COMPUTERS/INTERNET/SECURITY | WHAT REALLY HAPPENED

COMPUTERS/INTERNET/SECURITY

Mar 13 11:02

Google Offers A Virtual Tour Of The Everest

Site visitors Street View can scroll through a digital panoramic 360 degrees.

Google introduced a virtual tour of the Everest region in Nepal, which allows observing the conditions of life in one of the most inaccessible places on Earth.

The Street View service offers views of Sagarmatha National Park, where blue ice rivers meander under the snowy peaks, monks play music and breeders yak herds guide by steep stone paths.

Equipped with two cameras with tripod and device 15 goals tailored to the march, Google operators roamed the area walking and took over 45,000 panoramic views of remote villages in the eastern Himalayas inhabited by the Sherpa community.

http://whatisusa.info/google-offers-a-virtual-tour-of-the-everest/

Mar 13 10:04

Wikipedia entries for Eric Garner, Sean Bell and Amadou Diallo edited by someone at NYPD headquarters: report

Someone at Police Headquarters appears to have made changes in Wikipedia entries about notorious NYPD cases, including the deaths of Eric Garner, Sean Bell and Amadou Diallo, police sources said Friday.

Now cops are trying to find out who did it.

The edits span two NYPD administrations — those of Police Commissioner Bill Bratton and his predecessor, Raymond Kelly — according to a report by Capital New York. The changes included deletions, the addition of information and attempts to clarify NYPD policy or the circumstances of certain incidents. It was not immediately clear if the changes were ordered or sanctioned, or if they were carried out by officers or civilians doing it on their own.

Wikipedia allows anyone to edit its entries, even anonymously, but it does try to discourage changes that are considered a conflict of interest.

Mar 13 09:47

Hillary Clinton's Questionable Process for Sorting Work Emails

Hillary Clinton asked the public to trust her during a recent press conference at the United Nations, when she stated that she has already complied with transparency laws by turning over all public records she generated as Secretary of State.

She had no business making that claim. A Time magazine report about the process used to identify public records in her possession shows that she cannot possibly know if she is in compliance with the law. And juxtaposing her process with the words used in her press conference shows her core claim to be misleading.

Unless she can disprove the story, her credibility can only suffer from the comparison.

Mar 13 08:58

Hillary Clinton Didn't Encrypt Her Secretary of State Emails For Months

New details have emerged about exactly how Hillary Clinton secured the homebrew private email servers she used as Secretary of State. The punchline? Clinton didn't encrypt her emails or use a certificate for her first three months running the State Department.

While the future presidential candidate was dodging reporters' questions and complaining about the inconvenience of carrying two phones, security experts at Venafi, a company that sells email security software, went back to January 2009 when Clinton took office and analyzed the server activity through the end of her cabinet term.

The findings are unsettling at best:

Mar 13 08:55

No One Read Hillary’s Emails Before Deleting Them

For more than a year after she left office in 2013, she did not transfer work-related email from her private account to the State Department. She commissioned a review of the 62,320 messages in her account only after the department–spurred by the congressional investigation–asked her to do so.

And this review did not involve opening and reading each email; instead, Clinton’s lawyers created a list of names and keywords related to her work and searched for those. Slightly more than half the total cache–31,830 emails–did not contain any of the search terms, according to Clinton’s staff, so they were deemed to be “private, personal records.”

Mar 13 07:52

Now, hackers have found a way to blackmail gamers

Hackers have hauled in millions over the years, mostly in bitcoins, with a blackmail scheme called ransomware, experts say.

You visit a hacked website or download an evil file, and it encrypts files on your computer and won't give them back until you pay money to designated account.

Those who visit porn sites have been victims of this type of thing for years. Even police stations have been forced to pay up.

Now two security researchers have found a new type of ransomware that slips in through Flash files or through an old hole in Internet Explorer and specifically targets video games, writes security researcher Vadim Kotov from Bromium Labs.

Want your game back? Want all your high scores and other game-related data back? Pay up.

Mar 13 06:25

US leak investigation stalls over fears of revealing US-Israel anti-Iran operation

An investigation into a top US military general accused of leaking sensitive information has been halted over fears it could confirm a joint US-Israeli covert operation against Iran's nuclear program, according to US officials.

Federal prosecutors had been investigating whether former vice chairman of the Joint Chiefs of Staff, Marine General James E. Hoss Cartwright, leaked highly classified information to a New York Times reporter, current and former US officials say.

The leaked information was about a highly-classified operation to hinder Iran’s nuclear enrichment capability through cyber-sabotage, an operation not acknowledged by Israel or the US.

Mar 13 06:15

British Police Roll Out New ‘Precrime’ Software to Catch Would-Be Criminals

Police claim that this new computer allows them to conduct more ‘targeted investigations’, but does it really? The burglary ring detailed below could have just as easily been tackled through traditional, or ‘human’ police detective work. Machines do not necessarily do a better job than humans, but that’s not really the point. What they really provide for 21st century police and security services is a machine to blame should anything ‘go wrong’. That need to relinquish themselves of any human liability and responsibility is the No.1 motivator for institutions who are chomping at the bit to adopt this type of technocratic technology.

Mar 13 05:58

Mass spying on UK citizens ‘essential,’ say MPs in landmark report

A Parliamentary report examining the mass collection of private communications by UK security agencies has defended the practice as “essential.”

The Intelligence and Security Committee (ISC) report, published on Thursday, said only a “tiny” proportion of data collected was ever seen by human eyes.

Intelligence agencies “do not seek to circumvent the law” and must seek the “specific authorization” of a cabinet minister before spying on individuals in the UK, the ISC said.

Mar 13 05:53

Harper’s Niqab Comments Inspire Twitter Backlash

Canadian Prime Minister Stephen Harper decided to offer his fashion advice Tuesday on whether women should be allowed to wear niqabs at Canadian citizenship ceremonies. In response, scores of Twitter users shared their thoughts on the subject.

Mar 13 02:30

As FCC Releases Net Neutrality Rules, Battle Lines Form

Supporters of internet freedom must now defend sweeping reforms from industry attacks, say advocates.

n/a

n/a

n/a
Mar 12 11:59

UK Spy Agencies Seek Single Law to OK Data Collection of ‘Privileged’ Conversations

Is it OK to listen in on private conversations between a lawyer and a defendant on trial for a serious crime? What about sifting through the communications of an entire country, or even continent, in pursuit of a wanted criminal or terrorist?

Mar 12 11:52

Google: The 21st Century’s ‘Ministry of Truth’

“Net Neutrality” is not the only danger threatening the free flow of information in cyberspace. Lurking in the background, Internet giant Google has been developing new search engine methodologies, which threaten foundational principles of the World Wide Web and could turn it into an Orwellian wasteland of doublespeak controlled by the Ministry of Truth, as portrayed in the novel 1984.

According to the UK’s weekly international science magazine New Scientist, “Google wants to rank websites based on facts not links.” And while that sounds noble, it is anything but. Make no mistake. Google’s efforts are aimed ultimately at controlling what and how much information can be found on the Internet.

Mar 12 11:26

Leading digital rights organization throws support behind National Day of Action against the government's Secret Police Bill C-51

OpenMedia is encouraging Internet users across Canada to support events in over 35 cities this Saturday March 14

VANCOUVER, March 10, 2015 /CNW/ - Digital rights group OpenMedia is throwing its support behind a massive National Day of Action against Bill C-51 this Saturday March 14. Sparked by concerned citizens on social media platforms Facebook, and reddit, events are being organized right across Canada, from Victoria to Halifax. OpenMedia is supporting the day of action by launching an online action platform to empower those speaking out against C-51 at http://StopC51.ca

Public opinion is rapidly turning against the bill, with a recent EKOS opinion poll revealing that only 29% of Canadians would give up personal privacy safeguards in order to boost spy agency powers. Over 75,000 people have already spoken out online in recent weeks calling on Prime Minister Harper to rein in the unaccountable powers and violations of our civil liberties contained in Bill C-51.

Mar 12 10:45

This USB Drive Can Nuke A Computer

There are enough USB exploits floating around to warrant caution. Some will unknowingly install malware or backdoor software, and now, there is at least one, that will actually destroy your computer.

Mar 12 10:42

The law allowing phone and internet data collection in the Netherlands just got scrapped

A judge has scrapped the Netherlands’ data retention law, saying that while it helps solve crime it also breaches the privacy of telephone and Internet users.

The ruling by a judge in The Hague followed a similar decision in April by the European Union’s top court that wiped out EU data collection legislation it deemed too broad and offering too few privacy safeguards.

The Dutch security and justice ministry said it was considering an appeal.

Mar 12 10:38

Panda antivirus labels itself as malware, then borks EVERYTHING

Panda users had a bad hair day on Wednesday, after the Spanish security software firm released an update that classified components of its own technology as malign.

As a result, enterprise PCs running the antivirus software tied themselves in something of a knot, leaving some systems either unstable or unable to access the internet. A Panda spokesman confirmed the problem while advising that the issue was well in hand.

"A bad update was published temporarily today [Wednesday] that resulted in some system files being detected by the Panda engine, a replacement update was promptly published removing the error and restoring the wrongly quarantined files," a Panda representative told El Reg.

"At present we recommend NOT rebooting systems. This will allow us to update the system with the amended update. This update will also restore files previously detected," he added.

Mar 12 10:37

New smoking gun further ties NSA to omnipotent “Equation Group” hackers

The strongest new tie to the NSA was the string "BACKSNARF_AB25" discovered only a few days ago embedded in a newly found sample of the Equation Group espionage platform dubbed "EquationDrug." "BACKSNARF," according to page 19 of this undated NSA presentation, was the name of a project tied to the NSA's Tailored Access Operations.

"BACKSNARF" joins a host of other programming "artifacts" that tied Equation Group malware to the NSA. They include "Grok," "STRAITACID," and "STRAITSHOOTER."

Mar 12 10:17

NASA Mission Studies Magnetosphere Surges That Can “Short Out Grids and Cause Blackouts”

Mac Slavo
SHTFplan.com

The potential for a devastating EMP resulting from a massive solar event, or a man made weapon, is well known and, increasingly, being taken seriously as a looming, perhaps inevitable, disaster.

One half of that equation deals with the potential for solar flares, or coronal mass ejections, and other extreme space weather events to cause interruptions in Earth’s magnetosphere, in turn creating electrical discharges that have the potential to disrupt satellites orbiting the planet, and trigger outages in the electrical grid and most of the electronic devices on earth’s surface.

Mar 12 09:57

Here are all 400 pages of the FCC’s net neutrality rules

WEBMASTER ADDITION: Much to my surprise at first reading there does not seem to be a foundation for licensing content. If anyone finds something to contradict that first analysis, please call my attention to it!

Mar 12 09:34

Senator: Don't Use Obamacare or Russian Mobsters Will Steal Your Identity

Freshman US Senator Tom Cotton is currently enjoying his 15-minutes of glorious, Republican fame after organizing the Congressional letter to Iranian leadership. But long before his heyday of mailing potentially illegal memos, Cotton had a different strategy for gaining prominence: warning the uninsured about Obamacare and the Russian mob.

Mar 12 09:27

KASPERSKY CLAIMS TO HAVE FOUND NSA'S 'SPACE STATION MALWARE'

"The architecture of the whole framework resembles a mini-operating system with kernel-mode and user-mode components carefully interacting with each other via a custom message-passing interface."?

Kaspersky malware probers have uncovered a new 'operating system'-like platform that was developed and used by the National Security Agency (NSA) in its Equation spying arsenal.

The EquationDrug or Equestre platform is used to deploy 116 modules to target computers that can siphon data and spy on victims.

Mar 12 09:09

CIA, US Marshals engaged in domestic phone spying – report

CIA technology used to scan data from cellphones overseas has allegedly been used by the US Marshals Service to spy on phones in the US and Mexico.

Mar 12 09:09

IT Expert Says He Traced Hillary’s Email Server To Manhattan Government Building

Cyber-security expert Vinny Troia told Fox News’ Greta Van Susteren on Tuesday that he traced the IP address of the server Hillary Clinton used to host the private email account she used as secretary of state to a government building in the heart of New York City.

“I did read reports that [the server] was at her house, but when we traced the IP address it came back to the city office here in downtown Manhattan,” Troia told Van Susteren.

Webmaster's Commentary: 

If Hillary had her email served on a government computer, than everything on it is the property of the taxpayers! If those 31,000 erased emails were private, then she was using government property for personal use. If those erased emails were official business, Hillary is guilty of destroying public property!

Mar 12 07:53

Wikipedia Sues NSA For Spying Program

n/a
Mar 11 15:26

Kaspersky Lab Uncovers More Evidence Linking NSA to Infamous Hackers

Researchers from the Russia-based cybersecurity group Kaspersky Lab have uncovered more evidence tying the United States’ National Security Agency to a shadowy group of hackers.

The hacking collective, dubbed “Equation Group,” must have been sponsored by a nation-state with vast resources in order to operate, Kaspersky analysts assert.

Mar 11 14:32

Hillary Clinton Caught on Camera Lying About Secret Email Server, Watch The Video

Hillary Clinton claims the secret server that housed her emails while she was secretary of state (that was reportedly housed at her home in New York) was set up for President Bill Clinton. She also said that some of the “personal” emails she deleted were between her and her husband.

There is a huge problem with that. With exquisitely poor timing for Hillary, the Wall Street Journal, just before Hillary began the press conference at the United Nations building reported that Bill Clinton does not use email.

Mar 11 13:59

SIRI is recording everything you say, all of your contacts, your in-home devices, and sometimes even your location

Several stories and accusations have been going around about Apple’s Siri and other voice-to-text services, asserting that they are recording what you say and that people actually listen. Now I say “accusations” because many people are questioning the veracity of some of these claims, mainly those from Reddit user FallenMyst.

Mar 11 12:47

WHITE HOUSE WON’T SAY WHETHER OBAMA USES A GOVERNMENT EMAIL ACCOUNT

Wow. We might not be looking at just a Hillary Clinton/State Department scandal. Today, White House Paid Liar Press Secretary Josh Earnest refused to say whether Obama uses a government issued email address for his communications.

Mar 11 11:18

'NSA is straining the backbone of democracy'

Wikipedia, the online encyclopedia and one of the most highly-trafficked websites in the world, announced Tuesday that it—alongside a host of civil liberty advocates, news outlets, and privacy rights organizations—has filed a lawsuit against the National Security Agency for violating the constitutional rights of its users by performing bulk surveillance and searching, without specific cause or warrant, the international Internet communications of all Americans including emails, web-browsing content, and search-engine queries.

Mar 11 10:24

What the NSA tried to do with your iPhone is detestable

New reporting by The Intercept published Tuesday reveals a years-long effort by the Central Intelligence Agency, alongside partners both inside and outside of government, to crack the digital security systems of the Apple's signature iPhone and iPad products.

Mar 11 09:11

Wikipedia Demand The US Government

Wikipedia says the project would damage the free Internet access.

Wikimedia Foundation, a non-profit organization manages the Wikipedia encyclopedia; today sued the US Government and the National Security Agency (NSA) to monitor the “massive” way to supposedly internet access thousands of documents of citizens within and outside the country.

http://whatisusa.info/wikipedia-demand-the-us-government/

Mar 11 09:09

How much has Apple lost since iTunes has been down? Customers unable to purchase songs and apps may have cost the company millions

Frustrated users of the App Store, Mac App Store and iTunes around the world are currently unable to download songs and apps from Apple's sites.

It is not known precisely how long the services have been down, but the outage may have cost Apple millions of dollars in lost sales.

Apple is yet to reveal what the technical problem is, but has confirmed in an update on its status page, that the issue is global.

Mar 11 08:21

White House: Hillary Sent Classified Emails Despite Her Claim to the Contrary

Before Hillary Clinton’s news conference yesterday, Jen Psaki, the spokesperson for the United States Department of State, stated that the White House could not immediately released the former Secretary of State’s emails because “it will take several months” to redact all the classified things she sent.

Despite this, Ms. Clinton then stated in her press conference, “I did not email any classified material to anyone on my email. I’m certainly well aware of the classification requirements and did not send classified material.”

Webmaster's Commentary: 

That egg timer is already getting worn out!

n/a
Mar 11 07:07

Top 5 Points From Hillary Clinton’s Email Speech Proving You CANNOT Trust Her

Do not let Mrs. Clinton forget this scandal as we head into the 2016 election. If she wants to subvert oversight, why should she ever be granted the powers of the presidency?

Mar 11 06:34

Bill Clinton Still Doesn’t Use Email

If Hillary Clinton’s emails are eventually cracked open, don’t expect to see any juicy correspondence with her husband—or any correspondence at all. Bill Clinton doesn’t use email.

Mar 11 06:34

Hillary said she emailed with Bill, but the thing is ...

At a press conference on Tuesday, Hillary Clinton said the server that housed her emails while she was secretary of state (that was reportedly housed at her home in New York) was set up for President Bill Clinton. She also said that some of the "personal" emails she deleted were between her and her husband.

But just before Hillary began the press conference at the United Nations building, the Wall Street Journal reported that Bill Clinton does not use email.

Mar 11 06:11

Plans to censor SA internet called out as unconstitutional

The full document – available here – claims responsibility for online publishing as the prerogative of the FPB, which typically classifies movies, due to “media convergence” which has “fundamentally transformed the way media content is distributed and consumed”. It applies to “online distributors of digital films, games, and certain publications, whether locally or internationally”.

Online publications covered by the rules will be obliged to pay a fee to the FPB, which will then vet material published: “Where it is convenient and practical to do so, the Board may dispatch classifiers to the distributors’ premises for the purposes of classifying digital content.”

That seems to apply to anyone who publishes videogame source code, a YouTube video (YouTube is specifically mentioned in the regulations) or a blog.

Mar 11 06:04

CIA Aided Program to Spy on U.S. Cellphones

Marshals Service uses airborne devices that mimic cell towers to scan data on thousands of cellphones

Mar 10 18:14

First Hillary, Now Chuck Hagel: Former Secretary Of Defense Also Used Private Email

For all the administration's scaremongering about hackers hacking into every possible electronic source that is connected to the internet (and in the case of StuxNet, those that aren't as Iran found out the hard way), it appears that the biggest culprit when it comes to lax communication security was the administration itself. And not just Hillary: moments ago NBC revealed that none other than former Secretary of Defense Chuck Hagel, who as a reminder resigned in November following intense scapegoating by Obama who needed to a sacrificial calf following the disastrous midterm elections, also used a personal, non-supervised email address.

Mar 10 16:49

Could the Apple Watch Usher in a Cashless Society?

In addition to its fitness and communication applications, Apple’s new watch will allow users to pay for goods with the wave of their wrist. Are we are on the cusp of a cashless society?

Mar 10 15:32

Leaked Documents Suggest CIA Work on Hacked Version of Xcode, OS X Installer Exploit

United States Central Intelligence Agency researchers have been working for years to crack the security of Apple's iPhone and iPad, and may have done so through the creation of a modified version of Xcode, Apple's software development tool designed for developers.

According to secret documents obtained by The Intercept, at a 2012 "Jamboree" that focused on security flaws found in various electronics, CIA researchers outlined both a hacked version of Xcode and a modified OS X updater that could be used to install malicious software like keyloggers.

Mar 10 14:04

iSpy: How the CIA Targeted Apple

New reporting by The Intercept published Tuesday reveals a years-long effort by the Central Intelligence Agency, alongside partners both inside and outside of government, to crack the digital security systems of the Apple's signature iPhone and iPad products.

Mar 10 13:50

FIVE EYES Neo-colonialism in the Pacific Region

The recent revelations from the documents provided by National Security Agency (NSA) whistleblower Edward Snowden that the NSA’s two Pacific partners, the Government Communications Security Bureau (GCSB) and Australian Signals Directorate (ASD) conduct wholesale eavesdropping on the communications of the island nations of the Pacific may not be «news» but the reaction to the surveillance by regional leaders points to the neo-colonialism practiced by the NSA’s FIVE EYES intelligence partners.

Mar 10 12:55

BOMBSHELL: Bill Clinton Accidentally Proves Wife is Lying about Contents of Emails, Lying at Presser

“The server contains personal communications between my husband and me,” she declared. “The server will remain private.”

There are emails between the two, and they are not one-sided, she said. But new evidence, put together by Pundit Press, proves without a doubt that that is a deliberate lie.

As Market Watch reported separately before Mrs. Clinton’s press conference today, Bill Clinton “does not use email.” During his entire life, he has only sent two emails, both of which were when he was President, not during the time that his wife said she was corresponding with him. And neither were to his wife.

Mar 10 12:28

Mini Exploding ''Bee'' Drones Developed to Support Army

Nicholas West
Activist Post

Micro Air Vehicles have long been researched by the military for use in both surveillance and lethal targeting missions. An Air Force video released in early 2013 offered a vision of insect-sized drone swarms that could autonomously fly and communicate to fulfill their mission, using existing power sources to harness energy and remain "hidden in plain sight."

A new video from two Polish defense contractors, WB Electronics and Optimum, indicates the increasing miniaturization of drone technology as they continue along the path toward achieving the above-mentioned near-invisibility...

Mar 10 12:20

Hillary Clinton: Using private email was ‘convenient,’ server to stay ‘private’

Former Secretary of State Hillary Rodham Clinton said Tuesday her use of a private email account was “convenient,” but said looking back it might have been a bad idea.

Read more: http://www.washingtontimes.com/news/2015/mar/10/hillary-clinton-breaks...
Follow us: @washtimes on Twitter

Webmaster's Commentary: 

Mar 10 12:00

Apple Introduced The New Watch

The company said it may make pre orders and watching the clock in stores from April 10.

Apple introduced its Smart Clock Watch, which represents the entry of the company into a new business segment and is the first device to a new category created for the management of the company Tim Cook.

The company had already advanced enough about the clock, although some critical details were unknown. Yes we knew would have a rectangular touchscreen, to be offered in two sizes (38 and 42 mm) and a choice of materials for the body clock (steel, aluminum, gold) and multiple options straps.

http://whatisusa.info/apple-introduced-the-new-watch/

Mar 10 11:54

Meet The New Macbook

The new MacBook is 24% thinner than the MacBook Air.

Apple announced a new model of its MacBook laptop in an ultra-thin, lightweight version, with a weight of 900 grams and a thickness of only 13.1 millimeters, 24 percent thinner than the MacBook Air.

The new Apple MacBook achieved its stylish design through the use of Intel Core M chip, low power consumption and does not require a cooling system based on fans. It has a full backlit keyboard whose keys have a proprietary technology company to optimize space without losing precision. It is accompanied by a renewed trackpad, which has a Force Touch technology that differentiates various actions based on pressure exerted by the user.

http://whatisusa.info/meet-the-new-macbook/

Mar 10 10:52

NSA sued by Wikimedia, rights groups over mass surveillance

Bulk collection there violates the constitution's First Amendment, which protects freedom of speech and association, and the Fourth Amendment, which protects against unreasonable search and seizure, the lawsuit said.

The plaintiffs include the Wikimedia Foundation, which runs the online encyclopedia Wikipedia, the conservative Rutherford Institute, Amnesty International USA and the National Association of Criminal Defense Lawyers, among other groups.

The groups said in the lawsuit that upstream surveillance "reduces the likelihood" that clients, journalists, foreign government officials, victims of human rights abuses and other individuals will share sensitive information with them.

Legal standing, which requires the organizations to show individual, particular harm, is the most significant obstacle for them, said Stephen Vladeck, a professor at American University Washington College of Law.

Mar 10 10:06

Cutting-edge hack gives super user status by exploiting DRAM weakness

Still, the ability to exploit physical weaknesses in the hardware is a highly novel type of attack that breaks new ground and may not be easy to remedy.

"This is not like software, where in theory we can go patch the software and get a patch distributed via Windows update within the next two to three weeks," Kanter, of the Microprocessor Report, said. "If you want to actually fix this problem, we need to go out and replace, on a DIMM by DIMM basis, billions of dollars' worth of DRAM. From a practical standpoint that's not ever going to happen."

Mar 10 09:20

New Snowden Documents: CIA Has Spent 10 Years Hacking iPhones, iPads

Newly released documents obtained via NSA whistleblower Edward Snowden have revealed that the CIA attempted for a decade to gain access to data on Apple’s i devices as part of the intelligence establishment’s continued mass spying program.

“Studying both ‘physical’ and “non-invasive” techniques, U.S. government-sponsored research has been aimed at discovering ways to decrypt and ultimately penetrate Apple’s encrypted firmware,” The Intercept report by Glenn Greenwald states.

The CIA set its sights on accessing user data on iPhones and iPads all over the globe, according to the documents, as well as attempting to introduce backdoors to the devices, in order to monitor them at will.

Mar 10 09:19

New Zealand PM Retracts Vow to Resign if Mass Surveillance Is Shown

So now that it’s proven that New Zealand does exactly that which Prime Minister Key vowed would cause him to resign if it were proven, is he preparing his resignation speech? No: that’s something a political official with a minimal amount of integrity would do. Instead – even as he now refuses to say what he has repeatedly said before: that GCSB does not engage in mass surveillance – he’s simply retracting his pledge as though it were a minor irritant, something to be casually tossed aside:

Mar 10 08:17

Apple Watch May Be DOA As Cook Admits Battery Life As Low As 3 Hours

The Apple Watch may be pretty... but you are going to need up to 8 of them to make it through a full day. While Tim Cook proclaimed 18 hours of "all-day battery-life" - itself not particularly impressive compared to competing products, hidden deep in Apple Watch's product page is a little admission that battery life (in use) could be as low as 3 hours...

Webmaster's Commentary: 

Oops!

Like, "Google Glass" oops!

And who wants to pay hundreds and possibly thousands of dollars for a watch that will have to be "upgraded" every three years? I prefer my solar-powered CASIO which barring accidents should last me the rest of my life.

Mar 10 08:01

A Few Thoughts on Cryptographic Engineering

In case you’re not familiar with SSL and its successor TLS, what you should know is that they're the most important security protocols on the Internet. In a world full of untrusted networks, SSL and TLS are what makes modern communication possible.

Or rather, that’s the theory. In practice, SSL and TLS have been a more like a work in progress. In part this is because they were developed during an era when modern cryptographic best practices weren't nailed down yet. But more to the point: it's because even when the crypto is right, many software implementations still get things wrong.

With all that in mind, there’s a third aspect of SSL/TLS that doesn't get nearly as much attention. That is: the SSL protocol itself was deliberately designed to be broken.

Let me explain what I mean by that.

Mar 10 07:52

How DNA Is Turning Us Into a Nation of Suspects

Every dystopian sci-fi film we’ve ever seen is suddenly converging into this present moment in a dangerous trifecta between science, technology and a government that wants to be all-seeing, all-knowing and all-powerful.

Mar 10 07:32

FLASHBACK - A tale told by their e-mails

It's always the e-mails.

Warren Trepp was getting ready to take his friends, then-Rep. Jim Gibbons and his wife, Dawn, on an expensive cruise in 2005, a cruise Trepp had paid for, when his wife sent him a reminder e-mail:

"I know you are busy," Jal Trepp wrote, according to documents in possession of the Justice Department. "Please don't forget to bring the money you promised Jim and Dawn on the trip."

An alarmed Trepp responded: "Don't you ever send this kind of message to me! Erase this message from your computer now!"

Mar 10 06:16

Hillary Clinton scandal spreads as tea party group seeks private IRS emails

One of the tea party groups targeted by the IRS asked Congress Monday to demand the private emails of some agency employees, while a top committee chairman issued a request for instant-chat messages from the EPA, as the Clinton emails scandal begins to envelop other parts of the Obama administration.

The White House, meanwhile, tried to keep the burgeoning scandal at arm’s length, with spokesman Josh Earnest acknowledging President Obama and Mrs. Clinton did email, but insisting the White House followed all record-keeping laws, and the president didn’t know Mrs. Clinton was exclusively using a private email until reports surfaced last week.

Mar 09 15:07

The outrageous persecution of Internet freedom figure Kim Dotcom

Megaupload founder Kim Dotcom is not entitled to contest the forfeiture of an estimated $67 million in frozen assets because he’s a fugitive facing extradition, a federal judge ruled.

n/a
Mar 09 11:05

State Department: Hillary decides what emails we can see

The State Department has faced a lot of questions about former Secretary Hillary Clinton's secret email account, but the most fundamental one is: Do you have them all? Officials at State have said repeatedly that Clinton has turned over 55,000 pages of emails from her time at the department. But each time spokeswoman Marie Harf has been asked whether that material — 55,000 pages, not 55,000 emails — represents all of Clinton's State Department emails, she ends up citing Clinton's staff, who have told department officials that Clinton has turned over everything that is "responsive" to the department's request for documents. Clinton, of course, decided what is "responsive" and what is not.

Mar 09 11:04

The White House Knew About Hillary Clinton's Private Emails In August

The White House was alerted in August 2014 to the potential problem of Hillary Clinton's use of a private email account during her tenure as secretary of state, Politico reported Friday.

Earlier this week, the New York Times reported that Clinton exclusively used a personal email to conduct State Department business, potentially in violation of federal regulations. A subsequent report by the Associated Press detailed how the email was hosted by a server located at her family's home in Chappaqua, New York. While some have pointed out that rules against using personal email for official business were not relayed to officials until 2014, the potential 2016 presidential candidate has faced criticism over the perceived lack of transparency. Clinton has since asked the State Department to make the private emails publicly available.

Webmaster's Commentary: 

So much for Obama's "I learned about it from the media" excuse!

Mar 09 09:04

Scotland Yard Chief Wants CCTV Cameras in EVERY Home

LONDON, UK — The citizens of the United Kingdom are possibly the most surveilled group of people in the history of the world. Forget the NSA’s ever-expanding reach over every form of communication imaginable. We’re talking cameras… everywhere. The City of London is equipped with thousands of them, so is Manchester, Liverpool, Birmingham and well, like I said before, pretty much everywhere. In a nation of 64 million residents, there is one CCTV camera for every 11 people in the UK.

The British Security Industry Authority (BSIA) estimates there are up to 5.9 million closed-circuit television cameras scattered throughout the UK, including 750,000 in “sensitive locations” such as schools, hospitals and care homes. This statistic was released in 2013 as well. Do you think they decided to halt the expansion of their Orwellian state at any point over the past two years? The safe bet is that these numbers have grown exponentially.

Mar 09 08:24

LAPD further explores “untapped potential” of predictive policing

Computer network displays future crime "hot spots" as "boxes" on realtime "heat map"

Mar 09 08:20

Seeing the Stasi Through NSA Eyes

“The NSA’s agenda is to control the government, and control the population"

Mar 09 08:18

VIDEO: LOCKHEED MARTIN’S 30KW LASER WEAPON

Known as ATHENA, for Advanced Test High Energy Asset, the ground-based prototype system burned through the engine manifold in a matter of seconds from more than a mile away. The truck was mounted on a test platform with its engine and drive train running to simulate an operationally-relevant test scenario.

Mar 09 07:26

Is the US planning an internet takeover?

According to leaked documents, US interests are worried about the loss of the propaganda war due to the internet and alternative media.

It's certainly true that American mainstream news views are on the decline while many online news networks gain more and more attention.

Will US interests begin filling the internet with their own propaganda?

And more importantly, will it work?

n/a
Mar 09 05:54

Obama Says He Learned The Use Of Personal Mail Of Clinton In The Press

Barack Obama and Hillary Clinton.

President Barack Obama said he learned from the press that the former Secretary of State Hillary Clinton used a personal email account for official business during her time in office.

Obama referred to the case, which was revealed this week by The New York Times and has caused controversy in an interview with CBS.

Asked knew when Clinton did use their private email Obama said that “while everyone knew through press reports,” according to excerpts developed by the chain.

“The policy of my administration is to promote transparency, that’s what my emails, I carry the BlackBerry, all records are available and archived,” Obama said.

Read More: http://whatisusa.info/obama-says-he-learned-the-use-of-personal-mail-o...

Mar 08 16:12

Could Google Become Skynet? 8 Products That Prove It's Already There

SHARE THIS ARTICLE WITH YOUR SOCIAL MEDIA