The next time you go on a trip to the mall, give those mannequins a nice big smile! This 245 billion (yes, with a “B”) dollar industry consists of five organizations throughout Europe and the US that make the ‘Eye See polystyrene frame mannequins.’ These particular mannequins’ eyes are equipped with face recognition cameras.
Lately we’ve been looking at various techniques and approaches to Psy Ops and how they are not merely for military warfare, but an entire approach to human behavior modification and mass population management.
The USA Freedom Act limits bulk collection by refining the allowable search terms, leaves the data in the hands of telecom companies, rather than shipping it off to government servers, and would create liability protections for the phone companies that provide the information, among other things.
One thing it doesn't do is mandate how long the phone companies have to retain the information. Sen. Dan Coats (R-Ind.), who opposed the bill, said that lack of a retention mandate could render the program useless if the companies decided not to retain the data.
Nearly two years after NSA whistleblower Edward Snowden first revealed the U.S. government was secretly operating mass surveillance programs against the American public, including bulk collection of telephone data, privacy advocates and civil libertarians are celebrating—at least temporarily—after the U.S. Senate on Sunday failed to extend authorities for key portions of those programs before a midnight deadline.
But as vast and powerful as the global financial computer system is, it lacks sentience, self-awareness, certainly a conscience, or any sympathy for the humans whose labor provides the raw "food" to feed that system.
In searching for a way to demonstrate the behavior of the global computer finance system, I was struck by the image of slime-mold growth shown on a recent documentary.
The U.S. Supreme Court on Monday threw out the conviction of a Pennsylvania man found guilty of making threatening statements on Facebook to his estranged wife, law enforcement officers and others.
The court ruled 8-1 in favor of Anthony Elonis, who served prison time for posting a series of statements on the social media site in 2010 after his wife left him.
The case touched upon the rise of social media and how people use it to express strongly held feelings. But the legal question decided by the court was that Elonis needed to be aware of the threatening nature of his communication in order to be convicted. Lower courts had said he could be culpable regardless of whether he believed his messages could be viewed as threatening.
In what has become a common refrain in all security circles, the elimination of privacy is a necessary tool needed to provide a solution.
China is invoking the threat of financial fraud to usher in a new system of facial recognition ATMs that not only will link to an "identity database" but also will scan cash for counterfeit currency...
The National Security Agency lost its authority at midnight to collect Americans’ phone records in bulk, after Republican Sen. Rand Paul stood in the way of extending the fiercely contested program in an extraordinary Sunday session in the Senate.
But that program and several other post-Sept. 11, 2001 counter-terror measures look likely to be revived within days. With no other options, Senate Majority Leader Mitch McConnell reluctantly embraced a House of Representatives-passed bill that would extend the provisions, while also remaking the bulk phone collections program.
The headline is misleading. NSA still has the power to spy on your phone calls and will as long as those data centers remain standing. NSA was in violation of the law when it started building this system back in the 1980s. They will not hesitate to violate the law again. The new USA FREEDOM Act that may be passed now keeps the spying going, but shuffles around just who gets the data to make it look like there has been an improvement, but the real goal is to lull Americans into the false belief that somehow privacy protections have been restored, so that we will not create our own systems of encryption to protect our business secrets from government crooks. It is up to us all to take responsibility for our right to privacy, guaranteed to us under the Fourth Amendment to the Constitution.
The Federal Reserve is a private cartel created by the banksters for the express purpose of manipulating the money supply and controlling the economy? CONSPIRACY THEORY! No Google for you! -- Always and throughout history, Governments have used false flag terrorism in order to justify their wars of aggression? SLANDER! Do not pass go, do not collect $200, go directly to the bottom of the search results! -- Google and every other major Silicon Valley firm is in bed with the DOD and/or the CIA and/or the NSA? BLASPHEMY! You have been excommunicated from the church of Google. -- You get the idea...
As of Friday afternoon, over 14,000 websites have blocked Congressional access to their pages, instead directing them to a protest page. The massive move is an effort to show Congress that its push for continued surveillance via the Patriot Act and USA Freedom Act is unwelcome.
Facilitated by Fight for the Future (a non-profit internet advocacy group), the process works by identifying IP addresses that originate from Congress. When a Congressional IP is detected, whatever website the user attempted to access redirects to blackoutcongress.org. There, the site declares, “Congress: this is a blackout.” It explains to members of Congress (and presumably, their staff) why they were redirected:
“We are blocking your access until you end mass surveillance laws. You have conducted mass surveillance of everyone illegally and are now on record for trying to enact those programs into law.”
The secretive British spy agency GCHQ has developed covert tools to seed the internet with false information, including the ability to manipulate the results of online polls, artificially inflate pageview counts on web sites, “amplif[y]” sanctioned messages on YouTube, and censor video content judged to be “extremist.” The capabilities, detailed in documents provided by NSA whistleblower Edward Snowden, even include an old standby for pre-adolescent prank callers everywhere: A way to connect two unsuspecting phone users together in a call.
While one of the world’s richest men, Bill Gates, rates the chance of a “nuclear war” happening in his lifetime as “fairly low”, Gates maintains that there is ‘well over a 50 percent’ chance that a major pandemic, “far worse than Ebola”, will sweep the sweep the globe in coming years, Gates told Vox’s Editor-in-chief, Ezra Klein.
The United States tried but failed to sabotage North Korea's nuclear weapons program with a computer virus in 2010, Reuters reported Friday.
The cyber attack came at the same time the Stuxnet virus was disrupting Iran's uranium-enrichment efforts, according to sources familiar with the stealth effort. Stuxnet was reportedly created by the United States and Israel.
The North Korea attack involved a Stuxnet variant that was designed to activate "when it encountered Korean-language settings on an infected machine," Reuters writes. But U.S. agents were never able to install the malware on the computers controlling Pyongyang's nuclear program.
There is cause to suspect that Stuxnet exacerbated the Fukushima disaster by crippling emergency systems using the targeted Siemens' controllers. And despite the danger, the US went ahead and tried again with North Korea's nuclear weapons!
With the sunset of key spy powers on the near horizon and lawmakers scrambling to save them, privacy and internet freedom groups are dialing up the pressure on Congress to end mass surveillance as we know it.
everal of the most extremist provisions of the 2001 Patriot Act are going to expire on June 1 unless Congress reauthorizes them in some form. Obama officials such as Director of National Intelligence James Clapper and new Attorney General Loretta Lynch have been engaged in rank fear-mongering to coerce renewal, warning that we’ll all be “less safe” if these provisions are allowed to “sunset” as originally intended, while invoking classic Cheneyite rhetoric by saying Patriot Act opponents will bear the blame for the next attack. In an interview yesterday with the Intercept, ACLU Deputy Legal Director Jameel Jaffer explained why those scare tactics are outright frivolous.
The convicted mastermind behind the world's largest online narcotics emporium has been sentenced by a federal judge to life in prison without parole. The judge also ordered Ross Ulbricht, 31, to forfeit $184 million dollars. The website made over $187 million before it was shut down in 2013.
It won't be long now: all the parts and systems to create lethal machines with a mind of their own, deciding who and when to kill without human oversight are conceptually already developed. It is just a matter of time, and by all accounts that time is short.
Technologies have reached a point at which the deployment of such systems is — practically if not legally — feasible within years, not decades. The stakes are high: LAWS have been described as the third revolution in warfare, after gunpowder and nuclear arms.
Japan’s total fertility rate currently sits well below replacement rate at 1.41 births per woman. The image above is more than just a robot door greeter at a department store in a country with a dwindling population of young people to take care of its elderly.
It’s a death knell for the income of the nation’s already dwindling human population, sung by robots.
A February 2015 draft of the secret Trade In Services Agreement (TISA) was leaked again last week, revealing a more extensive and more recent text than that of portions from an April 2014 leak that we covered last year. Together with the Trans-Pacific Partnership (TPP) and the Trans-Atlantic Trade and Investment Partnership (TTIP), TISA completes a trifecta of trade agreements that the administration could sign under Fast Track without full congressional oversight.
The U.K. government has not given up on the idea that its secret services must be given access to communications between individuals who are suspects in an ongoing investigation, even if said communications are protected by encryption.
It all seemed rather innocent in the beginning. It certainly seemed convenient, and still is – maybe more so than ever, to be truthful. But if you haven’t noticed, slowly and gradually, during the past 17 years since its inception, Google has evolved from being a company which once merely provided Internet users with a free search engine and email to becoming an all-encompassing entity that monitors nearly everything you do.
The Federal Communications Commission is proposing to expand its Lifeline program to help subsidize Internet service for low-income Americans.
The plan floated Thursday by FCC Chairman Tom Wheeler faces resistance from Republicans who point to lingering waste and inefficiencies in the $1.7 billion program, which helps low-income individuals pay for phone service.
Of course, as we've been discussing for quite some time now, such backdoors into encryption are monumentally stupid and counterproductive. They weaken the security and privacy of everyone. And, of course, we've already discussed how once one country demands its own backdoors, others will want them as well. And, of course, such backdoors always come back to bite everyone by opening up avenues for malicious and nefarious attacks -- no matter how often law enforcement insists that it can keep things safe. You are, by definition, opening up a vulnerability. And it will lead to less safety and security.
A United Nations report released Thursday argues that strong encryption is fundamental to exercising basic human rights.
“Encryption and anonymity enable individuals to exercise their rights to freedom of opinion and expression in the digital age and, as such, deserve strong protection,” says the report, from the UN’s Office of the High Commissioner for Human Rights.
The official beta launch announcement is here! The world's first privacy-protecting search engine that bans corporate propaganda and government disinformation is now ready for webmasters to submit their sites for indexing. The name of the new search engine? Good Gopher! (www.GoodGopher.com)
In an hour-long interview aired Wednesday, Julian Assange spoke with Amy Goodman of Democracy Now! at the Ecuador embassy in London and shared his perspective on NSA spying, the pending Trans Pacific Partnership trade agreement, and other controversies.
If you hear this tiny flying bug drone buzzing around your head, an Army Special Forces team might not be far behind. The 18-gram PD-100 Black Hornet from Norway’s Prox Dynamics can bear regular and thermal cameras about a kilometer and stay aloft more than 25 minutes.
Monday, May 18, 2015
KingCast and Mortgage Movies See Kent County Delaware Register of Deeds Betty Lou McKenna, Holly Malone and Attorney John Pardee Attempt to Truncate Discovery with Bullshit Dispositive Motions.
Media. Just like KIRO 7 only smaller.
Access, because it is Constitutional.
This is simple stuff, folks.
Today's email to Counsel for Defendants:
Good Day Counselors and media,
I. Offer of Proof Video in Production.
I left the Bat Cave this afternoon to document that which common sense tells us. If you don't get it now you never will. Fortunately Jon Scherer, Recording Manager of King County gets it.Stay tuned for the video link and the Court filing.
Voluntary Dismissal of Negligent and Intentional Emotional Distress Claim.
That is self-explanatory. Document and Proposed order forthcoming.
III. Modification to Motion for Partial Summary Judgment.
All hands on deck for global, economic, corporate dictatorship.
There are dots to connect here. They’re real, and they’re spectacular.
Let me begin with a brief exchange from a 1978 interview, conducted by reporter Jeremiah Novak. He was speaking with two American members of the Trilateral Commission (TC), a group founded in 1973 by David Rockefeller and his intellectual flunkey, Zbigniew Brzezinski...
The White House ramped up its campaign to persuade the Senate to renew National Security Agency surveillance powers before they expire at midnight Sunday, likening a potential lapse to playing “Russian roulette” with national security.
For years many within the alternative media have written about the danger to freedom posed by implantable RFID chips. From chips implanted into pets to chips used in humans to monitor their health, society has slowly been conditioned to accept implanted microchips as a useful science based tool.
The dispute centers on Google copying names, declarations, and header lines of the Java APIs in Android. Oracle filed suit, and in 2012, a San Francisco federal judge sided with Google. The judge ruled that the code in question could not be copyrighted. Oracle prevailed on appeal, however. A federal appeals court ruled that the "declaring code and the structure, sequence, and organization of the API packages are entitled to copyright protection."
Google maintained that the code at issue is not entitled to copyright protection because it constitutes a "method of operation" or "system" that allows programs to communicate with one another.
A recently discovered bug in Apple’s mobile OS means that anyone can effectively crash another individual’s iPhone, or send it into Safe Mode if jailbroken, by simply sending a SMS or iMessage containing a specific set of non-Latin characters. The bug, as discovered by a number of keen-eyed Reddit users, causes an iOS device to immediately crash and reboot upon receiving of the message, as long as the device isn’t opened in the same conversation thread in which the message was received.
Senate Majority Leader Mitch McConnell (R-Ky.) is running out of time to save sections of the Patriot Act that the White House deems crucial to national security.
Top lawmakers and their aides are scrambling to find a last-minute deal to save the law, which is speeding toward expiration — at midnight Sunday — after a series of Senate votes failed to resolve an impasse over the National Security Agency (NSA).
Good old wood. It's everywhere! And soon it may be in your computing devices as the newest, most cutting-edge semiconductor material.
Or at least the first semiconductor material that's fully adapted to the fact that the average consumer chews through portable electronics like they're toilet paper. Consumers, after all, demand not just the fastest and slimmest devices, they want—implicitly, at least—devices that can go in the trash.
Wearable products need to transmit data to function. Many don’t work without a connection to a smartphone. And because it would be silly to walk around with a cord between the devices, that connection is made via Bluetooth Low Energy. Context Information Security has found that these connections can be used to identify smartwatches, fitness trackers, and other products that rely on BLE. And they’ve released an Android app that can track these signals to prove it.
Underground subways offer no place to hide from hackers.
Determined hackers can track the movements of millions of subway riders around the world even as they go underground by breaking into smartphone motion detectors, new research from Chinese academics reveals. The attack can track subway riders with up to 92 percent accuracy.
The IRS announced today that criminals used taxpayer-specific data acquired from non-IRS sources to gain unauthorized access to information on approximately 100,000 tax accounts through IRS’ “Get Transcript” application. This data included Social Security information, date of birth and street address.
It is now being reported that the hackers used the stolen information to file false amended tax returns generating about $50 million in bogus "refunds."
A recent release of Edward Snowden-provided classified PowerPoint presentation from the National Security Agency (NSA) provides a rather detailed description of how the FIVE EYES signals intelligence alliance of the United States, Britain, Canada, Australia, and New Zealand has conspired with the promoters of social media-based revolutions, such as the "Arab Spring", to bring about the collapse of democratically-elected or otherwise stable governments. However, the PowerPoint slides were partially redacted in key areas by the dubious censors of First Look Media, financed by e-Bay founder and multi-billionaire Pierre Omidyar.
For the National Security Agency, the fingerprint reader on your smartphone just isn't secure enough. Lockheed Martin has confirmed to Nextgov that the intelligence outfit is testing Mandrake, an identification system that verifies who you are based on the way you swipe your finger across the screen.
The technology measures not only the shape of your movements, but the acceleration and speed. It can tell whether you draw in broad, fast strokes or tend to be cautious. Lockheed doesn't know whether or not the NSA is deploying Mandrake in the field, but it wouldn't be shocking. Given that it's possible to fake fingerprints, gesture-based authentication may the best way of proving that the right person really is present.
The US Air Force announced today that it certified SpaceX to launch national security payloads, from spy satellites to mystery drones, ending the monopoly held by the Boeing-Lockheed Martin joint venture, United Launch Alliance (ULA).
Instead, in what is perhaps the most epic "option" in the history of automotive history, Volvo decided to make the special feature known as “pedestrian detection functionality” cost extra money. It gets better: the cars do have auto-braking features as standard, but only for avoiding other cars — if they are to avoid crashing into pedestrians, too, then owners must pay extra.
Tech industry giants say they are alarmed the federal government would demand back-door access to the encryption built into their products. Are they crying crocodile tears? Maybe, but the point is still a good one.
Imagine if, instead of memory chips, we were talking about your home's back door. It most likely contains a lock. Your family members have keys. They can come and go freely while others cannot. This is how locks should work.
The FBI says it can't do its job unless it has unimpeded access to your house, so it asks you to give it a spare key. The FBI further promises it will only use the key to enter your home in emergencies. Would you give it to them?
American spy agencies have intentionally weakened digital security for many decades. This breaks the functionality of our computers and of the Internet. It reduces functionality and reduces security by – for example – creating backdoors that malicious hackers can get through.
The spy agencies have treated patriotic Americans who want to use encryption to protect their privacy as extremists … or even terrorists.
As Gizmodo’s Matt Novak points out, this attack started at the very birth of the internet:
The new browser sports a clean, minimalist look with as much screen estate given to websites as possible. In addition, Yandex.Browser turns off usage statistics by default to ensure the most private browsing experience possible.
Yandex has revamped its popular Internet browser with a new beta release that the company says is cleaner and more privacy-focused than earlier builds.
Unlike the alpha version released last year, Yandex.Browser beta doesn’t send usage statistics to the company by default. Yandex said it had taken this decision in response to feedback from users in Canada, Germany and the U.S. There’s also a small button in the top right corner that turns on Stealth Mode, a tool that blocks user tracking code on websites, including analytics cookies, sharing plugins, etc. The feature is quite flexible, allowing users to whitelist certain websites and choose what exactly they want blocked on pages.
Just when you think Google (read: our real-life Skynet) can't get any creepier, they go and aspire.
Now the megacorporation has patented a fun new toy that comes complete with hidden microphones and cameras, spies on your child's activities and conversations, responds to his or her social cues, and can control smart devices in your home.
Along with formidable future weapons, super soldiers, armed drones of every size and autonomous robots executing lethal missions, the battlefield of tomorrow will also be driven by target identity and biometric data – you know, to stop terrorists.
The United States’ most elite soldiers have been collecting DNA samples from suspected terrorists for years. But because analysis normally takes three weeks, it’s been a pretty useless chore. Now, however, U.S. Special Operations Command is testing a machine that can do it in 90 minutes. Get ready for advanced biometric warfare.
The Wall Street Journal reported that the NSA spies on Americans’ credit card transactions. Senators Wyden and Udall – both on the Senate Intelligence Committee, with access to all of the top-secret information about the government’s spying programs – write:
Section 215 of the Patriot Act can be used to collect any type of records whatsoever … including information on credit card purchases, medical records, library records, firearm sales records, financial information and a range of other sensitive subjects.
Many other government agencies track your credit card purchases as well. In fact, all U.S. intelligence agencies – including the CIA and NSA – are going to spy on Americans’ finances.
Legislation to extend for two months a program in which spy agencies sweep up vast amounts of data about Americans’ telephone calls was blocked in the U.S. Senate early on Saturday, adding to uncertainty about the future of the program.
The Senate voted 45-54 on the procedural measure to stop debate on the extension of provisions of the “USA Patriot Act,” falling well short of the 60 votes in favor needed to advance the measure. The legal authorities that allow the collection of so-called telephone “metadata” expire on June 1.
Which does not mean the NSA will stop doing it. They'll just hope you think they stopped!
Would you let Ted run your home? Google is thinking you just might and has patented some Internet-connected toys that can do just that, per BBC News: Google’s R&D team has looked into making internet-connected toys that control smart home appliances.
In short, Clinton personally knew that attack by Al Qaeda that ended in the gruesome deaths of four Americans to basically cover up an international Fast and Furious was not because of some stupid Youtube video — but she stood up and lied to the entire nation with a ridiculous, barely believable cover story anyway and with a straight face.
But HEY! Let’s make her president! She’s a big fat liar, seems she’s pretty qualified for the job.
Are we getting numb to headlines like this one yet? The shock of this headline left us speechless (sarcasm)! Who doesn’t know this by now? Thanks DOJ for that astonishing conclusion that everyone else in America had already been made aware of at least a dozen times over since the Snowden revelations.
Are they going to actually do something about it then?? If not, they are wasting our time.
Either they cannot keep up the pretense and lies that they aren’t spying on us or it’s much worse than we thought. (Pick #2! Pick #2!)
A cyberattack on the Federal Reserve Bank of St. Louis last month compromised the bank’s domain name and routed web traffic to [rogue] websites created by the hackers that simulated the original, the bank confirmed this week.
Bank officials said in a statement on Monday that while the hackers didn’t compromise its website, they did manipulate the bank’s routing on April 24.
A US health insurer has admitted it has been hacked and the data of 1.1 million of its customers exposed.
CareFirst, which operates in several US states, is the third such company to fall victim to hackers.
The breach took place in June last year but was only recently discovered.
It follows similar attacks at Blue Cross, which had 11 million customer records stolen, and Anthem, which lost 80 million records.
The CareFirst database accessed included member names, birth dates, email addresses and identification numbers.
It did not include social security numbers, medical claims, employment , credit card or financial information, the company said.
The recordings posted to the site don’t name any of the eavesdropped speakers. But they do include the locations where the recordings were made, which could provide just enough information to identify some of those speakers. And regardless of anonymity, the prank is likely illegal: Secretly recording a conversation in New York requires the consent of at least one of the people recorded—a tape recorder planted under a table and retrieved later certainly doesn’t qualify.
Of the five recordings published on the project’s website so far, three of the recorders used to get them remain in place, and an untold number of others could still be planted around the city. So, careful what you say in public, New Yorkers—unless, of course, you have nothing to hide.
On Wednesday, representatives from the U.S. Special Operations Command revealed that they were testing two rapidDNA readers in forward locations. The operators feed in a DNA sample, and the reader compares it against a database that matches DNA to identities. The machines weigh some 60 pounds, so they aren’t small. And they aren’t cheap: each costs about $250,000. But they can give a result in 90 minutes, a process that used to take weeks.
Share | Comment
Hopefully, Oculus VR, like Google Glass before it, will be a spectacular failure that people reject. Pray that it is. FACEBOOK-OWNED OCULUS VR HAS NO PLANS TO PREVENT THE ADULT ENTERTAINMENT INDUSTRY FROM USING ITS RIFT VIRTUAL REALITY HEADSET, WHICH IS SCHEDULED TO LAUNCH AS A CONSUMER PRODUCT WITHIN THE FIRST QUARTER OF 2016, ACCORDING TO OCULUS FOUNDER PALMER LUCKEY.
GM has joined with John Deere in asking the government to confirm that you literally cannot own your car because of the software in its engine. Like Deere, GM wants to stop the Copyright Office from granting an exemption to the Digital Millennium Copyright Act that would allow you to jailbreak the code in your car's engine so that you can take it to a non-GM mechanic for service, or fix it yourself. By controlling who can service your car, GM can force you to buy only official, expensive parts, protecting its bottom line.
The intelligence alliance known as Five Eyes—comprising the U.S., Canada, New Zealand, the United Kingdom, and Australia—exploited security weaknesses in one of the world's most popular browsers to obtain data about users and planned to use links to Google and Samsung app stores to infect smartphones with spyware, a top secret National Security Agency (NSA) document published Wednesday has revealed.
The National Security Agency and its closest allies planned to hijack data links to Google and Samsung app stores to infect smartphones with spyware, a top-secret document reveals.
The surveillance project was launched by a joint electronic eavesdropping unit called the Network Tradecraft Advancement Team, which includes spies from each of the countries in the “Five Eyes” alliance — the United States, Canada, the United Kingdom, New Zealand and Australia.
The top-secret document, obtained from NSA whistleblower Edward Snowden, was published Wednesday by CBC News in collaboration with The Intercept. The document outlines a series of tactics that the NSA and its counterparts in the Five Eyes were working on during workshops held in Australia and Canada between November 2011 and February 2012.
More than 250 tech companies and digital rights organizations on Wednesday sent a joint letter to Congress, blasting the corporate-backed trade deal they say "actively silences the voices of Internet users, start-ups, and small tech companies...while undermining the health of the entire Web."
Tens of thousands of HTTPS-protected websites, mail servers, and other widely used Internet services are vulnerable to a new attack that lets eavesdroppers read and modify data passing through encrypted connections, a team of computer scientists has found.
Logjam is another exploit of the 1990s-era crypto-wars: “To comply with 1990s-era U.S. export restrictions on cryptography, SSL 3.0 and TLS 1.0 supported reduced-strength DHE_EXPORT ciphersuites that were restricted to primes no longer than 512 bits”, the paper notes.
Because “export grade” hangs around in ciphersuites, “a man-in-the-middle can force TLS clients to use export strength DH with any server that allows DHE_EXPORT.”
“The attack affects any server that supports DHE_EXPORT ciphers, and affects all modern web browsers. 8.4% of the Top 1 Million domains were initially vulnerable,” Green writes at the Logjam site.
As one example of the opaque link between NSA money and punditry, take the words of Stewart Baker, who was general counsel to the NSA from 1992 through 1994. During a Senate committee hearing last summer on one of the reform bills now before Congress, the USA FREEDOM Act, which would partially limit mass surveillance of telephone metadata, Baker essentially said the bill would aid terrorists.
“First, I do not believe we should end the bulk collection program,” he told the Senate Select Committee on Intelligence. “It will put us at risk. It will, as Senator King strongly suggested, slow our responses to serious terrorist incidents. And it is a leap into the dark with respect to this data.”
Two leading child and consumer advocacy groups have filed an important update to their Federal Trade Commission complaint against Google’s YouTube Kids app for false and deceptive marketing. In a letter sent to the Commission today, the groups charged that Google is deceiving parents by marketing YouTube Kids as a safe place for children under five to explore when, in reality, the app is rife with videos that would not meet anyone’s definition of “family friendly.”
Facebook's Internet.org project, which offers people from developing countries free mobile access to selected websites, has been pitched as a philanthropic initiative to connect two thirds of the world who don’t yet have Internet access. We completely agree that the global digital divide should be closed. However, we question whether this is the right way to do it. As we and others have noted, there's a real risk that the few websites that Facebook and its partners select for Internet.org (including, of course, Facebook itself) could end up becoming a ghetto for poor users instead of a stepping stone to the larger Internet.
A serious security vulnerability has been uncovered in Apple’s Safari web browser that could trick Safari users into visiting a malicious website with the genuine web address.
A group of researchers, known as Deusen, has demonstrated how the address spoofing vulnerability could be exploited by hackers to fool victim into thinking they are visiting a trusted website when actually the Safari browser is connected to an entirely different address.
This flaw could let an attacker lead Safari users to a malicious site instead of a trusted website they willing to connect to install malicious software and steal their login credentials.
RadioShack is dead, but its saga is ongoing. Last week, the company’s name was auctioned off for $26.2 million to Standard General, a hedge fund that earlier this year bought hundreds of RadioShack store leases. With the latest purchase, though, Standard General also got RadioShack’s collection of consumer data—that means the names, addresses, email addresses, and purchase histories of potentially tens or even hundreds of millions of RadioShack customers.
Back in March TOO came under sustained cyber-attack from the enemies of our people. This vital resource for truth was brought to a stand-still by a large number of bogus service requests, with Kevin MacDonald noting that one IP address in Israel “attempted to access the site 13,125 times within the span of three days.”
WEBMASTER ADDITION: Our server has been flooded with similar bogus requests form IPs located in Tel Aviv.
Robot trucks also don’t need salaries?—?salaries that stand to go up because fewer and fewer people want to be truckers. A company can buy a fleet of self-driving trucks and never pay another human salary for driving. The only costs will be upkeep of the machinery. No more need for health insurance either. Self-driving trucks will also never need to stop to rest, for any reason. Routes will take less time to complete.
While major or controversial legislative changes usually go through normal parliamentary process (i.e. democratic debate) before being passed into law, in this case an amendment to the Computer Misuse Act was snuck in under the radar as secondary legislation. According to Privacy International, "It appears no regulators, commissioners responsible for overseeing the intelligence agencies, the Information Commissioner's Office, industry, NGOs or the public were notified or consulted about the proposed legislative changes... There was no public debate."
Senate majority leader Mitch McConnell said on Sunday that legislation concerning the federal government’s powers of surveillance that was passed by the House of Representatives this week could cause the country to “go dark” when it comes to collecting Americans’ phone records.
McConnell said that if such a state of affairs came about, “we’ll not be able to have yet another tool that we need to combat this terrorist threat from overseas”.
Mitch, you are a tyrant's wet-dream!
First, under the Fourth Amendment, the government is not allowed at will to peek into our private lives, drool over naked pictures of our lovers, steal our business secrets, (all of which they have been caught doing) etc.
Second, in 12 years of living under tyranny, the NSA, TSA, DHS, FBI, CIA have not actually prevented any terror attacks. Yes, they have set up a bunch of innocent patsies to be arrested for propaganda purposes, but no real terrorists, and the reason is simple. As we demonstrated 6 times over at my website, anyone with modest programming skills can write systems of encryption the NSA simply cannot break. Which means the entire surveillance system you are so in love with is only able to spy on law abiding citizens. That means it is a hideous waste of time, money, manpower, and other resources.
But Mitch, I will make you a deal. We The People will allow total surveillance over our phone calls and emails and texts ... as soon as all members of Congress allow We The People the same access to your emails, phone calls, and texts. Fair enough?
Over the weekend I succeeded in working out how to copy the existing article database and user accounts into the new site. That was a major hurdle. The only remaining major hurdle is to have a "wrapper" page to surround the permanent articles, letters, and so forth, which is my next major task. After that, all that remains is theme refinement, and barring an unexpected disaster the new WRH site should be ready to go live early next month. Thanks for your patience.
Amidst a discussion of new top-level domain names (such as “.sucks”), a lawyer representing the Motion Picture Association of America (MPAA), the Recording Industry Association of America (RIAA), and other groups told the House Judiciary Committee’s Internet subcommittee that ICANN should force the companies that register domain names to suspend domains based on accusations of copyright infringement.
If this sounds familiar, that’s probably because it’s exactly the sort of system that the disastrous SOPA bill would have created—one where entire websites can be forced to go dark, without a day in court, because some material on the site is accused of infringing a copyright.
No, your Apple Watch isn't totally hacker-proof, despite what some have claimed.
The basic idea behind its security is that the Watch can detect when it is removed from a wrist, and automatically requires a passcode to be entered if removed (if one is set up, which is a requirement for using Apple Pay). So we set out to trick the sensor into thinking it's still on a wrist while removing it. Taking that a step further, we wanted to see if we could use this "exploit" to bring up Apple Pay and make purchases with someone else's card.
We'll cut right to the chase—we got it to work without much effort. Here's how we did it, and what you can do to protect yourself if someone uses this technique on you.
MenuetOS, a GUI-toting, x86-based operating system written entirely in assembly language, has hit version 1.0.
The milestone comes after almost a decade and a half of development for the operating system, which despite having an impressive graphical user interface is still compact enough to fit on a floppy disk (assuming you can find one).
Hands-free car entry systems, which typically unlock car doors without requiring the pushing of any buttons when owners are close to their vehicles, provide great convenience. Unfortunately, however, people have begun marketing for sale devices that allow criminals to exploit a technological vulnerability in these systems, and crooks have been seen using “mystery devices” to open cars equipped with hands-free car entry systems. Once in a car, crooks can steal whatever is in it, and, while most of the recent issue has been just that, they can also potentially connect a device to the vehicle’s diagnostic port in an effort to download sufficient information in order to create a key to drive and steal the vehicle, a problem about which the British police are now warning.
Anyone wishing to protect the contents of his or her car from being taken, or perhaps the vehicle itself from being stolen, might want to take action.
The e-Radiators stored in the test homes are being used to run complex calculations and other computer-intensive jobs for an array of companies and research institutions. Nerdalize will pay the bill for powering the radiators, allowing Eneco customers to stay warm for free. Nerdalize say that the scheme is also environmentally friendly, because energy is effectively used twice in the new system.
"The people's benefit is actually quite simple, what we do is we reimburse the electricity the server uses, and that we can do because of the computer clients on the other side, and in that way home owners actually get heating for free and compute users don't have to pay for the overhead of the data center, so it's pretty much a win-win situation," said Leupe.