COMPUTERS/INTERNET/SECURITY | WHAT REALLY HAPPENED


COMPUTERS/INTERNET/SECURITY

Mar 27 10:07

What Prevented Smart Meter Opt-outs in Pennsylvania?

Catherine J. Frompovich
Activist Post

Back in the summer of 2014, something very calculated apparently happened in the Pennsylvania state legislature that ought to be investigated by the Commonwealth’s Attorney General and the Pennsylvania State Ethics Commission. What happened was a crime against the democratic principles of governance, i.e., deliberately dis-allowing constituents, voters—and citizens in general—to exercise their right of redress and input regarding issues that affect them, their lives, and the safety of their possessions. The particular issue at hand was Opt-out provisions from Smart Meters, which was not originally written into PA Law 129 in 2008, but in committee ‘strong-armed’ into “sine die” by State Representative and Committee Chair, Robert W. Godshall...

Mar 27 09:55

Facebook and the military industrial surveillance complex

Earlier this week the European Commission’s attorney Bernhard Schima told the Court of Justice of the European Union (CJEU) the US-EU Safe Harbor framework does not work.

The framework process supposedly protects personal data. In 2013, however, it was discovered the NSA and its British counterpart — the GCHQ, short for Government Communications Headquarters — had siphoned off data transfers by tapping directly into under sea cable networks.

Mar 27 09:14

British users can sue Google in UK over “secret tracking”

The UK Court of Appeal's ruling clears the way for the group known as "Safari Users Against Google's Secret Tracking" to proceed with its claim for compensation. The group alleges, "Google deliberately undermined protections on the Safari browser so that they could track users' internet usage and to provide personally tailored advertising based on the sites previously visited."

The claimants in the original High Court case said they suffered "by reason of the fact that the information collected from their devices was used to generate advertisements which were displayed on their screens. These were targeted to their apparent interests (as deduced from the information collected from the devices they used). The advertisements that they saw disclosed information about themselves. This was, or might have been, disclosed also to other persons who either had viewed, or might have viewed, these same advertisements on the screen of each Claimant's device."

Mar 27 09:08

27 March: Problems at Facebook

Facebook is having issues since 10:25 AM EDT. Are you also affected? Leave a message in the comments.

Webmaster's Commentary: 

Latest NSA malware had a bug? :)

Mar 27 08:24

U.S. government allows itself to copy all your old emails

As the government continues to widen its electronic surveillance in the ongoing fight against "terrorism," Americans are witnessing the slow, steady erosion of their constitutional right to privacy embodied within the Constitution's Fourth Amendment.

As reported by McClatchy Papers, the federal government now has the authority -- somehow -- to read emails that are more than six months old, and without a court-issued warrant. So, if ever there was an incentive to clear out your inbox and your trash, this is certainly it.

Mar 27 08:19

NSA and Facebook Work Together

Earlier this week the European Commission’s attorney Bernhard Schima told the Court of Justice of the European Union (CJEU) the US-EU Safe Harbor framework does not work.

The framework process supposedly protects personal data. In 2013, however, it was discovered the NSA and its British counterpart — the GCHQ, short for Government Communications Headquarters — had siphoned off data transfers by tapping directly into under sea cable networks.

In fact, according to a lawyer representing the Austrian government before the CJEU, Safe Harbor is better suited for pirates than the protection of data of EU citizens. In other words, the system was designed to be hijacked by the NSA and GCHQ.

Mar 27 07:56

President TripAdvisor: “We Compete With Google”

The American company TripAdvisor Inc. 14 years of the little-known site with tips for travelers and feedback into a business that combines multiple services with annual revenues of more than $ 944 million. The site came up with Harvard graduate, the programmer Stephen Kaufer – today he is the president and CEO of TripAdvisor Inc.

http://whatisusa.info/president-tripadvisor-we-compete-with-google/

Mar 27 04:10

It Transmits Live Video From Your Ios Periscope

Twittter acquired Periscope 100 million.

The service live broadcast of Periscope, acquired by Twitter in January for $ 100 million, already has an official app for iOS devices.

Integrated with the micro blogging platform, the service allows streaming from a smartphone looking stomp on a segment initiated by Meerkat, an opponent who managed to grab the attention of users by enabling the creation of live video from an iPhone.

http://whatisusa.info/it-transmits-live-video-from-your-ios-periscope/

Mar 27 04:01

Internships With The National Park Service In Historic Places

The Foundation shall elect twenty undergraduate and graduate students to work with the team of NPS.

Hispanic Access Foundation, in cooperation with the National Park Service (NPS) launched the Latin Legacy Program: Internship Program 2015, known in English as the Latino Heritage Internship Program, or LHIP.

This professional internship program has been designed by the NPS in order to prepare the next generation of protecting our public lands and historic sites, the availability of these, and the participation of the Latino community in conservation.

http://whatisusa.info/internships-with-the-national-park-service-in-hi...

Mar 27 03:26

President TripAdvisor: “We Compete With Google”

The American company TripAdvisor Inc. 14 years of the little-known site with tips for travelers and feedback into a business that combines multiple services with annual revenues of more than $ 944 million. The site came up with Harvard graduate, the programmer Stephen Kaufer – today he is the president and CEO of TripAdvisor Inc. In his interview with media, he told company’s plans for the Russian market, and Uber partnership with Facebook and the scheme of earnings TripAdvisor.

http://whatisusa.info/president-tripadvisor-we-compete-with-google/

Mar 26 16:04

Hackers Use an Android App for Sex Extortion

In a report provided to The New York Times on Monday, Trend Micro’s researchers detailed a new Android app that criminals are using to pressure their victims into paying blackmail fees.

Researchers said the extortionists first lure their victims through a number of online chatting tools like Skype, or KakaoTalk, an Asian chat service. Once the trap is set, they feign audio or messaging problems to persuade their target to download one of four malicious Android apps that can siphon off a phone number, stored passwords and address books.

In some cases, the Android app turned the victim’s device into a recording device. It also intercepted incoming and outgoing telephone calls and text messages.

Mar 26 15:51

EU: Don’t use Facebook if you’re worried about NSA snooping

The best way for preventing such spying operations, for anyone worried about NSA snooping, would be to stop using certain U.S.-based online services, including Facebook, at least until they open data centers in Europe.

“You might consider closing your Facebook account, if you have one,” European Commission attorney Bernhard Schima told attorney-general Yves Bot at the CJEU on Tuesday, suggesting that personal data transferred from Europe to the U.S. isn’t necessarily protected under the U.S.-EU pact, even though the Framework should ensure data privacy and security.

Mar 26 15:22

Special ops troops using flawed intel software

Special operations troops heading to war zones are asking for commercial intelligence analysis software they say will help their missions. But their requests are languishing, and they are being ordered to use a flawed, in-house system preferred by the Pentagon, according to government records and interviews.

Mar 26 11:38

2007 NBC News Report Predicts We’ll All Be Microchipped, Tracked, and Traced Everywhere We Go by 2017

So in just two years’ time, we’re all set to be microchipped, iris scanned, facially recognized, and fingerprinted everywhere we go for just about any reason including buying stuff just like in the movie Minority Report.

Isn’t it clear yet we are all being herded like cattle in one big technocratic open-air prison?

Mar 26 11:35

Wall Street Ends Lower; Investors On The Lookout

Stocks on Wall Street ended lower on Tuesday for a second day, after investors weigh up the news of companies and the latest report on consumer prices.

Indications that the dollar could resume its recent rally also unnerved investors.

The construction showed a different trend, with a close higher after sales of new US homes rose in February to its highest pace in seven years.

http://whatisusa.info/wall-street-ends-lower-investors-on-the-lookout/

Mar 26 11:27

US Stock Market Remains Negative Trend

Shares on the stock exchange in the United States remained lower on Thursday half-day operations, the fourth day the markets recorded negative behavior.

Casualties were more pronounced in European and Asian markets.

The Dow Jones industrial average fell 21 points (0.1%) to stand at 17,696 units at 11:45 am New York.

http://whatisusa.info/us-stock-market-remains-negative-trend/

Mar 26 11:08

It Furthers to have Eyes in the Front of your Head.

Every now and then I put my name in quotes, like this; “les visible” and pop it into Zio-Google. I did this today and I noticed something I had never seen before. Ordinarily the only negative commentary I run into is that put together by Dublin Mick, who... ostensibly... ostensibly went out of his way to assault me because he felt that I did not attack The Vatican aggressively enough. He didn't feel it was important enough to approach me first before he launched into his hatchet job, which included seeking out everyone he knew who disliked me for one reason or another and letting them have at me while he performed as modifier, which made him not only look good but also accomplished his real intention. It was a good example of Machiavelli being channeled to a particular end but... I digress.

Mar 26 07:43

Apps Snoop on Your Location Way More Than You Think

The title of the study, which will be presented at a conference in Seoul next month, tells you all you need to know: Your Location Has Been Shared 5,398 Times! A Field Study on Mobile App Privacy Nudging. (Link to PDF)

That’s right. More than 5,000 pings in 14 days. Once participants in the study knew how frequently data was being collected, many adjusted their settings or deleted some apps entirely. But Professor Norman Sadeh, a member of the research team that conducted the research, says the volume of location-harvesting isn’t the biggest issue.

“There are some applications where you could justify this level of frequency—think for instance of a navigation app,” Sadeh told WIRED. “So the frequency by itself is not the problem. Instead it is whether the frequency is justified, and obviously whether users are informed of these practices and have some level of control.”

Mar 26 07:36

Ad-Fraud Malware Hijacks Router DNS – Injects Ads Via Google Analytics

Malware that hijacks router DNS settings is not new. However, exploits developed in recent years that enable hijacking through the use of Javascript alone are making this a widespread problem. Ara Labs has uncovered a new ad-fraud scheme where fraudsters are using hijacked router DNS settings to intercept Google Analytics tags and replace them with pornography and other ads.

Mar 26 07:34

Senate passes controversial metadata laws

Australians will have two years of their metadata stored by phone and internet providers after the Abbott government's controversial data retention laws passed parliament.

But it's still unclear how much will be added to internet users' monthly bills.

Mar 26 05:08

Instagram Enters The Segment Apps For Collages

Initially only available for iOS devices.

Instagram enters the segment of mobile applications focused on creating collages with the launch of Layout, initially available for iOS devices, although it seems that is not yet available globally.

With respect to the version for Android devices, it is expected to be launched in the coming months, according to the company's announcement.

http://whatisusa.info/instagram-enters-the-segment-apps-for-collages/

Mar 26 05:01

Taylor Swift, Harvard And Microsoft Buy .Porn Domains

taylor swift

The singer Taylor Swift, Microsoft Corp. and Harvard University are among those who are buying domains with suffixes and .adult .porn, as a preventive measure before they are available in a few months.

The Internet Corporation for Assigned Names and Numbers (ICANN, for its acronym in English) is offering internet addresses with suffixes that go beyond the usual .com and .org, for use by individuals and businesses. While some are in Chinese and other languages ??besides English, could be included .music, .app or, of course, .porn.

http://whatisusa.info/taylor-swift-harvard-and-microsoft-buy-porn-doma...

Mar 26 04:55

Facebook Cleared Its Concept Of Nudity

Facebook wants to help in the fight against Ebola.

Facebook has updated its "community standards" for its 1,400 million users and was very specific as to what is allowed and not on the social network.

For example, Facebook cleared its concept of nudity (images of genitalia, rear fully exposed female breasts and if the nipple is, except the images of women who are breastfeeding or breast with scars after a mastectomy).

http://whatisusa.info/facebook-cleared-its-concept-of-nudity/

Mar 26 04:39

Twitter Faces Gender Discrimination Lawsuit

Twitter continues with growth plans.

A former software engineer at Twitter filed a lawsuit alleging that the firm conducts promotion processes that favor men illegally.

A class action lawsuit was filed in state court of California at San Francisco by the former employee Tina Huang, who claims that the social network only warning certain people about jobs and promotion opportunities, often excluding women.

http://whatisusa.info/twitter-faces-gender-discrimination-lawsuit/

Mar 26 04:26

Facebook Released According To Reminisce

Facebook continues to expand its tools.

Facebook introduced "Today", a new way of seeing everything that has been shared and publications that have been labeled. Only the user can see the page "This day".

Those responsible explain that "our users like to see old photographs and memories they have shared on Facebook, and many of them have told us they like the products and features that put it easier."

http://whatisusa.info/facebook-released-according-to-reminisce/

Mar 25 15:15

Ted Cruz’s website poses unnecessary security risks for donors

As it turns out, the website does use SSL when users actually submit their credit card information. But there are two big problems with the way this is implemented. One is that the lack of SSL protection for the donation page as a whole means that the user is vulnerable to a "man in the middle" attack, where someone impersonates the Cruz website and directs the user to a malicious site instead.

Second, there's no way for ordinary users to know if their credit card details are encrypted or not. For more than a decade, users have been trained to look for that lock icon before submitting personal information. The way Cruz built his website encourages users to do something dangerous: submit personal credit card information without knowing if it's secure or not.

Mar 25 15:07

F-35 pilots are seeing double, but it's the plane that's drunk

The F-35 Joint Strike Fighter may be stealthy, powerful and expensive, but the plane's greatest threat isn't the enemy. Instead, engineers have discovered a software glitch that gives these new super fighters the technological equivalent of double vision. F-35s are equipped with Advanced Sensor Fusion, a system that's designed to collate sensor data from all of the planes and combine them into one big picture. If you have 10 jets zooming around, all of the allied pilots and commanders will, theoretically, be able to see everything that's going on.

Unfortunately, when two planes look at the same object, they do so from different angles, and the sensors can't combine that data into a single cohesive image. That means that pilots are stuck with tactical displays that offer a vague sense of where the enemy is, but not if there's one combatant or several.

Mar 25 15:05

Android flaw puts personal data at risk for millions

Nearly half of Android devices are vulnerable to an attack that could replace a legitimate app with malicious software that can collect sensitive data from a phone.

Google, Samsung, and Amazon have released patches for their devices, but 49.5 percent of Android users are still vulnerable, according to Palo Alto Networks, which discovered the problem.

Mar 25 15:03

Adobe Flash fix FAIL exposes world's most popular sites

Hackers Luca Carettoni and Mauro Gentile found a badly-applied four-year-old Adobe patch allows attackers to steal information and commandeer accounts for three of the world's top ten websites and 'many' others.

The LinkedIn and Minded Security researchers say the indirect Same-Origin-Policy Request Forgery and Cross-Site Request Forgery bypasses relates to a failed patch (CVE-2011-2461) issued in 2011. It is intended to fix Adobe Shockwave files that are vulnerable when built through the company's Flex software development kit compiler.

Mar 25 14:58

RadioShack's Bankruptcy Could Give Your Customer Data to the Highest Bidder

The remnants of RadioShack’s retail empire went on the auction block on Monday, giving bidders the first chance to snap up the company’s trademarks, patents, leases—and the names, e-mail addresses, and phone numbers of millions of RadioShack customers.

Mar 25 14:56

CISA Isn't Cybersecurity, It's Cyber-Surveillance

Earlier this month, the Senate Intelligence Committee approved the Cybersecurity Information Sharing Act of 2014 (CISA) by a 14–1 vote. Senator Ron Wyden (D-Ore.) stood alone against the bill, saying in a statement March 13 that it "does not include adequate privacy protections" and is simply another "surveillance bill by another name."

Mar 25 13:19

Apple Wants You to Get Accustomed to Real-Time Tracking

Tech giant Apple is not coy about it. They want you to get used to real-time tracking. That’s why they are changing Find My Friends to Track My Friends.

Webmaster's Commentary: 

You might want to take a look at those privacy cases in the ad on this page!

Mar 25 13:18

World’s top tech companies ask Congress to relax NSA spying laws

Global technology giants like Google and Microsoft have teamed up with civil liberties groups to get Congress to change the country’s spying laws. Tech companies say they’re potentially losing billions in sales following Edward Snowden’s NSA revelations.

Mar 25 11:25

Utah Signs Law Allowing Prisoners To Shoot When No Lethal Injections

The project was presented by Paul Ray, who says the squad is the most humane form of execution.

Utah became the first state to allow a firing squad if the lethal drugs are not available.

The Utah Gov. Gary Herbert signed a bill that makes use of firing squads for executions, if drugs for lethal injections are not available legal.

http://whatisusa.info/utah-signs-law-allowing-prisoners-to-shoot-when-...

Mar 25 11:02

Obama Will Keep 9,800 Troops In Afghanistan Through 2015

The US government announced Tuesday that slow withdrawal of of its troops from Afghanistan and remains in that country to 9,800 soldiers by the end of 2015, rather than reduce that number by half, as originally planned.

The White House said changing the timing through a statement, shortly before the joint press conference between President Barack Obama and his counterpart from Afghanistan, Ashraf Gani, who is visiting Washington. During the meeting, President Obama confirmed the news and explained that the number of troops remain there in 2016 will be decided later this year.

http://whatisusa.info/obama-will-keep-9800-troops-in-afghanistan-throu...

Mar 25 10:38

Authorities Linked To Robert Durst With Another Disappearance

Justice denied bail because of the risk of leakage.

Authorities investigating an unsolved case of several decades in the state of Vermont confirmed that there is a connection between millionaire Robert Durst and the disappearance in 1971 of Lynne Schulze, a student at Middlebury College.

"We are aware of the connection between the disappearance of Lynne Schulze and Robert Durst," he told CNN Captain Thomas Hanley, the Middlebury Police Department. "We have been aware of this connection for several years and have been working with various external agencies as we follow this track".

http://whatisusa.info/authorities-linked-to-robert-durst-with-another-...

Mar 25 10:38

Facebook Reveals its Master Plan – Control All News Flow

In recent months, Facebook has been quietly holding talks with at least half a dozen media companies about hosting their content inside Facebook rather than making users tap a link to go to an external site.

The new proposal by Facebook carries another risk for publishers: the loss of valuable consumer data. When readers click on an article, an array of tracking tools allow the host site to collect valuable information on who they are, how often they visit and what else they have done on the web.

And if Facebook pushes beyond the experimental stage and makes content hosted on the site commonplace, those who do not participate in the program could lose substantial traffic — a factor that has played into the thinking of some publishers. Their articles might load more slowly than their competitors’, and over time readers might avoid those sites.

Mar 25 09:13

This Is What It’s Like to Get Pulled over for Expired Tags in Police State USA 2015

My friend and coworker at The Daily Sheeple Lily Dane (who has no criminal record) was terrified tonight after police pulled her over for the high crime of expired tags and it turned into a bullying session that lasted over an hour and that apparently required four cop cars and SIX POLICE.

This video is the story of what happened. I’m sharing it because we live in such an insane police state that something has to change.

As our previous special report exposes, police are using pre-crime algorithms to assign color-coded threat scores to each and every one of us before an officer ever lays eyes on us based upon, among others, our social media and online posts. Is Lily special because of her political views, or is this just the way they treat everyone nowadays simply for driving with expired tags?

Mar 25 08:17

White House Confirms: If Section 215 Expires, So Does Bulk Phone Records Collection

Nadia Kayyali
Activist Post

There’s some good news coming from the White House today that deserves repeating. Reuters is reporting that Ned Price, a spokesman from the President’s National Security Council, has unequivocally stated:

"If Section 215 sunsets, we will not continue the bulk telephony metadata program."

Section 215 of the Patriot Act is the authority that the NSA, with the FBI’s help, has interpreted to allow the U.S. government to vacuum up the call records of millions of innocent people. It expires on June 1...

Mar 24 22:11

Ipredia OS

Any Good?

IprediaOS

IprediaOS is a fast, powerful and stable operating system based on Linux that provides an anonymous environment. All network traffic is automatically and transparently encrypted and anonymized.

Many applications are available in IprediaOS, including mail, peer-peer, bittorrent, IRC chat and others.

Mar 24 16:06

Outsourcing to Robots Continues: FLOBOT ''Revolutionizes Cleaning for Big Businesses''

by Jason Erickson

Previous speculations that robots would increasingly displace the human workforce are coming rapidly into better focus. Predictions such as those made by Professor of Computer Science, Moshe Vardi, when he stated that all human work will be fully outsourced to robots and robotic machine intelligence by 2045 now look quite optimistic for humans based on current trends...

Mar 24 12:28

BOEING PATENTS 'STAR WARS'-STYLE FORCE FIELDS

Aircraft and military manufacturer Boeing has been granted a patent on a system that is designed to prevent explosion shockwaves from harming a target.? ?A new patent granted to aircraft, defense and security company Boeing is taking its cues from science fiction. Just like the glowing energy shields seen protecting troops, machines and even spacecraft in Star Wars and Star Trek, the design -- named "Method and system for shockwave attenuation via electromagnetic arc" -- uses energy to deflect potential damage.
Share | Comment

Mar 24 10:21

Amazon Quietly Bricked Jailbroken Kindle Devices Last Year

It appears that Amazon is very serious about walling off its garden. Late last year, it pushed out a firmware update for its Amazon Fire TV devices that not only made rooted devices unusable, but prevented Fire TV owners from rolling back firmware to previous, more root-friendly versions. Apparently, Kindle users were also included in this lockdown.

A recent post at Good Reader notes that the latest firmware for Kindles is pretty much identical to its Fire TV firmware, right down to the destruction of functionality.

The new firmware was pushed out to all modern Kindle devices in late November of last year. Anything after version 5.60 will not allow you to hack the firmware and do interesting things like change the screensaver system or install custom apps.

Mar 24 09:32

FLORIDA LAWS TARGET ONLINE VIDEO ANONYMITY: STATE-BASED SITE BLOCKING?

As EFF has noted, a troubling bill has been making its way through the Florida state legislature. The bill, with versions in both the state House and Senate, would require anyone "dealing in...the electronic dissemination of commercial recordings or audiovisual works" to post their "true and correct name, physical address, and email or telephone number" on their site.

Mar 24 09:26

Music Group Wants Isps to Spy on Customers to Stop Piracy

In a response to the draft code tabled to deal with the Australian online-piracy problem, some of the world's largest music publishers have presented a set of draconian measures. ISPs should not only use technology to spy on their own customers, but also to proactively block access to infringing content and websites.

Mar 24 07:42

Lawsuit wave challenges FCC on net neutrality

US companies are filing lawsuits against the Federal Communications Commission (FCC)'s recent net neutrality ruling.
screen-shot-2015-03-24-at-10-44-26.png

The order, which has not taken effect yet, is already being challenged by firms across the United States. As reported by Reuters, the first wave of lawsuits was filed on Monday by companies under the USTelecom umbrella, which argued that the new net neutrality rules are "arbitrary, capricious, and an abuse of discretion."

The filing argues that the US regulator's rules break federal and local laws, and violate the constitution and the 1934 Communications Act.

Mar 24 07:29

Threats To The US Military Is Not Related To The Burglary Database

The Ministry of Defence is serious about any threats against members.

According to US officials, there is no evidence that the publication of the “Islamic state” names, addresses and photos of 100 US military in the murder of Islamists who are calling on their supporters in the United States, was the result of hacking databases.

http://whatisusa.info/threats-to-the-us-military-is-not-related-to-the...

Mar 24 07:17

Smart Meter Information Consumers Should Know

Catherine J. Frompovich
Activist Post

Over the course of a year that my electric power company in suburban Philadelphia, Pennsylvania, has been installing AMI Smart Meters on homes in my area, I have been able to keep one off my house by placing a “No Permission Granted to Install Smart Meter” sign on the meter along with a padlock on the meter latch. Early in February of 2015, I received what I perceived as a threatening letter to my health, safety, and well-being, that if I don’t give PECO permission to install a Smart Meter, my electric power will be turned off, and not because I’ve not paid my bill! No utility bill wherever my late husband or I have lived ever was missed or even made as a late payment! So, I’ve decided to tell my story of what’s been going on in the USA about Smart Meters...

Mar 24 06:14

AMTRAK / DHS ARE SPYING ON PASSENGERS AND LETTING POLICE ACCESS RECORDS WITHOUT WARRANTS

The first release of documents from 'Papers Please.org's' FOIA request for records of police and govt access to Amtrak reservation data show that Amtrak is giving police root access and a dedicated user interface to mine passenger data for general state and law enforcement purposes and is lying to passengers about it. Papers Please. Org's FOIA request was prompted by Amtrak’s obviously incomplete response to an earlier FOIA request from the ACLU. That response omitted any mention of Homeland Security's (DHS) access to Amtrak reservation data. Even though we’ve seen records of Amtrak profiling passengers and denying DHS involvement. The documents were clearly responsive to the ACLU’s request, and should have been included in Amtrak’s response to that request.

Mar 24 06:11

'SMART METERS' CALLED A MAJOR THREAT TO HEALTH, NATIONAL SECURITY

As an expert in electronic warfare, Flynn sees another danger. Specifically, he believes they make our nation highly vulnerable to attack.? e installing millions of "smart meters," devices which use wireless technology to send information back to the companies about power usage by their customers.

Mar 23 20:04

LightEater malware attack places millions of unpatched BIOSes at risk

Two minutes is all it takes to completely destroy a computer. In a presentation entitled "How many million BIOSes would you like to infect?" at security conference CanSecWest, security researchers Corey Kallenberg and Xeno Kovah revealed that even an unskilled person could use an implant called LightEater to infect a vulnerable system in mere moments.

The attack could be used to render a computer unusable, but it could also be used to steal passwords and intercept encrypted data. The problem affects motherboards from companies including Gigabyte, Acer, MSI, HP and Asus. It is exacerbated by manufactures reusing codes across multiple UEFI BIOSes and places home users, businesses and governments at risk.

Talking to The Register, Kopvah explained that the problem is made worse because of the fact that very few people take the trouble to update their BIOS.

Mar 23 15:46

Privacy Nudge: Study finds location sharing by apps prompts privacy action

by Byron Spice

Message that grabs attention: 'Your location has been shared 5,398 times'

Many smartphone users know that free apps sometimes share private information with third parties, but few, if any, are aware of how frequently this occurs. An experiment at Carnegie Mellon University shows that when people learn exactly how many times these apps share that information they rapidly act to limit further sharing...

Mar 23 14:35

McAfee-Owned Company had Access to Hillary Clinton’s Classified Emails

Hillary Clinton’s use of a private email account gave a private company—and potentially others—access to secret State Department information, according to a published report.

Mar 23 13:34

Snowden leaks prove Canada is hacking on global scale

Canada's spy agency, the Communication Security Establishment (CSE), is a major player in global hacking operations and boasts a vast array of cyberwarfare tools, revealed in news reports on Monday, that rivals that of the United States' National Security Agency.

Mar 23 11:24

Secret Emails Reveal Clinton Knowingly Lied in Press Conference

In newly released emails from when Hillary Clinton was Secretary of State, Mrs. Clinton sent business-related emails to her staffers. Not only do these new emails prove that Ms. Clinton used her private email address to conduct business, which she vehemently denied two weeks ago, but it also proves that she lied about whether her employees used private email.

The emails, obtained by the House committee investigating the terrorist attacks in Benghazi, show Mrs. Clinton emailing aides about whether she would survive the firestorm surrounding the attack and her perceived responsibility.

“Did we survive the day?” she wrote to a top adviser.

The person, who is currently unknown, responded, “Survive, yes.” Both emails were on private accounts.

Mar 23 10:30

FB USER FAKES SUICIDE TO SEE HOW THE FACEBOOK SUICIDE PREVENTION TOOL WORKS AND LANDS IN MENTAL ASYLUM

Shane Tusch faked his suicide in an attempt to test the authenticity of Facebook suicide prevention tool and got detained for 72 hours Facebook has rolled out a set of tools to keep a check on its users who are having suicidal tendencies and prevent these users from suicidal attempts. In case some user is having suicidal thoughts and mentions that in the Facebook posts and if a friend of that user reports it to Facebook then a third party will immediately review the post and Facebook would lock the suicidal user’s account and the user will be made to read Facebook’s suicide prevention materials.

Mar 23 10:24

NEW CHEVY MALIBU WILL COME WITH BUILT-IN NSA-STYLE TEEN-TRACKING SPYWARE

Chevrolet will offer parents an uncanny level of oversight when they need to lend the family ride to their kids with its NSA inspired spying feature that will be installed in its upcoming Malibu. The system has been dubbed as Teen Driver and will be launched on the bow-tie brand’s latest mid-sized sedan. The sedan which itself bows at the New York auto show 2015, will let parents set speed alerts, receive vehicle reports and even limit audio volume. Chevrolet believes “parents could use it as a teaching tool with their kids—they can discuss and reinforce safe driving habits.”
Share | Comment

Mar 23 09:40

Streets So Filled With Surveillance, No One Even Knows What All That Tech Junk Is…

This video is just a drive through an average, moderately sized city in modern-day America.

We are way beyond just traffic cameras… The average city intersection is jammed with so much surveillance technology, that it would be difficult to even sort out what is what.

During a couple of intersections we observed, there were not only eye-in-the-sky cameras, but angles of every direction of traffic, plus several antennas relying data to the authorities, a red light camera photographing license plates and generating revenue, and what else?

Mar 23 07:48

That Moron Who Spews Garbage and Doesn’t Listen to Reason May Be a Bot

Leck’s bot, @AI_AGW, doesn’t just respond to arguments directed at Leck himself, it goes out and picks fights. Every five minutes it trawls Twitter for terms and phrases that commonly crop up in Tweets that refute human-caused climate change. It then searches its database of hundreds to find a counter-argument best suited for that tweet—usually a quick statement and a link to a scientific source.

As can be the case with these sorts of things, many of the deniers don’t know they’ve been targeted by a robot and engage AI_AGW in debate. The bot will continue to fire back canned responses that best fit the interlocutor’s line of debate—Leck says this goes on for days, in some cases—and the bot’s been outfitted with a number of responses on the topic of religion, where the arguments unsurprisingly often end up.

Mar 23 07:14

Digital Terrorists and Cyberbullies: This CNN Clip Shows the Propaganda Push to Demonize All Anonymous and Free Speech on the Web

“The real crisis right now… when you have some of the other companies that allow for encrypted conversations between individuals uh, without, uh, the opportunity for law enforcement or intelligence to know how a communication goes…”

Mar 23 06:05

How Much Time Do Americans Spend Plugged Into The Matrix Every Day?

The average American spends more than 10 hours a day using an electronic device. And most of that activity is not even interactive.

Mar 22 14:11

VIDEO: Taking the F 015 Mercedes’s Self-Driving Car for a Spin

A sneak peek inside the Mercedes F 015 concept car, the company’s vision of a driverless future. The design turns the car into a shared social space where any passenger can interact with the vehicle.

Mar 22 10:53

The Wolf Is Guarding the Hen House: The Government’s War on Cyberterrorism

Nothing you write, say, text, tweet or share via phone or computer is private anymore.

The game is rigged.

Mar 22 10:40

The NSA's plan: improve cybersecurity by hacking everyone else

The NSA’s plan to protect America by starting cyberwars is absurd. Their argument that they need more power to do it is moreso

Mar 22 10:19

In Nine Years, Twitter Has Changed Communication In The Digital Age

Twitter has changed the way the world communicates.

Exactly nine years ago, many even imagined we were seeing the birth of one of the most recognized in the digital era media is Twitter.

"In our anniversary number nine, continue to say that Twitter is what it is by its users. After all, it is for you that we as hashtags product feature and success stories as live-tweeting. Today these elements have become part of the culture and customs of each country, "it said through a statement.

http://whatisusa.info/in-nine-years-twitter-has-changed-communication-...

Mar 22 10:04

Amazon Got Permission To Test Drones Sharing

The federal government issued a certificate allowing the giant train your staff drones.

Amazon won approval from US regulators to test a flying drone to distribute products, part of the efforts of e-commerce giant to accelerate deliveries to customers, amid public concerns about security and privacy.

The Federal Aviation Administration said on Thursday it had issued a certificate of experimental air navigation for a unit of Amazon and its prototype drone, allowing you to perform external flights on private rural land in the state of Washington.

http://whatisusa.info/amazon-got-permission-to-test-drones-sharing/

Mar 22 09:51

Facebook Messenger Allows You To Send Money Without Commission

Messenger is a separate service from the Facebook app.
Americans Facebook Messenger users can send money for free through the instant messaging application.

“We are adding a new feature in Messenger that provides a more comfortable and safer to send or receive money from friends so,” said the social network in a statement, in which everything rolling the service over the coming months in the US.

http://whatisusa.info/facebook-messenger-allows-you-to-send-money-with...

Mar 22 09:42

Why Software Is So Bad

The joke encapsulates one of the great puzzles of contemporary technology. In an amazingly short time, software has become critical to almost every aspect of modern life. From bank vaults to city stoplights, from telephone networks to DVD players, from automobile air bags to air traffic control systems, the world around us is regulated by code. Yet much software simply doesn’t work reliably: ask anyone who has watched a computer screen flush blue, wiping out hours of effort. All too often, software engineers say, code is bloated, ugly, inefficient and poorly designed; even when programs do function correctly, users find them too hard to understand. Groaning beneath the weight of bricklike manuals, bookstore shelves across the nation testify to the perduring dysfunctionality of software.

Webmaster's Commentary: 

Yesterday, I was playing with Siri on my iPhone and asked "Why is software so buggy", expecting one of Siri's humorous responses. Instead, I was shown a huge (and I mean HUGE) list of articles decrying the poor quality of modern commercial software, of which this is one.

The reason for poor quality software is purely economical. When personal computers were a new industry and still fragile, lobbyists from IBM, Apple, Microsoft, etc. asked for and got indemnity from product liability from the Congress. What that meant was that if you bought a truck for your business and because of a design defect it crashed and your business suffered harm, you could sue the truck manufacturer. However, if you bought a computer system for your business and because of a design defect it crashed and your company suffered financial harm, Congress declared you could not sue the computer company. This removed the financial incentive to produce quality products, and computer companies shifted their development from robust reliable code to coming up with the next whiz-bang feature to boost sales of new units, leaving the end user to become the unpaid QA division of the company by finding and reporting the bugs and problems in their computers instead of getting real work done which brought in paychecks and assisted the economy.

Readers are already aware that I have never been able to install 3DSMAX 2014 on my Win7 machine (and have since given up trying). Another example is the program I use to edit videos, Adobe Premier, which has a habit of refusing to render the final edits with the totally useless message "Unknown Error", leading to a trial-and-error approach to find what is not working correctly. Multiply this by tens of thousands of users and you can see that the corporate desire for more profit, coupled with protection from product liability, has greatly lowered the productivity of Americans who are now dependent on those computer systems, requiring twice as much work to produce a final result. All very good for the computer corporations, but not so good for Americans struggling to compete in the global marketplace.

Now, when Apple and Microsoft were just starting out, some protection from being sued out of existence may have been justified. But today these are giant corporations, among the richest on earth, and should be held responsible for bad design as would be the truck manufacturer, in order to provide an incentive to more reliable and efficient products. But as long as these large corporations are allowed unlimited political spending, we will get bad computers and software (not to mention vaccines) and a bought government that looks the other way.

Mar 22 07:09

Leaked Document Reveals Upcoming Biometric Experiments at US Customs

“The public should take notice,” Sethi, of the ACLU, told Motherboard. “These programs may be coming to a theater near you.” The ?facial recognition pilot program launched last week by US Customs and Border Protection, which civil liberties advocates say could lead to new potentially privacy-invading programs, is just the first of three biometric experiments that the feds are getting ready to launch.

Mar 21 17:35

The extinct dinosaur called The Individual

Jon Rappoport
Activist Post

“Give up your dreams, if you must. Cease dreaming altogether. Call those dreams and ambitions and visions…delusions. Then you will be ready. Then you can truly serve humanity. You can fall back into the arms of the many who will receive you with love. You’ll become an empty vessel through which miracles are channeled. One day Oprah will interview you.” (The Underground, Jon Rappoport)

In a BBC documentary, “Google and the World Brain,” the question of author-copyright is explored. Google has scanned and published out-of-print books that are still covered by copyright.

Interviewed, Kevin Kelly (twitter) (also here and here), the co-founder of Wired, makes a startling remark. In his view the whole issue of copyright is archaic. He explains that all authors draw their ideas from previous authors and therefore don’t own their own ideas.

Mar 21 17:19

Cyber Snoops Watching Your Kids

This is especially true for Common Core administrators who are scouring the internet looking for leaks of questions from standardized tests. This is bad enough, but there appears to be no allowance made for protecting privacy — even when it comes to information not even related to Common Core.

Mar 21 09:15

Google threatened to remove Yelp and TripAdvisor from search results if they didn't let Google use their reviews in Google Places

The Federal Trade Commission’s bureau of competition staff advised the commission to sue Google and agreed with TripAdvisor’s and Yelp’s charges in 2011 that Google was illegally ripping off their user reviews, but the FTC decided not to challenge Google in court.

Mar 21 08:52

Scientific study reveals conspiracy theorists the most sane of all

Researchers — psychologists and social scientists, mostly — in the U.S. and United Kingdom say data indicate that, contrary to those mainstream media stereotypes, “conspiracy theorists” appear to be more sane than people who accept official versions of controversial and contested events.

Webmaster's Commentary: 

Not that I was worried, mind you! :)

Mar 21 07:38

Billionaire investor warns that the app bubble is the new dot com bubble

Do you want a stock market bubble? Well, it appears there's an app for that.

Billionaire investor and owner of the NBA's Dallas Mavericks says he believes there is a tech bubble on the way that will be far worse for investors that the dot com bubble of 2000.

Mark Cuban, in a blog post cited by Market Watch, said that if investors "thought it was stupid to invest in public Internet web sites that had no chance of succeeding back then, it's worse today."

Learn more: http://www.naturalnews.com/049062_app_bubble_student_debt_mark_cuban.h...

Mar 21 06:37

US government threatened Germany over aiding Snowden

Although previously speculated, the United States did in fact strong arm at least one nation to prevent them from offering Edward Snowden asylum or aiding him

Mar 21 04:00

A Congressional Committee Asks Clinton To Deliver The Server Your Computer

Hillary Clinton

The chairman of a committee of the House of Representatives investigating the attacks of 2012 in Benghazi, Hillary Clinton formally requested that allows access to your private server computer to check emails independently.

Through a letter, Republican Trey Gowdy calls on Clinton give the inspector general of the Department of State the server used for official business while serving as secretary of state.

http://whatisusa.info/a-congressional-committee-asks-clinton-to-delive...

Mar 20 14:05

In the state Duma proposed to give bloggers the status of the media

Google Translate: The bill requires the addition of a list of media the term "blogger". This refers to the owner of the site and / or site pages on the Internet that host a public information and access to which during the day is more than three thousand users.

So, blogger is granted the status of the media in the organization of the dissemination of information on the Internet as well as have the rights and responsibilities of the journalist.

Without the adoption of this law bloggers equated to journalists, to be compared to them at a disadvantage, as it does not have the status and completeness of the journalist's right provided by law, the author notes the explanatory note to the bill.

Mar 20 12:26

Remove pcfixing3.info pop-up virus

The pcfixing3.info pop-ups are caused by an ad-supported extension for Internet Explorer, Firefox and Chrome, which is distributed through various monetization platforms during installation. The malicious browser extensions is typically added when you install another free software (video recording/streaming, download-managers or PDF creators) that had bundled into their installation this adware program.
When an adware extension is installed on your computer, whenever you will open a new tab within Internet Explorer, Firefox and Google Chrome, an ad from pcfixing3.info will pop-up.

Webmaster's Commentary: 

One of our WRH readers emailed me to complain about a pop-up on the screen saying his computer was infected and to dial a number where he could buy assistance to deal with the problem. This is NOT an ad coming from my server but is the result of hijackware on your computer, so in case anyone else is seeing this, here are the instructions on how to get rid of it.

Mar 20 10:14

Judge Orders Sheriff’s Office in New York to Disclose StingRay Secret Surveillance Documents

RT.com

Police in western New York state have been ordered to reveal secret documents containing information on the purchase and use of surveillance technology that collects data from cellphones.

On Tuesday, a New York State Supreme Court judge said that Erie County’s top law enforcement agency must turn over documents concerning its use of a spy tool that gives authorities the ability to collect identifying information on groups of people, including individualized location data, by mimicking the behavior of cellular phone towers.

Mar 20 09:54

Facial Recognition Authentication Hacked by Holding up Video of Man's Face to Camera/Scanner

Mar 20 08:30

Google Disables All Ads on Antiwar.com

– because we have a page showing the Abu Ghraib abuses.

Update: After channels of communication were opened as a result of this article on Gawker, Google contacted us and said they would be restoring our ads.

However, Friday morning I received another demand to remove content from our site. Google has decided this page must be removed.

We have no intention of letting Google dictate our editorial policies.

Webmaster's Commentary: 

Google ads refused to have ads at WRH. Not quite the image of Google as portrayed in "The Internship", is it!

Mar 20 08:26

Can a Molecular 3D Printer Change the Way We Make Everything?

Additive manufacturing, also known as 3D printing, has become one of the wonder-techs of the new millennium. Granted, while the vast majority of 3D printers on the market are little more than souped-up trinkets, some machines are leveraging the technology’s additive assets to instigate real change.

Mar 20 08:15

U.S. Customs Quietly Launches Facial Recognition Experiment at DC Airport

The next time you come back from overseas and flash your American passport at Washington, DC’s Dulles airport, customs officers might take a picture of you and use facial recognition technology to figure out if you really are who you say you are. On March 11, the Customs and Border Protection (CBP) quietly rolled out a new facial recognition pilot program to help custom officers catch “imposters,” or people using a passport that isn’t theirs, an agency spokesperson confirmed to Motherboard on Wednesday.

Mar 20 07:18

Big Data - A Google Data Center Tour

Big Data - A Google Data Center Tour

Mar 20 06:56

FBI Moves to Broaden Hacking Authority - Google Says it Poses “Monumental Constitutional Concern”

A judicial advisory panel Monday quietly approved a rule change that will broaden the FBI’s hacking authority despite fears raised by Google that the amended language represents a “monumental” constitutional concern.

The Judicial Conference Advisory Committee on Criminal Rules voted 11-1 to modify an arcane federal rule to allow judges more flexibility in how they approve search warrants for electronic data, according to a Justice Department spokesman.

The FBI wants the expanded authority, which would allow it to more easily infiltrate computer networks to install malicious tracking software.

Mar 20 06:56

Google claims its 'FaceNet' system has almost perfected recognising human faces - and is accurate 99.96% of the time

In the paper, titled 'FaceNet: A Unified Embedding for Face Recognition and Clustering', Google claims the system achieved nearly 100-percent accuracy rate on the facial recognition dataset Labeled Faces in the Wild.

The dataset uses more than 13,000 face images from the Internet to measure how accurate the algorithms are at verifying whether two images are of the same individual

Mar 20 05:04

Apple Had A Bad Opening In The Dow Jones Industrial

Shares of Apple technology firm did not have a good premiere at the Dow Jones Industrial Average , the select group of actions that joined in the last hours in replacement telecommunications group AT & T.
Confirming the fears of doomsayers that in previous dates indicate when a signature is attached at Dow Jones, for their own reasons or bad luck, its premiere throws losses, Apple ended the day with a decline of 0.76%, to $ 127.50.

http://whatisusa.info/apple-had-a-bad-opening-in-the-dow-jones-industr...

Mar 19 16:45

Google reportedly blackmailed websites into giving it content for free

According to the report, for one example, Google took content from companies like Yelp, TripAdvisor, and Amazon. In the latter case, Google lifted product rankings and placed them in their own search results for those products. When the companies complained to Google about the process, Google threatened to remove them entirely from results. The Journal quotes this section of the report: "It is clear that Google’s threat was intended to produce, and did produce, the desired effect, which was to coerce Yelp and TripAdvisor into backing down."

Mar 19 16:40

Facebook Is Being Sued for Gender and Racial Discrimination. Here's Why.

In a lawsuit filed against Facebook on Monday, former employee Chia Hong accused the company of gender discrimination, racial discrimination, and sex harassment.*She is represented by Lawless & Lawless, the same law firm representing Ellen Pao in the high-profile gender discrimination case against venture capital firm Kleiner Perkins. (And yes, Lawless really is the last name of the two sisters who head the firm.)

Mar 19 13:42

French Government Starts Blocking Websites With Views The Gov't Doesn't Like

We had been noting, in the wake of the Charlie Hebdo attacks in France, how the country that then held a giant "free speech" rally appeared to be, instead, focusing on cracking down on free speech at every opportunity. And target number one: the internet.

Mar 19 13:04

Court: NSA Spying May Continue Even If Congress Lets Authority Expire

The National Security Agency may be allowed to continue scooping up American phone records indefinitely even if congressional authority for the spying program expires later this year, according to a recently declassified court order.

The legal underpinning of the NSA's bulk collection of U.S. call data resides in a provision of the post-9/11 USA Patriot Act that is scheduled to sunset on June 1. The common understanding among lawmakers and the intelligence community is that the surveillance program will halt unless Congress reauthorizes Section 215 of the Patriot Act in some fashion.

But a passage buried on the last pages of an order from the Foreign Intelligence Surveillance Court declassified last week leaves open the door for the program—exposed publicly by Edward Snowden nearly two years ago—to continue even if lawmakers let Section 215 lapse.

Mar 19 12:50

France Moves to Make ‘Conspiracy Theories’ Illegal by Government Decree

Political elites and super-bureaucrats are worried. It’s becoming harder to control consensus reality.

A history stitched together by lies and cover-ups, political assassinations, slight-of-hand false flag deceptions, secret societies, dual loyalties and stolen fortunes – this have been the privilege of the ruling elite for centuries.

Putting aside history’s ‘big ticket’ items though, the real reason is much more fundamental. By knocking out their intellectual competition, political elites and their media moguls hope to eliminate all alternative analysis and opinion by labeling it as “extremist”. They want to wind back the clock, to a pre-internet, monolithic corporate media cartel, and back to a monopoly of ideas.

Mar 19 10:57

Can the Ukrainian Government Target Americans in the US?

If you have a website, write, read, or like something in social media that strays outside the new lines the war isn’t coming, its now here.

What would we do? Disrupt, deny, degrade, deceive, corrupt, usurp or destroy the information. The information, please don’t forget, is the ultimate objective of cyber. That will directly impact the decision-making process of the adversary’s leader who is the ultimate target.”- Joel Harding on Ukraine’s cyber strategy

Mar 19 10:43

Amazon, PayPal and Spotify inadvertently fund white supremacists. Here’s how.

Counter-Currents.com, a Web site you probably do not encounter in your standard Internet travels, exists to advance the books of noted neo-Nazis and the creation of an all-white nationalist state.

Mar 19 10:10

USA And Japan Are Investigating Death Threats Against The Ambassador Caroline Kennedy

Caroline Kennedy, US Ambassador to Japan.
Authorities in Washington are taken "seriously" threats received by the US ambassador to Japan, Caroline Kennedy, so that governments both the US and the Japanese are already investigating the matter, according to the State Department.
"We take seriously any threat to US diplomats," said State Department spokeswoman, Jen Psaki, adding that his government will give its diplomatic staff "every possible step to protect".

http://whatisusa.info/usa-and-japan-are-investigating-death-threats-ag...

Mar 19 09:54

NSA whistleblower: ‘We’re no longer a country with a government, we’re a government with a country’

Former high-level intelligence official warns of "totalitarian" slide into a "controlled society"

Mar 19 08:59

US Threatened Germany Over Snowden, Vice Chancellor Says

German Vice Chancellor Sigmar Gabriel (above) said this week in Homburg that the U.S. government threatened to cease sharing intelligence with Germany if Berlin offered asylum to NSA whistleblower Edward Snowden or otherwise arranged for him to travel to that country. “They told us they would stop notifying us of plots and other intelligence matters,” Gabriel said.

Mar 19 08:06

Googe Street view captures Claire and I

Webmaster's Commentary: 

About two years ago, Claire and I were walking up to get our mail and we saw the Google Street view car whiz by. I didn't think much about it at the time, but an alert reader pointed out that we have been "immortalized" by Google! :)

(Note, this picture is from before we both went on diets!)

Mar 19 07:57

The Apple TV Service Could Be Ready In Autumn

The streaming device Apple has been a success.
After your Apple TV, you can play Internet content on TV, Apple will take a step further and launched in autumn a service streaming payment in which a packet will include major brands.

http://whatisusa.info/the-apple-tv-service-could-be-ready-in-autumn/

Mar 19 07:33

What Other And Do Not Post On Facebook

Facebook remains one of the most important social networks in the world.
Facebook unveiled what messages, images and other content are allowed in the social network and why. When you update your page Community rules, the world’s largest social network gave users more guidance on what may cause the removal of a message, for example, justify violence and sexual exploitation, discourses of intolerance, criminal activity or harassment.

It also explains why not just blame the terrorist groups and criminal gangs, but also removes the content that supports them.

http://whatisusa.info/what-other-and-do-not-post-on-facebook/

Mar 19 07:22

UK Government can legally hack you even if you're not under suspicion

The British Government has admitted its intelligence services have the broad power to hack into personal phones, computers, and communications networks, and claims they are legally justified to hack anyone, anywhere in the world, even if the target is not a threat to national security nor suspected of any crime.

Mar 19 06:41

Nintendo Is Preparing A New Console

The Nintendo 3Ds maintains one of the industry leaders.
In a press conference in Tokyo, Satoru Iwata, Nintendo CEO, confirmed that the company is working on a new console, codenamed NX.

In the event, Nintendo announced its decision to collaborate with the company DeNA to enter the gaming market for smartphone. Iwata assured those present that the company will not abandon the creation of new hardware, which results in the development of NX.

http://whatisusa.info/nintendo-is-preparing-a-new-console/

Mar 19 06:32

Windows 10 Will Be Ready In Winter

Microsoft noted the presence of a single application store, with purchases and upgrades.
Microsoft announced that it expects to complete Windows 10 in the coming winter, as published in the official company blog. He did not specify a date, but analyst’s estimate that will close in September. It will be available in 190 countries.

Windows 10 represents the largest effort by Microsoft to create a single platform for all kinds of devices, whether desktops, tablets, smartphones or small devices those give life to the Internet of Things, supports x86 processor (Intel or AMD) and ARM.

http://whatisusa.info/windows-10-will-be-ready-in-winter/

Mar 19 06:26

Democratic support for Hillary Clinton softens: Reuters/Ipsos poll

Support for Clinton's candidacy has dropped about 15 percentage points since mid February among Democrats, with as few as 45 percent saying they would support her in the last week, according to a Reuters/Ipsos tracking poll. Support from Democrats likely to vote in the party nominating contests has dropped only slightly less, to a low in the mid-50s over the same period.

Mar 19 06:25

Yahoo Pulls the Plug on China Operations

Yahoo Inc. is withdrawing its remaining operations in China, laying off between 200 and 300 employees and shutting down its Beijing research center, according to a person familiar with the matter.

Mar 19 04:05

Texas Senate Approves Concealed Carry Weapons In Universities

In Texas it is legal to walk down the street publicly exhibiting rifles, but is not warranted show handguns.
The Texas Senate approved on Wednesday preliminarily a bill allowing concealed carry weapons in public universities, a day after it was authorized public carrying of handguns in the state.

The bill was approved even though it has been criticized by police, students and officials from major universities in Texas.

http://whatisusa.info/texas-senate-approves-concealed-carry-weapons-in...

Mar 18 18:27

The brands and police are listening, and Twitter intends to help them

Soon you might find yourself shocked by how much companies and government agencies know about you, in close to real time. Unless you lock your Twitter account, everything you say on the microblogging website is by default public. The company already sells bulk access to our tweets; these direct data sales make up about $70m of Twitter's $1.3b income, with the rest coming from advertising. According to a report in The Guardian, Twitter plans to expand its data sales of what one executive calls the "firehose"—the enormous stream of tweets—pouring out of Twitter users worldwide.

Mar 18 16:29

Stealthy, Persistent Dll Hijacking Works Against OS X

Running his Python script against his own OS X machine, Wardle was able to find 144 binaries vulnerable to different flavors of his dylib hijacking attacks, including Apple’s Xcode, iMovie and Quicktime plugins, Microsoft Word, Excel, and PowerPoint, and third-party apps such as Java, Dropbox, GPG Tools and Adobe plugins.

“Windows is vulnerable to DLL hijacking, and now OS X is similarly vulnerable to dylib hijacking,” Wardle said.

Mar 18 15:16

Hello Biometrics: Windows 10 to Add Facial Recognition, Iris Scans and Fingerprint Reader

Nicholas West
Activist Post

After several years of consumer complaints, Microsoft Windows 10 has been getting a lot of attention as of late for many upgrades slated for their new version of the popular operating system.

However, it appears that one feature being added to supposedly consumer-friendly applications is a suite of biometrics called Windows Hello and Windows Passport.

It's all a part of the move toward a full-fledged Smart World where YOU become the password in a matrix of online and real-world activity...

Mar 18 14:43

GCHQ empowered to hack any device anywhere without terrorist, criminal threat – UK court doc

The government has admitted to possessing far-reaching hacking powers to break into computers, phones and communications networks anywhere across the globe in the absence of national security and criminal threats, a court document reveals.

The startling revelation surfaced after civil rights group Privacy International (PI) filed a legal challenge in 2014 questioning the hacking powers of UK government intelligence agency GCHQ.

The legal challenge sought to examine allegations relating to “state-sponsored hacking” uncovered by ex-NSA computer analyst and whistleblower Edward Snowden.

Mar 18 13:41

FCC Chairman Concedes Future Internet Tax Is Possible After All

Federal Communications Commission (FCC) Chairman Tom Wheeler acknowledged in congressional testimony [yesterday] that an Internet tax–which he had previously said would not be imposed–could be imposed in the future.

Mar 18 13:31

Conspiracy Theories Damage British Democracy, says Douglas Alexander

Douglas Alexander, the head of Labour’s election strategy, has said it is getting harder for politicians to campaign in elections because of conspiracy theories on social media.

Mar 18 11:25

1984: France Will Counter Terrorist Attacks on Free Speech by... Attacking Free Speech?

George Orwell wasn't psychic; he was a time traveler, and we're permanently falling down the rabbit hole of 1984.

If you live in France, your right to visit certain websites has just been terminated by the almighty government.

Why? Because terrorism.

How painfully ironic, considering the Charlie Hebdo attack was supposed to be a terroristic attack on free speech to begin with...

Mar 18 10:41

Whistleblower: State Department Employees Who Don’t Sign Separation Agreement Face Dire Consequences

Failure to sign a formal separation agreement can have dire consequences for rank-and-file State Department employees, an agency whistleblower told The Daily Caller.

That is in stark contrast to what happens to top-level officials such as former Sec. of State Hillary Clinton if they refuse to sign the separation form, OF-109.

Ramifications for lower-level State Department employees include the withholding of retirement benefits and possible investigations conducted by the agency into why employees declined to sign the form, whistleblower Richard Higbie says.

By signing OF-109, agency employees affirm that they have turned over all records — classified or unclassified; emails or physical documents — pertaining to official government business.

Mar 18 09:48

A password like “adgjmptw” is nearly as bad as “123456”

The last pattern—adgjmptw—stumped the analysts until they thought of another keypad: that of old-fashioned phones, where the number two correlates with the letters A, B, and C; 3 with D, E, and F; and so on. To type “adgjmptw” on an old cell phone, one essentially dials “23456789.”

“I think ‘adgjmptw’ is just one of many examples—and an especially nice one, given the novelty of how it’s chosen—of how we are, for the most part, predictably unimaginative when it comes to choosing passwords, despite a decade of warnings from password strength checkers during sign-ups,” a WP Engine spokesman tells Quartz. “We love shortcuts. And so do password crackers.”

Mar 18 09:08

Windows 10 will be free for software pirates

Windows 10 will be a free upgrade for Windows 7 and Windows 8 users this summer, but Microsoft is also extending its offer to software pirates. "We are upgrading all qualified PCs, genuine and non-genuine, to Windows 10," says Terry Myerson, Microsoft’s Windows chief, in an interview with Reuters. The move means that thousands, perhaps millions, of machines will get a free copy of Windows 10 even if a license has not been properly acquired. "Anyone with a qualified device can upgrade to Windows 10, including those with pirated copies of Windows," says a Microsoft spokesperson in a statement to The Verge. "We believe customers over time will realize the value of properly licensing Windows and we will make it easy for them to move to legitimate copies."

Mar 18 07:21

State Dept.: ‘No record’ of signed document from Hillary Clinton affirming records turned over

The State Department said Tuesday that former Secretary Hillary Rodham Clinton never signed the document affirming that she turned in all classified information when she left in 2013, as the legal jeopardy to the Obama administration continued to grow over her treatment of emails.

House Speaker John A. Boehner, the Ohio Republican overseeing several congressional investigations into Mrs. Clinton’s emails, said an independent third party needs to take control of her email server in order to clear up remaining questions.

Mar 18 06:45

Law Enforcement Freaks Out Over Apple & Google's Decision To Encrypt Phone Info By Default

Think of the children! And the children killed by terrorists! And just be afraid! Of course, this is the usual refrain any time there's more privacy added to products, or when laws are changed to better protect privacy. And it's almost always bogus. I'm reminded of all the fretting and worries by law enforcement types about how "free WiFi" and Tor would mean that criminals could get away with all sorts of stuff. Except, as we've seen, good old fashioned police/detective work can still let them track down criminals. The information on the phone is not the only evidence, and criminals almost always leave other trails of information.

Webmaster's Commentary: 

The government is a bigger threat to us all than criminals or terrorists (meaning the ones not actually working for the government in the first place).

Mar 18 06:42

Judicial Committee Gives FBI The First OK It Needs To Hack Any Computer, Anywhere On The Planet

The FBI and DOJ are one step closer to having one of their "keeping up with the digital Joneses" requests granted. While the default phone encryption offered by Apple (and at some point in the future by Google) still remains free of law enforcement/intelligence "Golden Backdoors," the agencies are one step closer to being legally permitted to hack nearly any computer in the world.

Webmaster's Commentary: 

... to steal your business secrets and photos of your partner in states of undress, of course. So far, they have not actually caught any terrorists or cyber-criminals with all this snooping!

Mar 18 06:37

What's Scarier: Terrorism, or Governments Blocking Websites in Its Name?

The French Interior Ministry on Monday ordered that five websites be blocked on the grounds that they promote or advocate terrorism. “I do not want to see sites that could lead people to take up arms on the Internet,” proclaimed Interior Minister Bernard Cazeneuve.

When the block functions properly, visitors to those banned sites, rather than accessing the content of the sites they chose to visit, will be automatically redirected to the Interior Ministry website. There, they will be greeted by a graphic of a large red hand, and text informing them that they were attempting to access a site that causes or promotes terrorism: “you are being redirected to this official website since your computer was about to connect with a page that provokes terrorist acts or condones terrorism publicly.”

Mar 17 22:47

RIP Internet Explorer (1995-2015). We Knew Ye All Too Well

Microsoft Internet Explorer, a browser familiar to many and loved by few, passed away today after a long illness. It was 19 years old.

Bowing to the inevitable, Microsoft admitted today that it had decided to remove IE from life support. (IE will, however, continue to receive tech support through at least 2016.) IE is survived by Windows, Office, and the Microsoft Mouse.

Mar 17 21:27

Premera Blue Cross Hacked: 11 Million Customers Could Be Affected

Health insurer Premera Blue Cross was the target of a major cyberattack, and personal or health data for as many as 11 million people may have been compromised, the company announced Tuesday.

Premera said Tuesday hackers gained "unauthorized access" to its systems in a "sophisticated attack" that began May 4, 2014. Just last month, health insurer Anthem disclosed a major breach that may have affected as many as 80 million records.

Mar 17 18:26

HTTPS-crippling FREAK exploit affects thousands of Android and iOS apps

While almost all the attention paid to the HTTPS-crippling FREAK vulnerability has focused on browsers, consider this: thousands of Android and iOS apps, many with finance, shopping, and medical uses, are also vulnerable to the same exploit that decrypts passwords, credit card details, and other sensitive data sent between handsets and Internet servers.

Security researchers from FireEye recently examined the most popular apps on Google Play and the Apple App Store and found 1,999 titles that left users wide open to the encryption downgrade attack. Specifically, 1,228 Android apps with one million or more downloads were vulnerable, while 771 out of the top 14,079 iOS apps were susceptible. Vulnerable apps were those that used—or in the case of iOS, could use—an affected crypto library and connected to servers that offered weak, 512-bit encryption keys. The number of vulnerable apps would no doubt mushroom when analyzing slightly less popular titles.

Mar 17 14:32

What Budget Cuts? US Cyber Command to Double Its Spending

Still in its infancy, US Cyber Command is set to receive a massive bump in its budget. For 2015, the cybersecurity organization will receive $364 million; nearly double the $190 million it was allocated for 2014.

Mar 17 13:58

FCC NET NEUTRALITY DOCS HAVE 46 REFERENCES TO A GROUP FUNDED BY BILLIONAIRE GEORGE SOROS AND CO-FOUNDED BY A NEO-MARXIST

The FCC released the 400-page document on Thursday, two weeks after it passed new regulations, which many fear will turn the internet into a public commodity and thereby stifle innovation.

Mar 17 12:34

NEW YORK CITY INSTALLS 'ELECTRONIC EARS' IN MAJOR AREAS

Less than three months into 2015, 184 people have been shot in New York City. To combat this statistic, the city is looking toward a novel solution: gunfire detection systems. But the high cost of installing mics – and the potential for government eavesdropping – leave many wondering if it’s worth it. It’s called ShotSpotter, a large tracking system which detects gunfire and then triangulates the position of the sound. Acoustic sensors are placed in strategic areas, mostly along rooftops or atop telephone poles. Once installed, the sensors pick up street noise and listen for gunshots.

Mar 17 11:24

Denounce Abuses In ICE Raids In South Florida

Denucia woman who suffered abuse by ICE agents who tried to arrest undocumented family.
A family of immigrants in Homestead, South Florida, denounced abuses by federal agents of the Bureau of Immigration and Customs Enforcement (ICE, for its acronym in English) for a national five-day raid resulted in the arrest of more than 2 thousand undocumented.

The government ensures that all detainees had criminal records and were placed in deportation proceedings.

http://whatisusa.info/denounce-abuses-in-ice-raids-in-south-florida/

Mar 17 11:10

Third Cross-Border Tunnel Found In Arizona So Far This Year

A federal agent of the Department of Homeland Security (DHS) US cargo a package of marijuana seized at the border with Mexico.
Border Patrol Agents (Border Patrol) sector Tucson, Arizona, announced the discovery of a cross-border tunnel leading to the place where they were found by plugging another underground passage earlier this year.

The agents assigned to the Nogales station, in collaboration with the International Liaison Unit and the Mexican police discovered last March 13 an incomplete tunnel, which is the third I found this year in Arizona.

http://whatisusa.info/third-cross-border-tunnel-found-in-arizona-so-fa...

Mar 17 09:03

THE WOLF IS GUARDING THE HEN HOUSE: THE GOVERNMENT’S WAR ON CYBERTERRORISM

Nothing you write, say, text, tweet or share via phone or computer is private anymore. As constitutional law professor Garrett Epps points out, “Big Brother is watching…. Big Brother may be watching you right now, and you may never know. Since 9/11, our national life has changed forever. Surveillance is the new normal.”

Mar 17 08:46

Bill to Pull Plug On NSA Introduced in Texas

Activist Post

Legislation would Turn Off Water and Electric to San Antonio Facility

A Texas legislator introduced a bill that would stop the independent Texas power grid from being used to power mass, warrantless surveillance by the NSA last week...

Mar 17 08:31

Stay Alert Against Fake Calls And Emails IRS

Tax scams take many different forms. Recently, the most common scams are phone calls and emails from thieves who claim to be from the IRS. They use the IRS name, logo or a fake website to try to steal your money. Also, they may try to steal your identity. Here are some tips from the IRS to help you avoid becoming a victim of these types of tax scams:

http://whatisusa.info/stay-alert-against-fake-calls-and-emails-irs/

Mar 17 08:16

Lawmakers say TTP meetings classified to keep Americans in the dark

According to Grayson, putting Wednesday's ISDS briefing in a classified setting "is part of a multi-year campaign of deception and destruction

Mar 17 08:05

Spam Filtering Service had access to Clinton Classified Emails

Not often do we break news on Dvorak News but today we do. Hillary Clinton used a spam filtering service MxLogic to filter her spam and viruses. What this means is – employees at MxLogic, now owned by McAfee – had full access to all her classified state department email in unencrypted form.

Here’s the MX records for clintonemail.com.

clintonemail.com. 7200 IN MX 10 clintonemail.com.inbound10.mxlogicmx.net.
clintonemail.com. 7200 IN MX 10 clintonemail.com.inbound10.mxlogic.net.

Mar 17 00:41

King5 Follow Up on Safeguard/LPS Unlawful Foreclosure with Attorney Ha Dao on RCW 7.28.230(1).

Monday, March 16, 2015

KingCast and Mortgage Movies King5 Follow Up on Safeguard/LPS Unlawful Foreclosure with Attorney Ha Dao on RCW 7.28.230(1).

Life is good for Safeguard... because they are friends with the Bush family.
Just do your due diligence you'll find it.

Here is the King5 feature story from March 3, 2015

"It's a tricky business accessing property that the bank doesn't truly own, and Beal says the industry known as "property preservation" has plenty of faults. "The pressures are pretty intense," said Beal. A KING 5 Investigation shows that those pressures may be one reason behind numerous complaints filed with attorneys, housing assistance groups, and the Washington Attorney General's Office. Typically, a homeowner complains that they have not abandoned the home, yet but have been locked out or found their personal property is missing."

Says Attorney Dao:

Mar 16 19:54

The FBI’s Big Plan To Expand Its Hacking Powers

Technology giant Google has warned that a rule change represents a 'monumental' constitutional concern. A judicial advisory panel Monday quietly approved a rule change that will broaden the FBI’s hacking authority despite fears raised by Google that the amended language represents a “monumental” constitutional concern.

Mar 16 13:45

CIA WORKED WITH DOJ TO RE-PURPOSE FOREIGN SURVEILLANCE AIRBORNE CELL TOWER SPOOFERS FOR DOMESTIC USE

The CIA's recent rebranding as Valhalla for US cyberwarriors notwithstanding, the agency's general focus has been intelligence gathering on foreign governments, corporations and people. That it has often mistaken "torturing people into saying whatever they can to make it stop" for "intelligence gathering" isn't necessarily germane to the following discussion, but it's worth noting that the CIA is almost single-handedly responsible for destroying the term "extraordinary rendition" -- a formerly innocuous (and complimentary) term previously used to highlight something like, say, Johnny Cash's amazing cover of Soundgarden's' "Rusty Cage." (That Cash's two best covers are "Hurt" and "Rusty Cage" is not germane to the discussion of CIA torture programs, but what a coincidence!)

Mar 16 12:38

Here's the Chip Apple Is Using to Stop You from Buying Cheap Cables

If you bought yourself an iPhone 5, and are looking for a cheap, third-party lightning adapter to save a couple of bucks, you might want to hold off. There's an authenticator chip in the official adapters, and third-party adapters probably won't work without it.

Mar 16 10:45

Anti Police State App 'Sidekik' Features Real-Time Legal Aid

Activist Post

Studies have shown that police are held almost completely unaccountable by the current systems of governmental oversight. Perhaps this is the reason why you are 9 times more likely to be killed by a law enforcement officer than a terrorist. Rather than wait for bloated bureaucracy or corrupt government to save the day, we as activists have to find our own solutions. Technology is one of these solutions. Each citizen needs to become a member of the media and record everything that they see during encounters with the police.

We previously reported on the launch of a smartphone app called Sidekik which required funding to make it as easy as possible for you not only to record the police and upload that recording offsite, but to put you in immediate contact with legal representation to help you navigate the encounter ... in real-time.

We are happy to report that activist efforts have funded Phase 1 of Sidekik. Developers are now prepared to enter Phase 2...

Mar 16 09:20

SENATE INTELLIGENCE COMMITTEE APPROVES “A SURVEILLANCE BILL BY ANOTHER NAME”

The Senate Intelligence Committee on Thursday approved the Cybersecurity Information Sharing and Protection Act, which would facilitate the sharing of information from private companies to the government. The putative reason for the legislation is to stop cyberattacks, but some are concerned it will allow transfers of large amounts of personal information to the government.

Mar 16 09:14

Google is pleading with Firefox users to stop using Yahoo

Google's dropping search share is painful for the company, but given that Firefox is used by only 12% of Americans, the long-term effects will be limited. But this may just be the start for Google.

Some reports say Apple is considering dropping Google as its default search engine on the iPhone's Safari web browser. It is not clear what Apple might use instead, whether Yahoo, Bing, or an in-house search, but any change would be a big loss for Google.

Mar 16 07:55

Net Neutrality has a massive copyright loophole

After years of debating U.S. Internet subscribers now have Government regulated Net Neutrality

Mar 16 07:50

ORWELLIAN NIGHTMARE UNLEASHED ON SCHOOLKIDS

Rather than merely asking for a right or wrong answer to a math, history or science question, the new assessment industry is capable of boring into a child’s attitudes, values, opinions and beliefs, all of which parents and privacy advocates say is no business of the government’s.

The pushback has led some state education systems to recommend a reduction in the amount of high-stakes testing in public schools.

But, parents beware, the sudden realization that maybe too much testing is going on is not going to lead to less data being collected. Quite the opposite.

But what if your child’s teacher could have access to a software application that allows her to collect data on your child in real time, without ever rolling out a test?

Enter the BOSS app. It is just one of countless new data-collection products available to school systems looking to collect data on the sneak.

Webmaster's Commentary: 

And please be aware: these dossiers will follow the kid from kindergarten through high school.

Mar 16 07:36

FACE RECOGNITION, LICENSE PLATE TRACKING CAMERA DISAPPEARS AFTER JOURNALISTS ASK US POSTAL SERVICE ABOUT IT

Within an hour of FOX31 Denver discovering a hidden camera, which was positioned to capture and record the license plates and facial features of customers leaving a Golden Post Office, the device was ripped from the ground and disappeared.

Mar 16 06:29

'Muslim Brotherhood princess' used Clinton email server

At least three of Hillary Clinton’s top aides – including one with ties to the Muslim Brotherhood – used emails hosted on Clinton’s private server while she was secretary of state, according to several reports.

Mar 16 06:13

Hertz puts cameras in its rental cars, says it has no plans to use them

This week I got an angry email from a friend who had just rented a car from Hertz: “Did you know Hertz is putting cameras in rental cars!? This is bullsh*t. I wonder if it says they can tape me in my Hertz contract.” He sent along this photo of a camera peeping at him from out of his “NeverLost,” a navigational device that the company has started putting in many of its cars:

Mar 16 05:56

Internet Trolls: Propaganda's Final Frontier

The urge to control public perception, to label the heroes and villains within and without, has remained a political constant throughout our history. And for centuries the dissemination of these ideas followed a similar, top-down trajectory of some authoritative source telling us who we are and what we believe in.

But the advent of the Internet has changed all that.

The Internet is a game-changer in two ways. First there’s the nature of the medium, which allows for an escape from the top-down model and the easy skepticism it breeds. ‘Truth’ no longer issues forth from the pulpit or Dan Rather or the latest issue of Pravda; it reveals itself in fragments throughout our interconnected lives. Second there’s the global reach of the Internet. Now governments can dialogue directly with the populations of rival countries, even if the people don’t necessarily know who it is they’re talking to.

Mar 16 05:52

Minority Report (2002) esoteric analysis – pre-crime is now here!

Spielberg’s Minority Report is now an important film to revisit

SHARE THIS ARTICLE WITH YOUR SOCIAL MEDIA