COMPUTERS/INTERNET/SECURITY | WHAT REALLY HAPPENED


COMPUTERS/INTERNET/SECURITY

Feb 27 17:30

‘Jihadi John’ and the Future of the Biometrics Terror Hunt

The future of the biometrics dragnets that identified an Islamic State executioner is on a hilltop in West Virginia. On Thursday, the Washington Post and BBC publicly identified Mohammed Emwazi, a British-educated, Kuwaiti-born man in his mid 20s, as “Jihadi John,” the Islamic State frontman who executed several hostages on camera, to the world’s horror.

Feb 27 16:22

TalkTalk customers fall victim to fraudsters after data loss

TalkTalk admits that a data breach last year allowed scammers to prey on its four million customers, using stolen information to lend authenticity to over-the-phone requests for bank details which were then used to steal cash.

The communications company, which offers phone lines and broadband, say that the hack happened late last year but refused to reveal more details as “proceedings are ongoing”.

The Guardian reports that a third party contractor was involved in the loss, but the company could not confirm that to the Telegraph on Friday. Nor could it confirm how many customers were affected, saying only that it was a "small, but nonetheless significant" ammount.

It is believed that names, home addresses, phone numbers and TalkTalk account numbers were stolen.

Feb 27 15:56

Police State America: Internet, Rip?

Today the Federal Communications Commission (FCC), a non-elected federal government agency, voted three-to-two to reclassify broadband Internet as a common carrier service under Title II of the Communications Act. This means that – without the vote of Congress, the peoples’ branch of government – a federal agency now claims the power to regulate the Internet. I am surprised that even among civil liberties groups, some claim the federal government increasing regulation of the Internet somehow increases our freedom and liberty.

Feb 27 13:50

Did the FCC Sing Kumbaya After They Passed Net Neutrality?

Have you watched the video of the moment the FCC passed net neutrality? It's like this man walked on the moon and saved your grandma from cancer! Had to make a video...

Feb 27 13:48

SAMSUNG IS STILL LYING ABOUT THE ENCRYPTION ON ITS SMART TVS

When news broke that Samsung’s Smart TV’s listened to conversations and sent them to a third-party server company, the Korean manufacturer countered by claiming that all data transmissions to and from its televisions were encrypted. When testing demonstrated that the data in question wasn’t encrypted (despite being sent via Port 443, which is typically used for HTTPS traffic), Samsung modified its stance, claiming that new TVs were encrypted properly but older sets were not. This, too, has now been proven false.

Feb 27 13:39

There’s already a conspiracy theory brewing over net neutrality

It's been less than 24 hours since the Federal Communications Commission voted to approve strict new regulations on Internet providers, but that's the leading question coming from its critics.

Conservatives are demanding that the FCC release a full copy of the regulations that it's planning to impose on companies such as Comcast and Verizon — and taking the agency's silence as evidence of a cover-up. Readers of an FCC blog post have suspiciously mused that "these new regulations should have been published by now." It's much the same over on Twitter.

Feb 27 13:30

PERCEPTION MANAGERS: 35,000 INDIVIDUALS HAVE REPORTEDLY SIGNED UP TO JOIN UKRAINE’S ‘INFORMATION ARMY’

Russia’s vast state media sector has been embroiled in what has been referred to as an “information war” with Kiev and Western outlets since the beginning of the Ukrainian conflict, offering differing interpretations of the Ukrainian revolution and subsequent war in the east of the country.? The new initiative, which seeks to mobilise Ukrainian bloggers to post their accounts of the war online, was made live earlier this month in a bid to counter Russian propaganda coverage of the conflict.

Feb 27 13:14

CIA’S NEW BIG DATA HUB WILL BE HOSTED IN THE CLOUD

The CIA is preparing to take the next step in its quest to shake up the status quo of siloed agencies within the intelligence community. CIA Chief Information Officer Doug Wolfe confirmed Wednesday the intelligence agency will start using Cloudera’s Enterprise Data Hub platform by April, a move he expects “to extend the innovation and push the envelope on a whole range of different solutions” for all 17 IC agencies.

Feb 27 13:07

KIM DOTCOM’S MEGA IS DROPPED BY PAYPAL OVER END-TO-END ENCRYPTION, MAY ADOPT BITCOIN INSTEAD

Mega, the end-to-end encrypted cloud storage platform founded by mercurial entrepreneur and occasional outlaw Kim Dotcom, is back in the news. This time, the company’s primary adversary is PayPal, which earlier this week cancelled its payments processing contract.

Feb 27 12:07

Net Neutrality Vote in the FCC: You Lose America

It is manifestly unjust, and indeed outrageous, to allow this sort of cost-shifting to go on. It may be legal but it should be considered fraud. This is the false narrative being sold to you to support “Net Neutrality”, and it’s going to ram you right up the chute in the form of higher costs for your Internet connections whether you want to use Netflix and Facebook or not.

Feb 27 11:54

#LizardSquad hacks Lenovo over #Superfish...

Looks like Lenovo is going to be paying for the Superfish debacle for a long time coming.

Feb 27 10:59

Comcast: We Will Sue to Slow the Web

The company says the FCC overreached by passing rules to stop Internet service providers from blocking sites and slowing traffic. The problem is, Comcast’s admitted to doing just that.

Feb 27 10:57

Is This What We Can Expect from a Government-Run Internet?

The Federal Communications Commission voted Thursday to implement new net neutrality rules designed to make sure Internet service providers treat all legal content equally.

Feb 27 10:07

Obama Thanks Americans for Supporting Destruction of the Internet

Obama thanked internet users for supporting the FCC’s decision to micromanage the internet: -- As Ron Paul notes today the FCC is a non-elected federal government agency that has arbitrarily decided — without a vote from Congress or permission from the American people — to regulate the internet.

Feb 27 10:07

Disregard anti-net neutrality howlings: Our view

Cute, but hardly convincing. The net neutrality rules are many things. What they are not is a federal takeover, or government censorship or, as some critics put it, Obamacare for the Internet.

Webmaster's Commentary: 

Feb 27 09:42

Why your smartphone records everything you say to it

After controversy earlier this month over televisions recording owners and sending the clips to third parties, smartphone owners are now discovering that companies like Google, Apple and Microsoft are also recording voice commands and storing them for up to two years.

Feb 27 09:28

Berkeley Bans Police Drones, Taking Other Steps to Demilitarize Cops

Josh Paniagua
Activist Post

On Tuesday morning, I woke up to news of a Berkeley City Council meeting that would pass or reject a 2-year moratorium on the use of drones by the city happening later in the afternoon. By the evening, I was pleasantly surprised to hear that City Council had indeed passed a one-year ban on police drones and referred recommendations on remodeling community-police relations to the city manager.

During the 1-year suspension, City Council has pledged to work toward developing appropriate policies regarding city use of unmanned aircraft. While this may come as good news to some, vice chair of Berkeley’s Peace and Justice Commission Robert Meola was a bit disappointed...

Feb 27 09:12

Internet problems take out Facebook, Instagram, others; Lizard Squad takes credit

Unexplained outages took down a number of popular Internet services Monday night, including Facebook, Instagram, HipChat, and possibly others. Notorious hacker group The Lizard Squad took credit.

Webmaster's Commentary: 

As of now I cannot get into my Facebook account. It keeps shuffling me to the ad manager, which I don't use because I do not have ads on my Facebook page, but I cannot get out of there because it refuses my login. If I could get back in I would delete my accounts, because Facebook has become too difficult to use any more!

Feb 27 09:12

Ron Paul - Police State America: Internet, Rip?

Ron Paul 
RINF Alternative News

Today the Federal Communications Commission (FCC), a non-elected federal government agency, voted three-to-two to reclassify broadband Internet as a common carrier service under Title II of the Communications Act. This means that – without the vote of Congress, the peoples’ branch of government – a federal agency now claims the power to regulate the Internet. I am surprised that even among civil liberties groups, some claim the federal government increasing regulation of the Internet somehow increases our freedom and liberty.

Feb 27 08:36

Troll control: Twitter cracks down on abuse, spoofing

Twitter says it is boosting efforts to stop impersonation, spoofing and personal data leaks in the latest round of updates that are part of the corporation’s long term plan to deal with internet abuse on their platform.

“We streamlined the process of reporting harassment on Twitter recently; now we’re making similar improvements around reporting other content issues including impersonation, self-harm and the sharing of private and confidential information,” said Twitter Vice-President Tina Bhatnagar in a blog post.

The process started on Thursday and “should reach all users in the coming weeks."

Feb 27 08:10

Internet, RIP? by Ron Paul

Today the Federal Communications Commission (FCC), a non-elected federal government agency, voted three-to-two to reclassify broadband Internet as a common carrier service under Title II of the Communications Act. This means that – without the vote of Congress, the peoples’ branch of government – a federal agency now claims the power to regulate the Internet. I am surprised that even among civil liberties groups, some claim the federal government increasing regulation of the Internet somehow increases our freedom and liberty.

Feb 27 07:34

Ukraine Culture Ministry Bans Staff Use of .ru Domain Mail

Ukraine’s Ministry of Culture has banned staff from using Russian ru. domain e-mails or file-exchange networks, it said on Thursday, announcing that the prohibition "aims to stop confidential data leakage".

Webmaster's Commentary: 

"We'll use the American systems. THAT will keep our data safe!!!" -- President Chocolate

Feb 26 21:30

Why your smartphone records everything you say to it

In a post on Reddit one man claims to work for a company called Walk ‘N’ Talk Technologies, comparing recorded voice clips to the meaning extracted by computers and rating them for accuracy.

“I realised that I was hearing peoples’ commands given to their mobile devices,” he said. “I'm telling you, if you've said it to your phone, it's been recorded... and there's a damn good chance a third party is going to hear it. I've heard more text-to-speech sexting than I care to.”

Although there appears to be no evidence for the existence of any company by that name, audio is certainly being recorded in the manner described, by admission of tech companies.

Google says openly on its support pages that it records all of your voice commands issued to its Now service and saves them to “improve speech recognition”.

Feb 26 19:05

Ron Paul: Internet, RIP?

Today the Federal Communications Commission (FCC), a non-elected federal government agency, voted three-to-two to reclassify broadband Internet as a common carrier service under Title II of the Communications Act. This means that – without the vote of Congress, the peoples’ branch of government – a federal agency now claims the power to regulate the Internet. I am surprised that even among civil liberties groups, some claim the federal government increasing regulation of the Internet somehow increases our freedom and liberty.

Feb 26 18:57

REPORT: Ad Company Using Drones To Monitor Cellular, WiFi Signals

An advertising company has been utilizing drones experimentally to monitor cellular and Wi-Fi signals across the San Fernando Valley, according to a new report.

Feb 26 17:57

Ron Paul: Internet, RIP?

Feb 26 15:51

FCC Inches Closer to an Internet Takeover

Federal Communications Commission Chairman Tom Wheeler is refusing to appear before Congress as the FCC prepares a regulatory Internet takeover.

Feb 26 13:54

FCC Votes in Favor of Obama's Net Neutrality — Has the Slippery Slope to Web Censorship Begun?

Here it comes...

Having pressured FCC’s Tom Wheeler, the vote just came down: U.S. FCC APPROVES NET NEUTRALITY INTERNET RULES IN 3-2 VOTE. While potentially good for a consumer’s pocketbook, the handing over of “fair-use” decision to the government, as we previously noted, could be the first step on a slippery slope to increased censorship.

Feb 26 11:17

FCC approves net neutrality rules, reclassifies broadband as a utility

It's a good day for proponents of an open internet: the Federal Communications Commission just approved its long-awaited network neutrality plan, which reclassifies broadband internet as a Title II public utility and gives the agency more regulatory power in the process. And unlike the FCC's last stab at net neutrality in 2010, today's new rules also apply to mobile broadband. FCC chairman Tom Wheeler laid out the basic gist of the plan earlier this month -- it'll ban things like paid prioritization, a tactic some ISPs used to get additional fees from bandwidth heavy companies like Netflix, as well as slowdown of "lawful content." But now Wheeler's vision is more than just rhetoric, it's something the FCC can actively enforce.

Webmaster's Commentary: 

Now we get to find out what is on those other 300 pages!

Feb 26 10:34

FCC Inches Closer to an Internet Takeover

Federal Communications Commission Chairman Tom Wheeler is refusing to appear before Congress as the FCC prepares a regulatory Internet takeover.

Feb 26 09:48

Why is the FCC's Net Neutrality Plan Secret?

What's FCC Chairman Tom Wheeler? Hiding From Congress and the American People?

The 332-page final draft FCC order was only delivered to the four other FCC commissioners three weeks ago. When Wheeler delivered the document, he took the unusual step of issuing a “gag order” to prevent its release before the FCC vote

Feb 26 09:38

FCC: You Won’t Know What’s In Net Neutrality Until We Force It Upon You

The power grab is on, and the Obama Executive Branch will keep it all under wraps until it is too late for you to protest against it. Such has been the tendency of the Obama White House for six years, but now the brazen tyranny is being pranced in front of us as if the hard left minions of President Obama are daring us to make a peep about it.

Feb 26 09:36

'Breakthrough' NSA spyware shows deep grasp of makers' hard drives

What seems to be a U.S.-run computer espionage program has reportedly figured out how to employ a "breakthrough" snooping tactic — the implanting of spyware into hard drives — that could compromise most of the world's computers.

As a matter of policy, Kaspersky Lab, which publicized the discovery in a report on Monday, withheld the name of the country it suspects of being behind the operation.

But the Moscow-based anti-virus company said the country behind the implanted spyware was closely linked to Stuxnet, the computer worm deployed by the U.S. National Security Agency to disable Iran's nuclear-enrichment capabilities.

Former NSA operatives confirmed to Reuters that the analysis by Kaspersky, a highly reputable anti-virus firm, was correct. They said the NSA’s ability to secretly embed spyware into hard drives has long been prized by the surveillance agency.

Webmaster's Commentary: 

So if you are wondering how cyber-criminals seem to be able to so easily penetrate banks and credit card companies, it is because they don;t have to crack the systems, only find the open doors the NSA put in!

Feb 26 09:34

Bad for Business: After NSA Hack China Stops Buying Major US Tech Brands

China has been axing major US technology companies from its government purchasing list in favor of local brands. Some analysts believe fears over NSA spy technology could be to blame.

Webmaster's Commentary: 

Thanks a lot, NSA!

Feb 26 08:57

‘Today is the day’ as FCC readies historic vote on Net Neutrality

After millions made it clear they would not allow the commission, lawmakers or the telecom industry 'to mess with the Internet,' broad coalition plans celebrations on verge of historic vote

Feb 26 08:51

Argentina Congress votes to dissolve intelligence agency and to create new federal intelligence agency

Argentina's Congress has approved a bill to scrap the country's intelligence agency. The Intelligence Secretariat will be replaced with a new federal agency that will be accountable to Congress. The proposal was drafted last month by President Cristina Fernandez de Kirchner, following the death of special prosecutor Alberto Nisman.

Feb 26 08:39

Google Boosts Your Wallet

Google said via its blog that is working with AT & T, T-Mobile and Verizon for its application to electronic payments Google Wallet comes pre-installed on phones with Android operating system sold by three operators.

Read More: http://whatisusa.info/google-boosts-your-wallet/

Feb 26 07:27

FCC's Ajit Pai: Net Neutrality is a "Solution That Won't Work to a Problem That Doesn't Exist"

Feb 25 23:02

Telecoms, GOP Launch 'Last Ditch Effort' to Undermine Net Neutrality

A U.S. House subcommittee is meeting Wednesday to make a final attempt to derail net neutrality ahead of the Federal Communications Commission's vote scheduled for later this week.

Feb 25 18:41

Internet Freedom to Disappear on Thursday

The first thing will be changing the classification of the internet from an “information services” industry to a “telecommunications” industry, thus allowing the onerous – some call them draconian – rules now to apply to the internet, thus turning it essentially into a utility: bland, beige, quiescent, orderly, stagnant, inefficient, and expensive.

Feb 25 16:50

If the FCC’s ‘Net Neutrality’ Plan is So Great, Why Can’t Anyone See It?

If the FCC’s plan to “protect” net neutrality and reign in the power of greedy corporations is so fantastic, then why haven’t its 332 pages been released for public consumption?

Feb 25 16:08

Obamanet? Are Obama’s new internet rules the end of the Free and Open Internet?

This week the Federal Communications Commission (FCC) is scheduled to vote on the most significant Internet regulations ever. In spite of the wide-reaching effects of these new regulations, the American public has no say in what happens; instead, a bunch of government bureaucrats at the FCC will decide the future of the internet.

Feb 25 16:05

It's official: NSA spying is hurting the US tech economy

China is backing away from US tech brands for state purchases as NSA revelations continue to make headlines in newspapers all around the world.

Feb 25 16:02

Hillary Clinton Endorses FCC’s Title II Designation for the Internet

Former Secretary of State Hillary Clinton signaled support for the Federal Communications Commission upcoming vote to make the internet a Title II public utility.

Feb 25 15:57

Google's Atari-Playing Algorithm Could Be the Future of AI

This algorithm began with no previous information about Space Invaders—or, for that matter, the other 48 Atari 2600 games it is learning to play and sometimes master after two straight weeks of gameplay. In fact, it wasn't even designed to take on old video games; it is general-purpose, self-teaching computer program. Yet after watching the Atari screen and fiddling with the controls over two weeks, DQN is playing at a level that would humiliate even a professional flesh-and-blood gamer.

Volodymyr Mnih and his team of computer scientists at Google, who have just unveiled DQN in the journal Nature, says their creation is more than just an impressive gamer. Mnih says the general-purpose DQN learning algorithm could be the first rung on a ladder to artificial intelligence.

Feb 25 15:51

It's official: NSA spying is hurting the US tech economy

China is no longer using high-profile US technology brands for state purchases, amid ongoing revelations about mass surveillance and hacking by the US government.

A new report confirmed key brands, including Cisco, Apple, Intel, and McAfee -- among others -- have been dropped from the Chinese government's list of authorized brands, a Reuters report said Wednesday.

Feb 25 15:46

Socialism Behind “Net Neutrality” FCC Internet Takeover

“Net Neutrality” is a trojan horse attack on free speech spearheaded by socialist activists who want to take control of the Internet out of private hands by declaring it a “public utility.”

Feb 25 15:24

FCC Commissioner Ajit Pai: Net Neutrality is a "Solution That Won't Work to a Problem That Doesn't Exist"

Net Neutrality is "a solution that won't work to a problem that doesn't exist," says Ajit Pai, a commissioner at the Federal Communications Commission (FCC).

Pai is an oustpoken opponent of expanding government control of the internet, including FCC Chairman Tom Wheeler's plan to regulate Internet Service Providers (ISPs) under the same Title II rules that are used to govern telephone-service providers as public utilities. Under current FCC regulations, ISPs are considered providers of "information services" and subject to essentially no federal regulation.

Feb 25 14:09

Why ‘Net Neutrality’ is a Trojan Horse For Obama’s Web Takeover

The federal government is about to seize control of the Internet and most Americans don’t even know about it.

Feb 25 13:27

Forced Blood Draws, DNA Collection and Biometric Scans: What Country Is This?

Our freedoms—especially the Fourth Amendment—are being choked out by a prevailing view among government bureaucrats that they have the right to search, seize, strip, scan, spy on, probe, pat down, taser, and arrest any individual at any time and for the slightest provocation.

Forced cavity searches, forced colonoscopies, forced blood draws, forced breath-alcohol tests, forced DNA extractions, forced eye scans, forced inclusion in biometric databases—these are just a few ways in which Americans are being forced to accept that we have no control over what happens to our bodies during an encounter with government officials.

Feb 25 12:49

Hillary Clinton Blames ‘Different Media’ For Dividing Country

Former Secretary of State Hillary Clinton complained that “different media” are dividing the country, making it impossible for people to even have a conversation with each other.

Webmaster's Commentary: 

Translation: "Everyone should be forced to be in agreement with me!"

Feb 25 12:17

Soros, Ford shovel $196 million to 'net neutrality' groups, staff to White House

Liberal philanthropist George Soros and the Ford Foundation have lavished groups supporting the administration’s “net neutrality” agenda, donating $196 million and landing proponents on the White House staff, according to a new report.

And now, as the Federal Communications Commission nears approving a type of government control over the Internet, the groups are poised to declare victory in the years-long fight, according to the report from MRC Business, an arm of the conservative media watchdog, the Media Research Center.

Feb 25 11:28

World’s leading Simcard maker confirms British and US spooks “probably” stole security codes

The Franco-Dutch world number one simcard maker Gemalto has concluded its own investigation into a hacking of its security codes.

Last week an investigative website, acting on information supplied by whistleblower Edward Snowden, accused the British and American security services of the hack so they could monitor calls, texts and emails.

“This attack very likely has happened. We can correlate what is described in the document allegedly coming from the NSA or GCHQ with events we have observed. This attack was very innovative, it has never been seen before. So it was likely not done by a hacker or mafia as is usual,” said Gemalto’s boss Olivier Piou.

Feb 25 10:20

FCC Chair Refuses to Testify before Congress ahead of Net Neutrality Vote

Wheeler’s refusal to go before the House Oversight Committee on Wednesday comes on the eve of the FCC’s vote on new Internet regulations pertaining to net neutrality. The committee’s chairman, Representative Jason Chaffetz (R., Utah), and Energy and Commerce Committee chairman Fred Upton (R., Mich.) criticized Wheeler and the administration for lacking transparency on the issue.

Feb 25 10:08

Samsung Will Promote Its 5G Technology At Mobile World Congress

Samsung promoted by the firm also South Korea’s SK Telecom it’s called “millimeter wave technology” that allows a transmission rate of 7.5 gigabits per second (Gbps), about 30 times faster than current 4G networks.

Read More: http://whatisusa.info/samsung-will-promote-its-5g-technology-at-mobile...

Feb 25 10:07

THE DYSTOPIAN FUTURE OF QUANTIFIED BABIES

A group of design students from a Swedish university published an insightful academic paper last year spoofing all the baby health trackers now pitched to parents. The trackers measure things like a baby's breathing rate, heart rate, and sleep, and are made by startups including Mimo Baby, Owlet, Sproutling, and Monbaby.

Feb 25 09:46

Canadian Spies Collect Domestic Emails in Secret Security Sweep

Canada’s electronic surveillance agency is covertly monitoring vast amounts of Canadians’ emails as part of a sweeping domestic cybersecurity operation, according to top-secret documents.

Feb 25 09:44

18.8 million non-customers could be affected by Anthem breach

You read that headline correctly: between 8.8 and 18.8 million people are at risk as a result of the massive data breach that hit health insurer Anthem Inc. – despite having no relationship with the company.

When Anthem announced early February that hackers had accessed its servers and stolen personal information – including names, birth dates, phone numbers, addresses, email addresses, Social Security numbers, and employment information – it was estimated that about 78.8 million customers – including some 13.5 million Californians, 27,000 North Dakotans, 775,000 North Carolinians, 3.77 million Virginians, and 11,000 New Mexicans – were affected. Now, it transpires that the hackers got even luckier, and that an additional 8.8 to 18.8 people who aren’t Anthem customers could also be affected.

Feb 25 09:00

Facebook frontline: Kiev calls up 'online army' amid information war

A day after Ukraine announced it is joining the information war by creating an 'online army,' the Information Policy Ministry entered into its first controversy. It has reportedly called on bloggers to create accounts to spread information useful to Kiev.

The ministry has begun accepting applications from people wanting to join the online army. Once users are registered, they reportedly receive instructions on how to proceed.

Feb 25 08:02

Apple ordered to pay $533 million in iTunes infringement lawsuit

The tech giant must cough up roughly half a billion after being found guilty of using Smartflash patents without permission.

Feb 25 07:48

Texas inventor launches breakthrough home-based food production system featuring 3D-printable components posted online for free

A Texas patent holder and inventor has launched a collection of 3D-printable objects that function as key components in a non-electric, home-based food grow system that can be operated for

Feb 25 07:32

What Is FCC Hiding? Show Us

The Federal Communications Commission plans sweeping new regulations on the Internet that it claims will help consumers. If so, why are they keeping these rules hidden before voting on them Thursday?

For years, the FCC has been trying to impose itself on the Internet in name of "net neutrality," only to be thwarted by the courts. Even net neutrality backers can point to only fear, not harm, as justification for such intervention.

Rather than admit net neutrality is a solution in search of a problem, FCC Chairman Tom Wheeler decided — at the urging of President Obama — to regulate the Internet under what's called Title II. That's the part of the law that established the FCC and would let the government regulate competitive Internet service providers as though they were Ma Bell circa 1935.

Wheeler has refused to release the 332-page plan he wants the commission to approve on Thursday, citing FCC tradition as the reason.

Webmaster's Commentary: 

Net Neutrality can be described on a single page. So what are in the either 331 pages the FCC doesn't want you to see? Licenesed required (with heavy fees) for globs? Content control under "Standards and practices" as is now done with TV? Transfer of the public bandwidth into corporate control (again, as was done with radio and TV)?

It looks like the government created the whole "Net Neutrality Crisis" to get us to go along with allowing the White House to seize control of the internet, which has become a major threat to those who rule by lies and deception.

Feb 25 07:26

Obama's regs will make Internet slow as in Europe, warn FCC, FEC commissioners

“These Internet regulations will deter broadband deployment, depress network investment and slow broadband speeds. How do we know? Compare Europe, which has long had utility-style regulations, with the United States, which has embraced a light-touch regulatory model. Broadband speeds in the United States, both wired and wireless, are significantly faster than those in Europe. Broadband investment in the United States is several multiples that of Europe. And broadband’s reach is much wider in the United States, despite its much lower population density,” the two wrote.

They also joined to warn about the Democrat-chaired Federal Election Commission eyeing regulation of political speech on the Internet.

Noting recent votes on the issue that ended in a political deadlock, the two wrote, “these close votes and the risk of idiosyncratic case-by-case enforcement inevitably discourage citizens and groups from speaking freely online about politics.”

Webmaster's Commentary: 

"But that's the whole POINT! People shouldn't discuss politics. They should just believe what I tell them as if it is the word of God ... which, it kinda is!" -- Official White Horse Souse

Feb 24 22:07

The Second Amendment and the Right to Bear Drones

Given the rapid advance of robotic technology, drones like the GuardBot may look quaint in the next few years. We’re on the cusp of a new age of warfare that will be unlike anything we’ve seen before. In the future, the superpowers of the world will fight their wars with autonomous robots, and unfortunately, most people are completely unaware of what this might mean for their children’s generation.

Feb 24 17:46

Komodia’s Founder, “Was Once a Programmer in Israel’s IDF’s Intelligence Core”

Why is Komodia now getting so much attention anyway? Because its hugely intrusive and poorly protected technology is found in many places on the web, according to Marc Rogers, principal security researcher at content delivery network CloudFlare. The technology can be found in various parental control software, including those made by Qustodio and the Israeli firm’s own “Keep My Family Secure” product, and in web filter products across the world. On Weichselbaum’s LinkedIn page, he says: “My biggest vision is to create a world where children can surf the internet safely, and I’m working to see this vision realized.”

Feb 24 16:54

DARPA Spending Millions on ''RATS'' Voice Recognition Surveillance Tech

Cassius Methyl
Activist Post

Between 2015 and 2017, the Pentagon will have the ability to decipher human voices in surveillance audio even if background noise makes the covertly recorded conversations inaudible; and they are spending an additional $2.4 mil on top of the $13 mil already spent to do it...

Feb 24 15:00

CIA looks to expand its cyber espionage capabilities

CIA Director John Brennan is planning a major expansion of the agency’s cyber-espionage capabilities as part of a broad restructuring of an intelligence service long defined by its human spy work, current and former U.S. officials said.

Feb 24 13:49

CIA looks to expand its cyber espionage capabilities

CIA Director John Brennan is planning a major expansion of the agency’s cyber-espionage capabilities as part of a broad restructuring of an intelligence service long defined by its human spy work, current and former U.S. officials said.

Feb 24 11:21

Cops Want to Block Tracking App

Waze is an App that among other things allows you to pin police locations. Now police who use Stingray systems and other intelligence gathering measures want the App banned.

Feb 24 11:07

Former FCC Chairman ‘Shocked’ By The FEDs Rush To Regulate The Internet

Former FCC Chairman Michael Powell told CNBC today that he was shocked by the federal agency’s rush to regulate the Internet as a vote looms on a 332 page plan that remains secret.

Feb 24 09:45

Ad-blocking software is 'worse than Superfish'

Researchers have identified a fresh threat to the way consumers interact with websites, this time from software designed to block advertisements.

PrivDog has been found to compromise a layer of the internet known as Secure Socket Layer (SSL) - used to safeguard online transactions.

It follows the discovery of a similar problem with Superfish, software pre-installed on some Lenovo computers.

PrivDog said that its issue might compromise more than 57,000 users.

Feb 24 09:44

Download.com and Others Bundle Superfish-Style HTTPS Breaking Adware

And then they are installing a proxy into your browser and forcing all of your browsing through it so they can insert ads. That’s right, even when you connect to your bank, or health insurance site, or anywhere that should be secure. And you would never know, because they broke Windows encryption to show you ads.

But the sad, sad fact is that they aren’t the only ones doing this — adware like Wajam, Geniusbox, Content Explorer, and others are all doing the exact same thing, installing their own certificates and forcing all your browsing (including HTTPS encrypted browsing sessions) to go through their proxy server. And you can get infected with this nonsense just by installing two of the top 10 apps on CNET Downloads.

The bottom line is that you can no longer trust that green lock icon in your browser’s address bar. And that’s a scary, scary thing.

Feb 24 09:16

NSA director defends plan to maintain 'backdoors' into technology companies

The National Security Agency director, Mike Rogers, on Monday sought to calm a chorus of doubts about the government’s plans to maintain built-in access to data held by US technology companies, saying such “backdoors” would not be harmful to privacy, would not fatally compromise encryption and would not ruin international markets for US technology products.

Rogers mounted an elaborate defense of Barack Obama’s evolving cybersecurity strategy in an appearance before an audience of cryptographers, tech company security officers and national security reporters at the New America Foundation in Washington. In an hour-long question-and-answer session, Rogers said a cyber-attack against Sony pictures by North Korea last year showed the urgency and difficulty of defending against potential cyber threats.

Webmaster's Commentary: 

The only cyberthreat is the NSA itself!

Feb 24 08:29

Russian researchers expose breakthrough U.S. spying program

Raiu said the authors of the spying programs must have had access to the proprietary source code that directs the actions of the hard drives. That code can serve as a roadmap to vulnerabilities, allowing those who study it to launch attacks much more easily.

"There is zero chance that someone could rewrite the [hard drive] operating system using public information," Raiu said.

Webmaster's Commentary: 

So much for the claims by the hard drive makers that they did not know what the NSA was doing!

Feb 24 08:00

Hundreds of South Carolina Prisoners Sent to Solitary Confinement Over Facebook

Back in 2012, the South Carolina Department of Corrections (SCDC) made “Creating and/or Assisting With A Social Networking Site” a Level 1 offense [PDF], a category reserved for the most violent violations of prison conduct policies. It’s one of the most common Level 1 offense charges brought against inmates, many of whom, like most social network users, want to remain in contact with friends and family in the outside world and keep up on current events. Some inmates ask their families to access their online accounts for them, while many access the Internet themselves through a contraband cell phone (possession of which is yet another Level 1 offense).

Feb 24 07:59

NSA and GCHQ: Big Brother Would Have Never Believed

On February 16, researchers at the Moscow-based security group Kaspersky Lab announced the discovery of the ultimate virus which has virtually infected all spheres of military and civilian computing in more than 40 countries around the world. They’ve managed to discover a piece of malware that must have been installed on hard disks while they were still being manufactured, and due to its complexity and a certain number of features that it shares with Stuxnet, it’s safe to assume that it was created by US secret services.

On February 18, The Guardian confirmed that for the last 7 years Government Communications Headquarters (GCHQ) had been sharing personal intelligence data en masse with America’s national security agencies, regardless of the fact that it had interceptedmillions of foreign citizens’ conversations. The ruling of a UK court clearly suggests that these actions were illegal on top of being carried out in violation of the the European Convention on Human Rights.

Feb 24 07:25

Yahoo exec grills NSA director over ‘backdoor’ access to private data

“It sounds like you agree with [Federal Bureau of Investigation Director James] Comey that we should be building defects into the encryption in our products so that the US government can decrypt,” Yahoo’s chief information-security officer, Alex Stamos, said during the 'Cybersecurity for a New America: Big Ideas and New Voices' conference.

Rogers cut the question off, saying: “That would be your characterization.”

Stamos then proceeded further, asking the NSA director whether US tech firms should also build backdoors for foreign countries requesting access to private data.

Feb 24 07:17

Twitter comes out for #NetNeutrality

One after another, web giants are openly backing ‘net neutrality’ reforms proposed by the FCC. Twitter endorsed the plan on Monday, calling the open internet the “heart of Twitter.”

The internet not only “provides the lowest barrier to competitive entry” for businesses, but also serves “as a great equalizer in the access to information and in reaching a global audience,” Twitter public policy manager Will Carty wrote in a statement. “If you have an opinion or a new innovative web-based service, you don’t have to get permission to share it with the world at large.”

Feb 24 07:16

First Official Image Of The New Galaxy S6

The first official image of the new Samsung Galaxy S6 has been unveiled in Twitter by John Legere, president of T-Mobile USA, a major telephone companies in the United States.
In a message in which he claimed that his company will participate in “the next big” executive photograph showing a side of the phone used in advertising campaigns.

The image of Samsung Galaxy S6 reveals that have a curved edge that your screen will extend at least in one version, as already has the Galaxy Note Edge.

The latter, presented by Samsung in Berlin last September, was the launch pad for this type of display as different from most. The curved area is used as a taskbar on computers, which can occur from application options to serve as a launcher for your favorite applications.

Read More: http://whatisusa.info/first-official-image-of-the-new-galaxy-s6/

Feb 24 07:06

Apple patents iPhone tracking system

Your next iPhone may be trackable even when it's turned off, if Apple’s newest patent is anything to go by. The Cupertino tech giant has just patented a technology that would “periodically exit an unpowered state and transmit location data.”

Feb 24 07:01

The Spy Cables: A glimpse into the murky world of espionage

Feb 24 01:44

From Internet to Obamanet

This is yet another infringement of our government on our freedom. Does anyone think this President and his pals will stop short of regulating internet content?

Feb 23 23:01

The SIM Card Saga. The NSA and Britain’s GCHQ’s Agenda: Establishing Total Control Over Internet and Mobile Phone Users

Recent days have been marked by a record number of news stories regarding the US and its allies trying to establish total control over Internet users.

Feb 23 22:31

SIM Card Producer Denies Any Real Risk From NSA Hacking Its Encryption Keys

Apparently, execs at Gemalto went to the same crisis management training program as the top execs at Lenovo. As you probably recall, last week The Intercept revealed that the NSA and GCHQ had hacked into the systems at Gemalto, the world’s largest maker of SIM cards for mobile phones, in order to get access to their encryption keys. This is a pretty massive security breach, allowing these intelligence agencies to decrypt calls that people thought were encrypted. But Gemalto insists its SIM cards are perfectly secure...

Feb 23 18:23

The government can go back in time and listen to calls you made before you were a target

Back in May 2013, a former FBI agent went on national television and twice told the American public that "all digital communications" are recorded and retained for posterity by US government agencies. Those comments came just a month before the first Edward Snowden leaks rocked the world. Later that June Glenn Greenwald, the reporter to publish the first of the Snowden leaks, told an audience in Chicago that the NSA collects the content of one billion phone calls per day.

Feb 23 17:45

Facebook Owner Mark Zuckerberg Takes Public Stand Against Vaccine Refusers

This is the same guy who called all the users of his network "dumb f*cks" once upon a time, so...

Feb 23 17:39

A Viral Video about Police Brutality Is Making Its Way across the Web, Read This before Sharing It

A quote popularized by Mark Twain best sums up a recent motion graphic that’s been circulating on social media.

“There are three kinds of lies: lies, damn lies, and statistics.”

The video attempts to make a comparison of how likely the chances were for you to get murdered or raped, and then endeavors to compare this to police brutality per contact.

Feb 23 17:00

NSA chief declines comment on hard drive spyware reports — but insists programs lawful

The head of the National Security Agency refused to comment on Monday on reports that the U.S. government implants spyware on computer hard drives for surveillance purposes, saying “we fully comply with the law.”

Feb 23 16:45

Republican FCC Commissioners Ask Wheeler To Delay Net Neutrality Vote, Release Proposal

Three days before the Federal Communications Commission is scheduled to vote on the most significant Internet regulations in history, two commissioners are asking Chairman Tom Wheeler to delay the vote and release his proposal to the public.

“We respectfully request that FCC leadership immediately release the 332-page Internet regulation plan publicly and allow the American people a reasonable period of not less than 30 days to carefully study it,” Republican Commissioners Ajit Pai and Michael O’Rielly said in a statement Monday. “Then, after the commission reviews the specific input it receives from the American public and makes any modifications to the plan as appropriate, we could proceed to a final vote.”

Feb 23 16:00

“Bug” causes music group to bombard Google with bogus DMCA takedowns

One removal demand from Total Wipes, saying "We have an exclusive & worldwide deal for distributing this content," sought the removal of 95 download pages from some of the biggest names on the Internet, among them Ubuntu, Python, Skype, Open Office, Raspberry Pi, Pidgin, and Tor.

Feb 23 15:57

Faked PayPal sites hard to distinguish from the real thing

Faked PayPal email notifications directing recipients to malicious websites aren’t new. But cybercriminals are getting a lot better at executing them.

That’s what the discovery of a current phishing campaign designed to lure victims to click to a pair of very well-designed faked PayPal websites shows.

The finding comes from researchers at OpenDNS, a free, advertising-sponsored service for making faster, more secure website connections.

The fraudulent PayPal websites are virtually indistinguishable from the real PayPal.com, down to the images used on the login screen, the color palette, and the HTML code used in the page’s layout, the researchers found.

Feb 23 15:50

How the NSA’s Firmware Hacking Works and Why It’s So Unsettling

The hacking tool, believed to be a product of the NSA, is significant because subverting the firmware gives the attackers God-like control of the system in a way that is stealthy and persistent even through software updates. The module, named “nls_933w.dll”, is the first of its kind found in the wild and is used with both the EquationDrug and GrayFish spy platforms Kaspersky uncovered.

It also has another capability: to create invisible storage space on the hard drive to hide data stolen from the system so the attackers can retrieve it later. This lets spies like the Equation Group bypass disk encryption by secreting documents they want to seize in areas that don’t get encrypted.

Feb 23 13:23

Houston Admits Rapists Allowed to Rape Again Due to Backlogged Rape Kits

Houston’s District Attorney Devon Anderson admitted in the press conference that this lack of action on Houston’s rape kits did allow some of those rapists to rape again in the meantime (via KHOU).

“Now the technology is better. And as the mayor just said, it’s a lot cheaper. So we can test all of them. But yes, it did happen, unfortunately, and we are eagerly looking forward to prosecuting those rapists, those repeat rapists.”

So what is the statute of limitations on getting raped because your local law enforcement agency failed to act on evidence against your rapist who already raped someone else?

Feb 23 12:46

Car Hacking Report Refuels Concerns About Michael Hastings Crash

Those still wondering what really happened in gonzo journalist Michael Hastings’ fiery demise likely sat up straight during 60 Minutes’ recent piece on how hackers can hijack the controls of a car.

After Hastings died in a bizarre one-car crash along a straight Los Angeles street, former counterterrorism adviser Richard Clarke noted the accident was “consistent with a car cyber attack” and that it was easy to hack cars. It seems he was right, as 60 Minutes demonstrated in a chilling fashion.

Feb 23 12:40

Gaza Strip Created in U.S. Southwest

Why are Israeli companies heavily involved in the United States federal government’s alleged efforts to “close” our unprotected borders and keep out tidal waves of aliens illegally invading our country? To find out, AMERICAN FREE PRESS interviewed Tucson, Arizona resident Todd Miller, author of the book Border Patrol Nation: Dispatches from the Front Lines of Homeland Security, who has uncovered highly troubling facts about Israel’s long-term, ever-deepening involvement in “securing the American homeland” after September 11, 2001.

Feb 23 12:26

NSA chief declines comment on hard drive spyware reports — but insists programs lawful

The head of the National Security Agency refused to comment on Monday on reports that the U.S. government implants spyware on computer hard drives for surveillance purposes, saying “we fully comply with the law.”

Feb 23 11:13

German music group sends DMCA takedown against Python, EFF, TorProject, Red Hat, Ubuntu and others

A music group's anti-piracy system has just sent Google the most staggeringly ridiculous DMCA notices the planet has EVER seen. If you aren't sitting down, please do so now. Remove tight clothing, open a window and get a glass of water. This one is absolutely epic.

Feb 23 10:33

School Surveillance ''the norm'' in US and UK; on the rise in Australia: Study

TechSwarm

Invasive school surveillance practices are the norm in the UK and USA, and according to a University of Adelaide criminologist, such practices are becoming increasingly popular in Australian schools.

Associate Professor Andrew Hope’s research into school-based surveillance in the UK, USA, Europe and Australia was published in the British Journal of Sociology of Education...

Feb 23 09:18

BILL GATES SETS NEW WORLD ORDER CONSPIRACY THEORIES ON FIRE WITH GLOBAL GOVERNMENT QUOTE

Microsoft co-founder Bill Gates may be the the richest man in the world, but he apparently envisions a global government as a goal for the future. This prospect has New World Order conspiracy theorists buzzing about the potential for the one world government being pushed by the Gates Foundation. In a related report by the Inquisitr, Brazil’s Eike Batista managed to go from one of the world’s richest men to the very first negative billionaire within a period of only several years. Some New World Order conspiracy theories claim the Illuminati devil horns were spotted at the 2015 Grammy Awards.

Feb 23 08:43

Google Chrome Approaching World Domination?

A few moments ago a reader was having difficulty with an ad on my blog. I occasionally get complaints, and most of the recent ones involve non-US ads. The reader said the problem went away when he switched over to Chrome from Internet Explorer.

That got me wondering what browsers people were using to read my blog. Here are the results from a 20-minute, mid-Saturday snip.

Feb 22 20:05

Norton Internet Security antivirus update 'borked Internet Explorer'

Users of the world's second best* browser were forced to use alternatives after an overnight update to Norton AntiVirus prevented Internet Explorer from working at all.

Aggrieved users who'd thought far enough ahead to install Google Chrome, Mozilla Firefox or any of the other alternatives took to Norton's official forum to vent their spleens.

Feb 22 09:30

Buyer Beware: Talking Barbie Records Kids’ Conversations

Mattel’s new high-tech Barbie that records conversations for analysts to read. What possibly could go wrong?

Feb 22 09:23

Lenovo committed one of the worst consumer betrayals ever made

When Lenovo preinstalled Superfish adware on its laptops, it betrayed its customers and sold out their security. It did it for no good reason, and it may not even have known what it was doing. I’m not sure which is scarier. The various news reports of this catastrophe don’t quite convey the sheer horror and disbelief with which any technically minded person is now reacting to Lenovo’s screw-up. Security researcher Marc Rogers wrote that it’s “quite possibly the single worst thing I have seen a manufacturer do to its customer base. … I cannot overstate how evil this is.” He’s right. The Lenovo Superfish security hole is really, really bad.

Feb 22 08:18

NSA's SIM Card Scandal Bigger Than You Think

Vladimir Platov
Activist Post

Stolen encryption keys are just the beginning. US NSA appears to have compromised big telecom, IT manufacturers, online banking, and even passports, starting on the factory floor...

Feb 22 07:33

Whoa! A Bit of Accuracy from the Corporate Media! Becky Akers

Truthful media? Shocking!

“All I know is just what I read in the papers, and that's an alibi for my ignorance.”
- Will Rogers

Feb 22 06:29

US judge dismisses antitrust case against Google over Android apps

A U.S. federal judge has dismissed an antitrust lawsuit that charges Google harmed consumers by forcing Android handset makers to use its apps by default, but gave the plaintiffs three weeks to amend their complaint.
***
Google faces allegations of anticompetitive behavior in a number of antitrust cases around the world. The most recent case involves Russian search engine company Yandex, which has accused Google of illegally forcing Android device manufacturers to install its own apps and exclude software from competitors. Yandex said on Feb. 18 that it had filed a complaint with the Russian Federal Antimonopoly Service (FAS) asking the authority to investigate Google for possible violations of Russian antitrust law.

Feb 21 11:55

Calls to shut down social media “extremism” intensify

CBS claims the IS “propaganda machine produces as many as 90,000 posts on Twitter, YouTube, Facebook and other social media platforms every single day.”

Feb 21 09:22

Hackers can track phone users’ location by looking at power supply

The findings were carried out by a group of researchers at Stanford University and the Israeli defense company Rafael. The created a technique, which they have named PowerSpy and can gather information concerning the location of Android phones. It does this by simply tracking how much power has been used over a certain time.

How much power is used depends on a number of factors. For example, the further away the phone is from a transmitter, the more power is needed to get a signal. Physical objects such as mountains or buildings also have an impact on the amount of battery needed as these obstacles can block the phone’s signal, meaning there are temporary ‘power drains’ on the devices.

“A sufficiently long power measurement (several minutes) enables the learning algorithm to ‘see’ through the noise,” the researchers said, which was reported by Wired. “We show that measuring the phone’s aggregate power consumption over time completely reveals the phone’s location and movement.”

Feb 21 08:57

"We Messed Up Badly" Lenovo Admits Putting Tracking Software On Your PC

Lenovo Group, the largest computer manufacturer in the world, has made a rather stunning admission that they have been pre-installing tracking software on their PCs.

The tracking software is made by a company called Superfish, which apparently paid some “very minor compensation” to Lenovo for putting the software on people’s computers.

Feb 21 08:54

Norton AntiVirus was killing Internet Explorer

One is more than embarrassing mistake Symantec at night friday on front run on Saturday (20th to 21st February). An update of the antivirus software Norton AntiVirus was killing Microsoft's Internet Explorer 11 on Windows -7-64-bit systems. Whether other versions of Windows are affected by the error, unable to trace the author, since on its systems, only Windows 7 runs. When you enter the Internnet Explorer this immediately crashes with the error message "BEX". As a faulty module file "IPSEng32.dll" was displayed, which seems to be a Norton / Symantec file.

Feb 21 08:52

IBM Watson Dehumanizing Veterans Care

Jefferey Jaxen
Activist Post

IBM, whose stock price has sunk to its lowest in four years, has recently “announced a $1 billion investment to establish the new Watson Group.” IBM’s Watson computer processes large amounts of your information to make a better decision for you. Watson is now embedded in the Department of Veterans Affairs Data Center in Austin, Texas to “advise doctors on treatments for post-traumatic stress disorder.” According to their press release, the technology will “transform decision making,” or said in a different way, if you are a Veteran in need of care, IBM’s Watson will soon make the decision about your health care for you...

Feb 21 08:50

TrueCrypt + Norton AV = BSOD, wail disgruntled users

Encrypted disk users who upgrade to Norton 2015 have been confronted by the dreaded Blue Screen of Death.

Norton 2015 appears to trigger a crash on Windows 8.1 PCs that runs a disk encryption driver, according to user complaints about the problem in a thread on a Symantec support forum.

Many of those affected are running TrueCrypt but the issue is by no means limited to that utility, affecting other full-disk and file encryption utilities as well.

Users began complaining about the issue in mid-December and it is still not fixed. Downgrading to Norton 2014 has been suggested as a temporary stopgap ahead of a more comprehensive fix.

Feb 21 08:21

FBI digital search-warrant plan a ‘monumental’ constitutional threat, says Google

Tech giant Google submitted court documents this week charging that a new FBI plan for obtaining digital search warrants is a “monumental” constitutional threat.

Feb 21 03:28

The Folly of Data Retention - A Fool’s Paradise in Australia

The greatest danger of such an order of data retention is not even a dystopian one featuring corrupt police brutalising protesters and dissenters. Such totalitarian bestialities should never be deemed impossible, but in a materialist wonderland such as Australia, information retained by ISPs and telcos offers other rich prospects for abuse.

Feb 20 15:44

Find Out if You've Been Spied on - and Join the Fight for Privacy

by Nadia Kayyali

Want to know if GCHQ spied on you? Now you can find out. Privacy International (PI) has just launched a website that lets anyone find out if their communications were intercepted by the NSA and then shared with GCHQ.

The website is the result of a February 6 ruling by the Investigatory Powers Tribunal (IPT). Similar to the Foreign Intelligence Surveillance Court in the US, the IPT is a special court in the UK established by the Regulation of Investigatory Powers Act (RIPA) that deals with issues of surveillance and human rights...

Feb 20 15:33

Lenovo’s Response to Its Dangerous Adware Is Astonishingly Clueless

The company issued a statement shortly after security experts raised the issue, saying it stopped shipping the adware last month and customers need not worry about the thing compromising their security. “We have thoroughly investigated this technology and do not find any evidence to substantiate security concerns,” Lenovo said.

Robert Graham, the CEO of internet security firm called Errata Security, doesn’t mince words in assessing the situation. “This is a bald-face lie,” he says of Lenovo’s statement. “It’s obvious that there is a security problem here.” And Graham knows what he’s talking about. He runs a security consultancy and has documented very real security problems with Superfish.

Feb 20 15:30

Physics in finance: Trading at the speed of light

Financial traders are in a race to make transactions ever faster. In today's high-tech exchanges, firms can execute more than 100,000 trades in a second for a single customer. This summer, London and New York's financial centres will become able to communicate 2.6 milliseconds (about 10%) faster after the opening of a transatlantic fibre-optic line dubbed the Hibernia Express, costing US$300 million.

Feb 20 15:27

Microsoft has updated Windows Defender to root out the Superfish adware

Microsoft just took a major step towards rooting out the Superfish adware, which exposed Lenovo users to man-in-the-middle attacks. Researchers are reporting that Windows Defender, Microsoft's onboard anti-virus software, is now actively removing the Superfish software that came pre-installed on many Lenovo computers. Additionally, Windows Defender will reset any SSL certificates that were circumvented by Superfish, restoring the system to proper working order. It's a crucial fix, as many security professionals had been struggling to find a reliable method for consistently and completely undoing the harmful effects of the program. To make sure the fix takes effect, any Superfish-affected Windows users should update their version of Windows Defender within the program and scan as soon as possible.

Feb 20 15:03

Explosive new Snowden doc: NSA/GCHQ stole vital cellphone encryption keys

New reporting by The Intercept, based on documents leaked by whistleblower, reveals how spy agencies hacked world's largest SIM card manufacturer

Feb 20 13:34

US TRAVELLERS SET FOR EU BIOMETRIC DRAGNET

US citizens and other non-EU nationals who enter Europe will be asked to have their faces image-captured and fingerprints scanned upon arrival at a half-dozen major airports. The biometric dragnet is part of a pilot test of the EU’s so-called ‘smart borders’ package. Passengers can refuse to give the data for now but there are plans to eventually make it obligatory.

Feb 20 13:20

"We Messed Up Badly" Lenovo Admits Putting Tracking Software On Your PC

File this under ‘you can’t make this stuff up.’

Lenovo Group, the largest computer manufacturer in the world, has made a rather stunning admission that they have been pre-installing tracking software on their PCs.

The tracking software is made by a company called Superfish, which apparently paid some “very minor compensation” to Lenovo for putting the software on people’s computers.

Feb 20 11:41

FBI smearing my hacker husband

The FBI jailed and conducted a smear campaign against Texas hacker Fidel Salinas after he refused to do work for the agency, according to the imprisoned man’s wife,

Feb 20 11:34

James Comey Says the FBI Can’t Let Police Talk about Widely Reported Surveillance Tech Because of ‘Bad People’

I hope you’re hungry, because here’s a whopper: The FBI director has publicly defended his organization’s use of non-disclosure agreements to prevent local police departments from releasing documents about their use of controversial surveillance technologies, despite the fact that these technologies have been widely discussed in media outlets for years. What’s his justification for this policy?

"Bad people."

Feb 20 10:23

Go to Prison for File Sharing? That's What Hollywood Wants in the Secret TPP Deal

The Trans-Pacific Partnership agreement (TPP) poses massive threats to users in a dizzying number of ways. It will force other TPP signatories to accept the United States' excessive copyright terms of a minimum of life of the author plus 70 years, while locking the US to the same lengths so it will be harder to shorten them in the future.

Feb 20 10:23

Sony releases $160 64 GB SD cards marketed for 'Premium Sound', claiming it will produce 'less electrical noise'. Storage media can not change sound quality, but people are spending over $100 more to buy it.

Need the perfect expandable storage solution for your $1,200 Walkman? Sony might have a bridge to sell you.
The company is now selling a 64 GB Micro SDXC card “for Premium Sound” in Japan. At $160, it's four or five times more expensive than a typical 64 GB card, but as the Wall Street Journal reports, it's supposed to produce “less electrical noise.”

Feb 20 10:13

GCHQ and NSA Collaborate to Steal the Keys to Your Cellphone

By Nadia Kayyali

Anyone interested in privacy and security should think twice about their cell phone dependence right now. That’s because today, The Intercept revealed that British spy agency GCHQ led successful efforts to hack into the internal networks of Gemalto, “the largest manufacturer of SIM cards in the world, stealing encryption keys used to protect the privacy of cellphone communications” made on the world’s largest telecommunications carriers, including “AT&T, T-Mobile, Verizon, Sprint and some 450 wireless network providers around the world.”

In other words, for millions or even billions of users around the world, global cellular communications are about as secure from GCHQ and NSA as an FM radio broadcast...

Feb 20 09:11

Russia’s Antimonopoly Agency Launches Antitrust Probe Against Google

Yandex said Google prevents manufacturers of phones and tablets working on the US company's Android operation system from preinstalling services by Google's competitors.

Yandex is a party to another antitrust investigation against Google, led by the European Commission.

Feb 20 08:37

Why the Free and Open Internet Is Never Going to Die

Oh well. I guess it’s time to pack it up guys. We had a really nice run, but I guess the bad guys won. The Internet as we know it dead. Hammer the last nail and shovel in the dirt. We’ll just have to go back to watching CNN and shopping at Walmart.

I’m kidding of course. Put the noose down and listen up folks. The free Internet isn’t going to disappear. It’s just going underground. Even in countries like China, dissidents and businessmen have found some pretty creative ways to work around their government’s strict censorship of the Internet. And people of Cuba have gone so far as to build their own Internet infrastructure, separate from the government’s overpriced service. Even Mexico’s drug cartels have built a sprawling clandestine communication system that allow them to evade and spy on the authorities.

Feb 20 08:18

‘Unhackable’: Russian firm develops totally surveillance-proof smartphone

Russia is entering the post-Snowden world with style. Its own anti-surveillance smartphone prototype, equipped with the latest in cutting-edge cybersecurity and intended for corporate users, is currently being tested.

Webmaster's Commentary: 

I WANT ONE!

Feb 20 08:05

SPIES CAN TRACK YOU JUST BY WATCHING YOUR PHONE’S POWER USE

Smartphone users might balk at letting a random app like Candy Crush or Shazam track their every move via GPS. But researchers have found that Android phones reveal information about your location to every app on your device through a different, unlikely data leak: the phone’s power consumption.

Feb 20 02:48

THE GREAT SIM HEIST

How Spies Stole the Keys to the Encryption Castle

AMERICAN AND BRITISH spies hacked into the internal computer network of the largest manufacturer of SIM cards in the world, stealing encryption keys used to protect the privacy of cellphone communications across the globe, according to top-secret documents provided to The Intercept by National Security Agency whistleblower Edward Snowden.

The hack was perpetrated by a joint unit consisting of operatives from the NSA and its British counterpart Government Communications Headquarters, or GCHQ. The breach, detailed in a secret 2010 GCHQ document, gave the surveillance agencies the potential to secretly monitor a large portion of the world’s cellular communications, including both voice and data.

The company targeted by the intelligence agencies, Gemalto, is a multinational firm incorporated in the Netherlands that makes the chips used in mobile phones and next-generation credit cards.

Feb 20 02:48

Dutch Firm Gemalto Investigates Hacking Claim

AMSTERDAM—Digital-security firm Gemalto NV said Friday it was investigating a report that alleged it was hacked on a massive scale by U.S. and U.K. intelligence agencies.

The Intercept, a news website, reported Thursday that the National Security Agency and the U.K.’s Government Communications Headquarters hacked the Netherlands-based firm to steal encryption keys used to protect the privacy of mobile-phone communications. The report cited documents provided by former NSA contractor Edward Snowden .

GCHQ declined to comment, while the NSA couldn’t be reached for comment.

Feb 19 22:49

Google Chairman Vs. Obsolete Man

Bilderberger and Google Chairman Eric Schmidt versus the Twilight Zone's Mr. Wordsworth.

Feb 19 20:08

The Internet Is Our Only Free Press

The country was never really a democracy, meaning a polity in which final power rested with the people. The voters have always been too remote from the levers of power to have much influence. Yet for a brief window of time there actually was freedom of a sort. With the censorship of the net—it will be called “regulation”—the last hope of retaining former liberty will expire.

Feb 19 18:34

How to remove Superfish adware from your laptop

The bad news is that Lenovo ever put Superfish on their consumer laptops. The good news is that it's not that hard to get rid of it.

Feb 19 18:32

It’s not just Samsung TVs — lots of other gadgets are spying on you

But Samsung’s televisions are far from the only seeing-and-listening devices coming into our lives. If we’re going to freak out about a Samsung TV that listens in on our living rooms, we should also be panicking about a number of other emergent gadgets that capture voice and visual data in many of the same ways.

Feb 19 18:24

The Superfish certificate has been cracked, exposing Lenovo users to attack

Lenovo's Superfish bug just went from bad to worse, as researchers have turned up an easy way to take advantage of the security flaws opened up by the pre-installed software. Superfish is present on Lenovo laptops sold between September 2014 and January 2015, although Lenovo says no Thinkpads were shipped with the software. The bug has come under fire for breaking fundamental web security protocols, routing all encryption through a single password-protected certificate authority owned by a third-party adware company that makes Superfish. Anyone with the password that unlocks that certificate authority would be able to completely bypass the computer's web encryption.

This morning, researchers found and published that password, turning a security flaw into an active vector for attack. According to a post by Errata Security's Robert David Graham, the password was stored in the Superfish software's active memory and was trivial to extract.

Feb 19 16:44

Google Chairman on Obsolete Man: ‘The Internet Will Soon Be Part of You’

While sitting on a panel at the World Economic Forum in Davos, Switzerland recently, Google Executive Chairman Eric Schmidt told everyone that the Internet will soon “disappear.” What he meant is not what it sounds like he meant, however.

During a webcast of the panel discussion, Schmidt was asked for a prediction about what he believes is the future of the Internet. “I will answer simply that the Internet will disappear,” he replied.

Feb 19 15:02

Photos reveal NSA tampered with Cisco router prior to export

For years, the US government has accused Chinese companies of placing surveillance equipment inside routers being exported to America, but this week evidence suggests the exact opposite may be happening.

New photos implicate the US National Security Agency (NSA) in planting "beacons" into servers, routers and other network gear prior to being exported worldwide.

Feb 19 15:02

The NSA and its allies stole the keys to your phone's security

A new report by The Intercept details a stunning heist made by US and UK spies that has given intelligence agencies the ability to break through the privacy of smartphone communications. The report claims that the NSA and GCHQ successfully hacked the network of Gemalto, a major manufacturer of SIM cards, and obtained the secret keys that unlock phone data. In short, it's a massive security breach that means your phone could be vulnerable to the whims of the world's most powerful spy agencies.

We still don't know how many people may be affected, but it's safe to say that the number could be significant; all four major US carriers are customers of Gemalto, and The Intercept reports that the company produces around 2 billion SIM cards each year.

SHARE THIS ARTICLE WITH YOUR SOCIAL MEDIA