COMPUTERS/INTERNET/SECURITY | WHAT REALLY HAPPENED


COMPUTERS/INTERNET/SECURITY

Jan 27 07:44

“Technological Arms Race” Has Captured Global Finance: “Trading Once Took Minutes, Now Handled in Mere Nanoseconds by Computers”

As it becomes increasingly clear that fewer and fewer hands control the wealth of the planet, the manipulation of the market seems obvious enough.

Jan 27 07:27

Alternative Media future and risk

The political messages and agenda for acceptable discourse are provided through filtered lenses presented as establishment news

Jan 27 07:26

Piracy site Popcorn Time almost as popular as Netflix

Piracy site Popcorn Time almost as popular as Netflix (*in Netherlands)

The illegal video service, of which the managers are unknown, offers all brand new TV series and feature films. Popcorn Time also has a slick design and is very user friendly. Its range is much larger than legal variants like Netflix and HBO. These American services have to negotiate with film companies to be able to offer the latest titles. Popcorn Time is also free, which the other two aren’t.

(* https://popcorntime.io/ )

Jan 27 03:15

Sheriffs want popular police-tracking app disabled

Sheriffs are campaigning to pressure Google Inc. to turn off a feature on its Waze traffic software that warns drivers when police are nearby. They say one of the technology industry’s most popular mobile apps could put officers’ lives in danger from would-be police killers who can find where their targets are parked.

Jan 26 16:10

Robots are starting to break the law and nobody knows what to do about it

The Random Darknet Shopper, an automated online shopping bot with a budget of $100 a week in Bitcoin, is programmed to do a very specific task: go to one particular marketplace on the Deep Web and make one random purchase a week with the provided allowance. The purchases have all been compiled for an art show in Zurich, Switzerland titled The Darknet: From Memes to Onionland, which runs through January 11.

The concept would be all gravy if not for one thing: the programmers came home one day to find a shipment of 10 ecstasy pills, followed by an apparently very legit falsified Hungarian passport– developments which have left some observers of the bot’s blog a little uneasy.

If this bot was shipping to the U.S., asks Forbes contributor and University of Washington law professor contributor Ryan Calo, who would be legally responsible for purchasing the goodies? The coders? Or the bot itself?

Jan 26 15:52

Secret ‘BADASS’ Intelligence Program Spied on Smartphones

British and Canadian spy agencies accumulated sensitive data on smartphone users, including location, app preferences, and unique device identifiers, by piggybacking on ubiquitous software from advertising and analytics companies, according to a document obtained by NSA whistleblower Edward Snowden.

Jan 26 15:40

TSA could start snooping on social media to speed up security screenings

The Transportation Security Agency is already well known for conducting evasive searches at American airports, but new measures may soon see the social media accounts of potential passengers being screened by TSA.

Jan 26 10:08

Mass surveillance is fundamental threat to human rights, says European report

Europe’s top rights body has said mass surveillance practices are a fundamental threat to human rights and violate the right to privacy enshrined in European law.

The parliamentary assembly of the Council of Europe says in a report that it is “deeply concerned” by the “far-reaching, technologically advanced systems” used by the US and UK to collect, store and analyse the data of private citizens. It describes the scale of spying by the US National Security Agency, revealed by Edward Snowden, as “stunning”.

The report also suggests that British laws that give the monitoring agency GCHQ wide-ranging powers are incompatible with the European convention on human rights.

Jan 26 09:14

WikiLeaks Journalists Face Serious Charges After Google Hands Over Information

Three WikiLeaks journalists are facing charges of espionage and conspiracy after Google turned over their confidential data to the U.S. government, WikiLeaks announced on its site Monday morning.

The whistleblower organization now wants an explanation from both Google and the Justice Department.

Jan 26 08:27

Italy launches largest ever pirate site blockade

A complaint filed by 21st Century Fox's Sky TV has ended in Italy's most aggressive site-blocking action yet

Jan 26 08:18

THE TSA WANTS TO READ YOUR FACEBOOK POSTS AND CHECK OUT YOUR PURCHASES BEFORE IT WILL APPROVE YOU FOR PRECHECK

The TSA is disappointed that so few Americans have opted out of its bottle-tossing, package-groping screenings by signing up for its PreCheck program. For a few years now, the TSA has been selling travelers' civil liberties back to them, most recently for $85 a head, but it's now making a serious push to increase participation. The TSA can't do it alone, so it's accepting bids on its PreCheck expansion proposal. (h/t to Amy Alkon)

Jan 26 08:18

The Rebel Website got hacked by fake Muslim hackers

Tonight, the Rebel Website got attacked by hackers claiming to to be fighting for freedom for Palestine and all Muslims. Given the outspoken pro-Palestinian and anti-Jewish positions of the writers of the Rebel Team, I'm more inclined that it's a false-flag operation of the usual suspects. Jew know who...

Webmaster's Commentary: 

WRH got hit with attacks twice yesterday.

Jan 26 08:11

Why You Should Build Your Own Internet

by Brian Berletic

There are a lot of reasons to build your own Internet. In some places, you may have access to the Internet, but not particularly like your service provider or those monitoring and regulating your network. In other places, you may have no Internet (or telecom network) at all.

The solution is not to wait for someone to build the network that meets all your requirements, the answer is to build that network yourself!...

Jan 26 08:09

SHERIFFS WANT POPULAR POLICE-TRACKING WAZE APP DISABLED

Waze, which Google purchased for $966 million in 2013, is a combination of GPS navigation and social networking. Fifty million users in 200 countries turn to the free service for real-time traffic guidance and warnings about nearby congestion, car accidents, speed traps or traffic cameras, construction zones, potholes, stalled vehicles or unsafe weather conditions. To Sergio Kopelev, a reserve deputy sheriff in Southern California, Waze is also a stalking app for law enforcement.

Jan 26 08:00

GOOGLE SECRETLY HANDED OVER WIKILEAKS EMAILS AND PERSONAL DATA TO US GOVERNMENT

In what WikiLeaks called a “serious violation of the privacy and journalistic rights of WikiLeaks’ staff”, Google handed over the information under a secret search warrant issued by a federal judge in 2012. Google then wrote to Wikileaks on Christmas Eve 2014, telling the group that it had complied with an order from the Justice Department to hand over digital data including all email and IP addresses of three WikiLeaks staff members.

Jan 25 23:04

The Future of Freedom: A Feature Interview with NSA Whistleblower William Binney

historic parallels in privacy violations
how the government makes you vulnerable to hackers
retro-active immunity/ex post facto legality

Jan 25 21:40

Police seized 50 servers in Pirate Bay raid

The first major raid on The Pirate Bay took place on May 31 2006 in Stockholm, Sweden

Jan 25 13:30

Hack-Proof Smart Keyboard Learns How You Type, Won’t Work for Anyone Else

Scientists have developed a new keyboard that can protect your computer from direct hacking.

The intelligent keyboard (IKB) uses keystroke dynamics to identify users by the way they type, according to the journal ASC Nano.

By sensing typing patterns such as the speed at which a user types and the amount of pressure applied to the keys, the keyboard can accurately distinguish one user from another and prevent unauthorized users from accessing a computer.

Jan 25 10:20

Facebook Advocates Stasi-Style Snitching & Suppression of Free Speech

Social media site targets gun owners but not child molesters

Jan 25 10:03

Worst passwords of 2014 are just as terrible as you'd think

If the onset of high-profile hackings taught us anything in 2014, it's absolutely nothing.
Password management firm SplashData released its annual list of the worst passwords of the year and it's just as dreadful as you'd think. The company, which analyzed the 3 million passwords leaked online last year, revealed that the most common leaked password in 2014 was "123456," followed by "password" — both topped the list last year, too.

Jan 25 10:02

Secret TPP Negotiations—And Public Protests—To Be Held in New York City

The next round of secret Trans-Pacific Partnership (TPP) negotiations begins this Monday, January 26, and runs through the following week at the Sheraton New York Time Square Hotel in downtown Manhattan.

As with many previous TPP meetings, the public will be shut out of talks as negotiators convene behind closed doors to decide binding rules that could impact how our lawmakers set digital policy in the decades to come. Big content industry interests have been given privileged access to negotiating texts and have driven the US Trade Representative's mandate when it comes to copyright—which is why the TPP carries extreme copyright measures that ignore users' rights.

Jan 25 09:42

No need for speed: Cable industry opposes 25Mbps broadband definition. Normal people don't need 25Mbps down or 3Mbps up, cable lobby says.

The cable lobby is opposed to a Federal Communications Commission plan to define "broadband" as speeds of at least 25Mbps downstream and 3Mbps up.
Customers do just fine with lower speeds, the National Cable & Telecommunications Association (NCTA) wrote in an FCC filing Thursday (thanks to the Washington Post'sBrian Fung for pointing it out). 25Mbps/3Mbps isn't necessary to meet the legal definition of "high-speed, switched, broadband telecommunications capability that enables users to originate and receive high-quality voice, data, graphics, and video telecommunications using any technology," the NCTA said.

Jan 25 09:34

Edward Snowden: Apple iPhone with Secret iFeature Allows Government to Spy on You

"The iPhone has special software that can activate itself without the owner having to press a button and gather information about him; that's why on security grounds he refused to have this phone," Kucherena added.

It is not clear if the "special software" being referred to in the interview is made up of standard diagnostic tools, or if the NSA whistleblower thinks intelligence agencies from the United States have found a way to compromise the mobile operating system developed by Apple.

Jan 25 08:31

Internet filters block websites of sex abuse charities

The adult content filters being rolled out by some internet providers under a scheme championed by David Cameron are blocking the websites of businesses and charities and are a “distraction” for parents seeking to protect children from online pornography, claim campaigners.

Jan 24 11:41

State sponsored cyber-attacks happen more and more often - Kaspersky

At this year's Davos economic forum, the spectre of cyber-terrorism loomed over the luxurious get-together of the world's elite.

Jan 24 11:17

Bill Gates: Get on your knees and beg for your jobs

He might not have said it in so many words, though I wish that he had because only that kind of candor can get Americans to wakeup and do what is necessary to survive this stealth and brutal war, calculated to destroy their lives.

Microsoft cofounder Bill Gates isn’t going to sugarcoat things: The increasing power of automation technology is going to put a lot of people out of work. Business Insider reports that Gates gave a talk at the American Enterprise Institute think tank in Washington, DC this week and said that both governments and businesses need to start preparing for a future where lots of people will be put out of work by software and robots.

Webmaster's Commentary: 

Bill misses a key point. Software and robots do not earn wages to pour back into the economy. Bill's vision of the future is 300 million Americans starving in the streets while the factories and stores are filled with robots standing around with nothing to do!

Jan 24 11:04

How the CIA made Google

INSURGE INTELLIGENCE, a new crowd-funded investigative journalism project, breaks the exclusive story of how the United States intelligence community funded, nurtured and incubated Google as part of a drive to dominate the world through control of information. Seed-funded by the NSA and CIA, Google was merely the first among a plethora of private sector start-ups co-opted by US intelligence to retain ‘information superiority.’

Jan 24 07:38

The Many Problems with the DEA's Bulk Phone Records Collection Program

Hanni Fakhoury
Activist Post

Think mass surveillance is just the wheelhouse of agencies like the NSA? Think again. One of the biggest concerns to come from the revelations about the NSA’s bulk collection of the phone records of millions of innocent Americans was that law enforcement agencies might be doing the same thing.

It turns out this concern was valid, as last week the government let slip for the first time that the Drug Enforcement Agency (DEA) had also been collecting the phone records of Americans in bulk since the 1990s...

Jan 23 18:47

Americans Offer to Take 100 Lashes Each for Saudi Blogger

A bipartisan, multi-religious group of Americans have offered to each take 100 lashes for Saudi Arabian blogger Raif Badawi who was sentenced to 1,000 lashes for insulting Saudi clerics. All those who volunteered are members of the U.S. Commission on International Religious Freedom.

Jan 23 16:37

A 600,000 Cubic Foot Blimp May Be Spying on You

Ted Baumann
Activist Post

In the summer of 1849, Austrian Field Marshall Joseph Radetzky did something no one had done before: He bombed a city from the air.

His target was Venice, then in rebellion against the Habsburg crown. During the siege, he launched a fleet of unmanned linen balloons, carrying bombs made from canister shot and gunpowder, timed to drop over the besieged city.

Radetzky told Emperor Franz Joseph that the effect on the people of Venice was “frightful.” Indeed, Radetzky’s balloons had done little physical damage, but had a substantial effect on the morale of the city’s defenders. As the 19th century wore on, fear of attack by airships became a constant theme in popular literature. By World War I, the mere mention of the word “Zeppelin” was enough to cause panic in the streets of London.

Jan 23 16:07

Press Rebellion in the UK – British Media Launches Protest Against Spying, as GCHQ Places Investigative Journalism in Same Category as Terrorism

Go ahead and read that last paragraph again. In some respects,terrorists are viewed as a lower priority than investigative journalists by the GCHQ. More proof that the “war on terror” is a total sham, and that governments around the world see transparency, truth and their own citizenry as the real enemies.

This is precisely why UK Prime Minister David Cameron wasted no time in exploiting the tragic attacks in Paris in order to call for a banning of encryption, i.e., private communications.

Jan 23 15:58

Adobe fixes just one of two actively exploited zero-day vulnerabilities in Flash Player

Kafeine has since updated his blog post to reflect that the Angler exploit seen yesterday also works against the newly released Flash Player 16.0.0.287 for Windows and Mac. Moreover, the attackers have since corrected an error in their implementation and are now also targeting Firefox users who have Flash Player installed in addition to Internet Explorer users.

"Any version of Internet Explorer or Firefox with any version of Windows will get owned if Flash up to 16.0.0.287 (included) is installed and enabled," Kafeine said. Google Chrome, where Flash Player runs under the browser's security sandbox, is not targeted.

Jan 23 15:52

Fighting Back Against the Surveillance State: Turn Off the NSA's Resources

Thanks to whistleblower Edward Snowden, it is now widely known that the National Security Agency (NSA) has been trampling on the privacy of not only Americans, but pretty much everyone on the planet via mass surveillance for who knows how long.

But even the strongest and largest of villains inevitably have a weak spot - an Achilles' Heel - and the surveillance state is no exception.

OffNow.org has discovered a way to fight back and hit 'em where it hurts.

Jan 23 14:33

Suddenly 2015 feels a whole lot like the delusional financial euphoria we saw before the dot-com crash

The media will never tell you a crash is coming, even when it's imminent

Jan 23 14:23

New Indie Video Game Allows You to Play as a Mass Murdering Psychopath

you play a psychopathic killer who goes on a rampage to kill as many people as possible. And that’s pretty much it.

Jan 23 12:28

The Sorry State of In-Flight Wi-Fi

I’ve finally found something on commercial flights that’s worse than airplane food: the Wi-Fi. It’s so slow and unreliable that it shouldn’t be allowed to call itself “Wi-Fi.” Renaming it Airplane Dial-Up would be unfair to dial-up.

Jan 23 10:07

How Covert Agents Infiltrate the Internet to Manipulate, Deceive, and Destroy Reputations

Among the core self-identified purposes of JTRIG are two tactics: (1) to inject all sorts of false material onto the internet in order to destroy the reputation of its targets; and (2) to use social sciences and other techniques to manipulate online discourse and activism to generate outcomes it considers desirable. To see how extremist these programs are, just consider the tactics they boast of using to achieve those ends: “false flag operations” (posting material to the internet and falsely attributing it to someone else), fake victim blog posts (pretending to be a victim of the individual whose reputation they want to destroy), and posting “negative information” on various forums.

Jan 23 09:40

Top Google executive predicts end of the internet

At the World Economic Forum in Davos, Switzerland, Google guru Eric Schmidt gave an answer regarding the evolution of the web. “I will answer very simply that the internet will disappear,” Schmidt said on Thursday.

“There will be so many IP addresses, … so many devices, sensors, things that you are wearing, things that you are interacting with that you won’t even sense it, it will be part of your presence all the time,” he explained. “Imagine you walk into a room, and the room is dynamic. And with your permission and all of that, you are interacting with the things going on in the room.”

Webmaster's Commentary: 

The internet that Schmidt wants to go away is the internet that improves person-to-person communications, where we can share the wrongdoings of governments and corporations. The "Dynamic" room model is all about dazzling us with new toys to keep us from looking into the wider outside world and looking carefully at what is going on.

Jan 23 08:40

Top Google executive predicts end of the internet

"I will answer very simply that the internet will disappear"

Jan 23 07:54

Transhumanism: The Anti-Human ‘Singularity’ Agenda

At a TED-like techno-geek symposium in the 2014 film Transcendence, Artificial Intelligence guru Dr. Will Caster (Johnny Depp) is asked by an audience member, “So you want to create your own god?” And he answers, “Isn’t that what man has always done?”

This smarmy remark is indicative of the hubris and arrogance of scientism, the belief that science can solve all the problems on this planet, while scientists can have fun playing god at the same time.

It could also have been the answer of Real-Life Techno-Wizard Ray Kurzweil, Google’s Director of Engineering, whose book The Singularity is Near: When Humans Transcend Biology (2005), is ever so popular with scientific materialists who neither have the capacity nor the desire for spiritual evolution, but have a fervent belief that the shotgun marriage of man and machine is not only “normal” but something to be ardently pursued.

Jan 23 07:41

VIDEO: DARPA’S ATLAS GETS A HUGE UPGRADE, PREPARES TO ‘CUT THE CORD’

ATLAS, the standard-bearer for the next generation of robotics, is back and better than ever. In fact, it’s fully 75% better than ever, as the newest version of Google and Boston Dynamics’ humanoid robot carries over only a quarter of its parts from earlier prototypes. Everything from the battery pack to the arm strength has been upgraded, and not just for the sake of it — DARPA is getting ready to have ATLAS “cut the cord,” along with the rest of the competitors in its challenge in robot AI. Soon enough, ATLAS will be stomping through simulated “disaster” (combat) zones to “save” (neutralize) “civilians” (whomever) with total autonomy, and with no tether to undo a fall.

Jan 22 23:17

US Spying in Germany – With Friends Like These, Who Needs Enemies?

A German spy employed by Bundesnachrichtendienst (BND) was arrested in Berlin in early July 2014. He was charged with handing out the top secret documents to foreign secret services, namely the CIA. A few days later it was announced that German law enforcement agencies began searching for another US spy that had been stealing information from The Federal Ministry of Defence.

The general secretary of the Social Democratic Party (SPD) Yasmin Fahimi called for the adoption of a list of “effective countermeasures” that would allow Germany to protect its national secrets from being stolen by Washington. Speaking on national TV Yasmin Fahimi said that: “We are not yet another banana republic.”

Jan 22 16:44

Microsoft HoloLens: An experience you never knew you wanted

WEBMASTER ADDITION: Now THIS interests me a lot more than Google Glass did!

Jan 22 16:16

Journalist Barrett Brown Sentenced to 63 Months in Prison; Read his Speech Here

Justin King
Activist Post

Persecuted journalist Barrett Brown plans to use his opportunity to address the court at his sentencing to continue to defend his colleagues that are also being persecuted. The government extorted a guilty plea from him by threatening 105 years in prison: he’s currently facing around eight. All indications are that he signed a non-cooperating plea deal in which he admits only his role.

As Barrett Brown joins the ranks of America’s other political prisoners, the American people need to review his words and ask themselves if this is actually the government they want. Do they want to live in a society where journalists are targeted by federal agents simply because they revealed the truth? A society where the government exercises so much control over the corporate media, that the fifth estate remains silent, while one of their own is carted off to prison?

There isn’t much that can be added to Brown’s statement...

Jan 22 16:05

Sony hack: One Direction, David Bowie, Adele and more threatened as hackers 'plan to leak personal emails'

One Direction, David Bowie and Adele were last night bracing themselves for embarrassing details being leaked online after North Korean hackers threatened to publish a string of emails.

Why would North Korean hackers feel the need to threaten to leak the data? Its content is of no consequence to them. They can't financially benefit from it, and they would probably suffer a severe case of lead poisoning for giving advanced notice of the leak. The words "inside job" spring to mind.

Jan 22 13:46

BOMBSHELL: IRS Has Active Contract For MILLIONS With Company HHS FIRED Over Botched Healthcare.gov

Seven months after federal officials fired CGI Federal for its botched work on Obamacare website Healthcare.gov, the IRS awarded the same company a $4.5 million IT contract for its new Obamacare tax program.

Webmaster's Commentary: 

Adding insult to injury!

Jan 22 13:37

How Obama's Hacking Laws Could Make You a Criminal

Computer-security researchers fear President Barack Obama’s proposed changes to federal hacking laws could put them out of business, could make computers less secure overall, and could put some of them — and maybe even you — in prison.

"Under the new proposal, sharing your HBO GO password with a friend would be a felony," Nate Cardozo, an attorney with the Electronic Frontier Foundation in San Francisco, told an audience of researchers and IT pros Saturday (Jan. 17) at ShmooCon 2015, a security conference held annually in Washington, D.C.

Obama showcased the proposals in his State of the Union address Wednesday night (Jan. 20). The changes to the Computer Fraud and Abuse Act (CFAA), first implemented in 1984, might make many commonplace security-research practices — and media reporting on those practices — federal crimes. Even sharing passwords for online accounts would potentially be punishable.

Jan 22 13:34

The Hidden Threat To Free Speech in Obama’s State of the Union Address

President Obama proposed new laws to protect Americans and “especially our kids” from hackers during his State of the Union address. Swaddled in that almost tender-sounding language, though, was a plan that would strengthen the government’s ability to go after journalists like Barrett Brown.

In fact, the new cybersecurity legislation would further criminalize the kind of activity for which Brown is due to be sentenced in Dallas federal court on Jan. 22. Judge Sam A. Lindsay will decide whether to let Brown, 33, off with time served for the more than two years he’s already spent behind bars, or imprison him for a maximum of eight-and-a-half years. Brown struck a deal to plead guilty to, among other charges, a Computer Fraud and Abuse Act (CFAA) felony.

Jan 22 13:01

Joint Chiefs Chairman: Congress Must Pass Obama’s Cyber Bill

Even though the new Obama cybersecurity bill (itself mostly a copy of the failed CISPA bill) centers on civilian Internet infrastructure and giving the government easier access to individual Americans’ personal data, the Pentagon is finding ways to make it all about them.

Jan 22 12:44

'Whistleblowers persecuted & prosecuted for exposing illegality' - Snowden's lawyer

Jesselyn Radack, 2011 Sam Adams Award winner & the attorney of Edward Snowden & Bill Binney, tells about her experience.

Jan 22 12:42

New Facebook feature flags fake news

You've seen them in your feed: false reports of celebrity deaths, conspiracy theories presented as real news, promises of free iPads if you share a link, quotes attributed to the Pope that he never said.

Webmaster's Commentary: 

Note the inclusion of "conspiracy theories". Facebook is providing a button where anyone can flag a story as a hoax to get it banned. This gives the "megaphonies" the ability to silence any and all criticisms of Israel, with no recourse by the original poster.

We need a new censorship-free social media platform!

Jan 22 12:16

Thomas Drake - ‘US unchained itself from rule of law’ – 2011 Sam Adams Award winner

2011 Sam Adams Award winner Thomas Drake on the history of (NSA) whistleblowing and US security failures

Jan 22 09:01

Four and Counting: States Consider Bill to Turn Off Resources to the NSA

Activist Post

State efforts to stop warrantless NSA spying are off to a fast start in the 2015 legislative session.

Just two weeks into this year's legislative season, and with many legislatures not even in session yet, legislators in four states have already introduced bills to ban material support or resources to any federal agency engaged in warrantless spying.

These bills not only support efforts to turn off NSA’s water in Utah, but would also have practical effects on federal surveillance programs if passed...

Jan 22 08:37

OAKLAND POLICE PROVIDE PROOF THAT LICENSE PLATE READERS ARE CREATING A DATABASE OF AMERICANS

Since May 2013, EFF and the ACLU have been engaged in a legal battle with two Los Angeles law enforcement agencies who are refusing to hand over a week’s worth of ALPR data. San Diego County, another jurisdiction, has fought efforts by citizens to obtain access to data that law enforcement has collected on them using ALPRs. Both claim that the records are exempted under the California Public Records Act because they are records of law enforcement investigations. The agencies also argue the public interest in maintaining secrecy in ALPR data outweighs the public interest in learning how and where ALPR systems are being used.

Jan 22 08:22

EUROPOL 'TO BE GIVEN NEW INTERNET WATCHDOG POWERS

'
The EU is planning to give Europe’s police intelligence agency, Europol, new powers to become a European internet watchdog and censor, according to a secret policy document. The measures also include controls to have internet content removed as a key part of a Europe-wide response to terrorism after the Paris attacks two weeks ago.

Jan 22 08:21

EU WANTS INTERNET FIRMS TO HAND OVER ENCRYPTION KEYS

A top EU official wants internet and telecommunication companies to hand over encryption keys to police and spy agencies as part of a wider crackdown on terrorism. The EU’s counter-terrorism co-ordinator Gilles de Kerchove, in a document leaked by London-based civil liberties group Statewatch, says the European Commission should come up with rules that require the firms to help national governments snoop on possible suspects.

Jan 21 18:27

Sky blocks internet porn - now will rivals follow? Provider set to make family-friendly filter default unless customers choose to 'opt in'

Sky becomes the first major company to take the step, which was welcomed by child safety experts last night.

But pressure is now mounting on other major internet providers such as BT – which has twice as many broadband customers as Sky – and Virgin Media to adopt the same ‘family-friendly’ approach.

At present, these companies give customers the option of a filter – but do not impose one automatically.

Jan 21 16:43

Windows 10 will be a free upgrade for Windows 7 and 8.1 users

Backdoors are also free.

Jan 21 16:40

NSA secretly uses scapegoats, data mules and innocent victims' PCs for botnets

Besides the NSA being in North Korean systems but not warning Sony about the attack, leaked documents indicate that the NSA covertly uses innocent victims’ infected PCs when hijacking botnets, secretly redirects blame to scapegoats as well as taps into 'unwitting data mules' to pass along exfiltrated information.

Jan 21 16:15

Edward Snowden shuns iPhones due to secret software that can be remotely activated to spy on people, says lawyer

The iPhone has secret spyware that lets governments watch users without their knowledge, according to Edward Snowden's lawyer.

Jan 21 12:54

Health care website has leaks

The government's health insurance website is quietly passing along consumers' personal data to outside websites, just as President Barack Obama is calling for stronger cybersecurity protections.

It works like this: When you apply for coverage on HealthCare.gov, dozens of data companies may be able to tell that you are on the site. Some can even glean details such as your age, income, ZIP code, whether you smoke or if you are pregnant.

HealthCare.gov contains embedded connections to multiple data firms that the administration says generate analysis to improve the consumer experience. Officials say outside firms are barred from using the data to further their own business interests.

Still, ever-evolving technology allows for individual Internet users to be tracked, building profiles coveted by advertisers.

Jan 21 12:00

My Brush with French (and World) “Press Freedom”

Later in the month, I had the opportunity to take my first river cruise in Europe, on the Saone and Rhone Rivers in the south of France. I took my laptop with me to avail myself of the WiFi service that was available on the cruise boat.

I was still a bit excited about our success with the video and eager, should the opportunity arise, to share it with anyone I thought might be interested. The WiFi worked quite well generally, but when I attempted to view “Falling to Pieces for Israel,” I was greeted with this message: “This video is not available in your country.” At no time when I was in France was I able to see it.

Webmaster's Commentary: 

Read further down about how Kindle deletes books you have bought if the local government bans them. Good reason to go back to paper and ink books if you want to protect yourself from censorship!

Jan 21 11:40

Here's What Concerns Experts About Obama's State of the Union Cybersecurity Goals

Central to the problems with the recommended updates to the Computer Fraud and Abuse Act (CFAA) are vague terms that could easily be interpreted to prosecute innocents, no matter how weak their links to actual criminal activity. Anyone who "intentionally exceeds authorized access to a protected computer, and thereby obtains information from such computer" could be charged. That sounds acceptable on first inspection, but the definition of "exceeds authorized access" includes using a computer with proper authorization "to obtain or alter information" the relevant party is not entitled to look at, "or for a purpose that the accesser knows is not authorized by the computer owner".

Webmaster's Commentary: 

Or for that matter any of the Edward Snowden documents published in the European media.

Jan 21 10:14

PROJECT AURORAGOLD – THE US GOVERNMENT’S OWN HACKING OPERATION

There’s been an undeniable overload of information released by Edward Snowden since his rendition of “The Transported Man” back in May 2013. As we are now in 2015 the faucet of documents is still turned on. As if the NSA hasn’t already been pants’d enough, the last few months proves, yet again, that enough is never enough.

Jan 21 09:49

Facebook to hammer ‘satirical’ and ‘fake news’ stories

Facebook clamps-down on 'hoaxes'

Jan 21 09:35

The FCC's possible reclassification of ISPs signals hope for net neutrality

In January 2014, the FCC's net neutrality directives were struck down in the US Court of Appeals, a ruling that was expected because in 2002, the FCC reclassified ISPs as "information services," which prevents the agency from exerting much control over the infrastructure that powers these networks.

FCC Chairman Thomas Wheeler indicated that the agency will hold a vote on February 26, 2015, which is likely to return ISPs to being "telecommunication services" under Title II of the Communications Act of 1934. This will provide the FCC the legal authority to open access to utility poles to any interested company to build internet infrastructure, as well as prevent ISPs from throttling speeds from any remote servers, or prioritizing speeds from others in exchange for payment.

Jan 21 08:43

Google Maps Engine could be quietly coming to a halt soon

UPDATED: A Google spokesperson confirmed Maps Engine support will end on January 29, 2016.

Jan 21 07:26

Government Agency Classifies Journalists with Terrorists

Derrick Broze
Activist Post

New revelations from documents released by whistleblower Edward Snowden indicate the British Government Communications Headquarters (GCHQ) classifies investigative journalists as a threat, similar to terrorists and hackers.

The Guardian reported on the program which monitored emails to and from journalists working for media organizations in the U.S. and the UK. In one single day, in less than 10 minutes, the GCHQ collected 70,000 emails, including emails of journalists with the BBC, Reuters, the Guardian, the New York Times, the Sun, NBC, and the Washington Post. The emails were collected through the GCHQ accessing the fiber-optic cables known as “the backbone of the internet.” The communications were then shared with staff on the agencies intranet...

Jan 20 20:30

Google aboard as Musk`s SpaceX gets $1 bn in funding

he private space exploration firm SpaceX said Tuesday it had secured a $1 billion investment that could help founder Elon Musk`s plan to build a satellite Internet network.

The latest round of funding comes from Google and the financial firm Fidelity, which will own some 10 percent of the company.

Jan 20 16:18

Young people 'ready to ditch passwords for biometric security'

Of the biometric payment methods available to consumers, 16- to 24-year-olds are most keen on verification via fingerprint scanning, with 70 per cent predicting that this will be the primary form of identification by 2020.

Other methods of interest to this generation include retina scans (39pc) and facial recognition (27pc), though voice recognition (12pc), fast DNA samples (15pc) and implanted chips (16pc) remain less popular at present.

Jan 20 16:15

Sky to block pornography by default to protect children

Broadband provider Sky will block adult content by default, unless users opt out, it has revealed.

The decision was announced in a blog post and will be phased in over coming weeks.

In 2013 Prime Minister David Cameron put pressure on internet service provider [ISPs] to make online filtering mandatory, saying it was the best way to protect children.

His request caused controversy among politicians and the internet industry.

Since then most of the UK's ISPs have offered filtering software for parents concerned about what their children may be able to access online but few have offered this by default, opting instead to allow parents or other customers to turn the filters on if they want them.

Jan 20 16:07

You’ll Never Guess Who’s Trying to Hack Your iPhone

The FBI wants to search through your electronic life. You may think it’s a given that the government is in the business of collecting everyone’s personal data — Big Brother run amok in defiance of the Constitution. But under the limits of the Fourth Amendment, nothing it finds can be used to prosecute its targets. Now the FBI is taking steps to carry out broad searches and data collection under the color of authority, making all of us more vulnerable to “fishing expeditions.”

Jan 20 15:56

What David Cameron just proposed would endanger every Briton and destroy the IT industry

This, then, is what David Cameron is proposing:

* All Britons' communications must be easy for criminals, voyeurs and foreign spies to intercept

* Any firms within reach of the UK government must be banned from producing secure software

* All major code repositories, such as Github and Sourceforge, must be blocked

* Search engines must not answer queries about web-pages that carry secure software

* Virtually all academic security work in the UK must cease -- security research must only take place in proprietary research environments where there is no onus to publish one's findings, such as industry R&D and the security services

* All packets in and out of the country, and within the country, must be subject to Chinese-style deep-packet inspection and any packets that appear to originate from secure software must be dropped

* Existing walled gardens (like Ios and games consoles) must be ordered to ban their users from installing secure software

Jan 20 12:20

GCHQ captured emails of journalists from top international media

New evidence from other UK intelligence documents revealed by Snowden also shows that a GCHQ information security assessment listed “investigative journalists” as a threat in a hierarchy alongside terrorists or hackers.

Senior editors and lawyers in the UK have called for the urgent introduction of a freedom of expression law amid growing concern over safeguards proposed by ministers to meet concerns over the police use of surveillance powers linked to the Regulation of Investigatory Powers Act 2000 (Ripa).

More than 100 editors, including those from all the national newspapers, have signed a letter, coordinated by the Society of Editors and Press Gazette, to the UK prime minister, David Cameron, protesting at snooping on journalists’ communications.

Jan 20 09:34

The Digital Arms Race: NSA Preps America for Future Battle

Normally, internship applicants need to have polished resumes, with volunteer work on social projects considered a plus. But at Politerain, the job posting calls for candidates with significantly different skill sets. We are, the ad says, "looking for interns who want to break things."

Webmaster's Commentary: 

The links in red go to PDF files of US documents regarding the scope of cyber-warfare planned by the US Government.

Jan 20 08:50

Turkey arrests 23 in wire-tapping scandal

Turkey has arrested 23 people for wire-tapping senior government officials including President Recep Tayyip Erdogan.

Police launched raids in the capital Ankara and three other cities early Tuesday, arresting some 23 people suspected of illegally eavesdropping on senior government officials.

The state-run Anadolu news agency said the suspects are linked to Turkey's telecommunications authority and its research center. They are suspected of wiretapping phones, including encrypted ones used by President Recep Tayyip Erdogan and other senior officials.

Jan 20 06:22

Third-party connections prompt more privacy concerns about ObamaCare site

WASHINGTON – A little-known side to the government's health insurance website is prompting renewed concerns about privacy, just as the White House is calling for stronger cybersecurity protections for consumers.

It works like this: When you apply for coverage on HealthCare.gov, dozens of data companies may be able to tell that you are on the site. Some can even glean details such as your age, income, ZIP code, whether you smoke or if you are pregnant.

Jan 20 02:15

Think It All Started with Phones and Email? The NSA Used to Copy Our Telegrams

That’s right, folks: the NSA was systematically intercepting our telegrams all the way back in the 1960s.

One has to wonder: had the NSA been around in the days of communication by carrier pigeon, would we have found a government fort filled to the brim with dead birds and scrawled notes somewhere or what?

Jan 19 18:22

British intelligence intercepted emails from The New York Times, Reuters, BBC, and others

Newly released Snowden documents show GCHQ was listening in the internal communications of some of the most prestigious journalistic institutions in the world. A report in The Guardian details a test exercise that resulted in emails from BBC, Reuters, The Guardian, The New York Times, Le Monde, The Sun, NBC, and The Washington Post all being deposited onto GCHQ's internal intranet, available to anyone logged into the system. It does not appear to have been an intelligence gathering exercise, and the resulting emails don't seem to have targeted any sensitive stories, but it still represents a major privacy violation and a reminder of how easily bulk collection systems can be abused.

Jan 19 18:21

Malvertising Campaign exploited Google AdWords advertising

Malvertising campaigns are one of privileged attack vector exploited by criminal crews, their efficiency depends on the ability of attackers to compromise large audience channels. In September 2014 Malwarebytes firm discovered a large scale malvertising campaign exploiting Google’s DoubleClick and popular Zedo advertising agency to deliver malicious ad, while earlier 2015 security company Cyphort has discovered another malvertising campaign that targeted several websites via AOL Ad-Network, including the Huffington Post.

Jan 19 18:16

Lizard Squad’s Plaintext Customer List Leaked As Another Member Is Arrested

The Lizard Squad, the group of hackers credited with taking down Xbox Live and PSN over the holiday, have been compromised and much of their data leaked. Brian Krebs received a listing of the Lizard Squad’s LizardStresser customer database and noted that the group made about $11,000 in bitcoin serving up denial-of-service on demand.

At the same time police arrested an alleged member of the group, Jordan Lee-Bevan aka EvilJordie.

The Lizard Squad’s LizardStresser site had 14,241 users but only a few hundred funded accounts and performed an equal number of attacks (including shutting down Krebs’ own site).

Jan 19 15:46

Google will review Europe-only policy for ‘right to be forgotten’

Google is only removing search results from European websites when individuals invoke their “right to be forgotten”, contrary to regulators’ guidelines, but will review that approach soon, the company’s chief legal officer said on Monday.

Jan 19 10:43

‘Cyber Snipers’: Snowden uncovers truth on US digital war plans

America gearing up for digital war according to documents leaked by Snowden and released by der Spiegel magazine

Jan 19 10:34

Lizard Squad's paid cyberattack service faces a hack of its own

Lizard Squad is apparently getting a taste of its own medicine. Security guru Brian Krebs has learned that someone hacked Lizard Stresser, the cyberattack-for-hire service that Lizard Squad launched following its takedowns of the PlayStation Network and Xbox Live. The breach exposed the project's customer database, which was ironically stored in plain text -- unless clients change their passwords, they're about as vulnerable as the sites they paid to take down.

Jan 19 08:58

Insurance trackers 'could leave car vulnerable to hijack'

Tiny devices given to drivers by insurance companies to track driving habits are “insecure” and could allow a hacker to hijack cars, including steering and braking systems, warns a security researcher

Jan 19 08:22

The Digital Arms Race: NSA Preps America for Future Battle

The NSA's mass surveillance is just the beginning. Documents from Edward Snowden show that the intelligence agency is arming America for future digital wars -- a struggle for control of the Internet that is already well underway.

Jan 19 08:00

NSA Cyber War Will Use Internet of Things as Weapons Platform; Your Home is the Battlefield

Daniel Taylor
Activist Post

“World War III is a guerrilla information war with no division between military and civilian participation.” – Marshall McLuhan, Culture is Our Business, 1970

New Snowden documents recently revealed that the NSA is getting ready for future digital wars as the agency postures itself in an aggressive manner towards the world. "The Five Eyes Alliance," a cooperation between United States, Canada, Britain, Australia, and New Zealand, is working hard to develop these weapons of Cyber Warfare...

Jan 19 07:32

N.S.A. BREACHED NORTH KOREAN NETWORKS BEFORE SONY ATTACK, OFFICIALS SAY

The trail that led American officials to blame North Korea for the destructive cyberattack on Sony Pictures Entertainment in November winds back to 2010, when the National Security Agency scrambled to break into the computer systems of a country considered one of the most impenetrable targets on earth.

Jan 18 19:56

Apple Is Considering Storing Your Fingerprints In iCloud

Apple is considering storing customers' biometric data in the cloud to enable next-generation payment methods, according to new patent application found by Apple Insider.

The application relates to "finger biometric sensor data synchronisation via a cloud computing device and related methods," with one potential implementation being to authorise a "financial transaction."

Simply put, this means Apple is considering using its cloud hosting service iCloud to store customers' fingerprints, so they can be synced to other devices when required — such as to pay for a purchase.

Jan 18 08:32

John McAfee: 'I know who hacked Sony Pictures - and it wasn't North Korea'

Anti-virus pioneer John McAfee claims to have been in contact with the group of hackers behind the devastating cyber-attack against Sony Pictures and guarantees they are not from North Korea.

Jan 17 10:39

NY Post, UPI Twitter Accounts Hacked, Post Fake WWIII Alerts

Hackers infiltrated press agency UPI, posting a number of tweets which contained fake claims that a US Navy aircraft carrier, the USS George Washington, was engaged in active combat with Chinese vessels. The hackers also struck the New York Post.

Jan 17 06:25

Authoritarians Use Paris Terror Attack As Excuse for Power Grab

In the wake of the terror attack on the publication Charlie Hebdo in Paris, governments from around the world are calling for increased surveillance.

But top security experts agree that mass surveillance is ineffective … and actually makes us MORE vulnerable to terrorism.

Jan 17 06:12

US, UK to carry out cyber ‘war games’

US and UK intelligence agencies will begin conducting cyber “war games” to boost both countries' resistance to cyber attacks, President Barack Obama and British Prime Minister David Cameron announced.

Jan 17 06:07

Lavabit founder condemns David Cameron's 'insane' plan to ban encryption

British prime minister David Cameron’s calls to stop tech firms from protecting their users’ information with encryption technology are “insane”, according to the man who once ran NSA whistleblower Edward Snowden’s secure email account.

Jan 16 18:15

Security is Not a Crime—Unless You're an Anarchist

Nadia Kayyali and Katitza Rodriguez
Activist Post

Riseup, a tech collective that provides security-minded communications to activists worldwide, sounded the alarm last month when a judge in Spain stated that the use of their email service is a practice, he believes, associated with terrorism.

Javier Gómez Bermúdez is a judge of Audiencia Nacional, a special high court in Spain that deals with serious crimes such as terrorism and genocide. According to press reports, he ordered arrest warrants that were carried out on December 16th against alleged members of an anarchist group. The arrests were part of Operation Pandora, a coordinated campaign against “anarchist activity” that has been called an attempt “to criminalize anarchist social movements.” The police seized books, cell phones, and computers, and arrested 11 activists. Few details are known about the situation, since the judge has declared the case secret...

Jan 16 16:42

How to Lose Friends on Social Media: Question Authority

James Holbrooks
Activist Post

I’m gonna lose friends. I realize now it’s inevitable.

Not real friends. The real stuff is forged from memories and adamantium. I’m not worried about that. No, the friends I’m destined to lose are the type that can simply click a button and disappear me from their timeline.

I’ve been on Facebook since Christmas—as in three weeks ago. I’m sure that’s hilarious to some. But it was always a conscious decision not to partake, and I stand by it. In the end there were two reasons that finally got me to pull the trigger...

Jan 16 12:01

FALSE FLAG ALERT - 19,000 French websites under attack

The French Defense Ministry and ANSSI, that country's version of the NSA, confirmed to CNNMoney that they have monitored a large wave of cyberattacks on all sorts of French websites.

Webmaster's Commentary: 

And JUST in time to push the Cybersecurity bill!

Jan 16 09:21

Obama wants Congress to increase prison sentences for hackers

Proposal also expands hacking definition. That's a "dangerous idea," expert says.

Jan 16 09:03

Young Pirate hacker gets top security secrets

The president of the Swedish Pirate Party's youth wing has told The Local that Sweden's leading security and military experts searched for 'holidays' and 'forest hikes' during working hours, after he tricked them into logging onto an unsecure server at a conference.

Gustav Nipe, 26, set up a Wi-Fi network called 'Open Guest' at the conference earlier this week and claims that several high profile officials used the network to log into their email accounts and surf the internet.

As the Wi-Fi network was not encrypted, Nipe says he was able to track which sites people visited as well as the emails and text messages of around 100 delegates, including politicians and journalists as well as security experts.

“The security establishment was in Sälen pushing for more surveillance, but then leading figures go and log on to an unsecure W-Fi network,” he told The Local.

Jan 16 09:03

Disinformation of Charlie Hebdo: Analyzing a Fake BBC News Site

You may have noticed that a few media outlets have been reporting that a fake BBC website was setup to spread disinformation regarding the recent Charlie Hebdo attacks in Paris, France.On January 12, 2015 our advanced threat protection flagged the bbc-news[.]co[.]uk domain as a suspicious site. While we can’t say definitively what the motives are of the operators are, it is apparent that they are untrustworthy and potentially nefarious. The predictive classification that we used to identify and flag the site is showing the attack is very similar to former incidents that malicious actors have used in the past like the Boston Marathon malware incidents.

Webmaster's Commentary: 

The purpose was a "poison the well" propaganda stunt; to trick the public into thinking that the questions raised about Paris (and Boston) are not worth paying attention to.

Jan 16 09:01

ACTIVIST PULLS OFF CLEVER WI-FI HONEYPOT TO PROTEST SURVEILLANCE STATE

That we can identify government officials, journalists and politicians with the help of a wireless network and their less thoughtful use of online services demonstrates the tremendous power available in controlling the Internet.?The chairman of the youth wing of the Swedish Pirate Partysuccessfully fooled attendees at a major Swedish security and defense conference into connecting to an open Wi-Fi network that he controlled—as a way to protest mass digital surveillance.

Jan 16 08:16

Elon Musk Donates $10M to Eradicating Threat of Artificial Intelligence

by TechSwarm

Elon Musk has been one of many tech luminaries who have recently intensified their concerns about the threat of Artificial Intelligence run amok. Following a reading of Nick Bostrom's book "Superintelligence," Musk stated that advanced A.I. without proper ethical boundaries are "potentially more dangerous than nukes." Stephen Hawking has said much the same, and universities such as Cambridge have said that "terminators" are one of the greatest threats to mankind according to their study program Centre for the Study of Existential Risk.

The concern has manifested into serious research being conducted to ensure that robots know their limits. The United Nations has taken up the discussion; the U.S. military is being forced to address the issue; and even one Canadian robot manufacturer has issued an open letter urging his colleagues to proceed with the utmost caution, and to support the Campaign to Stop Killer Robots...

Jan 16 07:41

FCC to vote on Obama’s call for government-run internet next month

The Federal Communications Commission (FCC) will vote in February to decide whether municipalities can bypass state laws to provide their own internet service – a policy that President Barack Obama threw his weight behind earlier this week.

The vote is controversial but has support from the Obama administration, and proponents say it would give the public more options and faster service. Many Republicans and opponents argue that permitting such behavior exceeds the FCC’s authority.

Jan 16 07:30

Announcement: Commenting On Blacklisted News

It has come to our attention that the 3rd party commenting system we are using here on BlacklistedNews.com, Disqus is reporting that site staff or moderators on our behalf are banning commenters.

This is not true, and seems to be either a issue with disqus itself or because it is cross platformed, some of you may be being banned or profiled by Disqus for comments you are making on other sites communities.

Webmaster's Commentary: 

The problem may be Disqus itself. I have noticed that every time I win a discussion, especially one regarding Israel, I get banned. Facebook's commenting facility is also blocking me on sites like the Detroit News. That is why comments on WRH are run internally, and I do not ban commenters unless they are obviously trying to cause trouble.

Jan 15 18:37

VIDEO: DARPA's Six-legged Snake Monster is first of new breed of reconfigurable modular robots

Initial demonstrations of autonomous walking of "Snake Monster", a hexapod robot built with modular actuators from the Biorobotics Lab's snake robot project, at the Robotics Institute of Carnegie Mellon University. The series-elastic actuators in each joint allow simultaneous position-velocity-torque control, enabling compliant motions using a simple alternating-tripod walking gait. This work is funded by the DARPA M3 program.

Jan 15 16:26

‘Regrettable’: NSA mathematician apologizes for agency’s support of flawed security tool

A top NSA researcher has gone on the record to condemn the agency’s long-standing endorsement of a controversial cryptographic tool even after learning of its flaws – including a vulnerability that could be exploited by hackers and spies.

The National Security Agency’s director of research now says it is “regrettable” that the government continued to support the use of the application in question, which was previously reported to have been pushed on national and international standards groups by the NSA after the agency reportedly paid a leading security firm millions of dollars to make it one of its default programs.

Jan 15 15:39

Secret US cybersecurity report: encryption vital to protect private data

A secret US cybersecurity report warned that government and private computers were being left vulnerable to online attacks from Russia, China and criminal gangs because encryption technologies were not being implemented fast enough.

The advice, in a newly uncovered five-year forecast written in 2009, contrasts with the pledge made by David Cameron this week to crack down on encryption use by technology companies.

Jan 15 15:16

Exclusive: White House says net neutrality legislation not needed

The White House on Thursday said legislation was not necessary to settle so-called "net neutrality" rules because the Federal Communications Commission had the authority to write them.

Webmaster's Commentary: 

In other words, Obama just bailed on the promise of net neutrality he used to get support for the new incarnation of CISPA.

Jan 15 15:03

Indiana Bill Would Ban Material Support or Resources to the NSA

Activist Post

With Congress not only failing to rein in National Security Agency (NSA) spying, but actually expanding its power in a recent funding bill, many privacy activists have turned to the states to take action to block warrantless surveillance programs.

A bill filed this week in Indiana would not only support efforts to turn of NSA’s water in Utah, but would also have some practical effect in the Hoosier State...

Jan 15 14:20

Why Everyone Wants Their Own STASI - Universal Surveillance

When it comes to intelligence, everybody, be they democracies, dictatorships, or in between, wants it all. That includes the intelligence agencies–who treasure data as the wellspring of their effectiveness, influence, and leverage–and the presidents and prime ministers at the top of the heap—who are supposedly looking out for Joe Sixpack and his rights.

Jan 15 11:57

Obama calls for more cybersecurity information sharing

President Barack Obama followed up Monday's speech about data breach notification with another speech Tuesday encouraging companies to share information about cyberattacks.

In an address to the National Cybersecurity and Communications Integration Center (NCCIC) he proposed legislation that offers liability protection to companies that share information.

Jan 15 10:25

David Cameron seeks cooperation of US president over encryption crackdown

David Cameron is to urge Barack Obama to pressure internet firms such as Twitter and Facebook to do more to cooperate with Britain’s intelligence agencies as they seek to track the online activities of Islamist extremists.

Jan 15 08:38

Berkeley Protests Prompt Local Police to Push for Drones

Carey Wedler
Activist Post

Following uproarious police brutality protests in Berkeley and the San Francisco Bay Area last month, local cops are moving to employ drones in their police work.

Bloomberg reports that Berkeley and Oakland, both part of Alameda County, are seeking to use unmanned aerial vehicles. The city of San Jose is also eager to do the same...

Jan 15 06:53

This USB wall charger secretly logs keystrokes from Microsoft wireless keyboards nearby

Privacy and security researcher Samy Kamkar has released a keylogger for Microsoft wireless keyboards cleverly hidden in what appears to be a rather large, but functioning USB wall charger. Called KeySweeper, the stealthy Arduino-based device can sniff, decrypt, log, and report back all keystrokes — saving them both locally and online.

Jan 14 21:08

Bitcoin's Tracability May Result in Conviction of Ross Ulbricht

Ironically, it would have been much easier to conceal these assets in the traditional financial system. Conventional money laundering is still an enormous headache for prosecutors, and subpoenaing the transaction records for an offshore bank is much harder than simply checking the blockchain.. All these issues stem from a misunderstanding of Bitcoin itself. The service isn't technically anonymous: it's pseudonymous. Each wallet has a hard and persistent identity and a wealth of data associated with that identity. If you don't know who's behind a given wallet, that looks a lot like anonymity, but once a person is tied to a given wallet, their financial activity becomes instantly and painfully public.

Jan 14 17:32

DHS run police departments are using ‘ShotSpotter’ to spy on public conversations

In one of Camden’s roughest neighborhoods the police don’t want to talk about specific locations, but the Shotspotter microphones are hidden in buildings and on roof tops throughout the streets.

The technology costs between $60,000 and $100,000 a year per square mile.

A MuckRock FOIA request revealed police departments are using USAI grants otherwise known as DHS grants across the country.

Jan 14 16:00

Zombie Cookie: The Tracking Cookie That You Can’t Kill

An online advertising clearinghouse relied on by Google, Yahoo and Facebook is using controversial cookies that come back from the dead to track the web surfing of Verizon customers.

The company, called Turn, is taking advantage of a hidden undeletable number that Verizon uses to monitor customers' habits on their smartphones and tablets. Turn uses the Verizon number to respawn tracking cookies that users have deleted.

"We are trying to use the most persistent identifier that we can in order to do what we do," Max Ochoa, Turn's chief privacy officer, told ProPublica.

Turn's zombie cookie comes amid a controversy about a new form of tracking the telecom industry has deployed to shadow mobile phone users. Last year, Verizon and AT&T users noticed their carriers were inserting a tracking number into all the Web traffic that transmits from a users' phone – even if the user has tried to opt out.

Jan 14 15:57

David Cameron’s internet surveillance plans rival Syria, Russia and Iran

Cameron says there should be no means of communication that ‘we cannot read’. Let’s examine what that actually means

Jan 14 14:33

CTB Locker and Critroni Ransomware Information Guide and FAQ

CTB Locker (Curve-Tor-Bitcoin Locker), otherwise known as Critroni, is a file-encrypting ransomware infection that was released in the middle of July 2014 that targets all versions of Windows including Windows XP, Windows Vista, Windows 7, and Windows 8. Just like other file encrypting malware, the media continues to affiliate this infection with CryptoLocker when in fact this appears to have been developed by a different group using new technologies such as elliptical curve cryptography and the malware communicating with the Command and Control server over TOR. As discovered by Kafeine, this malware also appears to be part of a kit being sold online for $3,000 USD, which includes support in getting it up and running. With that said, expect to see other ransomware released using this kit, but possibly with different interfaces. More information on how this malware is being sold can be found in Kafeine's article "Crypto Ransomware" CTB-Locker (Critroni.A) on the rise.

Webmaster's Commentary: 

One of our WRH readers just got hit with this.

Jan 14 13:36

CISPA’s return? Obama seeks access to civilian communication info

Government intelligence agencies will be able to more closely work with private companies to access individuals’ private communications data if a new proposal from President Barack Obama is enacted. What many critics are calling a ‘recycling’ of the controversial CISPA, which was shut down by public opposition, the new plan has some differences the president hopes will make it more agreeable

Jan 14 12:29

UK Moves One Step Closer to Orwell’s 1984 Nightmare

In the United States, government officials responded to Apple and Droid’s new encryption services by throwing temper tantrums in speeches and making archaic arguments in court. In the United Kingdom, home of big brother and big brother to the U.S., they simply want to ban forms of communication they cannot intrude upon.

British Prime Minister David Cameron drew media attention this week when, in response to the Paris terrorist attacks, he said

“In our country, do we want to allow a means of communication between people which […] we cannot read?”

Jan 14 11:44

EU ministers push ISPs to censor web after Paris attacks

In the aftermath of the terrorist attacks on the offices of satirical newspaper Charlie Hebdo and a Jewish supermarket in Paris, EU ministers have issued a joint statement calling for ISPs to help to report and remove extremist material online.

The statement was signed by interior ministers from 11 European countries -- including the UK's Theresa May -- on 11 January, with French ministers and security representatives from the US, Canada and EU in attendance. It called for tighter internet surveillance and border controls.

SHARE THIS ARTICLE WITH YOUR SOCIAL MEDIA