging in Child Pornography Enterprise

The former acting director of cyber security at the U.S. Department of Health and Human Services was sentenced to 25 years in federal prison today for engaging in a child exploitation enterprise and related charges in connection with his membership in a Tor-network-based child pornography website.

Assistant Attorney General Leslie R. Caldwell of the Justice Department’s Criminal Division, U.S. Attorney Deborah R. Gilg of the District of Nebraska and Special Agent in Charge Thomas R. Metz of the FBI’s Omaha Division made the announcement.

Jan 06 08:26

Internet Era Is Not Kind to Authoritarian TPP

It Was a Pivotal Year in TPP Activism but the Biggest Fight Is Still to Come ... A draft of the Trans-Pacific Partnership's (TPP) Intellectual Property chapter from May 2014 leaked this past fall, confirming what previous leaks had suggested: this so-called trade agreement would bring copyright enforcement provisions that threaten users' right to free expression, privacy, and unfettered access to knowledge online. – Electronic Freedom Foundation

Jan 06 08:19

Breaking the code about the Second World War

Turing was a British mathematician who worked at Bletchley Park, a secret centre for cryptographers who were trying to break the German Enigma code -- allowing the Allies to read Nazi military communications. By designing a machine that could rapidly process information, Turing broke the code -- which ended the war an estimated two years sooner, saving millions of lives -- and through the process laid the foundation for modern computers.

How was Turing rewarded? The British state drove him to suicide, and wrote him out of history, for being gay. He was persecuted in 1952 with the same law that destroyed Oscar Wilde, avoided prison only by agreeing to be chemically castrated, and ate a cyanide-laced apple in 1954.

Jan 05 08:39

Hunting the hackers: Tough and getting tougher, but more important than ever

Events such as the massive attack on Sony Pictures have emphasised yet again how anyone with a grudge and a certain amount of technical knowledge can undermine the digital systems on which modern internet-connected economies rely.

Jan 05 08:19

Sony Hack a Prime Excuse for New US Cybersecurity Laws

Congress has been reluctant to pass the various draconian cybersecurity laws pushed by the administration in recent years, but that may be changing because of the high-profile Sony Pictures hack .

With the FBI ‘successfully’ pinning it on North Korea, at least so far as everyone on Capital Hill is concerned, there is a great deal of pressure for Congress to “do something,” and little interest in the evidence that North Korea had nothing to do with it.

Webmaster's Commentary: 

Memo to the FBI: if you had real, actionable evidence that North Korea hacked into SONY, that would be one thing; but you don't so the charge here is nothing more than a bold-faced lie, and both US citizens, and the world, knows it.

The only bloody reason you pinned this on North Korea is that North Korea, at the New Year, was reaching out to South Korea for a new round of talks, aimed at ratcheting down the tension between the two countries.

Should that have happened, it would have curtailed this administration's ability to engage in war with North Korea, as a back door to a war with China, which must defend it due to treaty obligations.

The FBI's credibility, if it was not before, is in absolute meltdown, and thinking Americans do not believe one word you say.

Jan 04 12:35

More Data on Attributing the Sony Attack

An analysis of the timestamps on some of the leaked documents shows that they were downloaded at USB 2.0 speeds -- which implies an insider.

Our Gotnews.com investigation into the data that has been released by the "hackers" shows that someone at Sony was copying 182GB at minimum the night of the 21st -- the very same day that Sony Pictures' head of corporate communications, Charles Sipkins, publicly resigned from a $600,000 job. This could be a coincidence but it seems unlikely. Sipkins's former client was NewsCorp and Sipkins was officially fired by Pascal's husband over a snub by the Hollywood Reporter.

Two days later a malware bomb occurred.

We are left with several conclusions about the malware incident:

Jan 04 10:08

CIA joins social media, is immediately trolled

The CIA admitted as far back as 2011 that its agents and employees regularly scan social media to spy on intelligence targets. It already had multiple accounts on Flickr and YouTube, but only debuted on Twitter Friday because it had spent months lobbying Twitter to stop someone else who was already using the @CIA handle.

Jan 04 09:59

‘US pursuing political agenda, not justice, sanctioning N.Korea over Sony hack’

There is no hard evidence for the United States’ claims that the North Korea was behind the hack on Sony. In fact, the evidence seems to point in a very different direction. Reports in US and global media say experts taking part in the investigation essentially rule out North Korea’s participation. They say the evidence simply isn’t there to point that finger.

Moreover, those very same experts point out that due to the complexity of the cyberattack it is not quite possible to determine who was behind it in mere 48 or 72 hours as was the case with the US government. Rather than seeing the evidence and drawing conclusions from that, it seems that Washington is pursuing a political agenda and using this issue to further that agenda.

Jan 04 09:24

How Many of These Secret Surveillance Programs Do you Know About?

According to various publications in the American and foreign media, the United States has created a global system of cyber espionage that allows the interception and processing of personal data around the globe in violation of fundamental human rights. Tapped phones, intercepted short messages, supervised discussions in social networks and stolen emails – this is the ugly reality we are living in. The NSA and other units of the United States Intelligence Community are more than capable of breaching any mobile operating system, be it iOS, Android or BlackBerry OS.

Washington and its agencies are literally spending billions of taxpayer dollars annually under the convenient guise of the “war on terror”, which in fact turns out to be a hidden war against its own citizens, now deprived of basic human rights. But what makes it even worse is that it’s pushing its satellite countries to launch an all-out offensive against the civil liberties of Europe and beyond.

Webmaster's Commentary: 

The alleged "war on terror" is simply a cover for a continuing surveillance war against Americans.

We have moved so quickly from "the land of the free...and the home of the brave" to the "land of the cowed...and the home of the surveilled" quickly enough to make my head spin.

Jan 03 11:08

Robots can now learn to cook just like you do: by watching YouTube videos

The demonstration is the latest impressive use of a type of artificial intelligence called deep learning. A hot area for acquisitions as of late, deep learning entails training systems called artificial neural networks on lots of information derived from audio, images, and other inputs, and then presenting the systems with new information and receiving inferences about it in response.

The researchers employed convolutional neural networks, which are now in use at Facebook, among other companies, to identify the way a hand is grasping an item, and to recognize specific objects. The system also predicts the action involving the object and the hand.

Jan 03 08:29

How Financial Looters Are Destroying Your 401(k) in a Fraction of a Second | Brainwash Update

Jan 03 07:58

White House announces sanctions against N. Korea

US President Barack Obama signed an executive order on Friday authorizing the imposition of new sanctions against certain North Korean entities in the wake of the recent Sony hack the White House continues to blame on Pyongyang.

Webmaster's Commentary: 

There is zero evidence that north Korea had anything to do with the SONY hack and quite a bit of evidence it was an internal hack by a disgruntled employee. This is Obama's version of Saddam's nuclear weapons; a made up threat to provoke another nation into war.

Jan 02 10:20

Apple facing lawsuit over shrinking iPhone and iPad storage following iOS 8 update

Apple is facing a lawsuit over the amount of space that the iOS 8 update takes up on iPhone, iPads, and iPods.

The complaint, filed in California by Miami residents Paul Orshan and Christopher Endara, claims that the 16GB iPhones and iPads they purchased had less than the stated amount of usable space, and that this was further reduced after upgrading his iPhone 5S from iOS 7 to iOS 8.

The complaint claims that iOS 8 can occupy more than 23 percent of the storage available on some devices, and further goes on to claim that upgrading devices from iOS 7 to 8 can cause users to lose a further 1.3GB of storage.

Webmaster's Commentary: 

I guess all that government spyware takes up a lot of room!

Dec 31 09:44

NSA spying in Vienna detailed at Chaos meet

According to a report in the Austrian news daily Der Standard, Möchel had made extensive use of the documents revealed by Edward Snowden, the former systems administrator and defense contractor with Booz Allen Hamilton who allegedly leaked NSA and CIA secret archives.

The documents show that the American National Security Agency operates a robust presence in the Austrian capital, and with good reason. Despite Vienna having a population of only 1.75 million people, the city is home to more than 17,000 accredited diplomats, many of whom work in the various international organizations, including the United Nations, IAEA, UNIDO, CTBTO, OSCE and OPEC.

That means nearly 1 percent of Vienna's population have diplomatic status - and a significant portion of those are likely to be spies, according to Austrian investigative journalist Emil Bobi, who estimates that there are more than 7,000 spooks living in the city.

Dec 31 09:43

India blocks 32 websites, including GitHub, Internet Archive, Pastebin, Vimeo

Today, Centre for Internet and Society (Bangalore, India) Policy Director Pranesh Prakash posted a copy of the notice listing the 32 blocked URLs.

Dec 30 16:44

The Great Firewall: China Permanently Shuts Down Google, Gmail and Other Services On Mainland

Google’s Gmail was blocked in China after months of disruptions to the world’s biggest email service, with an anti-censorship advocate suggesting the country’s “great firewall” was to blame.

Large numbers of Gmail web addresses were cut off in China on Friday, according to GreatFire.org, a China-based freedom of speech advocacy group. Users said the service was still down on Monday.

“I think the government is just trying to further eliminate Google’s presence in China and even weaken its market overseas,” said a member of the group who uses a pseudonym. “Imagine if Gmail users might not get through to Chinese clients. Many people outside China might be forced to switch away from Gmail.”

Webmaster's Commentary: 

China has set up their own search engines and mail providers to allow the Chinese people to web surf and communicate without the US Government spying on them. Russia has also done this.

Dec 30 12:28

FBI Busted Falsely Blaming North Korea for Sony Hack

I hate North Korean leaders …

They’re not only clowns sporting bad haircuts and weird clothes, but they live in luxury while the population literally starves.

But the FBI’s official assertion that North Korea carried out the attack in retaliation for Sony’s releasing the movie “The Interview” is B.S.

Webmaster's Commentary: 

Actually, America's money-junkies live in luxury while Americans starve, so I don't see much difference.

Dec 30 11:42

New NSA leak reveals scope of agency's war against crypto

?The National Security Agency boasts the ability to compromise computer protocols meant to encrypt private internet data, leaked documents have revealed. But the NSA has fallen short of totally winning its war against crypto.

Classified NSA files taken by former contractor Edward Snowden and published for the first time by Der Spiegel on Sunday reveal that, while the United States’ intelligence agency is indeed adept at cracking encryption, its efforts are no match when it comes to some of the more popular protocols used to keep communications private.

Webmaster's Commentary: 

The last 6 NSA challenges Mike coded have yet to be broken.

So, even though the NSA boasts about seeing/hearing all of our communications, they really cannot and do not.

Mike and I have speculated that any agents tasked with following our cybertrails have been given that task as punishment duty.

As a Christian pacifist, who never advocates violence, and participates in community charities, I must be a very dull read! :-)

And Mike, as a truth-teller, who also never advocates violence, could never possibly construed as a "threat" by any thinking person.

Dec 30 08:45

It Wasn't North Korea Or Russia: Sony Hack "Perpetrator" Said To Be Laid-Off, Disgruntled Employee

First it was, with "absolute certainly", North Korea. Then, out of the blue, an even more ridiculous theory emerged about the origin of the Sony hackers: Russia. Now, we finally get the truth, and as it turns out it was neither of the abovementioned sovereign actors who had nothing better to do than to hack movie scripts and racist emails: it was Sony's own disgruntled worker who was the source of the hack. According to Politico, FBI agents investigating the Sony Pictures hack were briefed Monday by a security firm that says its research points to laid-off Sony staff, not North Korea, as the perpetrator.

"Researchers from the cyber intelligence company Norse have said their own investigation into the data on the Sony attack doesn’t point to North Korea at all and instead indicates some combination of a disgruntled employee and hackers for piracy groups is at fault."

Webmaster's Commentary: 

GREAT MOMENTS IN THE HISTORY OF THE FBI.

"[Your information is] too precise, too complete to be believed. The questionnaire plus the other information you brought spell out in detail exactly where, when, how, and by whom we are to be attacked. If anything, it sounds like a trap."

FBI response to the top British spy, Dusko Popov (code named "Tricycle") on August 10, 1941, dismissing Popov's report of the complete Japanese plan for the attack on Pearl Harbor.

Pearl Harbor: The Verdict Of History by Gordon Prange, appendix 7 published in 1986. Based on records from the JOINT CONGRESSIONAL COMMITTEE on the Investigation of the Pearl Harbor Attack, Nov 15, 1945 to May 31, 1946.

Dec 30 06:58

New documents reveal which encryption tools the NSA couldn't crack

Not every service fared so well. Following a particular file across the web is marked as "trivial," while decrypting emails sent through the Russian mail service "Mail.ru" is marked as "moderate." Virtual private networks also offer little protection: documents show the NSA planning the capacity to surveil 20,000 VPN connections per hour. Perhaps most alarming, the NSA seems to have completely circumvented the HTTPS system, which is used to secure connections between websites and browsers. By late 2012, the agency expected to be able to intercept 10 million HTTPS connections per day.

Webmaster's Commentary: 

The most secure communications are obtained by creating your own system of encryption which the NSA does not know. Breaking an encrypted message requires two steps. First you have to find the encryption method, then the keys. Of the two, the first is by far the hardest. The allies were unable to break the German Enigma code until they captured an actual machine. Only then could they brute-force the actual message keys. If you are using the known encryption systems such as PGP, the bad guys already have the method, and enough supercomputers to find the keys. But if you develop your own encryption method, no amount of computer power will be able to read the message as long as NSA does not know that method. As we demonstrated with our six NSA challenges, anyone with a modicum of code writing skill can create new methods that will defeat the bad guys' attempts to peek into your private business affairs and steal your secrets for their own personal gain (as they have been caught doing).

Dec 30 06:50

SONY HACK: An Inside Job

Dec 29 19:04

Revenge porn offenders to be charged with domestic abuse

From today, police and prosecutors will be required to consider whether posting explicit pictures of a former partner constitutes a form of domestic abuse

Dec 29 16:46

United Airlines sues entrepreneur, 22, for tip website on how to score cheap flights

United Airlines and Orbitz have filed a civil lawsuit against a 22-year-old New Yorker for running a website that searches for the cheapest flights available using a loophole called hidden city ticketing.

Aktarer Zaman, who founded Skiplagged.com last year, says he isn’t doing anything illegal by exposing an “inefficiency” in airline pricing, a local Fox affiliate reported.

The idea of hidden city ticketing is to buy a one-way airline ticket that has a layover at your actual destination and then ditching the last leg of the trip. For instance, if you want to fly from New York to San Francisco, you would book your flight from New York to Lake Tahoe, with a layover in San Francisco, and then get off there, the Fox affiliate reported.

Dec 29 10:01

Estonia offers e-residency to foreigners

On 21 October, Estonia’s parliament unanimously voted to extend national digital e-residency rights to foreigners by the end of the year. With this e-residency programme, the least populous country in Europe, of 1.3 million people, intends to attract around 10 million “digital citizens” by 2025.

Estonians say their open and online culture – 77% of the population has internet access – is behind this experiment on a state level, and there has been little controversy over the move. After all, this is the country which created Skype.

From Talinn’s point of view, it hopes that foreign citizens will be encouraged to open an online business in the Estonian domain. Authorities say with their online system, applications can be processed in as little as 18 minutes.

Webmaster's Commentary: 

WOW!!:-) Instead of making it harder to do business, the Estonian government is making it easier to do business here!!.

Dec 29 09:04

Browser Hijacking and Free Browser Hijacker Removal Tools

Browser Hijacks appear to be increasing at an alarming rate globally, and it can be a real nuisance, and at times dangerous too. In this post we will have a look at Browser Hijacking and how to prevent and remove Browser Hijacking in Internet Explorer, Firefox, Chrome and Opera web browsers for Windows, natively or by using free Browser Hijacker Removal tools and software.

Webmaster's Commentary: 

There seems to be a sudden surge in browser hijacking. I am getting complaints of abusive advertising appearing on my web page that does not come from my server, such as a pop-over promising a free iPhone if you fill out a survey of some kind. Even if these hijack ads are not malware they are still making money off of other peoples' websites. This article lists ways to check your browsers for hijackers and remove them.

Dec 27 09:46

How Covert Agents Infiltrate the Internet to Manipulate, Deceive, and Destroy Reputations

Among the core self-identified purposes of JTRIG are two tactics: (1) to inject all sorts of false material onto the internet in order to destroy the reputation of its targets; and (2) to use social sciences and other techniques to manipulate online discourse and activism to generate outcomes it considers desirable. To see how extremist these programs are, just consider the tactics they boast of using to achieve those ends: “false flag operations” (posting material to the internet and falsely attributing it to someone else), fake victim blog posts (pretending to be a victim of the individual whose reputation they want to destroy), and posting “negative information” on various forums.

Dec 27 09:04

False Flag Alert! US Nuked From The Inside

Two issues are dealt with in the video below... 1) How NORSE has evidence that the SONY hack originated from within the US and; 2) How the United States is second only to China in being the originating location of attacks occurring right now INSIDE the United States.

Kurt Stammberger, a senior vice president of Norse, told CBS News "Sony was not just hacked, this is a company that was essentially nuked from the inside." Stammberger continues on to state "We are very confident that this was not an attack master-minded by North Korea and that insiders were key to the implementation of one of the most devastating attacks in history."

Dec 27 08:29

Why America would be foolish to wage a cyber-war against North Korea

North Korea's creaky internet crashed for nine hours on Monday, and is now mostly back up. This outage is probably no coincidence. Many observers assume that the Obama administration is behind it, retaliating to what the government called North Korean "cyber vandalism" aimed at Sony Pictures. That attack, as everyone knows, led Sony to cancel the release of a comedy, The Interview, about the assassination of North Korea's young leader, Kim Jong Un.

If President Obama did launch an undeclared cyberwar against North Korea, it may well be the equivalent of Bill Clinton launching cruise missiles at Osama bin Laden's empty training camps back in the 1990s. Clinton's salvo was never a real strategy to deal with a growing threat, and resulted only in intensified attacks. Obama may be making a similar mistake now.

Dec 27 08:16

North Korea blames the US for shutting down its internet and calls President Obama a MONKEY

The North Korean government called President Obama 'a monkey living in a tropical forest' in a racist tirade against the United States, which the dictatorship blames for knocking out its internet.

Officials on the National Defense Commission, led by Supreme Leader Kim Jong Un, lashed out at America, calling its leader 'reckless' and saying the U.S. is shameless.

Washington has denied it has anything to do with the disturbance, which has seen the internet repeatedly black out in the country.

Dec 27 08:12

Computer security specialists cast doubt on FBI claim that North Korea is behind Sony hacking


Nothing like embarrassing America yet again like Obama going out and saying that we will be responding “proportionally” to the attack from North Korea and then finding out it might not have been them at all.

Dec 26 09:16

U.S. Spy Agency Reports Improper Surveillance of Americans

The National Security Agency today released reports on intelligence collection that may have violated the law or U.S. policy over more than a decade, including unauthorized surveillance of Americans’ overseas communications.

Dec 26 08:24

Was the Sony Hack a Domestic Ploy?

Our suspicions about the Sony hack were raised when North Korea accused the US of involving its CIA. By then the story had been continuously presented by the mainstream media, always a sign that some sort of promotion was underway.

And now the next shoe has dropped – predictably. The administration is calling for "stronger cybersecurity laws."

Dec 24 12:22

Govt abusing Bill of Rights with digital surveillance loopholes, lawyers allege

Government and corporate entities have far too much leeway to hack into webcams in order to conduct surveillance, and laws supposedly designed to protect victims of such an intrusion are inadequate, according to a new report.

The report, titled 'Digital Peepholes,' highlights how easy it is for law enforcement and other government agencies, as well as corporations, to violate Americans’ Third and Fourth Amendment rights.

Constitutional “guarantees should preclude the government from remotely activating webcams, given that webcams are frequently located in the home, where privacy rights are at their strongest,” wrote the report’s authors, all of the Institute for Science, Law and Technology at the IIT Chicago-Kent College of Law.

Dec 24 07:45

BREAKING: We Can Conclusively Confirm North Korea Was Not Behind #Sony Hack

We are left with several conclusions about the malware incident:

1. The “hackers” did this leak physically at a Sony LAN workstation. Remember Sony’s internal security is hard on the outside squishy in the center and so it wouldn’t be difficult for an insider to harm Sony by downloading the material in much the same way Bradley Manning or Edward Snowden did at their respective posts.

2. If the “hackers” already had copies, then it’s possible they made a local copy the night of the 21st to prepare for publishing them as a link in the malware screens on the 24th.

Sony CEO Michael Lynton’s released emails go up to November 21, 2014. Lynton got the “God’sApstls” email demand for money on the 21st at 12:44pm.

This tweet by an American fluent in Japanese was yet another indication that it was an insider at Sony but in Japan.

Dec 24 07:16

The Facts Behind The Sony Hack; Sony To Show ‘The Interview’ On Christmas Day

Sony will show The Interview on Christmas Day in theaters after all, suggesting that the entire farce could have been one huge cynical marketing campaign to promote the movie, bolstering the contention that the hack was an inside job.

Dec 24 07:12

North Korea Says Obama And The CIA Are Behind The Sony Cyber Attacks

The North Korean National Defense Commission, led by Kim Jong-un, says the Obama administration is behind the production of Sony Pictures’ “The Interview,” a film featuring the assassination of the North Korean president.

It is unlikely Obama was directly involved in the production of the movie, which Sony pulled after theaters were allegedly targeted.

A more likely collaborator is the CIA, known for working closely with Hollywood on propaganda projects.

“Black Hawk Dawn, Zero Dark Thirty and Argo, those are only a few major recent productions showing how today’s movie industry promotes US foreign policy,” writes Julie Lévesque. “But the motion picture has been used for propaganda since the beginning of the 20th century and Hollywood’s cooperation with the Department of Defense, the CIA and other government agencies is no modern trend.”

Dec 23 13:36

Nuclear Power Plant In South Korea Hacked

The marketing stunt involving what would otherwise have been a straight to DVD flop, a pudgy North Korean dictator, an FBI desperate to create a fabricated YouTube clip of North Korean hackers scheming maliciously in their mother’s basement, an American president demanding retaliation because a 80286-equipped hacking army poses a threat to the American way of life and other surreal, B-grade movie elements may be about to end with the “shocking” re-release of The Interview on Christmas day, but that doesn’t mean that the push to implement an internet kill switch is over. Which really is what the relentless “hacking on the front pages” media scramble is all about.

Webmaster's Commentary: 

My first question is why these mission-critical systems are even connected to the outside internet in the first place?

Dec 23 10:27

Why Is Obama Using Flimsy Evidence to Blame North Korea for Sony Hack?

A lot of technology magazines are rather dubious at President Obama's accusations that it was the North Koreans that that it. Wired magazine, which is pretty well known for covering technology, says that it's akin to saying Saddam Hussein had weapons of mass destruction to say the North Koreans had the capability to pull something like this off.

Dec 23 09:15

Secret report cited in NSA surveillance lawsuit, govt silent on its existence

Wiebe cited a top-secret 2009 report by the NSA inspector general detailing the government’s email and internet data collection, originally published by The Guardian. Other documents, including AT&T’s first surveillance transparency report, published earlier this year, provide evidence of the program’s reach, he said.

James Gilligan, a Department of Justice attorney, said the government had never confirmed nor denied the existence of the secret 2009 report, and added that AT&T’s report only relates to the legal court orders received under the Foreign Intelligence Act.

Dec 23 07:47

As North Korea Loses Internet, Anonymous, Others Question Whether It Really Hacked Sony

On Friday, the FBI released a statement blaming the North Korean government for the massive cyberattack against Sony last month. President Barack Obama also said over the weekend that he was considering re-adding North Korea to the United States' terrorist watch list.

But North Korea has continued to deny that it's behind the Sony breach, and the group that has claimed responsibility -- the hacking collective Guardians of Peace -- is mocking the FBI online, according to The Daily Beast. Some security researchers, as well as members of the hacktivist group Anonymous, are questioning whether there is enough evidence to blame North Korea at all.

"I have yet to see evidence of North Korea behind this," Kyle Wilhoit, a senior threat researcher at Trend Micro, a Japanese security firm, told HuffPost on Monday. Wilhoit argued that just because the FBI sees similarities between the code used in the Sony hack and other North Korean malware doesn't mean it was the same attacker.

Dec 23 07:46

Cyber Command investment ensures hackers targeting U.S. face retribution

In the shadows of the Sony hacking incident and North Korea’s massive Internet outage, the Pentagon has quietly built a multibillion-dollar cyberwarfare capability and trained its commanders to integrate these weapons into their battlefield plans.

U.S. Cyber Command was officially stood up in 2010, based at Fort Meade in the Maryland suburbs of the nation’s capital, consolidating intelligence and cyberwarfare capabilities of the Army, Air Force, Navy and Marines under one house. Soon, billions of dollars were being invested in the concept that cyberattackers targeting America should be prepared to sustain their own damage.

Webmaster's Commentary: 

Cyber Command will be no more effective at harming the attackers than the NSA is at preventing the attacks in the first place.

Dec 23 07:39

China condemns cyberattacks, but says no proof North Korea hacked Sony

China said on Monday it opposed all forms of cyberattacks but there was no proof that North Korea was responsible for the hacking of Sony Pictures, as the United States has said.

North Korea has denied it was to blame and has vowed to hit back against any U.S. retaliation, threatening the White House and the Pentagon. The hackers said they were incensed by a Sony comedy about a fictional assassination of North Korean leader Kim Jong Un, which the studio has pulled.

Dec 23 07:29

North Korean websites back online after shutdown

Key North Korean websites were back online Tuesday after a nearly 10-hour shutdown that followed a U.S. vow to respond to a crippling cyberattack on Sony Pictures that Washington blames on Pyongyang.

It wasn't immediately clear what caused the Internet stoppage in one of the least-wired and poorest countries in the world, but outside experts said it could be anything from a cyberattack to a simple power failure. The White House and the State Department declined to say whether the U.S. government was responsible.

Dec 23 07:02

Google Reveals Government Attempt to Scrub Alleged Prisoner Abuse

Google on Monday released information about the government requests it receives to take down its content, revealing attempts in the U.S. to scrub content related to alleged prisoner abuse, sex crimes with a minor, and fraudulent business dealings.

The search giant for the first time released specific examples of takedown requests from governments around the world alongside its semiannual transparency report, providing a fuller look at how law-enforcement agencies and others attempt to police search results and YouTube videos.

One such example recounts a request from the Georgia Department of Corrections to "remove a YouTube video depicting alleged abuse of inmates."

Dec 23 06:55

China reluctant to join U.S. in punishing North Korea over cyberattacks

China said Tuesday there was no proof that North Korea was behind a cyberattack on Sony Pictures Entertainment, signaling its reluctance to side with the United States over the incident, while also rejecting speculation it could have cut off Pyongyang’s Internet access as punishment.

Asked about American requests for help from China to punish North Korea for cyberattacks, Hua Chunying, a spokeswoman for China’s foreign ministry, said the United States and North Korea needed to communicate directly.

She said Beijing had not seen proof of who was behind the attack on Sony. “We need sufficient evidence before drawing any conclusion,” she said at a news conference.

Dec 22 15:16

North Korea goes completely offline: Report

North Korea is having major Internet problems, just days after President Barack Obama promised a proportional response to the devastating hacks against Sony.

Dec 22 13:17

North Korea's internet is offline; massive DDOS attack presumed

North Korea’s addresses are managed by Star Joint Venture, the state-run Internet provider, which routes many of those connections through China Unicom, China’s state-owned telecommunications company.?

North Korea’s already tenuous links to the Internet went completely dark on Monday after days of instability, in what Internet monitors described as one of the worst North Korean network failures in years.

The loss of service came just days after President Obama pledged that the United States would launch a “proportional response” to the recent attacks on Sony Pictures, which government officials have linked to North Korea. While an attack on North Korea’s networks was suspected, there was no definitive evidence of it.

Webmaster's Commentary: 

So now when the US takes down the power grid, they will claim this is North Korea's "retaliation" for the DDOS attack.

Dec 22 09:02

How Obama Took Sony’s Crisis From Bad to Worse

But as much as Sony seemed to mishandle its sorry situation in recent days, the severity of the circumstances Sony faced are so extreme that it begs the question of whether anyone could have handled it better. Every step of the way Sony has been faced with no-win situations and just plain bad luck.

Just when things couldn’t have looked any worse for the studio, President Obama turned sharply critical of Sony in a news conference Friday, second-guessing its decision to withdraw “The Interview” from theaters.

Dec 22 08:37

The FBI told their story about North Korea attacking Sony. Before we retaliate, read what they didn’t tell you.

The government blames North Korea of the Axis of Evil for the attack on Sony, a claim quite like the bogus claims of the past we so credulously believed. No matter how often they lie to us, Americans believe what the government tells us. They lie, we believe, their lies are exposed — rinse, repeat. It makes us easy to govern, incapable of self-government, and quite different than our skeptical unruly forebearers. We can do better. This is a great day to begin. Read this and decide for yourself. This is the most complete collection of information I’ve found on this story.

Dec 22 08:09

Hacking Collective Anonymous Says FBI Is Lying, “North Korea Is Not Source Of Hack”

Having confirmed unequivocally, in a statement by the FBI and reiterated by President Obama, that “the North Korean government is responsible” for hacking Sony, it appears the YouTube-less ‘evidence’ the FBI provided is being questioned by the hacking-collective ‘Anonymous’ and former Lulzsec hacker Sabu. As The Daily Beast reports, the hackers blasted, the North Koreans “don’t have the technical capabilities,” and added “we all know the hacks didn’t come from North Korea, and “all of the evidence FBI cites would be trivial things to do if a hacker was trying to misdirect attention to DPRK.” Meanwhile, on Saturday afternoon, Guardians of Peace, the hacking group that’s so far claimed responsibility for wreaking havoc on Sony, posted a message online mocking the FBI’s investigation – a series of gyrating animated bodies shrieking, “You are an idiot!”

Webmaster's Commentary: 

GREAT MOMENTS IN THE HISTORY OF THE FBI.

"[Your information is] too precise, too complete to be believed. The questionnaire plus the other information you brought spell out in detail exactly where, when, how, and by whom we are to be attacked. If anything, it sounds like a trap."

FBI response to the top British spy, Dusko Popov (code named "Tricycle") on August 10, 1941, dismissing Popov's report of the complete Japanese plan for the attack on Pearl Harbor.

Pearl Harbor: The Verdict Of History by Gordon Prange, appendix 7 published in 1986. Based on records from the JOINT CONGRESSIONAL COMMITTEE on the Investigation of the Pearl Harbor Attack, Nov 15, 1945 to May 31, 1946.

Dec 22 08:03

Staples data breach exposes 1.16mn cards in 115 stores

The world’s largest office supply retailer Staples has revealed that up to 1.16 million of its clients’ payment cards might have been “affected” by a massive malware attack on the company’s point-of-sales systems.

“Staples’ data security experts detected that criminals deployed malware to some point-of-sale systems at 115 of its more than 1,400 US retail stores,” the company said in a press release.

Webmaster's Commentary: 

And the NSA couldn't find these guys, either!

Dec 22 07:24

N. Korea threatens US, demands apology for Obama’s ‘reckless rumors’ of Sony hack

N. Korea has demanded an apology from the US for “recklessly” circulating an unsubstantiated rumor about Pyongyang’s culpability in the recent Sony hack, warning the “proportional” response promised by Obama will be met with the “toughest counteraction.”

Dec 22 07:14

Why Canada's Internet Keeps Getting More Expensive

A Canadian reddit poster claiming to be a Shaw employee—one of Canada’s premier telcos—with news about new internet rates created a stir online this week by posting what looked like advance details of upcoming rate plans.

The rate plans appeared to change the pricing schemes so that new customers would pay equal money for slower service. Existing customers, whose rates will be going up anyway, would be grandfathered on their old plans—with updated prices showing an obvious path for upsell to the new rate tiers.

Webmaster's Commentary: 

Selling you less for more; that's the new western business model!

Dec 21 08:51

no evidence for sony hack!!!

Dec 21 08:28

Cyberattack on German steel mill inflicts serious damage

Unknown hackers have inflicted ‘serious damage’ to a German steel mill this year by breaking into internal networks and accessing the main controls of the factory, the German Federal Office for Information Security (BSI) revealed in its annual report.

The report says that the intrusion into the mainframe system caused significant damage to a blast furnace as the attackers managed to manipulate the internal systems and industrial components, causing outages that disrupted the controlled manner of operation.

Webmaster's Commentary: 

"Trust me, it's those North Korean, IRANIAN, Chinese, and Russian hackers (did I miss anyone) at work again!" -- Official White Horse Souse

Dec 21 08:10

Obama: North Korea’s attack ‘cybervandalism,’ not an ‘act of war’

President Obama said Sunday he does not consider North Korea’s attack on Sony Pictures to be an “act of war,” instead calling it an example of “cybervandalism” that must be met with a proportional response from the U.S. government.

Webmaster's Commentary: 

"Of course, if those gosh darn North Koreans (with help from Russia, China, and Iran) do something worse, like shut down the non-commercial internet or black out a few cities, that is another kettle of kimchee altogether!" -- Official White Horse Souse

Dec 20 15:45

North Korea Says They're Being Framed for Sony Cyber Attack

Guardians of Peace, the hacker group that previously took credit for the Sony cyber attack, mocked the FBI and their investigation that determined North Korea was "centrally involved" in the Sony hack. "The result of investigation by FBI is so excellent that you might have seen what we were doing with your own eye," the Guardians of Peace wrote in a statement posted on the file-sharing site Pastebin (via CNN). "We congratulate you success. FBI is the BEST in the world. You will find the gift for FBI at the following address. Enjoy." The hackers also included a link to a YouTube video titled "you are an idiot!"

Dec 20 08:01

ZeuS variant strikes 150 banks worldwide

Kaspersky has discovered a fresh ZeuS malware strain which has targeted financial institutions worldwide.

The company says the banking trojan's latest form has targeted a total of 150 different banks and 20 payment systems worldwide; focusing on the infiltration of online banking. In total, 15 countries have been attacked, including the United Kingdom, United States, Spain, Russia, Japan and Italy.

Webmaster's Commentary: 

It's North Korea ... and ... Iran. Yeah; that's it Iran. Iran did it. And also China. And Russia. And Venezuela. And all those guys we need to bomb." -- Official White Horse Souse

Dec 20 07:37

MEGA BEX ALERT - FOX News: Evidence in Sony hack attack suggests possible involvement by Iran, China or Russia, intel source says

The U.S. investigation into the recent hacking attack at Sony Pictures Entertainment has turned up evidence that does not point to North Korea as the "sole entity" in the case, but rather, raises the possibility that Iran, China or Russia may have been involved, an intelligence source told Fox News on Thursday.

Webmaster's Commentary: 

Dec 20 07:23

Sony hack: China may have helped North Korea, US states

US official states that North Korea responsible for hacking of Sony over The Interview film – and that Kim Jong-un's regime may have had Chinese help

Webmaster's Commentary: 

So, according to US Officials and FOX News, North Korea, China, Russia, Iran, (and everyone else the US needs an excuse to invade) secretly create the most potent cyber-army in the world, then expose the existence of that cyber-army with a pointless attack on a movie studio?

And if you believe THAT one, I have some of Saddam's nuclear weapons to sell you!

Dec 20 07:20

After Sony hack, is U.S. grid next?

Now that U.S. intelligence has blamed North Korea for the Nov. 24 cyber attack on Sony Pictures, there is growing concern that the Hermit Kingdom has the capability of bringing down the vulnerable U.S. national grid system.
Read more at http://www.wnd.com/2014/12/after-sony-hack-is-u-s-grid-next/#uM8SW1GrR...

Webmaster's Commentary: 

Yep; looks like the US is going to pull a 9-11 false-flag to get their wars going again!

This would be a good time for all the "white hat" hackers, who insist they use their powers only for good, to walk their talk and nail the real perpetrators of this war-starting hoax!

Dec 20 07:18

North Korea says did not hack Sony, wants joint probe with U.S.

North Korea said U.S. accusations that it was involved in a cyberattack on Sony Pictures were "groundless slander" and that it was wanted a joint investigation into the incident with the United States.

An unnamed spokesman of the North's foreign ministry said there would be "grave consequences" if Washington refused to agree to the joint probe and continued to accuse Pyongyang, the official KCNA news agency reported on Saturday.

On Friday, President Barack Obama blamed North Korea for the devastating cyberattack, which led to the Hollywood studio cancelling "The Interview", a comedy on the fictional assassination of North Korean leader Kim Jong Un.

Dec 19 16:20

Movie industry's evil plan to destroy the internet is going precisely nowhere

As well as finding out that Jennifer Lawrence earns less than her male counterparts, Hollywood studio execs are self-important a-holes and Sony Pictures has a password policy that a baby could break ... it turns out movie giants are also seeking to DESTROY THE INTERNET with a ten-page legal memo.

The memo [PDF], written by outside law firm Jenner & Block in August this year, looks into whether ISPs can be pressured into removing links to pirate content by using the legal language around telecommunications.

Dec 19 15:19

Blaming Iran for the Sony Hack

Dec 19 15:16

FLASHBACK - Federal Government Hires Internet TROLLS to Monitor and "Correct" Online Discussions

This subject is of big interest to me and I am happy to see other websites picking up the concerns and expressing them publicly. I have crossed paths with these undercover agents many times, on various websites and forums, and a I can tell you from my first hand experience that they are extremely effective.

They are usually intelligent and well informed people, and a couple of them operating on each section of a forum, are enough to kill a subject of major interest almost immediately.

Dec 19 14:01

North Korea denies involvement in Sony cyber attack

North Korea's UN mission on Friday denied involvement in a cyber attack on Sony Pictures after the US FBI said it had evidence that Pyongyang was behind the hacking.

"Our country has no relation with the hacker," North Korean political counsellor Kim Song told AFP.

"There is no relation. This is not worth a comment."

Dec 19 10:18

Think North Korea hacked Sony? Think about this

Unlike any hack attributed to North Korea in the past

North Korea has been blamed for a string of hacks in the past, and it’s generally accepted that the country has the capability to hack and attack companies. But no previous attack attributed to North Korea—or any nation-state—has been so public and so noisy. In the past, attacks happened, North Korea was suspected, and then sometimes the country was later blamed. It rarely said anything, except for an initial denial. This time around, the hacker group has posted messages online taunting Sony and telling the FBI they cannot be caught. Early on, they were also interacting with reporters.

Dec 19 08:54

Sony Hack: What They're Not Telling You

Webmaster's Commentary: 

The evidence indicates the SONY hack was done by disgruntled ex-employees of SONY itself. Yet the White House has hastily put together a frame-up of North Korea, and unlike the Benghazi attack, the movie that is supposed to be the root cause of it all actually does exist.

So what is going on?

One possibility is that SONY will reverse its decision (under covert pressure from the White House) and go ahead with the Christmas Day release of "The Interview." This will be followed by multiple bombings of movie theaters across America. Just like 9-11, this will be "justification" for war against the "attacker", which we are being assured is North Korea. War with North Korea opens the door to war with China and through China, Russia, all to protect the paper dollar from the Ruble and the Yuan. Millions will die and the world will go back to being enslaved to the private central bankers for another hundred years.

Dec 19 08:12

William Binney: The NSA’s Ultimate Goal is Total Population Control

“At least 80% of fibre-optic cables globally go via the US,” Binney said. “This is no accident and allows the US to view all communication coming in. At least 80% of all audio calls, not just metadata, are recorded and stored in the US. The NSA lies about what it stores.”

“The ultimate goal of the NSA is total population control,” said Binney, who believes the government is fighting for a future where surveillance is ubiquitous and government intrusion unlimited.

Dec 18 12:22

Google faces €15m fines over privacy breaches in Netherlands

The search giant has been ordered to change the way it collects data from users that is then used to target advertising, or face a significant fine.

Dec 18 11:20

ZIONISTS ARE FRAMING NORTH KOREA!

Those "unnamed sources" (Mossad, cough-cough) are at it again. This time they have solved the mystery of the hacked Hollywood E-mails and anonymous threats that Jewish Hollywood is all abuzz about. It was the North Koreans, these slimy sleuths assure us. As usual, Sulzberger's Slimes has accepted the baseless accusation at face value and gone full front-page retard with the bogus claims and threats.

Dec 18 09:05

The US Is Ready To Blame North Korea For The Sony Hack

The US government now reportedly believes that North Korea is directly to blame for the devastating and unprecedented attack on Sony, The New York Times reports.

The massive Sony data hack is likely retaliation for the controversial comedy "The Interview," which depicts the assassination of North Korean dictator Kim Jong Un.

US investigators have now parsed through enough evidence to claim that North Korea is "centrally involved."

Dec 18 08:32

NSA Firefoxed: Mozilla team-up with Tor to improve internet privacy

The internet browser Mozilla is teaming up with Tor to give internet users greater security online. The new Polaris project is designed to combat internet censorship and make NSA like intrusion’s a thing of the past.

Edward Snowden’s revelations concerning the extent of the National Security Agency’s spying on the general public, hit computer and internet enthusiasts hard. A poll conducted by Harris Poll on behalf of the internet company Mozilla last month, found that three quarters of those surveyed feel that their personal information on the web is less secure than it was one year ago.

Webmaster's Commentary: 

The comment in the article about the NSA not being able to find a TOR users identity is not entirely accurate. Recently it has come to light that if a user has the flash player installed on their computer, malicious code inside a flash object can detect the source IP of the request despite the onion network, which is why the current implementation of TOR recommends users not have the flash player installed. However I think that Mozilla and TOR will close that exploit (if they have not already done so).

As a general rule, everyone ought to be using anonymity tools and strong encryption, even if you do not really have anything to hide, to jam the NSA with added workload and confuse them as to who they should be looking at. For your local data protection or small-group communications, I strongly recommend investing the time to develop your own encryption methods using the code snippets in the NSA Challenge page as examples.

Dec 18 08:21

NSA and EFF to square off in court over internet surveillance

A digital rights group in the United States plans to argue in federal court this week that the National Security Agency’s internet surveillance operations violate the US Constitution’s ban against unlawful searches and seizures.

Six years after the Electronic Frontier Foundation brought suit against the NSA on behalf of a former AT&T customer, Carolyn Jewel, US District Court Judge Jeffrey White for the Northern District of California will hear an EFF attorney argue on Friday for summary judgment and attest that the intelligence agency’s data collection methods breach the Constitution’s Fourth Amendment clauses intended to protect private information.

Dec 18 07:22

You Won't believe What Facebook is Doing & You Could Be Their Next Target! Exclusive Victims Report

Dec 17 16:43

U.S. Links North Korea to Sony Hacking

American intelligence officials have concluded that the North Korean government was “centrally involved” in the recent attacks on Sony Pictures’s computers, a determination reached just as Sony on Wednesday canceled its release of the comedy, which is based on a plot to assassinate Kim Jong-un, the North Korean leader.

Senior administration officials, who would not speak on the record about the intelligence findings, said the White House was still debating whether to publicly accuse North Korea of what amounts to a cyberterrorism campaign. Sony’s decision to cancel release of “The Interview” amounted to a capitulation to the threats sent out by hackers this week that they would launch attacks, perhaps on theaters themselves, if the movie was released.

Dec 17 09:45

Delta Airlines Security Flaw Allows You To Use Another’s Boarding Pass

Delta Airlines intends to remain ahead of the competition when it comes to being on the cutting edge of technology, but even the best of intentions can result in an mistake or a flaw being discovered. Case in point, Delta Airlines’ glitch would allow you to actually access someone else’s boarding pass – without them being aware of it.

Dec 17 07:59

Online news sites to be blacked out during next major catastrophic event?

According to what I'm hearing from several sources in my network of contacts, the U.S. government is putting systems in place to black out online news sites like Natural News, Drudge Report, The Blaze and many others. A practice run that took place earlier this week in California has already achieved this result and confirmed the technical ability to make it happen at will.

Webmaster's Commentary: 
Dec 17 07:35

The FBI Used the Web’s Favorite Hacking Tool to Unmask Tor Users

For more than a decade, a powerful app called Metasploit has been the most important tool in the hacking world: An open-source Swiss Army knife of hacks that puts the latest exploits in the hands of anyone who’s interested, from random criminals to the thousands of security professionals who rely on the app to scour client networks for holes.

Now Metasploit has a new and surprising fan: the FBI. WIRED has learned that FBI agents relied on Flash code from an abandoned Metasploit side project called the “Decloaking Engine” to stage its first known effort to successfully identify a multitude of suspects hiding behind the Tor anonymity network.

Dec 17 07:03

Sony hit with class action suit over hacked employee info

On Monday, attorneys representing two former Sony workers filed paperwork in United States District Court for the Central District of California asking that a jury be assembled to weigh in on what could become a class action lawsuit between upwards of 15,000 current and past employees and the major motion picture company over the massive security breach suffered earlier this month.

According to the class action complaint, Sony should have been better prepared to protect against the hackers who recently pilfered troves of company data, especially in light of similar lapses suffered by the company in years past.

Dec 17 06:22

VIRTUAL 9-11: Will the US & Israel Hack The US Banking System Computers and Falsely Blame It On Iran (or Syria or Russia or China)?

Such a cyber false-flag also gives the US Government the excuse to take total control of the internet so that those pesky truth-seeking bloggers don't give the slaves uppity ideas that this is just another war-starting hoax like the attack on the USS Liberty or 9-11 or the Boston bombing.

Webmaster's Commentary: 

Reposted in light of the claim that the SONY Hackers are planning to bomb movie theaters now.

Optional Banner: 
WRH Exclusive
Dec 16 08:46

2014: The year Microsoft lost my loyalty

From productivity to email to operating systems to mobile to hardware, David Gewirtz is no longer actively using Microsoft products. He's not a Microsoft hater. The transition just happened organically as he adopted products that better served his needs.

Dec 16 07:52

Government Prosecutors Fear Liberty and Jury Nullification

I thought you’d be interested to know that the government has asked the judge to limit the defense by not allowing any of Ross’ political or philosophical beliefs to be introduced to the jury as they might influence the jury in his favor. The prosecution goes so far as to say that they fear that exposing the jury to his political thought could invite a jury nullification verdict.

The government obviously doesn’t want this trial to become about internet freedom, the drug war, or liberty. But these crucial issues are on trial along with Ross. This trial is poised to be the most important of 2015 in the fight for freedom. Obviously the government thinks so. They are doing their best to smear Ross and obstruct his defense.

I’m attaching an excerpt (bolds and highlights mine) from the prosecution’s motions illustrating what I’m saying. If you want the original document, just let me know.

This outrage needs to become known, so please spread the word!

Dec 16 07:37

Microsoft update blunders going out of control

This isn't the first time I've brought this up. In Summer of last year Microsoft had buggy Patch Tuesday updates three months in a row. There had been others that year, some of which crippled systems.

Dec 15 13:57

Amazon, HP, eBay join Microsoft bandwagon in warrant case

As extensively telegraphed by Microsoft, the company’s cast of supporters in its legal fight over a warrant seeking a customer’s emails just got a whole lot bigger.

Microsoft was joined by Amazon.com as well as Silicon Valley stalwarts Hewlett-Packard and eBay. Apple, AT&T, Cisco and Verizion, which all supported Microsoft in its lower court case, also weighed in again.

Google, a leader in the cloud-computing realm along with Microsoft and Amazon.com, was among the notable technology companies that haven’t weighed in.

Dec 15 12:19

Eric Schmidt: To Avoid NSA Spying, Keep Your Data In Google's Services

Google Chairman Eric Schmidt told a conference on surveillance at the Cato Institute that Edward Snowden's revelations on NSA spying shocked the company's engineers — who then immediately started working on making the company's servers and services more secure. Now, after a year and a half of work, Schmidt says that Google's services are the safest place to store your sensitive data.

Webmaster's Commentary: 

And if you believe THAT one, I have some of Saddam's nuclear weapons to sell you!

Dec 15 10:20

Microsoft update blunders going out of control

We have had an absolute deluge of problem updates from Redmond recently and some have been serious. What's up at Microsoft?

Webmaster's Commentary: 

What is going on is that Windows has become a bloated nightmare and as the economy shrinks, Microsoft has lost the ability to effectively maintain it all. This problem is hardly confined to Microsoft, and indeed Rome fell when it could no longer maintain the infrastructure it had built such as the roads and aqueducts.

Dec 15 08:33

Sony Attorney David Boies Threatens Media Over Hack Stories

Sony Pictures Entertainment lawyer David Boies sent a letter to news organizations Sunday, cautioning them against using information that hackers have leaked about the studio.

In the letter, first reported by The New York Times, Boies referred to leaked Sony documents as "stolen information" and demanded that the files be ignored, or destroyed if they had already been downloaded.

"We are writing to ensure that you are aware that SPE does not consent to your possession, review copying, dissemination, publication, uploading, downloading or making any use of the stolen information, and to request your cooperation in destroying the stolen information," the letter reads.

Dec 15 07:57

Hackers promise “Christmas present” Sony Pictures won’t like

This weekend, the “Guardians of Peace”—the cyber-attackers who brought Sony Pictures Entertainment’s network down in November and have since shared over a terabyte of the company’s internal data—made two more dumps of SPE data to file sharing sites and torrents. The second of the two, on Sunday, was the e-mail box of Sony Pictures Releasing International President Steven O’Dell. And the hackers promised a “Christmas present” soon of even more data if the company does not relent and meet their unspecified demands.

Webmaster's Commentary: 

This hack story is not being reported, it is being promoted! Coupled with the FBI warning that Iranian hackers are about to strike, I expect a virtual 9-11 to happen to justify a government clamp down on the internet!

Dec 15 07:15

How Congress Secretly Just Legitimized Questionable NSA Mass Surveillance Tool

We recently noted that, despite it passing overwhelmingly, Congress quietly deleted a key bit of NSA reform that would have blocked the agency from using backdoors for surveillance. But this week something even more nefarious happened, and it likely would have gone almost entirely unnoticed if Rep. Justin Amash's staffers hadn't caught the details of a new provision quietly slipped into the Intelligence Authorization Act, which effectively "legitimized" the way the NSA conducts most of its mass surveillance.

Dec 15 07:12

The NSA Revelations All in One Chart

This is a plot of the NSA programs revealed in the past year according to whether they are bulk or targeted, and whether the targets of surveillance are foreign or domestic. Most of the programs fall squarely into the agency’s stated mission of foreign surveillance, but some – particularly those that are both domestic and broad-sweeping – are more controversial.

Webmaster's Commentary: 

But the NSA still cannot find who hacked SONY! :)

Dec 15 06:51

Activists launch online initiative against ‘Internet Tax’

A group of Russian citizens has launched a petition seeking to prevent the adoption of a bill that would introduce a universal tax on the internet, collected by rights organizations representing authors of copyrighted films, music and books.

The anonymous authors of the motion claim that the universal tax is against the law as it would force the majority of internet users to pay for content that they never download or use.

Dec 15 06:47

“Net Neutrality”: The Citizens of the Internet Can Defeat the Telecom Mafia

In a claim that must have people laughing out loud, the telecom and broadband providers are fighting net neutrality by claiming that they will raise the rates of consumers! It is hard to believe that even telecom lobbyists, well-paid to mislead Congress and regulators, could make this claim without smirking as cable bills have been rising at four times the rate of inflation without net neutrality.

Dec 14 07:22

Visa, MasterCard sued for blocking donations to WikiLeaks

Lawyers representing the credit card processor used by WikiLeaks are suing Visa and MasterCard in the United States over the 2010 banking blockade that kept the anti-secrecy group from receiving funds.

On Monday this week, American attorneys for Icelandic hosting provider DataCell ehf filed suit in the US District Court for the Eastern District of Virginia in hopes of having a federal judge award the company upwards of $5 million for what it claims was a coordinated attempt between Visa and MasterCard to restrict funding to WikiLeaks after the secret-spilling organization started publishing classified US State Department cables over four years ago.

Dec 14 07:01

Reports reveal UK hacking of Belgian telecoms firm

New reports indicate that a British spy agency has hacked into the computers of Belgian telecoms firm, Belgacom, on a larger scale than previously thought.

Belgian newspaper De Standaard and The Intercept website on Saturday published detailed accounts of how the British surveillance agency, GCHQ, intruded into Belgacom’s networks.

The hacking first came to light in 2013 when Belgium asked Britain to respond to the espionage allegations.

Dec 14 06:48

Ron Paul: Scrap CIA, NSA, Bring Troops Home

Never one to hold back when it comes to corrupt big government agencies, former Congressman Ron Paul said Tuesday that the world would be a much better place if the CIA were completely abolished.

Responding in part to the release of the Summary of the forthcoming Senate report on CIA torture, and also to an impending possible government shutdown, Paul stated “my government shutdown would be something to be proud of.”

“Abolish the NSA, the TSA, the CIA and all spying on American citizens.” Paul urged.

Dec 14 06:44

Russia targeted by another large-scale cyber espionage campaign – Kaspersky Lab

Russian companies in oil, finance, military, and other sectors – as well as the country’s embassies abroad – have become the primary targets of a new espionage campaign, labeled ‘Cloud Atlas’ by global information security powerhouse Kaspersky Lab.

Enterprises in Belarus and Kazakhstan – which are Russia’s partners in the Eurasian Custom Union – are also affected. Another major target of the campaign is India, the Moscow-based company said.

According to Kaspersky Lab, Cloud Atlas infects corporate computers via RTF (Rich Text Format) files attached to emails.

Those behind the campaign have also launched attacks using MMS and SMS messages to infect Android, BlackBerry, and iOS devices.

Dec 13 10:47

GCHQ agents to hunt down child porn in ‘dark net’ – Cameron

A special unit of the British spy agency GCHQ has been tasked with roaming the “dark net” to locate child pornography images and weed out online abusers, according to Britain's Prime Minister David Cameron.

Webmaster's Commentary: 

FINALLY, something useful!

Dec 13 08:28

Sony Hackers Flash Disturbing New Warning on Staffers’ Computers (Exclusive)

This is the fourth known time the #GOP has contacted the studio. The group previously accessed dozens of Sony employee computer screens in late November, displaying a similarly ominous image when staff tried to log in for work. See a screenshot here.

Webmaster's Commentary: 

And the mighty NSA can't do a thing about it! I guess the people at NSA are too busy spying on our wives and daughters through our webcams or stealing our business secrets to actually bother themselves with actual computer criminals, right?

This is how we should respond to every single report of a hack anywhere, by proclaiming it as a total failure of the NSA and by extension the Federal Government.

For myself, this looks like a staged publicity stunt as a prelude for draconian controls over the internet, much like the pornography that flooded the internet (all of it traced back to US Government and military servers) that preceded the debate on the Exon Amendment.

Dec 13 07:31

Digital driver's licenses come with one small (big) problem

Iowa announces it is testing driver's licenses on phones. But what if a police officer asks to take your phone, so that he can check your license in his own vehicle?

Webmaster's Commentary: 

I recall when smart phones like the Treo had a slot for a microSD card. You could keep the pictures of your naked spouse on that and slide it out when you handed the phone to someone else, but for soooooooooooooome reason, that feature is no longer available.

Dec 13 07:28

Net Neutrality Activists Disrupt FCC Meeting

This morning at 10:40am, net neutrality demonstrators interrupted the FCC’s monthly meeting by unfurling a large banner reading “Reclassify Now!” behind the seated FCC commissioners. The activists, both union members, were escorted from the room by security after speaking out and asking FCC Chairman Tom Wheeler why he continues to delay Title II net neutrality, which should have been voted on at today’s meeting.

Dec 12 16:02

Beware viruses hidden in e-cigarette chargers

Whatever the pros and cons of smoking e-cigarettes, they have undoubtedly been a big hit with smokers looking to either kick their habit, or at least to mitigate its health risks.

Now, most businesses are very aware risks of the risks items such as USB thumb drives can be their systems, as these are a notorious vector for spreading computer viruses, and have instituted strict policies about their use (although personal users remain at high risk).

It now seems, however, that hackers in China have found a new means of infecting computers with viruses, using cheap pieces of hardware that many users would not even conceive of as threat – cheap e-cigarette chargers!

Dec 12 10:59

GOP rep attempted late bid to kill spy bill

Hidden in the law is “a troubling new provision that for the first time statutorily authorizes spying on U.S. citizens without legal process,” Amash told other lawmakers.

Dec 11 11:17

Congress Passes Bill Granting “Unlimited Access to Communications of Every American”

According to Congressman Justin Amash, Congress just passed a bill, (Dec 11th 2014) which grants the government and law enforcement “unlimited access to the communications of every American”.

When the Michigan lawmaker discovered that the Intelligence Authorization Act for FY 2015 had been amended with a provision that authorizes “the acquisition, retention, and dissemination” of all communications data from U.S. citizens, he desperately attempted to organize a roll call vote on the bill.

However, the legislation was passed yesterday 325-100 via a voice vote, a green light for what Amash describes as “one of the most egregious sections of law I’ve encountered during my time as a representative”.

The bill allows the private communications of Americans to be scooped up without a court order and then transferred to law enforcement for criminal investigations.

Webmaster's Commentary: 

I would like to remind the readers of the six NSA encryption challenges issued by this website, not one of which was solved. I am not a cryptographic expert, and only a moderately decent programmer, but I came up with six methods which defied decryption. The NSA would be well motivated to have broken my challenges in order to discourage people from starting to create their own codes. I, on the other hand, encourage people to create and use their own codes, both to defy the government's unconstitutional behavior, and to make it impossible for them to steal our business secrets, or nude pictures of our spouses or children. Inside the NSA encryption challenges are the code samples used to create the encryption methods, to use as a learning example.

Dec 11 08:50

Why Bad Software Succeeds

One of the hardest things to accept, as a justice-loving maker of software, is that a perfectly engineered and beautifully designed piece of software can go completely unused. Similarly, a lot of the software on which the world relies a great deal can be terrible — riddled with poor design decisions if not outright and undeniable bugs. This seems to be a fundamental frustrating truth about software.

Webmaster's Commentary: 

I have never been able to install 3DS MAX 2014 on my new windows 7 machine.

Dec 10 11:06

Kids' Privacy Under Threat: Mobile Apps Secretly Collect Data on Children

Mobile app makers ignore US federal privacy rulings, collecting vast amount of sensitive data through software aimed at kids. Using third-party "libraries" software developers often don't realize how much user data is being passing to advertisers.

Dec 10 09:06

Internet Censors Viral Sandy Hook Truth Documentary

Last Monday, an organization known as the Independent Media Solidarity released an epic documentary entitled “We Need to Talk About Sandy Hook,” which they hosted on their own site as well as on Youtube.

Within hours of the video’s upload, it was well on its way to going viral, however its success was short lived.

Shortly after Infowars began hosting the video the following Tuesday morning, it was suddenly removed from Youtube “due to a copyright claim by Lenny Pozner.”

(It should be noted the video was taken down despite carrying a message stating its materials are presented “in compliance with fair use principles,” and that “Use of copyright material in this video generates social benefits that greatly outweigh any cost to the copyright owner, and is therefore a protected form of speech.”)

Dec 09 09:29

Government In Action: Obama’s Administration Is Back On The Hunt For Internet Censorship In The US

A State Department official met with the czar of China’s infamous Internet censorship program in Washington DC yesterday, where she urged “co-operation” with the figure who helped implement prison sentences for online critics of the ruling Communist Party.

Dec 09 08:06

What Bad, Shameful, Dirty Behavior is U.S. Judge Richard Posner Hiding? Demand to Know.

Like so many federal judges, Judge Posner recognizes rights only when they belong to agents of the state or the economic elite. When it’s ordinary citizens at issue, he snidely rejects any such protections. Of course, this is exactly backwards: those exercising public power (police officers) have a lower entitlement to privacy than private individuals. But power-servants like Judge Posner view only actors of the state and those who serve it (such as himself) as entitled to these prerogatives. That’s become the corrupt essence of the U.S. justice system, and it’s perfectly expressed by Judge Posner’s radically divergent views based on whose privacy is at stake.

Dec 08 16:32

Sony Hackers Apparently Demand Studio Pull ‘The Interview’

A group calling itself GOP posted a message online on Monday that warned Sony to stop “immediately showing the movie of terrorism which can break the regional peace and cause the war.”

GOP — which stands for Guardians of Peace — did not specifically identify the movie. Authorities have been investigating whether the hacker attack is in some way be connected to “The Interview,” the movie that has generated condemnation from the government of North Korea.

Webmaster's Commentary: 

Yep; it's a false-flag!

Dec 08 14:17

Was there a secret Tory conspiracy to get rid of #CameronMustGo?

The Twitter hashtag that caught the imagination of the nation has been unceremoniously retired – despite the fact that it is still being used by thousands of British citizens who have had enough of the man it names, and his government.

That’s right – #CameronMustGo has gone.

It disappeared from Twitter‘s United Kingdom trends an astonishing 16 days after it was launched and – suspiciously – while it was still being tweeted at least once every three seconds [accurate at time of writing].

Users instantly smelled a rat – has Twitter been hacked? Or has it been corrupted by Cameron’s cronies?

Dec 08 11:55

Obama renews NSA snooping for 90 more days

President Obama has renewed the NSA’s phone-snooping program for another three months, with the administration saying Monday that it’s too important to let it expire right now, defying members of Congress who said it was time to ax the controversial program.

Dec 06 09:06

FinFisher dummy infection file NOT DETECTED by most anti-virus companies – Kaspersky included!

Bizzare, the FinFisher government spy application has been leaked to various torrent websites. We decided to download and analyze the package for more information.

We first took a look at the Dummy_Infection.exe file, is it really a virus? Yes, it is a virus. We scanned the virus via the VirusTotal domain, and guess what.

Only 6 companies were able to identify the FinFisher malware.

Does this mean that the other companies do not “WANT” to identify the malware?

Dec 05 14:46

Sen. Wyden puts forward a bill to ban data “backdoors”

The FBI didn't like that idea one bit and said so to Congress. On Thursday, Sen. Ron Wyden (D-Ore.) introduced a bill that, if passed, would make sure the companies can encrypt unmolested. The Secure Data Act would prohibit government agencies from requiring any "backdoors" be placed in US software or hardware.

Webmaster's Commentary: 

No, the Secure Data Act is intended to trick Americans into THINKING that government agencies cannot have any "backdoors", so that we don;t take precautions against government snooping.

Dec 05 07:43

Adding WRH to a local hosts file.

This is useful to do if the Domain Name Service is hacked or simply unavailable. IF YOU ARE NOT EXPERIENCED WITH SYSTEM-LEVEL CHANGES, PLEASE CONSULT AN EXPERT SO THAT YOU DO NOT DAMAGE YOUR OPERATING SYSTEM.

Webmaster's Commentary: 

I am reposting these instructions in light of recent reports that someone is testing ways to block the independent media websites from the internet ahead of some new false-flag event. These instructions will allow you to continue seeing WRH (or any other non-virtual IP website) without going through DNS, which is often a target of mischief makers. This method will not get around an outright router blockage. As it says above, if you do not know what you are doing, get someone who is an expert to help you. The IP for WRH is 173.236.29.251 .

Dec 05 07:06

INTIFADA MOVES FROM THE STREETS OF JERUSALEM TO THE INTERNET

At least that’s what the zionists want you to believe …. none of the following was reported in the Palestinian press leading me to believe that the ‘terrorists’ behind this are actually the zionists themselves.

The zionists have an ‘army’ of hackers who monitor pro Palestinian sites and render them ‘offline’ via DOS Attacks or other methods. My question is why have the sites reported about below not been targeted? Again, in my opinion, the answer is obvious.

Dec 04 16:44

Gov’t and ISP’s Master Plan for Throttling Online News Sites

In any forward operating theater of any war, the first battle to be waged is for the control of information, and hence, the US and other government have contingencies in place to block or obscure online news sources by way of regional internet hubs.

The idea is simple: keep citizens from seeing any alternative reporting or analysis in times of crisis or domestic strife, and to reinforce the corporate monopoly of information and commentary by state-sanctioned, or ‘trusted news sources’ only, namely, ABC, NBC, CBS, FOX News, MSNBC and CNN.

A number of top alternative news site (including this one) have noticed that our website has been offline in certain regions at certain times. Others have noticed, and documented, the same observations.

Dec 04 08:01

BEX ALERT - Iran hackers targeted airlines, energy firms: report

Iranian hackers have infiltrated some of the world's top energy, transport and infrastructure companies over the past two years in a campaign that could allow them to eventually cause physical damage, according to U.S. cyber security firm Cylance.

Webmaster's Commentary: 

Cylance is a tiny compny out of Irvine Californbia looking to make a name for itself, and what better way to garner headlines than to claim to have discovered those eeeeeeevil Iranian hackers are a threat!

Dec 04 07:33

Online news sites to be blacked out during next major catastrophic event?

According to what I'm hearing from several sources in my network of contacts, the U.S. government is putting systems in place to black out online news sites like Natural News, Drudge Report, The Blaze and many others. A practice run that took place earlier this week in California has already achieved this result and confirmed the technical ability to make it happen at will.

The recent outage of news sites experienced by internet users in California was reported by this article on BeforeItsNews.com and confirmed by The Washington Times, The Blaze and other sites. The Natural News reader service team also recorded numerous complaints from California users who were unable to reach our website even though our site was fully functional and serving pages worldwide.

Webmaster's Commentary: 

We got a few complaints here at WRH as well.

Dec 03 14:30

Poll: Nearly 4 in 10 say California Obamacare exchange not working well

Nearly four in 10 Californians say the state's health exchange isn't working well as the second open enrollment gets underway, a new survey shows.

The results from the Public Policy Institute of California survey may reflect persistent service problems experienced by some consumers as well as continued partisan opposition to the federal overhaul.

Dec 03 09:38

Exclusive: FBI warns of 'destructive' malware in wake of Sony attack

The Federal Bureau of Investigation warned U.S. businesses that hackers have used malicious software to launch a destructive cyberattack in the United States, following a devastating breach last week at Sony Pictures Entertainment.

Cybersecurity experts said the malicious software described in the alert appeared to describe the one that affected Sony, which would mark first major destructive cyber attack waged against a company on U.S. soil. Such attacks have been launched in Asia and the Middle East, but none have been reported in the United States. The FBI report did not say how many companies had been victims of destructive attacks.

"I believe the coordinated cyberattack with destructive payloads against a corporation in the U.S. represents a watershed event," said Tom Kellermann, chief cybersecurity officer with security software maker Trend Micro Inc. "Geopolitics now serve as harbingers for destructive cyberattacks."

Webmaster's Commentary: 

What possible motive, other than garnering headlines, does an attack that damages the computers at SONY serve?

Dec 02 09:29

Robots: About to make your job much more boring

Robots and artificial intelligence are expected to make work less of a chore - taking over repetitive tasks and freeing people to be more creative.

But as growing numbers of bots join the workforce over the next decade there's a risk the drudgery of the nine to five may actually increase for some workers.

Dec 02 09:13

Australian internet connections slowed down by submarine cable fault

Web pages loading slowly? A submarine fibre-optic cable fault between Perth and Singapore could be why.

Australia's second largest DSL internet service provider iiNet is among a number of Australian providers affected by the issue that started on the SEA-ME-WE 3 cable on Sunday.

"Our link between Perth and Singapore is currently not passing traffic," an iiNet spokesman told Fairfax Media. "This traffic is taking an alternate path via Sydney to Hong Kong.

As a result, iiNet said customers may experience slower than expected download and upload speeds, latency and packet-loss to destinations in Asia.

Webmaster's Commentary: 

We know that the US has been tapping undersea cables going back to Dr. John Craven and the US Navy's tapping of an undersea cable in the sea of Okhotsk. We also know the NSA is trying to spy on everyone, and I have to wonder if many of these undersea cable outages are botched attempts at installing taps.

Dec 01 09:50

Justices weigh limits of free speech over Internet

Anthony Elonis claimed he was just kidding when he posted a series of graphically violent rap lyrics on Facebook about killing his estranged wife, shooting up a kindergarten class and attacking an FBI agent.

But his wife didn't see it that way. Neither did a federal jury.

Elonis, who's from Bethlehem, Pa., was convicted of violating a federal law that makes it a crime to threaten another person.

In a far-reaching case that probes the limits of free speech over the Internet, the Supreme Court on Monday was to consider whether Elonis' Facebook posts, and others like it, deserve protection under the First Amendment.

Webmaster's Commentary: 

Common sense says that if you would not say it in person, don't post it to the net.

Dec 01 09:36

The Web Is Getting Slower, At Least in How We All Experience It

Afergan said that one way to see this phenomenon in action is to look at Web performance numbers over time for both desktop and mobile users. He said, “The last time the desktop metric was as slow as the current cellular metric is, it was ten years ago. Basically, we’ve lost a decade of innovation, by innovating.”

So as we have moved to an increasingly mobile first Web, we are seeing performance issues that bring back memories of modem connection tones and slow dial-up connections. We are even seeing the return of old-school performance tweaks, such as dynamic image optimization and caching. In a mobile first Web, high performance isn’t a given, even with a 4G network, if the user is in an area with poor coverage or interference.

Dec 01 08:35

2014: The year everyone's security took a hit

If 2013 was the year the world learned through whistleblower and former NSA contractor Edward Snowden that the United States and its Five Eyes allies were monitoring communications worldwide, then 2014 was the year that we learned how easily those agencies, and other actors no doubt, could do it.

Webmaster's Commentary: 
Nov 29 07:21

ZIONIST SHILLS get PAID "easy $" for posting comments, tweeting or clicking the LIKE button!!!

Nov 29 07:13

Snowden reveals British tapping US/Ireland communications

The main cable link between Ireland and America has been tapped by British intelligence, a new raft of papers released by National Security Agency whistleblower Edward Snowden reveals.

Nov 29 07:07

Anonymous posts KKK leader’s personal data online in ongoing war over Ferguson

Hacktivists aligned with the Anonymous movement have published credit card numbers and other personal information allegedly belonging to a leading Ku Klux Klan member amidst a grudge between the groups fueled by recent protests in Ferguson, Missouri.

Members of the loose-knit hacktivist collective have taken aim at the Klan in recent weeks after the KKK threatened to use lethal force against demonstrations descending on Ferguson to protest the August 9 killing of unarmed teenager Michael Brown by local police officer Darren Wilson. The feud between the groups has only escalated in the days since, though, and now Anons are circulating what they claim to be sensitive details about a powerful Klansman and his family.

Nov 28 08:22

Thanksgiving attack: Syrian hackers strike U.S. media websites

American,Canadian and European news organizations claimed on Thanksgiving Day that their websites were hacked by a group identifying themselves as the Syrian Electronic Army (SEA), a cyber-terrorist group that is allied with Syria's Assad regime.

Webmaster's Commentary: 

The hacks accomplished nothing but to attract attention, meaning this is a propaganda operation. And just because they claim to be Syrian doesn't mean they are. The hackers could easily be NSA or Mossad pushing the war on Syria propaganda.

Nov 27 08:52

Bell employees planted glowing online reviews of new Bell app

As soon as Bell Canada launched a new version of a phone app last week, the response online was electric; it quickly garnered glowing, five-star reviews on Apple's iTunes App Store.

CBC News has learned that some of those rave reviews were planted. Possibly half a dozen or more were written by Bell Canada employees – many in senior positions – none of whom disclosed their affiliation with the company.

Nov 25 06:11

'Regin' Spying Malware Linked to US, UK Intelligence Services: Reports

A sophisticated piece of malware that has been used to spy on governments, research facilities and private businesses around the world may have been developed by the US National Security Agency (NSA) and the British Government Communications Headquarters (GCHQ), The Intercept reported Tuesday.

Nov 20 12:41

Rivero challenges the NSA

Nobody got this. The coffee mug is still in the box. I am batting 1000 against the NSA's cryptographers! My first NSA challenge came out over a year ago. Had I been a real terrorist, I would have had ample time to carry out my nefarious plans.

This proves that the NSA cannot and does not track real criminals and terrorists, but exists to spy on law-abiding Americans citizens on behalf of a government grown paranoid over public awareness of their crimes and corruption.

Webmaster's Commentary: 

Posted for the audience of a radio interview I did this morning.

Nov 20 12:26

JEFF RENSE'S WEBSITE IS UNDER MASSIVE DOS ATTACK RIGHT NOW!

Webmaster's Commentary: 

Well, Jeff must have really ticked someone off because his website is under massive DOS attack right now, although nobody has any idea what the motive might be. But it is intense enough where the upstream providers are getting involved in trying to track down and block the attackers.

UPDATE: Jeff Rense's radio network has also been targeted.

And where is the mighty and omniscient NSA during all this? Aren't they supposed to be monitoring the internet for evildoers? :)

Nov 20 08:03

Rights groups release anti-surveillance tool

Four human rights groups have released a tool that lets users check whether their computer has been infected with surveillance software.

Amnesty International says the tool released on Thursday, called Detekt, is designed for right activists and journalists but will be freely available to anybody who fears their computer is being used to monitor them.

Webmaster's Commentary: 

Detekt is available HERE.

Of course, this could also be a giant hoax to convince us we are not being spied on. This tool reported finding no traces of spyware on my machine, which I have difficulty accepting at face value!

Nov 20 07:50

Utah lawmaker questions city water going to NSA

A Utah lawmaker concerned about government spying on its citizens is questioning whether city water service should be cut off to a massive National Security Agency data storage facility outside Salt Lake City.

Nov 20 07:13

Google Internet balloon drops in on farmer

Buyers of the earthly explanation for whatever fell from the sky in Roswell, N.M. back in 1947 are likely to appreciate the reaction of a South African farmer who recently came across what he assumed to be a crashed weather balloon.

In this case, however, the confusion proved only temporary.

Nov 19 11:43

Berners-Lee Behind New Private Communications Network For Ultra-Privacy Conscious

Web founder Tim Berners-Lee is one of the privacy advocates behind a newly launched service that combines social media, cloud storage, person-to-person, and group communications for privacy-conscious users.

Nov 19 07:36

FLASHBACK - The Double Identity of an "Anti-Semitic" Commenter

Like many other news websites, Common Dreams has been plagued by inflammatory anti-Semitic comments following its stories. But on Common Dreams these posts have been so frequent and intense they have driven away donors from a nonprofit dependent on reader generosity.

A Common Dreams investigation has discovered that more than a thousand of these damaging comments over the past two years were written with a deceptive purpose by a Jewish Harvard graduate in his thirties who was irritated by the website's discussion of issues involving Israel.

His intricate campaign, which he has admitted to Common Dreams, included posting comments by a screen name, "JewishProgressive," whose purpose was to draw attention to and denounce the anti-Semitic comments that he had written under many other screen names.

Webmaster's Commentary: 

We get a lot of that around here as well. Israelis have called our advertisers and clients and demanded they stop doing business with us. Sadly, the more cowardly among them have.

Nov 17 11:26

Why Quebec can't surf some major U.S. retailers' websites

Access to the websites of several large U.S.-based retailers have been blocked in Quebec because they did not comply with the province's language laws.

In recent weeks, retailers including Williams-Sonoma, Urban Outfitters, and Club Monaco blocked access in Quebec to parts of their retail websites.

Nov 17 07:17

#OpKKK: Anonymous hacks KKK websites, Twitter over Ferguson threats

Anonymous claims it has taken down several Ku Klux Klan websites and Twitter accounts as part of what internet hacktivists describe as a “cyber war”, inspired by KKK threats of using “lethal force” against Ferguson protesters.

Anonymous listed the KKK websites it put offline Sunday night on its Twitter feed, with reports on the attacks coming with the hashtag #OpKKK.