COMPUTERS/INTERNET/SECURITY

Aug 29 07:54

Net Neutrality Activists Take the Senate by Storm

The partisan bickering on Capitol Hill can turn the most wide-eyed idealist into a disillusioned crank. But progress is possible even in this era of legislative gridlock. That’s why Free Press Action Fund members meet with their elected officials: to effect change.

Aug 29 07:31

Thought those embarrassing Facebook photos were forgotten? Think again: Site tests tool that scours old posts in seconds

You might think those embarrassing Facebook posts from the past are long gone, but a new feature could soon see them making an unwelcome return.

Facebook is reportedly testing a feature on its mobile app that allows users to search through old posts from friends using keywords about people or events.

The move could make it easier for people to find content otherwise thought to be buried in the deep, recesses of your Facebook feed.

Aug 29 07:15

AFP Accidentally Publishes Sensitive Metadata Online

The Australian Federal Police (AFP) faces embarrassment today after it emerged that authorities accidentally published highly sensitive information pertaining to criminal investigations and telecommunications interception activities.

Aug 29 07:11

Mass 3-Day Protest Outside GCHQ

A mass protest outside GCHQ is about to take place from Friday to Monday, in an effort to raise concerns about the increasing amount of surveillance citizens are subjected to by British and foreign Governments.

Aug 29 00:58

Big Brother Is Watching You: Paranoia, Surveillance, and the Drug War

Waking Times

Police have new tech to help them predict and enforce the law better than ever—but that also means enforcing the racial bias of drug arrests faster than ever, too.

Aug 28 18:10

Wall Street Admits That A Cyberattack Could Crash Our Banking System At Any Time

Wall Street banks are getting hit by cyber attacks every single minute of every single day. It is a massive onslaught that is not highly publicized because the bankers do not want to alarm the public. But as you will see below, one big Wall Street bank is spending 250 million dollars a year just by themselves to combat this growing problem. The truth is that our financial system is not nearly as stable as most Americans think that it is. We have become more dependent on technology than ever before, and that comes with a potentially huge downside. An electromagnetic pulse weapon or an incredibly massive cyberattack could conceivably take down part or all of our banking system at any time.

Aug 28 15:23

The truth behind social media-driven donation campaigns

Tactic often used to scam well-meaning people

Aug 28 15:20

How safe is your Money? Five Major U.S. Banks Hacked this month

The FBI is investigating five major bank security breaches this month that experts think may have come from state-sponsored hackers in Russia. The attacks, which happened earlier this month, gave hackers access to gigabytes of checking and savings account data that could be used to drain accounts.

Not safe in the banks regardless, but more reason to keep ONLY WHAT YOU NEED in there for bills etc...

Aug 28 11:45

VIDEO: Member of Online Gaming Group Arrested by SWAT - on Live Stream

SWATTING

- LOOK IN BOTTOM LEFT OF VIDEO

The report proved to be false, but the investigation caused nearby schools to enact security procedures and businesses to be evacuated.

Aug 28 10:25

NSA and GCHQ: snooping because we can

The crucial thing about the latest revelations from the secret documents leaked by the whistleblower Edward Snowden is their scope. When the Guardian first began publishing Mr Snowden’s documents seven months ago, it was immediately apparent that they described secret data-trawling operations by America’s NSA and Britain’s GCHQ of almost limitless reach.

Aug 28 10:07

Confidential Australia Data Retention Discussion Paper Leaked

It’s the secret industry consultation paper the Australian federal government didn’t want you to see.

Aug 28 09:51

How big telecom smothers city-run broadband

But a 1999 Tennessee law prohibits cities that operate their own Internet networks from providing access outside the boundaries where they provide electrical service. Bowling wanted to change that and introduced a bill in February that would allow them to expand.

Enlarge / State Sen. Janice Bowling, a Republican from Tullahoma, Tennessee, says she was surprised by AT&T’s adversarial reaction to her bill to allow cities to expand their broadband networks.

Allan Holmes/Center for Public Integrity

She viewed the network, which offers Tullahoma residents speeds about 80 times faster than AT&T and 10 times faster than Charter (according to advertised services), as a utility, like electricity, that all Tennesseans need.

Aug 28 09:40

BEX Alert!!! - "FBI examining whether Russia is tied to JPMorgan hacking"

The Federal Bureau of Investigation (FBI) is investigating whether Russians had any links with recent cyber intrusions against US banking giant JPMorgan Chase and other American banks.

The FBI is investigating whether the attacks, discovered in mid-August, were in retaliation for Western sanctions levied on Russia over the crisis in Ukraine, according to Bloomberg.

Aug 28 09:33

iFail: Why John Deasy's Risky iPad Gambit Crashed and Burned at LAUSD

Aug 28 08:29

What went wrong with Microsoft's August updates?

It's been a long time since Microsoft had a Patch Tuesday this bad. By Friday they were conceding problems with several updates. Not only did they withdraw four updates, but they recommended that users uninstall one of them.

Yesterday they reissued that update, but they also announced that it had its own set of new bugs, one of which can make windows inaccessible or invisible. Three of the four withdrawn updates are still withdrawn and two of those are also subject to the missing window bug. Two other updates, previously uninvolved with the August updates, also have this missing window bug.

Aug 28 07:23

NSA and GCHQ: snooping because we can

The crucial thing about the latest revelations from the secret documents leaked by the whistleblower Edward Snowden is their scope. When the Guardian first began publishing Mr Snowden’s documents seven months ago, it was immediately apparent that they described secret data-trawling operations by America’s NSA and Britain’s GCHQ of almost limitless reach.

Aug 28 06:10

'Unofficial' Microsoft Windows XP Service Pack 4 now Available for Download: Integrates all Features of Earlier Service Packs

Users downloading the unofficial Windows XP Service Pack 4 should keep in mind the fact that the package is not endorsed by Microsoft and is developed by an independent third-party developer.

However, the unofficial SP4 can be checked out for its 'enhanced security features' by XP users having no intentions of upgrading to newer Microsoft OSes such as Windows 7/8.

Aug 27 19:35

Privacy Concerns Raised over Disclosure of Tacoma Police Use of 'Cell Site Simulator'

The Tacoma Police Department confirmed Wednesday it has been using a sophisticated ‘cell site simulator’ for the past five years that enables it to zero in on a person’s cellular device, but said it does not snoop or collect data on the general public.

Aug 27 14:59

Landmark civil rights legal records deleted from Pacer

Records of landmark US civil rights cases presided over by one of the country's most senior judges have been removed from the internet.

The state-run Public Access to Court Electronic Records (Pacer) service deleted numerous court documents deemed incompatible with a software upgrade.

These included appeals heard by Justice Sonia Sotomayor prior to her appointment to the Supreme Court.

A famous racial discrimination case was among the expunged files.

Webmaster's Commentary: 

Someone doesn't want those precedents to be available for lawyers! How Orwell can you get?

Aug 27 13:55

Social self-censorship: Twitter, Facebook users don’t share opinions on political issues

Research on how Edward Snowden’s explosive leaks were shared on social media has found using Twitter and Facebook may actually encourage self-censorship.

The Pew Research poll finds that contrary to the hype, people may share less on social media when it comes to hot topics.

Aug 27 13:41

Poll: People are self-censoring discussion of the NSA on Facebook and Twitter

A newly released poll from Pew Research found a “spiral of silence” on the topic of mass NSA surveillance in which social media users are unwilling to discuss the issue online, particularly if their friends do not agree with them. Notably, this self-censorship was far more prevalent on the internet than in real life:

Aug 27 12:55

DRUDGE : “FEDS: RUSSIANS HACKED AMERICAN BANKS”

Russian hackers attacked the U.S. financial system in mid-August, infiltrating and stealing data from JPMorgan Chase & Co. (JPM) and at least one other bank, an incident the FBI is investigating as a possible retaliation for government-sponsored sanctions, according to two people familiar with the probe.

Aug 27 12:15

Justice Department confirms lost IRS emails are stored on backup drives

for weeks the IRS and Obama Administration told the American people a carefully crafted narrative regarding the whereabouts of emails containing information surrounding the targeting of specific groups and individuals based on their political party.

Aug 27 07:08

Amazon has sold no more than 35,000 Fire phones, data suggests

Amazon doesn’t give sales data for its devices, but figures from comScore and Chitika suggest only modest sales so far

Aug 27 06:57

How Cops and Hackers Could Abuse California’s New Phone Kill-Switch Law

“It’s great for the consumer, but it invites a lot of mischief,” says Hanni Fakhoury, staff attorney for the Electronic Frontier Foundation, which opposes the law. “You can imagine a domestic violence situation or a stalking context where someone kills [a victim's] phone and prevents them from calling the police or reporting abuse. It will not be a surprise when you see it being used this way.”

...

More importantly, however, the EFF continues to oppose it on grounds that it could be abused by law enforcement. The organization has focused in particular on the law’s failure to specify who can activate the kill switch and how it may be abused by others.

Aug 27 06:38

nationalreport.net is a fake news site we have encountered before

The site nationalreport.net is best ignored. This is a site where leftist provocateurs post fake news stories in the hopes that patriotic conservatives will latch onto to them and embarrass themselves by passing them around as true.

Aug 27 04:38

US courts trash a decade’s worth of online documents, shrug it off

The US Administrative Office of the Courts (AOC) has removed access to nearly a decade's worth of electronic documents from four US appeals courts and one bankruptcy court.

The removal is part of an upgrade to a new computer system for the database known as Public Access to Court Electronic Records, or PACER.

Court dockets and documents at the US Courts of Appeals for the 2nd, 7th, 11th, and Federal Circuits, as well as the Bankruptcy Court for the Central District of California, were maintained with "locally developed legacy case management systems," said AOC spokesperson Karen Redmond in an e-mailed statement. Those five courts aren't compatible with the new PACER system.

"The dockets and documents in these cases can be obtained directly from the relevant court," said Redmond. "All open cases, as well as any new filings, will continue to be available on PACER."

Aug 26 22:00

Blue Blood Democratic Law Firm Advises Senate Candidate Cyrus Habib to Dodge Tough Questions*

*Of course the motivation is pure speculation. But given the lack of any substantive response, it is a logical inference.

Tuesday, August 26, 2014

Cyrusgate? Did Perkins Coie Advise Cyrus Habib to Ignore Four Troublesome Questions in the 48th Senate Race Against Michelle Darnell?

Remember the four (4) questions I posed to 48th District Candidates Cyrus Habib and Michelle Darnell a month ago after a completely inaccurate endorsement from the Seattle Stranger stated that Ms. Darnell was in favor of raising taxes on Joe the Plumber? Well in case you don't recall, they are linked above and replicated in the comments section below for your edification.

Aug 26 17:57

Net Neutrality is 'marxist,' according to this koch-backed astroturf group

A mysterious conservative group with strong ties to the Koch brothers has been bombarding inboxes with emails filled with disinformation and fearmongering in an attempt to start a "grassroots" campaign to kill net neutrality—at one point suggesting that "Marxists" think that preserving net neutrality is a good idea.

Aug 26 16:30

How Cops and Hackers Could Abuse California’s New Phone Kill-Switch Law

Beginning next year, if you buy a cell phone in California that gets lost or stolen, you’ll have a built-in ability to remotely deactivate the phone under a new “kill switch” feature being mandated by California law—but the feature will make it easier for police and others to disable the phone as well, raising concerns among civil liberties groups about possible abuse.

Aug 26 15:54

Federal Government Spending $1 Million Creating Database To Track “Hate Speech” On Twitter…

The federal government is spending nearly $1 million to create an online database that will track “misinformation” and hate speech on Twitter.

The National Science Foundation is financing the creation of a web service that will monitor “suspicious memes” and what it considers “false and misleading ideas,” with a major focus on political activity online.

Aug 26 15:17

Bill Passes Allowing Police To Shut Off ALL Cell Phones … Remotely

Police and others would have the ability to shut off cell phones anytime they wanted under a bill passed by California’s state legislature, privacy experts say.

Senate Bill (SB) 962 would require manufacturers to add a “kill switch” to cell phones that would let authorities turn the device off remotely. The stated goal of the bill is to allow owners of smartphones to “kill” their phone if it’s stolen, but privacy experts say the bill’s language could be twisted. Additional language was needed, they add.

“If you give law enforcement a tool that can be abused, you’ll have an instance of asking for forgiveness rather than permission,” Jack Laperruque, an expert on privacy at the Center for Democracy and Technology, told The Hill. Laperruque believes authorities could use the kill switch to shut down communications during protests or incidents of civil unrest such as the riots in Ferguson, Missouri.

Aug 26 13:04

Corporate lobbyists tighten stranglehold over TPP

Hollywood and big publishers already have an alarming stranglehold over the US Trade Representative's objectives in trade agreements, leading to extreme copyright enforcement and privacy-invading policies in trade deals like the Trans-Pacific Partnership (TPP) agreement. But now, the White House is doing away with the remaining limits it has on lobbyists influencing federal policies.

Aug 25 16:52

Electromagnetic Warfare Is Here

Electromagnetic (EM) attacks are not only possible—they are happening. One may be under way as you read this. Even so, you would probably never hear of it: These stories are typically hushed up, for the sake of security or the victims’ reputation. Occasionally, though, an incident comes to light.

Aug 25 15:10

NSA built “Google-like” interface to scan 850+ billion metadata records

According to newly published documents, the National Security Agency has built a “Google-like” search interface for its vast database of metadata, and the agency shares it with dozens of other American intelligence agencies. The new documents are part of the Snowden leaks and were first published on Monday by The Intercept.

The new search tool, called ICREACH, is described in an internal NSA presentation as a “large scale expansion of communications metadata shared with [intelligence community] partners.” That same presentation shows that ICREACH has been operational since the pilot launched in May 2007. Not only is data being shared to more agencies, but there are more types of such data being shared—ICREACH searches over 850 billion records.

New data types being shared include IMEI numbers (a unique identifier on each mobile handset), IMSI (another unique identifier for SIM cards), GPS coordinates, e-mail address, and chat handles, among others.

Aug 25 15:07

You'd Never Spot This Razor-Thin ATM Skimmer

The constant drive for miniaturization doesn't just apply to consumer electronics: the crooks are at it, too. And when it comes to card skimmers, this tiny thing is pretty much impossible to spot.

Aug 25 14:56

NSA search engine allows law enforcement to scour data on citizens

The United States National Security Agency has built a massive information sharing system intended to allow intelligence community analysts from across the US government access hundreds of billions of records detailing the lives of people the world over.

This “Google-like” search engine, according to journalist Ryan Gallagher at The Intercept, was developed by the NSA as early as 2007, but was only made publicly available on Monday this week thanks to classified documents disclosed to the news site by former intelligence contractor Edward Snowden.

Aug 25 13:51

Leaked Documents Show NSA 'Google-Like' Search Engine Of People's Lives

The United States National Security Agency has built a massive information sharing system intended to allow intelligence community analysts from across the US government access hundreds of billions of records detailing the lives of people the world over.

This “Google-like” search engine, according to journalist Ryan Gallagher at The Intercept, was developed by the NSA as early as 2007, but was only made publicly available on Monday this week thanks to classified documents disclosed to the news site by former intelligence contractor Edward Snowden.

Aug 25 13:36

Feds closer to expanded search & seizure authority to remotely hack into PCs

The feds need a search warrant before installing a Remote Access Trojan (RAT) on computers suspected of being used in crimes, but the government can keep the remote access operation a secret from their target for 30 days and sometimes even longer if a judge approves an extension.

Aug 25 13:14

China To Launch Its Own OS, Defying NSA Spying

The Chinese government has made it official: it is launching a computer operating system to replace the likes of Microsoft Corporation Windows.

Aug 25 12:51

Thought Crimes in the 21st Century

Weighing in on a case that will significantly impact expression on Facebook, Twitter and other social networks, The Rutherford Institute has asked the U.S. Supreme Court to reverse the conviction of a Pennsylvania man who was charged with making unlawful threats (it was never proven that he intended to threaten anyone) and sentenced to 44 months in jail after he posted allusions to popular song lyrics and comedy routines on his Facebook page.

Aug 25 12:06

Foreclosure: Court Slams Stafne Law Offices in Lamelson v. NWTS DTA/FDCPA Lawsuit Without Discovery.

Saturday, August 23, 2014

KingCast and Mortgage Movies See Court Slam Stafne Law Offices in Lamelson v. NWTS Without Discovery: "They Have the Original Note and Allonge, Summary Judgment Granted."

Two videos forthcoming.
Saturday: Post Hearing Discussions
Monday: The entire hearing.

Aug 25 11:48

The corporatization of privacy exploitation

Virtually all cell phones on Earth can be geographically pinpointed with the right technology, a new report suggests, and the tools that enable this tracking are becoming increasingly all too affordable.

Products that can locate a handhold phone within a city block from any corner of the globe are nothing new — the intelligence documents disclosed by former United States government contractor Edward Snowden last year have proved that the US National Security Agency is in the business of not just finding cellphones, but eavesdropping on those call and sometimes even infecting those devices.

Aug 25 11:26

Governments across world can track movements of almost anyone with cellphone

Makers of surveillance systems are offering governments across the world the ability to track the movements of almost anybody who carries a cellphone, whether they are blocks away or on another continent.

Aug 25 10:52

VIRTUAL 9-11: Will the US & Israel Hack The US Banking System Computers and Falsely Blame It On Iran (or Syria or Russia or China)?

So what it looks like is being planned, and pre-sold to the American people with all these stories about celebrities' personal information being hacked and made public (an activity that produces no profit for the hackers other than news headlines), and the "Syrian" (nudge nudge wink wink) hack of the AP Twitter feed that shocked the US stock market, is that the US Government will itself take down the US financial computers, and blame it on Iran /Russia/ China/Al Qaeda/Syria/Arabs and others to be named as convenient. This gets Wall Street and Washington DC off the hook, because now the financial melt-down is an act of war, rather than the result of decades of Wall Street crime and corruption and the predations of Private Central Banks. US banks have already been hit with cyber attacks, to set the stage.

Webmaster's Commentary: 

Reposted in light of Today's warming from Wall Street of an impending cyber-attack, along with the wag-the-ISIS from the corporate media.

Optional Banner: 
WRH Exclusive
Aug 25 09:26

Comcast Violates Thousands Of 'Unlisted Phone Number' Customer's Privacy

Four years ago, users of Comcast's phone service who had paid for their personal information to be unlisted noticed that something was amiss. Complaints started appearing from these individuals who found their names, addresses, and telephone numbers in phone directories both online and off.

Aug 25 09:03

GoDaddy buying American-Israeli company Mad Mimi

Web hosting giant GoDaddy is buying Mad Mimi, a startup with Israeli roots, the companies said last week, but did not give a purchase price.

The Arizona-based acquirer is losing money and hopes to beef up against new competitor Google.

Aug 25 08:06

Police Screening Dates with Unethical Database Use

Court documents show that Fairfield Police Officers Stephen Ruiz and Jacob Glashoff used company time and equipment to search for women on internet dating sites.

The documents also show that two used the California Law Enforcement Telecommunications System – a statewide police database – to screen the women they liked.

Aug 25 07:48

New Social Media Surveillance Program Violates Privacy to Keep You Safe

Joe Wright
Activist Post

The latest press release from Virginia Tech University uses a familiar sales pitch which asserts that the only way to keep the public safe is through pervasive surveillance.

Even amid the public outrage and pushback in the wake of the Snowden revelations, the establishment continues to push forward with justifications about why it is in our best interest to be under their constant watch...

Aug 25 07:36

Whistleblower Has NSA Quaking

According to Bamford, one of the things that most disturbed Snowden when he worked at NSA was how data was being passed to Israel.

Aug 25 07:08

Largest class action against Facebook will look at PRISM

The largest class action against the social media giant has begun, gaining the support of over 60,000 Facebook users and is expected to investigate the company’s connection to the draconian PRISM surveillance programme.

Speaking to the media, Austrian privacy activist Max Schrems, said:

“Our aim is to make Facebook finally operate lawfully in the area of data protection”, he explains. “We are only claiming a small amount as our primary objective is to ensure correct data protection.”

Aug 25 07:08

UK Government Caught Censoring Wikipedia To Hide Truth About Bedroom Tax

Today it emerged that the Wikipedia page of Housing Minister Kris Hopkins has been edited in an effort to censor disturbing information about the Coalition’s controversial Bedroom Tax.

Aug 24 21:07

Is Big Brother spying on your computer – with your own cell phone?

Did you know that those who have the right technology don’t need to access the microphone in your cell phone to listen to your conversations?

That's not all.

You may have missed this news but Georgia Tech and MIT came up with a way that they can actually spy on your computer activity through your cell phone in pretty much the same way as a keylogger does.

This is from the study’s conclusion:

Mobile phones contain an array of powerful sensors. While access to many of the most obvious sources of information is generally restricted, the use of a number of a number of other seemingly innocuous sensors is not. In this paper, we demonstrate that unfettered access to accelerometer data allows a malicious application to recover and decode the vibrations caused by keypresses on a nearby keyboard.

Aug 24 17:42

China targets own operating system to take on likes of Microsoft, Google

China could have a new homegrown operating system by October to take on imported rivals such as Microsoft Corp, Google Inc and Apple Inc, Xinhua news agency said on Sunday.

Computer technology became an area of tension between China and the United States after a number of run-ins over cyber security. China is now looking to help its domestic industry catch up with imported systems such as Microsoft's Windows and Google's mobile operating system Android.

Aug 24 10:43

THE COPYRIGHT MONOPOLY SHOULD BE DEAD AND BURIED ALREADY

People sometimes ask how the artists will get paid if - no, when - the copyright monopoly is abolished. This question is not based on facts.

Aug 24 09:14

XP SP3: Download it while you still can

The link is at the bottom of this article, along with security patches for Windows 98, & W98 2nd ed. They work as of today. [ts]

Aug 24 07:13

The Secret Government Website Spy Tech Nobody Told You About

Today it has been revealed that a Virginia-based firm, AddThis, has developed secret website technology that covertly tracks visitors without their knowledge. The technology is being put to use by the Welsh Government, the National Assembly and a range of councils including Anglesey Council, Blaenau Gwent Council and Conwy Council.

Aug 23 11:22

UK: Man jailed for 33 months for pirating ‘Fast & Furious’

A computer programmer who filmed Fast and Furious 6 at a cinema and then uploaded it to the internet has been jailed for almost three years.
Philip Danks, 25, used a camcorder to record Fast and Furious 6 at a cinema in Walsall, near Birmingham and then uploaded a copy to the internet the following day.

Aug 23 08:43

Ditching Linux for Windows? The truth isn't that simple, says Munich

Munich city council demonstrated to the world that an organisation employing thousands could ditch Windows and move to Linux and free software.

When the project finished late last year about 15,000 staff at the German authority had been migrated to using Limux, a custom-version of Ubuntu, and OpenOffice.

But is the council's move to open source about to be scrapped in favour or returning to Microsoft?

No says the council, in spite of numerous reports to the contrary. Suggestions the council has decided to back away from Linux are wrong, according to council spokesman Stefan Hauf.

Webmaster's Commentary: 

Now I wonder who would plant the story that Munich was dumping LINUX to go back to Windows!!!

Aug 23 07:39

Android Phones Hit by ‘Ransomware’

You are guilty of child porn, child abuse, zoophilia or sending out bulk spam. You are a criminal. The Federal Bureau of Investigation has locked you out of your phone and the only way to regain access to all your data is to pay a few hundred dollars.

That message — or variations of it — has popped up on hundreds of thousands of people’s Android devices in just the last month.

Aug 22 10:10

Google Maps Has Been Tracking Your Every Move, And There’s A Website To Prove It

We all know that no matter what ‘privacy’ settings you may try and implement, our information is all being collected and stored somewhere. That knowledge sits in the back of our minds, and is easy to drown out by shoving in some headphones and watching Adventure Time on repeat until everything stops being 1984. But it’s a sharp jolt back to reality when you see a two dimensional image marking your daily commute with occasional detours to the cinema or a friend’s house.
WEBMASTER ADDITION: I think this only works for Google phone as my iPhone shows nothing at all on the map. BTW if you read the comments there is a very obvious shill trying to counter the anger and outrage over this.

Aug 22 09:35

Xubuntu

One of Ubuntu's many flavors.Great for beginners!
www.dedoimedo.com/computers/xubuntu-trusty.html

Aug 22 09:26

Linux Mint

Great OS for beginners. Base on Ubuntu,which is base on Debian Linux. Available in Cinnamon,Mate,KDE and Xfce desktops.
https://www.youtube.com/watch?v=jeRpM0adN0k

Aug 22 09:22

Manjaro Linux

Another great Linux OS based on Archlinux. You can install graphically or by CLI. Done both. Intermediate Bloody bleeding edge OS and software.
If you have to you can still run Windows from Virtualbox!
https://www.youtube.com/watch?v=POKxjp49-bs

Aug 22 09:19

How to Spot – and Defeat – Disruption on the Internet

David Martin’s Thirteen Rules for Truth Suppression, H. Michael Sweeney’s 25 Rules of Disinformation (and now Brandon Smith’s Disinformation: How It Works) are classic lessons on how to spot disruption and disinformation tactics.

We’ve seen a number of tactics come and go over the years. Here are the ones we see a lot of currently.

Aug 22 09:17

Crunchbang Linux

This is a great little OS based on Debian stable Linux called Wheezy. Works great on old computers and runs like a bat out of hell on new ones. For intermediate users.
www.dedoimedo.com/computers/crunchbang-waldorf.html

Aug 22 08:33

Microsoft's Windows 9: Much ado about little, given cloud shift

In a short-term lens, Windows 9 is critical because:

Microsoft needs to put the Windows 8 launch to bed to get us talking about something other than Vista analogies;
The software giant needs to refine Windows to be both touch and non-touch friendly;
Windows needs to hook into Microsoft's platform and productivity mantra;
And Windows needs to lay the groundwork for a faster development cadence as well as a cloud approach.

In other words, Windows 9's codename Threshold is on target. Windows 9 is the bridge between Microsoft's past of big bang releases and a licensing model to one focused on the cloud, innovation that's easier to consume, and services.

Webmaster's Commentary: 

From Wikipedia: "Cloud computing is the delivery of computing as a service rather than a product, whereby shared resources, software, and information are provided to computers and other devices as a utility (like the electricity grid) over a network (typically the Internet)."

In other words, they are taking computing back to the model of the 1970s where all the software and data are on mainframes and your electronic devices are merely terminals. You are able to access your data and applications only so long as you continue to pay the monthly rental on them. But the real problem is the loss of all privacy as your data is not under your own control but that of large corporations which have a track record not only of cooperating with the government, but of skimping on security to save a few bucks to please the stockholders. As I read the articles about Windows 9 "Threshold", it appears its major selling point is that it is not Windows 8 and has little else to recommend it. his is not the product computer users want, but the product Microsoft demands you will buy.

The good news is that this will invigorate the LINUX and Open Source communities (which may explain why the IRS was targeting Open Source organizations right alongside Obama's political enemies!

Aug 22 07:03

NSA Whistle-Blower: Obama’s Authority To Label ‘Terrorists’ Is The Same Rule The Nazis Issued In 1933

Former National Security Agency crypto-mathematician Bill Binney was blowing the whistle on domestic spying long before Edward Snowden became a household name, and has gone on record describing the agency’s growing powers as increasingly “totalitarian.” Now the 36-year agency veteran is explaining the reason for its expansion — “power, control and money.”

“Look at the NDAA [National Defense Authorization Act] Section 1021, that gave President Obama the ability to define someone as a terrorist threat and have the military incarcerate them indefinitely without due process,” Binney said in a recent interview with DW while expanding on his testimony about NSA in Germany earlier this year.

“That’s the same as the special order 48 issued in 1933 by the Nazis [the so-called Reichstag Fire Decree]. Read that — it says exactly the same thing.”

Aug 21 15:54

Raytheon & the NSA will now be recording everyone's license plate in Massachusetts

Technology and defense giant Raytheon was recently awarded a $130 million contract to install all-electronic tolling systems on the Massachusetts Turnpike and at several local tunnels. A unit of the company’s Integrated Defense Systems business will install the system over the next year and a half.

Aug 21 12:55

NYT Responds on Torture

The Action Alert noted that while Times executive editor Dean Baquet announced that the paper would henceforth call torture by its right name, even when committed by the United States, the paper failed to cover a major report (8/11/14) linking the US to torture.

Aug 21 12:37

Ferguson’s About Net Neutrality, Too

At the end of the classic Mr. Smith Goes to Washington, Jimmy Stewart, as Senator Jefferson Smith, is in the midst of his filibuster against the corruption of the political machine that sent him to Capitol Hill as their lackey. Now he knows the truth and he’s taken over the floor of the Senate to tell it.

Aug 21 12:09

The Secret Playbook of Internet Trolls: What’s Confusing You Is the Nature of their Game

The reason that Internet trolls are effective is that people still don’t understand their game.

There are 15 commonly-used trolling tactics to disrupt, misdirect and control internet discussions.

Aug 21 11:48

global Internet conditions

Akamai monitors global Internet conditions around the clock. With this real-time data we identify the global regions with the greatest attack traffic, cities with the slowest Web connections (latency), and geographic areas with the most Web traffic (traffic density).

Webmaster's Commentary: 

Click on "attacks" in the Modes menu above the map. (It takes a minute to fully fill in the graphics)

Seems the US is a teensy bit over-represented as a target! Where is the NSA, which is supposed to be protecting the nation? Or is this the work of the NSA, stealing what is left of our privacy?

Aug 21 11:37

Google is ‘distorting’ and undermining EC privacy ruling – EU Justice Commissioner

Google and other prolific search engines are “distorting” and undermining the European High Court’s recent ‘Right to be Forgotten’ ruling, the European Commission’s (EC) most senior justice official has warned.

The EU Justice Commissioner, Martine Reicherts, has accused the tech giant and other internet search engines of effectively undermining planned data protection reforms.

Aug 21 11:05

The Secret Playbook of Internet Trolls

Why would a Jew post vile anti-Semitic comments? Because normal people are offended by – and don’t want to be associated with – pure, naked anti-Semitism, and so they will avoid such discussions. If the discussion was originally criticizing a specific aspect of Israel policy, the discussion will break down, and the actual point regarding policy will be lost.

Similarly, anti-Semitic posts weaken websites by making them seem less reputable. Indeed, Common Dreams says that the troll’s anti-Semitic comments drove away many of that site’s largest donors … dealing a severe blow to its continued viability. That’s exactly what trolls spewing anti-Semitic bile are trying to do: shut down logical discussion and discredit and weaken sites which allow rational criticism of policy.

Aug 21 10:42

The Secret Playbook of Internet Trolls: What’s Confusing You Is the Nature of their Game

The reason that Internet trolls are effective is that people still don’t understand their game.

There are 15 commonly-used trolling tactics to disrupt, misdirect and control internet discussions.

As one interesting example, trolls start flame wars because – according to two professors – swearing and name-calling shut down our ability to think and focus.

Aug 21 10:40

Ferguson’s About Net Neutrality, Too

At the end of the classic Mr. Smith Goes to Washington, Jimmy Stewart, as Senator Jefferson Smith, is in the midst of his filibuster against the corruption of the political machine that sent him to Capitol Hill as their lackey. Now he knows the truth and he’s taken over the floor of the Senate to tell it.

The nation is enthralled by his one man stand, but no one back in his home state is hearing the story: the machine controls all the newspapers and radio stations and even when the kids in Smith’s youth group print out a special edition of their own paper to try to tell his side, they’re run down by Boss Taylor’s goons.

Aug 21 10:35

Got weapons? Nude body scanners easily defeated

Researchers are delivering a paper at a security conference Thursday highlighting how easy it is to get weapons through the nude body scanners that have been removed from US airports but have been placed at other government installations across the globe.

The report, given at the Usenix Security Symposium in San Diego, highlights the insecurity of the Rapiscan Secure 1000 Single Pose "backscatter" scanner that once was used throughout the nation's airports but are now deployed at US prisons and courthouses, as well as airports in Africa. The paper, "Security Analysis of a Full-Body Scanner," from researchers at the University of California-San Diego, University of Michigan, and Johns Hopkins University, confirms what even laymen researchers had already discovered: hiding weapons on the side of one's body defeats the machine (PDF).

Webmaster's Commentary: 

This whole TSA thing is a huge money-making scam!

Aug 21 09:45

Are we handing our sovereignty over to unelected U.S. lobbyists?

The Trans-Pacific Partnership (TPP) trade agreement negotiations have resumed, and a troubling provision has come to light. The United States government is using an enhanced version of the provision known as "certification," which allows it to change other countries' domestic obligations at will. This has internet freedom activists worried that the US may enforce draconian copyright laws globally.

Aug 21 09:02

UPS says hackers may have stolen credit card data from 51 of its stores

Logistics firm UPS said on Wednesday that customer credit and debit card data may have been stolen from 51 of its UPS Stores across the United States. The company found malware capable of recording card information and sending it to a third party on cash register systems in one percent of its 4,470 UPS Store locations — 51 stores in 24 states.

Aug 21 08:15

Money And Power: The Real Reason For The NSA Spying On Everyone

We noted that Booz Allen Hamilton (yes, the last employer of one Ed Snowden) had hired former NSA director and also Director of National Intelligence Mike McConnell as its Vice Chairman. He was the leading voice out there screaming about the threat of "cyberwar" getting on TV and having lots of opinion pieces in big name publications -- all of which mentioned his former government jobs, but almost none of which mentioned that his current employer, Booz Allen Hamilton, stood to make billions selling "solutions" to the government. And, indeed, Booz Allen has been raking in the cash on "cybersecurity."

Aug 20 16:00

Don't let cable companies destroy everything great about the Internet

The Internet has already changed how we live and work, and we're only just getting started. Who'd have thought even five years ago that people would be streaming Ultra HD 4K video over their home Internet connections?

Technological advances are driving this evolution and will continue to do so only if we make sure the companies controlling consumers' access to the Internet don't adopt business practices that stifle its revolutionary nature. The next Netflix won't stand a chance if the largest US Internet service providers are allowed to merge or demand extra fees from content companies trying to reach their subscribers.

Aug 20 15:24

EFF, ACLU Demolish “It’s Just Metadata” Claim in NSA Spying Appeal

Americans Deserve Full Protection of the Fourth Amendment for their Telephone Records, Groups Argue

Activist Post

The Electronic Frontier Foundation (EFF) and the American Civil Liberties Union (ACLU) today filed an amicus brief in Klayman v. Obama, a high-profile lawsuit that challenges mass surveillance, arguing that Americans' telephone metadata deserves the highest protection of the Fourth Amendment...

Aug 20 14:50

Did Ferguson Police Use "Kill Switch" on Livestream Signal The Moment They Created Chaos?

"It keep saying 'no network error'. We had a foreign reporter on the roof with us and she wasn't able to get a signal on her cell phone. And people on the ground were saying 'I can't tweet out.'" -Livestreamer Argus Radio.

Eric Blair
Activist Post

It seems like the police state is using protests in Ferguson as a testing ground for all of their crowd-control weapons. Many are obvious like the curfew enforced by platoons of soldiers, armored tanks mounted by snipers, stun, tear and smoke grenades, no-fly zone, sound cannons, and designated free speech zones and media zones (apparently they're different now).

However, some weapons are less obvious like technology to kill livestream feeds during questionable police activity. And that's precisely what happened last night according to Ferguson's most prolific livestreamer Argus Radio...

Aug 20 14:45

If You Have Facebook Messenger, You Are Being Recorded Even When Not On The Phone

...users are made to accept an agreement that allows Facebook to “record audio with the microphone….at any time without your confirmation.”

The TOS also authorizes Facebook to take videos and pictures using the phone’s camera at any time without permission, as well as directly calling numbers, again without permission, that could incur charges.

But wait, there’s more! Facebook can also “read your phone’s call log” and “read data about contacts stored on your phone, including the frequency with which you’ve called, emailed or communicated in other ways with specific individuals.”

Although most apps on Android and Apple devices include similar terms to those pictured above, this is easily the most privacy-busting set of mandates we’ve seen so far.

Aug 20 14:17

Canada's Hitchhiking Robot Completed Its Trip Without Getting Murdered

On July 27, a brave robot named hitchBOT bid goodbye to its creators on the shoulder of a highway in Halifax, Nova Scotia. With limbs made from pool noodles, a beer-cooler body, and legs clad in Wellington rain boots, this adorable hodgepodge of a robot was ready to embark on the adventure of a lifetime. It raised its best hitchhiker’s thumb, and waited to be picked up by its first benefactor in its 6,000-kilometer road trip across Canada.

When hitchBot set off, we at Motherboard worried that the trooper might meet a tragic end (and we weren't the only ones). But fortunately, our fears were groundless. Over the weekend, hitchBOT arrived at its final destination in Victoria, BC, intact and thriving after meeting dozens of new friends across the country.

Aug 20 14:16

Twitter Steps Up, Suspends Accounts That Share Horrific Beheading Video

Twitter plans to suspend any accounts spreading graphic imagery from a video that appears to show photojournalist James Foley being beheaded by the Islamic State in Iraq and Syria. Company CEO Dick Costolo made the announcement early Wednesday morning on his own Twitter feed, after a video of the alleged beheading emerged Tuesday on YouTube.

Aug 20 11:19

Getting gouged by geeks

Webmaster's Commentary: 

I ... can ... identify...

Aug 20 11:08

Illegal Wiretapping Is Illegal, Even for Governments

Earlier this week, EFF told the U.S. District Court for the District of Columbia that Ethiopia must be held accountable for its illegal wiretapping of an American citizen. Foreign governments simply do not have a get-out-of-court-free card when they commit serious felonies in America against Americans. This case is the centerpiece of our U.S. legal efforts to combat state sponsored malware.

Aug 20 11:04

Researchers find security flaws in backscatter X-ray scanners

Editor's note: Latest research highlights the ongoing ruse of supposedly tightened airport security. Meanwhile, those who profited from these scanners laugh all the way to the bank. Then of course there are the negative health effects.

Activist Post

A team of researchers from the University of California, San Diego, the University of Michigan, and Johns Hopkins University have discovered several security vulnerabilities in full-body backscatter X-ray scanners deployed to U.S. airports between 2009 and 2013...

Aug 20 09:51

The Double Identity of an "Anti-Semitic" Commenter

Like many other news websites, Common Dreams has been plagued by inflammatory anti-Semitic comments following its stories. But on Common Dreams these posts have been so frequent and intense they have driven away donors from a nonprofit dependent on reader generosity.

A Common Dreams investigation has discovered that more than a thousand of these damaging comments over the past two years were written with a deceptive purpose by a Jewish Harvard graduate in his thirties who was irritated by the website's discussion of issues involving Israel.

His intricate campaign, which he has admitted to Common Dreams, included posting comments by a screen name, "JewishProgressive," whose purpose was to draw attention to and denounce the anti-Semitic comments that he had written under many other screen names.

Webmaster's Commentary: 

We get a lot of that here as well. And there is nothing new in this tactic. Back in the 1930s, the ADL was able to solicit huge donations to oppose the American Nazi Party, a very small organization that nonetheless garnered a lot of media attention, which assisted ADL in raising more funds. Then the leader of the American Nazi Party was arrested for embezzling from his sponsor ... which turned out to be the ADL!

Israel needs the illusion of anti-Semitism for political reasons and if none is to be found, they just create it themselves!

Aug 20 07:52

BUSTED! Gov. Running #Ferguson Twitter Psyop

Webmaster's Commentary: 

It is a fact that the US Government has spent millions of your tax dollars buying special software that allows government propagandists to create and use hundreds of fake identities to flood social media with US Government propaganda.

That they are provably using this system now to fan up the racial tensions tells us that indeed Ferguson is an operation to try to trigger mass race riots leading to martial law. DO NOT FALL FOR IT!

Shortly after exposing the government propaganda accounts, this poster was issued a warning form Twitter, implying that calling attention to these manufactured government accounts would suspend his own twitter account!

Aug 20 07:41

Researchers Hack Into Michigan’s Traffic Lights

Security flaws in a system of networked stoplights point to looming problems with an increasingly connected infrastructure.

Aug 20 07:38

Beyond Millennials: How to Reach Generation Z

As the average Facebook user gets older, more than 25% of 13- to 17-year-olds left the network in 2013.

Aug 20 07:18

Classified Information on Malaysia Airlines MH370 Case Stolen - Reports

Classified information from the computers of officials involved in the investigation into the disappearance of Malaysia Airlines MH370 has been stolen, The Star Online reported Wednesday.

The computers of the high-ranking officials are said to have been hacked and the stolen information was allegedly being sent to a computer in China before the Malaysian Science, Technology and Innovation Ministry blocked the transmissions, the website reported.

Webmaster's Commentary: 

This kind of skullduggery supports the theory that MH370 was shot down during a joint US/Thai military exercise, in an accident similar to that which killed TWA 800.

Aug 20 05:40

Database Shows What Military Equipment Your Local Police Department Has Been Stockpiling

There’s no doubt that domestic law enforcement agencies on every level have been ramping up their militarization efforts in recent years. In fact, it’s gotten so bad that it has prompted Senator Rand Paul to call for a demilitarization of domestic police departments. “The images and scenes we continue to see in Ferguson resemble war more than traditional police action,” notes Paul in a recent article.

Aug 20 00:39

Mass Produced Security Robots Introduced in U.S.

Waking Times

While debate continues to rage about the threat of autonomous “killer robots,” the mechanized replacement of humans continues across the workforce. In fact, the robotics industry notched record sales in the first half of 2014 in North America, and there appears to be no indications of a slowdown.

Aug 19 17:42

My prediction about Facebook came true

"The company is too important as a data-mining asset of the intelligence community to let it fall into disrepair and chaos."

Aug 19 14:48

California “Kill Switch” Bill Could Be Used to Disrupt Protests

This week’s events in Ferguson, Missouri highlight the risks of abuse all too clearly. Police have repeatedly attempted to disrupt protests and ordered both demonstrators and press to turn off recording devices. If the California bill were in place in Missouri, these officers might deploy the government kill switch alongside tear gas and rubber bullets, using the mandated technology to stop coordination between protesters, cut off access to outside information, and shut down video recordings that can deter police misconduct.

The purpose of the California kill switch bill may be to turn stolen phones into worthless “bricks,” but in its current form it could be used to brick protests that police disapprove of. Such a measure is unnecessary, and highly dangerous to the exercise of civil liberties.

Aug 19 14:43

Who Needs SOPA? US Court Wipes Sites From The Internet For 'Infringement' Without Even Alerting Sites In Question

TorrentFreak has the exceptionally troubling story of a federal district court in Oregon issuing an incredibly broad and questionable order, effectively wiping a bunch of websites out, without ever letting the websites in question know that they were being "tried" in court. The request came from ABS-CBN, a giant Filipino entertainment company arguing infringement, of course. But the argument against these sites is somewhat questionable already, made worse by the demand that the whole thing be done under seal (without alerting the site operators). Then Judge Anna Brown granted the temporary restraining order, basically deleting these sites from the internet, without even a sniff of an adversarial hearing.

Aug 19 09:41

Hospital network hacked, 4.5 million records stolen

Community Health Systems, which operates 206 hospitals across the United States, announced on Monday that hackers recently broke into its computers and stole data on 4.5 million patients.

Hackers have gained access to their names, Social Security numbers, physical addresses, birthdays and telephone numbers.

Aug 19 09:30

Mass Produced Security Robots Introduced in U.S.

Activist Post

While debate continues to rage about the threat of autonomous "killer robots," the mechanized replacement of humans continues across the workforce. In fact, the robotics industry notched record sales in the first half of 2014 in North America, and there appears to be no indications of a slowdown.

Security robots have become a special area of interest for developers...

Aug 19 08:37

Every American town should do what Rockport, Maine and Chattanooga, Tennessee have done and build a publically-owned fiber-optic network. If they can't afford to do that, the state or federal government should step in and help them finish the job, just li

As Americans, we love to think we're number one, but the truth is that when it comes to internet speed we're pretty mediocre.

In fact, one recent study put the U.S. at number 31 in the world in overall download speed, lagging behind much smaller and less developed countries like Estonia, Hungary, and Slovakia.
Internet speeds in the U.S. average out around 20.77 megabits per second, which is less than half of the average internet speed in Hong Kong, which has the world's fastest internet.

Aug 18 14:04

Why Twitter's new verified feature is disastrous for #Ferguson

In an effort to encourage its verified users to engage with one another, Twitter announced mid last week that its verified users would get a new set of tools that lets them screen out conversations from non-verified users. The system essentially builds an underclass into the most democratic social network ever made, by giving its verified users preferential treatment.

Aug 18 10:37

New Anti Police State App Helps You "See Something, Say Something" in Real-Time

Activist Post

Recent studies have shown that police are held almost completely unaccountable by the current systems of governmental oversight. Perhaps this is the reason why you are 9 times more likely to be killed by a law enforcement officer than a terrorist. Rather than wait for bloated bureaucracy or corrupt government to save the day, we as activists have to find our own solutions. Technology is one of these solutions...

Aug 18 10:12

Apple’s Cook Kicks Off ‘Made in USA’ Push With Mac Pro

Apple Inc. is taking orders today for the new Mac Pro personal computer, which is being built in Texas with components made domestically as part of Chief Executive Officer Tim Cook’s $100 million Made-in-the-USA push.

“We have begun manufacturing the Mac Pro in Austin,” Cook wrote in a posting yesterday on Twitter. “It’s the most powerful Mac ever.”

Webmaster's Commentary: 

Obviously, I hope this turns out to be a good product, and I am willing to accept one for testing and review! :)

Seriously, I would love to see the USA start to make quality products and I wish them success.

But...

Back when we were switching over to LED lights to get away from the toxic problems with the CFLs, I bought some of the Phillips LED lights, but mostly the CREE LED bulbs that are manufactured here in the US. So far, not a problem with the Philips lights. None. But we are seeing about a 30% failure rate for the CREE lamps over six months, including the glass globes simply falling off.

Aug 18 06:38

Anti-Piracy Outfit Wants to Hijack Browsers Until Fine Paid

Piracy monetization service Rightscorp has provided investors with details of its end game with cooperative ISPs. Initially service providers are asked to forward notices to subscribers with requests for $20.00 settlements, but the eventual plan is to hijack the browsers of alleged pirates until they've actually paid up.

Aug 18 06:36

Yahoo ads network helps hackers spread CryptoWall ransomware

This isn’t the first time that Yahoo’s ads have been tainted by the stench of malvertising.

In January, for instance, Fox IT reported that visitors to Yahoo’s website were bombarded with malicious adverts that attempted to infect computers with a wide array of financially-motivated malware.

Later in the same month, there were claims made that Bitcoin-mining malware had been spread via Yahoo ads.

Aug 18 06:27

The Windows Store is a Cesspool of Scams — Why Doesn’t Microsoft Care?

Microsoft’s Windows Store is a mess. It’s full of apps that exist only to scam people and take their money. Why doesn’t Microsoft care that their flagship app store is such a cesspool?

It’s now been more than two years since Windows 8 was released, and this has been a problem the entire time, and it is getting worse. If Microsoft was trying to offer a safe app store to Windows users, they’ve failed.

The Store is Full of Scams, And They’re Easy to Find.

Aug 18 06:22

BUSTED! Governments Hire Web Trolls to Sway Public Opinion

Aug 18 06:02

How Various Law Enforcement Agencies Could Hack Your Computer Via YouTube Videos

"..Companies such as Hacking Team and FinFisher sell devices called “network injection appliances.” These are racks of physical machines deployed inside internet service providers around the world, which allow for the simple exploitation of targets. In order to do this, they inject malicious content into people’s everyday internet browsing traffic.

One way that Hacking Team accomplishes this is by taking advantage of unencrypted YouTube video streams to compromise users. The Hacking Team device targets a user, waits for that user to watch a YouTube clip like the one above, and intercepts that traffic and replaces it with malicious code that gives the operator total control over the target’s computer without his or her knowledge. The machine also exploits Microsoft’s login.live.com web site in the same manner.."

Aug 17 19:29

After Blue Screen of Death reports, Microsoft says to uninstall recent patch

For instructions on how to uninstall this update, see Microsoft Knowledge Base Article 2982791.

Aug 17 07:10

Leaked: Comcast’s Insanely Detailed Manual for Persuading Customers Not to Cancel Their Service

The Verge has obtained a leaked manual that describes, in minute detail, the 13-step process that retention team members use to keep us from cutting Comcast's cords. It includes sentence-by-sentence instructions on the proper way to greet the customer, "set the agenda," "take control of the conversation," "overcome objections," and "close the save."

Aug 17 07:08

Revealed ... GCHQ's incredible hacking tool to sweep net for vulnerabilities: Nmap

For the past five years, British spying nerve-center GCHQ has been port scanning internet-connected computers in 27 countries – in a exhaustive hunt for systems to potentially exploit.

That bombshell comes amid fresh leaks detailing the dragnet surveillance programs operated by the Five Eyes nations: America, UK, Canada, Australia and New Zealand.

German publisher Heise reports that the HACIENDA program scans open ports on all public-facing servers to seek out vulnerable systems – a basic reconnaissance strategy adopted by countless hackers and other curious folk.

As well as simple port scans, GCHQ also stashes the banner text sent by some server software to connecting clients, and other data.

Aug 17 06:56

NSA BIOS Backdoor a.k.a. God Mode Malware

This article is the first part of a series on NSA BIOS backdoor internals. Before we begin, I’d like to point out why these malwares are classified as “god mode.” First, most of the malware uses an internal (NSA) codename in the realms of “gods,” such as DEITYBOUNCE, GODSURGE, etc. Second, these malwares have capabilities similar to “god mode” cheats in video games, which make the player using it close to being invincible. This is the case with this type of malware because it is very hard to detect and remove, even with the most sophisticated anti-malware tools, during its possible deployment timeframe.

This part of the series focuses on the DEITYBOUNCE malware described in the NSA ANT Server document, leaked by Edward Snowden.

Aug 16 11:08

Sen. Wyden: Your data’s yours no matter on whose server it lives

At the TechFestNW event in Portland on Friday, Oregon Sen. Ron Wyden called for legal reforms that embrace an understanding that the mere act of handing over digital data doesn't mean giving way a user's right to privacy.

Aug 16 08:31

Julie Bishop's mobile phone compromised while she negotiated access to MH17 crash site

The mobile phone of Foreign Affairs Minister Julie Bishop was compromised while she was overseas negotiating access to the Malaysia Airlines MH17 crash site, it has been revealed.

Ms Bishop travelled to Ukraine, the Netherlands and the United States during her two-week trip to secure access to the site in eastern Ukraine.

Aug 16 07:31

Facebook orders war hero who lost both legs and an arm in Afghanistan to remove picture of his 'offensive' stump

A war hero who lost both legs and an arm while serving in Afghanistan has called Facebook 'harsh and narrow-minded' after they removed a picture of one of his stumps because it was 'offensive'.

Former Corporal Andy Reid, 37, from St Helens, Merseyside became a triple-amputee when a landmine exploded while he was on patrol in Helmand Province in 2009.

The father-of-one posted the picture of his stump with the caption 'hard work on the legs today'.

But it was taken down by the social media's site communities team after a user complained about it.

The site removed the innocent image, despite the fact it does not ban violent clips, including beheadings.

Aug 15 18:32

The Gyroscopes in Your Phone Could Let Apps Eavesdrop on Conversations

In the age of surveillance paranoia, most smartphone users know better than to give a random app or website permission to use their device’s microphone. But researchers have found there’s another, little-considered sensor in modern phones that can also listen in on their conversations. And it doesn’t even need to ask.

In a presentation at the Usenix security conference next week, researchers from Stanford University and Israel’s defense research group Rafael plan to present a technique for using a smartphone to surreptitiously eavesdrop on conversations in a room—not with a gadget’s microphone, but with its gyroscopes, the sensors designed measure the phone’s orientation.

...

And unlike the actual mics built into phones, there’s no way for users of the Android phones they tested to deny an app or website access to those sensors’ data.

Aug 15 15:28

Seventh Circuit Saves Batman From Crazy Trademark Attack

The events depicted in the superhero movie The Dark Knight Rises are not real. For example, when Cat Woman pursues software called “Clean Slate” to erase all traces of her criminal past, you are watching a fictional character seek fictional software. If that point strikes you as obvious, then you may have trouble comprehending the trademark claim in Fortres Grand v. Warner Brothers. In that case, software company Fortres Grand claimed that the movie’s use of the words ‘clean slate’ infringed its trademark on a real piece of software with the that name.

Aug 15 14:18

Senate must follow House’s lead on Internet access tax

Last month, the House of Representatives gave consumers a little love when lawmakers voted to make a long-standing ban on Internet access taxes permanent.

The moratorium, otherwise known as the Internet Tax Freedom Act, prohibits states or their political subdivisions from imposing taxes on Internet access or from applying multiple or discriminatory taxes on electronic commerce. But unless Majority Leader Harry Reid, D-Nev., and the U.S. Senate take up a measure to extend the ITFA protections, this important act will expire Nov. 1.

State and local governments who view the expiration of ITFA as a way to raise revenue through new taxes to replenish their overspent coffers are clamoring over this legislation.

Aug 15 13:47

Snowden discusses US surveillance and cyber-warfare programs in interview with Wired

Wired magazine published an extended interview this week with former US intelligence agent and famed whistleblower Edward Snowden. Conducted in a hotel room somewhere in Russia, the interview included fresh revelations related to mass surveillance, cyber-warfare and information-grabbing operations mounted by the US National Security Agency (NSA).

The meat of the interview centered on a number of operations run by the surveillance and intelligence agencies, painting a picture of an American government engaged in ever-expanding cyber-machinations worldwide.

Aug 15 12:50

Stafne Law Crushes MERS, Fidelity and Deutsche Bank in Knecht v. Fidelity Summary Judgment Case: MERS Assignment a Legal Nullity.

Another homeowner victory. As usual, KingCast and Mortgage Movies cameras were nearby.

Friday, August 15, 2014

KingCast and Mortgage Movies Celebrate as Stafne Law Crushes MERS, Fidelity and Deutsche Bank in Knecht v. Fidelity Summary Judgment; MERS Assignment a Legal Nullity.

Above: Attorneys Scott Stafne and Josh Trumbull at the command center
as we discussed the ramifications of yesterday's Federal Court victory.

Aug 15 12:43

Questioning Edward Snowden’s Cure-All

Ed Snowden recently gave fellow NSA whistleblower James Bamford an “extended cut” interview in Moscow.1 While Snowden offered up a few morsels of headline-worthy information, like how he purposefully left forensic artifacts for investigators or details on the NSA’s automated cyber-attack system called MonsterMind, Bamford’s piece ends with Snowden describing what he views as the answer to the NSA’s global surveillance program:

We have the means and we have the technology to end mass surveillance without any legislative action at all, without any policy changes… By basically adopting changes like making encryption a universal standard—where all communications are encrypted by default—we can end mass surveillance not just in the United States but around the world.

So, that’s it, huh? All we need is strong crypto? Download the latest app and guaranteed civil liberties are but a click away…

Pleasant fiction, caws your humble narrator.

Aug 15 10:19

NSA cyberwarfare could pick wrong targets, Snowden says

The National Security Agency is planning to combat cyberattacks from overseas with a sophisticated yet highly risky program code-named ‘MonsterMind,’ warns whistleblower Edward Snowden.

Aug 15 09:56

Judge Demands Answers After IRS Contradicts Sworn Testimony

U.S. District Court Judge Emmet Sullivan Thursday ordered the Internal Revenue Service to come up with new answers after IRS employees contradicted sworn testimony about damage to Lois Lerner’s hard drive.

Aug 15 08:38

Canadian Robot Producer First To Denounce Killer Robots

Nicholas West
Activist Post

For the first time, a robot manufacturer is sounding the alarm and taking a clear stance against the pursuit of these systems. Clearpath Robotics Co-Founder and CTO, Ryan Gariepy, is offering an open letter that is a must-read, as it clearly focuses on ethics - something that consistently has been left out of the equation thus far...

Aug 15 08:11

Microsoft considered rebranding Internet Explorer to escape negative perception

Microsoft's Internet Explorer has a bit of a brand identity issue on its hands. Because of decisions made many, many years ago, Internet Explorer 6 has left a sour taste in the mouths of developers and consumers.

Aug 15 07:44

20 vehicles most vulnerable to hackers, putting drivers at risk of theft, hijacking, tracking and remote assassination

In 2013, when professional hackers Charlie Miller and Chris Valasek demonstrated that it was possible to hijack the steering and brakes of a Ford Escape and a Toyota Prius using only laptops connected to the autos, they raised two questions.

First, could hackers perform the same thing wirelessly or, perhaps, even over the Internet? And secondly, what other specific vehicles are vulnerable?

"If you own a Cadillac Escalade, a Jeep Cherokee or an Infiniti Q50, you may not like the answer," Wired reports

Learn more: http://www.naturalnews.com/046468_vehicle_security_hackers_theft.html#...

Aug 15 07:29

Watchdog: The FBI Spied on the Wrong People Because of Typos

The FBI unintentionally spied on the communications data of some Americans who were not targets of investigations because of typographical errors, according to a government watchdog.

The Justice Department's inspector general concluded in a report Thursday that the FBI has improved its overall handling of national security letters, which permit the agency to collect telephone and Internet data of suspects believed to be tied to a national security investigation.

But the inspector general identified a number of areas that "require additional effort and attention," such as a tendency to collect data on the wrong person because of routine mistakes.

Aug 15 06:13

Selling your Tesco Hudl? Beware: Processor flaw means private data remains on the device - even after a factory reset

A bug in the processor that powers the popular Tesco Hudl tablet could be leaving private data at risk.

Investigations carried out by security researchers and the BBC discovered that they could retrieve ‘deleted’ data from second-hand models of the device.

Experts typically advise carrying out a factory reset to remove data from any gadget, but the investigation has revealed this technique may not always work on the supermarket’s tablet.

Aug 14 17:42

Would you like fraud with that? Ingenious bank scam targets wealthy diners as they pay for restaurant meals

The campaign group is urging restaurant owners to be vigilant as fraudsters attempt to dupe them into allowing patrons to pass over bank security details.

The scam involves a fraudster posing as bank staff in a telephone call to the restaurant. They tell the restaurant there is a problem with the card payments system at the premises and asks them to redirect card payments to a phone number provided by the fraudster.

FFA UK says that when the restaurant then calls the phone number, the fraudster asks to speak with the paying customer to go through security questions.

Once sufficient security details have been skimmed, the fraudster will instruct the restaurant to put the transaction through.

The scammer then calls the customer’s bank and attempts to transfer money to their own account using the fraudulently obtained security details.

Aug 14 12:41

Snowden Reveals NSA Program Described as 'Last Straw' Before Leak

In an in-depth interview published by Wired Magazine on Wednesday, Edward Snowden discloses what government activities proved to be the "last straw," prompting the whistleblower to expose the depths of the National Security Agency's secret surveillance operation.

Speaking with investigative journalist James Bamford—who blew the whistle on a government eavesdropping program when stationed in Hawaii during the Vietnam War and later wrote a number of best-selling books about government secrecy and the NSA—Snowden reveals how a botched U.S. government hacking operation caused Syria's 2012 internet blackout.

Aug 14 11:57

Keep Big Telecom's hands off our net

Decision-makers at the CRTC are undertaking a crucial consultation1 that could profoundly impact digital services in Canada – including how we use the Internet.

For too long now, Canadians have watched our global counterparts surpass us when it comes to accessing exciting, affordable, and innovative digital services. But this CRTC hearing could be our chance to change all of that.

Aug 14 10:03

The real Skynet: New NSA autonomous weapons system intercepts threats and retaliates automatically

They could just as easily have called it Skynet, the computer network of Terminator franchise fame that eventually led to the destruction of the modern world.

Aug 14 09:11

"Anonymous" Releases Name of Alleged Michael Brown Shooter; Governor Relieves Local Police of Protest Duty

The hacker collective Anonymous on Thursday released the name of the police officer it believes shot unarmed teenager Michael Brown, a day after releasing raw audio files from the St. Louis police dispatch the day of the killing, but neither has been confirmed by authorities.

Aug 14 08:32

Law Enforcement Ask Public to Not Use Social Media During Emergencies

Police in Washington State are asking the public to stop tweeting during shootings and manhunts to avoid accidentally telling the bad guys what officers are doing.

Webmaster's Commentary: 

To judge by Ferguson, we are ALL "bad guys" now, so you will forgive us if we fail to comply.

Aug 14 08:23

How computer hackers changed the Ferguson protests

Exposed to the light the cops run like cockroaches when you turn on the light!

FERGUSON • The Internet crashed at City Hall here on Tuesday morning. Ferguson’s website went dark. The phones died.

City officials didn’t say what happened — only that a flood of traffic aimed at the City Hall website “just kept coming.”And the hackers vowed retribution if police harmed protesters.

“We are watching you very closely,” Anonymous’ distinctive electronic voice rasped in a video posted Monday on Twitter. “If you abuse, harass or harm the protesters in Ferguson we will take every Web-based asset of your departments and federal agencies offline.”

The hackers would also, the video continued, begin publicly releasing police officers’ personal information.

Then they did.

Early Tuesday morning, someone posted the home address and phone number of Jon Belmar, the relatively new chief of St. Louis County police. And that was just the beginning.

Aug 14 06:28

The Facebook Messenger backlash: Reviewers flock to complain as experts raise concerns about its privacy controls

Facebook has begun forcing people to use Messenger after announcing its split for the main app in April.

Members have been left annoyed and outraged by the changes, and have flocked to the Android app store Google Play to complain.

This is in addition to concerns being raised about the app’s permissions, that give Facebook access to send texts and make calls on the user’s device.

According to Google Play, the app has access to find accounts on the device, read contacts, access the user’s, as well as edit, read and receive text messages.

Other permissions give Facebook the ability to directly call phone numbers, modify or delete files on USB storage, take pictures and videos, record audio, download files without notification, control vibration and change network connectivity.

Aug 14 06:23

NSA bot MonsterMind can wage cyberwar on its own – Snowden

The US National Security Agency owns a “MonsterMind” program designed to prevent foreign cyberattacks and, also, automatically strike back, former NSA contractor Edward Snowden told Wired magazine.

In his latest revelation, Snowden said that the defense software in the works would robotically hunt for the launches of foreign cyberattacks against the US and neutralize them.

Aug 13 18:20

NSA bot MonsterMind can wage cyberwar on its own – Snowden

The US National Security Agency owns a “MonsterMind” program designed to prevent foreign cyberattacks and, also, automatically strike back, former NSA contractor Edward Snowden told Wired magazine.

In his latest revelation, Snowden said that the defense software in the works would robotically hunt for the launches of foreign cyberattacks against the US and neutralize them.

Aug 13 16:48

The Real Skynet: New NSA Autonomous Weapons System Intercepts Threats and Retaliates Automatically

The name of it is telling.

“MonsterMind.”

They could just as easily have called it Skynet, the computer network of Terminator franchise fame that eventually led to the destruction of the modern world.

Though not as advanced just yet, MonsterMind is a new autonomous cyber weapons system developed by the National Security Agency and according to Edward Snowden is capable of not only intercepting every single digital communication within the United States, but it can automatically detect and launch retaliatory strikes without any human involvement if a threat has been identified.

Aug 13 16:18

New NSA Autonomous Weapons System Intercepts Threats and Retaliates Automatically

The name of it is telling.

“MonsterMind.”

It’s a new autonomous cyber weapons system developed by the National Security Agency and according to Edward Snowden is capable of not only intercepting every single digital communication within the United States, but it can automatically detect and launch retaliatory strikes without any human involvement if a threat has been identified.

Aug 13 16:14

Bad Idea: California Legislature Passes Bill To Mandate Mobile Phone Kill Switches

The reasoning behind this bill seems sound: a kill switch makes stealing phones less valuable, thereby decreasing phone theft. But, the mandate is dangerous for a number of reasons. If individuals want to use a kill switch there are plenty of third party apps they can get to do that themselves. But much scarier is how such kill switches will undoubtedly be abused. Having a single technology that can brick a ton of phones will be a very tempting target for hackers. And, it will probably be even more tempting for law enforcement for a variety of reasons. Someone videotaped the police doing something bad? Instead of having to go confiscate the phone, why not just brick it from afar? This seems like yet another bill pushed with good intentions that risks some very dangerous consequences.

Aug 13 14:51

Today in the Surveillance State: The Ghost of Seattle's Wireless Mesh Network Briefly Returns

Yesterday, the Seattle Times reported on civil-liberties advocates who noticed that part of the wireless mesh network was still up and running—and registering on their cell phones during a protest against a new youth jail. The SPD said it was an accident, claiming that "the 'rogue node' had been inadvertently activated when a contractor restored power to the pole."

Aug 13 14:48

Seattle Police Department "Forgets" To Turn Off Mesh Network

Much like other Wi-Fi hot spots, the nodes can collect and retain the identification of individual cellphone users and potentially track them as they move around the city.

The police quickly apologized and said the “rogue node” had been inadvertently activated when a contractor restored power to the pole. Department officials assured the public that it had quickly been turned off again.

Aug 13 13:32

In Midst of War, Israel Clamps Down on Internal Dissent

As a tenuous ceasefire takes hold, the besieged Gaza strip must contend with the path of death and destruction left by Israel's month-long military assault, including 1,939 Palestinian lives lost, 9,886 wounded, over 200,000 displaced, and more than 10,000 Palestinian housing units severely damaged or completely ruined.

Aug 13 13:03

Snowden: Clapper comments pushed me to become leaker

Edward Snowden says dishonest comments to Congress by the US intelligence chief were the final straw that prompted him to flee the country and reveal a trove of national security documents.

In an interview with Wired magazine over several days in Moscow, Snowden said he had been long been troubled by the activities of the National Security Agency, which employed him as a contractor.

But it was only when Director of National Intelligence James Clapper told lawmakers that the agency does "not wittingly" collect data on millions of American citizens that he was angry enough to act.

SHARE THIS ARTICLE WITH YOUR SOCIAL MEDIA