Sciencemadness Discussion Board

Oh yeah, no reason to be paranoid...

 Pages:  1  2

franklyn - 18-2-2015 at 03:36

http://www.rutherford.org/publications_resources/john_whiteh...

Zombie - 18-2-2015 at 15:01

They have us by the short ones. I agree but what can you do to change or stop it?

I just live my life, inform people that wish to listen, and wear my titanium body suit 24 / 7. (tin foil hats can be tracked now too...)

Just sayin'

franklyn - 21-2-2015 at 14:28

http://www.slate.com/blogs/future_tense/2015/02/18/equation_...

aga - 21-2-2015 at 14:36

It's seriously Worse than you may imagine.

The best thing is to kind of realise the facts, make plans, prepare, then carry on regardless.

Fact is that You are unaffected, yet.

Chemosynthesis - 21-2-2015 at 15:59

http://www.eweek.com/security/linux-lands-on-nsa-watch-list....
That been posted yet?

Zombie - 21-2-2015 at 16:16

Quote: Originally posted by franklyn  
http://www.slate.com/blogs/future_tense/2015/02/18/equation_...



Bert posted a pretty comprehensive article on this story in the VPN thread.
Many people just have no clue how many "hand shakes your internet device makes in an hour, never mind any time span longer than that. It takes a millisecond for the damage to occur.

I really have no idea how many drive I have either repaired / cleaned / or tossed out due to malware.

Here's a quick story... There's a widow that lives a few houses down. We started talking, and she told me about her "site". Harmony dot com.

She met a guy (look this up) James Stewart!!!

It's a west African scam that has been and, still is bilking millions out of new widows, and dating sites.
I found the info, and informed her. She then tells me she has sent him $20,000.00!!!!!!! in the past year.
I started to dig thu her PC, and low, and behold the cursor begins deleting files almost as fast as I can dig them up.

The F@CKING WEB CAM IS ACTIVE!

She even sent a scan of her passport. That was so a courier could ID her to deliver 3.5 million in gold bullion that Staff Sgt. Stewart received for finding a Iraqi Princes son, that was kidnapped.

That little beauty only cost her ten grand in transportation fees due to the extreme weight.

I guess the courier took a left in New Jersey when he should have made a right... Shes STILL waiting for this gold to show up, and requested I leave her computer the way it is so I don't screw it up on her.

Good luck folks!


Zombie - 21-2-2015 at 16:27

Quote: Originally posted by Chemosynthesis  
http://www.eweek.com/security/linux-lands-on-nsa-watch-list....
That been posted yet?


That article is a little off in the details but the jist is correct.

Tor dropped Polipo (onion router) more than a year ago because of that issue.
They switched to a built in / no bail, relay node system.

It's not fail safe but the shear numbers make it undecipherable.
The "hype" is to scare users off the network solely because it is the numbers that make it work. Big Bro has the mass media, and all we have is each other. JFK ring any bells?

Tails network is a whole 'nuther ball of wax. Unless you encrypt yourself, and use an alias... you are wide freekin open. Only your PC is clean. Not your traffic.

The smart play is to run Wipe, and Nuke on a parallel band. Anyone trying to read your data will be shut down by their own security OR their drive will wipe, and delete the very code that makes it run. No recovering from it.

Least that's what I hear.;)

[Edited on 2-22-2015 by Zombie]

franklyn - 23-2-2015 at 00:33

http://www.wired.com/2015/02/nsa-firmware-hacking

I had addressed the following here _
http://www.sciencemadness.org/talk/viewthread.php?tid=19386&...
Hiding Data in Hard-Drive’s Service Areas
http://www.recover.co.il/SA-cover/SA-cover.pdf

http://cryptome.org/2014/05/nsa-customs.htm

http://www.wired.com/2015/02/kapersky-discovers-equation-gro...

http://securelist.com/blog/research/68750/equation-the-death...
http://25zbkz3k00wn2tp5092n6di7b5k.wpengine.netdna-cdn.com/f...

http://www.spiegel.de/media/media-35661.pdf

_______________________________________


As Charlie Brown would say - Arrrgh !

http://www.pcworld.com/article/2887392/lenovo-hit-with-lawsu...

http://www.cnet.com/news/superfish-torments-lenovo-owners-wi...

Check if you have this and maybe others
https://filippo.io/Badfish

.

Sulaiman - 23-2-2015 at 02:13

due to the post above I just ran the superfish removal tool

SHIIIT !!!

my Lenovo was infected.



Thanks for the heads up guys.

Zombie - 23-2-2015 at 02:22

It all comes back yo Uncle Bill!

Have you all seen the "System Reserved" partition? The "new" boot sector?

That is exactly what all those articles are referring to. Hidden partitions.

When Win. 10 is released all support for previous versions will be dropped. All of it. We are then 100% in pocket, and ready to go on Their on line world.

For now??? Copy your boot sector or make a new boot cd. Put that copy on "C" drive WHERE IT BELONGS, and delete Uncle Bills "system reserved" partition.
Use Paragon or whatever to wipe, and you can now re partition to gain that space, and prevent hidden partition attacks.

It's a brave new world... "order".

franklyn - 24-2-2015 at 08:17

http://www.theglobeandmail.com/news/world/russian-researcher...

Zombie - 24-2-2015 at 11:49

That is the first time I saw the complete list of hard drives.

The only use NSA would ever have for the majority of computers on the "net" would be to use them as "zombies" to launch a massive viral attack either at specific targets or entire countries.

For the most part all of this is no real concern to individuals.

It is the same as what they did with the Suxhnet virus, it's just a stronger back bone now. We can't readily remove their code.

aga - 24-2-2015 at 13:37

Just dump Windoze and install Linux.

If you can learn C, you can read the entire source code, even compile your own OS and use that instead of the spoon fed garbage M$ peddles.

Zombie - 24-2-2015 at 15:04

I'm a champ at understanding what software I need for a purpose but I forgot everything I ever learned about code when compilers came out.

Linux always felt sort of "flat" to me. I like all the shiny things that get windows users in trouble. It gives me something else to do. Fix the Damn computer...

Oscilllator - 24-2-2015 at 22:16

Quote: Originally posted by aga  
Just dump Windoze and install Linux.

If you can learn C, you can read the entire source code, even compile your own OS and use that instead of the spoon fed garbage M$ peddles.

I've been thinking about doing this, but since many of the applications I use are only available for windows I think it probably wouldn't be worth it since I would spend all my time using a windows emulator. What reasons would you give for using a linux over a windows machine?

Zombie - 25-2-2015 at 02:36

The bigest reason is everything runs in ram or a "virtual environment"

That alone prevents most nasties from ever gaining access to your hard drive.

Quote:

"LINUX IS LESS VULNERABLE TO COMPUTER MALWARE!

Because most computer malware are designed to attack Windows (often through Active X which is not typically found in Linux) the odds are considerably less for Linux to be infected with a virus than Windows [2]. The same holds true with spyware, trojans, and worms. While Linux malware does exist, they are relatively few in number and none have become widespread so far [3]. While Linux is very secure by its nature, users should still employ good sense while surfing the Internet; click here to learn more [4]. As long as Linux users download and install only from their distro’s official software repository, then security is greatly increased. One nice security feature In Linux is that files must be made to be executable by someone with administrator privileges, which requires a password. So even if a Linux virus is loaded on a Linux computer, it will not be able to run without the user who has administrator privileges intentionally making it executable. Another important aspect of Linux security is the fact that it is open source. Because the programing code is available for anyone to view, there are many eyes constantly examining it, which makes it highly difficult for malware to be hidden within the code [5]. Also, security patches normally come much quicker to Linux than other operating systems because so many people are contributing to it. Here are some resources with more information about Linux security and why Linux computers are much less likely than Windows to ever become infected with a virus:"

https://renewablepcs.wordpress.com/about-linux/advantages-of...


There are a few more links in the article

Loptr - 25-2-2015 at 10:03

Quote: Originally posted by Zombie  
The bigest reason is everything runs in ram or a "virtual environment"

That alone prevents most nasties from ever gaining access to your hard drive.

Quote:

"LINUX IS LESS VULNERABLE TO COMPUTER MALWARE!

Because most computer malware are designed to attack Windows (often through Active X which is not typically found in Linux) the odds are considerably less for Linux to be infected with a virus than Windows [2]. The same holds true with spyware, trojans, and worms. While Linux malware does exist, they are relatively few in number and none have become widespread so far [3]. While Linux is very secure by its nature, users should still employ good sense while surfing the Internet; click here to learn more [4]. As long as Linux users download and install only from their distro’s official software repository, then security is greatly increased. One nice security feature In Linux is that files must be made to be executable by someone with administrator privileges, which requires a password. So even if a Linux virus is loaded on a Linux computer, it will not be able to run without the user who has administrator privileges intentionally making it executable. Another important aspect of Linux security is the fact that it is open source. Because the programing code is available for anyone to view, there are many eyes constantly examining it, which makes it highly difficult for malware to be hidden within the code [5]. Also, security patches normally come much quicker to Linux than other operating systems because so many people are contributing to it. Here are some resources with more information about Linux security and why Linux computers are much less likely than Windows to ever become infected with a virus:"

https://renewablepcs.wordpress.com/about-linux/advantages-of...


There are a few more links in the article


A vulnerability can pop up in Linux-based distribution just as easily as Windows. Linux, or rather the open-source world, does have a pretty good leg up when it comes to security, and that is because the source code is available for review by hackers, developers, and security-minded individuals alike. The more eyes on the source code you have, the less likely it is to start to get a mind of its own and start seeing bugs as features.

One thing that Windows has over Linux is the reduced surface area of attack when it comes to combinations of third party software packages installed. Every Linux distribution is made up of software from completely different groups that have completely different ways of managing the projects, not to mention different methods of review, testing, and quality control. In order for a Linux distribution to be completely secure (no system is completely, but hypothetically speaking), the groups developing each individual package must be diligent and keep their act straight, while Microsoft on the other hand, has to just keep themselves straight. Whether either of them actually accomplishes this in reality is a whole other issue, but the point being less required purview. (yes, Windows has a lot of third party software, a lot of them being drivers, but they don't make up the core system in my conceptual frame of reference.)

When a vulnerability does pop up, I would feel safer with a Linux-based distribution simply for the reason that there is such a wide variance in the makeup of each distribution. Sure, there is a lot in common between each distribution, but each package distributor has their own way of putting the system together than might help keep your system from being included in a broad brush stroke across multiple machines, such as needed file permissions or execute permissions being set, certain libraries and versions being installed, certain paths of installed libraries, etc. That is another thing, why does Microsoft allow any file to be executable? In Unix-derived systems, there is an execute flag that is needed to "execute" something, whether it be a shell script or an actual executable. A lot of Linux vulnerabilities have to be specifically targeted, which limits the exploit to a particular set of installations instead of potentially several generations of Windows. Linux is a patchwork of software, and one Linux isn't necessarily the same as another Linux, which I feel does provide some level of additional security, even if it is only security through obscurity. An example would be a vulnerability in the KDE windowing environment, which doesn't automatically imply the vulnerability also works under a Gnome environment--I know these are commonly installed alongside each other, but just a simple example. The point being they are different libraries that are linked against either at compile time or run-time, depending on the developer. (Another factor is how knowledgeable the developer is that wrote the exploit--if they are good enough, it won't make a difference.)

Now, if you want to talk about government and big brother, then you need to start worrying about the distribution channels of your hardware and software, especially now since computers have networking abilities even before you get the operating system installed. BIOS-based management over the network is a useful technology for Sys Admins, but it scares the crap out of me. I have personally seen instances where Chinese-manufactured chips were found to contain rootkits, which led to policy being implemented within certain circles where all open-source software must be compiled in house or by a trusted-party (me being one of them at the time), and all hardware vetted through trusted channels.

If it's digital, it's probably listening to you right now. I imagine the classified sigint collection technologies are way beyond anything we could think of in a day, and years ahead of anything publicly available now. The government tends to get everything from the source through policy, so any public service or utility can only be assumed to have something built-in to allow them observe AT LEAST SOMETHING.

Now go check out that ISP-provided modem/wireless router you have in your house. The only reason they decided to provide that service is ease of use for the end-user, right? ;-)

Coming from someone who has been developing software for 20 years and is in the "industry".

[Edited on 25-2-2015 by Loptr]

[Edited on 25-2-2015 by Loptr]

aga - 1-3-2015 at 15:03

Quote: Originally posted by Loptr  
One thing that Windows has over Linux is the reduced surface area of attack when it comes to combinations of third party software packages installed.

I cannot agree with that at all.

Windows installations tend to come bundled with all sorts of Third Party garbage, on top of the M$ garbage, and users download and install all sorts of stupidity as well.

Most noteable recent gaff is the Lenovo Superfish abomination, sent out with each new Lenovo laptop : Idiocy in action.

M$ is terribly badly designed/written, yet makes Billions of $.

Fact is that it is so ubiquitous that those fatal flaws have been Spun into 'Reason To Upgrade' or 'Need to buy Support Package'.

Linux is also vulnerable, in that a Genius programmer can simply Read the code and See the vulnerabilities.

The advantage is that everyone can read the same code, and 10,000 less gifted programmers eventually see the same thing, and just 1 can fix it, and does, and for Free.

Loptr - 2-3-2015 at 09:44

I agree with the perceived difference between Windows and Linux, but the fact of how many third party pieces of code are included in one over the other is not for debate. I don't even think I could get a solid number because I continue to see more every day. Also, it comes down to distribution channels like I also said. You can't compare Windows that I install myself vs a prebuilt image being pushed by Lenovo. They will have different packages installed. I am approaching this from a statistical perspective of how likely a bug is to show up given mismanagement and miscommunication amongst developers. Like I also said, in reality it can be quite different and is not the rule.

Also, it doesn't take a genius programmer to read Linux code. Just a pot of coffee, Excedrin, and a bit of a background of college-level Computer Science and operating systems development (elective for my degree). I have written several linux kernel modules, and I don't consider myself a genius in the least.

Don't mistake my stance on Windows vs Linux, as I am a Unix geek at heart, but have now been forced to work in a predominantly Windows environment. Also, as having seen the Windows source code and worked with some of the teams at Microsoft, I can say it is filled (or was at one point) with bug workaround to preserve behavior for some important applications that depended on the bugs behavior.

As for the design of Windows, I only speak up for the kernel, which I quite liked actually (very tidy and clean), while a lot of the subsystem code and user land libraries seemed all over the place (which I have seen a bit and is where I saw the bug preservation code).

Microsoft does have an ugly past, and that's not up for debate. However, since they have now forced themselves to work according to the Security Development Lifecycle, where security is an integral part of its development plans, they have been doing... better. Code review is king, so whether it is open-source or paid consultants, the more eyes on the code, the better.


[Edited on 2-3-2015 by Loptr]

Loptr - 2-3-2015 at 09:52

Quote: Originally posted by aga  

I cannot agree with that at all.


The reduced surface area of attack specifically referred to the wide array of different packagers of the distributions, different packages and version, etc., etc.

There are more distributors and packagers of Linux than salt in the seas. (being facetious) And yes, this does open up discussion to Windows re-distributors, but there are still far more than Windows. Simply because it's cost money with Windows.

[Edited on 2-3-2015 by Loptr]

Quote: Originally posted by aga  
Fact is that it is so ubiquitous that those fatal flaws have been Spun into 'Reason To Upgrade' or 'Need to buy Support Package'.


Come on, that is a business model! ;)

[Edited on 2-3-2015 by Loptr]

aga - 2-3-2015 at 11:17

Sadly Yes.

M$ have managed to spin 'Our Failure To Make a Good Product' into 'The Reason for Our Amazing Success'

In that respect, M$ is truly incredible.

franklyn - 19-5-2015 at 09:55

http://www.foxnews.com/politics/2015/05/18/senate-fight-loom...

http://irregulartimes.com/2015/03/08/heads-up-section-215-of...

http://www.reuters.com/article/2015/05/07/us-usa-security-ns...

http://www.zdnet.com/article/two-months-until-patriot-act-do...


https://www.congress.gov/bill/114th-congress/senate-bill/103...

https://www.congress.gov/bill/114th-congress/house-bill/1466

https://www.congress.gov/bill/114th-congress/house-bill/2048


Okay fella what's the idea of you traveling by train _
http://www.theatlantic.com/politics/archive/2015/05/how-the-...


.

blogfast25 - 19-5-2015 at 12:16

Quote: Originally posted by aga  
Sadly Yes.

M$ have managed to spin 'Our Failure To Make a Good Product' into 'The Reason for Our Amazing Success'

In that respect, M$ is truly incredible.


Another example of Incompetence turned into Gold is Google.

'Our Search Results are So Crappy that if You Want to Be on Page 1, You Have to Pay for it, in an Auction that Drives up the Cost per Click, You Suckers. And Then Very Stupid People Will Call Us 'Liberals' with A Smiley Face'. :mad:

aga - 19-5-2015 at 12:23

All modern devices are incredibly complex.

The Sales hype tends to focus on the Core processor, by which the device is deemed 'powerful' etc.

Modern devices include several processors to handle tasks such as the Graphics, Hard drive control, even Power Management.

Each one is a processor, capable of executing instructions.

So long as it handles it's intended task, who is to say what Other instructions it is executing ?

The days of ROM or EPROM are long gone.
The technology today uses re-writeable permanent memory for storing the instructions for these processors, and these processors can write to that same permanent memory.

Frankly it is a crap-shoot as to whether your device does 100% what it was intended to do by it's manufacturer, let alone what you want it to focus on doing.

The manufacturer may never have intended it to do 100% what You the User wanted it to do ...

[Edited on 19-5-2015 by aga]

franklyn - 23-5-2015 at 09:13

http://www.vox.com/2015/5/23/8648463/nsa-scare-tactics

Zombie - 23-5-2015 at 10:06

Quote: Originally posted by aga  
All modern devices are incredibly complex.

The Sales hype tends to focus on the Core processor, by which the device is deemed 'powerful' etc.

Modern devices include several processors to handle tasks such as the Graphics, Hard drive control, even Power Management.

Each one is a processor, capable of executing instructions.

So long as it handles it's intended task, who is to say what Other instructions it is executing ?

The days of ROM or EPROM are long gone.
The technology today uses re-writeable permanent memory for storing the instructions for these processors, and these processors can write to that same permanent memory.

Frankly it is a crap-shoot as to whether your device does 100% what it was intended to do by it's manufacturer, let alone what you want it to focus on doing.

The manufacturer may never have intended it to do 100% what You the User wanted it to do ...

[Edited on 19-5-2015 by aga]



A lot of this depends on how much you know about the software in your system.Much if not all of it has "phone home" abilities under the pretense of updates.
Again much if not all of it also sends usage data. Exactly what that data is relies on how the software was written.

I've said it in several threads that turning off or deleting the "auto update" files are your only protection from this.
Also a fully controllable firewall is a MUST on today's net.

Knowing what services your system needs, and what they do is also a MUST. Same for processes.

It's well worth spending one week googling every running system on your rig to determine if it is needed, and if you can turn it off or modify the files to make it both safe, and free up needed computing power.

I run a home built 8 core AMD that is overclocked to 5.2MHz. I learned the hard way that anything less (for me) is almost useless. Even with every running set of instructions fine tuned to free up resources. Honestly... MicroSoft is a horrible excuse for an operating system. Planned failure.

Linux systems are not much better. There is no real software for it, and the emulators that allow SOME windows programs to run suck.

Back on topic. Thank God for Snowden. For those that didn't believe what the internet really is, I pray he opened your eyes. For those that still doubt it, Try this...

Open an AOL email account, and begin typing an Email to any address. Pick ANY subject ie: Dear mom, Where can I buy tires for my truck, and I also need a dozen roses for Judy's birthday.

Before that email is SENT there will be Ad banners for tires, and roses all over your screen. You did not even authorize a send command yet, and THEY KNOW what you are writing. Who else knows?????????

Firewall, PeerBlock, and monitor EVERY PROCESS, and SERVICE! There is nothing else you can do.

aga - 23-5-2015 at 10:22

Switch off the computer and live under a Rock, as i do.

Zombie - 23-5-2015 at 10:49

They have wifi under rocks? Or are you hard lined?

Trust me, Hard lined is better. You never know who is under the rock next to you running an array of repeaters.

True story... A local ass clown asked me to look at his computer. He had that FBI warning virus. AKA send us 500.00 USD (as your lawful "fine")and we will return control of your computer to you.

I went to his house with my stack of repair boot discs, and saw he had 6 wifi repeaters all around the room where his computer was. He admitted he was jacking someone elses signal, and had been for years.

I told him there was only one "POTENTIAL cure. To wipe the disc, pray the virus wiped, and re install the OS. I used my Hierem's boot cd, and choose "Wipe, and Nuke". It's a program that wipes the drive, and then wipes the code that makes the drive use-able. I don't mind pirating software from AutoCad or PeachTree (billion dollar corps.) but I don't believe in stealing from your neighbors. Especially in a poor city such as Carrabelle.

He wound up having to buy a new computer because they are cheaper than buying a drive, and an OS. (I never told him I have copies of every OS since XP, and perhaps 10-12 un-formatted hard drives) Perhaps I will meet him in hell, perhaps not.

aga - 23-5-2015 at 10:54

The Devil is in the Driver Details.

Zombie - 23-5-2015 at 11:08

:D:D:D Are you SURE I don't know you?

I'd swear we spent 5-6 hours laughing at people in Harry's bar about 3 months ago.

aga - 23-5-2015 at 12:17

Did i wet my pants ?

Wait a minute, that isn't narrowing it down any.

Zombie - 23-5-2015 at 12:58

You beat me to the punch line again!

Say g'night Gracie...:P

franklyn - 1-6-2015 at 22:43

See here two video reports, first how we got here and now big brother.

http://www.pbs.org/wgbh/pages/frontline/government-elections...

.

byko3y - 1-6-2015 at 22:57

Why should I bother about government spyingfor its citizens. US government is capable of spying all over the globe, and it had this ability long time ago.
It decides what news you will get on major tv, radio, newspapers, it has military bases all over the world. Not that US government is special - any government will do that. US just doing it in the whole world.
"Oh, what a nonsense conspiracy you talk about" somebody could say few years ago, until we actually got the proofs Google, Skype and Facebook are working for NSA. And there's no need for additional proofs of military bases existence.

142887153781.jpg - 127kB

Zombie - 2-6-2015 at 00:06

Google, and the NSA have been in bed for decades.

Google has the Bloom Cell, and they are partners in the quantum computer running in the coldest lab space in the universe. ALMOST absolute zero.

Combined they have the worlds best energy source, and the most powerful computer ever conceived. Nothing shifty going on there. They just need to coordinate all those Palm Pilots they have.


Oh! The Pict. you posted... That's just a soldier making sure no one hurts his coffee bean picking Mexican friend. The drug cartel guys like coffee, and they have been jacking the pickers for their beans.
Thank god for American soldiers huh.

http://www.bloomenergy.com/fuel-cell/solid-oxide-fuel-cell-a...

http://en.wikipedia.org/wiki/Quantum_computing

http://www.insightcrime.org/news-briefs/costa-ricas-coffee-i...

franklyn - 4-6-2015 at 14:28

Wait-a- minute ! they can't do that to U S ! !

http://news.yahoo.com/us-officials-massive-breach-federal-pe...

" The FBI is conducting an investigation to identify how and why this occurred,"

Hey , whatever goes around comes around.


.

blogfast25 - 4-6-2015 at 14:34

Quote: Originally posted by franklyn  
Wait-a- minute ! they can't do that to U S ! !

http://news.yahoo.com/us-officials-massive-breach-federal-pe...

" The FBI is conducting an investigation to identify how and why this occurred,"

Hey , whatever goes around comes around.


.


Hey, everyone knows when THEY do it it's GOOD but when 'WE' do it it's BAD!

See also Ellis/Snowdon/Manning etc etc etc. Orwell was so right he should be made mandatory reading in every school in the universe.

[Edited on 4-6-2015 by blogfast25]

blogfast25 - 4-6-2015 at 14:39

The Press Police is Here:

Quote:
The authors call for the creation of an “internationally recognized ratings system for disinformation” that would furnish news organizations and bloggers with the “analytical tools with which to define forms of communication.” While they throw in an obligatory caveat that “top-down censorship should be avoided” (exactly how is left unexplained), they nonetheless endorse what amounts to a media blacklist. “Vigorous debate and disagreement is of course to be encouraged,” the authors write, “but media organizations that practice conscious deception should be excluded from the community.”

What qualifies as “conscious deception” is also left undefined, but it isn’t difficult to surmise. Organizations that do not share the authors’ enthusiasm for regime change in Syria or war with Russia over Ukraine would almost certainly be “excluded from the community.” Weiss, for instance, has asserted repeatedly that Russia is to blame for the July 2014 downing of Malaysia Airlines Flight MH17. But would a news organization like, say, The Atlantic or Der Spiegel be “excluded from the community” for writing about a German intelligence report that indicated the missile in question did not come from Russia? Would journalists like Robert Parry be blacklisted for questioning the mainstream account of the tragedy? Would scholars like the University of Ottawa’s Paul Robinson be banned from appearing on op-ed pages and cable-news programs for challenging the notion that there is, in the words of Ukraine’s ambassador to the United States, “no civil war in Ukraine,” but rather a war “started and waged by Russia”?

Zombie - 4-6-2015 at 16:54

I don't know about a breech in Govt' payroll records. That is the sort of info they would NEVER release or completely deny if it did happen, and was leaked.

IMHO this is nothing more than anti China propaganda. Get Americans to hate China so we have reasons to attack their economy. Obviously we are starting to worry about that HUGE upper hand they have in global markets.

Quote from the linked article:
""This is an attack against the nation," said Ken Ammon,""

If in fact the article were based on a factual event... We'd be nuking them already.

Just my opinion. Propaganda!

franklyn - 5-6-2015 at 08:47

Back in 2009
https://www.youtube.com/watch?v=v6nWpaPNZTk

Currently
https://www.youtube.com/watch?v=iwjph3Xp4o4

.

blogfast25 - 5-6-2015 at 08:56

Quote: Originally posted by Zombie  
Get Americans to hate China so we have reasons to attack their economy. Obviously we are starting to worry about that HUGE upper hand they have in global markets.



Should be a doddle: just sprinkle propaganda with 'communism/Marxism' lavishly and you're half done. Cold war propaganda causes 13 year old Americans to 'still' hate something they don't even remotely understand.

[Edited on 5-6-2015 by blogfast25]

gregxy - 23-6-2015 at 10:45

Here is an interesting article on how it is possible to steal crypto keys by
monitoring RF emissions from a laptop using common components
(the required bandwidth is only 2MHz). The attacker, however needs to
interact with the laptop via WIFI.

http://www.wired.com/2015/06/radio-bug-can-steal-laptop-cryp...

IrC - 23-6-2015 at 13:05

http://67.225.133.110/~gbpprorg/mil/vaneck/index.html

http://67.225.133.110/~gbpprorg/mil/

I should add the point of the links is WiFi is not even required. Even though the technology in the links is dated one can be sure the system and science has advanced far beyond what is commonly known or imagined.

[Edited on 6-23-2015 by IrC]

aga - 23-6-2015 at 13:41

WiFi is incredibly vulnerable.

Strange how all new devices rely on WiFi.

No need to be paranoid - it's all for your own good, honest.

Just relax, buy, use, and rely on the WiFi devices and we'll make sure it's all fine, honest.

(prep the theatre Dave, we got new organ donors incoming).

 Pages:  1  2