of 172 page(s)
Global Warming Lefties Commit Identity Theft to Target Conservative Think Tank
by Ben Shapiro
February 17, 2012
Wednesday, two left-wing blogs posted confidential information supposedly obtained from the Heartland Institute, a free-market, non-profit think tank with a particular focus on battling global warming hysteria.
They posted supposed donor information, inside financials, and even a "confidential memo" on the Institute's climate strategy - which is a "complete fake," according to a statement from The Heartland Institute.
'Anonymous' Leaks Assad Emails; ABC Interview Tips Exposed: "American Psyche Easily Manipulated; Prey On Liberal Guilt"
by Liberty Chick
February 13, 2012
Sheherazad Ja'Afari, a U.N. based press attache in New York for the Syrian mission to the UN, exposes more about the American media and its capacity to be influenced by 'liberal guilt' in one email than conservative news sites could accomplish in a year.
Last night, hackers associated with the loose collective 'Anonymous' leaked the emails from the inboxes of 78 staffers from the mail server of the Syrian Ministry of Presidential Affairs, revealing some interesting observations about the American media.
US Sen. Paul: Ebola "incredibly" contagious
by Kathleen Ronayne
October 21, 2014
U.S. Sen. Rand Paul of Kentucky told a group of college students Wednesday the deadly virus Ebola can spread from a person who has the disease to someone standing three feet away and said the White House should be honest about that.
Paul, a doctor and potential GOP presidential contender, made his comments during a stop at Plymouth State University in New Hampshire Wednesday. In his remarks, he called Ebola "incredibly contagious" and suggested it could spread at a cocktail party attended by someone who is symptomatic, according to CNN video footage.
If You Click A Facebook "Like" Button, The Page Owner Can Spam You
by Patrick McKenzie
August 30, 2010
Facebook sometimes makes very curious decisions with respect to user privacy. Recently, one of them came to my attention, and it is so comprehensively wrong that I had to put up a PSA about it.
US Military May Consider You a Potential Terrorist If You Question Mainstream Ideologies
October 3, 2012
Wired magazine has obtained an outrageous US military document revealing people are being considered terrorist for all kinds of normal activities.
These are some warning signs that that you have turned into a terrorist who will soon kill your co-workers, according to the U.S. military. You've recently changed your "choices in entertainment." You have "peculiar discussions." You "complain about bias," you're "socially withdrawn" and you're frustrated with "mainstream ideologies." Your "Risk Factors for Radicalization" include "Social Networks" and "Youth."
U.S. Caught Creating Three New Cyberwar Viruses
September 19, 2012
In about of Orwellian double speaks the Obama administration touts cybersecurity while using it as cover to conduct cyber warfare.
As computer technology experts continue to be amazed and perplexed by the series of cyber espionage masterpieces which include Stuxnet, Flame and DuQu researchers have discovered three more malicious viruses being used in the United States cyber warfare arsenal. Researchers hope the discovery of the three new malware packages code-named SP, SPE and IP being used to communicate with a vast cyberwarfare infrastructure will help provide additional clues in hunting down the source of this malware.
Apple Granted Patent For Third-Party iPhone Kill Switch
September 17, 2012
A new Apple patent gives third parties the ability to disable data transmissions, cameras, and other features such as video and audio recording on iPhones.
A new patent granted to Apple will give third parties the complete ability to control the functionality of iPhones as they set fit. The patent specifies several use cases which will ultimately give the government, companies and organizations complete control over controlling the abilities of your iPhone. For example, when you bring your iPhone near a move theater they can set up policies to disable disable any features the create light or sound as well as disable recording functionality. Another use case specified in the patent is policies at academic institutions such as schools and colleges to completely disable data transmissions.
Obama Preparing To Seize Internet With CISPA Based Executive Order
by Alexander Higgins
September 9, 2012
President Obama is circulating draft legislation of CISPA legislation he will sign into law through executive order after Congress failed to pass it.
When the US congress tried to push legislation into effect to protect America's so-called critical infrastructure from the imminent threat of a doomsday cyberattack it was meant with such a huge public outcry and protest Congress couldn't enact it. Why? Well it didn't take a genius to look at the legislation and realize it did next to nothing to in regards to actually protecting America from a cyberattack but instead open a Pandora's box which essentially allowed companies that send your data across the internet to send all of that data to Uncle Sam. The legislation was written to give the government and participating companies immunity from any lawsuits or criminal charges for illegal activities they participate in the name of cybersecurity. In short the bill was nothing more than a complete suspension of the constitutional protections against illegal search in seizure.
BitTorrent Forced To Allow Feds To Secretly Monitor Traffic
by Monitoring Torrent Traffic It Is Not Unreasonable to Assume the Government Has Created A List of All Users Who Downloaded Or Shared the Top Secret Government Documents.
September 6, 2012
Researchers reveal shady companies, some yet to be identified, are secretly monitoring users and BitTorrent does not apply peer-blocking rules to these firms.
At least 10 companies are covertly monitoring the online traffic of the popular Bit Torrent peer to peer traffic sharing software researchers from the University of Birmingham have revealed. The researchers have learned several of the companies are government copyright enforcement agencies but their inability to identify several of the companies could mean that more sinister government monitoring is occurring. The researchers also revealed the Bit Torrent software is not allowing manually created block lists to be applied to the companies conducting the secret surveillance.
Hackers Find 12 Million Apple Users Personal Data On FBI Laptop
by Alexander Higgins
September 5, 2012
Hackers who got inside and FBI laptop found the personal data of over 12 million users including addresses, phone numbers and Unique Device Identifiers (UDID).
The Hacker Group Anonymous Hacked into the laptop of an FBI agent and found a massive cache of personal information: "This is just lovely. So apparently several hacker activist groups got into FBI agent Christopher Stangl's laptop and found - A list of 12,367,232 Apple iOS devices including Unique Device Identifiers (UDID), user names, name of device, type of device, Apple Push Notification Service tokens, zipcodes, cellphone numbers, addresses, etc."
Help keep this page up-to-date. Submit a Virus Information News link for inclusion on this page.