COMPUTERS/INTERNET/SECURITY

Oct 01 08:30

Windows 8 Was So Bad That Microsoft Is Skipping Windows 9

On April 1, 2013, Infoworld published an article headlined, “Microsoft skips ‘too good’ Windows 9, jumps to Windows 10.’” A disclaimer at the top clarified that the story was an April Fool’s Joke, but it now appears that wasn’t necessary.

On Tuesday, Microsoft announced that it will indeed be skipping Windows 9 and jumping to Windows 10 as the name for its next operating system. No joke.

Oct 01 08:00

The Dubious 'Internet Safety Software' That Hundreds of Police Agencies Have Distributed to Families

For years, local law enforcement agencies around the country have told parents that installing ComputerCOP software is the “first step” in protecting their children online.

Police chiefs, sheriffs, and district attorneys have handed out hundreds of thousands of copies of the disc to families for free at schools, libraries, and community events, usually as a part of an “Internet Safety” outreach initiative. The packaging typically features the agency’s official seal and the chief’s portrait, with a signed message warning of the “dark and dangerous off-ramps” of the Internet.

Oct 01 07:45

Advertising firms struggle to kill malvertisements

In late September, advertisements appearing on a host of popular news and entertainment sites began serving up malicious code, infecting some visitors' computers with a backdoor program designed to gather information on their systems and install additional malicious code.

The attack affected visitors to The Jerusalem Post, The Times of Israel, The Hindustan Times, Internet music service Last.fm, and India-focused movie portal Bollywood Hungama, among other popular sites. At the center of the malware campaign: the compromise of San Francisco-based Internet advertising network Zedo, an advertising provider for the sites, whose network was then used to distribute malicious ads.

WEBMASTER ADDITION: Zedo reports that it was not their servers that were compromised but those of their clients, and the problem has been resolved, so oyu are safe here at WRH.

Oct 01 07:05

Exclusive: Top 10 Flashlight Apps Are Stealing Your Data, Even Pics Off Your Phone

Nashua NH- The makers of some of the most widely used flashlight apps for smart phones are doing more than just helping you find your lost car keys, they are geo-locating you and stealing your data. At least, that is the claim being made by Snoopwall LLC. Snoopwall is the world’s first “counterveillance” company and according the founder, Gary Miliefsky in a web exclusive interview with Benswann.com, the top ten flashlight apps are stealing you data.

Sep 30 15:11

A ‘No Social Media List’ For Extremists And Potential Terrorists?

You have heard of the “No Fly List”, right? Well, now the Tories are pledging that if they win the next election in the UK they will establish a list of “extremists” that will have to have their social media posts “approved in advance by the police” before they post them.

Sep 30 14:34

Theresa May's Love Affair With The Snooper’s Charter

The Conservatives have made a clear offer to the public: they are saying that they will, if elected, revive plans for the Snooper’s Charter. Massive data gathering and analysis of your online habits would become available to the police and a range of public bodies. Powers that are currently being challenged in the courts, but are in practice available to GCHQ under programmes like TEMPORA, would become an everyday policing tool.

Sep 30 13:06

Your iPhone is now encrypted. The FBI says it'll help kidnappers. Who do you believe?

Predictably, the US government and police officials are in the midst of a misleading PR offensive to try to scare Americans into believing encrypted cellphones are somehow a bad thing, rather than a huge victory for everyone’s privacy and security in a post-Snowden era. Leading the charge is FBI director James Comey, who spoke to reporters late last week about the supposed “dangers” of giving iPhone and Android users more control over their phones. But as usual, it’s sometimes difficult to find the truth inside government statements unless you parse their language extremely carefully. So let’s look at Comey’s statements, line-by-line.

Sep 30 11:18

Inventor Of World Wide Web Warns Of Threat To Internet

The British inventor of the World Wide Web warned on Saturday that the freedom of the internet is under threat by governments and corporations interested in controlling the web.

Tim Berners-Lee, a computer scientist who invented the web 25 years ago, called for a bill of rights that would guarantee the independence of the internet and ensure users’ privacy.

Sep 30 10:17

Grooveshark Found Guilty of Massive Copyright Infringement…

If you’re a Grooveshark user, you should probably start backing up your collection. In a decision released Monday, the United States District Court in Manhattan has found Grooveshark guilty of massive copyright infringement based on a preponderance of internal emails, statements from former top executives, direct evidence from internal logs, and willfully deleted files and source code.

Specifically, CEO Samuel Tarantino and co-founder and CTO Josh Greenberg will face the heaviest charges, which remain to be determined. The others were just scared rats: earlier, a number of top Grooveshark executives were removed from the defendant list in a settlement agreement, which now appears part of a clever exchange for cooperation. Oh and did they talk…

Sep 30 10:10

Spyware phone app CEO indicted for conspiracy

The head of a company that sells a spyware application for smartphones has been indicted and arrested for conspiracy and other charges related to surreptitious interception. It is the first time the US Department of Justice has targeted spyware apps.

Undetectable and untraceable by most phone users – that is how a spyware application dubbed StealthGenie was allegedly being advertised by Hammad Akbar, the chief executive of the Pakistani-owned, UK-based company InvoCode.

Sep 30 09:15

Trust in cloud security at all-time low: Execs still betting on the cloud

A new report on IT decision makers shows enterprise trust in cloud security at its lowest -- yet they're flocking to use it. OpenStack's Matt Joyce thinks it's fair to ask if everyone's gone nuts.

Sep 30 05:44

Bug in iOS 8's 'Reset All Settings' Option Also Erases iCloud Drive Documents

It appears that there may be a serious bug with the "Reset All Settings" option in iOS 8, causing users who activate the feature to lose all of their iWork documents stored in iCloud Drive. According to multiple posters on the MacRumors forums, using the "Reset All Settings" option under General --> Reset has caused documents to be permanently deleted from iCloud Drive.

Sep 30 05:43

Facebook Ads Will Follow You Around. Starting Now.

Good news for advertisers, but maybe not-so-great news for users concerned about their personal data: Starting Monday, Facebook will use data it gleans from users for its new ad network, Atlas, which it will serve up ads on non-Facebook sites based on what Facebook knows about you.

Sep 29 15:32

Piracy Police Chief calls for State interference to stop Internet anarchy

Since last year City of London Police’s Intellectual Property Crime Unit have been working with copyright holders to tackle online piracy. The police have already booked some successes but according to PIPCU head Andy Fyfe, more state interference may be needed to stop Internet anarchy.

Sep 29 15:23

Revealed: The Little-Known Law Behind Our 'Collect It All' Spy State

The powers granted to the National Security Agency to spy on millions of Americans and people abroad were vested by a little-known executive order that—until now—has received scant scrutiny or oversight, newly uncovered government documents revealed on Monday.

Executive Order 12333, passed in 1981 by President Ronald Reagan, is the "main game in town for NSA surveillance," according to Alex Abdo, staff attorney for the American Civil Liberties Union, which obtained internal documents on the order through a Freedom of Information request.

Sep 29 12:38

AT&T’s congestion magically disappears when it’s signing up new customers

AT&T yesterday began offering “double the data for the same price” to new customers and existing customers who sign new contracts, apparently forgetting that its network is so congested that speeds must be throttled when people use too much data.

Like other carriers, AT&T slows the speeds of certain users when the network is congested. Such network management is a necessary evil that can benefit the majority of customers when used to ensure that everyone can connect to the network. But as Federal Communications Commission Chairman Tom Wheeler has argued, the carriers’ selective enforcement of throttling shows that it can also be used to boost revenue by pushing subscribers onto pricier plans.

Sep 28 22:37

Wikipedia used by government to smear and defame alternative media personalities

(NaturalNews) One of the primary reasons why academic institutions prohibit the use of Wikipedia as a legitimate source for research is because the open-ended site is rife with abuse. In fact, governments around the world use it to spread false information and propaganda, as evidenced both by newly leaked documents and by careful examination and documentation by those whose profiles have been tampered with.

Indeed, many whose profiles are being altered are thorns in the sides of those who are in power. Two such people -- radio host Alex Jones and alternative media journalist Abby Martin -- are "media personalities" who are being portrayed as "Kremlin propagandists" by someone linked to an IP address associated with the U.S. House of Representatives, "prompting suggestions that the U.S. government is involved in an online smear campaign," InfoWars is reporting.

Sep 28 10:23

World's First Wearable Drone Takes Flight

Nicholas West
Activist Post

As Congress and the FAA continue to discuss the parameters of drone use, a widening array of them are already taking flight. A new exemption has been granted for Hollywood, only the second after one was granted to BP earlier this year. This latest exemption greatly widens the scope for commercial drone use. According to Fortune, 40 other companies have filed for exemptions to the ban under section 333 of FAA Modernization and Reform Act of 2012.

A new invention seeks to merge drones with the booming trend of any sort of wearable tech or "augmented reality." That's right, why not a wearable drone?...

Sep 28 07:46

FBI To Enlist Local Police In Mass DNA Collection

Remember that time the Supreme Court ruled that our DNA is basically just like our fingerprints, and cops can snatch it from us subsequent to arrest? Remember the giant biometrics project the FBI has been spending at least a billion dollars of our money building (with many of the details kept secret), called ‘Next Generation Identification’? With those powers and monies combined, the FBI this week announced its plans “to accelerate the collection of DNA profiles for the government’s massive new biometric identification database.” Like with other biometrics collection schemes, the FBI aims to get local police to do the groundwork. What could go wrong?

Sep 28 05:57

Washington think tank recruits 'Call of Duty' creator to help them imagine future wars

A Washington think tank is recruiting the mastermind behind the best-selling "Call of Duty" video games to help policy wonks imagine future wars America may have to fight. Dave Anthony, whose blockbuster gaming franchise has earned billions of dollars, is among a group of writers and producers enlisted by the Atlantic Council to look at how armed conflicts might evolve in the 21st Century.

Sep 28 03:01

Tim Berners-Lee calls for internet bill of rights to ensure greater privacy Web inventor says world needs an online ‘Magna Carta’

The inventor of the world wide web has warned that the freedom of the internet is under threat by governments and corporations interested in controlling the web.

Tim Berners-Lee, the British computer scientist who invented the web 25 years ago, called on Saturday for a bill of rights that would guarantee the independence of the internet and ensure users’ privacy.

“If a company can control your access to the internet, if they can control which websites they go to, then they have tremendous control over your life,” Berners-Lee said at the Web We Want festival on the future of the internet in London.

“If a government can block you going to, for example, the opposition’s political pages, then they can give you a blinkered view of reality to keep themselves in power.”

“Suddenly the power to abuse the open internet has become so tempting both for government and big companies.”

Sep 28 02:35

US threat to British online privacy

Private information stored online by British computer users could be scrutinised by American law enforcement agencies under a wide-ranging new right-to-snoop being pursued by the US government.

Mr Hemming told the Telegraph that warrants could be granted at the US Foreign Intelligence Surveillance (FISA) court, which sits in private, and MPs would not even know that their emails were being monitored.

"Why should the American security services be able to access to our MPs emails, when even the British security services cannot?" he asked.

"It is a great mistake for Parliament not to manage its own servers. This is an alarming vulnerability. MPs and their constituents should be aware that their communications are not secure."

Sep 27 14:41

9 Epic Failures of Regulating Cryptography

Cindy Cohn
Electronic Frontier Foundation

Recently Apple has announced that it is providing basic encryption on mobile devices that they cannot bypass, even in response to a request from law enforcement. Google has promised to take similar steps in the near future. Predictably, law enforcement has responded with howls of alarm...

Sep 27 12:16

Google Wi-Fi Roundup Has Lawyers Chasing Landmark Jackpot

Data from two hard drives locked up in the San Francisco federal courthouse may make or break an effort to hold Google Inc. (GOOG) to account for what privacy advocates call an unprecedented corporate wiretapping case.

Sep 27 12:15

Will the Internet of Things Be Another Surveillance Nightmare?Alleged OK City Beheader Linked to Pentagon Diner al-Awlaki

The Internet of Things—the coming revolution in household appliance integration with the Internet—could well be a nightmare of privacy violation and data harvesting

Sep 27 07:59

Not a bash bug

I would argue that the bash security concern is not a bug. It is clearly a feature. Admittedly, a misguided and misimplemented feature, but still a feature.

The problem is that it was designed 25 years ago. Apache didn't exist yet for five years! Granted, the internet already existed, but it was still a more confidential club. Security in internet software and protocols were often just not considered at all in that time, and definitely not when developping a program such as a shell.

Sep 27 07:37

Police Chief Calls Apple 'the Phone of Choice for the Pedophile'

Law enforcement officials across the country and at all levels of government are amping up their warnings about Apple’s new privacy standards, the latest of which comes from a Chicago police chief, who said iPhones will become the favored device among pedophiles.

Just like that badge he wears is a favorite device for murderers and bullies to hide behind?

LINK FIXED

Sep 27 07:36

iPhone? It's a spyphone: Apple devices can record your every movement

It is tracking your every move – recording the exact time you left for work, where you bought your coffee and where you like to shop.

But this isn’t a futuristic spy drone or some sinister Big Brother state – it’s the iPhone sitting in your pocket.

Hidden in Apple phones is a function which logs every journey. The iPhones are then able to analyse the data to figure out where you live and work, basing decisions on the frequency and timing of trips.

The function – called the Frequent Locations feature – was quietly introduced to iPhones a year ago. But since access to the programme is buried beneath five layers of settings menus, few people know it exists.

Sep 26 11:56

Apple shares lose £12bn as iPhone 6 is hit by new fault: Stock loses all gains it had made since launch of device last week

More than £12billion was wiped off the value of Apple yesterday after its latest iPhone was rendered unusable by a software update.

The 3.5 per cent drop in the share price meant the company’s stock lost all gains it had made since launching the iPhone 6 and iPhone 6 Plus last week.

Users of the brand new devices were cut off from telephone signal and data networks, meaning they could not make or receive calls and text messages or go on the internet away from wifi signal.

The update for the iOS 8.0.1 operating system also killed off the Touch ID function, a much-trumpeted feature that allows users to log on to their phone using their fingerprint.

Sep 26 11:12

Hackers 'already using Shellshock bug to attack victims'

Hackers are already taking advantage of the ‘Shellshock’ flaw, which security researchers warn could be more serious than the Heartbleed security hole and have a dangerous fallout lasting for several years.

The Zscaler ThreatLabZ research team said this morning that it had spotted attacks using the flaw “within hours of the public disclosure”. Hackers have been gaining access to machines using the hole and using it to install additional malware that then leaves them wide open to abuse.

Sep 26 10:57

Shellshock superbug: Can anything stop the hackers? Millions of users' online details at risk

The Information Commissioner’s Office (ICO) sounded the alarm as the first evidence emerged of hackers exploiting the bug, dubbed “Shellshock”. The flaw – contained within a piece of software called Bash, which is used by operating systems and internet servers the world over – potentially allows any computer with the vulnerability to be remotely controlled.

Both the UK and US governments have issued national alerts in response to the bug, warning that it may compromise organisations responsible for “critical national infrastructure” such as power stations if it is not rapidly dealt with.

Sep 26 10:55

Edward Snowden: winning Sweden’s alternative Nobel prize is vindication – video

Edward Snowden issues a recorded statement after being awarded Sweden's Right Livelihood Honorary Award, dubbed the 'alternative Nobel Prize'. The National Security Agency whistleblower says he accepts the award on behalf of those who risked their lives to help 'resist unlawful and disproportionate mass surveillance'. He says the award serves as a 'vindication' for such efforts

Sep 26 09:25

Vaccine wars: the censoring of Rob Schneider

Yesterday, I reported on State Farm dropping Rob Schneider from their TV ads because he’s alerted people to vaccine dangers.

Because he has a view about vaccines that departs from the norm.

“Punch a hole in consensus reality and you can’t be a spokesman for our products.”

“Cause a ripple among the sleeping populace and you’re out.”

What’s next?

Well, I’ll tell you what could be next, based on the fact that the Internet runs via an interlocking system of commercial companies.

Some companies that facilitate emails to large lists, and website hosts, to say nothing of Facebook, which is already censoring information, could decide, under pressure, or voluntarily, to close down “controversial data.”

Sep 26 09:21

FBI blasts Apple, Google for locking police out of phones

Comey added that FBI officials already have made initial contact with the two companies, which announced their new smartphone encryption initiatives last week. He said he could not understand why companies would “market something expressly to allow people to place themselves beyond the law.”

Webmaster's Commentary: 

We would not be in this mess had "The Law" not placed itself beyond the Constitution!

Of course, this could also be a bluff to lull you into a false sense of privacy with these new phones and stimulate sales!

Sep 26 08:30

Photos: Robots and drones - here's what Intel's answer to the Raspberry Pi can do

The maker movement is thriving – with hobbyist technologists across the world packing low-cost computers and sensors into bespoke electronics that fuse art and technology.

The market is dominated by single-board computers and microcontrollers such as Raspberry Pi and Arduino, but new competitors are arriving all the time.

Intel's entry is Edison, a tiny single-board computers, little bigger than a postage stamp, measuring just 3.55 x 2.5 x 0.39cm.

Although it will be compared with the $35 Raspberry Pi model B+, it is designed to work as an embedded Linux board for electronic prototypes and products, rather than as a small-board computer running a full-blown Linux distro.

Webmaster's Commentary: 

I love technology when it works, and am old enough that some of the newer advances keep me in awe when I remember what I started with. This new desktop I built easily outpaces the Cray Supercomputers of the 1980s. Of course, back when computers were slow, software had to be efficient, but I have observed that as processors got faster, software companies got lazy, writing bloated, inefficient code, relying on the advances in hardware to keep their products usable.

Sep 26 07:43

Ello -The Facebook Killer?

by Tony Cartalucci

Ello, a social network alternative to Facebook is expanding its user base immensely, even as it remains in beta testing. Market watchers and tech trend analysts attribute the influx of users indicative of Facebook's waning popularity due to its invasive, profit-driven, monopolistic, and downright creepy conduct.

Facebook's incremental, manipulative policy and terms of use have been described as everything from a greedy business practice, to a government sanctioned means of mass manipulation and soft censorship...

Sep 26 07:01

AG: State officials received porn emails

At least eight prominent state officials — including the current head of the state police, Pennsylvania’s top environmental regulator, and a former spokesman for Gov. Tom Corbett — were among the commonwealth employees who sent or received hundreds of sexually explicit photos, videos and messages from state email accounts between 2008 and 2012, according to documents made available Thursday by the state Attorney General’s Office.

Following a court battle and public record requests from The Inquirer and other news organizations, Attorney General Kathleen Kane’s office released the names of the eight recipients and showed reporters some of the pornographic material that it said traveled over state-owned computers during work hours.

Sep 26 05:54

Israeli Reservists “Operate” In US Colleges

Following successive ongoing international campaigns to achieve boycott divestment and sanctions on Israel in different countries around the world, especially in colleges, the Israeli government is now acting on an extensive strategy that includes Israeli reservist soldiers, to recap its losses.

Tel Aviv knows it can count on the ongoing financial, political and military support from the United States, but wants to get US campuses to topple any move that aims at divesting from Israeli and international companies that invest and benefit from the illegitimate Israeli occupation and its settlements.

Sep 26 05:28

Alternative Media Success Panics NeoCons

While most old people still cling to the corporate media worldview, the young are skewing ever-harder toward alternative perspectives. In Thursday’s Scottish independence referendum, for example, the London Daily Mirror reported that 71% of 16-17 year olds voted “yes” while those over 65 voted “no” by a 73%-27% margin.

Why does the vast majority of Scottish young people favor independence, while an equally crushing majority of old people opposes it?

Short answer: Old people still believe BBC propaganda, while the young do not.

Sep 25 18:52

First Shellshock botnet attacks Akamai, US DoD networks

Attackers have been quick to exploit the Shellshock Bash command interpreter bug disclosed yesterday by building a botnet that is currently trying to infect other servers, according to a security researcher.

The "wopbot" botnet is active and scanning the internet for vulnerable systems, including at the United States Department of Defence, chief executive of Italian security consultancy Tiger Security, Emanuele Gentili, told iTnews.

"We have found a botnet that runs on Linux servers, named “wopbot", that uses the Bash Shellshock bug to auto-infect other servers," Gentili said.

Sep 25 18:40

'Bash bug could be worse than Heartbleed': 'Catastrophic' flaw may threaten the security of millions of internet-connected devices

The bug, which also goes by the name 'Shellshock', could potentially allow hackers to gain access to every internet-enabled device in a person's home using something as innocuous as a smart lightbulb.

The danger with this, in particular, is that once it has access to an internet-connected device it can jump onto others. This includes smart locks that open front doors.

Sep 25 14:55

Middle-School Dropout Codes Clever Chat Program That Foils NSA Spying

The National Security Agency has some of the brightest minds working on its sophisticated surveillance programs, including its metadata collection efforts. But a new chat program designed by a middle-school dropout in his spare time may turn out to be one of the best solutions to thwart those efforts.

Prompted by Edward Snowden’s revelations about the government’s intrusive surveillance activities, loosely knit citizen militias of technologists and security professionals have cropped up around the world to develop systems to protect us from government agencies out to identify us online and grab our communications.

Sep 25 14:48

Amazon readies major cloud server reboot

Amazon Web Services will be updating a substantial number of its cloud servers, and customers are recommended to re-launch their instances in the coming days, according to AWS consultants.

Amazon has not said why the reboot is happening, but AWS watchers believe it is to patch a security issue.

Sep 25 14:46

Bug in Bash shell creates big security hole on anything with *nix in it [Updated]

The Bash vulnerability, now dubbed by some as "Shellshock," has been reportedly found in use by an active exploit against Web servers. Additionally, the initial patch for the vulnerability was incomplete and still allows for attacks to succeed, according to a new CERT alert. See Ars' latest report for further details, our initial report is below.

A security vulnerability in the GNU Bourne Again Shell (Bash), the command-line shell used in many Linux and Unix operating systems, could leave systems running those operating systems open to exploitation by specially crafted attacks. “This issue is especially dangerous as there are many possible ways Bash can be called by an application,” a Red Hat security advisory warned.

Sep 25 14:43

The Bash Bug: What you need to know about the latest security flaw

The bug can be used to hack into vulnerable servers. Once inside, attackers could deface websites, steal user data, and engage in other forms of mischief.

There's a good chance that hackers will use the vulnerability to create a worm that automatically spreads from vulnerable machine to vulnerable machine. The result would be a botnet, a network of thousands of compromised machines that operate under the control of a single hacker. These botnets — which are often created in the wake of major vulnerabilities — can be used to send spam, participate in denial-of-service attacks on websites or to steal confidential data.

Sep 25 14:33

As Bash damage spreads, experts warn of network attacks and an internet meltdown

Reports on the latest Bash bug have gone from bad to worse, as damage from the bug spreads and many early patches are proving ineffective. Unlike Heartbleed, Bash attacks allow for remote code execution, allowing an attacker to exploit the vulnerability for malware distribution. Most attacks from the bug will target web servers and network devices, with experts saying that PHP-based web applications will be particularly vulnerable. Connected devices like smart appliances are also expected to be vulnerable in the long-term, since the devices are often slow to be patched, but early reports indicate an alarming number of systems may be at risk. As Kaspersky Lab's David Jacoby put it, "the real scale of the problem is not yet clear."

Sep 25 13:04

Shocking Documents Prove NSA Spying on Your Cell Phone

Infowars reporter Joe Biggs discovers a document hidden among hundreds of open source licenses on the Samsung Galaxy that admits the NSA is spying on you at all times through your cell phone.

Sep 25 11:41

Obamacare Website Costs Top $2 Billion, Almost Triple Government Estimates

What's the opposite of government efficiency? In a double-take-instigating headline, the federal government’s Obamacare enrollment system has cost about $2.1 billion so far, according to a Bloomberg Government analysis of contracts related to the project. BGOV’s analysis shows that costs for both healthcare.gov and the broader reform effort are far greater than anything publicly discussed. However, that pales into insignificance when considering health reform has cost American taxpayers $73 billion in the last four years... and counting.

Sep 25 11:39

Major Sell Program Trips 50-DMA, Sends Stocks Sliding

A "huge" institutional sell order, covering almost 200 individual stocks, is rumored to have been responsible for getting this morning's weakness across stocks going as equity indices catch down to bonds and credit. The S&P 500 broke key support at its 50-day moving-average (for first time in 2 months) and is back at 6 week lows. The Russell 2000 is now down 4.25% from the FOMC meeting last week...

Sep 25 10:57

Shellshock: Bash bug 'bigger than Heartbleed' could undermine security of millions of websites

A security flaw discovered in one of the most fundamental interfaces powering the internet has been described by researchers as ‘bigger than Heartbleed', the computer bug that affected nearly every computer user earlier this year.

The 'Bash bug', also known as Shellshock, is located in the command-line shell used in many Linux and Unix operating systems, leaving websites and devices power by these operating systems open to attack.

Security firm Rapid7 has rated the bug as 10 out of 10 for its severity, but "low" for complexity - with hackers able to exploit it using just three lines of code.

Sep 25 09:59

Survey: Online trolls are 'everyday sadists'

If you've ever complained that the trolls junking up online comment sections are a bunch of sadistic psychopaths, you might be onto something.

An online survey by a group of Canadian researchers suggests that Internet trolls are more likely than others to show signs of sadism, psychopathy and "Machiavellianism": a disregard for morality and tendency to manipulate or exploit others.

Webmaster's Commentary: 

We kinda figured that out.

Sep 25 09:30

Australian Government Scrambles to Authorize Mass Surveillance

Jeremy Malcolm
Electronic Frontier Foundation

This week, Australian Prime Minister Tony Abbott used recent terrorist threats as the backdrop of a dire warning to Australians that “for some time to come, the delicate balance between freedom and security may have to shift. There may be more restrictions on some, so that there can be more protection for others.” ...

Sep 25 09:24

Do not open any emails with attachment "balance statement.htm!" It is malware

Webmaster's Commentary: 

Don't bother clicking the link to the FBI's list of current scams. It is not listed there. But I received no less than seven of these under various subject lines today, two of which were explicitly sent to wrh@whatreallyhappened.com. The rest just had "recipients" in the "to:" field. Examination of the htm file shows it loads a bunch of malware onto your computer.

Needless to say, I am making this threat known as a public service to our readers ... and beat the NSA to the announcement as well! :)

Sep 25 08:51

PR Firm Pulls ‘Emma Watson Naked Pics’ False Flag to Push For Internet Censorship

A PR firm has admitted to carrying out an online false flag against the 4chan forum in which it blamed the website for a threat to release naked pictures of actress Emma Watson as part of an appeal to President Barack Obama to censor the Internet.

Webmaster's Commentary: 

Anyone foolish enough to take nude pictures and put them on the web is just asking for trouble, and the reality is that more than a few stars intentionally plant nude pictures of themselves where they will be "discovered" as part of the campaign to increase their fame and "bankability." Setting that aside, this whole episode reminds us that the government and corporate media persist in trying to find ways to shut down the open and free internet and turn it into just another government and corporate controlled content and propaganda delivery system. Public Relations firms are paid vast amounts of money to engage in activities which for normal civilians would be punishable as crimes.

Sep 25 08:42

Foreclosure Lawyer Dennis Reimer Caught Lying in 1977 and Still Hasn't Changed His Ways.

"I'll tell you what..... You will rue the day you tried to fuck with me," at 0:40.

As a Name Partner his firm continues to lie and to besmirch the legal community. This is an ongoing situation, updates anticipated next week.

Sunday, September 21, 2014

KingCast and Mortgage Movies Launch a New Facebook Page: Fight Safeguard and Reimer Arnovitz Chernek & Jeffrey for Ethic Violations.

Dennis Reimer a Foreclosure Liar Since 1977: Sims v. Bloomfield Sav. Bank, 1977 Ohio App. LEXIS 8777

Oh my God... Dennis Reimer has been a goddamned liar since 1977 --when I was 12 years old -- on the subject of Service against a homeowner who spanked his ass at trial. So is it far-fetched to believe Reimer Arnovitz fabricated those U.S. Mail green cards in the Busby matter? It is a pattern and practice but wealthy establishment attorneys always get away with it. Don't get mad at me I'm just exposing it:

Sep 25 07:49

Putting your iPhone in the microwave will COOK it, not charge it: Apple urges users not to fall for convincing internet hoax... too late for many

Fake advertisements claiming iPhones can be charged by putting them in the microwave have caught out unwary users whose phones have been set on fire or left a smoking ruin when they've tried it.

Sep 25 05:56

Emma Watson nude photo threats were apparently a plot to kill 4chan

Site was a hoax orchestrated by viral marketing company

Sep 25 03:58

Apple Mac Bug Is 'Bigger' Than Heartbleed

Apple's OS X operating system has a security flaw which could be more serious than the notorious Heartbleed bug, experts have warned.

Hackers could exploit a flaw in software on Unix-based operating systems such as OS X and Linux, according to the US Department of Homeland Security.

The vulnerable software is called Bash, which is used to control the command prompt on many Unix computers.

By exploiting the bug - known as Shellshock - hackers can take control of a targeted system.

Sep 24 15:36

880,000 Affected by Viator Payment Card Breach

TripAdvisor stock was down 4% on Monday and trading around 94 as word circulated about a recent data breach at its tour booking and review website, Viator.

Sep 24 14:29

School Secretly Monitoring Students’ Facebook Posts—On Advice from NSA

A Huntsville, Alabama, public school superintendent says that after taking a friendly call from the NSA, he decided to start secretly monitoring students’ social media activities. -- The school board had no idea what he was doing, and the NSA has denied that it would make a phone call concerning a domestic matter. But Superintendent Casey Wardynski says no, it was definitely the NSA who called.

Sep 24 14:08

Apple withdraws iOS 8 update just hours after release

Apple has issued and then immediately withdrawn the first update of its latest mobile operating system, just a week after the release of iOS 8.

It is thought to be the first time that the company has pulled a software update from its App Store.

The release of iOS 8 followed the launch of the iPhone 6 and iPhone 6 Plus earlier this month, but the operating system has been plagued by a range of problems, including wireless connectivity problems and battery drain.

Sep 24 14:00

FBI Plans Rapid DNA Dragnets

The FBI is preparing to accelerate the collection of DNA profiles for the government's massive new biometric identification database. Developers of portable DNA analysis machines have been invited to a Nov. 13 presentation to learn about the bureau's vision for incorporating their technology into the FBI's new database.

Sep 24 11:42

School Secretly Monitoring Students' Facebook Posts—On Advice from NSA

A Huntsville, Alabama, public school superintendent says that after taking a friendly call from the NSA, he decided to start secretly monitoring students' social media activities.

The school board had no idea what he was doing, and the NSA has denied that it would make a phone call concerning a domestic matter. But Superintendent Casey Wardynski says no, it was definitely the NSA who called.

Sep 24 10:55

Home Depot Hack Is Letting Criminals Drain Money From People's Bank Accounts

Data breach at home improvement retailer Home Depot Inc has led to fraudulent transactions across the United States, draining cash from customer bank accounts, the Wall Street Journal said.

Webmaster's Commentary: 

And where is the mighty NSA in all this? The American taxpayer has been forced to surrender billions in tax dollars, not to mention the Bill of Rights, to create an all-encompassing data monitoring system we are told exists to find criminals and terrorists. Yet we have not heard a peep from the NSA in all these serious data breaches. Not once. And the NSA could certainly use some good PR right now!

So where are they?

Is this "We are watching you" a gigantic and costly bluff to scare the people into silent obedience? After all, the Nazis used the same trick to keep their population silent and uncomplaining as Germany was led to the slaughter.

Or, alternative theory; it is the NSA itself that is behind the data breaches. They certainly have the resources to carry out these crimes, and as already demonstrated, no regard for the laws of the land! Criminal activity in intelligence agencies is hardly new. The CIA was trafficking drugs from Vietnam, then later Central America, to fund operations they did not wish to tell Congress about. Maybe NSA is doing the exact same thing, with NSA employees "dipping into the take" to get the latest iPhone!

Because all these data breaches and not a word from the NSA makes no sense at all!

Sep 24 07:55

$425 million: FBI's Expensive Sentinel Computer System Still Isn't Working, Despite Report

You can’t find what you need most of the time, or you get junk you don’t want, but other than that, the FBI’s long troubled, half-billion-dollar Sentinel computerized file system is coming along just fine, says the Justice Department’s watchdog.

Sentinel, successor to the FBI’s antiquated Automatic Case Support System, or ACS, was supposed to be finished by the end of 2009 at a cost of $425 million. Plagued by mismanagement, cost overruns and technical glitches detailed in a series of reviews through the years, its budget has ballooned another $100 million, the new report says. Years after it was launched, FBI special agents and intelligence analysts sometimes still have to visit another field office to obtain a particularly big or sensitive file, sources say.

Sep 24 07:51

Your Smartphone Broadcasts Your Entire Life To The Secret Service

Intelligence services collect metadata on the communication of all citizens. Politicians would have us believe that this data doesn’t say all that much. A reader of De Correspondent put this to the test and demonstrated otherwise: metadata reveals a lot more about your life than you think.

Sep 24 07:27

Emma Watson nude photos threat a hoax

A website threatening to release nude photos of actress Emma Watson is a hoax, designed by somebody claiming to be a marketing firm determined to smear online message board 4chan.

Sep 24 07:00

Huntsville schools say call from NSA led to monitoring students online

HUNTSVILLE, Alabama - A secret program to monitor students' online activities began quietly in Huntsville schools, following a phone call from the NSA, school officials say. Huntsville schools Superintendent Casey Wardynski says the system began monitoring social media sites 18 months ago, after the National Security Agency tipped the school district to a student making violent threats on Facebook.

The NSA, a U.S. agency responsible for foreign intelligence, this week said it has no record of a call to Huntsville and does not make calls to school systems. Regardless of how the program started, Huntsville City Schools began scanning Facebook and other sites for signs of gang activity, watching for photos of guns, photos of gang signs and threats of violence.

Sep 23 14:45

The dirty TRUTH about the new iPhone 6

A different type of Apple iPhone 6/Samsung Galaxy S5 comparison.

Sep 23 09:59

Banking & Foreclosure: Seattle City Council Moves Closer to Auditing MERS & Deed Registries.


Seattle City Council is leading the way..... stay tuned for more details in the coming months. That is all I will say right now.

http://mortgagemovies.blogspot.com/2014/09/kingcast-and-mortgage-movie...

http://www.scribd.com/doc/240577761/Seattle-City-Council-Leads-the-Way...

************

And from yesterday don't miss this: Dirty-assed commingling lawyers who filed an anti-First Amendment Bar Complaint against me get their comeuppance as former employees rat them out.

http://mortgagemovies.blogspot.com/2014/09/kingcast-and-mortgage-movie...

http://www.scribd.com/doc/240515714/Slam-Safeguard-and-Reimer-Arnovitz...

23 September, 2014

Reimer Arnovitz et al Unethical Commingling + Retaliatory Bar Complaint

Sep 23 08:29

Snowden, CDC whistleblower: who owns information?

Jon Rappoport
Activist Post

Let me start with this general statement: there are scientists and politicians who are trained like dogs to believe that corrections to the deepest crimes of government can be achieved through an orderly structure and process.

This belief is a form of mind control. It’s engraved in a place where so-called rational people still entertain a fairy tale about rescue and “everything working out properly, through channels.”

Among the many differences between Ed Snowden and William Thompson, the CDC whistleblower, there is one striking similarity...

Sep 23 07:10

FBI gags state and local police on capabilities of cellphone spy gear

The FBI requires state and local police to keep quiet about the capabilities of a controversial type of surveillance gear that allows law enforcement to eavesdrop on cell phone calls and track individual people based on the signals emitted by their mobile devices, according to a bureau document released recently under a Freedom of Information Act request.

The December 2012 document is a heavily redacted letter between the FBI and police in Tacoma, Wash., as the local department sought to acquire an IMSI catcher, sometimes described as a “fake cell phone tower” because it tricks individual phones into routing their calls and other data through the surveillance equipment. The Takoma police were buying gear produced by Harris Corp., a Florida-based company that makes the StingRay and other IMSI catchers used by law enforcement agencies across the country.

Sep 22 14:50

Death, drones and driverless cars: how Google wants to control our lives

If you want to understand the future of humanity – where we’re headed, who’ll be in charge, and exactly how worried you should be about that – you could do worse than begin with two unremarkable buildings, on opposite coasts of the US. The more famous one, half a mile from Google’s main campus in Mountain View, California, is home to Google X, the search giant’s purportedly secret research lab. It’s not really very secret.

Sep 22 13:16

“Virtual Reality” Journalism Could Create “Virtual Propaganda”

The largest U.S. newspaper publisher is experimenting with Facebook’s virtual reality headset to allow readers to experience a news story in a 3D immersive environment, but one expert warns the technology could lead to “virtual propaganda” which misleads viewers.

Sep 22 12:51

Tor Challenge Inspires 1,635 Tor Relays

Good news for whistleblowers, journalists, and everyone who likes to browse the Internet with an added cloak of privacy: the Tor network got a little stronger. Tor—software that lets you mask your IP address—relies on an international network of committed volunteers to run relays to help mask traffic. And that network is stronger now, thanks to the 1,000+ volunteers who participated in our second-ever Tor Challenge.

Sep 22 11:16

Get Your Christmas Gifts From The Police State!

From the "you can't make this up" files...

Amanda Warren
Activist Post

So perhaps you think that warrantless checkpoints, random DNA sampling, no-knock SWAT raids to smoke out some criminals, and an array of high-tech weapons and drones were the only gifts bestowed upon society by a rightly outfitted militarized U.S. police force. Freedom isn't free after all!

In at least a couple of locations last year, Santa had a personal escort in his mission of gift-giving. Because, these days, even Santa Claus is under attack from freedom-hating terrorists and criminals - ESPECIALLY because they are all Muslim (big wink). So, last year, Silver Spring, Maryland - population 70,000 - exchanged Santa's Sleigh for a Ballistic Engineered Armored Response Counter Attack Truck, commonly known as a BearCat, so that he could safely distribute gifts and donations amid an elevated threat level...

Sep 22 10:15

Big Brother Wants 'To Make Life Easier' For You - But Ask Yourself Why

Increasingly, how we interact with government over the internet is the public face of Whitehall. Mike Bracken, head of the Government Digital Service (GDS) – launched in 2011, based on the recommendations of Lastminute.com founder Martha Lane Fox – is the man in charge of this digital transformation. Lane Fox recommended that a central service bring together existing government websites, enable access to official data and enable day-to-day transactions, such as renewing a car tax disc, easy online.

Sep 22 09:10

David Cameron appoints special envoy to preserve government data snooping

Prime minister David Cameron has appointed Sir Nigel Sheinwald as a special envoy on "intelligence and law enforcement data sharing".

The role was announced by Cameron this July, when he set out the government’s plans to introduce emergency legislation to preserve data retention and investigation powers (the Data Retention and Investigatory Powers Act).

Sep 22 08:46

DOJ Power Grab Wants To Target Anonymous Web Users

The US Department of Justice (DOJ) is proposing a power grab that would make it easier for domestic law enforcement to break into computers of people trying to protect their anonymity via Tor or other anonymizing technologies.

That's according to a law professor and litigator who deals with constitutional issues that arise in espionage, cybersecurity and counterterrorism prosecutions.

Sep 22 08:14

Fake ads suggest you can charge your iPhone 6 in a microwave

Remember the spoof adverts that tried to suggest that iOS 7 would make your iPhone waterproof? Well the same bunch of tricksters from the 4chan message boards are back, and this time they’re trying to get you to microwave your iPhone 6. Just in case you were tempted to try it: no, you cannot charge your brand new phone by putting it in the microwave.

Sep 22 07:20

Snowden Reveal Makes Israeli Spies' Protest An American Issue

Last Friday, 43 veteran and reserve members of Israel's secretive spy organization, Unit 8200, claimed they'd been directed to spy on Palestinians for coercion purposes.

The group signed an open letter of protest to Prime Minister Benjamin Netanyahu and to the head of the Israeli army, accusing the spy agency of targeting innocent Palestinians and collecting data for political purposes, not national security. Dubbed the "refusniks," the veterans declared that they had a "moral duty" to no longer "take part in the state's actions against Palestinians."

The source of much of the Israeli data may be the U.S. National Security Agency. Author and journalist James Bamford interviewed NSA leaker Edward Snowden in Moscow this summer. Bamford tells NPR's Arun Rath that Snowden was eager to discuss documents that show a U.S. agreement to routinely share information with Israel and Unit 8200.

Sep 22 06:26

Dirty Foreclosure Mill Reimer Arnovitz Facing Ethics Probe for Lies and Stealing from Clients.

http://www.scribd.com/doc/240515714/Slam-Safeguard-and-Reimer-Arnovitz...

Stop the presses: Just off the Lexis updates.... same exact issues Pattie Busby is alleging against Reimer but the goddamn State Court won't address it. Can you say "Judicial Notice."

Citing Refs. With Analysis Available. Click to Shepardize® Kline v. Mortg. Elec. Sec. Sys., 2014 U.S. Dist. LEXIS 124406

II. FACTUAL ALLEGATIONS

The Amended Complaint alleges that Kline entered into a $160,000 loan transaction with WMC Mortgage Corporation ("WMC") in June of 2004. Doc. #157 ¶ 25. After Kline fell behind on the payments and defaulted on the loan, Reimer commenced foreclosure proceedings against him in August, 2005, on behalf of WMC and the loan servicer, HomEq Servicing Corporation ("HomEq"). Id. ¶¶ 26-29. The mortgage was later reinstated and the foreclosure case against Kline was dismissed. Id. ¶ 30.

Sep 22 04:50

Amazon, Facebook, and Twitter Allows ISIS To Sell Merchandise

WEBMASTER ADDITION: That alone tells us ISIS is a propaganda front for US/Israel covert operations.

Sep 21 19:38

Globalist billionaire Peter Thiel’s take on the Bilderberg Group

In 2012, as covered in my documentary film Shade the Motion Picture, I flew to Chantilly Virginia to cover a secretive closed-door meeting conducted at the Westfields Marriott by a select few of the world’s foremost elite and royalty who essentially sit down in an organized fashion to plan our futures — the futures of their indentured servants, or as Marvin the Martian would say, “futile Earth scum”.

Sep 21 15:43

Warning for iPhone Users: iOS 8 Wave is a Hoax

. . . . someone made an Apple-style graphic explaining the benefits of “Wave,” a fake technology that lets you charge an iPhone by popping it in the microwave.

According to the graphic, Wave sucks in power from the microwave radiation used by the appliance to cook food.

Also here: http://www.king5.com/story/tech/2014/09/20/iphone-ios-8-wave-hoax/1597...

Drink Brawndo!

Sep 21 13:41

The Internet Debate Pits Local Communities Against Broadband Giants

Internet service with modern connection speeds is not available in much of Bradley County, Tennessee. Some parts have no internet service at all. But local advocates and lawmakers are pushing the FCC to intervene on their behalf - against major broadband companies and their lobbyists.

Sep 21 10:09

Alt media success panics neocons

As Western mainstream media fall into the hands of lying billionaires, Zionists, and intelligence agencies (three categories with significant overlap) – and as neoconservatives script big media’s ignoble lies – a surging internet-based alternative media has arisen to challenge the elite’s false narratives. Thanks to alt-media, fewer and fewer people are buying the simplistic feel-good myths peddled by the mainstream.

Webmaster's Commentary: 

I blush!

Sep 20 17:21

eBay “security glitch” has existed for months

A flaw that has exposed eBay customers to malicious websites has been affecting the site since at least February, according to the BBC.

Earlier this week it was revealed how clicking on some listings automatically redirected users to the harmful sites.

EBay removed several posts, but said it was an isolated incident.

But the BBC has since found multiple listings, from multiple users, exploiting the same vulnerability.

Furthermore, several readers contacted the BBC detailing complaints they had made to the site.

Sep 20 07:46

"NSA shared Americans' private communications with Israel"

Sep 20 07:25

Ex-Employees Say Home Depot Left Data Vulnerable

The risks were clear to computer experts inside Home Depot: The home improvement chain, they warned for years, might be easy prey for hackers.

But despite alarms as far back as 2008, Home Depot was slow to raise its defenses, according to former employees. On Thursday, the company confirmed what many had feared: The biggest data breach in retailing history had compromised 56 million of its customers’ credit cards. The data has popped up on black markets and, by one estimate, could be used to make $3 billion in illegal purchases.

Sep 19 20:03

Court Lets Cisco Systems Off the Hook for Helping China Detain, Torture Religious Minorities

Chinese citizens who suffered forced detention, torture, and a panoply of brutal human rights abuses at the hands of the Chinese government have been engaged in a high profile court case against Silicon Valley mainstay Cisco Systems for many years.

Sep 19 18:01

Google acts like privatized NSA: WikiLeaks’ Julian Assange

IN INTERVIEWS WITH BBC AND SKY NEWS, WIKILEAKS FOUNDER EXPLAINS HOW GOOGLE’S BEHAVIOR, THOUGH LEGAL, IS LIKE THAT OF SURVEILLANCE AGENCIES

Sep 19 14:48

Google Acts Like Privatized NSA

Google’s practices are “almost identical” to those of the U.S. National Security Agency and its British counterpart, the GCHQ, Julian Assange has said.

The WikiLeaks founder made the charge Thursday in interviews with the BBC and Sky News. He spoke from the Ecuadoran Embassy in London, where he has lived for over two years under political asylum.

Sep 19 13:02

Teen with lymphatic malformations has profile photo deleted by Facebook

On Tuesday, Norwegian news site VG reported that a 16-year-old boy found his newest Facebook profile photo deleted automatically by the site, but not for containing offensive content or misrepresenting himself. Embret Henock Haldammen, a high school student in Kristiansand, Norway, had posted his latest school portrait weeks earlier, only to receive a notice stating that "the profile picture violated Facebook's policies."

Webmaster's Commentary: 

But Facebook is okay with setting a kitten on fire!

And of course, facebook is blocking all posts that reference the video of "All Wars Are Bankers' Wars" under the excuse that YouTube is a known security threat!

Sep 19 10:38

World Wide Web inventor slams Internet fast lanes: ‘It’s bribery.’

In a visit to The Washington Post, on Thursday, Berners-Lee said that system is now in danger from Internet service providers (ISPs) who stand to amass too much power over what was intentionally built as a decentralized network — one where no single actor could dictate outcomes to everyone else.

Berners-Lee pushed back against opponents of net neutrality regulation who argue that applying new rules on ISPs is tantamount to regulating the Internet. But there's a difference between regulating providers of broadband and the services that run on top of it, said Berners-Lee. Strong net neutrality rules would help preserve that line dividing the two and limit the incentive of ISPs to meddle in the market for services.

Sep 19 07:04

Home Depot breach affected 56M debit, credit cards

Home Depot said Thursday that a data breach that lasted for months at its stores in the U.S. and Canada affected 56 million debit and credit cards, far more than a pre-Christmas 2013 attack on Target customers.

The size of the theft at Home Depot trails only that of TJX Companies' heist of 90 million records disclosed in 2007. Target's breach compromised 40 million credit and debit cards.

Webmaster's Commentary: 

And where is the NSA in all this? After all that money and Constitutional violations, can;t they actually do something USEFUL?

Sep 19 06:43

50 Facts That Show How Far America Has Fallen In This Generation

What has happened to America? Please show these numbers to anyone that does not believe that the United States is in decline.

Sep 19 05:07

AT&T/DirecTV merger boosts incentive to kill copper service, opponents say

AT&T’s proposed $48.5 billion acquisition of DirecTV will reduce competition for TV subscribers, increase AT&T’s “incentive to discriminate against online video services,” and give AT&T more reasons to neglect its aging copper network, consumer advocacy groups argue in a petition to deny the merger. AT&T has claimed the merger would help it expand fiber buildouts to an additional two million locations, but this claim is unverifiable because AT&T hasn’t said how much fiber it will deploy if the merger is not approved, says the petition to the FCC filed Tuesday by Public Knowledge and the Institute for Local Self-Reliance.

Sep 19 00:06

AFP accidentally leaves explosives at Sydney airport, force to apologise to public

oops we left a suitcase full of plastic explosives here, sorry our bad.

Sep 18 22:57

Irate NSA Staffer Doesn’t Like Being Filmed in Public, for Some Reason

The NSA sent someone bearing the nametag “Neal Z.” to the University of New Mexico’s Engineering and Science Career Fair today, in the hopes of recruiting young computer geniuses to help manage the yottabytes of data it is collecting about you. But instead of eager young applicants, Mr. Z. encountered University of New Mexico alumnus Andy Beale and student Sean Potter, who took the rare opportunity of being in the room with a genuine NSA agent to ask him about his employer’s illegal collection of metadata on all Americans. Mr. Z. did not like that one bit.

Sep 18 20:29

ALERT: Federal government may seize and shut down all internet sites that don’t push vaccines during a national emergency pandemic

If you aren’t saving off articles, downloading important MP3 audio files and printing off vital information that might save your life in a pandemic outbreak, you may soon find yourself completely cut off from all holistic or alternative information on the web.

Sep 18 18:45

Over a dozen intercept cell phone towers found near the White House and Senate

t was early September when reports of fake cell phone towers across America started picking up steam in the alternative press. Les Goldsmith, the CEO of the defense & law enforcement technology provider ESD America, told the press that he was able to map out 17 different fake

Sep 18 17:43

Home Depot: 56M Cards Impacted, Malware Contained

Home Depot said today that cyber criminals armed with custom-built malware stole an estimated 56 million debit and credit card numbers from its customers between April and September 2014. That disclosure officially makes the incident the largest retail card breach on record.

Sep 18 17:39

Apple’s “warrant canary” disappears, suggesting new Patriot Act demands

When Apple published its first Transparency Report on government activity in late 2013, the document contained an important footnote that stated:

“Apple has never received an order under Section 215 of the USA Patriot Act. We would expect to challenge such an order if served on us.”

Writer and cyber-activist Cory Doctorow at the time recognized that language as a so-called “warrant canary,” which Apple was using to thwart the secrecy imposed by the Patriot Act.

Warrant canaries are a tool used by companies and publishers to signify to their users that, so far, they have not been subject to a given type of law enforcement request such as a secret subpoena. If the canary disappears, then it is likely the situation has changed — and the company has been subject to such request.

Now, Apple’s warrant canary has disappeared.

Sep 18 12:39

Apple’s “warrant canary” disappears, suggesting new Patriot Act demands

Apple included language in its first Transparency Report to say that it had not been subject to a Section 215 Patriot Act request. That language is now gone.

Sep 18 09:01

VIDEO: IRATE NSA STAFFER DOESN’T LIKE BEING FILMED IN PUBLIC, FOR SOME REASON

The NSA sent someone bearing the nametag “Neal Z.” to the University of New Mexico’s Engineering and Science Career Fair today, in the hopes of recruiting young computer geniuses to help manage the yottabytes of datait is collecting about you.

Sep 18 08:17

Google Maps Has Been Tracking Your Every Move, And There’s A Website To Prove It

Remember that scene in Minority Report, where Tom Cruise is on the run from the law, but is unable to avoid detection because everywhere he goes there are constant retina scans feeding his location back to a central database? That’s tomorrow. Today, Google is tracking wherever your smartphone goes, and putting a neat red dot on a map to mark the occasion.

You can find that map here. All you need to do is log in with the same account you use on your phone, and the record of everywhere you’ve been for the last day to month will erupt across your screen like chicken pox.

Sep 18 06:58

Biggest attack on RT.com: Website hit by 10 Gbps DDoS

RT.com has been hit with the most powerful DDoS attack in the website's history, which reached 10 Gbps in strength. No group has claimed responsibility. RT has experienced cyber assaults in the past, prompted by its reporting on Manning and WikiLeaks.

The Wednesday attack was successfully deflected, but resulted in a temporary slowdown of the site.

“Thanks to the website’s reliable technical protection, RT.com was unavailable just for a few minutes, even though the DDoS attack has continued,” RT’s press service said in a statement.

The attack was identified as a UDP-flood type, and reached 10 gigabits per second.

Sep 18 06:40

NSA Attacks Student at University of New Mexico

Sep 18 06:26

Apple will no longer unlock most iPhones, iPads for police, even with search warrants

Apple said Wednesday night that it is making it impossible for the company to turn over data from most iPhones or iPads to police — even when they have a search warrant — taking a hard new line as tech companies attempt to blunt allegations that they have too readily participated in government efforts to collect user information.

Sep 17 19:22

Biggest attack on RT.com: Website hit by 10 Gbps DDoS

RT.com has been hit with the most powerful DDoS attack in the website's history, which reached 10 Gbps in strength. No group has claimed responsibility.

Sep 17 18:36

Nowhere To Hide As Minority Report-Style Facial Recognition Technology Spreads Across America

What is our society going to look like when our faces are being tracked literally everywhere that we go? As part of the FBI's new Next Generation Identification System, a facial recognition database known as the Interstate Photo System will have collected 52 million of our faces by the end of 2015. But that is only a small part of the story. According to Edward Snowden, the NSA has been using advanced facial recognition technology for years. In addition, as you will see below, advertising companies are starting to use Minority Report-style face scanners in their billboards and many large corporations see facial recognition technology as a tool that they can use to serve their customers better. Someday soon it may become virtually impossible to go out in public in a major U.S. city without having your face recorded. Is that the kind of society that we want?

Sep 17 15:15

Occupy group abolishes nearly $4 million in student loan debt

On the third anniversary of the Occupy Wall Street movement, an offshoot group announced that it has erased $3.8 million worth of private student loan debt.

The group, Strike Debt, said in a press release issued on Wednesday this week that its Rolling Jubilee initiative has purchased nearly $4 million in private student debt owed by former attendees of Everest College — an institution run by the massive for-profit education company Corinthian Colleges — in turn freeing those former students from a huge chunk of the burdensome loan bills.

Sep 17 14:57

Senators opposing net neutrality rake in more campaign cash

Senators who have vocalized their opposition to net neutrality are taking in, on average, 40 percent more campaign cash from the broadband-delivery industry than those who support it, according to an analysis of campaign data.

The data (XLSX)—a Maplight analysis of campaign contributions prepared for Ars Technica—highlights the disparity between what the monied Washington interests want compared to the public's desires. Most of the 800,000 initial public comments to the Federal Communications Commission backed the FCC adopting net neutrality rules. The commission is weighing whether to enact regulations that, among other things, could prevent broadband providers from charging for Internet fast lanes. The public commenting period ended Monday.

Sep 17 13:29

ALERT: Federal government may seize and shut down all internet sites that don't push vaccines during a national emergency pandemic

If you aren't saving off articles, downloading important MP3 audio files and printing off vital information that might save your life in a pandemic outbreak, you may soon find yourself completely cut off from all holistic or alternative information on the web. Under an executive order signed by President Obama in 2012, the U.S. federal government now has the authority to seize and shut down all private websites which do not promote vaccines and pharmaceuticals during the coming Ebola pandemic the government expects to sweep across America.

If you aren't making alternative plans to have access to lifesaving information about antiviral herbal remedies and immune boosting solutions, you can fully expect to be completely cut off from those information sources of a pandemic national emergency is declared.

Sep 17 13:07

New Android Browser Bug Is a “Privacy Disaster” for Android Users

A Critical android vulnerability has been discovered in the browser installed by default on a large number (Approximately 70%) of Android devices, that could allow an hacker to hijack users’ open websites, and there is now a Metasploit module available to easily exploit this dangerous vulnerability.

Independent security researcher Rafay Baloch has written about a security bug in the Android Browser app that allows one website to steal data from another. The exploit targets vulnerability (CVE-2014-6041) in Android versions 4.2.1 and all older versions and was first disclosed right at the start of September by Rafay Baloch.

The guys over at Metasploit are calling it a “Privacy Disaster,” and promising to take the time to create a video that is “sufficiently shocking” in order to show you why.

Sep 17 11:41

WHAT YOU'RE NOT BEING TOLD ABOUT THE USA FREEDOM ACT

The current “gutted” version of the U.S.A. Freedom Act (S. 2685) will only serve to legalize government’s currently illegal surveillance of innocent civilians. A coalition of whistleblowers & civil liberties organizations published a letter calling on members of Congress to reject the empty reform.

Sep 17 10:15

Government could have fined Yahoo trillions of dollars "At the end of the year: the total would have been $7.9 sextillion. That’s equal to a stack of $100 bills (if that many actually existed) so high that it would go back and forth to the sun 28,769 time

For an illuminating glimpse of government power in action, it’s hard to beat the fines the Justice Department threatened to level against Yahoo if it didn’t comply with a secret and sweeping surveillance request in 2008.News coverage of the case, for which documents were unsealed last week, reported the proposed fines as $250,000 a day. But there was also a clause that called for a doubling of the amount each week if Yahoo refused to comply. It was more than enough to bankrupt the company after just a few months.

Sep 17 09:56

CIA, NSA And Facebook Create 'Threat Matrix Score' On Every American

Participation on Facebook could prove very dangerous to your future well-being. There is a reason that Facebook is aligned with both the CIA and the NSA. I have several credible sources who tell me that all data posted on Facebook goes into series of cataloged files which culminates with each person being assigned a “Threat Matrix Score”. The mere existence of a Threat Matrix Score should send chills up and down the collective spines of every American.

Sep 17 09:22

DOCTOR: KEEP CELLPHONES ON ‘AIRPLANE MODE’ WHILE IN POCKETS TO LOWER CANCER RISK

“If you have to have your phone in your pocket for a short period of time, it’s not going to be a problem as long as you have it on airplane mode, which means you cannot send or receive messages,” she said.

Sep 17 09:10

New Zealand's Prime Minister: 'Snowden Might Be Right'

Prime Minister John Key said Edward Snowden ‘may well be right’ in his claims that the NSA has access to communications from New Zealand. The politician, however, said he ‘did not believe’ mass surveillance was taking place.

Key was interviewed in the aftermath of Edward Snowden’s revelations on Monday published by The Intercept, in which he claimed he “routinely came across the communications of New Zealanders” in his work with “a mass surveillance tool we [NSA] share with GCSB, called ‘XKeyscore’.”

Sep 17 07:31

The NSA and GCHQ Campaign Against German Satellite Companies

“Fuck!” That is the word that comes to the mind of Christian Steffen, the CEO of German satellite communications company Stellar PCS. He is looking at classified documents laying out the scope of something called Treasure Map, a top secret NSA program. Steffen’s firm provides internet access to remote portions of the globe via satellite, and what he is looking at tells him that the company, and some of its customers, have been penetrated by the U.S. National Security Agency and British spy agency GCHQ.

Stellar’s visibly shaken chief engineer, reviewing the same documents, shares his boss’ reaction. “The intelligence services could use this data to shut down the internet in entire African countries that are provided access via our satellite connections,” he says.

Sep 17 07:02

Federal government may seize and shut down all internet sites that don't push vaccines during a national emergency pandemic

Under an executive order signed by President Obama in 2012, the U.S. federal government now has the authority to seize and shut down all private websites which do not promote vaccines and pharmaceuticals during the coming Ebola pandemic the government expects to sweep across America.

Sep 16 17:23

Google: US government demands for user data have risen 250% since 2009

Transparency report shows global government requests for information rose 15% last year, as tech giant urges surveillance reform

Sep 16 15:20

Let Me Explain Why U2 Is Damaging the Music Industry…

Dumping an album in hundreds of millions of iTunes libraries whether people want it or not, reduces music to the level of a software update or a bug-fix or just plain spam.

Sep 16 13:34

‘More harm than good’: Congressional NSA reforms a sham, say critics

INTELLIGENCE COMMUNITY WHISTLEBLOWERS AND CIVIL LIBERTIES GROUPS CALL ON CONGRESSMEN TO REJECT ‘GUTTED’ USA FREEDOM ACT

Sep 16 09:41

Nationwide Biometric Database Goes Live

Nicholas West
Activist Post

Despite the FBI already having been sued by privacy groups amid plans for a nationwide biometric database, it has officially gone live. The Next Generation Identification system will eventually include iris scans, facial recognition, and a range of other biometric identifiers that are collated into a central database for real-time sharing at all levels of law enforcement and government agencies...

Sep 16 08:13

THREE QUARTERS of Android mobes open to web page spy bug

Tod Beardsley (@TodB), a developer for the Metasploit security toolkit dubbed the "major" flaw a "privacy disaster".

"What this means is any arbitrary website - say, one controlled by a spammer or a spy - can peek into the contents of any other web page," Beardsley said.

"[If] you went to an attackers site while you had your web mail open in another window, the attacker could scrape your email data and see what your browser sees.

"Worse, he could snag a copy of your session cookie and hijack your session completely, and read and write web mail on your behalf."

Sep 16 08:05

Computer Models Tell Us That This Ebola Pandemic Could Soon Kill Millions

We could potentially be on the verge of the greatest health crisis that any of us have ever seen. The number of Ebola cases in Africa has approximately doubled over the past three weeks, and scientific computer models tell us that this Ebola pandemic could ultimately end up killing millions of us – especially if it starts spreading on other continents. At first, many assumed that this Ebola outbreak would be just like all the others – that it would flare up for a little while and then it would completely fade away. But that has not happened this time. Instead, this epidemic has seemed to pick up momentum with each passing week. Despite extraordinary precautions, hundreds of health workers have gotten the virus, and the head of the CDC says that the spread of Ebola is “spiraling out of control” and that it is “going to get worse in the very near future.” For those that have thought that all of this talk about Ebola was just “fearmongering”, it is time for you to wake up.

Sep 16 07:48

Is YOUR Amazon account at risk? Security expert finds flaw in the Kindle library that could expose personal details

Next time you log into Amazon to manage your Kindle and e-books, you could be putting your personal details at risk.

A German security researcher has spotted a vulnerability in the retail giant's website that hackers could exploit to gain full access to users' accounts.

The flaw, which can be exploited when a user downloads a malicious e-book, has been active since at least July this year, despite being reported to Amazon’s security team.

Sep 16 06:16

Justice Department Proposal Would Massively Expand FBI Extraterritorial Surveillance

A Department of Justice proposal to amend Rule 41 of the Federal Rules of Criminal Procedure would make it easier for domestic law enforcement to hack into computers of people attempting to protect their anonymity on the Internet. The DOJ has explicitly stated that the amendment is not meant to give courts the power to issue warrants that authorize searches in foreign countries—but the practical reality of the underlying technology means doing so is almost unavoidable.

The result? Possibly the broadest expansion of extraterritorial surveillance power since the FBI’s inception.

This post highlights key issues raised by the international aspect of the DOJ proposal, in the attempt to encourage wider public debate before the FBI is granted such expansive powers.

Sep 16 04:18

Court blasts US Navy for scanning civilians’ computers for child porn

A federal appeals court said the US Navy's scanning of the public's computers for images of child pornography constituted "a profound lack of regard for the important limitations on the role of the military in our civilian society."

The Naval Criminal Investigative Service (NCIS) practice led the 9th US Circuit Court of Appeals to suppress evidence in the form of images of child pornography that an NCIS agent in Georgia found on a Washington state civilian's computer. The agent was using a law-enforcement computer program called RoundUp to search for hashed images of child pornography on computers running the file-sharing network Gnutella.

"...RoundUp surveillance of all computers in Washington amounted to impermissible direct active involvement in civilian enforcement of the child pornography laws, not permissible indirect assistance," Judge Marsha Berzon wrote for the San Francisco-based appeals court.

Sep 15 15:32

The new Luddites: why former digital prophets are turning against tech

Neo-Luddism began to emerge in the postwar period. First after the emergence of nuclear weapons, and secondly when it became apparent new computer technologies had the power to change our lives completely.

Webmaster's Commentary: 

It isn't the new technologies that are the problem, but the misuse of those technologies by government and corporations.

Sep 15 15:18

The Original Idea for Mobile Music Streaming… Written In 1908

…from “The Future of the Wireless Art,” Wireless Telegraphy and Telephony: Popularly Explained (p.67) by Nikola Tesla.

An inexpensive instrument, not bigger than a watch, will enable its bearer to hear anywhere, on sea or land, music or song, the speech of a political leader, the address of an eminent man of science, or the sermon of an eloquent clergyman, delivered in some other place, however distant. In the same manner any picture, character, drawing, or print can be transferred from one to another place. Millions of such instruments can be operated from but one plant…

Sep 15 14:48

Giganews Is an FBI operation

This is my warning - that all of the content being downloaded and shared on the Usenet network is going through the authorities! Giganews customers are being logged! The log file is called the "gigauth" on their "cruncher" servers which logs every connection by every customer, which are then archived. This means Usenet uploaders are helping the feds monitor the distribution of Usenet content if their newsgroup provider peers with Giganews!

Sep 15 14:46

Snowden: 'If You Live in New Zealand, You Are Being Watched'

NSA whistleblower Edward Snowden has penned a firm rebuke to New Zealand Prime Minister John Key, accusing the head of state of "not telling the truth about mass surveillance" and issuing this plainly worded warning to residents of the country: "If you live in New Zealand, you are being watched."

Sep 15 14:17

US spies have two bases in New Zealand: Snowden

Renegade former American intelligence analyst Edward Snowden claims the US National Security Agency, for which he used to work, has a facility in Auckland and another in the north. "You are being watched."

Snowden, who is sheltering in Moscow from US attempts to extradite him on espionage charges, appeared by video link before a capacity crowd at the Kim Dotcom-organised Moment of Truth event in Auckland Town Hall last night.

Sep 15 13:49

FBI's facial recognition program hits 'full operational capability'

The Federal Bureau of Investigation’s Next Generation Identification System, a biometric database reliant on tens of millions of facial-recognition records, is now fully operational, the agency announced Monday.

The NGI system, after three years of development, is billed by the FBI as a new breakthrough for criminal identification and data-sharing between law enforcement agencies.

Sep 15 11:45

Yahoo Mail To Be Scanned To Find Users Buying Habits

Yahoo is working on an app recommendation algorithm that will suggest new apps for you to buy based on apps you’ve purchased in the past.

Yahoo knows which apps its Yahoo Mail users have downloaded because whenever someone downloads an app from Apple’s App Store or the Google Play store, Google and Apple emails that person a receipt.

Sep 15 11:42

Our Nation Depends on Restoring Product Liability

Sadly, we have seen a trend in recent decades for the government to protect corporations against the people, rather than protecting the people against corporations. Along with computers, other industries we are dependent on are being protected against product liability lawsuits, such as vaccine manufacturers, and other biotech corporations. This is a practice typically seen under fascist governments, and it never ends well.

The computers don't last. The software will not install. The aqueducts are leaking. The roads are cracking.

Rome is falling.

Optional Banner: 
WRH Exclusive
Sep 15 08:12

Apple Reportedly Paid Over $100 Million to Infect Your Phone With U2

Let's tally up the winners and losers of this transaction.

Apple

Spent: Over $100 million. (As The Verge reminds us, Apple has revenues in the hundreds of billions.)

Received: A new album by U2, advertising in direct (television commercials) and indirect formats (breathless liveblogging by the tech media).

U2

Spent: An undisclosed sum, likely somewhere in the five or six figures, in order to produce an album.

Received: Many millions of dollars from Apple.

Apple customers

Spent: Nothing.

Received: A new album by U2.

I think we got fucked on this, you guys.

Sep 15 08:01

Fifteen Months After the NSA Revelations, Why Aren’t More News Organizations Using HTTPS?

More than fifteen months after the NSA revelations laid bare the overwhelming scope of online surveillance and fueled the demand for privacy, virtually none of the top news websites—including all those who have reported on the Snowden documents—have adopted the most basic of security measures to protect the integrity of their content and the privacy of their readers: deploying HTTPS.

Sep 15 07:50

GCHQ and NSA Hack German Telecoms To Track 'Every Device'

Intelligence agencies, including the NSA and GCHQ used Deutsche Telekom's network to create a 'Treasure Map' of the internet that could be used to monitor and track web users.

Der Spiegel reported uncovering the campaign while analysing documents leaked by whistleblower Edward Snowden. The map reportedly collected data from, and showed the location of, every smartphone, computer and tablet connecting to Deutsche Telekom's network in real time.

Sep 15 07:44

Comcast Tells Customers to Stop Using Tor Browser

Embattled Comcast has another complaint about customer service to add to its growing list. The cable and Internet provider has been telling customers that their service will be terminated if they don’t stop using the Tor web browser. According to a report by Deep.Dot.Web, multiple accounts of Comcast customer service crossing into monitoring customer activity online have been reported to them.

Comcast agents have reportedly contacted customers who use Tor, a web browser that is designed to protect the user’s privacy while online, and said their service can get terminated if they don’t stop using Tor. According to Deep.Dot.Web, one of those calls included a Comcast customer service agent named Jeremy, who allegedly described Tor as an “illegal service.” The use of Tor was then described as against Comcast usage policy.

Sep 15 07:30

Winona Judd, Dubya and Bush Family all in Bed with Safeguard Property Thugs this Week at Five Star Conference.



So now Winona Judd is going to be jamming out down there in the Lone Star State with them I found out. I loved living in Dallas for a while, but the bullshit they can keep.

Sep 15 06:35

Five German Telecom Companies Hacked by The NSA and The GCHQ

We knew already that Germany was a prime target for electronic espionage orchestrated by the American National Security Agency (NSA) and its British equivalent, the Government Communications Headquarters (GCHQ). According to the German Magazine, Der Spiegel, based on documents provided by Edward Snowden, 500 million communications (telephone, email, SMS) were being intercepted every month before the scandal broke out.

However, a new investigation published on Saturday, September 13, by the German magazine, seems to provide additional details on the technicalities of the espionage which was, apparently, organized with the complicity of the German secret services. Der Spiegel ensures that the NSA and the GCHQ have clandestine access to the networks of at least five German companies: Deutsche Telekom, Netcologne, Stellar, and Cetel IABG. These companies, in fact, operate much of the German telecommunications infrastructure.

SHARE THIS ARTICLE WITH YOUR SOCIAL MEDIA