COMPUTERS/INTERNET/SECURITY | WHAT REALLY HAPPENED

COMPUTERS/INTERNET/SECURITY

Aug 27 07:14

Be a closet climate modeler with Climate@home

First there was SETI@home where you could use spare CPU cycles to look for extraterrestrial signals. Now we have Climate@Home, running NASA GISS modeling software in distributed computing, but no release date yet. Oxford has already created climateprediction.net running BOINC. I expect it’s a case of “keeping up with the Joneses”

I wonder though, what’s the “carbon footprint” of leaving all those computers running to calculate the effects of fossil fuels burned to run them?

Aug 26 11:47

Facebook sues start-up for using 'book' in its name

Teachbook.com has two employees and fewer than 20 users signed up for its free Web community. The site has yet to officially launch.

But the Northbrook, Ill., company, which provides tools for teachers to manage their classrooms and share lesson plans and other resources, has been thrust into the spotlight by social networking giant Facebook, which sued the start-up for using "book" in its name.

"We've been sitting here scratching our heads for the last couple of days," Teachbook's managing director, Greg Shrader, said Wednesday. "We're trying to understand how Facebook, a multibillion-dollar company, feels this small enterprise in Chicago is any type of threat."

Aug 26 11:23

I Graciously Accept Rolling Stone's Obnoxiousness Award - Now Where's My Check?

Since an excited friend emailed me that I had won Matt Taibbi's "Most Obnoxious Thing on the Internet This Month" award, I have been looking forward to my $10,000 check and working on my acceptance speech. Here is a draft of that speech:

Webmaster's Commentary: 

An insult from Rolling Stone beats a compliment from the New York Times, any day! :)

Aug 26 09:17

NameNotFound

You want to know what news sends chills down the spines of the world’s governments?

Not "rogue regimes’" purported saber rattling.

Not even bad economic data coming out of Wall Street.

It's news like this:

"The search giant Google and the U.S. Central Intelligence Agency are investing in a company working to track Web-browsing behavior.

Aug 26 08:53

Music Biz Uses Net Neutrality to Equate P2P with Child Porn – Again

Earlier this year the IFPI took that sentiment to the next level, going so far as to exclaim that “child pornography is great…because politicians understand child pornography.”

“By playing that card,” IFPI lawyer Johan Schlüter told an audience gathered at an anti-P2P conference in Sweden, “we can get them to act, and start blocking sites. And once they have done that, we can get them to start blocking file-sharing sites.”

The music industry knows the drill. Equating P2P with child porn is the quickest way to make people sympathetic to their cause and get them to act accordingly.

Aug 25 09:16

Internet fraudsters claim celebrities have died in plane crash in latest trojan virus attack

Scammers are sending emails containing links which claim that people like Beyonce, Tom Cruise or Tiger Woods have died in a plane or car crash.

One common email claims that the named celebrity has died along with 34 other people when their plane crashed into a mountainside while approaching the airport.

Recipients are asked to open an attachment for further details.

But when the user clicks on the link a Trojan computer virus is installed on their computer which can then give the virus’ creator complete remote control of their machine.

Aug 25 08:43

Philly Is Not the “City of Blogger-ly Love”

Imagine you live in Philadelphia and you have a blog. You are like about 99.9 percent of the world’s bloggers so you make no money and the blog is a labor of love.

Now imagine that you are going to be charged $300 for the privilege of having your blog start from the City of Brotherly Love. Yup, that’s right, Philly is hitting bloggers with this and other measures. If you haven’t had enough of the government on every level getting into everyone’s business this may put you over the top.

Webmaster's Commentary: 

I sure hope so!

Aug 23 20:10

New iPhone Security Patent: User Protection or 1984 iSpy?

Your next iPhone might listen to your heartbeat or scan your face to identify its rightful owner — and it could react with anti-theft measures if it ended up in the wrong hands, according to a patent recently filed by Apple.

...

“Ignoring the possibility that a false positive in Apple’s proposed theft protection might activate the spy cam while the user is in the bath, or in the middle of some other intimate moment, this technology seems Orwellian for another reason: It gives Steve Jobs and Co. the means to retaliate when iPhones aren’t being used in ways Cupertino doesn’t expressly permit,” The Register wrote over the weekend.

Aug 22 18:40

How WikiLeaks Keeps Its Funding Secret

The controversial website WikiLeaks, which argues the cause of openness in leaking classified or confidential documents, has set up an elaborate global financial network to protect a big secret of its own—its funding.

Some governments and corporations angered by the site's publications have already sued WikiLeaks or blocked access to it, and the group fears that its money and infrastructure could be targeted further, founder Julian Assange said in an interview in London shortly after publishing 76,000 classified U.S. documents about the war in Afghanistan in July. The move sparked international controversy and put WikiLeaks in the spotlight.

Webmaster's Commentary: 

So, the site shut down for lack of funding last year, then suddenly they have a million bucks to play with from a source which must remain hidden ... at the same time they start coming out with stories about a living Osama Bin Laden and dissing the 9-11 truth movement!

Aug 22 11:32

Course: Zionist Editing on Wikipedia

Webmaster's Commentary: 

Israel openly declares their intention to control everything you see, hear, and read on the internet!

Sieg HEIL! Sieg HEIL! Sieg HEIL!

Aug 22 11:30

Pay Up: Got a blog that makes no money? The city wants $300, thank you very much.

So even if your blog collects a handful of hits a day, as long as there's the potential for it to be lucrative — and, as Mandale points out, most hosting sites set aside space for bloggers to sell advertising — the city thinks you should cut it a check. According to Andrea Mannino of the Philadelphia Department of Revenue, in fact, simply choosing the option to make money from ads — regardless of how much or little money is actually generated — qualifies a blog as a business. The same rules apply to freelance writers. As former City Paper news editor Doron Taussig once lamented [Slant, "Taxed Out," April 28, 2005], the city considers freelancers — which both Bess and Barry are, in addition to their blog work — "businesses," and requires them to pay for a license and pay taxes on their profits, on top of their state and federal taxes.

Aug 22 08:30

The facial recognition software that will put a name to every photograph in the internet

A software company is developing revolutionary software which provides the ability to identify people from photographs posted on the internet.

Face.com has produced technology that can identify individuals on social networking sites and online galleries by comparing their image against a known picture of them.

It means detailed profiles of individuals can be built up purely from online photographs and critics have said it could lead to exploitation by employers.

Aug 21 16:32

New industry meetings over net neutrality being hosted by lobbyists

While much of the focus has been on Google and Verizon when it comes to net neutrality as of late, the Wall Street Journal has reported that lobbyists began a new set of talks among a much wider group on Wednesday.

The Information Technology Industry Council is a lobbying firm which represents dozens of companies, including Apple, AOL, Cisco, HP, Microsoft, Nokia, and RIM among others. Reports indicate Microsoft is in attendance as is Cisco. AT&T and Verizon are also involved in the negotiations, but Google is not.

No public interest groups have been invited to this round of talks, unlike the unsuccessful FCC talks. Those groups used that fact to point out that the consumer has no representation in these latest talks, making them illegitimate.

"The public does not need more time-consuming deliberations," Media Access Project senior vice president and policy director Andrew Jay Schwartzman said in a statement. "The FCC should take prompt action to assert its authority over broadband providers' network management practices, without further delay."

Aug 21 14:35

New Facebook Feature Is A Possible Security Concern

New facebook feature allows facebook to lock town your location anytime anywhere...beware!

Aug 21 11:08

Philadelphia to register/charge bloggers $300 for blogging "priviledge"

For the past three years, Marilyn Bess has operated MS Philly Organic, a small, low-traffic blog that features occasional posts about green living, out of her Manayunk home. Between her blog and infrequent contributions to ehow.com, over the last few years she says she's made about $50. To Bess, her website is a hobby. To the city of Philadelphia, it's a potential moneymaker, and the city wants its cut.
ADVERTISEMENT

In May, the city sent Bess a letter demanding that she pay $300, the price of a business privilege license.

Aug 20 08:59

Gilad Atzmon: United Against Knowledge

The Guardian reported today that two Israeli groups have set up training courses in subversive Wikipedia editing aiming to 'show the other side' of the Jewish State.

Those who lend their pen to the Palestinian cause know about Wikipedia Jews, a term that was coined a few years ago. It refers to a bunch of rabid and crypto Zionists who constantly vandalise encyclopaedia entries to do with Palestine, Palestinian activists and Israeli atrocities.

According to the Guardian two Israeli groups seeking to gain the upper hand in the online debate have launched a course in "Zionist editing".

Aug 19 12:32

Mac, PC, Linux - it doesn't matter as they all suck...

Let the rant begin! I just sent this little crash notifier note in my daily series or my reality show called, Crash Notifier - My Daily Time Waster, to the techies at Apple since I have nothing better to do.

As much as this happens, I should start sending them my invoice for billable time since they are taking money away from me. I did the same by sending my NSAT&T cell phone bill up the road here to NSA and told them to pay it, since I'm funding their operations as we all are with our taxes, so they can in-turn use our federal equipment and payroll spook personnel to be used against us, to spy on us in this twisted Ouroboros tax-funded intel scheme against the hand, or tail, that feeds it...

Aug 18 16:45

Wikipedia editing courses launched by Zionist groups

Two Israeli groups set up training courses in Wikipedia editing.

Aug 18 09:17

US says okay for teachers to spy on your kids in their bedrooms!

IT LOOKS LIKE PROSECUTORS are not going to get involved in the bizarre case of the school which switched on laptops to spy on students while they were in their own bedrooms. US Attorney Zane David Memeger told USA Today, investigators had found no evidence of criminal intent by Lower Merion School District employees who activated tracking software that took thousands of webcam and screenshot images on school-provided laptops.

Webmaster's Commentary: 

Those parents ought to buy their own kids laptops and send the school issued ones back ... in pieces!

Aug 18 07:12

Former Pakistani Intel Chief Fears World War Three Is Imminent

Gul reiterated his stance on the 9/11 attacks, that it was a black operation to be used as a pretext for entering Afghanistan and using it as a launch pad to enter Pakistan and dominate the region.

Gul also spoke about the evidence that the 2008 Mumbai terror attacks were a Western controlled intelligence operation that was to be blamed on Pakistan, a claim he made shortly after the attacks which has since been vindicated by mainstream reports that US and Indian undercover agents were involved in the attacks.

The General also spoke on the death of former Pakistan leader Benazir Bhutto, reasserting his previous analysis that Bhutto was eliminated by a neocon controlled assassination squad after she “became rebellious” toward globalist interests.

Aug 17 13:02

Google still censoring Climategate?

For many weeks now, readers have been sending me emails describing how Google has been doing its best to hide information relating to Climategate, which has been the single biggest story on the Internet since the Climategate emails came to light on November 19. By Nov. 26, the term had gone viral and Google returned more results for “climategate” (10.4 million) than for “global warming” (10.1 million). As the Climate Scandal exploded, and increasing numbers of blog sites covered it, the number of web pages with Climategate continued to climb. On Dec. 7, Google’s search engine found 31.6 million hits for people who searched for “Climategate.”

Webmaster's Commentary: 

As an experiment, I searched "Michael Rivero" on Google and got 268,000 results. The same search at BING yielded 726,000 results.

Google doesn't love me any more!

Yahoo does not indicate the total number of records it finds. Wikipedia has flat-out banned any mention of me (one slipped through by accident apparently) and all the YouTube videos I did with Alex Jones have now been deleted.

Boo hoo, boo hoo. :P

Aug 17 12:13

Everything Is A Lie: The Deliberate Intent To Deceive People Is At An All Time High

From pollution to politics, the era of deception and duplicity has reached new heights and hijacked almost every form of media in the world. In the last frontiers for truth such as the internet, disinformation operations are in full swing to discredit and destroy any semblance of authentic and factual information available to the public.

Webmaster's Commentary: 

Lies are control. Truth is freedom.

Aug 17 11:56

Obama demands access to Internet records without court review

'Big Brother is watching you.' Yet another move toward a totalitarian government has secretly occurred that bears ominous signals for personal freedom.

Barack Obama is demanding access to the Internet records of average citizens, in secret, and without court review.

"The Obama administration is seeking authority from Congress that would compel internet service providers (ISPs) to turn over records of an individual's internet activity for use in secretive FBI probes.

"In another instance where Americans are urged to trust their political minders, The Washington Post reported last month that "the administration wants to add just four words--'electronic communication transactional records'--to a list of items that the law says the FBI may demand without a judge's approval."

Aug 17 09:31

Zionists Boast: "Our Internet Warfare Squad Controls The Web"

The Zionist state is accelerating its Hasbara campaign, by forming “Internet Warfare Squads”, their sole remit: to post pro-Israel responses on websites worldwide. This assault on free speech and effectively muzzling any criticism of Israel is a tool which will be used in the public relations war, the Zionist thought police are only a click away.

Aug 17 09:27

A reminder that Israel PAYS people to post pro-Israel propaganda on the internet!

Aug 16 13:50

Porno for Pessimists

I don’t need to remind you that—little more than a month after Lindgren and Harris mocked Celente’s wacky conspiracy theories—“Tea (Taxed Enough Already?) Party” protests began to pop up all across the nation to revolt against everything from TARP bailouts to mandatory health insurance.

Webmaster's Commentary: 

Every time the bloggers came out with a well considered prognostication about future events, the government and corporate PR shills would hurl ridicule and abuse, and attempt to silence our warnings that agreement with various policies would be to the benefit of the ruling class and detrimental to everyone else in the nation. But that was then and this is now and the hard reality is that the bloggers were for the most part correct while the corporate media and government promises and claims were so much empty air.

Today the citizen's media (a better name than blog-o-sphere IMHO) has won the lion's share of the audience, while the audience share and trust in the corporate media has plummeted. Most people get their political news off of the internet these days much to the annoyance of those who grew up with an unshakable sense of being able to lie with impunity as the path to power and great wealth.

We were telling you the truth. The government was lying. That situation persists to this very day.

Of course, as this article illustrates, neither the government nor the corporate media will ever outright admit they lied to the public. Those rising internet stars they cannot buy off or otherwise co-opt will simply be ignored as the powers that be struggle to find ways to sell the old lies in the new world.

Personally, I think the effort doomed to fail. The internet has changed the fundamental nature of how information flows in our society just as dramatically as Gutenberg's movable type printing and there is no going back. We are entering an age where government and business must be more honest with the public, or simply cease to exist. The age of lies is coming to an end. Truth is winning. Deal with it.

Aug 16 13:34

Disney, others sued over allegedly spying with 'flash cookies'

A lawsuit filed in federal court last week alleges that a group of well-known Web sites, including those owned by Disney, Warner Bros. Records, and Demand Media, broke the law by secretly tracking the Web movements of their users, including children.

Webmaster's Commentary: 

See Ghostery!

Aug 16 11:09

Ghostery

Ghostery sees the invisible web - tags, web bugs, pixels and beacons. Ghostery tracks the trackers and gives you a roll-call of the ad networks, behavioral data providers, web publishers, and other companies interested in your activity.

Aug 16 09:22

Facebook 'dislike' scam warning

Facebook users are being targeted in a scam that offers them a chance to install a "dislike" button.

The scam tricks users into allowing a rogue application to access their profile page, which then posts spam messages.

It also attempts to lure people into completing an online survey, for which the scammers are paid money.

Aug 15 23:14

Big Brother: Obama Demands Access to Internet Records, in Secret, and Without Court Review

The Obama administration is seeking authority from Congress that would compel internet service providers (ISPs) to turn over records of an individual's internet activity for use in secretive FBI probes.

In another instance where Americans are urged to trust their political minders, The Washington Post reported last month that "the administration wants to add just four words--'electronic communication transactional records'--to a list of items that the law says the FBI may demand without a judge's approval."

Aug 15 12:49

Knesset Outsources US Campus Public Diplomacy to Militant Christian Zionists

A bi-partisan group of Israel's Ministers of Kenesset (Israel's Parliament) has partnered with a Christian Zionist organization to recruit Evangelical students to represent Israel on US campuses:

Aug 15 12:25

Megaphone desktop tool

The Megaphone Desktop Tool gives the user the option of going to a particular site with a poll, and if the user chooses to go to the site, the software then casts a vote automatically, when this is technically feasible. The vote is chosen by the distributors of Megaphone.

Webmaster's Commentary: 

How Israel's shills try to hijack the internet!

Aug 14 09:30

Dell accused of hiding incriminating evidence in defect case

Dell stands accused of deliberately hiding emails that showed its top executives in the mid-2000s knew the company was shipping millions of defective computers, one of its customers alleged in court filings Thursday.

Web hosting provider Advanced Internet Technologies, which alleges Dell knowingly sold computers that contained faulty components, said it knows that senior executives were aware of the problems. It cites a list of talking points that showed then-chief executive Kevin Rollins, founder Michael Dell, and others discussing ways to publicly address the malfunctions, which involved capacitor failures in Dell OptiPlex computers. AIT claims Dell is deliberating withholding the release of additional documents.

Webmaster's Commentary: 

The story about the capacitors goes back a loooooooong way!

Aug 13 18:49

Explaining Net Neutrality In A Way Tea Partiers Can Understand

Recent news item: Tea Partiers coming out against Net Neutrality

Explaining Net Neutrality In A Way Tea Partiers Can Understand

Let's put this in a way Tea Partiers can understand. Let's say Mr. and Mrs. Tea Party Zealot love to use the Internet for political activism -- they frequent right-wing websites, send around clips of Hannity and Limbaugh, organize right-wing events, post sycophantic praise on Sarah Palin's website, the works.

But let's say their service provider is a (cue scary music) liberal company, which contributes heavily to Democrats. The media giant that this family pays for Internet access wants to make it easy for customers to access socialist content, send around pictures of Karl Marx, coordinate with the New Black Panther Party, and send money to gay illegal immigrants, but would make it exceedingly difficult to access RedState.com, visit Glenn Beck's activist sites, access Palin's Facebook age, etc.

Aug 13 14:15

Cops love iPhone data trail

• Every time an iPhone user closes out of the built-in mapping application, the phone snaps a screenshot and stores it. Savvy law-enforcement agents armed with search warrants can use those snapshots to see if a suspect is lying about whereabouts during a crime.

• iPhone photos are embedded with GEO tags and identifying information, meaning that photos posted online might not only include GPS coordinates of where the picture was taken, but also the serial number of the phone that took it.

• Even more information is stored by the applications themselves, including the user's browser history. That data is meant in part to direct custom-tailored advertisements to the user, but experts said some of it could be useful to police.

Aug 13 09:24

Obama Demands Access to Internet Records, in Secret, and Without Court Review

The Obama administration is seeking authority from Congress that would compel internet service providers (ISPs) to turn over records of an individual's internet activity for use in secretive FBI probes.

In another instance where Americans are urged to trust their political minders, The Washington Post reported last month that "the administration wants to add just four words--'electronic communication transactional records'--to a list of items that the law says the FBI may demand without a judge's approval."

Aug 13 05:49

Tea Baggers NOT in favour of net neutrality?

The Virginia Tea Party Patriot Federation was among the groups that signed the letter. Jamie Radtke, the group’s chairman, said interest in net neutrality is rising in the tea party movement.

“I’ve heard it talked about a lot more on conference calls I’ve been on [recently],” Radtke said. “It’s starting to get onto the radar now.”

Radke said the tea party opposition to net neutrality stems from concerns over increased government power.
------------------------------------------------------------------------------------------------------------

Aug 12 20:41

Windows XP SP2 could live on thanks to Grand Theft Auto

A GRAND THEFT AUTO hack allows users of Windows XP Service Pack Two (SP2) to still obtain security updates despite Microsoft not supporting the OS.

...

"It turns out that an SP2 system will think its SP3 if you edit this key: HKLM\System\CurrentControlSet\Control\Windows, and edit the DWORD value CSDVersion from 200 to 300 (and reboot)," said F-Secure.

"It worked for GTA IV, so we decided to test it with KB2286198. And our test worked, WindowsXP-KB2286198-x86-ENU.exe installed on our SP2 test system once we tweaked the registry. We also tested an LNK exploit, and it did not infect the system after the patch."

Aug 12 20:39

The Palm Pre OS can bug you

BUG YOUR FRIENDS if they have a Palm Pre because its OS can be manipulated thanks to a zero day flaw that can be exploited with the help of an SMS text message.

A security team at Basingstoke based MWR Labs has found that an SMS can be used to subvert the OS completely. The flaw would allow the phone to be used as a recorder and transmitter for anything in its microphone's range.

Aug 12 08:05

U.S. Marshals Storing Naked Body Scanner Images!

U.S. Marshals Storing Naked Body Scanner Images

Aug 12 07:47

Facebook bug spills name and pic for all 500 million users

A bug in Facebook's login system allows attackers to match unknown email addresses with users' first and last names, even when they've configured their accounts to make that information private.

The information leak can be exploited by social-engineering scammers, phishers, or anyone who has ever been curious about the person behind an anonymous email message. If the address belongs to any one of the 500 million active users on Facebook, the social-networking site will return the full name and picture associated with the account.

Aug 11 13:16

I guess WRH isn't the only patriot site hovering on the edge of being broke.

Webmaster's Commentary: 

The only way to get the big money out of politics is for the little money to unite in the common cause of freedom.

Aug 11 11:12

Cybersecurity Lie Exposed: Power Plants Are Not Connected To The Internet

Senator Joe Lieberman’s draconian Internet takeover legislation, the 197-page Protecting Cyberspace as a National Asset Act, is being promoted as a vital tool to protect vulnerable infrastructure hubs from terrorist attacks, but as a recent Wall Street Journal report makes clear, large industrial power and water plants are not even connected to the public Internet.

We are constantly told that the Internet needs to be subject to government control because cyberterrorists could hack in and bring down the national power grid. However, the vast majority of the U.S. power infrastructure is not connected to the Internet. It will only be connected to the Internet if the government accelerates the implementation of “smart grid” technology, so in this sense, the government itself is leaving the power grid more vulnerable to hackers by its own programs.

Aug 11 10:41

Ryan Dawson needs donations

Webmaster's Commentary: 

I know it is a pain to keep hearing how the patriot blogs need money, but these are hard economic times for us all, and the big money goes to the people willing to lie to you to sell you a war, or a new tax, global warming, why BP is the sweetest-smelling oil company in the world, or why critics of Israel are "weak-minded fools."

The only way to defeat the big money is for all the little money to step forward and get involved. Without your continued support, even in small donations, we can lose more of the patriot blogs including Ryan's (and WRH).

I understand how Ryan feels about asking for help to replace his camera, but right now we are all dependent on the public to keep us running.

In Ryan's case, his camera with which he makes his web broadcasts has been destroyed, and he needs some help to purchase a new one.

Aug 11 09:56

Thousands of online banking customers have accounts emptied by 'most dangerous trojan virus ever created'

Thousands of British online banking customers have fallen victim to a sophisticated attack by cyber criminals who have stolen thousands of pounds from their accounts.

About 3,000 online banking customers have been victims of a computer virus attack that empties their accounts while showing them fake statements so the scam goes undetected.

Webmaster's Commentary: 

Or the bank just came up short and decided to blame hackers for it! Remember when Chase was limiting ATM withdrawals claiming a hacker attack no other banks reported, and it later turned out they were having cash flow problems they needed to hide from the public?

n/a
Aug 10 17:04

Snopes Exposed

I have recently discovered that Snopes.com is owned by a flaming liberal and this man is in the tank for Obama. There are many things they have listed on their site as a hoax and yet you can go to You tube yourself and find the video of Obama actually saying these things. So you see, you cannot and should not trust Snopes.com, ever for anything that remotely resembles truth! I don't even trust them to tell me if email chains are hoaxes anymore.

Webmaster's Commentary: 

All anyone needed to do is look at how Snopes handled 9-11 truth to know they are gatekeepers.

Aug 10 15:31

Google and Verizon Usher in the Internets

Monday's announcement that Verizon and Google will create a distinct wireless experience put net neutrality discussions not so much on the back burner as in the recycling bin.

Although early speculation suggested that the corporate giants were going to create the equivalent of an E-Z Pass lane for content providers willing to pay for higher content speeds, the actual plan is to create not just what amounts to a distinct "set of pipes" to funnel high-bandwidth content, but to also clearly define the wireless Internet as a rules-free zone that allows providers to determine what content reaches consumers.

Aug 10 12:10

Hawaii Internet Slow Down could last a Month or More!

This should not come as a surprise because basic bandwidth speeds have not increased here significantly in many years. We have waited and waited for promised increased speeds and it has never happened. This incident makes it very obvious that they do not have the infrastructure in place to handle increased speeds. If one fiber cable is damaged resulting in this massive decrease in available service it is obvious that they have not been investing in infrastructure . This should be a wake up call to Oceanic.

Aug 10 11:10

Website Grader, Quantcast, Compete, Alexa, Awstats - Accurate Web Analysis?

In reality, Alexa is the target of technically gifted webmasters who manage to inflate the rank of their sites, and thus deflate the rank of all other sites. It was fine when it started, but no longer.

Webmaster's Commentary: 

Crap.

Aug 10 08:00

South Korea Police Raid Google Office

The South Korean police raided the offices of Google Korea on Tuesday as part of an investigation into whether the company illegally collected and stored personal wireless data.

Aug 08 22:17

Market Data Firm Spots the Tracks of Bizarre Robot Traders

The trading bots visualized in the stock charts in this story aren't doing anything that could be construed to help the market. Unknown entities for unknown reasons are sending thousands of orders a second through the electronic stock exchanges with no intent to actually trade. Often, the buy or sell prices that they are offering are so far from the market price that there's no way they'd ever be part of a trade. The bots sketch out odd patterns with their orders, leaving patterns in the data that are largely invisible to market participants.

Aug 08 16:24

More bashing of the internet ahead of mandatory government controls?

Popular classified ad website Craigslist has come under fire for profiting off of illegal prostitution ads. While Craigslist executives insist that they screen ads posted to their "adult services" section, police and anti-human trafficking advocates say the site has become a hotbed for online prostitution, which often involves underage women forced into the sex trade.

Aug 08 14:25

Virus Attacks Siemens Plant-Control Systems

Computer hackers have designed a virus that targets industrial control systems built by German engineering giant Siemens AG, activating a kind of malicious software that analysts say represents a growing corporate-espionage threat.

The virus, dubbed Stuxnet, is spread by devices plugged into USB computer ports. It is programmed to try to steal data from computer systems that are used to monitor large automated plants built for anything from manufacturing to power generation to water treatment. Siemens is one of the world's largest makers of such industrial automated systems, though it doesn't break out its annual revenue from such sales.

Webmaster's Commentary: 

BULL BISCUITS!

As this article confirms, plant control systems are not tied into the public internet. The virus has to be inserted using a USB device.

So why would hackers, who are into money, porn, identity theft, and cramming Viagra ads into your mailbox going to waste their time on a virus for a refrigerator factory assembly line control system?

Folks, this is a hoax. The government needs to find a way to control the internet because they are in a panic that the world sees them for what they really are. So they are going to have "Terrorists" at you (as if terrorists could destroy this nation any more badly that Federal fiscal policy already has) to trick you into accepting more locks and controls on your computer and internet. For your own good, of course.

But stop and think about it. There is no financial reason for hackers to waste their time with factory computers (which are actually rather boring). Real enemies of the United States are not going to waste their time on refrigerator factory assembly line control systems. They would go after military systems which are already secure. Or they would go after the NCA comm systems (again, already secure) or even the IRS computers.

This claim that factory computers are under threat is just more bovine excrement to limit freedom of speech and justify handing several million dollars to some congresscritters donor who is in computer security.

Aug 08 10:03

Greek blogger shot down in Athens

Sokratis Giolias, 37, was shot down before his home in Athens after men possibly dressed in police uniforms rang his bell and said his car had been robbed. They shot 16 bullets of the 19 mm caliber at him.

Webmaster's Commentary: 

Latest word is that it was the police who gunned him down.

Aug 08 09:48

Digital Education vs. the Ruling Elite

Ruling elites as recently as 1600 appealed to God to justify their continuing rule. This was called the divine right of kings: rulership beyond any earthly court of appeal. That began to be undermined in the second half of the seventeenth century. A century later, Enlightenment democratic theory had replaced the divine right of kings. The divine right of Parliament or the divine right of the People replaced it.

This forced a major strategic change on the ruling elite. The ruling elite has to pretend that it does not exist. It formally acknowledged the legitimacy of the People as the final court of appeal. This involved training and screening the judges.

Aug 08 00:26

Sweden To Attend US-Led Military Drill

Sweden will take part in an American military drill to practice defence strategies in case of an Internet attack, Swedish Radio News reports.

Staff from the National Defence Radio Establishment and the Swedish Civil Contingencies Agency will take part in the drill, scheduled for September, which will focus on protecting countries against attacks from hackers and states that are hostile towards the West.

“Cyber Storm 3” is the largest military drill so far to focus on computer trespassing and is organised together with the US Department of Homeland Security, the Central Intelligence Agency and the Department of Defence.

Finland and Norway are also taking part in the drill.

Aug 06 13:00

Apple devices are vulnerable to attack, say German security officials

Several Apple devices including the iPhone and iPad have two critical security weaknesses for which no patch exists, the German government warned last night.

Users of Apple mobile devices should only use websites they deem trustworthy and refrain from opening PDF files until Apple releases a fix, Germany's federal office for information security said.

"This allows potential attackers access to the complete system, including administrator rights," the statement warned. "It has to be expected that hackers will soon use the weak spots for attacks."

Aug 06 10:28

The Trust Crisis with Regulating Net Neutrality

Activist Post

Since it was reported that Google and Verizon are close to a deal on so-called "net neutrality," the policy debate has heated up in Washington. Of course the debate has very little to do with the actual mechanics of how net neutrality will work, rather who will get the control to regulate it.

However, now that the FCC has abandoned negotiations on a "net neutrality" compromise, it is looking like the Congress will ultimately establish the rules -- handed down to them by their corporate masters. It seems the Elite's fight over who controls the dial has been decided. One thing is for sure, whoever controls the speed dial on the Internet will control the entire Web and subsequently all flow of information.

Aug 05 19:08

FCC Abandons Efforts for Net Neutrality Compromise: Allows Google and Verizon to Write the Regulations

AP

WASHINGTON — Federal regulators are abandoning efforts to negotiate a compromise on so-called "network neutrality" rules intended to ensure that phone and cable TV companies cannot discriminate against Internet traffic traveling over their broadband lines.

The announcement Thursday by the Federal Communications Commission ends weeks of FCC-brokered talks to try to reach an agreement on the thorny issue among a handful of big phone, cable and Internet companies. And it comes as two big companies that have been taking part in those talks – Verizon Communications Inc. and Google Inc. – attempt to hammer out their own separate proposal for how broadband providers should treat Internet traffic.

Aug 05 16:00

Net neutrality is foremost free speech issue of our time

Back in the 1990s, Congress rescinded rules that prevented television networks from owning their own programming. Network executives swore in congressional hearings that they wouldn't give their own programming preferred access to the airwaves. They vowed access to the airwaves would be determined only by the quality of the shows.

I was working at NBC back then, and I didn't buy that line one bit. Sure enough, within a couple of years, NBC was the largest supplier of its own prime-time programming. To take advantage of this new paradigm, Disney bought ABC, Viacom (the parent company of Paramount) bought CBS and NBC merged with Universal.

Aug 05 11:43

Using Google Earth to Find Tax Cheats

Webmaster's Commentary: 

"ALL YOUR MONEY ARE BELONG TO US!!!!" -- Official White Horse Souse

Aug 05 11:38

Google, Verizon Web Deal Could Upend Net Neutrality

Washington -- Google Inc. and Verizon Communications Inc. are close to finalizing a proposal for so-called "network neutrality" rules, which would dictate how broadband providers treat Internet traffic flowing over their lines, according to a person briefed on the negotiations.

A deal could be announced within days, said the person, who did not want to be identified because negotiations are still ongoing. According to the New York Times, the agreement between Google and Verizon "could allow Verizon to speed some online content to Internet users more quickly if the content's creators are willing to pay for the privilege."

Aug 05 11:20

Massive Censorship Of Digg Uncovered

A group of influential conservative members of the behemoth social media site Digg.com have just been caught red-handed in a widespread campaign of censorship, having multiple accounts, upvote padding, and deliberately trying to ban progressives. An undercover investigation has exposed this effort, which has been in action for more than one year.

Aug 05 10:38

DHS Deploys Special Teams to Battle Hackers in Cyber War for Infrastructure

Just hours before reports emerged that hackers were for the first time attempting to take over specific infrastructure plants, a former CIA director told ABC News that weaknesses in critical infrastructure systems in the U.S. were among the country's greatest threats to national security.

Webmaster's Commentary: 

This is just a propaganda tactic to convince people that the internet must be brought under tight government control "for your own safety." But stop and use your common sense. Hackers do what they do to make money. They steal credit card data and "ping" each one for a few bucks to make millions. They steal identities to buy whatever they buy with their stolen credit card data.

There is hardly a profit motive going after infrastructure, because there is no way to collect an extortion payment that does not provide the opportunity for a capture. The risk is far higher while the financial rewards cannot compete with the fees paid to hackers to pump viagra and porn ads into every mailbox!

n/a
Aug 04 14:24

GOOGLE HARASSMENT? … or WORSE??

I was just informed that zionist ads sponsored by Google are appearing at the end of my posts.

Webmaster's Commentary: 

It appears that wordpress is selling ad space to Google Adsense, who in this particular case showed no taste at all putting an ad for AIPAC on Desert Peace! :)

Aug 04 11:45

Jane Bürgermeister - Bloggers Persecuted & Declared Insane to Silence Dissent

Aug 04 10:55

Saudi Arabia announces Blackberry messenger deadline

Saudi Arabia's telecoms watchdog has called on telecoms firms in the country to block the messenger function on Blackberry handsets from Friday.

The watchdog said the ban would last until the state's three mobile phone operators "fulfil the regulatory requirements it has requested".

But the Communications and Information Technology Commission (CITC) did not reveal what these requirements were.

The United Arab Emirates threatened on Sunday to ban some Blackberry services.

Webmaster's Commentary: 

Apparently, the assassination in Dubais involved the use of Blackberries by Mossad.

Aug 04 10:12

U.S. To Train 3,000 Offshore IT Workers in South Asia

Despite President Obama's pledge to retain more hi-tech jobs in the U.S., a federal agency run by a hand-picked Obama appointee has launched a $22 million program to train workers, including 3,000 specialists in IT and related functions, in South Asia.

Following their training, the tech workers will be placed with outsourcing vendors in the region that provide offshore IT and business services to American companies looking to take advantage of the Asian subcontinent's low labor costs.

As recently as Monday, Obama, speaking at a Democratic fundraiser in Atlanta, boasted about his efforts to reduce offshoring. The President said he's implemented "a plan that’s focused on making our middle class more secure and our country more competitive in the long run -- so that the jobs and industries of the future aren’t all going to China and India, but are being created right here in the United States of America."

Aug 03 11:54

Obama Information Czar Outlined Plan For Government To Infiltrate Conspiracy Groups

Harvard law professor Cass Sunstein, Obama’s appointee to head the Office of Information and Regulatory Affairs, outlined a plan for the government to infiltrate conspiracy groups in order to undermine them via postings on chat rooms and social networks

Webmaster's Commentary: 

Just in case you wondered why all of a sudden there were so many postings about HAARP, chemtrails. and Bigfoot showing up here at WRH (then being deleted as soon as I see them).

Aug 03 10:19

DOJ Report Says Child Porn On the Rise

The report, ordered by Congress in legislation approved two years ago, concedes that the market for child pornography continues to grow rapidly and determining its size is impossible. "The number of offenders accessing the images and videos and the quantity of images and videos being traded is unknown," the report said.

Webmaster's Commentary: 

I would start with the clergy, then add SEC, MMS, the Pentagon, and maybe even the EPA, which has been waiting 16 years for data on the toxicity of 2-methylnapthalene when a 30 second search reveals it is a potent carcinogen!

Aug 03 08:24

The Web's New Gold Mine: Your Secrets

Hidden inside Ashley Hayes-Beaty's computer, a tiny file helps gather personal details about her, all to be put up for sale for a tenth of a penny.

The file consists of a single code— 4c812db292272995e5416a323e79bd37—that secretly identifies her as a 26-year-old female in Nashville, Tenn.

The code knows that her favorite movies include "The Princess Bride," "50 First Dates" and "10 Things I Hate About You." It knows she enjoys the "Sex and the City" series. It knows she browses entertainment news and likes to take quizzes.

Aug 03 07:09

The Man with the Bullhorn is a Lying Sack of Shit.

I wrote him to ask for the information and he said, basically, “Screw all of that. What do you mean by, how I feel about you? I love your wonderful writings.” I thought, WTF? It turned out that, all of a sudden, he never had gotten any of my mail and this went on for two weeks during a period when it had never happened before. My not denouncing him made me feel pretty good in the aftermath.

Aug 02 15:52

Project Vigilant and the government/corporate destruction of privacy

So, while Lamo has repeatedly denied (including in his interview with me) that he ever worked with federal authorities, it turns out that he was a "volunteer analyst" for an entity which collects private Internet data in order to process it and turn it over to the Federal Government.

Aug 02 15:08

How to Avoid the Prying Eyes

The Internet is rife with surveillance technology, but you can cover some of your tracks

To launch IE8 in InPrivate browsing mode by default do this.

Aug 02 13:23

First Web-based Jailbreak for iPhone 4 arrives; here's how to do it

Webmaster's Commentary: 

A recent court ruling has declared that jailbreaking your own equipment is not a violation of the DMCA. So have fun, but remember that once you step past Apple's boundaries, you are on your own and if you do not know what you are doing, you can wreck your phone. Final note is that this web system is VERY busy and it will probably take a while to complete the process.

Aug 02 09:08

Elite Cyber Group Comes Over Ground To Recruit Hackers

Webmaster's Commentary: 

A private contractor wrapped in the flag is hiring hackers to attack websites the government does not like.

Aug 01 13:27

ASSEMBLING THE EVIDENCE FOR HIGH LIKELIHOOD OF COMING THIRD WORLD WAR

In no particular order, these are the salient points that are converging, rapidly, screaming out our inexorable collision with National disaster:

–Very high levels of saber-rattling by lots of influential people, both in the US and abroad, both “allies” and “enemies” in recent weeks, more so than usual.

–Huge build-up of Naval forces, US and Israeli, munitions, in Gulf AO.

–Key positions in US military, all branches, held by Israeli dual citizens

Jul 31 05:54

GORDON DUFF: WIKI-LEAKS IS ISRAEL, LIKE WE ALL DIDN’T KNOW

Now “Wiki-Leaks” is busy selling phony bin Laden stories, having the long dead Osama humiliating the CIA by running around villages in Afghanistan selling vacuum cleaners. What is our “leak” site really about? This is a dead news cycle. The World Cup is over, lots of people on holiday and no major stories. Only in a dead news period like this, as Oliver Stone pointed out, could the Israeli controlled media dump a pile of lame rumors mixed in with box loads of chickenfeed, passing it off as the story of the century.

Jul 30 11:46

Wiki-Leaks is Israel

Now “Wiki-Leaks” is busy selling phony bin Laden stories, having the long dead Osama humiliating the CIA by running around villages in Afghanistan selling vacuum cleaners. What is our “leak” site really about? This is a dead news cycle. The World Cup is over, lots of people on holiday and no major stories. Only in a dead news period like this, as Oliver Stone pointed out, could the Israeli controlled media dump a pile of lame rumors mixed in with box loads of chickenfeed, passing it off as the story of the century.

Webmaster's Commentary: 

The internet is an intellectual jungle, where lies and liars are quickly exposed and savaged. That is the new reality. This is survival of the fittest, which means survival of the most accurate, where winning by spending enough money to force people to believe as they are told to believe is an obsolete relic of a bygone age.

The downfall of WikiLeaks illustrates that principle.

A large amount of expense and effort was spent to build up WikiLeaks' reputation as a whistle blower site, even though there were older and more established whistle blower websites in operation. The first inkling that there might be a problem was that ABCNNBBCBS was pumping what a "dangerous" website WikiLeaks was, by way of attracting attention to the place.

And, as it the classic case of a bait-and-switch propaganda campaign, WikiLeaks did leak out some damaging info early on to build credibility. But whereas a TV newsreader can build an audience by being truthful, then start to lie to them with impunity, any blog news source is only as credible as their last release, because of the interactivity of the medium. Trust in WikiLeaks, years in the building, appears to have vanished almost overnight, both with the inclusion of the long dead Osama Bin Laden in the leaked Afghan logs, and Julian Assange's open disdain for the 9-11 truth movement.

The environment has changed. The old methods no longer work. Those entities that cannot evolve and adapt to the new reality must go extinct. WikiLeaks just demonstrated that hard fact.

Jul 30 10:58

U.S. Copyright Group ‘Steal’ Competitor’s Website

The U.S. Copyright Group (USCG) has been all over the news in recent months. The lawyer group sued thousands of BitTorrent users who allegedly file-shared motion pictures belonging to their clients, including the Oscar-winning Hurt Locker. However, it turns out that USCG are not copyright purists either, as they have blatantly copied the website of a competitor without permission.

Jul 30 10:48

THE RULING ELITE CALLED

I just got off the horn with the Ruling Elite. We had an emergency conference call and to tell you the truth, they ain’t happy. You little people are not responding the way you are supposed to. A significant portion of you are not getting more optimistic because they tell you to. Instead of just reading the headline on Bloomberg that durable goods orders skyrocketed in June, you actually read the details that said durable goods orders plunged. It is getting difficult for the ruling elite to keep the masses sedated and dumbed down. These damn bloggers, with their facts and critical thinking, are throwing a wrench into the gears.

Webmaster's Commentary: 

Guilty as charged.

Jul 30 10:40

Breaking a Promise on Surveillance

It is just a technical matter, the Obama administration says: We just need to make a slight change in a law to make clear that we have the right to see the names of anyone’s e-mail correspondents and their Web browsing history without the messy complication of asking a judge for permission.

It is far more than a technical change. The administration’s request, reported Thursday in The Washington Post, is an unnecessary and disappointing step backward toward more intrusive surveillance from a president who promised something very different during the 2008 campaign.

Jul 30 10:37

DND computers used to change Wikipedia site

A Defence Department spokesperson confirms computers at the department's research agency were used to alter a Wikipedia page entry about the Joint Strike Fighter jet and the Conservative government's decision to spend as much as $18 billion on the aircraft.

Jul 30 10:17

WHATREALLYHAPPENED.COM - The Ultimate Online News Source

WhatReallyHappened.com is perhaps the greatest online news site explaining the history and politics behind current world events. If you want to know what's really going on visit WRH.com.

Those who are new to the alternative media will soon understand that the critical decisions made by our political leaders are not simply the result of left or right wing points of view. This left/right idea is a false paradigm in many instances. What we are dealing with are often examples of outright corruption- violations of Law, not ideological leanings (ie. the invasion of Iraq).

Jul 30 10:16

White House proposal would ease FBI access to records of Internet activity

The Obama administration is seeking to make it easier for the FBI to compel companies to turn over records of an individual's Internet activity without a court order if agents deem the information relevant to a terrorism or intelligence investigation.

The administration wants to add just four words -- "electronic communication transactional records" -- to a list of items that the law says the FBI may demand without a judge's approval. Government lawyers say this category of information includes the addresses to which an Internet user sends e-mail; the times and dates e-mail was sent and received; and possibly a user's browser history. It does not include, the lawyers hasten to point out, the "content" of e-mail or other Internet communication.

Jul 30 09:51

ANOTHER ‘NEWS’ SITE GONE SOUR

Rebel News WAS one of the sources of these submissions…. at least until this morning. The site is administered by an Ausralian anti Semite and certified nutcase named Andrew Winkler. His former site was called ziopedia.

The names of sites he choses give the impression that factual information will be presented…. BUT, on the contrary, they are nothing but sounding boards for pure, unadulterated anti Semitism. The sites are also his vehicle to wage attacks against true activists involved in the Palestinian cause.

Below is his latest example of hatered…. in the form of an ’editorial’ sent out this morning…. an ‘editorial’ that promted this reply from me…

Jul 29 21:49

Canada's Defense Department computers used to change Wikipedia site

A Defence Department spokesperson confirms computers at the department's research agency were used to alter a Wikipedia page entry about the Joint Strike Fighter jet and the Conservative government's decision to spend as much as $18 billion on the aircraft.

Those edits included the removal of information critical of the government's plan to buy the jets and the addition of insulting comments aimed at Liberal Leader Michael Ignatieff.

Jul 29 14:06

Pennsylvania School District Accused of Spying on Students for Second Time

Jim Tate runs a computer and software store in Oklahoma City called Computer Nerdz. He said the software the school district installed in those laptops is a program that can be activated from a remote site in the event of a loss or theft.

"The software was designed to help the school district retrieve the laptop in the event that it was stolen from the student," Tate said.

But in Robbin's and Hassan's cases, the laptops were inside their homes and the web cams continued taking snap shots and screen grabs.

"I can understand why the parents would be absolutely outraged," said Jim Tate with Computer Nerdz.

Jul 29 13:43

Wiki "Leaks" - The final word?

"WikiLeaks is lame. Even the cover story, the mysterious Assange fleeing the murderous CIA, working to save the world is lame. Please, everyone, go to the site and read everything there. I have seen more confidential information on a weather report... When you read Mr. Assange’s output, you are looking at one of the Mossad games, nothing more... The game today is using Wikileaks, given its 15 minutes of fame for trashing the US in Iraq with the helicopter video, to spread imaginary stories about Pakistan, the only nuclear power in the Middle East capable of standing up to Israel, and the enemy of India"

[NB: Perhaps even more important, Pakistan is a staunch ally of China — a most dangerous liaison where USrael is concerned]

Jul 29 13:25

Wikileaks + MSM Hype = ?

Ladies & gentlemen, welcome to the 40th episode of New World Next Week - the video series from CorbettReport.com & MediaMonarchy.com. This week we look exclusively at the massive media hype surrounding Wikileaks, wider wars & the future of the web.

Sources & Documentation: http://www.youtube.com/watch?v=UjW4s5EtG6s&playnext=1&videos=l1vERo_w39Q

Jul 29 11:01

US wants increased police access to email: report

The White House wants to give the FBI easier access to the Internet activity of suspects without a court order, the Washington Post reported Thursday.

Webmaster's Commentary: 

Just as soon as We The People get the same exact access to all government emails.

Jul 29 10:58

Facebook privacy fears for 100m users as their personal details are published on file-sharing site

The privacy of millions of Facebook users has been jeopardised after some of their details were harvested and published on the internet.

An online security consultant who wished to highlight the social networking site's privacy issues published a list of data taken from more than 100million users' profiles.

Ron Bowles used a piece of code to scan Facebook profiles, collecting data not hidden by the user's privacy settings.

The list has been shared as a downloadable file which has now spread rapidly across the internet, prompting anger and concern from millions of users around the world.

Jul 29 10:51

Sherrod to sue blogger who released video clip

Former Agriculture Department employee Shirley Sherrod said Thursday she will pursue a lawsuit against conservative blogger Andrew Breitbart - the man responsible for posting an edited video clip of Sherrod appearing to say she discriminated against a white farmer looking for assistance.

Webmaster's Commentary: 

Andrew Breitbart will immediately point the finger at whoever gave him the clip, and THAT should be an interesting story!

Jul 29 09:06

FBI backs record-keeping on prepaid cell phones

FBI Director Robert Mueller has endorsed anti-terrorism legislation that would require prepaid cell-phone sellers to keep records of buyers' identities.

Webmaster's Commentary: 

And the end result of all that expense and bureaucracy is that real terrorists (and even the Mossad and CIA fakes) will simply start every operation by stealing a bunch of cell phones. Good thinking Mueller! You are the perfect government official, able to spend a ton of money on a program that won't really accomplish anything.

n/a
Jul 28 23:05

Google and CIA Invest in ‘Future’ of Web Monitoring - Pre Crime

The investment arms of the CIA and Google are both backing a company that monitors the web in real time — and says it uses that information to predict the future.

“We’re right there as it happens,” Ahlberg told Danger Room as he clicked through a demonstration. “We can assemble actual real-time dossiers on people.”

SHARE THIS ARTICLE WITH YOUR SOCIAL MEDIA