Sep 24 16:07

FBI investigating 'Here you have' worm

Representatives from the FBI's Miami field office spoke with IDG News Service this week seeking information on the hacker behind the worm. A hacker using the name Iraq Resistance has exchanged a number of e-mails with IDG over the past two weeks discussing the incident.

Webmaster's Commentary: 

I am going ot go out on a limb here and speculate that this hacker isn't in or has anything to do with Iraq.

Sep 24 10:57

Airborne Laser Goes Off-Target Due to Software Bug

An airborne laser built for the U.S. Missile Defense Agency failed to destroy a target missile when a software glitch threw off its precision aiming during its latest field test.

Webmaster's Commentary: 

"Meanwhile, in other news, government sources have concluded that the mysterious hole that appeared drilled through Mount Wilson, north of Pasadena, must be the work of Al Qaeda!!

Sep 24 07:18

Censorship of the Internet Takes Center Stage in "Online Infringement" Bill

This is a censorship bill that runs roughshod over freedom of speech on the Internet. Free speech is vitally important to democracy, which is why the government is restricted from suppressing speech except in very specific, narrowly-tailored situations. But this bill is the polar opposite of narrow — not only in the broad way that it tries to define a site "dedicated to infringing activities," but also in the solution that it tries to impose — a block on a whole domain, and not just the infringing part of the site.

Webmaster's Commentary: 

The fastest way to bring down a dictatorship is to force it to act like one where everybody can see it!

Sep 24 02:52

Jones - Israel-Bashers Are 'Scum'

In a recent Youtube clip, talk show host Alex Jones describes himself as the most influential leader of the Patriot/Tea Party revolt, next to Rep. Ron Paul. Many would disagree. Yet he inarguably has the power to influence and mislead many.

Sep 23 14:35

Stuxnet Suspicions Rise: Has a Cyberwar Started?

The Stuxnet worm has been rattling security experts for quite some time with its complexity and ingenuity. New suspicions have been raised recently that the worm was used to sabotage a nuclear reactor in Iran. That, coupled with the worm's behavior, has led to some speculation that Stuxnet is a state-sponsored weapon.

Sep 23 09:42

Stuxnet worm 'targeted high-value Iranian assets'

One of the most sophisticated pieces of malware ever detected was probably targeting "high value" infrastructure in Iran, experts have told the BBC.

Sep 23 08:32

Feds Target Americans As Terrorists In Effort To Break Back Of Big Government Resistance

The feds are up to their old tricks once again – demonizing American citizens who are politically engaged and use the Internet as domestic terrorists in a transparent ploy to chill free speech and immobilize resistance to big government – when in actual fact every major terror plot in the United States was provocateured, contrived or directly facilitated by the federal government itself.

Sep 23 08:02

Bill would let feds block pirate websites worldwide

Copyright enforcement as censorship

Dan Goodin -- The Register

US lawmakers have introduced legislation that would allow the federal government to quickly block websites anywhere in the world if they are dedicated to sharing copyrighted music or other protected content.

The “Combating Online Infringement and Counterfeits Act” would empower the US Department of Justice to shut down, or block access to, websites found to be “dedicated to infringing activities.” Sites that use domain names registered by a US-based company, or a top-level-domain administered by a US-based company, would find their internet addresses frozen.

Sep 23 07:38

Seeing The Internet As An 'Information Weapon'

Using the term "mass psychologic brainwashing," the agreement said that the dissemination of information "harmful to the spiritual, moral and cultural spheres of other states" should be considered a "security threat."

Sep 22 08:42

4chan invades Tea Party website

A website run by the conservative Tea Party movement was overrun by the denizens of 4chan on Tuesday.

Website vulnerabilities on the official website allowed pranksters to divert surfers landing on the photo section of the site to smut and shock sites. It's unclear what website security shortcomings were exploited in that attack and whether these are now closed.

Webmaster's Commentary: 

Donald Segretti would be proud!

The entrenched political parties are clearly terrified of the Tea Party movement.

Sep 22 08:15

Leading Stuxnet theory points toward sabotage and SCADA inside players

Because of the geopolitical circumstances surrounding the location where most attacks were recorded (Iran), the current hypothesis points toward Bushehr and other nuclear plants as the lead targets.

Webmaster's Commentary: 

Obviously, Israel has to lead the list of suspects behind this cyber-attack. They are desperate to maintain their nuclear monopoly in the region. But what if they make a mistake? It is one thing to try to keep a reactor from operating, but what if the hackers trigger a Chernobyl-style meltdown. From this moment on, any disaster that befalls Iran's power station will inevitably bring suspicion onto Israel, given their long history of dirty-trick operations!

Sep 22 08:08

Stuxnet malware is 'weapon' out to destroy ... Iran's Bushehr nuclear plant?

Cyber security experts say they have identified the world's first known cyber super weapon designed specifically to destroy a real-world target – a factory, a refinery, or just maybe a nuclear power plant.

Sep 21 09:30

Phone app monitors Israeli settlements in Palestinian territories

Sep 21 08:18

Twitter "MouseOver" Hack is Spreading a Malicious Code

The code is often lurking in the user name -- and sometimes the tweet itself is entirely blank. It can hijack clicks on the compromised page, taking users to a malicious non-Twitter site. PC Magazine reports that one affected user was the wife of a former British Prime Minister, whose Twitter feed now redirects users to a Japanese porn site. And CNN discovered another victim: White House press secretary Robert Gibbs. Tuesday he tweeted, "My Twitter went haywire - absolutely no clue why it sent that message or even what it is...paging the tech guys..."

Webmaster's Commentary: 

As another aid flotilla heads towards Gaza, just who has the most to gain by shutting down Twitter right now?

As a side note, the non-web interfaces to Twitter like "tweetdeck" seem unaffected.

Sep 21 07:45

Fake iPhone jail-breaking tool packed with malware

Webmaster's Commentary: 

The most effective computer security tool is a bullet in the brain of the cyber-criminals. Everything else is just part of the protection racket.

Sep 21 06:43

US Lawmakers seek power to 'shut down' Web sites in other countries


A bill introduced in the US Senate on Monday would give US law enforcement authorities more tools to crack down on websites engaged in piracy of movies, television shows and music.

The Combating Online Infringement and Counterfeits Act has received support from both parties and was introduced by Senator Patrick Leahy, a Democrat from Vermont, and Senator Orrin Hatch, a Republican from Utah.

Sep 20 08:48

The truth about iPad: It's only good for two things

To my close friends and colleagues, I’ve been more candid. I’ve often said, “The iPad is only good for two things: Reading and Scrabble.”

Sep 20 07:08

Global ‘internet treaty’ proposed

Claudine Beaumont
The Telegraph

The proposal was presented at the Internet Governance Forum in Lithuania last week, and outlined 12 “principles of internet governance”, including a commitment from countries to sustain the technological foundations that underpin the web’s infrastructure.

The draft law has been likened to the Space Treaty, signed in 1967, which stated that space exploration should be carried out for the benefit of all nations, and guaranteed “free access to all areas of celestial bodies”.

Under the proposed terms of the law, there would be cross-border co-operation between countries to identify and address security vulnerability and protect the network from possible cyber attacks or cyber terrorism.

Sep 19 09:28



Never has a nation funded a foreign spy organization's efforts to catalog potential intelligence assets, operatives and, at the same time, take over the job of watching themselves. This is one of the greatest intelligence coups in history. Combine this with control of America’s airport security and total control of America's communications networks, everything, mobile, internet, even landlines….we might as well pull down the flag and roll over.

Sep 18 18:35

Time/CNN's Captain Obvious Asks: Have Cell Phones Become Personal Tracking Devices?

Time/CNN's Breaking News Study in Forgone Conclusions: What Your Cell Phone Could Be Telling the Government

Related 2007 Story at Conclusion of Article Predating Time's "Groundbreaking" News?

Smart phones do many things these days: surf the Internet, send e-mail, take photos and video (and — oh, yes — send and receive calls). But one thing they can do that phone companies don't advertise is spy on you. As long as you don't leave home without your phone, that handy gadget keeps a record of everywhere you go — a record the government can then get from your telephone company.

Sep 17 09:15

HTC EVO vs iPhone 4 Trilogy

Mikes rant at the beginning of yesterdays show reminded me of this.

Start to pick up speed at 0:59

Sep 17 09:03

Weapon Software Glitch Hits Close to Home

In July, TheStreet reported a story detailing how an intellectual property dispute between two Boston-area companies uncovered allegations that the CIA bought faulty software for its unmanned aerial weapons program.

Now comes apparent proof the military is, indeed, dealing with software glitches in its unmanned "drones." The New York Times reported that a U.S. Navy drone earlier this month made its way into restricted airspace near Washington, D.C., because operators lost remote control of it for about 20 minutes. The reason for the scary error, according to Navy officials, was a "software issue" that thwarted the drone's automatic homing feature. When operators lost contact with it, the Northrop Grumman(NOC)-manufactured drone just kept flying the wrong way.

Sep 17 08:14

Dark Patterns - how websites trick you into doing things you don't really want to do!

Sep 17 07:42

Google Is Now Officially Evil

Sorry, Google, but according to the lawsuit Skyhook filed against you today, you've crossed the line. Your "don't be evil" mantra is now officially a joke.

The evidence?

Today, Skyhook announced that it is suing Google for interfering with its business, costing the small company sums exceeding "tens of millions of dollars."

In short, Skyhook says that Google effectively forced Motorola to cancel a deal with Skyhook in which Skyhook would have provided location-based services in Motorola phones -- because Google wanted Motorola to use Google's own location services instead.

Sep 16 21:54

Pentagon re-opens probe into 100s of employees with child porn & other warwhore updates

Last week, Kenneth deGraffenreid, a former high-ranking counterintelligence official, told John Cook it was "absurd" the Pentagon didn't investigate the child porn allegations, because it left the defense establishment vulnerable to espionage. [and a first class paid junket to USrael]

"What a sophisticated case officer is looking for is someone who has potential vulnerabilities," he said. "They look for something like that, and a taste for child pornography is powerful stuff. So I would be very worried that they didn't investigate all of the cases. It sounds absurd on the face of it, that you'd have this information and only investigate some of the cases. You don't put five locks on three of your doors and none on the last one."

Sep 16 11:18

Secular Israelis outraged about holy day Internet blackout

Ultra-Orthodox Cabinet ministers are leading the charge to enforce the religious prohibition on spending money on Jewish holy days. But for non-religious residents, tourists and foreign workers, the planned ban joins two leading ills of Israeli life — red tape and religious restrictions — in a marriage of inconvenience.

Sep 16 10:36

Is Stuxnet the 'best' malware ever?

The Stuxnet worm is a "groundbreaking" piece of malware so devious in its use of unpatched vulnerabilities, so sophisticated in its multipronged approach, that the security researchers who tore it apart believe it may be the work of state-backed professionals.

Webmaster's Commentary: 

Given that Iran bore the brunt of this cyber-attack, that kinda narrows down the list of potential suspects!

Sep 16 08:38

The face that launched a global advertising scam

Theuriau has, over the past few months, also become the face of one of the most brazen series of cyber identity thefts. To many web surfers, she is not Melissa, but more likely ''Karen'' or ''Amy'' - her image stolen for use in bogus advertising. She is being used variously to promote Swipe penny auctions, acai berry diets, colon cleansing and slimming teas. None of it with her knowledge or permission.

Many of the sites have connections back to Canadian internet entrepreneur Jesse Willms, some of whose companies were sued last year by Oprah Winfrey and Dr Mehmet Oz for using the television show hosts' images without permission, and in a manner that implied they endorsed the products.

Sep 16 08:38

Claimed HDCP master key leak could be fatal to DRM scheme

High-bandwidth Digital Content Protection (HDCP), the copy protection system used to prevent the making of perfect digital copies of audio and video data sent over DisplayPort, HDMI, and DVI interfaces, may have been blown out of the water if a post made to yesterday is what it claims to be. The post purports to contain the HDCP "master key," a 40×40 matrix of 56-bit numbers, which is used by the HDCP licensing company, Digital Content Protection (DCP), to generate the private keys used in all HDCP devices.

Sep 15 15:11

Google engineer fired for snooping on underage teens

David Barksdale, a former Google employee, was a site reliability engineer (SRE) at Google’s Kirkland, Washington office. SREs are able to gain access to private data on a fairly regular basis, in order to properly troubleshoot and fix problems anywhere in the Google-verse. According to Valleywag, Barksdale abused his powers as an SRE by snooping on various underage teens he met at a technology group in Seattle. He gained access to their Gmail inboxes, chat transcripts, and Google Voice phone conversations, among other things. The snooping does not seem sexual in nature, and is being looked at as simply a privacy breach, with no malicious intent.

Webmaster's Commentary: 

If there was no malicious intent, then how did the parents find out about the snooping in the first place?

Sep 15 13:49

Mossad in America

The Israeli government claims that it does not spy on the United States are intended for the media and popular consumption. The reality is that Israel’s intelligence agencies target the United States intensively, particularly in pursuit of military and dual-use civilian technology. Among nations considered to be friendly to Washington, Israel leads all others in its active espionage directed against American companies and the Defense Department. It also dominates two commercial sectors that enable it to extend its reach inside America’s domestic infrastructure: airline and telecommunications security.

Sep 15 11:06

Ubuntu 10.04

I'm running the new Ubuntu 10.04 Desktop 64 bit OS on an Inspiron. It is smooth and fast. It even has an email program with it. Try it! You will like it. Don't cost nothin.

Sep 15 08:56

Flashback: Professional Trolls

People are reporting that they're getting these comments from a company called Netvocates. The company will defend your organization's reputation by sending people to fill blog comments with defenses.

Sep 13 08:14


Webmaster's Commentary: 


We are all aware that Righthaven LLC is suing all websites it can for copyright infringement from Stephens Media. The obvious solution is simply to never read anything from Stephens Media, lest we inadvertently copy something we ought not to. This plugin for Firefox makes sure you never see anything owned by Stephens Media on any of their websites anywhere in the world. Better safe than sorry!

I am sure this will make Stephens Media very happy indeed to know they are permanently safe from ever having any of their materials copied or for that matter even read by anyone ever again anywhere in the world!

Please spread this useful tool everywhere you can. There is also a version for Chrome

Sep 13 07:30

Spammers Make 57,000 Fake Web Sites a Week

According to a three-month study by antivirus developer PandaLabs, these cyber-criminals are creating around 57,000 new fake websites every week. That's close to 3 million per year. And all of it is being done to exploit major brands.

Webmaster's Commentary: 

But loyal Americans will ignore the cyber-criminals and hate the Muslims as ordered!

Sep 13 07:14

Gorilla Design Studio Presents: Using the Hosts File

Webmaster's Commentary: 


A non-browser specific means of blocking your computer from seeing Stephens Media websites, in order to protect yourself from the lawsuits by Righthaven LLC. This does not require a plugin, but does require some technical expertise. However, if done correctly, it is 100% safe. If anyone has a complete list of the domains currently represented by Righthaven LLC please send it in and I will make a permanent resource here at WRH.

Sep 13 02:23

Concern grows over foreign involvement in spy's death

The 31-year-old maths and computer expert would have been regarded as a valuable asset for his knowledge of the inner-workings of GCHQ, the government's listening post in Cheltenham, and for his work on preventing cyber attacks on the banking and transport infrastructure.

It is understood Mr Williams's job at the time of his death was creating computer defences in the City of London. Williams would have had access to information which other countries would want to obtain.

The intelligence source said: "His job was to defend the banking system on which Britain's banking, commerce and all our public services depend. It was the kind of work that would have made him prime target for recruitment.

Sep 12 09:52

Can You Handle The Heat?

Awesome news for people wearing sweatpants while posting lists of their favorite Smurfs (present company included): the Associated Press informed its members this week that they can cite blogs as a news source.

Webmaster's Commentary: 

Dear AP (and for that matter ABCNNBBCBS), feel free to use any original writings on this website as a source free of charge, as long as you don't "tinker" it to change the meaning and include a credit.

Sep 12 09:31

Latest "gift" from those who hate the internet

Sep 12 09:05

Oh come ON, now! This is just plain silly!

Sep 11 07:31

Israel whining about anti-semtisim in blogs that merely report the truth about Israel

Webmaster's Commentary: 

"Whine whine whimper whine pity us you are all so mean what did we ever do to you Nazi Nazi Hitler Hitler holocaust holocaust God intended us to have all the Palestinians' lands and you just aren't with the @#%$ing program schmucks give us your money and we will stop calling you bad names!"

Sep 10 12:22


Hi you guys.. . I am a member of the news repeaters.. Here is how you join this elite group.. Have you ever noticed that the very hottest posters have websites that direct the traffic to their own advertisers?
In this way they reward themselves for their efforts.. And because of their efforts we have high quality and timely posts..

Mike Rivero has a great business model.. To encourage people to post great articles by allowing them to re-direct the traffic to their own sites.. The plan is working great.. White Hot posts from great websites making WRH the very best source of 'Truther News'

Alex2245, ActivistPost, PoliticalTheatrics, sabbah, johnu78, portos, suman,, My Catbird Seat

Sep 10 09:28

Facebook users 'are insecure, narcissistic and have low self-esteem'

Using Facebook is the online equivalent of staring at yourself in the mirror, according to a study.

Those who spent more time updating their profile on the social networking site were more likely to be narcissists, said researchers.

Facebook provides an ideal setting for narcissists to monitor their appearance and how many ‘friends’ they have, the study said, as it allows them to thrive on ‘shallow’ relationships while avoiding genuine warmth and empathy.

Sep 09 12:53

Website pulled on US church that wants to burn Korans

The small Florida church that has sparked global outrage with its plan to hold a Koran-burning event had its website pulled from the Internet on Thursday by its host.

Dan Goodgame, a spokesman for the San Antonio, Texas-based web hosting firm Rackspace, told AFP the evangelical Dove World Outreach Center church had, "violated the Offensive Content section of its Acceptable Use policy."

Sep 09 11:11

Foreign report: Israel has one of world's largest 'eavesdropping' intel bases

Israel has one of the largest signals intelligence (SIGINT) bases in the world in the western Negev, Le Monde Diplomatique reported. The base, near Kibbutz Urim, is central to the activities of the main Israel Defense Forces signals intelligence unit, 8200, the report says.

According to the report, the base has 30 antennas and satellite dishes of different sizes and types, capable of eavesdropping on telephone calls and accessing the e-mail of "governments, international organizations, foreign companies, political groups and individuals."

One of the base's main purposes is to listen to transmissions from ships passing in the Mediterranean, the report says. The base is also the center of intelligence activity that "taps underwater communication cables, mostly in the Mediterranean, connecting Israel with Europe."

Sep 09 09:37

NSA: U.S. Must Secure the Internet


According to National Security Agency (NSA) Director Gen. Keith Alexander, the United States federal government has the overarching duty and responsibility in securing the Internet to safeguard against cyber-criminal activities. Top military officials concurred with Alexander, but the government still has yet to provide details of how it intends to tackle Internet security issues. According to site Threat Post, Alexander "expressed confidence that the country's information security apparatus was up to the task, but acknowledged the difficulty of securing the Internet, a network that many security experts see as hopelessly broken and flawed by design."

Sep 08 15:06

5 Things That Are Being Automated That Probably Shouldn't Be

Trading stocks is a tedious, mass-number-crunching game. Why not make computers do it for you?
Because they will fuck it up.
Just a few months ago, on May 6, the Dow dropped about 1,000 points in minutes, which is usually about the kind of rate that kicks off something like the Great Depression. Stockbrokers barely had enough time to get their office windows open before the word spread that it was a false alarm.
The cause?

Sep 08 07:27

Traffic Jam

The Web has been hailed as the most measurable medium ever, and it lives up to the hype. The mistake was to assume that everyone measuring everything would produce clarity. On the contrary, clear media standards emerge where there’s a shortage of real data about audiences.

Sep 07 09:42

Cyber Warfare: US Military Hackers and Internet Spies

US gets ready to knock the world offline

Sep 06 08:54

U.S. and Israel spying behind BlackBerry woe: Dubai police

Concerns over Israeli access to BlackBerry data, and the use of the device by the United States to spy on the United Arab Emirates are behind the Gulf state's moves to curb the smartphone, Dubai's police chief said.

Sep 05 09:43

U.S. and Israel spying behind BlackBerry woe: Dubai police

"The Unites States is the primary beneficiary of having no controls over the BlackBerry, as it has an interest to spy on the UAE," Dhahi Khalfan Tamim said in remarks carried by the website of the daily al-Khaleej on Friday.

"The West has accused us of curbing the liberties of BlackBerry users, while America, Israel, Britain and other countries are allowed access to all transferred data," Tamim added.

Sep 05 07:18

Kinect's Israeli partner sees a remoteless world

TEL AVIV, Israel (AP) -- Inon Beracha envisions a world where your movements control the gadgets and devices around you. There's no remote control to lose, no buttons to push. The air conditioner senses your presence and changes the temperature to your liking.

Controlling your surroundings with the wave of a hand sounds like magic, but Beracha's company, PrimeSense, is already making headway, thanks to a little help from video games.

Sep 04 10:02

Adult services censored on Craigslist

The section that usually reads "adult services" was replaced by the word "censored."

It was not immediately clear whether Craigslist removed the adult services and replaced them with the "censored" section that had a link that was not active. But for users who accessed the account outside the U.S., the erotic services link was still active.

Webmaster's Commentary: 

"Americans should not have sex. They should get their orgasms killing Israel's enemies!" -- Official White Horse Souse

Sep 04 09:47

Daily Paul / Michael Nystrom Sued by Righthaven LLC in Massive Blogger Copyright Shakedown

Righthaven's standard shakedown seems to go as follows: The firm goes trolling the web, looking for content that from the Las Vegas Review-Journal that has been reposted on other blogs or websites. Once it finds a match, it acquires the copyright from the Review-Journal, then - without first contacting the accused blogger / website owner - files a lawsuit in Nevada Federal court. The standard damages seem to be for $75,000 and forfeiture of the domain name to Righthaven. I assume that is what I am being sued for as well, though I have yet to see it.

Webmaster's Commentary: 

The financial realities of being a blogger being what they are, I cannot imagine that Righthaven LLC actually thinks they can make any money off of these lawsuits, and confiscation of the domain names adds a further indicator that this is simply a covert means to shut down dissent on the web by targeting the blogs which are exposing corruption. In an age of lies, telling the truth is a revolutionary act!

Now, I agree that simply copying an entire article into a site is not appropriate without permission of the copyright holder, but excerpting for the purpose of comment/criticism and linking to the original source are as of this writing still considered fair use.

That being said, Righthaven LLC has a clear financial motive to join blogs that allow member posts to plant entire stores for the express purpose of creating an opportunity for litigation (much as the Canadian Human Rights Council was caught doing), and indeed I have had to kick a few members off of this website who refused to quit posting entire articles without permissions.

This is an attack on free speech using the copyright laws as a weapon of tyranny. At some point the blogs will have to go underground, and we should be prepared to do so.

Sep 03 07:17


Webmaster's Commentary: 

A rather unique music video, best viewed in Google Chrome

Aug 31 22:30

Full-Body Scanners Installed at Lindbergh Field

Workers at Lindbergh Field have begun installing the full-body scanners inside Terminal One.

The scanners, which are being placed in 11 airports across the country by the end of the year, are funded by the American Recovery and Reinvestment Act.

Transportation officials will be demonstrating the technology in San Diego on Tuesday….

Aug 31 17:15

Instructions for installing WRH iPhone app (beta 0.3)!

Webmaster's Commentary: 

Podcasts fixed in this version

Aug 31 05:52

3M buying Israeli maker of people tracking devices

NEW YORK — Manufacturing conglomerate 3M says it has agreed to pay $230 million in cash for an Israeli company that makes technology used to keep track of people.

Aug 30 22:38

The "Biometric Reality" Coming to the U.S. by 2017

This mainstream media report acknowledges the validity of predictive programming. Stating that it is from "science fiction 20 years ago, but a biometric reality today," as well as citing the movie, Minority Report, it lays out the future we can expect by 2017. The fusion of security features, with the all-sacred consumer convenience worshiped in the United States, portends the high-tech control grid. The piece ends with a reference to the Brave New World that awaits us. Curiously enough, the date of 2017 was the one chosen by Paul Craig Roberts as The Year America Dissolved -- Nicholas West

Aug 30 15:17

Instructions for installing WRH iPhone app (beta)! UPDATED VERSION

Webmaster's Commentary: 

Live feed and podcasts work now.

Aug 30 15:03

On BlackBerry bans and the real threat to national security

On BlackBerry bans and the real threat to national security
Saturday, August 28, 2010
Mohannad El-Khairy
"Thousands of Israeli companies have contributed to the information and communication technology needs of modern day life. What do they, along with the names mentioned above, share in common?"
"Unlike Dubai, Unit 8200, known as “Shmone Matayim” in Hebrew, doesn’t like the lime light. Set up in the 1959 on Mount Avital in the occupied Golan Heights, Unit 8200 is as a secretive electronic warfare unit responsible for collecting signal intelligence and code decryption."
"Both Gadi Mazor and Ron Maor of Onset and Nobex Technologies are veterans of Unit 8200 as well; so is the influential Yossi Vardi.
Arab resistance groups have taken notice."

Aug 30 08:07

Pentagon considers preemptive strikes as part of cyber-defense strategy

The Pentagon is contemplating an aggressive approach to defending its computer systems that includes preemptive actions such as knocking out parts of an adversary's computer network overseas - but it is still wrestling with how to pursue the strategy legally.

The department is developing a range of weapons capabilities, including tools that would allow "attack and exploitation of adversary information systems" and that can "deceive, deny, disrupt, degrade and destroy" information and information systems, according to Defense Department budget documents.

Aug 30 07:55

Government Think Tank Calls For Infiltrating Conspiracy Websites

Furious that state involvement in major terror attacks is being exposed to a wider audience than ever before via the Internet, a UK think tank closely affiliated with the Downing Street has called for authorities to infiltrate conspiracy websites in an effort to “increase trust in the government”.

Aug 29 12:22

The semi-official WRH iPhone app (Beta)

This app is not endorsed by or approved of by Apple. This app is in beta test stage and is provided without guarantees or warranties of any kind whatsoever (but I've had it on my own iPhone for a month now without a problem). Please email comments and criticisms to The software guru.

Aug 29 09:36

Wikipedia’s credibility threatened by Zionists

Israeli campaign to “edit” pages for propaganda purposes results in Palestinian counter-reaction; Wikipedia will be destroyed as a reliable source of information if turned into an ideological battleground.

Webmaster's Commentary: 

Wikipedia has no credibility, and no this is not a whine about how they deleted every article about me and my website. I am referring to the campaign by the global warming cult to alter 5000 Wikipedia articles in order to remove mention of the Medieval warm period and how much BETTER life was with a warmer planet! That little stunt, together with an unflagging dismissal of any unofficial points of view, ended Wikipedia's credibility a long time ago.

Aug 29 09:21

Pentagon considers preemptive strikes as part of cyber-defense strategy

The Pentagon is contemplating an aggressive approach to defending its computer systems that includes preemptive actions such as knocking out parts of an adversary's computer network overseas - but it is still wrestling with how to pursue the strategy legally.

The department is developing a range of weapons capabilities, including tools that would allow "attack and exploitation of adversary information systems" and that can "deceive, deny, disrupt, degrade and destroy" information and information systems, according to Defense Department budget documents.

Aug 29 07:08

California students get tracking devices

RICHMOND, Calif.—California officials are outfitting preschoolers in Contra Costa County with tracking devices they say will save staff time and money.

The system was introduced Tuesday. When at the school, students will wear a jersey that has a small radio frequency tag. The tag will send signals to sensors that help track children's whereabouts, attendance and even whether they've eaten or not.

Aug 29 06:52

Net Neutrality: 7 Worst Case Scenarios

Many consumer advocacy groups, web companies and startups are ranting about the perils of losing net neutrality. Net neutrality, they say, is what made the Internet what it is today by giving small companies the opportunity to become big companies, and it rightly puts the user in full control of what he views on the Internet.

Aug 29 06:15

Microsoft Co-Founder Launches Patent War

Now, Microsoft Corp. co-founder Paul Allen says he owns the technology behind all these ideas, and he's demanding that some of the world's top Web companies pay up to use them.

Aug 29 02:59

Make Sure the Bunker is Well Stocked

Capital Hill is awash in Wall Street's filthy lucre, which means that congress will block any law that threatens the main profit-centers of the big banks or brokerage houses. HFT, complex derivatives, securitization and repo transactions will all be preserved in their present state until the next big tremor rumbles through lower Manhattan bringing the markets down in a thunderous roar. Make sure the bunker is well stocked.

Aug 28 09:14

Boycott Philly? Why Philadelphia's Licensing and Taxing of Blogs is Creeping Fascism

The recent decision by the City of Philadelphia in Pennsylvania to require a Business Privilege License ($50 a year or lifetime cost of $300) of blogs and that the blogs be taxed on any profits has generated a well deserved outcry from free marketers across the country. Many have invoked Chief Justice John Marshall's famous words, "The power to tax involves the power to destroy." They are right, this will be the end of independent blogging in Philadelphia and around the world when this spreads across countries.

Webmaster's Commentary: 

Aug 28 08:23

Megaphone desktop tool - How Israel hijacks the blog-o-sphere

The Megaphone Desktop Tool gives the user the option of going to a particular site with a poll, and if the user chooses to go to the site, the software then casts a vote automatically, when this is technically feasible. The vote is chosen by the distributors of Megaphone.

Aug 28 06:48

The battle for Wikipedia: Palestinians counter Israeli editing group

After a rightist group opened the first-ever Zionist editing group aimed at defending Israel on Wikipedia, a Palestinian organization plans to create its own Wikipedia editing program.

Palestinian Journalists Syndicate head Abdul Nasser An-Najar told the Bethlehem-based Maan news agency that his organization plans to set up editing groups to counter attempts to present Israel's view on Wikipedia. He urged the Palestinian Authority to take part in the initiative.

An-Najar warned that the next regional war would be a “media war,” adding that online information on the Israeli-Arab conflict shapes world opinion.

Aug 28 06:32

Pentagon seeks anti-WikiLeaks technology

Evidently stung by the massive WikiLeaks dump of classified data about the Afghan war via a renegade Army intelligence analyst, the Pentagon is turning to its Top Secret "skunkworks" operation for a tech workaround. The Defense Advanced Research Projects Agency (DARPA) this week announced a new initiative to develop software that would identify and root out "insiders" stealing secrets from classified networks. The Cyber Insider Threat program, or CINDER for short, would "increase the accuracy, rate and speed with which insider threats are detected and impede the ability of adversaries to operate undetected within government and military interest networks," according DARPA's request for proposals.

Aug 27 06:14

Be a closet climate modeler with Climate@home

First there was SETI@home where you could use spare CPU cycles to look for extraterrestrial signals. Now we have Climate@Home, running NASA GISS modeling software in distributed computing, but no release date yet. Oxford has already created running BOINC. I expect it’s a case of “keeping up with the Joneses”

I wonder though, what’s the “carbon footprint” of leaving all those computers running to calculate the effects of fossil fuels burned to run them?

Aug 26 10:47

Facebook sues start-up for using 'book' in its name has two employees and fewer than 20 users signed up for its free Web community. The site has yet to officially launch.

But the Northbrook, Ill., company, which provides tools for teachers to manage their classrooms and share lesson plans and other resources, has been thrust into the spotlight by social networking giant Facebook, which sued the start-up for using "book" in its name.

"We've been sitting here scratching our heads for the last couple of days," Teachbook's managing director, Greg Shrader, said Wednesday. "We're trying to understand how Facebook, a multibillion-dollar company, feels this small enterprise in Chicago is any type of threat."

Aug 26 10:23

I Graciously Accept Rolling Stone's Obnoxiousness Award - Now Where's My Check?

Since an excited friend emailed me that I had won Matt Taibbi's "Most Obnoxious Thing on the Internet This Month" award, I have been looking forward to my $10,000 check and working on my acceptance speech. Here is a draft of that speech:

Webmaster's Commentary: 

An insult from Rolling Stone beats a compliment from the New York Times, any day! :)

Aug 26 08:17


You want to know what news sends chills down the spines of the world’s governments?

Not "rogue regimes’" purported saber rattling.

Not even bad economic data coming out of Wall Street.

It's news like this:

"The search giant Google and the U.S. Central Intelligence Agency are investing in a company working to track Web-browsing behavior.

Aug 26 07:53

Music Biz Uses Net Neutrality to Equate P2P with Child Porn – Again

Earlier this year the IFPI took that sentiment to the next level, going so far as to exclaim that “child pornography is great…because politicians understand child pornography.”

“By playing that card,” IFPI lawyer Johan Schlüter told an audience gathered at an anti-P2P conference in Sweden, “we can get them to act, and start blocking sites. And once they have done that, we can get them to start blocking file-sharing sites.”

The music industry knows the drill. Equating P2P with child porn is the quickest way to make people sympathetic to their cause and get them to act accordingly.

Aug 25 08:16

Internet fraudsters claim celebrities have died in plane crash in latest trojan virus attack

Scammers are sending emails containing links which claim that people like Beyonce, Tom Cruise or Tiger Woods have died in a plane or car crash.

One common email claims that the named celebrity has died along with 34 other people when their plane crashed into a mountainside while approaching the airport.

Recipients are asked to open an attachment for further details.

But when the user clicks on the link a Trojan computer virus is installed on their computer which can then give the virus’ creator complete remote control of their machine.

Aug 25 07:43

Philly Is Not the “City of Blogger-ly Love”

Imagine you live in Philadelphia and you have a blog. You are like about 99.9 percent of the world’s bloggers so you make no money and the blog is a labor of love.

Now imagine that you are going to be charged $300 for the privilege of having your blog start from the City of Brotherly Love. Yup, that’s right, Philly is hitting bloggers with this and other measures. If you haven’t had enough of the government on every level getting into everyone’s business this may put you over the top.

Webmaster's Commentary: 

I sure hope so!

Aug 23 19:10

New iPhone Security Patent: User Protection or 1984 iSpy?

Your next iPhone might listen to your heartbeat or scan your face to identify its rightful owner — and it could react with anti-theft measures if it ended up in the wrong hands, according to a patent recently filed by Apple.


“Ignoring the possibility that a false positive in Apple’s proposed theft protection might activate the spy cam while the user is in the bath, or in the middle of some other intimate moment, this technology seems Orwellian for another reason: It gives Steve Jobs and Co. the means to retaliate when iPhones aren’t being used in ways Cupertino doesn’t expressly permit,” The Register wrote over the weekend.

Aug 22 17:40

How WikiLeaks Keeps Its Funding Secret

The controversial website WikiLeaks, which argues the cause of openness in leaking classified or confidential documents, has set up an elaborate global financial network to protect a big secret of its own—its funding.

Some governments and corporations angered by the site's publications have already sued WikiLeaks or blocked access to it, and the group fears that its money and infrastructure could be targeted further, founder Julian Assange said in an interview in London shortly after publishing 76,000 classified U.S. documents about the war in Afghanistan in July. The move sparked international controversy and put WikiLeaks in the spotlight.

Webmaster's Commentary: 

So, the site shut down for lack of funding last year, then suddenly they have a million bucks to play with from a source which must remain hidden ... at the same time they start coming out with stories about a living Osama Bin Laden and dissing the 9-11 truth movement!

Aug 22 10:32

Course: Zionist Editing on Wikipedia

Webmaster's Commentary: 

Israel openly declares their intention to control everything you see, hear, and read on the internet!

Sieg HEIL! Sieg HEIL! Sieg HEIL!

Aug 22 10:30

Pay Up: Got a blog that makes no money? The city wants $300, thank you very much.

So even if your blog collects a handful of hits a day, as long as there's the potential for it to be lucrative — and, as Mandale points out, most hosting sites set aside space for bloggers to sell advertising — the city thinks you should cut it a check. According to Andrea Mannino of the Philadelphia Department of Revenue, in fact, simply choosing the option to make money from ads — regardless of how much or little money is actually generated — qualifies a blog as a business. The same rules apply to freelance writers. As former City Paper news editor Doron Taussig once lamented [Slant, "Taxed Out," April 28, 2005], the city considers freelancers — which both Bess and Barry are, in addition to their blog work — "businesses," and requires them to pay for a license and pay taxes on their profits, on top of their state and federal taxes.

Aug 22 07:30

The facial recognition software that will put a name to every photograph in the internet

A software company is developing revolutionary software which provides the ability to identify people from photographs posted on the internet. has produced technology that can identify individuals on social networking sites and online galleries by comparing their image against a known picture of them.

It means detailed profiles of individuals can be built up purely from online photographs and critics have said it could lead to exploitation by employers.

Aug 21 15:32

New industry meetings over net neutrality being hosted by lobbyists

While much of the focus has been on Google and Verizon when it comes to net neutrality as of late, the Wall Street Journal has reported that lobbyists began a new set of talks among a much wider group on Wednesday.

The Information Technology Industry Council is a lobbying firm which represents dozens of companies, including Apple, AOL, Cisco, HP, Microsoft, Nokia, and RIM among others. Reports indicate Microsoft is in attendance as is Cisco. AT&T and Verizon are also involved in the negotiations, but Google is not.

No public interest groups have been invited to this round of talks, unlike the unsuccessful FCC talks. Those groups used that fact to point out that the consumer has no representation in these latest talks, making them illegitimate.

"The public does not need more time-consuming deliberations," Media Access Project senior vice president and policy director Andrew Jay Schwartzman said in a statement. "The FCC should take prompt action to assert its authority over broadband providers' network management practices, without further delay."

Aug 21 13:35

New Facebook Feature Is A Possible Security Concern

New facebook feature allows facebook to lock town your location anytime anywhere...beware!

Aug 21 10:08

Philadelphia to register/charge bloggers $300 for blogging "priviledge"

For the past three years, Marilyn Bess has operated MS Philly Organic, a small, low-traffic blog that features occasional posts about green living, out of her Manayunk home. Between her blog and infrequent contributions to, over the last few years she says she's made about $50. To Bess, her website is a hobby. To the city of Philadelphia, it's a potential moneymaker, and the city wants its cut.

In May, the city sent Bess a letter demanding that she pay $300, the price of a business privilege license.

Aug 20 07:59

Gilad Atzmon: United Against Knowledge

The Guardian reported today that two Israeli groups have set up training courses in subversive Wikipedia editing aiming to 'show the other side' of the Jewish State.

Those who lend their pen to the Palestinian cause know about Wikipedia Jews, a term that was coined a few years ago. It refers to a bunch of rabid and crypto Zionists who constantly vandalise encyclopaedia entries to do with Palestine, Palestinian activists and Israeli atrocities.

According to the Guardian two Israeli groups seeking to gain the upper hand in the online debate have launched a course in "Zionist editing".

Aug 19 11:32

Mac, PC, Linux - it doesn't matter as they all suck...

Let the rant begin! I just sent this little crash notifier note in my daily series or my reality show called, Crash Notifier - My Daily Time Waster, to the techies at Apple since I have nothing better to do.

As much as this happens, I should start sending them my invoice for billable time since they are taking money away from me. I did the same by sending my NSAT&T cell phone bill up the road here to NSA and told them to pay it, since I'm funding their operations as we all are with our taxes, so they can in-turn use our federal equipment and payroll spook personnel to be used against us, to spy on us in this twisted Ouroboros tax-funded intel scheme against the hand, or tail, that feeds it...

Aug 18 15:45

Wikipedia editing courses launched by Zionist groups

Two Israeli groups set up training courses in Wikipedia editing.

Aug 18 08:17

US says okay for teachers to spy on your kids in their bedrooms!

IT LOOKS LIKE PROSECUTORS are not going to get involved in the bizarre case of the school which switched on laptops to spy on students while they were in their own bedrooms. US Attorney Zane David Memeger told USA Today, investigators had found no evidence of criminal intent by Lower Merion School District employees who activated tracking software that took thousands of webcam and screenshot images on school-provided laptops.

Webmaster's Commentary: 

Those parents ought to buy their own kids laptops and send the school issued ones back ... in pieces!

Aug 18 06:12

Former Pakistani Intel Chief Fears World War Three Is Imminent

Gul reiterated his stance on the 9/11 attacks, that it was a black operation to be used as a pretext for entering Afghanistan and using it as a launch pad to enter Pakistan and dominate the region.

Gul also spoke about the evidence that the 2008 Mumbai terror attacks were a Western controlled intelligence operation that was to be blamed on Pakistan, a claim he made shortly after the attacks which has since been vindicated by mainstream reports that US and Indian undercover agents were involved in the attacks.

The General also spoke on the death of former Pakistan leader Benazir Bhutto, reasserting his previous analysis that Bhutto was eliminated by a neocon controlled assassination squad after she “became rebellious” toward globalist interests.

Aug 17 12:02

Google still censoring Climategate?

For many weeks now, readers have been sending me emails describing how Google has been doing its best to hide information relating to Climategate, which has been the single biggest story on the Internet since the Climategate emails came to light on November 19. By Nov. 26, the term had gone viral and Google returned more results for “climategate” (10.4 million) than for “global warming” (10.1 million). As the Climate Scandal exploded, and increasing numbers of blog sites covered it, the number of web pages with Climategate continued to climb. On Dec. 7, Google’s search engine found 31.6 million hits for people who searched for “Climategate.”

Webmaster's Commentary: 

As an experiment, I searched "Michael Rivero" on Google and got 268,000 results. The same search at BING yielded 726,000 results.

Google doesn't love me any more!

Yahoo does not indicate the total number of records it finds. Wikipedia has flat-out banned any mention of me (one slipped through by accident apparently) and all the YouTube videos I did with Alex Jones have now been deleted.

Boo hoo, boo hoo. :P

Aug 17 11:13

Everything Is A Lie: The Deliberate Intent To Deceive People Is At An All Time High

From pollution to politics, the era of deception and duplicity has reached new heights and hijacked almost every form of media in the world. In the last frontiers for truth such as the internet, disinformation operations are in full swing to discredit and destroy any semblance of authentic and factual information available to the public.

Webmaster's Commentary: 

Lies are control. Truth is freedom.

Aug 17 10:56

Obama demands access to Internet records without court review

'Big Brother is watching you.' Yet another move toward a totalitarian government has secretly occurred that bears ominous signals for personal freedom.

Barack Obama is demanding access to the Internet records of average citizens, in secret, and without court review.

"The Obama administration is seeking authority from Congress that would compel internet service providers (ISPs) to turn over records of an individual's internet activity for use in secretive FBI probes.

"In another instance where Americans are urged to trust their political minders, The Washington Post reported last month that "the administration wants to add just four words--'electronic communication transactional records'--to a list of items that the law says the FBI may demand without a judge's approval."

Aug 17 08:31

Zionists Boast: "Our Internet Warfare Squad Controls The Web"

The Zionist state is accelerating its Hasbara campaign, by forming “Internet Warfare Squads”, their sole remit: to post pro-Israel responses on websites worldwide. This assault on free speech and effectively muzzling any criticism of Israel is a tool which will be used in the public relations war, the Zionist thought police are only a click away.

Aug 17 08:27

A reminder that Israel PAYS people to post pro-Israel propaganda on the internet!

Aug 16 12:50

Porno for Pessimists

I don’t need to remind you that—little more than a month after Lindgren and Harris mocked Celente’s wacky conspiracy theories—“Tea (Taxed Enough Already?) Party” protests began to pop up all across the nation to revolt against everything from TARP bailouts to mandatory health insurance.

Webmaster's Commentary: 

Every time the bloggers came out with a well considered prognostication about future events, the government and corporate PR shills would hurl ridicule and abuse, and attempt to silence our warnings that agreement with various policies would be to the benefit of the ruling class and detrimental to everyone else in the nation. But that was then and this is now and the hard reality is that the bloggers were for the most part correct while the corporate media and government promises and claims were so much empty air.

Today the citizen's media (a better name than blog-o-sphere IMHO) has won the lion's share of the audience, while the audience share and trust in the corporate media has plummeted. Most people get their political news off of the internet these days much to the annoyance of those who grew up with an unshakable sense of being able to lie with impunity as the path to power and great wealth.

We were telling you the truth. The government was lying. That situation persists to this very day.

Of course, as this article illustrates, neither the government nor the corporate media will ever outright admit they lied to the public. Those rising internet stars they cannot buy off or otherwise co-opt will simply be ignored as the powers that be struggle to find ways to sell the old lies in the new world.

Personally, I think the effort doomed to fail. The internet has changed the fundamental nature of how information flows in our society just as dramatically as Gutenberg's movable type printing and there is no going back. We are entering an age where government and business must be more honest with the public, or simply cease to exist. The age of lies is coming to an end. Truth is winning. Deal with it.

Aug 16 12:34

Disney, others sued over allegedly spying with 'flash cookies'

A lawsuit filed in federal court last week alleges that a group of well-known Web sites, including those owned by Disney, Warner Bros. Records, and Demand Media, broke the law by secretly tracking the Web movements of their users, including children.

Webmaster's Commentary: 

See Ghostery!

Aug 16 10:09


Ghostery sees the invisible web - tags, web bugs, pixels and beacons. Ghostery tracks the trackers and gives you a roll-call of the ad networks, behavioral data providers, web publishers, and other companies interested in your activity.

Aug 16 08:22

Facebook 'dislike' scam warning

Facebook users are being targeted in a scam that offers them a chance to install a "dislike" button.

The scam tricks users into allowing a rogue application to access their profile page, which then posts spam messages.

It also attempts to lure people into completing an online survey, for which the scammers are paid money.

Aug 15 22:14

Big Brother: Obama Demands Access to Internet Records, in Secret, and Without Court Review

The Obama administration is seeking authority from Congress that would compel internet service providers (ISPs) to turn over records of an individual's internet activity for use in secretive FBI probes.

In another instance where Americans are urged to trust their political minders, The Washington Post reported last month that "the administration wants to add just four words--'electronic communication transactional records'--to a list of items that the law says the FBI may demand without a judge's approval."

Aug 15 11:49

Knesset Outsources US Campus Public Diplomacy to Militant Christian Zionists

A bi-partisan group of Israel's Ministers of Kenesset (Israel's Parliament) has partnered with a Christian Zionist organization to recruit Evangelical students to represent Israel on US campuses:

Aug 15 11:25

Megaphone desktop tool

The Megaphone Desktop Tool gives the user the option of going to a particular site with a poll, and if the user chooses to go to the site, the software then casts a vote automatically, when this is technically feasible. The vote is chosen by the distributors of Megaphone.

Webmaster's Commentary: 

How Israel's shills try to hijack the internet!

Aug 14 08:30

Dell accused of hiding incriminating evidence in defect case

Dell stands accused of deliberately hiding emails that showed its top executives in the mid-2000s knew the company was shipping millions of defective computers, one of its customers alleged in court filings Thursday.

Web hosting provider Advanced Internet Technologies, which alleges Dell knowingly sold computers that contained faulty components, said it knows that senior executives were aware of the problems. It cites a list of talking points that showed then-chief executive Kevin Rollins, founder Michael Dell, and others discussing ways to publicly address the malfunctions, which involved capacitor failures in Dell OptiPlex computers. AIT claims Dell is deliberating withholding the release of additional documents.

Webmaster's Commentary: 

The story about the capacitors goes back a loooooooong way!

Aug 13 17:49

Explaining Net Neutrality In A Way Tea Partiers Can Understand

Recent news item: Tea Partiers coming out against Net Neutrality

Explaining Net Neutrality In A Way Tea Partiers Can Understand

Let's put this in a way Tea Partiers can understand. Let's say Mr. and Mrs. Tea Party Zealot love to use the Internet for political activism -- they frequent right-wing websites, send around clips of Hannity and Limbaugh, organize right-wing events, post sycophantic praise on Sarah Palin's website, the works.

But let's say their service provider is a (cue scary music) liberal company, which contributes heavily to Democrats. The media giant that this family pays for Internet access wants to make it easy for customers to access socialist content, send around pictures of Karl Marx, coordinate with the New Black Panther Party, and send money to gay illegal immigrants, but would make it exceedingly difficult to access, visit Glenn Beck's activist sites, access Palin's Facebook age, etc.

Aug 13 13:15

Cops love iPhone data trail

• Every time an iPhone user closes out of the built-in mapping application, the phone snaps a screenshot and stores it. Savvy law-enforcement agents armed with search warrants can use those snapshots to see if a suspect is lying about whereabouts during a crime.

• iPhone photos are embedded with GEO tags and identifying information, meaning that photos posted online might not only include GPS coordinates of where the picture was taken, but also the serial number of the phone that took it.

• Even more information is stored by the applications themselves, including the user's browser history. That data is meant in part to direct custom-tailored advertisements to the user, but experts said some of it could be useful to police.

Aug 13 08:24

Obama Demands Access to Internet Records, in Secret, and Without Court Review

The Obama administration is seeking authority from Congress that would compel internet service providers (ISPs) to turn over records of an individual's internet activity for use in secretive FBI probes.

In another instance where Americans are urged to trust their political minders, The Washington Post reported last month that "the administration wants to add just four words--'electronic communication transactional records'--to a list of items that the law says the FBI may demand without a judge's approval."

Aug 13 04:49

Tea Baggers NOT in favour of net neutrality?

The Virginia Tea Party Patriot Federation was among the groups that signed the letter. Jamie Radtke, the group’s chairman, said interest in net neutrality is rising in the tea party movement.

“I’ve heard it talked about a lot more on conference calls I’ve been on [recently],” Radtke said. “It’s starting to get onto the radar now.”

Radke said the tea party opposition to net neutrality stems from concerns over increased government power.

Aug 12 19:41

Windows XP SP2 could live on thanks to Grand Theft Auto

A GRAND THEFT AUTO hack allows users of Windows XP Service Pack Two (SP2) to still obtain security updates despite Microsoft not supporting the OS.


"It turns out that an SP2 system will think its SP3 if you edit this key: HKLM\System\CurrentControlSet\Control\Windows, and edit the DWORD value CSDVersion from 200 to 300 (and reboot)," said F-Secure.

"It worked for GTA IV, so we decided to test it with KB2286198. And our test worked, WindowsXP-KB2286198-x86-ENU.exe installed on our SP2 test system once we tweaked the registry. We also tested an LNK exploit, and it did not infect the system after the patch."

Aug 12 19:39

The Palm Pre OS can bug you

BUG YOUR FRIENDS if they have a Palm Pre because its OS can be manipulated thanks to a zero day flaw that can be exploited with the help of an SMS text message.

A security team at Basingstoke based MWR Labs has found that an SMS can be used to subvert the OS completely. The flaw would allow the phone to be used as a recorder and transmitter for anything in its microphone's range.

Aug 12 07:05

U.S. Marshals Storing Naked Body Scanner Images!

U.S. Marshals Storing Naked Body Scanner Images

Aug 12 06:47

Facebook bug spills name and pic for all 500 million users

A bug in Facebook's login system allows attackers to match unknown email addresses with users' first and last names, even when they've configured their accounts to make that information private.

The information leak can be exploited by social-engineering scammers, phishers, or anyone who has ever been curious about the person behind an anonymous email message. If the address belongs to any one of the 500 million active users on Facebook, the social-networking site will return the full name and picture associated with the account.

Aug 11 12:16

I guess WRH isn't the only patriot site hovering on the edge of being broke.

Webmaster's Commentary: 

The only way to get the big money out of politics is for the little money to unite in the common cause of freedom.

Aug 11 10:12

Cybersecurity Lie Exposed: Power Plants Are Not Connected To The Internet

Senator Joe Lieberman’s draconian Internet takeover legislation, the 197-page Protecting Cyberspace as a National Asset Act, is being promoted as a vital tool to protect vulnerable infrastructure hubs from terrorist attacks, but as a recent Wall Street Journal report makes clear, large industrial power and water plants are not even connected to the public Internet.

We are constantly told that the Internet needs to be subject to government control because cyberterrorists could hack in and bring down the national power grid. However, the vast majority of the U.S. power infrastructure is not connected to the Internet. It will only be connected to the Internet if the government accelerates the implementation of “smart grid” technology, so in this sense, the government itself is leaving the power grid more vulnerable to hackers by its own programs.

Aug 11 09:41

Ryan Dawson needs donations

Webmaster's Commentary: 

I know it is a pain to keep hearing how the patriot blogs need money, but these are hard economic times for us all, and the big money goes to the people willing to lie to you to sell you a war, or a new tax, global warming, why BP is the sweetest-smelling oil company in the world, or why critics of Israel are "weak-minded fools."

The only way to defeat the big money is for all the little money to step forward and get involved. Without your continued support, even in small donations, we can lose more of the patriot blogs including Ryan's (and WRH).

I understand how Ryan feels about asking for help to replace his camera, but right now we are all dependent on the public to keep us running.

In Ryan's case, his camera with which he makes his web broadcasts has been destroyed, and he needs some help to purchase a new one.

Aug 11 08:56

Thousands of online banking customers have accounts emptied by 'most dangerous trojan virus ever created'

Thousands of British online banking customers have fallen victim to a sophisticated attack by cyber criminals who have stolen thousands of pounds from their accounts.

About 3,000 online banking customers have been victims of a computer virus attack that empties their accounts while showing them fake statements so the scam goes undetected.

Webmaster's Commentary: 

Or the bank just came up short and decided to blame hackers for it! Remember when Chase was limiting ATM withdrawals claiming a hacker attack no other banks reported, and it later turned out they were having cash flow problems they needed to hide from the public?

Aug 11 07:28

Google’s Secret Internal Vision Statement Reveals Struggle With Privacy

A confidential, seven-page Google Inc. "vision statement" shows the information-age giant in a deep round of soul-searching over a basic question: How far should it go in profiting from its crown jewels—the vast trove of data it possesses about people's activities?'

Aug 10 16:04

Snopes Exposed

I have recently discovered that is owned by a flaming liberal and this man is in the tank for Obama. There are many things they have listed on their site as a hoax and yet you can go to You tube yourself and find the video of Obama actually saying these things. So you see, you cannot and should not trust, ever for anything that remotely resembles truth! I don't even trust them to tell me if email chains are hoaxes anymore.

Webmaster's Commentary: 

All anyone needed to do is look at how Snopes handled 9-11 truth to know they are gatekeepers.

Aug 10 14:31

Google and Verizon Usher in the Internets

Monday's announcement that Verizon and Google will create a distinct wireless experience put net neutrality discussions not so much on the back burner as in the recycling bin.

Although early speculation suggested that the corporate giants were going to create the equivalent of an E-Z Pass lane for content providers willing to pay for higher content speeds, the actual plan is to create not just what amounts to a distinct "set of pipes" to funnel high-bandwidth content, but to also clearly define the wireless Internet as a rules-free zone that allows providers to determine what content reaches consumers.

Aug 10 11:10

Hawaii Internet Slow Down could last a Month or More!

This should not come as a surprise because basic bandwidth speeds have not increased here significantly in many years. We have waited and waited for promised increased speeds and it has never happened. This incident makes it very obvious that they do not have the infrastructure in place to handle increased speeds. If one fiber cable is damaged resulting in this massive decrease in available service it is obvious that they have not been investing in infrastructure . This should be a wake up call to Oceanic.

Aug 10 10:10

Website Grader, Quantcast, Compete, Alexa, Awstats - Accurate Web Analysis?

In reality, Alexa is the target of technically gifted webmasters who manage to inflate the rank of their sites, and thus deflate the rank of all other sites. It was fine when it started, but no longer.

Webmaster's Commentary: 


Aug 10 07:00

South Korea Police Raid Google Office

The South Korean police raided the offices of Google Korea on Tuesday as part of an investigation into whether the company illegally collected and stored personal wireless data.

Aug 08 21:17

Market Data Firm Spots the Tracks of Bizarre Robot Traders

The trading bots visualized in the stock charts in this story aren't doing anything that could be construed to help the market. Unknown entities for unknown reasons are sending thousands of orders a second through the electronic stock exchanges with no intent to actually trade. Often, the buy or sell prices that they are offering are so far from the market price that there's no way they'd ever be part of a trade. The bots sketch out odd patterns with their orders, leaving patterns in the data that are largely invisible to market participants.

Aug 08 15:24

More bashing of the internet ahead of mandatory government controls?

Popular classified ad website Craigslist has come under fire for profiting off of illegal prostitution ads. While Craigslist executives insist that they screen ads posted to their "adult services" section, police and anti-human trafficking advocates say the site has become a hotbed for online prostitution, which often involves underage women forced into the sex trade.

Aug 08 13:25

Virus Attacks Siemens Plant-Control Systems

Computer hackers have designed a virus that targets industrial control systems built by German engineering giant Siemens AG, activating a kind of malicious software that analysts say represents a growing corporate-espionage threat.

The virus, dubbed Stuxnet, is spread by devices plugged into USB computer ports. It is programmed to try to steal data from computer systems that are used to monitor large automated plants built for anything from manufacturing to power generation to water treatment. Siemens is one of the world's largest makers of such industrial automated systems, though it doesn't break out its annual revenue from such sales.

Webmaster's Commentary: 


As this article confirms, plant control systems are not tied into the public internet. The virus has to be inserted using a USB device.

So why would hackers, who are into money, porn, identity theft, and cramming Viagra ads into your mailbox going to waste their time on a virus for a refrigerator factory assembly line control system?

Folks, this is a hoax. The government needs to find a way to control the internet because they are in a panic that the world sees them for what they really are. So they are going to have "Terrorists" at you (as if terrorists could destroy this nation any more badly that Federal fiscal policy already has) to trick you into accepting more locks and controls on your computer and internet. For your own good, of course.

But stop and think about it. There is no financial reason for hackers to waste their time with factory computers (which are actually rather boring). Real enemies of the United States are not going to waste their time on refrigerator factory assembly line control systems. They would go after military systems which are already secure. Or they would go after the NCA comm systems (again, already secure) or even the IRS computers.

This claim that factory computers are under threat is just more bovine excrement to limit freedom of speech and justify handing several million dollars to some congresscritters donor who is in computer security.

Aug 08 09:03

Greek blogger shot down in Athens

Sokratis Giolias, 37, was shot down before his home in Athens after men possibly dressed in police uniforms rang his bell and said his car had been robbed. They shot 16 bullets of the 19 mm caliber at him.

Webmaster's Commentary: 

Latest word is that it was the police who gunned him down.

Aug 08 08:48

Digital Education vs. the Ruling Elite

Ruling elites as recently as 1600 appealed to God to justify their continuing rule. This was called the divine right of kings: rulership beyond any earthly court of appeal. That began to be undermined in the second half of the seventeenth century. A century later, Enlightenment democratic theory had replaced the divine right of kings. The divine right of Parliament or the divine right of the People replaced it.

This forced a major strategic change on the ruling elite. The ruling elite has to pretend that it does not exist. It formally acknowledged the legitimacy of the People as the final court of appeal. This involved training and screening the judges.

Aug 07 23:26

Sweden To Attend US-Led Military Drill

Sweden will take part in an American military drill to practice defence strategies in case of an Internet attack, Swedish Radio News reports.

Staff from the National Defence Radio Establishment and the Swedish Civil Contingencies Agency will take part in the drill, scheduled for September, which will focus on protecting countries against attacks from hackers and states that are hostile towards the West.

“Cyber Storm 3” is the largest military drill so far to focus on computer trespassing and is organised together with the US Department of Homeland Security, the Central Intelligence Agency and the Department of Defence.

Finland and Norway are also taking part in the drill.

Aug 06 12:00

Apple devices are vulnerable to attack, say German security officials

Several Apple devices including the iPhone and iPad have two critical security weaknesses for which no patch exists, the German government warned last night.

Users of Apple mobile devices should only use websites they deem trustworthy and refrain from opening PDF files until Apple releases a fix, Germany's federal office for information security said.

"This allows potential attackers access to the complete system, including administrator rights," the statement warned. "It has to be expected that hackers will soon use the weak spots for attacks."

Aug 06 09:28

The Trust Crisis with Regulating Net Neutrality

Activist Post

Since it was reported that Google and Verizon are close to a deal on so-called "net neutrality," the policy debate has heated up in Washington. Of course the debate has very little to do with the actual mechanics of how net neutrality will work, rather who will get the control to regulate it.

However, now that the FCC has abandoned negotiations on a "net neutrality" compromise, it is looking like the Congress will ultimately establish the rules -- handed down to them by their corporate masters. It seems the Elite's fight over who controls the dial has been decided. One thing is for sure, whoever controls the speed dial on the Internet will control the entire Web and subsequently all flow of information.

Aug 05 18:08

FCC Abandons Efforts for Net Neutrality Compromise: Allows Google and Verizon to Write the Regulations


WASHINGTON — Federal regulators are abandoning efforts to negotiate a compromise on so-called "network neutrality" rules intended to ensure that phone and cable TV companies cannot discriminate against Internet traffic traveling over their broadband lines.

The announcement Thursday by the Federal Communications Commission ends weeks of FCC-brokered talks to try to reach an agreement on the thorny issue among a handful of big phone, cable and Internet companies. And it comes as two big companies that have been taking part in those talks – Verizon Communications Inc. and Google Inc. – attempt to hammer out their own separate proposal for how broadband providers should treat Internet traffic.

Aug 05 15:00

Net neutrality is foremost free speech issue of our time

Back in the 1990s, Congress rescinded rules that prevented television networks from owning their own programming. Network executives swore in congressional hearings that they wouldn't give their own programming preferred access to the airwaves. They vowed access to the airwaves would be determined only by the quality of the shows.

I was working at NBC back then, and I didn't buy that line one bit. Sure enough, within a couple of years, NBC was the largest supplier of its own prime-time programming. To take advantage of this new paradigm, Disney bought ABC, Viacom (the parent company of Paramount) bought CBS and NBC merged with Universal.

Aug 05 10:43

Using Google Earth to Find Tax Cheats

Webmaster's Commentary: 

"ALL YOUR MONEY ARE BELONG TO US!!!!" -- Official White Horse Souse

Aug 05 10:38

Google, Verizon Web Deal Could Upend Net Neutrality

Washington -- Google Inc. and Verizon Communications Inc. are close to finalizing a proposal for so-called "network neutrality" rules, which would dictate how broadband providers treat Internet traffic flowing over their lines, according to a person briefed on the negotiations.

A deal could be announced within days, said the person, who did not want to be identified because negotiations are still ongoing. According to the New York Times, the agreement between Google and Verizon "could allow Verizon to speed some online content to Internet users more quickly if the content's creators are willing to pay for the privilege."

Aug 05 10:20

Massive Censorship Of Digg Uncovered

A group of influential conservative members of the behemoth social media site have just been caught red-handed in a widespread campaign of censorship, having multiple accounts, upvote padding, and deliberately trying to ban progressives. An undercover investigation has exposed this effort, which has been in action for more than one year.

Aug 05 09:38

DHS Deploys Special Teams to Battle Hackers in Cyber War for Infrastructure

Just hours before reports emerged that hackers were for the first time attempting to take over specific infrastructure plants, a former CIA director told ABC News that weaknesses in critical infrastructure systems in the U.S. were among the country's greatest threats to national security.

Webmaster's Commentary: 

This is just a propaganda tactic to convince people that the internet must be brought under tight government control "for your own safety." But stop and use your common sense. Hackers do what they do to make money. They steal credit card data and "ping" each one for a few bucks to make millions. They steal identities to buy whatever they buy with their stolen credit card data.

There is hardly a profit motive going after infrastructure, because there is no way to collect an extortion payment that does not provide the opportunity for a capture. The risk is far higher while the financial rewards cannot compete with the fees paid to hackers to pump viagra and porn ads into every mailbox!

Aug 05 05:29

Experts: BlackBerry ban could affect privacy everywhere

Smartphone users in countries all over the world could lose some privacy if threats and promises by foreign nations to shut down BlackBerry services goes through, analysts say.

Aug 04 13:24


I was just informed that zionist ads sponsored by Google are appearing at the end of my posts.

Webmaster's Commentary: 

It appears that wordpress is selling ad space to Google Adsense, who in this particular case showed no taste at all putting an ad for AIPAC on Desert Peace! :)

Aug 04 10:45

Jane Bürgermeister - Bloggers Persecuted & Declared Insane to Silence Dissent

Aug 04 09:55

Saudi Arabia announces Blackberry messenger deadline

Saudi Arabia's telecoms watchdog has called on telecoms firms in the country to block the messenger function on Blackberry handsets from Friday.

The watchdog said the ban would last until the state's three mobile phone operators "fulfil the regulatory requirements it has requested".

But the Communications and Information Technology Commission (CITC) did not reveal what these requirements were.

The United Arab Emirates threatened on Sunday to ban some Blackberry services.

Webmaster's Commentary: 

Apparently, the assassination in Dubais involved the use of Blackberries by Mossad.

Aug 04 09:12

U.S. To Train 3,000 Offshore IT Workers in South Asia

Despite President Obama's pledge to retain more hi-tech jobs in the U.S., a federal agency run by a hand-picked Obama appointee has launched a $22 million program to train workers, including 3,000 specialists in IT and related functions, in South Asia.

Following their training, the tech workers will be placed with outsourcing vendors in the region that provide offshore IT and business services to American companies looking to take advantage of the Asian subcontinent's low labor costs.

As recently as Monday, Obama, speaking at a Democratic fundraiser in Atlanta, boasted about his efforts to reduce offshoring. The President said he's implemented "a plan that’s focused on making our middle class more secure and our country more competitive in the long run -- so that the jobs and industries of the future aren’t all going to China and India, but are being created right here in the United States of America."

Aug 03 10:54

Obama Information Czar Outlined Plan For Government To Infiltrate Conspiracy Groups

Harvard law professor Cass Sunstein, Obama’s appointee to head the Office of Information and Regulatory Affairs, outlined a plan for the government to infiltrate conspiracy groups in order to undermine them via postings on chat rooms and social networks

Webmaster's Commentary: 

Just in case you wondered why all of a sudden there were so many postings about HAARP, chemtrails. and Bigfoot showing up here at WRH (then being deleted as soon as I see them).

Aug 03 09:19

DOJ Report Says Child Porn On the Rise

The report, ordered by Congress in legislation approved two years ago, concedes that the market for child pornography continues to grow rapidly and determining its size is impossible. "The number of offenders accessing the images and videos and the quantity of images and videos being traded is unknown," the report said.

Webmaster's Commentary: 

I would start with the clergy, then add SEC, MMS, the Pentagon, and maybe even the EPA, which has been waiting 16 years for data on the toxicity of 2-methylnapthalene when a 30 second search reveals it is a potent carcinogen!

Aug 03 07:24

The Web's New Gold Mine: Your Secrets

Hidden inside Ashley Hayes-Beaty's computer, a tiny file helps gather personal details about her, all to be put up for sale for a tenth of a penny.

The file consists of a single code— 4c812db292272995e5416a323e79bd37—that secretly identifies her as a 26-year-old female in Nashville, Tenn.

The code knows that her favorite movies include "The Princess Bride," "50 First Dates" and "10 Things I Hate About You." It knows she enjoys the "Sex and the City" series. It knows she browses entertainment news and likes to take quizzes.

Aug 03 06:09

The Man with the Bullhorn is a Lying Sack of Shit.

I wrote him to ask for the information and he said, basically, “Screw all of that. What do you mean by, how I feel about you? I love your wonderful writings.” I thought, WTF? It turned out that, all of a sudden, he never had gotten any of my mail and this went on for two weeks during a period when it had never happened before. My not denouncing him made me feel pretty good in the aftermath.

Aug 02 14:52

Project Vigilant and the government/corporate destruction of privacy

So, while Lamo has repeatedly denied (including in his interview with me) that he ever worked with federal authorities, it turns out that he was a "volunteer analyst" for an entity which collects private Internet data in order to process it and turn it over to the Federal Government.

Aug 02 14:08

How to Avoid the Prying Eyes

The Internet is rife with surveillance technology, but you can cover some of your tracks

To launch IE8 in InPrivate browsing mode by default do this.

Aug 02 12:23

First Web-based Jailbreak for iPhone 4 arrives; here's how to do it

Webmaster's Commentary: 

A recent court ruling has declared that jailbreaking your own equipment is not a violation of the DMCA. So have fun, but remember that once you step past Apple's boundaries, you are on your own and if you do not know what you are doing, you can wreck your phone. Final note is that this web system is VERY busy and it will probably take a while to complete the process.

Aug 02 08:08

Elite Cyber Group Comes Over Ground To Recruit Hackers

Webmaster's Commentary: 

A private contractor wrapped in the flag is hiring hackers to attack websites the government does not like.

Aug 01 12:27


In no particular order, these are the salient points that are converging, rapidly, screaming out our inexorable collision with National disaster:

–Very high levels of saber-rattling by lots of influential people, both in the US and abroad, both “allies” and “enemies” in recent weeks, more so than usual.

–Huge build-up of Naval forces, US and Israeli, munitions, in Gulf AO.

–Key positions in US military, all branches, held by Israeli dual citizens

Jul 31 04:54


Now “Wiki-Leaks” is busy selling phony bin Laden stories, having the long dead Osama humiliating the CIA by running around villages in Afghanistan selling vacuum cleaners. What is our “leak” site really about? This is a dead news cycle. The World Cup is over, lots of people on holiday and no major stories. Only in a dead news period like this, as Oliver Stone pointed out, could the Israeli controlled media dump a pile of lame rumors mixed in with box loads of chickenfeed, passing it off as the story of the century.

Jul 30 10:46

Wiki-Leaks is Israel

Now “Wiki-Leaks” is busy selling phony bin Laden stories, having the long dead Osama humiliating the CIA by running around villages in Afghanistan selling vacuum cleaners. What is our “leak” site really about? This is a dead news cycle. The World Cup is over, lots of people on holiday and no major stories. Only in a dead news period like this, as Oliver Stone pointed out, could the Israeli controlled media dump a pile of lame rumors mixed in with box loads of chickenfeed, passing it off as the story of the century.

Webmaster's Commentary: 

The internet is an intellectual jungle, where lies and liars are quickly exposed and savaged. That is the new reality. This is survival of the fittest, which means survival of the most accurate, where winning by spending enough money to force people to believe as they are told to believe is an obsolete relic of a bygone age.

The downfall of WikiLeaks illustrates that principle.

A large amount of expense and effort was spent to build up WikiLeaks' reputation as a whistle blower site, even though there were older and more established whistle blower websites in operation. The first inkling that there might be a problem was that ABCNNBBCBS was pumping what a "dangerous" website WikiLeaks was, by way of attracting attention to the place.

And, as it the classic case of a bait-and-switch propaganda campaign, WikiLeaks did leak out some damaging info early on to build credibility. But whereas a TV newsreader can build an audience by being truthful, then start to lie to them with impunity, any blog news source is only as credible as their last release, because of the interactivity of the medium. Trust in WikiLeaks, years in the building, appears to have vanished almost overnight, both with the inclusion of the long dead Osama Bin Laden in the leaked Afghan logs, and Julian Assange's open disdain for the 9-11 truth movement.

The environment has changed. The old methods no longer work. Those entities that cannot evolve and adapt to the new reality must go extinct. WikiLeaks just demonstrated that hard fact.

Jul 30 09:58

U.S. Copyright Group ‘Steal’ Competitor’s Website

The U.S. Copyright Group (USCG) has been all over the news in recent months. The lawyer group sued thousands of BitTorrent users who allegedly file-shared motion pictures belonging to their clients, including the Oscar-winning Hurt Locker. However, it turns out that USCG are not copyright purists either, as they have blatantly copied the website of a competitor without permission.

Jul 30 09:48


I just got off the horn with the Ruling Elite. We had an emergency conference call and to tell you the truth, they ain’t happy. You little people are not responding the way you are supposed to. A significant portion of you are not getting more optimistic because they tell you to. Instead of just reading the headline on Bloomberg that durable goods orders skyrocketed in June, you actually read the details that said durable goods orders plunged. It is getting difficult for the ruling elite to keep the masses sedated and dumbed down. These damn bloggers, with their facts and critical thinking, are throwing a wrench into the gears.

Webmaster's Commentary: 

Guilty as charged.

Jul 30 09:40

Breaking a Promise on Surveillance

It is just a technical matter, the Obama administration says: We just need to make a slight change in a law to make clear that we have the right to see the names of anyone’s e-mail correspondents and their Web browsing history without the messy complication of asking a judge for permission.

It is far more than a technical change. The administration’s request, reported Thursday in The Washington Post, is an unnecessary and disappointing step backward toward more intrusive surveillance from a president who promised something very different during the 2008 campaign.

Jul 30 09:37

DND computers used to change Wikipedia site

A Defence Department spokesperson confirms computers at the department's research agency were used to alter a Wikipedia page entry about the Joint Strike Fighter jet and the Conservative government's decision to spend as much as $18 billion on the aircraft.

Jul 30 09:17

WHATREALLYHAPPENED.COM - The Ultimate Online News Source is perhaps the greatest online news site explaining the history and politics behind current world events. If you want to know what's really going on visit

Those who are new to the alternative media will soon understand that the critical decisions made by our political leaders are not simply the result of left or right wing points of view. This left/right idea is a false paradigm in many instances. What we are dealing with are often examples of outright corruption- violations of Law, not ideological leanings (ie. the invasion of Iraq).

Jul 30 09:16

White House proposal would ease FBI access to records of Internet activity

The Obama administration is seeking to make it easier for the FBI to compel companies to turn over records of an individual's Internet activity without a court order if agents deem the information relevant to a terrorism or intelligence investigation.

The administration wants to add just four words -- "electronic communication transactional records" -- to a list of items that the law says the FBI may demand without a judge's approval. Government lawyers say this category of information includes the addresses to which an Internet user sends e-mail; the times and dates e-mail was sent and received; and possibly a user's browser history. It does not include, the lawyers hasten to point out, the "content" of e-mail or other Internet communication.

Jul 30 08:51


Rebel News WAS one of the sources of these submissions…. at least until this morning. The site is administered by an Ausralian anti Semite and certified nutcase named Andrew Winkler. His former site was called ziopedia.

The names of sites he choses give the impression that factual information will be presented…. BUT, on the contrary, they are nothing but sounding boards for pure, unadulterated anti Semitism. The sites are also his vehicle to wage attacks against true activists involved in the Palestinian cause.

Below is his latest example of hatered…. in the form of an ’editorial’ sent out this morning…. an ‘editorial’ that promted this reply from me…

Jul 29 20:49

Canada's Defense Department computers used to change Wikipedia site

A Defence Department spokesperson confirms computers at the department's research agency were used to alter a Wikipedia page entry about the Joint Strike Fighter jet and the Conservative government's decision to spend as much as $18 billion on the aircraft.

Those edits included the removal of information critical of the government's plan to buy the jets and the addition of insulting comments aimed at Liberal Leader Michael Ignatieff.

Jul 29 13:06

Pennsylvania School District Accused of Spying on Students for Second Time

Jim Tate runs a computer and software store in Oklahoma City called Computer Nerdz. He said the software the school district installed in those laptops is a program that can be activated from a remote site in the event of a loss or theft.

"The software was designed to help the school district retrieve the laptop in the event that it was stolen from the student," Tate said.

But in Robbin's and Hassan's cases, the laptops were inside their homes and the web cams continued taking snap shots and screen grabs.

"I can understand why the parents would be absolutely outraged," said Jim Tate with Computer Nerdz.

Jul 29 12:43

Wiki "Leaks" - The final word?

"WikiLeaks is lame. Even the cover story, the mysterious Assange fleeing the murderous CIA, working to save the world is lame. Please, everyone, go to the site and read everything there. I have seen more confidential information on a weather report... When you read Mr. Assange’s output, you are looking at one of the Mossad games, nothing more... The game today is using Wikileaks, given its 15 minutes of fame for trashing the US in Iraq with the helicopter video, to spread imaginary stories about Pakistan, the only nuclear power in the Middle East capable of standing up to Israel, and the enemy of India"

[NB: Perhaps even more important, Pakistan is a staunch ally of China — a most dangerous liaison where USrael is concerned]

Jul 29 12:25

Wikileaks + MSM Hype = ?

Ladies & gentlemen, welcome to the 40th episode of New World Next Week - the video series from & This week we look exclusively at the massive media hype surrounding Wikileaks, wider wars & the future of the web.

Sources & Documentation:

Jul 29 10:01

US wants increased police access to email: report

The White House wants to give the FBI easier access to the Internet activity of suspects without a court order, the Washington Post reported Thursday.

Webmaster's Commentary: 

Just as soon as We The People get the same exact access to all government emails.

Jul 29 09:58

Facebook privacy fears for 100m users as their personal details are published on file-sharing site

The privacy of millions of Facebook users has been jeopardised after some of their details were harvested and published on the internet.

An online security consultant who wished to highlight the social networking site's privacy issues published a list of data taken from more than 100million users' profiles.

Ron Bowles used a piece of code to scan Facebook profiles, collecting data not hidden by the user's privacy settings.

The list has been shared as a downloadable file which has now spread rapidly across the internet, prompting anger and concern from millions of users around the world.

Jul 29 09:51

Sherrod to sue blogger who released video clip

Former Agriculture Department employee Shirley Sherrod said Thursday she will pursue a lawsuit against conservative blogger Andrew Breitbart - the man responsible for posting an edited video clip of Sherrod appearing to say she discriminated against a white farmer looking for assistance.

Webmaster's Commentary: 

Andrew Breitbart will immediately point the finger at whoever gave him the clip, and THAT should be an interesting story!

Jul 29 08:06

FBI backs record-keeping on prepaid cell phones

FBI Director Robert Mueller has endorsed anti-terrorism legislation that would require prepaid cell-phone sellers to keep records of buyers' identities.

Webmaster's Commentary: 

And the end result of all that expense and bureaucracy is that real terrorists (and even the Mossad and CIA fakes) will simply start every operation by stealing a bunch of cell phones. Good thinking Mueller! You are the perfect government official, able to spend a ton of money on a program that won't really accomplish anything.

Jul 29 06:11

Intel Turns to Light to Transfer Data Inside PCs

Intel on Tuesday announced it had developed a prototype interconnect that uses light to speed up data transmission inside computers at the speed of 50 gigabits per second.

Jul 28 22:05

Google and CIA Invest in ‘Future’ of Web Monitoring - Pre Crime

The investment arms of the CIA and Google are both backing a company that monitors the web in real time — and says it uses that information to predict the future.

“We’re right there as it happens,” Ahlberg told Danger Room as he clicked through a demonstration. “We can assemble actual real-time dossiers on people.”

Jul 28 17:54

Who's Paranoid Now? US Military & Blogs (Official Docs)

...At that point the enemy blog might be used covertly as a vehicle for friendly information operations. Hacking the site and subtly changing the messages and data—merely a few words or phrases—may be sufficient to begin destroying the blogger’s credibility with the audience. Better yet, if the blogger happens to be passing enemy communications and logistics data, the information content could be corrupted. If the messages are subtly tweaked and the data corrupted in the right way, the enemy may reason that the blogger in question has betrayed them and either take down the site (and the blogger) themselves, or by threatening such action, give the U.S. an opportunity to offer the individual amnesty in exchange for information.

Jul 28 13:12

New Zealand pizza lovers suffer information theft from Hell

Some 230,000 New Zealanders have been told that their personally identifiable information may have fallen into the hands of hackers who apparently compromised the network of a locally famous food chain, Hell Pizza.

Jul 28 12:31

Wikileaks’ estranged co-founder becomes a critic

Cryptome’s history of publicizing leaks–while not yielding to pressure to remove them–is what led Young to be invited to join Wikileaks before its launch over three years ago. He also agreed to be the public face of the organization by listing his name on the domain name registration.

Operating a Web site to post leaked documents isn’t very expensive (Young estimates he spends a little over $100 a month for Cryptome’s server space). So when other Wikileaks founders started to talk about the need to raise $5 million and complained that an initial round of publicity had affected “our delicate negotiations with the Open Society Institute and other funding bodies,” Young says, he resigned from the effort.

Jul 28 10:57

Cable break hits Internet, phone, cable TV

Some 400,000 customers of Oceanic Time Warner Cable lost service Tuesday when the break occurred in a deep water undersea fiber-optic cable in the Molokai Channel.

Webmaster's Commentary: 

I wonder if one of the RIMPAC ships had an "accident."

Jul 28 07:27

Hackers shut down EU carbon-trading website

Hackers hijacked Europe's carbon-trading website and replaced it with spoof page detailing flaws in cap and trade scheme

Webmaster's Commentary: 

Okay, so occasionally you find a good hacker... (It will be interesting to see how hard they go after this one).

Jul 27 18:07

Is Your Last Name 'Arab'? Hope You Don't Want a Facebook Account!

Facebook appears to have solved the bug that led to the word 'Palestinian' being banned from page titles. But that's not their only problem: Now people with the surname "Arab" are being prevented from opening accounts.

Jul 27 10:49

Statewide outage for Oceanic Time Warner Cable

If you're having problems with the internet, you're not alone. Oceanic Time Warner Cable experienced a statewide outage just after midnight.

The interruption affects all services for the Big Island, Maui, Molokai and Lanai.

Webmaster's Commentary: 

Obviously Oahu is unaffected for the moment.

Jul 27 10:29

How long should a hard drive last?

Hard drive manufacturers are struggling - not just to stay ahead of each other, but to continue with a viable approach to making money. With drives being as cheap as they are, you know that the manufacturers can't spend a ton of effort in QA and test on each device. My suspicion is that the number of drives that arrive dead is much higher than it used to be. I'll also bet that "infant mortality" rates (drives, like mine, that experience a problem within the first few months of use) is also much higher than in the past.

The important take away? Drives are allowed to fail more often because they're so cheap to replace.

Jul 27 08:12

Iran targeted by industrial theft worm

Iran appears to have been the main target of the Stuxnet worm, which tries to steal data from industrial control systems.

The worm, which was first discovered last month, targets Siemens SCADA (supervisory control and data acquisition) management systems, which are most commonly used in industrial manufacturing facilities and utilities plants.

Webmaster's Commentary: 

Now, who would do a thing like that to Iran?!?!?

Jul 26 11:32

Former Google Engineers Launch New Search Engine:

According to, former Google engineers have launched a new search engine that could index even more sites than that of Google. The name of the search engine is Cuil (pronounced “cool”) and has already gone live.

Webmaster's Commentary: 

I spotted their web crawler going through my server earlier today.

Jul 26 11:31

Government says DMCA can’t stop jailbreaking, unlocking

The first administrative ruling makes clear that users are within their rights to modify to modify cell phone software so that the device will run applications other than those approved by its maker, say, Apple, and procured from sources other than the manufacturer's proprietary source, say Apple's App Stone.

The copyright office said: "When one jailbreaks a smartphone in order to make the operating system on that phone interoperable with an independently created application that has not been approved by the maker of the smartphone or the maker of its operating system, the modifications that are made purely for the purpose of such interoperability are fair uses."

Jul 26 09:31

Wikileaks Mirrors

Find all the current Wikileaks Mirrors here. Helpful, if the main site - - is down.

Jul 26 09:25

Let Us All Solemnly Praise Wikileaks

We properly should offer recognition and honor to the great heroism of the people at Wikileaks:

Jul 26 09:21

The Afghanistan War Logs Released by Wikileaks, the World's First Stateless News Organization

"In media history up to now, the press is free to report on what the powerful wish to keep secret because the laws of a given nation protect it. But Wikileaks is able to report on what the powerful wish to keep secret because the logic of the Internet permits it. This is new."

Jul 26 05:56

Microsoft Vs. Open Source: Now It's Political

Software giant may dominate in the U.S., but governments around the world are looking for other options.

Jul 25 09:22

Andrew Breitbart-- Major Right wing Echo Chamber Architect and Voice

You might think that Andrew Breitbart, involved in fraudulent, unethical faux journalism efforts attacking ACORN and Shirley Sherrod, is simply a small-time, ethically impaired lowlife-- pond scum. You would be wrong. Andrew Breitbart is, scum-metaphor-wise, BP grade, ocean destroying, gull oil well destorying major scum.

Jul 25 09:10

On the Edge with Max Keiser and Alex Jones

On the Edge from Friday, July 23rd with Alex Jones to talk about the surveillance state now being reported in Mainstream Media.

Jul 24 09:45

Wikipedia Revisionism by Israeli Pressure Groups

CAMERA (Committee for Accuracy in Middle East Reporting in America) is not in fact an organization devoted to fairness in journalism. … Its members also mounted a covert and conspiratorial attempt to edit all Wikipedia articles to slant them toward a rightwing Zionist perspective, and they were banned from Wikipedia when the plot was outed. The organization occasionally succeeds in correcting errors, but only in the same way that a fanatical Khomeinist would easily be able to find and correct errors in US journalism about the Islamic Republic of Iran. It isn´t that ideologues want fairness– they want to impose their blindered narrative on everyone else.

Webmaster's Commentary: 

That may explain why Wikipedia keeps deleting articles about What Really Happened and Michael Rivero

Jul 24 07:47


Of course these same talking heads make no mention of Joe the Plumber who reputation was smeared by professional journalists.

Webmaster's Commentary: 

Nor do they mention how the corporate media helped lie us all into war with Iraq. Then there were earlier embarrassments.

# NBC Dateline defames a trucking company in a report which manufactured claims of unsafe driving. NBC had to pay a half million in damages.

# CNN/Time - On June 7th, 1998, CNN reported that a Vietnam veteran had accused the Department of Defense of using nerve gas on it's own troops. While hardly the first time that the US has used chemicals against it's own people, this story proved to be un confirmable, and in the face of pressure from the Department of Defense, CNN retracted on July 2nd, 1998. Several reporters were fired, but CNN's Peter Arnett keeps his job by reminding everyone that he just reads what's given to him and has no way of knowing if it's true or not. At last report, Arnett, CNN and TIME have been sued for 100 million dollars for defaming the officers accused of the Sarin gas attacks.

# Steve Brill - Long time DNC donor Steven Brill created a magazine called "Brill's Content" and then shot his own magazine down with the debut issue, which instead of criticizing media offered up a 22 page attack on Kenneth Starr which was then used by the White House to again try to impede the investigation. No sooner had the Brill article debuted than virtually everyone interviewed for the article came forward to claim they had been misquoted and in one case to deny totally the statements attributed to them. Brill's shrill insistence that his quotes were indeed accurate and checked fell apart when one of the interviewees produced a tape recording of the interview. Brill was then forced to retract and apologize.

# Salon - An online magazine funded by Clinton donors, Salon, like Brill, was created to lend an air of credibility to some pretty silly accusations nobody else in the mainstream media would touch. Typical was the story Salon ran accusing Kenneth Starr of paying off witness David Hale. Upon examination, it turned out that Salon's sole source for the accusation was a woman who was a Clinton delegate, and had once worked for detectives trying to find dirt on Kenneth Starr. A (failed) professional psychic, she claimed she could control the rain with her mind and that it was she, not General Norman Schwartzkoppf, who had guided our troops to victory in Desert Storm. One of the reporters working for Salon is Jonathan Broder, who was fired from the Chicago Tribune for plagiarism.

# Stephen Glass - A reporter at the New Republic, Stephen wrote several award winning articles which reinforced the liberal's preconceived notions about conservatives and the nation at large. One example involved a story of a conservative conference that degenerated into drug use and group sex. The story passed editorial review and ran without basic fact checking. The story turned out to be a fabrication, along with almost 1/3 of the total work product of Glass's career at New Republic.

# Patricia Smith resigns her job at the Boston Globe after having to admit she fabricated characters for one of her stories. Later investigation shows that 52 of her articles for the newspaper cannot be verified as factual. Smith had been a finalist for a Pulitzer prize at the time of her disgrace.

# Mike Barnicle refused to resign his job at the Boston Globe after having been caught plagiarizing, and was fired. It was not the first time he had been investigated for fraud in his articles. Barnicle was suspended without pay for two months, which prompted an accusation of racial bias from the NAACP due to the difference in treatment between the white Barnicle and the black Pat Smith.

# The Weekly Standard settles a big lawsuit with Deepak Chopra.

# Both CNN and Tom Brokaw settle out-of-court with Richard Jewell.

# The Wall Street Journal loses a record libel suit filed by a Texas company, paying $200-million in damages.

Jul 24 07:22

Another iPhone glitch: Holidaymakers hit with huge bills for surfing web abroad - even with internet switched OFF

Owners of Apple's iPhone have been warned of a new problem that could see them unfairly charged hundreds of pounds for using them on holiday.

People with smart phones face big bills if they connect to the internet over the mobile phone network while overseas to check and send emails or browse the web.

Most holidaymakers turn off this function when abroad in order to avoid a nasty shock.

But some people who turn off this function on their iPhone are still being hit with enormous bills once they get home, it has been claimed.

Jul 23 11:14

India unveils prototype for $35 touch-screen computer

The Indian government has unveiled the prototype of an iPad-like touch-screen laptop, with a price tag of $35 (£23), which it hopes to roll out next year.

Aimed at students, the tablet supports web browsing, video conferencing and word processing, say developers.

Human Resource Development Minister Kapil Sibal said a manufacturer was being sought for the gadget, which was developed by India's top IT colleges.

Jul 23 08:35

Newspaper Chain’s New Business Plan: Copyright Suits

Steve Gibson has a plan to save the media world’s financial crisis — and it’s not the iPad.

Borrowing a page from patent trolls, the CEO of fledgling Las Vegas-based Righthaven has begun buying out the copyrights to newspaper content for the sole purpose of suing blogs and websites that re-post those articles without permission. And he says he’s making money.

(Note: If you do not advertise on your site and it is not a pay-site, then the copyrights fall under FAIR USE unless the copyright holder specifically limits that the information cannot be retransmitted/reprinted without the copyright holder's permission.)