COMPUTERS/INTERNET/SECURITY | WHAT REALLY HAPPENED


COMPUTERS/INTERNET/SECURITY

May 28 10:54

Scott Adams: 2020 Election Prediction Update, Can Biden Really Beat Trump?

Comments at: https://twitter.com/ScottAdamsSays/status/1133372902022062080

Devin Nunes retweeted my guides for identifying FAKE NEWS
Drone “bullet”, hovers and waits for its target…then kills it
Are Prediction models for 2020 election results, better than 2016s?
The impact: Social media’s “thumb on scale” algorithms
People who CAN be persuaded…in key states, decide who’s President
VOX’s ridiculous claim about FOX News, impact on CNN, MSNBC
YouTube supposedly blocking people from playing a certain video
John Lewis says he cried…
…when President Trump said something…that he didn’t say
Joe Biden’s campaign strategy of invisibility, noticed by others
President Trump UNDERSTANDS PEOPLE, at a level few others can
Have you EVER felt safer about North Korea?
Duncan Hunter’s support for Navy Seal photographing war carnage
Creativity from AI computer programs? Yes, it CAN be done
Prediction:

May 28 10:32

"The Most Destructive Breach In History": Hackers Use NSA Code To Grind Baltimore To A Halt

The United States is no longer supplying its enemies only with conventional weapons – that list now also includes cyberweapons. While Baltimore has been struggling with an aggressive cyber-attack over the last three weeks, previously profiled here , it has now been revealed that a key component of the malware used by cyber-criminals was actually developed just a short drive from Baltimore - at the NSA, according to the New York Times.

The tool used - called EternalBlue – has been used by hackers in North Korea, Russia and China to "cut a path of destruction around the world", and resulted in billions of dollars in damages.

May 28 10:23

3 big changes in how the Army thinks about software

The Army is changing the way it buys software and has started entering into new agreements with industry to acquire the intellectual property rights of software.

Generally, contractors that develop systems for the Army own the actual code they write. This means if an update needs to be made quickly, the Army has to go back to the contractor and often pay for updates because they don’t own the rights to the programming.

“It used to be the way we looked at intellectual property rights is we kind of saw it as a binary decision. The government either bought it or we didn’t. Most times we didn’t because it was very expensive,” Maj. Gen. Randy Taylor, commander of Communications and Electronics Command (CECOM), told C4ISRNET in a May 20 interview. “The reason it was so expensive is because what company would want to compromise that?”

May 28 10:22

How secure is the intelligence community’s IT supply chain?

The Senate Select Committee on Intelligence is taking aim at risks to the supply chain in its most recent draft of the Intelligence Authorization Act.

A provision in the legislation, which was approved by the panel May 14, would create a task force to address vulnerabilities in the supply chain from foreign actors.

The intelligence community has long known that foreign adversaries are interested in exploiting technology and information used by both industry and government. One key vulnerability is the acquisition supply chain.

The number of commercial and nonprofit organizations involved in any technology can be vast, and ensuring each supplier is protected from external threats is a daunting task. As a result, information shared with contractors who aren’t following strong security or cybersecurity practices can be vulnerable. In addition, determining what information should be shared with industry is a major challenge for the intelligence community.

May 28 10:21

Army to deliver network updates every 2 years

The Army wants to develop a force that can compete with adversaries such as China and Russia in every domain by 2028. To do so, service leaders say they will need to deliver incremental updates to the tactical network every two years beginning in 2021.

“We’re going to have a network of ‘21, a network of ‘23, ‘25 and ‘27 with our goal for the network of ‘27 to be the network that implements the 2028 vision,” Maj. Gen. Dave Bassett, program executive officer of Command, Control, Communications-Tactical, said at a February industry forum in San Diego, California.

This approach to incrementally improve capability is a departure from previous efforts, where the Army was locked into one vendor and one technology set. Now, the service is more cognizant that technology could force service leaders to change their vision.

May 28 10:12

Firefox 67 Switching to Empty Profiles Causing Data Loss Fears

For users who are affected by this issue, you can switch back to your original profile to restore your addons and user data.

To do this, go to about:profiles and then click on the button labeled Set as default profile under the profile that contains your data.

Once you select that profile, close and start Firefox again and your data should be back.

May 28 10:06

Nearly 1 Million Computers Still Vulnerable to "Wormable" BlueKeep RDP Flaw

Nearly 1 million Windows systems are still unpatched and have been found vulnerable to a recently disclosed critical, wormable, remote code execution vulnerability in the Windows Remote Desktop Protocol (RDP)—two weeks after Microsoft releases the security patch.

If exploited, the vulnerability could allow an attacker to easily cause havoc around the world, potentially much worse than what WannaCry and NotPetya like wormable attacks did in 2017.

Dubbed BlueKeep and tracked as CVE-2019-0708, the vulnerability affects Windows 2003, XP, Windows 7, Windows Server 2008 and 2008 R2 editions and could spread automatically on unprotected systems.

May 28 09:45

Amazon Alexa will soon record EVERYTHING you say rather than wait to hear its name first, new patent reveals

Alexa's poor reputation for privacy may soon worsen as a patent filed by the firm suggests the virtual assistant may start listening before its 'wake word' is said.

Under the plans Alexa will be able to detect when it is being given a command even if the wake word is said at the end of the sentence instead of at the front.

The move raises concerns over user privacy as Alexa will, by default, always be listening to conversations on the off-chance its wakeword is spoken.

May 27 13:15

Exclusive-Paul Gosar Sounds Alarm on USMCA’s Language Codifying Big Tech Censorship

Rep. Paul Gosar (R-AZ) told Breitbart News exclusively on Friday that he has started drafting and circulating a letter to U.S. Trade Representative Robert Lighthizer, sounding the alarm about how the United States Mexico Canada Agreement (USMCA) could codify big tech’s ability to censor conservatives.
Rep. Gosar started drafting a letter to Robert Lighthizer, urging him to remove USMCA Article 19.17 that would enshrine technology companies’ legal immunity from Section 230 of the 1996 Communications Decency Act that allows tech companies to censor on their platforms without significant legal recourse.

Congressman Gosar told Breitbart News that America, Canada, and Mexico should not reward tech companies’ censorship practices with an international liability shield to continue censoring on the “public square.”

May 27 12:38

  AT&T'S DYSTOPIAN ADVERTISING VISION PERFECTLY ILLUSTRATES THE RELATIONSHIP BETWEEN SURVEILLANCE AND MONOPOLY

AT&T has come a long way from the supernormative, feel-good messages of its You Will ads; now CEO Randall Stephenson predicts a future where his company will dynamically alter your TV ads based on what it thinks you will buy; and chase you with that ad from your TV to your computer to your phone, and then spy on your location to see whether you go to a retailer to buy the thing you've had advertised to you; and use that intelligence to command high advertising rates from advertisers.

On The Verge, Nilay Patel points out that this requires an enormous, vertically integrated scaffolding of surveillance, made possible by the company's ownership of the video services you watch, the device data showing what you're watching from moment to moment, location tracking from your devices, data from ad-partners tracking your purchases, all in realtime, available to a huge number of ad-sales associates who will use it in their pitches to advertisers.

Webmaster's Commentary: 

Looks like AT&T is going full-bore "Minority Report".

May 27 12:34

QUALCOMM RULED A MONOPOLY, FOUND IN VIOLATION OF US ANTITRUST LAW

Apple and Qualcomm may have dropped their worldwide lawsuit war against each other, but that wasn’t the only battle Qualcomm faced. The FTC also brought a case against Qualcomm, alleging antitrust abuses and illegal behavior. In a ruling May 21, US District Court Judge Lucy Koh found that Qualcomm had violated the Federal Trade Commission Act. Qualcomm has pledged to immediately appeal the ruling, which has significant implications for its business structure and earnings.

“We strongly disagree with the judge’s conclusions, her interpretation of the facts and her application of the law,” Don Rosenberg, executive vice president and general counsel of Qualcomm, said in a statement Wednesday.

Webmaster's Commentary: 

I think the judge has come to this ruling correctly.

May 27 12:18

NEW FLORIDA LAW BANS RELEASE OF MASS SHOOTING RECORDINGS

SOURCE: WGCU.ORG

Gov. Ron DeSantis has signed a bill that prohibits Florida's government agencies from releasing photos, video or audio that record the killing of a person in an act of mass violence.

The new law was signed Thursday and takes effect immediately.

The bill was written after last year's school shooting in Parkland that left 17 people dead. It says the exemption to the public record law is needed to protect victims' families from trauma and to prevent the images or recordings from inspiring others to kill.

The bill's sponsor, Sen. Tom Lee of Hillsborough County, has said he is aware that such recordings can help the media keep authorities accountable after a mass shooting but pointed out that news organizations can petition a judge to access the images.

Webmaster's Commentary: 

I have to wonder, just how Senator Tom Lee defines "news organisations"?!? Are they simply the outlets for Federal and State Governmental Codwallop, carefully crafted to create specific reactions in their audience?

Are they the usual corporate presstitutes and waresspondents on corporate channels like CNN; MSNBC; and FOX?!?

What about a small organisation, or an individual, looking to research some aspect of a mass shooting?!? Let's say, what about an organization like "Judicial Watch", which has a brilliant track record of uncovering Federal governmental malfeasance through their investigations?!? And Judicial Watch, you are definitely among my heroes of cyberspace.

Were I a betting woman, I would bet, that the answer from the Bench would be "HELL, NO!!", but of course, wrapped all around some kind of obscure legalese, as to why the information cannot be released.

And I have to ask; what are Florida officials so concerned about that a private investigator, or blogger, might discover, that they don't want the public to know about?!?

Is it, perhaps, that the shooter might have been on, or coming off of some SSRI medications, which have a proven track record of causing delusional, and violent behaviour?!?

I think this country deserves to know; big pharma, which makes these prescription drugs, doesn't want us to know, because this kind of medication is greatly profitable for them. But understanding this, my curiosity is peaked.

And if you have never seen, or heard of a website titled:
www.ssristories.org, I strongly suggest that you visit it, particularly if your teenage kid's school counselor, or physician, is recommending it for your child.

May 27 11:27

AT&T'S DYSTOPIAN ADVERTISING VISION PERFECTLY ILLUSTRATES THE RELATIONSHIP BETWEEN SURVEILLANCE AND MONOPOLY

AT&T has come a long way from the supernormative, feel-good messages of its You Will ads; now CEO Randall Stephenson predicts a future where his company will dynamically alter your TV ads based on what it thinks you will buy; and chase you with that ad from your TV to your computer to your phone, and then spy on your location to see whether you go to a retailer to buy the thing you've had advertised to you; and use that intelligence to command high advertising rates from advertisers.

May 27 11:07

FACIAL RECOGNITION: BRITAIN FACES A DYSTOPIAN FUTURE

SOURCE: SPIKED-ONLINE
Automated facial recognition (AFR) is the state’s latest, and most invasive, surveillance technology.

Since 2015, three police forces – South Wales, Metropolitan and Leicestershire – have made use of AFR in controversial live trials. Now, South Wales Police have been taken to court by office worker Ed Bridges, who started a crowdfunding campaign when he felt his privacy had been violated by AFR.

Bridges’ legal challenge has been backed by civil-rights organisation Liberty, which argues that the indiscriminate deployment of AFR is equivalent to taking DNA samples or fingerprints without consent. According to Liberty, there are no legal grounds for scanning thousands of innocent people in this way. It also claims the technology discriminates against black people, whose faces are disproportionately flagged by mistake, meaning they are more likely to be stopped by police unfairly.

Webmaster's Commentary: 

To the British government, a word, please.

George Orwell's "1984" was a cautionary tale; NOT AN INSTRUCTION MANUAL!!

May 27 09:09

VIDEO GAME ADDICTION IS A MENTAL HEALTH DISORDER, WORLD HEALTH ORGANIZATION SAYS

Many parents already have concerns, but some may now have a new argument for limiting their children's 'screen time' — addiction to video games has been recognized by World Health Organization (WHO) as a mental health disorder.

The WHO's International Classification of Diseases (ICD), a reference bible of recognized and diagnosable diseases, describes addiction to digital and video gaming as "a pattern of persistent or recurrent gaming behavior" that becomes so extensive it "takes precedence over other life interests".

May 26 11:24

Scott Adams: Find Out Why Trump Has NO Chance of Reelection (Unless Something Changes)

Comments at: https://twitter.com/ScottAdamsSays/status/1132647797591760898

Anti-Trumpers convincing themselves he WANTS to be impeached
Not likely he wants impeachment on his Presidential record
CNN home page, news…or mind reading?
Using the wrong words to describe things…to CREATE news
President Trump’s “Bidan” tweet about Joe being called “low IQ”
Chairman Kim, a friend, mocking President Trump’s rival
Breitbart article, my Episode 540 video about Trump’s 2020 chances
The caveat is…IF nothing changes, President Trump can’t win
Social media has a stranglehold and time to perfect persuasion
BBC video immersing viewer in WWI trench warfare
“They Shall Not Grow Old”
Voiceovers of the actual words from WWI military volunteers
Pre-Suasion, by Cialdini tells us what will happen in the 2020 election
Social media controls the order in which you see things

May 26 08:25

STOLEN NSA HACKING TOOL NOW VICTIMIZING US CITIES, REPORT SAYS

SOURCE: CNET.COM
A hacking tool developed by the US National Security Agency is now being used to shut down American cities and towns, says a Saturday report in The New York Times.

Code-named EternalBlue, the hacking exploit involves malicious software and was leaked in 2017 by a group called Shadow Brokers. Hackers used the tool that same year in the worldwide WannaCry ransomware attacks, which locked up computer systems at hospitals, banks and phone companies and required a ransom to set the networks free. It was also used in the 2017 NotPetya assault against Ukraine, which has been called one of the most destructive cyberattacks ever.

Now, though, EternalBlue has reportedly landed in the NSA's own backyard: Baltimore, site of the agency's headquarters. The city has been hobbled since a ransomware attack on May 7 ensnared the local government's computers, disrupting city services. Baltimore's IT department is only slowly getting systems up and running again.

Webmaster's Commentary: 

Yikes! This is, officially, horrible!

Did NO ONE understand what might happen, if this code got into the wrong hands?!?

May 25 22:32

Instagram has been leaking contact info for months

ad news for users of Instagram, as apparently the site has been leaking the phone numbers and email addresses of its users for the last few months.

Back in February, data scientist David Stier notified Instagram when he discovered the site was showing some user's contact info in the source code. While the information wasn't showing directly on profiles, having it displayed in the source code on the user's page would still make it easy for someone to scrape the info and build a database.

The problem was fixed by March, but by then it may have already been too late. During Stier's investigation, he found that this flaw had been present since at least last October while viewing archived versions of the website. That's more than enough time for this to have been discovered and exploited.

May 25 18:13

Website for storing digital currencies hosted code with a sneaky backdoor

A website that bills itself as providing a safer way to store Bitcoin and other digital currencies has been using a coding sleight of hand to generate private keys that are suspiciously trivial for the operators to guess, leaving all funds stored in the wallets open to theft, researchers with a different service said on Friday.

May 25 18:10

Dr. Evil Would Love Facebook’s “GlobalCoin”

More than 2 billion users spending one currency, controlled by one billionaire. What’s to worry about?

May 25 18:05

U.S. Military to Trawl Through 350 Billion Social Media Messages

The U.S. military plans to analyze 350 billion social-media posts from around the world to help it track how popular movements evolve.

A tender for the project, based at the Naval Postgraduate School in Monterey, California, calls for screening messages from at least 200 million users from more than 100 countries in more than 60 languages to better understand “collective expression.” Messages, including user names, will be examined for comments, metadata, location and hometown identifiers.

While it’s part of an existing Department of Defense Analysis effort to harness big data for social research, “the scale and global reach of this program is striking,” Antoine Bousquet, a senior lecturer in international relations at Birkbeck, University of London, said by email.

May 25 17:59

885 Million Records Exposed Online: Bank Transactions, Social Security Numbers, and More

Several million records said to include bank account details, Social Security digits, wire transactions, and other mortgage paperwork, were found publicly accessible on the server of a major U.S. financial service company.

More than 885 million records in total were reportedly exposed, according to Krebs on Security. The data was taken offline on Friday.

Ben Shoval, a real-estate developer, reportedly discovered the files online and notified security reporter Brian Krebs. Krebs said that he contacted the server’s owner, First American Corporation, prior to reporting the incident.

May 25 17:56

Stolen NSA hacking tool now victimizing US cities, report says

A hacking tool developed by the US National Security Agency is now being used to shut down American cities and towns, says a Saturday report in The New York Times.

Code-named EternalBlue, the hacking exploit involves malicious software and was leaked in 2017 by a group called Shadow Brokers. Hackers used the tool that same year in the worldwide WannaCry ransomware attacks, which locked up computer systems at hospitals, banks and phone companies and required a ransom to set the networks free. It was also used in the 2017 NotPetya assault against Ukraine, which has been called one of the most destructive cyberattacks ever.

Now, though, EternalBlue has reportedly landed in the NSA's own backyard: Baltimore, site of the agency's headquarters. The city has been hobbled since a ransomware attack on May 7 ensnared the local government's computers, disrupting city services. Baltimore's IT department is only slowly getting systems up and running again.

May 25 14:56

DONKTUM: Restricting the Range of Consciousness

The time to defend free speech is now, and the place is wherever you stand. We must be hyper-vigilant because the outrage addicts and crypto-fascists will never stop hunting thought criminals. We must defend speech we abhor just as vehemently as the speech we like. We must not let voices be silenced and their owners disappear into the black bag of deplatforming.

Comments at: https://twitter.com/CarpeDonktum/status/1132401710301941760

May 25 12:00

Scott Adams The Age of Enlightenment, End of the Republic

Comments at: https://twitter.com/ScottAdamsSays/status/1132285215160668161

“End of the world” fears about President…versus major successes
A consistent President Trump theme…he knows what matters
“Age of Enlightenment” phrase used by President Trump
As predicted, he is changing how we view reality
President Trump is teaching us what’s important
Military arms sales to Saudi Arabia and support for their leadership
Blight area usage, homestead style with 2 lots per owner
Kit style homes, like Sears Craftsman homes of the past
Twitter poll, ever notice you were no longer following my account
Consistently, about 20% have experienced the phenomena
Social media has neutralized our democratic republic
Ability to influence people without them realizing it
Headline construction, clickbait links, influence triggers
2020 election results will be determined by social media

May 24 13:13

CIA Whistleblower: Assange Is Going To Get Railroaded By "Hanging" Judge

A former CIA analyst-turned-whistleblower says that an extradited Julian Assange would have no chance of a fair trial in front of a federal judge who "reserves every national security case for herself."

Judge Leonie Brinkema, Julian Assange
John Kiriakou, who was sentenced to 30 months in prison by Eastern District of Virginia Judge Leonie Brinkema for telling ABC News about CIA waterboarding, told Russian state-sponsored RT "They are going to try to make an example of Julian," adding "He’s been charged in the Eastern District of Virginia. His judge was also my judge and ex-Snowden’s judge and [CIA whistleblower] Jeffry Sterling’s judge who reserves every national security case for herself."

"She is a hanging judge. She will not give him a fair trial. It’s impossible for Julian to receive a fair trial in the Eastern District of Virginia," addid Kiriakou.

Webmaster's Commentary: 

I frankly worry that he will not be allowed to live before his trial; anyone remember how Whitey Bulger was bludgeoned to death, in prison?!?

There are a whole lot of people, wanting him dead, and they would not hesitate have an assassination ordered, if they felt what he may have to say at a trial, would compromise their wealth and their power.

May 24 11:29

Scott Adams: Slaughtermeter Reset to Zero Due to Social Media Manipulation, Pelosi

Comments at: https://twitter.com/ScottAdamsSays/status/1131923144522919936

Slaughtermeter downgraded from 140% to 0%
Currently, no chance President Trump will win re-election
Currently…social media thumb on the scale, will prevent it
Zero visibility into algorithms, no explanations, no independent appeal
“Doctored” videos of Pelosi slurs removed as misleading
Enemy press then labels ALL Pelosi slur videos “doctored”
Why not show undoctored and doctored vids for comparison?
2 topics are undiscussible…I can’t even say the words
Some people undiscussible…I can’t even mention their names
Doing so, risks suspension, banning, demonetizing, censorship
Am I being Shadowbanned on Twitter?
I can’t tell, I can’t know, there’s no way to know
Social Media was caught off-guard by candidate Trump in 2016
His “Island of Misfit Toys” supporters are VERY effective

May 24 11:04

Skype Co-Founder Is "Desperate" To Save Humanity From AI

The co-founder of Skype, Jaan Tallinn, is on a desperate mission to save the human race from the destruction of artificial intelligence. Since 2007, Tallinn’s dedicated more than $1 million toward preventing super-smart AIs from replacing humans as Earth’s dominant species and from destroying humanity in the process.

According to an interesting Popular Science article, the programmer discovered AI researcher Eliezer Yudkowsky’s essay “Staring into the Singularity” in 2007, two years after cashing in his Skype shares following the startup’s sale to eBay. That’s when Tallinn started pouring money into the cause of saving humanity from AI.

So far, [Tallinn has] given more than $600,000 to the Machine Intelligence Research Institute, the nonprofit where Yudkowsky is a research fellow. He’s also given $310,000 to the University of Oxford’s Future of ­Humanity Institute, which PopSci quotes him as calling “the most interesting place in the universe.” –Futurism

May 24 11:01

Venezuela to Create 4G Network With Help of China's Huawei, Russian Companies

Venezuela hopes to develop a nationwide 4G system with the help of Russian and Chinese technology, particularly from the Asian country’s Huawei, Venezuelan President Nicolas Maduro has said.

The Venezuelan president stated that Caracas is aiming to develop its satellite technologies.

"There are a lot of things that I should address. The first one is the creation of a telecommunications corporation… I have ordered to make an investment and, together with China's technologies, Huawei technologies and the technologies of Russian companies, bring telecommunications [to a new level] and make a nationwide 4G network a reality in Venezuela to ensure Venezuela has fast communications, internet, and telephony", Maduro said in an address published on Twitter late on Thursday.

May 24 10:59

Virtual reality phone app could help spot Alzheimer's by testing patients' ability to navigate a computer-simulated world, research finds

Virtual reality will soon be able to help detect Alzheimer’s disease by asking patients to step into a computer-simulated world, research suggests.

Scientists believe they can better identify the disease its early stages using technology than with the current ‘gold standard’ cognitive tests currently used, The Times reported.

They hope the findings could one day help them develop a smartphone app that could help diagnose the disorder at home.

May 24 09:49

EPA CYBERSECURITY WEAKNESSES ARE GOING UNTRACKED AND UNPATCHED

SOURCE: NEXTGOV
The Environmental Protection Agency has a detailed process for dealing with new cybersecurity weaknesses: develop a plan to remediate with clear goals and milestones, then attack the problem. The only issue: Those plans aren’t being logged, managed or tracked, according to the agency inspector general.

The agency created an automated tool for logging vulnerabilities that will take time to remediate and track progress through official plans of action and milestones. According to an inspector general report released Tuesday, many of those plans were never entered into the system, meaning they were never tracked and, in some cases, the vulnerabilities were never patched.

Webmaster's Commentary: 

This ... is officially horrible, and the US government needs to find a better way of organizing, and tracking, what is going on at the EPA with their computers.

May 24 09:47

DARPA TO CREATE MIND-CONTROLLED WEAPONS

BY DAGNY TAGGART
Last year, the U.S. Defense Advanced Research Projects Agency (DARPA) announced that it was seeking noninvasive ways “to achieve high levels of brain-system communications without surgery.” The techniques would “allow precise, high-quality connections to specific neurons or groups of neurons.”

The agency wants to create mind-controlled weapons of war, as it (vaguely) explained in two recent press releases.

To achieve this goal, DARPA recently formed a program called Next-Generation Nonsurgical Neurotechnology (N3).

DARPA WANTS SOLDIERS TO BE ABLE TO CONTROL MACHINES WITH THEIR MINDS.
According to a press release published on May 20, 2019, the agency has awarded funding to six companies to support N3:

Webmaster's Commentary: 

Gee, what could possibly go wrong with systems like that, except for everything?!?

I would counsel extreme caution in the development of this technology; there is so much room for so much to go completely haywire, that it is hard to know where to start evaluation of severe potential problems, both for the weapons,and the soldiers who use them.

May 24 09:23

THEY'RE BACK! 3D-PRINTED GUNS ARE UNSTOPPABLE AND HERE TO STAY

SOURCE: MAC SLAVO VIA SHTFPLAN

An entirely decentralized network of self-defense rights advocates have taken to the internet to provide plans for 3D-printed guns. It looks like the 3D guns are unregulatable and unstoppable. They’re anonymously sharing the blueprints and advice while simultaneously building an unstoppable community.

Unlike previous attempts to popularize 3D-printed guns, this newer operation is entirely decentralized. There’s no headquarters, no trademarks, and no real leader. The people behind it already understand that this means they can’t be stopped by governments and their laws or regulations.

“If they [the government] were to come after me, they’d first have to find my identity,” says Ivan the Troll, a member of the group. “I’m one of many, many like-minded individuals who’re doing this sort of work.”

Webmaster's Commentary: 

And to the governments who really thought that they were going to be able to regulate and control this; whatever window you thought you had, is long gone.

As my late Grandmother used to say, "the horse is already out of the barn!"

May 23 20:09

Death Of Press Freedoms? Julian Assange Charged Under The Espionage Act On 17 Counts

By Aaron Kesel

WikiLeaks founder and former editor Julian Assange has been charged under The Espionage Act on 17 new counts in a superseding indictment for his role in obtaining and publishing classified military and diplomatic documents prior to his extradition hearing on May 30th, Reuters reported.

The charges carry a shocking sentence of 175 years in prison if found guilty by the secret Espionage court — a horrendous statement to send to journalists and truth tellers.

“The Department of Justice wants to imprison Assange for crimes allegedly committed outside of the United States. This extraterritorial application of US law is explicit throughout the indictment… thereby classifying any territory in the world as subject to US law,” WikiLeaks wrote in a statement, adding...

May 23 15:55

Huawei’s Android Replacement Smartphone OS Will Be Called HongMeng- Report

After Google restricted Huawei’s use of Android for its future smartphones, effectively cutting off Huawei from everything Google other than the Android Open Source Project, new reports from Chinese media have come out with the claim that Huawei’s in-house operating system (OS) for its smartphones will reportedly be called HongMeng.

While it’s been an open secret that Huawei has been working on its own operating system as a contingency plan in case the US-China trade war escalated the way that it now has, apparently, the company has been working on the new OS since as far back as 2012. The reports in the Chinese media are also claiming that the OS is being tested already and will gradually replace Android on Huawei’s hardware soon.

May 23 15:52

The future of AT&T is an ad-tracking nightmare hellworld

AT&T can claim up and down that it’s asked for permission to use customer information to do this, but there is simply no possible way the average customer has ever even read their AT&T contracts, let alone puzzled out that they’re signing up to be permanently tracked and influenced by targeted media in this way.

May 23 15:41

WannaCry? Hundreds of US schools still haven’t patched servers [Updated]

Publicly accessible security-scan data shows that many public organizations have failed to do more than put a bandage over long-standing system vulnerabilities that, if successfully exploited, could bring their operations to a standstill.

While the method by which RobbinHood ransomware infected the network of Baltimore City two weeks ago is still unknown, insiders within city government have pointed to the incomplete efforts by the Office of Information Technology to get a handle on the city's tangle of software, aging servers, and wide-flung network infrastructure. Baltimore isn't even the only city to have been hit by ransomware in the last month—Lynn, Massachusetts, and Cartersville, Georgia, both had electronic payment systems taken offline by ransomware this month. Greenville, North Carolina, was struck by the same RobbinHood ransomware affecting Baltimore in April.

May 23 15:39

Huawei builds its own chip factory in Cambridge to counter Arm blow

Huawei is to make its own chips at a new factory in Cambridge UK technology hotspot as it fights back from the latest backlash from the US-China trade war.

The chip factory is slated for the 550-acre former Spicers site at Sawston for which Huawei recently paid £37.5 million, as first revealed by Business Weekly.

It appears the Chinese ICT giant had anticipated escalation of the bitter China-US impasse in making the Cambridge land acquisition as part of multi-billion dollar investment in the UK economy.

May 23 15:34

It's Getting Way Too Easy to Create Fake Videos of People's Faces

Researchers at the Samsung AI Center in Moscow developed a way to create "living portraits" from a very small dataset—as few as one photograph, in some of their models.

The paper, "Few-Shot Adversarial Learning of Realistic Neural Talking Head Models," was published on the preprint server arXiv on Monday.

The researchers call this few- and one-shot learning, where the model can be trained using just one image to create a convincing, animated portrait. With a few more shots—as few as eight or 32 photographs—the realism improves even more.

May 23 13:01

Comcast Plans In-Home Health Surveillance and Medical Tracking Device

By Nicholas West

“Comcast is already in talks with hospitals about taking on shared savings — if it can keep people from expensive emergency room visits.” — CNBC

It is becoming clearer each day that new technologies are further highlighting the great expanse between intention and application. As with all technologies of value, medicine has pitted the powerful desire of human liberation from suffering and the pursuit of a longer life up against the powerful desire to create centralized systems of management, both for profit and control.

The fact is that Big Data and its attendant analytics is irresistible for central authorities...

May 23 11:18

Scott Adams: Biden, Infrastructure Theater, Word-Thinking, Shadowbanning

Comments at: https://twitter.com/ScottAdamsSays/status/1131560677942878209

Michael Avenatti, Stormy Daniels…back in the news again
Political season is upon us, and some odd traffic coincidences
We’re left to guess why traffic patterns suddenly altered
The fact we can’t tell why…portends regulation
Lack of social media algorithm transparency…
…IS the end of our Republic
Not necessarily a coordinated conspiracy, but same result
Joe Biden has no legislative accomplishments
A career in politics, and NO accomplishments to show?
VP candidate traditionally boring, watered-down version of POTUS
Biden was more boring than President Obama
Now Biden has to select his own VP, that’s even more boring
CNN and MSNBC producing stories out of colorful words
CNN reports Pelosi says she’s getting under POTUS skin
Social media wasn’t able to obtain their desired result in 2016

May 23 10:56

VIDEO: Trump confirms US cyberattack on Russia last year

The U.S. carried out a cyberattack against Russia last year, President Donald Trump confirmed on Sunday.

During an interview with Fox News’ Steve Hilton, Trump said the cyberattack “happened during my administration.”

Watch the exchange below, which begins at approximately 4:08:

May 23 10:50

MOSSAD AND THE RISE OF THE VC-SPY ALLIANCE

SOURCE: DEEP STATE BLOG

The growth of intelligence agencies in the 21st century has been powered by the development of new technologies, created by start-ups, which are powered by intelligence agencies. This unvirtuous circle of money and espionage is a new and daunting challenge for civil liberties and human rights groups.

The U.S intelligence community has a venture capital organization, Inqtel, founded by the CIA in 1999. Israel’s Mossad has Libertad Ventures, founded in June 2017.

As The Times of Israel reports:

Webmaster's Commentary: 

How deliciously ironic: the name of the organization, "Libertad" (meaning liberty) is the polar opposite from what Mossad wants its software to do; Mossad's goals here, are to assist Israel in regime change of any country it doesn't much care for (and that would most probably be the entire rest of the Middle East), or viciously mischaracterize individuals who believe in a fair shake for Palestine, as "supporters of extreme terror" (and I have to bet, as peace activists, our names are somewhere in their data base).

The goals of this company are not to encourage any real win/win relationships, but to give Israel the "edge" it believes it needs to surveille other countries, without leaving a trace of the intrusions

May 23 10:45

Israel launches massive recruitment drive for social media warriors

Israel has embarked on a massive recruitment drive to support the country’s online propaganda campaign one day after its companies were exposed for spreading disinformation and meddling in the elections of several African, Asian and Latin American countries.

The new initiative, which would see the government funding pro-Israel groups overseas, was unveiled by Israel’s Ministry of Strategic Affairs, a government arm set up to combat the global rise of pro-Palestinian activism and Israel’s poor global image.

Launching the initiative, Strategic Affairs Minister Gilad Erdan, who is also the public security minister, was quoted by the Times of Israel saying: “I’m proud to launch the first [government] program to support pro-Israel organizations and activists around the world.”

May 23 09:51

Two more Microsoft zero-days uploaded on GitHub

A security researcher going online by the pseudonym of SandboxEscaper has published today demo exploit code for two more Microsoft zero-days after releasing a similar fully-working exploit the day before.

These two mark the sixth and seventh zero-days impacting Microsoft products this security researcher has published in the past ten months, with the first four being released last year, and three over the past two days.

May 23 09:50

Apple to be more upfront about the impact of iPhone updates

Apple has promised to be clearer and more upfront with iPhone users about battery health and performance, following action by the UK's Competition and Markets Authority (CMA).

The competition watchdog said it opened an investigation last year after finding that iPhone owners were not being warned clearly that their phone's performance could slow down following a 2017 software update designed to manage demands on the battery.

The CMA was worried that users might have tried to repair their phone or replace it because they didn't realise the software update had caused the handset to slow down. It also said that people found it hard to access information about the health of their phone's battery, which can degrade over time.

May 23 08:31

NO WONDER OBAMA INTEL CHIEFS PANICKING – TRUMP TO DECLASSIFY “BUCKET 5” RUSSIAGATE DOCS

SOURCE: ZERO HEDGE

As Congressional Democrats insist on conducting post-Mueller probes into President Trump and those around him, much of the recent infighting and backpedaling we’ve seen from former Obama intel chiefs is starting to make sense.

Appearing with Fox News‘s Sean Hannity Tuesday night, The Hill‘s John Solomon revealed that according to his sources (and Hannity’s as well), President Trump will begin declassifying ‘Russiagate’ documents in the next 6-7 days.

Among those will be the so-called “Bucket Five” – documents which were originally presented to the Gang of Eight in 2016, which included everything the FBI and DOJ used against Trump campaign aide Carter Page – including the FISA surveillance application and its underlying exculpatory intelligence documents which the FISA court may have never seen.

According to John Solomon, #declas is coming in 7-8 days; looks likely after POTUS Japan visit and just before a visit to UK, or between 5/29 and 6/2.

Webmaster's Commentary: 

This is precisely why we had that"Pelosiopolous" moment yesterday (a place for those living in that deluded and dangerous mental construct which is near that of Nancy Pelosi) when "The Pel" accused President Trump of a "cover-up."

It was all planned political theatre, just as Kabuki-like, as one could imagine, and carefully scripted by those who pathologically fail to understand, that when they are prone to these outbreaks of bad, but well-timed, political theatre, the people who hired these people to represent them, are the ones who suffer.

I am watching the crawl on Faux right now, and it is as though nothing else but else but this wretched mud slinging matters. The Pel is speaking right now, again, accusing President Trump of a "cover up". Of course, she really has nothing;, but in the fog-filled, ambien-esque reality of fact-free, political theatre, emotional couching and attempted emotional manipulation, are much more important than facts.

The Pel is stating that President Trump's priority "is his personal interest, not public interest"; I would really like to know precisely what she means, because she has, so far, said a great bunch of nothing, and now has made the statement that President Trump has "pulled a stunt", and "wants the US to be on a path to impeachment." This is how she is laying the groundwork for impeachment. But as we know with the impeachment spectacle of her BFF, President Clinton, during one of his "infidelity fests" with Monica Lewinsky, the accusation does not always mean conviction.

Folks, we are hovering on the verge of World War 3, precisely because Congress has virtually abnegated its responsibility to declare war in Iraq; Somalia, Afghanistan; Libya; Yemen; and here comes the wind-up, and the pitch, for a war against Iran, whose only collective "crime" has been, that it has refused to allow its oil to be sold only in US dollars.

We the People cannot tolerate this lack of action by Congress, and this vile, vituperative "misdirection" by The Pel, and if, somewhere between Memorial Day, and the 4th of July, we see a huge false flag to be blamed on Iran, (most probably courtesy of Mossad), please don't tell me we didn't warn you, that this was coming.

May 23 07:58

ICE SEEKS TECH TO TRACK ELECTRONIC DEVICES—EVEN THROUGH TIME

Immigration and Customs Enforcement is looking for a cloud-based subscription service that can pinpoint the exact locations of cellphones, laptops and other connected devices—even going back in time.

ICE is searching for geolocation services technology that can give an accurate location—either pinpoint or a designated polygonal area—for connected devices within a specific time window. The service should be able to identify locations going back at least two years or more.

According to a request for information posted Monday to FedBizOpps, ICE agents may use the service to locate electronic devices from geolocation data obtained through providers and applications, though it is unclear if the service could be used to pull geolocation data from confiscated devices. The service should be to pull data from numerous sources, including “Wi-Fi, Apps, Software Development Kit (SDK), Bidstream, Beacons, etc.,” and then reduce that information to a single data point.

Webmaster's Commentary: 

I am actually having a hard time in understanding why ICE would be putting out this RFI, other than to spy even more intensely on innocent civilians, who are doing nothing wrong.

I would be interested in the percentage of illegal aliens who come across our Southern border, who are actually set up with cell phones and laptops; my sense would be, doggone few, because if they have cell phones and laptops, they most probably would be doing reasonably well, economically, in their countries of origin.

Color this, should it get fulfilled, just another illegal data grab against ordinary Americans.

May 22 15:16

Huawei unwanted: Asian shops shun phone trade-ins on Google suspension worries

Mobile phone retailers in some Asian countries are refusing to accept Huawei devices for trade-ins, as more consumers look to offload their device on worries Google suspending business with the Chinese firm will disrupt services.

May 22 15:14

New Windows 10 Vulnerability Could Let Hackers Gain Full Access to Your PC

A security researcher who goes by the handle SandboxEscaper published code to GitHub that allegedly shows how a malicious hacker can gain higher privileges on a Windows 10 machine and wreak havoc. The security vulnerability was earlier reported on by ZDNet.

The zero-day vulnerability is what's called a "local privilege escalation." That means that the vulnerability won't necessarily allow hackers or malware to gain access to your machine. They have to already be on your machine. Instead, the vulnerability, when exploited, will give them full control over your machine by upping their privileges to the System level.

This is a bigger problem than it seems, because most malware can be constrained by the limits of the user account it has infected. Privilege escalation busts out of that straitjacket and gives even low-level malware godlike powers.

May 22 15:12

Huawei laptop disappears from Microsoft website, suggesting imminent 'ban'

MICROSOFT LOOKS set to become the latest company to suspend ties with Huawei after it was discovered that all reference to its flagship laptop, the MateBook X Pro, has been removed from the Microsoft Store.

The top-end laptop has had rave reviews since it launched at MWC but has now disappeared from view, suggesting that Microsoft may be preparing to take action to comply with the recent trade ban with the Chinese tech giant.

Microsoft is yet to make a statement either way, but given that Google was forced to suspend licensing Android to Huawei, it's quite likely that Microsoft will be in the same boat and will need to stop issuing Windows licences.

May 22 15:10

Huawei: ARM memo tells staff to stop working with China’s tech giant

UK-based chip designer ARM has told staff it must suspend business with Huawei, according to internal documents obtained by the BBC.

ARM instructed employees to halt "all active contracts, support entitlements, and any pending engagements” with Huawei and its subsidiaries to comply with a recent US trade clampdown.

ARM's designs form the basis of most mobile device processors worldwide.

In a company memo, it said its designs contained “US origin technology”.

As a consequence, it believes it is affected by the Trump administration's ban.

One analyst described the move, if it became long-term, as an “insurmountable” blow to Huawei’s business.

May 22 14:18

MOSSAD AND THE RISE OF THE VC-SPY ALLIANCE

The growth of intelligence agencies in the 21st century has been powered by the development of new technologies, created by start-ups, which are powered by intelligence agencies. This unvirtuous circle of money and espionage is a new and daunting challenge for civil liberties and human rights groups.

May 22 10:59

Microsoft hasn't said a word so far about Huawei's ban in the US, but it removed Huawei laptops from its stores

Microsoft removed Huawei laptops from the Microsoft online store last weekend, likely in response to the US government blacklisting Huawei.

Huawei laptops are still being sold in physical Microsoft stores that still have the computers in stock, according to The Verge.

Microsoft hasn't made an official statement regarding its relationship with Huawei. Business Insider has asked Microsoft for comment, but the company didn't immediately reply. Other outlets have also requested comment from the company to no avail.

May 22 10:32

Why capturing Huawei is no victory in tech war

It’s geopolitical, geoeconomic war. Cold, so far, but now about to descend to deep freeze. The US National Security Strategy unmistakably spells it out. China is a strategic competitor and must be contained, no holds barred, on all fronts: economic, military and most of all, technological.

Enter the current, concerted offensive across the spectrum, from 5G and AI to moves attempting to prevent the coming of globalization 2.0. Add to it maximum pressure all over the world to prevent nations from joining the New Silk Roads, or Belt and Road Initiative (BRI), the organizing foreign policy concept for China in the foreseeable future and the strategic road map for Eurasian integration up to 2049.

It’s all interconnected; the Trump administration’s trade war, Google blocking Huawei from the enhanced Android OS, the demonization of Belt and Road. It’s all about control of global supply chains and technological infrastructure.

May 22 10:26

Why the Air Force is investigating a cyber attack from the Navy

The Air Force is investigating the Navy for a cyber intrusion into its network, according to a memo obtained by Military Times.

The bizarre turn of events stems from a decision by a Navy prosecutor to embed hidden tracking software into emails sent to defense attorneys, including one Air Force lawyer, involved in a high-profile war-crimes case of a Navy SEAL in San Diego.

The tracking device was an attempt to find out who was leaking information to the editor of Navy Times, a sister publication. A similar tracking device was also sent to Carl Prine, the Navy Times editor, who has written numerous stories about the case.

Navy Capt. David Wilson, chief of staff for the Navy’s Defense Service Offices, wrote in the May 19 memo that an Air Force attorney was among the defense lawyers who had received emails with the hidden tracking software, which he described as “malware.”

May 22 10:21

I Was a Paid Internet Shill [for Israeli Propagandists]How Shadowy Groups Manipulate Internet Opinion and Debate

Update 1/12/2013: CLN has received a takedown notice asking us to remove this article on the basis that “It is libelous and utterly false” from someone claiming to be a legal agent of Above Top Secret’s parent company. We are currently investigating and will post status updates as they become available. The original thread now appears to have vanished from Above Top Secret’s website.

Update 1/17/2013: We have requested clarification regarding the takedown request and have not received a response. We will provide updates on any new developments.

May 22 09:00

First SpaceX Starlink mission, why 60 Satellites? 550 km?

May 21 20:25

Popular Chinese Android app hijacks users' devices by signing them up for unwanted services and stealing their personal data, security researchers find

Researchers from Secure-D, the mobile ad fraud division of UK-based mobile monetization firm Upstream, detailed their findings in a post published on Monday.

They discovered that VidMate has a hidden component within the app that delivers hidden ads, generates fake clicks and purchases, installs malicious apps and siphons off users' private information - all without their knowledge.

As a result, it eats up users' data allowance and costs them money.

Upstream researchers blocked over 128 million malicious mobile transactions that were attempted by the VidMate app on 4.8 million devices.

Had they not been blocked, they could have cost users a boatload of unwanted charges.

May 21 19:25

Reddit Commenter’s Fight for Anonymity Is a Win for Free Speech and Fair Use

By Alex Moss

A fight over unmasking an anonymous Reddit commenter has turned into a significant win for online speech and fair use. A federal court has affirmed the right to share copyrighted material for criticism and commentary, and shot down arguments that Internet users from outside the United States can’t ever rely on First Amendment protections for anonymous speech.

EFF represents the Reddit commenter, who uses the name “Darkspilver.” A lifelong member of the Jehovah’s Witness community, Darkspilver shared comments and concerns about the Jehovah’s Witness organization via one of Reddit’s online discussion groups. Darkspilver’s posts included a copy of an advertisement asking for donations that appeared on the back of a Watch Tower magazine, as well as a chart they edited and reformatted to show the kinds of data that the Jehovah’s Witness organization collects and processes...

May 21 18:42

iPhone gyroscopes, of all things, can uniquely ID handsets on anything earlier than iOS 12.2

Oddly enough, the attack doesn't work on most Android devices because they're cheaper than Apple's, in all senses of the word, and generally aren't calibrated, though the researchers did find that some Google Pixel handsets did feature calibrated MEMS.

Beresford joked: "There's a certain sense of irony that because Apple has put more effort in to provide more accuracy, it has this unfortunate side effect!"

Apple has patched the flaws in iOS 12.2 by blocking "access to these sensors in Mobile Safari just by default" as well as adding "some noise to make the attack much more difficult".

The researchers have set up a website which includes both the full research paper and their layman's explanation, along with a proof-of-concept video. Get patching, Apple fanbois.

May 21 18:15

TalkTalk data breach customer details found online

TalkTalk failed to inform 4,545 customers their personal information, including bank account details, were stolen as part of the 2015 data breach.

Viewers contacted BBC Watchdog Live about concerns that their details had been breached by TalkTalk.

But the company had told them that their details were not comprised.

"The customer data referred to by BBC Watchdog relates to the historical October 2015 data breach. It is not a new incident," the firm said.

The BBC consumer show investigated and found the personal details of approximately 4,500 customers available online after a Google search.

The details included full names, addresses, email addresses, dates of birth, TalkTalk customer numbers, mobile numbers and bank details for thousands of customers.

May 21 17:55

Some Facebook users don't have the option to turn off facial recognition technology, study finds

A consumer advocacy group has discovered that not all Facebook users have access to a privacy setting that lets them opt out of the site's facial recognition technology.

Consumer Reports examined a set of Facebook accounts and found that a significant number didn't have the ability to toggle off Face Recognition, a feature that uses facial recognition technology to identify users in tagged photos.

That's despite Facebook announcing almost two years ago that all users would be able to opt out of facial recognition entirely through the setting.

Consumer Reports looked at the accounts of 31 Facebook users and found that eight of them didn't have the privacy setting.

Additionally, the site created several new Facebook accounts to test if they had the setting and found that about a half-dozen of them did not.

It's not clear exactly how many of Facebook's 2 billion-plus users lack access to the Face Recognition privacy setting.

May 21 15:21

Soon You May Not Even Have to Click on a Website Contract to Be Bound by Its Terms

If you’re like most people, you’ve probably clicked “I agree” on many online contracts without ever reading them. Soon you may be deemed to have agreed to a company’s terms without even knowing it. A vote is occurring Tuesday that would make it easier for online businesses to dispense with that click and allow websites that you merely browse — anything from Amazon and AT&T to Yahoo and Zillow — to bind you to contract terms without your agreement or awareness.

As public outcry mounts over companies like Facebook collecting and selling user information, the new proposal would prime courts and legislatures to give businesses even more power to extract data from unwitting consumers. If the proposal is approved, merely posting a link to a company’s terms of service on a homepage could be enough for the company to conclude that a user has agreed to its policies.

May 21 15:17

Google had some passwords stored in plaintext for more than a decade

You might've tried your best to keep your passwords hidden, but a bug could've allowed Google employees to view those login credentials.

In a blog post Tuesday, Google notified G Suite customers that some passwords were stored on its internal servers without any encryption -- meaning anyone who found them could read them in plain text. Suzanne Frey, Google Cloud Trust's vice president of engineering, said in the post that this bug affects only business users -- so if you're using Google for free, this doesn't affect you.

May 21 09:27

Facebook helps phone companies gather user data, including their 'creditworthiness' – report

Facebook has supplied phone companies with customers' private data without their knowledge or consent, and even helped those companies use Facebook behavior to evaluate users' creditworthiness, documents reportedly show.

The social network supplied data on location, interests, and friend groupings to phone carriers and manufacturers without users' permission – data that went far beyond mere technical specs. Users' activity on Facebook, Instagram and even Messenger was fair game for data-mining, and the platform encouraged and even assisted over 100 global telecoms to use customers' data for purposes including evaluating their creditworthiness, according to documents seen by the Intercept, which suggest the program is still going on.

SHARE THIS ARTICLE WITH YOUR SOCIAL MEDIA