COMPUTERS/INTERNET/SECURITY | WHAT REALLY HAPPENED


COMPUTERS/INTERNET/SECURITY

Oct 01 12:02

DOJ Sues To Block California Net Neutrality Law

Barely an hour after California Gov. Jerry Brown signed what's widely believed to be the toughest net neutrality law ever enacted in the US, the US DOJ announced that it would sue California to invalidate the new law, setting up yet another showdown between the federal government and the largest state in the union.

According to the Washington Post, California has become the largest state to adopt its own rules requiring Internet providers like AT&T, Comcast and Verizon to treat all web traffic equally. State lawmakers wrote their law after the FCC scrapped nationwide protections last year, citing the regulatory burdens they had caused for the telecom industry. The lawsuit opens yet another legal showdown between Brown and Attorney General Jeff Sessions. Recently, a federal judge threw out most of the DOJ's challenge to California's sanctuary state laws.

Oct 01 11:59

Military and U.S. Law Enforcement Establishing Joint Communication Network for Biometric Databases

By Nicholas West

Does anyone remember that it used to be considered a conspiracy theory to warn people about biometric databases? Well, now that it is an accepted reality, we should be looking even farther down the slippery slope for new signposts indicating even greater plans to track, trace and database all human beings.

Apparently it is neither sufficient — nor efficient — to have the myriad databases currently at the disposal of agencies like the Department of Defense, FBI or Homeland Security. According to a release from Biometric Update, these agencies currently use different computer languages that have difficulty communicating with each other as seamlessly as the U.S. government desires...

Oct 01 11:21

RON PAUL: VENEZUELA'S SOCIALISM...AND OURS

This week we witnessed the horrible spectacle of Nikki Haley, President Trump’s Ambassador to the United Nations, joining a protest outside the UN building and calling for the people of Venezuela to overthrow their government.

“We are going to fight for Venezuela,” she shouted through a megaphone, “we are going to continue doing it until Maduro is gone.”

This is the neocon mindset: that somehow the US has the authority to tell the rest of the world how to live and who may hold political power regardless of elections.

After more than a year of Washington being crippled by evidence-free claims that the Russians have influenced our elections, we have a senior US Administration official openly calling for the overturning of elections overseas.

Imagine if President Putin’s national security advisor had grabbed a megaphone in New York and called for the people of the United States to overthrow their government by force!

Webmaster's Commentary: 

Unfortunately, President Trump has made some astonishingly bad choices in the people he has appointed to represent the Unhinged, Surveilled State of Amerika, and Nikki Haley is one hysterically horrific example of Trump's taste in officials, second only to that of Gina Haspel's nomination to - and leadership of - the CIA.

Please don't get me wrong; I would love to see centrist women with impeccable credentials get nominated, and approved, for leadership roles in this country. But somehow, this just doesn't happen under President Trump's watch.

Sadly, both of these ladies are just to the extreme right of Attila the Hun when it comes to both human rights, and national, peaceful self-determination when it comes to countries which do not conduct themselves as the US government would wish (and are sitting over huge oil reserves, as is Venezuela).

Haley is the Neocons' consummate wet dream, when it comes to advocating for regime change in countries sitting over vast fortunes in oil or other resources, like Iran; Venezuela; Russia; or China.

But she has a couple of problems with publicly calling out Venezuela for regime change.

First and foremost, China has just given Venezuela 5 billion dollars as a loan last month with which to create a lifeline for its battered economy last month. China to give Venezuela a 5 billion dollar loan, as Maduro visits Beijing.

And secondly, at least for the moment, Venezuela's military are still on his side, particularly those 16,900 military Maduro "promoted" last July: Maduro "promotes" 16,900 members of his military for "loyalty"

And there is utterly no guarantee, if the US goes in with the usual bovine excrement rationale of "attack to protect the people" of Venezuela, that the outcome will be to the Unhinged, Surveilled State of Amerika's liking.

Remember Libya, and just how brilliantly well that went, after the assassination of Qaddafi?!? Talk about a "mammary glands up" outcome!

Ambassador Haley behaves as though she is a Miss Cleo wannabe, declaring that she can see the outcome of events before they unfold; for example, the accusation, made as late as August of this year, that Iran had a secret nuclear weapons program Nikki Haley warns that Iran could become "The Next North Korea", taking a phrase right out of Bibi Netanyahu's playbook

And remember, this was done right before the IAEA's statement that the P5+1 agreement was still being honored by the Iranians.IAEA states that Iran is still acting in accord with the P5+1 agreementThe article went on to state the following:
"Mogherini further pointed to the 12th report released by the International Atomic Energy Agency (IAEA) certifying that Iran is still complying with all its nuclear related commitments in accordance with the JCPOA and said, "This is good news."

Acting upon what is not there, does not make for good states craft; it is unfortunate that Ms. Haley appears to be dancing to the tune of Neocon delusional thinking, and that there is no equivalent in the US Constitution of the 25th Amendment, for removal of a US representative who is no longer physically, or intellectually fit, to represent this country.

Oct 01 10:44

Python joins movement to dump 'offensive' master, slave terms

Python creator Guido van Rossum retired as "benevolent dictator for life" in July, but like Michael Corleone in The Godfather III, he's been pulled back in to resolve a debate about politically incorrect language.

Like other open source communities, Python's minders have been asked whether they really want to continue using the terms "master" and "slave" to describe technical operations and relationships, given that the words remind some people of America's peculiar institution, a historical legacy that fires political passions to this day.

Last week Victor Stinner, a Python developer who works for Red Hat, published four pull requests seeking to change "master" and "slave" in Python documentation and code to terms like "parent," "worker," or something similarly anodyne.

Webmaster's Commentary: 

This is just getting silly!

Oct 01 10:31

VIDEO: A SHORT HISTORY OF U.S. MEDDLING IN FOREIGN ELECTIONS

MEDDLING IN FOREIGN elections is bad. I think we can all agree on that.

And almost everyone — bar Donald Trump — seems to believe that the Russian government meddled in the 2016 election. So that should be condemned.

Here’s the problem, though: U.S. politicians and pundits cannot credibly object to Russian interference in U.S. elections without also acknowledging that the United States doesn’t exactly have clean hands. Or are we expected to believe that Russian hackers were the first people in human history to try and undermine a foreign democracy?

In this video, I examine the ways in which the United States has, in fact, spent the past 70-odd years meddling in elections across the world.

Oct 01 10:29

TRAVELERS TO NEW ZEALAND WHO REFUSE A DIGITAL STRIP SEARCH WILL BE FINED $5000

New Zealand's Customs and Excise Act 2018 went into effect today. That means travelers who refuse to give their phone or laptop password to customs officials will be fined NZ$5000. In addition, their devices will be confiscated and forensically searched.

Customs Minister Kris Faafoi said these digital strip searches are necessary because "A lot of the organised crime groups are becoming a lot more sophisticated in the ways they're trying to get things across the border. And if we do think they're up to that kind of business, then getting intelligence from smartphones and computers can be useful for a prosecution."

But Thomas Beagle of Council for Civil Liberties pointed out that organized criminals are smart enough not to keep incriminating files on their devices.

From Radio NZ:

[Customs spokesperson Terry Brown] said the law struck the "delicate balance" between a person's right to privacy and Customs' law enforcement responsibilities.

Webmaster's Commentary: 

New Zealand may be a beautiful place to visit; however, there are other beautiful places to visit which haven't gone full black-belt fascist; color this off my destination for any tourism whatsoever, and I can guarantee you that any laptop with which I may travel is totally "vanilla" in terms of content.

Oct 01 10:17

More Evidence of Political Coverup in Dem IT Security Scandal

More evidence has surfaced about the disturbing political coverup of grave national security violations committed by the Pakistani who ran House Democrats’ information technology. His name is Imran Awan and last year he was arrested on bank-fraud charges at Dulles International Airport in Washington D.C. while trying to flee to his native Pakistan. Even after getting fired by some members of Congress for stealing computers and data systems, Florida’s Debbie Wasserman Schultz, then Democratic National Committee (DNC) chair, kept him and let him have access to her emails and files as well as the password to the electronic device she used for DNC business. At one point, Awan had access to the computers of dozens of members of Congress, including those on the House Intelligence and Foreign Affairs committees. Judicial Watch has launched an investigation and is pursuing public records.

Oct 01 10:03

World wide web has become a Frankenstein's monster: Creator Sir Tim Berners-Lee admits his brainchild is now 'an engine of inequity and division' as he launches audacious bid to fix it

The inventor of the world wide web has admitted that he's become disillusioned by his creation because it has become 'an engine of inequity and division.'

Sir Tim Berners-Lee created the web in 1989 with the idea that the sharing of information would benefit all mankind – but now, he says it is 'swayed by powerful forces who use it for their own agendas.'

In a blog post, the 63-year-old spoke of how the public have developed a mistrust of apps that 'have an ulterior motive.'

In the wake of the breach of millions of people's Facebook data by Cambridge Analytica, he revealed he has been working on a new online platform that would help users regulate the personal information they share online and how the data is stored.

Oct 01 08:04

Perils of the Part-Time Driver

BMW just publicly revealed their new camera-based driver monitoring system. It is called Extended Traffic Jam Assistant and will be available in the 2019 X5, the company’s best-selling mid-sized SUV.

The assistant is part of what’s styled Level 2 automated driving tech. The 2019 X5 can drive itself – including steer itself – without the driver touching anything – all the way up to just under 40 MPH. But for obvious reasons – including legal liability reasons – BMW doesn’t want to leave it entirely up to the X5 to drive itself.

Well, that’s not exactly accurate.
The driver is still expected to pay attention to his driving – even when he’s not the one actually driving the car.

But if the driver is supposed to pay attention to driving, shouldn’t he just . . . drive?

Oct 01 07:35

iPhone XS, XS Max charging problems: Strange issues surface on Apple's new phones

Some owners of the new iPhone XS and iPhone XS Max are reporting on Apple's community site that the devices aren't charging when plugged into a power supply via a Lightning cable.

Certain users are reporting that the iPhone XS will sometimes start to charge after reinserting an Apple-made cable. Others have noticed that if the device is not charging, picking it up or tapping the screen to wake up the device will cause it to charge.

"If I haven't interacted with the phone for some time, it becomes unresponsive to a charger being plugged in. But if I unplug then lift it and start using it, it will recognize the charger," wrote one iPhone XS owner.

Sep 30 20:05

Linux developers threaten to pull “kill switch”

Activists from the feminist and LGBTQIA+ communities have been trying to force the Linux project to join the Contributor Covenant since at least 2015. The Contributor Covenant is an agreement to implement a special Code of Conduct (frequently CoC from now on) aimed at changing the predominantly white, straight, and male face of programming. CC’s Code of Conduct is controversial particularly because it allows anyone to be banned from contributing code for any reason, usually with no mechanism for oversight or accountability.

On September 16 the pro-CoC side got their wish (how this happened is a very strange story of its own, read recent news about Linus Torvalds’ departure if you want to know more) — Linux had officially committed to implementing and obeying the CC Code of Conduct — and they immediately set about using it to remove top Linux coders.

PC could soon screw up the Linux kernel. Insanity.

Sep 29 08:49

ELECTION SECURITY REMAINS JUST AS VULNERABLE AS IN 2016

The ability to vote for local, state, and federal representatives is the cornerstone of democracy in America. With mid-term congressional elections looming in early November, many voices have raised concerns that the voting infrastructure used by states across the Union might be suspect, unreliable, or potentially vulnerable to attacks. As Congress considers measures critical to consumer rights and the functioning of technology (net neutrality, data privacy, biometric identification, and surveillance), ensuring the integrity of elections has emerged as a matter of crucial importance.

With mid-term elections in just two months, Secretaries of State should be pressed to do their jobs and increase security before voters cast their ballots.

Webmaster's Commentary: 

The electronic process, which we know can be hacked very easily, should be scrapped in favor of paper ballots, period, end of discussion.

Voters should be required to provide voter ID, either in terms of a state identification, or valid driver's license.

And if you have never seen the following Hacking Democracy, by Bev Harris, , treat yourself by ordering this documentary about how wildly unsafe and unsecure voting systems are in this country.

Sep 29 08:42

YOU GAVE FACEBOOK YOUR NUMBER FOR SECURITY. THEY USED IT FOR ADS

Add “a phone number I never gave Facebook for targeted advertising” to the list of deceptive and invasive ways Facebook makes money off your personal information. Contrary to user expectations and Facebook representatives’ own previous statements, the company has been using contact information that users explicitly provided for security purposes—or that users never provided at all—for targeted advertising.

A group of academic researchers from Northeastern University and Princeton University, along with Gizmodo reporters, have used real-world tests to demonstrate how Facebook’s latest deceptive practice works. They found that Facebook harvests user phone numbers for targeted advertising in two disturbing ways: two-factor authentication (2FA) phone numbers, and “shadow” contact information.

Two-Factor Authentication Is Not The Problem

Webmaster's Commentary: 

Absoflippinglutely unbelievable, but perfectly predictable from this company.

Please get off of this "infozilla for profit scam", and go with another service which does not rip off private information.

Sep 29 06:52

CIBC, A Huge Canadian Bank, Was Offline All Day, Proving Again The Dangers of a Cashless Society

It only took one day of the CIBC debacle to remind people of why digital transactions are at the mercy of the computers and those who control them.

Sep 29 00:25

Reddit Now “Quarantining” Users Who Question 9/11—Direct Users to Gov’t Site Instead

A highly popular subreddit devoted to posting information which proposed information outside the official narrative to 9/11 has been “Quarantined” by the Reddit Administrators. The community has effectively been cut off from the rest of the platform and anyone who wishes to view its contents are forced to go through a checkpoint while being redirected to a government website.

Sep 28 16:22

CBS Shuts Down Stage 9, a Fan-Made Recreation of the USS Enterprise

Stage 9, a beautiful fan-made recreation of the Enterprise ship from Star Trek: The Next Generation, has been shut down following a cease-and-desist from CBS. The people behind the two-year-old project tried to reason with CBS, offering to make changes to keep their dream project alive, but the broadcasting giant wasn't interested in discussion.

In my view this is a travesty because it is a stunning piece of work. Take a look...

Sep 28 11:19

TAKE A PEEK, TERRORISTS AND SPIES! BELGIUM TO SUE GOOGLE FOR REFUSING TO BLUR MILITARY SITES

Wanna take a peek at jets stationed at Belgian airbases and learn how many US nukes are stored there? Just google it! It’s all there on the maps. But Brussels now plans to sue Google for not blurring its military sites.
The Belgian Defense Ministry had already asked the tech giant to blur the sensitive data from Google Maps, but the American company apparently ignored the demand. Now the military has decided to take action.

“The Defense [Ministry] had made a request to Google to blur [Belgian military] sites. After it found out that this [request] wasn’t satisfied, it [the ministry] will sue Google,” an official from the defense ministry’s press service told Sudinfo newspaper.

Webmaster's Commentary: 

Good that Google is being sued for this; that information, putting US personnel and equipment at high risk, should be the last thing on earth Google should be doing.

Sep 28 09:59

DEF CON hackers' dossier on US voting machine security is just as grim as feared

Researchers found that many of the systems tested were riddled with basic security blunders committed by their manufacturers, such as using default passwords and neglecting to install locks or tamper-proof seals on casings. These could be exploited by miscreants to do anything from add additional votes to create and stuff the ballot with entirely new candidates. It would require the crooks to get their hands on the machines long enough to meddle with the hardware.

Some electronic ballot boxes use smart cards loaded with Java-written software, which executes once inserted into the computer. Each citizen is given a card, which they slide in the machine when they go to vote. Unfortunately, it is possible to reprogram your card yourself so that when inserted, you can vote multiple times. If the card reader has wireless NFC support, you can hold your NFC smartphone up to the voting machine, and potentially cast a ballot many times over.

Sep 28 09:55

US mid-terms: Hackers expose 'staggering' voter machine flaws

In August, the Def Con conference in Las Vegas ran a "Voting Village", where participants were encouraged to uncover flaws in US election infrastructure by hacking into various computer systems.

The organisers of the conference on Thursday released a 50-page report on their findings.

They describe the number and severity of flaws in voting equipment as "staggering".

"The problems outlined in this report are not simply election administration flaws that need to be fixed for efficiency's sake, but rather serious risks to our critical infrastructure and thus national security," the report claims.

Sep 28 09:51

San Diego port hit by ransomware attack

San Diego's port operator has been caught out by ransomware.

The Port released a statement saying the malware had infiltrated its computer network and was disrupting administration systems.

It said the attack had not stopped ships or boats using the port, or put members of the public in danger.

Sep 28 07:52

ex-NSA Hacker Discloses macOS Mojave 10.14 Zero-Day Vulnerability

The same day Apple released its latest macOS Mojave operating system, a security researcher demonstrated a potential way to bypass new privacy implementations in macOS using just a few lines of code and access sensitive user data.

Sep 28 06:45

Loss Of Internet Forces Assange To Step Down From Wikileaks Editor Role

Julian Assange has stepped down as editor-in-chief of Wikileaks because he is unable to access the internet.

His team indicated that a lack of communications leaves his position as editor of the organisation, which publishes secret information, untenable, although he remains its “publisher”.

>>>

Sep 27 18:10

Google Chrome browser gives “Critical Error” notice when you play Project Veritas videos EXPOSING crooked deep-state “Democratic” communists

About half way into certain Project Veritas videos, Google Chrome abruptly interrupts the video and projects a “Critical Error” message enveloping your smart device screen. Coincidence? We think not. The only critical error being made is by the deep state communists working for the DSA anarchists.

Sep 27 17:55

TSA Bosses Covered Up Internal Sexual Harassment; What Does That Mean For The Public Cases?

By Aaron Kesel

The Transportation Security Administration, the agency always fingered for groping allegations of passengers boarding airplanes, has reportedly had bad bosses for quite some time who covered up internal sexual harassment, fueling the culture...

Sep 27 17:15

Another Recall: Burn Baby, Burn — Fitness Tracker Inferno!

By B.N. Frank

Just announced! ANOTHER Fitness Tracker recall! This time it’s due to burn risk.

"Portland-based Provata Health has recalled around 30,000 fitness trackers following reports of burns due to overheating issues...The Chinese manufactured devices come with a digital display, accelerometer, optical heart rate sensor and Bluetooth technology. They are offered in three colors: black, blue and mint green."...

Sep 27 14:33

Elon Musk Sued By SEC For Securities Fraud, Tesla Stock Tumbles: Full Complaint

Update: from the SEC press conference:

MUSK'S STATEMENTS HAD NO BASIS IN FACT, SEC'S AVAKIAN SAYS
NONE OF MUSK'S STATMENTS PRECLEARED BY ANYONE ON TESLA: SEC
TESLA INVESTOR RELATIONS TOOK MUSK TWEETS AT FACE VALUE: SEC
MUSK'S TWEETS WERE `SIMPLY NOT TRUE,' SEC'S PEIKEN SAYS
And the punchline:

MUSK'S TWEET ON $420 PRICE WAS TIED TO MARIJUANA CULTURE: SEC
MUSK THOUGHT HIS GIRLFRIEND WOULD FIND PRICE HUMEROUS: SEC
Oops.

Webmaster's Commentary: 

Musk is a genius; but a genius who needs to be paired with a "hard-headed" pragmatic business partner who will not let his empire spiral out of control.

Sep 27 13:31

The Bitcoin Psyop - corbettreport


TRANSCRIPT AND SOURCES: https://www.corbettreport.com/bitcoinpsyop/
Yes, the blockchain is truly revolutionary. Yes, bitcoin is Tulipmania 2.0. Yes, cryptocurrency is a nail in the coffin of the bankster parasites. Yes, digital currency is a tool of the totalitarian tyrants. No, these statements are not contradictory. But don’t worry if you think they are. You’re just a victim of "The Bitcoin Psyop."

Sep 27 12:47

DETAILED LOOK AT GOOGLE'S SECRET, CENSORED, SPYING CHINESE SEARCH TOOL

Jack Poulson is one of several googlers to quit the company over Project Dragonfly, the company's secret plan to launch a Chinese search tool that will incorporate state surveillance and censorship on behalf of China's authoritarian government.

Now, Poulson has sent a letter to the US Senate detailing the internal workings of Project Dragonfly, confirming that the tool is designed to block such queries as "student protest" and "Nobel prize," and to facilitate tracking users whose search history reveals an interest in politically sensitive topics.

Google confirmed that this product has been developed, but insisted that the product is "not close to launch."

The letter alleges Google is working on:

* A prototype interface designed to allow a Chinese joint venture company to search for a given user's search queries based on their phone number

Webmaster's Commentary: 

You have to understand; that unholy triumverate of Google, Facebook, and Twitter are also working as arms of US government propaganda right now, by their deplatforming algorithms, and such a system not too far from what Google is developing for China will most probably shortly be in operation right here in the good old Unhinged, Surveilled State of Amerika.

Sep 27 12:20

“Historic Judgment” As India’s Nationwide Biometric ID Database Ruled Constitutional

By Nicholas West

As the march toward a cashless (and privacy-less) society accelerates forward, a new high watermark has been reached.

India first introduced its concept for a nationwide biometric ID database more than 7 years ago, which they touted as a necessary “social welfare” program to assist the millions of India’s unbanked...

Sep 27 11:33

Edible Robot Caterpillar Designed to Deliver Drugs Inside Human Body

By Nicholas West

High-tech drug delivery systems continue to be researched. I’ve extensively covered the move toward nanorobotics that can do everything from deliver drugs to laying down labels for genetic marking that could one day connect the human brain to computers or rewire it completely.

The latest offering is a bit more direct than that – it involves eating a robotic caterpillar and having it swim through your insides to distribute medication, as you can see in the video...

Sep 27 09:51

How to Have Power Over the Big Tech Companies (And Still Use Their Products)

Governments are coming for the big tech companies.

But governments use big tech’s data too… So obviously they aren’t going to solve the biggest privacy concerns.

This is a problem because the main issue with Amazon, Google, and Facebook is how they interact with governments.

I talked about this yesterday… the real reason the government won’t hold big tech accountable.

We only need to look to China’s dystopian social credit scores to see how Google and Facebook data is used by governments.

And the CIA seems to be pretty happy with their deal with Amazon and Jeff Bezos.

Why would we expect the government to protect our privacy when the government profits from the intrusion into our privacy?

Sep 27 09:18

Is a “Social Credit” Program Coming to America? Or Is It Already Here?

Have you heard about China’s dystopian new “social credit” program? If you haven’t, there’s a terrifying infographic from Bored Panda that I’ll be referencing throughout this article.

The good news is that this is happening in China, where we all know a Communist government has long been crushing freedom for the residents of the nation. You may think this doesn’t affect you because you’re in America, gosh-dang-it, but we’ve seen over and over again how a “great idea” in another country, no matter how dystopian, can spread like a viral contagion.

The bad news is that it is incredibly close to happening here. Heck, it is happening here.

Don’t believe it’s already happening? Let’s take a look.

Sep 27 08:27

More Schools Are Converting Back to Safer Wired Internet. Free Documentary “Wi-Fried” Details Why.

By B.N. Frank

There is still no safe level of cell phone and wireless WiFi radiation exposure that has been scientifically determined for children and pregnant women. This is why an increasing number of schools in the U.S. and overseas are replacing wireless (WiFi) internet with safer wired internet. Many doctors have been recommending this for a while now. Regardless, this is not coming easily everywhere...

Sep 26 10:53

The Real Reason the Government Won’t Hold Big Tech Accountable

Clearly, China is not going to prohibit Google and Facebook from providing them with incriminating information on citizens.

Is the CIA going to make sure the money they give Bezos doesn’t influence the Washington Post, which Bezos owns?

Are elected officials going to get Facebook out of elections, or are they going to make sure Facebook helps them win the next election?

Is the government going to protect your privacy from Google, when the government is only too happy to subpoena incriminating evidence against you from the search giant?

The government already teamed up with these companies!

And that’s, like, most of the problem!

The government is going to focus on regulating the wrong things.

Sep 26 10:06

Ex-Google employee warns of ‘disturbing’ China plans

The letter alleges Google is working on:

  • A prototype interface designed to allow a Chinese joint venture company to search for a given user's search queries based on their phone number
  • An extensive censorship blacklist developed in accordance with Chinese government demands. Among others, it contained the English term "human rights", the Mandarin terms for 'student protest' and 'Nobel prize', and very large numbers of phrases involving 'Xi Jinping' and other members of the CCP
  • Explicit code to ensure only Chinese government-approved air quality data would be returned in response to Chinese users' search

    Mr Poulson said the sum of these efforts amounted to a "catastrophic failure" of Google's internal policies on privacy - as well as going against assurances made to the US trade regulator regarding data protection measures in its products.

  • Sep 26 07:05

    Spotify launches controversial customised 'heritage playlists' based on your DNA in new partnership with genetics firm Ancestry

    Spotify claims to be able to create a 'heritage playlist' based on the results of a £79 ($99) AncestryDNA kit.

    Since the partnership launched last Thursday, more than 10,000 people are believed to have signed up.

    However, not everyone is convinced, with some saying that everyone's playlist will end up playing 'Africa' by Toto.

    Sep 26 04:30

    HERE’S HOW CHINA’S ‘SOCIAL CREDIT SCORE’ PUNISH AND REWARD CITIZENS, AND IT’S TERRIFYING

    George Orwell’s 1984, Black Mirror S03E01, Psycho Pass, The Orville and many others have all theorised how technology can make our lives better… or worse.

    Sep 25 12:20

    ‘Resistance’ Hero Brian Krassenstein Admits to Being Paid for Hijacking Trump’s Twitter Feed in Secret Recording

    In a secret recording published by Los Angeles-based political activist Currie Dobson, “Resistance” hero Brian Krassenstein admits to being paid for his excessive anti-Trump tweets.

    The purpose of this is, he admits, is to spam the president’s feed and prevent positive commentary from being visible at the top when people scroll through the responses.

    When asked if being a member of the “Resistance” is a job for him, Krassenstein begins by stating that he has several businesses and that it’s just what he enjoys spending his time doing. He quickly goes on to admit that he also happens to be paid for it.

    Sep 25 11:42

    Drones Unleashed to Find Tax Evaders as Greece Sets Disturbing Precedent

    By Nicholas West

    Anyone who is looking to understand exactly what the term “mission creep” means and why privacy advocates warn of its negative impact, here is another case study.

    Greece is apparently battling a “black economy” in one of its most popular tourist attractions: the island of Santorini. According to tax authorities, the area has become a hotbed of tax evasion, primarily by day trip organizers who are not properly recording their income. They have turned to drones...

    Sep 25 10:53

    Your Elected Officials Received How Much $$ From AT&T, Verizon and Comcast??

    By B.N. Frank

    There’s no doubt that technology can be wonderful. Anyone experiencing car trouble will tell you that having a cell phone can literally be a life saver. But it’s actually not necessary for millions more cell towers to be installed in front of homes and everywhere else so we can all have cell phone service. Unfortunately, this may happen anyway thanks to The Federal Communication (FCC) and many U.S. elected officials due to their unrelenting push to pass legislation in order to win the ridiculous and the highly risky “Race for 5G”...

    Sep 25 09:39

    Former Google bigwig launches AI “church” that positions technology as GOD

    Former Google executive Anthony Levandowski has filed IRS paperwork to establish an official religion devoted to technology. Not only will this bizarre religion worship scientific progress, but it will also worship artificial intelligence and create a “godhead.”

    According to his filing, this new non-profit religious organization, which will be known as “Way of the Future,” will “develop and promote the realization of a Godhead based on artificial intelligence and through understanding and worship of the Godhead [to] contribute to the betterment of society.”

    Sep 25 08:58

    The UN Accidentally Exposed Passwords And Sensitive Data To The Entire Internet

    The U.N. accidentally released passwords, internal documents, and other sensitive details when it failed to properly secure its accounts on Trello, a popular workplace project management website.

    According to The Intercept, “[a]ffected data included credentials for a U.N. file server, the video conferencing system at the U.N.’s language school, and a web development environment for the U.N.’s Office for the Coordination of Humanitarian Affairs.” It was made available to anyone who had the links to the material as opposed to specific users granted access.

    The security slips were first identified by Security researcher Kushagra Pathak back in August after he conducted Google searches, which led him to public Trello pages that also linked to Google documents and Jira pages. Jira is an “issue tracking app,” as noted by The Intercept.

    Sep 25 08:55

    Three Phases of Surveillance to Totalitarianism: It is Happening Now

    Over the past year and a half, I’ve written many pieces on the surveillance state and how we are one step away from the inculcation of technological “omniscience” pertaining to control. The objective is not simply “control,” as they have already obtained that for the most part: limiting cash withdrawals from the bank, restricting your movements and business outside of the country, and new laws being created by the day. This latter part is akin to a “tag team” event of WWF: what the feds can’t or won’t do, they “tag” off for the states to accomplish, with local governments following suit.

    The objective is total control: over everything you read, hear, and watch in the (so-called) media, and an eyeball on you in every facet of your life.

    Sep 25 08:33

    Confirming Assange's Assertion That WikiLeaks' Source Was The DNC Itself

    Authored by Elizabeth Vos via DisobedientMedia.com,

    Disobedient Media has closely followed the work of the Forensicator, whose analysis has shed much light on the publications by the Guccifer 2.0 persona for over a year. In view of the more recent work published by the Forensicator regarding potential media collusion with Guccifer 2.0, we are inclined to revisit an interview given by WikiLeaks Editor-In-Chief Julian Assange in August of 2016, prior to the publication of the Podesta Emails in October, and the November US Presidential election.

    This author previously discussed the possibility that Assange’s current isolation might stem in part from the likelihood that upon expulsion from the embassy, Julian Assange could provide evidential proof that the DNC emails and Podesta emails published by WikiLeaks were not sourced from Russia, or backed by the Kremlin, all without disclosing the identity of their source.

    Julian Assange told RT:

    Sep 25 08:29

    The UN Accidentally Exposed Passwords And Sensitive Data To The Entire Internet

    The U.N. accidentally released passwords, internal documents, and other sensitive details when it failed to properly secure its accounts on Trello, a popular workplace project management website.

    According to The Intercept, “[a]ffected data included credentials for a U.N. file server, the video conferencing system at the U.N.’s language school, and a web development environment for the U.N.’s Office for the Coordination of Humanitarian Affairs.” It was made available to anyone who had the links to the material as opposed to specific users granted access.

    Sep 25 08:26

    Cryptos Crash After "Mt.Gox" Tokyo Whale Renews Bitcoin Liquidation

    Cryptocurrencies are crashing once again following reports that the trustee liquidating the defunct exchange Mt. Gox has offloaded another 25.98 billion yen ($230 million) of Bitcoin and Bitcoin Cash...

    Sep 25 08:24

    Facebook Sued By PTSD-Stricken Moderator Over "Rape, Torture, Bestiality, Beheadings, Suicide And Murder"

    Selena Scola moderated content for Facebook as an employee of contractor Pro Unlimited, Inc. between June 2017 and March of this year, according to her complaint.

    "Every day, Facebook users post millions of videos, images, and livestreamed broadcasts of child sexual abuse, rape, torture, bestiality, beheadings, suicide, and murder," the lawsuit reads. "To maintain a sanitized platform, maximize its already vast profits, and cultivate its public image, Facebook relies on people like Ms. Scola – known as “content moderators” – to view those posts and remove any that violate the corporation’s terms of use."

    "You’d go into work at 9am every morning, turn on your computer and watch someone have their head cut off. Every day, every minute, that’s what you see. Heads being cut off," one content moderator recently told the Guardian.

    Sep 25 08:14

    3 WAYS FACEBOOK IS INCREASINGLY BECOMING AN ARM OF THE US GOVERNMENT

    Facebook has lately announced a series of major steps it would take to combat fake news and the global spread of misinformation that it says could influence elections, but the more we learn about just who it is Facebook is partnering with in this endeavor, the clearer it becomes that these initiatives are not at all designed to foster independent thought and discourse, but to ultimately ensure that public online discourse doesn't stray too far from official state narratives.

    Mark Weisbrot, a co-director at the Center for Economic and Policy Research, recently slammed Facebook’s decision to work with US government-funded organizations as "Orwellian" — especially given the fact these organizations themselves "specialize in overseas propaganda."

    Thus while claiming to fight Russian, Iranian, and other propaganda these very groups will strictly enforce an official establishment Washington and NATO view of world events.

    Webmaster's Commentary: 

    Consider Facebook the moral and electronic equivalent to "Big Brother", and you will have the correct image in mind as to what this company has become.

    This is why the Independent Media is more critical than ever in evaluating if your government is seriously busy, taking care of We the People... or Those, the Monied.

    Unfortunately, most decisions this government makes in this part of the 21st century, are informed/pressed for by the later group.

    Sep 25 08:08

    New Apple connection problem? iPhone XS users report subpar cell and Wi-Fi reception

    Eight years after Apple's iPhone 4 Antennagate fiasco, we are seeing complaints from iPhone XS and XS Max users that Wi-Fi and cellular reception and performance isn't living up to expectations. FCC lab test results appear to lend credence to these concerns.

    Sep 25 07:49

    Generation Being Born Now Is The Last To Be Free

    This generation being born now… is the last free generation. You are born and either immediately or within say a year you are known globally. Your identity in one form or another –coming as a result of your idiotic parents plastering your name and photos all over Facebook or as a result of insurance applications or passport applications– is known to all major world powers.

    Sep 25 07:22

    UK INTELLIGENCE AGENCY ADMITS UNLAWFULLY SPYING ON PRIVACY INTERNATIONAL

    Press release from Privacy International
    Tuesday, September 25, 2018
    The UK’s domestic-facing intelligence agency, MI5, today admitted that it captured and read Privacy International’s private data as part of its Bulk Communications Data (BCD) and Bulk Personal Datasets (BPD) programmes, which hoover up massive amounts of the public’s data. In further startling legal disclosures, all three of the UK’s primary intelligence agencies – GCHQ, MI5, and MI6 – also admitted that they unlawfully gathered data about Privacy International or its staff.

    The intelligence agencies have repeatedly denied that their BPD and BCD programmes are tantamount to mass surveillance of people not suspected of any wrongdoing. Documents published today demonstrate that Privacy International, an international NGO, has been caught up in MI5’s investigations because its data was part of the UK intelligence agencies vast databases.

    Webmaster's Commentary: 

    Prime Minister May, you have some explaining to do!!

    Sep 25 07:18

    SEPTEMBER 25TH IS "NATIONAL PANIC DAY" A DAY WHERE AMERICANS ARE ENCOURAGED TO SPY ON EACH OTHER

    Today, September 25th. is Homeland Security's "National Panic Day."

    What is "National Panic Day"?

    Officially, today is known as "National Awareness Day" not "National Panic Day." For the reasons stated below, I am calling it "National Panic Day" which coincides with DHS reissuing their National Terrorism Bulletins this month.

    DHS and law enforcement have created a national day that glorifies spying on your family, neighbors, coworkers, classmates and much more.

    "Across the country, in our communities, we share everyday moments with our neighbors, family, coworkers, and friends. We go to work or school, the grocery store, or the gas station. It's easy to overlook these routine moments, but as you’re going about your day if you see something that doesn't seem quite right, say something. By being alert and reporting suspicious activity to your local law enforcement you can protect your family, neighbors, and community."

    Webmaster's Commentary: 

    Absoflippinglutely unbelievable, but perfectly predictable for this country's government, governing a country which should be renamed as the "Unhinged, Surveilled State of Amerika."

    Sep 25 06:25

    Is Google Chrome tracking what YOU'RE doing? Browser is now logging people in WITHOUT their permission and 'syncing' user data, professor warns

    Until recently Google Chrome users have been able to use the browser without logging in.

    However, now when people log into a service such as Gmail they are automatically logged in without their consent.

    Sep 24 18:05

    FCC Wants to Give $2B to Wireless Carriers on September 26

    By B.N. Frank

    According to a recent article in ARS Technica, this FCC proposal will also force cities and towns to act on small cell tower and wireless infrastructure applications within 60 or 90 days. It will be voted on September 26, 2018 and statements are still being accepted.

    Numerous U.S. municipal governments, organizations, medical professionals and environmentalists are extremely ticked off...

    Sep 24 15:51

    Less Talk, More Texting

    Sep 24 13:54

    Wendy's Sued For Violating Illinois Law Against Biometrics

    By Aaron Kesel

    A class-action lawsuit was filed in Illinois against a fast food restaurant chain of the Wendy’s franchise. The suit accuses the company of violating state laws for the way the business stores its employees’ fingerprints...

    Sep 24 11:10

    Google secretly logs users into Chrome whenever they log into a Google site

    Google has made an important change to the way the Chrome browser works, a move the company did not advertise to its users in any way, and which has serious privacy repercussions.

    According to several reports [ 1, 2, 3], starting with Chrome 69, whenever a Chrome user would access a Google-owned site, the browser would take that user's Google identity and log the user into the Chrome in-browser account system --also known as Sync.

    This system, Sync, allows users to log in with their Google accounts inside Chrome and optionally upload and synchronize local browser data (history, passwords, bookmarks, and other) to Google's servers.

    Sep 24 08:11

    New Malware Combines Ransomware, Coin Mining and Botnet Features in One

    According to the researchers from security vendor Palo Alto Networks, who uncovered the malware, XBash is an all-in-one malware that features ransomware and cryptocurrency mining capabilities, as well as worm-like ability similar to WannaCry or Petya/NotPetya.

    In addition to self-propagating capabilities, XBash also contains a functionality, which is not yet implemented, that could allow the malware to spread quickly within an organization's network.

    Sep 24 08:08

    Hackers Steal Customers' Credit Cards From Newegg Electronics Retailer

    The notorious hacking group behind the Ticketmaster and British Airways data breaches has now victimized popular computer hardware and consumer electronics retailer Newegg.

    Magecart hacking group managed to infiltrate the Newegg website and steal the credit card details of all customers who entered their payment card information between August 14 and September 18, 2018, according to a joint analysis from Volexity and RiskIQ.

    Magecart hackers used what researchers called a digital credit card skimmer wherein they inserted a few lines of malicious Javascript code into the checkout page of Newegg website that captured payment information of customers making purchasing on the site and then send it to a remote server.

    Sep 24 08:07

    Flaw in 4GEE WiFi Modem Could Leave Your Computer Vulnerable

    A high-severity vulnerability has been discovered in 4G-based wireless 4GEE Mini modem sold by mobile operator EE that could allow an attacker to run a malicious program on a targeted computer with the highest level of privileges in the system.

    The vulnerability—discovered by 20-year-old Osanda Malith, a Sri Lankan security researcher at ZeroDayLab—can be exploited by a low privileged user account to escalate privileges on any Windows computer that had once connected to the EE Mini modem via USB.

    This, in turn, would allow an attacker to gain full system access to the targeted remote computer and thereby, perform any malicious actions, such as installing malware, rootkits, keylogger, or stealing personal information.

    Sep 24 06:32

    ORWELLIAN: Apple monitors your phone calls and emails, then calculates a “trust score” just like the communist Chinese government… it’s happening NOW, in America

    Apple has gone full-blown authoritarian with its latest initiative to crack-down on freedom. The corporate behemoth says that the “trust ratings,” which were added quietly in the latest iOS update, are benevolent in nature; supposedly these ratings will “help” with fraud prevention. Despite Apple’s insistence that the company is “fully committed to transparency,” and that the scores are “privacy-preserving,” how monitoring people’s phone calls and emails will prevent fraud (or preserve privacy) is never explained.

    In fact, Apple hasn’t even provided a single scenario in which the trust score would prevent fraud.

    Users can’t even see their own “trust scores,” unless they contact Apple directly and ask for their data.

    Sep 24 06:17

    Couldn't give a fsck about patching? Well, that's your WordPress website pwned, then

    Website admins are urged to update their WordPress installations as soon as possible to the latest version following a rash of attacks exploiting known vulnerabilities in the web publishing software.

    Researchers at Malwarebytes say miscreants don't appear to be targeting any one specific bug, but rather a full array of flaws in older versions of WordPress and its various plugins.

    "During the past few days, our crawlers have been catching a larger-than-usual number of WordPress sites being hijacked," noted MalwareBytes researcher Jérôme Segura on Thursday.

    "One of the most visible client-side payloads we see are redirections to tech support scam pages. Digging deeper, we found that this is part of a series of attacks that have compromised thousands of WordPress sites since early September."

    Sep 23 08:59

    Judicial Watch Uncovers Five More Clinton Emails Containing Classified Material on Her Unsecure, Non-‘State.gov’ Email System

    Judicial Watch today released two batches, 184 pages and 45 pages, of newly uncovered emails of former Secretary of State Hillary Clinton from the U.S. Department of State sent and received over her unsecure, non-“state.gov” email system. Five emails contain classified information.

    Sep 22 22:06

    Twitter warns direct messages were exposed

    Twitter has told an undisclosed number of users their private messages may have been leaked to third-parties for more than a year.

    The software “bug”, which has since been fixed, involved direct messages between users and businesses that offer customer services via Twitter.

    Affected users are being notified via a message that appeared when opening the app or logging on to Twitter's website.

    "The issue has persisted since May 2017," Twitter said.

    The company said it had resolved the issue immediately upon discovering it, on 10 September.

    Sep 22 10:44

    British Spies Hacked Belgian Telecom Firm on UK Government Orders - Reports

    Belgian prosecutors' report supported previous claims made by Edward Snowden that British GCHQ had been intercepting communications at NATO HQ and key European institutions for at least two years.

    The operation had a codename “Operation Socialist” and was conducted by the British intelligence service GCHQ, the Guardian reported. Belgian Justice minister, Koen Geens, has confirmed that he received the report from the prosecutors and would discuss it with country’s national security council, led by Belgian Prime Minister Charles Michel.

    Sep 22 10:43

    GOVERNMENT CAN SPY ON JOURNALISTS IN THE U.S. USING INVASIVE FOREIGN INTELLIGENCE PROCESS

    THE U.S. GOVERNMENT can monitor journalists under a foreign intelligence law that allows invasive spying and operates outside the traditional court system, according to newly released documents.

    Targeting members of the press under the law, known as the Foreign Intelligence Surveillance Act, requires approval from the Justice Department’s highest-ranking officials, the documents show.

    In two 2015 memos for the FBI, the attorney general spells out “procedures for processing Foreign Intelligence Surveillance Act applications targeting known media entities or known members of the media.” The guidelines say the attorney general, the deputy attorney general, or their delegate must sign off before the bureau can bring an application to the secretive panel of judges that approves monitoring under the 1978 act, which governs intelligence-related wiretapping and other surveillance carried out domestically and against U.S. persons abroad.

    Webmaster's Commentary: 

    How completely typical for the 21st century's Unhinged, Surveilled State of Amerika!!

    The Constitution and Bill of Rights has just been thrown under the proverbial bus by a succession of Amerikan governments, and are truly no longer any thing more than a couple of pieces of paper.

    Americans now live under the illusion of being citizens in a democratic republic; but that no longer exists.

    The very wealthy and monied buy the government policies they want, like Sheldon Adelson, having outsourced US Middle East policy to Israel, by funding President Trump to the hilt.

    Sep 22 10:31

    Trump’s new cyber strategy seeks global dominion over internet

    Setting the global standard for online behavior, preserving American dominance, political and economic interests, punishing ‘malicious actors’ like Russia and China: these are the ambitious goals of the new US cyber-strategy.
    The White House published the 40-page document on Thursday afternoon, the first comprehensive cyber strategy in 15 years. The strategy’s core assumption is that the US created the internet and that Washington must maintain the dominant role in defining, shaping and policing cyberspace in much the same way as it does the globe.

    Sep 22 10:15

    THE GAMIFICATION OF TYRANNY

    It looks like we’re headed for a brave new world where all citizens are rated on their loyalty to the state and are punished for wandering from its narrative.
    Call it the gamification of repression.

    In China, the supposedly communist state—in fact, it is an advanced form of crony capitalist authoritarianism that Marx would have disapproved—is busy setting up a rating system for all citizens. According to a paper written by an academic at the Lebanese American University in Beirut, Lebanon, scores are based on professional conduct, corruption, type of products bought, peers’ own scores, and tax evasion.

    The author left something out, however. This social credit system will also be used to marginalize and stigmatize those who criticize the state.

    China’s nominally communist government says the system and its massive database will allow the trustworthy to roam freely under heaven while making it hard for the discredited to take a single step.

    Webmaster's Commentary: 

    AND... such a "social credit scoring system" is already happening here in the US, courtesy of Apple.

    Sep 22 09:46

    GOOGLE SUPPRESSES MEMO REVEALING PLANS TO CLOSELY TRACK SEARCH USERS IN CHINA

    GOOGLE BOSSES HAVE forced employees to delete a confidential memo circulating inside the company that revealed explosive details about a plan to launch a censored search engine in China, The Intercept has learned.
    The memo, authored by a Google engineer who was asked to work on the project, disclosed that the search system, codenamed Dragonfly, would require users to log in to perform searches, track their location — and share the resulting history with a Chinese partner who would have “unilateral access” to the data.

    The memo was shared earlier this month among a group of Google employees who have been organizing internal protests over the censored search system, which has been designed to remove content that China’s authoritarian Communist Party regime views as sensitive, such as information about democracy, human rights, and peaceful protest.

    Webmaster's Commentary: 

    How Google does this here in the US is, for the moment, far more subtle, by using a combination of algorithms which can get a blog pushed so far down in search results, that it becomes deplatformed.

    Couple that with a monetary service which used to take contributions for various blogs, like Pay Pal, but suddenly refuses to do so, and you have a website devoid of both viewers and operational cash.

    Sep 21 14:44

    Facebook Wants A Facial Recognition Smart Home Device For Its Users

    By Aaron Kesel

    Facebook is planning to announce a new home assistant device called “Portal” with a controversial facial recognition camera. This is significant because not even Amazon’s Echo or Google’s own Smart Home device has a facial recognition camera built in...

    Sep 21 11:50

    The UK Government Is Planning To Set Up A Regulator For The Internet

    BuzzFeed News has obtained details of plans being drawn up by ministers that also include a compulsory code of conduct and age verification for Facebook, Twitter, and Instagram.

    Sep 21 11:42

    West Virginia high school counselor is charged with fraud for 'changing her daughter's grades to get the girl more than $10,000 in college scholarships'

    A West Virginia high school counselor is accused of using a school computer program to raise her daughter's grades in order for the teen to obtain college scholarship money.

    Mellissa Krystynak, 49, of Stuart, Florida, has been indicted on six counts of mail fraud.

    The mother worked as a counselor from 2011 until 2017 at Greenbrier West High School in Charmco, West Virginia.

    Two of Krystynak's children also attended the school.

    US Attorney Mike Stuart said in a news release that Krystynak used her administrative access to change more than 35 of her daughter's grades.

    SHARE THIS ARTICLE WITH YOUR SOCIAL MEDIA