COMPUTERS/INTERNET/SECURITY

Sep 16 17:23

Google: US government demands for user data have risen 250% since 2009

Transparency report shows global government requests for information rose 15% last year, as tech giant urges surveillance reform

Sep 16 15:20

Let Me Explain Why U2 Is Damaging the Music Industry…

Dumping an album in hundreds of millions of iTunes libraries whether people want it or not, reduces music to the level of a software update or a bug-fix or just plain spam.

Sep 16 13:34

‘More harm than good’: Congressional NSA reforms a sham, say critics

INTELLIGENCE COMMUNITY WHISTLEBLOWERS AND CIVIL LIBERTIES GROUPS CALL ON CONGRESSMEN TO REJECT ‘GUTTED’ USA FREEDOM ACT

Sep 16 09:41

Nationwide Biometric Database Goes Live

Nicholas West
Activist Post

Despite the FBI already having been sued by privacy groups amid plans for a nationwide biometric database, it has officially gone live. The Next Generation Identification system will eventually include iris scans, facial recognition, and a range of other biometric identifiers that are collated into a central database for real-time sharing at all levels of law enforcement and government agencies...

Sep 16 08:13

THREE QUARTERS of Android mobes open to web page spy bug

Tod Beardsley (@TodB), a developer for the Metasploit security toolkit dubbed the "major" flaw a "privacy disaster".

"What this means is any arbitrary website - say, one controlled by a spammer or a spy - can peek into the contents of any other web page," Beardsley said.

"[If] you went to an attackers site while you had your web mail open in another window, the attacker could scrape your email data and see what your browser sees.

"Worse, he could snag a copy of your session cookie and hijack your session completely, and read and write web mail on your behalf."

Sep 16 08:05

Computer Models Tell Us That This Ebola Pandemic Could Soon Kill Millions

We could potentially be on the verge of the greatest health crisis that any of us have ever seen. The number of Ebola cases in Africa has approximately doubled over the past three weeks, and scientific computer models tell us that this Ebola pandemic could ultimately end up killing millions of us – especially if it starts spreading on other continents. At first, many assumed that this Ebola outbreak would be just like all the others – that it would flare up for a little while and then it would completely fade away. But that has not happened this time. Instead, this epidemic has seemed to pick up momentum with each passing week. Despite extraordinary precautions, hundreds of health workers have gotten the virus, and the head of the CDC says that the spread of Ebola is “spiraling out of control” and that it is “going to get worse in the very near future.” For those that have thought that all of this talk about Ebola was just “fearmongering”, it is time for you to wake up.

Sep 16 07:48

Is YOUR Amazon account at risk? Security expert finds flaw in the Kindle library that could expose personal details

Next time you log into Amazon to manage your Kindle and e-books, you could be putting your personal details at risk.

A German security researcher has spotted a vulnerability in the retail giant's website that hackers could exploit to gain full access to users' accounts.

The flaw, which can be exploited when a user downloads a malicious e-book, has been active since at least July this year, despite being reported to Amazon’s security team.

Sep 16 06:16

Justice Department Proposal Would Massively Expand FBI Extraterritorial Surveillance

A Department of Justice proposal to amend Rule 41 of the Federal Rules of Criminal Procedure would make it easier for domestic law enforcement to hack into computers of people attempting to protect their anonymity on the Internet. The DOJ has explicitly stated that the amendment is not meant to give courts the power to issue warrants that authorize searches in foreign countries—but the practical reality of the underlying technology means doing so is almost unavoidable.

The result? Possibly the broadest expansion of extraterritorial surveillance power since the FBI’s inception.

This post highlights key issues raised by the international aspect of the DOJ proposal, in the attempt to encourage wider public debate before the FBI is granted such expansive powers.

Sep 16 04:18

Court blasts US Navy for scanning civilians’ computers for child porn

A federal appeals court said the US Navy's scanning of the public's computers for images of child pornography constituted "a profound lack of regard for the important limitations on the role of the military in our civilian society."

The Naval Criminal Investigative Service (NCIS) practice led the 9th US Circuit Court of Appeals to suppress evidence in the form of images of child pornography that an NCIS agent in Georgia found on a Washington state civilian's computer. The agent was using a law-enforcement computer program called RoundUp to search for hashed images of child pornography on computers running the file-sharing network Gnutella.

"...RoundUp surveillance of all computers in Washington amounted to impermissible direct active involvement in civilian enforcement of the child pornography laws, not permissible indirect assistance," Judge Marsha Berzon wrote for the San Francisco-based appeals court.

Sep 15 15:32

The new Luddites: why former digital prophets are turning against tech

Neo-Luddism began to emerge in the postwar period. First after the emergence of nuclear weapons, and secondly when it became apparent new computer technologies had the power to change our lives completely.

Webmaster's Commentary: 

It isn't the new technologies that are the problem, but the misuse of those technologies by government and corporations.

Sep 15 15:18

The Original Idea for Mobile Music Streaming… Written In 1908

…from “The Future of the Wireless Art,” Wireless Telegraphy and Telephony: Popularly Explained (p.67) by Nikola Tesla.

An inexpensive instrument, not bigger than a watch, will enable its bearer to hear anywhere, on sea or land, music or song, the speech of a political leader, the address of an eminent man of science, or the sermon of an eloquent clergyman, delivered in some other place, however distant. In the same manner any picture, character, drawing, or print can be transferred from one to another place. Millions of such instruments can be operated from but one plant…

Sep 15 14:48

Giganews Is an FBI operation

This is my warning - that all of the content being downloaded and shared on the Usenet network is going through the authorities! Giganews customers are being logged! The log file is called the "gigauth" on their "cruncher" servers which logs every connection by every customer, which are then archived. This means Usenet uploaders are helping the feds monitor the distribution of Usenet content if their newsgroup provider peers with Giganews!

Sep 15 14:46

Snowden: 'If You Live in New Zealand, You Are Being Watched'

NSA whistleblower Edward Snowden has penned a firm rebuke to New Zealand Prime Minister John Key, accusing the head of state of "not telling the truth about mass surveillance" and issuing this plainly worded warning to residents of the country: "If you live in New Zealand, you are being watched."

Sep 15 14:17

US spies have two bases in New Zealand: Snowden

Renegade former American intelligence analyst Edward Snowden claims the US National Security Agency, for which he used to work, has a facility in Auckland and another in the north. "You are being watched."

Snowden, who is sheltering in Moscow from US attempts to extradite him on espionage charges, appeared by video link before a capacity crowd at the Kim Dotcom-organised Moment of Truth event in Auckland Town Hall last night.

Sep 15 13:49

FBI's facial recognition program hits 'full operational capability'

The Federal Bureau of Investigation’s Next Generation Identification System, a biometric database reliant on tens of millions of facial-recognition records, is now fully operational, the agency announced Monday.

The NGI system, after three years of development, is billed by the FBI as a new breakthrough for criminal identification and data-sharing between law enforcement agencies.

Sep 15 11:45

Yahoo Mail To Be Scanned To Find Users Buying Habits

Yahoo is working on an app recommendation algorithm that will suggest new apps for you to buy based on apps you’ve purchased in the past.

Yahoo knows which apps its Yahoo Mail users have downloaded because whenever someone downloads an app from Apple’s App Store or the Google Play store, Google and Apple emails that person a receipt.

Sep 15 11:42

Our Nation Depends on Restoring Product Liability

Sadly, we have seen a trend in recent decades for the government to protect corporations against the people, rather than protecting the people against corporations. Along with computers, other industries we are dependent on are being protected against product liability lawsuits, such as vaccine manufacturers, and other biotech corporations. This is a practice typically seen under fascist governments, and it never ends well.

The computers don't last. The software will not install. The aqueducts are leaking. The roads are cracking.

Rome is falling.

Optional Banner: 
WRH Exclusive
Sep 15 08:12

Apple Reportedly Paid Over $100 Million to Infect Your Phone With U2

Let's tally up the winners and losers of this transaction.

Apple

Spent: Over $100 million. (As The Verge reminds us, Apple has revenues in the hundreds of billions.)

Received: A new album by U2, advertising in direct (television commercials) and indirect formats (breathless liveblogging by the tech media).

U2

Spent: An undisclosed sum, likely somewhere in the five or six figures, in order to produce an album.

Received: Many millions of dollars from Apple.

Apple customers

Spent: Nothing.

Received: A new album by U2.

I think we got fucked on this, you guys.

Sep 15 08:01

Fifteen Months After the NSA Revelations, Why Aren’t More News Organizations Using HTTPS?

More than fifteen months after the NSA revelations laid bare the overwhelming scope of online surveillance and fueled the demand for privacy, virtually none of the top news websites—including all those who have reported on the Snowden documents—have adopted the most basic of security measures to protect the integrity of their content and the privacy of their readers: deploying HTTPS.

Sep 15 07:50

GCHQ and NSA Hack German Telecoms To Track 'Every Device'

Intelligence agencies, including the NSA and GCHQ used Deutsche Telekom's network to create a 'Treasure Map' of the internet that could be used to monitor and track web users.

Der Spiegel reported uncovering the campaign while analysing documents leaked by whistleblower Edward Snowden. The map reportedly collected data from, and showed the location of, every smartphone, computer and tablet connecting to Deutsche Telekom's network in real time.

Sep 15 07:44

Comcast Tells Customers to Stop Using Tor Browser

Embattled Comcast has another complaint about customer service to add to its growing list. The cable and Internet provider has been telling customers that their service will be terminated if they don’t stop using the Tor web browser. According to a report by Deep.Dot.Web, multiple accounts of Comcast customer service crossing into monitoring customer activity online have been reported to them.

Comcast agents have reportedly contacted customers who use Tor, a web browser that is designed to protect the user’s privacy while online, and said their service can get terminated if they don’t stop using Tor. According to Deep.Dot.Web, one of those calls included a Comcast customer service agent named Jeremy, who allegedly described Tor as an “illegal service.” The use of Tor was then described as against Comcast usage policy.

Sep 15 07:30

Winona Judd, Dubya and Bush Family all in Bed with Safeguard Property Thugs this Week at Five Star Conference.



So now Winona Judd is going to be jamming out down there in the Lone Star State with them I found out. I loved living in Dallas for a while, but the bullshit they can keep.

Sep 15 06:35

Five German Telecom Companies Hacked by The NSA and The GCHQ

We knew already that Germany was a prime target for electronic espionage orchestrated by the American National Security Agency (NSA) and its British equivalent, the Government Communications Headquarters (GCHQ). According to the German Magazine, Der Spiegel, based on documents provided by Edward Snowden, 500 million communications (telephone, email, SMS) were being intercepted every month before the scandal broke out.

However, a new investigation published on Saturday, September 13, by the German magazine, seems to provide additional details on the technicalities of the espionage which was, apparently, organized with the complicity of the German secret services. Der Spiegel ensures that the NSA and the GCHQ have clandestine access to the networks of at least five German companies: Deutsche Telekom, Netcologne, Stellar, and Cetel IABG. These companies, in fact, operate much of the German telecommunications infrastructure.

Sep 15 05:45

Comcast Is Monitoring Your Tor Usage, Threatening To Cut Services

Comcast Corporation (CMCSA) is reportedly telling its subscribers, who are using the Tor service, to stop doing so or risk losing their Internet services. As if the company needed any help to cement its position as the most hated company in America, it has just done itself a huge favor. A number of reports have surfaced over the last few days, chronicling encounters and experiences some Comcast subscribers have had with the company’s support group.

Users have been warned that if they use Tor, they can risk losing their Internet services provided by Comcast. Tor is a Web anonymizing service, which lets users surf and browse the Internet in complete privacy and anonymity. The service gained a lot of traction after Edward Snowden leaked information about the US government, specifically the National Security Agency (NSA), massive-monitoring US citizens without their knowledge.

Sep 15 04:32

Supreme Court ruling has wiped out 11 “do it on a computer” patents so far

There have been no less than 11 federal judicial rulings striking down patents as "abstract" since the US Supreme Court's June 26 decision in Alice v. CLS Bank. It's a high number. The case was recognized as a big decision by commentators when it came, and what's happened since suggests the ramifications may be broader than first thought. Vox Media's Tim Lee (former Ars contributor) has an article rounding up the 11 rulings.

Sep 14 18:33

Safeguard Busted in Florida on Foreclosure Trespass as Illinois Attorney General Expands Probe

Sunday, September 14, 2014

KingCast and Mortgage Movies See Safeguard Busted in Florida Foreclosure Trespass as Illinois Attorney General Expands Probe.

Dear Attorney Erkkila: We meet again, and this time the stakes are higher. I received notice today, one year to the date of Attorney General Lisa Madigan's press release, that your client has again run afoul of the law. Specifically they, along with Keller Williams representatives Greg Beam and/or Pat Kolar, unlawfully entered premises owned by one Nellie Blanco, as you can see by the current Deed and related government - issued tax and property information. In today's taped phone call to me, Greg Beam denied any specific knowledge and said that Pat Kolar was handling this matter. Pat Kolar did not return my taped phone call.

Sep 14 13:52

Local and State Police Involved in Sensitive Hemisphere Program

Federal, state, and local police, with the assistance of phone company employees embedded within DEA narcotics intelligence units, are utilizing an unclassified but “law enforcement sensitive” program, known as Hemisphere, which provides nearly unfettered access to an enormous database containing call records of all telephone calls passing through phone company switches likely owned by AT&T, according to a partially-redacted 24-slide presentation obtained by The Declaration.

Sep 14 11:36

APPLE WATCH IS A HAZARD TO YOUR SEX LIFE

A July 2013 survey of British women found that that 62% of women have interrupted sexual intercourse to check their cell phone. Some 48% of men admitted to doing the same.

Sep 14 07:51

Despite Obama’s Pledge to Curb It, NSA Mass Surveillance Wins Rubber Stamp

In the face of congressional inaction, a federal court on Friday renewed an order allowing the government to collect phone records on virtually all calls within the United States.

The Foreign Intelligence Surveillance Court approved the Justice Department's request for another 90-day extension of the National Security Agency's controversial mass surveillance program, exposed publicly last summer by Edward Snowden and authorized under Section 215 of the post-9/11 Patriot Act. The spying authority is next set to expire on Dec. 5.

Sep 14 07:29

NSA, GCHQ have secret access to German telecom networks

US and UK intelligence services have secret access points for German telecom companies’ internal networks, Der Spiegel reports, citing slides created in the NSA’s ‘Treasure Map’ program used to get near-real-time visualization of the global internet. The latest scandal continues to evolve around the US’ NSA and the British GCHQ, both of which appear to be able to eavesdrop on German giants such as Deutsche Telekom, Netcologne, Stellar, Cetel and IABG network operators, according to Der Spiegel’s report based on material disclosed by Edward Snowden.

Sep 13 15:29

NSA denies whistleblower Snowden ‘raised concerns’ in emails

In response to a Freedom of Information request, the NSA denies that its former NSA contractor-turned whistleblower Edward Snowden ever raised concerns in emails to colleagues to his colleagues over the agency’s surveillance work.

Sep 13 14:22

US Government Ordered Yahoo! To Provide User Data

As the internet giant Yahoo! attempted to refuse compliance with requests by the NSA to access the online data for millions of the company’s users, the U.S. Justice Department threatened to fine the company a staggering $250,000 a day, according to new reporting based on previously secret court documents released on Thursday.

Sep 13 05:45

Proposed Anti-Terror Law in France Would Erode Civil Liberties

A proposed anti-terrorism law in France has freedom of expression advocates concerned. The bill, as our friends at La Quadrature du Net frame it, “institutes a permanent state of emergency on the Internet,” providing for harsher penalties for incitement or “glorification” of terrorism conducted online. Furthermore, the bill (in Article 9) allows for “the possibility for the administrative authority to require Internet service providers to block access to sites inciting or apologizing for terrorism” without distinguishing criteria or an authority to conduct the blocking.

Sep 12 15:25

Proposed Anti-Terror Law in Would Erode Civil Liberties

A proposed anti-terrorism law in France has freedom of expression advocates concerned. The bill, as our friends at La Quadrature du Net frame it, “institutes a permanent state of emergency on the Internet,” providing for harsher penalties for incitement or “glorification” of terrorism conducted online. Furthermore, the bill (in Article 9) allows for “the possibility for the administrative authority to require Internet service providers to block access to sites inciting or apologizing for terrorism” without distinguishing criteria or an authority to conduct the blocking.

Sep 12 14:59

US Government Ordered Yahoo! To Provide User Data Or Face $250,000 Fine - Per Day

As the internet giant Yahoo! attempted to refuse compliance with requests by the NSA to access the online data for millions of the company's users, the U.S. Justice Department threatened to fine the company a staggering $250,000 a day, according to new reporting based on previously secret court documents released on Thursday.

Sep 12 13:05

Naked Celebrity Photo Leak: Can You Be Bothered? Russell Brand

Webmaster's Commentary: 

Down in New Zealand, in what appears to have been a test, websites carrying the hacked nude celebrity photos were planting malware that shut the entire New Zealand network down for a day! So, I owuld advise you to focus your attention on naked pictures of your significant other and avoid being victimized!

Sep 12 11:22

Worldwide Censorship Suppliers Want More Censorship

The movement to save Net Neutrality by reclassifying broadband providers as common carriers got another boost via Wednesday’s Internet Slowdown protest. But the other side isn’t relenting. This week a number of phone and cable equipment suppliers sent a letter to Secretary of Commerce Penny Pritzker urging her to oppose reclassification.

The letter in itself is not surprising. The companies listed are business partners of the largest U.S. Internet providers — the same companies that support FCC Chairman Tom Wheeler’s plan to allow discrimination online.

Sep 12 04:19

US gov’t threatened Yahoo with $250K daily fine if it didn’t use PRISM

Yahoo reports that it is on the verge of releasing 1,500 pages of documents related to a long court battle over its participation in the PRISM program, a National Security Agency program revealed last summer as part of the Snowden leaks.

A leaked top-secret slide about PRISM shows that Yahoo was one of the first participants, having begun contributing to the database in March of 2008. It did so under severe duress. Company executives believed the government's demand for data was "unconstitutional and overbroad" and fought it in court.

Sep 11 14:33

The Era Of Widespread Biometric Indentification And Microchip Implants Is Here

Are you ready to have your veins scanned every time you use your bank account? Are you ready to use a "digital tattoo" or a microchip implant to unlock your telephone? Once upon a time we read about such technologies in science fiction novels, but now they are here. The era of widespread biometric identification and microchip implants is upon us, and it is going to change the way that we live. Proponents of these new technologies say that they will make our private information and our bank accounts much more secure. But there are others that warn that these kinds of "Big Brother technologies" will set the stage for even more government intrusion into our lives. In the wrong hands, such technologies could prove to be an absolute nightmare.

Sep 11 11:43

‘Internet Slowdown Day’: World Wide Web rises up to defend Net Neutrality

ONLINE PROTEST AIMS TO SHOW USERS WHAT’S AT STAKE IF KEY PRINCIPLE OF THE ‘OPEN INTERNET’ IS DESTROYED BY WORLD’S WEALTHIEST TELECOM COMPANIES

Sep 11 10:54

City of Turin decides to ditch Windows XP for Ubuntu and €6m saving

€6m: the amount the municipality of Turin hopes to save over five years by switching from Windows XP to Ubuntu Linux in all of its offices.

The move will mean installing the open source operating system on 8,300 PCs, which will generate an immediate saving of roughly €300 per machine (almost €2.5m altogether, made up from the cost of Windows and Office licences) — a sum that will grow over the years as the need for the renewal of proprietary software licences vanishes, and the employees get used to the new machines.

Sep 11 10:45

Microsoft accepts ‘contempt of court’ deal to appeal email privacy case

Microsoft Corp and the US government have reached a deal under which Microsoft has agreed to be held in contempt of court, as a procedural measure to move an email privacy case on to appeal.

The agreement is the latest step in an ongoing legal battle, in which Microsoft is fighting moves by the US government that would force the corporation to hand over a customer’s emails stored in a data centre in Ireland.

Sep 11 05:28

Meet The Ex-NSA And Ex-Unit 8200 Spies Cashing In On Security Fears

Before Edward Snowden smashed its digital doors wide open, the National Security Agency was seen as the mysterious keeper of an arsenal of dark-voodoo hacking weapons. Now we know the truth: NSA employees are almost too good at what they do–as are their counterparts at Israel’s elite military signal intelligence group, Unit 8200. Unlike people at most government agencies, NSAers and Unit 8200 alums include world experts in their craft, in this case hacking and defending networks and devices.

Sep 11 03:22

PLEASE READ: If People Were Countries.....

If People Were Countries.....
(or, how to avert nuclear war, public or private)

remember, everyone, when things get heated, to CALM DOWN.

there is a point in any conflictual communication where one feels one absolutely must raise one's (virtual) voice, lose one's cool; where not to do so is a detriment to oneself and the meaning in one's life.

soon as the emotional barbs are answered in kind, one might as well give up. 'Innocent until proven guilty' -- how one feels and where one draws the line of acceptable stretching of the truth is not as important.

-- 'to protect my honor' or to 'back up my principles' or 'to protect' others -- worse, to 'not lose face' --

these are the game changers, the seemingly unique and rare set of events that will suddenly convince a large number of people to get involved, people who steadfastly opposed getting involved up to that point.

sound familiar?

Sep 10 18:28

Why I Won't Buy an Apple Watch

I consider myself a tech enthusiast and early adopter, but I just don't see any current smartwatch that can enrich my daily life. The Apple Watch doesn't change that, at least not what I saw from the presentation.

And then there was the gaping hole in the Apple Watch announcement: battery life. Oh, there's a fancy MagSafe charger, but how often will you have to use it? Every night, most likely. I'm already a slave to my smartphone charger. Another device to babysit? No, thank you. Also missing: waterproof specs. If it can't stand up to some rain or the occasional spilled drink, it'll quickly become a $350 paperweight.

Sep 10 16:01

Israeli Think Tank Compromised to Serve Sweet Orange Exploit Kit

The official website of a prominent Israel-based, Middle East foreign policy-focused think tank, the Jerusalem Center for Public Affairs (JCPA), has been compromised and abused by attackers to distribute malware.

The Israeli think tank website JCPA – an independent research institute focusing on Israeli security, regional diplomacy and international law – was serving the Sweet Orange exploit kit via drive-by downloads to push malware onto the computers of the website's visitors by exploiting software vulnerabilities, researchers from security firm Cyphort reported on Friday.

Sep 10 15:58

Largest Pirate Bay Proxy & More Blocked By UK ISPs

Update: The operator of PirateProxy informs us that a new domain is up and operational at PirateProxy.bz

Sep 10 14:16

LAPD Blames Predictive Software For Misconduct And Abuse, Rather Than Its Own Disinterest In Holding Officers Accountable

The LASD is finally acknowledging that it let its officers (and prison guards) act with impunity for far too many years. The system could have worked -- at least in its limited capabilities -- but no one wanted to follow up on flagged officers. The situation there has deteriorated to the point that the LASD is looking at a few years of federal supervision.

Sep 10 13:24

5 Million Gmail User Accounts, Passwords Hacked

Time to change your password again. A database containing nearly 5 million Gmail user accounts and passwords was leaked on Bitcoin Security, a popular Russian website devoted to the cryptocurrency.

Sep 10 12:39

Senators and Other Experts to Appeals Court: NSA's Phone Records Program Is a Massive Invasion of Privacy

Smith v. Obama, a challenge to the NSA’s warrantless collection of phone records, currently before the Ninth Circuit Court of Appeals, has received some high-profile support. In six amicus briefs filed yesterday, a range of groups add depth to our argument that the NSA’s activities are an extraordinary invasion of the privacy of innocent Americans.

Sep 10 12:17

5 million ‘compromised’ Google accounts leaked

A database of what appears to be some 5 million login and password pairs for Google accounts has been leaked to a Russian cyber security internet forum. It follows similar leaks of account data for popular Russian web services.

Webmaster's Commentary: 

And again, the NSA cannot find these crooks. Why? Are they the crooks themselves?

Sep 09 15:18

The Era Of Widespread Biometric Indentification And Microchip Implants Is Here

Are you ready to have your veins scanned every time you use your bank account? Are you ready to use a "digital tattoo" or a microchip implant to unlock your telephone? Once upon a time we read about such technologies in science fiction novels, but now they are here. The era of widespread biometric identification and microchip implants is upon us, and it is going to change the way that we live. Proponents of these new technologies say that they will make our private information and our bank accounts much more secure. But there are others that warn that these kinds of "Big Brother technologies" will set the stage for even more government intrusion into our lives. In the wrong hands, such technologies could prove to be an absolute nightmare.

Sep 09 10:04

AT&T and Verizon say 10Mbps is too fast for “broadband,” 4Mbps is enough -- AT&T and Verizon have asked the Federal Communications Commission not to change its definition of broadband from 4Mbps to 10Mbps

AT&T and Verizon have asked the Federal Communications Commission not to change its definition of broadband from 4Mbps to 10Mbps, saying many Internet users get by just fine at the lower speeds.
"Given the pace at which the industry is investing in advanced capabilities, there is no present need to redefine 'advanced' capabilities," AT&T wrote in a filing made public Friday after the FCC’s comment deadline (see FCC proceeding 14-126). "Consumer behavior strongly reinforces the conclusion that a 10Mbps service exceeds what many Americans need today to enable basic, high-quality transmissions," AT&T wrote later in its filing. Verizon made similar arguments.

Sep 09 10:04

FBI’s Story of Finding Silk Road’s Server Sounds a Lot Like Hacking

To hear the FBI tell it, tracking down the secret server behind the billion-dollar drug market known as the Silk Road was as easy as knocking on a door. The bureau’s latest court filing in the case describes how the hidden site accidentally revealed its location to anyone who visited its login page, thanks to a software misconfiguration.

Sep 09 09:41

Off-the-grid texting device GoTenna attracts antisurveillance crowd

Daniel Levy, a Web developer living in the Puna District of Hawaii, lived through a 12-day blackout after a rather vicious hurricane earlier this summer. Many residents in his community were stuck powerless until the local utility company restored the grid, while some subsisted on solar energy. It was after that, Levy said, that he sought a solution and came upon GoTenna.

The gadget -- a small Bluetooth-enabled rod packed to the brim with modern radio innards -- lets you create your own private, secure communication network for sending messages without cell service using your smartphone. Though marketed toward outdoors and emergency situations like hiking and disaster relief, GoTenna is getting a boost from the cryptography community. Levy, whose neighborhood gets little to zero reliable cell service, happens to represent both. He's among the more than 25 percent of GoTenna preorder customers who paid for the product with the cryptocurrency Bitcoin.

Webmaster's Commentary: 

IF this works as advertized, it sounds like a very cool gizmo!!

Sep 09 08:38

INFOGRAPHIC - Internet Security Threats

Through their Global Intelligence Network, Symantec have put together their annual report for 2014. It looks at the types of internet security threats and number of attacks as well as vulnerabilities and effects of the attacks. Symantec’s Network is one of the most advanced of its kind; it’s made up of more than 41.5 million attack sensors!

Aside from the many attacks on personal devices, which can cause a great amount of stress and financial problems for the victim (see Ransomware!), attacks on businesses can be catastrophic. Risks to corporations include reputational damage and loss of trust, lawsuits and bankruptcy. 2013 has officially become known as the year of the Mega Breach. The average number of identities exposed in 2013 was 2,181,891 compared with 604,826 in 2012. This was probably down to the campaigns lasting longer, resulting in 8 incidents exposing over 10million IDs compared with only 1 in 2012.

Webmaster's Commentary: 

The real question is, "Where is the NSA?"

For months we have been told that thew NSA, at huge taxpayer expense, has been violating the Constitution to monitor all of our computer activity.

So why are they not able to find these cyber-criminals?

There is no question that the NSA could use some good publicity; to demonstrate that they provide a useful service for all their cost and Constitutional crimes.

So why don't they?

Is it all a gigantic bluff to try to scare us into silence? If so, it does not appear to be working.

Or is the NSA itself, already acting in a lawless fashion, committing these crimes or in league with those who do?

THIS IS A CALL TO RIVERO'S RANGERS!

Wherever you see any story about any data breach, please post the above!

Sep 09 08:35

Biggest credit card breach in history

First it was Target.

Now it's Home Depot in what may well prove to be the biggest credit card data breach in history.

What's going on?

It's pretty simple. The companies that run these systems are not investing enough in making them secure and are hoping that the bill for not doing so will never come due.

Webmaster's Commentary: 

The real question is, "Where is the NSA?"

For months we have been told that thew NSA, at huge taxpayer expense, has been violating the Constitution to monitor all of our computer activity.

So why are they not able to find these cyber-criminals?

There is no question that the NSA could use some good publicity; to demonstrate that they provide a useful service for all their cost and Constitutional crimes.

So why don't they?

Is it all a gigantic bluff to try to scare us into silence? If so, it does not appear to be working.

Or is the NSA itself, already acting in a lawless fashion, committing these crimes or in league with those who do?

THIS IS A CALL TO RIVERO'S RANGERS!

Wherever you see the story about the Home Depot (or any other) data breach, please post the above!

Sep 08 18:45

Thousands get 'Peter Pan virus' phishing email

The email typically states that a MasterCard whose last four digits are 7006 was used to make the £145 purchase. It invites people to open some e-tickets which it says are attached.

...

According to Derek Knight at the My Online Security blog, those who open the attachment may find they have downloaded viruses and malware such as Cryptolocker. Cryptolocker typically locks the recipient out of their computer until they pay a ransom to the scammers.

"Almost all of these have a password-stealing component. Many of them are also designed to specifically steal your Facebook and other social network login details."

Sep 08 18:05

Amazon Cuts Struggling Phone’s Price to 99 Cents

Sixty thousand people vied to attend the unveiling of Amazon’s first smartphone in late June.

If only the retailer could persuade those fans — or anyone, really — to actually buy the device. The Amazon Fire is threatening to become the Amazon Fizzle.

On Monday, Amazon took a drastic step to avert disaster, announcing that it would charge 99 cents for the phone, basically giving it away if users signed a two-year contract with AT&T, the exclusive carrier.

Amazon has money to burn, and a relentless determination. But some analysts still wondered if a price drop of almost $200 was enough.

Sep 08 14:14

Facebook’s value to top $200B

FACEBOOK MAY EVENTUALLY BE THE BIGGEST CORPORATION IN THE WORLD

Sep 07 18:02

Record Labels Take Down Kim Dotcom’s Official Album… From Mega

In what could be one of the most ironic anti-piracy mistakes this year, music industry group IFPI has asked Mega to take down Kim Dotcom's very own music album Good Times. Mega was asked to remove its founder's music twice, casting doubt over the accuracy of the record labels' takedown efforts.

Sep 07 17:44

Apollo 11: The computers that put man on the moon

The so-called Apollo Guidance Computer (AGC) used a real time operating system, which enabled astronauts to enter simple commands by typing in pairs of nouns and verbs, to control the spacecraft. It was more basic than the electronics in modern toasters that have computer controlled stop/start/defrost buttons. It had approximately 64Kbyte of memory and operated at 0.043MHz.

WEBMASTER ADDITION: For a simulation of the Apollo computer control panel, CLICK HERE!

Sep 07 10:04

Religious Sites Carry More Malware Than Porn Sites, Security Firm Reports

Religious and ideological websites can carry three times more malware threats than pornography sites, according to research from security firm Symantec. The firm’s annualInternet Security Threat Report also found that threats to mobile devices continue to grow, almost exclusively for Google’s Android mobile OS.

Sep 07 09:05

This Site Is Messed Up!

I can't edit posts here anymore. I can't make comments on investment watch anymore. WTF is going on Mike?
The mutant spider dog story is a joke goin all over the net. If there was a humor and satire tag I wouldn't have commented in the first place!
Man hire somebody to read the posts before they go up cause it's making the site look foolish!

WRH REPLY: Your membership is working. Obviously you were able to post this comment. The mutant story was clearly labeled as humor and satire. Any problems you are having are at your end.

Sep 07 08:41

How To Kick Surveillance Devices From Your Network

A new low-cost gadget claims to protect your WiFi network from snooping devices . . . even drones. According to product notes from Cyborg Unplug:

'Plug to Unplug' ... detects and kicks devices known to pose a risk to personal privacy from your local wireless network, breaking uploads and streams. Detected devices currently include: Google Glass, Dropcam, small drones/copters, wireless 'spy' microphones...

Sep 07 08:36

Celebrity photo leak: Fake links to nude photos cause nationwide internet crash in New Zealand

New Zealanders keen to view hacked photos of naked celebrities have been blamed for a nationwide internet meltdown involving the country's main provider.

It is believed a handful of computer users clicked links on Friday evening believing they would be taken to the illicit images, but instead caused them to inadvertently install malware, triggering a crippling internet attack.

Webmaster's Commentary: 

A test to take down the internet during the next false-flag attack?

There is no way the perpetrators of a new 9-11 can allow the independent media to operate during a false-flag, lest we find and report the signs of fraud. Remember that in the weeks ahead of 9-11, the FBI was shutting down Muslim websites here in the US, to prevent the victims of the coming frame-up from defending themselves while the official story was implanted into the population.

And the fact that this shut down was confined by the planted malware to only New Zealand suggests it was an operational test.

So don't start clicking links to see naked celebrities this next week.

" To act with my clothes on is a performance. To act with my clothes off is a documentary." -- Julia Roberts

Sep 07 08:25

Patriot Act’s absurd new spawn: Just when you thought it couldn’t get any worse

Congress may be preparing to reinforce two horrible FISA Court decisions and an abusive government search with no debate in the coming weeks: a decision to give national security orders unlimited breadth, one making it legal for the government to investigate Americans for activities protected under the First Amendment, and the FBI’s “back door” searches of Americans’ communication content collected under the FISA Amendment Act Section 702 authority.

Webmaster's Commentary: 

Congress is most likely giving this approval because they know what these governmental agencies have on them!

Remember Chief Justice Robert's "flip-flop" on Obamacare?!? I am still rather curious as to precisely what "inspired" his change of heart!! :-)

And right after, he slipped out of the country for awhile so he couldn't be questioned on his reversal.

Sep 07 07:07

Makers: Escaping the Pull of Big-Business

3D printers, DIY biology, and the maker movement is now too big to be laughed off or ignored. It is now something big-business intends to first try to co-opt, then fight and destroy. Through SOPA/ACTA and various other intellectual property schemes, we can see in many ways, the fight has already begun. Defining and defending worthy principles is now more necessary than ever - and recognizing the folly of following individuals - be they people, companies, or brands - is utter folly. A sense of pragmatic awareness of principles over people and parties may help makers succeed where politics has habitually failed.

Sep 06 18:57

SEPTEMBER 10 INTERNET SLOWDOWN -- BE PART OF THE SOLUTION

the above link goes to the page for webadmins, bloggers, etc, to get the slowdown code.

the regular Netizen's page is here.

do it now, while you sre thinking about it!

or think -- where would we be without the web...

WEBMASTER ADDITION: Oh sure; let's slow the net down the day before FOX claimed there will be an ISIS attack on America!

Sep 06 15:41

How your innocent smartphone passes on almost your entire life to the secret service

So the next time you hear a minister, security expert or information officer say ‘Oh, but that’s only metadata,’ think of Ton Siedsma – the guy you now know so much about because he shared just a week of metadata with us.

Sep 06 15:35

Malware Can Bypasses Chrome Extension Security Feature Easily

Researchers have uncovered a new social engineering trick that leads users to a malicious extension from Google Chrome impersonating to deliver Adobe’s Flash Player in order to lure victims in a click fraud campaign.

Security experts at TrendMicro believe that the malware is triggered by opening Facebook or Twitter via shortened links provided in any social networking websites. Once clicked, the links may lead victims to a site that automatically downloads the malicious browser extension.

Sep 06 09:12

My Stumbling Days Are About Over!

Stumble has turned off my account it would appear. The last 6 weeks have been really difficult getting stuff up.
I put up the Make sure your Congressman see's this before November of the father holding his child with a brainless open skull plus the article about the IDF bombing an orphanage and the dairy that supports it. A couple of minutes after that I can't get into my account or post anymore!
Stumble has been turning off sites and individual webpages left and right and it has really gotten bad since Gaza and Ukraine.
If I can get back up I will but if not I hope I directed some traffic to WRH and all the bloggers who post here and we woke some more people up!
DRIP! DRIP! DRIP!as we slowly wash this mountain of hate,injustice and inequity into the oceans!

Sep 06 05:25

Google silent on support for group opposing net neutrality and muni broadband

Common Cause and more than 50 other advocacy groups this week called on Google to end its affiliation with the American Legislative Exchange Council (ALEC), a group that has pushed state laws limiting the rights of cities and towns to create community-owned broadband networks. ALEC also opposes network neutrality rules that Google used to be a staunch supporter of and last month urged the FCC to quickly approve Comcast’s purchase of Time Warner Cable without imposing any regulatory conditions on the merger

Sep 06 05:23

When NSA and FBI call for surveillance takeout, these companies deliver

Not every Internet provider can handle the demands of a Foreign Intelligence Surveillance Act warrant or law enforcement subpoena for data. For those companies, Zack Whittaker reports on ZDNet, the answer is to turn to a shadowy class of companies known as “trusted third parties” to do the black bag work of complying with the demands of the feds.

Under the Communications Assistance for Law Enforcement Act (CALEA), phone companies and Internet providers can charge back the government for their efforts in responding to warrants. AT&T charges the CIA more than $10 million per year for access to its phone call metadata. But smaller ISPs who aren’t frequently hit with warrants can’t afford to keep the infrastructure or manpower on-hand to respond to requests—so they sign up with a “trusted third party” capable of doing the work as an insurance policy against such requests.

Sep 05 17:01

YouTube, then and now

Sep 05 14:22

Obamacare site hacked but nothing taken, HHS says

NEW YORK (CNN) — Hackers silently infected a Healthcare.gov computer server this summer. But the malware didn't manage to steal anyone's data, federal officials say.

A computer server that routinely tests portions of the website wasn't properly set up. It was never supposed to be connected to the Internet — but someone had accidentally connected it anyway.

That left it open to attack, and on July 8, malware slipped past the Obamacare security system, officials said.

Sep 05 07:39

Meet the Russian-made tool that grabs nude selfies from iCloud accounts

There’s a seedy trade in compromising photos stored in Apple iCloud accounts, and it is in part aided by a software program that cleanly collects the data.

Some of the nude celebrity photos are believed to have first been circulated on Anon-IB, a definitely not safe-for-work forum. As reported by Wired, the forum is full of offers for iCloud “ripping,” or downloading the entire contents of an account.

The software tool they’re using is Moscow-based Elcomsoft’s Phone Password Breaker, or EPPB, one of many forensic tools the company develops for law enforcement and other clients.

Sep 05 06:24

How Covert Agents Infiltrate the Internet to Manipulate, Deceive, and Destroy Reputations

By publishing these stories one by one, our NBC reporting highlighted some of the key, discrete revelations: the monitoring of YouTube and Blogger, the targeting of Anonymous with the very same DDoS attacks they accuse “hacktivists” of using, the use of “honey traps” (luring people into compromising situations using sex) and destructive viruses.

Sep 04 19:19

UK Police Abused Anti-Terror Law To Snoop On Journalist's Phone Records Concerning Minor Political Spat

It's not a surprise that surveillance laws will be abused. But it's worth highlighting when they're abused so egregiously.

Sep 04 15:05

Newly Revealed NSA Program ICREACH Extends the NSA's Reach Even Further

Turns out, the DEA and FBI may know what medical conditions you have, whether you are having an affair, where you were last night, and more—all without any knowing that you have ever broken a law.

That’s because the DEA and FBI, as part of over 1000 analysts at 23 U.S. intelligence agencies, have the ability to peer over the NSA’s shoulder and see much of the NSA’s metadata with ICREACH.

Sep 04 15:01

The Latest Snowden Leak Is Devastating to NSA Defenders

The NSA collected "medical records sent from one family member to another, résumés from job hunters and academic transcripts of schoolchildren. In one photo, a young girl in religious dress beams at a camera outside a mosque. Scores of pictures show infants and toddlers in bathtubs, on swings, sprawled on their backs and kissed by their mothers. In some photos, men show off their physiques. In others, women model lingerie, leaning suggestively into a webcam ..."

Have you ever emailed a photograph of your child in the bathtub, or yourself flexing for the camera or modeling lingerie? If so, it could be your photo in the Washington Post newsroom right now, where it may or may not be secure going forward. In one case, a woman whose private communications were collected by the NSA found herself contacted by a reporter who'd read her correspondence.

Sep 04 15:01

HEALTHCARE.GOV HACKED!

A hacker broke into part of the HealthCare.gov insurance enrollment website in July and uploaded malicious software, according to federal officials.

Sep 04 14:42

Topeka Goodwill Among 20 Stores Affected By Data Security Breach

Goodwill of Topeka is one of 20 stores in Kansas affected by what the company is calling a data security issue.

Sep 04 13:59

Beware: Facebook's "Soft Censorship"

The Land Destroyer Report maintained a Facebook page under the name Anthony Cartalucci. Since 2009 it was used to express my personal thoughts regarding the news of the day, as well as share relevant links with followers. Today, Facebook, without warning or opportunity to appeal, decided that the Facebook account must be changed over to a "page." By doing so, all those following my account no longer would receive updates, because of Facebook's "news feed" filters.

Sep 04 13:58

What Hackers Did to Celebs? The NSA’s Been Doing That to All of the U.S. Instead of Predicting ISIL

ISIL, appears to have surprised them last June by taking over 40% of the major country of Iraq, which the U.S. surely had under intensive surveillance.

Sep 04 13:28

Did Dem Senate Candidate Cyrus Habib and Perkins Coie Lawyers Pay to Scrub Negative Internet Info?

Tuesday, August 26, 2014

Cyrusgate? Did Perkins Coie Advise Cyrus Habib to Internet Scrub and to Ignore Four Troublesome Questions in the 48th Senate Race Against Michelle Darnell?

Update 4 Sept. 2014: I am 99% certain that Cyrus Habib and Perkins Coie scrubbed the Internet to have negative information about him deleted.

See that negative return in the lower left corner?
Apparently no negative information about Cyrus Habib
will be allowed online. Sorry, I must have missed the memo.

Sep 04 13:14

No! Your data is not safe!: Hackers Used Government Spyware to Data-rob iCloud

One sensationally reported incident this week exposes a dual threat: your data isn't safe on a corporate-controlled "cloud" and spying software made for police and government agencies makes it completely accessible.

Sep 04 09:29

GOP-backed fake news sites target Dems in congressional races

This month, the National Republican Congressional Committee debuted at least 20 websites in key congressional districts—from Central Valley, California, to Augusta, Georgia—that are designed, albeit amateurishly, to look like news sites. One of them, “South Michigan Update,” sports the headline “Byrnes Struggles to Escape Her Record,” referring to Democrat Pamela Byrnes in Michigan’s 7th District. Like the other NRCC sites, the featured post attacks the Democratic candidate in the race. The piece has a byline credit to “Geoff,” though, as The Washington Post pointed out, most of “Geoff’s” posts are rewrites of content from the NRCC site. The spare South Michigan site has one other item: a video ad for the 7th District’s Republican incumbent, Tim Walberg, that is featured under the header, “Most Viewed.”

Sep 04 05:11

Russian MP says Google is spying for Ukraine

A ruling party MP plans to ask Russian law enforcers to investigate Google’s alleged ties with the Ukrainian special services and possible leaking of Russian citizens’ personal data.

Evgeny Fyodorov of the United Russia party has accused Google of taking “an openly anti-Russian position” in an interview with popular daily Izvestia. He added that he possessed information that Google had signed a cooperation agreement with Ukrainian special services, in particular the Security Service of Ukraine or SBU.

“Google remains in the jurisdiction of the United States of America and the USA is now officially seeking to weaken Russia and destabilize the situation. This is a direct order for all organizations that fall under its control,” Fyodorov told reporters.

Sep 03 17:05

Newly Revealed NSA Program ICREACH Extends the NSA's Reach Even Further

Nadia Kayyali
Electronic Frontier Foundation

Turns out, the DEA and FBI may know what medical conditions you have, whether you are having an affair, where you were last night, and more—all without any knowing that you have ever broken a law.

That’s because the DEA and FBI, as part of over 1000 analysts at 23 U.S. intelligence agencies, have the ability to peer over the NSA’s shoulder and see much of the NSA’s metadata with ICREACH.

Metadata is transactional data about communications, such as numbers dialed, email addresses sent to, and duration of phone calls, and it can be incredibly revealing....

Sep 03 12:13

Nation’s poor remain hungry as Wall Street feasts

PERSISTENT RATES OF FOOD INSECURITY REVEAL VAST INEQUITIES OF SO-CALLED “ECONOMIC RECOVERY” IN US, SAY ANTI-POVERTY ADVOCATES

Sep 03 09:09

Child pornography among hacked celebrity photographs posted online

Many of the nude photographs of A-list celebrities stolen from cloud constitute child pornography, The Daily Dot reports.

Sep 03 06:35

States Rights, Local Democracy, and the Future of Broadband

In July, the Federal Communications Commission (FCC) stirred up a hornets’ nest by announcing it might overturn state prohibitions on municipally owned broadband networks. Republicans protested that Washington should keep its grubby hands off state authority. Giant cable and phone companies contended that local governments are incapable of managing telecommunications networks and the resulting failure will burden taxpayers.

Sep 02 15:45

Net neutrality activists are about to show you what an Internet 'slow lane' looks like

In a move out of the anti-SOPA campaign playbook, Fight for the Future and other net neutrality activist groups have set up the Battle for the Net coalition, which plans to launch an “Internet slowdown day” later this month.

No actual traffic will be slowed down. Instead, participating sites will display embeddable modules that include a spinning “loading” symbol and information about contacting the Federal Communications Commission (FCC), the White House, and members of Congress.

Sep 02 15:22

Ricky Gervais prompts furious online backlash after blaming the victims of celebrity iCloud scandal

Ricky Gervais has received a backlash on Twitter after suggesting that the celebrities who had their nude photos hacked were to blame - because they had taken and stored the photos in the first place.

The comedian posted a message to his 5.99million followers saying: 'Celebrities, make it harder for hackers to get nude pics of you from your computer by not putting nude pics of yourself on the computer.'

His comment was quickly criticised online, and he was forced to delete the tweet before backtracking on the controversial claim.

We are living in a world where common sense is controversial.

Sep 02 12:01

Dem Perkins Coie Lawyer Cyrus Habib Dodges Questions in Washington 48th Dist. Senate Bid, Michelle Darnell Answers!

http://www.scribd.com/doc/238446808/Michelle-Darnell-Answers-Four-Toug...

In full disclosure I am listed as a team member for Michelle Darnell's campaign because she paid me $250 to make her first 3 videos. I haven't been paid a dime since then yet I continue to document what I am seeing in this race because I feel like it and I have just enough of my own money and time to do so. I am not part of the control group and I make no decisions on policy or any of that. I am just the guy with the camera, documenting Ms. Darnell and Mr. Habib.

*********

Why is Cyrus Habib hiding? Isn't Transparency the hallmark of the Democratic Party?

Sep 02 11:50

VIDEO: Surveillance society; Biometric ID cards, GHCQ protests, Micro-chipped clothing

George Osborne scamming the British public (again), RFID chips in Adidas clothes, biometric ID cards and GHCQ protest.

Sep 02 10:46

NSA Data-Sweep Lawfulness Challenged in NY Appeal Hearing

The National Security Agency’s program of collecting phone records, deemed lawful by a Manhattanfederal judge, was challenged by the American Civil Liberties Union as the most sweeping surveillance operation ever directed against the American public by the government.

Sep 02 07:10

Chattanooga: Fastest Internet in US

Yes, you read that right. Internet speeds as fast as 1 gigabit per second are the norm in the city of Chattanooga, Tennessee. Not the spot you might have predicted, would you. Certainly not the place I anticipated would have faster, better internet than anywhere else in the United States, and one of the faster internet speeds on the planet. Not only that, but the fast internet is helping to lead Chattanooga out of the economic doldrums.

Sep 02 05:09

FBI, Apple Investigate Nude Photo Leak Targeting Jennifer Lawrence, Others

As long as the FBI has its priorities straight -- "May the odds be ever in their favor!" (Remember the childhood joke? FBI = Female Body Inspector.)

I bet that the NSA is feeling really bad-ass right now.

Sep 01 15:13

'Cloud' concerns after celebrity picture leaks

One expert said that private data "becomes much more difficult to control" when using cloud services.

"It is important for celebrities and the general public to remember that images and data no longer just reside on the device that captured it," said Ken Westin, security analyst at Tripwire.

"Although many cloud providers may encrypt the data communications between the device and the cloud, it does not mean that the image and data is encrypted when the data is at rest.

"If you can view the image in the cloud service, so can a hacker."

Sep 01 10:29

The Server Needs To Die To Save The Internet

Do we have the Internet we deserve? There’s an argument to say that yes, we absolutely do. Given web users’ general reluctance to pay for content. We are of course, paying. Just not with cold hard cash, but with our privacy — as digital business models rely on gathering and selling intel on their users to make the money to pay (the investors who paid) for the free service.

A UK startup called MaidSafe, based in the small town of Troon in Scotland, reckons the myriad problems with today’s Internet can be linked to a design quirk of its underlying architecture. And that the answer to solving the web’s most perennial issues, such as finding sustainable digital business models for content, safeguarding user data and privacy, and thwarting hacking, malware and overreaching surveillance, is to begin again — with a whole new re-architected Internet.

Sep 01 09:47

Police State: US Government-Funded Database Created to Track “Subversive Propaganda” Online

The creation of the Truthy database by Indiana University researchers has drawn sharp criticism from free-speech advocates and others concerned over government censorship of political expression.

According to the award abstract accompanying the funding provided by the National Science Foundation (NSF), the Truthy project aims to demonstrate “why some ideas cause viral explosions while others are quickly forgotten.” In order to answer this and other questions, the resulting database will actively “[collect] and [analyze] massive streams of public microblogging data.”

Webmaster's Commentary: 

MOI, subversive?!?!? :-)

If telling the truth has become "subversive", this country might as well pack it in as the alleged "land of the free and the home of the brave". right now.

Sep 01 07:44

‘Partner and Target’: NSA spying on NATO ‘friend’ Turkey

Documents leaked by NSA whistleblower Edward Snowden show that Turkey is one of the agency’s top spying objectives, on a par with Venezuela and more than arch-foe Cuba – despite Ankara’s close cooperation with Washington on intelligence.

Aug 31 10:35

The US government can brand you a terrorist based on a Facebook post

The US government’s web of surveillance is vast and interconnected. Now we know just how opaque, inefficient and discriminatory it can be.

Aug 31 08:37

The US government can brand you a terrorist based on a Facebook post. We can't let them make up the rules

The US government’s web of surveillance is vast and interconnected. Now we know just how opaque, inefficient and discriminatory it can be.

As we were reminded again just this week, you can be pulled into the National Security Agency’s database quietly and quickly, and the consequences can be long and enduring. Through ICREACH, a Google-style search engine created for the intelligence community, the NSA provides data on private communications to 23 government agencies. More than 1,000 analysts had access to that information.

This kind of data sharing, however, isn’t limited to the latest from Edward Snowden’s NSA files. It was confirmed earlier this month that the FBI shares its master watchlist, the Terrorist Screening Database, with at least 22 foreign governments, countless federal agencies, state and local law enforcement, plus private contractors.

Aug 31 07:45

NSA Expanding Spying Programs With Advanced Capabalities

August 30, 2014 - A US geo-political analyst says the recent report about the National Security Agency (NSA) secretly providing data to nearly two dozen US government agencies via a powerful search engine illustrates how the advancement of technologies has given US intelligence agencies more capability to further expand their vast spying programs.

Citing classified documents provided by former NSA contractor Edward Snowden, The Intercept investigative site reported Monday that the NSA built its own “Google-like” search engine and shares hundreds of billions of digital records with federal law enforcement and several other US government agencies.

Aug 31 07:25

Google's Self-Driving Car Can't Navigate Heavy Rain Or Most Roads

Apparently the famous Google self-driving car isn't that close to giving us hands-free transportation after all.

While Google's fleet has safely driven more than 700,000 miles, the autonomous model relies so heavily on maps and detailed data that it can't yet drive itself in 99 percent of the country, according to an MIT Technology Review report.

Aug 30 11:44

The 3D-printed key that can unlock anything

Lockpicking just became a whole lot easier. Engineers Jos Weyers and Christian Holler can use 3D printing technology to produce ‘bump’ keys capable of opening millions of locks, without ever having seen the original keys.

Their DIY software Photobump requires only a picture of the lock in question, and couple of pieces of readily available information such as lock’s depth, to design a ‘bump’ key that can pick even the most sophisticated of security locks.

Aug 30 10:49

The US government can brand you a terrorist based on a Facebook post. We can't let them make up the rules -- Innocent people’s lives are being ruined.

The US government’s web of surveillance is vast and interconnected. Now we know just how opaque, inefficient and discriminatory it can be.

Aug 30 06:19

Microsoft And Privacy Violations: U.S. Judge Rules Microsoft Must Handover Personal Data

“Microsoft has been told it must handover emails stored abroad to US prosecutors by a New York court. However, the software giant says it will fight the ruling, saying that an email deserves the same privacy protection as a paper letter sent by mail.

The company says they will not release any emails to US authorities, while it appeals the ruling, made by Chief Judge Loretta Preska of the US District Court in Manhattan. She said that Microsoft must hand over information, regardless of where it was stored.

"Microsoft will not be turning over the email and plans to appeal,” a Microsoft spokesperson told Reuters. "Everyone agrees this case can and will proceed to the appeals court. This is simply about finding the appropriate procedure for that to happen."

Aug 29 15:57

Obama's NSA review gives the lie to Britain's timid platitudes: a debate is possible

What a relief. It is, after all, possible to discuss the operations of modern intelligence agencies without having to prove one's patriotism, be turned over by the police, summoned by politicians or visited by state-employed technicians with instructions to smash up one's computers.

Aug 29 12:40

13 Million Nigerians To Receive Mastercard's Biometric ID Card

With the intention of producing a National Identity Management System (NIMS), 13 million Nigerians will be issued with eID cards. The cards will hold highly sensitive information including; health insurance status, tax information, driver licensing, birth and death records, and there plans to use the cards for border control.

Perhaps most disturbingly, the card will also function as a payment method and are backed by Mastercard and will hold biometric information including 10 fingerprints and a retinal scan. Along side the biometric data, the invasive cards will carry two photographs of the holder.

Aug 29 11:49

Supreme Court Finds Internet Speech Injunctions Violate the First Amendment

The Texas Supreme Court today ruled that orders preventing people who have been found liable for defamation from publishing further statements about the plaintiff are “prior restraints,” a remedy that the First Amendment rarely permits. Adopting a position advocated by EFF in an amicus brief, the court also delightfully quoted The Big Lebowski's Walter Sobchak: "For your information, the Supreme Court has roundly rejected prior restraint." It further rejected the argument that the ability of Internet publication to reach millions of readers almost instantaneously somehow required a change in First Amendment law.

Aug 29 10:52

IN TIMES OF WAR: A PRAYER FOR PEACE - CLAIRE K. RIVERO

Webmaster's Commentary: 

I am reposting Claire's video as the US invades Iraq for the third time, Kiev fakes an invasion by Russia, Libya's US puppet rules are driven from office, and a new flood of TV commercials hits the corporate media networks reminding all 18 year-olds that they MUST register for selective service.

Optional Banner: 
WRH Exclusive
Aug 29 07:54

Net Neutrality Activists Take the Senate by Storm

The partisan bickering on Capitol Hill can turn the most wide-eyed idealist into a disillusioned crank. But progress is possible even in this era of legislative gridlock. That’s why Free Press Action Fund members meet with their elected officials: to effect change.

Aug 29 07:31

Thought those embarrassing Facebook photos were forgotten? Think again: Site tests tool that scours old posts in seconds

You might think those embarrassing Facebook posts from the past are long gone, but a new feature could soon see them making an unwelcome return.

Facebook is reportedly testing a feature on its mobile app that allows users to search through old posts from friends using keywords about people or events.

The move could make it easier for people to find content otherwise thought to be buried in the deep, recesses of your Facebook feed.

SHARE THIS ARTICLE WITH YOUR SOCIAL MEDIA