COMPUTERS/INTERNET/SECURITY | WHAT REALLY HAPPENED


COMPUTERS/INTERNET/SECURITY

Jun 01 16:54

Things You Won’t Believe Are Spying On You

The next time you go on a trip to the mall, give those mannequins a nice big smile! This 245 billion (yes, with a “B”) dollar industry consists of five organizations throughout Europe and the US that make the ‘Eye See polystyrene frame mannequins.’ These particular mannequins’ eyes are equipped with face recognition cameras.

Jun 01 14:17

Trendies Ready for Ultimate Wearable: “Chip Implanted in Their Skin Used for Payments”

The Mark of the Beast is more almost here than ever before. A poll found that 25% of the population is ready to make payments via an RFID implant.

A mind-boggling 25% of Australians say they are at least “slightly interested” at the prospect of having a chip implanted in their skin that could be used for payments, new research has found.

Read more at SHTFplan.com

Jun 01 12:24

The Ghost in the Machine and mass mind control

Lately we’ve been looking at various techniques and approaches to Psy Ops and how they are not merely for military warfare, but an entire approach to human behavior modification and mass population management.

Jun 01 11:43

Senate Recesses Without Passing USA Freedom Act

The USA Freedom Act limits bulk collection by refining the allowable search terms, leaves the data in the hands of telecom companies, rather than shipping it off to government servers, and would create liability protections for the phone companies that provide the information, among other things.

One thing it doesn't do is mandate how long the phone companies have to retain the information. Sen. Dan Coats (R-Ind.), who opposed the bill, said that lack of a retention mandate could render the program useless if the companies decided not to retain the data.

Jun 01 11:41

Victory for Privacy, Vindication for Snowden as Phone Dragnet Sunsets

Nearly two years after NSA whistleblower Edward Snowden first revealed the U.S. government was secretly operating mass surveillance programs against the American public, including bulk collection of telephone data, privacy advocates and civil libertarians are celebrating—at least temporarily—after the U.S. Senate on Sunday failed to extend authorities for key portions of those programs before a midnight deadline.

Jun 01 11:07

SLIME-MOLD ECONOMICS

But as vast and powerful as the global financial computer system is, it lacks sentience, self-awareness, certainly a conscience, or any sympathy for the humans whose labor provides the raw "food" to feed that system.

In searching for a way to demonstrate the behavior of the global computer finance system, I was struck by the image of slime-mold growth shown on a recent documentary.

Optional Banner: 
WRH Exclusive
Jun 01 10:37

Supreme Court throws out man’s conviction for Facebook rap lyrics about killing his ex-wife

The U.S. Supreme Court on Monday threw out the conviction of a Pennsylvania man found guilty of making threatening statements on Facebook to his estranged wife, law enforcement officers and others.

The court ruled 8-1 in favor of Anthony Elonis, who served prison time for posting a series of statements on the social media site in 2010 after his wife left him.

The case touched upon the rise of social media and how people use it to express strongly held feelings. But the legal question decided by the court was that Elonis needed to be aware of the threatening nature of his communication in order to be convicted. Lower courts had said he could be culpable regardless of whether he believed his messages could be viewed as threatening.

Jun 01 10:33

What China's New Facial Recognition ATM Says About the Future

By Nicholas West

In what has become a common refrain in all security circles, the elimination of privacy is a necessary tool needed to provide a solution.

China is invoking the threat of financial fraud to usher in a new system of facial recognition ATMs that not only will link to an "identity database" but also will scan cash for counterfeit currency...

Jun 01 09:53

Big Brother, eh?

This week we break Bill C-51, down Kanada’s sinister new law, that would give the Canucks increased spying powers over its population.

Jun 01 08:17

NSA loses power to collect Americans’ phone records after no deal in Senate

The National Security Agency lost its authority at midnight to collect Americans’ phone records in bulk, after Republican Sen. Rand Paul stood in the way of extending the fiercely contested program in an extraordinary Sunday session in the Senate.

But that program and several other post-Sept. 11, 2001 counter-terror measures look likely to be revived within days. With no other options, Senate Majority Leader Mitch McConnell reluctantly embraced a House of Representatives-passed bill that would extend the provisions, while also remaking the bulk phone collections program.

Webmaster's Commentary: 

The headline is misleading. NSA still has the power to spy on your phone calls and will as long as those data centers remain standing. NSA was in violation of the law when it started building this system back in the 1980s. They will not hesitate to violate the law again. The new USA FREEDOM Act that may be passed now keeps the spying going, but shuffles around just who gets the data to make it look like there has been an improvement, but the real goal is to lull Americans into the false belief that somehow privacy protections have been restored, so that we will not create our own systems of encryption to protect our business secrets from government crooks. It is up to us all to take responsibility for our right to privacy, guaranteed to us under the Fourth Amendment to the Constitution.

Jun 01 06:55

Proposed rule change to expand feds’ legal hacking powers moves forward

Change would allow one judge to authorize "remote access" basically anywhere.

Jun 01 01:52

SPYING POWERS LAPSE: Senate Fails to Reach a Deal on NSA Surveillance

Well, it’s after midnight and the Senate failed to reach a deal on the domestic surveillance.

Even though the USA Freedom Act will likely pass anyway, we can breathe a sigh of private, NSA-less relief for five whole minutes together for the first time in years…

(read more)

Jun 01 00:30

Who’s Afraid Of The Internet? Elites Panic As Information Control Flounders

The Federal Reserve is a private cartel created by the banksters for the express purpose of manipulating the money supply and controlling the economy? CONSPIRACY THEORY! No Google for you! -- Always and throughout history, Governments have used false flag terrorism in order to justify their wars of aggression? SLANDER! Do not pass go, do not collect $200, go directly to the bottom of the search results! -- Google and every other major Silicon Valley firm is in bed with the DOD and/or the CIA and/or the NSA? BLASPHEMY! You have been excommunicated from the church of Google. -- You get the idea...

May 31 12:26

14,000 Websites Have Blocked Congress from Accessing Their Pages: Here’s Why

As of Friday afternoon, over 14,000 websites have blocked Congressional access to their pages, instead directing them to a protest page. The massive move is an effort to show Congress that its push for continued surveillance via the Patriot Act and USA Freedom Act is unwelcome.

Facilitated by Fight for the Future (a non-profit internet advocacy group), the process works by identifying IP addresses that originate from Congress. When a Congressional IP is detected, whatever website the user attempted to access redirects to blackoutcongress.org. There, the site declares, “Congress: this is a blackout.” It explains to members of Congress (and presumably, their staff) why they were redirected:

“We are blocking your access until you end mass surveillance laws. You have conducted mass surveillance of everyone illegally and are now on record for trying to enact those programs into law.”

May 31 10:03

Hacking Online Polls and Other Ways British Spies Seek to Control the Internet

The secretive British spy agency GCHQ has developed covert tools to seed the internet with false information, including the ability to manipulate the results of online polls, artificially inflate pageview counts on web sites, “amplif[y]” sanctioned messages on YouTube, and censor video content judged to be “extremist.” The capabilities, detailed in documents provided by NSA whistleblower Edward Snowden, even include an old standby for pre-adolescent prank callers everywhere: A way to connect two unsuspecting phone users together in a call.

May 31 08:41

Bill Gates bets future epidemic will “kill over 10 million excess people” — Are you one of them?

While one of the world’s richest men, Bill Gates, rates the chance of a “nuclear war” happening in his lifetime as “fairly low”, Gates maintains that there is ‘well over a 50 percent’ chance that a major pandemic, “far worse than Ebola”, will sweep the sweep the globe in coming years, Gates told Vox’s Editor-in-chief, Ezra Klein.

May 30 07:46

Report: U.S. cyberattack on N. Korea nuke program failed

The United States tried but failed to sabotage North Korea's nuclear weapons program with a computer virus in 2010, Reuters reported Friday.

The cyber attack came at the same time the Stuxnet virus was disrupting Iran's uranium-enrichment efforts, according to sources familiar with the stealth effort. Stuxnet was reportedly created by the United States and Israel.

The North Korea attack involved a Stuxnet variant that was designed to activate "when it encountered Korean-language settings on an infected machine," Reuters writes. But U.S. agents were never able to install the malware on the computers controlling Pyongyang's nuclear program.

Webmaster's Commentary: 

There is cause to suspect that Stuxnet exacerbated the Fukushima disaster by crippling emergency systems using the targeted Siemens' controllers. And despite the danger, the US went ahead and tried again with North Korea's nuclear weapons!

May 30 01:31

Critics Blast 'Compromises' as Patriot Act Barrels Toward Sunset

With the sunset of key spy powers on the near horizon and lawmakers scrambling to save them, privacy and internet freedom groups are dialing up the pressure on Congress to end mass surveillance as we know it.

May 29 20:37

Current NSA Officials Admit Agency Is Drowning In TOO MUCH Info

Former top NSA officials have repeatedly said that the NSA is collecting TOO MUCH information on Americans to be able to stop terror attacks.

The Intercept reports that current mid-level NSA officials confirm that the NSA is gathering TOO MUCH information… and it’s making it impossible to focus:

May 29 13:46

Anonymous Fear-Mongering About the Patriot Act From the White House and NYT

everal of the most extremist provisions of the 2001 Patriot Act are going to expire on June 1 unless Congress reauthorizes them in some form. Obama officials such as Director of National Intelligence James Clapper and new Attorney General Loretta Lynch have been engaged in rank fear-mongering to coerce renewal, warning that we’ll all be “less safe” if these provisions are allowed to “sunset” as originally intended, while invoking classic Cheneyite rhetoric by saying Patriot Act opponents will bear the blame for the next attack. In an interview yesterday with the Intercept, ACLU Deputy Legal Director Jameel Jaffer explained why those scare tactics are outright frivolous.

May 29 13:43

Alleged Silk Road creator Ross Ulbricht sentenced to life in prison without parole

The convicted mastermind behind the world's largest online narcotics emporium has been sentenced by a federal judge to life in prison without parole. The judge also ordered Ross Ulbricht, 31, to forfeit $184 million dollars. The website made over $187 million before it was shut down in 2013.

May 29 13:00

Autonomous Killer Robots Almost Here: “3rd Revolution in Warfare After Gunpowder, Nuclear”

It won't be long now: all the parts and systems to create lethal machines with a mind of their own, deciding who and when to kill without human oversight are conceptually already developed. It is just a matter of time, and by all accounts that time is short.

Technologies have reached a point at which the deployment of such systems is — practically if not legally — feasible within years, not decades. The stakes are high: LAWS have been described as the third revolution in warfare, after gunpowder and nuclear arms.

Read more at SHTFplan.com

May 29 12:55

Japan’s Prime Minister Calls for ‘Robot Revolution': Hopes to ‘Spread the Use of Robotics to Every Corner of Society’

Japan’s total fertility rate currently sits well below replacement rate at 1.41 births per woman. The image above is more than just a robot door greeter at a department store in a country with a dwindling population of young people to take care of its elderly.

It’s a death knell for the income of the nation’s already dwindling human population, sung by robots.

(read more)

May 29 10:09

TISA: Yet Another Leaked Treaty You've Never Heard of Makes Secret Rules for the Internet

A February 2015 draft of the secret Trade In Services Agreement (TISA) was leaked again last week, revealing a more extensive and more recent text than that of portions from an April 2014 leak that we covered last year. Together with the Trans-Pacific Partnership (TPP) and the Trans-Atlantic Trade and Investment Partnership (TTIP), TISA completes a trifecta of trade agreements that the administration could sign under Fast Track without full congressional oversight.

May 29 09:35

The U.K. proposes new law that will force Google, Apple & Facebook to decrypt and hand over messages from suspects under investigation

The U.K. government has not given up on the idea that its secret services must be given access to communications between individuals who are suspects in an ongoing investigation, even if said communications are protected by encryption.

May 29 08:58

How to avoid Google surveillance and protect your personal data

It all seemed rather innocent in the beginning. It certainly seemed convenient, and still is – maybe more so than ever, to be truthful. But if you haven’t noticed, slowly and gradually, during the past 17 years since its inception, Google has evolved from being a company which once merely provided Internet users with a free search engine and email to becoming an all-encompassing entity that monitors nearly everything you do.

May 29 08:13

FCC looks to subsidize low-income Americans' Internet access

The Federal Communications Commission is proposing to expand its Lifeline program to help subsidize Internet service for low-income Americans.

The plan floated Thursday by FCC Chairman Tom Wheeler faces resistance from Republicans who point to lingering waste and inefficiencies in the $1.7 billion program, which helps low-income individuals pay for phone service.

May 29 08:10

UK Government Goes Full Orwell: Snooper's Charter, Encryption Backdoors, Free Speech Suppression

Of course, as we've been discussing for quite some time now, such backdoors into encryption are monumentally stupid and counterproductive. They weaken the security and privacy of everyone. And, of course, we've already discussed how once one country demands its own backdoors, others will want them as well. And, of course, such backdoors always come back to bite everyone by opening up avenues for malicious and nefarious attacks -- no matter how often law enforcement insists that it can keep things safe. You are, by definition, opening up a vulnerability. And it will lead to less safety and security.

May 29 07:58

UN report: Encryption crucial for human rights

A United Nations report released Thursday argues that strong encryption is fundamental to exercising basic human rights.

“Encryption and anonymity enable individuals to exercise their rights to freedom of opinion and expression in the digital age and, as such, deserve strong protection,” says the report, from the UN’s Office of the High Commissioner for Human Rights.

Webmaster's Commentary: 

See Rivero Challenges the NSA! for code snippets to learn NSA-proof encryption.

May 28 16:10

The text you never want to get on your iPhone

A nasty computer bug in Apple's iOS allows anyone who sends an iPhone a certain text message to shut it down.

The worst part? You don't even need to open the text message. Your device just needs to receive it.

May 28 14:45

Health Ranger launches world's first search engine that favors New Media while banning corporate and government propaganda: GoodGopher.com

The official beta launch announcement is here! The world's first privacy-protecting search engine that bans corporate propaganda and government disinformation is now ready for webmasters to submit their sites for indexing. The name of the new search engine? Good Gopher! (www.GoodGopher.com)

May 28 14:03

Julian Assange on the TPP, NSA spying, and his own ambiguous future

In an hour-long interview aired Wednesday, Julian Assange spoke with Amy Goodman of Democracy Now! at the Ecuador embassy in London and shared his perspective on NSA spying, the pending Trans Pacific Partnership trade agreement, and other controversies.

May 28 12:56

US SPECIAL FORCES ARE EXPERIMENTING WITH BUG DRONES

If you hear this tiny flying bug drone buzzing around your head, an Army Special Forces team might not be far behind. The 18-gram PD-100 Black Hornet from Norway’s Prox Dynamics can bear regular and thermal cameras about a kilometer and stay aloft more than 25 minutes.

May 28 11:45

Only Dirty Deeds Recorders Like Kent County DE's Betty Lou McKenna Restrict Media Access and Cameras.

Monday, May 18, 2015
KingCast and Mortgage Movies See Kent County Delaware Register of Deeds Betty Lou McKenna, Holly Malone and Attorney John Pardee Attempt to Truncate Discovery with Bullshit Dispositive Motions.

Media. Just like KIRO 7 only smaller.
Access, because it is Constitutional.
This is simple stuff, folks.

Today's email to Counsel for Defendants:
Good Day Counselors and media,

I. Offer of Proof Video in Production.

I left the Bat Cave this afternoon to document that which common sense tells us. If you don't get it now you never will. Fortunately Jon Scherer, Recording Manager of King County gets it.Stay tuned for the video link and the Court filing.

II.
Voluntary Dismissal of Negligent and Intentional Emotional Distress Claim.
That is self-explanatory. Document and Proposed order forthcoming.

III. Modification to Motion for Partial Summary Judgment.

May 28 11:03

The TPP, Monsanto, Rockefeller, Trilateral Commission, Brzezinski

By Jon Rappoport

All hands on deck for global, economic, corporate dictatorship.

There are dots to connect here. They’re real, and they’re spectacular.

Let me begin with a brief exchange from a 1978 interview, conducted by reporter Jeremiah Novak. He was speaking with two American members of the Trilateral Commission (TC), a group founded in 1973 by David Rockefeller and his intellectual flunkey, Zbigniew Brzezinski...

May 28 10:02

White House warns possible lapse of Patriot Act like playing ‘Russian roulette’

The White House ramped up its campaign to persuade the Senate to renew National Security Agency surveillance powers before they expire at midnight Sunday, likening a potential lapse to playing “Russian roulette” with national security.

Webmaster's Commentary: 

Even though the government now admits such surveillance has not cracked a single case, we we proved that real criminals and terrorists can easily evade the NSA!

May 28 09:46

Moving towards the mark of the beast: Feds help fund implantable RFID device

For years many within the alternative media have written about the danger to freedom posed by implantable RFID chips. From chips implanted into pets to chips used in humans to monitor their health, society has slowly been conditioned to accept implanted microchips as a useful science based tool.

May 28 07:41

White House sides with Oracle, tells Supreme Court APIs are copyrightable

The dispute centers on Google copying names, declarations, and header lines of the Java APIs in Android. Oracle filed suit, and in 2012, a San Francisco federal judge sided with Google. The judge ruled that the code in question could not be copyrighted. Oracle prevailed on appeal, however. A federal appeals court ruled that the "declaring code and the structure, sequence, and organization of the API packages are entitled to copyright protection."

Google maintained that the code at issue is not entitled to copyright protection because it constitutes a "method of operation" or "system" that allows programs to communicate with one another.

May 28 07:40

This Text Message Can Crash, Reboot Any iPhone Instantly

A recently discovered bug in Apple’s mobile OS means that anyone can effectively crash another individual’s iPhone, or send it into Safe Mode if jailbroken, by simply sending a SMS or iMessage containing a specific set of non-Latin characters. The bug, as discovered by a number of keen-eyed Reddit users, causes an iOS device to immediately crash and reboot upon receiving of the message, as long as the device isn’t opened in the same conversation thread in which the message was received.

May 28 06:59

GAO, TIGTA Warned Of IRS's Lax Computer Security For Years Before Hack Of 100,000 Taxpayer Accounts On IRS Website

Government monitors repeatedly warned of IRS computer security risks long before Tuesday's disclosure that identity thieves had stolen tax agency data for roughly 100,000 U.S. households.

May 27 11:34

Scramble begins as Patriot Act teeters

Senate Majority Leader Mitch McConnell (R-Ky.) is running out of time to save sections of the Patriot Act that the White House deems crucial to national security.

Top lawmakers and their aides are scrambling to find a last-minute deal to save the law, which is speeding toward expiration — at midnight Sunday — after a series of Senate votes failed to resolve an impasse over the National Security Agency (NSA).

May 27 10:45

Wood-Based Computer Chips Could Make Electronics Biodegradable

Good old wood. It's everywhere! And soon it may be in your computing devices as the newest, most cutting-edge semiconductor material.

Or at least the first semiconductor material that's fully adapted to the fact that the average consumer chews through portable electronics like they're toilet paper. Consumers, after all, demand not just the fastest and slimmest devices, they want—implicitly, at least—devices that can go in the trash.

Webmaster's Commentary: 

Termites! The next computer bug!

May 27 07:45

GOT A WEARABLE? ALMOST ANYBODY CAN TRACK YOU USING SIMPLE TECHNOLOGY

Wearable products need to transmit data to function. Many don’t work without a connection to a smartphone. And because it would be silly to walk around with a cord between the devices, that connection is made via Bluetooth Low Energy. Context Information Security has found that these connections can be used to identify smartwatches, fitness trackers, and other products that rely on BLE. And they’ve released an Android app that can track these signals to prove it.

May 27 07:40

New research suggests that hackers can track subway riders through their phones

Underground subways offer no place to hide from hackers.

Determined hackers can track the movements of millions of subway riders around the world even as they go underground by breaking into smartphone motion detectors, new research from Chinese academics reveals. The attack can track subway riders with up to 92 percent accuracy.

May 27 07:27

Hackers Gained Access To Old Tax Returns For 100,000 Taxpayers On IRS Web Site

The IRS announced today that criminals used taxpayer-specific data acquired from non-IRS sources to gain unauthorized access to information on approximately 100,000 tax accounts through IRS’ “Get Transcript” application. This data included Social Security information, date of birth and street address.

Webmaster's Commentary: 

It is now being reported that the hackers used the stolen information to file false amended tax returns generating about $50 million in bogus "refunds."

May 26 22:05

Five Eyes and Color Revolutions

A recent release of Edward Snowden-provided classified PowerPoint presentation from the National Security Agency (NSA) provides a rather detailed description of how the FIVE EYES signals intelligence alliance of the United States, Britain, Canada, Australia, and New Zealand has conspired with the promoters of social media-based revolutions, such as the "Arab Spring", to bring about the collapse of democratically-elected or otherwise stable governments. However, the PowerPoint slides were partially redacted in key areas by the dubious censors of First Look Media, financed by e-Bay founder and multi-billionaire Pierre Omidyar.

May 26 20:12

The NSA wants to identify phone users by their finger swipes

For the National Security Agency, the fingerprint reader on your smartphone just isn't secure enough. Lockheed Martin has confirmed to Nextgov that the intelligence outfit is testing Mandrake, an identification system that verifies who you are based on the way you swipe your finger across the screen.

The technology measures not only the shape of your movements, but the acceleration and speed. It can tell whether you draw in broad, fast strokes or tend to be cautious. Lockheed doesn't know whether or not the NSA is deploying Mandrake in the field, but it wouldn't be shocking. Given that it's possible to fake fingerprints, gesture-based authentication may the best way of proving that the right person really is present.

May 26 20:12

Air Force Certifies SpaceX To Launch Military Satellites

The US Air Force announced today that it certified SpaceX to launch national security payloads, from spy satellites to mystery drones, ending the monopoly held by the Boeing-Lockheed Martin joint venture, United Launch Alliance (ULA).

May 26 19:50

Caught On Tape: Self-Driving Car Ploughs Into Journalists

Instead, in what is perhaps the most epic "option" in the history of automotive history, Volvo decided to make the special feature known as “pedestrian detection functionality” cost extra money. It gets better: the cars do have auto-braking features as standard, but only for avoiding other cars — if they are to avoid crashing into pedestrians, too, then owners must pay extra.

May 26 09:45

Wikipedia edits from inside Parliament removing scandals from MPs' pages, investigation finds.

Details of MPs’ expenses scandals and controversies are being removed from Wikipedia from inside the Houses of Parliament, a newspaper investigation has claimed.

May 26 09:29

Elite Bunker Down in “Secure, Safe Rooms Hidden in Plain Sight”… And You Can, Too

It is an age of vast inequality, and those who stand out, or stand above, are finding places to lay low.

With any number of riots, protests and grumblings on the ground level, elites, VIPs, military commandos and foreign dignitaries are preparing to hunker down.

Read more at SHTFplan.com

May 25 16:02

The Elite Will Merge with Tech and Quote: ‘Become God-Like Cyborgs Within 200 Years’

Notice the story from The Telegraph begins with “wealthy humans…” and continues with “will upgrade themselves into some idea of a divine being…”

(read more)

May 25 08:42

Back Door Worse Than No Door

Tech industry giants say they are alarmed the federal government would demand back-door access to the encryption built into their products. Are they crying crocodile tears? Maybe, but the point is still a good one.

Imagine if, instead of memory chips, we were talking about your home's back door. It most likely contains a lock. Your family members have keys. They can come and go freely while others cannot. This is how locks should work.

The FBI says it can't do its job unless it has unimpeded access to your house, so it asks you to give it a spare key. The FBI further promises it will only use the key to enter your home in emergencies. Would you give it to them?

Webmaster's Commentary: 
May 24 13:02

From the Very Creation of the Internet, U.S. Spy Agencies Fought to Block Encryption

American spy agencies have intentionally weakened digital security for many decades. This breaks the functionality of our computers and of the Internet. It reduces functionality and reduces security by – for example – creating backdoors that malicious hackers can get through.

The spy agencies have treated patriotic Americans who want to use encryption to protect their privacy as extremists … or even terrorists.

As Gizmodo’s Matt Novak points out, this attack started at the very birth of the internet:

May 24 09:36

Lindsey Graham's epic eyeroll as Rand Paul defends Americans' right to privacy.

May 24 05:40

Yandex Strips Down Its Browser To Take On Google

The new browser sports a clean, minimalist look with as much screen estate given to websites as possible. In addition, Yandex.Browser turns off usage statistics by default to ensure the most private browsing experience possible.
Yandex has revamped its popular Internet browser with a new beta release that the company says is cleaner and more privacy-focused than earlier builds.
Unlike the alpha version released last year, Yandex.Browser beta doesn’t send usage statistics to the company by default. Yandex said it had taken this decision in response to feedback from users in Canada, Germany and the U.S. There’s also a small button in the top right corner that turns on Stealth Mode, a tool that blocks user tracking code on websites, including analytics cookies, sharing plugins, etc. The feature is quite flexible, allowing users to whitelist certain websites and choose what exactly they want blocked on pages.

May 24 03:54

Google Patents Creepy New Toys That Spy on Your Kids, Control Smart Devices in Your Home

Just when you think Google (read: our real-life Skynet) can't get any creepier, they go and aspire.

Now the megacorporation has patented a fun new toy that comes complete with hidden microphones and cameras, spies on your child's activities and conversations, responds to his or her social cues, and can control smart devices in your home.

Yay!

(read more)

May 23 16:45

Special Ops Armed with Rapid DNA Scanners: “Get Ready for Advanced Biometric Warfare”

Along with formidable future weapons, super soldiers, armed drones of every size and autonomous robots executing lethal missions, the battlefield of tomorrow will also be driven by target identity and biometric data – you know, to stop terrorists.

Gizmodo reports:

The United States’ most elite soldiers have been collecting DNA samples from suspected terrorists for years. But because analysis normally takes three weeks, it’s been a pretty useless chore. Now, however, U.S. Special Operations Command is testing a machine that can do it in 90 minutes. Get ready for advanced biometric warfare.

Read more at SHTFplan.com

May 23 11:09

Researchers Predicted In 1971 that Debit Cards Would Become the Ultimate Spy Tool

The Wall Street Journal reported that the NSA spies on Americans’ credit card transactions. Senators Wyden and Udall – both on the Senate Intelligence Committee, with access to all of the top-secret information about the government’s spying programs – write:

Section 215 of the Patriot Act can be used to collect any type of records whatsoever … including information on credit card purchases, medical records, library records, firearm sales records, financial information and a range of other sensitive subjects.

Many other government agencies track your credit card purchases as well. In fact, all U.S. intelligence agencies – including the CIA and NSA – are going to spy on Americans’ finances.

May 23 08:45

Proposal to extend ‘Patriot Act’ surveillance programs also blocked in Senate

Legislation to extend for two months a program in which spy agencies sweep up vast amounts of data about Americans’ telephone calls was blocked in the U.S. Senate early on Saturday, adding to uncertainty about the future of the program.

The Senate voted 45-54 on the procedural measure to stop debate on the extension of provisions of the “USA Patriot Act,” falling well short of the 60 votes in favor needed to advance the measure. The legal authorities that allow the collection of so-called telephone “metadata” expire on June 1.

Webmaster's Commentary: 

Which does not mean the NSA will stop doing it. They'll just hope you think they stopped!

May 23 07:11

Google Patents ‘Creepy’ Cuddly Toys to Run Your Home

Would you let Ted run your home? Google is thinking you just might and has patented some Internet-connected toys that can do just that, per BBC News: Google’s R&D team has looked into making internet-connected toys that control smart home appliances.

May 22 14:48

WHAT? You Mean Hillary KNEW Al Qaeda Carried out the Benghazi Attack and LIED to Us About It? No Way

In short, Clinton personally knew that attack by Al Qaeda that ended in the gruesome deaths of four Americans to basically cover up an international Fast and Furious was not because of some stupid Youtube video — but she stood up and lied to the entire nation with a ridiculous, barely believable cover story anyway and with a straight face.

But HEY! Let’s make her president! She’s a big fat liar, seems she’s pretty qualified for the job.

(read more)

May 22 14:47

AND?! DOJ: FBI Used Patriot Act to Obtain ‘Large Collections’ of Data on Americans

Are we getting numb to headlines like this one yet? The shock of this headline left us speechless (sarcasm)! Who doesn’t know this by now? Thanks DOJ for that astonishing conclusion that everyone else in America had already been made aware of at least a dozen times over since the Snowden revelations.

Are they going to actually do something about it then?? If not, they are wasting our time.

Either they cannot keep up the pretense and lies that they aren’t spying on us or it’s much worse than we thought. (Pick #2! Pick #2!)

(read more)

May 22 12:58

Hackers build a new Tor client designed to beat the NSA

According to slashdot.org, this client was created by a joint American/Israeli team. So it is just as buggy as the original.

May 22 09:24

Cyber-attack leaves millions of British students without access to online resources

Millions of staff and students at over 150 centers of further education were left without access to their online resources following a cyber-attack on the University of London Computer Centre.

May 21 12:45

Confirmed: Hackers attacked St. Louis Federal Reserve Bank

A cyberattack on the Federal Reserve Bank of St. Louis last month compromised the bank’s domain name and routed web traffic to [rogue] websites created by the hackers that simulated the original, the bank confirmed this week.

Bank officials said in a statement on Monday that while the hackers didn’t compromise its website, they did manipulate the bank’s routing on April 24.

May 21 09:59

Millions exposed by latest health insurer hack

A US health insurer has admitted it has been hacked and the data of 1.1 million of its customers exposed.

CareFirst, which operates in several US states, is the third such company to fall victim to hackers.

The breach took place in June last year but was only recently discovered.
It follows similar attacks at Blue Cross, which had 11 million customer records stolen, and Anthem, which lost 80 million records.

The CareFirst database accessed included member names, birth dates, email addresses and identification numbers.

It did not include social security numbers, medical claims, employment , credit card or financial information, the company said.

May 21 09:57

Video: Mass jamming of electric car locks in a British car park

A video posted on Facebook has shown a car park in Manchester full of cars with alarms going off while their owners stand around, confused as to why they can’t lock or unlock their cars.

No one at the Manchester Fort Shopping Park was able to lock their car’s doors on Sunday evening as a result of the attack.

The lady in the video – as well as many others – suspects that someone nearby is using a jamming device that essentially jams the signals used to remotely lock and unlock a car.

May 21 09:55

The code war: Russia plans to free itself from iOS and Android

Finland’s Sailfish operating system is the platform for Russia’s latest fight for independence from US technology

May 21 09:53

Anti-NSA Pranksters Planted Tape Recorders Across New York and Published Your Conversations

The recordings posted to the site don’t name any of the eavesdropped speakers. But they do include the locations where the recordings were made, which could provide just enough information to identify some of those speakers. And regardless of anonymity, the prank is likely illegal: Secretly recording a conversation in New York requires the consent of at least one of the people recorded—a tape recorder planted under a table and retrieved later certainly doesn’t qualify.

Of the five recordings published on the project’s website so far, three of the recorders used to get them remain in place, and an untold number of others could still be planted around the city. So, careful what you say in public, New Yorkers—unless, of course, you have nothing to hide.

May 21 08:37

SPECIAL OPERATORS ARE USING RAPID DNA READERS, THE POLICE WILL BE TOO SOON

On Wednesday, representatives from the U.S. Special Operations Command revealed that they were testing two rapidDNA readers in forward locations. The operators feed in a DNA sample, and the reader compares it against a database that matches DNA to identities. The machines weigh some 60 pounds, so they aren’t small. And they aren’t cheap: each costs about $250,000. But they can give a result in 90 minutes, a process that used to take weeks.
Share | Comment

May 21 08:29

FACEBOOK-OWNED OCULUS VR SET TO LAUNCH INTO THE VIRTUAL PORN INDUSTRY

Hopefully, Oculus VR, like Google Glass before it, will be a spectacular failure that people reject. Pray that it is. FACEBOOK-OWNED OCULUS VR HAS NO PLANS TO PREVENT THE ADULT ENTERTAINMENT INDUSTRY FROM USING ITS RIFT VIRTUAL REALITY HEADSET, WHICH IS SCHEDULED TO LAUNCH AS A CONSUMER PRODUCT WITHIN THE FIRST QUARTER OF 2016, ACCORDING TO OCULUS FOUNDER PALMER LUCKEY.

May 21 08:26

GM SAYS YOU DON'T OWN YOUR CAR, YOU JUST LICENSE IT

GM has joined with John Deere in asking the government to confirm that you literally cannot own your car because of the software in its engine. Like Deere, GM wants to stop the Copyright Office from granting an exemption to the Digital Millennium Copyright Act that would allow you to jailbreak the code in your car's engine so that you can take it to a non-GM mechanic for service, or fix it yourself. By controlling who can service your car, GM can force you to buy only official, expensive parts, protecting its bottom line.

May 21 08:22

'Weaponizing Vulnerabilities': New Snowden Doc Reveals Spy Agencies Targeted Smartphones

The intelligence alliance known as Five Eyes—comprising the U.S., Canada, New Zealand, the United Kingdom, and Australia—exploited security weaknesses in one of the world's most popular browsers to obtain data about users and planned to use links to Google and Samsung app stores to infect smartphones with spyware, a top secret National Security Agency (NSA) document published Wednesday has revealed.

May 21 07:37

NSA Planned to Hijack Google App Store to Hack Smartphones

The National Security Agency and its closest allies planned to hijack data links to Google and Samsung app stores to infect smartphones with spyware, a top-secret document reveals.

The surveillance project was launched by a joint electronic eavesdropping unit called the Network Tradecraft Advancement Team, which includes spies from each of the countries in the “Five Eyes” alliance — the United States, Canada, the United Kingdom, New Zealand and Australia.

The top-secret document, obtained from NSA whistleblower Edward Snowden, was published Wednesday by CBC News in collaboration with The Intercept. The document outlines a series of tactics that the NSA and its counterparts in the Five Eyes were working on during workshops held in Australia and Canada between November 2011 and February 2012.

May 20 14:17

TPP Could 'Undermine Health of Web' Say 250+ Tech Companies and Digital Rights Groups

More than 250 tech companies and digital rights organizations on Wednesday sent a joint letter to Congress, blasting the corporate-backed trade deal they say "actively silences the voices of Internet users, start-ups, and small tech companies...while undermining the health of the entire Web."

May 20 11:59

I-Team: Drivers Say Insurance Device Put Them In Danger On The Road

May 20 09:03

HTTPS-crippling attack threatens tens of thousands of Web and mail servers

Tens of thousands of HTTPS-protected websites, mail servers, and other widely used Internet services are vulnerable to a new attack that lets eavesdroppers read and modify data passing through encrypted connections, a team of computer scientists has found.

May 20 08:52

'Logjam' crypto bug could be how the NSA cracked VPNs

Logjam is another exploit of the 1990s-era crypto-wars: “To comply with 1990s-era U.S. export restrictions on cryptography, SSL 3.0 and TLS 1.0 supported reduced-strength DHE_EXPORT ciphersuites that were restricted to primes no longer than 512 bits”, the paper notes.

Because “export grade” hangs around in ciphersuites, “a man-in-the-middle can force TLS clients to use export strength DH with any server that allows DHE_EXPORT.”

“The attack affects any server that supports DHE_EXPORT ciphers, and affects all modern web browsers. 8.4% of the Top 1 Million domains were initially vulnerable,” Green writes at the Logjam site.

May 19 17:39

Many of the NSA’s Loudest Defenders Have Financial Ties to NSA Contractors

As one example of the opaque link between NSA money and punditry, take the words of Stewart Baker, who was general counsel to the NSA from 1992 through 1994. During a Senate committee hearing last summer on one of the reform bills now before Congress, the USA FREEDOM Act, which would partially limit mass surveillance of telephone metadata, Baker essentially said the bill would aid terrorists.

“First, I do not believe we should end the bulk collection program,” he told the Senate Select Committee on Intelligence. “It will put us at risk. It will, as Senator King strongly suggested, slow our responses to serious terrorist incidents. And it is a leap into the dark with respect to this data.”

May 19 13:21

Advocates Charge Google with Deceiving Parents about Content on YouTube Kids, Request FTC Action

Two leading child and consumer advocacy groups have filed an important update to their Federal Trade Commission complaint against Google’s YouTube Kids app for false and deceptive marketing. In a letter sent to the Commission today, the groups charged that Google is deceiving parents by marketing YouTube Kids as a safe place for children under five to explore when, in reality, the app is rife with videos that would not meet anyone’s definition of “family friendly.”

May 19 10:08

Internet.org Is Not Neutral, Not Secure, and Not the Internet

Facebook's Internet.org project, which offers people from developing countries free mobile access to selected websites, has been pitched as a philanthropic initiative to connect two thirds of the world who don’t yet have Internet access. We completely agree that the global digital divide should be closed. However, we question whether this is the right way to do it. As we and others have noted, there's a real risk that the few websites that Facebook and its partners select for Internet.org (including, of course, Facebook itself) could end up becoming a ghetto for poor users instead of a stepping stone to the larger Internet.

May 19 08:33

Apple Safari Browser Vulnerable to URL Spoofing Vulnerability

A serious security vulnerability has been uncovered in Apple’s Safari web browser that could trick Safari users into visiting a malicious website with the genuine web address.

A group of researchers, known as Deusen, has demonstrated how the address spoofing vulnerability could be exploited by hackers to fool victim into thinking they are visiting a trusted website when actually the Safari browser is connected to an entirely different address.

This flaw could let an attacker lead Safari users to a malicious site instead of a trusted website they willing to connect to install malicious software and steal their login credentials.

May 19 08:25

RadioShack Sold Your Data to Pay Off Its Debts. The FTC Isn’t Too Happy About It.

RadioShack is dead, but its saga is ongoing. Last week, the company’s name was auctioned off for $26.2 million to Standard General, a hedge fund that earlier this year bought hundreds of RadioShack store leases. With the latest purchase, though, Standard General also got RadioShack’s collection of consumer data—that means the names, addresses, email addresses, and purchase histories of potentially tens or even hundreds of millions of RadioShack customers.

May 19 08:08

Jews Continue Pressure for Internet Censorship

Back in March TOO came under sustained cyber-attack from the enemies of our people. This vital resource for truth was brought to a stand-still by a large number of bogus service requests, with Kevin MacDonald noting that one IP address in Israel “attempted to access the site 13,125 times within the span of three days.”

WEBMASTER ADDITION: Our server has been flooded with similar bogus requests form IPs located in Tel Aviv.

May 18 20:10

Self Driving Trucks Will Wipe Out Millions of Jobs

Robot trucks also don’t need salaries?—?salaries that stand to go up because fewer and fewer people want to be truckers. A company can buy a fleet of self-driving trucks and never pay another human salary for driving. The only costs will be upkeep of the machinery. No more need for health insurance either. Self-driving trucks will also never need to stop to rest, for any reason. Routes will take less time to complete.

May 18 10:03

UK government quietly passed new legislation that exempts GCHQ, police, and other intelligence officers from prosecution for hacking into computers and mobile phones

While major or controversial legislative changes usually go through normal parliamentary process (i.e. democratic debate) before being passed into law, in this case an amendment to the Computer Misuse Act was snuck in under the radar as secondary legislation. According to Privacy International, "It appears no regulators, commissioners responsible for overseeing the intelligence agencies, the Information Commissioner's Office, industry, NGOs or the public were notified or consulted about the proposed legislative changes... There was no public debate."

May 18 09:40

Proposed surveillance limits could force US to 'go dark', says Mitch McConnell

Senate majority leader Mitch McConnell said on Sunday that legislation concerning the federal government’s powers of surveillance that was passed by the House of Representatives this week could cause the country to “go dark” when it comes to collecting Americans’ phone records.

McConnell said that if such a state of affairs came about, “we’ll not be able to have yet another tool that we need to combat this terrorist threat from overseas”.

Webmaster's Commentary: 

Mitch, you are a tyrant's wet-dream!

First, under the Fourth Amendment, the government is not allowed at will to peek into our private lives, drool over naked pictures of our lovers, steal our business secrets, (all of which they have been caught doing) etc.

Second, in 12 years of living under tyranny, the NSA, TSA, DHS, FBI, CIA have not actually prevented any terror attacks. Yes, they have set up a bunch of innocent patsies to be arrested for propaganda purposes, but no real terrorists, and the reason is simple. As we demonstrated 6 times over at my website, anyone with modest programming skills can write systems of encryption the NSA simply cannot break. Which means the entire surveillance system you are so in love with is only able to spy on law abiding citizens. That means it is a hideous waste of time, money, manpower, and other resources.

But Mitch, I will make you a deal. We The People will allow total surveillance over our phone calls and emails and texts ... as soon as all members of Congress allow We The People the same access to your emails, phone calls, and texts. Fair enough?

May 18 08:50

NEW WRH WEBSITE - STATUS REPORT

Webmaster's Commentary: 

Over the weekend I succeeded in working out how to copy the existing article database and user accounts into the new site. That was a major hurdle. The only remaining major hurdle is to have a "wrapper" page to surround the permanent articles, letters, and so forth, which is my next major task. After that, all that remains is theme refinement, and barring an unexpected disaster the new WRH site should be ready to go live early next month. Thanks for your patience.

May 18 08:14

Government anti-Semitism conference endorses net censorship

Recommendations coming out of the three day meeting included the scrubbing of Holocaust denial websites from the internet and the omission of “hate websites and content” from web searches.

May 18 07:23

NSA Chief Threatens War Against Cyber Attacks

"Abusive language being turned into actual abuse of humanity" - David Swanson

May 17 15:47

Flashback: STOP SOPA

May 17 15:43

SOPA, anyone? Entertainment Lobby Uses Hearing on Domain Names to Revive Awful Censorship Idea

Amidst a discussion of new top-level domain names (such as “.sucks”), a lawyer representing the Motion Picture Association of America (MPAA), the Recording Industry Association of America (RIAA), and other groups told the House Judiciary Committee’s Internet subcommittee that ICANN should force the companies that register domain names to suspend domains based on accusations of copyright infringement.

If this sounds familiar, that’s probably because it’s exactly the sort of system that the disastrous SOPA bill would have created—one where entire websites can be forced to go dark, without a day in court, because some material on the site is accused of infringing a copyright.

May 17 15:40

Apple Watch Vulnerability Lets Thieves Use Apple Pay Without Your PIN

No, your Apple Watch isn't totally hacker-proof, despite what some have claimed.

The basic idea behind its security is that the Watch can detect when it is removed from a wrist, and automatically requires a passcode to be entered if removed (if one is set up, which is a requirement for using Apple Pay). So we set out to trick the sensor into thinking it's still on a wrist while removing it. Taking that a step further, we wanted to see if we could use this "exploit" to bring up Apple Pay and make purchases with someone else's card.

We'll cut right to the chase—we got it to work without much effort. Here's how we did it, and what you can do to protect yourself if someone uses this technique on you.

May 17 15:35

MenuetOS, an operating system written entirely in assembly, hits 1.0

MenuetOS, a GUI-toting, x86-based operating system written entirely in assembly language, has hit version 1.0.

The milestone comes after almost a decade and a half of development for the operating system, which despite having an impressive graphical user interface is still compact enough to fit on a floppy disk (assuming you can find one).

May 17 15:12

Vulnerability In Car Keyless Entry Systems Allows Anyone To Open And Steal Your Vehicle

Hands-free car entry systems, which typically unlock car doors without requiring the pushing of any buttons when owners are close to their vehicles, provide great convenience. Unfortunately, however, people have begun marketing for sale devices that allow criminals to exploit a technological vulnerability in these systems, and crooks have been seen using “mystery devices” to open cars equipped with hands-free car entry systems. Once in a car, crooks can steal whatever is in it, and, while most of the recent issue has been just that, they can also potentially connect a device to the vehicle’s diagnostic port in an effort to download sufficient information in order to create a key to drive and steal the vehicle, a problem about which the British police are now warning.

Anyone wishing to protect the contents of his or her car from being taken, or perhaps the vehicle itself from being stolen, might want to take action.

May 17 15:05

Free home heating offered by e-Radiators

The e-Radiators stored in the test homes are being used to run complex calculations and other computer-intensive jobs for an array of companies and research institutions. Nerdalize will pay the bill for powering the radiators, allowing Eneco customers to stay warm for free. Nerdalize say that the scheme is also environmentally friendly, because energy is effectively used twice in the new system.

"The people's benefit is actually quite simple, what we do is we reimburse the electricity the server uses, and that we can do because of the computer clients on the other side, and in that way home owners actually get heating for free and compute users don't have to pay for the overhead of the data center, so it's pretty much a win-win situation," said Leupe.

Great idea.

SHARE THIS ARTICLE WITH YOUR SOCIAL MEDIA