COMPUTERS/INTERNET/SECURITY | WHAT REALLY HAPPENED

COMPUTERS/INTERNET/SECURITY

May 11 14:23

Net address availability is at critical low

THERE ARE ONLY 300 MILLION Internet protocol version 4 (IPv4) addresses left and on 9 September, 2011 they will all be used up, according to a report by the BBC.

May 11 12:51

Another FCC Power Grab Attempt Over the Internet

The point here is to establish by hook or by crook that the FCC can regulate the Internet. Once it can, it will, Chicago gangland politics style, get to pick the winners and the losers in business and by having that power, politicians will be able to extort money from those companies at risk for campaign donations, future jobs, and present jobs for friends and family. The claim is always made that such regulations are needed for the general public, but the actual advantage always winds up in the hands of the politicians and the few large companies that are most savvy at buying their influence.

May 11 09:36

VENGENCE OF THE ZIONIST TROLLS

ALL of the above is obviously the work of Vera Perks, the troll that was exposed by us in the first link I gave. She is a VERY SICK individual….. a warning to ALL not to post ANY personal information ANYWHERE on the Web.

These SICKOS don’t seem to know when to stop… but we know who they are. DON’T FEED THEM!

May 11 08:05

White House devs overlooked gaping Drupal vuln

A researcher has uncovered a potentially serious vulnerability in the open-source content management system used by the White House website and thousands of other sites.

Webmaster's Commentary: 

Ewwwww, the White House uses the same system WRH does????? Yukk :)

Seriously, the module with the vulnerability is not used here at WRH, but maybe if the White House website got hacked, finding and dealing with the hackers might be given a slightly higher priority!

May 11 07:23

20 anti-'expensive paperweight' iPad reasons

“Beware: Apple also built the world’s most infamous paperweight. One word: Newton“.

May 10 09:04

BlackBerry-loving President Barack Obama declared war on technology, singling out Apple’s super-popular iPods and iPads for criticism at a commencement ceremony in Virginia.

Webmaster's Commentary: 

"You don't need computers.

"You don't need blogs.

"You don't need alternative media.

"You don't need What Really Happened.

"Just watch ABCNNBBCBS and do as you are told and all will be well.

"Oh yes, you get to go to heaven when you die in our wars!"

-- Official White Horse Souse

May 08 07:59

U.S. should prepare for a cyber attack that will ruin the country in just 15 MINUTES, expert warns

The U.S. should prepare for a cyber attack that could cause destruction on the scale of 9/11 in less than 15 minutes, a leading anti-terrorism expert has warned.

Richard Clarke, a former adviser to both Bill Clinton and George W. Bush, suggests that the lack of security in place against such an attack could lead to an 'electronic Pearl Harbor'.

Webmaster's Commentary: 

With both 9-11 and Pearl Harbor appearing to be war-starting hoaxes, I wish to point out that the only party benefiting from a "terrorist" attack that shuts down the internet are those government and corporate interests terrified of blogs like WRH.

n/a
May 07 14:06

Rip-off Britain: iPad to cost 25% more in the UK than it does in US stores

British consumers will have to pay far more than their U.S. counterparts for Apple's latest must-have gadget, the iPad.

Apple has announced that the starting price in the UK will be £429 for the 16GB model with a wi-fi link to the internet - around 25 per cent more than in America.

The equivalent price for the same device there is around £340.

May 07 13:53

Rudd retreats on web filter legislation

KEVIN Rudd has put another election promise on the backburner with his controversial internet filtering legislation set to be shelved until after the next election.

May 07 13:43

Copy Machines, a Security Risk?

This year marks the 50th anniversary of the good, old-fashioned copy machine. But, as Armen Keteyian reports, advanced technology has opened a dangerous hole in data security.

Webmaster's Commentary: 

Something to remember before you make those "funny" copies during the office Christmas party!

May 07 09:23

Why Our Civilization's Video Art and Culture is Threatened by the MPEG-LA

You see, there is something very important, that the vast majority of both consumers and video professionals don't know: ALL modern video cameras and camcorders that shoot in h.264 or mpeg2, come with a license agreement that says that you can only use that camera to shoot video for "personal use and non-commercial" purposes (go on, read your manuals).

Webmaster's Commentary: 

"The first thing we do, let's kill all the lawyers" -- William Shakespeare

This attempt to use hardware to force a license on all content produced is not new. Thomas Edison held that because he had invented the motion picture camera, that he owned a piece of every movie made with one. At that time, movies were produced in New York and New Jersey, and Edison formed a Motion picture Patents corporation that hounded anyone using a movie camera for royalties. Indeed, when Edison made a copy of George Melies' "Le Voyage Dans La Lune" and exhibited it in the United States, Edison did not feel he was committing a crime since the movie was "his" to begin with! (As a side note, Edison's copies were black and white, while the original Melies version was actually hand tinted in an early attempt at color)

The early movie producers did not feel that Edison owned part of every movie produced with his cameras any more than Ford owed the roads his car traveled over, so en masse, the east coast film producers sought a new place to make movies, someplace with good weather, varied scenery, and close enough to a border for a quick getaway should Edison's lawyers ever find them. A chance rainstorm convinced C. D. DeMille not to get off of the train on Phoenix Arizona, and he instead scouted a new home for film making in an area of cheap orchard land northwest of Los Angeles that nobody had ever heard of, Hollywood.

May 07 06:42

Facebook's new features secretly add apps to your profile

When a piece of software is automatically installed on your computer without your knowledge, it's called malware. But what do you call it when Facebook apps are added to your profile without your knowledge? We discovered Wednesday that this is actually happening, and stopping it isn't as easy as checking a box in your privacy settings.

May 06 18:45

Music industry spokesman loves child porn

A music-industry speaker at an American Chamber of Commerce event in Stockholm waxed enthusiastic about child porn, because it serves as the perfect excuse for network censorship, and once you've got a child-porn filter, you can censor anything:

"Child pornography is great," the speaker at the podium declared enthusiastically. "It is great because politicians understand child pornography. By playing that card, we can get them to act, and start blocking sites. And once they have done that, we can get them to start blocking file sharing sites".

May 06 18:29

Scammers attempt to cash in on volcanic ash travel chaos

Scammers are hoping to hoodwink travellers who were stranded by the volcanic ash cloud last month as fresh plumes have disrupted flights once more in the UK.

The emails invite recipients to apply to a compensation fund from Frank Adam at the Civil Aviation Authority. In reality there is no Frank Adam and no fund - the emails are intended to lure victims into an advance fee fraud.

"You will either be asked for an 'administration fee' to release your payment, or be sent a fake cheque and be asked to send the fee by wire transfer once you’ve paid the cheque into your account," Scam Detectives warns.

May 06 11:07

More change you can believe in: FCC Prepares to Re-Regulate Broadband Providers

Reversing a controversial deregulation decision made by the Bush administration, the FCC will seek to force broadband internet providers to adhere to some of the rules that have long applied to the nation’s landline phone providers.

May 06 09:03

Laptop Scandal School's Own Law Firm: Aside From Those 58,000 Spy Photos, There's No Evidence Of Spying

A law firm employed by the Pennsylvania school district caught using student laptop webcams to spy on students at home has released a 72-page report (pdf) on the incident after a 10-week investigation. Most of the report's findings aren't too surprising; it exonerates most higher-level school officials like any wealthy school district's in-house investigation should, concluding that there's no evidence indicating that anybody above the IT level "knew how TheftTrack worked or understood that it could collect large quantities of webcam photographs or screenshots." The report also confirms reports that the system took some 58,000 images -- a far cry from the 42 images the school originally claimed.

May 06 08:30

New U.S. Push to Regulate Internet Access

Breaking a deadlock within his agency, Mr. Genachowski is expected Thursday to outline his plan for regulating broadband lines. He wants to adopt “net neutrality” rules that require Internet providers like Comcast Corp. and AT&T Inc. to treat all traffic equally, and not to slow or block access to websites.

May 06 07:33

Hacker Develops ATM Rootkit

Webmaster's Commentary: 

Good reason to stop using banks.

n/a
May 05 11:03

THE TROLL DISSECTED

This article is not nice reading. It is going to expose and demonstrate just how a fake activist gets debunked, how smear campaigns are unraveled, and how Internet is Big Brother who never closes his eye and leaves bread crumbs tracing everything to the source. It is a shocking story of sex, lies and madness. That it involves Palestine, unfortunately has once again influenced us to speak out. We insist upon the separation of the Palestinian cause from some disturbed persons involved who use the cause for their own ends. By their own words and deeds, they shall be exposed. Welcome to the Emperor’s New Clothes.

n/a
May 04 11:30

Cyberattacks: Washington is hyping the threat to justify regulating the Internet

Networks have been under attack -- and successfully handled by operators -- as long as they’ve been around. Be wary of calls for more government supervision of the Internet.

May 04 09:37

Draft of Secretive International Copyright Treaty Leaked -- Confirms Fears About Internet Freedom

The Dutch leak succeeded in blowing the issue wide open by identifying precisely which countries posed barriers to transparency. The document identified the U.S., Singapore, South Korea, and a trio of European countries as the remaining holdouts. Once publicly identified, the European countries quickly reversed their positions. The E.U. now unanimously supports the releasing of the text alongside Canada, Australia, New Zealand, Japan, and Switzerland. With the outing of the transparency issue, it will fall to the U.S., which is widely viewed as the critical stumbling block, to justify its insistence on keeping the treaty secret.

May 04 07:40

Hacked US Treasury websites serve visitors malware

Websites operated by the US Treasury Department are redirecting visitors to websites that attempt to install malware on their PCs, a security researcher warned on Monday.

The infection buries an invisible iframe in bep.treas.gov, moneyfactory.gov, and bep.gov that invokes malicious scripts from grepad.com, Roger Thompson, chief research officer of AVG Technologies, told The Register. The code was discovered late Sunday night and was active at time of writing, about 12 hours later.

May 04 07:38

Top Ten Reasons You Should Quit Facebook

After some reflection, I've decided to delete my account on Facebook. I'd like to encourage you to do the same. This is part altruism and part selfish. The altruism part is that I think Facebook, as a company, is unethical. The selfish part is that I'd like my own social network to migrate away from Facebook so that I'm not missing anything. In any event, here's my "Top Ten" reasons for why you should join me and many others and delete your account.

May 02 10:50

THE UNITED STATES OF SHODDY

We are already a third-world country in terms of what we make and what our stores sell to us. Our computers fail, our software crashes, flashlights don't work when you need them, Apple Blue tooth headsets fail after a week, Avatar Blu-Ray disks won't play at all right out of the box, bridges collapse, levees fail, coal mines collapse, and oil rigs explode. GM proclaims that it paid back its TARP loans, but they had to borrow more TARP money to do it. Nobody wants to buy a GM car, as they still lag way behind their Asian and European counterparts.

May 01 13:12

The next 9/11 – made in Israel?

Maidhc Ó Cathail views the evidence indicating that dual loyalty officials in the US administration are funnelling American nuclear secrets not only to Israel, but also to terrorist organizations in order to facilitate a “nuclear 9/11” and a massive US attack against Iran or Pakistan.

”If, as Israeli Prime Minister Binyamin Netanyahu admitted, 9/11 was ‘very good’ for Israel, a nuclear 9/11 might be even better. As the spellbinding effects of that traumatic event nine years ago have begun to wear off, and with Americans increasingly questioning the costs of a one-sided alliance [with Israel], it may even be considered necessary.”

May 01 08:50

Court OKs Unmasking Identities of Copyright Scofflaws

A federal appeals court is blessing the legal process by which the recording industry and other content owners unmask the identities of alleged peer-to-peer copyright infringers.

May 01 07:36

Clegg: Digital Economy Bill was a "stitch-up"

Clegg claims the way the bill was rushed through without proper debate is a "classic example of what's wrong with Westminster".

"It was rammed through after the election was called in the last dying days of the Parliament in something called a 'wash-up'," said Clegg. "It wasn't a wash-up, it was a stitch-up. A stitch-up between Labour and Conservative MPs who decided that you didn't deserve to have your representatives in Parliament properly looking at a bill which might have a very, very serious impact on the way that you use the internet."

"That's why we said it should have been scrutinised properly, it shouldn't have been rushed through in that way in the first place, at all."

Apr 29 20:00

The Gizmodo Raid: A Preview of Hollywood's Dystopian Plan for Copyright Enforcement

The Gizmodo seizure reminds us that not only are our tax dollars at stake, but also our civil liberties. Whether you’re a blogger or a simple citizen, take note: if copyright policing becomes a regular item on the law enforcement agenda, you can expect more bogus search warrants, and more doors to be broken down.

Apr 28 11:12

Google: Fake antivirus makes up 15 percent of all malware

Fake antivirus--false pop-up warnings designed to scare money out of computer users--represents 15 percent of all malware that Google detects on Web sites, according to 13-month analysis the company conducted between January 2009 and February 2010.

Apr 28 11:12

iPad owning Windows users targeted by hackers

Hackers are hard at work trying to dupe iPad owners to install a malware-loaded iTunes update on their Windows PCs.

Apr 27 17:16

CIA Director Says Cyber Attack Could Be Next Pearl Harbor

Central Intelligence Agency director Leon Panetta told 300Sacramento Metro Chamber Cap-to-Cap delegates that the next “Pearl Harbor” is likely to be an attack on the United States’ power, financial, military and other Internet systems.

“The next Pearl Harbor is likely to be a cyber attacking going after our grid…and that can literally cripple this country,” Panetta said. “This is a whole new area of threat.”

Webmaster's Commentary: 

Memo to CIA Director Panetta: I don't know if I would run so quickly with that particular analogy, sir. As reported at:

http://whatreallyhappened.com/WRHARTICLES/pearl.html

""...everything that the Japanese were planning to do was known to the United States..." ARMY BOARD, 1944"

"President Roosevelt (FDR) provoked the attack, knew about it in advance and covered up his failure to warn the Hawaiian commanders. FDR needed the attack to sucker Hitler to declare war, since the public and Congress were overwhelmingly against entering the war in Europe. It was his backdoor to war."

Creating this linkage, unfortunately, could lead a thinking person to wonder if just such a "false flag cyber-attack" could be in the works, courtesy of our own government, either to be blamed on the "adversary du jour" (like, perhaps, Iran), or used as an excuse to declare martial law in the US.

Apr 26 11:17

1.5 million Facebook accounts offered for sale - FAQ

“On Feb. 10, 2010, (cybercriminal) stated that he or she is selling 1.5 million compromised Facebook accounts, in bulk quantities, belonging to users in various countries. The price per 1,000 accounts varies based upon the number of friends and contacts that each account possesses. For a purchase of compromised accounts containing 10 contacts or fewer, a buyer must pay $25 per 1,000 accounts. A purchase of compromised accounts containing 10 or more contacts requires a buyer to pay $45 per 1,000 accounts. Accounts containing zero contacts are also available for bulk purchasing from (cybercriminal), at the cost of $15 per 1,000 accounts. The prices of these accounts are presumably in USD or the equivalent amount in some form of electronic currency.”

Apr 26 08:24

Legal spying via the cell phone system

"It's not illegal, nor is it a breach of terms of service," Bailey said.

Apr 25 15:41

Internet Freedoms Are Under Attack: Are We Paying Attention?

Its 2010.

Do you know where your internet freedoms are?

Apr 25 15:36

Russian Hacker Selling 1.5 Million Facebook Accounts

A hacker who calls himself Kirllos has obtained and is now offering to sell 1.5 million Facebook IDs at astonishingly low prices — $25 per 1000 IDs for users with fewer than 10 friends and $45 per 1000 IDs for users with more than 10 friends — according to researchers at VeriSign’s iDefense. Looking at the numbers, Kirllos has stolen the IDs of one out of every 300 Facebook users.

Information for sale includes login credentials; whether or not the e-mail addresses and passwords are legitimate is currently unknown.

Apr 25 15:31

Facebook: 5 Privacy Settings You Must Tweak Now

Keeping track of Facebook's ongoing updates, upgrades and changes--and how they affect your privacy--can be confusing and frustrating. We've sorted through the new wrinkles for you. Here's a list of five essential privacy settings you should review now and tweak accordingly to ensure your information remains safe.

Apr 24 06:14

It’s Official: Google Can Sell Power Like a Utility

Google has said it wants to go carbon neutral. With the FERC order, it can now effectively erect as many solar panels and install as many fuel cells as it likes without worrying about having purchased too much capacity; the company can now sell off the extra power it generates.

Apr 23 17:39

Boobquake bid to prove cleric wrong

A US student has attracted 30 000 supporters for a Facebook campaign urging women to show as much cleavage as possible to prove that breasts do not cause earthquakes.

Jen McCreight's Boobquake day on Monday, April 26 is in protest against an Iranian cleric who claimed that women who do not cover up were to blame for predictions that Tehran would be hit by a quake.

Apr 23 12:07

CLIMATEGATE - And we would've gotten away with it, too, if it wasn't for that damned Internet

Dale Spurlock, of Shirland, said he believes global warming is a complete hoax, and just another way for the government to find ways to pass on taxes.

“It’s just bologna,” he said.

Apr 23 10:11

Google Catches Flak for Mapping European Homes' Wireless Networks With Street View Car

There is a specter haunting Europe. Nope, not that one, but several European nations have expressed concern about Google’s slow but steady encroachment on citizens’ privacy protections. Now the search behemoth is in hot water with Germans for using its wandering Street View cars to log the location of private WLAN networks and media access control (MAC) addresses in that country.

Germany’s data protection chief said he was “horrified” by the discovery – which has been rumored for a while now – and called on Google to delete what he claims was unlawfully collected personal data from wireless networks, as well as to cease cruising German streets for Street View.

Apr 23 09:39

McAfee admits "inadequate" quality control caused PC meltdown

If your company uses enterprise security products from McAfee, you probably had a bad day yesterday. If you’re an IT professional at one of those companies, you’re probably still cleaning up the mess caused by a defective virus signature update that disabled systems running Windows XP with the most recent service pack (SP3). The worst part? According to a confidential document from McAfee, the cause was a fundamental breakdown in the most basic of quality-assurance processes.

Webmaster's Commentary: 

The security software causes more damage than the @#%$ing viruses

Apr 23 09:06

STEAMPUNK KEYBOARDS!

Webmaster's Commentary: 

The TV show "Warehouse 13" has popularized a retro design style called "Steampunk" in which modern machines are made to look like Victorian-era science apparatus. And while I am not that old, I find I have a resonance for the scientific machines of that era, which one could intuit simply by looking at them, and when needed, easily repair. I think this stuff is cool, and that alone justified putting up this link for my fellow "Steampunkers!"

n/a
Apr 21 17:03

McAfee antivirus program goes berserk, freezes PCs

Computers in companies, hospitals and schools around the world got stuck repeatedly rebooting themselves Wednesday after an antivirus program identified a normal Windows file as a virus.

McAfee Inc. confirmed that a software update it posted at 9 a.m. Eastern time caused its antivirus program for corporate customers to misidentify a harmless file. It has posted a replacement update for download.

McAfee could not say how many computers were affected, but judging by online postings, the number was at least in the thousands and possibly in the hundreds of thousands.

Webmaster's Commentary: 

False Positives are becoming a major headache. The anti-virus programs are causing more damage than the viruses!

When we start executing the virus writers, slowly, after forcing them to watch their computers get waterboarded, then we will see a reduction in the problems. Until then, and as long as more money is made treating the virus problem than curing it, we are stuck with this modern incarnation of the mafia protection racket.

Apr 21 13:47

Broken McAfee DAT update cripples Windows workstations

McAfee pushed out a virus definition update, 5958, at 14:00 PDT that causes false positive identification of the critical Windows system file svchost.exe. Machines running Windows XP Service Pack 3 using the 5958 definitions will delete the file, causing many key Windows services to fail to start. The Windows file is being mistakenly detected as W32/wecorl.a. Failure to start svchost.exe causes Windows to automatically reboot, hindering repair efforts.

n/a
Apr 20 21:38

Microsoft debuts 'fix it' program

Microsoft has launched "Fix It" software that keeps an eye on a PC and automatically repairs common faults.

Webmaster's Commentary: 

I thin this is what Micro$oft used to fix the bug in the licensing on my machine a week back.

Apr 20 19:26

Microsoft debuts 'fix it' program

Microsoft has launched "Fix It" software that keeps an eye on a PC and automatically repairs common faults.

The software basically adds the automatic diagnostics system in Windows 7 to older versions of Microsoft's operating system.

The software, currently available as a trial or beta version, is intended for users of Windows XP and Vista.

The package also tries to anticipate how security updates will affect a PC before they are installed.

Apr 20 19:22

Draft of Secretive International Copyright Treaty Leaked -- Confirms Fears About Internet Freedom

On the table: losing internet access due to infringement allegations, and widespread data sharing across national borders.

Apr 20 19:20

Facebook Further Reduces Your Control Over Personal Information

Today, Facebook removed its users' ability to control who can see their own interests and personal information. Certain parts of users' profiles, "including your current city, hometown, education and work, and likes and interests" will now be transformed into "connections," meaning that they will be shared publicly. If you don't want these parts of your profile to be made public, your only option is to delete them.

Apr 20 14:43

Government requests directed to Google and YouTube

Apr 20 13:01

Washington Post Writer: Internet Journalism Is “Sort Of Like Terrorism”

A Washington Post columnist who appeared on CBS’ Face the Nation on Sunday described tea partiers as potentially violent and decried internet journalism as “sort of like terrorism”

Webmaster's Commentary: 

Apr 20 08:28

Lower Merion high school Webcam flap: Report says 56,000 images snapped

A school district accused of spying on students with Webcams now appears to have snapped 56,000 images, according to reports.

Webmaster's Commentary: 

If there is just one photo of an undressed student in that stack of 56,000 images, then the entire school administration ought to be charged with creating and distributing child pornography.

Apr 20 06:01

iPad Thieves Rip Off Part Of Man's Finger

A brazen theft in the Cherry Creek Mall left the victim with a permanent injury to his hand. He had just bought an iPad as a favor for a friend.

Webmaster's Commentary: 

It just isn't that hot a gizmo!

Apr 19 12:20

Embedded PDF executable hack goes live in Zeus malware attacks

The identity thieves behind the Zeus malware attacks are now using the “/launch” command feature in Adobe Reader to launch malicious attacks without exploiting a vulnerability in the software.

Yes, that’s the same “feature” that’s been in the news in recent weeks after a security researcher found a way to execute an embedded executable without exploiting any PDF security vulnerabilities.

Apr 19 07:28

Malware uses copyright threats to blackmail victims

So far 5,500 people have admitted to being caught out in the scam, according to local paper Yomiuri Shimbun, and an unknown number have paid out the $10 (£6.50) 'copyright infringement fee' for the removal of the personal data. It is believed that paying the ransom prompts further demands for money.

Interestingly, the Trojan also downloads three MP3 tracks onto the host computer, which are listed on a separate web site as being worth over $500,000 (£327,000).

Webmaster's Commentary: 

So, if the TSA steals confiscates your iPod because it has an illegal copy of a song, and that song was planted by a criminal scam that the US Government failed to stop, why should you lose your iPod?

Me personally; I have stopped wasting time and money trying to deal with the licensing of content and have simply thrown away all my portable players as being more trouble than the content could possibly be worth. It is quite liberating to live in the real world again and I highly recommend it!

Apr 19 06:49

School IT allegedly took "thousands" of pics in webcam case

Remember the lawsuit filed by the family of 15-year-old Blake Robbins against the school district that spied on him at home via webcam? The latest news comes from a motion filed by the Robbins family claiming that the school took more than 400 photos of Blake in his room—some while sleeping and others while he was "partially undressed."

Now, thanks to the court order asking the district to preserve evidence on all school-issued computers, the family has discovered more than 400 photos of Blake alone, not to mention the "thousands" more taken of other students in their homes. In addition to these photos of students doing private things in their rooms, the school district also allegedly took screenshots of IM conversations they were having with friends.

Apr 19 05:57

Malware uses copyright threats to blackmail victims

Security experts at Trend Micro have identified a new Trojan spreading from Japan which threatens to post the internet history of infected users.

Apr 18 08:27

The image Microsoft doesn't want you to see: Too tired to stay awake, the Chinese workers earning just 34p an hour

Showing Chinese sweatshop workers slumped over their desks with exhaustion, it is an image that Microsoft won't want the world to see.

Employed for gruelling 15-hour shifts, in appalling conditions and 86f heat, many fall asleep on their stations during their meagre ten-minute breaks.

For as little as 34p an hour, the men and women work six or seven days a week, making computer mice and web cams for the American multinational computer company.

Webmaster's Commentary: 

When I had to call MS support the other day to deal with a bug in their licensing system, not one of the people I spoke to sounded like English was their first ;language. It took 90 minutes of wading through people before the 5 minutes it took to fix the actual problem, which is apparently a known issue with the software.

Apr 17 15:28

FLASHBACK: Total Information Awareness: Reloaded

reposted from the National Journal.

....Two of the most important components of the TIA program were moved to the Advanced Research and Development Activity, housed at NSA headquarters in Fort Meade, Md., documents and sources confirm. One piece was the Information Awareness Prototype System, the core architecture that tied together numerous information extraction, analysis, and dissemination tools developed under TIA...

Apr 17 12:41

Google: Being Evil? Maybe it has a REALLY good explanation....

Google, I love you. How could you?

In June 2007, Privacy International.. cited Google as the worst privacy offender ...below... Facebook and AOL. ...no other company was “coming close..."

Below FACEBOOK!! ...*breaks off, sobbing*...

Apr 17 08:42

School Spy Laptops “Took Thousands Of Photos” Of Students In Homes

Startling new evidence has emerged in the ongoing case of the Lower Merion school district in Philadelphia accused of spying on students in their homes via school issued laptops.

The lawyer for the family of the student whose school issued computer was allegedly remotely accessed while in his home, says that thousands of images were taken, including photographs of other students in their homes, web sites they visited, and excerpts of their online chats.

Apr 17 08:39

Digital Economy Act: This means war

Baking surveillance, control and censorship into the very fabric of our networks, devices and laws is the absolute road to dictatorial hell

Apr 17 08:38

Big Content's dystopian wish-list for the US gov't: spyware, censorship, physical searches and SWAT teams

The MPAA and RIAA have submitted their master plan for enforcing copyright to the new Office of Intellectual Property Enforcement. As the Electronic Frontier Foundation's Richard Esguerra points out, it's a startlingly distopian work of science fiction. The entertainment industry calls for:

* spyware on your computer that detects and deletes infringing materials;
* mandatory censorware on all Internet connections to interdict transfers of infringing material;
* border searches of personal media players, laptops and thumb-drives;
* international bullying to force other countries to implement the same policies;
* and free copyright enforcement provided by Fed cops and agencies (including the Department of Homeland Security!).

Webmaster's Commentary: 

I guess finding Osama bin Laden just isn't a priority any more!

Frankly, after having one laptop destroyed by TSA and spending 90 minutes on the phone with Micro$oft to get around a bug that prevented my legally owned software from running on my legally owned computer thi8s last week, I am ready to live a life free of personal electronic devices. I don't plan to pull an Alex Jones and torture an iPad (I don't own one and don't plan to buy one), but I have already weaned myself from the practice of walking around all day with mp3 music blasting into my ears and recommend it highly as a means to reconnect with the real world. I might even go back to using a cell phone that does nothing at all except make phone calls.

And screw it, if I cannot be assured that my laptop will arrive at a business destination with me so that I can do my job, then I will quit the business I am in and go on welfare.

The government has gone out of its way to make it impossible to work in this country, and they have finally succeeded.

Apr 17 08:12

Israel's Latest Ridiculous Story About Why It Has Banned iPads: They "Violate Israeli Law"

As we noted earlier this week, Israel has banned iPads.

The country is so serious about this ban that it's confiscating iPads at airports.

Why?

The initial story was that the US iPad runs on a different WiFi standard than Israel's WiFi standard and, therefore, iPads might "damage Israel's domestic network."

That story was preposterous.

Apr 16 22:09

The CyberWar Against Online Privacy

Original post.

Not only will they have a phone number, they will have physical location data - which spells the end of anonymous posting, at least on Youtube...

Apr 16 20:05

Gamestation Tricked Online Buyers Into Selling Their SOULS (no really)

"By placing an order via this Web site on the first day of the fourth month of the year 2010 Anno Domini, you agree to grant Us a non-transferable option to claim, for now and for ever more, your immortal soul. Should We wish to exercise this option, you agree to surrender your immortal soul, and any claim you may have on it, within 5 (five) working days of receiving written notification from gamesation.co.uk or one of its duly authorised minions."

Apr 16 08:56

Automated propaganda systems continue to hijack Twitter

Apr 16 06:18

Law firm defends attacking pensioners

DISGRACED EXORTIONISTS Digiprotect, the firm that got over-eager lawyers to send threatening letters to pensioners demanding payment, has tried to defend its actions.

Apparently all the firm was doing was "just protecting its rights-holders", according to an interview with the BBC. The firm, which is based in Germany, wasn't willing to divulge quite who those 'rights-holders' were, but simply said they were "musicians and producers".

Apr 15 09:57

ACTA Treaty: Can Seize, Destroy Your PC, Electronics

ACTA was designed to enact the constant monitoring of everyone's online activities -- both legitimate and non-legitimate -- and gives border agents in the U.S. and other member states the power to search and seize your equipment without a warrant. Effectively, it gives these officials the power to destroy U.S. citizens' laptops, iPods or CDs if the agents suspect they might contain copyright-infringing content.

Webmaster's Commentary: 

They can destroy your electronics if they only suspect that it might contain copyright-infringing content.

Probably better to stop buying mp3 players, iPads, or any of that stuff from now on. The movies are all remakes and today's focus-group engineered music all sounds the same anyway, so why waste time and money on these gadgets anymore if the government goons are going to smash them anyway like they smashed my laptop, only this time DELIBERATLY!

Boycott personal electronics! You know those small people living in your house? Those are your children. Unplug the headphones and introduce yourself. You might enjoy it!

Apr 15 09:42

The Google Toilet: SuperNews!

Apr 15 09:35

Israel bans iPad imports

Israel has banned all imports of Apple's hottest new product, the iPad, citing concerns that its wireless frequencies are incompatible with national standards.

Customs officials said Thursday they already have confiscated about 10 iPads since Israel announced the new regulations this week.

Webmaster's Commentary: 

National standards my astrolabe! Israel is building a silicon curtain around Gaza to block information from leaking out during CAST LEAD (watch this number).

Apr 14 16:45

YouTube now gone Orwellian – Now requires SMS from every new Registrant

Now if you are simply a regular person, not a spammer, and not a multiple account creator that just wants a Google or YouTube account, your out of luck without giving out your cell phone number or regular phone number to their authorities (aka the youtube police). YouTube has become a phone number collector which means they can give police, FBI, and CIA peoples private phone numbers if you use Google.

Apr 14 08:24

US: Net Neutrality Needs Your Help TODAY, By Sen. John Kerry

On one side are the telephone and cable companies who believe they should be in control because they own the wires that deliver the Internet to your house. On the other side is you, the consumer, and President Obama’s FCC, with a broad set of interests – making sure consumers are protected, users and content are not discriminated against, and broadband service is universally affordable and available.

n/a
Apr 13 16:29

Law Firm Refuses To Send Fine Letters, Blames 'Adverse Publicity'

With the passing of the controversial Digital Economy Bill, illegal file sharers are being bombarded with fine letters sent by a few chosen law firms, which are penalising ISP customers with fines upwards of £500.

However, one such law firm, Tilly, Bailey and Irvine Solicitors (TBI), has announced that it will not be sending any more of these fine letter because of the 'adverse publicity' it has been receiving over the past couple of days. Several consumer rights group, which have actively opposed the Bill, welcomed the decision and praised the law firm for 'finally seeing sense.'

Apr 13 15:12

DigaPEN and DigSPY Glasses - Spy on the government infiltrators!

Webmaster's Commentary: 

From Saturday's Radio show. WRH Readers get a 10% Discount! Use promo code "Rivero"

Apr 13 12:11

Hard Drive Makers Fall on Wedbush Downgrade

Shares of both Seagate Technology (STX) and Western Digital (WDC) are trading lower today, in the wake of somewhat bearish sentiment from Wedbush Securities. Analyst Kaushik Roy downgraded both of the hard-disk drive makers to Neutral from Outperform.

Webmaster's Commentary: 

YES!!! Yes, yes, yes, yes YES!!!!!

Apr 13 09:14

Stupid Simple Arduino LF RFID Tag Spoofer

RFID tags are all over the place. They're used in building access control systems, passports, inventory tracking . . . This instructable will show how you can use an Arduino and a few simple components (wire coil, transistor, capacitor, resistor) to make a device that can spoof an 125 KHz (low frequency) RFID tag. This is version 1, so there are many enhancements that can be made, but this version is stupid simple, yet it works. I did this in a few hours without much previous knowledge of RFID and without any fancy equipment

Apr 13 08:40

UK govt: IP address is "Intellectual Property address"

The UK has just passed a far-reaching "Digital Economy" bill that gets the judiciary into the website-blocking business and orders ISPs to pass on copyright notices from media companies. It also makes it easy to expand into throttling and Internet disconnections a year from now.

The moves are explicitly done to help the UK's music and movie industries. This "help the rightsholders!" thinking has taken such hold in the government that an "IP address" can now be defined as an "Intellectual Property (IP) address" rather than an "Internet Protocol address" in official government correspondence—and no one bats an eye.

Apr 12 18:19

Man slams Google Street View over garage break-ins

A furious West Yorkshire homeowner who has slammed Google Street View for picturing his open garage which has now been the subject of a break-in has said the service is like on-line shopping for thieves.

Apr 12 18:17

Shame Peter Mandelson didn't download some common sense

The Digital Economy Bill is fatally flawed and won't stop illegal file-sharing

Apr 12 11:01

Social Networking Decline

While social networks are still massive and generally doing well, there are more more reports of people getting fed up with such networks because they get too many friend requests and are not happy with the new advertising methods the sites use to generate revenue.

Apr 12 08:43

BEWARE OF THE ZIONIST TROJANS

If your computer is ‘attacked’ by these evil forces, notify HaAretz at contact@haaretz.co.il
Perhaps they might find ways to prevent this from happening….

Apr 11 10:36

Activists? Action Against Censorship Not Just a Gag

At 5:30PM on April 1st, Activists protesting against the Rudd Government's proposed Mandatory Internet Filter will gather in Hyde Park Sydney to speak out against Government Censorship.

One of the organisers of the protest and member of Pirate Party Australia, Simon Frew, said. "I think it is outrageous that the government has the audacity to force this filter on a supposedly free society. This is the sort of censorship you would expect of China or Iran, and it is being roundly condemned by the US State Department and Google for good reason."

Apr 11 10:35

The Pirate Party: how to bypass the great Australian firewall

Apr 11 09:34

U.K. Passes Internet Censorship and Disconnection Law

Late Thursday night the U.K. Parliament passed the controversial Digital Economy Bill, which grants the U.K. government sweeping new powers to control access to the Internet.

Apr 09 10:20

What's wrong with the iPad? Let's start with the lack of a clock

It won't wake you up and won't charge while it's syncing. And other annoyances.

Apr 09 09:46

Digital Economy Bill: Nine things you can't do any more

The Digital Economy Bill has a number of clauses that, if taken to their logical extremes, could see some pretty horrible outcomes. It's completed its whistle-stop tour of the legislative process, sprinting from Commons to Lords with barely a pause for breath before getting the nod from Her Maj. MPs decided to get the bill into law first and worry about the details later.

Until Ofcom hammers out the mechanics of the processes outlined in the bill, it's impossible to say how we'll be affected. We take a look at some of the worst-case scenarios.

Apr 09 07:54

Class Claims McAfee Pulls a Fast One

McAfee, the Internet security software giant, gives customers' credit card information to an advertiser that uses deceptive pop-ups on McAfee's Web site to trick people into subscribing to its service, according to a federal class action. After customers buy software from McAfee's Web site, a pop-up appears that looks like the rest of the McAfee page, the class says. The pop-up thanks customers for their purchase and asks them to click the "Try it Now" button.

When they click on the button, believing they are activating the new software, they actually are being tricked into subscribing to Arpu, which claims to make it possible for customers to buy things online using credit card information already on file, according to the complaint.

Apr 08 15:59

Google Gives the US Government Access To Gmail

"Google condemns the Chinese Government for censoring its results, and Australia for planning to do the same. Meanwhile, its lawyers and security experts have told employees to 'be intentionally vague about whether or not we've given access to end-user accounts,' according to engineer James Tarquin, hinting that Google may be sharing its data with the US government. Perhaps Australia's most hated communications minister, Steven Conroy, could be right in his criticism of Google's privacy record after all."

SHARE THIS ARTICLE WITH YOUR SOCIAL MEDIA