of 172 page(s)
Pigs are flying...
October 24, 2013
Hollywood celebrities come together and make a video slamming the government
Judge Napolitano: The Government Violated Same Statute It's Attempting To Prosecute Snowden For
October 24, 2013
A brand-new report suggests that Hillary Clinton's State Department leaked confidential national security secrets to New York Times reporter David Sanger.
The leaks were allegedly in exchange for writings that made the department look tougher. Judge Andrew Napolitano discussed the severity of the leaks on this morning's Fox and Friends. "All governments leak information, we know that. But when the government leaks national security secrets in return for favorable treatment in the press, the government is showing its hypocrisy because it is violating the very same statute that it's attempting to prosecute Edward Snowden for violating," Napolitano said.
Google Launches Tools For Evading Government Control
by J.D. Tuccille
October 22, 2013
With the Internet playing an ever-greater role in disseminating information and connecting political opponents of authoritarian regimes, governments with a taste for deterring the same are stepping up surveillance, efforts to control access to inconvenient facts and opinions, and attacks on the Web presence of the opposition. As we all know, even officials in the land of the free have a taste for online snoopiness. So what an appropriate moment for Internet giant Google to step forward with new tools intended to help online users escape surveillance and control, and to deliver their messages even when under cyberattack by the authorities.
The NSA Lied: Surveillance Didn't Stop 54 Terror Plots
by Jason Louv
October 16, 2013
General Alexander lied about how NSA surveillance is being used, and he's been caught in public
The NSA recently attempted to justify its mass surveillance programs by claiming that its secret taps had foiled 54 terrorist plots. Except that's not true. And General Alexander (the same psycho that built a surveillance "command center" to spy on Americans, and designed it to look like the bridge of the Enterprise from Star Trek) has been caught out lying about the whole thing. And Senator Patrick Leahy (D-Vermont), current chairman of the Senate Judiciary Committee, is none too pleased.
Is the NSA Blackmailing Officials Into Supporting Snooping?
by J.D. Tuccille
October 15, 2013
Why are the likes of Sen. Dianne Feinstein so supportive of wide-reaching National Security Agency surveillance even as polls show a majority of Americans horrified by such intrusions?
At the risk of venturing into paranoid territory, could it be that the NSA has gone all J. Edgar and compiled compromising information about officials who might otherwise be a bit less enthusiastic about snooping? That's what Jay Stanley, senior policy analyst for the American Civil Liberties Union wonders, and he has some evidence to support his theory.
Investigating a New Botnet with the Security Graph
by Dhia Mahjoub
October 14, 2013
The Security Graphs gives us a lot of information about last week's rapidly spreading UnknownDGA17 botnet
According to Gouveia, the botnet spread at a rapid pace to infect 150,000 devices within hours. He also showed that "a total of 21 different domain names were being used at the time of the initial analysis" as CnCs. AnubisNetworks promptly sinkholed these domains to monitor the evolution of the infection. Gouveia revealed that the 21 domains were all registered under the .su ccTLD but did not disclose the full domain names.
'ScareMail' seeks to confuse NSA programs with nonsense
October 10, 2013
An Illinois man has developed a Gmail browser extension designed to randomly insert fake, nonsensical stories into the signature of every email one sends to confuse the NSA's surveillance operations.
Benjamin Grosser says "ScareMail" takes keywords from an extensive US Department of Homeland Security list used to troll social media websites and utilizes them "to disrupt the NSA's surveillance efforts by making NSA search results useless." The buzzwords include the likes of "Al-Qaeda" and "Al-Shabab," yet also more mundane terms like "breach," "threat," "death" and "hostage," among many others. Documents released by former National Security Agency contractor Edward Snowden revealed that the NSA uses the "selector" terms to sift through Internet data it collects via a tool known as "XKEYSCORE."
Warning: Enrolling in Obamacare allows government to link your IP address with your name, social security number, bank accounts and web surfing habits
by Mike Adams
October 10, 2013
We have already established that Healthcare.gov is not a functioning database application that allows people to shop for competing health plans.
It is actually a government-run Trojan Horse that suckers people into creating accounts where they hand over: • Name and address • Email address and password • Social security number • Private bank account details • Employer details and other information During the enrollment process, your computer also hands over your IP address which is then tied to your social security number. This IP address is then handed over to the NSA...
Adobe: Customer security alert
October 3, 2013
Adobe's security team recently discovered sophisticated attacks on our network, involving the illegal access of customer information as well as source code for numerous Adobe products.
We believe these attacks may be related. We are working diligently internally, as well as with external partners and law enforcement, to address the incident.
Rule Cyber-Britannia: MoD to recruit hundreds of IT warriors for cyber task force
September 29, 2013
Britain's Defense Ministry has announced it is creating a military cyber unit and has welcomed tech-savvy hackers to consider taking the Queen's virtual shilling in a recruitment drive starting October.
The UK is channeling part of its military budget on recruiting hundreds of computer experts to constitute the new Joint Cyber Reserve Unit, the country's Defense Secretary, Philip Hammond, announced Sunday. For the first time, the UK's would-be cyber warriors will be tasked with offensive missions.
Help keep this page up-to-date. Submit a Virus Information News link for inclusion on this page.