Friday, June 13, 2015 - [[[[[[[[[[[[[[[[[[[[[[ National Whistleblower Center ]]]]]]]]]]]]]]]]]]]]]]

Friday, June 13, 2015 - [[[[[[[[[[[[[[[[[[[[[[ National Whistleblower Center ]]]]]]]]]]]]]]]]]]]]]]
[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[ Disseminate Widely ]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]

Monday, August 11, 2014 - [[[[[[[[[[[[[[[[[[[[[[[[[ Project - N.N.O.M.Y ]]]]]]]]]]]]]]]]]]]]]]]]]]

Monday, August 11, 2014 - [[[[[[[[[[[[[[[[[[[[[[[[[ Project - N.N.O.M.Y ]]]]]]]]]]]]]]]]]]]]]]]]]]
[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[ The National Network Opposing The Militarization of Youth ]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]

Monday, August 11, 2014 - [[[[[[[[[[[[[[[[[[[[[[[[[[ Project - Y.A.N:D ]]]]]]]]]]]]]]]]]]]]]]]]]]]

Monday, August 11, 2014 - [[[[[[[[[[[[[[[[[[[[[[[[[[ Project - Y.A.N:D ]]]]]]]]]]]]]]]]]]]]]]]]]]]
[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[ The National Network Opposing The Militarization of Youth ]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]

Sunday, July 13, 2014 - [[[[[[[[[[[[[[[[[[[[[ One Nation Under Surveillance ]]]]]]]]]]]]]]]]]]]]]]

Sunday, July 13, 2014 - [[[[[[[[[[[[[[[[[[[[[ One Nation Under Surveillance ]]]]]]]]]]]]]]]]]]]]]]
[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[ Disseminate Widely ]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]

Saturday, January 18, 2014 - [[[[[[[[[[[[[[[[[[[ Nullify The NSA - OFFNOW.org ]]]]]]]]]]]]]]]]]]]]

Saturday, January 18, 2014 - [[[[[[[[[[[[[[[[[[[ Nullify The NSA - OFFNOW.org ]]]]]]]]]]]]]]]]]]]]
[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[ Disseminate Widely ]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]

Saturday, January 18, 2014 - [[[[[[[[[[[ Whatis Taxed.com - Income Tax Research ]]]]]]]]]]]]

Saturday, January 18, 2014 - [[[[[[[[[[[ Whatis Taxed.com - Income Tax Research ]]]]]]]]]]]]
[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[ Stop Funding Criminal Government - Disseminate Widely ]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]

Thursday, Sept 11, 2014 - [[[[[[[[[[[[[[[[[[[[ The Lone Gladio By Sibel Edmonds ]]]]]]]]]]]]]]]]]]]

Thursday, Sept 11, 2014 - [[[[[[[[[[[[[[[[[[[[ The Lone Gladio By Sibel Edmonds ]]]]]]]]]]]]]]]]]]]
[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[ Disseminate Widely ]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]

Thursday, Sept 11, 2014 - [[[[[[[ Bin Laden Worked With U.S. Government After 9/11 ]]]]]]

Thursday, Sept 11, 2014 - [[[[[[[ Bin Laden Worked With U.S. Government After 9/11 ]]]]]]
[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[ Disseminate Widely ]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]

Thursday, Sept 11, 2014 - [[[[[[ U.S. Government 'Directly Involved' In Terror Plots ]]]]]

Thursday, Sept 11, 2014 - [[[[[[ U.S. Government 'Directly Involved' In Terror Plots ]]]]]
[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[ Disseminate Widely ]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]

Thursday, October 12, 2015 - [[[[[[[[[[[[[[ The Attacks Will Be Spectacular ]]]]]]]]]]]]]]

Thursday, October 12, 2015 - [[[[[[[[[[[[[[ The Attacks Will Be Spectacular ]]]]]]]]]]]]]]
[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[ Disseminate Widely ]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]

Thursday, Sept 11, 2014 - [[[[[[[[[[[ Reality Check More Americans Rethinking 9/11 ]]]]]]]]]]

Thursday, Sept 11, 2014 - [[[[[[[[[[[ Reality Check More Americans Rethinking 9/11 ]]]]]]]]]]

Thursday, Sept 11, 2014 - [[[[[[[[[[[[[[[[[[[[[[[[ We Will N.E.V.E.R. Forget ]]]]]]]]]]]]]]]]]]]]]]

Thursday, Sept 11, 2014 - [[[[[[[[[[[[[[[[[[[[[[[[ We Will N.E.V.E.R. Forget ]]]]]]]]]]]]]]]]]]]]]]
[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[ N.E.V.E.R. Forget ]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]

Cost of War to the United States

Wednesday, February 17, 2010

[RECAP] - "RoGuE HaCkEr" aNd BlAcK Op$ - BeHiNd The CyBeRaTtaCk$ oN AmErIcA

February, 17, 2010 - by Tom Burghardt

The iconic American investigative journalist I.F. Stone once said, "All governments are run by liars and nothing they say should be believed." Stone's credo is all the more relevant today when it comes to the pronouncements of intelligence agencies and their corporate masters, particularly where official enemies are concerned

A widespread computer attack that began July 4 took down several U.S. Government, South Korean and financial web sites, the Associated Press reported.

Multiple media reports claim that the Treasury Department, the Department of Homeland Security (DHS), Secret Service, Federal Trade Commission and Department of Transportation web sites were struck by a distributed denial of service (DDOS) assault that began last Saturday.

According to Computerworld, "a botnet comprised of about 50,000 infected computers has been waging a war against U.S. government Web sites and causing headaches for businesses in the U.S. and South Korea." The magazine reported July 7, "on Saturday and Sunday the attack was consuming 20 to 40 gigabytes of bandwidth per second, about 10 times the rate of a typical DDoS attack, one security expert said after being briefed by the US-CERT on Tuesday. 'It's the biggest I've seen'."

This is particularly embarrassing to the DHS since the agency's U.S. Computer Emergency Readiness Team (U.S.-CERT) is responsible for preventing illegal hacking forays on government networks.

Attacks were also reported on the White House, the Department of Defense, the State Department, The Washington Post, U.S. Bancorp, the New York Stock Exchange and Nasdaq. Affected sites in South Korea included those of the presidential Blue House, the Ministry of Defense, the National Assembly, Shinhan Bank, the newspaper Chosun Ilbo. South Korea's top Internet Service Provider, Naver.com crashed on Tuesday, according to the Associated Press.

===snipped===>Que Bono:Who Benefits?

While we may never know who actually launched the incursions, we just might have a slight inkling of who'll benefit. As Antifascist Calling reported July 6, plans are already afoot to roll-out Einstein 3, a BushF.R.A.U.D.-era surveillance program to screen state computer traffic on private-sector networks.

In partnership with the Department of Homeland Security and the National Security Agency, communications, defense and security firms such as AT&T, General Dynamics, L3 Communications, MCI, Qwest, Sprint and Verizon stand to make billions from contracts under the government's Managed Trusted Internet Protocol Services (MTIPS) program with its built-in "Einstein domain."

How's that for timing!

NeW DHS-NSA-AT&T "CyBeRsEcUrItY" PaRtnEr$hIp

by Antifascist Calling

Pervasive Surveillance Continuing Under ObamaC.H.A.N.G.E.

Under the rubric of cybersecurity, the ObamaC.H.A.N.G.E. administration is moving forward with a BushFRAUD regime program to screen state computer traffic on private-sector networks, including those connecting people to the Internet, The Washington Post revealed July 3.

That project, code-named "Einstein," may very well be related to the much-larger, ongoing and highly illegal National Security Agency (NSA) communications intercept program known as "Stellar Wind," disclosed in 2005 by The New York Times.

There are several components to Stellar Wind, one of which is a massive data-mining project run by the agency. As USA Today revealed in 2006, the "National Security Agency has been secretly collecting the phone call records of tens of millions of Americans, using data provided by AT&T, Verizon and BellSouth."

Under the current program, Einstein will be tied directly into giant NSA data bases that contain the trace signatures left behind by cyberattacks; these immense electronic warehouses will be be fed by information streamed to the agency by the nation's telecommunications providers.

AT&T, in partnership with the Department of Homeland Security (DHS) and the NSA will spearhead the aggressive new initiative to detect malicious attacks launched against government web sites--by continuing to monitor the electronic communications of Americans.

This contradicts President Obama'sC.H.A.N.G.E. pledge announcing his administration's cybersecurity program on May 29. During White House remarks Obama said that the government will not continue Bush-era surveillance practices or include "monitoring private sector networks or Internet traffic."

Called the "flagship system" in the national security state's cyber defense arsenal, The Wall Street Journal reports that Einstein is "designed to protect the U.S. government's computer networks from cyberspies." In addition to cost overruns and mismanagement by outsourced contractors, the system "is being stymied by technical limitations and privacy concerns." According to the Journal, Einstein is being developed in three stages:

Einstein 1: Monitors Internet traffic flowing in and out of federal civilian networks. Detects abnormalities that might be cyber attacks. Is unable to block attacks.

Einstein 2: In addition to looking for abnormalities, detects viruses and other indicators of attacks based on signatures of known incidents, and alerts analysts immediately. Also can't block attacks.

Einstein 3: Under development. Based on technology developed for a National Security Agency program called Tutelage, it detects and deflects security breaches. Its filtering technology can read the content of email and other communications. (Siobhan Gorman, "Troubles Plague Cyberspy Defense," The Wall Street Journal, July 3, 2009)

===snipped===>Einstein: You Don't Have to Be a Genius to Know They're Lying

But what happens next, after the data is processed and catalogued by the agency is little understood. Programs such as Einstein will provide NSA with the ability to read and decipher the content of email messages, any and all messages in real-time.

While DHS claims that "the new program will scrutinize only data going to or from government systems," the Post reports that a debate has been sparked within the agency over "uncertainty about whether private data can be shielded from unauthorized scrutiny, how much of a role NSA should play and whether the agency's involvement in warrantless wiretapping during George W. BushFRAUD's presidency would draw controversy."

===snipped===>"And Ye Shall Know The Truth and The Truth Will Set You Free"

WAKE UP AMERICA.....IT(s) OUR COUNTRY!!!

Love "Light" and Energy

_Don

References:

[Update: 06.13.10 Microsoft Secretly Installs Firefox Extension via Windows Update]:O

[Update: 06.06.10 Samsung Smartphone Shipped With Malware-infected Memory Card] Ya Don't Say:O

[Update: 06.02.10 Windows Live Messenger Hack Tool Is Actually Malware] LOL LOL LOL

[Update: 06.01.10 Researchers Beat Clickjacking Defenses of Top Websites] Ya Don't Say:O

[Update: 06.01.10 Clickjacking Worm Hits Facebook] More DoD R&D Backdoors!

[Update 05.21.10: IBM Hands Out Malware at AusCERT Security Conference] Ya Don't Say:O

[Update 05.13.10: Latest Damage Control 'Declassified"] LOL LOL LOL

[Heads Up! Plague in (Security) Software] Intel back-doors

[New attack bypasses virtually all AV protection] More DuDs R&D

[Hacked US Treasury websites serve visitors malware] Ya don't Say!

[The Securitization and Militarization of Daily Life]

[Countermeasure - Foxit PDF Reader]

[Are PDF's Worm-able?]

[IBM and FAA working together on security project] hmm...very interesting ;)

[Countermeasure - Certificate Patrol Firefox Add-On]

[New PDF-Based Arbitrary Code Execution Technique Revealed] Adobe Exposed Again!

[Urban Legend Watch: Cyberwar Attack on U.S. Central Command] Duhhhhhhh

[Google, Microsoft Push Feds to Fix Privacy Laws] ...L.O.L. Shit is getting D.E.E.P.!

LOL LOL LOL [Lawmakers Urge FTC To Investigate Google Buzz] LOL LOL LOL

[Facebook Announces Changes to Privacy Policy. Again...Geo Location Tracking]

[Researchers demo wireless keyboard sniffer for Microsoft 27Mhz keyboards] KeyKeriki

[Intelligence Support Systems for Lawful Interception/Investigations/Spying]

[China Accuses Google of US Intelligence Ties] LOL LOL LOL DUHHHHHHHHH!

[LOL LOL LOL - Governments Fakes SSL Certificates- LOL LOL LOL] TOLD YA SO!

[LOL LOL LOL- Law Enforcement Appliance Subverts 'SSL- LOL LOL LOL] TOLD YA SO!

[Security Watch: Beware the NSA’s Geek-Spy Complex]

[Secret Service Paid TJX Hacker $75,000 a Year] DUHHHHHHHHHHH

[It looks, feels, and acts like Microsucks, maybe it is Microsucks?]

[More Damage Control - LOL LOL LOL "3" Persons Contolling 12 Million IPs? LOL LOL LOL]

[Federal Agencies Expand Internet Monitoring] LOL LOL LOL

[Cyberwar Scam Designed to Destroy Open Internet]

[Cryptome's Publication of Microsoft's Manual is a Fair Use]

[Microsoft/Network Solutions Demand Takedown] DUHHHHHHHHHH

A document from a 2008 oversight report indicates that Army Cyber Counterintelligence officers attended a Black Hat security conference without disclosing their Army affiliation. The conference, held annually in Las Vegas and Washington, D.C., attracts hackers and security professionals from around the world. It’s also a hotbed gathering for undercover law enforcement and intelligence agents from around the world who come to learn about the latest computer security vulnerabilities and what specific hackers are up to. The documents don’t indicate if the officers collected any information on conference attendees.

[Hacker 'Mudge' gets DARPA job]

[Google Buzz accused of EPIC FAIL]

[Firefox: Location-Aware Browsing]

[Pentagon Seeks High School Hackers]

[Hacker claims he was working for FBI]

[Google Buzz bug exposes user geo location]

[Pentagon Working on Cyberwarfare Tools for GIs]

[Hacker ‘Dark Tangent’ Joins DHS Advisory Council]

[Surprise Adobe update grapples with critical flaws]

[Cybersecurity official quits, blasts NSA power grab]

[Hackers update rootkit causing Windows blue screens]........Microsofts Security Updates = Intel Hack Patches

[US: Contractors Vie for Plum Work, Hacking for U.S. Government]

[Programmer Conned CIA, Pentagon Into Buying Bogus Anti-Terror Code]

Notice; site being blocked, use The Cloak to view: www.wired.com/threatlevel/2009/12/montgomery-2/

No comments:

TOPs Blogger Role