COMPUTERS/INTERNET/SECURITY

Sep 22 14:50

Death, drones and driverless cars: how Google wants to control our lives

If you want to understand the future of humanity – where we’re headed, who’ll be in charge, and exactly how worried you should be about that – you could do worse than begin with two unremarkable buildings, on opposite coasts of the US. The more famous one, half a mile from Google’s main campus in Mountain View, California, is home to Google X, the search giant’s purportedly secret research lab. It’s not really very secret.

Sep 22 13:16

“Virtual Reality” Journalism Could Create “Virtual Propaganda”

The largest U.S. newspaper publisher is experimenting with Facebook’s virtual reality headset to allow readers to experience a news story in a 3D immersive environment, but one expert warns the technology could lead to “virtual propaganda” which misleads viewers.

Sep 22 12:51

Tor Challenge Inspires 1,635 Tor Relays

Good news for whistleblowers, journalists, and everyone who likes to browse the Internet with an added cloak of privacy: the Tor network got a little stronger. Tor—software that lets you mask your IP address—relies on an international network of committed volunteers to run relays to help mask traffic. And that network is stronger now, thanks to the 1,000+ volunteers who participated in our second-ever Tor Challenge.

Sep 22 11:16

Get Your Christmas Gifts From The Police State!

From the "you can't make this up" files...

Amanda Warren
Activist Post

So perhaps you think that warrantless checkpoints, random DNA sampling, no-knock SWAT raids to smoke out some criminals, and an array of high-tech weapons and drones were the only gifts bestowed upon society by a rightly outfitted militarized U.S. police force. Freedom isn't free after all!

In at least a couple of locations last year, Santa had a personal escort in his mission of gift-giving. Because, these days, even Santa Claus is under attack from freedom-hating terrorists and criminals - ESPECIALLY because they are all Muslim (big wink). So, last year, Silver Spring, Maryland - population 70,000 - exchanged Santa's Sleigh for a Ballistic Engineered Armored Response Counter Attack Truck, commonly known as a BearCat, so that he could safely distribute gifts and donations amid an elevated threat level...

Sep 22 10:15

Big Brother Wants 'To Make Life Easier' For You - But Ask Yourself Why

Increasingly, how we interact with government over the internet is the public face of Whitehall. Mike Bracken, head of the Government Digital Service (GDS) – launched in 2011, based on the recommendations of Lastminute.com founder Martha Lane Fox – is the man in charge of this digital transformation. Lane Fox recommended that a central service bring together existing government websites, enable access to official data and enable day-to-day transactions, such as renewing a car tax disc, easy online.

Sep 22 09:10

David Cameron appoints special envoy to preserve government data snooping

Prime minister David Cameron has appointed Sir Nigel Sheinwald as a special envoy on "intelligence and law enforcement data sharing".

The role was announced by Cameron this July, when he set out the government’s plans to introduce emergency legislation to preserve data retention and investigation powers (the Data Retention and Investigatory Powers Act).

Sep 22 08:46

DOJ Power Grab Wants To Target Anonymous Web Users

The US Department of Justice (DOJ) is proposing a power grab that would make it easier for domestic law enforcement to break into computers of people trying to protect their anonymity via Tor or other anonymizing technologies.

That's according to a law professor and litigator who deals with constitutional issues that arise in espionage, cybersecurity and counterterrorism prosecutions.

Sep 22 08:14

Fake ads suggest you can charge your iPhone 6 in a microwave

Remember the spoof adverts that tried to suggest that iOS 7 would make your iPhone waterproof? Well the same bunch of tricksters from the 4chan message boards are back, and this time they’re trying to get you to microwave your iPhone 6. Just in case you were tempted to try it: no, you cannot charge your brand new phone by putting it in the microwave.

Sep 22 07:20

Snowden Reveal Makes Israeli Spies' Protest An American Issue

Last Friday, 43 veteran and reserve members of Israel's secretive spy organization, Unit 8200, claimed they'd been directed to spy on Palestinians for coercion purposes.

The group signed an open letter of protest to Prime Minister Benjamin Netanyahu and to the head of the Israeli army, accusing the spy agency of targeting innocent Palestinians and collecting data for political purposes, not national security. Dubbed the "refusniks," the veterans declared that they had a "moral duty" to no longer "take part in the state's actions against Palestinians."

The source of much of the Israeli data may be the U.S. National Security Agency. Author and journalist James Bamford interviewed NSA leaker Edward Snowden in Moscow this summer. Bamford tells NPR's Arun Rath that Snowden was eager to discuss documents that show a U.S. agreement to routinely share information with Israel and Unit 8200.

Sep 22 06:26

Dirty Foreclosure Mill Reimer Arnovitz Facing Ethics Probe for Lies and Stealing from Clients.

http://www.scribd.com/doc/240515714/Slam-Safeguard-and-Reimer-Arnovitz...

Also, I know Reimer was scared about my inquiry because they circulated an email throughout the company about me. They didn't want anything getting out. Too bad it got out anyway. More on this at a time I deem appropriate.?

Sunday, September 21, 2014

KingCast and Mortgage Movies Launch a New Facebook Page: Fight Safeguard and Reimer Arnovitz Chernek & Jeffrey for Ethic Violations.
Safeguard continues to break into homes and cover it up. And that's a fact. Watch the videos documenting more of that, along with the Illinois Attorney General's ongoing lawsuit against them. Meanwhile an inside source tells me that Bank of America lawyers at Reimer, Arnovitz steal from the clients, illegally use court refund monies, and abuse employees. They too, work hand-in-hand with Safeguard.

Sep 22 04:50

Amazon, Facebook, and Twitter Allows ISIS To Sell Merchandise

WEBMASTER ADDITION: That alone tells us ISIS is a propaganda front for US/Israel covert operations.

Sep 21 19:38

Globalist billionaire Peter Thiel’s take on the Bilderberg Group

In 2012, as covered in my documentary film Shade the Motion Picture, I flew to Chantilly Virginia to cover a secretive closed-door meeting conducted at the Westfields Marriott by a select few of the world’s foremost elite and royalty who essentially sit down in an organized fashion to plan our futures — the futures of their indentured servants, or as Marvin the Martian would say, “futile Earth scum”.

Sep 21 15:43

Warning for iPhone Users: iOS 8 Wave is a Hoax

. . . . someone made an Apple-style graphic explaining the benefits of “Wave,” a fake technology that lets you charge an iPhone by popping it in the microwave.

According to the graphic, Wave sucks in power from the microwave radiation used by the appliance to cook food.

Also here: http://www.king5.com/story/tech/2014/09/20/iphone-ios-8-wave-hoax/1597...

Drink Brawndo!

Sep 21 13:41

The Internet Debate Pits Local Communities Against Broadband Giants

Internet service with modern connection speeds is not available in much of Bradley County, Tennessee. Some parts have no internet service at all. But local advocates and lawmakers are pushing the FCC to intervene on their behalf - against major broadband companies and their lobbyists.

Sep 21 10:09

Alt media success panics neocons

As Western mainstream media fall into the hands of lying billionaires, Zionists, and intelligence agencies (three categories with significant overlap) – and as neoconservatives script big media’s ignoble lies – a surging internet-based alternative media has arisen to challenge the elite’s false narratives. Thanks to alt-media, fewer and fewer people are buying the simplistic feel-good myths peddled by the mainstream.

Webmaster's Commentary: 

I blush!

Sep 20 17:21

eBay “security glitch” has existed for months

A flaw that has exposed eBay customers to malicious websites has been affecting the site since at least February, according to the BBC.

Earlier this week it was revealed how clicking on some listings automatically redirected users to the harmful sites.

EBay removed several posts, but said it was an isolated incident.

But the BBC has since found multiple listings, from multiple users, exploiting the same vulnerability.

Furthermore, several readers contacted the BBC detailing complaints they had made to the site.

Sep 20 07:46

"NSA shared Americans' private communications with Israel"

Sep 20 07:25

Ex-Employees Say Home Depot Left Data Vulnerable

The risks were clear to computer experts inside Home Depot: The home improvement chain, they warned for years, might be easy prey for hackers.

But despite alarms as far back as 2008, Home Depot was slow to raise its defenses, according to former employees. On Thursday, the company confirmed what many had feared: The biggest data breach in retailing history had compromised 56 million of its customers’ credit cards. The data has popped up on black markets and, by one estimate, could be used to make $3 billion in illegal purchases.

Sep 19 20:03

Court Lets Cisco Systems Off the Hook for Helping China Detain, Torture Religious Minorities

Chinese citizens who suffered forced detention, torture, and a panoply of brutal human rights abuses at the hands of the Chinese government have been engaged in a high profile court case against Silicon Valley mainstay Cisco Systems for many years.

Sep 19 18:01

Google acts like privatized NSA: WikiLeaks’ Julian Assange

IN INTERVIEWS WITH BBC AND SKY NEWS, WIKILEAKS FOUNDER EXPLAINS HOW GOOGLE’S BEHAVIOR, THOUGH LEGAL, IS LIKE THAT OF SURVEILLANCE AGENCIES

Sep 19 14:48

Google Acts Like Privatized NSA

Google’s practices are “almost identical” to those of the U.S. National Security Agency and its British counterpart, the GCHQ, Julian Assange has said.

The WikiLeaks founder made the charge Thursday in interviews with the BBC and Sky News. He spoke from the Ecuadoran Embassy in London, where he has lived for over two years under political asylum.

Sep 19 13:02

Teen with lymphatic malformations has profile photo deleted by Facebook

On Tuesday, Norwegian news site VG reported that a 16-year-old boy found his newest Facebook profile photo deleted automatically by the site, but not for containing offensive content or misrepresenting himself. Embret Henock Haldammen, a high school student in Kristiansand, Norway, had posted his latest school portrait weeks earlier, only to receive a notice stating that "the profile picture violated Facebook's policies."

Webmaster's Commentary: 

But Facebook is okay with setting a kitten on fire!

And of course, facebook is blocking all posts that reference the video of "All Wars Are Bankers' Wars" under the excuse that YouTube is a known security threat!

Sep 19 10:38

World Wide Web inventor slams Internet fast lanes: ‘It’s bribery.’

In a visit to The Washington Post, on Thursday, Berners-Lee said that system is now in danger from Internet service providers (ISPs) who stand to amass too much power over what was intentionally built as a decentralized network — one where no single actor could dictate outcomes to everyone else.

Berners-Lee pushed back against opponents of net neutrality regulation who argue that applying new rules on ISPs is tantamount to regulating the Internet. But there's a difference between regulating providers of broadband and the services that run on top of it, said Berners-Lee. Strong net neutrality rules would help preserve that line dividing the two and limit the incentive of ISPs to meddle in the market for services.

Sep 19 07:04

Home Depot breach affected 56M debit, credit cards

Home Depot said Thursday that a data breach that lasted for months at its stores in the U.S. and Canada affected 56 million debit and credit cards, far more than a pre-Christmas 2013 attack on Target customers.

The size of the theft at Home Depot trails only that of TJX Companies' heist of 90 million records disclosed in 2007. Target's breach compromised 40 million credit and debit cards.

Webmaster's Commentary: 

And where is the NSA in all this? After all that money and Constitutional violations, can;t they actually do something USEFUL?

Sep 19 06:43

50 Facts That Show How Far America Has Fallen In This Generation

What has happened to America? Please show these numbers to anyone that does not believe that the United States is in decline.

Sep 19 05:07

AT&T/DirecTV merger boosts incentive to kill copper service, opponents say

AT&T’s proposed $48.5 billion acquisition of DirecTV will reduce competition for TV subscribers, increase AT&T’s “incentive to discriminate against online video services,” and give AT&T more reasons to neglect its aging copper network, consumer advocacy groups argue in a petition to deny the merger. AT&T has claimed the merger would help it expand fiber buildouts to an additional two million locations, but this claim is unverifiable because AT&T hasn’t said how much fiber it will deploy if the merger is not approved, says the petition to the FCC filed Tuesday by Public Knowledge and the Institute for Local Self-Reliance.

Sep 19 00:06

AFP accidentally leaves explosives at Sydney airport, force to apologise to public

oops we left a suitcase full of plastic explosives here, sorry our bad.

Sep 18 22:57

Irate NSA Staffer Doesn’t Like Being Filmed in Public, for Some Reason

The NSA sent someone bearing the nametag “Neal Z.” to the University of New Mexico’s Engineering and Science Career Fair today, in the hopes of recruiting young computer geniuses to help manage the yottabytes of data it is collecting about you. But instead of eager young applicants, Mr. Z. encountered University of New Mexico alumnus Andy Beale and student Sean Potter, who took the rare opportunity of being in the room with a genuine NSA agent to ask him about his employer’s illegal collection of metadata on all Americans. Mr. Z. did not like that one bit.

Sep 18 20:29

ALERT: Federal government may seize and shut down all internet sites that don’t push vaccines during a national emergency pandemic

If you aren’t saving off articles, downloading important MP3 audio files and printing off vital information that might save your life in a pandemic outbreak, you may soon find yourself completely cut off from all holistic or alternative information on the web.

Sep 18 18:45

Over a dozen intercept cell phone towers found near the White House and Senate

t was early September when reports of fake cell phone towers across America started picking up steam in the alternative press. Les Goldsmith, the CEO of the defense & law enforcement technology provider ESD America, told the press that he was able to map out 17 different fake

Sep 18 17:43

Home Depot: 56M Cards Impacted, Malware Contained

Home Depot said today that cyber criminals armed with custom-built malware stole an estimated 56 million debit and credit card numbers from its customers between April and September 2014. That disclosure officially makes the incident the largest retail card breach on record.

Sep 18 17:39

Apple’s “warrant canary” disappears, suggesting new Patriot Act demands

When Apple published its first Transparency Report on government activity in late 2013, the document contained an important footnote that stated:

“Apple has never received an order under Section 215 of the USA Patriot Act. We would expect to challenge such an order if served on us.”

Writer and cyber-activist Cory Doctorow at the time recognized that language as a so-called “warrant canary,” which Apple was using to thwart the secrecy imposed by the Patriot Act.

Warrant canaries are a tool used by companies and publishers to signify to their users that, so far, they have not been subject to a given type of law enforcement request such as a secret subpoena. If the canary disappears, then it is likely the situation has changed — and the company has been subject to such request.

Now, Apple’s warrant canary has disappeared.

Sep 18 12:39

Apple’s “warrant canary” disappears, suggesting new Patriot Act demands

Apple included language in its first Transparency Report to say that it had not been subject to a Section 215 Patriot Act request. That language is now gone.

Sep 18 09:01

VIDEO: IRATE NSA STAFFER DOESN’T LIKE BEING FILMED IN PUBLIC, FOR SOME REASON

The NSA sent someone bearing the nametag “Neal Z.” to the University of New Mexico’s Engineering and Science Career Fair today, in the hopes of recruiting young computer geniuses to help manage the yottabytes of datait is collecting about you.

Sep 18 08:17

Google Maps Has Been Tracking Your Every Move, And There’s A Website To Prove It

Remember that scene in Minority Report, where Tom Cruise is on the run from the law, but is unable to avoid detection because everywhere he goes there are constant retina scans feeding his location back to a central database? That’s tomorrow. Today, Google is tracking wherever your smartphone goes, and putting a neat red dot on a map to mark the occasion.

You can find that map here. All you need to do is log in with the same account you use on your phone, and the record of everywhere you’ve been for the last day to month will erupt across your screen like chicken pox.

Sep 18 06:58

Biggest attack on RT.com: Website hit by 10 Gbps DDoS

RT.com has been hit with the most powerful DDoS attack in the website's history, which reached 10 Gbps in strength. No group has claimed responsibility. RT has experienced cyber assaults in the past, prompted by its reporting on Manning and WikiLeaks.

The Wednesday attack was successfully deflected, but resulted in a temporary slowdown of the site.

“Thanks to the website’s reliable technical protection, RT.com was unavailable just for a few minutes, even though the DDoS attack has continued,” RT’s press service said in a statement.

The attack was identified as a UDP-flood type, and reached 10 gigabits per second.

Sep 18 06:40

NSA Attacks Student at University of New Mexico

Sep 18 06:26

Apple will no longer unlock most iPhones, iPads for police, even with search warrants

Apple said Wednesday night that it is making it impossible for the company to turn over data from most iPhones or iPads to police — even when they have a search warrant — taking a hard new line as tech companies attempt to blunt allegations that they have too readily participated in government efforts to collect user information.

Sep 17 19:22

Biggest attack on RT.com: Website hit by 10 Gbps DDoS

RT.com has been hit with the most powerful DDoS attack in the website's history, which reached 10 Gbps in strength. No group has claimed responsibility.

Sep 17 18:36

Nowhere To Hide As Minority Report-Style Facial Recognition Technology Spreads Across America

What is our society going to look like when our faces are being tracked literally everywhere that we go? As part of the FBI's new Next Generation Identification System, a facial recognition database known as the Interstate Photo System will have collected 52 million of our faces by the end of 2015. But that is only a small part of the story. According to Edward Snowden, the NSA has been using advanced facial recognition technology for years. In addition, as you will see below, advertising companies are starting to use Minority Report-style face scanners in their billboards and many large corporations see facial recognition technology as a tool that they can use to serve their customers better. Someday soon it may become virtually impossible to go out in public in a major U.S. city without having your face recorded. Is that the kind of society that we want?

Sep 17 15:15

Occupy group abolishes nearly $4 million in student loan debt

On the third anniversary of the Occupy Wall Street movement, an offshoot group announced that it has erased $3.8 million worth of private student loan debt.

The group, Strike Debt, said in a press release issued on Wednesday this week that its Rolling Jubilee initiative has purchased nearly $4 million in private student debt owed by former attendees of Everest College — an institution run by the massive for-profit education company Corinthian Colleges — in turn freeing those former students from a huge chunk of the burdensome loan bills.

Sep 17 14:57

Senators opposing net neutrality rake in more campaign cash

Senators who have vocalized their opposition to net neutrality are taking in, on average, 40 percent more campaign cash from the broadband-delivery industry than those who support it, according to an analysis of campaign data.

The data (XLSX)—a Maplight analysis of campaign contributions prepared for Ars Technica—highlights the disparity between what the monied Washington interests want compared to the public's desires. Most of the 800,000 initial public comments to the Federal Communications Commission backed the FCC adopting net neutrality rules. The commission is weighing whether to enact regulations that, among other things, could prevent broadband providers from charging for Internet fast lanes. The public commenting period ended Monday.

Sep 17 13:29

ALERT: Federal government may seize and shut down all internet sites that don't push vaccines during a national emergency pandemic

If you aren't saving off articles, downloading important MP3 audio files and printing off vital information that might save your life in a pandemic outbreak, you may soon find yourself completely cut off from all holistic or alternative information on the web. Under an executive order signed by President Obama in 2012, the U.S. federal government now has the authority to seize and shut down all private websites which do not promote vaccines and pharmaceuticals during the coming Ebola pandemic the government expects to sweep across America.

If you aren't making alternative plans to have access to lifesaving information about antiviral herbal remedies and immune boosting solutions, you can fully expect to be completely cut off from those information sources of a pandemic national emergency is declared.

Sep 17 13:07

New Android Browser Bug Is a “Privacy Disaster” for Android Users

A Critical android vulnerability has been discovered in the browser installed by default on a large number (Approximately 70%) of Android devices, that could allow an hacker to hijack users’ open websites, and there is now a Metasploit module available to easily exploit this dangerous vulnerability.

Independent security researcher Rafay Baloch has written about a security bug in the Android Browser app that allows one website to steal data from another. The exploit targets vulnerability (CVE-2014-6041) in Android versions 4.2.1 and all older versions and was first disclosed right at the start of September by Rafay Baloch.

The guys over at Metasploit are calling it a “Privacy Disaster,” and promising to take the time to create a video that is “sufficiently shocking” in order to show you why.

Sep 17 11:41

WHAT YOU'RE NOT BEING TOLD ABOUT THE USA FREEDOM ACT

The current “gutted” version of the U.S.A. Freedom Act (S. 2685) will only serve to legalize government’s currently illegal surveillance of innocent civilians. A coalition of whistleblowers & civil liberties organizations published a letter calling on members of Congress to reject the empty reform.

Sep 17 10:15

Government could have fined Yahoo trillions of dollars "At the end of the year: the total would have been $7.9 sextillion. That’s equal to a stack of $100 bills (if that many actually existed) so high that it would go back and forth to the sun 28,769 time

For an illuminating glimpse of government power in action, it’s hard to beat the fines the Justice Department threatened to level against Yahoo if it didn’t comply with a secret and sweeping surveillance request in 2008.News coverage of the case, for which documents were unsealed last week, reported the proposed fines as $250,000 a day. But there was also a clause that called for a doubling of the amount each week if Yahoo refused to comply. It was more than enough to bankrupt the company after just a few months.

Sep 17 09:56

CIA, NSA And Facebook Create 'Threat Matrix Score' On Every American

Participation on Facebook could prove very dangerous to your future well-being. There is a reason that Facebook is aligned with both the CIA and the NSA. I have several credible sources who tell me that all data posted on Facebook goes into series of cataloged files which culminates with each person being assigned a “Threat Matrix Score”. The mere existence of a Threat Matrix Score should send chills up and down the collective spines of every American.

Sep 17 09:22

DOCTOR: KEEP CELLPHONES ON ‘AIRPLANE MODE’ WHILE IN POCKETS TO LOWER CANCER RISK

“If you have to have your phone in your pocket for a short period of time, it’s not going to be a problem as long as you have it on airplane mode, which means you cannot send or receive messages,” she said.

Sep 17 09:10

New Zealand's Prime Minister: 'Snowden Might Be Right'

Prime Minister John Key said Edward Snowden ‘may well be right’ in his claims that the NSA has access to communications from New Zealand. The politician, however, said he ‘did not believe’ mass surveillance was taking place.

Key was interviewed in the aftermath of Edward Snowden’s revelations on Monday published by The Intercept, in which he claimed he “routinely came across the communications of New Zealanders” in his work with “a mass surveillance tool we [NSA] share with GCSB, called ‘XKeyscore’.”

Sep 17 07:31

The NSA and GCHQ Campaign Against German Satellite Companies

“Fuck!” That is the word that comes to the mind of Christian Steffen, the CEO of German satellite communications company Stellar PCS. He is looking at classified documents laying out the scope of something called Treasure Map, a top secret NSA program. Steffen’s firm provides internet access to remote portions of the globe via satellite, and what he is looking at tells him that the company, and some of its customers, have been penetrated by the U.S. National Security Agency and British spy agency GCHQ.

Stellar’s visibly shaken chief engineer, reviewing the same documents, shares his boss’ reaction. “The intelligence services could use this data to shut down the internet in entire African countries that are provided access via our satellite connections,” he says.

Sep 17 07:02

Federal government may seize and shut down all internet sites that don't push vaccines during a national emergency pandemic

Under an executive order signed by President Obama in 2012, the U.S. federal government now has the authority to seize and shut down all private websites which do not promote vaccines and pharmaceuticals during the coming Ebola pandemic the government expects to sweep across America.

Sep 16 17:23

Google: US government demands for user data have risen 250% since 2009

Transparency report shows global government requests for information rose 15% last year, as tech giant urges surveillance reform

Sep 16 15:20

Let Me Explain Why U2 Is Damaging the Music Industry…

Dumping an album in hundreds of millions of iTunes libraries whether people want it or not, reduces music to the level of a software update or a bug-fix or just plain spam.

Sep 16 13:34

‘More harm than good’: Congressional NSA reforms a sham, say critics

INTELLIGENCE COMMUNITY WHISTLEBLOWERS AND CIVIL LIBERTIES GROUPS CALL ON CONGRESSMEN TO REJECT ‘GUTTED’ USA FREEDOM ACT

Sep 16 09:41

Nationwide Biometric Database Goes Live

Nicholas West
Activist Post

Despite the FBI already having been sued by privacy groups amid plans for a nationwide biometric database, it has officially gone live. The Next Generation Identification system will eventually include iris scans, facial recognition, and a range of other biometric identifiers that are collated into a central database for real-time sharing at all levels of law enforcement and government agencies...

Sep 16 08:13

THREE QUARTERS of Android mobes open to web page spy bug

Tod Beardsley (@TodB), a developer for the Metasploit security toolkit dubbed the "major" flaw a "privacy disaster".

"What this means is any arbitrary website - say, one controlled by a spammer or a spy - can peek into the contents of any other web page," Beardsley said.

"[If] you went to an attackers site while you had your web mail open in another window, the attacker could scrape your email data and see what your browser sees.

"Worse, he could snag a copy of your session cookie and hijack your session completely, and read and write web mail on your behalf."

Sep 16 08:05

Computer Models Tell Us That This Ebola Pandemic Could Soon Kill Millions

We could potentially be on the verge of the greatest health crisis that any of us have ever seen. The number of Ebola cases in Africa has approximately doubled over the past three weeks, and scientific computer models tell us that this Ebola pandemic could ultimately end up killing millions of us – especially if it starts spreading on other continents. At first, many assumed that this Ebola outbreak would be just like all the others – that it would flare up for a little while and then it would completely fade away. But that has not happened this time. Instead, this epidemic has seemed to pick up momentum with each passing week. Despite extraordinary precautions, hundreds of health workers have gotten the virus, and the head of the CDC says that the spread of Ebola is “spiraling out of control” and that it is “going to get worse in the very near future.” For those that have thought that all of this talk about Ebola was just “fearmongering”, it is time for you to wake up.

Sep 16 07:48

Is YOUR Amazon account at risk? Security expert finds flaw in the Kindle library that could expose personal details

Next time you log into Amazon to manage your Kindle and e-books, you could be putting your personal details at risk.

A German security researcher has spotted a vulnerability in the retail giant's website that hackers could exploit to gain full access to users' accounts.

The flaw, which can be exploited when a user downloads a malicious e-book, has been active since at least July this year, despite being reported to Amazon’s security team.

Sep 16 06:16

Justice Department Proposal Would Massively Expand FBI Extraterritorial Surveillance

A Department of Justice proposal to amend Rule 41 of the Federal Rules of Criminal Procedure would make it easier for domestic law enforcement to hack into computers of people attempting to protect their anonymity on the Internet. The DOJ has explicitly stated that the amendment is not meant to give courts the power to issue warrants that authorize searches in foreign countries—but the practical reality of the underlying technology means doing so is almost unavoidable.

The result? Possibly the broadest expansion of extraterritorial surveillance power since the FBI’s inception.

This post highlights key issues raised by the international aspect of the DOJ proposal, in the attempt to encourage wider public debate before the FBI is granted such expansive powers.

Sep 16 04:18

Court blasts US Navy for scanning civilians’ computers for child porn

A federal appeals court said the US Navy's scanning of the public's computers for images of child pornography constituted "a profound lack of regard for the important limitations on the role of the military in our civilian society."

The Naval Criminal Investigative Service (NCIS) practice led the 9th US Circuit Court of Appeals to suppress evidence in the form of images of child pornography that an NCIS agent in Georgia found on a Washington state civilian's computer. The agent was using a law-enforcement computer program called RoundUp to search for hashed images of child pornography on computers running the file-sharing network Gnutella.

"...RoundUp surveillance of all computers in Washington amounted to impermissible direct active involvement in civilian enforcement of the child pornography laws, not permissible indirect assistance," Judge Marsha Berzon wrote for the San Francisco-based appeals court.

Sep 15 15:32

The new Luddites: why former digital prophets are turning against tech

Neo-Luddism began to emerge in the postwar period. First after the emergence of nuclear weapons, and secondly when it became apparent new computer technologies had the power to change our lives completely.

Webmaster's Commentary: 

It isn't the new technologies that are the problem, but the misuse of those technologies by government and corporations.

Sep 15 15:18

The Original Idea for Mobile Music Streaming… Written In 1908

…from “The Future of the Wireless Art,” Wireless Telegraphy and Telephony: Popularly Explained (p.67) by Nikola Tesla.

An inexpensive instrument, not bigger than a watch, will enable its bearer to hear anywhere, on sea or land, music or song, the speech of a political leader, the address of an eminent man of science, or the sermon of an eloquent clergyman, delivered in some other place, however distant. In the same manner any picture, character, drawing, or print can be transferred from one to another place. Millions of such instruments can be operated from but one plant…

Sep 15 14:48

Giganews Is an FBI operation

This is my warning - that all of the content being downloaded and shared on the Usenet network is going through the authorities! Giganews customers are being logged! The log file is called the "gigauth" on their "cruncher" servers which logs every connection by every customer, which are then archived. This means Usenet uploaders are helping the feds monitor the distribution of Usenet content if their newsgroup provider peers with Giganews!

Sep 15 14:46

Snowden: 'If You Live in New Zealand, You Are Being Watched'

NSA whistleblower Edward Snowden has penned a firm rebuke to New Zealand Prime Minister John Key, accusing the head of state of "not telling the truth about mass surveillance" and issuing this plainly worded warning to residents of the country: "If you live in New Zealand, you are being watched."

Sep 15 14:17

US spies have two bases in New Zealand: Snowden

Renegade former American intelligence analyst Edward Snowden claims the US National Security Agency, for which he used to work, has a facility in Auckland and another in the north. "You are being watched."

Snowden, who is sheltering in Moscow from US attempts to extradite him on espionage charges, appeared by video link before a capacity crowd at the Kim Dotcom-organised Moment of Truth event in Auckland Town Hall last night.

Sep 15 13:49

FBI's facial recognition program hits 'full operational capability'

The Federal Bureau of Investigation’s Next Generation Identification System, a biometric database reliant on tens of millions of facial-recognition records, is now fully operational, the agency announced Monday.

The NGI system, after three years of development, is billed by the FBI as a new breakthrough for criminal identification and data-sharing between law enforcement agencies.

Sep 15 11:45

Yahoo Mail To Be Scanned To Find Users Buying Habits

Yahoo is working on an app recommendation algorithm that will suggest new apps for you to buy based on apps you’ve purchased in the past.

Yahoo knows which apps its Yahoo Mail users have downloaded because whenever someone downloads an app from Apple’s App Store or the Google Play store, Google and Apple emails that person a receipt.

Sep 15 11:42

Our Nation Depends on Restoring Product Liability

Sadly, we have seen a trend in recent decades for the government to protect corporations against the people, rather than protecting the people against corporations. Along with computers, other industries we are dependent on are being protected against product liability lawsuits, such as vaccine manufacturers, and other biotech corporations. This is a practice typically seen under fascist governments, and it never ends well.

The computers don't last. The software will not install. The aqueducts are leaking. The roads are cracking.

Rome is falling.

Optional Banner: 
WRH Exclusive
Sep 15 08:12

Apple Reportedly Paid Over $100 Million to Infect Your Phone With U2

Let's tally up the winners and losers of this transaction.

Apple

Spent: Over $100 million. (As The Verge reminds us, Apple has revenues in the hundreds of billions.)

Received: A new album by U2, advertising in direct (television commercials) and indirect formats (breathless liveblogging by the tech media).

U2

Spent: An undisclosed sum, likely somewhere in the five or six figures, in order to produce an album.

Received: Many millions of dollars from Apple.

Apple customers

Spent: Nothing.

Received: A new album by U2.

I think we got fucked on this, you guys.

Sep 15 08:01

Fifteen Months After the NSA Revelations, Why Aren’t More News Organizations Using HTTPS?

More than fifteen months after the NSA revelations laid bare the overwhelming scope of online surveillance and fueled the demand for privacy, virtually none of the top news websites—including all those who have reported on the Snowden documents—have adopted the most basic of security measures to protect the integrity of their content and the privacy of their readers: deploying HTTPS.

Sep 15 07:50

GCHQ and NSA Hack German Telecoms To Track 'Every Device'

Intelligence agencies, including the NSA and GCHQ used Deutsche Telekom's network to create a 'Treasure Map' of the internet that could be used to monitor and track web users.

Der Spiegel reported uncovering the campaign while analysing documents leaked by whistleblower Edward Snowden. The map reportedly collected data from, and showed the location of, every smartphone, computer and tablet connecting to Deutsche Telekom's network in real time.

Sep 15 07:44

Comcast Tells Customers to Stop Using Tor Browser

Embattled Comcast has another complaint about customer service to add to its growing list. The cable and Internet provider has been telling customers that their service will be terminated if they don’t stop using the Tor web browser. According to a report by Deep.Dot.Web, multiple accounts of Comcast customer service crossing into monitoring customer activity online have been reported to them.

Comcast agents have reportedly contacted customers who use Tor, a web browser that is designed to protect the user’s privacy while online, and said their service can get terminated if they don’t stop using Tor. According to Deep.Dot.Web, one of those calls included a Comcast customer service agent named Jeremy, who allegedly described Tor as an “illegal service.” The use of Tor was then described as against Comcast usage policy.

Sep 15 07:30

Winona Judd, Dubya and Bush Family all in Bed with Safeguard Property Thugs this Week at Five Star Conference.



So now Winona Judd is going to be jamming out down there in the Lone Star State with them I found out. I loved living in Dallas for a while, but the bullshit they can keep.

Sep 15 06:35

Five German Telecom Companies Hacked by The NSA and The GCHQ

We knew already that Germany was a prime target for electronic espionage orchestrated by the American National Security Agency (NSA) and its British equivalent, the Government Communications Headquarters (GCHQ). According to the German Magazine, Der Spiegel, based on documents provided by Edward Snowden, 500 million communications (telephone, email, SMS) were being intercepted every month before the scandal broke out.

However, a new investigation published on Saturday, September 13, by the German magazine, seems to provide additional details on the technicalities of the espionage which was, apparently, organized with the complicity of the German secret services. Der Spiegel ensures that the NSA and the GCHQ have clandestine access to the networks of at least five German companies: Deutsche Telekom, Netcologne, Stellar, and Cetel IABG. These companies, in fact, operate much of the German telecommunications infrastructure.

Sep 15 05:45

Comcast Is Monitoring Your Tor Usage, Threatening To Cut Services

Comcast Corporation (CMCSA) is reportedly telling its subscribers, who are using the Tor service, to stop doing so or risk losing their Internet services. As if the company needed any help to cement its position as the most hated company in America, it has just done itself a huge favor. A number of reports have surfaced over the last few days, chronicling encounters and experiences some Comcast subscribers have had with the company’s support group.

Users have been warned that if they use Tor, they can risk losing their Internet services provided by Comcast. Tor is a Web anonymizing service, which lets users surf and browse the Internet in complete privacy and anonymity. The service gained a lot of traction after Edward Snowden leaked information about the US government, specifically the National Security Agency (NSA), massive-monitoring US citizens without their knowledge.

Sep 15 04:32

Supreme Court ruling has wiped out 11 “do it on a computer” patents so far

There have been no less than 11 federal judicial rulings striking down patents as "abstract" since the US Supreme Court's June 26 decision in Alice v. CLS Bank. It's a high number. The case was recognized as a big decision by commentators when it came, and what's happened since suggests the ramifications may be broader than first thought. Vox Media's Tim Lee (former Ars contributor) has an article rounding up the 11 rulings.

Sep 14 18:33

Safeguard Busted in Florida on Foreclosure Trespass as Illinois Attorney General Expands Probe

Sunday, September 14, 2014

KingCast and Mortgage Movies See Safeguard Busted in Florida Foreclosure Trespass as Illinois Attorney General Expands Probe.

Dear Attorney Erkkila: We meet again, and this time the stakes are higher. I received notice today, one year to the date of Attorney General Lisa Madigan's press release, that your client has again run afoul of the law. Specifically they, along with Keller Williams representatives Greg Beam and/or Pat Kolar, unlawfully entered premises owned by one Nellie Blanco, as you can see by the current Deed and related government - issued tax and property information. In today's taped phone call to me, Greg Beam denied any specific knowledge and said that Pat Kolar was handling this matter. Pat Kolar did not return my taped phone call.

Sep 14 13:52

Local and State Police Involved in Sensitive Hemisphere Program

Federal, state, and local police, with the assistance of phone company employees embedded within DEA narcotics intelligence units, are utilizing an unclassified but “law enforcement sensitive” program, known as Hemisphere, which provides nearly unfettered access to an enormous database containing call records of all telephone calls passing through phone company switches likely owned by AT&T, according to a partially-redacted 24-slide presentation obtained by The Declaration.

Sep 14 11:36

APPLE WATCH IS A HAZARD TO YOUR SEX LIFE

A July 2013 survey of British women found that that 62% of women have interrupted sexual intercourse to check their cell phone. Some 48% of men admitted to doing the same.

Sep 14 07:51

Despite Obama’s Pledge to Curb It, NSA Mass Surveillance Wins Rubber Stamp

In the face of congressional inaction, a federal court on Friday renewed an order allowing the government to collect phone records on virtually all calls within the United States.

The Foreign Intelligence Surveillance Court approved the Justice Department's request for another 90-day extension of the National Security Agency's controversial mass surveillance program, exposed publicly last summer by Edward Snowden and authorized under Section 215 of the post-9/11 Patriot Act. The spying authority is next set to expire on Dec. 5.

Sep 14 07:29

NSA, GCHQ have secret access to German telecom networks

US and UK intelligence services have secret access points for German telecom companies’ internal networks, Der Spiegel reports, citing slides created in the NSA’s ‘Treasure Map’ program used to get near-real-time visualization of the global internet. The latest scandal continues to evolve around the US’ NSA and the British GCHQ, both of which appear to be able to eavesdrop on German giants such as Deutsche Telekom, Netcologne, Stellar, Cetel and IABG network operators, according to Der Spiegel’s report based on material disclosed by Edward Snowden.

Sep 13 15:29

NSA denies whistleblower Snowden ‘raised concerns’ in emails

In response to a Freedom of Information request, the NSA denies that its former NSA contractor-turned whistleblower Edward Snowden ever raised concerns in emails to colleagues to his colleagues over the agency’s surveillance work.

Sep 13 14:22

US Government Ordered Yahoo! To Provide User Data

As the internet giant Yahoo! attempted to refuse compliance with requests by the NSA to access the online data for millions of the company’s users, the U.S. Justice Department threatened to fine the company a staggering $250,000 a day, according to new reporting based on previously secret court documents released on Thursday.

Sep 13 05:45

Proposed Anti-Terror Law in France Would Erode Civil Liberties

A proposed anti-terrorism law in France has freedom of expression advocates concerned. The bill, as our friends at La Quadrature du Net frame it, “institutes a permanent state of emergency on the Internet,” providing for harsher penalties for incitement or “glorification” of terrorism conducted online. Furthermore, the bill (in Article 9) allows for “the possibility for the administrative authority to require Internet service providers to block access to sites inciting or apologizing for terrorism” without distinguishing criteria or an authority to conduct the blocking.

Sep 12 15:25

Proposed Anti-Terror Law in Would Erode Civil Liberties

A proposed anti-terrorism law in France has freedom of expression advocates concerned. The bill, as our friends at La Quadrature du Net frame it, “institutes a permanent state of emergency on the Internet,” providing for harsher penalties for incitement or “glorification” of terrorism conducted online. Furthermore, the bill (in Article 9) allows for “the possibility for the administrative authority to require Internet service providers to block access to sites inciting or apologizing for terrorism” without distinguishing criteria or an authority to conduct the blocking.

Sep 12 14:59

US Government Ordered Yahoo! To Provide User Data Or Face $250,000 Fine - Per Day

As the internet giant Yahoo! attempted to refuse compliance with requests by the NSA to access the online data for millions of the company's users, the U.S. Justice Department threatened to fine the company a staggering $250,000 a day, according to new reporting based on previously secret court documents released on Thursday.

Sep 12 13:05

Naked Celebrity Photo Leak: Can You Be Bothered? Russell Brand

Webmaster's Commentary: 

Down in New Zealand, in what appears to have been a test, websites carrying the hacked nude celebrity photos were planting malware that shut the entire New Zealand network down for a day! So, I owuld advise you to focus your attention on naked pictures of your significant other and avoid being victimized!

Sep 12 11:22

Worldwide Censorship Suppliers Want More Censorship

The movement to save Net Neutrality by reclassifying broadband providers as common carriers got another boost via Wednesday’s Internet Slowdown protest. But the other side isn’t relenting. This week a number of phone and cable equipment suppliers sent a letter to Secretary of Commerce Penny Pritzker urging her to oppose reclassification.

The letter in itself is not surprising. The companies listed are business partners of the largest U.S. Internet providers — the same companies that support FCC Chairman Tom Wheeler’s plan to allow discrimination online.

Sep 12 04:19

US gov’t threatened Yahoo with $250K daily fine if it didn’t use PRISM

Yahoo reports that it is on the verge of releasing 1,500 pages of documents related to a long court battle over its participation in the PRISM program, a National Security Agency program revealed last summer as part of the Snowden leaks.

A leaked top-secret slide about PRISM shows that Yahoo was one of the first participants, having begun contributing to the database in March of 2008. It did so under severe duress. Company executives believed the government's demand for data was "unconstitutional and overbroad" and fought it in court.

Sep 11 14:33

The Era Of Widespread Biometric Indentification And Microchip Implants Is Here

Are you ready to have your veins scanned every time you use your bank account? Are you ready to use a "digital tattoo" or a microchip implant to unlock your telephone? Once upon a time we read about such technologies in science fiction novels, but now they are here. The era of widespread biometric identification and microchip implants is upon us, and it is going to change the way that we live. Proponents of these new technologies say that they will make our private information and our bank accounts much more secure. But there are others that warn that these kinds of "Big Brother technologies" will set the stage for even more government intrusion into our lives. In the wrong hands, such technologies could prove to be an absolute nightmare.

Sep 11 11:43

‘Internet Slowdown Day’: World Wide Web rises up to defend Net Neutrality

ONLINE PROTEST AIMS TO SHOW USERS WHAT’S AT STAKE IF KEY PRINCIPLE OF THE ‘OPEN INTERNET’ IS DESTROYED BY WORLD’S WEALTHIEST TELECOM COMPANIES

Sep 11 10:54

City of Turin decides to ditch Windows XP for Ubuntu and €6m saving

€6m: the amount the municipality of Turin hopes to save over five years by switching from Windows XP to Ubuntu Linux in all of its offices.

The move will mean installing the open source operating system on 8,300 PCs, which will generate an immediate saving of roughly €300 per machine (almost €2.5m altogether, made up from the cost of Windows and Office licences) — a sum that will grow over the years as the need for the renewal of proprietary software licences vanishes, and the employees get used to the new machines.

Sep 11 10:45

Microsoft accepts ‘contempt of court’ deal to appeal email privacy case

Microsoft Corp and the US government have reached a deal under which Microsoft has agreed to be held in contempt of court, as a procedural measure to move an email privacy case on to appeal.

The agreement is the latest step in an ongoing legal battle, in which Microsoft is fighting moves by the US government that would force the corporation to hand over a customer’s emails stored in a data centre in Ireland.

Sep 11 05:28

Meet The Ex-NSA And Ex-Unit 8200 Spies Cashing In On Security Fears

Before Edward Snowden smashed its digital doors wide open, the National Security Agency was seen as the mysterious keeper of an arsenal of dark-voodoo hacking weapons. Now we know the truth: NSA employees are almost too good at what they do–as are their counterparts at Israel’s elite military signal intelligence group, Unit 8200. Unlike people at most government agencies, NSAers and Unit 8200 alums include world experts in their craft, in this case hacking and defending networks and devices.

Sep 11 03:22

PLEASE READ: If People Were Countries.....

If People Were Countries.....
(or, how to avert nuclear war, public or private)

remember, everyone, when things get heated, to CALM DOWN.

there is a point in any conflictual communication where one feels one absolutely must raise one's (virtual) voice, lose one's cool; where not to do so is a detriment to oneself and the meaning in one's life.

soon as the emotional barbs are answered in kind, one might as well give up. 'Innocent until proven guilty' -- how one feels and where one draws the line of acceptable stretching of the truth is not as important.

-- 'to protect my honor' or to 'back up my principles' or 'to protect' others -- worse, to 'not lose face' --

these are the game changers, the seemingly unique and rare set of events that will suddenly convince a large number of people to get involved, people who steadfastly opposed getting involved up to that point.

sound familiar?

Sep 10 18:28

Why I Won't Buy an Apple Watch

I consider myself a tech enthusiast and early adopter, but I just don't see any current smartwatch that can enrich my daily life. The Apple Watch doesn't change that, at least not what I saw from the presentation.

And then there was the gaping hole in the Apple Watch announcement: battery life. Oh, there's a fancy MagSafe charger, but how often will you have to use it? Every night, most likely. I'm already a slave to my smartphone charger. Another device to babysit? No, thank you. Also missing: waterproof specs. If it can't stand up to some rain or the occasional spilled drink, it'll quickly become a $350 paperweight.

Sep 10 16:01

Israeli Think Tank Compromised to Serve Sweet Orange Exploit Kit

The official website of a prominent Israel-based, Middle East foreign policy-focused think tank, the Jerusalem Center for Public Affairs (JCPA), has been compromised and abused by attackers to distribute malware.

The Israeli think tank website JCPA – an independent research institute focusing on Israeli security, regional diplomacy and international law – was serving the Sweet Orange exploit kit via drive-by downloads to push malware onto the computers of the website's visitors by exploiting software vulnerabilities, researchers from security firm Cyphort reported on Friday.

Sep 10 15:58

Largest Pirate Bay Proxy & More Blocked By UK ISPs

Update: The operator of PirateProxy informs us that a new domain is up and operational at PirateProxy.bz

Sep 10 14:16

LAPD Blames Predictive Software For Misconduct And Abuse, Rather Than Its Own Disinterest In Holding Officers Accountable

The LASD is finally acknowledging that it let its officers (and prison guards) act with impunity for far too many years. The system could have worked -- at least in its limited capabilities -- but no one wanted to follow up on flagged officers. The situation there has deteriorated to the point that the LASD is looking at a few years of federal supervision.

Sep 10 13:24

5 Million Gmail User Accounts, Passwords Hacked

Time to change your password again. A database containing nearly 5 million Gmail user accounts and passwords was leaked on Bitcoin Security, a popular Russian website devoted to the cryptocurrency.

Sep 10 12:39

Senators and Other Experts to Appeals Court: NSA's Phone Records Program Is a Massive Invasion of Privacy

Smith v. Obama, a challenge to the NSA’s warrantless collection of phone records, currently before the Ninth Circuit Court of Appeals, has received some high-profile support. In six amicus briefs filed yesterday, a range of groups add depth to our argument that the NSA’s activities are an extraordinary invasion of the privacy of innocent Americans.

Sep 10 12:17

5 million ‘compromised’ Google accounts leaked

A database of what appears to be some 5 million login and password pairs for Google accounts has been leaked to a Russian cyber security internet forum. It follows similar leaks of account data for popular Russian web services.

Webmaster's Commentary: 

And again, the NSA cannot find these crooks. Why? Are they the crooks themselves?

Sep 09 15:18

The Era Of Widespread Biometric Indentification And Microchip Implants Is Here

Are you ready to have your veins scanned every time you use your bank account? Are you ready to use a "digital tattoo" or a microchip implant to unlock your telephone? Once upon a time we read about such technologies in science fiction novels, but now they are here. The era of widespread biometric identification and microchip implants is upon us, and it is going to change the way that we live. Proponents of these new technologies say that they will make our private information and our bank accounts much more secure. But there are others that warn that these kinds of "Big Brother technologies" will set the stage for even more government intrusion into our lives. In the wrong hands, such technologies could prove to be an absolute nightmare.

Sep 09 10:04

AT&T and Verizon say 10Mbps is too fast for “broadband,” 4Mbps is enough -- AT&T and Verizon have asked the Federal Communications Commission not to change its definition of broadband from 4Mbps to 10Mbps

AT&T and Verizon have asked the Federal Communications Commission not to change its definition of broadband from 4Mbps to 10Mbps, saying many Internet users get by just fine at the lower speeds.
"Given the pace at which the industry is investing in advanced capabilities, there is no present need to redefine 'advanced' capabilities," AT&T wrote in a filing made public Friday after the FCC’s comment deadline (see FCC proceeding 14-126). "Consumer behavior strongly reinforces the conclusion that a 10Mbps service exceeds what many Americans need today to enable basic, high-quality transmissions," AT&T wrote later in its filing. Verizon made similar arguments.

Sep 09 10:04

FBI’s Story of Finding Silk Road’s Server Sounds a Lot Like Hacking

To hear the FBI tell it, tracking down the secret server behind the billion-dollar drug market known as the Silk Road was as easy as knocking on a door. The bureau’s latest court filing in the case describes how the hidden site accidentally revealed its location to anyone who visited its login page, thanks to a software misconfiguration.

Sep 09 09:41

Off-the-grid texting device GoTenna attracts antisurveillance crowd

Daniel Levy, a Web developer living in the Puna District of Hawaii, lived through a 12-day blackout after a rather vicious hurricane earlier this summer. Many residents in his community were stuck powerless until the local utility company restored the grid, while some subsisted on solar energy. It was after that, Levy said, that he sought a solution and came upon GoTenna.

The gadget -- a small Bluetooth-enabled rod packed to the brim with modern radio innards -- lets you create your own private, secure communication network for sending messages without cell service using your smartphone. Though marketed toward outdoors and emergency situations like hiking and disaster relief, GoTenna is getting a boost from the cryptography community. Levy, whose neighborhood gets little to zero reliable cell service, happens to represent both. He's among the more than 25 percent of GoTenna preorder customers who paid for the product with the cryptocurrency Bitcoin.

Webmaster's Commentary: 

IF this works as advertized, it sounds like a very cool gizmo!!

Sep 09 08:38

INFOGRAPHIC - Internet Security Threats

Through their Global Intelligence Network, Symantec have put together their annual report for 2014. It looks at the types of internet security threats and number of attacks as well as vulnerabilities and effects of the attacks. Symantec’s Network is one of the most advanced of its kind; it’s made up of more than 41.5 million attack sensors!

Aside from the many attacks on personal devices, which can cause a great amount of stress and financial problems for the victim (see Ransomware!), attacks on businesses can be catastrophic. Risks to corporations include reputational damage and loss of trust, lawsuits and bankruptcy. 2013 has officially become known as the year of the Mega Breach. The average number of identities exposed in 2013 was 2,181,891 compared with 604,826 in 2012. This was probably down to the campaigns lasting longer, resulting in 8 incidents exposing over 10million IDs compared with only 1 in 2012.

Webmaster's Commentary: 

The real question is, "Where is the NSA?"

For months we have been told that thew NSA, at huge taxpayer expense, has been violating the Constitution to monitor all of our computer activity.

So why are they not able to find these cyber-criminals?

There is no question that the NSA could use some good publicity; to demonstrate that they provide a useful service for all their cost and Constitutional crimes.

So why don't they?

Is it all a gigantic bluff to try to scare us into silence? If so, it does not appear to be working.

Or is the NSA itself, already acting in a lawless fashion, committing these crimes or in league with those who do?

THIS IS A CALL TO RIVERO'S RANGERS!

Wherever you see any story about any data breach, please post the above!

Sep 09 08:35

Biggest credit card breach in history

First it was Target.

Now it's Home Depot in what may well prove to be the biggest credit card data breach in history.

What's going on?

It's pretty simple. The companies that run these systems are not investing enough in making them secure and are hoping that the bill for not doing so will never come due.

Webmaster's Commentary: 

The real question is, "Where is the NSA?"

For months we have been told that thew NSA, at huge taxpayer expense, has been violating the Constitution to monitor all of our computer activity.

So why are they not able to find these cyber-criminals?

There is no question that the NSA could use some good publicity; to demonstrate that they provide a useful service for all their cost and Constitutional crimes.

So why don't they?

Is it all a gigantic bluff to try to scare us into silence? If so, it does not appear to be working.

Or is the NSA itself, already acting in a lawless fashion, committing these crimes or in league with those who do?

THIS IS A CALL TO RIVERO'S RANGERS!

Wherever you see the story about the Home Depot (or any other) data breach, please post the above!

Sep 08 18:45

Thousands get 'Peter Pan virus' phishing email

The email typically states that a MasterCard whose last four digits are 7006 was used to make the £145 purchase. It invites people to open some e-tickets which it says are attached.

...

According to Derek Knight at the My Online Security blog, those who open the attachment may find they have downloaded viruses and malware such as Cryptolocker. Cryptolocker typically locks the recipient out of their computer until they pay a ransom to the scammers.

"Almost all of these have a password-stealing component. Many of them are also designed to specifically steal your Facebook and other social network login details."

Sep 08 18:05

Amazon Cuts Struggling Phone’s Price to 99 Cents

Sixty thousand people vied to attend the unveiling of Amazon’s first smartphone in late June.

If only the retailer could persuade those fans — or anyone, really — to actually buy the device. The Amazon Fire is threatening to become the Amazon Fizzle.

On Monday, Amazon took a drastic step to avert disaster, announcing that it would charge 99 cents for the phone, basically giving it away if users signed a two-year contract with AT&T, the exclusive carrier.

Amazon has money to burn, and a relentless determination. But some analysts still wondered if a price drop of almost $200 was enough.

Sep 08 14:14

Facebook’s value to top $200B

FACEBOOK MAY EVENTUALLY BE THE BIGGEST CORPORATION IN THE WORLD

Sep 07 18:02

Record Labels Take Down Kim Dotcom’s Official Album… From Mega

In what could be one of the most ironic anti-piracy mistakes this year, music industry group IFPI has asked Mega to take down Kim Dotcom's very own music album Good Times. Mega was asked to remove its founder's music twice, casting doubt over the accuracy of the record labels' takedown efforts.

Sep 07 17:44

Apollo 11: The computers that put man on the moon

The so-called Apollo Guidance Computer (AGC) used a real time operating system, which enabled astronauts to enter simple commands by typing in pairs of nouns and verbs, to control the spacecraft. It was more basic than the electronics in modern toasters that have computer controlled stop/start/defrost buttons. It had approximately 64Kbyte of memory and operated at 0.043MHz.

WEBMASTER ADDITION: For a simulation of the Apollo computer control panel, CLICK HERE!

Sep 07 10:04

Religious Sites Carry More Malware Than Porn Sites, Security Firm Reports

Religious and ideological websites can carry three times more malware threats than pornography sites, according to research from security firm Symantec. The firm’s annualInternet Security Threat Report also found that threats to mobile devices continue to grow, almost exclusively for Google’s Android mobile OS.

Sep 07 09:05

This Site Is Messed Up!

I can't edit posts here anymore. I can't make comments on investment watch anymore. WTF is going on Mike?
The mutant spider dog story is a joke goin all over the net. If there was a humor and satire tag I wouldn't have commented in the first place!
Man hire somebody to read the posts before they go up cause it's making the site look foolish!

WRH REPLY: Your membership is working. Obviously you were able to post this comment. The mutant story was clearly labeled as humor and satire. Any problems you are having are at your end.

Sep 07 08:41

How To Kick Surveillance Devices From Your Network

A new low-cost gadget claims to protect your WiFi network from snooping devices . . . even drones. According to product notes from Cyborg Unplug:

'Plug to Unplug' ... detects and kicks devices known to pose a risk to personal privacy from your local wireless network, breaking uploads and streams. Detected devices currently include: Google Glass, Dropcam, small drones/copters, wireless 'spy' microphones...

Sep 07 08:36

Celebrity photo leak: Fake links to nude photos cause nationwide internet crash in New Zealand

New Zealanders keen to view hacked photos of naked celebrities have been blamed for a nationwide internet meltdown involving the country's main provider.

It is believed a handful of computer users clicked links on Friday evening believing they would be taken to the illicit images, but instead caused them to inadvertently install malware, triggering a crippling internet attack.

Webmaster's Commentary: 

A test to take down the internet during the next false-flag attack?

There is no way the perpetrators of a new 9-11 can allow the independent media to operate during a false-flag, lest we find and report the signs of fraud. Remember that in the weeks ahead of 9-11, the FBI was shutting down Muslim websites here in the US, to prevent the victims of the coming frame-up from defending themselves while the official story was implanted into the population.

And the fact that this shut down was confined by the planted malware to only New Zealand suggests it was an operational test.

So don't start clicking links to see naked celebrities this next week.

" To act with my clothes on is a performance. To act with my clothes off is a documentary." -- Julia Roberts

Sep 07 08:25

Patriot Act’s absurd new spawn: Just when you thought it couldn’t get any worse

Congress may be preparing to reinforce two horrible FISA Court decisions and an abusive government search with no debate in the coming weeks: a decision to give national security orders unlimited breadth, one making it legal for the government to investigate Americans for activities protected under the First Amendment, and the FBI’s “back door” searches of Americans’ communication content collected under the FISA Amendment Act Section 702 authority.

Webmaster's Commentary: 

Congress is most likely giving this approval because they know what these governmental agencies have on them!

Remember Chief Justice Robert's "flip-flop" on Obamacare?!? I am still rather curious as to precisely what "inspired" his change of heart!! :-)

And right after, he slipped out of the country for awhile so he couldn't be questioned on his reversal.

Sep 07 07:07

Makers: Escaping the Pull of Big-Business

3D printers, DIY biology, and the maker movement is now too big to be laughed off or ignored. It is now something big-business intends to first try to co-opt, then fight and destroy. Through SOPA/ACTA and various other intellectual property schemes, we can see in many ways, the fight has already begun. Defining and defending worthy principles is now more necessary than ever - and recognizing the folly of following individuals - be they people, companies, or brands - is utter folly. A sense of pragmatic awareness of principles over people and parties may help makers succeed where politics has habitually failed.

Sep 06 18:57

SEPTEMBER 10 INTERNET SLOWDOWN -- BE PART OF THE SOLUTION

the above link goes to the page for webadmins, bloggers, etc, to get the slowdown code.

the regular Netizen's page is here.

do it now, while you sre thinking about it!

or think -- where would we be without the web...

WEBMASTER ADDITION: Oh sure; let's slow the net down the day before FOX claimed there will be an ISIS attack on America!

Sep 06 15:41

How your innocent smartphone passes on almost your entire life to the secret service

So the next time you hear a minister, security expert or information officer say ‘Oh, but that’s only metadata,’ think of Ton Siedsma – the guy you now know so much about because he shared just a week of metadata with us.

Sep 06 15:35

Malware Can Bypasses Chrome Extension Security Feature Easily

Researchers have uncovered a new social engineering trick that leads users to a malicious extension from Google Chrome impersonating to deliver Adobe’s Flash Player in order to lure victims in a click fraud campaign.

Security experts at TrendMicro believe that the malware is triggered by opening Facebook or Twitter via shortened links provided in any social networking websites. Once clicked, the links may lead victims to a site that automatically downloads the malicious browser extension.

Sep 06 09:12

My Stumbling Days Are About Over!

Stumble has turned off my account it would appear. The last 6 weeks have been really difficult getting stuff up.
I put up the Make sure your Congressman see's this before November of the father holding his child with a brainless open skull plus the article about the IDF bombing an orphanage and the dairy that supports it. A couple of minutes after that I can't get into my account or post anymore!
Stumble has been turning off sites and individual webpages left and right and it has really gotten bad since Gaza and Ukraine.
If I can get back up I will but if not I hope I directed some traffic to WRH and all the bloggers who post here and we woke some more people up!
DRIP! DRIP! DRIP!as we slowly wash this mountain of hate,injustice and inequity into the oceans!

Sep 06 05:25

Google silent on support for group opposing net neutrality and muni broadband

Common Cause and more than 50 other advocacy groups this week called on Google to end its affiliation with the American Legislative Exchange Council (ALEC), a group that has pushed state laws limiting the rights of cities and towns to create community-owned broadband networks. ALEC also opposes network neutrality rules that Google used to be a staunch supporter of and last month urged the FCC to quickly approve Comcast’s purchase of Time Warner Cable without imposing any regulatory conditions on the merger

Sep 06 05:23

When NSA and FBI call for surveillance takeout, these companies deliver

Not every Internet provider can handle the demands of a Foreign Intelligence Surveillance Act warrant or law enforcement subpoena for data. For those companies, Zack Whittaker reports on ZDNet, the answer is to turn to a shadowy class of companies known as “trusted third parties” to do the black bag work of complying with the demands of the feds.

Under the Communications Assistance for Law Enforcement Act (CALEA), phone companies and Internet providers can charge back the government for their efforts in responding to warrants. AT&T charges the CIA more than $10 million per year for access to its phone call metadata. But smaller ISPs who aren’t frequently hit with warrants can’t afford to keep the infrastructure or manpower on-hand to respond to requests—so they sign up with a “trusted third party” capable of doing the work as an insurance policy against such requests.

Sep 05 17:01

YouTube, then and now

Sep 05 14:22

Obamacare site hacked but nothing taken, HHS says

NEW YORK (CNN) — Hackers silently infected a Healthcare.gov computer server this summer. But the malware didn't manage to steal anyone's data, federal officials say.

A computer server that routinely tests portions of the website wasn't properly set up. It was never supposed to be connected to the Internet — but someone had accidentally connected it anyway.

That left it open to attack, and on July 8, malware slipped past the Obamacare security system, officials said.

Sep 05 07:39

Meet the Russian-made tool that grabs nude selfies from iCloud accounts

There’s a seedy trade in compromising photos stored in Apple iCloud accounts, and it is in part aided by a software program that cleanly collects the data.

Some of the nude celebrity photos are believed to have first been circulated on Anon-IB, a definitely not safe-for-work forum. As reported by Wired, the forum is full of offers for iCloud “ripping,” or downloading the entire contents of an account.

The software tool they’re using is Moscow-based Elcomsoft’s Phone Password Breaker, or EPPB, one of many forensic tools the company develops for law enforcement and other clients.

SHARE THIS ARTICLE WITH YOUR SOCIAL MEDIA