COMPUTERS/INTERNET/SECURITY | WHAT REALLY HAPPENED


COMPUTERS/INTERNET/SECURITY

May 05 15:01

Military Readies Mountain Fortress to “Shield Against EMP Attack”

The government powers that be are preparing for continuity under any conditions.

‘The grid is utterly unprotected from an EMP attack. It’s not adequately protected from cyber or physical sabotage,’ Pry told FOX. ‘It’s why North Korea and Iran want the bomb, have the bomb. North Korea has actually practiced this against the United States.’ (source)

Now, the military is making preparations to spend more than $1 billion to move vital equipment and personnel back to the Cheyenne Mountain bunker-fortress. Essential to Cold War contingencies and operations, today, the facility offers a place for continuity of government (COG) to take hold in case of the worst.

Read more at SHTFplan.com

May 05 14:49

French Law Forces Backdoors On ISPs

A translated post on OVH's statement shows some of the real dangerous of this law.

... Requiring French hosts to accept real-time capture of connection data and the establishment of "black boxes" with blurred in infrastructure, means giving French intelligence services access and visibility into all data traveling over networks. This unlimited access insinuate doubt among customers of hosting providers on the use of these "black boxes" and the protection of their personal data.
OVH.com

We can all argue in favor of end-to-end encryption, SSL everywhere, ... but that doesn't change the fact that your government is forcing the internet providers in your country to install and maintain a backdoor, so French law enforcement can intervene and spy at their own choosing.

It's a sad day for France and a sad day for ISPs and hosting providers in general.

May 05 14:47

THE COMPUTERS ARE LISTENING - HOW THE NSA CONVERTS SPOKEN WORDS INTO SEARCHABLE TEXT

Most people realize that emails and other digital communications they once considered private can now become part of their permanent record.

But even as they increasingly use apps that understand what they say, most people don’t realize that the words they speak are not so private anymore, either.

Top-secret documents from the archive of former NSA contractor Edward Snowden show the National Security Agency can now automatically recognize the content within phone calls by creating rough transcripts and phonetic representations that can be easily searched and stored.

The documents show NSA analysts celebrating the development of what they called “Google for Voice” nearly a decade ago.

May 05 13:12

Facebook Poised to Become 'De Facto Internet Gatekeeper' for Developing World

Privacy and net neutrality activists are sounding the alarm after Facebook on Monday announced changes to its "free" Internet for the developing world, dubbed Internet.org, which critics say threatens to make the social networking company the de facto Internet "gatekeeper" for hundreds of millions worldwide.

May 05 12:18

Patriot Act Reform: A Hoax

May 05 11:01

Court Asked Why There's No Expectation Of Privacy In Cell Location Data, But An Expectation Of Privacy In The Cellphone Itself

The government continues to argue that the Third Party Doctrine trumps the Fourth Amendment. Almost any "business record" created intentionally or inadvertently can be had by the government without a warrant. Even if the citizen in question has no ability to control what's collected by third parties (without forgoing the service entirely) or is completely unaware that it's happening, the government claims records of this type have no expectation of privacy.

May 05 09:53

The USA Freedom Act Doesn’t End Bulk Data Collection

The business records provision of the Patriot Act, known as Section 215, is scheduled to expire on June 1st. It’s the legal basis for the NSA’s collection of telephone metadata inside American borders. A few days ago the House Judiciary Committee proudly announced that it had approved a bill, (HR 2048/S.1123) the USA Freedom Act of 2015, which alters the provisions of Section 215. The Judiciary Committee claims that their proposed legislation “ends bulk collection.” At best this is a mischaracterization that flagrantly ignores additional surveillance laws.

May 05 09:52

THE COMPUTERS ARE LISTENING

Most people realize that emails and other digital communications they once considered private can now become part of their permanent record.

But even as they increasingly use apps that understand what they say, most people don’t realize that the words they speak are not so private anymore, either.

Top-secret documents from the archive of former NSA contractor Edward Snowden show the National Security Agency can now automatically recognize the content within phone calls by creating rough transcripts and phonetic representations that can be easily searched and stored.

The documents show NSA analysts celebrating the development of what they called “Google for Voice” nearly a decade ago.

Webmaster's Commentary: 

A short memo to the NSA - yes, I'm talking about YOU GUYS (and gals).

NEWS FLASH: The baddies have the horse sense to either encrypt their email, or don't use traceable telephones for conversation.

Mike set out 6 NSA decryption challenges on this website, which none of you were able to break, just to point out that you CANNOT surveille all people all the time. And we are NOT terrorists; just, at times, severely irritating, because we wish we could believe anything this government says, which these days is nearly impossible.

I am very sure that when you have someone surveille Mike and me, it's punishment duty. They will hear such inflammatory language over the phone such as "Sweetheart, could you please pick up an onion for the meatloaf?!?"

May 05 09:23

NSA Converting Spoken Words into Searchable Text

Most people realize that emails and other digital communications they once considered private can now become part of their permanent record.

But even as they increasingly use apps that understand what they say, most people don’t realize that the words they speak are not so private anymore, either.

May 05 08:10

'Rombertik' malware kills host computers if you attempt a cure

Cisco researchers Ben Baker and Alex Chiu have found new malware that destroys a machine's Master Boot Record and home directories if it detects meddling white hats.

The pair from the Borg's TALOS malware probing department say the "Rombertik" malware is designed to steal keystrokes and data and targets Windows users through phishing.

May 05 08:02

The World’s First On-Line B.S. Filter - Michael Rivero

May 05 06:46

DHS IS WORKING ON AN RFID BIOMETRIC ID BADGE THAT KNOWS WHEN YOU GO THE BATHROOM

A Southern Connecticut State University student named Steve Abbagnaro of Durham is developing technology for DHS through his company, Queralt Inc. "Started in January 2011 with private funding from the Department of Homeland Security, a multi-national industrial gas company and private shareholders, Queralt has grown from developing elementary sensor solutions to offering the leading cloud-based platform for powering intelligent real-time actions based on multiple sensory and data inputs."

May 05 06:38

The Surveillance Engine: How the NSA Built Its Own Secret Google

The National Security Agency is secretly providing data to nearly two dozen U.S. government agencies with a “Google-like” search engine built to share more than 850 billion records about phone calls, emails, cellphone locations, and internet chats, according to classified documents obtained by The Intercept.

The documents provide the first definitive evidence that the NSA has for years made massive amounts of surveillance data directly accessible to domestic law enforcement agencies. Planning documents for ICREACH, as the search engine is called, cite the Federal Bureau of Investigation and the Drug Enforcement Administration as key participants.

ICREACH contains information on the private communications of foreigners and, it appears, millions of records on American citizens who have not been accused of any wrongdoing. Details about its existence are contained in the archive of materials provided to The Intercept by NSA whistleblower Edward Snowden.

May 04 19:53

Secrecy Over TPP Fuels Growing Opposition in Congress

The back-room push for the corporate-friendly Trans-Pacific Partnership (TPP) trade pact may be backfiring on its supporters, as more and more lawmakers in U.S. Congress drop their interest in the deal over its extreme secrecy.

Only members of the House and Senate are currently allowed to view the text of the deal, and even they are forbidden from discussing what it contains. As a new report from Politico published Monday details, "If you’re a member who wants to read the text, you’ve got to go to a room in the basement of the Capitol Visitor Center and be handed it one section at a time, watched over as you read, and forced to hand over any notes you make before leaving."

May 04 15:44

World's first anti-propaganda search engine launching soon that favors Independent Media while banning government and corporate disinfo

For the last six months, I have been working hard on the development of a breakthrough search engine that will finally offer a credible search alternative to the NSA-funded, surveillance-state search engines currently dominating the web.

Next week, I'll be opening the webmaster URL submit page for the world's first independent, anti-propaganda search engine that filters out corporate propaganda and government disinformation. The search engine is free to submit to and free to use. It's funded entirely by advertising that appears on the search results page.

Uniquely, this independent search engine either bans or flags (with a warning) all corporate propaganda and government disinfo websites. Just as Google flags search result URLs containing malicious code that can infect your computer, we will flag search result URLs containing malicious propaganda that can infect your mind.

Webmaster's Commentary: 

SIGN ME UP!!!!

May 04 13:04

FCC Commissioner: Feds May Come for Drudge

Federal Communications Commission (FCC) member Ajit Pai said over the weekend that he foresees a future in which federal regulators will seek to regulate websites based on political content, using the power of the FCC or Federal Elections Commission (FEC).

May 04 09:05

Unnoticed for years, malware turned Linux and BSD servers into spamming machines

For over 5 years, and perhaps even longer, servers around the world running Linux and BSD operating systems have been targeted by an individual or group that compromised them via a backdoor Trojan, then made them send out spam, ESET researchers have found.

May 04 08:20

UK may impose internet rationing as electricity depletion looms

Britain could face mandatory internet rationing as web electricity consumption threatens to consume the country’s entire power supply, experts warn.

Internet rationing or increasing costs in order to update infrastructure might be required, otherwise fiber optical networks will reach their limit within the next eight years, The Independent quoted Professor Andrew Ellis as saying on Sunday.

The capacity people have been able to reach has been doubling every two years, he added.

Webmaster's Commentary: 

The difference between a net connection carrying data and a net connection waiting for data is miniscule. This is the start of an attempt to limit access to the net by ordinary citizens, to drive them back to the corporate media propaganda machine!

May 04 08:03

Merkel defends allegations German intelligence helped NSA spies

Chancellor Merkel has dismissed allegations that Germany's foreign intelligence agency broke the law, and helped the US spy on European firms and officials. It is the first time she has publicly commented on the matter.

May 04 07:19

Medical equipment can be taken over and controlled remotely by hackers

The development of a form of medical technology known as telesurgery, which uses robotic arms capable of performing surgery that can be remotely controlled, has tremendous potential to save lives and money. The ability to remotely perform a surgical procedure is an inexpensive way to partially solve the problems associated with the lack of expert surgeons in remote areas, for example.

However, security flaws have recently been identified regarding the remote control communication systems used to operate the machinery, which could easily be exploited by hackers. Researchers at the University of Washington have demonstrated how a hacker could take over the controls and interfere in a surgical procedure, making it impossible to perform.

The problem is that telesurgery procedures take place using public networks instead of secured private networks.

May 03 18:15

SOPA Lives On For the International Anti-Counterfeiting Coalition

Last week the International Anti-Counterfeiting Coalition (IACC) held their spring conference in San Diego, to share intelligence about the latest strategies for combatting “counterfeiting” (by which they mean trademark infringement) and “piracy” (by which they mean copyright infringement). EFF's Jeremy Malcolm attended as an invited panelist, giving us the opportunity to assert our views that anti-piracy campaigns should not infringe users' rights or damage the fabric of the global Internet. But perhaps more importantly, it also also afforded us a window into the mindset of the content and brand owners, law enforcement officials and lawyers behind these campaigns.

May 03 18:08

CYBERCOM To Outsource $475 Million Worth of Work To Private Contractors

The massive contract would cover more than 20 task areas and would build out one of the divisions of the Pentagon's fledgling cyber branch. The emerging Pentagon division that coordinates military cybersecurity and cyberattacks is asking private contractors to help finish standing up the Cyber Command. Among the tasks to be assigned under a request for proposals issued Thursday are support for eavesdropping to detect threats and assistance with repelling hacks equivalent to an armed attack against the nation.

May 02 16:31

Avengers: Age of Ultron – Gods of the Rising Technocratic Aeon

Joss Whedon’s follow-up to The Avengers, Avengers: Age of Ultron, is setting new box office records for Marvel, and has roughly the same degree of critical response as the first. A few days ago, I analyzed the first in anticipation for the follow-up that premiered in the U.S. this weekend, noting the A.I. takeover plot, and the sequel was even more esoterically themed and blatant in its presentation. Hollywood is making it difficult for me not to write the same A.I. analysis over and over, but some new ground is tread here to investigate in the midst of the same pattern we’ve been witnessing of late, the extinction of man through mass depopulation and his subjugation and/or replacement with an A.I. control grid.

May 02 13:44

Sheryl Sandberg's Husband, Dave Goldberg, Dies Suddenly

Dave Goldberg, SurveyMonkey CEO and husband of Facebook COO Sheryl Sandberg, died suddenly Friday night, his family announced Saturday. He was 47.

More on Sheryl Sandberg: http://en.wikipedia.org/wiki/Sheryl_Sandberg

May 02 11:13

First Amendment Skirmish with Former Federal Magistrate Monica Benton in Pooley v. Quality Loan Lost Note Foreclosure Case.

Friday, May 1, 2015

KingCast, Mortgage Movies, Malcolm X and Martin Luther King See Judge Monica Benton Uphold the First Amendment in Lost Note Case of Pooley v. Quality Loan Servicing Corporation & McCarthy Holthus.

I'm going to get to the specifics and substance of the case soon, and it involves a purportedly lost Note with a date uncertain for when an indorsement was issued on it, but for now you need to know that my First Amendment Rights as a Citizen, as a Journalist, and as a Citizen Journalist were somewhat imperiled today when I was called back into Honorable Monica Benton's Judicial Chambers where the following colloquy ensued:

"What are your credentials?"

May 02 09:47

2 members of Supreme Court 'targeted by U.S. spies'

U.S. intelligence agencies have “harvested” the personal and private data of “hundreds of federal officials and judges, including Chief Justice John Roberts and Justice Ruth Bader Ginsberg,” charges a legal brief filed by Larry Klayman, the attorney who has come to be known as “the NSA slayer” for his successful legal battles against the National Security Agency.

Webmaster's Commentary: 

I speculated that this might have been the reason for Roberts' sudden reversal on Obamacare!

May 02 08:10

Assange: More leaks to come

WikiLeaks is planning new releases of secret documents on controversial negotiations and intelligence agency operations, according to the anti-secrecy organisation's Australian founder, Julian Assange.

In an interview with Fairfax Media, Mr Assange said that while he does not expect to leave Ecuador's London embassy any time soon, WikiLeaks very much remains in the business of publishing the secrets of diplomats and spies.

"There'll be more publications – about large international so-called free trade deals, and about an intelligence agency," Mr Assange said.

May 02 08:05

Algorithmic guilt: using secret algorithms to kick people off welfare

A wrenching and beautifully argued essay by Virginia Eubanks describes the inevitable consequences of letting secret, unaccountable algorithms decide who is eligible for welfare. The essay is part of New America's What Drives Innovation Around the Country conference, and it describes the drive to outsource management of critical state services to private firms that control costs by using proprietary, secret algorithms to ascribe suspicion and guilt to members of the public.

May 02 07:57

NSA Used German Intelligence to Spy on Offices of French President and other EU Allies

Intelligence spying involving the United States and Germany is once again in the news, only this time the rift isn’t between the two allies. Unlike the 2013 revelation that the National Security Agency had spied on German Chancellor Angela Merkel, the latest snooping hoopla has the NSA using Germany’s electronic listening technology to spy on other European allies, including the leader of France. The American-German cooperation went on for at least a decade, according to a parliamentary investigation in Berlin

May 02 07:40

Comcast sued a city trying to build high-speed internet — then offered its own version

The small city of Chattanooga, Tennessee, has played a large role in the movement to expand high-speed internet around the US. It wanted to build its own municipal fiber network, but was sued by incumbents like Comcast. After winning in court, Chattanooga built its own high-speed offering, but was prevented from expanding this offering to neighboring areas by state laws. Earlier this year, the FCC voted to overturn those restrictions. And today Comcast has come crawling back, announcing it will begin offering its own 2-gigabit service in Chattanooga.

Webmaster's Commentary: 

Despite the internet being invented in the United States (by DARPA, not by Al Gore) consumer internet in the US currently lags behind other developed nations because of this approach of making us dependent on a single provider who thus has little incentive to improve service and speed, but spends all their energy keeping competing system that might be better out. This too is a symptom of a fascist economic dictatorship!

May 01 15:07

Tan lines

May 01 14:45

No patch for remote code-execution bug in D-Link and Trendnet routers

Home and small-office routers from manufacturers including Trendnet and D-Link are vulnerable to attacks that allow attackers anywhere in the world to execute malicious code on the devices, according to an advisory issued over the weekend.

The remote command-injection bug affects routers that were developed using the RealTek software development kit. That includes routers from Trendnet and D-Link, according to the developer who discovered the vulnerability. There's no comprehensive list of manufacturers or models that are affected, though more technical users may be able to spot them by using the Metasploit framework to query their router. If the response contains "RealTek/v1.3" or similar, it's likely vulnerable.

May 01 14:44

Behold: the drop-dead simple exploit that nukes Google’s Password Alert

Less than 24 hours after Google unveiled a Chrome extension that warns when user account passwords get phished, a security researcher has devised a drop-dead simple exploit that bypasses it.

May 01 14:38

The NSA's greatest hiring strength is students, but resistance is growing

For years the NSA has used the incentive of paid tuition to lure talented teens into employment with the agency. But in light of the Snowden leaks, students are organizing against what they see as just another invasion of their privacy rights

May 01 14:36

Irate Congressman gives cops easy rule: “just follow the damn Constitution”

Rep. Ted Lieu lambasts gov't request for more access to encrypted devices.

May 01 13:38

WikiLeaks Relaunch Anonymous Whistleblower Submissions

After a five year hiatus, anonymous submissions have returned to WikiLeaks. The group has launched a new system that uses the Tor network to encrypt and protect sensitive information.

May 01 11:42

Rep. Amash: ?Not Enough Votes in Congress to Reauthorize PATRIOT Act

Michigan Congressman Justin Amash took to Facebook earlier today to inform the public about the inner workings of alleged surveillance reform.

Amash states that the latest version of the USA Freedom Act does not prevent the government's illegal surveillance on Americans.

He also said "There are not enough votes in Congress to reauthorize it," referring to the PATRIOT Act which is set to expire in about a month,

Webmaster's Commentary: 

Which does not mean the NSA will stop spying on you, just that it will go back to being illegal as well as unconstitutional ... but that hasn't stopped NSA yet!

May 01 10:20

How the Pentagon Could Soon Share Americans’ Data With Foreign Militaries

The new strategy indirectly, but unequivocally, ties into information-sharing legislation that’s slowly making its way to the President’s desk. Among the various bills moving around Capitol Hill, the most important is the Cyber Information Sharing Act. Among other things, CISA would protect companies from being sued for sending data about their users to DHS, which would be permitted to send it in real time to DOD and other U.S. agencies and outfits. In turn, DOD’s new strategy claims the right to to share cyber threat data beyond the United States. Presumably, that would include information obtained via CISA.

But if CISA or its cousins becomes law, what kind of information might fly from company servers to DHS to DOD and then around world? Members of the privacy community describe the scope as incredibly broad.

Webmaster's Commentary: 

This proposed legislation is yet another evisceration of the Constitution and Bill of Rights, cementing the disempowerment of We the People to control our own data, and what happens to it.

May 01 08:28

What is a Makerspace?

By Brian Berletic

Makerspaces are getting a lot of attention these days but it still seems like some people are unclear as to what exactly a makerspace actually is. That might be because, at this point, even makerspaces themselves are unsure of exactly what they are doing or where this is all heading.

However, what they do know is that makerspaces are for at least three things: Innovating, collaborating, and learning. Perhaps an analogy can help make things clearer...

May 01 07:01

Boeing 787 software bug can shut down planes' generators IN FLIGHT

The US Federal Aviation Administration (FAA) has issued a new airworthiness directive (PDF) for Boeing's 787 because a software bug shuts down the plane's electricity generators every 248 days.

“We have been advised by Boeing of an issue identified during laboratory testing,” the directive says. That issue sees “The software counter internal to the generator control units (GCUs) will overflow after 248 days of continuous power, causing that GCU to go into failsafe mode.”

When the GCU is in failsafe mode it isn't making any power. That'll be bad news if all four of the GCUs aboard a 787 were powered up at the same time, because all will then shut down, “resulting in a loss of all AC electrical power regardless of flight phase.”

Apr 30 14:33

Spam-blasting malware infects thousands of Linux and FreeBSD servers

Several thousand computers running the Linux and FreeBSD operating systems have been infected over the past seven months with sophisticated malware that surreptitiously makes them part of a renegade network blasting the Internet with spam, researchers said Wednesday. The malware likely infected many more machines during the five years it's known to have existed.

Apr 30 14:18

NSA Whistleblower: “We Are No Longer Afraid Of The Police State Happening. It’s Here”

It’s not just NSA officials … Two former U.S. Supreme Court Justices have warned that America is sliding into tyranny. A former U.S. President, and many other high-level American officials agree.

Apr 30 12:34

BITCOIN PLATFORM CIRCLE GETS $50M FROM GOLDMAN SACHS AND CHINA’S IDG CAPITAL

The Wall Street Journal is reporting that Boston-based Bitcoin platform Circle has added $50 million in new funding — valuing the company at $200 million. The company’s latest investment was led by Goldman Sachs and Chinese investor IDG Capital Partners. Previous investors Accel Partners*, Breyer Capital, General Catalyst Partners, and Digital Currency Group also took part in the round.

Apr 30 12:34

2 members of Supreme Court 'targeted by U.S. spies'

U.S. intelligence agencies have “harvested” the personal and private data of “hundreds of federal officials and judges, including Chief Justice John Roberts and Justice Ruth Bader Ginsberg,” charges a legal brief filed by Larry Klayman, the attorney who has come to be known as “the NSA slayer” for his successful legal battles against the National Security Agency.

Webmaster's Commentary: 

Which was my guess as to Roberts' sudden reversal on Obamacare!

Apr 30 10:15

Can mass surveillance be stopped before it’s too late?

A House committee advanced major legislation Thursday that would effectively end the National Security Agency's bulk vacuuming of American phone records, a lurch forward for surveillance reform that comes as key spying authorities are a month away from expiring.

Apr 30 10:14

Airbus to sue in US, German spying row

Aviation giant Airbus says it will file a criminal complaint over allegations that German intelligence helped the US carry out industrial espionage.

Apr 30 09:44

How Eric Snowden Changed Our World

It is now almost two years since whistleblower Edward Snowden leaked classified information on the surveillance activities of the NSA and its allies in the GCHQ and other agencies around the world. Eighteen months later Laura Poitras' film Citizenfour about Snowden was released, and four months after that it won an Oscar for Best Documentary Feature. Another film, this one a biopic directed by Oliver Stone entitled Snowden, is due out at the end of this year.

Apr 30 07:39

FBI slammed on Capitol Hill for 'stupid' ideas about encryption

Amy Hess, the FBI's executive assistant director for science and technology, reiterated to the House Committee on Oversight & Government Reform the bureau’s decades-old fear of “going dark” because encryption, which makes it will make criminal investigations more difficult.

“We’re certainly not going to go dark,” Rep. Jason Chaffetz (R-Utah) responded. “And in many ways we’ve never been brighter.”

"Creating a technological backdoor just for good guys is technologically stupid," said Rep. Ted Lieu (D-Calif.), a Stanford University computer science graduate. "That's just stupid."

Lieu blamed the NSA's vast surveillance apparatus, saying the agency "violated the Fourth Amendment rights of every American for years" and has caused a vast public reaction.

"Our founders understood that an Orwellian overreaching government is one of the most dangerous things this world could have," Lieu said.

Apr 30 06:41

If You Encrypt Your Cellphone the Terrorists Win

If you value privacy and want to encrypt your cellphone to keep hackers and other snoops from rifling through your personal business then you are aiding terrorists. At least that's what the top prosecutor in New York City said recently when discussing new encryption software released by Apple and Google that is specifically for the operating systems on cellphones.

Webmaster's Commentary: 

Terrorism isn't a threat to the nation. Government stealing of our business secrets is. So are the police, who murder 55 times as many innocent Americans as the terrorists do!

Apr 29 15:49

FBI’s Proposals for Mandatory Tech Security ‘Back Doors’ Is Slammed by Bipartisan Committee

An FBI proposal to force companies to provide law enforcement with so-called back doors into consumer phones and computers would be like “drilling a hole in a windshield,” said Rep. Jason Chaffetz, R-Utah, chairman of the U.S. Committee on Oversight and Government Reform. Rep. Ted Lieu, D-Calif., called the proposal “stupid” and said law enforcement should “just follow the damn Constitution.”

Apr 29 12:44

German govt accused of lying to parliament about NSA spying

Angela Merkel’s government has been accused of lying to the country’s parliament after it was alleged that it knew German spies were conducting economic espionage for the NSA. Revelations show that some spooks were even spying on German companies.

Apr 29 11:02

Fight Over Domestic Spying Heats Up in Congress with 'USA Freedom Act'

A bipartisan bill, designed to rein in the bulk collection of the private communications of American citizens, was introduced Tuesday by members of the House and Senate Judiciary Committees, ahead of an upcoming expiration date for key Patriot Act provisions that have given legal authority to some of the most controversial domestic surveillance practices revealed over the last two years.

Apr 29 09:44

THIS HACKER HAS IMPLANTED A CHIP IN HIS BODY TO EXPLOIT YOUR ANDROID PHONE

Plenty of people these days are prepared to augment their bodies with face furniture, piercings, rings and tattoos. But would you implant a chip in your hand to show how easy it is to exploit an Android phone? That’s what former US navy petty officer Seth Wahle did, in an attempt to demonstrate how business networks could be compromised.

Apr 29 08:56

Opposition amassing to ‘outdated and unsound’ trade policies

With dissent fermenting on both sides of the political aisle, more than 2,000 civil society groups are urging Congress to reject Fast Track trade authority, warning that the legislation would pave the way for approval of the Trans-Pacific Partnership (TPP), the 12-nation proposal they say “replicates and expands on the most damaging provisions of past U.S. trade pacts.”

Apr 29 08:55

Tattoos may stop Apple Watch from working

Tattooed wrists can prevent the Apple Watch's heart rate sensor from functioning properly, according to some customers.

Apr 29 08:32

An iPad glitch grounded several dozen American Airlines planes

American Airlines flights experienced significant delays this evening after pilots’ iPads—which the airline uses to distribute flight plans and other information to the crew—abruptly crashed. “Several dozen” flights were affected by the outage, according to a spokesperson for the airline.

“The pilot told us when they were getting ready to take off, the iPad screens went blank, both for the captain and copilot, so they didn’t have the flight plan,” Toni Jacaruso, a passenger on American flight #1654 from Dallas to Austin, told Quartz.

“The pilot came on and said that his first mate’s iPad powered down unexpectedly, and his had too, and that the entire 737 fleet on American had experienced the same behavior,” said passenger Philip McRell, who was also on flight #1654. “It seemed unprecedented and very unfamiliar to the pilots.”

Apr 29 08:29

Federal Government Ordered to Explain Why it Needs a Cell Phone Kill Switch

Monday is the court-ordered deadline for the government to explain a secretive policy that allows it to use a “kill switch” on cell phone service among the population. The policy, adopted by the Department of Homeland Security in 2005, is called Standard Operating Procedure 303.

Apr 28 21:57

Who Hacked the White House? The Russia-haters are sure they know

Not a shred of evidence is given as to the identity or nationality of the hackers except the assertions of anonymous government officials. We have to wait until the seventh paragraph to read that they “are presumed to be linked to the Russian government, if not working for it.”

Apr 28 15:31

Twitter in meltdown: Stock tumbles 18% after disappointing figures accidentally released early in online gaffe

Twitter's stock is falling sharply after the company's earnings, which were due to be released after the stock market closes, accidentally came out ahead of time.

Trading in its stock was halted Tuesday afternoon after word spread of the premature earnings release.

Twitter said it has informed the stock exchange, and was 'investigating the leak'.

Apr 28 14:57

AT&T Bills 83 Year Old $24,298 for AOL Dial Up

An 83-year-old Los Angeles man claims that AT&T charged him $24,298 -- for using his AT&T landline to access AOL service. According to the Los Angeles Times, Ron Dorff is one of 2.2 million users that still pay for AOL dial-up service. Dorff historically accesses the service via an AT&T landline, which he pays $51 a month for.

Out of the blue, Dorff was socked with a $8,596.57 bill, then a $15,687.64 charge, at which point he navigates the usual gauntlet of "right hand, meet left hand" phone support and technician no shows.

Though the Times article is murky on this point, the 83-year-old's modem was apparently misconfigured to dial a long distance number, racking up massive charges while the elderly man remained online.

Apr 28 09:50

Macau authorities deny CIA tried to assassinate Snowden

Authorities in the Chinese region of Macau have denied news reports that Chinese Special Forces averted an attempt by the United States Central Intelligence Agency to kill or capture American defector Edward Snowden. The reports were initially published on March 8 on the website of China News Service, China’s second-largest state-owned news agency after Xinhua. The news agency, which serves China’s Special Administrative Regions of Hong Kong and Macau, said that a secretive unit of the Chinese People’s Liberation Army held a private function to celebrate its success against an alleged attempt by the CIA to kill Snowden. The American former computer expert worked for the CIA and the National Security Agency before defecting to Russia in the summer of 2013. Prior to arriving in Russia, however, Snowden first sought refuge in Hong Kong, where he stayed until June 23.

Apr 28 08:17

Android apps still suffer game-over HTTPS defects 7 months later

More than seven months after being flagged as vulnerable, more than a dozen Android apps collectively downloaded at least 350 million times still contain fatal HTTPS flaws that cause them to leak passwords, phone numbers, and other highly sensitive user data, student researchers at City College of San Francisco found.

Apr 27 20:47

Germanwings Computer Caused Crash? Michael Rivero

Apr 27 18:13

New Spy Tech to Watch: Automated Vehicle Occupancy Detection

By Dave Maas

Journalists and transparency activists across the country have done a phenomenal job of shining light on how local law enforcement agencies use emerging technologies to surveil everyday people on a massive scale. It’s often like playing Whac-A-Mole and Go Fish at the same time.

One day, the question may be whether police are using drones. The next, automatic license plate readers. After that, facial recognition or IMSI catchers (i.e. Stingrays) or Rapid DNA analyzers.

So many technical terms, so many acronyms. Unfortunately, we need to put yet another one on your radar: Automated Vehicle Occupancy Detection, also known as Automated Vehicle Passenger Detection or Automated Vehicle Occupancy Verification...

Apr 27 15:28

BYPASSING OS X SECURITY TOOLS IS TRIVIAL, RESEARCHER SAYS

For years, Apple has enjoyed a pretty good reputation among users for the security of its products. That halo has been enhanced by the addition of new security features such as Gatekeeper and XProtect to OS X recently, but one researcher said that all of those protections are simple to bypass and gaining persistence on a Mac as an attacker isn’t much of a challenge at all.

Gatekeeper is one of the key technologies that Apple uses to prevent malware from running on OS X machines. It gives users the ability to restrict which applications can run on their machines by choosiing to only allow apps from the Mac App Store. With that setting in play, only signed, legitimate apps should be able to run on the machine. But Patrick Wardle, director of research at Synack, said that getting around that restriction is trivial.

Apr 27 15:25

London Metropolitan Police still uses 35,000 Windows XP computers

Today, the Metropolitan Police Force illustrated just how integral Windows XP still is to many workplace IT systems. Responding to a Freedom of Information Request issued by technology news site Motherboard, the Force said: "We have currently got 35,640 Desktop and Laptop computers running Windows XP across all departments [within the force]."

The force has not yet responded to follow-up questions from Motherboard and has not issued any expected date for when it will stop using XP. In the meantime, the systems are vulnerable to un-patched security loopholes and can be more easily exploited by attackers than newer, generally-supported operating systems like Windows 7 and Windows 8.1.

Apr 27 15:21

Apple Bans Fart Apps From the Apple Watch

Apple is pitching the Apple Watch as a time-saver, a fitness companion and a stylish fashion accessory. But it could also be a pretty great office prank tool, if the makers of the “Fart Watch” app had their way.

Essentially, the app turns the Apple Watch and a paired up iPhone into a whoopie cushion for the 21st century. Place the iPhone near your intended target, wait for the opportune moment, then tap the Apple Watch app to release fake flatulence at will.

But unfortunately for the Fart Watch developers, Apple doesn’t see this all as one big gas.

Apr 27 14:11

The Mark: Will you wear this “beast tech” digital tattoo that can read your mind and operate your devices?

Over the next several years we’ll begin to see advanced bio-technologies hit the retail market. According to Tom Horn, author of On the Path of the Immortals, this Beast Tech could lead to the eventual extinction of the human race as we know it today.

Apr 27 10:27

House passes cybersecurity bill that threatens privacy without clear security benefits

The bill was drafted in response to data breaches at Target, Sony Pictures, and countless other companies. Instead of handling any threats themselves, the bill would require companies to band together and work with the government as part of a renewed effort to protect United States companies from cyberattacks.

Yet the bill’s critics fear that it’s merely a guise for the government’s efforts to preserve — and, indeed, expand — its surveillance efforts more than a year after National Security Agency programs were first revealed to the public. As Wired explains in its report on the bill receiving the House’s overwhelming support:

Webmaster's Commentary: 

This bill is not about making Americans more secure from violence or harm; it is about making government surveillance deeper and more intrusive in our daily lives.

Apr 27 10:27

House passes cybersecurity bill that threatens privacy without clear security benefits

The bill was drafted in response to data breaches at Target, Sony Pictures, and countless other companies. Instead of handling any threats themselves, the bill would require companies to band together and work with the government as part of a renewed effort to protect United States companies from cyberattacks.

Yet the bill’s critics fear that it’s merely a guise for the government’s efforts to preserve — and, indeed, expand — its surveillance efforts more than a year after National Security Agency programs were first revealed to the public. As Wired explains in its report on the bill receiving the House’s overwhelming support:

Webmaster's Commentary: 

This bill is not about making Americans more secure from violence or harm; it is about making government surveillance deeper and more intrusive in our daily lives.

Apr 27 09:27

House passes cybersecurity bill that threatens privacy without clear security benefits

The Protect Cyber Networks Act, a bill that would require companies to share threat information with the government, passed the House with a 307-116 vote on Wednesday. It will now head to the Senate, where it’s expected to pass despite widespread criticism of the bill’s ramifications and lack of clear benefits.

The bill was drafted in response to data breaches at Target, Sony Pictures, and countless other companies. Instead of handling any threats themselves, the bill would require companies to band together and work with the government as part of a renewed effort to protect United States companies from cyberattacks.

Apr 27 09:20

US Police Departments Using “Spy Rocks” to Spy on Citizens Now (Yes. That’s right. Spy rocks.)

Yes. Exactly as it sounds.

Spy rocks.

Fake rocks with tiny cameras inside.

If it sounds like a lame episode of Inspector Gadget, that’s because it is like that, only this is real life, modern day Surveillance State USA.

Apr 27 08:46

How to Delete Everything That Google Knows About You

Still want to get rid of your search history? Here’s how:

Apr 27 08:20

Game of Thrones Piracy Surges to New High

---- > AS HBO broke ratings records.

Apr 27 08:12

What's the Big Deal About 3D Printing?

By Brian Berletic

3D printing surely catches people's attention. During a recent 3D printing event at the Paragon in Bangkok, Thailand, people passing by of all ages couldn't help but take a closer look at the various types of 3D printers constructing entire objects, layer by layer and inspecting objects already printed out beforehand. Children couldn't help but to play with them, and adults couldn't help but wonder how this exciting technology could help them with their respective professions.

3D printing, in its current form, helps most with prototyping and customization...

Apr 27 08:10

When Google errs: A cautionary tale of great power

3Comments
0
inShare3

The web runs on Google search and woe unto any website when Google makes a mistake and thinks your site has done something wrong. This story is a personal tale of woe and my own plea for help.
What's Hot on ZDNet

Turn your iPhone or Android smartphone into a satellite phone
Windows 10 build 10061 under the microscope: Can Microsoft hit its summer launch deadline?
?Nokia denies plans to re-enter consumer phone market
5 laptop stands to help improve ergonomics

Apr 27 07:58

NSA Gadget Transfer Program Turning Local Cops into Spies

By Activist Post

With the media spotlight shining on police militarization, most Americans know something about the federal 1033 transfer program that enables police departments to get military equipment like armored vehicles, high power weapons, grenade launchers, and even bayonets. But most Americans don't realize that local law enforcement agencies can also acquire spy gear from the feds.

The NSA transfers electronic gadgets to a variety of agencies including local law enforcement, and it is as simple as catalog shopping...

Apr 27 07:18

OBAMA ADMINISTRATION RELEASES HEAVILY CENSORED VERSION OF 6-YEAR-OLD SECRET REPORT CASTING DOUBT ON LEGALITY AND EFFECTIVENESS OF BUSH’S WARRANTLESS SPYING

After the terrorist attacks of September 11, 2001, the George W. Bush administration ordered the National Security Agency (NSA) to ignore the Foreign Intelligence Surveillance Act of 1978 by beginning the secret warrantless surveillance of international phone calls, emails and data without going through the Judicial Branch of government. This surveillance evolved into a program called Stellarwind. Now, newly declassified documents show that the data obtained from Stellarwind was so secret that it was not useful in tracking terrorists.

Apr 27 07:13

Who Hacked the White House?

When the hacking of Sony’s computer system produced a brouhaha of ridiculous proportions, the government’s pet “experts” were quick to blame North Korea. The rationale: Since Sony was releasing a pretty awful anti-North Korean propaganda film, it was only obvious that King Jong-un was personally responsible. Besides that, the attack supposedly originated in a region of cyberspace inhabited by North Korea’s pathetic Internet superstructure.

Apr 26 21:18

Russian Hackers Have Found Access To Personal E-Mail Barack Obama

WASHINGTON — Some of President Obama’s email correspondence was cleared up by Russian programmers a year ago in a rupture of the White House’s unclassified PC framework that was much more nosy and troubling than has been freely recognized, by American authorities informed on the examination.

http://whatisusa.info/russian-hackers-have-found-access-to-personal-e-...

Apr 26 14:21

Toyota's killer firmware: Bad design and its consequences

Embedded software used to be low-level code we'd bang together using C or assembler. These days, even a relatively straightforward, albeit critical, task like throttle control is likely to use a sophisticated RTOS and tens of thousands of lines of code.

With all this sophistication, standards and practices for design, coding, and testing become paramount – especially when the function involved is safety-critical. Failure is not an option. It is something to be contained and benign.

So what happens when an automaker decides to wing it and play by their own rules? To disregard the rigorous standards, best practices, and checks and balances required of such software (and hardware) design? People are killed, reputations ruined, and billions of dollars are paid out. That's what happens. Here's the story of some software that arguably never should have been.

Apr 26 11:46

To help spread its message, the NSA has produced a coloring book. You know, for kids

While I wasn’t able to score any government-issue school supplies, and none of the representatives could tell me if the NSA was still operating out of the hermetic former AT&T fiber optic hub down the street at 2nd and Folsom, I did walk away with a copy of the “CryptoKids Fun Book”, images from which you can see below.

Which anthropomorphic Myers-Briggs Type crypto-kid are you? I’m Decipher Dog, always looking for “the hidden messages behind the words, symbols and sounds,” and reading the latest robot news in Cryptobyte Monthly. That said, I don’t condone Dog’s habit of wearing shoes in bed and looking at kitty porn on his laptop. You bad dog you.

Apr 26 08:06

Declassified Report Shows Doubts About Value of N.S.A.’s Warrantless Spying

The secrecy surrounding the National Security Agency’s post-9/11 warrantless surveillance and bulk data collection program hampered its effectiveness, and many members of the intelligence community later struggled to identify any specific terrorist attacks it thwarted, a newly declassified document shows.

Webmaster's Commentary: 

So, the US Government violated the Constitution, spied on law abiding citizens, drooled over stolen naked pictures of our wives and girlfriends, helped themselves to our business secrets, spent a huge amount of money, made out computer systems more vulnerable under the claim of making us more secure ... and utterly failed to find and stop any terrorists.

Yeah; that's the quality work we have come to expect from the bozos in DC!

Let's be honest. While the contractors for this boondoggle have made billions of dollars, the system failed and it failed for precisely the reason I said it would fail.

1. People lie on social media, which means social media is not a source of reliable hard intelligence. No real criminals or terrorists use social media because is is social! Discussing an act of terror on Facebook makes as much sense as discussing a robbery while having lunch in a restaurant. It is a given others will be listening in.

2. Real criminals and terrorists, if they use telecommunications at all, will develop their own encryption systems, which as we demonstrated, will be unbreakable to the NSA.

So the reason the NSA system never found any real terrorists is that it wasn't supposed to. The NSA is watching YOU, for the US Government, which is afraid that you no longer naively trust them, that you will not do what you are told to do, not believe what you are told to believe, will refuse to pay the money you are told to pay, refuse to let your children be killed and crippled in wars when told to do so, and worse, might decide, as our forebears did in 1776, to give this abusive government and it's slave-system of private central banking the old heave ho!

Apr 25 17:13

NSA spied on EU politicians and companies with help from German intelligence

Germany's intelligence service, the Bundesnachrichtendienst (BND), has been helping the NSA spy on European politicians and companies for years, according to the German news magazine Der Spiegel.

Apr 25 17:09

Declassified Report Shows Doubts About Value of N.S.A.’s Warrantless Spying

The secrecy surrounding the National Security Agency’s post-9/11 warrantless surveillance and bulk data collection program hampered its effectiveness, and many members of the intelligence community later struggled to identify any specific terrorist attacks it thwarted, a newly declassified document shows.

The document is a lengthy report on a once secret N.S.A. program code-named Stellarwind. The report was a joint project in 2009 by inspectors general for five intelligence and law enforcement agencies, and it was withheld from the public at the time, although a short, unclassified version was made public. The government released a redacted version of the full report to The New York Times on Friday evening in response to a Freedom of Information Act lawsuit.

Apr 25 15:57

65 Business Tesla Motors’ Twitter Account Was Hacked

Tesla Motors Inc. ’s official Twitter account was hacked on Saturday around 4:50 p.m. New York time by a person or people who identified themselves as the #ripprgang.

Over about a 10-minute period, the hacker sent out 11 tweets, mostly tagging other people and advertising a “free Tesla” if people called a number that routes to a computer repair shop in Oswego, Ill.

Tesla locked down the account quickly. The account stopped sending out tweets at around 5 p.m.

It is not uncommon for Twitter accounts to be hacked. Twitter’s own chief financial officer, along with Burger King and even U.S. military accounts have briefly been taken over by pranksters.

Apr 25 07:40

Obama Moves Forward With TPP Despite Democratic Objections

"Democrats' frustration with President Barack Obama's trade agenda bubbled over Thursday, with key opponents accusing their party's leader of putting more effort into a bid to aid corporate America than anything he's done for the middle class.

Calling it "maddening," Sen. Sherrod Brown (D-Ohio) told reporters that the Obama administration was putting on a full-court press unlike anything Democrats have ever seen in his presidency in order to win the authority to fast track enormous trade deals."*

Apr 25 06:43

Windows PCs vulnerable to Stuxnet attack — five years after patch

Microsoft released a patch for Stuxnet, MS10-046, by the end of August — but according to HP’s Zero Day Initiative, that patch had serious holes in it. Attackers were more than capable of reverse-engineering that patch and finding these loopholes, then crafting solutions that dodged Microsoft’s own security efforts. The virus lived on in any case, eventually making it aboard the International Space Station.

HP doesn’t pull its punches in its blog post, noting that “The patch failed. And for more than four years, all Windows systems have been vulnerable to exactly the same attack that Stuxnet used for initial deployment.” Microsoft’s new update, MS15-020, is supposed to seal the gaps left open five years ago, though further analysis will be needed to tell if that’s the case.

Apr 24 13:11

Maui Foreclosures Allowed by Judge Peter T. Cahill Without Proof of Standing or HRS §667-17 Compliance.

Friday, April 17, 2015

KingCast and Mortgage Movies Present: Trouble in Paradise -- Maui Foreclosures Allowed by Judge Peter T. Cahill Without Proof of Standing or HRS §667-17 Compliance.

24 April 2014 -- First video coming today. Wells Fargo responded after I outed them and counsel for reading my email with proof that all of them had read my inquiry but had not yet responded. Query, what percentage of the homes valued over $500K received a loan mod.... when the stakes get high the banksters for the the gold.

Hello Mr. King,

Apr 24 09:28

Miami's ''HunchLab" is Latest Police Move Toward Pre-Crime Detection

By Nicholas West

Even mainstream media has started to compare emerging police technologies to science fiction. The problem is that it can't be called fiction if it's actually happening. Hence the Miami Herald's headline, "Not science fiction: Miami wants to predict when and where crime will occur."

Pre-crime Internet systems already continuously scour and collect data for potentially incriminating patterns. And, as you'll read, these systems are trickling down to America from war zones overseas...

Apr 24 09:08

Boehner Opens Door to House Subpoena of Clinton's E-mail Server

In his ceremonial office in the Capitol building, the speaker flared with outrage at Clinton’s conduct, asserting she broke the law by failing to use a government e-mail account as secretary of state.

Apr 24 08:37

Megasquirt - Open Source Software for Cars

MegaSquirt® EFI controllers are for experimental and educational purposes. No warranties are expressed or implied. Neither Al Grippo nor Bruce Bowling are responsible for the construction, installation, or targeted use of this unit. This unit has been tested on many engines, however, it is an experimental unit and the end-user assumes all responsibilities for its use and application. Do not use in an aircraft which, if the unit fails or ceases to operate properly, can fall out of the sky. Do not use on a boat where, if there is a failure, results in a situation where the vessel is stuck in a hurricane and sinks to the bottom of the ocean. In other words, follow the manual carefully, and seek authoritative help if you have questions. This FAQ, our manual, and our forums are solely for the support of MegaSquirt® boards by Bowling and Grippo.

Webmaster's Commentary: 

It is against the law for owners of modern cars to peek inside the electronics as the software is protected under the Digital Millennium Copyright Act in theory to protect the software from being stolen and in fact to prevent car owners from finding and disabling government-mandated spyware and remote control. Now major car manufacturers are trying to move one step further and make it a crime for car (and tractor) owners to work on their own vehicles at all! Talk about dictatorship!

So it was inevitable that we would see the birth of an open-source system for car owners in which you simply toss the DMCA-protected, malware-infested, locked-against-the-ownet controller in the trash bin and install one that you can play with to your hearts content.

Apr 24 08:23

THE TRANS-PACIFIC PARTNERSHIP AND THE DEATH OF THE REPUBLIC

A republican form of government is one in which power resides in elected officials representing the citizens, and government leaders exercise power according to the rule of law. In The Federalist Papers, James Madison defined a republic as “a government which derives all its powers directly or indirectly from the great body of the people . . . .” On April 22, 2015, the Senate Finance Committee approved a bill to fast-track the Trans-Pacific Partnership (TPP), a massive trade agreement that would override our republican form of government and hand judicial and legislative authority to a foreign three-person panel of corporate lawyers.

Apr 24 04:46

WE CAN’T LET JOHN DEERE DESTROY THE VERY IDEA OF OWNERSHIP

IT’S OFFICIAL: JOHN Deere and General Motors want to eviscerate the notion of ownership. Sure, we pay for their vehicles. But we don’t own them. Not according to their corporate lawyers, anyway. In a particularly spectacular display of corporate delusion, John Deere—the world’s largest agricultural machinery maker —told the Copyright Office that farmers don’t own their tractors. Because computer code snakes through the DNA of modern tractors, farmers receive “an implied license for the life of the vehicle to operate the vehicle.”

Apr 24 04:25

For Facebook users...

Apr 24 03:56

Spying from Inside: Nano-Robotics And The Invasion of Privacy

The National health Federation was the first to alert the public and the health-freedom community about “the need for a Constitution for the Race of Mankind,” because of the invasion of privacy and increased vulnerability to outside control of internal bodily processes via monitoring by healthcare professionals.

“Science is a double-edged sword; it creates as many problems as it solves, but always on a higher level.”

Apr 23 22:07

Carter: Russian hackers hacked Pentagon's network

The Pentagon says that one of its networks was hacked by Russian hackers earlier this year, calling the breach “worrisome”.

Apr 23 20:19

Potent, in-the-wild exploits imperil customers of 100,000 e-commerce sites

Criminals are exploiting an extremely critical vulnerability found on almost 100,000 e-commerce websites in a wave of attacks that puts the personal information for millions of people at risk of theft.

The remote code-execution hole resides in the community and enterprise editions of Magento, the Internet's No. 1 content management system for e-commerce sites. Engineers from eBay, which owns the e-commerce platform, released a patch in February that closes the vulnerability, but as of earlier this week, more than 98,000 online merchants still hadn't installed it, according to researchers with Byte, a Netherlands-based company that hosts Magento-using websites.

Apr 23 14:23

Facebook DOES collect the text you decided against posting

Ever written out a status update or comment but decided against posting it? One techie has discovered Facebook collects this content, despite the company's claims to the contrary

Apr 23 14:04

'Spectacularly Good News for Consumers' as Comcast/TWC Mega-Merger Fails

Despite a ferocious lobbying effort trying to get federal approval for such a deal since last year, cable giant Comcast is planning to drop its highly-contested bid to merge with its largest competitor Time-Warner.

Apr 23 11:43

Head Transplant Doctor: Creating Immortality Is the Goal

The Italian doctor who has claimed that he could transplant a man’s head onto a donor’s body has said that he could do much of the procedure in less than an hour. The procedure — which Canavero has admitted is just a first step towards his ultimate aim of creating immortality — will see a man’s head removed and placed on a donor’s body.

Apr 23 09:44

And Now… “How Tor Is Building a New Dark Net with Help from the U.S. Military”

The funding, which began in 2014, comes as part of DARPA’s Memex project, a “groundbreaking” search engine designed to best commercial titans like Google at searching the Deep Web and other oft-ignored terrain for the U.S. intelligence, law enforcement, and military. To build Memex, DARPA is partnered with universities like Carnegie Mellon, NASA, private research firms, and several Tor Project developers.

Apr 23 09:09

House Passes Cybersecurity Bill Despite Privacy Protests

Congress is hellbent on passing a cybersecurity bill that can stop the wave of hacker breaches hitting American corporations. And they’re not letting the protests of a few dozen privacy and civil liberties organizations get in their way. On Wednesday the House of Representatives voted 307-116 to pass the Protecting Cyber Networks Act, a bill designed to allow more fluid sharing of cybersecurity threat data between corporations and government agencies. That new system for sharing information is designed to act as a real-time immune system against hacker attacks, allowing companies to warn one another via government intermediaries about the tools and techniques of advanced hackers. But privacy critics say it also threatens to open up a new backchannel for surveillance of American citizens, in some cases granting the same companies legal immunity to share their users’ private data with government agencies that include the NSA.

Apr 23 08:52

McConnell Introduces Bill to Reauthorize Patriot Act Until 2020

Senate Majority Leader Mitch McConnell introduced a bill Tuesday night that would reauthorize a controversial surveillance authority of the Patriot Act until 2020, a push that comes just as a group of bipartisan lawmakers is preparing a last-minute push to rein in the government's mass-spying powers.

Apr 23 08:51

The THREATS posed by the TPP and the TTIP. You Can Act!

Apr 23 07:38

Guy Trading at Home Caused the Flash Crash

The point of this -- according to the federal prosecutors, the Federal Bureau of Investigation and the Commodity Futures Trading Commission, who are not happy with Sarao -- is that by placing all these fake sell orders, Sarao would artificially drive down the price of the E-mini futures. It's classic spoofing: He'd place a lot of big orders to sell, everyone else would say, "Ooh look at all those big sell orders, I'd better sell too," they'd sell, the market would go down, he'd buy, he'd turn off his algorithm, everyone else would say, "Oh hey never mind, things are great again, there are no more big sell orders," they'd buy, the price would go back up, and Sarao would sell the futures he'd bought at a lower price a moment ago.

Apr 23 06:55

Is the online surveillance of black teenagers the new stop-and-frisk?

Critics say the NYPD’s trawling of social media for gang activity – affecting children as young as 10 – is disproportionate and may amount to racial profiling Taylonn Murphy is sitting in a Harlem beauty salon after hours.

Apr 22 21:54

The Lesson of Hacking Team’s Malware - Mass Surveillance Is Driven By The Private Sector

Yet another report has surfaced describing how tools created by the malware-industrial complex are being deployed by U.S. security services. While the coverage surrounding this story focuses primarily on federal agencies it’s important to step back for a moment and view the big picture. In particular, looking at who builds, operates, and profits from mass surveillance technology offers insight into the nature of the global panopticon.

Apr 22 13:31

Patriot Act Gets New Lease on Life From McConnell Bill

Sen. McConnell's legislation "to extend authority relating to roving surveillance, access to business records, and individual terrorists as agents of foreign powers under the Foreign Intelligence Surveillance Act of 1978..." isn't yet formally on the Senate calendar, but that shouldn't be too much of an obstacle for McConnell. He intends to "bypass the traditional committee process," according to Dustin Volz at National Journal.

McConnell is a long-time fan of the surveillance state.

Apr 22 10:50

Grant Shapps accused of editing his Conservative rivals' Wikipedia pages and deleting references to his embarrassing past

Tory party chairman Grant Shapps has been accused of editing the Wikipedia pages of his Conservative rivals and allegedly changing his own page to delete embarrassing references to his past.

A user claiming to be a Wikipedia administrator reported and suspended an account on suspicion it was being used by Mr Shapps or “someone acting on his behalf”.

Apr 22 10:26

The Coming ''Brain Chip''

By Brandon Turbeville

Interestingly, a 2007 clip from NBC News has, for some reason, been making the rounds on the Internet once again as if it were being broadcast for the first time. This clip and the accompanying commentary has served to galvanize those reading and listening to it into one of two camps: one that is subject to overhype, “clickbait” titles and panic; and another that is firmly entrenched in the American sheep class for whom no bad news or reports of malfeasance is real or anything other than a conspiracy theory.

This is because the NBC clip is an issue that would affect each and every individual in the country on a deeply personal level. Entitled, “The Year 2017,” the report predicts a near future in which every American will be microchipped by the year 2017...

Let's look at the deeper history...

Apr 22 09:47

Frustrated man charged by police after shooting his uncooperative computer

Police in Colorado have cited a 37-year-old man for carrying his computer into an alley then shooting it eight times with a handgun after what authorities said had been a long battle with the uncooperative machine.

Apr 22 09:12

Congress About to Pass All The Horrible Spying/Anti-Internet Bills We Defeated Before

After we the people – web users and just plain folks – killed SOPA and CISPA, Congress has just renamed them and is about to pass them under the radar …

Wake up, Internet … THERE’S STILL TIME TO STOP THIS FASCIST MOVE!

Apr 22 09:09

Congress Can't Even Get Its Own Cybersecurity Right, So Why Should We Let It Define Everyone Else's?

Timm also reminds us how Congress used to have an Office of Technology Assessment, a non-partisan organization that advised Congress on technology issues from 1972 until 1995. That's when Newt Gingrich defunded it. An effort last year by Rush Holt to bring it back was overwhelmingly rejected, suggesting that Congress wants to remain ignorant, even as it has to make laws on this stuff.

At least it appears that more Congressional reps are finally figuring out how to use HTTPS -- with 214 members now at least supporting HTTPS, if only 76 default to it. That's not everything they need to know about cybersecurity, but it at least starts the conversation. Though it seems notable that no Senate site does. It really seems that if Congress wants to write laws about cybersecurity, it should first be required to get its own online security straight first.

Apr 22 08:01

Google pulls plug on YouTube for older iPads, iPhones, smart TVs

The devices that will be locked out of the streaming service include pre-2013 TVs and Blu-Ray players by Panasonic and Sony. But a surprising number of other, even "smarter" devices will no longer work, either, including many from Apple.

Any device not running iOS 7 or above won't support the new API – meaning the iPhone 3GS and earlier, the fourth-generation iPod Touch and earlier, the first-generation iPad, and the second-generation Apple TV are all shut out.

The Chocolate Factory's move will even cut off YouTube access for versions 2 and earlier of its own Google TV platform, presumably because it would like to shift customers toward the newer Android TV, which replaces it.

Apr 22 07:55

Security Flaw Lets Attackers Crash Any iPhone or iPad Within Wi-Fi Range

At the RSA security conference in San Francisco today, researchers from security firm Skycure presented ‘No iOS Zone’, a vulnerability that would let attackers crash any iOS device within range of a WiFi hotspot — whether you deliberately connect or not. Gulp.

The vulnerability takes advantage of a bug in iOS 8: namely, that by manipulating SSL certificates sent to iOS devices over a network — certificates used in virtually every app, and in iOS itself — the researchers could make iOS devices crash, in the worst-case scenario putting them into a constant boot-loop.

Apr 22 07:52

Our Response To Sony Sending Us A Threat Letter For Reporting On The Company's Leaked Emails

Yesterday we wrote about how Sony's high-powered lawyer on retainer, David Boies, had apparently been sending major media properties an idiotic letter warning them not to report on the leaked Sony hack emails. And then, what did we find in our mail on Monday afternoon? A copy of the same damn letter of our very own. How thoughtful of David Boies to send us a personally signed copy. I've asked my staff to frame it and hang it on the wall. I hope that he's charging Sony top dollar to send us a letter we'd already mocked as ridiculous, wrong on the law and pointless.

Anyway, given that we've now personally received our own copy, I feel semi-obligated to respond -- and to respond in public.

So, David, Leah and Sony Corp. -- our official response is: go pound sand.

Apr 22 07:50

Google Changes Search Results To Favour Mobile-Friendly Sites

Google changes its search algorithm

Google Inc. is patching up its inquiry administration to support sites that are custom-made to cell phones.

http://whatisusa.info/google-will-favor-websites-tailored-to-mobile/

Apr 22 07:50

European Rights Body Again Rejects Mass Surveillance

Europe’s top rights body, the Parliamentary Assembly of the Council of Europe (PACE), has crystalized its censure of mass surveillance as a threat to fundamental human rights and to democracy itself by adopting a draft resolution in which it reiterates deep concerns over the practice of intelligence agencies systematically harvesting untargeted communications data, without adequate legal regulation or technical protection.

“Mass surveillance does not appear to have contributed to the prevention of terrorist attacks, contrary to earlier assertions made by senior intelligence officials. Instead, resources that might prevent attacks are diverted to mass surveillance, leaving potentially dangerous persons free to act,” PACE warned yesterday.

“These powerful structures risk escaping democratic control and accountability and they threaten the free and open character of our societies,” it added.

Apr 22 07:47

Homeland Security Secretary Begs Silicon Valley to Stop the Encryption

Broadly speaking, these are all efforts aimed at getting private industry to share critical information about infosec threats with the government. So this new DHS outpost is part of a much larger agenda to bring Silicon Valley companies into the national security fold.

Johnson also emphasized that DHS has a specific agenda, which is to push back on the call for encryption that’s come from many tech companies, including Yahoo and Google.

Johnson asked the audience at RSA to help the government have more access to unencrypted data to help them stop threats to our digital infrastructure.

WWEBMASTER ADDITION
-----BEGIN PGP MESSAGE-----
Version: BCPG v1.47

hI4DROGyHfwQM84QAfoDgte4mRf44pZoH7U8mylmabkMfej2cAjcSdJzd1NaWdSZ
6OHcuBgUo7E4Z/9OvRcUdLvn8zSNqOHRGAC2JrQ0AgCJnKuTuKvOs0T7WNXgcDB7
ygWA7y+4cJ5g0UCD6NoWRbP3pTmuZ1F1BNxgvUzl8/1q5gmm/6BhlJJYP1pmRRB5
0m4ByyKp96lisP4qFDU8Y5xgzI7hPAG2KYUdG1sXbKQujODic6iNiXvrgjUzRIhx

Apr 22 07:29

TECHNO FASCISM: DHS TO OPEN UP SHOP IN SILICON VALLEY

The Department of Homeland Security is setting up shop in Google's territory. DHS is close to opening a branch in Silicon Valley to help tighten the tech industry's computer security -- and conscript its top talent, the department's top official announced Tuesday. The move is part of a larger attempt to build a bridge between West Coast Web giants and the government, after 2013 revelations of online surveillance soured many in the industry on the concept of public-private partnerships.

Apr 22 07:01

CIA-BACKED COMPANY MAY BE READING YOUR FACEBOOK CHATS

While sending a web link over Facebook Chat, a group of app developers noticed a curious amount of activity. Pulling at the thread, they discovered a mysterious company known as Recorded Future, and a potential CIA conspiracy. Facebook Chat seems innocuous enough. So thought Bosnadev, a group of coders and bloggers, when they used the communication program to send a link. But something seemed amiss.

SHARE THIS ARTICLE WITH YOUR SOCIAL MEDIA