COMPUTERS/INTERNET/SECURITY | WHAT REALLY HAPPENED


COMPUTERS/INTERNET/SECURITY

Oct 17 10:24

News Corp. Shuts Off Hulu Access To Cablevision Customers – And Turns It Back On

Editor's Note: In an impressive display of internet censorship power, News Corp has been able to restrict internet access to outside providers to some of its websites. Now that we know that this type of censoring ability exists, we can expect to see much more efforts to strangle internet service providers to comply with the media giants. Not a good sign at all. Also note that the following article is written by a News Corp employee so it surely has the kindest possible spin on this exercise of power.

Peter Kafka
WSJ Digital

Oct 17 09:10

Government Spying via Facebook

Webmaster's Commentary: 

This is just another propaganda trick to discourage people from communicating with each other; to trick Americans back into psychological dependency on ABCNNBBCBS. But with 300 million angry Americans, it's not like there are enough Federal Agents to spy on us all. 99% of what gets posted to Facebook are clipping from other sources. There is simply too much information out there to correlate.

You think the Feds don't already know we are angry? You think the government is not aware there is open talk of revolution across the land? You think Obama hasn't heard that the people want him charged with high treason for allowing Israel to attack Americans in international waters? You think Congress thinks they got away with holding the Middle Class down while Wall Street gang-banged us all into poverty?

They know it. They know that the interval between now and the guillotines grows shorter every day. All they want to do is hold off the final collapse as long as possible while they loot the nation and skedaddle for the borders! So they play this Booga Booga trick to keep people from sharing their growing rage with each other.

Not gonna work.

Not a chance in Hell.

So to all those government goons reading these words right now; cut your losses. Take what you already looted and leave now while you can. Because you and I both know your bosses will offer you up as a sacrificial lamb in a heartbeat to save their own sorry asses when the final bug-out happens.

P.S. People lie about themselves on Facebook.

Oct 16 22:16

Govt. Spying via Facebook

[YouTube: p3bLAvpi-sg]

Oct 15 11:33

CYBERCOM to Go Operational This Month

In August, the Pentagon revealed information about a cyber attack against the US military’s Central Command in 2008. According to the Pentagon’s account, USB memory sticks were randomly placed in a washroom at a US military base in the Middle East providing support for the war in Iraq. The memory sticks, infected with a computer worm by an undisclosed foreign intelligence agency, were picked up by soldiers who ignored protocol and plugged them into military laptops. The worm took 14 months to kill. In a very similar attack earlier this year, Iran experienced a computer worm (the Stuxnet virus) that infected around 30,000 IP addresses, as well as the computers at the Bushehr nuclear plant.

Oct 14 08:23

Half of wi-fi networks can be hacked in seconds

Nearly half of home wi-fi networks can be hacked in less than five seconds, according to a study carried out across UK cities.

Of the 40,000 networks identified in the six cities, just under 20,000 had no password or the most basic form of security encryption, the research for card protection and insurance company CPP found.

In the ''ethical hacking'' experiment, researchers spent half an hour in each city using freely available software to use as many unsecured wireless connections as possible.

Oct 13 17:32

Microsoft issues its biggest-ever security fix

Microsoft said four of the new patches -- software updates that write over glitches -- were of the highest priority and should be deployed immediately to protect users from potential criminal attacks on the Windows operating systems.

Oct 13 09:16

FLASHBACK - Israeli Foreign Ministry to Hire Shills for “Internet Warfare” Squad

The Foreign Ministry unveiled a new plan this week: Paying talkbackers to post pro-Israel responses on websites worldwide. A total of NIS 600,000 (roughly $150,000) will be earmarked to the establishment of an “Internet warfare” squad.

Oct 12 14:52

Wired.com Calls For New Cybersecurity Slogan

Hey WRHistas,

Here's something "fun" for you amidst all the tyranny ...

Wired.com is appalled at DHS's new cybersecurity slogan: Stop, Think, Connect.

(We are appalled, too, but for other reasons.)

And they're calling for people to post new slogans. Here are some of the ones SCMLA has come up with so far:

Swipe It Or Wipe It

Fingerscan or Taliban

Don't Hate Surveillance

Fingerscan For Freedom

Have You Iris-Scanned Lately?

You Surf. We Surveil. Questions?

Cyber Surveillance is Cyber Freedom

Relinquish Cyberliberty For Cybersecurity

Watch What You're Watching Because We're Watching Too

Oct 12 11:47

Irish court rules in favour of ISPs in piracy case

The High Court in Ireland has ruled that laws cutting off internet users who have illegally downloaded content cannot be enforced in the country.

It is a victory for Irish internet service provider UPC which took the legal action against copyright owners, including EMI and Sony.

But it will be a blow to the music and film industry, which wants the strict rules as a deterrent against piracy.

It is likely to have a knock-on effect to similar policies in other countries.

Oct 12 04:40

Iranian, Chinese Computers Also Discovered to Have Been Hacking D.C. Internet Voting System

http://blacklistednews.com/Iranian%2C-Chinese-Computers-Also-Discovere...

According to testimony given to a D.C. City Council committee last Friday by J. Alex Halderman, asst. professor of electrical engineering and computer science at University of Michigan, hackers from Iran and China were also attempting to access the very same network infrastructure, even as his own team of students had successfully done so, taking over the entirety of the Internet Voting system which had been opened for a first-of-its-kind live test.

Oct 11 12:20

Google’s self-driving car

Google announced this weekend that it’s been building robotic cars that have been driving themselves around California — down curvy Lombard Street in San Francisco, across the Golden Gate Bridge, along the Pacific Coast Highway, around Lake Tahoe and from Google’s Mountain View headquarters to Santa Monica (a 350-mile trip). So far, the cars have logged over 140,000 miles.

The company hasn’t said yet what it’s going to do with the cars, but they should be a good business for Google, because they draw heavily on Google’s data centers.

Oct 11 10:02

Stuxnet Computer Worm–Israel’s Attempt To Silence Iran on 9/11 or Veiled Threat to the Entire World?

The reasons for Israel being fingered as the lone gunman in this crime were several. First, the bug in question–while making its way to other parts of the world, nevertheless was disproportionally concentrated in Iran, and–more importantly–targeted the nuclear facility at Natanz whose destruction is numero uno on Israel’s wish list. Next were two “fingerprints” left on the would-be murder weapon, one of them being a reference to the biblical heroine Esther whose reputed actions (celebrated yearly in the Jewish religious festival known as Purim) saved the Jews of Persia (today’s Iran) from yet another in a seemingly-endless parade of persecution of God’s chosen people.

Oct 11 05:50

When the 'Future' Invades Our Lives. The CIA Funds 'Predictive Behavior' Start-Ups

What do Google, the CIA and a host of so-called "predictive behavior" start-ups have in common?

They're interested in you, or more specifically, whether your online interests--from Facebook to Twitter posts, and from Flickr photos to YouTube and blog entries--can be exploited by powerful computer algorithms and subsequently transformed into "actionable intelligence."

Oct 10 09:32

Cass Sunstein's despicable ideas on regulating the internet

In the past, we have seen Barack Obama and his supporters attempt to chill any sort of scrutiny or criticism of him. Many of his records - whether they are transcripts from Occidental or Columbia - have not been released. He lost his senior thesis (on Soviet nuclear disarmament) from Columbia University (how likely was that to happen, given that he felt his own life was important enough to write an autobiography in his young 20s), and his records from his time in the Illinois state senate were "lost".

Oct 10 09:14

Ryan Dawson - Youtube censored me again

Oct 09 03:21

Fears of a 10.10.10 computer virus hit internet

Fears that a computer virus could be unleased on October 10 – 10.10.10 – are circulating on the internet, with experts warning users to be careful.

Oct 07 19:04

Feds order HSBC to boost money-laundering controls

Eileen AJ Connelly
Associated Press

NEW YORK — Federal regulators on Thursday said HSBC North America Holdings Inc. has been ordered to improve its compliance with money laundering laws.
A federal investigation found the U.S. subsidiaries of the London-based HSBC Holdings PLC do not have tight enough controls over a list of money transfer operations.

Oct 07 15:12

Microsoft Proposes Government Licensing Internet Access

A new proposal by a top Microsoft executive would open the door for government licensing to access the Internet, with authorities being empowered to block individual computers from connecting to the world wide web under the pretext of preventing malware attacks.

Oct 07 07:34

How the Phone Companies Are Screwing America: The $320 Billion Broadband Rip-Off

Since 1991, the telecom companies have pocketed an estimated $320 billion --- that's about $3,000 per household.

This is a conservative estimate of the wide-scale plunder that includes monies garnered from hidden rate hikes, depreciation allowances, write-offs and other schemes. Ironically, in 2009, the FCC's National Broadband plan claimed it will cost about $350 billion to fully upgrade America's infrastructure.

The principal consequence of the great broadband con is not only that Americans are stuck with an inferior and overpriced communications system, but the nation's global economic competitiveness has been undermined.

Webmaster's Commentary: 

This is becoming a consistent pattern in the US. Pacific Gas and Electric got a rate increase approved because they needed to make repairs on the gas lines, only they took the money and didn't make the repairs and San Bruno blew up. This is more of the same. The phone companies got a rate increase back in 1991 to pay for system upgrades to support broadband, but they took the money and made only token improvements here and there while the rest of the world surged ahead. So, broadband in the US is like our medical care; the most expensive in the world, and lagging in quality.

Oct 07 07:21

Microsoft proposes public health approach to internet infections: Only vaccinated computers can get online

Byron Acohido
USA Today

Microsoft has proposed a bold new Internet security model based on the principles used to preserve public health on a global basis.

Oct 06 15:20

Superbug that hit 6m PCs in China traced to US?

The much-feared new cyber-weapon, the 'Superbug', which has attacked over six million personal and almost 1,000 corporate computers in China has been traced to the US, official media reported.

Oct 06 15:20

Jewish Internet Defense Force: Not so powerful after all

You Tube reinstates David Duke’s Account

Oct 06 13:19

FBI wants revision in telecom law to aid terror probes

WASHINGTON — FBI Director Robert Mueller is calling for changes in federal law to help his agents with surveillance of communications in anti-terrorism and other criminal investigations.

Oct 06 11:16

Microsoft: Ban 'sick' PCs from the Internet

Webmaster's Commentary: 

Rivero: Shoot the cyber criminals!

Oct 06 10:06

New Phishing Attack Targets Apple iTunes, Security Firm Says

Got iTunes? Be careful, you might get iScammed too.

A new cyberscam has been targeting the tens of millions of users of Apple's iTunes music service, as crooks phish for confidential bank information.

Webmaster's Commentary: 

How iNnoying!

Oct 06 10:03

REALITY REPORT #64 - Global Warming Battle Turns Bloody

In this edition of the Reality Report, the brutal video about what could happen if you don't reduce your carbon footprint is broken down in the Rant. We the People Foundation Chairman, Bob Schulz, joins Gary Franchi for a special interview to respond the the recent allegations by Time Magazine that he "has reached the brink of calling for war." They also talk about the upcoming Liberty Walks on October 24th. Angie Ress sits in for Nina this week. She talks about the lengths the NYPD is going to to keep terror out of the city, how the Army may be taking control of what you watch on TV, and why the FBI could soon be watching your every move on the internet. All of this plus a dip into the Mailbag to reveal the shocking answers to the previous Question of the Week, and a new Enemy of the State.

Oct 06 08:57

Obama Administration Pressures ISPs To Censor Websites

The Obama Administration IP Czar Victoria Espinel has been holding meetings with ISPs, registrars, payment processors and others in a bid to get them to block access to websites “dedicated to infringing activities”. However, as we have documented, the government deems such infringement to include political opinions which are antagonistic toward the state, leaving the door open for state censorship of free speech on the world wide web.

Oct 06 06:34

Cyber Wars: US Is Stepping Up Defense Against Digital Attacks

Reuters

Guarding water wells and granaries from enemy raids is as old as war itself. In the Middle Ages, vital resources were hoarded behind castle walls, protected by moats, drawbridges and knights with double-edged swords.

Oct 06 00:48

Programming Kids To Enforce The Police State

Want to earn tons of cool badges and prizes while competing with you friends to see who can be the best American? Download the SnapScouts app for your Android phone (iPhone app coming soon) and get started patrolling your neighborhood.

It's up to you to keep America safe! If you see something suspicious, Snap it! If you see someone who doesn't belong, Snap it! Not sure if someone or something is suspicious? Snap it anyway!

Play with your friends and family to see who can get the best prizes. Join the SnapScouts today!

Oct 06 00:44

Hospital Patient Privacy Sacrificed as State Agency Sells or Gives Away Data

http://www.theaustinbulldog.org/index.php/Main-Articles/Main-Articles/...

Maybe you, like so many others, couldn't get away on vacation this summer. Never mind. If you were a patient in a Texas hospital in the past ten years, the intimate details of your hospital stay made the trip for you.

Oct 05 14:07

Chipped: school children put into “Smart Badge program”

School children in Santa Fe, New Mexico are being compelled to participate in a “Smart Badge” program. These are RFID chips embedded in an ID badge that the kids are required to have with them at all times. With these tags, the children can be (and are) followed and monitored by administrators of the government school system.

The program is getting mixed reviews, according to an article at KVUE. Some parents love it. After all, this is being done in the name of the children’s safety. Who doesn’t want kids to be safe, right?

Other parents aren’t so sure about this program.

Oct 05 06:47

Some Android apps caught covertly sending GPS data to advertisers

The results of a study conducted by researchers from Duke University, Penn State University, and Intel Labs have revealed that a significant number of popular Android applications transmit private user data to advertising networks without explicitly asking or informing the user. The researchers developed a piece of software called TaintDroid that uses dynamic taint analysis to detect and report when applications are sending potentially sensitive information to remote servers.

They used TaintDroid to test 30 popular free Android applications selected at random from the Android market and found that half were sending private information to advertising servers, including the user's location and phone number.

Oct 04 14:24

Stuxnet Super Virus Also Attacked China

The latest super virus, Stuxnet, which attacked Iran’s Nuclear Facility, is reported to have attacked China too. Some of the industrial computing systems and their hardwares run by the Siemens software were affected by the Stuxnet worm. Now there is a fear shown by the US, that if the virus could hit China, then the United States is not missing on its list.

Oct 04 09:37

Israel's unit 8200: cyber warfare

Israel demonstrated its intent to conquer cyber warfare in the 1990s by presenting the country's legions of hackers with a choice between prison and working for the state.

Oct 04 08:04

Stop the Internet Blacklist!

Just the other day, President Obama urged other countries to stop censoring the Internet. But now the United States Congress is trying to censor the Internet here at home. A new bill being debated this week would have the Attorney General create an Internet blacklist of sites that US Internet providers would be required to block.

This is the kind of heavy-handed censorship you'd expect from a dictatorship, where one man can decide what web sites you're not allowed to visit. But the Senate Judiciary Committee is expected to pass the bill this week -- and Senators say they haven't heard much in the way of objections! That's why we need you to sign our urgent petition to Congress demanding they oppose the Internet blacklist.

Oct 04 07:49

CENSORED History of the Slave Trade

Webmaster's Commentary: 

A few days ago, the Jewish Internet Defense Force, a group of hackers who attack websites that criticize Israel for its war crimes, bragged about how they had succeeded in forcing YouTube to delete the channel and videos of David Duke.

Now, regardless of whether you agree with Duke or not, we still have a First Amendment in this nation, and everyone gets to say their point of view, a right Israel's supporters never fail to take constant advantage of, even as they attempt to deny it to others. Frankly, I find the prospect of a foreign nation controlling what we can see on the internet in the same fashion they already control what we see on ABCNNBBCBS far more alarming than anything Duke has to say.

As has historically been the case, the downfall of Israel's supporters is that they cannot resist bragging about how they control America. They could not help but brag how they were in control of YouTube. Thus it comes as no surprise that First Amendment supporters are pouring Duke's videos back onto YouTube where, because of the "Banned in Boston" effect, more people are watching them now than ever before!

Oct 04 06:34

The Israeli threat to global security

A USB memory stick carrying the Stuxnet malware is believed to have provided intruders with access to Iran’s nuclear program. The same technique was used in November 2008 to break into CENTCOM, providing a foreign government with unfiltered access to the Pentagon’s command of the wars in Iraq and Afghanistan. Did both attacks come from the same source?

Oct 04 06:25

Crypto Wars! Obama Wants New Law to Wiretap the Internet

In a reprise of the crypto wars of the 1990s, the U.S. secret state is mounting an offensive that would force telecommunication companies to redesign their systems and information networks to more easily facilitate internet spying.

Touted as a simple technical "fix" that would "modernize" existing legislation for wiretaps, government security officials will demand that telecommunication firms and internet service providers provide law enforcement with backdoors that would enable them to bypass built-in encryption and security features of electronic communications.

Oct 03 22:04

Israel's hackers brag how they control YouTube!

Webmaster's Commentary: 

Whether you agree with David Duke or not, the idea that the agents of a foreign power are now able to control what you can and cannot see on YouTube should confirm for all observers that Israel is imposing a dictatorship over America.

n/a
Oct 02 11:27

Congress Has Plans for an Internet Blacklist in the Works -- Let's Stop This Now

When it really matters to them, Congressmembers can come together -- with a panache and wry wit you didn't know they had. As banned books week gets underway, and President Obama admonishes oppressive regimes for their censorship of the Internet, a group of powerful Senators -- Republicans and Democrats alike -- have signed onto a bill that would vastly expand the government's power to censor the Internet.

Oct 02 08:19

Iran 'detains western spies' after cyber attack on nuclear plant

Iran has detained several "spies" it claims were behind cyber attacks on its nuclear programme.

The intelligence minister, Heydar Moslehi, said western "spy services" were behind the complex computer virus that recently infected more than 30,000 computers in industrial sites, including those in the Bushehr nuclear power plant, appearing to confirm the suspicion of computer security experts that a foreign state was responsible.

Webmaster's Commentary: 

This isn't the USA, where spies from Israel are given a trip to Disneyland then sent back home. Because of the crimes committed at Abu Ghraib, Bagram, Guantanamo, and other torture centers, those spies are in for a very rough time!

Oct 02 06:45

Congress Abandons Net Neutrality Bill

House Energy and Commerce Committee Chairman Henry Waxman (D-California) has given up for the year on an effort to create bipartisan legislation that would prevent broadband providers from interfering with traffic over their networks.

Waxman's net neutrality bill would have prohibited Internet, cable and phone companies from slowing or blocking traffic to legal web sites, protocols and services, which would otherwise allow them to play favorites with online content - and while Internet providers have claimed they would engage in neutral practice with or without a bill, cable company RCN was recently sued for "delaying or blocking" P2P protocols.

n/a
Oct 01 22:12

Stuxnet 'cyber superweapon' moves to China

A computer virus dubbed the world's "first cyber superweapon" by experts and which may have been designed to attack Iran's nuclear facilities has found a new target -- China.

The Stuxnet computer worm has wreaked havoc in China, infecting millions of computers around the country, state media reported this week.

Stuxnet is feared by experts around the globe as it can break into computers that control machinery at the heart of industry, allowing an attacker to assume control of critical systems like pumps, motors, alarms and valves.

It could, technically, make factory boilers explode, destroy gas pipelines or even cause a nuclear plant to malfunction.

Webmaster's Commentary: 
Oct 01 22:07

Stuxnet Malware Mystery Deepens: Another Hint Of Israeli Origins

On Tuesday, a German computer specialist offered a hint that Israel may be behind the sophisticated malware, by demonstrating that a file inside the code uses the word "Myrtus" -- which could be a reference to the Book of Esther, the Old Testament story about how the Jews prevented a nefarious plot by the Persians, according to the New York Times.

Oct 01 13:31

Computer worm attacking Iran's nuclear facilities 'includes Biblical link to Israel'

Israel has been linked to a complex worm currently attacking computers in Iran, which experts claim may have been designed to target the country's nuclear facilities.

The Stuxnet worm, supposedly aimed at slowing Iran's desire to create a nuclear arsenal, appears to include a reference to a Biblical story in which Jews pre-empt a Persian plot to destroy them.

The New York Times reports a file inside the Stuxnet code is named 'Myrtus' - a reference to the Hebrew word Esther, the same name as the Old Testament book in which the story appears.

Oct 01 11:35

SAFEGUARDING THE INTERNET

I posted the above earlier today. The prospect is frightening…. not only will ‘Big Brother’ be watching YOU, he will be watching the sites you surf on the Internet.

Michael Rivero of What Really Happened has come up with a way to defeat these Internet terrorists and nip their plans in the bud….

Oct 01 10:34

Remove Stuxnet Infection with Stuxnet Rootkit Remover

Stuxnet is a new family of malware that has drawn a large number of attention from security researchers in the mid of this July. By taking advantage of the previously unknown vulnerability in Windows shell, which was discovered lately in most of the current versions of Windows–including Windows Vista, Windows 7, both 32- and 64-bit versions, and Windows Server 2008–Stuxnet is able to run itself without user interaction as soon as the .lnk file in an infected USB drive is read by the operating system.

Oct 01 10:17

It’s the Economy, Not the Bloggers

Americans are angry with the Obama administration, and the Obama administration is angry with—bloggers?

Webmaster's Commentary: 

Moi???????

Oct 01 09:16

Israel Suspected in Worm Sabotage of Iran's First Nuclear Plant

The viral program is very sophisticated and appears designed specifically to attack the plant. It first was released onto workers' computers, designed to try to reach plant's control systems. Unlike other more sophisticated attacks which appeared to be primarily geared for monitoring, this attack was designed to do damage. It contained logic to sabotage nuclear fuel enrichment centrifuges. The centrifuges, made by German equipment electronics giant Siemens, would be made to fail in a virtually unnoticeable way.
-----------------------------------------------------------------

another noteworthy event: unit8200 soldier *arrested*

Oct 01 08:48

Israel's unit 8200: cyber warfare

Israel demonstrated its intent to conquer cyber warfare in the 1990s by presenting the country's legions of hackers with a choice between prison and working for the state.

Oct 01 08:43

GNU adns Advanced, easy to use, asynchronous-capable DNS client library and utilities.

adns is a resolver library for C (and C++) programs, and a collection of useful DNS resolver utilities.

Webmaster's Commentary: 

S.3804 will attempt to silence Patriot websites by forcing commercial domain name resolution systems to drop the DNS listings for those sites. However, setting up private or community DNS is fairly easy, as this code demonstrates! Once operational, adding the DNS info for the patriot sites is trivial!

Oct 01 08:33

SHUTTING DOWN THE INTERNET?

On September 20th, Senate Judiciary Committee Chairman Patrick Leahy (D-VT) introduced legislation — S. 3804, the Combating Online Infringement and Counterfeits Act — that seeks to give the Department of Justice the power to shut down websites anywhere in the world that are found to infringe on intellectual property rights. This would be accomplished by ordering U.S. domain registrars and registries to stop resolving infringing sites’ domain names. While this bill has the noble-sounding goal of preventing online piracy, handing the federal government authority over the Internet would set a troubling precedent that would imperil Internet freedom in America and across the world.

Webmaster's Commentary: 

This can actually be defeated by amateur DNS servers set up all across the world, especially in those nations now willing to defy the United States, possibly even Iceland! Those who know how can actually set up their own local DNS servers to allow themselves and their friends to continue to access the patriot websites. The copyright infringers and pirates already do this, which means that this new law, like all the others, portrays itself as fighting cr4ime while actually seeking to return the general population to a state of deaf, dumb, and blindness, wholly dependent on ABCNNBBCBS to tell them what is going on in the world.

It won't work and it never has, but the tyrants playing by last century's rules are panicking. My concern is that if the virtual revolution is attacked, it will move from the virtual to the real world (as we are already seeing across Europe).

Oct 01 07:57

Stuxnet worm could have been inside job

Delegates at the Virus Bulletin 2010 conference in Vancouver have heard that the Stuxnet worm could have been an inside job.

Graham Cluley, senior technology consultant at Sophos, told V3.co.uk that the worm may have been written by someone with detailed knowledge of Siemens' computer systems, possibly a current or former employee.

Mikko Hyppönen, chief research officer at F-Secure, told V3.co.uk that, based on the evidence he'd seen, the Stuxnet worm looks like a government attack, although conference presentations focused on the technical details of the attack rather than the motive.

Oct 01 07:05

Israeli cyber unit responsible for Iran computer worm – claim

Computer experts have discovered a biblical reference embedded in the code of the computer worm that has pointed to Israel as the origin of the cyber attack.

The code contains the word "myrtus", which is the Latin biological term for the myrtle tree. The Hebrew word for myrtle, Hadassah, was the birth name of Esther, the Jewish queen of Persia.

In the Bible, The Book of Esther tells how the queen pre-empted an attack on the country's Jewish population and then persuaded her husband to launch an attack before being attacked themselves.

Israel has threatened to launch a pre-emptive attack on Iran's facilities to ensure that the Islamic state does not gain the ability to threaten its existence.

Oct 01 06:38

House Democrats shelve net neutrality proposal

Joelle Tessler
Associated Press

House Democrats have shelved a last-ditch effort to broker a compromise between phone, cable and Internet companies on rules that would prohibit broadband providers from blocking or degrading online traffic flowing over their networks.

Oct 01 02:13

DARPA develops Helmet of Obedience

It looks like our ever-diligent friends at DARPA have been busy creating a contingency plan for the OathKeeper movement. Thanks to a newly-developed pain modulator and behavior modification helmet, any US troops who decide they will obey the Constitution rather than the commands of the global puppet masters will now be getting some remote-controlled motivational persuasion.

Oct 01 01:54

Stuxnet & "Cyber Storm III' Cyber Attack Wargame are unrelated, nothing to see here...

New York Times asks: In a Computer Worm, a Possible Biblical Clue

But first from CyberSpaceWar/defencetalk: US keyboard warriors were doing battle Tuesday with a simulated cyberattack on government and private computer networks that undermines basic trust in the Internet. The "Cyber Storm III" exercise involves participants from seven US government departments, including the Pentagon, 11 US states, 60 private companies and 12 international partners.

Sep 30 18:54

Inside Stuxnet: Researcher drops new clues about origin of worm

The mysterious Stuxnet worm took center stage at the Virus Bulletin 2010 conference with a prominent security researcher dropping a raw hint that Israel may be behind the industrial-strength malware attack.

Sep 30 16:43

In a Computer Worm, a Possible Biblical Clue

Deep inside the computer worm that some specialists suspect is aimed at slowing Iran’s race for a nuclear weapon lies what could be a fleeting reference to the Book of Esther, the Old Testament tale in which the Jews pre-empt a Persian plot to destroy them.

Sep 30 16:33

Obama Working on Plan to Wiretap Skype, Facebook, BlackBerrys

The Obama administration wants to force all communications companies to make their networks compliable with wiretapping orders from law enforcement, a change that would primarily affect the likes of Facebook, Skype, BlackBerrys and similar encrypted systems.

Phone and broadband companies already are required under the 1994 Communications Assistance to Law Enforcement Act to ensure their operations can allow for eavesdropping by police and federal agents. But more recent communications like BlackBerrys, which encrypt emails, make it difficult for the government to intercept messages that may involve terrorist plots.

The White House has been working with the FBI, the Department of Justice and the National Security Agency to develop a plan that would be submitted to Congress sometime next year.

Sep 30 10:24

Millions of Computers Hit by Virus Across China

Jakarta Globe

Bejing. A computer virus dubbed the world’s “first cyber superweapon” and which may have been designed to attack Iran’s nuclear facilities has found a new target — China.

The Stuxnet computer worm has wreaked havoc in China, infecting millions of computers around the country, state media reported this week.

Sep 30 09:20

Authorities Plan To Trawl Phone Calls And E Mails For Signs Of “Resentment Toward Government”

Do you resent the government for enforcing Obamacare or raising your taxes? Write about it in an email or talk about it on the phone and you could be placed under surveillance as a potential terrorist, if frightening new technology being shopped to law enforcement agencies is implemented.

Webmaster's Commentary: 

Since the Republicans resent the Democrats and the Democrats resent the Republicans, that puts pretty much every registered voter on the "terrorist" watch list, doesn't it?

Sep 29 19:24

Internet's creator slams 'blight' of web disconnection laws

AFP

Tim Berners-Lee, the man credited with inventing the world wide web, warned Tuesday of the "blight" of new laws being introduced across the globe allowing people to be cut off from the Internet.

"There's been a rash of laws trying to give governments and Internet service providers (ISPs) the right and the duty to disconnect people," he told a conference on web science at the Royal Society in London.

Sep 29 16:44

FBI agents seek the right to tap texts, emails and websites

US intelligence services would be allowed to tap text messages, emails and networking websites under new powers being considered by Barack Obama's administration.

The FBI says extremists and drug cartels are increasingly communicating online rather than using telephones, leaving US investigators struggling to keep track of them.

A new bill requesting the additional powers to investigate suspected criminals and terrorists will be presented next year. It is likely to face stiff opposition from civil liberties advocates who say the security services have historically abused extensions of power.

James Dempsey, of the pressure group Centre for Democracy and Technology, said: "They are really asking for the authority to redesign services that take advantage of the unique architecture of the internet."

Sep 29 12:48

Engineers Slam Internet 'Censorship' Bill Ahead of Key Senate Panel Vote

Editor's Note: If you disagree with this bill, sign the petition here: http://demandprogress.org/blacklist/

Judson Berger -- FOX News

Internet entrepreneurs are in a panic over a fast-tracking Senate bill they say will censor the Web, stifle Silicon Valley startups, damage the United States' credibility on free speech and ultimately trigger the creation of an alternate-universe Internet.

The West Coast engineers say they were blindsided last Monday when the Combating Online Infringement and Counterfeits Act was introduced in the Senate Judiciary Committee. The bill, which could come up for a vote as early as Thursday, has a bipartisan roster of co-sponsors who say it will be a tool for stopping the worst offenders in the world of online piracy.

Sep 29 10:13

University of Chicago Law Prof's Blog About Struggling on $400Gs Draws Fire

A prominent college law professor's posting of his family's finances on the Web to make the case that they're struggling to make ends meet -- despite their estimated $400,000-plus income -- has lit the fuse of an online debate that he claims has made him the target of an "online lynch mob."

Todd Henderson, a corporate law professor at the University of Chicago -- and a neighbor of President Obama -- says that since he posted his finances online he's been barraged with comments such as "die yuppie scum," forcing him to shut down his blog out of fear for his family.

Webmaster's Commentary: 

Yeah, our heart @#%ing bleeds for people who make almost a half mil a year crying about how tough life is.

For a law professor, this was pretty insensitive, not to mention stupid. Maybe that's why the legal system is so screwed up in this country.

Sep 29 08:34

FBI drive for encryption backdoors is déjà vu for security experts

The FBI now wants to require all encrypted communications systems to have backdoors for surveillance, according to a New York Times report, and to the nation's top crypto experts it sounds like a battle they've fought before.

Webmaster's Commentary: 

Here's the deal...

Criminals and terrorists (real ones; not these Israeli phonies running around wearing towels they stole from Holiday Inn on their heads) have the resources to set up private channels and create their own unbreakable encryption systems. The FBI push for back door encryption to be forced on the masses is to watch the people of the United States, to ward off a popular uprising, and to steal confidential personal data with which the FBI agents can make a fast buck. Here is a well-documented case of such behavior!

THE BUGGING OF THE APEC IN SEATTLE - Part 1,

THE BUGGING OF THE APEC IN SEATTLE - Part 2,

THE BUGGING OF THE APEC IN SEATTLE - Part 3

Sep 29 08:28

Gilad Atzmon: Roger Waters and the Bombs of David


May I suggest to Foxman and his notorious ADL that the rest of humanity also has a wish : we want to see an end to the terror imposed by the Jewish state, in the name of the Jewish people, Foxman included. We also want to see an end of Jewish institutional pressure being exercised on so many Western political groups, parties and governments.

Sep 29 06:42

US launches 'Cyber Storm III' to test preparedness against cyber attack

AFP

ARLINGTON: The United States and a dozen other countries are staging a huge cyber exercise to test the preparedness of their computer networks against a simulated attack, Homeland Security Secretary Janet Napolitano has announced.

Sep 28 19:21

Censorship of the Internet Takes Center Stage in "Online Infringement" Bill

Senator Patrick Leahy yesterday introduced the "Combating Online Infringement and Counterfeits Act" (COICA). This flawed bill would allow the Attorney General and the Department of Justice to break the Internet one domain at a time — by requiring domain registrars/registries, ISPs, DNS providers, and others to block Internet users from reaching certain websites. The bill would also create two Internet blacklists. The first is a list of all the websites hit with a censorship court order from the Attorney General. The second, more worrying, blacklist is a list of domain names that the Department of Justice determines — without judicial review — are "dedicated to infringing activities." The bill only requires blocking for domains in the first list, but strongly suggests that domains on the second list should be blocked as well by providing legal immunity for Internet intermediaries and DNS operators who decide to block domains on the second blacklist as well. (It's easy to predict that there will be tremendous pressure for Internet intermediaries of all stripes to block these "deemed infringing" sites on the second blacklist.)

And it's not clear what a user would see in this situation — would it look like a "404 message," that simply says a site or page could not be found, without explaining why? Would users receive some kind of notice clarifying that the site they were seeking was made inaccessible at the behest of the government? Generally speaking, the bill forces all the Internet "middlemen" to act as if a part of the Internet doesn't exist, even though that page may otherwise be completely available and accessible.

Sep 28 15:16

Age of Censorship and Internet Trade Wars

Francis Anthony Govia
Activist Post

Sep 28 14:37

Feds want backdoors built into VoIP and email

Developers of email, instant-messaging and voice-over-internet-protocol applications would be forced to redesign their services so their contents can be intercepted by law enforcement agents armed with legal wiretap orders under federal legislation reported on Monday by The New York Times.

The legislation would, among other things, require cellphone carriers, websites and other types of service providers to have a way to unscramble encrypted communications traveling over their networks, the report said. It specifically mentions companies such as Research in Motion and Skype, which are popular in part because their cellular communications and VoIP services respectively are widely regarded as offering robust encryption that's impractical if not impossible for government agents to crack.

Sep 28 14:03

Has the West declared cyber war on Iran?

Computers can go wrong, and everyone is used to it. But that's at home. We assume that the machines controlling the infrastructure that makes everything tick – power stations, chemical works, water purification plants – have rock-solid defences in place to deal with unexplained crashes or virus attacks by malicious strangers.

Now, though, a new kind of online sabotage has reached its zenith with a self-replicating "worm" that started on a single USB drive and has spread rapidly through industrial computer systems around the world.

Sep 28 10:12

Fresh ACS:Law file-sharing lists expose thousands more

The personal details of a further 8,000 people alleged to have shared music or films illegally have appeared online.

A list of more than 8,000 Sky broadband subscribers and a second of 400 PlusNet users surfaced following a security breach of legal firm ACS:Law.

It comes after a database of more than 5,000 people suspected of downloading adult films emerged on Monday.

The UK's Information Commissioner said ACS:Law could be fined up to half a million pounds for the breaches.

Sep 28 09:03

Pentagon Accused Of Launching Supervirus Attack On Iran

Webmaster's Commentary: 

Whether it is Israel or the US or both that committed this act of industrial sabotage, the question the mainstream media is refusing to ask is what would have happened if these bozos made a mistake and instead of shutting down the power station they triggered a Chernobyl-style melt down and showered the Mideast with radiation, poisoning the cities, poisoning the people, and poisoning the oil fields on which we are still dependent? Is anyone actually thinking these things through? Or are we ruled by leaders who do not care if they blow up the world as long as those gosh-darned Muslims get it first?

One thing is clear. Since this computer weapon has to be inserted using an infected USB flash drive, there is a foreign spy on the staff at the power station.

Sep 28 08:53

US to spy on Internet messaging

The Obama White House is backing new regulations that would compel popular Internet messaging services like Facebook, Skype and Blackberry to open up their systems to FBI surveillance, the New York Times reported Monday, citing federal law enforcement and national security officials.

Webmaster's Commentary: 

I wouldn't worry about it. Odigo received an advanced warning of the 9-11 attacks and gave the FBI the IP address of the message sender and even with the message and the IP the FBI couldn't figure out where the message came from, so how will they handle half a billion text messages about my BFF!

Sep 28 08:36

Israel Suspected in Worm Sabotage of Iran's First Nuclear Plant

The New York Times quotes a former U.S. intelligence office as saying that the attack was the work of Israel’s equivalent of America’s National Security Agency, known as Unit 8200. According to IEEE Spectrum's December issue, Israel had previously used a cyber-attack to shut off radar systems in Syria, allowing it to evaluate what it believed to be an under-construction nuclear reactor.

Sep 28 07:44

Anti-Net Neutrality Bill Gets Leaked From Waxman’s Office

Rep. Henry Waxman, Chairman of the House Committee on Energy and Commerce, the committe that oversees telecommunications was leaked on yesterday. Now we have a copy of Waxman’s plan to subvert Net Neutrality. Copy of the leaked Bill (in legalese) not yet submitted to congress. Leak Source is techdailydose.nationaljournal.com

Let’s say the internet is made of tubes. This bill gives the tube companies license to start selling premium tubes. Big shiny tubes. However anyone with the misfortune not to partner with the tube company will find themselves stuck in the smaller, collapsing tube system.

Sep 27 10:29

Money transfers could face anti-terrorism scrutiny

Ellen Nakashima
The Washington Post

The Obama administration wants to require U.S. banks to report all electronic money transfers into and out of the country, a dramatic expansion in efforts to counter terrorist financing and money laundering.

Officials say the information would help them spot the sort of transfers that helped finance the al-Qaeda hijackers who carried out the Sept. 11, 2001, attacks. They say the expanded financial data would allow anti-terrorist agencies to better understand normal money-flow patterns so they can spot abnormal activity.

Sep 27 09:45

BE A SNITCH ON YOUR SMART PHONE!

Want to earn tons of cool badges and prizes while competing with you friends to see who can be the best American? Download the SnapScouts app for your Android phone (iPhone app coming soon) and get started patrolling your neighborhood.

Webmaster's Commentary: 

Use your smart phone to be just like the Nazi neighborhood informants! Be a REAL American today!

Sep 27 08:50

Israel Cyber-Attacks Iranian Nuke Plant With Stuxnet Computer Virus

Sep 27 06:32

Wiretapped phones, now Internet?

Charlie Savage
The New York Times

Federal law enforcement and national security officials are preparing to seek sweeping new regulations of the Internet, arguing that their ability to wiretap criminal and terrorism suspects is "going dark" as people increasingly communicate online instead of by telephone.

Sep 27 06:27

Short passwords 'hopelessly inadequate', say boffins

The availability of password-cracking tools based on increasingly powerful graphics processors means that even carefully chosen short passwords are liable to crack under a brute-force attack.

A password of less than seven characters will soon be "hopelessly inadequate" even if it contains symbols as well as alphanumerical characters, according to computer scientists at the Georgia Tech Research Institute. The security researchers recommend passwords at least 12 characters long.

Sep 27 06:23

Apple claims to own the word 'pod'

All we are saying is give peas a chance

Sep 27 06:21

New law to 'ease internet wiretaps'

Broad new regulations being drafted by the Obama administration would make it easier for law enforcement and national security officials to eavesdrop on internet and email communications like social networking websites and BlackBerry phones, a US newspaper has reported.

It said the White House plans to submit a bill next year that would require all online services that enable communications to be technically equipped to comply with a wiretap order.

That would include providers of encrypted email, such as BlackBerry, networking sites like Facebook and direct communication services like Skype.

Sep 26 22:03

U.S. should be able to shut Internet, former CIA chief says

SAN ANTONIO (Reuters) - Cyberterrorism is such a threat that the U.S. president should have the authority to shut down the Internet in the event of an attack, Former CIA Director Michael Hayden said.

Sep 26 13:29

Computer attacks linked to a wealthy group or nation

Lolita C. Baldor
Associated Press

WASHINGTON — A powerful computer code attacking industrial facilities around the world, but mainly in Iran, probably was created by experts working for a country or a well-funded private group, according to an analysis by a leading computer security company.

The malicious code, called Stuxnet, was designed to go after several "high-value targets," said Liam O Murchu, manager of security response operations at Symantec Corp. But both O Murchu and U.S. government experts say there's no proof it was developed to target nuclear plants in Iran, despite recent speculation from some researchers.

Sep 26 00:17

Iran 'first victim of cyberwar'

Kevin Hogan, senior director of security response at computer security giant Symantec, said 60 per cent of computers worldwide infected by the Stuxnet worm were in Iran, suggesting its industry was the target.

And European digital security company Kaspersky Labs said the attack could only be conducted "with nation-state support".

"Stuxnet is a working and fearsome prototype of a cyber-weapon that will lead to the creation of a new arms race in the world," it said in a statement about the virus which attacks control systems produced by German company Siemens.

The comments have stirred speculation that Iran's first nuclear power station, at Bushehr, may have been targeted in a state-backed attempt at sabotage or espionage.

Sep 25 15:44

US Cyber Command/Mossad? Stuxnet worm 'targeted high-value Iranian assets'

One of the most sophisticated pieces of malware ever detected was probably targeting "high value" infrastructure in Iran, experts have told the BBC.

Stuxnet's complexity suggests it could only have been written by a "nation state", some researchers have claimed.

Sep 25 10:29

September 10, 2001: Military ‘Infocon’ Alert Level Reduced because of Perceived Lower Threat of Computer Attacks

The US military reduces the Information Operations Condition (Infocon) to Normal—the lowest possible threat level—less than 12 hours before the 9/11 attacks commence, reportedly due to reduced fears of attacks on computer networks.

Level Reduced Due to 'Decreased Threat' - The Infocon level is lowered to Normal, meaning there is no special threat, at 9:09 p.m. this evening. The reason for this, according to historical records for the 1st Fighter Wing at Langley Air Force Base, Virginia, is “a decreased threat from hacker and virus attacks on the computer networks across the US.” [Colorado Springs Gazette, 5/3/2001; 1st Fighter Wing History Office, 12/2001]

Sep 25 08:42

CIA used pirated, inaccurate software to target drone attacks: lawsuit

The CIA used illegally pirated software to direct Predator drone attacks, despite apparently knowing the software was inaccurate, according to documents in an intellectual property lawsuit.

The lawsuit, working its way through a Massachusetts court, alleges that the CIA purchased a pirated and inaccurate version of a location analysis program, which may have incorrectly located targets by as much as 42 feet.

Webmaster's Commentary: 

42 feet means you hit the house next door!

Sep 24 16:07

FBI investigating 'Here you have' worm

Representatives from the FBI's Miami field office spoke with IDG News Service this week seeking information on the hacker behind the worm. A hacker using the name Iraq Resistance has exchanged a number of e-mails with IDG over the past two weeks discussing the incident.

Webmaster's Commentary: 

I am going ot go out on a limb here and speculate that this hacker isn't in or has anything to do with Iraq.

Sep 24 10:57

Airborne Laser Goes Off-Target Due to Software Bug

An airborne laser built for the U.S. Missile Defense Agency failed to destroy a target missile when a software glitch threw off its precision aiming during its latest field test.

Webmaster's Commentary: 

"Meanwhile, in other news, government sources have concluded that the mysterious hole that appeared drilled through Mount Wilson, north of Pasadena, must be the work of Al Qaeda!!

Sep 24 07:18

Censorship of the Internet Takes Center Stage in "Online Infringement" Bill

This is a censorship bill that runs roughshod over freedom of speech on the Internet. Free speech is vitally important to democracy, which is why the government is restricted from suppressing speech except in very specific, narrowly-tailored situations. But this bill is the polar opposite of narrow — not only in the broad way that it tries to define a site "dedicated to infringing activities," but also in the solution that it tries to impose — a block on a whole domain, and not just the infringing part of the site.

Webmaster's Commentary: 

The fastest way to bring down a dictatorship is to force it to act like one where everybody can see it!

SHARE THIS ARTICLE WITH YOUR SOCIAL MEDIA