COMPUTERS/INTERNET/SECURITY | WHAT REALLY HAPPENED


COMPUTERS/INTERNET/SECURITY

May 27 07:45

GOT A WEARABLE? ALMOST ANYBODY CAN TRACK YOU USING SIMPLE TECHNOLOGY

Wearable products need to transmit data to function. Many don’t work without a connection to a smartphone. And because it would be silly to walk around with a cord between the devices, that connection is made via Bluetooth Low Energy. Context Information Security has found that these connections can be used to identify smartwatches, fitness trackers, and other products that rely on BLE. And they’ve released an Android app that can track these signals to prove it.

May 27 07:40

New research suggests that hackers can track subway riders through their phones

Underground subways offer no place to hide from hackers.

Determined hackers can track the movements of millions of subway riders around the world even as they go underground by breaking into smartphone motion detectors, new research from Chinese academics reveals. The attack can track subway riders with up to 92 percent accuracy.

May 27 07:27

Hackers Gained Access To Old Tax Returns For 100,000 Taxpayers On IRS Web Site

The IRS announced today that criminals used taxpayer-specific data acquired from non-IRS sources to gain unauthorized access to information on approximately 100,000 tax accounts through IRS’ “Get Transcript” application. This data included Social Security information, date of birth and street address.

Webmaster's Commentary: 

It is now being reported that the hackers used the stolen information to file false amended tax returns generating about $50 million in bogus "refunds."

May 26 22:05

Five Eyes and Color Revolutions

A recent release of Edward Snowden-provided classified PowerPoint presentation from the National Security Agency (NSA) provides a rather detailed description of how the FIVE EYES signals intelligence alliance of the United States, Britain, Canada, Australia, and New Zealand has conspired with the promoters of social media-based revolutions, such as the "Arab Spring", to bring about the collapse of democratically-elected or otherwise stable governments. However, the PowerPoint slides were partially redacted in key areas by the dubious censors of First Look Media, financed by e-Bay founder and multi-billionaire Pierre Omidyar.

May 26 20:12

The NSA wants to identify phone users by their finger swipes

For the National Security Agency, the fingerprint reader on your smartphone just isn't secure enough. Lockheed Martin has confirmed to Nextgov that the intelligence outfit is testing Mandrake, an identification system that verifies who you are based on the way you swipe your finger across the screen.

The technology measures not only the shape of your movements, but the acceleration and speed. It can tell whether you draw in broad, fast strokes or tend to be cautious. Lockheed doesn't know whether or not the NSA is deploying Mandrake in the field, but it wouldn't be shocking. Given that it's possible to fake fingerprints, gesture-based authentication may the best way of proving that the right person really is present.

May 26 20:12

Air Force Certifies SpaceX To Launch Military Satellites

The US Air Force announced today that it certified SpaceX to launch national security payloads, from spy satellites to mystery drones, ending the monopoly held by the Boeing-Lockheed Martin joint venture, United Launch Alliance (ULA).

May 26 19:50

Caught On Tape: Self-Driving Car Ploughs Into Journalists

Instead, in what is perhaps the most epic "option" in the history of automotive history, Volvo decided to make the special feature known as “pedestrian detection functionality” cost extra money. It gets better: the cars do have auto-braking features as standard, but only for avoiding other cars — if they are to avoid crashing into pedestrians, too, then owners must pay extra.

May 26 09:45

Wikipedia edits from inside Parliament removing scandals from MPs' pages, investigation finds.

Details of MPs’ expenses scandals and controversies are being removed from Wikipedia from inside the Houses of Parliament, a newspaper investigation has claimed.

May 26 09:29

Elite Bunker Down in “Secure, Safe Rooms Hidden in Plain Sight”… And You Can, Too

It is an age of vast inequality, and those who stand out, or stand above, are finding places to lay low.

With any number of riots, protests and grumblings on the ground level, elites, VIPs, military commandos and foreign dignitaries are preparing to hunker down.

Read more at SHTFplan.com

May 25 16:02

The Elite Will Merge with Tech and Quote: ‘Become God-Like Cyborgs Within 200 Years’

Notice the story from The Telegraph begins with “wealthy humans…” and continues with “will upgrade themselves into some idea of a divine being…”

(read more)

May 25 08:42

Back Door Worse Than No Door

Tech industry giants say they are alarmed the federal government would demand back-door access to the encryption built into their products. Are they crying crocodile tears? Maybe, but the point is still a good one.

Imagine if, instead of memory chips, we were talking about your home's back door. It most likely contains a lock. Your family members have keys. They can come and go freely while others cannot. This is how locks should work.

The FBI says it can't do its job unless it has unimpeded access to your house, so it asks you to give it a spare key. The FBI further promises it will only use the key to enter your home in emergencies. Would you give it to them?

Webmaster's Commentary: 
May 24 13:02

From the Very Creation of the Internet, U.S. Spy Agencies Fought to Block Encryption

American spy agencies have intentionally weakened digital security for many decades. This breaks the functionality of our computers and of the Internet. It reduces functionality and reduces security by – for example – creating backdoors that malicious hackers can get through.

The spy agencies have treated patriotic Americans who want to use encryption to protect their privacy as extremists … or even terrorists.

As Gizmodo’s Matt Novak points out, this attack started at the very birth of the internet:

May 24 09:36

Lindsey Graham's epic eyeroll as Rand Paul defends Americans' right to privacy.

May 24 05:40

Yandex Strips Down Its Browser To Take On Google

The new browser sports a clean, minimalist look with as much screen estate given to websites as possible. In addition, Yandex.Browser turns off usage statistics by default to ensure the most private browsing experience possible.
Yandex has revamped its popular Internet browser with a new beta release that the company says is cleaner and more privacy-focused than earlier builds.
Unlike the alpha version released last year, Yandex.Browser beta doesn’t send usage statistics to the company by default. Yandex said it had taken this decision in response to feedback from users in Canada, Germany and the U.S. There’s also a small button in the top right corner that turns on Stealth Mode, a tool that blocks user tracking code on websites, including analytics cookies, sharing plugins, etc. The feature is quite flexible, allowing users to whitelist certain websites and choose what exactly they want blocked on pages.

May 24 03:54

Google Patents Creepy New Toys That Spy on Your Kids, Control Smart Devices in Your Home

Just when you think Google (read: our real-life Skynet) can't get any creepier, they go and aspire.

Now the megacorporation has patented a fun new toy that comes complete with hidden microphones and cameras, spies on your child's activities and conversations, responds to his or her social cues, and can control smart devices in your home.

Yay!

(read more)

May 23 16:45

Special Ops Armed with Rapid DNA Scanners: “Get Ready for Advanced Biometric Warfare”

Along with formidable future weapons, super soldiers, armed drones of every size and autonomous robots executing lethal missions, the battlefield of tomorrow will also be driven by target identity and biometric data – you know, to stop terrorists.

Gizmodo reports:

The United States’ most elite soldiers have been collecting DNA samples from suspected terrorists for years. But because analysis normally takes three weeks, it’s been a pretty useless chore. Now, however, U.S. Special Operations Command is testing a machine that can do it in 90 minutes. Get ready for advanced biometric warfare.

Read more at SHTFplan.com

May 23 11:09

Researchers Predicted In 1971 that Debit Cards Would Become the Ultimate Spy Tool

The Wall Street Journal reported that the NSA spies on Americans’ credit card transactions. Senators Wyden and Udall – both on the Senate Intelligence Committee, with access to all of the top-secret information about the government’s spying programs – write:

Section 215 of the Patriot Act can be used to collect any type of records whatsoever … including information on credit card purchases, medical records, library records, firearm sales records, financial information and a range of other sensitive subjects.

Many other government agencies track your credit card purchases as well. In fact, all U.S. intelligence agencies – including the CIA and NSA – are going to spy on Americans’ finances.

May 23 08:45

Proposal to extend ‘Patriot Act’ surveillance programs also blocked in Senate

Legislation to extend for two months a program in which spy agencies sweep up vast amounts of data about Americans’ telephone calls was blocked in the U.S. Senate early on Saturday, adding to uncertainty about the future of the program.

The Senate voted 45-54 on the procedural measure to stop debate on the extension of provisions of the “USA Patriot Act,” falling well short of the 60 votes in favor needed to advance the measure. The legal authorities that allow the collection of so-called telephone “metadata” expire on June 1.

Webmaster's Commentary: 

Which does not mean the NSA will stop doing it. They'll just hope you think they stopped!

May 23 07:11

Google Patents ‘Creepy’ Cuddly Toys to Run Your Home

Would you let Ted run your home? Google is thinking you just might and has patented some Internet-connected toys that can do just that, per BBC News: Google’s R&D team has looked into making internet-connected toys that control smart home appliances.

May 22 14:48

WHAT? You Mean Hillary KNEW Al Qaeda Carried out the Benghazi Attack and LIED to Us About It? No Way

In short, Clinton personally knew that attack by Al Qaeda that ended in the gruesome deaths of four Americans to basically cover up an international Fast and Furious was not because of some stupid Youtube video — but she stood up and lied to the entire nation with a ridiculous, barely believable cover story anyway and with a straight face.

But HEY! Let’s make her president! She’s a big fat liar, seems she’s pretty qualified for the job.

(read more)

May 22 14:47

AND?! DOJ: FBI Used Patriot Act to Obtain ‘Large Collections’ of Data on Americans

Are we getting numb to headlines like this one yet? The shock of this headline left us speechless (sarcasm)! Who doesn’t know this by now? Thanks DOJ for that astonishing conclusion that everyone else in America had already been made aware of at least a dozen times over since the Snowden revelations.

Are they going to actually do something about it then?? If not, they are wasting our time.

Either they cannot keep up the pretense and lies that they aren’t spying on us or it’s much worse than we thought. (Pick #2! Pick #2!)

(read more)

May 22 12:58

Hackers build a new Tor client designed to beat the NSA

According to slashdot.org, this client was created by a joint American/Israeli team. So it is just as buggy as the original.

May 22 09:24

Cyber-attack leaves millions of British students without access to online resources

Millions of staff and students at over 150 centers of further education were left without access to their online resources following a cyber-attack on the University of London Computer Centre.

May 21 12:45

Confirmed: Hackers attacked St. Louis Federal Reserve Bank

A cyberattack on the Federal Reserve Bank of St. Louis last month compromised the bank’s domain name and routed web traffic to [rogue] websites created by the hackers that simulated the original, the bank confirmed this week.

Bank officials said in a statement on Monday that while the hackers didn’t compromise its website, they did manipulate the bank’s routing on April 24.

May 21 09:59

Millions exposed by latest health insurer hack

A US health insurer has admitted it has been hacked and the data of 1.1 million of its customers exposed.

CareFirst, which operates in several US states, is the third such company to fall victim to hackers.

The breach took place in June last year but was only recently discovered.
It follows similar attacks at Blue Cross, which had 11 million customer records stolen, and Anthem, which lost 80 million records.

The CareFirst database accessed included member names, birth dates, email addresses and identification numbers.

It did not include social security numbers, medical claims, employment , credit card or financial information, the company said.

May 21 09:57

Video: Mass jamming of electric car locks in a British car park

A video posted on Facebook has shown a car park in Manchester full of cars with alarms going off while their owners stand around, confused as to why they can’t lock or unlock their cars.

No one at the Manchester Fort Shopping Park was able to lock their car’s doors on Sunday evening as a result of the attack.

The lady in the video – as well as many others – suspects that someone nearby is using a jamming device that essentially jams the signals used to remotely lock and unlock a car.

May 21 09:55

The code war: Russia plans to free itself from iOS and Android

Finland’s Sailfish operating system is the platform for Russia’s latest fight for independence from US technology

May 21 09:53

Anti-NSA Pranksters Planted Tape Recorders Across New York and Published Your Conversations

The recordings posted to the site don’t name any of the eavesdropped speakers. But they do include the locations where the recordings were made, which could provide just enough information to identify some of those speakers. And regardless of anonymity, the prank is likely illegal: Secretly recording a conversation in New York requires the consent of at least one of the people recorded—a tape recorder planted under a table and retrieved later certainly doesn’t qualify.

Of the five recordings published on the project’s website so far, three of the recorders used to get them remain in place, and an untold number of others could still be planted around the city. So, careful what you say in public, New Yorkers—unless, of course, you have nothing to hide.

May 21 08:37

SPECIAL OPERATORS ARE USING RAPID DNA READERS, THE POLICE WILL BE TOO SOON

On Wednesday, representatives from the U.S. Special Operations Command revealed that they were testing two rapidDNA readers in forward locations. The operators feed in a DNA sample, and the reader compares it against a database that matches DNA to identities. The machines weigh some 60 pounds, so they aren’t small. And they aren’t cheap: each costs about $250,000. But they can give a result in 90 minutes, a process that used to take weeks.
Share | Comment

May 21 08:29

FACEBOOK-OWNED OCULUS VR SET TO LAUNCH INTO THE VIRTUAL PORN INDUSTRY

Hopefully, Oculus VR, like Google Glass before it, will be a spectacular failure that people reject. Pray that it is. FACEBOOK-OWNED OCULUS VR HAS NO PLANS TO PREVENT THE ADULT ENTERTAINMENT INDUSTRY FROM USING ITS RIFT VIRTUAL REALITY HEADSET, WHICH IS SCHEDULED TO LAUNCH AS A CONSUMER PRODUCT WITHIN THE FIRST QUARTER OF 2016, ACCORDING TO OCULUS FOUNDER PALMER LUCKEY.

May 21 08:26

GM SAYS YOU DON'T OWN YOUR CAR, YOU JUST LICENSE IT

GM has joined with John Deere in asking the government to confirm that you literally cannot own your car because of the software in its engine. Like Deere, GM wants to stop the Copyright Office from granting an exemption to the Digital Millennium Copyright Act that would allow you to jailbreak the code in your car's engine so that you can take it to a non-GM mechanic for service, or fix it yourself. By controlling who can service your car, GM can force you to buy only official, expensive parts, protecting its bottom line.

May 21 08:22

'Weaponizing Vulnerabilities': New Snowden Doc Reveals Spy Agencies Targeted Smartphones

The intelligence alliance known as Five Eyes—comprising the U.S., Canada, New Zealand, the United Kingdom, and Australia—exploited security weaknesses in one of the world's most popular browsers to obtain data about users and planned to use links to Google and Samsung app stores to infect smartphones with spyware, a top secret National Security Agency (NSA) document published Wednesday has revealed.

May 21 07:37

NSA Planned to Hijack Google App Store to Hack Smartphones

The National Security Agency and its closest allies planned to hijack data links to Google and Samsung app stores to infect smartphones with spyware, a top-secret document reveals.

The surveillance project was launched by a joint electronic eavesdropping unit called the Network Tradecraft Advancement Team, which includes spies from each of the countries in the “Five Eyes” alliance — the United States, Canada, the United Kingdom, New Zealand and Australia.

The top-secret document, obtained from NSA whistleblower Edward Snowden, was published Wednesday by CBC News in collaboration with The Intercept. The document outlines a series of tactics that the NSA and its counterparts in the Five Eyes were working on during workshops held in Australia and Canada between November 2011 and February 2012.

May 20 14:17

TPP Could 'Undermine Health of Web' Say 250+ Tech Companies and Digital Rights Groups

More than 250 tech companies and digital rights organizations on Wednesday sent a joint letter to Congress, blasting the corporate-backed trade deal they say "actively silences the voices of Internet users, start-ups, and small tech companies...while undermining the health of the entire Web."

May 20 11:59

I-Team: Drivers Say Insurance Device Put Them In Danger On The Road

May 20 09:03

HTTPS-crippling attack threatens tens of thousands of Web and mail servers

Tens of thousands of HTTPS-protected websites, mail servers, and other widely used Internet services are vulnerable to a new attack that lets eavesdroppers read and modify data passing through encrypted connections, a team of computer scientists has found.

May 20 08:52

'Logjam' crypto bug could be how the NSA cracked VPNs

Logjam is another exploit of the 1990s-era crypto-wars: “To comply with 1990s-era U.S. export restrictions on cryptography, SSL 3.0 and TLS 1.0 supported reduced-strength DHE_EXPORT ciphersuites that were restricted to primes no longer than 512 bits”, the paper notes.

Because “export grade” hangs around in ciphersuites, “a man-in-the-middle can force TLS clients to use export strength DH with any server that allows DHE_EXPORT.”

“The attack affects any server that supports DHE_EXPORT ciphers, and affects all modern web browsers. 8.4% of the Top 1 Million domains were initially vulnerable,” Green writes at the Logjam site.

May 19 17:39

Many of the NSA’s Loudest Defenders Have Financial Ties to NSA Contractors

As one example of the opaque link between NSA money and punditry, take the words of Stewart Baker, who was general counsel to the NSA from 1992 through 1994. During a Senate committee hearing last summer on one of the reform bills now before Congress, the USA FREEDOM Act, which would partially limit mass surveillance of telephone metadata, Baker essentially said the bill would aid terrorists.

“First, I do not believe we should end the bulk collection program,” he told the Senate Select Committee on Intelligence. “It will put us at risk. It will, as Senator King strongly suggested, slow our responses to serious terrorist incidents. And it is a leap into the dark with respect to this data.”

May 19 13:21

Advocates Charge Google with Deceiving Parents about Content on YouTube Kids, Request FTC Action

Two leading child and consumer advocacy groups have filed an important update to their Federal Trade Commission complaint against Google’s YouTube Kids app for false and deceptive marketing. In a letter sent to the Commission today, the groups charged that Google is deceiving parents by marketing YouTube Kids as a safe place for children under five to explore when, in reality, the app is rife with videos that would not meet anyone’s definition of “family friendly.”

May 19 10:08

Internet.org Is Not Neutral, Not Secure, and Not the Internet

Facebook's Internet.org project, which offers people from developing countries free mobile access to selected websites, has been pitched as a philanthropic initiative to connect two thirds of the world who don’t yet have Internet access. We completely agree that the global digital divide should be closed. However, we question whether this is the right way to do it. As we and others have noted, there's a real risk that the few websites that Facebook and its partners select for Internet.org (including, of course, Facebook itself) could end up becoming a ghetto for poor users instead of a stepping stone to the larger Internet.

May 19 08:33

Apple Safari Browser Vulnerable to URL Spoofing Vulnerability

A serious security vulnerability has been uncovered in Apple’s Safari web browser that could trick Safari users into visiting a malicious website with the genuine web address.

A group of researchers, known as Deusen, has demonstrated how the address spoofing vulnerability could be exploited by hackers to fool victim into thinking they are visiting a trusted website when actually the Safari browser is connected to an entirely different address.

This flaw could let an attacker lead Safari users to a malicious site instead of a trusted website they willing to connect to install malicious software and steal their login credentials.

May 19 08:25

RadioShack Sold Your Data to Pay Off Its Debts. The FTC Isn’t Too Happy About It.

RadioShack is dead, but its saga is ongoing. Last week, the company’s name was auctioned off for $26.2 million to Standard General, a hedge fund that earlier this year bought hundreds of RadioShack store leases. With the latest purchase, though, Standard General also got RadioShack’s collection of consumer data—that means the names, addresses, email addresses, and purchase histories of potentially tens or even hundreds of millions of RadioShack customers.

May 19 08:08

Jews Continue Pressure for Internet Censorship

Back in March TOO came under sustained cyber-attack from the enemies of our people. This vital resource for truth was brought to a stand-still by a large number of bogus service requests, with Kevin MacDonald noting that one IP address in Israel “attempted to access the site 13,125 times within the span of three days.”

WEBMASTER ADDITION: Our server has been flooded with similar bogus requests form IPs located in Tel Aviv.

May 18 20:10

Self Driving Trucks Will Wipe Out Millions of Jobs

Robot trucks also don’t need salaries?—?salaries that stand to go up because fewer and fewer people want to be truckers. A company can buy a fleet of self-driving trucks and never pay another human salary for driving. The only costs will be upkeep of the machinery. No more need for health insurance either. Self-driving trucks will also never need to stop to rest, for any reason. Routes will take less time to complete.

May 18 10:03

UK government quietly passed new legislation that exempts GCHQ, police, and other intelligence officers from prosecution for hacking into computers and mobile phones

While major or controversial legislative changes usually go through normal parliamentary process (i.e. democratic debate) before being passed into law, in this case an amendment to the Computer Misuse Act was snuck in under the radar as secondary legislation. According to Privacy International, "It appears no regulators, commissioners responsible for overseeing the intelligence agencies, the Information Commissioner's Office, industry, NGOs or the public were notified or consulted about the proposed legislative changes... There was no public debate."

May 18 09:40

Proposed surveillance limits could force US to 'go dark', says Mitch McConnell

Senate majority leader Mitch McConnell said on Sunday that legislation concerning the federal government’s powers of surveillance that was passed by the House of Representatives this week could cause the country to “go dark” when it comes to collecting Americans’ phone records.

McConnell said that if such a state of affairs came about, “we’ll not be able to have yet another tool that we need to combat this terrorist threat from overseas”.

Webmaster's Commentary: 

Mitch, you are a tyrant's wet-dream!

First, under the Fourth Amendment, the government is not allowed at will to peek into our private lives, drool over naked pictures of our lovers, steal our business secrets, (all of which they have been caught doing) etc.

Second, in 12 years of living under tyranny, the NSA, TSA, DHS, FBI, CIA have not actually prevented any terror attacks. Yes, they have set up a bunch of innocent patsies to be arrested for propaganda purposes, but no real terrorists, and the reason is simple. As we demonstrated 6 times over at my website, anyone with modest programming skills can write systems of encryption the NSA simply cannot break. Which means the entire surveillance system you are so in love with is only able to spy on law abiding citizens. That means it is a hideous waste of time, money, manpower, and other resources.

But Mitch, I will make you a deal. We The People will allow total surveillance over our phone calls and emails and texts ... as soon as all members of Congress allow We The People the same access to your emails, phone calls, and texts. Fair enough?

May 18 08:50

NEW WRH WEBSITE - STATUS REPORT

Webmaster's Commentary: 

Over the weekend I succeeded in working out how to copy the existing article database and user accounts into the new site. That was a major hurdle. The only remaining major hurdle is to have a "wrapper" page to surround the permanent articles, letters, and so forth, which is my next major task. After that, all that remains is theme refinement, and barring an unexpected disaster the new WRH site should be ready to go live early next month. Thanks for your patience.

May 18 08:14

Government anti-Semitism conference endorses net censorship

Recommendations coming out of the three day meeting included the scrubbing of Holocaust denial websites from the internet and the omission of “hate websites and content” from web searches.

May 18 07:23

NSA Chief Threatens War Against Cyber Attacks

"Abusive language being turned into actual abuse of humanity" - David Swanson

May 17 15:47

Flashback: STOP SOPA

May 17 15:43

SOPA, anyone? Entertainment Lobby Uses Hearing on Domain Names to Revive Awful Censorship Idea

Amidst a discussion of new top-level domain names (such as “.sucks”), a lawyer representing the Motion Picture Association of America (MPAA), the Recording Industry Association of America (RIAA), and other groups told the House Judiciary Committee’s Internet subcommittee that ICANN should force the companies that register domain names to suspend domains based on accusations of copyright infringement.

If this sounds familiar, that’s probably because it’s exactly the sort of system that the disastrous SOPA bill would have created—one where entire websites can be forced to go dark, without a day in court, because some material on the site is accused of infringing a copyright.

May 17 15:40

Apple Watch Vulnerability Lets Thieves Use Apple Pay Without Your PIN

No, your Apple Watch isn't totally hacker-proof, despite what some have claimed.

The basic idea behind its security is that the Watch can detect when it is removed from a wrist, and automatically requires a passcode to be entered if removed (if one is set up, which is a requirement for using Apple Pay). So we set out to trick the sensor into thinking it's still on a wrist while removing it. Taking that a step further, we wanted to see if we could use this "exploit" to bring up Apple Pay and make purchases with someone else's card.

We'll cut right to the chase—we got it to work without much effort. Here's how we did it, and what you can do to protect yourself if someone uses this technique on you.

May 17 15:35

MenuetOS, an operating system written entirely in assembly, hits 1.0

MenuetOS, a GUI-toting, x86-based operating system written entirely in assembly language, has hit version 1.0.

The milestone comes after almost a decade and a half of development for the operating system, which despite having an impressive graphical user interface is still compact enough to fit on a floppy disk (assuming you can find one).

May 17 15:12

Vulnerability In Car Keyless Entry Systems Allows Anyone To Open And Steal Your Vehicle

Hands-free car entry systems, which typically unlock car doors without requiring the pushing of any buttons when owners are close to their vehicles, provide great convenience. Unfortunately, however, people have begun marketing for sale devices that allow criminals to exploit a technological vulnerability in these systems, and crooks have been seen using “mystery devices” to open cars equipped with hands-free car entry systems. Once in a car, crooks can steal whatever is in it, and, while most of the recent issue has been just that, they can also potentially connect a device to the vehicle’s diagnostic port in an effort to download sufficient information in order to create a key to drive and steal the vehicle, a problem about which the British police are now warning.

Anyone wishing to protect the contents of his or her car from being taken, or perhaps the vehicle itself from being stolen, might want to take action.

May 17 15:05

Free home heating offered by e-Radiators

The e-Radiators stored in the test homes are being used to run complex calculations and other computer-intensive jobs for an array of companies and research institutions. Nerdalize will pay the bill for powering the radiators, allowing Eneco customers to stay warm for free. Nerdalize say that the scheme is also environmentally friendly, because energy is effectively used twice in the new system.

"The people's benefit is actually quite simple, what we do is we reimburse the electricity the server uses, and that we can do because of the computer clients on the other side, and in that way home owners actually get heating for free and compute users don't have to pay for the overhead of the data center, so it's pretty much a win-win situation," said Leupe.

Great idea.

May 17 15:01

Feds Say That Banned Researcher Commandeered a Plane

Chris Roberts, a security researcher with One World Labs, told the FBI agent during an interview in February that he had hacked the in-flight entertainment system, or IFE, on an airplane and overwrote code on the plane’s Thrust Management Computer while aboard the flight. He was able to issue a climb command and make the plane briefly change course, the document states.

“He stated that he thereby caused one of the airplane engines to climb resulting in a lateral or sideways movement of the plane during one of these flights,” FBI Special Agent Mark Hurley wrote in his warrant application (.pdf). “He also stated that he used Vortex software after comprising/exploiting or ‘hacking’ the airplane’s networks. He used the software to monitor traffic from the cockpit system.”

May 17 14:58

MPAA COMPLAINED SO WE SEIZED YOUR FUNDS, PAYPAL SAYS

Developers considering adding a torrent search engine to their portfolio should proceed with caution, especially if they value their income streams. Following a complaint from the MPAA one developer is now facing a six month wait for PayPal to unfreeze thousands in funds, the vast majority related to other projects.

May 17 14:57

UK government quietly rewrites hacking laws to give GCHQ immunity

The UK government has quietly passed new legislation that exempts GCHQ, police, and other intelligence officers from prosecution for hacking into computers and mobile phones.

While major or controversial legislative changes usually go through normal parliamentary process (i.e. democratic debate) before being passed into law, in this case an amendment to the Computer Misuse Act was snuck in under the radar as secondary legislation. According to Privacy International, "It appears no regulators, commissioners responsible for overseeing the intelligence agencies, the Information Commissioner's Office, industry, NGOs or the public were notified or consulted about the proposed legislative changes... There was no public debate."

May 17 08:48

Court keeps cellphone network ‘kill switch’ a secret

The fuss revolves around a policy called Standard Operating Procedure 303, which is “a shutdown and restoration process for use by commercial and private wireless networks in the event of a national crisis,” according to the IT Law Wiki. The Electronic Privacy Information Center (EPIC) brought the suit after San Francisco officials blocked cellphone service to prevent a protest in 2011.

Webmaster's Commentary: 

This is a violation of the First Amendment right to Freedom of Speech and Freedom to Assemble. There is no law that overrides those rights. There cannot be, because under the Supreme Court Decision Marbury vs Madison, laws repugnant to the Constitution are automatically null and void. Thus, some official in San Francisco pulled the plug on the cell phone system just because they wanted to. By doing so, along with violation of one of the most basic rights Americans possess, they placed those Americans in emergency situations at risk from the loss of needed communications, plus caused untold economic harm to those Americans using their cell phones for business purposes during the outage. The responsible party needs to be removed from office and made PERSONALLY financially liable for the harm caused to life and property!

May 16 20:48

Security researcher tells FBI he took control of a commercial airliner - even making it fly sideways - by hacking into the entertainment system

A prominent hacker and security researcher who was kicked off a United Airlines flight last month had previously admitted to the FBI that he had taken control of a plane and made it fly sideways.

Chris Roberts told a special agent earlier this year that he had repeatedly hacked planes' in-flight entertainment systems while aboard the aircraft, a search warrant application by the FBI states.

In one case, he also reportedly claimed to have overwritten the plane's Thrust Management Computer code, allowing him to issue a climb command and make the plane serve sideways.

Following the interviews with the FBI agent on February 13 and 23 and March 5 - and another in April - Roberts had two of his laptops confiscated, along with several hard drives and USB sticks.

May 16 19:17

This Jet Engine was made by a 3D printer

Engineers have made a fully-functional jet engine using a 3D printer

One of the most exciting technologies to emerge in recent time, 3D printing has a become a popular but limited method of manufacturing - until now. Engineers at GE Aviation’s Additive Development Center in Cincinnati have made the world’s 3D printed first jet engine using one of the devices.

May 16 17:54

More than 1,000 plaintiffs file lawsuit to keep Japan out of TPP

More than 1,000 people filed a lawsuit against the government on Friday, seeking to halt Japan’s involvement in 12-country talks on a Pacific Rim free trade agreement, which they called “unconstitutional.” A total of 1,063 plaintiffs, including lawmakers, claimed in the case brought to the Tokyo District Court that the proposed Trans-Pacific Partnership would undermine their basic human rights under the Constitution.

May 15 13:59

What law says the text of the TPP must remain secret?

By Jon Rappoport

To the US Congress: reveal the contents of the TPP now

It seems like a case of mass hypnosis. People claiming they can’t say what’s in the TPP trade agreement. And mainstream media accept this premise.

“That’s right. Congress must stay silent.”

Pop quiz: who says the text of the TPP must remain secret?

Under what authority?

Members of Congress are scuttling around like weasels, claiming they can’t disclose what’s in this far-reaching, 12-nation trade treaty...

May 15 13:55

FBI’s covert air force of surveillance aircraft shrouded in secrecy and hidden in shell corporations

As reported by ARS Technica, as tensions surrounding the recent protests and violence in Baltimore began to subside, a small squadron of innocuous-looking aircraft circled overhead, keeping watch on the neighborhoods most affected by rioting and other acts.

May 15 13:30

NSA shares raw intelligence including Americans' data with Israel

The National Security Agency routinely shares raw intelligence data with Israel without first sifting it to remove information about US citizens, a top-secret document provided to the Guardian by whistleblower Edward Snowden reveals.

Details of the intelligence-sharing agreement are laid out in a memorandum of understanding between the NSA and its Israeli counterpart that shows the US government handed over intercepted communications likely to contain phone calls and emails of American citizens. The agreement places no legally binding limits on the use of the data by the Israelis.

May 15 12:32

HUMANS HAVE SHORTER ATTENTION SPAN THAN GOLDFISH, THANKS TO SMARTPHONES

The average human’s attention span is… oh look, a bird! According to scientists, the age of smartphones has left humans with such a short attention span even a goldfish can hold a thought for longer.

May 15 09:11

Signed into Law: Florida Bill Expands Limits on Drone Surveillance

By Michael Maharrey

Florida Gov. Rick Scott signed signed a bill into law yesterday that takes a second step against mass surveillance, expanding current limitations on the use of drones in the Sunshine State that will have a practical impact on the federal surveillance state...

May 15 09:02

GOOGLE ERASES ISRAEL FROM THE MAP

“At first I couldn’t believe it, because Rubi Rivlin is the symbol of Israelism. But when we kept searching, we found that when my name is typed into Google it says I was born in Palestine, and the same is written about famous actress Natalie Portman, the Oscar winner who was also born in Jerusalem.”

May 15 08:34

Canadian Court to the Entire World: No Links For You!

The Supreme Court of British Columbia has ordered Google to remove entire domains from its search results—a decision that could have enormous global implications on free expression. This is the latest of several instances of courts exercising dangerous jurisdictional overreach, where they have applied local laws to remove content on the Internet. Not only did the Court order Google to delete the site from its search results on the Canadian “Google.ca” domain, it went even further by demanding it censor the domain worldwide by deleting every instance of the site from its global index.

May 15 05:57

WHY BIG BUSINESS PROFIT IS THE REAL REASON BEHIND NSA SURVEILLANCE

The US Surveillance State is scrambling to save itself in the wake of a federal ruling that declared the bulk collection of metadata under a provision of the Patriot Act, which is set to expire on June 1, illegal . But the reason for so many ‘experts’ touting the benefits of surveillance, goes beyond the basic desire to spy on Americans. Because, as you might imagine, “terrorism” is big business.

May 15 05:52

MORE THAN HALF OF AMERICANS THINK THAT “THE CLOUD” IS RELATED TO WEATHER

According to a recent survey, a majority of Americans are totally confused about cloud computing. The survey was conducted by Wakefield Research for Citrix, and included over 1000 participants. The results of the study showed that roughly 51 percent of those questioned believed that rain clouds caused interference with devices that were connected to “the cloud.”

May 15 05:50

THIS LITTLE 3-D PRINTED ROBOT CRACKS COMBINATION LOCKS IN 30 SECONDS

CAREFUL WHAT YOU leave in your lockers, high school students and gym-goers. An invasion of 3-D printed robots may be coming, capable of popping one of the world’s most ubiquitous brands of combination locks in as little as half a minute.

May 14 16:06

Making the Leap from Consumer to Producer

By Brian Berletic

Consuming seems like a natural thing to many. We are born and raised in increasingly consumerist societies no matter where we live. The idea of "doing something yourself" strikes some as a shabby alternative to the super-sleek status symbols and ultra-convenient prepackaged everything waiting on the shelves for us.

However, at the same time, perhaps paradoxically, many of us feel there is something fundamentally wrong with this sort of society and in particular the dependency and sometimes outright laziness and ignorance bred by consumerism...

May 14 15:49

Minority Report: Your Iris Can Now Be Scanned From Across the Room

Biometrics has been coming for a long time, but as it is starting to be adopted everywhere, superficially for consumer verification and security purposes, the envelope is getting pushed as more invasive techniques are being developed and put in the hands of government, law enforcement agencies, and corporations.

Now someone has invented “long range” iris scans. In other words, they can literally scan your iris and identify you from across the room.

(read more)

May 14 10:37

LET THE INTERNET FIX AMERICA

The American crisis is just around the corner. Wall Street's bankers have finally triumphed. Financial vultures, in their rampage for wealth, power, and world control have nearly completely destroyed an imperfect but incredibly free and promising American society. What must we do if we are to survive individually and as a free people?

May 14 09:59

exas veteran imprisoned for 35 days for refusing to surrender his Facebook password; fed donuts and insulin injections

Texas entrepreneur and U.S. Army veteran Jeremy Alcede has been imprisoned for 35 days (and counting) over his refusal to turn over his Facebook account password as part of a business bankruptcy court order. Federal bankruptcy Judge Jeff Bohm of the Southern District of Texas ordered Alcede thrown in jail for an indefinite period of time until he surrenders his Facebook account password, potentially creating a dangerous precedent that threatens the privacy and control of all our social media accounts.

According to reports from those in direct contact with Alcede, he was fed donuts and processed cereal by the prison staff, causing his blood sugar to experience wild clinical swings. In response, the medical staff at the facility began administering insulin shots to control his blood sugar.

May 14 09:00

NSA Chief: We May Retaliate for Cyberattacks With Real Weapons

The head of the US National Security Agency has clarified that the United States may use physical retaliation against the perpetrators of a cyberattack.

May 14 08:09

China’s Secret Space Weapons Targeting U.S. : “Soon Every Satellite Will Be at Risk”

A new Pentagon report to Congress claims that China is pursuing a secret space weapons program to disable U.S. satellites, GPS and communication systems.

The United States is concerned that the Chinese regime’s “continued development of destructive space technologies” is a “threat to all peaceful space-faring nations,” states the Pentagon’s 2015 annual report to Congress on the Chinese regime’s military and security developments.

The report is particularly concerned with China’s use of directed-energy weapons, satellite jammers and other technology that can be used to take out the communications grid and weaken U.S. military positions.

Read more at SHTFplan.com

May 14 07:30

Almost Half Of Brits View Wearable Tech As Treat To Privacy

Software programmers are being pushed to teach customers about wearable technologies in order to facilitate consumption, as a result of the latest research which shows that almost 50% of Brits believe that the tech presents a threat to their privacy.

May 14 07:18

House Votes to End N.S.A.’s Bulk Phone Data Collection

The House on Wednesday overwhelmingly approved legislation to end the federal government’s bulk collection of phone records, exerting enormous pressure on Senator Mitch McConnell of Kentucky, the Senate majority leader, who insists that dragnet sweeps continue in defiance of many of those in his Republican Party.

Under the bipartisan bill, which passed 338 to 88, the Patriot Act would be changed to prohibit bulk collection by the National Security Agency of metadata charting telephone calls made by Americans. However, while the House version of the bill would take the government out of the collection business, it would not deny it access to the information. It would be in the hands of the private sector — almost certainly telecommunications companies like AT&T, Verizon and Sprint, which already keep the records for billing purposes and hold on to them from 18 months to five years.

Webmaster's Commentary: 

In other words, your privacy is still being invaded; they just changed the signs on the doors.

May 14 07:09

Hackers are draining bank accounts via the Starbucks app

hieves are stealing money from people's credit cards, bank and PayPal accounts -- by first tapping into their Starbucks mobile app.

May 13 14:43

Fight for the Future

Congress is hours away from renewing the PATRIOT Act and allowing the NSA to continue mass spying on everyone for years.
Tell them: “End NSA mass spying! Overturn the PATRIOT Act.”

May 13 14:30

Docs: TSA Agents Laugh at Groping While Travelers Have “Breasts, Penis, Butt Crack” Fondled

The whole charade of preemptively screening every passenger – and carrying out retribution against those that object and speak out – is not supporting “national security,” it is swiftly turning America into a banana republic with goons at the gates.

The documents were uncovered by Judicial Watch, the accountability group who last year filed a lawsuit for more information on alleged sexual assaults at the hands of TSA.

July 5, 2013, “TSA Contact Center Record,” O’Hare Airport:

The female TSO then proceeded to roughly feel of [sic] her breast including her nipples. The TSO didn’t go under her arms or along her sides. She indicated that she did not receive a proper pat down. The search was limited to her breast…

Read more at SHTFplan.com

May 13 14:29

Former U.S. Government Official: U.S. Is ALREADY at War with China and Russia

Former White House official Dr. Philippa Malmgren – former presidential adviser and member of the U.S. President’s Working Group on Financial Markets – said last December that the United States is already at war with China and Russia:

I was recently at a meeting with a lot of very senior people from the defense community, and their view is that we are already in a nose-to-nose confrontation (war) with China and Russia. But these (wars) are being conducted through cyberspace rather than through traditional conventional weapons.

May 13 14:14

51% of Americans believe storms affect cloud computing

A study has found that a large percentage of Americans are a little foggy on what cloud computing actually is.

A market survey (PDF) by Wakefield Research, for cloud computing firm Citrix, asked "1006 nationally representative American adults, aged 18 and older" what they know about the cloud. The results were, well, unsurprising really, when you consider how confusing tech terms can be for the non-tech-minded.

The biggest chunk of respondents — 29 per cent — thought that "the cloud" is something to do with meteorology, while only 16 per cent first thought of computing. A whopping 51 per cent believe that a storm could play havoc with cloud computing.

May 13 14:06

The secret corporate takeover hidden in the TPP

Corporations would be able to overturn laws and regulations that protect us NEW YORK (Project Syndicate) — The United States and the world are engaged in a great debate about new trade agreements. Such pacts used to be called “free-trade agreements”; in fact, they were managed trade agreements, tailored to corporate interests, largely in the U.S. and the European Union. Today, such deals are more often referred to as “partnerships,” as in the Trans-Pacific Partnership (TPP).

May 13 14:05

“The biggest company you’ve never heard of” acquired by major military contractor you’ve heard of

Last week, one of the biggest names in military-intelligence contracting, SAIC (Science Applications International Corporation) acquired “the biggest [military-intelligence] company you’ve never heard of,” Scitor, for $790 million. That quote about Scitor was told by a former NSA officer to investigative journalist Tim Shorrock, author of the definitive book on the military-intelligence complex, “Spies For Hire: The Secret World of Intelligence Outsourcing”. In the press release, SAIC describes its newest acquisition as “a leading national security provider focused on classified US Air Force and intelligence community programs,” with annual revenues of $600 million.

May 13 10:50

Are Parents Another Threat to Children's Privacy?

NYU Researchers Demonstrate that Children's Photos on Facebook and Instagram Can Be Used to Easily Trace Personal Information.

Most parents go to great lengths to keep their children safe online—but what if parents themselves, through the simple act of posting photos to Facebook and Instagram, are putting their own kids at risk every day?...

May 13 10:32

Former Israeli premier Barak joins biometric start-up

Former Israeli Prime Minister Ehud Barak has joined the board of a local startup that specializes in biometric identification technology.

FST Biometrics announced Monday that it had received a $15 million investment from GMF Capital, a firm led by Swiss investor Gary Fegel, and that Barak would serve as GMF's representative on the company board.

FST says it uses a combination of facial recognition and behavioral analytics in its products, and that its clients include governments and corporations. Its founder and chief executive is Aharon Zeevi Farkash, a former head of Israeli military intelligence.

Barak, a former Israeli military chief, served as prime minister from 1999 to 2001. More recently, he served as defense minister before retiring from politics in 2013.

May 13 08:14

Surveilling and censoring the internet in Pakistan

A new bill before parliament could severely limit internet freedom and raises concerns the state is legalising censorship and mass digital surveillance, rights activists say.

May 13 07:48

Bigger than Heartbleed, 'Venom' security vulnerability threatens most datacenters

Move over, Heartbleed. There's a new catastrophic vulnerability in town.

A security research firm is warning that a new bug could allow a hacker to take over vast portions of a datacenter -- from within.

The zero-day vulnerability lies in a legacy common component in widely-used virtualization software, allowing a hacker to infiltrate potentially every machine across a datacenter's network.

May 13 07:47

OUTAGE AT AMSTERDAM INTERNET HUB AFFECTS MUCH OF NETHERLANDS

A technical fault at the internet hub AMS-IX in Amsterdam caused online problems in several places in the Netherlands for about an hour Wednesday afternoon. The internet hub, one of the most used internet exchanges in the world, announced they resolved the problem shortly after 1:30 p.m.

The cause of the problem, which took hold around 12:00 p.m. was not revealed. Not all of the internet traffic in the Netherlands was affected, as the hub makes use of 11 data centers, a spokesman for the internet hub told Nu.nl.

Breakdowns in internet traffic at AMS-IX are not common, the hub said. “In any case, it never happened in the three years I’ve worked here,” a spokesman told newspaper NRC. A cyber attack was not initially ruled out, but the probable cause is human error.

May 12 21:50

Israel sentences Palestinian to 9 months for Facebook posts

The former secretary-general of Fatah in Jerusalem has been sentenced to nine months in an Israeli prison for activity on social media.

SHARE THIS ARTICLE WITH YOUR SOCIAL MEDIA