» Computer Technology INDEPENDENCE DAY

You are the resistance

Computer Technology

Zombies are real

humans-merge-with-smartphonesAre you a zombie? On Twitter?  On Facebook? Visit Drudge? Infowars.com? Buy “stuff” you don’t need?

Have you looked around lately? The zombie apocalypse is already here. It’s as if people have merged with their smartphones, as if the device is now a part of their bodies like another hand or another foot.

Reality is becoming a little less real by the day. Can you even imagine what it will be like when virtual reality hits the mainstream?

Russian gang that hacked 1.2 billion IDs and passwords may be just an ad to get people to purchase a computer security service

The following post is from http://www.whatdoesitmean.com regarding a recent New York Times article that claims a group of Russian hackers stole consumer IDs and corresponding passwords may be nothing more than a devious marketing technique to get readers to purchase a $120.00 service fee that would determine if you were a victim or not.

Before you read it, let me share that this whatdoesitmean website has been accused of providing “disinformation,” by whom and for what purpose is unknown. But it seems that the Department of Homeland Secur0000ity monitors this website, so maybe the disinformation is coming from Examiner.com’s Timothy Barello who accuses the whatdoesitmean site of being a “disinfo” site. Added to the mix is an arcticle that appeared in PC World magazine yesterday that questions how and how much was answered by the company that initially broke the news, Hold Security, so read at your own risk.

The article in PC World is “5 unansered questions about the 1.2 billion passwords stolen by Russian hackers.” Whatever you do, don’t buy this $120.00 service until you get more information. If true, the New York Times, which broke the story, may be further losing some of its shrinking credibility.

What follows is the WhatDoesItMean post:

Cyber intelligence analysts working in the Federal Security Services (FSB) are reporting today that the New York Times (NYT) has made an estimated US$1 million off of a “fake article” designed to look like news blaming a Russian hacking group for stealing over a billion passwords to Internet sites and personal computers causing fright among tens-of-millions of users the world over.

According to this report, on 5 August, the NY Times published a story titled “Russian Hackers Amass Over a Billion Internet Passwords” which was, in fact, a “Native Advertising” venture between this once respected newspaper and a relatively new computer company identified as Hold Security founded last year in Wisconsin by Alex Holden.

“Native Advertising”, this report continues, is an online advertising method in which the advertiser attempts to gain attention by providing content in the context of the user’s experience. Native ad formats match both the form and function of the user experience in which they are placed.

The advertiser’s intent is to make the paid advertising feel less intrusive and thus increase the likelihood users will click on it. The word “native” is used to refer to the formatting of the advertising materials to make them appear more consistent with other media in the recipient’s universe.

The New York Times began their “Native Advertising” programme this past January, this report says, when Dell became the first advertiser to buy into this highly deceptive program, and which was “a three-month campaign costing six-figures”.

The FSB’s estimate of The New York Times making “at least” US$1 million off of their “Native Advertising” article for Hold Security, this report says, is based upon the Hold Security fee of US$120.00 for anyone seeking to find if their passwords were hacked by these “non-existent” Russian hackers as they are the only ones who, supposedly, know who they are.

In their “fake” news story about these Russian hackers, the FSB reports, The New York Times says that Hold Security (the only cyber security firm mentioned in this story) told them: “The hacking ring is based in a small city in south central Russia, the region flanked by Kazakhstan and Mongolia. The group includes fewer than a dozen men in their 20s who know one another personally — not just virtually. Their computer servers are thought to be in Russia.”

A more accurate description of this “cyber gang”, however, this report says, can be found in the article by the American technology news and media network The Verge who writes about them stating:

“The biggest red flag of all, though, is that CyberVor isn’t trying to sell the data or use it to steal actual money. They’re using it for Twitter spam, the dark web equivalent of boiling the bones for stock. If there were anything else they could do with these passwords, it would be more lucrative and more sustainable than spamming. The fact that the crew is reduced to jacking Twitter accounts suggests the data is more about quantity than quality.

What you’re left with is something of a mess. Clearly CyberVor has been busy, and they seem to have done real damage. Spammers are bad, and cracking small sites is just as bad as cracking big ones. But the most impressive aspects of the hack (the 1.2 billion accounts, the 420,000 sites) all have more to do with how the hack was framed than how it was carried out, and it’s easy to see why. No one was going to pay $120 a year just to find out if their Twitter might get hacked.”

Not just The Verge noticed this New York Times “Native Advertising” story for being the “fake” news it was pretending to be either, this report continues, but also The Wall Street Journal and Forbes caught it too, and as we can read:

From Forbes in their article titled “Firm That Exposed Breach Of ‘Billion Passwords’ Quickly Offered $120 Service To Find Out If You’re Affected”:

“The story provides few details beyond hyperbolic numbers: “ 1.2 billion username and password combinations” and “more than 500 million email addresses” are in the hands of a group of 20-something hackers in Russia, according to the report. No specifics about the state of those passwords: whether they’re in clear-text — the worst case scenario — or in encrypted form. The Internet predictably panicked as the story of yet another massive password breach went viral.”

And from the Wall Street Journal:

“The firm, founded last year in Milwaukee, isn’t naming the hackers, any of the victims or how it obtained the data. For a fee, the company said it offers “breach notification services” for website operators that they can use to see if they’re affected and monitor for ongoing threats, according to its website. In an email, Alex Holden, the founder and chief information security officer of Hold Security, said he wanted to “avoid discussing details about the hackers whereabouts and names in case law enforcement has an ongoing investigation.”

Also critical to note about this “fake” New York Times story, FSB intelligence analysts in this report say, was it being written by Nicole Perlroth and David Gellesaug, both of whom were recently found to belong to a highly secretive cabal called the “Gamechanger Salon” which consist of over 1,000 reporters working, in essence, for the Obama regime.

Founded by leftwing activist Billy Wimsatt, the EAG News Service reports, this group is a secretive digital gathering of writers, opinion leaders, activists and political hands who share information, ideas and strategy via a closed Google group. The group’s existence was discovered by Media Trackers through an open records request filed with a University of Wisconsin professor who happened to be a member of the network.

August 7, 2014 © EU and US all rights reserved. Permission to use this report in its entirety is granted under the condition it is linked back to its original source at WhatDoesItMean.Com. Freebase content licensed under CC-BY and GFDL.

Just a thought – Is this accusal of “Russian gangs” part of the U.S. battle over the Ukraine controversy. We know that U.S. mainstream media is store-bought. Hey, anything that makes the Russians look bad is good, right, John Kerry?


“I will take a back seat to no one in my commitment to net neutrality” – Barack Obama

Yet another false promise by Obama, the “speaks with forked tongue” president.

Bill Moyer

Here’s an excerpt from a recent Slate article, The FCC Chairman’s Many Excuses: Tom Wheeler tries, and fails, to justify his execution of net neutrality.

“A few years ago, Internet users, democracy activists, and entrepreneurs got wind of a proposed law, SOPA, that would have changed the Web’s basic architecture to the benefit of a few media giants. So they organized protests for several months to oppose the law. Faced with this opposition, some senators and members of Congress who supported the Stop Online Piracy Act had a moment of sudden insight: They realized they were wrong. They had gone to Washington to help the very people who were now protesting them—the risk-takers, the job builders, the social changers. Instead of digging in or just brushing off the criticism, these policymakers learned from the protests and chose to stay on the right side of history.


Tom Wheeler, a former lobbyist, is the current Chairman of the FCC, appointed by President Obama and confirmed by the U.S. Senate in November, 2013.

Today, millions of Americans from every sector are up in arms over Federal Communications Commission Chairman Tom Wheeler’s proposal to end network neutrality and authorize cable and phone companies to discriminate among websites and charge Web giants for “fast lanes” while keeping the rest of us in a “slow lane.”

Source: Slate.com

NSA tracks innocent citizens, not terrorists, to what ends?

snowEdward Snowden was invited by the Parliamentary Assembly of the Council of Europe to address the activities of NSA in Europe and worldwide. In this presentation he revealed NSA’s monitoring of general population behavior via computer web cams, cables and malware. The technology exists now to track an individual’s sexual habits, orientation, travel movements, donations made, with whom individuals share pictures of their children, even what websites an individual might visit and recorded and analyzed using algorithms designed for such purposes.

Much of the information is made available to law enforcement agencies at a national, state and local level as a means of enforcing laws within their areas of jurisdiction. It should be noted that these activities are as far removed from terrorist activities as the North Pole is from the Sahara Desert.

He emphasized the point that there currently exists no legal means to challenge mass surveillance, a point that was followed by a plea to all nations concerned with privacy to develop international standards to prevent the abuse of this technology. This is a global problem requiring global solutions.

The video is taken of a live stream so the imagery is poor but the audio is excellent.


Published on Apr 9, 2014, YouTube.com
No legal means exist to challenge mass surveillance, said NSA whistleblower Edward Snowden, testifying to the Parliamentary Assembly of the Council of Europe. A former NSA contractor, Snowden was speaking to the PACE session in Strasbourg via a video link-up from Moscow.

The stock market is rigged

The bombshell ’60 Minutes’ report below just released last night will shake Wall Street to its core. Exposing that Wall Street is rigged to the benefit of certain insiders who have made BILLIONS of dollars via computerized trading, this report should bring Wall Street to its knees.

DAHBOO77 – Underground World News brought attention to this “60 Minutes” episode on YouTube and below is a video by him with his take on the situation. Visit his site at the link above for other issues of concern to him such as Second Amendment rights.

A whistle blower in Whistler, British Columbia – Edward Snowden speaks at TED conference

Appearing by telepresence robot, Edward Snowden speaks at TED-2014 about surveillance and Internet freedom.

Obama, like Bush did, tries to hide behind the cloak of “plausible deniability”


What the CIA and NSA does best – hack

In an article by Marcy Wheeler of The Intercept, the new “no holds barred” online publication headed by founding editors Glenn Greenwald, Laura Poitras and Jeremy Scahill, President Obama’s role in the cover up of the Bush years, particularly his refusal to release or declassify any documents that dealt with the torture program administered by the CIA, is examined in detail and without mercy.   Unfortunately, it raises more questions than provides answers; nonetheless, it represents the first time any news organization, alternative or mainstream, has dared to directly tie Obama to the catalog of gross misconducts in a responsible and professional journalistic manner.


On May 10, 2013, John Brennan presented CIA’s response to the Senate Intelligence Committee Torture Report to the President. Official White House Photo by Pete Souza.

Too often the public media has attempted to paint a picture of presidents being isolated from the ugly realities of war and intelligence gathering and as a consequence cannot really be blamed for something they knew little or nothing about.  They call it “plausible deniability.”  Plausible deniability is actually a term coined by the CIA in the early 1960s to describe the withholding of information from senior officials in order to protect them from repercussions in the event that illegal or unpopular activities by the CIA became public knowledge.  My contention is that Obama is no fool and not only does he know what the CIA is doing, but it is he that orders them to cross the boundaries of the rule of law.  He, like Bush before him, believes a president can do no wrong and laws apply only to the masses.

  • Further, did the CIA pull those documents in deference to a White House claim of executive privilege, as Senator Mark Udall and then CIA General Counsel Stephen Preston suggested last fall?
  • And is the White House continuing to withhold 9,000 pages of documents without invoking privilege, as McClatchy News reported on March 12, 2014?

Current CIA Director, John O. Brennan

One thing is certain, from 2009 to 2012, the Obama Administration went to extraordinary lengths to keep a single short phrase, documenting President Bush’s authorization of the torture program,  a secret.  The ACLU had filed a Freedom of Information Request to determine the source of the authority for the CIA’s use of torture and like most requests it refused to comply.  As other documents and reporting have made clear since then, the source of authority was a September 17, 2001 Presidential declaration authorizing not just detention and interrogation, but a range of other counterterrorism activities, including targeted killings.

The article proceeds to provide a time line for the authorization of the CIA torture program which makes it perfectly clear that Bush authorized the program and cannot use “plausible deniability” as a cover for his actions.  Usually presidents will deny “direct” knowledge of such actions and prosecute some lower level official or military orderly for the transgression and the matter is effectively covered up.  The buck stops at President Bush’s desk on this matter.  He authorized it, he lied about it and now, with Obama’s help, he is trying to deny responsibility.


X’s: George Tenet, CIA director and George W. Bush, President at CIA headquarters in Langley VA

My personal view is that Bush should be impeached even though he is no longer in office.  With it should come some sanctions such as the loss of the presidential library, the removal of his portrait from White House walls and a loss of presidential security for the remainder of his life.  Too harsh?  How many lives in how many countries has this man’s actions destroyed?

Link: The White House Has Been Covering Up the Presidency’s Role in Torture for Years


P.S.  There is a growing call for the current director of the CIA, John Brennan, to resign.  Brennan denies spying on the Senate Intelligence Committee.

As a counter move, the CIA is claiming staffers from the Senate intelligence Committee stole secret internal reviews from CIA headquarters and forwarded that charge to the Justice Department for possible investigation.  The documents are an internal review by former CIA Director Panetta, called the “Panetta Review” which is highly critical of the CIA.

Brennan was in charge of the CIA’s torture program after Bush authorized it.


To serve, protect and watch every minute of every day

thZ5VQQGQ8A private company called Vigilante Solutions has developed a data base that captures vehicle license plate information, merges it with other databases and can provide law enforcement agencies like ICE and local police with an intelligence profile that goes well beyond the expiration date of your vehicle registration.

thJMPV51JCIn fact, this technology has been around for years, so if you are on any federal or “suspect” lists you are a moving target for any police unit that carries this type of camera equipment. Are you on a TSA fly list? Forgotten to pay your traffic tickets? How about arrest warrants? All of this without the officer leaving his unit and before he asks for your license and registration. Facial recognition? Yes.

Big Brother is watching you. No sh_t! The following promotion video by Vigilant Solutions boasts of the advantages your police department can have if it purchases the system. In its spare time, the company is suing the state of Utah for passing a law restricting the collection of license plate data.

One day in the life of the planet

On Wednesday, February 5, 2014:

  • Selena Gomez is in need of rehab for emotional trauma and possibly drug addition
  • Nearly a million people are without power in the Northeast as severe snow and ice storms hit overnight
  • Charlie Chaplin’s only novel to be released
  • States look to rein in government surveillance
  • Catholic watchdog group demands the Pope expel all priests accused of sexual crimes
  • Deputy Czar says pot less dangerous than alcohol
  • West Virginia residents desperate for clean water after coal mining pollution
  • Iraq faces possible civil war as religious factions fight over control
  • Cancer rate will surge 57 percent in next 20 years
  • Obamacare will lose jobs due to employers not able to maintain fulltime employees and layoffs
  • A 20 year sanitation worker is fired for accepting a $20 tip
  • France plans law to restore GMO crop ban
  • U.S. firms lax with data security, Illinois official tells Congress
  • 18-foot long Burmese python found in Florida Everglades
  • Man gets first prosthetic hand that can feel
  • Bill Nye, the Science Guy, debates creationist over evolution
  • One-third of kids killed in car crashes were unbuckled

What might a visitor from outer space conclude about our civilization if all they could see is a summary of the news every day?


Well, based on the sample above, they might say that we usually put the fox in charge of the chicken coop, our federal government has become overpowering, we do not know how to prepare for natural disasters, our emotions rule us more than our intellect, we still do not know the true origin of our species, we rush in without considering the consequences of our actions, we are always inventing ways of augmenting our natural abilities, we take either/or positions rarely negotiating middle ground  for the common good, we have a fascination with the rich and famous, we love our children but provide them little supervision, and we act irresponsibly when it comes to our environment issues.


Translate »
Scroll Up