COMPUTERS/INTERNET/SECURITY

Aug 20 07:52

BUSTED! Gov. Running #Ferguson Twitter Psyop

Webmaster's Commentary: 

It is a fact that the US Government has spent millions of your tax dollars buying special software that allows government propagandists to create and use hundreds of fake identities to flood social media with US Government propaganda.

That they are provably using this system now to fan up the racial tensions tells us that indeed Ferguson is an operation to try to trigger mass race riots leading to martial law. DO NOT FALL FOR IT!

Shortly after exposing the government propaganda accounts, this poster was issued a warning form Twitter, implying that calling attention to these manufactured government accounts would suspend his own twitter account!

Aug 20 07:41

Researchers Hack Into Michigan’s Traffic Lights

Security flaws in a system of networked stoplights point to looming problems with an increasingly connected infrastructure.

Aug 20 07:38

Beyond Millennials: How to Reach Generation Z

As the average Facebook user gets older, more than 25% of 13- to 17-year-olds left the network in 2013.

Aug 20 07:18

Classified Information on Malaysia Airlines MH370 Case Stolen - Reports

Classified information from the computers of officials involved in the investigation into the disappearance of Malaysia Airlines MH370 has been stolen, The Star Online reported Wednesday.

The computers of the high-ranking officials are said to have been hacked and the stolen information was allegedly being sent to a computer in China before the Malaysian Science, Technology and Innovation Ministry blocked the transmissions, the website reported.

Webmaster's Commentary: 

This kind of skullduggery supports the theory that MH370 was shot down during a joint US/Thai military exercise, in an accident similar to that which killed TWA 800.

Aug 20 05:40

Database Shows What Military Equipment Your Local Police Department Has Been Stockpiling

There’s no doubt that domestic law enforcement agencies on every level have been ramping up their militarization efforts in recent years. In fact, it’s gotten so bad that it has prompted Senator Rand Paul to call for a demilitarization of domestic police departments. “The images and scenes we continue to see in Ferguson resemble war more than traditional police action,” notes Paul in a recent article.

Aug 20 00:39

Mass Produced Security Robots Introduced in U.S.

Waking Times

While debate continues to rage about the threat of autonomous “killer robots,” the mechanized replacement of humans continues across the workforce. In fact, the robotics industry notched record sales in the first half of 2014 in North America, and there appears to be no indications of a slowdown.

Aug 19 17:42

My prediction about Facebook came true

"The company is too important as a data-mining asset of the intelligence community to let it fall into disrepair and chaos."

Aug 19 14:48

California “Kill Switch” Bill Could Be Used to Disrupt Protests

This week’s events in Ferguson, Missouri highlight the risks of abuse all too clearly. Police have repeatedly attempted to disrupt protests and ordered both demonstrators and press to turn off recording devices. If the California bill were in place in Missouri, these officers might deploy the government kill switch alongside tear gas and rubber bullets, using the mandated technology to stop coordination between protesters, cut off access to outside information, and shut down video recordings that can deter police misconduct.

The purpose of the California kill switch bill may be to turn stolen phones into worthless “bricks,” but in its current form it could be used to brick protests that police disapprove of. Such a measure is unnecessary, and highly dangerous to the exercise of civil liberties.

Aug 19 14:43

Who Needs SOPA? US Court Wipes Sites From The Internet For 'Infringement' Without Even Alerting Sites In Question

TorrentFreak has the exceptionally troubling story of a federal district court in Oregon issuing an incredibly broad and questionable order, effectively wiping a bunch of websites out, without ever letting the websites in question know that they were being "tried" in court. The request came from ABS-CBN, a giant Filipino entertainment company arguing infringement, of course. But the argument against these sites is somewhat questionable already, made worse by the demand that the whole thing be done under seal (without alerting the site operators). Then Judge Anna Brown granted the temporary restraining order, basically deleting these sites from the internet, without even a sniff of an adversarial hearing.

Aug 19 09:41

Hospital network hacked, 4.5 million records stolen

Community Health Systems, which operates 206 hospitals across the United States, announced on Monday that hackers recently broke into its computers and stole data on 4.5 million patients.

Hackers have gained access to their names, Social Security numbers, physical addresses, birthdays and telephone numbers.

Aug 19 09:30

Mass Produced Security Robots Introduced in U.S.

Activist Post

While debate continues to rage about the threat of autonomous "killer robots," the mechanized replacement of humans continues across the workforce. In fact, the robotics industry notched record sales in the first half of 2014 in North America, and there appears to be no indications of a slowdown.

Security robots have become a special area of interest for developers...

Aug 19 08:37

Every American town should do what Rockport, Maine and Chattanooga, Tennessee have done and build a publically-owned fiber-optic network. If they can't afford to do that, the state or federal government should step in and help them finish the job, just li

As Americans, we love to think we're number one, but the truth is that when it comes to internet speed we're pretty mediocre.

In fact, one recent study put the U.S. at number 31 in the world in overall download speed, lagging behind much smaller and less developed countries like Estonia, Hungary, and Slovakia.
Internet speeds in the U.S. average out around 20.77 megabits per second, which is less than half of the average internet speed in Hong Kong, which has the world's fastest internet.

Aug 18 14:04

Why Twitter's new verified feature is disastrous for #Ferguson

In an effort to encourage its verified users to engage with one another, Twitter announced mid last week that its verified users would get a new set of tools that lets them screen out conversations from non-verified users. The system essentially builds an underclass into the most democratic social network ever made, by giving its verified users preferential treatment.

Aug 18 10:37

New Anti Police State App Helps You "See Something, Say Something" in Real-Time

Activist Post

Recent studies have shown that police are held almost completely unaccountable by the current systems of governmental oversight. Perhaps this is the reason why you are 9 times more likely to be killed by a law enforcement officer than a terrorist. Rather than wait for bloated bureaucracy or corrupt government to save the day, we as activists have to find our own solutions. Technology is one of these solutions...

Aug 18 10:12

Apple’s Cook Kicks Off ‘Made in USA’ Push With Mac Pro

Apple Inc. is taking orders today for the new Mac Pro personal computer, which is being built in Texas with components made domestically as part of Chief Executive Officer Tim Cook’s $100 million Made-in-the-USA push.

“We have begun manufacturing the Mac Pro in Austin,” Cook wrote in a posting yesterday on Twitter. “It’s the most powerful Mac ever.”

Webmaster's Commentary: 

Obviously, I hope this turns out to be a good product, and I am willing to accept one for testing and review! :)

Seriously, I would love to see the USA start to make quality products and I wish them success.

But...

Back when we were switching over to LED lights to get away from the toxic problems with the CFLs, I bought some of the Phillips LED lights, but mostly the CREE LED bulbs that are manufactured here in the US. So far, not a problem with the Philips lights. None. But we are seeing about a 30% failure rate for the CREE lamps over six months, including the glass globes simply falling off.

Aug 18 06:38

Anti-Piracy Outfit Wants to Hijack Browsers Until Fine Paid

Piracy monetization service Rightscorp has provided investors with details of its end game with cooperative ISPs. Initially service providers are asked to forward notices to subscribers with requests for $20.00 settlements, but the eventual plan is to hijack the browsers of alleged pirates until they've actually paid up.

Aug 18 06:36

Yahoo ads network helps hackers spread CryptoWall ransomware

This isn’t the first time that Yahoo’s ads have been tainted by the stench of malvertising.

In January, for instance, Fox IT reported that visitors to Yahoo’s website were bombarded with malicious adverts that attempted to infect computers with a wide array of financially-motivated malware.

Later in the same month, there were claims made that Bitcoin-mining malware had been spread via Yahoo ads.

Aug 18 06:27

The Windows Store is a Cesspool of Scams — Why Doesn’t Microsoft Care?

Microsoft’s Windows Store is a mess. It’s full of apps that exist only to scam people and take their money. Why doesn’t Microsoft care that their flagship app store is such a cesspool?

It’s now been more than two years since Windows 8 was released, and this has been a problem the entire time, and it is getting worse. If Microsoft was trying to offer a safe app store to Windows users, they’ve failed.

The Store is Full of Scams, And They’re Easy to Find.

Aug 18 06:22

BUSTED! Governments Hire Web Trolls to Sway Public Opinion

Aug 18 06:02

How Various Law Enforcement Agencies Could Hack Your Computer Via YouTube Videos

"..Companies such as Hacking Team and FinFisher sell devices called “network injection appliances.” These are racks of physical machines deployed inside internet service providers around the world, which allow for the simple exploitation of targets. In order to do this, they inject malicious content into people’s everyday internet browsing traffic.

One way that Hacking Team accomplishes this is by taking advantage of unencrypted YouTube video streams to compromise users. The Hacking Team device targets a user, waits for that user to watch a YouTube clip like the one above, and intercepts that traffic and replaces it with malicious code that gives the operator total control over the target’s computer without his or her knowledge. The machine also exploits Microsoft’s login.live.com web site in the same manner.."

Aug 17 19:29

After Blue Screen of Death reports, Microsoft says to uninstall recent patch

For instructions on how to uninstall this update, see Microsoft Knowledge Base Article 2982791.

Aug 17 07:10

Leaked: Comcast’s Insanely Detailed Manual for Persuading Customers Not to Cancel Their Service

The Verge has obtained a leaked manual that describes, in minute detail, the 13-step process that retention team members use to keep us from cutting Comcast's cords. It includes sentence-by-sentence instructions on the proper way to greet the customer, "set the agenda," "take control of the conversation," "overcome objections," and "close the save."

Aug 17 07:08

Revealed ... GCHQ's incredible hacking tool to sweep net for vulnerabilities: Nmap

For the past five years, British spying nerve-center GCHQ has been port scanning internet-connected computers in 27 countries – in a exhaustive hunt for systems to potentially exploit.

That bombshell comes amid fresh leaks detailing the dragnet surveillance programs operated by the Five Eyes nations: America, UK, Canada, Australia and New Zealand.

German publisher Heise reports that the HACIENDA program scans open ports on all public-facing servers to seek out vulnerable systems – a basic reconnaissance strategy adopted by countless hackers and other curious folk.

As well as simple port scans, GCHQ also stashes the banner text sent by some server software to connecting clients, and other data.

Aug 17 06:59

Google Maps Has Been Tracking Your Every Move, And There’s A Website To Prove It

We all know that no matter what ‘privacy’ settings you may try and implement, our information is all being collected and stored somewhere. That knowledge sits in the back of our minds, and is easy to drown out by shoving in some headphones and watching Adventure Time on repeat until everything stops being 1984. But it’s a sharp jolt back to reality when you see a two dimensional image marking your daily commute with occasional detours to the cinema or a friend’s house.

Aug 17 06:56

NSA BIOS Backdoor a.k.a. God Mode Malware

This article is the first part of a series on NSA BIOS backdoor internals. Before we begin, I’d like to point out why these malwares are classified as “god mode.” First, most of the malware uses an internal (NSA) codename in the realms of “gods,” such as DEITYBOUNCE, GODSURGE, etc. Second, these malwares have capabilities similar to “god mode” cheats in video games, which make the player using it close to being invincible. This is the case with this type of malware because it is very hard to detect and remove, even with the most sophisticated anti-malware tools, during its possible deployment timeframe.

This part of the series focuses on the DEITYBOUNCE malware described in the NSA ANT Server document, leaked by Edward Snowden.

Aug 16 11:08

Sen. Wyden: Your data’s yours no matter on whose server it lives

At the TechFestNW event in Portland on Friday, Oregon Sen. Ron Wyden called for legal reforms that embrace an understanding that the mere act of handing over digital data doesn't mean giving way a user's right to privacy.

Aug 16 08:31

Julie Bishop's mobile phone compromised while she negotiated access to MH17 crash site

The mobile phone of Foreign Affairs Minister Julie Bishop was compromised while she was overseas negotiating access to the Malaysia Airlines MH17 crash site, it has been revealed.

Ms Bishop travelled to Ukraine, the Netherlands and the United States during her two-week trip to secure access to the site in eastern Ukraine.

Aug 16 07:31

Facebook orders war hero who lost both legs and an arm in Afghanistan to remove picture of his 'offensive' stump

A war hero who lost both legs and an arm while serving in Afghanistan has called Facebook 'harsh and narrow-minded' after they removed a picture of one of his stumps because it was 'offensive'.

Former Corporal Andy Reid, 37, from St Helens, Merseyside became a triple-amputee when a landmine exploded while he was on patrol in Helmand Province in 2009.

The father-of-one posted the picture of his stump with the caption 'hard work on the legs today'.

But it was taken down by the social media's site communities team after a user complained about it.

The site removed the innocent image, despite the fact it does not ban violent clips, including beheadings.

Aug 15 18:32

The Gyroscopes in Your Phone Could Let Apps Eavesdrop on Conversations

In the age of surveillance paranoia, most smartphone users know better than to give a random app or website permission to use their device’s microphone. But researchers have found there’s another, little-considered sensor in modern phones that can also listen in on their conversations. And it doesn’t even need to ask.

In a presentation at the Usenix security conference next week, researchers from Stanford University and Israel’s defense research group Rafael plan to present a technique for using a smartphone to surreptitiously eavesdrop on conversations in a room—not with a gadget’s microphone, but with its gyroscopes, the sensors designed measure the phone’s orientation.

...

And unlike the actual mics built into phones, there’s no way for users of the Android phones they tested to deny an app or website access to those sensors’ data.

Aug 15 15:28

Seventh Circuit Saves Batman From Crazy Trademark Attack

The events depicted in the superhero movie The Dark Knight Rises are not real. For example, when Cat Woman pursues software called “Clean Slate” to erase all traces of her criminal past, you are watching a fictional character seek fictional software. If that point strikes you as obvious, then you may have trouble comprehending the trademark claim in Fortres Grand v. Warner Brothers. In that case, software company Fortres Grand claimed that the movie’s use of the words ‘clean slate’ infringed its trademark on a real piece of software with the that name.

Aug 15 14:18

Senate must follow House’s lead on Internet access tax

Last month, the House of Representatives gave consumers a little love when lawmakers voted to make a long-standing ban on Internet access taxes permanent.

The moratorium, otherwise known as the Internet Tax Freedom Act, prohibits states or their political subdivisions from imposing taxes on Internet access or from applying multiple or discriminatory taxes on electronic commerce. But unless Majority Leader Harry Reid, D-Nev., and the U.S. Senate take up a measure to extend the ITFA protections, this important act will expire Nov. 1.

State and local governments who view the expiration of ITFA as a way to raise revenue through new taxes to replenish their overspent coffers are clamoring over this legislation.

Aug 15 13:47

Snowden discusses US surveillance and cyber-warfare programs in interview with Wired

Wired magazine published an extended interview this week with former US intelligence agent and famed whistleblower Edward Snowden. Conducted in a hotel room somewhere in Russia, the interview included fresh revelations related to mass surveillance, cyber-warfare and information-grabbing operations mounted by the US National Security Agency (NSA).

The meat of the interview centered on a number of operations run by the surveillance and intelligence agencies, painting a picture of an American government engaged in ever-expanding cyber-machinations worldwide.

Aug 15 12:50

Stafne Law Crushes MERS, Fidelity and Deutsche Bank in Knecht v. Fidelity Summary Judgment Case: MERS Assignment a Legal Nullity.

Another homeowner victory. As usual, KingCast and Mortgage Movies cameras were nearby.

Friday, August 15, 2014

KingCast and Mortgage Movies Celebrate as Stafne Law Crushes MERS, Fidelity and Deutsche Bank in Knecht v. Fidelity Summary Judgment; MERS Assignment a Legal Nullity.

Above: Attorneys Scott Stafne and Josh Trumbull at the command center
as we discussed the ramifications of yesterday's Federal Court victory.

Aug 15 12:43

Questioning Edward Snowden’s Cure-All

Ed Snowden recently gave fellow NSA whistleblower James Bamford an “extended cut” interview in Moscow.1 While Snowden offered up a few morsels of headline-worthy information, like how he purposefully left forensic artifacts for investigators or details on the NSA’s automated cyber-attack system called MonsterMind, Bamford’s piece ends with Snowden describing what he views as the answer to the NSA’s global surveillance program:

We have the means and we have the technology to end mass surveillance without any legislative action at all, without any policy changes… By basically adopting changes like making encryption a universal standard—where all communications are encrypted by default—we can end mass surveillance not just in the United States but around the world.

So, that’s it, huh? All we need is strong crypto? Download the latest app and guaranteed civil liberties are but a click away…

Pleasant fiction, caws your humble narrator.

Aug 15 10:19

NSA cyberwarfare could pick wrong targets, Snowden says

The National Security Agency is planning to combat cyberattacks from overseas with a sophisticated yet highly risky program code-named ‘MonsterMind,’ warns whistleblower Edward Snowden.

Aug 15 09:56

Judge Demands Answers After IRS Contradicts Sworn Testimony

U.S. District Court Judge Emmet Sullivan Thursday ordered the Internal Revenue Service to come up with new answers after IRS employees contradicted sworn testimony about damage to Lois Lerner’s hard drive.

Aug 15 08:38

Canadian Robot Producer First To Denounce Killer Robots

Nicholas West
Activist Post

For the first time, a robot manufacturer is sounding the alarm and taking a clear stance against the pursuit of these systems. Clearpath Robotics Co-Founder and CTO, Ryan Gariepy, is offering an open letter that is a must-read, as it clearly focuses on ethics - something that consistently has been left out of the equation thus far...

Aug 15 08:11

Microsoft considered rebranding Internet Explorer to escape negative perception

Microsoft's Internet Explorer has a bit of a brand identity issue on its hands. Because of decisions made many, many years ago, Internet Explorer 6 has left a sour taste in the mouths of developers and consumers.

Aug 15 07:44

20 vehicles most vulnerable to hackers, putting drivers at risk of theft, hijacking, tracking and remote assassination

In 2013, when professional hackers Charlie Miller and Chris Valasek demonstrated that it was possible to hijack the steering and brakes of a Ford Escape and a Toyota Prius using only laptops connected to the autos, they raised two questions.

First, could hackers perform the same thing wirelessly or, perhaps, even over the Internet? And secondly, what other specific vehicles are vulnerable?

"If you own a Cadillac Escalade, a Jeep Cherokee or an Infiniti Q50, you may not like the answer," Wired reports

Learn more: http://www.naturalnews.com/046468_vehicle_security_hackers_theft.html#...

Aug 15 07:29

Watchdog: The FBI Spied on the Wrong People Because of Typos

The FBI unintentionally spied on the communications data of some Americans who were not targets of investigations because of typographical errors, according to a government watchdog.

The Justice Department's inspector general concluded in a report Thursday that the FBI has improved its overall handling of national security letters, which permit the agency to collect telephone and Internet data of suspects believed to be tied to a national security investigation.

But the inspector general identified a number of areas that "require additional effort and attention," such as a tendency to collect data on the wrong person because of routine mistakes.

Aug 15 06:13

Selling your Tesco Hudl? Beware: Processor flaw means private data remains on the device - even after a factory reset

A bug in the processor that powers the popular Tesco Hudl tablet could be leaving private data at risk.

Investigations carried out by security researchers and the BBC discovered that they could retrieve ‘deleted’ data from second-hand models of the device.

Experts typically advise carrying out a factory reset to remove data from any gadget, but the investigation has revealed this technique may not always work on the supermarket’s tablet.

Aug 14 17:42

Would you like fraud with that? Ingenious bank scam targets wealthy diners as they pay for restaurant meals

The campaign group is urging restaurant owners to be vigilant as fraudsters attempt to dupe them into allowing patrons to pass over bank security details.

The scam involves a fraudster posing as bank staff in a telephone call to the restaurant. They tell the restaurant there is a problem with the card payments system at the premises and asks them to redirect card payments to a phone number provided by the fraudster.

FFA UK says that when the restaurant then calls the phone number, the fraudster asks to speak with the paying customer to go through security questions.

Once sufficient security details have been skimmed, the fraudster will instruct the restaurant to put the transaction through.

The scammer then calls the customer’s bank and attempts to transfer money to their own account using the fraudulently obtained security details.

Aug 14 12:41

Snowden Reveals NSA Program Described as 'Last Straw' Before Leak

In an in-depth interview published by Wired Magazine on Wednesday, Edward Snowden discloses what government activities proved to be the "last straw," prompting the whistleblower to expose the depths of the National Security Agency's secret surveillance operation.

Speaking with investigative journalist James Bamford—who blew the whistle on a government eavesdropping program when stationed in Hawaii during the Vietnam War and later wrote a number of best-selling books about government secrecy and the NSA—Snowden reveals how a botched U.S. government hacking operation caused Syria's 2012 internet blackout.

Aug 14 11:57

Keep Big Telecom's hands off our net

Decision-makers at the CRTC are undertaking a crucial consultation1 that could profoundly impact digital services in Canada – including how we use the Internet.

For too long now, Canadians have watched our global counterparts surpass us when it comes to accessing exciting, affordable, and innovative digital services. But this CRTC hearing could be our chance to change all of that.

Aug 14 10:03

The real Skynet: New NSA autonomous weapons system intercepts threats and retaliates automatically

They could just as easily have called it Skynet, the computer network of Terminator franchise fame that eventually led to the destruction of the modern world.

Aug 14 09:11

"Anonymous" Releases Name of Alleged Michael Brown Shooter; Governor Relieves Local Police of Protest Duty

The hacker collective Anonymous on Thursday released the name of the police officer it believes shot unarmed teenager Michael Brown, a day after releasing raw audio files from the St. Louis police dispatch the day of the killing, but neither has been confirmed by authorities.

Aug 14 08:32

Law Enforcement Ask Public to Not Use Social Media During Emergencies

Police in Washington State are asking the public to stop tweeting during shootings and manhunts to avoid accidentally telling the bad guys what officers are doing.

Webmaster's Commentary: 

To judge by Ferguson, we are ALL "bad guys" now, so you will forgive us if we fail to comply.

Aug 14 08:23

How computer hackers changed the Ferguson protests

Exposed to the light the cops run like cockroaches when you turn on the light!

FERGUSON • The Internet crashed at City Hall here on Tuesday morning. Ferguson’s website went dark. The phones died.

City officials didn’t say what happened — only that a flood of traffic aimed at the City Hall website “just kept coming.”And the hackers vowed retribution if police harmed protesters.

“We are watching you very closely,” Anonymous’ distinctive electronic voice rasped in a video posted Monday on Twitter. “If you abuse, harass or harm the protesters in Ferguson we will take every Web-based asset of your departments and federal agencies offline.”

The hackers would also, the video continued, begin publicly releasing police officers’ personal information.

Then they did.

Early Tuesday morning, someone posted the home address and phone number of Jon Belmar, the relatively new chief of St. Louis County police. And that was just the beginning.

Aug 14 06:28

The Facebook Messenger backlash: Reviewers flock to complain as experts raise concerns about its privacy controls

Facebook has begun forcing people to use Messenger after announcing its split for the main app in April.

Members have been left annoyed and outraged by the changes, and have flocked to the Android app store Google Play to complain.

This is in addition to concerns being raised about the app’s permissions, that give Facebook access to send texts and make calls on the user’s device.

According to Google Play, the app has access to find accounts on the device, read contacts, access the user’s, as well as edit, read and receive text messages.

Other permissions give Facebook the ability to directly call phone numbers, modify or delete files on USB storage, take pictures and videos, record audio, download files without notification, control vibration and change network connectivity.

Aug 14 06:23

NSA bot MonsterMind can wage cyberwar on its own – Snowden

The US National Security Agency owns a “MonsterMind” program designed to prevent foreign cyberattacks and, also, automatically strike back, former NSA contractor Edward Snowden told Wired magazine.

In his latest revelation, Snowden said that the defense software in the works would robotically hunt for the launches of foreign cyberattacks against the US and neutralize them.

Aug 13 18:20

NSA bot MonsterMind can wage cyberwar on its own – Snowden

The US National Security Agency owns a “MonsterMind” program designed to prevent foreign cyberattacks and, also, automatically strike back, former NSA contractor Edward Snowden told Wired magazine.

In his latest revelation, Snowden said that the defense software in the works would robotically hunt for the launches of foreign cyberattacks against the US and neutralize them.

Aug 13 16:48

The Real Skynet: New NSA Autonomous Weapons System Intercepts Threats and Retaliates Automatically

The name of it is telling.

“MonsterMind.”

They could just as easily have called it Skynet, the computer network of Terminator franchise fame that eventually led to the destruction of the modern world.

Though not as advanced just yet, MonsterMind is a new autonomous cyber weapons system developed by the National Security Agency and according to Edward Snowden is capable of not only intercepting every single digital communication within the United States, but it can automatically detect and launch retaliatory strikes without any human involvement if a threat has been identified.

Aug 13 16:18

New NSA Autonomous Weapons System Intercepts Threats and Retaliates Automatically

The name of it is telling.

“MonsterMind.”

It’s a new autonomous cyber weapons system developed by the National Security Agency and according to Edward Snowden is capable of not only intercepting every single digital communication within the United States, but it can automatically detect and launch retaliatory strikes without any human involvement if a threat has been identified.

Aug 13 16:14

Bad Idea: California Legislature Passes Bill To Mandate Mobile Phone Kill Switches

The reasoning behind this bill seems sound: a kill switch makes stealing phones less valuable, thereby decreasing phone theft. But, the mandate is dangerous for a number of reasons. If individuals want to use a kill switch there are plenty of third party apps they can get to do that themselves. But much scarier is how such kill switches will undoubtedly be abused. Having a single technology that can brick a ton of phones will be a very tempting target for hackers. And, it will probably be even more tempting for law enforcement for a variety of reasons. Someone videotaped the police doing something bad? Instead of having to go confiscate the phone, why not just brick it from afar? This seems like yet another bill pushed with good intentions that risks some very dangerous consequences.

Aug 13 14:51

Today in the Surveillance State: The Ghost of Seattle's Wireless Mesh Network Briefly Returns

Yesterday, the Seattle Times reported on civil-liberties advocates who noticed that part of the wireless mesh network was still up and running—and registering on their cell phones during a protest against a new youth jail. The SPD said it was an accident, claiming that "the 'rogue node' had been inadvertently activated when a contractor restored power to the pole."

Aug 13 14:48

Seattle Police Department "Forgets" To Turn Off Mesh Network

Much like other Wi-Fi hot spots, the nodes can collect and retain the identification of individual cellphone users and potentially track them as they move around the city.

The police quickly apologized and said the “rogue node” had been inadvertently activated when a contractor restored power to the pole. Department officials assured the public that it had quickly been turned off again.

Aug 13 13:32

In Midst of War, Israel Clamps Down on Internal Dissent

As a tenuous ceasefire takes hold, the besieged Gaza strip must contend with the path of death and destruction left by Israel's month-long military assault, including 1,939 Palestinian lives lost, 9,886 wounded, over 200,000 displaced, and more than 10,000 Palestinian housing units severely damaged or completely ruined.

Aug 13 13:03

Snowden: Clapper comments pushed me to become leaker

Edward Snowden says dishonest comments to Congress by the US intelligence chief were the final straw that prompted him to flee the country and reveal a trove of national security documents.

In an interview with Wired magazine over several days in Moscow, Snowden said he had been long been troubled by the activities of the National Security Agency, which employed him as a contractor.

But it was only when Director of National Intelligence James Clapper told lawmakers that the agency does "not wittingly" collect data on millions of American citizens that he was angry enough to act.

Aug 13 12:49

Snowden: NSA Took Down Syria’s Internet, Targeted China

National Security whistleblower Edward Snowden claims the super-secret agency was responsible for taking down Syria’s internet two years ago.

The former NSA employee now living in Russia told WIRED the agency inadvertently took down the country’s only ISP when it attempted to insert a backdoor on the network.

Aug 13 12:43

Snowden casts doubt on NSA investigation into security disclosures

National Security Agency whistleblower Edward Snowden has called into question the competence of the investigation into the aftermath of his disclosures, which was overseen by the NSA’s new deputy director, Rick Ledgett.

In a new cover story for Wired magazine, the former NSA contractor provided writer James Bamford with previously unreported allegations of NSA cyberattack tools, including a piece of software, codenamed MonsterMind, that would automate a hostile response when it detected a network intrusion. He also alleged that a 2012 incident that took Syria’s internet offline was the fault of the NSA.

Aug 13 09:31

Snowden: NSA has secret ‘MonsterMind’ program that operates without human intervention

In his latest revelation, Snowden tells WIRED magazine that the NSA has a secret, autonomous program called “Monstermind” that can respond to cyberattacks from other countries without human intervention.

And beyond domestic privacy concerns, Snowden warns, the program could cause an international diplomacy nightmare for the U.S. as well, because the cyberattacks launched by MonsterMind are often routed through third-party computers housed in foreign countries.

“These attacks can be spoofed,” Snowden said. “You could have someone sitting in China, for example, making it appear that one of these attacks is originating in Russia. And then we end up shooting back at a Russian hospital. What happens next?”

Aug 13 09:17

NSA was responsible for 2012 Syrian internet blackout, Snowden says

When Syria's access to the internet was cut for two days back in 2012, it apparently wasn't the fault of dissenting "terrorists," as the Syrian government claimed: according to Wired, it was the fault of the US government. In a long profile of Edward Snowden published today, Wired writes what Snowden says is the truth about the internet outage. An elite hacking unit in the National Security Agency had reportedly been attempting to install malware on a central router within Syria — a feat that would have allowed the agency to access a good amount of the country's internet traffic. Instead, it ended up accidentally rendered the router unusable, causing Syria's internet connection to go dark.

Aug 13 09:16

NSA was responsible for 2012 Syrian internet blackout, Snowden says

Former National Security Agency contractor Edward Snowden says the NSA was responsible for a 2012 Syrian Internet outage, in a new profile published Wednesday by Wired.

Aug 13 06:31

Comcast customer charged $182 after being told he wouldn't be billed, finally got a refund when he played agent their TAPED conversations - now you can listen too

A Comcast customer grew so frustrated with the poor service he received that he recorded his calls with the cable company and used them to prove that they lied to him about charges.

The man, who declined to give his real name but calls himself ‘Tim Davis’ online, posted his exchanges on YouTube on Sunday and claims the company only refunded him $182 in unnecessary charges after he played them his recording of the exchanges.

Aug 13 05:08

The billion dollar web site you paid for

Perhaps no news about HealthCare.gov, the Federal healthcare exchange website and supporting systems, is shocking anymore. We all know that it was an utter disaster at launch on October 1, 2013 and was completely unusable for some time thereafter. But eventually they got it to the point of being usable, so no harm no foul, right?

You may not think so after reading the recent GAO (Government Accountability Office) report HEALTHCARE.GOV — Ineffective Planning and Oversight Practices Underscore the Need for Improved Contract Management. The report is embedded at the bottom of this story.

Not only was the project a technical disaster — development was originally supposed to be complete October 1, 2013, but the schedule is now for the end of 2014 — but it has cost far, far beyond what was budgeted and far further than what could be called reasonable for such a system.

Aug 12 17:06

Shopper Tracking Device Embedded in Store Mannequins

John Galt
Activist Post

The search for predictive behavior technology to target shopping habits has been a contentious one in the United States. Several years ago a notice appeared at Promenade Temecula in California, and Short Pump Town Center in Richmond, Va. which advised shoppers that their cell phone signal would be used to track them as they move from store to store. Despite privacy assurances, that test-run produced enough outrage to force the UK maker of the technology, Path Intelligence, as well as mall management to halt the surveillance. Senator Charles Schumer was embroiled in the debate and subsequently put forth a Code of Conduct "to promote consumer privacy and responsible data use for retail location analytics." It's been described as a step in the right direction, while other lawmakers still see major privacy gaps.

Aug 12 17:04

Youtube Truther Dahboo7 Claims PC Remotely Hacked

With 100,000+ Subscribers - Erased All His Videos

Aug 12 16:39

Secret programs to stay secret: Court sides with NSA in surveillance lawsuit

A federal judge in California sided mostly with the United States government this week in a decision handed down concerning classified documents pertaining to the National Security Agency’s secret surveillance programs.

Judge Yvonne Gonzalez Rogers, a justice in the US District Court for the district of Northern California, said on Monday that the Department of Justice does not have to disclose two sets of documents among the three requested in a lawsuit filed by the Electronic Frontier Foundation, a California-based digital rights group.

Aug 12 12:16

Twitter reveals 23M of its active accounts are bots

Almost 9 percent of active accounts are bots, which post updates automatically without the input of an actual person.

Aug 12 09:20

‘Kill switch’ smartphone bill passes in California

ALL PHONES SOLD IN THE STATE WILL BE MANDATED TO INTEGRATE CONTROVERSIAL TECHNOLOGY

Aug 12 08:58

Smartphone ‘kill switch’ bill moves to California governor’s desk

In an effort to protect personal data from falling into the hands of thieves, a bill that requires mandatory technology on all smartphones sold in California is one step away from becoming law after a California Senate vote on Monday.

California legislators are attempting to deal a blow to thieves who have made smartphone theft almost an epidemic crime in America’s most populous state. Smartphone theft accounts for more than half of all crimes in some of the state's biggest cities, including San Francisco and Oakland.

Aug 11 18:11

Immunicity Resurrected by Anti-Censorship Supporters

Less than a week after the UK 'piracy police' shut down the proxy service Immunicity and arrested its owner, clones of the service have started to appear online. The services allow people to access The Pirate Bay and other blocked sites. Just like the original site they are completely free of charge.

Aug 11 15:01

Don't Fall for this: Classic Facebook "Color Changer" Scam makes a Big Return

According to Cheetah Mobile, the app advertises the ability to “select your favourite color scheme for facebook layout,” and appears to direct users to “apps.facebook.com/themsandcolors.” But instead, the app sends users to a phishing site.

Once there, the site asks users to view a tutorial video. Launching the video supposedly provides temporary access to the user’s Access Tokens, letting the malicious site connect to the user’s Facebook friends. If the user doesn’t view the video, the site then attempts to download a pornographic video player on PCs or a bogus malware scanner on Android devices.

Cheetah Mobile blames a “a vulnerability that lives in Facebook’s app page itself, allowing hackers to implant viruses and malicious code into Facebook-based applications directs users to phishing sites.”

Aug 11 12:22

News Crew Should Have Used “SketchFactor” App Before Going into “Sketchy” Neighborhood

Wow, How’s the irony taste?! The van of WUSA-TV’s news crew was burglarized in Washington D.C. while doing a story on “SketchFactor” an app that warns users of sketchy neighborhoods. The crew was in the Petworth neighborhood of D.C. when the thousands of dollars worth of computer equipment and electronics were stolen from their van.

Aug 11 10:50

American held without bail after tweets in support of Islamic State

An American accused of conspiring to aid the militant group Islamic State was ordered by a New York judge to be held without bail after he was arrested at John F. Kennedy International Airport earlier this month, according to the New York Daily News.

Donald Ray Morgan was arrested by FBI agents on August 2 at Kennedy Airport when he returned to the United States following an eight-month stay in Lebanon where his wife lives, the Daily News reported.

Aug 11 10:44

MS-13 gang member sentenced to 60 months in prison for obstruction of child sex trafficking laws

According to court documents and statements made at his plea hearing, in July 2011, Contreras engaged in chats via Facebook with a minor female

Aug 11 10:41

Blocking Pirate Bay is not censorship, IFPI chief says

The CEO of the IFPI in Austria has been defending his group's attempts to have The Pirate Bay and other torrent sites blocked by local ISPs

Aug 11 09:37

DELETE Your Facebook Accounts Now!

Facebook Messenger App is Malicious

Aug 11 08:59

CIA Expert: Microsoft Should Make Windows XP Open Source

Speaking at Black Hat 2014, the Chief Security Officer of the CIA’s VC fund In-Q-Tel explained that Microsoft should make Windows XP open source and let developers improve the operating system on their own.

According to The Register, Geer pointed out that all software companies that decided to stop releasing updates for their products should make these solutions open source because the existing user base would thus become vulnerable to attacks.

Geer compared Windows XP with “a car, property, or child,” explaining that if you abandoned any of these, you lost right to it. The same should apply to software as well, he explained.

Aug 10 17:09

Win Phone 7 users aghast Microsoft axed Skype for their phones

Owners of Windows Phone 7 smartphones are apoplectic that Skype no longer works on their devices.

Commenting on the official Skype support forum, affected users say they’re in disbelief at Microsoft’s decision to not only stop support for Skype, but go further and make it unusable on their smartphones.

A number of those complaining are heavy Skype users, so losing access to it from their Windows Phone 7 devices is crippling to their daily work and life.

To make matters worse, these people find themselves unable to upgrade their smartphones to Windows Phone 8 or 8.1, because Windows Phone 7 devices don’t support the newer OS. So in order to use Skype from a mobile phone they’ll have to change their devices.

Aug 10 07:24

John McAfee speaks at hacker conference, unveils complaint website

set up the site for ordinary people to lodge complaints on anything from government corruption to bad consumer products.

Aug 10 07:22

UK.gov wants public sector to rip up data protection law

The British government is in the preliminary stages of designing a controversial system which will share citizens' sensitive personal information across government departments without their consent.

Leaked documents show civil servants are planning to mimic the data-sharing systems used by firms like Amazon or Tesco.

This could mean information about a person's driving licence, criminal record and even how much energy they use at home will be shared by apparatchiks in all government departments.

The measures are intended to side-step the old-fashioned guidance contained in the Data Protection Act, which makes it very difficult for information to be shared across government departments.

Aug 10 07:18

NSA, struggling to recruit top talent, turns to Silicon Valley

The U.S. National Security Agency is turning to Silicon Valley for topflight talent, but first it has to rebuild trust.

Anne Neuberger, special assistant to NSA Director Michael Rogers, said this week she feared the agency would no longer be able to recruit top technologists, since former contractor Edward Snowden blew the lid off the extent of its spying activities.

At a seminar organized by the non-profit LongNow Foundation in San Francisco, she extended a plea to an audience replete with tech workers to consider a career in government, or at least apply for a fellowship.

Aug 10 05:08

Father of PGP encryption: Telcos need to get out of bed with governments

Phil Zimmermann, the creator of Pretty Good Privacy public-key encryption, has some experience when it comes to the politics of crypto. During the “crypto wars” of the 1990s, Zimmermann fought to convince the US government to stop classifying PGP as a “munition” and shut down the Clipper Chip program—an effort to create a government-mandated encryption processor that would have given the NSA a back door into all encrypted electronic communication. Now Zimmermann and the company he co-founded are working to convince telecommunications companies—mostly overseas—that it’s time to end their nearly century-long cozy relationship with governments.

Aug 09 19:33

IN TIMES OF WAR: A PRAYER FOR PEACE - CLAIRE K. RIVERO

Webmaster's Commentary: 

I am reposting Claire's video as the US invades Iraq for the third time, and as a new flood of TV commercials hits the corporate media networks reminding all 18 year-olds that they MUST register for selective service, and because recent revelations from Edward Snowden include confirmation that the NSA "tinkers" with view counts on YouTube videos to keep videos contrary to the war agenda from going viral.

Optional Banner: 
WRH Exclusive
Aug 09 19:08

Azerbaijan President declares war with Armenia via Twitter

SOME people use Twitter to complain about their commute or what they’re having for lunch but for the President of Azerbaijan he took to social media to declare war.

Aug 09 11:12

SKYPE is Falling

by Less Prone

Aug 08 17:03

Harvard & MIT create first self-assembling robots – the first real Transformers

Harvard and MIT engineers, showing a reckless disregard for the robocalypse, have created origami robots that can self-assemble themselves — from a flat piece of paper and polystyrene – and walk away in just four minutes. “Getting a robot to assemble itself autonomously and actually perform a function has been a milestone we’ve been chasing for many years,” says Harvard’s Robert Wood, barely stifling a maniacal cackle.

Aug 08 15:50

Australian Proposal Would Require Suspicionless Domestic Spying by ISPs

The Australian government announced new anti-terrorism measures this week, in response to the alleged involvement of Australian citizens with extremist groups in countries including Syria and Iraq. Quietly omitted from the briefing at which those changes were announced, but separately leaked to the press this week, were the government's plans to introduce mandatory data retention requirements for Australian Internet Service Providers (ISPs).

Aug 08 11:40

Dear FCC: Get Out of D.C. and Talk to the Over 1 Million Americans Who Support Real Net Neutrality

The FCC is slated to close the written comment window for the net neutrality proceeding on September 10th, but that doesn’t mean that the FCC is going to make up its mind anytime soon. In fact, it doesn’t even mean that the FCC will be done hearing from the public. Technically, the public can continue to comment, and the FCC, if it decides to do so, can continue to listen to Americans who speak out against proposed rules that would allow Internet providers to discriminate against how we access parts of the Net.

Aug 08 10:35

The Biggest Lie About Net Neutrality

One of the most persistent lies told in Washington is the notion that common carriage is a heavy-handed regulation that transforms innovative businesses into antiquated, government-run utilities.

Aug 08 09:28

Leaked Docs Show Spyware Used to Snoop on U.S. Computers

Software created by the controversial U.K. based Gamma Group International was used to spy on computers that appear to be located in the United States, the U.K., Germany, Russia, Iran and Bahrain, according to a leaked trove of documents analyzed by ProPublica.

It's not clear whether the surveillance was conducted by governments or private entities. Customer email addresses in the collection appeared to belong to a German surveillance company, an independent consultant in Dubai, the Bosnian and Hungarian Intelligence services, a Dutch law enforcement officer and the Qatari government.

Aug 08 09:27

Gaza Strip: Boycott Israeli Products App Gets 350,000 Supporters

An app that allows users to search for a product linked to targeted companies or countries in order to boycott them has seen a significant surge in users signing up to anti-Israel campaigns.

Buycott catalogues brands and their affiliations and lets users set up campaigns to either help or avoid funding certain causes. By scanning a product's barcode with their smartphone camera, consumers are able to determine which brands are associated with which campaigns.

Aug 08 07:49

Google to prioritise secure websites

Google has said it will give preference to more secure websites in its search rankings from now on.

The search engine has been testing highlighting pages that have HTTPS encryption by default, and will now roll out across its algorithms.

"We've seen positive results, so we're starting to use HTTPS as a ranking signal," Google said.

Aug 08 07:41

Hacker Redirects Traffic From 19 Internet Providers to Steal Bitcoins

If one Canadian ISP can be used to redirect large flows of the Internet to steal a pile of cryptocurrency, other attackers could just as easily steal massive drifts of Internet data for espionage or pure disruption. The Dell researchers suggest that companies set up monitoring through a service like BGPmon, which can detect BGP hijacking attacks. But they shouldn’t expect to be able to actually prevent those attacks any time soon.

“We’re going to see other events like this,” says Dell’s Stewart. “It’s ripe for exploitation.”

Aug 08 07:39

Nest Smart Thermostat Can Be Hacked to Spy on Owners

So what's the big deal about hacking a thermostat? Well, the researchers explained, the Nest is much more than just a thermostat. It's actually a full-fledged Linux computer with 2 gigabytes of flash memory, Wi-Fi networking and proximity sensors.

The Nest can tell when you're home or not, knows your postal code, knows your Wi-Fi network name and password (and stores them in plain text and can communicate with other nearby Nest devices using the company's custom implementation of the Zigbee mesh-networking protocol.

The Nest routinely uses the Internet to communicate with the Nest cloud, but can be modified to contact any other device on the Internet. As such, mass compromising of Nest devices could be used to create a malicious botnet to pump out spam or malware — or sell information about homeowners' habits to burglars.

Aug 08 07:22

All Four Internet Service Giants Allegedly Violated Last Remaining Net Neutrality Rule

T-Mobile, Verizon, AT&T and Sprint accused of violating transparency rule in throttling cases as FCC considers abolishing net neutrality

Aug 08 07:16

BRICS: Russia Looking To ChinaFor Military, Aerospace Components

Russian aerospace and military-industrial enterprises will purchase electronic components worth several billion dollars from China, Izvestia reported Wednesday, referencing a source close to Roscosmos, Russia's Federal Space Agency.

Aug 08 06:13

Google Is Acting Like an Arm of the Surveillance State

Convicted in 1994 of sexually assaulting a young boy, John Henry Skillern of Texas once again finds himself incarcerated and awaiting trial, this time for possession and production of child pornography. Skillern’s arrest comes courtesy of Google.

Aug 07 18:21

FLIGHT CONTROL: Boeing’s uninterruptible autopilot system, drones and remote hijacking

Following the apparent ‘vanishing act’ of Malaysian Airlines flight MH370, many investigators and researchers began to question the likelihood of such an event happening in today’s high-tech world.

Aug 07 15:55

DARPA's smartphone app implemted at the 2014 Boston Marathon

Everyone from the FBI to the Boston Fire Department needed to know what everyone else is doing, and the same types of apps that keep soldiers organized in the battlefield worked perfectly there. You can see from a screenshot of the app they were using, where the specific units and checkpoints are located and how an officer in the field could search and sort for more granular information.

Aug 07 15:53

Populist Senate Candidate Michelle Darnell Takes 36% of Primary Vote with 4% of Cyrus Habib's Money!

Thursday, August 7, 2014

KingCast and Mortgage Movies Say D-48 Senate Candidate Michelle Darnell is a Hit with Elders, Children and Voters: 5% of Cyrus Habib's Money and 36% of the Vote!

Aug 07 08:25

Gamma FinFisher hacked: 40 GB of internal documents and source code of government malware published

[…] a couple days ago when I hacked in and made off with 40GB of data from Gamma’s networks. I have hard proof they knew they were selling (and still are) to people using their software to attack Bahraini activists, along with a whole lot of other stuff in that 40GB.

Aug 07 07:27

Australia's Attorney General Says Metadata Collection Won't Track Your Web Surfing, Just The Web Addresses You Visit (Huh?)

Australian Attorney General George Brandis seems to be working extra hard to demonstrate just how completely clueless he really is. On both copyright and surveillance, it's pretty clear that he doesn't even remotely understand the details, but is willing to go all in to support some misleading claims that someone told him.

Aug 07 07:10

New Site Recovers Files Locked by Cryptolocker Ransomware

Milpitas, Calf. based FireEye and Fox-IT in the Netherlands — launched decryptcryptolocker.com, a site that victims can use to recover their files. Victims need to provide an email address and upload just one of the encrypted files from their computer, and the service will email a link that victims can use to download a recovery program to decrypt all of their scrambled files.

The free decryption service was made possible because Fox-IT was somehow able to recover the private keys that the cybercriminals who were running the CryptoLocker scam used on their own (not free) decryption service. Neither company is disclosing much about how exactly those keys were recovered other than to say that the opportunity arose as the crooks were attempting to recover from Operation Tovar, an international effort in June that sought to dismantle the infrastructure that CryptoLocker used to infect PCs.

Aug 07 07:08

Why Google Just Bought a Company That Snoops on Your Chats

Google just bought another online communications channel it can fill with ads.

The tech giant confirms it has acquired Emu, a startup that offers a kind of instant messaging tool. The price was not disclosed, but Google’s interest in the company isn’t hard to divine: Emu has built a system that can monitor chats, infer what people are talking about, and insert relevant links—including ads.

Aug 06 17:19

UK's Lords and EU Take Aim at Online Anonymity

Last week, the UK's House of Lords Select Committee on Communications released a report on"social media and criminal offences." Britain has faced a number of high-profile cases of online harassment this year, which has prompted demands for new laws, and better enforcement of existing laws.

"Our starting point," the peers begin, "is that what is not an offence off-line should not be an offence online". The report is cautious in its recommendations for modifying existing regulation, and reasonable in spelling out how current criminal law can deal with patterns of harassment and bullying, whether they intersect with modern social media or not.

Aug 06 15:17

Government Wiki edits downplay high profile killings

A Channel 4 News investigation reveals Wikipedia edits to pages on Jean Charles de Menezes, Lee Rigby and Damilola Taylor made from government computers.

The spokesman for the family of Jean Charles de Menezes today spoke of his shock after hearing that users on government computer networks were found to have altered key information in his Wikipedia entry and sought to cover up police failings.

Aug 06 14:46

Is Google the New Sheriff in Town?

First there was Google Maps, then there was Google Books, and then there was Google Glass. Now, apparently, there's Google Cops.

Last Wednesday, police in Houston, Texas announced the arrest of 41-year-old John Henry Skillern on the charges of possessing child pornography.

Aug 06 13:12

Classified Documents Show US Government's Flawed "Secret Terrorist-Tracking System"

Nearly half of the U.S. government's terrorist suspects have no connection to any known terrorist groups, The Intercept reported on Tuesday.

Publishing two classified, unredacted documents related to the White House's "secret terrorist-tracking system," The Intercept journalists, Jeremy Scahill and Ryan Devereaux, report that of the 680,000 people listed on the government's widely-shared watchlist, more than 40 percent are defined as having "no recognized terrorist group affiliation." The cumulative amount of people who are in the database for no reason adds up to 280,000 — more than the total number of al-Qaeda, Hamas, and Hezbollah suspects combined.

Aug 06 11:18

Assange stakeout has cost nearly $12 million

WikiLeaks founder Julian Assange marks his 777th day in the Ecuadorian embassy in London

Aug 06 10:57

President's Net Neutrality Views Don't Square with FCC Proposal

On Tuesday, President Barack Obama voiced strong support for Net Neutrality and opposition to the type of pay-for-priority Internet rules now being proposed by FCC Chairman Tom Wheeler.

Aug 06 09:50

You’ll Be One of the ‘Things’ in the ‘Internet of Things’

And how secure are these devices that make you part of the Internet of Things? You don’t need to break a code; you don’t need to capture a server. “Hardcore hackers wouldn’t even bother with it,” said one of the hackers. “They’d find access too easy.” Read…. Google Glass Hacked, Can Record Everything You Stare At?

The “Internet of Things” is the next Big Thing. A universe of devices connected to data centers: your fridge, toaster, alarm clock, garage-door opener, pickup truck, self-driving car, thermostat, “intelligent toilet” (I had to learn how to use them in Japan), and other doodads.

Webmaster's Commentary: 

I don't know about you, but all this potential data gathering makes me more than a little edgy.

Aug 06 08:59

The Russian 'hack of the century' doesn't add up

The biggest problem, as Forbes's Kashmir Hill and The Wall Street Journal's Danny Yadron have noted, is that Hold Security is already capitalizing on the panic, charging a $120-per-year subscription to anyone who wants to check if their name and password are on the list. Hold says it's just trying to recoup expenses, but there's something unseemly about stoking fears of cybercrime and then asking concerned citizens to pay up. It also gives Hold a clear incentive to lie to reporters about how large and significant the finding is.

Of course, facts are still facts, but even the hard data here is a little strange. If the idea of hacking 1.2 billion usernames sounds incredible, it should. There are just a handful of services with over a billion users — Facebook, Google Search, and Microsoft Office lead the pack — and if any of those were involved, Hold wouldn't be shy about saying so. Instead, this data comes from hundreds of thousands of compromises over the course of months.

Aug 06 07:34

China Said to Exclude Apple From Procurement List

China’s government excluded Apple Inc. iPads and MacBook laptops from the list of products that can be bought with public money because of security concerns, according to government officials familiar with the matter.

Webmaster's Commentary: 

Thank you NSA for wrecking the American IT industry! Hope you are proud of yourselves!

Aug 06 06:18

FALSE-FLAG ALERT - Russian Gang Amasses Over a Billion Internet Passwords

Hold Security would not name the victims, citing nondisclosure agreements and a reluctance to name companies whose sites remained vulnerable. At the request of The New York Times, a security expert not affiliated with Hold Security analyzed the database of stolen credentials and confirmed it was authentic.

Aug 06 04:51

Homeland Security employee in Sacramento facing child porn charge

An inspector for the U.S. Department of Homeland Security is facing an attempted production of child pornography charge after a Craigslist ad was traced to a federal computer.

George Hristovski of Elverta, in Sacramento County, was booked into Sacramento County jail Tuesday. Court documents state that Hristovski admitted to soliciting sexually explicit photographs from a 13-year-old and her mother on multiple occasions.

News10 spoke with a woman who identified herself as Hristovski's wife. She said the charges were false.

Court documents state that an undercover investigator for the Placer County Sheriff's Department found an ad in the Casual Encounters section of Craigslist from a man named "Greg" seeking sex with a "daughter or step-daughter." The investigator responded to the ad and posed as a mom, "Heather" who had a 13-year-old daughter, "Megan."

Aug 05 19:39

Singapore's Precarious Surveillance State The Envy Of US Intelligence Agencies

If you want to build a surveillance state with a minimum of backlash, you'll need a very controllable environment. Shane Harris at Foreign Policy has a detailed report on Singapore's relatively peaceful coexistence with Big Brother that includes the United States' involvement in its creation, as well as the many reasons pervasive surveillance and an out-sized government presence have been accepted, rather than rebelled against.

Aug 05 16:57

UNSEALED: The US Sought Permission To Change The Historical Record Of A Public Court Proceeding

David Greene
Electronic Frontier Foundation

A few weeks ago we fought a battle for transparency in our flagship NSA spying case, Jewel v. NSA. But, ironically, we weren't able to tell you anything about it until now.

On June 6, the court held a long hearing in Jewel in a crowded, open courtroom, widely covered by the press. We were even on the local TV news on two stations. At the end, the Judge ordered both sides to request a transcript since he ordered us to do additional briefing. But when it was over, the government secretly, and surprisingly sought permission to “remove” classified information from the transcript, and even indicated that it wanted to do so secretly, so the public could never even know that they had done so...

Aug 05 15:22

The Insidiousness of Facebook Messenger's Mobile App Terms of Service

How much access to your (and your friends') personal data are you prepared to share for access to free mobile apps? I suspect the amount is significantly less than that which you actually agreed to share when blindly accepting the Terms of Service.

Case in point: Facebook's Messenger App, which boasts over 1,000,000,000 downloads, requires the acceptance of an alarming amount of personal data and, even more startling, direct control over your mobile device. I'm willing to bet that few, if any, of those who downloaded this app read the full Terms of Service before accepting them and downloading the app.

Aug 05 15:01

Canada’s telecoms aid state surveillance by handing over personal data

As part of a vast expansion of the Canadian surveillance state, federal government police agencies are requesting personal subscriber information from the country’s telecommunications companies (such as Rogers, Bell, TELUS, and Quebecor’s Vidéotron) at staggering rates—with well over a million such requests per year.

Internal documents from Public Safety Canada and others tabled by the country’s privacy commissioner in the House of Commons indicate that the vast majority of these requests are made without a warrant. Yet the telecoms almost invariably provide the requested information.

Aug 05 14:53

Windows Registry-infecting malware has no files, survives reboots

Antivirus doesn't stand a chance because there's nothing for it to scan

Aug 05 14:29

PayPal 2FA is easily bypassed, teenage whitehat hacker says

A teenage whitehat hacker said he has found a simple way that attackers can bypass the two-factor authentication system PayPal uses to protect user accounts.

The circumvention requires little more than spoofing a browser cookie set when users link their eBay and PayPal accounts, according to Joshua Rogers, a 17-year-old living in Melbourne, Australia. Once the cookie—which is tied to a function PayPal identifies as "=_integrated-registration"—is active in a user's browsing session, the two-factor authentication is circumvented, Rogers reported. That means attackers who somehow acquire someone else's login credentials would be able to log in without having to enter the one-time passcode sent to the account holder's mobile phone.

Aug 05 14:17

Watch a hacker unlock a car WITHOUT touching it - and the whole attack takes just 10 minutes to complete

You may be forgiven for thinking your car is secure, parked on your drive with the doors locked.

But a security researcher has revealed how key fobs can be hacked wirelessly using an everyday laptop, transmitter and a bit of technical knowledge.

Aug 05 14:04

Google admits scanning Gmail for kiddie porn after turning in pedophile

A man in Texas found out the hard way that Google is required by law to scan emails for suspected child abuse after he was arrested. The company had tipped off law enforcement to the presence of child pornography in his Gmail.

John Henry Skillern was arrested for possessing and promoting child pornography on Thursday after Google generated a cyber-tip and sent it to the National Center for Missing and Exploited Children (NCMEC). The internet mega-company detected explicit images of a young girl in an email he was sending to a friend, police said.

Aug 05 13:47

Justin.tv shuts down

Aug 05 11:06

Airship Flight Over the NSA Data Center: New Behind-the-Scenes Video

Activist Post

The Electronic Frontier Foundation (EFF) today released a video by acclaimed documentarian Brian Knappenberger (The Internet's Own Boy) that explores how and why an unlikely coalition of advocacy organizations launched an airship over the National Security Agency's Utah data center.

The short documentary explains the urgent need to rein in unconstitutional mass surveillance, just as the U.S. Senate has introduced a new version of the USA FREEDOM Act...

Aug 05 07:35

'Don't Be Evil': Google Uses Its Power Justly, But We Should All Be Afraid

To paraphrase Martin Niemöller: First they came for the child pornographers, and you didn’t speak up because you were not a child pornographer. Then they came for the terrorists, and you didn’t care because you were not one of those either. Then they came for the tax evaders and still you were not especially troubled. But when they came for you for daring to question their unchecked authority, “no one was there to speak for you.”

Justice may have been done yesterday. We’ll know once Skillern gets his day in court. But a very dangerous precedent has been set under which a private company has concluded that if technology can solve a problem, it should be unleashed on it. It’s hard not to worry about where that leads.

Aug 05 06:04

Visit the Wrong Website, and the FBI Could End Up in Your Computer

Security experts call it a “drive-by download”: a hacker infiltrates a high-traffic website and then subverts it to deliver malware to every single visitor. It’s one of the most powerful tools in the black hat arsenal, capable of delivering thousands of fresh victims into a hackers’ clutches within minutes.

Now the technique is being adopted by a different kind of a hacker—the kind with a badge. For the last two years, the FBI has been quietly experimenting with drive-by hacks as a solution to one of law enforcement’s knottiest Internet problems: how to identify and prosecute users of criminal websites hiding behind the powerful Tor anonymity system.

Aug 05 05:20

Google-X Moves To Map Perfect Human Health

Google recently unveiled its most ambitious — and some say its most troubling — endeavor to date: the “Baseline Study,” which would collect genetic and body chemistry information in order to create a picture of the ideal healthy human.

Aug 04 16:06

‘Israel you’re weak’: Anonymous hacktivists shut down key Israeli websites

Worldwide hacker collective Anonymous has unleashed another wave of attacks against Israel’s government websites over their military incursion into Gaza, taking down “hundreds” of portals, including those run by Mossad and the IDF.

Among the scalps claimed by the group were the Ministry of Justice website, the state archive portal, and even the national advertising agency. Most of the attacks were repelled within hours, with all agencies currently back online.

Aug 04 15:28

New York judge upholds US efforts to seize emails from Microsoft

New York federal district court Judge Loretta Preska ruled Thursday that US government warrants are valid for data stored overseas, as long as the company storing the data is based inside the United States.

The case stemmed from a federal warrant issued in December 2013 demanding data from a user account connected with an unspecified criminal investigation. Microsoft refused to turn over the data, and was subsequently ordered by a federal judge to do so in April of 2014.

Aug 04 13:43

Rossiya Segodnya News Agency Continues to Repel Mass Cyber-Attacks

Rossiya Segodnya News Agency, including its flagship website ria.ru and the project on Ukraine, continues to thwart mass cyber-attacks for the second day in a row, the company's IT official said late on Monday.

Aug 04 11:53

Bill that would require smartphone kill switches is close to passage

A proposal backed by state Sen. Mark Leno, above, that would require kill switches on smartphones is supported by consumer groups, law enforcement and city governments including L.A., San Francisco, Santa Ana, Oakland and San Diego.

Webmaster's Commentary: 

So they can shut off all the smartphones in case the government is doing something they do not want photos and videos made of ... which is why you should dig out that old pocket digital camera and keep it handy if you are going to a protest.

Aug 04 11:21

‘Bomb Gaza’ Google Play app lets Android users carry out Israeli air strikes on Palestinians

Google is facing criticism for continuing to allow Android mobile users to download a game called “Bomb Gaza”, in which players are required to “drop bombs and avoid killing citizens”.

The app, which was uploaded on 29 July, has been installed up to 1,000 times and received at least one report as “inappropriate”, yet still remains available on Google’s Play store.

Webmaster's Commentary: 

Now can you imagine the reaction by the corporate media if someone posted an APP called "Bomb Israel?"

Aug 04 07:42

Planes can be hacked via inflight WiFi, researcher says

Cybersecurity researcher Ruben Santamarta says he has figured out how to hack the satellite communications equipment on passenger jets through their WiFi and inflight entertainment systems - a claim that, if confirmed, could prompt a review of aircraft security.

Aug 04 07:16

FACEBOOK STILL BLOCKING POSTS WITH THE URL TO THE YOUTUBE VIDEO OF "ALL WARS ARE BANKERS' WARS."

Aug 04 05:55

U.S. Homeland Security Trying to Track Down Web Leak of 'The Expendables 3'

The U.S. Department of Homeland Security was created to fight terrorism per President Bush in 2002, but the federal government is now spending taxpayer money to hunt down the person or person(s) responsible for allegedly leaking the action movie "The Expendables 3" onto the web.

According to Deadline.com, the U.S. Department of Homeland Security’s Immigration and Customs Enforcement is trying to find the source of illegal downloads of the film.

Aug 04 05:35

NSA has close partnership with Israel

New documents show a “far-reaching” collaboration between the US National Security Agency and Israeli intelligence services most of which was directed against Palestine.

The NSA "maintains a far-reaching technical and analytic relationship with the Israeli SIGINT National Unit (ISNU) sharing information on access, intercept, targeting, language, analysis and reporting," according to an NSA document dated April 13, 2013, which is among other documents revealed by The Intercept on Monday.

The documents show the US has provided Israel with cash, raw data and analysis under agreements reached between the NSA and Israeli SIGINT National Unit also known as Unit 8200, the secretive signals intelligence organization.

Aug 02 19:47

Israeli soldier: 'I killed 13 childrens today and ur next muslims'

"I [sic] killed 13 childrens [sic] today and ur [sic] next f****** muslims [sic] go to hell b******," Israeli sniper David Ovadia posted on his Instagram account yesterday.

Ovadia directed the comment at a fellow Instagram user who appears to be a Palestinian woman.

The comment was made in response to a picture Ovadia posted of himself laying on the ground aiming his sniper rifle, while dressed in army fatigues. It was quickly spread across social media networks and his account was subsequently closed down.

Aug 02 17:36

How hackers could slam on your car's brakes

Modern cars are increasingly controlled by computers. And where there are computers, there are hackers.

A report shared exclusively with CNNMoney shows that the 2014 Jeep Cherokee, 2015 Cadillac Escalade and 2014 Toyota Prius were the most 'hackable' of 20 car models reviewed by automotive security researchers. The 2014 Dodge Viper and 2014 Audi A8 were the least hackable.

Aug 02 14:31

The Pardo v. MERSCORP Case: MERSCORP Northwest Trustee and RCO in Hot Water Losing Civil Conspiracy Motion to Dismiss


01 August 2014

Pardo v. NWTS -- KingCast/Mortgage Movies See Stafne Trumbull Crush NWTS, RCO, MERS, MERSCORP in King County Superior Court Motion Hearing: Civil Conspiracy Moves to Discovery.

Court: Originally the holder was Landhome...
PTF: Correct Your Honor....
Court: And then Landhome assigned it to whom....
PTF: We have no idea, that's the problem. We're here to get Discovery to find out what happened!!!"

SHARE THIS ARTICLE WITH YOUR SOCIAL MEDIA