‘Trojan Horse’ Bug Lurking in Vital US Computers Since 2011

A destructive “Trojan Horse” malware program has penetrated the software that runs much of the nation’s critical infrastructure and is poised to cause an economic catastrophe, according to the Department of Homeland Security. National Security sources told ABC News there is evidence that the malware was inserted by hackers believed to be sponsored by the…

FBI director: iPhones shields pedophiles from cops

NEW YORK (CNNMoney) Apple’s new privacy features protect kidnappers, pedophiles and terrorists, according to FBI director James Comey. In an interview on CBS’ “60 Minutes” on Sunday, Comey said Apple’s encryption standards for iPhones and iPads “put people beyond the law.” Apple (AAPL, Tech30) recently took measures to enhance user privacy. Now, only users have…

Southcom Keeps Watch on Ebola Situation

By Jim Garamone DoD News, Defense Media Activity WASHINGTON, Oct. 8, 2014 – The potential spread of Ebola into Central and Southern America is a real possibility, the commander of U.S. Southern Command told an audience at the National Defense University here yesterday. “By the end of the year, there’s supposed to be 1.4 million…

“Common People Do Not Carry This Much Currency” – How Police Justify Stealing American Citizens’ Money

Submitted by Mike Krieger via Liberty Blitzkrieg blog, Police confiscating Americans’ hard earned cash, as well as a wide variety of other valuables, without an arrest or conviction is a disturbing and growing practice throughput these United States. Since cops get to keep the seized funds and use the money on pretty much anything they want, the practice is…

Top Doctors: Ebola May Become Airborne … And May ALREADY Be Transmissible Via Aerosols

Michael T. Osterholm – director of the Center for Infectious Disease Research and Policy at the University of Minnesota – wrote in the New York Times last month: Viruses like Ebola are notoriously sloppy in replicating, meaning the virus entering one person may be genetically different from the virus entering the next. The current Ebola…

For the first time, Russia has more deployed nuclear warheads than U.S.

For the first time, Russia, which is in the midst of a major strategic nuclear modernization, has more deployed nuclear warheads than the United States, according to the latest numbers released by the State Department. Russia now has 1,643 warheads deployed on intercontinental ballistic missiles, submarine-launched ballistic missiles and heavy bombers. The United States has 1,642, said…

U.S. Ramping Up Major Renewal in Nuclear Arms

KANSAS CITY, Mo. — A sprawling new plant here in a former soybean field makes the mechanical guts of America’s atomic warheads. Bigger than the Pentagon, full of futuristic gear and thousands of workers, the plant, dedicated last month, modernizes the aging weapons that the United States can fire from missiles, bombers and submarines. It…

Pirate Bay fools the system with cloud technology

Despite years of persecution, the world’s most notorious pirated content exchange continues to flout copyright laws worldwide. The Pirate Bay team revealed how cloud technology made their service’s virtual servers truly invulnerable. Two founders of The Pirate Bay (TPB) file exchange are in prison, but their creation continues to receive millions of unique visitors daily…

CIA stops spying on friendly nations in W. Europe

WASHINGTON (AP) — Stung by the backlash over a German caught selling secrets to the U.S. and the revelations of surveillance by the National Security Agency, the CIA has stopped spying on friendly governments in Western Europe, according to current and former U.S. officials. The pause in decades of espionage was designed to give CIA…

Governments spy on journalists with weaponized malware – WikiLeaks

Journalists and dissidents are under the microscope of intelligence agencies, Wikileaks revealed in its fourth SpyFiles series. A German software company that produces computer intrusion systems has supplied many secret agencies worldwide. The weaponized surveillance malware, popular among intelligence agencies for spying on “journalists, activists and political dissidents,” is produced by FinFisher, a German company.…

China wants explanation on allegations of US spying

China has demanded a clear explanation from the United States following reports that it infiltrated the servers of the Chinese telecoms giant, Huawei. The company said it would condemn the invasion of its networks if the reports in the New York Times were true. The newspaper quoted documents, allegedly from the US National Security Agency…

Busted! – U.S. Tech Giants Knew Of NSA Spying Says Agency’s Senior Lawyer

GIH: As it turns out, tech giants were in fact working with the NSA to collect user data electronically.  They have vehemently denied this.  It seemed to make more sense, that NSA had worked with them, compared to NSA being able to hack on multiple levels their systems.  Although the NSA has developed many technologies…

Why HTTPS and SSL are not as secure as you think

GIH: We are led to believe that by installing a certificate, or by other common security practices, we are safe.  The following shows that this may not be the case, especially considering the vulnerabilities of HTTPS protocol, the commonly accepted ‘safe’ way to browse: In this day and age of well-known NSA spying, everyone keeps…

‘What does ISP mean?’

GIH: Shocking information has come forth that government officials responsible for cybersecurity initiatives do not have basic knowledge about the internet, such as what an “ISP” is.  How can those who know nothing about a topic regulate or execute it? One of the world’s leading cyberwarfare experts has warned of the damaging lack of government…

How the NSA Plans to Infect ‘Millions’ of Computers with Malware

GIH:  As more information comes out about various spy agencies and their cyber divisions, it seems that those such as the NSA pose a larger threat to internet security than the hackers they are supposedly protecting us from.  The following information should make any user of the internet, be it a business or individual or…

ALERT: Point of Sale RAM scraper malware

Advances in technology have led to more sophisticated crimes by exploiting security vulnerabilities of new technologies.  This is exacerbated by the fact that understanding of these technologies and their use is only by a few, while the majority of end-users are unaware.  Generally speaking, following standard security practices will thwart 95% of electronic crimes such…

FBI moves from policy of Law Enforcement to National Security

The FBI’s creeping advance into the world of counterterrorism is nothing new. But quietly and without notice, the agency has finally decided to make it official in one of its organizational fact sheets. Instead of declaring “law enforcement” as its “primary function,” as it has for years, the FBI fact sheet now lists “national security”…

Inside TAO: Documents Reveal Top NSA Hacking Unit

More leaked documents reveal a secret NSA hacking operation, with techniques ranging from physical implants of malware (sometimes hardware) to infiltrating Telecom networks, and even exploiting Microsoft updates to infect the target machine.  TAO has existed since 1997, but recently interest in the program is exploding, as seen by the drastic increase in the number…

Federal judge rules NSA phone surveillance legal

In a surprise ruling, a New York judge has ruled that the NSA’s surveillance program is legal, because it proves Al-Qaeda a ‘counterpunch’.  The name Al-Qaeda was a name created by the CIA that means ‘database’ – in this case, database of radicals.  Is much of the conspiracy theory purported by the US government (The…