COMPUTERS/INTERNET/SECURITY | WHAT REALLY HAPPENED


COMPUTERS/INTERNET/SECURITY

Jan 23 12:28

The Sorry State of In-Flight Wi-Fi

I’ve finally found something on commercial flights that’s worse than airplane food: the Wi-Fi. It’s so slow and unreliable that it shouldn’t be allowed to call itself “Wi-Fi.” Renaming it Airplane Dial-Up would be unfair to dial-up.

Jan 23 10:07

How Covert Agents Infiltrate the Internet to Manipulate, Deceive, and Destroy Reputations

Among the core self-identified purposes of JTRIG are two tactics: (1) to inject all sorts of false material onto the internet in order to destroy the reputation of its targets; and (2) to use social sciences and other techniques to manipulate online discourse and activism to generate outcomes it considers desirable. To see how extremist these programs are, just consider the tactics they boast of using to achieve those ends: “false flag operations” (posting material to the internet and falsely attributing it to someone else), fake victim blog posts (pretending to be a victim of the individual whose reputation they want to destroy), and posting “negative information” on various forums.

Jan 23 09:40

Top Google executive predicts end of the internet

At the World Economic Forum in Davos, Switzerland, Google guru Eric Schmidt gave an answer regarding the evolution of the web. “I will answer very simply that the internet will disappear,” Schmidt said on Thursday.

“There will be so many IP addresses, … so many devices, sensors, things that you are wearing, things that you are interacting with that you won’t even sense it, it will be part of your presence all the time,” he explained. “Imagine you walk into a room, and the room is dynamic. And with your permission and all of that, you are interacting with the things going on in the room.”

Webmaster's Commentary: 

The internet that Schmidt wants to go away is the internet that improves person-to-person communications, where we can share the wrongdoings of governments and corporations. The "Dynamic" room model is all about dazzling us with new toys to keep us from looking into the wider outside world and looking carefully at what is going on.

Jan 22 13:46

BOMBSHELL: IRS Has Active Contract For MILLIONS With Company HHS FIRED Over Botched Healthcare.gov

Seven months after federal officials fired CGI Federal for its botched work on Obamacare website Healthcare.gov, the IRS awarded the same company a $4.5 million IT contract for its new Obamacare tax program.

Webmaster's Commentary: 

Adding insult to injury!

Jan 22 13:37

How Obama's Hacking Laws Could Make You a Criminal

Computer-security researchers fear President Barack Obama’s proposed changes to federal hacking laws could put them out of business, could make computers less secure overall, and could put some of them — and maybe even you — in prison.

"Under the new proposal, sharing your HBO GO password with a friend would be a felony," Nate Cardozo, an attorney with the Electronic Frontier Foundation in San Francisco, told an audience of researchers and IT pros Saturday (Jan. 17) at ShmooCon 2015, a security conference held annually in Washington, D.C.

Obama showcased the proposals in his State of the Union address Wednesday night (Jan. 20). The changes to the Computer Fraud and Abuse Act (CFAA), first implemented in 1984, might make many commonplace security-research practices — and media reporting on those practices — federal crimes. Even sharing passwords for online accounts would potentially be punishable.

Jan 22 13:34

The Hidden Threat To Free Speech in Obama’s State of the Union Address

President Obama proposed new laws to protect Americans and “especially our kids” from hackers during his State of the Union address. Swaddled in that almost tender-sounding language, though, was a plan that would strengthen the government’s ability to go after journalists like Barrett Brown.

In fact, the new cybersecurity legislation would further criminalize the kind of activity for which Brown is due to be sentenced in Dallas federal court on Jan. 22. Judge Sam A. Lindsay will decide whether to let Brown, 33, off with time served for the more than two years he’s already spent behind bars, or imprison him for a maximum of eight-and-a-half years. Brown struck a deal to plead guilty to, among other charges, a Computer Fraud and Abuse Act (CFAA) felony.

Jan 22 13:01

Joint Chiefs Chairman: Congress Must Pass Obama’s Cyber Bill

Even though the new Obama cybersecurity bill (itself mostly a copy of the failed CISPA bill) centers on civilian Internet infrastructure and giving the government easier access to individual Americans’ personal data, the Pentagon is finding ways to make it all about them.

Jan 22 12:42

New Facebook feature flags fake news

You've seen them in your feed: false reports of celebrity deaths, conspiracy theories presented as real news, promises of free iPads if you share a link, quotes attributed to the Pope that he never said.

Webmaster's Commentary: 

Note the inclusion of "conspiracy theories". Facebook is providing a button where anyone can flag a story as a hoax to get it banned. This gives the "megaphonies" the ability to silence any and all criticisms of Israel, with no recourse by the original poster.

We need a new censorship-free social media platform!

Jan 21 12:54

Health care website has leaks

The government's health insurance website is quietly passing along consumers' personal data to outside websites, just as President Barack Obama is calling for stronger cybersecurity protections.

It works like this: When you apply for coverage on HealthCare.gov, dozens of data companies may be able to tell that you are on the site. Some can even glean details such as your age, income, ZIP code, whether you smoke or if you are pregnant.

HealthCare.gov contains embedded connections to multiple data firms that the administration says generate analysis to improve the consumer experience. Officials say outside firms are barred from using the data to further their own business interests.

Still, ever-evolving technology allows for individual Internet users to be tracked, building profiles coveted by advertisers.

Jan 21 12:00

My Brush with French (and World) “Press Freedom”

Later in the month, I had the opportunity to take my first river cruise in Europe, on the Saone and Rhone Rivers in the south of France. I took my laptop with me to avail myself of the WiFi service that was available on the cruise boat.

I was still a bit excited about our success with the video and eager, should the opportunity arise, to share it with anyone I thought might be interested. The WiFi worked quite well generally, but when I attempted to view “Falling to Pieces for Israel,” I was greeted with this message: “This video is not available in your country.” At no time when I was in France was I able to see it.

Webmaster's Commentary: 

Read further down about how Kindle deletes books you have bought if the local government bans them. Good reason to go back to paper and ink books if you want to protect yourself from censorship!

Jan 21 11:40

Here's What Concerns Experts About Obama's State of the Union Cybersecurity Goals

Central to the problems with the recommended updates to the Computer Fraud and Abuse Act (CFAA) are vague terms that could easily be interpreted to prosecute innocents, no matter how weak their links to actual criminal activity. Anyone who "intentionally exceeds authorized access to a protected computer, and thereby obtains information from such computer" could be charged. That sounds acceptable on first inspection, but the definition of "exceeds authorized access" includes using a computer with proper authorization "to obtain or alter information" the relevant party is not entitled to look at, "or for a purpose that the accesser knows is not authorized by the computer owner".

Webmaster's Commentary: 

Or for that matter any of the Edward Snowden documents published in the European media.

Jan 21 09:35

The FCC's possible reclassification of ISPs signals hope for net neutrality

In January 2014, the FCC's net neutrality directives were struck down in the US Court of Appeals, a ruling that was expected because in 2002, the FCC reclassified ISPs as "information services," which prevents the agency from exerting much control over the infrastructure that powers these networks.

FCC Chairman Thomas Wheeler indicated that the agency will hold a vote on February 26, 2015, which is likely to return ISPs to being "telecommunication services" under Title II of the Communications Act of 1934. This will provide the FCC the legal authority to open access to utility poles to any interested company to build internet infrastructure, as well as prevent ISPs from throttling speeds from any remote servers, or prioritizing speeds from others in exchange for payment.

Jan 21 08:43

Google Maps Engine could be quietly coming to a halt soon

UPDATED: A Google spokesperson confirmed Maps Engine support will end on January 29, 2016.

Jan 20 09:34

The Digital Arms Race: NSA Preps America for Future Battle

Normally, internship applicants need to have polished resumes, with volunteer work on social projects considered a plus. But at Politerain, the job posting calls for candidates with significantly different skill sets. We are, the ad says, "looking for interns who want to break things."

Webmaster's Commentary: 

The links in red go to PDF files of US documents regarding the scope of cyber-warfare planned by the US Government.

Jan 19 08:22

The Digital Arms Race: NSA Preps America for Future Battle

The NSA's mass surveillance is just the beginning. Documents from Edward Snowden show that the intelligence agency is arming America for future digital wars -- a struggle for control of the Internet that is already well underway.

Jan 17 10:39

NY Post, UPI Twitter Accounts Hacked, Post Fake WWIII Alerts

Hackers infiltrated press agency UPI, posting a number of tweets which contained fake claims that a US Navy aircraft carrier, the USS George Washington, was engaged in active combat with Chinese vessels. The hackers also struck the New York Post.

Jan 16 12:01

FALSE FLAG ALERT - 19,000 French websites under attack

The French Defense Ministry and ANSSI, that country's version of the NSA, confirmed to CNNMoney that they have monitored a large wave of cyberattacks on all sorts of French websites.

Webmaster's Commentary: 

And JUST in time to push the Cybersecurity bill!

Jan 16 09:03

Disinformation of Charlie Hebdo: Analyzing a Fake BBC News Site

You may have noticed that a few media outlets have been reporting that a fake BBC website was setup to spread disinformation regarding the recent Charlie Hebdo attacks in Paris, France.On January 12, 2015 our advanced threat protection flagged the bbc-news[.]co[.]uk domain as a suspicious site. While we can’t say definitively what the motives are of the operators are, it is apparent that they are untrustworthy and potentially nefarious. The predictive classification that we used to identify and flag the site is showing the attack is very similar to former incidents that malicious actors have used in the past like the Boston Marathon malware incidents.

Webmaster's Commentary: 

The purpose was a "poison the well" propaganda stunt; to trick the public into thinking that the questions raised about Paris (and Boston) are not worth paying attention to.

Jan 16 07:41

FCC to vote on Obama’s call for government-run internet next month

The Federal Communications Commission (FCC) will vote in February to decide whether municipalities can bypass state laws to provide their own internet service – a policy that President Barack Obama threw his weight behind earlier this week.

The vote is controversial but has support from the Obama administration, and proponents say it would give the public more options and faster service. Many Republicans and opponents argue that permitting such behavior exceeds the FCC’s authority.

Jan 16 07:30

Announcement: Commenting On Blacklisted News

It has come to our attention that the 3rd party commenting system we are using here on BlacklistedNews.com, Disqus is reporting that site staff or moderators on our behalf are banning commenters.

This is not true, and seems to be either a issue with disqus itself or because it is cross platformed, some of you may be being banned or profiled by Disqus for comments you are making on other sites communities.

Webmaster's Commentary: 

The problem may be Disqus itself. I have noticed that every time I win a discussion, especially one regarding Israel, I get banned. Facebook's commenting facility is also blocking me on sites like the Detroit News. That is why comments on WRH are run internally, and I do not ban commenters unless they are obviously trying to cause trouble.

Jan 15 15:16

Exclusive: White House says net neutrality legislation not needed

The White House on Thursday said legislation was not necessary to settle so-called "net neutrality" rules because the Federal Communications Commission had the authority to write them.

Webmaster's Commentary: 

In other words, Obama just bailed on the promise of net neutrality he used to get support for the new incarnation of CISPA.

Jan 15 06:53

This USB wall charger secretly logs keystrokes from Microsoft wireless keyboards nearby

Privacy and security researcher Samy Kamkar has released a keylogger for Microsoft wireless keyboards cleverly hidden in what appears to be a rather large, but functioning USB wall charger. Called KeySweeper, the stealthy Arduino-based device can sniff, decrypt, log, and report back all keystrokes — saving them both locally and online.

Jan 14 14:33

CTB Locker and Critroni Ransomware Information Guide and FAQ

CTB Locker (Curve-Tor-Bitcoin Locker), otherwise known as Critroni, is a file-encrypting ransomware infection that was released in the middle of July 2014 that targets all versions of Windows including Windows XP, Windows Vista, Windows 7, and Windows 8. Just like other file encrypting malware, the media continues to affiliate this infection with CryptoLocker when in fact this appears to have been developed by a different group using new technologies such as elliptical curve cryptography and the malware communicating with the Command and Control server over TOR. As discovered by Kafeine, this malware also appears to be part of a kit being sold online for $3,000 USD, which includes support in getting it up and running. With that said, expect to see other ransomware released using this kit, but possibly with different interfaces. More information on how this malware is being sold can be found in Kafeine's article "Crypto Ransomware" CTB-Locker (Critroni.A) on the rise.

Webmaster's Commentary: 

One of our WRH readers just got hit with this.

Jan 14 12:29

UK Moves One Step Closer to Orwell’s 1984 Nightmare

In the United States, government officials responded to Apple and Droid’s new encryption services by throwing temper tantrums in speeches and making archaic arguments in court. In the United Kingdom, home of big brother and big brother to the U.S., they simply want to ban forms of communication they cannot intrude upon.

British Prime Minister David Cameron drew media attention this week when, in response to the Paris terrorist attacks, he said

“In our country, do we want to allow a means of communication between people which […] we cannot read?”

Jan 14 11:44

EU ministers push ISPs to censor web after Paris attacks

In the aftermath of the terrorist attacks on the offices of satirical newspaper Charlie Hebdo and a Jewish supermarket in Paris, EU ministers have issued a joint statement calling for ISPs to help to report and remove extremist material online.

The statement was signed by interior ministers from 11 European countries -- including the UK's Theresa May -- on 11 January, with French ministers and security representatives from the US, Canada and EU in attendance. It called for tighter internet surveillance and border controls.

Jan 14 11:17

Play Israeli Youths’ Hilarious New “Push the Bibi” Video Game!

In the age of the political gaffe, how could Israeli PM Bibi Netanyahu’s now-notorious push to the front of the memorial march in Paris last week not turn heads? Fellow Israelis did a collective facepalm and chided him for presenting “the pushy Israeli, the impolite Israeli” to the world during a moment of global mourning for the Charlie Hebdo cartoonists and hostages killed in Paris.

But few went as far as the as-yet-unnamed young creators of “Push the Bibi,” a fun-poking arcade-style game that lets you navigate the Prime Minister to the front of the march. Featuring an image of Bibi wearing a crown, flanked by an Israeli and French flag, the game feels a little like midtown Manhattan during rush hour, but with a layer of bad PR. If your Bibi reaches the coveted spot between Angela Merkel and Ibrahim Keita, the game announces “Game over! Don’t try again.”

Jan 13 08:21

Erosion of free speech? Cameron pledges to ban Snapchat and WhatsApp

PM David Cameron may block encrypted messaging platforms Snapchat and WhatsApp if the Conservatives win May’s general election, as part of the party’s agenda to bolster surveillance powers following last week’s terror attacks in Paris.

Jan 13 08:00

BOOGA BOOGA! U.S. Central Command Twitter account hacked: ‘ISIS is already here’

Hackers claiming to be with the Islamic State terror group infiltrated U.S. Central Command’s official Twitter account Monday.

Webmaster's Commentary: 

Anonymous tracked the source of the hacks to Maryland, home of the CIA and NSA.

Jan 13 07:35

DOJ calls for dismissal of Twitter transparency lawsuit over gov't records requests

The US Department of Justice has called for the dismissal of a lawsuit filed by Twitter, in which the social network alleges its First Amendment rights are violated when the government forbids it to reveal national security requests for user data.

Twitter’s lawsuit concerns the publishing of transparency reports that detail government requests for customer information. A deal struck in January 2014 between the Department of Justice (DOJ) and five technology companies relaxed restrictions on disclosure, but Twitter has argued that the deal did not go far enough in allowing the companies to reveal exactly how many orders it gets from the government and “what types of legal process have not been received.”

Jan 13 07:25

Scientists join Elon Musk & Stephen Hawking, warn of dangerous AI

Hundreds of leading scientists and technologists have joined Stephen Hawking and Elon Musk in warning of the potential dangers of sophisticated artificial intelligence, signing an open letter calling for research on how to avoid harming humanity.

Webmaster's Commentary: 

Jan 12 16:03

CENTCOM's Twitter, YouTube accounts hacked

A group calling itself the CyberCaliphate claimed responsibility for the hack.

A Twitter account from a group identifying itself as Anonymous said Monday it had tracked the source of the hack to Maryland, but that was not confirmed by official sources.

Jan 12 14:16

Obama Will Regulate Targeted Advertising to Students Because Markets Are Scary!

President Obama announced new consumer protection regulations aimed at protecting kids from corporations—evil, greedy corporations—that use students' data to try to sell them things they might actually want.

This is a terrifying prospect that requires immediate government intervention.

Jan 12 11:22

CentCom social media accounts hacked

The Twitter account for U.S. Central Command has been hacked, a U.S. Defense official tells NBC News.

CentCom is based at MacDill Air Force Base in Tampa.

Numerous tweets have been sent out from @CENTCOM threatening American soldiers. One tweet states "ISIS is already here, we are in your PCs, in each military base." Another says "American soldiers, we are coming, watch your back!"

The profile picture on the page cites ISIS, saying "i love you isis."

Jan 12 08:59

EU response to free speech killings? More internet censorship

In the wake of this week’s terrorist attacks in Paris, which began with the killing of 12 people at the offices of satirical publication Charlie Hebdo, the interior ministers of 12 EU countries have called for a limited increase in internet censorship.

The interior ministers of France, Germany, Latvia, Austria, Belgium, Denmark, Spain, Italy, the Netherlands, Poland, Sweden and the U.K. said in a statement (PDF) that, while the internet must remain “in scrupulous observance of fundamental freedoms, a forum for free expression, in full respect of the law,” ISPs need to help “create the conditions of a swift reporting of material that aims to incite hatred and terror and the condition of its removing, where appropriate/possible.”

Jan 09 16:44

Hidden in plain sight (revisited)


Ten months ago, the Rebel Website's editor "Rebel of Oz" published an article exposing the manipulations performed by leading website ranking firm Alexa for the purpose of reducing the search engine ranking of dissident websites. (http://therebel.website/en/editorial/...) After recently changing the domain name of the Rebel Website from therebel.org to therebel.website, Rebel of Oz revisited the matter. Here's what he has found out.

Webmaster's Commentary: 

Alexa is owned by Amazon, which just signed a huge deal with the CIA.

Jan 09 16:18

Cantor Fitzgerald: Apple Watch Will Be Biggest Product Launch In Company's History

Even after having a super holiday season sales, shares of Apple Inc. AAPL 0.11% have witnessed significant declines. However, Cantor Fitzgerald analyst Brian White thinks that the going will be great for Apple in 2015, especially after the Apple Watch release.

Webmaster's Commentary: 

They said the same thing about Google Glass.

Jan 09 13:55

Computer chaos feared over 2015's leap second

The year 2015 will have an extra second — which could wreak havoc on the infrastructure powering the Internet.

At 11:59 p.m. on June 30, clocks will count up all the way to 60 seconds. That will allow the Earth's spin to catch up with atomic time.

Webmaster's Commentary: 

This is a pathetic replay of the Y2K hoax.

Jan 09 08:06

Hundreds mourn the 'death' of Fidel Castro after rumours sweep Twitter (but are they confusing him with recently departed Fidel Castro Odinga from Nairobi?)

Twitter is abuzz with rumours that Cuba's former communist leader Fidel Castro has died, although the speculation has emerged close on the heels of the death of another high-profile person with the same name.

There has been no official confirmation that the 88-year old former leader of Cuba has died and social media has an impressive track record of prematurely announcing Castro's demise.

Jan 09 08:01

MI5 chief seeks new powers after Paris magazine attack

The head of MI5, Andrew Parker, has called for new powers to help fight Islamist extremism, warning of a dangerous imbalance between increasing numbers of terrorist plots against the UK and a drop in the capabilities of intelligence services to snoop on communications.

Webmaster's Commentary: 

Snooping on law-abiding citizens didn't stop this attack (assuming the official story is true, which I don't). And as you can see below, French Authorities were already tracking these two "terror" suspects before the shooting at Charlie Hebdo!

Jan 09 07:51

White House won't take action against Aaron Swartz's prosecutors

Two years to the week before Swartz, 26, took his own life while waiting to be tried in federal court on alleged Computer Fraud and Abuse Act (CFAA) violations, the office of United States President Barack Obama issued a response on Tuesday that answers two petitions posted on the White House website in early 2013, in which the prosecutors who charged the hacker were asked by thousands to be reprimanded over accusations of overreach.

Jan 08 10:21

Directors of FBI and Office of National Intelligence blame Sony hack on North Korea

The top intelligence official in the United States for the first time attributed the security breach suffered by Sony Pictures Entertainment to his North Korean counterpart and called it “the most serious cyberattack ever made against US interests.”

Webmaster's Commentary: 

Jan 08 09:33

FCC chair likely to take Obama’s lead on net neutrality

Speaking at an electronics show, the United States’ top telecom regulator dismissed complaints that tougher regulations would discourage providers from upgrading their networks, seemingly indicating he will back tough net neutrality regulations.

Federal Communications Commission Chairman Tom Wheeler told audiences at the Consumer Electronics Show show in Las Vegas that net neutrality proposals do not currently go far enough to protect consumers. Policy analysts took that as a hint that Wheeler is leaning towards President Barack Obama’s position on net neutrality, calling for Title II regulations for broadband providers that would regulate them as if they were utilities.

Jan 08 07:55

90's kids rejoice as Internet Archive releases 2,300 MS-DOS games for free

By today's standards, classic MS-DOS games like Castle Wolfenstein and Lemmings seem rather rudimentary in terms of how they look on-screen.

A young Xbox One player today might scoff at the pixelating stylings of Prince of Persia for the Apple II, but computer games from the late '80s and '90s hold a special place in the hearts of anyone who grew up in or discovered PC gaming around that time.

Jan 07 12:53

With Power of Social Media Growing, Police Now Monitoring and Criminalizing Online Speech

Criminal cases for online political speech are now commonplace in the UK, notorious for its hostility to basic free speech and press rights. As The Independent‘s James Bloodworth reported last week, “around 20,000 people in Britain have been investigated in the past three years for comments made online.”

But the persecution is by no means viewpoint-neutral. It instead is overwhelmingly directed at the country’s Muslims for expressing political opinions critical of the state’s actions.

Jan 07 08:11

In Europe, Pirates Are Writing The Copyright Law

The collateral damage to liberties has been immense, and has spilled far outside the net. In the US, people are complaining that copyright monopoly law is now unintentionally preventing them to modify items they legally own, such as cars or games consoles. They’re absolutely wrong: that was the exact intention with the most recent round of revisions to copyright monopoly law – to limit property rights and to lock people out of their own possessions. (The copyright monopoly is, and has always been, a limitation on property rights.)

Jan 06 09:12

New 3d Print: Oahu

After making my SF Bay print, I thought I’d turn to the Hawaiian islands: I lived on Oahu for a time and have many fond memories. I was always shocked by its beauty constrained by size: I’m pretty sure you could drive around it twice in one day if you tried. Printed on my Makerbot Replicator (1) . Download the files to print over on Thingiverse.

Jan 06 09:01

Former Acting HHS Cyber Security Director Sentenced to 25 Years in Prison for Engaging in Child Pornography Enterprise

The former acting director of cyber security at the U.S. Department of Health and Human Services was sentenced to 25 years in federal prison today for engaging in a child exploitation enterprise and related charges in connection with his membership in a Tor-network-based child pornography website.

Assistant Attorney General Leslie R. Caldwell of the Justice Department’s Criminal Division, U.S. Attorney Deborah R. Gilg of the District of Nebraska and Special Agent in Charge Thomas R. Metz of the FBI’s Omaha Division made the announcement.

Jan 06 08:26

Internet Era Is Not Kind to Authoritarian TPP

It Was a Pivotal Year in TPP Activism but the Biggest Fight Is Still to Come ... A draft of the Trans-Pacific Partnership's (TPP) Intellectual Property chapter from May 2014 leaked this past fall, confirming what previous leaks had suggested: this so-called trade agreement would bring copyright enforcement provisions that threaten users' right to free expression, privacy, and unfettered access to knowledge online. – Electronic Freedom Foundation

Jan 06 08:19

Breaking the code about the Second World War

Turing was a British mathematician who worked at Bletchley Park, a secret centre for cryptographers who were trying to break the German Enigma code -- allowing the Allies to read Nazi military communications. By designing a machine that could rapidly process information, Turing broke the code -- which ended the war an estimated two years sooner, saving millions of lives -- and through the process laid the foundation for modern computers.

How was Turing rewarded? The British state drove him to suicide, and wrote him out of history, for being gay. He was persecuted in 1952 with the same law that destroyed Oscar Wilde, avoided prison only by agreeing to be chemically castrated, and ate a cyanide-laced apple in 1954.

Jan 05 08:39

Hunting the hackers: Tough and getting tougher, but more important than ever

Events such as the massive attack on Sony Pictures have emphasised yet again how anyone with a grudge and a certain amount of technical knowledge can undermine the digital systems on which modern internet-connected economies rely.

Jan 05 08:19

Sony Hack a Prime Excuse for New US Cybersecurity Laws

Congress has been reluctant to pass the various draconian cybersecurity laws pushed by the administration in recent years, but that may be changing because of the high-profile Sony Pictures hack .

With the FBI ‘successfully’ pinning it on North Korea, at least so far as everyone on Capital Hill is concerned, there is a great deal of pressure for Congress to “do something,” and little interest in the evidence that North Korea had nothing to do with it.

Webmaster's Commentary: 

Memo to the FBI: if you had real, actionable evidence that North Korea hacked into SONY, that would be one thing; but you don't so the charge here is nothing more than a bold-faced lie, and both US citizens, and the world, knows it.

The only bloody reason you pinned this on North Korea is that North Korea, at the New Year, was reaching out to South Korea for a new round of talks, aimed at ratcheting down the tension between the two countries.

Should that have happened, it would have curtailed this administration's ability to engage in war with North Korea, as a back door to a war with China, which must defend it due to treaty obligations.

The FBI's credibility, if it was not before, is in absolute meltdown, and thinking Americans do not believe one word you say.

Jan 04 12:35

More Data on Attributing the Sony Attack

An analysis of the timestamps on some of the leaked documents shows that they were downloaded at USB 2.0 speeds -- which implies an insider.

Our Gotnews.com investigation into the data that has been released by the "hackers" shows that someone at Sony was copying 182GB at minimum the night of the 21st -- the very same day that Sony Pictures' head of corporate communications, Charles Sipkins, publicly resigned from a $600,000 job. This could be a coincidence but it seems unlikely. Sipkins's former client was NewsCorp and Sipkins was officially fired by Pascal's husband over a snub by the Hollywood Reporter.

Two days later a malware bomb occurred.

We are left with several conclusions about the malware incident:

Jan 04 10:08

CIA joins social media, is immediately trolled

The CIA admitted as far back as 2011 that its agents and employees regularly scan social media to spy on intelligence targets. It already had multiple accounts on Flickr and YouTube, but only debuted on Twitter Friday because it had spent months lobbying Twitter to stop someone else who was already using the @CIA handle.

Jan 04 09:59

‘US pursuing political agenda, not justice, sanctioning N.Korea over Sony hack’

There is no hard evidence for the United States’ claims that the North Korea was behind the hack on Sony. In fact, the evidence seems to point in a very different direction. Reports in US and global media say experts taking part in the investigation essentially rule out North Korea’s participation. They say the evidence simply isn’t there to point that finger.

Moreover, those very same experts point out that due to the complexity of the cyberattack it is not quite possible to determine who was behind it in mere 48 or 72 hours as was the case with the US government. Rather than seeing the evidence and drawing conclusions from that, it seems that Washington is pursuing a political agenda and using this issue to further that agenda.

Jan 04 09:24

How Many of These Secret Surveillance Programs Do you Know About?

According to various publications in the American and foreign media, the United States has created a global system of cyber espionage that allows the interception and processing of personal data around the globe in violation of fundamental human rights. Tapped phones, intercepted short messages, supervised discussions in social networks and stolen emails – this is the ugly reality we are living in. The NSA and other units of the United States Intelligence Community are more than capable of breaching any mobile operating system, be it iOS, Android or BlackBerry OS.

Washington and its agencies are literally spending billions of taxpayer dollars annually under the convenient guise of the “war on terror”, which in fact turns out to be a hidden war against its own citizens, now deprived of basic human rights. But what makes it even worse is that it’s pushing its satellite countries to launch an all-out offensive against the civil liberties of Europe and beyond.

Webmaster's Commentary: 

The alleged "war on terror" is simply a cover for a continuing surveillance war against Americans.

We have moved so quickly from "the land of the free...and the home of the brave" to the "land of the cowed...and the home of the surveilled" quickly enough to make my head spin.

Jan 03 11:08

Robots can now learn to cook just like you do: by watching YouTube videos

The demonstration is the latest impressive use of a type of artificial intelligence called deep learning. A hot area for acquisitions as of late, deep learning entails training systems called artificial neural networks on lots of information derived from audio, images, and other inputs, and then presenting the systems with new information and receiving inferences about it in response.

The researchers employed convolutional neural networks, which are now in use at Facebook, among other companies, to identify the way a hand is grasping an item, and to recognize specific objects. The system also predicts the action involving the object and the hand.

Jan 03 08:29

How Financial Looters Are Destroying Your 401(k) in a Fraction of a Second | Brainwash Update

Jan 03 07:58

White House announces sanctions against N. Korea

US President Barack Obama signed an executive order on Friday authorizing the imposition of new sanctions against certain North Korean entities in the wake of the recent Sony hack the White House continues to blame on Pyongyang.

Webmaster's Commentary: 

There is zero evidence that north Korea had anything to do with the SONY hack and quite a bit of evidence it was an internal hack by a disgruntled employee. This is Obama's version of Saddam's nuclear weapons; a made up threat to provoke another nation into war.

Jan 02 10:20

Apple facing lawsuit over shrinking iPhone and iPad storage following iOS 8 update

Apple is facing a lawsuit over the amount of space that the iOS 8 update takes up on iPhone, iPads, and iPods.

The complaint, filed in California by Miami residents Paul Orshan and Christopher Endara, claims that the 16GB iPhones and iPads they purchased had less than the stated amount of usable space, and that this was further reduced after upgrading his iPhone 5S from iOS 7 to iOS 8.

The complaint claims that iOS 8 can occupy more than 23 percent of the storage available on some devices, and further goes on to claim that upgrading devices from iOS 7 to 8 can cause users to lose a further 1.3GB of storage.

Webmaster's Commentary: 

I guess all that government spyware takes up a lot of room!

Dec 31 09:44

NSA spying in Vienna detailed at Chaos meet

According to a report in the Austrian news daily Der Standard, Möchel had made extensive use of the documents revealed by Edward Snowden, the former systems administrator and defense contractor with Booz Allen Hamilton who allegedly leaked NSA and CIA secret archives.

The documents show that the American National Security Agency operates a robust presence in the Austrian capital, and with good reason. Despite Vienna having a population of only 1.75 million people, the city is home to more than 17,000 accredited diplomats, many of whom work in the various international organizations, including the United Nations, IAEA, UNIDO, CTBTO, OSCE and OPEC.

That means nearly 1 percent of Vienna's population have diplomatic status - and a significant portion of those are likely to be spies, according to Austrian investigative journalist Emil Bobi, who estimates that there are more than 7,000 spooks living in the city.

Dec 31 09:43

India blocks 32 websites, including GitHub, Internet Archive, Pastebin, Vimeo

Today, Centre for Internet and Society (Bangalore, India) Policy Director Pranesh Prakash posted a copy of the notice listing the 32 blocked URLs.

Dec 30 16:44

The Great Firewall: China Permanently Shuts Down Google, Gmail and Other Services On Mainland

Google’s Gmail was blocked in China after months of disruptions to the world’s biggest email service, with an anti-censorship advocate suggesting the country’s “great firewall” was to blame.

Large numbers of Gmail web addresses were cut off in China on Friday, according to GreatFire.org, a China-based freedom of speech advocacy group. Users said the service was still down on Monday.

“I think the government is just trying to further eliminate Google’s presence in China and even weaken its market overseas,” said a member of the group who uses a pseudonym. “Imagine if Gmail users might not get through to Chinese clients. Many people outside China might be forced to switch away from Gmail.”

Webmaster's Commentary: 

China has set up their own search engines and mail providers to allow the Chinese people to web surf and communicate without the US Government spying on them. Russia has also done this.

Dec 30 12:28

FBI Busted Falsely Blaming North Korea for Sony Hack

I hate North Korean leaders …

They’re not only clowns sporting bad haircuts and weird clothes, but they live in luxury while the population literally starves.

But the FBI’s official assertion that North Korea carried out the attack in retaliation for Sony’s releasing the movie “The Interview” is B.S.

Webmaster's Commentary: 

Actually, America's money-junkies live in luxury while Americans starve, so I don't see much difference.

Dec 30 11:42

New NSA leak reveals scope of agency's war against crypto

?The National Security Agency boasts the ability to compromise computer protocols meant to encrypt private internet data, leaked documents have revealed. But the NSA has fallen short of totally winning its war against crypto.

Classified NSA files taken by former contractor Edward Snowden and published for the first time by Der Spiegel on Sunday reveal that, while the United States’ intelligence agency is indeed adept at cracking encryption, its efforts are no match when it comes to some of the more popular protocols used to keep communications private.

Webmaster's Commentary: 

The last 6 NSA challenges Mike coded have yet to be broken.

So, even though the NSA boasts about seeing/hearing all of our communications, they really cannot and do not.

Mike and I have speculated that any agents tasked with following our cybertrails have been given that task as punishment duty.

As a Christian pacifist, who never advocates violence, and participates in community charities, I must be a very dull read! :-)

And Mike, as a truth-teller, who also never advocates violence, could never possibly construed as a "threat" by any thinking person.

Dec 30 08:45

It Wasn't North Korea Or Russia: Sony Hack "Perpetrator" Said To Be Laid-Off, Disgruntled Employee

First it was, with "absolute certainly", North Korea. Then, out of the blue, an even more ridiculous theory emerged about the origin of the Sony hackers: Russia. Now, we finally get the truth, and as it turns out it was neither of the abovementioned sovereign actors who had nothing better to do than to hack movie scripts and racist emails: it was Sony's own disgruntled worker who was the source of the hack. According to Politico, FBI agents investigating the Sony Pictures hack were briefed Monday by a security firm that says its research points to laid-off Sony staff, not North Korea, as the perpetrator.

"Researchers from the cyber intelligence company Norse have said their own investigation into the data on the Sony attack doesn’t point to North Korea at all and instead indicates some combination of a disgruntled employee and hackers for piracy groups is at fault."

Webmaster's Commentary: 

GREAT MOMENTS IN THE HISTORY OF THE FBI.

"[Your information is] too precise, too complete to be believed. The questionnaire plus the other information you brought spell out in detail exactly where, when, how, and by whom we are to be attacked. If anything, it sounds like a trap."

FBI response to the top British spy, Dusko Popov (code named "Tricycle") on August 10, 1941, dismissing Popov's report of the complete Japanese plan for the attack on Pearl Harbor.

Pearl Harbor: The Verdict Of History by Gordon Prange, appendix 7 published in 1986. Based on records from the JOINT CONGRESSIONAL COMMITTEE on the Investigation of the Pearl Harbor Attack, Nov 15, 1945 to May 31, 1946.

Dec 30 06:58

New documents reveal which encryption tools the NSA couldn't crack

Not every service fared so well. Following a particular file across the web is marked as "trivial," while decrypting emails sent through the Russian mail service "Mail.ru" is marked as "moderate." Virtual private networks also offer little protection: documents show the NSA planning the capacity to surveil 20,000 VPN connections per hour. Perhaps most alarming, the NSA seems to have completely circumvented the HTTPS system, which is used to secure connections between websites and browsers. By late 2012, the agency expected to be able to intercept 10 million HTTPS connections per day.

Webmaster's Commentary: 

The most secure communications are obtained by creating your own system of encryption which the NSA does not know. Breaking an encrypted message requires two steps. First you have to find the encryption method, then the keys. Of the two, the first is by far the hardest. The allies were unable to break the German Enigma code until they captured an actual machine. Only then could they brute-force the actual message keys. If you are using the known encryption systems such as PGP, the bad guys already have the method, and enough supercomputers to find the keys. But if you develop your own encryption method, no amount of computer power will be able to read the message as long as NSA does not know that method. As we demonstrated with our six NSA challenges, anyone with a modicum of code writing skill can create new methods that will defeat the bad guys' attempts to peek into your private business affairs and steal your secrets for their own personal gain (as they have been caught doing).

Dec 30 06:50

SONY HACK: An Inside Job

Dec 29 19:04

Revenge porn offenders to be charged with domestic abuse

From today, police and prosecutors will be required to consider whether posting explicit pictures of a former partner constitutes a form of domestic abuse

Dec 29 16:46

United Airlines sues entrepreneur, 22, for tip website on how to score cheap flights

United Airlines and Orbitz have filed a civil lawsuit against a 22-year-old New Yorker for running a website that searches for the cheapest flights available using a loophole called hidden city ticketing.

Aktarer Zaman, who founded Skiplagged.com last year, says he isn’t doing anything illegal by exposing an “inefficiency” in airline pricing, a local Fox affiliate reported.

The idea of hidden city ticketing is to buy a one-way airline ticket that has a layover at your actual destination and then ditching the last leg of the trip. For instance, if you want to fly from New York to San Francisco, you would book your flight from New York to Lake Tahoe, with a layover in San Francisco, and then get off there, the Fox affiliate reported.

Dec 29 10:01

Estonia offers e-residency to foreigners

On 21 October, Estonia’s parliament unanimously voted to extend national digital e-residency rights to foreigners by the end of the year. With this e-residency programme, the least populous country in Europe, of 1.3 million people, intends to attract around 10 million “digital citizens” by 2025.

Estonians say their open and online culture – 77% of the population has internet access – is behind this experiment on a state level, and there has been little controversy over the move. After all, this is the country which created Skype.

From Talinn’s point of view, it hopes that foreign citizens will be encouraged to open an online business in the Estonian domain. Authorities say with their online system, applications can be processed in as little as 18 minutes.

Webmaster's Commentary: 

WOW!!:-) Instead of making it harder to do business, the Estonian government is making it easier to do business here!!.

Dec 29 09:04

Browser Hijacking and Free Browser Hijacker Removal Tools

Browser Hijacks appear to be increasing at an alarming rate globally, and it can be a real nuisance, and at times dangerous too. In this post we will have a look at Browser Hijacking and how to prevent and remove Browser Hijacking in Internet Explorer, Firefox, Chrome and Opera web browsers for Windows, natively or by using free Browser Hijacker Removal tools and software.

Webmaster's Commentary: 

There seems to be a sudden surge in browser hijacking. I am getting complaints of abusive advertising appearing on my web page that does not come from my server, such as a pop-over promising a free iPhone if you fill out a survey of some kind. Even if these hijack ads are not malware they are still making money off of other peoples' websites. This article lists ways to check your browsers for hijackers and remove them.

Dec 27 09:46

How Covert Agents Infiltrate the Internet to Manipulate, Deceive, and Destroy Reputations

Among the core self-identified purposes of JTRIG are two tactics: (1) to inject all sorts of false material onto the internet in order to destroy the reputation of its targets; and (2) to use social sciences and other techniques to manipulate online discourse and activism to generate outcomes it considers desirable. To see how extremist these programs are, just consider the tactics they boast of using to achieve those ends: “false flag operations” (posting material to the internet and falsely attributing it to someone else), fake victim blog posts (pretending to be a victim of the individual whose reputation they want to destroy), and posting “negative information” on various forums.

Dec 27 09:04

False Flag Alert! US Nuked From The Inside

Two issues are dealt with in the video below... 1) How NORSE has evidence that the SONY hack originated from within the US and; 2) How the United States is second only to China in being the originating location of attacks occurring right now INSIDE the United States.

Kurt Stammberger, a senior vice president of Norse, told CBS News "Sony was not just hacked, this is a company that was essentially nuked from the inside." Stammberger continues on to state "We are very confident that this was not an attack master-minded by North Korea and that insiders were key to the implementation of one of the most devastating attacks in history."

Dec 27 08:29

Why America would be foolish to wage a cyber-war against North Korea

North Korea's creaky internet crashed for nine hours on Monday, and is now mostly back up. This outage is probably no coincidence. Many observers assume that the Obama administration is behind it, retaliating to what the government called North Korean "cyber vandalism" aimed at Sony Pictures. That attack, as everyone knows, led Sony to cancel the release of a comedy, The Interview, about the assassination of North Korea's young leader, Kim Jong Un.

If President Obama did launch an undeclared cyberwar against North Korea, it may well be the equivalent of Bill Clinton launching cruise missiles at Osama bin Laden's empty training camps back in the 1990s. Clinton's salvo was never a real strategy to deal with a growing threat, and resulted only in intensified attacks. Obama may be making a similar mistake now.

Dec 27 08:16

North Korea blames the US for shutting down its internet and calls President Obama a MONKEY

The North Korean government called President Obama 'a monkey living in a tropical forest' in a racist tirade against the United States, which the dictatorship blames for knocking out its internet.

Officials on the National Defense Commission, led by Supreme Leader Kim Jong Un, lashed out at America, calling its leader 'reckless' and saying the U.S. is shameless.

Washington has denied it has anything to do with the disturbance, which has seen the internet repeatedly black out in the country.

Dec 27 08:12

Computer security specialists cast doubt on FBI claim that North Korea is behind Sony hacking


Nothing like embarrassing America yet again like Obama going out and saying that we will be responding “proportionally” to the attack from North Korea and then finding out it might not have been them at all.

Dec 26 09:16

U.S. Spy Agency Reports Improper Surveillance of Americans

The National Security Agency today released reports on intelligence collection that may have violated the law or U.S. policy over more than a decade, including unauthorized surveillance of Americans’ overseas communications.

Dec 26 08:24

Was the Sony Hack a Domestic Ploy?

Our suspicions about the Sony hack were raised when North Korea accused the US of involving its CIA. By then the story had been continuously presented by the mainstream media, always a sign that some sort of promotion was underway.

And now the next shoe has dropped – predictably. The administration is calling for "stronger cybersecurity laws."

Dec 24 12:22

Govt abusing Bill of Rights with digital surveillance loopholes, lawyers allege

Government and corporate entities have far too much leeway to hack into webcams in order to conduct surveillance, and laws supposedly designed to protect victims of such an intrusion are inadequate, according to a new report.

The report, titled 'Digital Peepholes,' highlights how easy it is for law enforcement and other government agencies, as well as corporations, to violate Americans’ Third and Fourth Amendment rights.

Constitutional “guarantees should preclude the government from remotely activating webcams, given that webcams are frequently located in the home, where privacy rights are at their strongest,” wrote the report’s authors, all of the Institute for Science, Law and Technology at the IIT Chicago-Kent College of Law.

Dec 24 07:45

BREAKING: We Can Conclusively Confirm North Korea Was Not Behind #Sony Hack

We are left with several conclusions about the malware incident:

1. The “hackers” did this leak physically at a Sony LAN workstation. Remember Sony’s internal security is hard on the outside squishy in the center and so it wouldn’t be difficult for an insider to harm Sony by downloading the material in much the same way Bradley Manning or Edward Snowden did at their respective posts.

2. If the “hackers” already had copies, then it’s possible they made a local copy the night of the 21st to prepare for publishing them as a link in the malware screens on the 24th.

Sony CEO Michael Lynton’s released emails go up to November 21, 2014. Lynton got the “God’sApstls” email demand for money on the 21st at 12:44pm.

This tweet by an American fluent in Japanese was yet another indication that it was an insider at Sony but in Japan.

Dec 24 07:16

The Facts Behind The Sony Hack; Sony To Show ‘The Interview’ On Christmas Day

Sony will show The Interview on Christmas Day in theaters after all, suggesting that the entire farce could have been one huge cynical marketing campaign to promote the movie, bolstering the contention that the hack was an inside job.

Dec 24 07:12

North Korea Says Obama And The CIA Are Behind The Sony Cyber Attacks

The North Korean National Defense Commission, led by Kim Jong-un, says the Obama administration is behind the production of Sony Pictures’ “The Interview,” a film featuring the assassination of the North Korean president.

It is unlikely Obama was directly involved in the production of the movie, which Sony pulled after theaters were allegedly targeted.

A more likely collaborator is the CIA, known for working closely with Hollywood on propaganda projects.

“Black Hawk Dawn, Zero Dark Thirty and Argo, those are only a few major recent productions showing how today’s movie industry promotes US foreign policy,” writes Julie Lévesque. “But the motion picture has been used for propaganda since the beginning of the 20th century and Hollywood’s cooperation with the Department of Defense, the CIA and other government agencies is no modern trend.”

Dec 23 13:36

Nuclear Power Plant In South Korea Hacked

The marketing stunt involving what would otherwise have been a straight to DVD flop, a pudgy North Korean dictator, an FBI desperate to create a fabricated YouTube clip of North Korean hackers scheming maliciously in their mother’s basement, an American president demanding retaliation because a 80286-equipped hacking army poses a threat to the American way of life and other surreal, B-grade movie elements may be about to end with the “shocking” re-release of The Interview on Christmas day, but that doesn’t mean that the push to implement an internet kill switch is over. Which really is what the relentless “hacking on the front pages” media scramble is all about.

Webmaster's Commentary: 

My first question is why these mission-critical systems are even connected to the outside internet in the first place?

Dec 23 10:27

Why Is Obama Using Flimsy Evidence to Blame North Korea for Sony Hack?

A lot of technology magazines are rather dubious at President Obama's accusations that it was the North Koreans that that it. Wired magazine, which is pretty well known for covering technology, says that it's akin to saying Saddam Hussein had weapons of mass destruction to say the North Koreans had the capability to pull something like this off.

Dec 23 09:15

Secret report cited in NSA surveillance lawsuit, govt silent on its existence

Wiebe cited a top-secret 2009 report by the NSA inspector general detailing the government’s email and internet data collection, originally published by The Guardian. Other documents, including AT&T’s first surveillance transparency report, published earlier this year, provide evidence of the program’s reach, he said.

James Gilligan, a Department of Justice attorney, said the government had never confirmed nor denied the existence of the secret 2009 report, and added that AT&T’s report only relates to the legal court orders received under the Foreign Intelligence Act.

Dec 23 07:47

As North Korea Loses Internet, Anonymous, Others Question Whether It Really Hacked Sony

On Friday, the FBI released a statement blaming the North Korean government for the massive cyberattack against Sony last month. President Barack Obama also said over the weekend that he was considering re-adding North Korea to the United States' terrorist watch list.

But North Korea has continued to deny that it's behind the Sony breach, and the group that has claimed responsibility -- the hacking collective Guardians of Peace -- is mocking the FBI online, according to The Daily Beast. Some security researchers, as well as members of the hacktivist group Anonymous, are questioning whether there is enough evidence to blame North Korea at all.

"I have yet to see evidence of North Korea behind this," Kyle Wilhoit, a senior threat researcher at Trend Micro, a Japanese security firm, told HuffPost on Monday. Wilhoit argued that just because the FBI sees similarities between the code used in the Sony hack and other North Korean malware doesn't mean it was the same attacker.

Dec 23 07:46

Cyber Command investment ensures hackers targeting U.S. face retribution

In the shadows of the Sony hacking incident and North Korea’s massive Internet outage, the Pentagon has quietly built a multibillion-dollar cyberwarfare capability and trained its commanders to integrate these weapons into their battlefield plans.

U.S. Cyber Command was officially stood up in 2010, based at Fort Meade in the Maryland suburbs of the nation’s capital, consolidating intelligence and cyberwarfare capabilities of the Army, Air Force, Navy and Marines under one house. Soon, billions of dollars were being invested in the concept that cyberattackers targeting America should be prepared to sustain their own damage.

Webmaster's Commentary: 

Cyber Command will be no more effective at harming the attackers than the NSA is at preventing the attacks in the first place.

Dec 23 07:39

China condemns cyberattacks, but says no proof North Korea hacked Sony

China said on Monday it opposed all forms of cyberattacks but there was no proof that North Korea was responsible for the hacking of Sony Pictures, as the United States has said.

North Korea has denied it was to blame and has vowed to hit back against any U.S. retaliation, threatening the White House and the Pentagon. The hackers said they were incensed by a Sony comedy about a fictional assassination of North Korean leader Kim Jong Un, which the studio has pulled.

Dec 23 07:29

North Korean websites back online after shutdown

Key North Korean websites were back online Tuesday after a nearly 10-hour shutdown that followed a U.S. vow to respond to a crippling cyberattack on Sony Pictures that Washington blames on Pyongyang.

It wasn't immediately clear what caused the Internet stoppage in one of the least-wired and poorest countries in the world, but outside experts said it could be anything from a cyberattack to a simple power failure. The White House and the State Department declined to say whether the U.S. government was responsible.

Dec 23 07:02

Google Reveals Government Attempt to Scrub Alleged Prisoner Abuse

Google on Monday released information about the government requests it receives to take down its content, revealing attempts in the U.S. to scrub content related to alleged prisoner abuse, sex crimes with a minor, and fraudulent business dealings.

The search giant for the first time released specific examples of takedown requests from governments around the world alongside its semiannual transparency report, providing a fuller look at how law-enforcement agencies and others attempt to police search results and YouTube videos.

One such example recounts a request from the Georgia Department of Corrections to "remove a YouTube video depicting alleged abuse of inmates."

Dec 23 06:55

China reluctant to join U.S. in punishing North Korea over cyberattacks

China said Tuesday there was no proof that North Korea was behind a cyberattack on Sony Pictures Entertainment, signaling its reluctance to side with the United States over the incident, while also rejecting speculation it could have cut off Pyongyang’s Internet access as punishment.

Asked about American requests for help from China to punish North Korea for cyberattacks, Hua Chunying, a spokeswoman for China’s foreign ministry, said the United States and North Korea needed to communicate directly.

She said Beijing had not seen proof of who was behind the attack on Sony. “We need sufficient evidence before drawing any conclusion,” she said at a news conference.

Dec 22 15:16

North Korea goes completely offline: Report

North Korea is having major Internet problems, just days after President Barack Obama promised a proportional response to the devastating hacks against Sony.

Dec 22 13:17

North Korea's internet is offline; massive DDOS attack presumed

North Korea’s addresses are managed by Star Joint Venture, the state-run Internet provider, which routes many of those connections through China Unicom, China’s state-owned telecommunications company.?

North Korea’s already tenuous links to the Internet went completely dark on Monday after days of instability, in what Internet monitors described as one of the worst North Korean network failures in years.

The loss of service came just days after President Obama pledged that the United States would launch a “proportional response” to the recent attacks on Sony Pictures, which government officials have linked to North Korea. While an attack on North Korea’s networks was suspected, there was no definitive evidence of it.

Webmaster's Commentary: 

So now when the US takes down the power grid, they will claim this is North Korea's "retaliation" for the DDOS attack.

Dec 22 09:02

How Obama Took Sony’s Crisis From Bad to Worse

But as much as Sony seemed to mishandle its sorry situation in recent days, the severity of the circumstances Sony faced are so extreme that it begs the question of whether anyone could have handled it better. Every step of the way Sony has been faced with no-win situations and just plain bad luck.

Just when things couldn’t have looked any worse for the studio, President Obama turned sharply critical of Sony in a news conference Friday, second-guessing its decision to withdraw “The Interview” from theaters.

Dec 22 08:37

The FBI told their story about North Korea attacking Sony. Before we retaliate, read what they didn’t tell you.

The government blames North Korea of the Axis of Evil for the attack on Sony, a claim quite like the bogus claims of the past we so credulously believed. No matter how often they lie to us, Americans believe what the government tells us. They lie, we believe, their lies are exposed — rinse, repeat. It makes us easy to govern, incapable of self-government, and quite different than our skeptical unruly forebearers. We can do better. This is a great day to begin. Read this and decide for yourself. This is the most complete collection of information I’ve found on this story.

Dec 22 08:09

Hacking Collective Anonymous Says FBI Is Lying, “North Korea Is Not Source Of Hack”

Having confirmed unequivocally, in a statement by the FBI and reiterated by President Obama, that “the North Korean government is responsible” for hacking Sony, it appears the YouTube-less ‘evidence’ the FBI provided is being questioned by the hacking-collective ‘Anonymous’ and former Lulzsec hacker Sabu. As The Daily Beast reports, the hackers blasted, the North Koreans “don’t have the technical capabilities,” and added “we all know the hacks didn’t come from North Korea, and “all of the evidence FBI cites would be trivial things to do if a hacker was trying to misdirect attention to DPRK.” Meanwhile, on Saturday afternoon, Guardians of Peace, the hacking group that’s so far claimed responsibility for wreaking havoc on Sony, posted a message online mocking the FBI’s investigation – a series of gyrating animated bodies shrieking, “You are an idiot!”

Webmaster's Commentary: 

GREAT MOMENTS IN THE HISTORY OF THE FBI.

"[Your information is] too precise, too complete to be believed. The questionnaire plus the other information you brought spell out in detail exactly where, when, how, and by whom we are to be attacked. If anything, it sounds like a trap."

FBI response to the top British spy, Dusko Popov (code named "Tricycle") on August 10, 1941, dismissing Popov's report of the complete Japanese plan for the attack on Pearl Harbor.

Pearl Harbor: The Verdict Of History by Gordon Prange, appendix 7 published in 1986. Based on records from the JOINT CONGRESSIONAL COMMITTEE on the Investigation of the Pearl Harbor Attack, Nov 15, 1945 to May 31, 1946.

Dec 22 08:03

Staples data breach exposes 1.16mn cards in 115 stores

The world’s largest office supply retailer Staples has revealed that up to 1.16 million of its clients’ payment cards might have been “affected” by a massive malware attack on the company’s point-of-sales systems.

“Staples’ data security experts detected that criminals deployed malware to some point-of-sale systems at 115 of its more than 1,400 US retail stores,” the company said in a press release.

Webmaster's Commentary: 

And the NSA couldn't find these guys, either!

Dec 22 07:24

N. Korea threatens US, demands apology for Obama’s ‘reckless rumors’ of Sony hack

N. Korea has demanded an apology from the US for “recklessly” circulating an unsubstantiated rumor about Pyongyang’s culpability in the recent Sony hack, warning the “proportional” response promised by Obama will be met with the “toughest counteraction.”

Dec 22 07:14

Why Canada's Internet Keeps Getting More Expensive

A Canadian reddit poster claiming to be a Shaw employee—one of Canada’s premier telcos—with news about new internet rates created a stir online this week by posting what looked like advance details of upcoming rate plans.

The rate plans appeared to change the pricing schemes so that new customers would pay equal money for slower service. Existing customers, whose rates will be going up anyway, would be grandfathered on their old plans—with updated prices showing an obvious path for upsell to the new rate tiers.

Webmaster's Commentary: 

Selling you less for more; that's the new western business model!

Dec 21 08:51

no evidence for sony hack!!!

SHARE THIS ARTICLE WITH YOUR SOCIAL MEDIA