COMPUTERS/INTERNET/SECURITY | WHAT REALLY HAPPENED

COMPUTERS/INTERNET/SECURITY

Aug 05 15:52

Spike in government demands for Amazon customer data: Firm reports a 77 PERCENT increase in subpoenas for information on Alexa, Kindle and Ring users in the last six months

Amazon says that U.S. government requests for customer data have seen a substantial spike so far this year.

As reported by TechCrunch, the most recent figures released from the company -- which date between January and June 2019 -- show a 14 percent increase in subpoenas and a nearly 35 percent increase in the number of search warrants.

Information handed over by the company comes from several sources according to TechCrunch, including Amazon's Echo voice assistant, Alexa, its e-reader, the Kindle, and even its home security devices sold by Ring.

Aug 05 15:46

Sites using Facebook ‘Like’ button liable for data, EU court rules

According to the European Court of Justice ruling, a site that embeds the Facebook “like” icon and link on its pages also sends user data to the US web giant.

“It seems that that transmission occurs without that visitor being aware of it and regardless of whether or not he or she is a member of the social network Facebook or has clicked on the ‘Like’ button,” it said.

Under EU data protection law, therefore, a European retailer and the US platform are jointly responsible for gathering the data and sending it to Facebook’s Irish subsidiary.

Users should therefore be warned and asked to consent to their data being gathered, although the retailer is not responsible for what Facebook does with it later.

“As a result of this case, companies that embed this ‘like’ button on their website cannot hide behind Facebook any longer,” said Monique Goyens, of the European Consumer Organisation.

Aug 05 15:32

Scientists Announce They Can Manipulate Brain Cells with Smartphone-controlled Implant

By B.N. Frank

It’s bad enough that they have already been testing these on defenseless mice. Have they considered any or all of the risks associated with implanting these in people, including the potential for hacking these implants?...

Aug 05 12:32

Trump Demands Gun Control, Executions For 'Hate Crimes,' Asks DOJ & Social Media to Detect Pre-Crime

President Donald Trump on Monday demanded anti-Second Amendment "red flag" gun seizure laws, swift executions for so-called "hate crimes," "involuntary confinement" for people the state deems "mentally disturbed," and directed the DOJ to work with states, local law enforcement and social media sites to "detect mass shooters before they strike" -- all while repeating generic leftist slogans about "hate."

Aug 05 10:25

THE METADATA TRAP

Most people aren’t very aware of it, but we’re all under surveillance. Telecom companies and tech giants have access to nearly all of our private data, from our exact physical locations at any given time to the content of our text messages and emails. Even when our private data doesn’t get sent directly to tech companies, our devices are still recording it locally. Do you know exactly what you were doing on your computer two months ago today at 3:05 p.m.? Your web browser probably does.

Aug 05 10:16

Facebook and Instagram go down as thousands of users worldwide complain they cannot log in or upload pictures

Facebook and Instagram have reportedly crashed with thousands of users around the world unable to post, share content or even log into their accounts.

Instagram users reported they have not been able to log into their accounts, with other problems being reported since around 2.30pm today.

Users of Facebook were also experiencing problems sharing photos, video and files.

Aug 05 08:44

Apple will end up doing what Intel could not

With its recent billion dollar purchase to take Intel's scrapped 5G modem business off its hands, Apple is more in control of its destiny than ever.

A cursory analysis would quickly reveal that Cupertino is more than happy to lessen its reliance on Qualcomm, a company that Apple is unlikely to send a Christmas card to any time soon.

It continues Apple's long tradition of bringing more of its component design in-house, and while Intel could not hit its own targets, the silicon powerhouse that is Apple is more than likely to turn that around in the coming years.

That would eventually leave the memory chip as the only major piece of silicon within an iPhone that remains out of Apple's hands. It's a heck of a place for a phone maker to be.

Aug 05 08:24

A.I. “RoboCops” Continue Rolling Out Across U.S. Collecting Biometrics and Creating Blacklists

By Nicholas West

The move toward using robots in law enforcement, private security, and even to scare away the homeless, has been a decade-long trend that is now becoming much more prevalent in everyday life.

“RoboCops” have now been launched coast to coast in 16 states. Muckrock recently obtained a cache of documents about the latest system being used in Huntington Park, CA...

Aug 05 06:24

YouTube Censorship Drives Uptake of Crypto-Powered Video Platforms

By Kai Sedgwick

If the prospect of greater privacy and financial sovereignty doesn’t lure the masses to crypto networks, perhaps the ability to speak freely will. Lately, a lot of people who couldn’t give a damn about peer-to-peer cryptocurrency have taken a shine to peer-to-peer networks that run on the same censorship-resistant principles. As social networks run amok, deplatforming users for the slightest provocation, decentralized alternatives start to look increasingly alluring. If YouTube, Facebook, Twitter et al. continue on their current path, they may become the architects of their own downfall, accelerating the exodus to web3...

Aug 04 18:31

FREE e-Book, “The Book of Broken Promises: $400 Billion Broadband Scandal & Free the Net”

By B.N. Frank

Free Book Explains How Americans Have Become Powerless Against Telecom Companies

In June, Bruce Kushnick and The IRREGULATORS won their first round against the Federal Communications Commission (FCC) for ripping off the American taxpayers and putting us all at risk...

Aug 04 10:55

U.S. Air Force and Raytheon Join Navy and Lockheed Martin by Introducing Directed Energy Weapons

By Nicholas West

After many years of speculation as to weather the use of Directed Energy Weapons in war would be unleashed upon the world, we now have our answer...

Aug 04 10:13

S&P Bearish on 5G, Tesla’s Coil and the T-Mobile Merger

By Renee Parsons

The FCC, the telecoms and cooperating MSM continue their resolute PR campaign to sell 5G to an unsuspecting American public as if the technology is up and running at effortless full capacity. The truth is that even as ‘spotty’ coverage is being established in large urban markets, the telecoms are well aware that there are fundamental uncertainties yet to be addressed which may take years before widespread distribution can be accomplished.

The industry is driven by the hard reality that consumer indifference to increased data speed may be enough to threaten a return on their $275 billion investment...

Aug 03 16:38

French Court Rules Against Utility Smart Meters Because They Are Making People Sick

By B.N. Frank

Tens of millions of utility Smart Meters have been installed throughout the U.S and around the world so it’s likely that they are installed on your home and throughout your community whether you know it or not. There are many problems associated with them including adverse health effects and fires.

Merci beaucoup to the French court for ruling against these dastardly devices for health reasons and to the lawyer who continues to fight on behalf of complainants...

Aug 03 16:19

Telecom Construction Expert Offers Opinion on YouTube Video of Dead Bees Under 5G Cell Towers

By B.N. Frank

Earlier this week, Activist Post reported about the viral YouTube video that shows dead bees under what was reported to be 5G small cells installed in California.

A Telecom Industry Construction Expert has weighed in and provided information that is equally if not more depressing...

Aug 03 07:41

NSA Whistleblower Edward Snowden Says Facebook, Instagram Spying On Customers — Wants To Help Combat Surveillance

By Aaron Kesel

National Security Agency whistleblower Edward Snowden wants to fight back against corporate surveillance by Instagram and its parent company Facebook, as well as YouTube, which is owned by Google.

In a tweet rant posted on Twitter, Snowden expressed that both social media giants owned by Mark Zuckerberg were involved in spying on their users, as well as YouTube. Snowden also announced that he has created new accounts on the platforms and that he will explain how the sites spy on users. He added, that he would “explain methods to limit how much they know about you,” if you choose to use them...

Aug 03 06:17

Pentagon Testing Mass Surveillance Balloons to Spy on Vehicles Across the US

By Julia Conley

Millions of Americans across the Midwest this summer are being subjected to surveillance from above as the Pentagon experiments with the use of surveillance radars attached to high-altitude balloons.

As The Guardian reported Friday, the defense and aerospace contractor Sierra Nevada Corporation was authorized by the Federal Communications Commission (FCC) to send up to 25 balloons across six states to track vehicles.

U.S. Southern Command commissioned the project for the stated purpose of creating a “persistence surveillance system” to deter drug traffickers and perceived “homeland security threats.”...

Aug 02 17:33

Microsoft Slammed For Investment In Israeli Facial Recognition ‘Spying On Palestinians’

Microsoft is under fire for funding the Israeli facial recognition company AnyVision, which is reportedly carrying out surveillance on Palestinians. AnyVision also supplies technology in Russia and Hong Kong, where human rights are under attack.

Privacy activists say it’s another sign Microsoft is pushing the controversial technology, despite presenting itself as more progressive and transparent on the ethics of facial recognition than rivals like Amazon and Google.

Aug 02 17:27

Capital One breach also hit other major companies, say researchers

The data breach at Capital One may be the “tip of the iceberg” and may affect other major companies, according to security researchers.

Israeli security firm CyberInt said Vodafone, Ford, Michigan State University and the Ohio Department of Transportation may have also fallen victim to the same data breach that saw more than 106 million credit applications and files copied from a cloud server run by Capital One by an alleged hacker, Paige Thompson, a Seattle resident, who was taken into FBI custody earlier this week.

It follows earlier reports from Forbes and security reporter Brian Krebs indicating that Capital One may not have been the only company affected, pointing to “one of the world’s biggest telecom providers, an Ohio government body, and a major U.S. university,” according to Slack messages sent by the alleged hacker.

Aug 02 17:21

Hey, Apple! 'Opt Out' Is Useless. Let People Opt In

Like Google and Amazon before it, Apple has been caught sending voice assistant recordings to contractors, who listen to snippets of your requests and conversations, without telling anyone. In response to the privacy concerns that raises, Apple says it will eventually give users control over whether their Siri data gets sent to third-party eavesdroppers, but it's unclear whether that consent will be opt-in or opt-out. Google and Amazon offer the latter. And it's not nearly good enough.

Letting people opt out of data collection is better than not giving them any choice at all. But for decades, that’s been the extent of the conversation. It gives too many giant tech companies plausible deniability for the rampant hoovering of your personal information and allows them to implicitly blame the victim when they overreach: Don’t get angry at us, you could have opted out this whole time. Here’s a simple suggestion: Let people opt in, instead.

Aug 02 16:23

What would Milton Friedman say about Bitcoin? - Naomi Brockwell


Milton Friedman was one of the twentieth century’s most inspiring champions of individual liberty. He was the 1976 winner of the Nobel Prize in economics, and in this 1999 interview he spoke about the need for an internet currency that couldn't be tracked.

Aug 02 16:17

Facebook “glitch” allowed adult pedophiles to openly chat with underage children… was it really a glitch?

Messenger Kids, a “safe” chat app that Facebook recently introduced for underage children and their friends to talk to each other, has already made the news in a not-so-good way for a serious design “flaw” that allowed adult pedophiles to join children’s “parent-approved” group chats.

According to reports, the “technical error,” as Facebook is calling it, allowed the “friends” of underage Facebook users to create group chats with adult Facebook users that had not first been pre-approved by these children’s parents. Facebook has since “turned off” the group chat feature....

Aug 02 11:48

Jeffrey Epstein became an FBI INFORMANT to secure sweetheart deal and shut down federal probe into the pedophile's abuse of underage girls, government records reveal

Jeffrey Epstein managed to shut down a federal probe into his illicit and illegal activities with underage girls and secure his sweetheart plea deal by providing information' to the government, FBI reports confirm.

A federal investigation into the pedophile led by the FBI was closed out on September 18, 2008 when Epstein 'provided information to the FBI as agreed upon' according to the case agent.

That investigation had been underway for two years at that point, but it was noted in the final report that 'no prosecution will occur in this matter as long as Epstein continues to uphold his agreement with the State of Florida.'

The investigation had been dormant for seven months by then, with FBI records obtained by DailyMail.com showing that the lead agent had not filed a report since February 11 at the time he closed the case.

Webmaster's Commentary: 

Just when I think that the FBI (the Federal Bureau of Ignominy) cannot possibly sink lower than it already has, it surprises me, hiring a hideous miscreant like Epstein.

When the absolutely "morally wrong", such as serially raping under-age girls, becomes the absolutely "morally acceptible" thing to do, as the means to an end, you have to understand, that the whole moral fiber of a country, has been ripped to shreds, and we can expect nothing but more lies from those who signed off on the Epstein deal.

IF he actually gets to testify at his trial, it will be nothing short of a miracle that he got there to testify in one piece, with so many of the monied and well positioned people wanting to have him assassinated.

Aug 02 11:11

The 30 silliest Raspberry Pi projects

Aug 02 09:29

Apple Suspends Program That Records Users Having Sex And Buying Drugs

Last week, we reported a shocking revelation about Apple's friendly personal assistant tool for mass surveillance Siri: The app "regularly" records people having sex, discussing private medical information, participating in drug deals and other "countless" invasive moments which it promptly sends to Apple contractors for their listening pleasure - all for the sake of "quality control".

Now, in the face of the latest privacy scandal to rock one of the major American tech giants, Apple has reportedly decided to suspend its global internal program for “grading” users' Siri commands following the public backlash over the Guardian's revelations, which came courtesy of a whistleblower.

Webmaster's Commentary: 

Siri as a potential blackmail device; who knew?!?!? :-)

Aug 02 07:42

Microsoft Says 30% of IoT Projects Fail in Proof-of-Concept Stage. Security Experts Warn IoT’s Vulnerability and 74% Failure Rate Can Cause Catastrophic Events.

By B.N. Frank

5G and The Internet of Things (IoT) may sound cool in theory but the reality is security experts have warned for many years already how dangerous it is to install and operate...

Aug 02 06:56

Gerry - A Font of Gerrymandered Districts to Troll Congress

Meet Gerry, a font made up of gerrymandered districts that can be used to troll congress.

This font may be seen as a joke at first glance, but in reality it's not as the font and its accompanied web site UglyGerry.com was created to illustrate how your vote doesn't matter. Made of real gerrymandered districts, it shows how politicians from both parties just break up districts into ridiculously shaped regions to gain advantage during elections.

The UglyGerry site allows you to create a message with this font and then tweet it as image to your favorite congressman.

Aug 01 21:17

New FBI Document Adds “Fringe” Conspiracy Theories As Next Big Domestic Terror Threat

By Nicholas West

It already has been well documented how many government agencies have compiled lists containing Americans who are potential terrorists, so one more shouldn't be too surprising, but the language suggests further surveillance and crackdowns. Because it’s not deranged and violent people carrying out these acts who occasionally latch on to strange ideas, it’s the opposite: it’s the ideas that create deranged and violent people. Furthermore, it’s open communication on the Internet that makes it all possible … and especially during an election season...

Aug 01 19:53

Critical Flaws Found in VxWorks RTOS That Powers Over 2 Billion Devices

Security researchers have discovered almost a dozen zero-day vulnerabilities in VxWorks, one of the most widely used real-time operating systems (RTOS) for embedded devices that powers over 2 billion devices across aerospace, defense, industrial, medical, automotive, consumer electronics, networking, and other critical industries.

According to a new report Armis researchers shared with The Hacker News prior to its release, the vulnerabilities are collectively dubbed as URGENT/11 as they are 11 in total, 6 of which are critical in severity leading to 'devastating' cyberattacks.

Armis Labs is the same IoT security company that previously discovered the BlueBorne vulnerabilities in Bluetooth protocol that impacted more than 5.3 Billion devices—from Android, iOS, Windows and Linux to the Internet of things (IoT).

Aug 01 19:39

Thought Crimes? Facebook Along With Researchers Successfully Transcribes Thoughts Instantly Into Speech

By Aaron Kesel

Facebook-backed research on brain reading has transmitted thoughts to speech, as we take a step towards pre-crime becoming a reality. Meanwhile, in an unrelated development, the FBI has demanded a “social media early alerting tool” that will help monitor terrorist groups, foreign intelligence services, criminal organizations and other domestic threats before they act. In other words, thought crimes and pre-crime — something that Facebook no doubt can help with its new brain-reading technology...

Aug 01 18:54

Amcrest home security camera contains flaw that lets hackers listen to audio feeds using a web browser

The flaw affects the Amcrest IP2M-841B IP camera, an internet-connected security cam sold on Amazon and the subject of more than 12,000 consumer reviews.

The camera is capable of capturing video in 1080p and can be used with a smartphone and a PC. Footage can also be uploaded to the cloud with a subscription.

Researchers at the security firm Tenable say they discovered a serious bug in the products firmware which allows hackers to listen into audio over HTTP without authentication.

To make matters worse, researchers describe the flaw as 'trivial' meaning all that needs to be leveraged to exploit the bug is a simple media playing tool like VLC or a browser.

Once directed at the 'endpoint,' a script is able to extract the audio feed from the camera say researchers.

Aug 01 18:28

The Military Secretly Built An “Artificial Brain” Called Sentient

Since 2010, American intelligence agencies have been developing a top-secret “artificial brain” military AI system that they named — seriously — “Sentient.”

Newly released confidential and classified documents first reported by The Verge describe the National Reconnaissance Office (NRO)’s Sentient Program as a fully-integrated intelligence system that can coordinate satellite positions and may soon be used to manage battlefield operations during military engagements.

Aug 01 17:52

Digital Games May Beat Mindfulness Apps at Relieving Stress

The authors of the study noted that digital games appear to fulfil four criteria necessary for post-work recovery: they tend to be relaxing, they provide opportunities for mastering a new skill, they are highly immersive and distracting, and they allow people to feel in control...

Aug 01 17:49

Virtual Reality Shows Promise for Pain Patients; This is Exactly Why It Should Not Be Used in Schools

By Patricia Burke

Many groups are promoting the use of Virtual Reality as a treatment strategy for pain patients. For example, VR is promoted as an alternative to opiates, “because it’s very powerful with no side effects.” However, Virtual Reality stops the brain from processing pain because it overrides full-body and full sensory system intelligence and integration...

Aug 01 15:32

Voter records for 80% of Chile's population left exposed online

The voter information of more than 14.3 million Chileans, which accounts to nearly 80% of the country's entire population, was left exposed and leaking on the internet inside an Elasticsearch database.

ZDNet learned of the leaky server from a member of the Wizcase research team, who passed the server's IP to this reporter last week, in order to identify the nature and source of the leak.

We found that the database contained names, home addresses, gender, age, and tax ID numbers (RUT, or Rol Único Tributario) for 14,308,151 individuals.

Aug 01 15:17

Tesla ‘dog mode’ failure exposes pooches to extreme heat

Dog Mode promises to regulate the vehicle’s temperature and also inform concerned passersby that the animal is safe through a message on the center touchscreen. However when Sood, fortunately, logged into his Tesla app to check on his vehicle he noticed that the temperature had climbed up to 85 degrees Fahrenheit (29 Celsius), leaving his dog Enzo in danger of dying from heatstroke.

“It’s hot as all hell in Seattle. Today I used dog mode and luckily I kept the app open, to my horror the car was 85 degrees and climbing!” he wrote on Twitter.

“Dog mode only works if in auto, if you manually set the fan and leave the AC turns off,” he added.

Aug 01 13:45

Where Is Published Scientific Literature Regarding Non-ionizing Radiation, Electromagnetic Hypersensitivity (EHS) & Microwave Radiation Hazards?

By Catherine J. Frompovich

One would think Internet searches for specific literature regarding EMFs and RFRs emitted by microwaves and numerous high tech “smart” personal-use devices would not be easy to find, but Physicians for Safe Technology surprisingly found many and created a webpage consisting of “Military and Government Reports.”...

Aug 01 12:35

Addiction Expert Claims: Giving Your Child A Smartphone Is Like Giving Them A gram Of Cocaine

By Amanda Froelich

The world is changing at a dramatic pace. It’s shifting so fast, in fact, that the childhood you remember is vastly different than the one your own kids will experience. This is largely due to the development and saturation of technology in modern society.

While there are perks to being hyper-connected, allowing children access to their own smartphone could produce detrimental effects long-term. It’s so influential, top addiction therapist Mandy Saligari suggested in 2017 that giving your child a smartphone is like “giving them a gram of cocaine.”...

Aug 01 12:15

Inspiring Photos and Video of Anti 5G Rallies on U.S. Day of Action

By B.N. Frank

Saturday, July 27 was the 2nd U.S. Day of Action against the deployment of 5G wireless technology.

The telecom industry has provided NO scientific evidence that 5G is safe. There is research that has determined that it isn’t...

U.S. opposition to 5G is increasing and few people have signed up for it where it’s already been installed.

Aug 01 10:55

Apple iMessage Flaw Allows Remote Attackers to Read iPhone Messages

Five bugs in Apple’s iMessage service for the iPhone have been uncovered that require no user interaction to exploit, including one that would allow remote attackers to access content stored on iOS devices.

First discovered by Google Project Zero security researcher Natalie Silvanovich, Apple has fully patched four of the flaws as part of the 12.4 iOS update.

Aug 01 09:58

Facebook admits that it stored at least 600 million passwords in plain text, with employees having access to the files for years

Facebook is under fire yet again — and this time, it’s for leaving hundreds of millions of user passwords unprotected. Security researcher Brian Krebs reports that a company oversight left up to 600 million exposed because they were stored in plain text. Leaving the passwords in plain text format means that the information was readable and searchable among 20,000 Facebook employees.

Storing passwords in plain text is a huge security risk for anybody — and when you’ve got 20,000 employees with access to an unprotected password storage bank, things can really start to look grim. According to the report, the plain text password issue could affect users of Facebook, Facebook Lite and Instagram –and in some cases, the password information dates as far back as 2012.

Aug 01 09:37

HACKERS SEIZE CONTROL OF BULGARIAN TAX AGENCY, SPRINKLER SYSTEM

SOURCE: FUTURISM.COM
WET AND WILD

The Bulgarian government is stuck in an unusually comical cybersecurity crisis.

A hacker broke into servers of the National Revenue Agency, according to the Bulgarian language newsroom Media Pool, but also seized control over a city sprinkler system, dousing government officials when they tried to leave the Parliament Building. The government has accused and arrested 20-year-old cybersecurity developer Kristian Boykov, according to Reuters, though Boykov denies the allegations.

While it’s funny to imagine, the hack illustrates how unprepared world governments are to deal with cybersecurity threats.

Aug 01 09:32

FBI WANTS TECH TO TRACK SOCIAL MEDIA FOR CRIMINALS AND TERRORISTS BEFORE THEY ACT

SOURCE: NEXTGOV
The Federal Bureau of Investigations aims to acquire access to a “social media early alerting tool” that will help insiders proactively and reactively monitor how terrorist groups, foreign intelligence services, criminal organizations and other domestic threats use networking platforms to further their illegal efforts, according to a request for proposal amended this week.

“With increased use of social media platforms by subjects of current FBI investigations and individuals that pose a threat to the United States, it is critical to obtain a service which will allow the FBI to identify relevant information from Twitter, Facebook, Instagram, and other Social media platforms in a timely fashion,” the agency said in the RFP. “Consequently, the FBI needs near real-time access to a full range of social media exchanges in order to obtain the most current information available in furtherance of its law enforcement and intelligence missions.”

Webmaster's Commentary: 

Looks like we're headed toward a Chinese-centric model for controlling behaviour by controlling social media, and giving "credits and debits" to all of its citizens.

Of course, what the end result of such sweeping surveillance will cause to happen, is an absolute silence on the internet, with no one saying anything, even if it is of positive social significance.

And my question has to be; if these on-line manifestos did exist, why hadn't the DHS already flagged them, before it was too late?!?

And also, why DHS is absolutely, utterly impotent at finding, and prosecuting malware and hijack ware creators?!? Are they not supposed to be responsible for the security of ALL Americans online?!?

And we have a companion piece, also to be found at blacklistednews.com:
UK Home Secretary wants backdoor access to all encrypted email.

Aug 01 09:24

DOJ AND FBI SHOW NO SIGNS OF CORRECTING PAST UNTRUTHS IN THEIR NEW ATTACKS ON ENCRYPTION

SOURCE: ELECTRONIC FRONTIER FOUNDATION
Last week, Attorney General William Barr and FBI Director Christopher Wray chose to spend some of their time giving speeches demonizing encryption and calling for the creation of backdoors to allow the government access to encrypted data. You should not spend any of your time listening to them.

Don’t be mistaken; the threat to encryption remains high. Australia and the United Kingdom already have laws in place that can enable those governments to undermine encryption, while other countries may follow. And it’s definitely dangerous when senior U.S. law enforcement officials talk about encryption the way Barr and Wray did.

Webmaster's Commentary: 

The problem with giving government "back doors" through all computer entities is, that the bad guys already have this security already in place and evolving, and the good people may well be encrypting their business methods, to protect themselves against unfair competition.

And secondly, and most importantly, this government has proven, time and time again, that they are not to be trusted with anything more important than a receipt for a pizza!!

Aug 01 09:19

PENTAGON: NEW LASER TECH CAN MAKE PEOPLE HEAR VOICE COMMANDS

ZAPPY BRAIN
The Pentagon is working on a weapon that uses lasers and plasma to transmit sound files, even human speech, directly to individual people at great distances.

That’s according to a story by the Military Times newspaper, which reports that military researchers are working on ways to use lasers and plasma to control crowds. The story is short on technical details — but, at the same time, a troubling glimpse of the military’s desire to control people using next-gen tech.

FRIKKIN LASERS
It’s not clear how the tech works.

And for now, the Military Times reports that the Pentagon’s scientists haven’t yet built a speech-transmitting laser capable of passing through a wall — though officials believe it could be ready to deploy in as little as five years.

HEARING VOICES

Webmaster's Commentary: 

I don't know about you, but upon reading this, the hair on the back of my head suddenly started to break dance!!

Aug 01 09:13

THE PENTAGON SPENT MILLIONS ON VULNERABLE CHINESE TECH IN 2018, WATCHDOG SAYS

SOURCE: NEXTGOV
The Pentagon last year purchased thousands of Chinese tech products that contained known cybersecurity vulnerabilities, and officials have yet to enact policies to stop it from happening again, an internal watchdog found.

In 2018, the department bought more than 9,500 commercial printers, computers and cameras despite warnings that adversaries could use the products to infiltrate networks and spy on personnel, according to an inspector general audit. The procurements, which totaled roughly $33 million, expose significant shortcomings in the department’s supply chain security policies that persist to this day, auditors said in a redacted report published Tuesday.

Specifically, the Army and Air Force purchased more than 8,000 printers from Lexmark and 1,500 computers from Lenovo, two Chinese companies that national security officials previously linked to the Communist Party’s espionage operations.

Webmaster's Commentary: 

The question I have to ask, is why did this keep happening, when the Pentagon knew that there were known vulnerabilities in this equipment?!?

What's wrong with this picture?!?

Bloody Everything!!!

Aug 01 08:47

Proxyclick: Customers Will Be Impressed When Businesses Use Facial Recognition To Identify Them

By MassPrivateI

Leave it to facial recognition companies to make up a totally bogus claim that makes me want to slam my foot in a door.

The access management company Proxyclick claims that businesses who use their ID Match (facial recognition) will impress customers...

Jul 31 18:53

Cambridge Massachusetts to Consider Facial Recognition Ban

By Michael Maharrey

Last night, Cambridge, Massachusetts Mayor Marc McGovern proposed a measure to ban facial recognition technology in the city.

Cambridge could become the fourth U.S. city to ban facial recognition technology. Oakland, San Francisco, and Somerville, Massachusetts, have all passed ordinances to prohibit active use of facial recognition technology by city departments and barring the use of data or evidence produced by facial recognition software systems in criminal investigations or legal proceedings...

Jul 31 16:15

Whistleblower Matt DeHart To Be Released From Prison In October

By Elizabeth Vos

Former U.S. Air National Guard intelligence analyst and online activist Matt DeHart is set for release on October 3rd, after eight years’ imprisonment. He was jailed after pleading guilty to two counts of soliciting child pornography but has maintained that the FBI told him they knew he was innocent of the charges and that evidence supporting the charges was fabricated. DeHart is incarcerated in Ashland, Kentucky...

Jul 31 13:22

DOJ and FBI Show No Signs of Correcting Past Untruths in Their New Attacks on Encryption

By Andrew Crocker

Last week, Attorney General William Barr and FBI Director Christopher Wray chose to spend some of their time giving speeches demonizing encryption and calling for the creation of backdoors to allow the government access to encrypted data. You should not spend any of your time listening to them.

Don’t be mistaken; the threat to encryption remains high. Australia and the United Kingdom already have laws in place that can enable those governments to undermine encryption, while other countries may follow. And it’s definitely dangerous when senior U.S. law enforcement officials talk about encryption the way Barr and Wray did...

Jul 31 11:07

Oh, How I Loathe the TSA

By Michael Maharrey

Oh, I know there are greater threats to my liberty. I should hate the IRS more. Or maybe the NSA. Perhaps the Pentagon. But the TSA — I guess that it’s just such a tangible violation of my rights and the Constitution. I can literally feel it running up and down my leg...

Jul 31 10:50

Are You Ready To Have Elon Musk’s Artificial Intelligence Chip, Neuralink, Inserted Into Your Brain? Trials Start 2020 For The ‘Robotization’ Of Humankind

By Catherine J. Frompovich

Are you ready to be chipped and robotized?

As almost always, conspiracy theories and/or “fake news” turn out to be factual, but propagandized so as to make “useless eaters” feel they are ‘safe’ from surveillance and becoming robots or ‘bots’...

Jul 30 10:44

When Cash Is Banned, Centralized Cryptos Are Not Going to Save You

By Graham Smith

Australia is now moving forward with its proposed legislation to ban cash purchases over 10,000 AUD ($6,900) for business purposes. According to the treasury website: “The Black Economy Taskforce recommended this action to tackle tax evasion and other criminal activities.” While many Aussies are celebrating Bitcoin’s exclusion from this clause, others find the move away from hard cash somewhat chilling. After all, if this finally goes through, banks and the state will be given sole power to deny or approve any and all purchases above this limit. Crypto is not yet affected, but when cash is erased, and the control grid is tightened, be sure that centralized shitcoins are not going to save anyone, either...

Jul 30 08:48

Expensive 5G Phones Overheat and Switch Back to 4G; “Remedies” Include Ice Packs and Cranking A/C

By B.N. Frank

A few weeks ago, new warnings started being reported that 5G is causing phones to overheat.

Here’s another one, including some very unfriendly solutions for the environment...

Jul 30 08:05

100 million Americans and 6 million Canadians caught up in Capital One breach

Capital One has disclosed that it has suffered a data breach impacting 100 million people in the United States, and 6 million in Canada.

The company said in a statement that data between 2005 and 2019 was accessed and related to information on consumers at the time when they applied for a credit card.

"This information included personal information Capital One routinely collects at the time it receives credit card applications, including names, addresses, zip codes/postal codes, phone numbers, email addresses, dates of birth, and self-reported income," the company said.

"Beyond the credit card application data, the individual also obtained portions of credit card customer data, including: Customer status data, e.g., credit scores, credit limits, balances, payment history, contact information; Fragments of transaction data from a total of 23 days during 2016, 2017 and 2018."

Jul 30 08:01

Amazon & Google Use Secret Police Deals and Freebies To Spy On Everyone

By MassPrivateI

Amazon and Google are using secret police agreements and free giveaways to spy on everyone.

Amazon and law enforcement are enticing residents to join Amazon’s “Neighbors” network by giving out corporate freebies. They're essentially offering first-time home buyers $5,000 worth of surveillance devices so they can monitor everything they do...

Jul 30 07:33

Libra is Just the Beginning of Corporate Cryptocurrencies, Says Blockchain Researchers

Moving from a world where the development of economic frameworks are no longer at the helm of governments and countries, Facebook will soon have around 2.2 billion of its users with access to a crypto wallet.

But while Libra’s success is an unknown, one certainty is that Facebook won’t be the only corporation rolling out such technology according to RMIT’s Professor Jason Potts from the University’s Blockchain Innovation Hub...

Jul 29 18:12

5G Is Bad For Bees. California Video Provides Sad Evidence.

By B.N. Frank

Last month a new one-page flyer was released to provide information about how bees are harmed by exposure to 5G and other sources of cell phone and wireless radiation.

This new video posted on YouTube seems to document that 5G cell towers are causing bees to die underneath them...

Jul 29 16:31

Surveillance state: 1 in 2 American adults is already in the FBI’s facial recognition database

To American patriots still thinking inside the box, granting ICE access to such data might seem like nothing but a good thing, seeing as how at least 22 million illegal aliens are currently living in America without permission. But once this pandora’s box of privacy is breached in the name of fighting illegal immigration, it can very quickly be abused as a means to violate the privacy rights of all Americans.

Jul 29 16:12

DDoS Attack Explained

Jul 29 08:30

Lack of Diverse Media Ownership Leads to Censorship in Pakistan Says New Report

By Waleed Tariq

Aided by lax legal restrictions, Pakistan is a “high-risk country” in terms of media pluralism as more than half of mass media ownership is concentrated in the hands of a few — a model which has resulted in closure of businesses, a fall in journalism standards and rise in censorship, says a new research study.

These findings, coupled with the ruling party’s increasingly hostile attitude towards journalists who are critical of government institutions, have led to the deterioration of the country’s once-vibrant media environment and paved the way for continued threats to press freedom...

Jul 29 08:19

Australia to Start Policing Facebook’s and Google’s Algorithms

By Sean Walton

Australia’s antitrust watchdog, the Australian Competition and Consumer Commission (ACCC), has announced that it plans to set up an office that is dedicated to nothing else other than policing the algorithms tech giants like Facebook and Google use to generate their income, reports Reuters.

This is part of reforms designed to rein in the U.S. technology giants, potentially setting a precedent for global lawmakers...

Jul 29 07:48

GitHub confirms it has blocked developers in Iran, Syria and Crimea

The impact of U.S. trade restrictions is trickling down to the developer community. GitHub, the world’s largest host of source code, is preventing users in Iran, Syria, Crimea and potentially other sanctioned nations from accessing portions of the service, chief executive of the Microsoft-owned firm said.

Jul 28 17:31

Where Does It End? New “Monarch” Brain Device Approved for ADHD

By Truthstream Media

Featuring Dr. Peter Breggin [The Minds of Men] For more on SPAC, visit Breggin.com.

Dr. Breggin discusses the sordid history behind experiments done on children, and looks at some of the latest developments in what is planned for kids who supposedly have ADHD.

Jul 28 17:25

Crypto Is Part of Free Speech, and Free Speech Is Everything

By Graham Smith

On July 23, U.S. Attorney General William Barr gave a speech demanding big players in the tech industry work with government agencies in providing backdoor entry points for encrypted devices and software. Per his reasoning, certain devices and messaging services pose a safety threat by providing a secure, third-party-inaccessible area where crime can rapidly proliferate. He didn’t note that this “warrant-proof encryption” also protects journalists, researchers, and individuals in areas of political unrest living under corrupt governments. Secure encryption also protects and verifies the financial assets and transactions of cryptocurrency holders everywhere. If strings of code — ideas, in essence — are now being made illegal, it would appear that a brand new battle for humanity’s free expression is just beginning...

Jul 28 16:00

STOP THIS BS : Senate moves bill with up to $15,000 fines for sharing memes online

In other words, the Congress wants to make it easier to sue people who send a meme or post images that they didn’t create themselves, essentially a giveaway to lawyers who sue unsuspecting suckers for a living.

Jul 28 12:09

Unbanked for Buying Bitcoin: How the Financial System Criminalizes Crypto

By Kai Sedgwick

When we think of the unbanked, we envisage citizens of developing nations who lack the means and documentation to obtain access. But you don’t have to be a Mongolian goat herder to find yourself financially excluded. In the West, relatively affluent citizens are having their banking services withdrawn suddenly and without warning. Their ‘crime’? Buying and selling bitcoin.

The story of my banking blockade isn’t tragic or deserving of sympathy. But it warrants telling nonetheless, for it will be familiar to a number of readers who have bought or sold bitcoin. If this can happen to me, it can happen to anyone...

Jul 28 10:05

5 of the Most Important Use Cases for Cryptocurrency

By Kai Sedgwick

Crypto assets have come a long way since Bitcoin. What started out as a P2P payment system has spawned an array of use cases that extend far beyond the original designation of cryptocurrency. While the primary function of crypto assets such as ETH and BTC is a matter of some debate, what’s indisputable is that digital currencies can now be used for more than merely paying for goods and services. Here are five use cases for crypto assets that demonstrate the extent of the fintech revolution taking place...

Jul 27 08:53

10,000 American Cryptocurrency Owners Will Receive Warning Letters From the IRS

By Jamie Redman

On July 26, the U.S. Internal Revenue Service (IRS) announced that the tax agency has started sending letters to American cryptocurrency owners advising them to pay their taxes. According to the organization, three types of letters will be sent to more than 10,000 taxpayers by the end of August. The news follows the recent IRS taskforce slide that shows alarming recommendations on how tax agents should investigate digital currency users...

Jul 27 08:42

“Human Rights Activists” Celebrate Facebook-Twitter Censorship

Op-Ed by Joseph Thomas

All Facebook and Twitter accounts associated with Bangkok-based geopolitical analyst Tony Cartalucci have been deleted. The extent to which both American-based tech companies went to target Cartalucci could be seen in a recent Reuters article reporting on it...

Jul 27 08:37

Siri ‘regularly’ records sex encounters, sends ‘countless’ private moments to Apple contractors

Apple’s Siri AI assistant sends audio of sexual encounters, embarrassing medical information, drug deals, and other private moments recorded without users’ knowledge to human ‘graders’ for evaluation, a whistleblower has revealed.

Recordings from Apple’s Siri voice assistant are fed to human contractors around the world, who grade the AI based on the quality of its response and whether its activation was deliberate, according to an anonymous contractor who spoke to the Guardian. They claimed accidental activations are much more frequent than Apple lets on, especially with Apple Watch users – and wants the company to own up to the problem.

Jul 27 08:36

‘This is the endgame’: Instagram users vent after site culls meme-posting accounts

Instagram has suspended scores of popular ‘meme’ accounts that collectively have tens of millions of followers, during a mass purge of the platform. The move was met with shock and anger by users.

The cull was carried out on Friday with no warning to users other than an email to tell the account holders that they had been suspended. One, @Finest.Inventions, claimed more than 13 million followers alone.

SHARE THIS ARTICLE WITH YOUR SOCIAL MEDIA