Nov 29 19:16

Israel To Coordinate With Google, YouTube, To Censor Palestinian Videos Of Conflict

Israeli daily Maariv said Hotovely will be working with Google and YouTube officials in a joint mechanism that will be in charge of “monitoring and preventing” any publication of materials deemed by Tel Aviv to be “inflammatory.” Hotovely announced in a Hebrew-only press release that she met with YouTube CEO Susan Wojcicki, and Google’s Director of Public Policy, Jennifer Oztzistzki, at Google’s Silicon Valley Offices.

Nov 28 10:02

Crypto 102

Published on Nov 27, 2015

Crypto 102 - How To Make A Secret - Warning you could be shot for doing this exercise

Nov 28 08:22

Raspberry Pi Zero: the $5 computer

The original Raspberry Pi Model B and its successors put a programmable computer within reach of anyone with $20-35 to spend. Since 2012, millions of people have used a Raspberry Pi to get their first experience of programming, but we still meet people for whom cost remains a barrier to entry. At the start of this year, we began work on an even cheaper Raspberry Pi to help these people take the plunge.
Four fathers!?!??

Nov 27 11:11

China to Unleash Killer Robot Army to Fight Terrorism

By Nicholas West

This warnings are abundant about the rise of "killer robots;" they have spawned an unresolved dialogue at the United Nations, and even the U.S. military is seeking ways to create moral, ethical robots. Such dialogue and warnings might give one the perception that killer robots are not already here. Wrong, they are...

Nov 27 08:26

'Most complex malware ever': Security experts smash system that stole cash from millions

“This is POS malware on steroids. We have been examining POS malware…for at least the last eight years, and we have never seen this level of sophistication in terms of development… [Engineers say] it is the most sophisticated framework they have ever put their hands on,” Steve Ward from iSight told The Register.

The ModPOS malware is “wrapped” in multiple layers of encryption to obfuscate its tracks, so when the malware uploads cypher data to a remote server, it becomes next to impossible to find out exactly what data was stolen.

And it is not only the encryption that makes ModPOS so sophisticated. To fish out holders' personal data at the moment when the credentials pass through an electronic point-of-sale device, such as a cash register, the malware also uses a combination of tricks like ‘key-logging’, ‘network monitoring’ and ‘RAM scraping’, Gizmodo reports.

Nov 27 08:17

Google is attacking alternative news

We've been mentioning this for a several years and now other alternative news producers are feeling it too.

Google/YouTube is selectively "de-monetizing" the channels that feature alternative news.

Here's a channel we admire the "Next News Network" reporting the problem.

The issue is that it costs cold hard cash to produce videos, host them, handle the emails, and deal with never-ending technical problems.

This doesn't even address the fact that while people are doing this work, they can't earn money from other sources. (No one can be in two places at the same time no matter how hard they try.)

Webmaster's Commentary: 

This has been going on quite a while. Google has refused WRH for advertising and monitization ever since our first videos went up. Google is clearly starting to expand that program to other independent media. The fastest way to bring down a dictatorship is to force them to act like one where everybody can see it!

Nov 26 16:04

Penalties Continue For Downing Drones; FAA Seeks Mandatory Registration

By Joe Wright

As hobby drones continue to proliferate across the U.S., the rules about their use remain murky, as do the rules for blasting them out of the sky if you feel personally threatened by one. Since we have had a fair amount of reader support for taking down drones, it’s worthwhile to look at what one might expect if a course of action is taken...

Nov 26 10:34

Human resources: Walmart hired Lockheed Martin to keep tabs on employees

Walmart hired global security giant Lockheed Martin a few years ago to monitor activism in its massive workforce, according to new documents. The defense contractor tracked employees’ social media and reported protest participation to the retail giant.

Lockheed Martin, the world’s largest defense contractor, provided Walmart, the world’s largest retailer, with intelligence-gathering and surveillance services in 2012, according to a lengthy report by Bloomberg Businessweek. The news has emerged just before Black Friday protests by a union-funded group called OUR Walmart, the report claims. Participants demand higher wages and reliable scheduling for Walmart employees.

Webmaster's Commentary: 

Absoflippinglutely unbelievable, but thoroughly predictable.

Nov 26 10:07

Saudi Arabia To Sue Twitter User Who Called Poet's Death Sentence 'ISIS-Like'

Saudi Arabia's justice ministry plans to sue a Twitter user who compared the death sentence handed down on Friday to a Palestinian poet to the punishments meted out by Islamic State, a major government-aligned newspaper reported on Wednesday.

Nov 26 09:18

CENSORSHIP SHOCK: bans investigative book 'Nobody Died at Sandy Hook' because it disagrees with government version of what happened

In a stunning demonstration of online book burning, has just banned a book because of its contents. The book Nobody Died at Sandy Hook consists of analysis from a dozen contributor authors, and it's edited by Jim Fetzer, Ph.D. The book concludes that Sandy Hook was a staged FEMA drill carried out by the government to push an agenda of nationwide gun control.

Webmaster's Commentary: 

You can download a free copy of the book from THIS LINK. Save a local copy to forward to your friends.

Nov 26 08:32

Sneaky Microsoft renamed its data slurper before sticking it back in Windows 10

“Anonymity is like virginity. You don't get it back once you've lost it,” writes one Register reader on Microsoft’s latest raid on your privacy.

Microsoft pulled a major update for Windows after it blew away the user's privacy settings, allowing app developers and advertisers to glean the user’s identity.

But that’s only part of the story, which gets murkier by the day.

We already knew Windows 10 Threshold deleted third-party data monitoring tools and cleanup tools, including stalwarts like Spybot and CCleaner. It even disabled Cisco’s VPN software. Just a bug, said Microsoft.

Two bugs would be a puzzling coincidence – but something else makes it altogether more troubling.

Nov 26 07:26

Israel meets with Google and YouTube to discuss censoring Palestinian videos

Israel’s Deputy Foreign Minister Tzipi Hotovely has met with representatives of YouTube and Google to discuss ways to cooperate in what she calls the fight against “inciting violence and terrorism”.

Israel’s Maariv newspaper reported yesterday that Hotovely agreed to work with Google and YouTube in order to establish a joint working mechanism to monitor and prevent the publication of “inflammatory material” originating in the Palestinian territories.

Webmaster's Commentary: 

"Just because we are stealing their land, destroying their homes, and killing their children is no reason to let them complain about it to the world!!!" -- Nodding Yahoo

Nov 25 15:18

Hacktivists smash ISIS website with Prozac and Viagra ads

Hackers affiliated with online activist group Anonymous have taken down an Islamic State (IS, formerly ISIS/ISIL) website on the dark web and replaced it with ads for anti-depressant Prozac and erectile dysfunction treatment drug Viagra, with a message urging extremists to calm down.

Nov 25 12:15

AVG defends plans to flog user data as privacy row continues

Security software firm AVG has defended changes in its privacy policy, due to come into effect on Thursday (15 October), allowing it to collect and resell users’ anonymised web browsing and search history.

AVG argues that it has no immediate plans to monetise users’ browsing habits. However, independent security experts remain critical, arguing that the firm is putting user privacy and even trust in security firm more generally at risk.

Nov 25 11:36

FLASHBACK 2014 - The Details About the CIA's Deal With Amazon

The intelligence community is about to get the equivalent of an adrenaline shot to the chest. This summer, a $600 million computing cloud developed by Amazon Web Services for the Central Intelligence Agency over the past year will begin servicing all 17 agencies that make up the intelligence community. If the technology plays out as officials envision, it will usher in a new era of cooperation and coordination, allowing agencies to share information and services much more easily and avoid the kind of intelligence gaps that preceded the Sept. 11, 2001, terrorist attacks.

Webmaster's Commentary: 

Well, I guess I know why I am being DOSed from the Amazon IPs! I am up against the varsity! And it probably doesn't help that former White House spokesdrone Jay Carney is now a VP at Amazon. :)

Nov 25 08:33

Perfectly legal ways you can still get Windows 7 cheap (or even free)

Windows 7 is more than six years old. Most of the cheap upgrade offers that were available when it was fresh and new are long gone. But if you prefer the familiar Windows 7 interface (or need it for testing and evaluation) you can still find great deals. Here are all the details you need.

Nov 25 08:25

Second Dell backdoor root cert found

A second root certificate has been found in new Dell laptops days after the first backdoor was revealed.

The DSDTestProvider certificate was first discovered by Laptopmag. It is installed through Dell System Detect into the Trusted Root Certificate Store on new Windows laptops along with the private key.

Dell has been contacted for comment. The Texas tech titan has called the first certificate gaffe an "unintended security vulnerability" in boilerplate media statements.

Carnegie Mellon University CERT says it allows attackers to create trusted certificates and impersonate sites, launch man-in-the-middle attacks, and passive decryption.

Nov 25 08:24

Amazon resets account passwords feared compromised – report appears to be asking some of its customers to reset passwords after a breach of some sort.

The online bazaar apparently sent cryptic emails to some of its account holders warning them that their passwords were blabbed in some way, and therefore have to be changed.

"We recently discovered that your password may have been improperly stored on your device or transmitted to Amazon in a way that could potentially expose it to a third party. We have corrected the issue to prevent this exposure," Amazon is reported to have told customers.

Amazon says it has no evidence that the passwords were abused, and had reset the credentials out of an "abundance of caution."

Webmaster addition: No evidence of abuse? My server has been DOSed repeatedly from IP addresses this week!

Nov 24 09:08

iPad Pro: Apple's tablet is a big fat enterprise failure

No executive is going to lug around this morbidly obese tablet in place of a smaller iPad or a real laptop.

Webmaster's Commentary: 

Plus the iPad Pro can freeze while being recharged, requiring a hard restart.

Nov 24 09:07

How to remove Dell's 'Superfish 2.0' root certificate - permanently

Dell's eDellroot certificate blunder exposes users to a range of malicious attacks but guidance is now available for its permanent removal.

Nov 24 08:57

Dell: How to kill that web security hole we put in your laptops, PCs

Dell has published a guide on how to remove the web security backdoor it installed in its Windows laptops and desktop PCs.

This confirms what we all know by now – that Dell was selling computers with a rather embarrassing hole it in their defenses.

Nov 24 08:56

Superfish 2.0: Dell ships laptops, PCs with huge internet security hole

Root CA certificate opens up folks to banking, shopping snooping, etc

Nov 24 08:55

World's most complex cash register malware plunders millions in US

The world's most complex sales till malware has been discovered ... after it ripped millions of bank cards from US retailers on the eve of post-Thanksgiving shopping frenzies.

The ModPOS malware has pilfered "multiple millions" of debit and credit cards from the unnamed but large retail companies incurring millions of dollars in damages.

The attackers have operated in a low-key, ultra professional manner since late 2013 and has only come to light after weeks of painstaking reverse-engineering efforts by malware experts.

They have kept mum, too. Cybercrime forums are entirely devoid of references to the malware.

"This is POS [point-of-sale] malware on steroids," iSight Partners senior director Steve Ward says.

Nov 24 08:37

Flashback: Hackers seed Amazon cloud with potent denial-of-service bots

Attackers have figured out a new way to get Amazon's cloud service to wage potent denial-of-service attacks on third-party websites—by exploiting security vulnerabilities in an open source search and analytics application known as Elasticsearch.

Nov 24 08:02

Jimmy Wales: "All major internet traffic is going to be encrypted very, very soon"

“A few years back we were in the golden age for spying on the general public,” says Jimmy Wales, founder of Wikipedia. He is giving the keynote address at the IP Expo Europe in London, and it’s clear that he is confident of two things: total internet encryption is coming, and this is a very good thing.

Nov 24 07:49

Dell installs self-signed root certificate on laptops, endangering users' privacy

Dell laptops are coming preloaded with a self-signed root digital certificate that lets attackers spy on traffic to any secure website.

Nov 24 06:40

What's inside a "Hello Barbie" surveillance toy?

Mattel's Hello Barbie has a microphone and a wifi interface, and it transmits the phrases it hears to a central server in order to parse them and formulate a response. Mattel claims that the data isn't being retained or harvested for marketing purposes, and assures parents that they can make Barbie stopping eavesdropping on them at will. But does it work? Somerset Recon has done a teardown on a Hello Barbie, examining its components and dumping its firmware. Part one of their report is online now, and it's a little dry: Hello Barbie has some standard IoT chips -- a sound codec, a wifi card, etc -- but until Somerset posts their analysis of the firmware dump, this is pretty preliminary stuff.

Nov 24 06:09

Debunking the Sandy Hook Debunkers: #5 bans NOBODY DIED AT SANDY HOOK

Webmaster's Commentary: 


James Fetzer's website.

Here is the link to download a PDF of the book Amazon does not want you to see.

Nov 23 16:33

Amazing Prosthetic Hand Can Be Created In 42 Hours And Costs Just $3,000

By Amanda Froelich

From 3D printed wheelchairs to casts that speed healing, the world of prosthetics is exciting. Unfortunately, investing in 3D printed limbs is also expensive, which is why Open Bionics set out to find a way to make a bionic hand quickly and cheaply.

As IFLScience reports, the company recently won the prestigious UK 2015 Dyson Award for its 3D printed artificial limb which can be created in just over 42 hours and costs about $3,000...

Nov 23 15:06

The Post-Paris War on Encryption Is an Opportunistic Attack on Our Civil Liberties

The feds have had it out for encryption for decades, but in the wake of the Paris attacks, the vilification of cryptography - the use of mathematical algorithms and other practices to protect web transactions and emails, "lock up" data at rest on a hard drive, protect the privacy of certain phone calls and more - has reached a dangerous new low.

Nov 23 10:01

This video is no longer available because the YouTube account associated with this video has been terminated.

Webmaster's Commentary: 

This video had showed migrants simply dumping their garbage from their balconies at the Augsburg Asylum Center, Germany into the streets.

Nov 23 09:18

NSA documents reveal bulk email collection continues despite official claims

A series of declassified National Security Agency (NSA) documents have revealed that the government’s program of bulk metadata collection of the population’s internet communications, known as STELLARWIND, has continued despite claims by the Obama administration to have ended the program in 2011, prior to information of its existence being leaked by NSA whistleblower Edward Snowden.

Nov 23 09:12

NSA's Mass Metadata Collection Still Constitutional, Says Court

The U.S. Court of Appeals for the D.C. circuit has denied Larry Klayman’s emergency petition for rehearing en bac of the appeals court’s ruling to stay a lower court injunction on the government’s bulk metadata collection program.

Nov 23 08:57

New hacker group (Ghost Security Group) 'Spying' on Islamic State instead of hacking them. Calling Anonymous tactics 'unsophisticated'

In the wake of the Paris attacks, the vigilante hacker group Anonymous has declared war on so-called Islamic State using the internet and claims to haveshut thousands of Twitter accounts used by IS operatives. But a much smaller online group has also emerged, with quite a different strategy - and they claim they've already thwarted at least one terror attack.

Nov 23 07:59

How NSA continued to spy on American citizens' email traffic – from overseas

Newly revealed documents (not from Snowden this time) show that the NSA has continued to collect Americans' email traffic en masse using overseas offices to get around curbs introduced domestically.

Shortly after the September 11 attacks, President Bush authorized the NSA to collect bulk metadata on emails sent by Americans (although not the content) to help The War Against Terror (TWAT). The surveillance was authorized by the US Foreign Intelligence Surveillance Court, which mostly rubberstamped such requests.

But the collection was stopped in 2011, the NSA said, although it still monitored emails from Americans to people outside the nation's borders. However, a Freedom of Information Act lawsuit started by The New York Times against the NSA's Inspector General has uncovered documents showing that the NSA carried on collecting domestic data.

Webmaster's Commentary: 

Intelligent people understand that one cannot say ,in any email correspondence, anything that one would not want shouted from the rooftops, globally.

And the bad guys already have encryption in place that the Feds cannot penetrate, or are going low tech to communicate.

No matter which party is in office, the efforts to completely eviscerate the Constitution and Bill of Rights continue, with impunity.

Nov 23 07:56

Inside the Sony Hack

Outside Sony, it would eventually seem as if all the studio's info had been exposed for everyone to see. But inside the studio, nobody could access anything. “Everything was so completely destroyed. It was surreal. Everything was down,” one ex-employee told me. “It wasn’t just one system or one part of the lot or one building. The network was completely chewed up by the virus."

The telephone directory vanished. Voicemail was offline. Computers became bricks. Internet access on the lot was shuttered. The cafeteria went cash-only. Contracts—and the templates those contracts were based on—disappeared. Sony’s online database of stock footage was unsearchable. It was near impossible for Sony to communicate directly with its employees—much less ex-employees, who were also gravely affected by the hack—to inform them of what was even happening and what to do about it. “It was like moving back into an earlier time,” one employee says.

Nov 22 18:40

How NSA continued to spy on American citizens' email traffic – from overseas

Newly revealed documents (not from Snowden this time) show that the NSA has continued to collect Americans' email traffic en masse using overseas offices to get around curbs introduced domestically.

Shortly after the September 11 attacks, President Bush authorized the NSA to collect bulk metadata on emails sent by Americans (although not the content) to help The War Against Terror (TWAT). The surveillance was authorized by the US Foreign Intelligence Surveillance Court, which mostly rubberstamped such requests.

But the collection was stopped in 2011, the NSA said, although it still monitored emails from Americans to people outside the nation's borders. However, a Freedom of Information Act lawsuit started by The New York Times against the NSA's Inspector General has uncovered documents showing that the NSA carried on collecting domestic data.

Nov 22 18:39

Malware caught checking out credit cards in 54 luxury hotels

Add Starwood – owner of the Sheraton, Westin, W hotel chains – to the ranks of resorts infiltrated by credit card-stealing malware.

The luxury hotel chain said on Friday that 54 of its North American locations had been infected with a software nasty that harvested banking card information from payment terminals and cash registers.

Starwood said the 54 compromised hotels [PDF] were scattered throughout the US and Canada, and were infected from as early as November of 2014 to June 30 of this year. Malware was found in payment systems in gift shops, restaurants, and sales registers.

Data stolen by the software could include customer names, credit card numbers, card security codes, and expiration dates.

Nov 22 18:38

Who's running dozens of top-secret unpatched databases? The Dept of Homeland Security

The US Department of Homeland Security is running dozens of unpatched databases, some of which are rated "secret" and even "top secret," according to an audit.

An inspection [PDF] of the department's IT infrastructure found huge security gaps, including the fact that 136 systems had expired "authorities to operate" – meaning that no one was in charge of keeping them updated. Of the 136, 17 were classified as "secret" or "top secret."

Unsurprisingly, with so many systems not undergoing active maintenance, the audit found that many did not have up-to-date security patches, leaving them open to hacking efforts. The problems extended from browsers to PCs to databases. It also found a large number of weak passwords.

Nov 22 17:44

NSA documents reveal bulk email collection continues despite official claims

A series of declassified National Security Agency (NSA) documents have revealed that the government’s program of bulk metadata collection of the population’s internet communications, known as STELLARWIND, has continued despite claims by the Obama administration to have ended the program in 2011, prior to information of its existence being leaked by NSA whistleblower Edward Snowden.

Nov 22 09:43

YouTube Terminates PINAC Account for “Violent” Police Videos, the Latest Shutdown on Independent Media

On October 27, YouTube terminated the main channel of Photography is Not a Crime, claiming the channel posts too many videos that are “violent or graphic content that appears to be posted in a shocking, sensational, or disrespectful manner.”

Because of that, PINAC lost hundreds of videos it had posted on the channel.

The videos found on the PINAC YouTube channel are typically also aired by national and local television news stations now that police violence has become national news.

However, PINAC’s account was suspended in August for airing footage of the Virginia reporters getting shot to death, which many news stations chose not to run.

Nov 21 12:06

Anonymous Publishes List of ISIS Targets for Sunday Attacks

By Joe Wright

Hacktivist group Anonymous has declared all-out cyber war on ISIS following the Paris terror attacks. #OpParis went live just days ago, which involved Anonymous issuing a guide to the world on how to disrupt ISIS recruiting via social media. Despite documenting their results of over 20,000 hacked ISIS Twitter accounts, some US officials appeared dismissive of the tactics saying it would only be nothing more than an “annoyance.”

However, it appears that the U.S. government is now paying closer attention to what Anonymous is saying...

Nov 21 09:44

NSA doc shows US email surveillance continued despite program ending

Although the US government says an NSA program collecting email records of Americans was shut down in December 2011, it is likely the practice still continued, according to documents obtained by the New York Times under the Freedom of Information Act.

Webmaster's Commentary: 

Imagine my shock!

Click for larger image

Nov 20 10:46

'Facebook thinks I'm a terrorist': woman named Isis has account disabled

Isis Anchalee, a San Francisco-based engineer, claims to have had her Facebook account disabled because of her name

Nov 20 10:39

Android adware can install itself even when users explicitly reject it

Two weeks ago, Ars reported on newly discovered Android adware that is virtually impossible to uninstall. Now, researchers have uncovered malicious apps that can get installed even when a user has expressly tapped a button rejecting the app.

Nov 20 09:30

Candidates Ready to Trash Constitution to Fight ISIS: “Time To Put Life Ahead of Civil Liberties”

Under the auspices of retribution for 9/11 and the War on Terror, Americans hardly blinked at trampling on constitutional rights.

People later regretted the powers granted via the PATRIOT Act... but only once the path down the slippery slope had begun

Today, new threats from ISIS are dragging the United States dangerously close to this point again.

“I disagree with that [liberal view]. You want to be free and dead? I’d rather be not free and alive,” Saban said, adding that at ‘a time of war’, interviewing Muslim refugees and migrants in a more intense way than Christians is acceptable, as well as “listening in on anyone and everybody who looks suspicious.”


Nov 20 08:34

Numerous terror attacks go unnoticed amid Paris attacks buzz

Social media users are embracing the #PrayForNigeria hashtag, criticizing main stream media for ignoring or underreporting the latest terrorist attacks there.

Nov 20 08:21

Apple – it's true: iPad Pro slabs freeze when plugged in to charge

Apple has confirmed its iPad Pro tablets sometimes freeze while recharging.

The Cupertino giant has published a support document acknowledging that its new 12.9-inch tablet has a tendency to lock up when plugged in for a battery charge, requiring a hard reboot to revive it.

This comes after people have been complaining for nearly a week that their new iPad Pros were refusing to wake up when plugged into the charger.

Nov 20 08:17

Israeli spy Pollard released after 30 years in US jail

Jewish American spy Jonathan Pollard was released from a US prison Friday after serving nearly 30 years for passing American secrets to Israel, in a move welcomed by Israeli Prime Minister Benjamin Netanyahu.

The decades-long punishment has been deemed disproportionate by the Jewish state, where Pollard is seen by some as a national hero.

Netanyahu, who has long pressed for Pollard's release, said Friday that "after three long and difficult decades Jonathan is at last reunited with his family."

"The people of Israel welcome the release of Jonathan Pollard," he said.

(Note: Another "Soft Spin" from the Zio-Media on the release of this Jewish TRAITOR!!!)

Nov 20 07:45

NATO fights malware, bugged devices at Estonian cyber center

NATO nations and allies are battling malware in tablets and infected devices this week in the alliance's largest cyber drill to date aimed at improving members' data privacy in crisis situations.

Nov 20 07:03

Cat discovers GNOME desktop bug

Coming soon: Dog rewrites Linux kernel

Nov 19 18:49

Facebook censors have blocked this posting (from the Jerusalem Post!) and shut me out for five days

Facebook Ban – Day Two

It’s not to try to silence me or anything during current events.
Please pass on news of the ban, share on social media and tell people to come to to see what Facebook is censoring this next week …

Far-right settler rabbi: Paris attacks are payback for the Holocaust

Nov 19 17:03

Shock Report: DHS Missed 73 Airport Employees On Watchlist… But “Will Screen Out Terrorists”

Can we trust the federal government to protect us from terrorist who may be coming to the U.S. to cause trouble?

A review of screening and security procedures inside the TSA has revealed that 73 workers approved for access to secure areas are actually on the terrorism watch list.


Nov 19 13:23

Post-Paris American Police State Once Again In Vogue: “We Can Crush ISIS’s Enclave of Terror”

It seems that the only response to terrorism is more surveillance, security, police presence and, of course, war.

To that end, Hillary Clinton is most definitely "in":

But Clinton called for further US special forces to be deployed to Syria too, reiterated her call for a no-fly zone and demanded an “intelligence surge” to allow the airstrikes against Isis to be stepped up.

“The United States has been conducting this fight for more than a year; it’s time to be begin a new phase and intensify and broaden our efforts,” Clinton told the Council on Foreign Relations in New York.


Nov 19 12:48

US officials seize on Paris attacks to press for “back door” to encryption

US officials are moving rapidly to exploit the terrorist attacks in Paris on Friday to push forward with already existing plans to undermine encrypted communications and vastly expand the powers of the state.

Nov 19 10:18

U.S. Mass Surveillance Has No Record of Thwarting Large Terror Attacks, Regardless of Snowden Leaks

Despite the intelligence community’s attempts to blame NSA whistleblower Edward Snowden for the tragic attacks in Paris on Friday, the NSA’s mass surveillance programs do not have a track record — before or after Snowden — of identifying or thwarting actual large-scale terrorist plots.

CIA Director John Brennan asserted on Monday that “many of these terrorist operations are uncovered and thwarted before they’re able to be carried out,” and lamented the post-Snowden “handwringing” that has made that job more difficult.

But the reason there haven’t been any large-scale terror attacks by ISIS in the U.S. is not because they were averted by the intelligence community, but because — with the possible exception of one that was foiled by local police — none were actually planned.

And even before Snowden, the NSA wasn’t able to provide a single substantiated example of its surveillance dragnet preventing any domestic attack at all.

Nov 19 09:53

Kids' tech skills go backwards thanks to tablets and smartmobes

Australian study finds lowest-ever digital literacy scores coincide with the iPad age

Nov 19 09:51

Edgy online shoppers face Dyre Christmas as malware mutates

"The cyber criminals behind Dyreza often spread the malware via spray-and-pray spam campaigns, which are sent to random recipients," Zahria says.

" … Dyreza is also a crime-as-a-service network” that anyone can buy into [and attack] a group of targets in the code configuration file [which] are typically online banking websites."

Targeted users risk having bank accounts drained and machines botted.

Nov 19 09:24

Martin Armstrong Rages "It's Time To Knock Off The BS About 'Surveillance For Terrorism'"

The worldwide collection of phone calls, emails, text messages and our total loss of privacy is all about taxes – NOT terrorism.

With all this power and the demand that encryption be outlawed, not any of this surveillance has stopped one terrorist act. There was the Boston bombers, two kids using cell phones. They didn’t catch that either. Then there was the two guys dressing up as women who attacked the NSA itself. They didn’t know about that. Then Charlie Hebdo, that too was a surprise. Now we have an all out assault on civilians in Paris carried out by 3 suicide squads and again they were clueless.

This surveillance does not work because they are really monitoring the people for taxes or they would not be storing everything forever.

Nov 19 09:06

Elections – Social Media Engineering And The Art Of Hacking Humans

Social engineering is the hacking of human beings. It’s not new but what is new is the almost overnight and spectacular take up rate of social media across the world and it brings with it new challenges that in some context should be termed social media engineering.

Nov 19 08:36

Paris attacks prompt new calls by senators for legislation to bypass encryption

The U.S. government's financial support for the development of smartphone encryption apps doesn't surprise security experts.

Wireless network engineers, network admins, and network security pros can expect above-average pay
Read Now

U.S. intelligence agencies are probably involved in funding commercial encryption apps through the government's Open Technology Fund to stay on top of terrorists and organized criminals that use encryption to cloak their communications, several security experts said Wednesday.
MORE ON NETWORK WORLD: 26 crazy and scary things the TSA has found on travelers

"It would not surprise me if federal agencies were funding encryption apps because it is possibly the only option available to monitor terrorism and organized crime," said Darren Hayes, assistant professor and director of cybersecurity at Pace University.

Webmaster's Commentary: 

Except that it won't work! Like so many other government "solutions" it will increase cost, complexity, and inconvenience to law abiding citizens and leave the criminals/terrorists untouched.

Nov 19 08:33

Elections – Social Media Engineering And The Art Of Hacking Humans

By Graham Vanbergen

Social engineering is the hacking of human beings. It’s not new, but what is new is the almost overnight and spectacular take-up rate of social media across the world; and it brings with it new challenges that in some context should be termed social media engineering...

Nov 19 08:09

Both FBI And Carnegie Mellon Are Now Denying 'Accuracy' Of $1 Million Tor Surveillance Payment

Last week the director of the Tor Project, Roger Dingledine, made a bold but unsubstantiated claim that users of the Tor anonymizing network were unmasked in the first half of 2014 by a technique supplied to the FBI by Carnegie Mellon University (CMU) researchers. Both have now labelled those claims inaccurate and it appears CMU submitted to a subpoena, though it isn’t admitting to anything.

In a terse statement given to FORBES on Friday, an FBI spokesperson said the suggestion that $1 million was paid was inaccurate. The spokesperson wouldn’t be drawn into saying whether any payment was made at all.

Webmaster's Commentary: 

A non-denial denial.

Nov 19 06:22

Anonymous Publishes Guide On How To Attack ISIS Online

Hacker group Anonymous have published a guide for people interested in waging an online war against ISIS.

The guide will detail ways to identify and attack websites and social media assets belonging to the Islamic State or ISIS.

Nov 18 23:11


Published on Mar 21, 2014

Now that the MSM is flirting with the idea of "cyber hijacking" in the increasingly desperate search for MH370, many are left wondering how long the possibility of a remote control hijack has been possible and why the public hasn't been warned of this threat. Join us for this week's Eyeopener report as we examine the cyber hijacking issue and its connections to 9/11.

Nov 18 23:03

The double-edged sword of cyber warfare

Kind of in your face aren't they!

One week after the Israeli army formally recognized cyber weapons as a fourth dimension of warfare, alongside land, air and sea, the defense minister on Wednesday sang the praises of digital weapons, saying that they can attack and conquer enemy assets without leaving a trace.

“Cyberspace enables the attack of another nation state in offensive action, even reaching victory without leaving any fingerprints, even if it is suspected,” Defense Minister Moshe Ya’alon said Wednesday at the fifth annual Cyber Security Conference at Tel Aviv University, according to a conference statement. “We are already there; we are not talking about some distant future. We have experienced this in Israel’s day-to-day actions against its enemies.”

The reference to offensive action was somewhat rare and it came just two weeks after Israel was fingered as a suspect in a cyberattack against participants in the nuclear negotiations with Iran.

Nov 18 20:57

How a hacker could hijack a plane from their seat

The Russian plane reported problems with the planes in-flight entertainment system and wireless(wifi?).After that no more communications.

Reports that a cybersecurity expert successfully hacked into an airplane’s control system from a passenger seat raises many worrying questions for the airline industry. It was once believed that the cockpit network that allows the pilot to control the plane was fully insulated and separate from the passenger network running the in-flight entertainment system. This should make it impossible for a hacker in a passenger seat to interfere with the course of the flight. But the unfolding story of this hacker’s achievement, which has prompted further investigation by authorities and rebuttals from plane manufacturers, means that this assumption needs to be revisited.

Nov 18 20:54

The scariest cyber threat of all? How hackers are hijacking planes

Cyber attacks on the aviation industry are becoming a sensitive issue. Considering that cyberspace provides a low-cost haven for carrying out a broad range of disruptive activities, it is reasonable to conclude that hackers will consider the aviation sector as one of their targets.

Also, because of lower risk, cyber terrorism is replacing the bomber and hijacker and becoming the weapon of choice when it comes to attacks against the aviation industry.

Nov 18 20:52

Cyber Wars: US govt failing to address hacking attacks – report

American government agencies are being faced with a broadening range of cyber-based threats, but the government has largely failed to tackle the issue.

Nov 18 20:52

Hacker Uses An Android To Remotely Attack and Hijack A Plane

By taking advantage of two new technologies for the discovery, information gathering and exploitation phases of the attack, and by creating an exploit framework (SIMON) and an Android app (PlaneSploit) that delivers attack messages to the airplanes' Flight Management Systems (computer unit + control display unit), he demonstrated the terrifying ability to take complete control of aircrafts by making virtual planes "dance to his tune."

Nov 18 20:48

Planes Grounded After Hackers Hijack An Airline's Flight Plan System

Practice makes perfect!

A cyberattack on Polish airline LOT left ten flights canceled this Sunday, stranding around 1,400 people at Warsaw’s Chopin airport. The attack hit the airline’s ground computer system, which is used to make flight plans.

The hackers didn’t break into the IT on the planes, but this incident makes it even more obvious that the air travel industry needs to be vigilant about cybersecurity. Earlier this year, security researcher Chris Roberts reportedly commandeered an airplane to demonstrate how crappy United’s security setup is.

“We’re using state-of-the-art computer systems, so this could potentially be a threat to others in the industry,” spokesman Adrian Kubicki told Reuters.

Nov 18 20:46

New Malaysia Airlines Flight MH370 ‘Cyber Hijack’ Theory Emerges After ‘Vulnerabilities’ Found In Inflight System

As the search for the missing Malaysia Airlines Flight MH370 continues, investigators have come across some startling evidence that the plane could have been hijacked using a mobile phone or even a USB stick. The theory comes from a British anti-terrorism expert who says cyber terrorists could have used a series of “codes” to hack the plane’s in-flight entertainment system and infiltrate the security software.

According to Sally Leivesley, a former scientific adviser to the UK’s Home Office, the Boeing 777’s speed, direction and altitude could have been changed using radio signals sent from a small device. The theory comes after investigators determined that someone with knowledge of the plane’s system intentionally flew the jet off course.

“It might well be the world’s first cyber hijack,”

Nov 18 20:21

Suspicions about the Russian Plane Crash

"Once again, politicians, intelligence agents and journalists have made up their minds that a bomb triggered the crash of a Russian Airbus A321, though evidence to support this theory is ephemeral."
- Christine Negroni, "Why the rush to judgment in the Metrojet disaster?"

[Carmi] Gillon suggested that today a terror organization could take over a jet plane and “achieve something like 9-11” without fielding any flesh and blood attackers.
- Carmi Gillon, former head of Israel’s Shin Bet security service, “The double-edged sword of cyber warfare,” Times of Israel, June 24, 2015

“Cyberspace enables the attack of another nation state in offensive action, even reaching victory without leaving any fingerprints, even if it is suspected. We are already there; we are not talking about some distant future. We have experienced this in Israel’s day-to-day actions against its enemies.”
- Israel Defense Minister Moshe Ya’alon, Ibid., Times of Israel, June 24, 2015

Nov 18 16:32

The World’s First Cashless Society Is Here – A Totalitarian’s Dream Come True

By Nick Giambruno

Central planners around the world are waging a War on Cash. In just the last few years:

- Italy made cash transactions over €1,000 illegal;
- Switzerland proposed banning cash payments in excess of 100,000 francs;
- Russia banned cash transactions over $10,000;
- Spain banned cash transactions over €2,500;
- Mexico made cash payments of more than 200,000 pesos illegal;
- Uruguay banned cash transactions over $5,000; and
- France made cash transactions over €1,000 illegal, down from the previous limit of €3,000.

The War on Cash is a favorite pet project of the economic central planners...

Nov 18 16:08

Don't want Windows 10? This tool lets you stay on Windows 7 and prevent automatic upgrades

So what can you do? We suggest that you download GWX Control Panel, a piece of freeware that enables users to permanently remove the annoying blue and white "Get Windows 10" pop-up box on your desktop's notification area, as well as preventing Microsoft from secretly installing the 6GB of Windows 10 drivers, images and language packs you don't want.

In addition, the program also claims that it can detect and automatically remove any Windows 10 installation files that might have already downloaded to your PC, if you don't want to head over to Windows Explorer and search for the C:$Windows.~BT folder yourself.

Nov 18 14:35

‘War against ISIS’: Anonymous promises revenge for A321 Sinai crash

Members of the Anonymous hacker group are promising revenge for the Russian plane disaster.

Nov 18 13:56

Osborne slashes welfare, injects £1.9bn into cybersecurity to counter ISIS hackers

Islamic State terrorists could launch cyberattacks on power stations, the National Grid and hospitals, Chancellor George Osborne warned in a speech outlining his commitment to spending an additional £1.9 billion on cybersecurity.

Nov 18 12:42

GridExIII Drill Coincides with American Terror Threat: “ISIS Cells Could Attack Our Power Grid”

The threat of an ISIS attack on U.S. soil has become tangible... all while the North American Energy Reliance Corporation (NERC) has launched GridExIII, high level national security exercises for November 18-19... simulating an attack on the power grid:

“NERC’s grid security exercise (GridEx III) is designed for electric utilities to exercise their response to simulated coordinated cyber and physical security threats and incidents…"

Rogue cells inside a legitimate drill COULD be used to take down the entire power grid, and emergency response teams would play along in real time as if it were only a scenario. By then, it might be too late.


Nov 18 07:51

"They're violating the rights of everyone in the country"

This is not the opinion of an
outside critic.

It's the opinion of one of the
NSA administrators who set up
the mass surveillance system.

Nov 18 05:38

Metadata Surveillance Didn’t Stop the Paris Attacks

And yet intelligence officials and politicians are now saying it could have. They’re wrong.

Nov 18 05:31

'Shut down the parts of internet used by Islamic State masterminds'

Joe Barton is angry about Paris killings. Also has no idea what he's talking about

Nov 17 16:29

Dislike: Facebook wrongly removes post questioning partial coverage of Paris attacks

Facebook removed a UK student’s post criticizing the world for not responding to recent terrorist attacks in Lebanon and Africa with the same prayers and support as for Paris. The tech giant republished it, citing human error, after being approached by RT.

Nov 17 15:05

Anonymous Kills 5,500 ISIS Social Media Accounts After Paris Terror Attack

The “hacker collective” known as Anonymous is waging an all-out war against ISIS.

So far, they’ve taken down more 5,500 ISIS-associated Twitter accounts since the Paris terror attacks.

Webmaster's Commentary: 

Actually, these are the accounts used by propagandists to sell the ISIS terror image, or the NSA would have shut them down long ago.

Nov 17 14:07

15yo boy charged over airline bomb hoaxes, cyber-attacks

A teenage boy has been charged with offences relating to cyber-attacks and bomb hoaxes on airlines in the UK and US, it has emerged.

The 15-year-old suspect from Plymouth has been charged with three offences under Section 3 of the Computer Misuse Act.

Nov 17 13:28

Judge: HP must turn over computer code to Mich. SOS

A Kent County judge has ordered Hewlett-Packard to turn over the computer source code for vehicle registrations online to the state of Michigan, according to the Michigan Secretary of State’s Office.

The state terminated its contract with the global information technology company in August and sued HP in Kent County Circuit Court in September after the company failed to deliver on a $49 million contract over 10 years. The contract was expected to replace aging computer systems at the Secretary of State offices across the state.

The ruling Monday addressed the state’s request for an injunction to force HP to provide computer source code that is necessary to ensure the state’s ability to maintain and manage its ExpressSOS website, which is used by millions of Michigan residents, the SOS office said in a news release Monday.

Nov 17 13:23


Despite the intelligence community’s attempts to blame NSA whistleblower Edward Snowden for the tragic attacks in Paris on Friday, the NSA’s mass surveillance programs do not have a track record—before or after Snowden—of identifying or thwarting actual, large-scale terrorist plots. CIA Director John Brennan asserted on Monday that “many of these terrorist operations are uncovered and thwarted before they’re able to be carried out,” and lamented the post-Snowden “handwringing” that has made that job more difficult.

Nov 17 12:44

Edward Snowden urges internet users to install ad blockers to boost online privacy

"Everybody should be running adblock software, if only from a safety perspective.

"We’ve seen internet providers inserting their own ads into your plaintext http connections.

"As long as service providers are serving ads with active content that require the use of Javascript to display or that have some kind of active content like Flash embedded in it, you should be actively trying to block these.

Webmaster's Commentary: 

We do not allow flash ads here at WRH for that reason.

Nov 17 10:44

The US government is already lying like crazy about surveillance after the Paris attacks

At a Center for Strategic & International Studies talk today, CIA director John Brennan renewed one of the government's favorite lies about spying: that mass surveillance has been successful in stopping a bunch of mysterious threats while it is simultaneously too ineffective to stop real attacks, because of privacy advocates and whistleblowers.

Nov 17 09:28

The US government is already lying like crazy about surveillance after the Paris attacks

Glenn Greenwald at The Intercept has thoroughly documented the genesis of this lie, but here's the short version: the government can't have it both ways on security. It can't ask that companies and individuals strengthen their defenses against attacks while at the same time demanding companies like Apple and Google to sabotage their users by giving the government the means to break encryption.

Nov 17 08:43

Hillary Clinton: (Yet) ‘Another conspiracy theory’

After a series of questions from host Chuck Todd about her emails, including a new charge that a recently released email exchange with former CIA director and retired Gen. David Petraeus occurred earlier than she acknowledged using her personal account, an exasperated-sounding Clinton asked Todd whether his next question would be about “another conspiracy theory.”

She rejected the notion that her decision to use a personal email server as secretary of state was meant to evade public records searches, noting that congressional investigators unearthed many of her emails before she released them because they were obtainable through public systems. She acknowledged, however, the “drip, drip, drip” of accusations leveled at her, but couldn’t guarantee when they would stop.

Nov 17 08:09


Remember all the Angst and outrage from the Merkel government when She Who Is Not To Be Spied Upon, Frau Bundeskanzler, discovered that the American national security agency was tapping her cell phone? At the time, we read all the outraged op-ed pieces that it simply wasn't a good thing for allies to spy on each other. Indeed, consider the following RT article, reporting on a recent article on Germany's own international espionage efforts in Der Spiegel, shared by Mr. S.D.:

Germany ‘systematically spied’ on own allies on grand scale - Spiegel

As the RT article points out, the outrage expressed by the Merkel government is more than disingenuous:

Nov 17 08:08

Germany ‘systematically spied’ on own allies on grand scale - Spiegel

A list of targets of Germany’s foreign intelligence agency (BND) has provided some unexpected surprises, a report by Spiegel suggests. Berlin is reported to have “systematically spied” on many of its allies – including the US Department of the Interior.

German espionage programs have targeted many states and organizations one would think would be considered friendly, including the Ministries of Interior of Poland, Austria, Denmark and Croatia; US diplomatic missions at the EU and UN, as well as the US Treasury Department and Department of the Interior in Washington, according to Der Spiegel’s report. Even the US State Department’s hotline for travel warnings has been snooped on.

Webmaster's Commentary: 

Now watch the same US Government that insists we should not be upset over warrantless spying on us all scream bloody murder when it happens to them!

Nov 17 07:06

French Security Left Blind During Paris Attacks

I have received a report from European security that there was a massive cyber attack on French systems 48 hours prior to and during the Paris attacks. Among other things, the attack took down the French mobile data network and blinded police surveillance The attack was not a straightforward DDOS attack but a sophisticated attack that targeted a weakness in infrastructure hardware.

Such an attack is beyond the capability of most organizations and requires capability that is unlikely to be in ISIL’s arsenal. An attack on this scale is difficult to pull off without authorities getting wind of it. The coordination required suggests state involvement.

Nov 16 16:14

Verizon resurrects activation fees because you're not already giving it enough money

According to a report from Droid Life this week, Verizon will so bring back the dreaded activation fee when you sign up for service from the carrier. Starting on November 15th, which is the same date the price hike for unlimited plans goes into effect, Verizon will charge customers adding a new line of service a one-time $20 fee for doing so. The fee applies to customers that sign up for Verizon's device payment plans, though it's not clear if the carrier will charge you if you pay for a device in full upfront or bring your own.

Nov 16 16:10

Planes grounded at Paris Orly airport thanks to Windows 3.1 error

But the French Ministry of Transport won't modernise system until 2017.

Nov 16 11:56

“We Will Hunt You Down”: Anonymous Declares War on ISIS

Kinda hard to keep up with all these CIA-infiltrated groups these days...

(read more)

Nov 16 10:18

Georgia passenger with gun in carry-on goes unnoticed by TSA

(KUTV) A Georgia man told authorities he accidentally boarded a plane with a loaded gun - and didn't get stopped by TSA.

"If they'll take toothpaste, they'll make people get out of wheel chairs. They'll make me take off my belt buckle. My shoes. How did my gun get through?" asked Blake Alford, a retired truck driver from Clayton county who said he made an "honest mistake" by forgetting he had a loaded gun in his carry-on.

Nov 16 08:43

The Pentagon’s Plan to Outsource Lethal Cyber-Weapons

The Pentagon has quietly put out a call for vendors to bid on a contract to develop, execute and manage its new cyber weaponry and defense program. The scope of this nearly half-billion-dollar “help wanted” work order includes counterhacking, as well as developing and deploying lethal cyberattacks — sanctioned hacking expected to cause real-life destruction and loss of human life.

Nov 16 07:58

UK law mandates software backdoors, jail for disclosing vulnerability

The bill, widely referred to as the Snoopers Charter, could also mean that citizens subjected to these secret orders, who decide to defy them, would be tried by secret courts and appeal to secret tribunals with zero public accountability or even disclosure of its decisions. This fundamentally makes resistance impossible — try to make a stink about what you see as improper use of government power in the UK, and the UK government may soon be able to respond with a judicial system not all that different from a black bag over the head.

The most famous battle over a National Security Letter in the US came when the creator of Lavabit decided that the only way to alert his customers to government snooping without going to jail was to shut down the service without notice or explanation. These sorts of laws, which not only grant powers but build into the system secrecy about those powers, stultify the discourse and make democracy fundamentally impossible.

Nov 16 07:48

Customers are complaining that some tablets for sale on Amazon are loaded with malware

Buyer beware.

Some tablets being sold on Amazon are apparently coming with pre-installed malware on them, and can delete users’ apps and force them to look at unwanted adverts.

That’s according to an investigation from Chinese mobile company Cheetah Mobile.

Cheetah’s researchers have been looking into a particular Trojan called “Cloudsota,” and say that it is frequently coming pre-installed on more than 30 different tablet brands.

These aren’t iPads or Google Nexus tablets, of course — they’re low-end devices from no-name manufacturers, typically built in China. The most affected, Cheetah says, are “no brand” devices that use Allwinner chips.

Nov 16 07:40

France Has A Powerful and Controversial New Surveillance Law

As it happens, the attacks have occurred only a few months after legislators in that country passed a sweeping new surveillance law that gives the government broad powers to closely monitor the mobile phone and Internet communications of French citizens.

Passed by the French Parliament in May in response to the attacks on the Paris-based magazine Charlie Hebdo, the law allows government to monitor phone calls and emails of people suspected of connections to terrorism without the authorization of a judge.

But it goes further than that. The law requires Internet service providers to install “black boxes” that are designed to vacuum up and analyze metadata on the Web-browsing and general Internet use habits of millions of people using the Web, and to make the data available to intelligence agencies.

Finally, the law allows government agents to break into the homes of suspected terrorists for the purpose of planting microphone bugs...

Nov 16 05:48

Is Facebook Doing Israel’s PR?

The FB has reportedly stopped Milli Gazette’s admin from posting on its FB page a story from the daily Arab News headlined, “World Must Act to Halt Israeli Aggression” (also published on this portal). When he tried to send the link to a friend to check if he was also facing this problem to his surprise FB blocked the message as well.

Even on Arab News’ FB url shorteners are being used to post stories which shows that perhaps it is not just one story from the daily that has been blocked but FB has blacklisted the Arab News itself.

It is difficult to make further comment on this bizarre scenario but what the story is definitely queer and bizarre and Arab News should ask the FB Authorities to clarify this outlandish incident.

Nov 16 05:38

As Predicted: Encryption Haters Are Already Blaming Snowden (?!?) For The Paris Attacks

The idea that it was suddenly because of Snowden's revelations that the attackers decided to communicate via encryption defies all common sense, and anyone making that suggestion seems to be publicly displaying a near total ignorance on history -- most likely for political gain. Meanwhile, the speculation over how the attackers communicated has led some to claim (without any evidence to support it) that they may have been communicating via the PlayStation 4. I'm pretty damn sure that the PS4 does not include end-to-end encryption, so even if that does turn out to be true, it would seem to undermine the earlier claims of encryption being the problem.

Nov 15 15:52

Global Banks Carve Up the World Ahead of COP21 Paris

By Rusticus

As individuals and Nations alike wait in anticipation for COP21 less than a month from now, described as the United Nations’ “legally binding and universal” update to the ever-deleterious Agenda 21, banksters at the supranational level have shown little hesitation in offering their seemingly sage opinions on how their usurious reserves will be put to use in enacting this “Global Sustainable New Deal.”

From veterans of monetary Technocracy like the IMF and World Bank to the “New Kids on the Trading Bloc” represented by the BRICS and AIIB, monetary institutions around the world are poised to receive their slice of the sustainable pie – at the expense of what little freedom and financial security the individual still retains...

Nov 15 13:21

Hours Before Paris Terror Attack, Facebook Stopped Anonymous From Exposing ISIS Recruiters

The Paris area was shocked by a major terrorist attack Friday night that is being claimed by the Neo-Caliphate terrorist group ISIS. But just hours before this attack was carried out, Facebook removed a key Anonymous group responsible for identifying and reporting thousands of social media accounts used by ISIS recruiters.

Regardless of your views on ISIS, their origins and who is pulling the strings and funding them, one thing is clear: they have been spreading their ideology and recruiting using Facebook and Twitter more than any “on-the-ground”, traditional methods.

Nov 15 09:35

Belgium’s home affairs minister says ISIL communicates using Playstation 4

Jambon also reportedly warned of the growing use by terror networks of the PlayStation 4 gaming console, which allows terrorists to communicate with each other and is difficult for the authorities to monitor. “PlayStation 4 is even more difficult to keep track of than WhatsApp,” he said.

The gaming console also was implicated in ISIL’s plans back in June, when an Austrian teen was arrested for downloading bomb plans to his PS4.

Webmaster's Commentary: 

So, looks like the NSA struck out ... again. Clearly, unable to find terrorists before they strike, or even the writers of ransomware, the NSA has become a huge and costly boondoggle which should be shut down.

Nov 15 08:53

The creepy hidden map inside your iPhone that records everywhere you go including times and dates - and how to disable it

It is perhaps no secret that mapping services in your phone have long been able to identify where you're going and record how often you go there.

But it will perhaps come as a shock to Apple users to discover that their phones are actually plotting that information on an actual map that they can access.

Even more shocking, when you actually open that map, is how much information your device is secretly collecting on you - including the date and time of your visits to particular locations, and how long you stayed there for each time.

Nov 15 08:47

Conficker is back – and it's infecting police body cams

A US IT security company says it found copies of the Conficker malware infecting police body cameras.

Florida-based iPower reports that body cameras it received from supplier Martel Electronics were loaded with 2009's baddest botware.

Researchers Jarrett Pavao and Charles Auchinleck found that when plugged into a PC, the Martel cameras attempted to execute the Worm:Win32/Conficker.B!inf variant.

While any PC running an even remotely up-to-date antivirus package would be able to detect the Conficker attempt, unguarded machines could still be infected. What's worse, iPower says the malware was present in the cameras before it received the units.

Nov 15 08:33

Exploiting Emotions About Paris to Blame Snowden, Distract from Actual Culprits Who Empowered ISIS

One key premise here seems to be that prior to the Snowden reporting, The Terrorists helpfully and stupidly used telephones and unencrypted emails to plot, so western governments were able to track their plotting and disrupt at least large-scale attacks. That would come as a massive surprise to the victims of the attacks of 2002 in Bali, 2004 in Madrid, 2005 in London, 2008 in Mumbai, and April, 2013 at the Boston Marathon. How did the multiple perpetrators of those well-coordinated attacks — all of which were carried out prior to Snowden’s June, 2013 revelations — hide their communications from detection?

Nov 15 07:19

Hours Prior to Paris Terror Attacks Facebook Shuts Down Anonymous Group Exposing ISIS Recruiters

The idea that Facebook has removed a group calling itself “Report ISIS Accounts” is disconcerting and raises serious ethical questions. The Anonymous run group was removed from Facebook only hours prior to the Paris attacks, and the administrators from the group were banned.

*Update – Facebook has now restored the #OpISIS “Report ISIS Accounts” group without comment.

Nov 14 09:46

Beware of ads that use inaudible sound to link your phone, TV, tablet, and PC

Privacy advocates are warning federal authorities of a new threat that uses inaudible, high-frequency sounds to surreptitiously track a person's online behavior across a range of devices, including phones, TVs, tablets, and computers.

The ultrasonic pitches are embedded into TV commercials or are played when a user encounters an ad displayed in a computer browser. While the sound can't be heard by the human ear, nearby tablets and smartphones can detect it. When they do, browser cookies can now pair a single user to multiple devices and keep track of what TV commercials the person sees, how long the person watches the ads, and whether the person acts on the ads by doing a Web search or buying a product.