COMPUTERS/INTERNET/SECURITY | WHAT REALLY HAPPENED

COMPUTERS/INTERNET/SECURITY

Oct 25 10:41

As-Safir: Israel Invaded Alfa Mobile Phone Operator, Nahhas Confirms

The Lebanese daily as-Safir reported on Monday that Israel invaded Alfa mobile phone operator over a period of 32 days during the July 2006 war, few hours before Telecommunications Minister Charbel Nahhas had said that Israel infiltrated the telecommunications sector and managed to alter and manipulate its data.

Webmaster's Commentary: 

So, all evidence collected via telephone and data surveillance anywhere in the world just became inadmissible in a court of law, because its authenticity cannot be guaranteed.

Oct 24 05:37

Mark Glenn's Attack on Jeff Rense

Jeff Rense's website and radio program represent an oasis of truth for countless people around the world who can still think for themselves.

That's why it was both puzzling and painful to witness a vituperative attack on Jeff by his erstwhile friend and ally Mark Glenn.

Both these men are courageous and outspoken opponents of Zionist World Government. What triggered Glenn's attack?

Oct 23 17:46

Wikileaks under doubt as “classified” documents substantiate bogus U.S. claims

The fact that the supposedly damaging leaks are in fact bolstering American accusations against Iran while minimizing American complicity in Iraqi deaths leads some to believe that the leaks are in fact engineered by the Pentagon to either discredit Wikileaks, or are in conjunction with Wikileaks which is a U.S. government outfit.

Oct 23 17:10

Panda: Mac is less secure than Windows, here's an antivirus

The number of Mac OS vulnerabilities has quintupled in less than a year. In 2009, 34 vulnerabilities were detected for Mac OS. So far in 2010, this number has risen to 175 vulnerabilities. Furthermore, the platform can also be affected by 170,000 macro viruses for Windows and there are 5,000 classified strains of malware that specifically target Apple systems, according to Panda Security.

Oct 22 11:45

November 30th Could Be the Day the Government Seizes Control of the Internet

November 30th, the Federal Communications Commission (FCC) could potentially engage in one of the largest federal power grabs we have ever seen.

And what’s worse, the FCC would be doing it without Congress weighing in. At the FCC’s November meeting – note the coincidental date of choice, AFTER the impending election – three unelected bureaucrats (of five) could simply vote themselves rulers of 1/6th of our entire economy – the information and technology sector.

Meaning the Internet that you currently enjoy – that has been a marvel of economic and information innovation and success – will be subject to vast new governmental regulations. You didn’t elect these people – but they are on the verge of electing themselves Internet overlords.

Oct 22 10:26

Facebook conspiracy: Data mining for the CIA

Facebook, however, does what Chairman Mao, Joseph Stalin, or Adolf Hitler could not have dreamt of - it has a half billion people willingly doing a form of spy work on all their friends, family, neighbors, etc.—while enthusiastically revealing information on themselves.

Webmaster's Commentary: 

"It's amazing, sir! After sifting through all this data we have discovered that the vast majority of American males are built like a young Arnold Schwarzenegger (only with longer genitals) while almost every American women looks like a Playboy centerfold model! But despite this, they are all very lonely!"

Oct 22 10:02

First look: HP Slate 500 with Windows 7 Professional

Powered by an Intel Atom Z540 processor, the HP Slate 500 powers up like any other notebook or desktop running Windows 7 by hitting the button pictured above. There aren’t many buttons or ports around surrounding the edges, leaving most of the controls to the touch screen. But here is what you will find on the sides: an on/off switch, a power connector, an SD card slot, a USB port, a Home screen button, an onscreen keyboard tab, a headphones jack and volume controls. (Additional connectivity options can be found on the back of the included docking station, which includes another two USB ports, HDMI and a headphones jack.)

Oct 22 09:52

THE PAYPAL SAGA!

Webmaster's Commentary: 

As you can see by clicking the donate button to the right, PayPal has once again shut down our account. We do not yet know the reason, but clearly my caution at re-establishing business with them was justified. This article is a record of our first run-in with PayPal and why we chose not to use them for so many years. If this matter is not resolved within a day or so, we will again cancel PayPal and we will never use them again.

You can get a second chance with me, but never a third.

n/a

n/a
Oct 22 07:02

Pentagon Will Help Homeland Security Department Fight Domestic Cyberattacks

Thom Shanker
The New York Times

WASHINGTON — The Obama administration has adopted new procedures for using the Defense Department’s vast array of cyberwarfare capabilities in case of an attack on vital computer networks inside the United States, delicately navigating historic rules that restrict military action on American soil.

Oct 21 19:20

Snuggly the Wiretap Friendly Bear

http://www.MarkFiore.com Snuggly the Security Bear is back! This time he's updating you on Internet privacy and other civil liberty fun. See what happens when you're perfectly safe and secure!

Oct 21 16:51

China stops rare earth minerals to US

Oct 21 10:16

Bill Clinton 'lost vital White House nuclear codes'

For several months during Bill Clinton's administration, a former top military officer says the White House lost the card with a set of numbers for opening the briefcase containing the codes for a nuclear attack.

Oct 21 08:59

Google Alert: Google's Devilish Tax Deals Detailed in Bloomberg News Scoop

The motto for those good Google guys out in Mountain View, CA. is "Don't be evil," but Bloomberg News today details how that pledge stops somewhere short of their tax returns. Bloomberg's Jesse Drucker explains how the world's most successful Internet search engine manages to cut its tax rate on its massive overseas profits by a sleight of hand worthy of a Times Square Three-Card Monte dealer (Ok, they don't have Three-Card Monte games in Times Square anymore, but they did. Just Google it.)

n/a
Oct 20 20:17

The Stuxnet worm, a form of malware, was likely created by a government.

“In terms of preparation, planning and organization, Stuxnet is completely unparalleled to anything we’ve seen before,” Roel Schouwenberg, a Boston-based researcher for Russian internet security company Kaspersky Lab, told GlobalPost.

Schouwenberg said Stuxnet exploits holes in computers running Microsoft Windows, infecting networks and spreading via USB data sticks as it hunts specific software created by German engineering company Siemens for use in power plants and factories.

Once it finds the software, it makes modifications, causing machinery to shut down, “potentially by explosion.” In the meantime, it tinkers with feedback software so engineers running the plant have no idea what is happening.

Oct 20 20:11

Kaspersky hit by cyber criminals?

The Russian-based security firm Kaspersky has fallen victim to the cyber criminals it tries to protect users against, according to reports.

The company, known for its anti-virus software, has supposedly been compromised by hackers who have directed users trying to download Kaspersky’s software to malicious sites. Once they have reached the destination they are then encouraged to download fake anti-virus software, which could compromise their data security.

Oct 20 15:35

Three Maine newspapers stop accepting online comments

Three Maine newspapers have halted online comments on stories posted on their websites.

MaineToday Media CEO Richard Connor said what was aimed as a public forum for civil discourse devolved into "a forum for vile, crude, insensitive, and vicious postings." In his words, "No story subject seems safe from hurtful and vulgar comments."

Webmaster's Commentary: 

Translation: "We got tired of having BULL BISCUITS shouted at us every time we obediently posted whatever Israel paid us to post."

Oct 20 12:44

Keeping the Bad Guys out of your RFID credit cards

Webmaster's Commentary: 

I was not sure these things really worked, but the owner of this company sent me one for testing, and I attempted to make a purchase using my RFID equipped credit card and while it was in the sleeve, the scanner did not see it! As soon as I took the card out of the sleeve, the scanner saw it and completed the transaction. This thing really does work! With so many hackers walking around malls with portable scanners and laptops hidden in their backpacks, the only real protection is to avoid RFID, or keep the RFID cards in these sleeves.

Oct 20 07:20

In UK, every email and website to be stored by government

Every email, phone call and website visit is to be recorded and stored after the Coalition Government revived controversial Big Brother snooping plans.

Tom Whitehead
Telegraph

It will allow security services and the police to spy on the activities of every Briton who uses a phone or the internet.

Moves to make every communications provider store details for at least a year will be unveiled later this year sparking fresh fears over a return of the surveillance state.

Oct 20 00:40

Interactive Brokers' Peterffy Lashes Out Against The Broken Market, As Nanex Conclusively Proves HFT's Were Cause For Flash Crash

"It is not so much anymore that the public does not trust their brokers. They do not trust the markets, the exchanges, or the regulators either. And why should they, given our showing in the past few years?

Who cares what will happen in the future? Obviously not the banks, for whom each and every day of continued existence is a taxpayer-funded gift from god, or in this case Bernanke and the administration, which allows them to pay another batch of record bonuses for a catastrophe well done. They know the game is over, and it is now just a matter of when. If they can get paid one or two bonuses in the meantime, so much better.

Oct 19 23:38

Israeli lottery Draws the Same Six Numbers as 3 Weeks Ago– A one in Four Trillion chance.

It didn't take long for some viewers to notice that these numbers were exactly the same as those drawn in the September 21st draw.

Yitzhak Melechson, a professor of statistics at the University of Tel Aviv, said that the incident of six numbers repeating themselves within a month is an event of once in 10,000 years.

Oct 19 18:14

Officials Push to Bolster Law on Wiretapping

Charlie Savage
The New York Times

WASHINGTON — Law enforcement and counterterrorism officials, citing lapses in compliance with surveillance orders, are pushing to overhaul a federal law that requires phone and broadband carriers to ensure that their networks can be wiretapped, federal officials say.

Oct 19 10:41

ALTERNATIVE MEDIA CENSORSHIP: SPONSORED BY CIA's FORD FOUNDATION?

The multi-billion dollar Ford Foundation's historic relationship to the Central Intelligence Agency [CIA] is rarely mentioned on Pacifica's DEMOCRACY NOW / Deep Dish TV show, on FAIR's COUNTERSPIN show, on the WORKING ASSETS RADIO show, on The Nation Institute's RADIO NATION show, on David Barsamian's ALTERNATIVE RADIO show or in the pages of PROGRESSIVE, MOTHER JONES and Z magazine. One reason may be because the Ford Foundation and other Establishment foundations subsidize the Establishment Left's alternative media gatekeepers / censors.

Oct 19 10:38

U.S. Pushes to Ease Technical Obstacles to Wiretapping

Law enforcement and counterterrorism officials, citing lapses in compliance with surveillance orders, are pushing to overhaul a federal law that requires phone and broadband carriers to ensure that their networks can be wiretapped, federal officials say.

The officials say tougher legislation is needed because some telecommunications companies in recent years have begun new services and made system upgrades that caused technical problems for surveillance. They want to increase legal incentives and penalties aimed at pushing carriers like Verizon, AT&T, and Comcast to ensure that any network changes will not disrupt their ability to conduct wiretaps.

Oct 19 09:47

Google Street View breached privacy: Commissioner

An investigation by Canada's privacy commissioner has found Google breached privacy laws while it scoured Canadian streets in a specially designed vehicle for its popular Google Street View feature.

The investigation found the technology giant gathered email addresses, passwords, usernames and other personal information from unsecured wireless networks in Canadian neighbourhoods.

Oct 19 09:40

A BLOGGING MILESTONE

DesertPeace enters its sixth year of publishing today. We started out on Blogspot but after one to many times of being denied access by Google, we moved to a much friendlier ’neighbourhood’.

Oct 19 09:35

"Here you have" or "Just for you" virus/worm warning

This is a new kind of cleverly designed trojan activated virus/worm by a hacker who calls himself 'life owner.

Oct 19 06:52

Facebook apps transmitted personal info, report says

NEW YORK - The Wall Street Journal is reporting that 10 popular Facebook applications have been transmitting users' personal identifying information to dozens of advertising and Internet tracking companies.

Oct 18 10:40

Cool! Someone started a second WRH Facebook page!

Oct 18 03:23

Johann Hari: Obama's robot wars endanger us all

Imagine if, an hour from now, a robot-plane swooped over your house and blasted it to pieces. The plane has no pilot. It is controlled with a joystick from 7,000 miles away, sent by the Pakistani military to kill you. It blows up all the houses in your street, and so barbecues your family and your neighbours until there is nothing left to bury but a few charred slops. Why? They refuse to comment. They don't even admit the robot-planes belong to them. But they tell the Pakistani newspapers back home it is because one of you was planning to attack Pakistan. How do they know? Somebody told them. Who? You don't know, and there are no appeals against the robot.

Oct 17 17:12

THE UNITED STATES FIGHTS AND PAYS FOR ISRAEL'S WARS - MAIDHC O'CATHAIL

Charles Freeman recently stated, “Only a peace process that is protected from Israel’s ability to manipulate American politics can succeed.” So, to paraphrase the neocons, the road to Jerusalem leads through Washington. As long as the Lobby holds sway inside the Beltway, Israel can do what it likes in the West Bank and Gaza.

Oct 17 11:24

News Corp. Shuts Off Hulu Access To Cablevision Customers – And Turns It Back On

Editor's Note: In an impressive display of internet censorship power, News Corp has been able to restrict internet access to outside providers to some of its websites. Now that we know that this type of censoring ability exists, we can expect to see much more efforts to strangle internet service providers to comply with the media giants. Not a good sign at all. Also note that the following article is written by a News Corp employee so it surely has the kindest possible spin on this exercise of power.

Peter Kafka
WSJ Digital

Oct 17 10:10

Government Spying via Facebook

Webmaster's Commentary: 

This is just another propaganda trick to discourage people from communicating with each other; to trick Americans back into psychological dependency on ABCNNBBCBS. But with 300 million angry Americans, it's not like there are enough Federal Agents to spy on us all. 99% of what gets posted to Facebook are clipping from other sources. There is simply too much information out there to correlate.

You think the Feds don't already know we are angry? You think the government is not aware there is open talk of revolution across the land? You think Obama hasn't heard that the people want him charged with high treason for allowing Israel to attack Americans in international waters? You think Congress thinks they got away with holding the Middle Class down while Wall Street gang-banged us all into poverty?

They know it. They know that the interval between now and the guillotines grows shorter every day. All they want to do is hold off the final collapse as long as possible while they loot the nation and skedaddle for the borders! So they play this Booga Booga trick to keep people from sharing their growing rage with each other.

Not gonna work.

Not a chance in Hell.

So to all those government goons reading these words right now; cut your losses. Take what you already looted and leave now while you can. Because you and I both know your bosses will offer you up as a sacrificial lamb in a heartbeat to save their own sorry asses when the final bug-out happens.

P.S. People lie about themselves on Facebook.

Oct 16 23:16

Govt. Spying via Facebook

[YouTube: p3bLAvpi-sg]

Oct 15 12:33

CYBERCOM to Go Operational This Month

In August, the Pentagon revealed information about a cyber attack against the US military’s Central Command in 2008. According to the Pentagon’s account, USB memory sticks were randomly placed in a washroom at a US military base in the Middle East providing support for the war in Iraq. The memory sticks, infected with a computer worm by an undisclosed foreign intelligence agency, were picked up by soldiers who ignored protocol and plugged them into military laptops. The worm took 14 months to kill. In a very similar attack earlier this year, Iran experienced a computer worm (the Stuxnet virus) that infected around 30,000 IP addresses, as well as the computers at the Bushehr nuclear plant.

Oct 14 09:23

Half of wi-fi networks can be hacked in seconds

Nearly half of home wi-fi networks can be hacked in less than five seconds, according to a study carried out across UK cities.

Of the 40,000 networks identified in the six cities, just under 20,000 had no password or the most basic form of security encryption, the research for card protection and insurance company CPP found.

In the ''ethical hacking'' experiment, researchers spent half an hour in each city using freely available software to use as many unsecured wireless connections as possible.

Oct 13 18:32

Microsoft issues its biggest-ever security fix

Microsoft said four of the new patches -- software updates that write over glitches -- were of the highest priority and should be deployed immediately to protect users from potential criminal attacks on the Windows operating systems.

Oct 13 10:16

FLASHBACK - Israeli Foreign Ministry to Hire Shills for “Internet Warfare” Squad

The Foreign Ministry unveiled a new plan this week: Paying talkbackers to post pro-Israel responses on websites worldwide. A total of NIS 600,000 (roughly $150,000) will be earmarked to the establishment of an “Internet warfare” squad.

Oct 12 15:52

Wired.com Calls For New Cybersecurity Slogan

Hey WRHistas,

Here's something "fun" for you amidst all the tyranny ...

Wired.com is appalled at DHS's new cybersecurity slogan: Stop, Think, Connect.

(We are appalled, too, but for other reasons.)

And they're calling for people to post new slogans. Here are some of the ones SCMLA has come up with so far:

Swipe It Or Wipe It

Fingerscan or Taliban

Don't Hate Surveillance

Fingerscan For Freedom

Have You Iris-Scanned Lately?

You Surf. We Surveil. Questions?

Cyber Surveillance is Cyber Freedom

Relinquish Cyberliberty For Cybersecurity

Watch What You're Watching Because We're Watching Too

Oct 12 12:47

Irish court rules in favour of ISPs in piracy case

The High Court in Ireland has ruled that laws cutting off internet users who have illegally downloaded content cannot be enforced in the country.

It is a victory for Irish internet service provider UPC which took the legal action against copyright owners, including EMI and Sony.

But it will be a blow to the music and film industry, which wants the strict rules as a deterrent against piracy.

It is likely to have a knock-on effect to similar policies in other countries.

Oct 12 05:40

Iranian, Chinese Computers Also Discovered to Have Been Hacking D.C. Internet Voting System

http://blacklistednews.com/Iranian%2C-Chinese-Computers-Also-Discovere...

According to testimony given to a D.C. City Council committee last Friday by J. Alex Halderman, asst. professor of electrical engineering and computer science at University of Michigan, hackers from Iran and China were also attempting to access the very same network infrastructure, even as his own team of students had successfully done so, taking over the entirety of the Internet Voting system which had been opened for a first-of-its-kind live test.

Oct 11 13:20

Google’s self-driving car

Google announced this weekend that it’s been building robotic cars that have been driving themselves around California — down curvy Lombard Street in San Francisco, across the Golden Gate Bridge, along the Pacific Coast Highway, around Lake Tahoe and from Google’s Mountain View headquarters to Santa Monica (a 350-mile trip). So far, the cars have logged over 140,000 miles.

The company hasn’t said yet what it’s going to do with the cars, but they should be a good business for Google, because they draw heavily on Google’s data centers.

Oct 11 11:02

Stuxnet Computer Worm–Israel’s Attempt To Silence Iran on 9/11 or Veiled Threat to the Entire World?

The reasons for Israel being fingered as the lone gunman in this crime were several. First, the bug in question–while making its way to other parts of the world, nevertheless was disproportionally concentrated in Iran, and–more importantly–targeted the nuclear facility at Natanz whose destruction is numero uno on Israel’s wish list. Next were two “fingerprints” left on the would-be murder weapon, one of them being a reference to the biblical heroine Esther whose reputed actions (celebrated yearly in the Jewish religious festival known as Purim) saved the Jews of Persia (today’s Iran) from yet another in a seemingly-endless parade of persecution of God’s chosen people.

Oct 11 06:50

When the 'Future' Invades Our Lives. The CIA Funds 'Predictive Behavior' Start-Ups

What do Google, the CIA and a host of so-called "predictive behavior" start-ups have in common?

They're interested in you, or more specifically, whether your online interests--from Facebook to Twitter posts, and from Flickr photos to YouTube and blog entries--can be exploited by powerful computer algorithms and subsequently transformed into "actionable intelligence."

Oct 10 10:32

Cass Sunstein's despicable ideas on regulating the internet

In the past, we have seen Barack Obama and his supporters attempt to chill any sort of scrutiny or criticism of him. Many of his records - whether they are transcripts from Occidental or Columbia - have not been released. He lost his senior thesis (on Soviet nuclear disarmament) from Columbia University (how likely was that to happen, given that he felt his own life was important enough to write an autobiography in his young 20s), and his records from his time in the Illinois state senate were "lost".

Oct 10 10:14

Ryan Dawson - Youtube censored me again

Oct 09 04:21

Fears of a 10.10.10 computer virus hit internet

Fears that a computer virus could be unleased on October 10 – 10.10.10 – are circulating on the internet, with experts warning users to be careful.

Oct 07 20:04

Feds order HSBC to boost money-laundering controls

Eileen AJ Connelly
Associated Press

NEW YORK — Federal regulators on Thursday said HSBC North America Holdings Inc. has been ordered to improve its compliance with money laundering laws.
A federal investigation found the U.S. subsidiaries of the London-based HSBC Holdings PLC do not have tight enough controls over a list of money transfer operations.

Oct 07 16:12

Microsoft Proposes Government Licensing Internet Access

A new proposal by a top Microsoft executive would open the door for government licensing to access the Internet, with authorities being empowered to block individual computers from connecting to the world wide web under the pretext of preventing malware attacks.

Oct 07 08:34

How the Phone Companies Are Screwing America: The $320 Billion Broadband Rip-Off

Since 1991, the telecom companies have pocketed an estimated $320 billion --- that's about $3,000 per household.

This is a conservative estimate of the wide-scale plunder that includes monies garnered from hidden rate hikes, depreciation allowances, write-offs and other schemes. Ironically, in 2009, the FCC's National Broadband plan claimed it will cost about $350 billion to fully upgrade America's infrastructure.

The principal consequence of the great broadband con is not only that Americans are stuck with an inferior and overpriced communications system, but the nation's global economic competitiveness has been undermined.

Webmaster's Commentary: 

This is becoming a consistent pattern in the US. Pacific Gas and Electric got a rate increase approved because they needed to make repairs on the gas lines, only they took the money and didn't make the repairs and San Bruno blew up. This is more of the same. The phone companies got a rate increase back in 1991 to pay for system upgrades to support broadband, but they took the money and made only token improvements here and there while the rest of the world surged ahead. So, broadband in the US is like our medical care; the most expensive in the world, and lagging in quality.

Oct 07 08:21

Microsoft proposes public health approach to internet infections: Only vaccinated computers can get online

Byron Acohido
USA Today

Microsoft has proposed a bold new Internet security model based on the principles used to preserve public health on a global basis.

Oct 06 16:20

Superbug that hit 6m PCs in China traced to US?

The much-feared new cyber-weapon, the 'Superbug', which has attacked over six million personal and almost 1,000 corporate computers in China has been traced to the US, official media reported.

Oct 06 16:20

Jewish Internet Defense Force: Not so powerful after all

You Tube reinstates David Duke’s Account

Oct 06 14:19

FBI wants revision in telecom law to aid terror probes

WASHINGTON — FBI Director Robert Mueller is calling for changes in federal law to help his agents with surveillance of communications in anti-terrorism and other criminal investigations.

Oct 06 12:16

Microsoft: Ban 'sick' PCs from the Internet

Webmaster's Commentary: 

Rivero: Shoot the cyber criminals!

Oct 06 11:06

New Phishing Attack Targets Apple iTunes, Security Firm Says

Got iTunes? Be careful, you might get iScammed too.

A new cyberscam has been targeting the tens of millions of users of Apple's iTunes music service, as crooks phish for confidential bank information.

Webmaster's Commentary: 

How iNnoying!

Oct 06 11:03

REALITY REPORT #64 - Global Warming Battle Turns Bloody

In this edition of the Reality Report, the brutal video about what could happen if you don't reduce your carbon footprint is broken down in the Rant. We the People Foundation Chairman, Bob Schulz, joins Gary Franchi for a special interview to respond the the recent allegations by Time Magazine that he "has reached the brink of calling for war." They also talk about the upcoming Liberty Walks on October 24th. Angie Ress sits in for Nina this week. She talks about the lengths the NYPD is going to to keep terror out of the city, how the Army may be taking control of what you watch on TV, and why the FBI could soon be watching your every move on the internet. All of this plus a dip into the Mailbag to reveal the shocking answers to the previous Question of the Week, and a new Enemy of the State.

Oct 06 09:57

Obama Administration Pressures ISPs To Censor Websites

The Obama Administration IP Czar Victoria Espinel has been holding meetings with ISPs, registrars, payment processors and others in a bid to get them to block access to websites “dedicated to infringing activities”. However, as we have documented, the government deems such infringement to include political opinions which are antagonistic toward the state, leaving the door open for state censorship of free speech on the world wide web.

Oct 06 07:34

Cyber Wars: US Is Stepping Up Defense Against Digital Attacks

Reuters

Guarding water wells and granaries from enemy raids is as old as war itself. In the Middle Ages, vital resources were hoarded behind castle walls, protected by moats, drawbridges and knights with double-edged swords.

Oct 06 01:48

Programming Kids To Enforce The Police State

Want to earn tons of cool badges and prizes while competing with you friends to see who can be the best American? Download the SnapScouts app for your Android phone (iPhone app coming soon) and get started patrolling your neighborhood.

It's up to you to keep America safe! If you see something suspicious, Snap it! If you see someone who doesn't belong, Snap it! Not sure if someone or something is suspicious? Snap it anyway!

Play with your friends and family to see who can get the best prizes. Join the SnapScouts today!

Oct 06 01:44

Hospital Patient Privacy Sacrificed as State Agency Sells or Gives Away Data

http://www.theaustinbulldog.org/index.php/Main-Articles/Main-Articles/...

Maybe you, like so many others, couldn't get away on vacation this summer. Never mind. If you were a patient in a Texas hospital in the past ten years, the intimate details of your hospital stay made the trip for you.

Oct 05 15:07

Chipped: school children put into “Smart Badge program”

School children in Santa Fe, New Mexico are being compelled to participate in a “Smart Badge” program. These are RFID chips embedded in an ID badge that the kids are required to have with them at all times. With these tags, the children can be (and are) followed and monitored by administrators of the government school system.

The program is getting mixed reviews, according to an article at KVUE. Some parents love it. After all, this is being done in the name of the children’s safety. Who doesn’t want kids to be safe, right?

Other parents aren’t so sure about this program.

Oct 05 07:47

Some Android apps caught covertly sending GPS data to advertisers

The results of a study conducted by researchers from Duke University, Penn State University, and Intel Labs have revealed that a significant number of popular Android applications transmit private user data to advertising networks without explicitly asking or informing the user. The researchers developed a piece of software called TaintDroid that uses dynamic taint analysis to detect and report when applications are sending potentially sensitive information to remote servers.

They used TaintDroid to test 30 popular free Android applications selected at random from the Android market and found that half were sending private information to advertising servers, including the user's location and phone number.

Oct 04 15:24

Stuxnet Super Virus Also Attacked China

The latest super virus, Stuxnet, which attacked Iran’s Nuclear Facility, is reported to have attacked China too. Some of the industrial computing systems and their hardwares run by the Siemens software were affected by the Stuxnet worm. Now there is a fear shown by the US, that if the virus could hit China, then the United States is not missing on its list.

Oct 04 10:37

Israel's unit 8200: cyber warfare

Israel demonstrated its intent to conquer cyber warfare in the 1990s by presenting the country's legions of hackers with a choice between prison and working for the state.

Oct 04 09:04

Stop the Internet Blacklist!

Just the other day, President Obama urged other countries to stop censoring the Internet. But now the United States Congress is trying to censor the Internet here at home. A new bill being debated this week would have the Attorney General create an Internet blacklist of sites that US Internet providers would be required to block.

This is the kind of heavy-handed censorship you'd expect from a dictatorship, where one man can decide what web sites you're not allowed to visit. But the Senate Judiciary Committee is expected to pass the bill this week -- and Senators say they haven't heard much in the way of objections! That's why we need you to sign our urgent petition to Congress demanding they oppose the Internet blacklist.

Oct 04 08:49

CENSORED History of the Slave Trade

Webmaster's Commentary: 

A few days ago, the Jewish Internet Defense Force, a group of hackers who attack websites that criticize Israel for its war crimes, bragged about how they had succeeded in forcing YouTube to delete the channel and videos of David Duke.

Now, regardless of whether you agree with Duke or not, we still have a First Amendment in this nation, and everyone gets to say their point of view, a right Israel's supporters never fail to take constant advantage of, even as they attempt to deny it to others. Frankly, I find the prospect of a foreign nation controlling what we can see on the internet in the same fashion they already control what we see on ABCNNBBCBS far more alarming than anything Duke has to say.

As has historically been the case, the downfall of Israel's supporters is that they cannot resist bragging about how they control America. They could not help but brag how they were in control of YouTube. Thus it comes as no surprise that First Amendment supporters are pouring Duke's videos back onto YouTube where, because of the "Banned in Boston" effect, more people are watching them now than ever before!

Oct 04 07:34

The Israeli threat to global security

A USB memory stick carrying the Stuxnet malware is believed to have provided intruders with access to Iran’s nuclear program. The same technique was used in November 2008 to break into CENTCOM, providing a foreign government with unfiltered access to the Pentagon’s command of the wars in Iraq and Afghanistan. Did both attacks come from the same source?

Oct 04 07:25

Crypto Wars! Obama Wants New Law to Wiretap the Internet

In a reprise of the crypto wars of the 1990s, the U.S. secret state is mounting an offensive that would force telecommunication companies to redesign their systems and information networks to more easily facilitate internet spying.

Touted as a simple technical "fix" that would "modernize" existing legislation for wiretaps, government security officials will demand that telecommunication firms and internet service providers provide law enforcement with backdoors that would enable them to bypass built-in encryption and security features of electronic communications.

Oct 03 23:04

Israel's hackers brag how they control YouTube!

Webmaster's Commentary: 

Whether you agree with David Duke or not, the idea that the agents of a foreign power are now able to control what you can and cannot see on YouTube should confirm for all observers that Israel is imposing a dictatorship over America.

n/a
Oct 02 12:27

Congress Has Plans for an Internet Blacklist in the Works -- Let's Stop This Now

When it really matters to them, Congressmembers can come together -- with a panache and wry wit you didn't know they had. As banned books week gets underway, and President Obama admonishes oppressive regimes for their censorship of the Internet, a group of powerful Senators -- Republicans and Democrats alike -- have signed onto a bill that would vastly expand the government's power to censor the Internet.

Oct 02 09:19

Iran 'detains western spies' after cyber attack on nuclear plant

Iran has detained several "spies" it claims were behind cyber attacks on its nuclear programme.

The intelligence minister, Heydar Moslehi, said western "spy services" were behind the complex computer virus that recently infected more than 30,000 computers in industrial sites, including those in the Bushehr nuclear power plant, appearing to confirm the suspicion of computer security experts that a foreign state was responsible.

Webmaster's Commentary: 

This isn't the USA, where spies from Israel are given a trip to Disneyland then sent back home. Because of the crimes committed at Abu Ghraib, Bagram, Guantanamo, and other torture centers, those spies are in for a very rough time!

Oct 02 07:45

Congress Abandons Net Neutrality Bill

House Energy and Commerce Committee Chairman Henry Waxman (D-California) has given up for the year on an effort to create bipartisan legislation that would prevent broadband providers from interfering with traffic over their networks.

Waxman's net neutrality bill would have prohibited Internet, cable and phone companies from slowing or blocking traffic to legal web sites, protocols and services, which would otherwise allow them to play favorites with online content - and while Internet providers have claimed they would engage in neutral practice with or without a bill, cable company RCN was recently sued for "delaying or blocking" P2P protocols.

n/a
Oct 01 23:12

Stuxnet 'cyber superweapon' moves to China

A computer virus dubbed the world's "first cyber superweapon" by experts and which may have been designed to attack Iran's nuclear facilities has found a new target -- China.

The Stuxnet computer worm has wreaked havoc in China, infecting millions of computers around the country, state media reported this week.

Stuxnet is feared by experts around the globe as it can break into computers that control machinery at the heart of industry, allowing an attacker to assume control of critical systems like pumps, motors, alarms and valves.

It could, technically, make factory boilers explode, destroy gas pipelines or even cause a nuclear plant to malfunction.

Webmaster's Commentary: 
Oct 01 23:07

Stuxnet Malware Mystery Deepens: Another Hint Of Israeli Origins

On Tuesday, a German computer specialist offered a hint that Israel may be behind the sophisticated malware, by demonstrating that a file inside the code uses the word "Myrtus" -- which could be a reference to the Book of Esther, the Old Testament story about how the Jews prevented a nefarious plot by the Persians, according to the New York Times.

Oct 01 14:31

Computer worm attacking Iran's nuclear facilities 'includes Biblical link to Israel'

Israel has been linked to a complex worm currently attacking computers in Iran, which experts claim may have been designed to target the country's nuclear facilities.

The Stuxnet worm, supposedly aimed at slowing Iran's desire to create a nuclear arsenal, appears to include a reference to a Biblical story in which Jews pre-empt a Persian plot to destroy them.

The New York Times reports a file inside the Stuxnet code is named 'Myrtus' - a reference to the Hebrew word Esther, the same name as the Old Testament book in which the story appears.

Oct 01 12:35

SAFEGUARDING THE INTERNET

I posted the above earlier today. The prospect is frightening…. not only will ‘Big Brother’ be watching YOU, he will be watching the sites you surf on the Internet.

Michael Rivero of What Really Happened has come up with a way to defeat these Internet terrorists and nip their plans in the bud….

Oct 01 11:34

Remove Stuxnet Infection with Stuxnet Rootkit Remover

Stuxnet is a new family of malware that has drawn a large number of attention from security researchers in the mid of this July. By taking advantage of the previously unknown vulnerability in Windows shell, which was discovered lately in most of the current versions of Windows–including Windows Vista, Windows 7, both 32- and 64-bit versions, and Windows Server 2008–Stuxnet is able to run itself without user interaction as soon as the .lnk file in an infected USB drive is read by the operating system.

Oct 01 11:17

It’s the Economy, Not the Bloggers

Americans are angry with the Obama administration, and the Obama administration is angry with—bloggers?

Webmaster's Commentary: 

Moi???????

Oct 01 10:16

Israel Suspected in Worm Sabotage of Iran's First Nuclear Plant

The viral program is very sophisticated and appears designed specifically to attack the plant. It first was released onto workers' computers, designed to try to reach plant's control systems. Unlike other more sophisticated attacks which appeared to be primarily geared for monitoring, this attack was designed to do damage. It contained logic to sabotage nuclear fuel enrichment centrifuges. The centrifuges, made by German equipment electronics giant Siemens, would be made to fail in a virtually unnoticeable way.
-----------------------------------------------------------------

another noteworthy event: unit8200 soldier *arrested*

Oct 01 09:48

Israel's unit 8200: cyber warfare

Israel demonstrated its intent to conquer cyber warfare in the 1990s by presenting the country's legions of hackers with a choice between prison and working for the state.

Oct 01 09:43

GNU adns Advanced, easy to use, asynchronous-capable DNS client library and utilities.

adns is a resolver library for C (and C++) programs, and a collection of useful DNS resolver utilities.

Webmaster's Commentary: 

S.3804 will attempt to silence Patriot websites by forcing commercial domain name resolution systems to drop the DNS listings for those sites. However, setting up private or community DNS is fairly easy, as this code demonstrates! Once operational, adding the DNS info for the patriot sites is trivial!

Oct 01 09:33

SHUTTING DOWN THE INTERNET?

On September 20th, Senate Judiciary Committee Chairman Patrick Leahy (D-VT) introduced legislation — S. 3804, the Combating Online Infringement and Counterfeits Act — that seeks to give the Department of Justice the power to shut down websites anywhere in the world that are found to infringe on intellectual property rights. This would be accomplished by ordering U.S. domain registrars and registries to stop resolving infringing sites’ domain names. While this bill has the noble-sounding goal of preventing online piracy, handing the federal government authority over the Internet would set a troubling precedent that would imperil Internet freedom in America and across the world.

Webmaster's Commentary: 

This can actually be defeated by amateur DNS servers set up all across the world, especially in those nations now willing to defy the United States, possibly even Iceland! Those who know how can actually set up their own local DNS servers to allow themselves and their friends to continue to access the patriot websites. The copyright infringers and pirates already do this, which means that this new law, like all the others, portrays itself as fighting cr4ime while actually seeking to return the general population to a state of deaf, dumb, and blindness, wholly dependent on ABCNNBBCBS to tell them what is going on in the world.

It won't work and it never has, but the tyrants playing by last century's rules are panicking. My concern is that if the virtual revolution is attacked, it will move from the virtual to the real world (as we are already seeing across Europe).

Oct 01 08:57

Stuxnet worm could have been inside job

Delegates at the Virus Bulletin 2010 conference in Vancouver have heard that the Stuxnet worm could have been an inside job.

Graham Cluley, senior technology consultant at Sophos, told V3.co.uk that the worm may have been written by someone with detailed knowledge of Siemens' computer systems, possibly a current or former employee.

Mikko Hyppönen, chief research officer at F-Secure, told V3.co.uk that, based on the evidence he'd seen, the Stuxnet worm looks like a government attack, although conference presentations focused on the technical details of the attack rather than the motive.

Oct 01 08:05

Israeli cyber unit responsible for Iran computer worm – claim

Computer experts have discovered a biblical reference embedded in the code of the computer worm that has pointed to Israel as the origin of the cyber attack.

The code contains the word "myrtus", which is the Latin biological term for the myrtle tree. The Hebrew word for myrtle, Hadassah, was the birth name of Esther, the Jewish queen of Persia.

In the Bible, The Book of Esther tells how the queen pre-empted an attack on the country's Jewish population and then persuaded her husband to launch an attack before being attacked themselves.

Israel has threatened to launch a pre-emptive attack on Iran's facilities to ensure that the Islamic state does not gain the ability to threaten its existence.

Oct 01 07:38

House Democrats shelve net neutrality proposal

Joelle Tessler
Associated Press

House Democrats have shelved a last-ditch effort to broker a compromise between phone, cable and Internet companies on rules that would prohibit broadband providers from blocking or degrading online traffic flowing over their networks.

Oct 01 03:13

DARPA develops Helmet of Obedience

It looks like our ever-diligent friends at DARPA have been busy creating a contingency plan for the OathKeeper movement. Thanks to a newly-developed pain modulator and behavior modification helmet, any US troops who decide they will obey the Constitution rather than the commands of the global puppet masters will now be getting some remote-controlled motivational persuasion.

Oct 01 02:54

Stuxnet & "Cyber Storm III' Cyber Attack Wargame are unrelated, nothing to see here...

New York Times asks: In a Computer Worm, a Possible Biblical Clue

But first from CyberSpaceWar/defencetalk: US keyboard warriors were doing battle Tuesday with a simulated cyberattack on government and private computer networks that undermines basic trust in the Internet. The "Cyber Storm III" exercise involves participants from seven US government departments, including the Pentagon, 11 US states, 60 private companies and 12 international partners.

Sep 30 19:54

Inside Stuxnet: Researcher drops new clues about origin of worm

The mysterious Stuxnet worm took center stage at the Virus Bulletin 2010 conference with a prominent security researcher dropping a raw hint that Israel may be behind the industrial-strength malware attack.

Sep 30 17:43

In a Computer Worm, a Possible Biblical Clue

Deep inside the computer worm that some specialists suspect is aimed at slowing Iran’s race for a nuclear weapon lies what could be a fleeting reference to the Book of Esther, the Old Testament tale in which the Jews pre-empt a Persian plot to destroy them.

Sep 30 17:33

Obama Working on Plan to Wiretap Skype, Facebook, BlackBerrys

The Obama administration wants to force all communications companies to make their networks compliable with wiretapping orders from law enforcement, a change that would primarily affect the likes of Facebook, Skype, BlackBerrys and similar encrypted systems.

Phone and broadband companies already are required under the 1994 Communications Assistance to Law Enforcement Act to ensure their operations can allow for eavesdropping by police and federal agents. But more recent communications like BlackBerrys, which encrypt emails, make it difficult for the government to intercept messages that may involve terrorist plots.

The White House has been working with the FBI, the Department of Justice and the National Security Agency to develop a plan that would be submitted to Congress sometime next year.

Sep 30 11:24

Millions of Computers Hit by Virus Across China

Jakarta Globe

Bejing. A computer virus dubbed the world’s “first cyber superweapon” and which may have been designed to attack Iran’s nuclear facilities has found a new target — China.

The Stuxnet computer worm has wreaked havoc in China, infecting millions of computers around the country, state media reported this week.

Sep 30 10:20

Authorities Plan To Trawl Phone Calls And E Mails For Signs Of “Resentment Toward Government”

Do you resent the government for enforcing Obamacare or raising your taxes? Write about it in an email or talk about it on the phone and you could be placed under surveillance as a potential terrorist, if frightening new technology being shopped to law enforcement agencies is implemented.

Webmaster's Commentary: 

Since the Republicans resent the Democrats and the Democrats resent the Republicans, that puts pretty much every registered voter on the "terrorist" watch list, doesn't it?

Sep 29 20:24

Internet's creator slams 'blight' of web disconnection laws

AFP

Tim Berners-Lee, the man credited with inventing the world wide web, warned Tuesday of the "blight" of new laws being introduced across the globe allowing people to be cut off from the Internet.

"There's been a rash of laws trying to give governments and Internet service providers (ISPs) the right and the duty to disconnect people," he told a conference on web science at the Royal Society in London.

SHARE THIS ARTICLE WITH YOUR SOCIAL MEDIA