COMPUTERS/INTERNET/SECURITY | WHAT REALLY HAPPENED


COMPUTERS/INTERNET/SECURITY

Dec 20 08:01

ZeuS variant strikes 150 banks worldwide

Kaspersky has discovered a fresh ZeuS malware strain which has targeted financial institutions worldwide.

The company says the banking trojan's latest form has targeted a total of 150 different banks and 20 payment systems worldwide; focusing on the infiltration of online banking. In total, 15 countries have been attacked, including the United Kingdom, United States, Spain, Russia, Japan and Italy.

Dec 20 07:37

MEGA BEX ALERT - FOX News: Evidence in Sony hack attack suggests possible involvement by Iran, China or Russia, intel source says

The U.S. investigation into the recent hacking attack at Sony Pictures Entertainment has turned up evidence that does not point to North Korea as the "sole entity" in the case, but rather, raises the possibility that Iran, China or Russia may have been involved, an intelligence source told Fox News on Thursday.

Webmaster's Commentary: 

Dec 20 07:23

Sony hack: China may have helped North Korea, US states

US official states that North Korea responsible for hacking of Sony over The Interview film – and that Kim Jong-un's regime may have had Chinese help

Webmaster's Commentary: 

So, according to US Officials and FOX News, North Korea, China, Russia, Iran, (and everyone else the US needs an excuse to invade) secretly create the most potent cyber-army in the world, then expose the existence of that cyber-army with a pointless attack on a movie studio?

And if you believe THAT one, I have some of Saddam's nuclear weapons to sell you!

Dec 20 07:20

After Sony hack, is U.S. grid next?

Now that U.S. intelligence has blamed North Korea for the Nov. 24 cyber attack on Sony Pictures, there is growing concern that the Hermit Kingdom has the capability of bringing down the vulnerable U.S. national grid system.
Read more at http://www.wnd.com/2014/12/after-sony-hack-is-u-s-grid-next/#uM8SW1GrR...

Webmaster's Commentary: 

Yep; looks like the US is going to pull a 9-11 false-flag to get their wars going again!

This would be a good time for all the "white hat" hackers, who insist they use their powers only for good, to walk their talk and nail the real perpetrators of this war-starting hoax!

Dec 20 07:18

North Korea says did not hack Sony, wants joint probe with U.S.

North Korea said U.S. accusations that it was involved in a cyberattack on Sony Pictures were "groundless slander" and that it was wanted a joint investigation into the incident with the United States.

An unnamed spokesman of the North's foreign ministry said there would be "grave consequences" if Washington refused to agree to the joint probe and continued to accuse Pyongyang, the official KCNA news agency reported on Saturday.

On Friday, President Barack Obama blamed North Korea for the devastating cyberattack, which led to the Hollywood studio cancelling "The Interview", a comedy on the fictional assassination of North Korean leader Kim Jong Un.

Dec 19 16:29

The Feds Want to Replace Your Driver’s License with a National ID Card

If you live in Arizona, Louisiana, New York, or one of more than a dozen other states, the Department of Homeland Security (DHS) has bad news for you. Come January 19, your driver’s license will no longer allow you access to certain federal facilities. Unless DHS changes its mind. Again. In 2005, Congress passed a bill called the Real ID Act, based upon recommendations made by the 9/11 Commission. Whether or not you’ve heard of the law depends largely upon how in tune you are with conspiracy theories. Where you live matters, too, because nearly a decade after the law’s passage, only 19 states actually comply with its standards.

Dec 19 16:20

Movie industry's evil plan to destroy the internet is going precisely nowhere

As well as finding out that Jennifer Lawrence earns less than her male counterparts, Hollywood studio execs are self-important a-holes and Sony Pictures has a password policy that a baby could break ... it turns out movie giants are also seeking to DESTROY THE INTERNET with a ten-page legal memo.

The memo [PDF], written by outside law firm Jenner & Block in August this year, looks into whether ISPs can be pressured into removing links to pirate content by using the legal language around telecommunications.

Dec 19 16:00

Devastating Sony hack just a malware rehash, say experts

The tech used in one of the worst cyber-attacks in business history was known to cyber-defenders, according to CyActive

Dec 19 15:42

Personal information on 50,000 federal employees exposed; hackers breach contractor system

A company that conducts background checks for the federal government – including investigations on Alabama workers – has been breached, potentially exposing personal data of tens of thousands of federal employees.

Dec 19 15:35

How The Military Could Turn Your Mind Into The Next Battlefield

Giordano's research group has categorized these weapons into four broad categories: drugs, bugs, toxins, and bytes. In an email to me, he described them like this:

Drugs: There are particular drugs that act upon the central and/or peripheral nervous system that can be used to 1) alter concentration and vigilance (to increase or decrease combat warfighters' performance on various tasks), 2) alter sensation, perception and emotion (to induce feelings of fear, confusion or even amiability), and of course 3) incur profound debilitation — and death.

Bugs: There are a number of microbiological agents ("bugs") — viruses and bacteria — that can induce a host of neurological diseases (such as encephalitis, meningitis), and effects (such as cognitive and motor manifestations).

Dec 19 15:30

Not just tolls: E-Z Pass keeping an eye on speeders

Not just tolls: E-Z Pass keeping an eye on speeders
Warning to motorists: Don't speed in the toll lanes. E-Z Pass is watching. Several states, including New York, Maryland and Pennsylvania, say they monitor speeds through the fast pass toll lanes and will suspend your E-Z Pass for multiple speeding violations. In all, five of the 15 E-Z Pass states have some kind of rules on the books for breaking the speed limit in the convenience lanes.

Dec 19 15:19

Blaming Iran for the Sony Hack

Dec 19 15:16

FLASHBACK - Federal Government Hires Internet TROLLS to Monitor and "Correct" Online Discussions

This subject is of big interest to me and I am happy to see other websites picking up the concerns and expressing them publicly. I have crossed paths with these undercover agents many times, on various websites and forums, and a I can tell you from my first hand experience that they are extremely effective.

They are usually intelligent and well informed people, and a couple of them operating on each section of a forum, are enough to kill a subject of major interest almost immediately.

Dec 19 14:01

North Korea denies involvement in Sony cyber attack

North Korea's UN mission on Friday denied involvement in a cyber attack on Sony Pictures after the US FBI said it had evidence that Pyongyang was behind the hacking.

"Our country has no relation with the hacker," North Korean political counsellor Kim Song told AFP.

"There is no relation. This is not worth a comment."

Dec 19 12:44

SPECIAL REPORT: Police Pre-Crime Algorithm Uses Social Media Posts Against You in Real-Time

And still, astoundingly, we have people saying "Well, I haven't done anything wrong, so I don't have anything to worry about."

We have finally reached the moment where Orwell's nightmare in 1984 meets the movie Minority Report. We're living there right now.

Did you know that any time a police officer pulls you over or responds to your 9-1-1 call, he or she is using a pre-crime algorithm which assigns you a color-coded threat score based not just on your criminal background but on everything including "flagged" purchases and all your social media posts which may include any comments that may be construed as "offensive?"

The officer will receive your color coding — red, yellow or green — before he or she ever even sees you based on factors you are not allowed to see or question. Guilty until proven innocent just got thrown completely out the window. Welcome to the modern era of big data and thought crime in Police State, U.S.A.

Dec 19 10:18

Think North Korea hacked Sony? Think about this

Unlike any hack attributed to North Korea in the past

North Korea has been blamed for a string of hacks in the past, and it’s generally accepted that the country has the capability to hack and attack companies. But no previous attack attributed to North Korea—or any nation-state—has been so public and so noisy. In the past, attacks happened, North Korea was suspected, and then sometimes the country was later blamed. It rarely said anything, except for an initial denial. This time around, the hacker group has posted messages online taunting Sony and telling the FBI they cannot be caught. Early on, they were also interacting with reporters.

Dec 19 09:22

TorrentLocker Ransomware Spreading Fast: Report

A TorrentLocker infection, like other ransomware schemes (such as CryptoWall or CryptoLocker), usually takes place when a victim downloads a malicious file. Although the name TorrentLocker might suggest infections come through the way of torrents (a file typically used for file sharing), it does not; in fact, most TorrentLocker infections come through email.

ESET says the people behind TorrentLocker have become remarkably adept at devising spam emails that grab and hold a target's attention; this includes emails about unpaid invoices, traffic violations, and mailed packages with tracking numbers. In most cases, the emails are tailored to a target's home country, making them even more believable.

Dec 19 09:20

Sloppy security hygiene made Sony Pictures ripe for hacking

Sony Pictures Entertainment's (SPE) computer hygiene in the years leading up to last month's hack was breathtakingly sloppy, with the movie studio's CEO regularly being reminded of e-mail, banking, and travel passwords in plaintext e-mails, according to an Associated Press report published Thursday.

Headlined "Sony emails show a studio ripe for hacking," the article is based on a review of more than 32,000 stolen corporate e-mails released on the Internet by people connected to last month's hack of SPE. The e-mails show CEO Michael Lynton repeatedly receiving plaintext passwords in unencrypted e-mails for his and his family's e-mail, banking, travel, and shopping accounts. The unencrypted e-mails were frequently sent by executive assistant David Diamond. Other e-mails included images of passports, driver licenses, and banking statements.

Dec 19 09:11

Secret WTO Trade Deal Threatens Internet Freedom, New Leak Reveals

Global governments are secretly negotiating a little-known mega trade deal that poses a threat to internet freedoms and boon to corporate interests, analysts warned Wednesday, citing a just-leaked U.S. proposal.

The Trade in Services Agreement (TISA), under discussion between a 50-country subset of World Trade Organization members for nearly two years, is so secretive that its talks aren't even announced to the public, making it even more shadowy than the Trans-Pacific Partnership.

Kept in the dark about the deal, the global public will be hugely impacted by its provisions.

Dec 19 08:54

Sony Hack: What They're Not Telling You

Webmaster's Commentary: 

The evidence indicates the SONY hack was done by disgruntled ex-employees of SONY itself. Yet the White House has hastily put together a frame-up of North Korea, and unlike the Benghazi attack, the movie that is supposed to be the root cause of it all actually does exist.

So what is going on?

One possibility is that SONY will reverse its decision (under covert pressure from the White House) and go ahead with the Christmas Day release of "The Interview." This will be followed by multiple bombings of movie theaters across America. Just like 9-11, this will be "justification" for war against the "attacker", which we are being assured is North Korea. War with North Korea opens the door to war with China and through China, Russia, all to protect the paper dollar from the Ruble and the Yuan. Millions will die and the world will go back to being enslaved to the private central bankers for another hundred years.

Dec 19 08:19

Congress Just “Legalized” Warrantless Spying Against U.S. Citizens

Within hours of the world learning the gruesome details of the new CIA Torture Report, Congress rushes through yet another bill giving all U.S. intelligence agencies more power than you can even imagine.

Dec 19 08:12

William Binney: The NSA’s Ultimate Goal is Total Population Control

“At least 80% of fibre-optic cables globally go via the US,” Binney said. “This is no accident and allows the US to view all communication coming in. At least 80% of all audio calls, not just metadata, are recorded and stored in the US. The NSA lies about what it stores.”

“The ultimate goal of the NSA is total population control,” said Binney, who believes the government is fighting for a future where surveillance is ubiquitous and government intrusion unlimited.

Dec 18 21:58

HIPPA: Police/DHS can spy on your medical & financial records

The Health Insurance Portability & Accountability Act (HIPPA) is the primary federal law that addresses health records. The HIPAA privacy rules have special exceptions for law enforcement and national security investigations. The law enforcement provision is very broad. It covers all the usual police procedures, including subpoenas. Those don’t require a judge’s advance permission, and they also require much less basis than probable cause.

Dec 18 16:49

Hacking your iCloud files just got easier, even with two-step enabled

An update to Elcomsoft's Phone Breaker software now makes it easier for bad guys to bypass Apple's vaunted new two-factor authentication to steal your iCloud stuff. As before, the hackers would need some information to start with -- either your Apple ID/password plus a two-factor code, or a digital token stolen from, say, your laptop. That would give them access to your account anyway, but here's the kicker: The Phone Breaker app can then create a digital token granting intruders permanent access without a two-step code until you change the password. It also allows someone to view all your iCloud files at a glance, making it easier to pick and choose which to steal.

Dec 18 16:37

The Evidence That North Korea Hacked Sony Is Flimsy

But in their initial public statement, whoever hacked Sony made no mention of North Korea or the film. And in an email sent to Sony by the hackers, found in documents they leaked, there is also no mention of North Korea or the film. The email was sent to Sony executives on Nov. 21, a few days before the hack went public. Addressed to Sony Pictures CEO Michael Lynton, Chairwoman Amy Pascal and other executives, it appears to be an attempt at extortion, not an expression of political outrage or a threat of war.

“[M]onetary compensation we want,” the email read. “Pay the damage, or Sony Pictures will be bombarded as a whole. You know us very well. We never wait long. You’d better behave wisely.”

...

It was only on December 8, after a week of media stories connecting North Korea and the Sony film to the hack, that the attackers made their first reference to the film in one of their public announcements.

Dec 18 16:02

Prediction: In 5 Years, Smart Fridges Will Outnumber Fitness Trackers

Having to worry about the North Koreans and Chinese, not to mention US state and federal agencies hacking my refrigerator, is just not something I am really ready to deal with. Most of the wearables and other smart appliances on the market today, keep and could possibly share too much personal information about bad habits that the insurance company would love to use against me during the next open enrollment period.

Dec 18 12:22

Google faces €15m fines over privacy breaches in Netherlands

The search giant has been ordered to change the way it collects data from users that is then used to target advertising, or face a significant fine.

Dec 18 11:20

ZIONISTS ARE FRAMING NORTH KOREA!

Those "unnamed sources" (Mossad, cough-cough) are at it again. This time they have solved the mystery of the hacked Hollywood E-mails and anonymous threats that Jewish Hollywood is all abuzz about. It was the North Koreans, these slimy sleuths assure us. As usual, Sulzberger's Slimes has accepted the baseless accusation at face value and gone full front-page retard with the bogus claims and threats.

Dec 18 09:54

From Skyfall to SPECTRE: 007 secrets

I thought it odd the new Bond film will be titled SPECTRE, as I have recently written an article about how the secretive organization from the film mirrors the real cabals and cartels that rule the real world, and in particular the black markets.

Dec 18 09:14

Ex-Anonymous hacker questions North Korea's role in Sony hack

Some of the investigators point to malware written in Korean, but Monsegur said that doesn't necessarily mean the hackers are Korean.

"Well, it doesn't tell me much. I've seen Russian hackers pretending to be Indian. I've seen Ukrainian hackers pretending to be Peruvian.There's hackers that pretend they're little girls. They do this for misinformation, disinformation, covering their tracks," he said. "Do you really think a bunch of nerds from North Korea are going to fly to New York and start blowing up movie theaters? No. It's not realistic. It's not about 'The interview.' It's about money. It's a professional job."

Monsegur thinks it's also possible this was an inside job, that an employee or consultant downloaded all the information from Sony's servers and then sold it to someone else.

Dec 18 09:12

Global internet authority ICANN has been hacked

ICANN says the hackers accessed internal emails, a members-only Wiki page containing public information, the WHOIS portal (used to look up who registered a particular domain), and the organization’s Centralized Zone Data System (CZDS). This last breach is the most troubling as ICANN reports that the attackers gained access to a wide range of user information including real names, addresses, emails, telephones and usernames. Users’ passwords were also accessed but ICANN has said that these were encrypted rather than stored as plaintext.

Dec 18 09:10

“Shadowy” anti-net neutrality group flooded FCC with comments

"A shadowy organization with ties to the Koch Brothers" spearheaded an anti-net neutrality form letter writing campaign that tipped the scales against net neutrality proponents, according to an analysis released today by the Sunlight Foundation.

Dec 18 09:05

The US Is Ready To Blame North Korea For The Sony Hack

The US government now reportedly believes that North Korea is directly to blame for the devastating and unprecedented attack on Sony, The New York Times reports.

The massive Sony data hack is likely retaliation for the controversial comedy "The Interview," which depicts the assassination of North Korean dictator Kim Jong Un.

US investigators have now parsed through enough evidence to claim that North Korea is "centrally involved."

Dec 18 08:32

NSA Firefoxed: Mozilla team-up with Tor to improve internet privacy

The internet browser Mozilla is teaming up with Tor to give internet users greater security online. The new Polaris project is designed to combat internet censorship and make NSA like intrusion’s a thing of the past.

Edward Snowden’s revelations concerning the extent of the National Security Agency’s spying on the general public, hit computer and internet enthusiasts hard. A poll conducted by Harris Poll on behalf of the internet company Mozilla last month, found that three quarters of those surveyed feel that their personal information on the web is less secure than it was one year ago.

Webmaster's Commentary: 

The comment in the article about the NSA not being able to find a TOR users identity is not entirely accurate. Recently it has come to light that if a user has the flash player installed on their computer, malicious code inside a flash object can detect the source IP of the request despite the onion network, which is why the current implementation of TOR recommends users not have the flash player installed. However I think that Mozilla and TOR will close that exploit (if they have not already done so).

As a general rule, everyone ought to be using anonymity tools and strong encryption, even if you do not really have anything to hide, to jam the NSA with added workload and confuse them as to who they should be looking at. For your local data protection or small-group communications, I strongly recommend investing the time to develop your own encryption methods using the code snippets in the NSA Challenge page as examples.

Dec 18 08:21

NSA and EFF to square off in court over internet surveillance

A digital rights group in the United States plans to argue in federal court this week that the National Security Agency’s internet surveillance operations violate the US Constitution’s ban against unlawful searches and seizures.

Six years after the Electronic Frontier Foundation brought suit against the NSA on behalf of a former AT&T customer, Carolyn Jewel, US District Court Judge Jeffrey White for the Northern District of California will hear an EFF attorney argue on Friday for summary judgment and attest that the intelligence agency’s data collection methods breach the Constitution’s Fourth Amendment clauses intended to protect private information.

Dec 18 07:22

You Won't believe What Facebook is Doing & You Could Be Their Next Target! Exclusive Victims Report

Dec 18 06:13

The Pirate Bay’s Facebook page is shut down too

Following in the footsteps of the main site, Pirate Bay’s Facebook page with nearly half a million likes was shut down a few hours ago.

Dec 17 16:43

U.S. Links North Korea to Sony Hacking

American intelligence officials have concluded that the North Korean government was “centrally involved” in the recent attacks on Sony Pictures’s computers, a determination reached just as Sony on Wednesday canceled its release of the comedy, which is based on a plot to assassinate Kim Jong-un, the North Korean leader.

Senior administration officials, who would not speak on the record about the intelligence findings, said the White House was still debating whether to publicly accuse North Korea of what amounts to a cyberterrorism campaign. Sony’s decision to cancel release of “The Interview” amounted to a capitulation to the threats sent out by hackers this week that they would launch attacks, perhaps on theaters themselves, if the movie was released.

Dec 17 14:37

Secret WTO Trade Deal Threatens Internet Freedom, New Leak Reveals

Global governments are secretly negotiating a little-known mega trade deal that poses a threat to internet freedoms and boon to corporate interests, analysts warned Wednesday, citing a just-leaked U.S. proposal.

The Trade in Services Agreement (TISA), under discussion between a 50-country subset of World Trade Organization members for nearly two years, is so secretive that its talks aren't even announced to the public, making it even more shadowy than the Trans-Pacific Partnership.

Dec 17 13:59

Sydney Siege Aftermath: Australian Government Seeks More Anti Terrorism Laws

Brandon Turbeville
Activist Post

Right on schedule, following a high profile terrorist attack, the government of Australia is now “investigating new security laws” and other methods that can be used to gut the civil liberties, privacy, and general way of life of Australian citizens. Only a day after the Sydney Siege, Australian “lawmakers,” intelligence agencies, legal branches, and other government officials sprung into action in order to discuss the possibility of passing yet another law allowing the collection and housing of telecommunication and Internet data of Australian citizens...

Dec 17 12:21

NSA's internet surveillance faces constitutional challenge in court

The Electronic Frontier Foundation (EFF) this week will challenge the National Security Agency (NSA) in a federal court, where the advocacy group will argue that the agency's web data collection program is unconstitutional. The hearing will be held on Friday morning in an Oakland court, marking what the EFF calls the first challenge to the NSA's upstream data collection program in a public court.

Dec 17 10:06

HIGH TREASON: Congress Just “Legalized” Warrantless Spying Against U.S. Citizens

Within hours of the world learning the gruesome details of the new CIA Torture Report, Congress rushes through yet another bill giving all U.S. intelligence agencies more power than you can even imagine. Economist Jerry Robinson exposes the latest move by Washington!

Dec 17 09:45

Delta Airlines Security Flaw Allows You To Use Another’s Boarding Pass

Delta Airlines intends to remain ahead of the competition when it comes to being on the cutting edge of technology, but even the best of intentions can result in an mistake or a flaw being discovered. Case in point, Delta Airlines’ glitch would allow you to actually access someone else’s boarding pass – without them being aware of it.

Dec 17 07:59

Online news sites to be blacked out during next major catastrophic event?

According to what I'm hearing from several sources in my network of contacts, the U.S. government is putting systems in place to black out online news sites like Natural News, Drudge Report, The Blaze and many others. A practice run that took place earlier this week in California has already achieved this result and confirmed the technical ability to make it happen at will.

Webmaster's Commentary: 
Dec 17 07:35

The FBI Used the Web’s Favorite Hacking Tool to Unmask Tor Users

For more than a decade, a powerful app called Metasploit has been the most important tool in the hacking world: An open-source Swiss Army knife of hacks that puts the latest exploits in the hands of anyone who’s interested, from random criminals to the thousands of security professionals who rely on the app to scour client networks for holes.

Now Metasploit has a new and surprising fan: the FBI. WIRED has learned that FBI agents relied on Flash code from an abandoned Metasploit side project called the “Decloaking Engine” to stage its first known effort to successfully identify a multitude of suspects hiding behind the Tor anonymity network.

Dec 17 07:03

Sony hit with class action suit over hacked employee info

On Monday, attorneys representing two former Sony workers filed paperwork in United States District Court for the Central District of California asking that a jury be assembled to weigh in on what could become a class action lawsuit between upwards of 15,000 current and past employees and the major motion picture company over the massive security breach suffered earlier this month.

According to the class action complaint, Sony should have been better prepared to protect against the hackers who recently pilfered troves of company data, especially in light of similar lapses suffered by the company in years past.

Dec 17 06:22

VIRTUAL 9-11: Will the US & Israel Hack The US Banking System Computers and Falsely Blame It On Iran (or Syria or Russia or China)?

Such a cyber false-flag also gives the US Government the excuse to take total control of the internet so that those pesky truth-seeking bloggers don't give the slaves uppity ideas that this is just another war-starting hoax like the attack on the USS Liberty or 9-11 or the Boston bombing.

Webmaster's Commentary: 

Reposted in light of the claim that the SONY Hackers are planning to bomb movie theaters now.

Optional Banner: 
WRH Exclusive
Dec 17 06:15

Cops illegally nailed webcam to utility pole for 6 weeks to spy on house

A federal judge on Monday tossed evidence that was gathered by a webcam—turned on for six weeks—that the authorities nailed to a utility pole 100 yards from a suspected drug dealer's rural Washington state house.

The Justice Department contended that the webcam, with pan-and-zoom capabilities that were operated from afar—was no different from a police officer's observation from the public right-of-way.

Dec 16 17:22

Eric “You Have No Privacy Get Over It” Schmidt says Store Your Data on Our Servers

The news of surveillance by the NSA and intelligence agency counterparts at allied nations has damaged the U.S. tech industry on “many levels,” with many Europeans now distrusting U.S. tech companies to hold on to their personal data, Schmidt said Friday at a surveillance conference at the Cato Institute, a libertarian think tank.

Dec 16 15:54

Sony leaks reveal Hollywood is trying to break DNS, the backbone of the internet

Most anti-piracy tools take one of two paths: they either target the server that's sharing the files (pulling videos off YouTube or taking down sites like The Pirate Bay) or they make it harder to find (delisting offshore sites that share infringing content). But leaked documents reveal a frightening line of attack that's currently being considered by the MPAA: What if you simply erased any record that the site was there in the first place?

To do that, the MPAA's lawyers would target the Domain Name System (DNS) that directs traffic across the internet. The tactic was first proposed as part of the Stop Online Piracy Act (SOPA) in 2011, but three years after the law failed in Congress, the MPAA has been looking for legal justification for the practice in existing law and working with ISPs like Comcast to examine how a system might work technically.

Dec 16 14:58

Pirate Bay responds to the raid, copies and the future

The Pirate Bay crew has broken its silence for the first time since the site was knocked down hard by a raid in Sweden last week.

Dec 16 14:42

Google closes Spanish News site

The closure came after the Spanish government passed a new intellectual property law which means news aggregators will have pay to post content from the country's media outlets on their sites.

Dec 16 13:09

First Public Court Challenge to NSA Data Collection From Internet Backbone

Activist Post

The Electronic Frontier Foundation (EFF) will argue on Friday before a federal court that the National Security Agency (NSA) is violating the Fourth Amendment by copying and searching data that it collects by tapping into the Internet backbone.

The hearing on a motion for partial summary judgment in Jewel v. NSA will be at 9 am on Dec. 19 before Judge Jeffrey White at the federal courthouse in Oakland...

Dec 16 11:09

Federal Court Throws Out Six Weeks of Warrantless Video Surveillance

By Hanni Fakhoury

In United States v. Vargas local police in rural Washington suspected Vargas of drug trafficking. In April 2013, police installed a camera on top of a utility pole overlooking his home. Even though police did not have a warrant, they nonetheless pointed the camera at his front door and driveway and began watching every day...

Dec 16 09:49

Some 100,000 or more WordPress sites infected by mysterious malware

Infected sites load attack code into webpages viewed by visitors.

Dec 16 09:45

Sony Said to Learn Last Year About Large Network-Security Breach

Sony Corp. (6758) was warned about a year ago that hackers had infiltrated its network and were stealing gigabytes of data several times a week, underscoring a pattern of lapses predating a recent attack that has spilled Sony Pictures’ secrets onto the Internet.

The hackers, who haven’t been identified, sifted in late 2013 through data from the company’s network, encrypted the information to cover their tracks and mined it on a regular schedule, said a person familiar with Sony’s investigation of the breach who asked not to be named because the findings are confidential.

The company’s cybersecurity problems date at least as far back as 2011, with a breach of Sony’s PlayStation video-game network.

Dec 16 09:06

JUDGE SAYS REPORTER CAN’T GET PUBLIC RECORDS ABOUT COPS’ “STINGRAY” USE

A local judge in Arizona ruled Friday that the Tucson Police Department (TPD) does not have to disclose records related to the use of stingrays, also known as cell-site simulators, under the state’s public records act. According to a Saturday report from Capitol Media Services, a state news wire, complying with reporter Beau Hodai’s public records request "would give criminals a road map for how to defeat the device, which is used not only by Tucson but other local and national police agencies."

Dec 16 08:46

2014: The year Microsoft lost my loyalty

From productivity to email to operating systems to mobile to hardware, David Gewirtz is no longer actively using Microsoft products. He's not a Microsoft hater. The transition just happened organically as he adopted products that better served his needs.

Dec 16 07:52

Government Prosecutors Fear Liberty and Jury Nullification

I thought you’d be interested to know that the government has asked the judge to limit the defense by not allowing any of Ross’ political or philosophical beliefs to be introduced to the jury as they might influence the jury in his favor. The prosecution goes so far as to say that they fear that exposing the jury to his political thought could invite a jury nullification verdict.

The government obviously doesn’t want this trial to become about internet freedom, the drug war, or liberty. But these crucial issues are on trial along with Ross. This trial is poised to be the most important of 2015 in the fight for freedom. Obviously the government thinks so. They are doing their best to smear Ross and obstruct his defense.

I’m attaching an excerpt (bolds and highlights mine) from the prosecution’s motions illustrating what I’m saying. If you want the original document, just let me know.

This outrage needs to become known, so please spread the word!

Dec 16 07:37

Microsoft update blunders going out of control

This isn't the first time I've brought this up. In Summer of last year Microsoft had buggy Patch Tuesday updates three months in a row. There had been others that year, some of which crippled systems.

Dec 16 07:19

POLITICAL PRISONER BARRETT BROWN TO BE SENTENCED TOMORROW – WHY THE RESULT MATTERS TO FREEDOM IN AMERICA

Barrett Lancaster Brown is a writer and activist who possesses a unique combination of ability, courage, wit and determination. This resume of personality traits turned him into a threatening individual once he decided to direct much of that energy against the prevailing corrupt status quo. This is also why he’s one of the roughly roughly 2.4 million Americans locked up within these United States; many of them for non-crimes. The Feds went after Barrett Brown in the same manner in which they went after Aaron Swartz (tactics that led to the suicide of the latter). They came out with a bunch of trumped up charges, including that of copying and pasting a link (that charge was later dropped), and threatened him with 105 years in jail.

Dec 15 20:38

Down The Memory Hole: Facebook Plays Gatekeeper And Filters Things You Aren't Supposed To See

For the wretched souls addicted to Facebook, you are their economic engine. They mine your data, run facial recognition software on your pictures and you tell them about everything about yourself, and everything about everyone you know. Governments are salivating at the idea of learning more about you and Facebook offers you up on a silver platter. They have been censoring information in the past but now they are mulling the idea of a 'dislike button. It won't be hard to find some good minders who will disappear information that your Government doesn't approve of.

Dec 15 20:35

Inside an internet addiction treatment center in China

At the Internet Addiction Treatment Centre in Beijing, children must take part in military-style activities, including exercise drills and the singing of patriotic songs. They are denied access to the internet. One of the first experiences internees undergo is brain monitoring through electroencephalography (EEG). The programme is run by psychologist Tao Ran, who claims the brains of internet and heroin addicts display similarities.

Dec 15 18:10

KB 2553154, 2726958 clobber Excel ActiveX; KB 3011970 Silverlight, KB 3004394 Root Cert pulled

Overnight, Microsoft pulled two high-profile screwed-up patches: KB 3011970 and KB 3004394. Another patch, KB 2553154, is killing some Excel 2010 and 2013 macros, saying the ActiveX control "has stopped working in Excel." Admins are reporting that KB 3008923 has broken modal dialogs in IE. And the hang on installing KB 3002339 described yesterday is still kicking.

Dec 15 14:32

Spain hit by Russian and Chinese hackers

Four Spanish government ministries were hit by serious cyberattacks in 2014, with the assaults targeting the mobile phones and personal computers of prominent government figures.

Dec 15 13:57

Amazon, HP, eBay join Microsoft bandwagon in warrant case

As extensively telegraphed by Microsoft, the company’s cast of supporters in its legal fight over a warrant seeking a customer’s emails just got a whole lot bigger.

Microsoft was joined by Amazon.com as well as Silicon Valley stalwarts Hewlett-Packard and eBay. Apple, AT&T, Cisco and Verizion, which all supported Microsoft in its lower court case, also weighed in again.

Google, a leader in the cloud-computing realm along with Microsoft and Amazon.com, was among the notable technology companies that haven’t weighed in.

Dec 15 13:31

NEW WORLD SYSTEMS: POLICE ARE SPYING ON SOCIAL MEDIA AND ASSESSING YOUR ‘THREAT RATING’

New World Systems offers software that allows dispatchers to enter in a person’s name to see if they’ve had contact with the police before. Provided crime data, PredPol claims that its software “forecasts highest risk times and places for future crimes.” These and other technologies are supplanting and enhancing traditional police work.

Dec 15 12:19

Eric Schmidt: To Avoid NSA Spying, Keep Your Data In Google's Services

Google Chairman Eric Schmidt told a conference on surveillance at the Cato Institute that Edward Snowden's revelations on NSA spying shocked the company's engineers — who then immediately started working on making the company's servers and services more secure. Now, after a year and a half of work, Schmidt says that Google's services are the safest place to store your sensitive data.

Webmaster's Commentary: 

And if you believe THAT one, I have some of Saddam's nuclear weapons to sell you!

Dec 15 10:20

Microsoft update blunders going out of control

We have had an absolute deluge of problem updates from Redmond recently and some have been serious. What's up at Microsoft?

Webmaster's Commentary: 

What is going on is that Windows has become a bloated nightmare and as the economy shrinks, Microsoft has lost the ability to effectively maintain it all. This problem is hardly confined to Microsoft, and indeed Rome fell when it could no longer maintain the infrastructure it had built such as the roads and aqueducts.

Dec 15 08:53

Surprise: Spanish Newspapers Beg Government And EU To Stop Google News Shutting Down

Once again, it seems that an obsession with "protecting" copyright from imaginary harm causes otherwise rational people to lose the ability to think properly.

Dec 15 08:51

Sony Jabs Hornets Nest, Allegedly Engages In DDoS Attacks Against Sites Hosting Leaked Documents

If Sony is indeed engaged in DDoS attacks, it's participating in the sort of behavior it's been quick to decry in the past. Sony Pictures may be relishing the chance to turn hackers' tools against them, but its history strongly suggests it really isn't in the position to be provoking further attacks. To pursue this option is pure hubris. It's hypocrisy and stupidity rolled into one. It may think it will escape this latest hack bowed but not broken, but whatever pride it has left at this point is delusional. It has opened everything up to criticism by failing to take proper precautions and destroyed its employees' trust that their employer would make the minimum of effort to keep their internal conversations internal.

Dec 15 08:49

Amazon sellers hit by nightmare before Christmas as glitch cuts prices to 1p

There were Christmas shopping bargains galore on Amazon’s website over the weekend … for about an hour. Because of a technical glitch, the prices of thousands of items crashed to 1p – giving eagle-eyed customers a pre-Christmas treat while leaving scores of small family-owned businesses nursing heavy losses, with some warning they could enter the new year facing closure.

From 7-8pm on Friday, software used by third-party sellers to ensure their products are the cheapest on the market went haywire and reduced prices to as little as 1p. “Amazon is all kinds of broken,” one observer tweeted. “Mattress 1p. Headphones 1p. Batteries, clothing, games all 1p. Someone messed up big time.”

Martin Le Corre, who sells toys and games via his MB Housewares store on Amazon, told the Guardian that the glitch in software developed by RepricerExpress could have cost him more than £100,000.

Dec 15 08:42

Microsoft withdraws bad Windows 7 update that broke future Windows 7 updates

The problem update is called KB3004394. The purpose of this update was to change how Windows updates its collection of root certificates used to authenticate SSL and TLS connections. Without the update, Windows is meant to poll for certificate updates once a week. With the update, this frequency is increased to once a day.

Unfortunately, this apparently simple change has had severe consequences for some users of Windows 7 Service Pack 1 and Windows Server 2008 R2 Service Pack 1, with users reporting that Windows Update, drivers from both Nvidia and AMD, and some third-party software including Virtual Box are all unable to install correctly. The error code 0x8004FF91 seems to be a common finding.

Microsoft has issued a second update to remove the bad update from affected machines and has withdrawn the original update for Windows 7.

Dec 15 08:33

Sony Attorney David Boies Threatens Media Over Hack Stories

Sony Pictures Entertainment lawyer David Boies sent a letter to news organizations Sunday, cautioning them against using information that hackers have leaked about the studio.

In the letter, first reported by The New York Times, Boies referred to leaked Sony documents as "stolen information" and demanded that the files be ignored, or destroyed if they had already been downloaded.

"We are writing to ensure that you are aware that SPE does not consent to your possession, review copying, dissemination, publication, uploading, downloading or making any use of the stolen information, and to request your cooperation in destroying the stolen information," the letter reads.

Dec 15 08:19

Alleged GCHQ hacking of Belgian telecoms firm was widespread, reports reveal

Snowden told The Intercept that the Belgacom hack was the first documented case to show one EU member state mounting a cyber-attack on another, being a breath-taking example of the scale of the state-sponsored hacking problem.

According to the documents received from Snowden, GHCQ first infiltrated the computers of three Belgian engineers back in 2011 and the virus went on undetected until 2013, when Belgacom removed it from its system. It is said that the malicious software was camouflaged as legitimate Microsoft software whilst extracting data.

"The security service was thus able to intercept communications from Belgacom's individual clients, from NATO and the EU, as well as from clients of hundreds of international telecoms providers. It is an unprecedented violation of the privacy of anybody who used a mobile telephone," De Standaard said.

Dec 15 07:57

Hackers promise “Christmas present” Sony Pictures won’t like

This weekend, the “Guardians of Peace”—the cyber-attackers who brought Sony Pictures Entertainment’s network down in November and have since shared over a terabyte of the company’s internal data—made two more dumps of SPE data to file sharing sites and torrents. The second of the two, on Sunday, was the e-mail box of Sony Pictures Releasing International President Steven O’Dell. And the hackers promised a “Christmas present” soon of even more data if the company does not relent and meet their unspecified demands.

Webmaster's Commentary: 

This hack story is not being reported, it is being promoted! Coupled with the FBI warning that Iranian hackers are about to strike, I expect a virtual 9-11 to happen to justify a government clamp down on the internet!

Dec 15 07:28

We Asked 29 Tech Companies If Their Employees Can Access Your Personal Data

Traditionally, privacy worries for consumers and tech companies have been limited to keeping information secure from third parties or hackers. But a series of internal abuses show that tech company employees often have universal access to user information, as well as reason — be it pure voyeuristic curiosity or, in the worst cases, a vendetta — to look at our whereabouts, spending, and of the most private corners of our lives.

Dec 15 07:15

How Congress Secretly Just Legitimized Questionable NSA Mass Surveillance Tool

We recently noted that, despite it passing overwhelmingly, Congress quietly deleted a key bit of NSA reform that would have blocked the agency from using backdoors for surveillance. But this week something even more nefarious happened, and it likely would have gone almost entirely unnoticed if Rep. Justin Amash's staffers hadn't caught the details of a new provision quietly slipped into the Intelligence Authorization Act, which effectively "legitimized" the way the NSA conducts most of its mass surveillance.

Dec 15 07:12

The NSA Revelations All in One Chart

This is a plot of the NSA programs revealed in the past year according to whether they are bulk or targeted, and whether the targets of surveillance are foreign or domestic. Most of the programs fall squarely into the agency’s stated mission of foreign surveillance, but some – particularly those that are both domestic and broad-sweeping – are more controversial.

Webmaster's Commentary: 

But the NSA still cannot find who hacked SONY! :)

Dec 15 06:51

Activists launch online initiative against ‘Internet Tax’

A group of Russian citizens has launched a petition seeking to prevent the adoption of a bill that would introduce a universal tax on the internet, collected by rights organizations representing authors of copyrighted films, music and books.

The anonymous authors of the motion claim that the universal tax is against the law as it would force the majority of internet users to pay for content that they never download or use.

Dec 15 06:47

“Net Neutrality”: The Citizens of the Internet Can Defeat the Telecom Mafia

In a claim that must have people laughing out loud, the telecom and broadband providers are fighting net neutrality by claiming that they will raise the rates of consumers! It is hard to believe that even telecom lobbyists, well-paid to mislead Congress and regulators, could make this claim without smirking as cable bills have been rising at four times the rate of inflation without net neutrality.

Dec 14 09:39

Morgan Freeman: Movie pirates have tiny, useless penises

Over the years anti-piracy PSAs haven’t enjoyed a great reception, with many ending up as objects of ridicule.

Dec 14 07:22

Visa, MasterCard sued for blocking donations to WikiLeaks

Lawyers representing the credit card processor used by WikiLeaks are suing Visa and MasterCard in the United States over the 2010 banking blockade that kept the anti-secrecy group from receiving funds.

On Monday this week, American attorneys for Icelandic hosting provider DataCell ehf filed suit in the US District Court for the Eastern District of Virginia in hopes of having a federal judge award the company upwards of $5 million for what it claims was a coordinated attempt between Visa and MasterCard to restrict funding to WikiLeaks after the secret-spilling organization started publishing classified US State Department cables over four years ago.

Dec 14 07:01

Reports reveal UK hacking of Belgian telecoms firm

New reports indicate that a British spy agency has hacked into the computers of Belgian telecoms firm, Belgacom, on a larger scale than previously thought.

Belgian newspaper De Standaard and The Intercept website on Saturday published detailed accounts of how the British surveillance agency, GCHQ, intruded into Belgacom’s networks.

The hacking first came to light in 2013 when Belgium asked Britain to respond to the espionage allegations.

Dec 14 06:48

Ron Paul: Scrap CIA, NSA, Bring Troops Home

Never one to hold back when it comes to corrupt big government agencies, former Congressman Ron Paul said Tuesday that the world would be a much better place if the CIA were completely abolished.

Responding in part to the release of the Summary of the forthcoming Senate report on CIA torture, and also to an impending possible government shutdown, Paul stated “my government shutdown would be something to be proud of.”

“Abolish the NSA, the TSA, the CIA and all spying on American citizens.” Paul urged.

Dec 14 06:44

Russia targeted by another large-scale cyber espionage campaign – Kaspersky Lab

Russian companies in oil, finance, military, and other sectors – as well as the country’s embassies abroad – have become the primary targets of a new espionage campaign, labeled ‘Cloud Atlas’ by global information security powerhouse Kaspersky Lab.

Enterprises in Belarus and Kazakhstan – which are Russia’s partners in the Eurasian Custom Union – are also affected. Another major target of the campaign is India, the Moscow-based company said.

According to Kaspersky Lab, Cloud Atlas infects corporate computers via RTF (Rich Text Format) files attached to emails.

Those behind the campaign have also launched attacks using MMS and SMS messages to infect Android, BlackBerry, and iOS devices.

Dec 14 06:04

Hidden devices scrutinize employees

Software that monitors employees who work at home. Electronic gear that tracks everywhere they go and how they drive while on the job. Technology that records their fitness and "happiness levels."

Dec 13 10:47

GCHQ agents to hunt down child porn in ‘dark net’ – Cameron

A special unit of the British spy agency GCHQ has been tasked with roaming the “dark net” to locate child pornography images and weed out online abusers, according to Britain's Prime Minister David Cameron.

Webmaster's Commentary: 

FINALLY, something useful!

Dec 13 08:28

Sony Hackers Flash Disturbing New Warning on Staffers’ Computers (Exclusive)

This is the fourth known time the #GOP has contacted the studio. The group previously accessed dozens of Sony employee computer screens in late November, displaying a similarly ominous image when staff tried to log in for work. See a screenshot here.

Webmaster's Commentary: 

And the mighty NSA can't do a thing about it! I guess the people at NSA are too busy spying on our wives and daughters through our webcams or stealing our business secrets to actually bother themselves with actual computer criminals, right?

This is how we should respond to every single report of a hack anywhere, by proclaiming it as a total failure of the NSA and by extension the Federal Government.

For myself, this looks like a staged publicity stunt as a prelude for draconian controls over the internet, much like the pornography that flooded the internet (all of it traced back to US Government and military servers) that preceded the debate on the Exon Amendment.

Dec 13 07:31

Digital driver's licenses come with one small (big) problem

Iowa announces it is testing driver's licenses on phones. But what if a police officer asks to take your phone, so that he can check your license in his own vehicle?

Webmaster's Commentary: 

I recall when smart phones like the Treo had a slot for a microSD card. You could keep the pictures of your naked spouse on that and slide it out when you handed the phone to someone else, but for soooooooooooooome reason, that feature is no longer available.

Dec 13 07:28

Net Neutrality Activists Disrupt FCC Meeting

This morning at 10:40am, net neutrality demonstrators interrupted the FCC’s monthly meeting by unfurling a large banner reading “Reclassify Now!” behind the seated FCC commissioners. The activists, both union members, were escorted from the room by security after speaking out and asking FCC Chairman Tom Wheeler why he continues to delay Title II net neutrality, which should have been voted on at today’s meeting.

Dec 12 20:42

Brilliant New Device Lets Protesters Jam Surveillance, Block Stingrays

The main NSA headquarters is described as ”a building covered with one-way dark glass, which is lined with copper shielding in order to prevent espionage by trapping in signals and sounds.” The question becomes: if they can protect their own privacy with copper, why can’t we use this same technique to protect our privacy from them? Well now we finally can. Tunnel is a portable Faraday enclosure that uses a 100% authentic copper shielding system to surround your phone. When your phone is inside, it forms a topologically near-complete surface to prevent non-ionizing radiation from penetrating its boundaries, letting you avoid surveillance. Thankfully, it’s not going to cost thousands of dollars, which has come as great news for protesters and other privacy advocates.

Dec 12 17:56

Intelligence bill bolsters warrantless spying on U.S. citizens

“When I learned that the Intelligence Authorization Act for FY 2015 was being rushed to the floor for a vote—with little debate and only a voice vote expected (i.e., simply declared “passed” with almost nobody in the room) — I asked my legislative staff to quickly review the bill for unusual language. What they discovered is one of the most egregious sections of law I’ve encountered during my time as a representative: It grants the executive branch virtually unlimited access to the communications of every American.” — Rep. Justin Amash (R-MI) Section 309 contains the language which civil libertarians found disturbing. Rep. Amash rushed out a “Dear Colleague” letter to every member of congress, urging each to vote “NO” on H.R. 4681.

Dec 12 17:15

Feds Creating Robots To Watch Over The Elderly

The federal government is financing the creation of robots that can assist the elderly and make sure they are eating healthily. A nearly $800,000 project from the National Science Foundation (NSF) is pairing the University of Pennsylvania with a robot company to create the machines, which will be able to deliver glasses of water to senior citizens.

Dec 12 16:02

Beware viruses hidden in e-cigarette chargers

Whatever the pros and cons of smoking e-cigarettes, they have undoubtedly been a big hit with smokers looking to either kick their habit, or at least to mitigate its health risks.

Now, most businesses are very aware risks of the risks items such as USB thumb drives can be their systems, as these are a notorious vector for spreading computer viruses, and have instituted strict policies about their use (although personal users remain at high risk).

It now seems, however, that hackers in China have found a new means of infecting computers with viruses, using cheap pieces of hardware that many users would not even conceive of as threat – cheap e-cigarette chargers!

Dec 12 10:59

GOP rep attempted late bid to kill spy bill

Hidden in the law is “a troubling new provision that for the first time statutorily authorizes spying on U.S. citizens without legal process,” Amash told other lawmakers.

Dec 11 23:25

Peter Thiel’s speech at U.C. Berkely shut down by anti-police state protesters *Video*

Peter Thiel, self-proclaimed libertarian, founder of PayPal, Napster, and Spotify

Dec 11 13:47

Revolutionary App Will Drastically Reduce the Tendency of Communities to be Dependent upon Police

Don't know if it will work but armed neighbors are better than militarized police (who often shoot victims of crimes too)

Dec 11 11:30

IOWA TO ALLOW CITIZENS TO USE A SMARTPHONE APP AS THEIR OFFICIAL DRIVERS LICENSE

The app, which will be provided to drivers at no additional cost, will be available sometime in 2015, DOT Director Paul Trombino told Gov. Terry Branstad during a state agency budget hearing Monday.

“We are really moving forward on this,” Trombino said. “The way things are going, we may be the first in the nation.”

Dec 11 11:17

Congress Passes Bill Granting “Unlimited Access to Communications of Every American”

According to Congressman Justin Amash, Congress just passed a bill, (Dec 11th 2014) which grants the government and law enforcement “unlimited access to the communications of every American”.

When the Michigan lawmaker discovered that the Intelligence Authorization Act for FY 2015 had been amended with a provision that authorizes “the acquisition, retention, and dissemination” of all communications data from U.S. citizens, he desperately attempted to organize a roll call vote on the bill.

However, the legislation was passed yesterday 325-100 via a voice vote, a green light for what Amash describes as “one of the most egregious sections of law I’ve encountered during my time as a representative”.

The bill allows the private communications of Americans to be scooped up without a court order and then transferred to law enforcement for criminal investigations.

Webmaster's Commentary: 

I would like to remind the readers of the six NSA encryption challenges issued by this website, not one of which was solved. I am not a cryptographic expert, and only a moderately decent programmer, but I came up with six methods which defied decryption. The NSA would be well motivated to have broken my challenges in order to discourage people from starting to create their own codes. I, on the other hand, encourage people to create and use their own codes, both to defy the government's unconstitutional behavior, and to make it impossible for them to steal our business secrets, or nude pictures of our spouses or children. Inside the NSA encryption challenges are the code samples used to create the encryption methods, to use as a learning example.

Dec 11 08:56

Google shuts down its news feed in Spain after new law forces it to pay publishers for using snippets of their content

Google is to close its news-linking service in Spain next in response to a new law which will force it to pay publishers for using their content.

The Internet advertising giant said the new law makes Google News unsustainable and that 'with real sadness' it would remove Spanish publishers from the service on December 16.

'The new law requires publishers to charge Google News for showing even the smallest snippets of their content - whether they want to charge or not,' the company said.

Dec 11 08:50

Why Bad Software Succeeds

One of the hardest things to accept, as a justice-loving maker of software, is that a perfectly engineered and beautifully designed piece of software can go completely unused. Similarly, a lot of the software on which the world relies a great deal can be terrible — riddled with poor design decisions if not outright and undeniable bugs. This seems to be a fundamental frustrating truth about software.

Webmaster's Commentary: 

I have never been able to install 3DS MAX 2014 on my new windows 7 machine.

Dec 10 20:21

'Each time police shut Pirate Bay down, we will multiply other servers'

The Pirate Bay and several other torrent websites temporarily disappeared from the internet on Tuesday. Reports say the sites were downed in a raid by Swedish police, which seized the servers, computers, and equipment of previously elusive web pirates. RT talks to the Berlin Chairman of the Pirate Party - Bruno Kramm.

Dec 10 17:31

Hacked payment card service transmitted some data in plaintext

Charge Anywhere, a company that routes payment transactions between merchants and payment card processors, said that malicious software planted on its network may have accessed unencrypted sensitive cardholder data for almost five years.

In a statement, the company warned that some of the card data it sends or receives appears in plaintext, allowing attackers to copy it and use it in fraudulent transactions. Details including names, account numbers, expiration dates, and verification codes are known to be exposed for transactions that occurred this year from August 17 through September 24, although it's possible transactions dating back to November 5, 2009 may also have been accessed, the statement said.

Dec 10 15:37

Taped Phone Call to Dept of Justice on Trustee Gary F Seitz Chapter 7 Abuse.

From yesterday:

http://mortgagemovies.blogspot.com/2014/12/kingcastmortgage-movies-and...

Wait for the taped phone call in a moment, but note first that former Eckert, Seamans Attorney Margaret England (more info) now works for the same law firm as Gary F. Seitz. England is a racist who called La Mar Gunn a nigger, as noted in a recent Federal Trial that Mr. Gunn won, pro se. So now we have discrimination against a Philipino family, nice.

In this case, the pro se Blanco family tried to file a Chapter 13 but checked the wrong box. Should be a simple matter to convert, right? I mean you know, seeing as they are trying to pay, rather than to extinguish a debt, right?

Dec 10 13:40

MONSANTO NABS CHICAGO BIG-DATA STARTUP 640 LABS

One of Chicago's more interesting big-data startups, 640 Labs, has been acquired by agriculture giant Monsanto. The company was bought by San Francisco-based Climate Corp., a fast-growing technology unit of Monsanto. Founded by two former Motorola engineers, 640 Labs uses GPS, wireless and mobile technologies to give farmers detailed data on their crops and equipment to improve operations.

Dec 10 11:06

Kids' Privacy Under Threat: Mobile Apps Secretly Collect Data on Children

Mobile app makers ignore US federal privacy rulings, collecting vast amount of sensitive data through software aimed at kids. Using third-party "libraries" software developers often don't realize how much user data is being passing to advertisers.

Dec 10 09:06

Internet Censors Viral Sandy Hook Truth Documentary

Last Monday, an organization known as the Independent Media Solidarity released an epic documentary entitled “We Need to Talk About Sandy Hook,” which they hosted on their own site as well as on Youtube.

Within hours of the video’s upload, it was well on its way to going viral, however its success was short lived.

Shortly after Infowars began hosting the video the following Tuesday morning, it was suddenly removed from Youtube “due to a copyright claim by Lenny Pozner.”

(It should be noted the video was taken down despite carrying a message stating its materials are presented “in compliance with fair use principles,” and that “Use of copyright material in this video generates social benefits that greatly outweigh any cost to the copyright owner, and is therefore a protected form of speech.”)

Dec 10 07:34

FBI Makes Apple Comply to Encryption by Invoking 18th Century Law

The FBI is struggling to win over Apple and Google, now using an 18th century law to beat the tech companies in court and force them to unlock devices. Apple and Google both added encryption to their smartphones, to protect users from surveillance and theft. The smartphones cannot be opened by anyone other than the owner and even the companies do not know how to open the devices.

Dec 10 06:05

Comcast sued by customers for turning routers into public hotspots

A pair of Comcast customers has sued the company for turning Xfinity Internet routers into public Wi-Fi hotspots, saying Comcast’s actions pose risks to subscribers and are taken without seeking their authorization.

Plaintiff Toyer Grear and daughter Joycelyn Harris of Alameda County, California, filed the suit on December 4 (PDF) in US District Court in Northern California, seeking class action status on behalf of all Comcast customers who lease wireless routers that broadcast Xfinity Wi-Fi hotspots. “Without authorization to do so, Comcast uses the wireless routers it supplies to its customers to generate additional, public Wi-Fi networks for its own benefit,” the complaint states.

Dec 09 22:12

Police pull plug on Pirate Bay’s servers, reports say

Some BitTorrent users were in a frenzy Tuesday, and rightfully so, when a popular website named PirateBay.com went offline, along with a few other similar ones, simultaneously, in what the publication Torrent Freak and officials are dubbing a “police raid”.

Dec 09 14:03

Court and U.S. Chapter 7 Trustee Gary F. Seitz Caught Trying to Steal Property Instead of Allowing Chapter 13.


Wait for the taped phone call in a moment, but note first that former Eckert, Seamans Attorney Margaret England (more info) now works for the same law firm as Gary F. Seitz. England is a racist who called La Mar Gunn a nigger, as noted in a recent Federal Trial that Mr. Gunn won, pro se. So now we have discrimination against a Philipino family, nice.

In this case, the pro se Blanco family tried to file a Chapter 13 but checked the wrong box. Should be a simple matter to convert, right? I mean you know, seeing as they are trying to pay, rather than to extinguish a debt, right?

Dec 09 13:09

Facebook’s Upcoming Artificial Intelligence Will ‘Mediate’ Your Online Activity

Facebook is building an artificial intelligence program that will serve as a social media assistant—kind of like Clippy, the obnoxious Microsoft Office bot, only more intelligent and invasive. A Wired profile of the head of the Facebook AI lab, Yann LeCun, says the new program will “mediate your interaction with your friends” and do things like shame you from posting pictures of illicit activities.

Dec 09 12:33

150 Million PayPal Accounts In Danger of Hijacking

A vulnerability that would have enabled a hacker to completely bypass the authentication system in PayPal has been patched, resulting in a $10,000 bounty for the white-hat that found it.

Dec 09 10:27

Sony hack snowballs as movie scripts, celebrity phone numbers leaked

The new trove of data released by the so-called GOP (Guardians of Peace) includes more private employee info, actor phone numbers and traveling aliases, legal claims against Sony Pictures, film budgets, scripts and more. As pointed out by the WSJ, it also includes private info of some 40,000 Sony Pictures ex-employees like home addresses, previous salaries and social security numbers.

Dec 09 09:29

Government In Action: Obama’s Administration Is Back On The Hunt For Internet Censorship In The US

A State Department official met with the czar of China’s infamous Internet censorship program in Washington DC yesterday, where she urged “co-operation” with the figure who helped implement prison sentences for online critics of the ruling Communist Party.

Dec 09 08:06

What Bad, Shameful, Dirty Behavior is U.S. Judge Richard Posner Hiding? Demand to Know.

Like so many federal judges, Judge Posner recognizes rights only when they belong to agents of the state or the economic elite. When it’s ordinary citizens at issue, he snidely rejects any such protections. Of course, this is exactly backwards: those exercising public power (police officers) have a lower entitlement to privacy than private individuals. But power-servants like Judge Posner view only actors of the state and those who serve it (such as himself) as entitled to these prerogatives. That’s become the corrupt essence of the U.S. justice system, and it’s perfectly expressed by Judge Posner’s radically divergent views based on whose privacy is at stake.

Dec 09 06:49

Powerful, highly stealthy Linux trojan may have infected victims for years

Researchers have uncovered an extremely stealthy trojan for Linux systems that attackers have been using to siphon sensitive data from governments and pharmaceutical companies around the world.

Dec 08 16:41

Pew: 75% ‘better informed’ because of Internet news sites, don’t feel ‘overloaded’

The Internet is revolutionizing news consumption, with more than seven in 10 telling Pew Research Center that they are better informed than they were five years ago because of the news websites they visit daily.

Dec 08 16:32

Sony Hackers Apparently Demand Studio Pull ‘The Interview’

A group calling itself GOP posted a message online on Monday that warned Sony to stop “immediately showing the movie of terrorism which can break the regional peace and cause the war.”

GOP — which stands for Guardians of Peace — did not specifically identify the movie. Authorities have been investigating whether the hacker attack is in some way be connected to “The Interview,” the movie that has generated condemnation from the government of North Korea.

Webmaster's Commentary: 

Yep; it's a false-flag!

Dec 08 14:17

Was there a secret Tory conspiracy to get rid of #CameronMustGo?

The Twitter hashtag that caught the imagination of the nation has been unceremoniously retired – despite the fact that it is still being used by thousands of British citizens who have had enough of the man it names, and his government.

That’s right – #CameronMustGo has gone.

It disappeared from Twitter‘s United Kingdom trends an astonishing 16 days after it was launched and – suspiciously – while it was still being tweeted at least once every three seconds [accurate at time of writing].

Users instantly smelled a rat – has Twitter been hacked? Or has it been corrupted by Cameron’s cronies?

Dec 08 13:05

NSA SPIES ON EVERY CELL PHONE COMPANY IN THE WORLD, NEW DATA SHOWS

The United States National Security Agency has spied on virtually every cell phone manufacturer and provider in the world in an attempt to uncover security weaknesses that can be exploited for surveillance, according to newly leaked data. It also appears that the NSA has worked to sabotage the technical security features of commercial telecommunications systems in order to be able to spy on their users.

Dec 08 11:55

Obama renews NSA snooping for 90 more days

President Obama has renewed the NSA’s phone-snooping program for another three months, with the administration saying Monday that it’s too important to let it expire right now, defying members of Congress who said it was time to ax the controversial program.

SHARE THIS ARTICLE WITH YOUR SOCIAL MEDIA