Oct 20 15:41

Survival Basics: Prepping for An Unexpected Power Outage

By Gaye Levy

You don’t have to be a prepper to realize that power outages can happen anytime, to anybody, and anywhere. Some outages are planned, some are the result of Mother Nature kicking up a storm, and some are the unexpected result of a natural or man-made crisis. More recently, the threat of a cyber-attack or terrorist-invoked EMP has been added to the mix; and, most assuredly, if that were to happen we will be without power for an extended time.

The bottom line is this: the delicacy of our grid is such that nearly any disruption can cause a sudden and unexpected power outage...

Oct 20 13:46

State Department and Benghazi committee accidentally release CIA source's name in Hillary Clinton email – who turns out to be suspected mastermind behind the 1988 Lockerbie bombing

The State Department inadvertently released the name of a CIA source who is suspected of being the main plotter behind the 1988 Lockerbie, Scotland airline bombing, and the House Select Committee on Benghazi republished the mistake this week.

The CIA told Congress that the name of the alleged secret agency source was not considered by the agency to be a major secret.

The name was mentioned but then partially redacted by the State Department from an email received on Hillary Clinton's private server.

At issue is Moussa Koussa, a one-time intelligence chief for Libyan dictator Muammar Gaddafi, whose name was mentioned in an email Clinton received four years ago from her close confidant Sidney Blumenthal.

Webmaster's Commentary: 

Sooooooo ... thanks to Hillary's private email server, the "Mastermind" behind Lockerbie has been exposed as a CIA asset!

Oct 20 11:18

Agenda 21, Technocracy, and the New World Order in the Russian Federation

By Rusticus

As the alternative media as a whole seems poised to eternally sing the praises of the Russian Federation in stymieing the Anglo-American Establishment’s imperialistic aims in Syria, entrenched in analysis of the 2D Chessboard of geopolitics, this author’s contrarian nature has seen fit to call attention to the 3D Chessboard unifying these seemingly disparate nation-states.

Today’s game? Agenda 21. Its playing piece of choice? The seemingly autonomous nation of Russia...

Oct 20 09:53

Teen Who Hacked CIA Director’s Email Tells How He Did It

A hacker who claims to have broken into the AOL account of CIA Director John Brennan says he obtained access by posing as a Verizon worker to trick another employee into revealing the spy chief’s personal information.

Using information like the four digits of Brennan’s bank card, which Verizon easily relinquished, the hacker and his associates were able to reset the password on Brennan’s AOL account repeatedly as the spy chief fought to regain control of it.

Webmaster's Commentary: 

Another reason to assume Hillary's private server (with weaker security than AOL) was indeed hacked and secrets stolen (or sold in exchange for "donations").

Oct 20 09:23

Edward Snowden : “The Biggest Revelations Are Yet To Come”

Edward Snowden, the NSA whistleblower who stole thousands of classified documents before leaving the United States recently made an unexpected and unscheduled appearance at a TED conference in Vancouver, Canada on Tuesday night. It was done so VIA satellite robot, where he emphasized that there is still a lot of reporting to be done.

What has come as a surprise to many, is the fact that the NSA and other intelligence organizations, as Snowden puts it, “a super national intelligence organization that doesn’t answer to the laws of its own countries,” has been spying on what seems to be the entire global population.

Webmaster's Commentary: 

Except they cannot find any real terrorists or criminals, can they?

Oct 20 09:22

UN delay could open door to robot wars, say experts

Observers say UK and US are seeking to water down agreement so that any autonomous weapons deployed before talks conclude will be beyond reach of ban

Oct 20 08:53

Obama just signed another executive order, this time declaring government control over the entire Internet

Given the increasing use of social media to organize protests and inform populations subjected to censorship, this could be a hugely valuable tool for tyrants.

Oct 20 08:31


The government of the Republic of the Congo has apparently cut access to the main internet service provider in the midst of widespread protests, according to an internet monitoring firm. Congo Telecom, or Congotel, the incumbent fixed line provider, went completely dark on Tuesday, according to Dyn, a company that monitors global internet connectivity.

Oct 20 07:37

YouTube, Please Restore Ad Revenue for Journalists Reporting on War & Political Conflicts

Oct 20 06:40

CIA boss uses AOL email – and I hacked it, claims stoner teen

A teenager claims to have hacked the CIA director's AOL email account and laid his hands on sensitive government files within.

The kid bragged he managed to trick staff at AOL parent Verizon into reseting the password to CIA boss John Brennan's personal account, allowing the youngster to hijack it.

After apparently rifling through the inbox and pulling out records on intelligence agency staffers, plus Brennan's own application for top-level security clearance, the teen started posting the sensitive information on Twitter and text-hosting websites.

Said information included what appeared to be the names, dates of birth and social security numbers of national intelligence workers, and the contents of Brennan's address book.

Oct 19 17:38

Apple pulls hundreds of apps after 'rogue' ad system that could spy on users is discovered

Apple is kicking out applications that collect personal data in violation of the company's privacy policies from its online store, the tech giant has revealed.

The iPhone maker made the announcement a day after researchers discovered hundreds of apps using Chinese advertising software that extracts 'personally identifiable user information.'

It is believed over 250 apps are affected.

Oct 19 15:02

Police attempt to whitewash viral brutality video

In the recording, uploaded to Twitter on Saturday afternoon, a police officer can be seen on top of a young African-American, punching him in the face and then using what appears to be a stun gun. The struggle is caught on camera by a passing motorist, who uploaded the clip and brought it to the attention of two prominent Black Lives Matter activists, DeRay McKesson and Shaun King. Thousands of people retweeted the clip, often using the hashtag #JusticeforVonte.

Oct 19 14:58

Victim testimonies permanently deleted by child sex abuse inquiry

Victims of alleged child sex abuse who submitted accounts through the Government's inquiry website were told their testimonies had been deleted because of a technical blunder.

Following a change in the inquiry’s website address, any submissions through an online form between 14 September and October 2 were “instantly and permanently deleted” before reaching staff.

Webmaster's Commentary: 


Oct 19 14:16

UK Politicians to Hold ‘Emergency Debate’ After Spy Tribunal Says GCHQ Permitted to Put Them Under Surveillance

A long-held “gentleman’s agreement” that GCHQ would not spy on members of Parliament (with an exigent circumstances exception, naturally) was found to be not legally-binding by the UK’s surveillance oversight tribunal.

Oct 19 14:03

3D printing used to make first real handheld railgun, which fires plasma projectiles at 560 mph

If you think the image above looks frightening, you’re right. The crazy contraption pictured in the image is the first portable railgun, a futuristic projectile launcher associated most commonly with the military or NASA. The man in the image above isn’t in the military, and he’s not a NASA engineer. Instead, he’s a civilian who used some engineering smarts, some widely available parts and a 3D printer to create a functioning weapon that can fire graphite, aluminum, tungsten and even plasma projectiles at speeds of more than 560 mph.

Oct 19 13:33

New Facebook Feature Alerts Users of State-Sponsored Cyberattacks

The new security feature issues a warning when Facebook believes that a user's devices or private accounts have been compromised by "an attacker suspected of working on behalf of a nation-state."

Webmaster's Commentary: 

Except the US, I presume!

Oct 19 11:14

For US, Limiting Unlimited Data Plans Is The New Normal

Mobile providers seem to want their subscribers to cut down on data use, but the trend shows data use is still going up.

Oct 19 09:52

Snowden: NSA, GCHQ Using Your Phone to Spy on Others (and You)

You are a tool of the state, according to NSA whistleblower Edward Snowden.

Oct 19 07:51


When you type up a racy e-mail to a loved one, do you consider the details private? Most of us would probably say yes, even though such messages often end up filtered through intelligence agencies and service providers. On the other hand, as the digital world becomes more personalized, consumers have begun to accept, appreciate and apparently requestrelevant connections between their online behavior and displayed advertisements.

Oct 18 19:04

Sacred Cow BBQ 15 Oct: Frederick C Blackburn, NSA Whistleblower

Edward Snowden only confirmed what Frederick Blackburn had been saying for more than 10 years. Why Snowden gets celebrity whistleblower status while Blackburn lived out of car for 2 years after being blacklisted is a great question.

Oct 18 17:48

Company to Blanket City Streets With WiFi Connected “Smart Pavement”

By Kevin Samson

Regardless of health concerns or privacy concerns, pervasive WiFi continues to be rolled out. One city has introduced "Smart Pavement" ...

Oct 18 13:36

Hillary Clinton LAUGHS when Jake Tapper asks her about the FBI's investigation into her emails

Hillary Clinton still gets a kick out of what rival Bernie Sanders said about her 'damn emails' at Tuesday night's debate.

She laughed about it again on Sunday when State of the Union host Jake Tapper brought it up.

But Clinton continued laughing when Tapper asked her about the FBI's investigation into her emails - opening herself up to criticism that she's making light of the ongoing scandal, which has caused her poll numbers to dip in recent months.

Oct 18 12:01

Google degenerates into Ministry of Truth; all knowledge must now be pre-approved by search algorithm

Gone are the days when you could search Google and pull up neutral, relevant content appropriate to your search query. The search engine giant is reportedly pioneering a new search algorithm that will tailor search results not based on popularity or accuracy, but rather on what Google itself deems to be truthful or untruthful.

The world's new "Ministry of Truth", Google believes that screening and censoring information requested by its users will help avoid "websites full of misinformation" from showing up at the top of the search list. Known as the "Knowledge Vault," the novel algorithm is described by The New American as "an automated and super-charged version of Google's manually compiled fact database called Knowledge Graph."

Webmaster's Commentary: 

Time to switch to Yandex!

Oct 18 07:28

NYPD won't disclose what it does with its secret military-grade X-ray vans

The $825,000 Z Backscatter Vans the NYPD drives around the city look like regular police vans, but are equipped with powerful X-rays that can see through walls and vehicles. US Customs uses these things to scan cars and freight-containers, but only after they're sure there are no people around. For more than three years, Propublica has been suing the NYPD for access to training materials and other documents explaining what the NYPD does with the vans, and even though a New York court ruled in their favor in January, the NYPD is still fighting the order in appeals court.

Oct 17 18:50

Sprint to throttle any "Unlimited" users using over 23GB a month. Claims its because its "unfair" to users with any other types of contracts.

Sprint, the nation's fourth-largest cellular carrier, announced on Friday that it will begin throttling connection speeds of unlimited data customers chewing through more than 23GB of data in a monthly billing period.

Oct 17 09:46

City to Test Infrastructure Repair With Drones and Robots

By Jason Erickson

Leeds in West Yorkshire, England is to be a test bed for a future city concept that will incorporate drones and robots to fix city infrastructure and conduct preventative maintenance.

The project "Balancing the impact of City Infrastructure Engineering on Natural systems using Robots" is funded by £4.2m of a total £21m from the Engineering Grand Challenges research put forth by the Engineering and Physical Sciences Research Council...

Oct 17 08:27

Herridge: Whistleblowers Call Out Double Standard in Hillary's Email Scandal

Webmaster's Commentary: 

This is another indication that the real scandals still hidden behind Hillary's server are so big, they could bring down the entire government. As a result, we see GOP members of Congress undermining the credibility of the Benghazi probe, The FBI complaining that Obama is interfering with their investigation, and Bernie Sanders dropping the email issue, even though it could remove his chief rival for the Democratic nomination! Not without as good reason are so many people of both parties trying to protect Hillary right now!

In politics, there are two kinds of secrets. There are the little secrets; the sex scandals, the bribes, which are the fodder for political infighting. Then there are the great secrets, secrets so terrible they would bring down the entire government, such as the truth behind the JFK assassination, the truth behind 9-11, and so forth. Sanders' dismissal of Hillary's email scandal was not done to protect Hillary herself, but to protect the government Sanders hopes to lead. Sanders knows that if pursued, the public will learn that behind the server itself lurks far larger scandals, such as government-sanctioned gun-running from Libya to ISIS and Al Qaeda in Syria (using that Consulate in Benghazi), and whether the weak private email server holding US secrets, coupled with a "charitable foundation" legally allowed to accept money from foreign sources, signals a repeat of the 1996 Clinton "China-gate" secrets-for-donations scandal!

Oct 17 08:05

U.S. Will Require Drones to Be Registered

The federal government will announce a new plan requiring anyone buying a drone to register the device with the U.S. Department of Transportation, NBC news has learned. The government has been concerned about the rise in close calls between unmanned drones and aircraft flying into and out of some of the nation’s biggest airports. The plan is expected to be announced Monday.

Oct 16 09:38

Huma on the hot seat: Hillary’s aide Abedin grilled by House Benghazi panel

Huma Abedin, former Secretary of State Hillary Rodham Clinton’s closest and longest-serving aide, arrived for a closed-door interview by the House Select Committee on Benghazi, bracing for questions about her boss’ private email account and the circumstances surrounding the deadly terror attack in Libya.

Mrs. Abedin’s closed-door session with investigators on Capitol Hill served as a prelude to Mrs. Clinton’s public testimony next week before the committee.

Oct 16 08:14


Dr James Carter warned that he had seen an “alarming increase” in the condition, which he called “text neck.”

Oct 16 06:49


Federal agents were still cataloging the classified information from Hillary Rodham Clinton’s personal email server last week when President Obama went on television and played down the matter.

Webmaster addition: Read my comment (too big to post here).

Oct 16 05:38

CNN thought control: Shilling for Clinton, deleting Facebook comments, and attempting to control your mind

In the days since the first Democratic National Debate, CNN, along with establishment pundits throughout the mainstream media, have fallen over themselves in praise for Hillary Clinton while attempting to decide for American voters who actually won the debate.

Oct 15 19:18

US global assassination campaign kills numerous unreported civilians

A former National Security Agency executive and whistleblower says the US assassination campaign has killed far more civilians than has been reported.

Thomas Drake told the Sputnik news agency on Thursday that America’s mass assassination program - that has mostly stayed in the dark over the years - has led to untold number of civilian casualties.

"We [the United States] have mass surveillance and we have a mass assassination program," Drake said. "It is two sides of the same coin."

Oct 15 18:29

Windows 10 upgrade nags become more aggressive, offer no opt-out

It seems that Microsoft is desperate to get laggards who are still running Windows 7 and Windows 8 onto Windows 10, but there's a fine line between being enthusiastic about a new operating system and behaving like you own every PC running Windows, and I think that in this case that line has been crossed.

Webmaster's Commentary: 

Hey Microsoft. I will upgrade to Windows 10 if you promise to pay for every piece of current software I own that breaks and has to be upgraded. Deal?

Do you not understand that (setting aside your partnership with an illegal and illegitimate government) that we regular folks do not have Bill Gates' kind of money and cannot simply replace all of our software applications whenever YOU feel like it!

Oct 15 17:17

UK crime rate rises as cybercrimes, fraud included in statistics

A new report suggests the crime rate in the United Kingdom has risen to more than 11.6 million offences in the one year to June 2015.

Oct 15 15:06

Richard Hanna and the GOP are handing Hillary Clinton a Benghazi hearing win before it even starts

Hillary Rodham Clinton won't appear before the House select committee tasked with investigating the deaths of four Americans in Benghazi, Libya, until next Thursday. But, thanks to House Republicans, she's already got a major leg up, politically speaking.

First came House Majority Leader Kevin McCarthy's career-killing comment that the Benghazi committee deserved credit for dragging down Clinton's poll numbers. Now we have Rep. Richard Hanna (N.Y.) who told a local radio station this week that "this may not be politically correct, but I think that there was a big part of this investigation that was designed to go after people and an individual, Hillary Clinton." Hanna added: “I think that’s the way Washington works. But you’d like to expect more from a committee that’s spent millions of dollars and tons of time.”

Webmaster's Commentary: 

Yeah, once may be a goof, but twice? It is obvious that the politicians are circling the wagons around Hillary's email server and a major scandal still hidden behind it, such as the US running guns from Libya to ISIS and Al Qaeda in Syria!

Oct 15 14:19

How the NSA can break trillions of encrypted Web and VPN connections

For years, privacy advocates have pushed developers of websites, virtual private network apps, and other cryptographic software to adopt the Diffie-Hellman cryptographic key exchange as a defense against surveillance from the US National Security Agency and other state-sponsored spies. Now, researchers are renewing their warning that a serious flaw in the way the key exchange is implemented is allowing the NSA to break and eavesdrop on trillions of encrypted connections.

Webmaster's Commentary: 

It is not a flaw, It is a back-door!

Oct 15 12:08

Google leaves St. Petersburg

Closure of Google’s development center in St. Petersburg is "optimization," press service of the Russian representative office of the corporation told TASS on Thursday. "This is a common optimization process taking place not only in Russia but also, for example, in Finland, Sweden, and the United States," Google said. Former employees of the closed development center "continue working on projects in other offices," the company said. It was reported earlier the staff of the closed development center worked on such projects as Google Toolbar for Firefox browser and Google Code Search.

Oct 15 11:51

New Huma Abedin E-mail Address Discovered ahead of Benghazi Committee Appearance

A previously unknown e-mail address used by Huma Abedin was discovered on Thursday, just hours before the top Hillary Clinton aide prepares to testify in front of the House Select Committee on Benghazi.

Conservative watchdog group Citizens United discovered the address in an e-mail exchange that shows Clinton Foundation CEO Robert Harrison forwarding a speaking invitation for then-Secretary of State Clinton to both Abedin’s State Department account and an unfamiliar Abedin address on November 6, 2012. “I tried to send this to your ‘’ address, but it bounced back as undeliverable, so here it is again,” Harrison wrote.

Oct 15 10:54

Customs computers crash at airports across US

Problems and outages affecting Customs and Border Protection computers -- and the Department of Homeland Security's terrorist watch list -- were reported at multiple American airports on Wednesday. The cause of the problem is unknown.

Oct 15 09:44

World’s First Cashless Nation is On Track in Sweden

By Nicholas West

The full emergence of a cashless society has been a plan long in the making and taking place on many fronts. We are currently seeing an array of new tech that is intended to make cash seem like an antiquated, clumsy way to transact business. Why not pay via identity tech such as vein scanners, facial recognition, voiceprints, iris scans – even tears? Purchases will just be so much safer and more convenient with your new Zwipe biometric credit card.

Simultaneously, we are witnessing legislation and internal banking policies that make it – or will make it – virtually impossible to use cash unless you want to be investigated for money laundering or ties to terrorism. We have begun to hear an increasing chorus from central banks, lackey politicians and of course the United States IRS who are openly declaring a war on cash. So what will the new economic world look like?...

Oct 15 08:13

Bernie Sanders Gave a Helluva Defense of Hillary’s Email Scandals at the Debate. There Are 32 Problems With It.

But before everybody moved on, Sanders weighed in. "I think the secretary is right," he said. "And that is, I think the American people are sick and tired of hearing about your damn emails." Clinton smiled and thanked him, and the crowd roared its approval.

Webmaster's Commentary: 

Here we have on display the spectacle of a candidate for President dismissing THE issue which could remove his top rival for the Democratic nomination. I doubt Sanders did that for no reason.

In politics, there are two kinds of secrets. There are the little secrets; the sex scandals, the bribes, which are the fodder for political infighting. Then there are the great secrets, secrets so terrible they would bring down the entire government, such as the truth behind the JFK assassination, the truth behind 9-11, and so forth. Sanders' dismissal of Hillary's email scandal was not done to protect Hillary, but possibly because Sanders knows that if pursued, the public will learn that behind the server itself lurks far larger scandals, such as government-sanctioned gun-running from Libya to ISIS and Al Qaeda in Syria (using that Consulate in Benghazi), and whether the weak private email server holding US secrets, coupled with a "charitable foundation" legally allowed to accept money from foreign sources, signals a repeat of the 1996 Clinton "China-gate" secrets-for-donations scandal!

Oct 15 08:00

White House: Hillary ISN'T in the clear - when president said servergate wasn't a national security risk, that might change

The White House had to play clean up this week for President Barack Obama after he asserted in an interview Hillary Clinton's use of a private server hadn't 'endangered' national security.

'The President was making an observation about what we know so far,' White House Press Secretary Josh Earnest said.

Webmaster's Commentary: 

This is a clever bit of propaganda. Obama knows that most of the people who heard him say Hillary had not endangered National Security will not see the White House retraction, and will go on believing what he said (assuming they believed him the moment he said it).

However, it was a rather reckless comment by Obama, and suggests that Obama is worried about a far larger scandal lurking behind Hillary's emails, such as US-backed gun-running to ISIS and Al Qaeda from Libya to Syria, and whether the weak private email server holding US secrets, coupled with a "charitable foundation" legally allowed to accept money from foreign sources, signals a repeat of the 1996 Clinton "China-gate" secrets-for-donations scandal!

Oct 15 07:49

WH: On Second Thought, We Don't Know Whether Hillary's Emails Harmed National Security

Sunday gave us the presidential assertion. Tuesday gave us the official walk-back. When President Obama stated that Hillary Clinton's improper, unsecure private email server didn't pose a national security problem, some observers wondered how he could comment so confidently on the unresolved subject of an ongoing federal investigation.

Webmaster's Commentary: 

It was a rather reckless comment by Obama, and suggests that Obama is worried about a far larger scandal lurking behind Hillary's emails, such as US-backed gun-running to ISIS and Al Qaeda from Libya to Syria, and whether the weak private email server holding US secrets, coupled with a "charitable foundation" legally allowed to accept money from foreign sources, signals a repeat of the 1996 Clinton "China-gate" secrets-for-donations scandal!

Oct 15 07:30

US Navy grabs old-fashioned sextants amid hacker attack fears

The US Navy discontinued celestial navigation courses in 1998 because GPS made the old style of navigating redundant. Working out your position the old-fashioned way needs a clear sight of the stars or sun, an accurate watch, and a serious amount of math work to get your position within a couple of miles, whereas GPS can instantly pinpoint a ship to within metres.

"We went away from celestial navigation because computers are great," Lt. Cmdr. Ryan Rogers, deputy chairman of the Naval Academy's department of seamanship and navigation told the Capital Gazette.

"The problem is there's no backup. We know there are cyber vulnerabilities. In the event that we had to go into a national emergency, we would probably have to shut the GPS down because it can be used by potential enemies."

Oct 14 20:15

Apple could face $1.17 billion bill after losing patent lawsuit against university

You would think a Corporation that sues competitors for making rectangular products with rounded corners would have secured the core patents for it's technology first.

Oct 14 17:11

Rise of the Nanobots - The World of Molecular Machines

By Nicholas West

One of the more controversial concepts in the area of nanotech is what has come to be known as The Singularity. Essentially, it is the mission to transcend biology. There are many ways The Singularity could ultimately come about, but one of them is molecular control via nanobots.

The latest video from the American Chemical Society and the University of Nebraska lays out just how pervasive this technology is set to become...

Oct 14 16:02

AVG defends plans to flog user data as privacy row continues

Security software firm AVG has defended changes in its privacy policy, due to come into effect on Thursday (15 October), allowing it to collect and resell users’ anonymised web browsing and search history.

AVG argues that it has no immediate plans to monetise users’ browsing habits. However, independent security experts remain critical, arguing that the firm is putting user privacy and even trust in security firm more generally at risk.

AVG let users know beforehand that it may sell “non-personal” customer data to third-party advertisers in order to bankroll its freemium security software products. This non-personal data, including browsing and search history, advertising IDs, applications on a device and ISP used, are previously reported. The revised privacy policy is due to come into effect on 15 October.

Oct 14 16:00

Apple may face $900m bill after A7 CPU in iPhones, iPads ripped off university's patent

Apple's A7 processors in iPhones and iPads infringe a patent held by the University of Wisconsin, a court has ruled.

A jury, sitting in a US District Court in Madison, Wisconsin, found Apple guilty of patent infringement late yesterday afternoon. While the damages in the case have yet to be determined, Judge William Conley previously set the possible payout to the college as high as $862m. Apple declined to comment on the case.

Oct 14 15:39

New Flash Player Zero-Day in The Wild

The vulnerability which has been assigned as CVE-2015-7645 is rated critical and affects Adobe Flash Player and earlier versions.

This means that even if you are running the latest version of this program, you are still vulnerable and can get infected by simply browsing the web, even on sites that you trust.

Oct 14 15:34

Hackers Can Silently Control Siri From 16 Feet Away

A pair of researchers at ANSSI, a French government agency devoted to information security, have shown that they can use radio waves to silently trigger voice commands on any Android phone or iPhone that has Google Now or Siri enabled, if it also has a pair of headphones with a microphone plugged into its jack. Their clever hack uses those headphones’ cord as an antenna, exploiting its wire to convert surreptitious electromagnetic waves into electrical signals that appear to the phone’s operating system to be audio coming from the user’s microphone. Without speaking a word, a hacker could use that radio attack to tell Siri or Google Now to make calls and send texts, dial the hacker’s number to turn the phone into an eavesdropping device, send the phone’s browser to a malware site, or send spam and phishing messages via email, Facebook, or Twitter.

Oct 14 15:31

Google degenerates into Ministry of Truth; all knowledge must now be pre-approved by search algorithm

What this all means for sites like NaturalNews, InfoWars, and the many other independent news outlets that regularly challenge the status quo is that our content may soon be declared "inaccurate" by Google and forced down to a lower ranking as a result. Even though our collective readership is exploding because people are tired of the lies from the mainstream media, Google's new algorithm threatens to stifle this growth by hiding the truth from search results.

"It could make it more difficult for bright young people to bring about the next revolution in science," says University of Maryland professor Jim Purtillo about the plan. "After all, most of today's established science came about because someone challenged the herd mentality of yesterday."

Oct 14 14:26

University of Cambridge study finds 87% of Android devices are insecure

It's easy to see that the Android ecosystem currently has a rather lax policy toward security, but a recent study from the University of Cambridge put some hard numbers to Android's security failings. The conclusion finds that "on average 87.7% of Android devices are exposed to at least one of 11 known critical vulnerabilities."

Oct 14 12:59

Eavesdropping virus ‘stealing millions’ from UK bank accounts – NCA

The National Crime Agency (NCA) has warned internet users to protect themselves from cyber-attacks which have seen hackers harvest online banking details and steal millions from UK bank accounts.

Oct 14 11:32

Private server used by Hillary Clinton while secretary of state was vulnerable to hacking: report

The private email server running in Hillary Clinton’s home basement when she was secretary of state was connected to the Internet in ways that made it more vulnerable to hackers while using software that could have been exploited, according to data and documents reviewed by The Associated Press.

Clinton’s server, which handled her personal and State Department correspondence, appeared to allow users to connect openly over the Internet to control it remotely, according to detailed records compiled in 2012. Experts said the Microsoft remote desktop service wasn’t intended for such use without additional protective measures, and was the subject of U.S. government and industry warnings at the time over attacks from even low-skilled intruders.

Oct 14 11:31

Hillary’s Private Server Was Extremely Vulnerable to Hacking — AP Confirms

Obama turned down opportunities from interviewer Steve Kroft on 60 Minutes to defend Clinton, instead describing the controversy as “legitimate”. Experts said the Microsoft remote desktop service wasn’t intended for such use without additional protective measures, and was the subject of USA government and industry warnings at the time over attacks from even low-skilled intruders. Yet he also says criticism has been “ginned up” because of politics.

Oct 14 11:29

Lost in debate news – Obama walks back Hillary server defense

Hillary Clinton supporters understandably are happy after last night’s debate. The motley crew of challengers on stage were incapable of stringing sentences together, much less taking on Clinton directly. Bernie Sanders’ demand that the media leave Hillary alone on her server also was a boost to her narrative of “nothing to see here, move along.”

But that good night masked the fact that in the real world, the server is a serious problem legally and politically.

When Obama was interviewed on 60 Minutes last Sunday, he seemed to be signaling there was nothing to Hillary’s server problem, Obama pretty much signaled Justice to lay off Hillary:

Oct 14 10:47

Open doors, no checkpoints and a dumpster waiting to be rifled through - security farce at 'data fortress' run by company that held Hillary Clinton's emails

Wide open with no checkpoints and no perimeter fence, this is one of the data storage sites run by the company that backed up Hillary Clinton's emails.

The facility owned by Datto Inc was part of the network that stored classified messages from the private email server the Democratic presidential candidate used as Secretary of State.

But unlike most government buildings, it is possible to walk to the front door without being challenged.

Daily Mail Online also saw employees from inside the building emptying trash into a dumpster that was kept open and unattended.

Oct 14 08:18

Here are 13 more reasons to kick Adobe Flash to the curb

Flash, used by just 9.9 percent of all websites, remains one of the biggest headaches for system administrators and security professionals alike. As we see every month, it's continually riddled with security vulnerabilities. It's also a resource hog that slows down your computer.

Webmaster's Commentary: 

On Firefox, the freezing of the browser coupled with the message "The shockwave player has crashed" has become a constant occurrence. I don't use flash inside WRH any more.

Oct 14 08:15

Apple loses patent lawsuit to University of Wisconsin, faces hefty damages

Apple Inc could be facing up to $862 million in damages after a U.S. jury on Tuesday found the iPhone maker used technology owned by the University of Wisconsin-Madison's licensing arm without permission in chips found in many of its most popular devices.

Oct 14 07:53

In 2015, your Windows PC can be owned by opening a spreadsheet

Patch your Microsoft and Adobe software today – like, right now

Oct 14 06:31

GCHQ given green light to spy on MPs, court rules

GCHQ is legally allowed to collect and read the private communications of MPs and Lords, a court has ruled, overruling a decades old rule which forbade snooping on Westminster politicians.

In a surprise decision, the Investigatory Powers Tribunal (IPT) said the ‘Wilson doctrine’ did not preclude the bulk collection of data through programs such as Tempora, as exposed by NSA whistleblower Edward Snowden.

Green Party MP Caroline Lucas, who brought the issue to court alongside Baroness Jenny Jones, called the ruling a “blow for parliamentary democracy.”

Established by former Labour Prime Minister Harold Wilson in 1966, the rule forbids the interception of communications between MPs and their constituents by police or intelligence agencies.

Oct 14 06:27

Snowden a hero or traitor? 2016 Democratic hopefuls declare what to do with whistleblower

Is former National Security Agency contractor and whistleblower Edward Snowden a hero for revealing the American government’s massive surveillance program or a traitor who betrayed his own country?

That was the question posed to all of the Democratic presidential candidates during the party’s first debate on Tuesday. The answers ran the gamut from bringing him home to imprisoning him for leaking classified information. But who said what? . . .

. . . "He broke the laws of the United States. He could have been a whistleblower," she said. "He could have gotten all of the protections of being a whistleblower. He could have raised all of the issues that he has raised. And I think there would have been a positive response to that."

But Clinton went on to say that Snowden “stole very important information that has, unfortunately, fallen into a lot of the wrong hands … I don’t think he should be brought home without facing the music.”

Oct 14 05:26

NYPD has super-secret X-ray vans

Police Commissioner Bill Bratton won’t let the NYCLU — or anyone else — bully him for details on the NYPD’s super-secret X-ray vans. The top cop was asked Tuesday about the counter-terror vehicles, called Z Backscatter Vans, in light of the NYCLU’s request to file an amicus brief arguing that the NYPD should have to release records about the X-ray vans.

Webmaster update: Claire and I spotted one when we were in New York for the 9-11 Tenth Anniversary. We realized something was hinky because this "UPS" truck stayed parked there all day long; something real UPS trucks do not do. This one was parked just down the street from the conference I spoke at.

Oct 13 23:12

Did Bernie sell out? CNN Debate: Press Room EXPLODES IN CHEERS as Bernie Sanders Demands Media Stop Reporting on Hillary’s Email Scandal

Reporters in the press room at the Democratic Party presidential debate held in Las Vegas Tuesday night exploded in cheers after Sen. Bernie Sanders emphatically called for the media to stop reporting on the Hillary Clinton email controversy.

Oct 13 19:01

Warning to Internet banking users after hackers snatch £20m from UK accounts after using 'particular virulent' virus to infect thousands of computers

Computers become infected with the virus when users receive and open documents in seemingly legitimate emails, the NCA said.

Oct 13 17:43

Malvertising Hits ‘The Daily Mail,’ One of the Biggest News Sites on the Web

The internet is a dangerous place, so much so that browsing popular news websites can lead to your computer automatically being infected with malware, without you even noticing. The latest victim is perhaps one of the biggest targets yet: The Daily Mail website, which apparently has around 156 million monthly visitors.

Oct 13 15:28

Amazon to help Americans buy more toxic poisons for their home with the touch of a button

Logistics innovator Amazon, which last year announced a robotic drone concept that cuts out the delivery middleman by shipping goods directly from Amazon warehouses to people’s homes via drone, has come up with yet another novel, futuristic concept that will allow people to instantly order the consumer products they need with the quick touch of a button.

Oct 13 12:13

Sacred Cow BBQ- Jewish Supremacy and Racial Violence

NSA Whistleblower Frederick C. Blackburn and street savvy martial artist Dutchman discuss Jewish Supremacism and the incitement of other races against Whites in their plan for world domination.

Oct 13 09:38

Hillary’s Email Server Was a Hack Risk

Hillary Clinton’s personal email server was connected to the Internet in a way that made it vulnerable to hacking risks, according to an AP investigation. The report found that Clinton’s server, which she used to handle both personal and State Department email while she was Secretary of State, "appeared to allow users to connect openly over the Internet to control it remotely" and did not use additional protective measures, the AP reported. On top of that, two other devices run on Clinton’s home network in Chappaqua, N.Y., were also accessible from the Internet.

Oct 13 09:37

‘Total amateur hour’: AP reports on new vulnerabilities discovered on Hillary Clinton’s email server

The AP has a new report out this morning that sheds new light on Hillary Clinton’s home-brew email server, none of it good. The system, according to the AP, lacked even basic protections to prevent a hacker from accessing information through Microsoft’s remote desktop product:

Oct 13 09:36

A ‘Cancer’ on the Clinton Candidacy

Clinton’s frustration with her own campaign staff was striking. So was her refusal for much of the year to characterize the escalating email controversy as anything other than a failure of communications, messaging or the vast right-wing-and-media conspiracy. Both complaints were consistent with what other campaign advisers told us in dozens of interviews for this story—except some of them laid equal blame on the candidate herself.

Indeed, from the minute news of Clinton’s secret personal email server broke this past March, she had reacted by lashing out at her enemies—and repeatedly demanding of her inner circle, “How do we get past this?” Neither the campaign nor the candidate have definitively answered that question, and the months of indecision, uncertainty and mounting legal threat have left Clinton, for the second time in her two presidential campaigns, a deeply vulnerable front-runner.

Oct 13 08:56

How Russia’s leading search engine beat Google in court

The Russian Federal Antimonopoly Service (FAS) has found Google guilty of violating the Russian law on competition, in response to a complaint filed by Russia’s leading search engine Yandex. Now Google has until Nov. 18 to authorize manufacturers of Android devices to pre-install applications of its competitors, including Yandex.

Oct 13 08:45

Privatized NSA Army is Attacking YOU!

They aren't connected with the government, intelligence, or homeland security. They are private citizens who have no security clearances in any western country.

They use the free OSINT software found on the internet to find or decide who is a terrorist. Many of them enjoy the feeling of power they get from getting people fired from their jobs and put on terrorist investigation lists.

They are freelancers with no oversight or rules. They are only accountable to themselves and their employers. These freelancers thrive on their ability to remain hidden from the public eye. In reality, they could be any of your socially inept, angry neighbors down the street who is afraid of their own shadow in person. But give them a keyboard and they'll take your job, your bank account and your freedom.

Oct 13 08:10

Microsoft Re-Issues Windows 7 Updates Forcing Windows 10 Upgrade, Enabling Data Collection

Microsoft has a goal of bringing Windows 10 on a total of 1 billion devices by 2017, and in order to achieve this, the company knows that most, if not all of those on Windows 7 need to upgrade as soon as possible.

So to do this, Microsoft offered some patches prompting users to upgrade, and it turns out that the company has recently re-released these to make sure that, even if Windows 7 consumers blocked them, they still show up on their computers.

Woody Leonhard of InfoWorld writes that a total of six patches have been re-released, and these include not only updates that are supposed to encourage the upgrade to Windows 10 but also bulletins that were previously used to enable data collection on Windows 7.

Oct 12 14:55

Is The End Of Independent News In Sight?

Is the end of the news aggregator, independent news and websites of bloggers in sight?

According to Matt Drudge it is. He is an American political commentator and the creator and editor of the Drudge Report, an online news aggregator.

Oct 12 10:47

Facebook paid £4,327 of UK corporation tax in 2014

Social network giant Facebook paid just £4,327 ($6,643) in corporation tax in 2014, its latest UK results show.

Oct 12 08:15

Obama defends Clinton over private email server, blames controversy on politics

Hillary Rodham Clinton’s use of a private email server while she was secretary of State “is not a situation in which America's national security was endangered,” President Obama said in an interview Sunday, adding that although Clinton “made a mistake,” he believes the controversy over the matter has “been ginned up … in part because of politics.”

Webmaster's Commentary: 

Obama cannot possibly know for a fact if National Security was compromised. If anyone is playing politics it is Obama, trying to protect the Democrats, and quite possibly protect a far worse scandal hidden behind the server, such as running guns to our enemies ISIS and Al Qaeda in Syria. And given the 1996 China-gate scandal, Obama knows the Clintons have sold US secrets for donations in the past. The combination of a weak outside server and a "charitable" foundation accepting payments from foreign sources strongly suggests Hillary is repeating an old family pattern, which makes Obama's blanket declaration that National Security was not compromised even more ridiculous on the face of it!

Optional Banner: 
WRH breaking
Oct 12 06:52

Flashback - LEAKED: German Government Warns Key Entities Not To Use Windows 8 – Linked to NSA

According to leaked internal documents from the German Federal Office for Information Security (BSI) that Die Zeit obtained, IT experts figured out that Windows 8, the touch-screen enabled, super-duper, but sales-challenged Microsoft operating system is outright dangerous for data security. It allows Microsoft to control the computer remotely through a built-in backdoor. Keys to that backdoor are likely accessible to the NSA – and in an unintended ironic twist, perhaps even to the Chinese.

Oct 11 13:40

Private NSA Army is Attacking YOU!

In the first part of this article series, the post 9/11 rise of a private NSA was detailed. Some started in reaction to the twin tower attack. They aren’t connected with the government, intelligence, or homeland security. They are private citizens that have no security clearances in any western country.

Oct 11 10:16

Leaked (final?) TPP Intellectual Property chapter spells doom for free speech online

Under the terms of the text, countries in the TPP can force each other to suspend legal proceedings if the trial would cause embarrassing information -- information "detrimental to a party’s economic interests, international relations, or national defense or national security" -- would come to light. That would be the Wikileaks/Snowden clause.

Oct 11 08:28

In a first, Chinese hackers are arrested at the behest of the U.S. government

The Chinese government has quietly arrested a handful of hackers at the urging of the U.S. government — an unprecedented step to defuse tensions with Washington at a time when the Obama administration has threatened economic sanctions.

The action came a week or two before President Xi Jinping’s state visit to Washington late last month. The hackers had been identified by U.S. officials as having stolen commercial secrets from U.S. firms to be sold or passed along to Chinese state-run companies.

Oct 10 14:21

Incompetent or indifferent: Clinton burns CIA Libya contact

On March 18, 2011, Blumenthal wrote to Clinton about a conversation he had had with Tyler Drumheller, a former CIA official, who divulged the name of the contact. When the email was released to the Select Committee on Benghazi, the name was redacted.

"Tyler spoke to a colleague currently at CIA," Blumenthal wrote, "who told him the agency had been dependent for intelligence from [redacted due to sources and methods]."

It is bad enough that Drumheller, who had business interests in Libya along with Blumenthal, was able to learn so much from intelligence officers in the field. It is worse that he was so indiscreet as to tell Blumenthal, who had no business knowing and certainly no business sending email from his AOL account. But worst of all, this information reached Clinton in a way that left it open to anyone with the right computer skills.

Oct 10 10:56

The Final Leaked TPP Text is All That We Feared

The severity of the earlier language on trade secrets protection has not been abated in the final text. It continues to criminalize those who gain “unauthorized, willful access to a trade secret held in a computer system,” without any mandatory exception for cases where the information is accessed or disclosed in the public interest, such as by investigative journalists or whistleblowers.

There is no evident explanation for the differential treatment given to trade secrets accessed or misappropriated by means of a computer system, as opposed to by other means; but it is no surprise to find the U.S. pushing such a technophobic provision, which mirrors equivalent provisions of U.S. law that have been used to persecute hackers for offenses that would otherwise have been considered much more minor.

Oct 10 08:47

White House won’t ask for encryption backdoor law - may seek 'back window' later

The Obama Administration said that it won’t support legislation forcing firms to decode encrypted messages. But this didn’t provide much solace for privacy advocates, since the administration says it will pursue other means to get people’s data.

Webmaster's Commentary: 
Oct 10 07:19

The Final Leaked TPP Text is All That We Feared

By Jeremy Malcolm

Today’s release by WikiLeaks of what is believed to be the current and essentially final version of the intellectual property (IP) chapter of the Trans-Pacific Partnership (TPP) confirms our worst fears about the agreement, and dashes the few hopes that we held out that its most onerous provisions wouldn’t survive to the end of the negotiations...

Oct 09 14:43


The real scandal surrounding Democratic presidential hopeful Hillary Clinton’s private email system may be that she was running, in concert with a private consulting firm tied closely to George Soros, an outsourced and parallel State Department answerable only to her and not President Obama, the Congress, or the American people.

Oct 09 12:20

Clinton Email Naming Top CIA Source Called ‘Unauthorized Disclosure Of Sensitive Information’

The revelation that Hillary Clinton forwarded an email containing the name of one of the CIA’s top Libyan intelligence assets has triggered a scathing response from two former CIA officials.

Webmaster's Commentary: 

Oct 09 12:17

Trey Gowdy: Clinton Emails Name CIA Source, Push Action in Libya

Hillary Clinton's confidant Sidney Blumenthal names a CIA source and pushes action in Libya, partly to promote business interests, Trey Gowdy says in a letter about new emails his committee plans to release.

The House Benghazi Select Committee plans to release the emails from former Secretary of State Hillary Clinton prior to her testimony later this month.

Oct 09 12:15

Newly disclosed emails mean more trouble for Hillary

Trey Gowdy, chairman of the House Select Committee on Benghazi, has told Elijah Cummings, his Democratic counterpart on the committee, that he will soon release 1,500 pages of new Hillary Clinton emails concerning Libya that the State Department recently turned over. A “small number” of them pertain to the 2012 terrorist attack on the U.S. compound, Gowdy said.

In his letter to Cummings, Gowdy also revealed that many of the emails in question involve Sid Blumenthal.

Oct 09 12:13

Gowdy says new emails show Clinton confidant naming CIA source, pushing Libya interests

Longtime Hillary Clinton confidant Sidney Blumenthal allegedly sent her an email with the name of a CIA source, further casting doubt on her claim she never sent or received classified information on her private email address, according to the Republican chairman of the committee investigating the 2012 Benghazi attacks.

Webmaster's Commentary: 

This is nonsense. The job of Secretary of State involves a great deal of classified information. If Hillary was not using her official government email, and insists there was no classified emails on her private server, then what server DID she use for the classified information and why hasn't it been surrendered to the Benghazi investigation?

Oct 09 12:08

BEX ALERT - Judge says Hillary Clinton’s server is private

A federal judge ordered the State Department Wednesday to request former Secretary Hillary Rodham Clinton not delete any government business emails she may still have, but said he doubts he can force her to do anything.

Judge Reggie B. Walton said since Mrs. Clinton used her own BlackBerry and computer devices, and kept her email server at her home, he doesn’t have authority over the records she created on those.

Webmaster's Commentary: 

Wrong, your dishonor; the emails in question were not created by Hillary but by US Government agencies, and hence are the property of the public. In point of fact the judge does have the authority to order Hillary to turn them all over, just as judges have been ordering ordinary Americans to turn over their PRIVATE data from their phones and tablets. The hypocrisy on this is stunning, to say the least, and further reinforces the public perception of yet another high-level government cover-up!

Oct 09 10:13

Purdue deletes video of author’s academic talk on NSA after federal order

“Universities are not secret agencies,” Barton Gellman bluntly stated in a blog post after a video of his presentation on the National Security Agency at Purdue University was ordered destroyed by US national security authorities.

Oct 09 10:02

Hacker uses Ashley Madison files to seek revenge on prosecutors

A hacker who spent time in prison -- some say unfairly -- is threatening to exact revenge by exposing federal prosecutors around the country who he claims had accounts on the dating site Ashley Madison.

Ashley Madison, a dating site for married people who want to cheat, was recently hacked. Anyone smart enough to find the files could search through its users. Some people signed up using their government email accounts. Some of those included police chiefs, government bureaucrats -- and federal prosecutors.

Webmaster's Commentary: 

Finally, a hacker doing something GOOD! :)

Oct 09 08:26

Australian Prime Minister runs private email server

Any hacker capable of sinking a tinnie of Fosters will be trying to crack it as you read

Oct 09 08:18

Clinton server hack attempts came from China, Korea, Germany

At least five cyberattack tries were apparently blocked by a "threat monitoring" product that was connected to her network in October 2013, eight months after she left office. But for more than three months earlier that year, her system was not protected by the security product because it had not been installed.

Webmaster's Commentary: 


And just to make it easier for you to post to the comments sections on corporate media websites, here are two text versions for you to cut and paste, depending on how much room you are allowed.

Back in 1996, when Bill Clinton was running for re-election, he authorized the transfer of highly sensitive technology to China. This technology had military applications and allowed China to close the gap in missile performance with the United States. The transfers were opposed and severely criticized by the Defense Department.

At the same time Bill Clinton was transferring this technology to China, huge donations began to pour into his re-election campaign from the US companies allowed to sell the technology to China, and from American citizens of Chinese descent. The fact that they were US citizens allowed them to donate to political campaigns, but it later emerged that they were acting as conduits for cash coming in from Asian sources, including Chinese Intelligence Agencies! The scandal became known as China-gate!

This establishes a history of the Clintons treating US secrets as their own personal property, selling them to raise money for campaigns.

Now then, let us consider a private email server with weak security, at least one known totally open access point, no encryption, and outside the control and monitoring systems of the US government, on which are parked many of the nation's most closely guarded secrets! It is already established that Hillary's email was hacked. One hacker named Guccifer provided copies of emails to Russia Today, which published them. Another hacker is reported to be offering 32,000 of Hillary's emails for the sum of $500,000. Security experts agree that Hillary's server had worse security than the Ashley Madison website!

Now, consider a charitable foundation owned by the Clintons (which actually does very little charitable work). Being a charitable foundation, it is allowed to accept "donations" from foreign sources, and roughly 40% of the cash that has poured into the Clinton Foundation has come from foreign sources. Many of those foreign sources received preferential treatment from Secretary of State Hillary Clinton, sufficient for attorney Larry Klayman to file a RICO lawsuit against the foundation (which as of last report was thrown out of court by a Clinton-appointed judge who refused to recuse himself over the obvious conflict of interest)!

Easy means of delivering secrets. Easy means of accepting payment! And now there is confirmation that Hillary did have a private "off the books" spy network, centered on Sidney Blumenthal, while she was secretary of state!

This is a perfect setup to repeat the 1996 selling of secrets for cash. In other words, a perfect espionage operation, running out the US State Department, with the weak email server providing the secrets and a charitable foundation to accept and launder the payments! Hillary doesn't have to physically steal the files, the way Jonathan Pollard did. Hillary doesn't have to scratch an X on a mailbox, the way Aldrich Ames did. Hillary doesn't have to tape bundles of stolen documents underneath a park bridge, like Robert Hannsen did!

It is time to look past the small scandal of the private email server at what may be a far larger scandal hidden behind it!

And the longer the government and corporate media avoids this question, the more complicit they look!

(smaller) ---------------

Remember China-gate from 1996? Then President Bill Clinton authorized the sale of sensitive US technology to China and Chinese money was donated to his re-election campaign!

Was Hillary playing the same game, selling US secrets delivered via a private server with weaker security than the Ashley Madison website in exchange for "donations" to her "charitable" foundation?

It is time to look past the server itself to what may be the biggest spy scandal in US history!

Oct 09 06:40

'Pics or didn’t happen': Internet reacts to ‘Russian missiles crash in Iran’ report

It looks like it was a challenging task for MSM outlets to make bloggers believe that four Russian missiles sent from the Caspian Sea to take out ISIS dens in Syria fell in Iran. While CNN, Sky and Reuters rushed to publish reports based on unnamed US officials, many readers trolled the media to check the validity of the sources and the allegations.

(Note: It looks like no one is buying this story from the Jewish Media)

Oct 08 19:23

DuckDuckGo CEO: 'Our search engine is actually profitable! It's a myth you need to track people to make money in web search'

The CEO and founder of DuckDuckGo has revealed that the privacy-focused search engine is making a profit despite not tracking its users' online activity and search history. Gabriel Weinberg took to YCombinator's Hacker News to conduct an AMA (ask me anything) on 7 October, making a dig at Google and other major search engines by claiming that privacy does not need to be sacrificed for profitability.

Oct 08 15:38

Google buys domain

After Google officially became a subsidiary of Alphabet last Friday, the company literally bought the alphabet by acquiring the rights to the domain containing all 26 letters. According to domain search site, the domain name was created in 1999 and was updated on Wednesday. The purpose of the domain is unclear and it was unavailable as of Thursday evening. On August 11, Google announced a major restructuring; its divisions, along with Google, were united under the Alphabet brand. Currently Alphabet is the second largest company in the world by market capitalization. “We did a lot of things that seemed crazy at the time. Many of those crazy things now have over a billion users, like Google Maps, YouTube, Chrome, and Android. And we haven’t stopped there. We are still trying to do things other people think are crazy but we are super excited about,” said Google co-founder Larry Page.

Oct 08 10:11

Apple's iPhone 6s 4K camera shoots better video than $3,000+ Nikon DSLR, test finds

The iPhone 6s shoots 4K video that, when downscaled, is superior to the 1080p video from a Nikon D750 DSLR setup costing between $3,000 and $4,000, according to a recent comparison.

Oct 08 10:06

In China, every citizen is being assigned a credit score that drops if a person buys and plays video games, or posts political comments online “without prior permission," or even if social media "friends" do so.

Gamer? Strike. Bad-mouthed the government in comments on social media? Strike. Even if you don’t buy video games and you don’t post political comments online “without prior permission,” but any of your online friends do….strike. The strikes are actually more like dings, dings to your falling credit score that is.

Oct 08 09:47

Banning data encryption is “moronic”: Wikipedia founder Jimmy Wales

Jimmy Wales, founder of Wikipedia, has launched scathing criticism at governmental plans to ban data encryption, arguing that encryption is both impossible to prevent and a direct result of overreaching digital surveillance.

Speaking at the IP Expo Europe event in London today, he referred to comments made earlier this year by UK Prime Minister David Cameron, who asked: “in our country, do we want to allow a means of communication we cannot read? My answer to that question is: ‘No, we must not’.”

“Too late, David,” Wales retorted. “It is not possible in any sense of the word for the UK to ban encryption. More to the point, it’s a moronic thing to do.”

Webmaster's Commentary: 
Oct 08 08:53

Minority Report PreCrime Test Claims Success; Seeks Expansion Worldwide

By Nicholas West

Well, it sounds like PreCrime policing is officially set to expand across the nation, and perhaps the world.

The pace of technological advancement is now quickening to the point where the gap between science fiction and reality is being greatly reduced. Philip K. Dick explored the concept of PreCrime in his short story “The Minority Report” in 1956, but it wasn’t until Steven Spielberg offered it on the big screen as Minority Report in 2002 that the audience got a true look at a potential day-to-day existence under corporate and government data management and control.

The problem is that it can’t be called fiction if it’s actually happening; and among the vast array of surveillance and Big Brother intrusion nothing will likely affect the average person as much as the concept of PreCrime taking hold in modern policing...

Oct 08 08:30

Major security flaw 'leaves 100 car models at risk of being stolen'

Among the makes of car at risk are Audi, Honda, Skoda, Citroen, Fiat and Volvo - as well as top of the range sports cars produced by Porsche and Ferrari

Oct 08 08:29

''Psychic'' Robot Will Know What You Really Meant To Do

By Jean Galatzer-Levy

What if software could steer a car back on track if the driver swerves on ice? Or guide a prosthesis to help a shaky stroke patient smoothly lift a cup?

Bioengineers at the University of Illinois at Chicago have developed a mathematical algorithm that can “see” your intention while performing an ordinary action like reaching for a cup or driving straight up a road — even if the action is interrupted...

Oct 08 08:25

DuckDuckGo CEO: 'It's a myth you need to track people to make money in web search'

The CEO and founder of DuckDuckGo has revealed that the privacy-focused search engine is making a profit despite not tracking its users' online activity and search history.

Oct 08 08:15

New mystery Windows-smashing RAT found in corporate network

Malware man Yotam Gottesman has found a somewhat mysterious remote access Trojan on a corporate network that sports highly capable evasion techniques.

The Ensilo researcher says the Trojan, dubbed Moker, is not known to antivirus databases and can bypass and disable Windows security measures.

Bypassed security systems includes antivirus, user access control, and virtual machines.

"As opposed to more common malware such as bank Trojans, ransomware, and PoS scrapers, this advanced persistent threat hooked into the operating system in order to appear as a legitimate OS process and to access system-wide settings," Gottesman says.