NYU Accidentally Exposed NSA Encryption Busting Code To The World

So how did that global cyber attack happen? I can’t tell you with any certainty but the evidence points to its having originated in the USA (and don’t rule out a false flag explanation because the military – industrial complex are now desperate for an escalation of conflict in the middle east, so if some new terrorist group with a scary sounding name like Al Evilastard death-to-the-infidel Cunt Front claims responsibility be suspicious, very suspicious.

What I can tell you is that the attempts by leftie – loonys to blame Teresa May, claiming it was her decision not to upgrade NHS operating systems when she was Home Secretary is a typically inept and idiotic leftie lie. First, the Home Secretary would not be responsible for decisions on health department information technology systems (the Treasury runs the Government Data Network, the Health Department is responsible for deciding on systems.)

Second, the claim made by the Bolshevik Broadcasting Corporation that the malware attacked Windows 7 was fake news. The worm attacks Windows versions from 7 on, Apple and Linux operating systems. It was developed by the US National Security Agency (NSA) for fuck’s sake, not a bunch of amateur script kiddies.

Here’s the full story of how the virus was released into the piblic domain from The Intercept

In early December 2016, Adam was doing what he’s always doing, somewhere between hobby and profession: looking for things that are on the internet that shouldn’t be. That week, he came across a server inside New York University’s famed Institute for Mathematics and Advanced Supercomputing, headed by the brilliant Chudnovsky brothers, David and Gregory. The server appeared to be an internet-connected backup drive. But instead of being filled with family photos and spreadsheets, this drive held confidential information on an advanced code-breaking machine that had never before been described in public. Dozens of documents spanning hundreds of pages detailed the project, a joint supercomputing initiative administered by NYU, the Department of Defense, and IBM. And they were available for the entire world to download.

The supercomputer described in the trove, “WindsorGreen,” was a system designed to excel at the sort of complex mathematics that underlies encryption, the technology that keeps data private, and almost certainly intended for use by the Defense Department’s signals intelligence wing, the National Security Agency. WindsorGreen was the successor to another password-cracking machine used by the NSA, “WindsorBlue,” which was also  documented in the material leaked from NYU and which had been previously described in the Norwegian press thanks to a document provided by National Security Agency whistleblower Edward Snowden. Both systems were intended for use by the Pentagon and a select few other Western governments, including Canada and Norway.

Adam, an American digital security researcher, requested that his real name not be published out of fear of losing his day job. Although he deals constantly with digital carelessness, Adam was nonetheless stunned by what NYU had made available to the world. “The fact that this software, these spec sheets, and all the manuals to go with it were sitting out in the open for anyone to copy is just simply mind blowing,” he said.

He described to The Intercept how easy it would have been for someone to obtain the material, which was marked with warnings like “DISTRIBUTION LIMITED TO U.S. GOVERNMENT AGENCIES ONLY,” “REQUESTS FOR THIS DOCUMENT MUST BE REFERRED TO AND APPROVED BY THE DOD,” and “IBM Confidential.” At the time of his discovery, Adam wrote to me in an email:

All of this leaky data is courtesy of what I can only assume are misconfigurations in the IMAS (Institute for Mathematics and Advanced Supercomputing) department at NYU. Not even a single username or password separates these files from the public internet right now. It’s absolute insanity.

The files were taken down after Adam notified NYU.

Intelligence agencies like the NSA hide code-breaking advances like WindsorGreen because their disclosure might accelerate what has become a cryptographic arms race. Encrypting information on a computer used to be a dark art shared between militaries and mathematicians. But advances in cryptography, and rapidly swelling interest in privacy in the wake of Snowden, have helped make encryption tech an effortless, everyday commodity for consumers. Web connections are increasingly shielded using the HTTPS protocol, end-to-end encryption has come to popular chat platforms like WhatsApp, and secure phone calls can now be enabled simply by downloading some software to your device. The average person viewing their checking account online or chatting on iMessage might not realize the mathematical complexity that’s gone into making eavesdropping impractical.

The spread of encryption is a good thing — unless you’re the one trying to eavesdrop. Spy shops like the NSA can sometimes thwart encryption by going around it, finding flaws in the way programmers build their apps or taking advantage of improperly configured devices.

Read full article >>>

RELATED POSTS:

Is Bilderberg A Sinister Group That Runs The World Or Just A Tea Party For Rich And Powerful People
Are the Bilderberg Group meeting, this weekend in Dresden, Germany, really The Shadow Government (the New World Order, The Illuminati,) that rules the world?

US-EU Privacy Shield Data-Sharing Agreement Blasted as Inadequate
The issue arises from the strict EU laws — enshrined in the Charter of Fundamental Rights of the European Union — to the privacy of citizens personal data. As we all know thanks to the material leaked by Ed Snowden and others the United States National Security Agency (NSA) does not regard anything as private,
New German Government Smartphone Spyware Will Monitor Citizens’ Calls, Typing AND See Through Their Camera Lenses
The German Interior Ministry has revealed a new “Bundestrojaner” or government trojan horse software that will enable security agencies to track the smartphone activities of anyone who downloads it. We understand Chancellor Merkel’s government has also adopted an “off the shelf” tool from a company which is said to help authoritarian regimes track their citizens …

Latest NSA Spying Scandal: White House Spied On US Congress.
During the aftermath of Ed Snowden’s NSA snooping revelations which revealed the US had been spying on its closest allies for years, Barack Hussein Obama announced he had banned eavesdropping by U.S. government agencies on leaders of US allies and promised he would begin to curtail the collection of Americans’ phone data in a series of limited reforms. Unsurprisingly the president was lying,

Big Data and The Surveillance Society
We kill people based on metadata. – Gen. Michael Hayden, former head of the NSA and CIA. Bene vixit, bene qui latuit. (To live well is to live concealed) – – Ovid (43 BC – 18 AD)The most sacred thing is to be able to shut your own door. – G.K. Chesterton (1874 – 1936). I don’t know why people are so keen to put the details of their private lives in public; they forget that invisibility is a superpower. – Banksy (2006)

New IBM software lets banks and retailers spy on Social Media Activities
Last Thursday (May 28) IBM launched 20 new applications with built in predictive analytics capabilities that will make it easier and faster for corporations to repond to what is revealed by your internet browsing habits.


John Kerry Calls For The Internet To Be Placed Under The Authority Of The United Nations

US Secretary of State John Kerry, speaking earlier this week in South Korea, said that the Internet “needs rules to be able to flourish and work properly.” This, according to Kerry, is necessary even for “a technology founded on freedom.” Kerry made his remarks in the context of talking about how international law is applicable to the Internet.


Whistleblower Exposes USA regine’s torture of it’s citizens

Just a couple of days ago we picked up a story from one of our favourite Whistleblower sites about a US Government Homeland Security site in Chicago where very strage things were going on. Our report compared it to The Ministry Of Love in Gorge Orwell’s novel 1984.

We Predicted An Orwellian Nightmare. Now Obama’s Ministry Of Love Is Identified
Back in 2008 we predicted pretty accurately how things would turn out under Presdident Barack Obama. We were not totally correct (well we are a British site) but where we erred it was on the side of caution. For example while it was easy enough to be aware that the egomaniacal

Thousands To Make Legal Stand Againt UK & US Government Surveillance.
Human rights organisation launches legal action to halt electronic mass surveillance. You can join them and be one of the names sueing GCHQ and the NSA. Learn how and read the full story of the Privacy International action below.

Secret ‘BADASS’ Intelligence Program Used To Spy On Smartphones.
Oh what a laugh, what a grin, those kool dudes who strut around with their iPhones clamped to their ear to show us that they paid $500 for a phone they could hsve bought for $150 had they been willing to do without the little Apple logo, and those who bought smart phones because, well everybody who is anybody has one, have been well and truly had.

Virtual ID has arrived – why you should resist taking it up
We told you some years ago when our publication appeared under a different name that the then Labour Government’s plan for compulsory electronic ID cards was the step that would take us over the line from a seblance of liberal democracy into oligarchic fascism. Labour’s plan was derailed by public opposition but now it has been rehashed and is presented with fluffy window dressing. A vote for Labour, Conservative Or Liberal Democrat is a vote for fascism. You have been warned.

Virtual ID has arrived – why you should resist taking it up
We told you some years ago when our publication appeared under a different name that the then Labour Government’s plan for compulsory electronic ID cards was the step that would take us over the line from a seblance of liberal democracy into oligarchic fascism. Labour’s plan was derailed by public opposition but now it has been rehashed and is presented with fluffy window dressing. A vote for Labour, Conservative Or Liberal Democrat is a vote for fascism. You have been warned.

Big Brother Is Right Behind You And He Knows What you Are Up To
No doubt the smug complacent bourgeois fools will shouth conspiracy theirist and the emotionally needy leftist Sheeple will

bleat “racist bigot” (they always bleat “racist bigot” but it is not alarmist to say the UK is slowly becoming a totalitarian state. What else can we calli our nation if anti – terror laws are being used prosecute people for low-level offences such as Television licence dodging.

Greenteeth Elsewhere:
[ The Original Boggart Blog] … [ Writerbeat ] … [ Daily Stirrer.shtml ]…[Little Nicky Machiavelli]… [ Ian’s Authorsden Pages ]… [ It’s Bollocks My Dears, All Bollocks ] [Scribd]…[Wikinut] … [ Boggart Abroad] … [ Grenteeth Bites ] … [ Latest Posts ] [Ian Thorpe at Flickr ] … [Latest Posts] … [ Tumblr ] … [ Authorsden blog ] … [Daily Stirrer Headlines]
[ Ian at Facebook ]

Global Ransomware Attack Exposes Folly Of Putting All Your Eggs In One Basket

UK broadcast news and online news sites have been dominated for most of the day by the cyber attack that has affected government and business computer systems. Most disturbing consequence of the attack, which hijacks computer screens with a message that files have been encrypted and can only be unlocked on payment of a large fee (a type of malware known as Ransomware) is fact that hospitals across the United Kingdom had gone dark , locking staff out of patient records and appointment systems..

The situation has got significantly worse as The BBC reports the ransomware attack has gone global.

Screenshots showing a message put out by a popular screen hijacker app show a program that locks computers and demands a payment in Bitcoin have been posted online by organisations hit by the attack.

It is not yet clear whether the attacks are all connected. One cyber-security consultant tweeted that he had detected 36,000 instances of the ransomware, called WannaCry and variants of that name.

“This is huge,” he said.

There have been reports of infections in the UK, US, China, Russia, Spain, Italy, Vietnam, Taiwan and others.

The BBB details a number of Spanish firms including some of the biggest businesses in spain were among the apparent victims elsewhere in Europe.

Telecoms giant Telefonica said in a statement that it was aware of a “cybersecurity incident” but that clients and services had not been affected.

Power firm Iberdrola and utility provider Gas Natural were also reported to have suffered from the outbreak.

There were reports that staff at the firms were told to turn off their computers.

In Italy, one user shared images appearing to show a university computer lab with machines locked by the same program.

The Blue Screen Of Death

Bitcoin wallets seemingly associated with the ransomware were reported to have already started filling up with cash.

“This is a major cyber attack, impacting organisations across Europe at a scale I’ve never seen before,” said security architect Kevin Beaumont.

According to security firm Check Point, the version of the ransomware that appeared today is a new variant.

Several experts monitoring the situation have linked the attacks to vulnerabilities released by a group known as The Shadow Brokers, which recently claimed to have dumped hacking tools stolen from the NSA.

_____________________________________

An attack such as this has been inevitable due to the inherent vulnerabilities of the world wide web (conceived by an amateur, remember) and the near monopoly of the Windows operating system and Google search engine that has been encouraged by governments of the USA, the EU and most leading nations of the free world.

While it’s true that things are much more convenient if we all use the same computer systems, convenience is a double edged sword. What’s convenient for the lay user is even more convenient for cyber criminals who are rogue programmers and analysts.

RELATED POSTS:

Why Do Government Information Technology Projects always Screw Up? Because Everything Governmrent Touches Becomes Political
While scientists burble excitedly about the internet of things, computer-brain interfaces that will enable the government to control us from data centres, creating human / computers hybrids and other science fantasy rubbish as if any of it stands a chance of becoming reality, government Information Technology managers, with almost unlimited resources at their disposal, can’t even manage to cobble together a simple database and search routine. The failure of the e borders project is the latest in a long line of screw ups.

How Internet Companies Like Google and Facebook Have Helped The spread of extremism
Although the Westminster terror attack is still filling the print and broadcast news and the usual conspiracy theories about it’s being a false flag incident start to circulate, attention is turning to the role of technology companies such as Google, Facebook and Twitter in the process of radicalisation. Google stands accused of providing easy access …

Pissed Off With Government/Microsoft/Google Online Spying? Be Completely Anonymous Online
Not so long ago our biggest worry online was malware, virus software, trojans and worms plagued the internet cost many people a lot of time and worry. Since about a year ago everything has changed, protecting our digital privacy is the issue and the enemy is no longer spotty little nerds hunched over computers in dimly lit basements, but governments and major technology corporations.

Item In Todays News About US Gov’t Internet Security Hack has Tipped Our Editor Over The Edge.
I had my fill of the USA’s presidential election some time ago. Trump won, personally I was glad, not because I think he’ll be a good president, he’s a cunt, but because Hillary Clinton campaigned on a promise to start World War Three and that’s the one campaign promise I was sure she would keep. …

Facebook boss Zukerberg Wants To Own The Internet
Facebook’s latest acquisition Whatsapp cost $19bn, that’s $40 per user. Whatsapp charge their users $1 per year. That means it will take Facebook 40 years to recover their outlay. And people are buying shares in this company? Insane.

The Internet Purge Of Politically Incorrect (aka truthful) Content Begins.
When US President Barack Hussein Obama (the cocksucker president) in one of his moves aimed at sucking offup to the globalist millionaires who are trying to abolish free speech and democracy signed over (illegally and unconstitutionally) to the United Nations the USA’s control of ICANN, the nearest thing the internet has to date had to …

Technowanks for technowankers with Google Glass?
Almost every day we are reporting the latest ‘breaktrhough in dehumanisation and a further step towards making us all slaves to technology. The scientists are out of control, semi – autistic nerds with no understanding of ethical boundaries are giving politicians with no scruples about reviving Naziism the tools to enslave us.

Internet Privacy: could Your Online Porn Viewing Details Go Viral
Even if you are using privacy tools is your internet browsing safe. How secret are your financial transactions, are the off colour jokes you share with friends really private, and what about the kind of sites you would never tell your mother you visit? While you are watching porn, who is watching you? Image source: …

Facebook Are Nazis – We Told You So
All the Greenteeth Labyrinth pages have consistently warned that the most successful internet companies, Google, Microsoft, Amazon, Twitter etc. are led by people with authoritarian, even fascistic tendencies and a world domination complex which manifests itself as a desire to establish a monopoly position in their field. Facebook are at the forfront of this fascist cartel.

Facebook Boss Zuckerberg Wants To Own The Internet

Facebook IPO

Facebook Evil Empire

Facebook Privacy Piracy

Google Being Evil

Google Surveillance Society

Itnernet Privacy Theft

Internet Threat To Fivilisation

News Used To Be Important But The Internet Is A barrier To How We Communicate

Tell the internet I am a human being not a computer

The technology you deserve

Science and technology menu

more on Internet Technology

Society

Greenteeth Elsewhere: [ The Original Boggart Blog] … [ Writerbeat ] … [ Daily Stirrer.shtml ]…[Little Nicky Machiavelli]… [ Ian’s Authorsden Pages ]… [ It’s Bollocks My Dears, All Bollocks ] [Scribd]…[Wikinut] … [ Boggart Abroad] … [ Grenteeth Bites ] … [ Latest Posts ] [Ian Thorpe at Flickr ] … [Latest Posts] … [ Tumblr ] … [ Authorsden blog ] … [Daily Stirrer Headlines]
[ Ian at Facebook ]

FBI Collaborating With Deep State To Discredit Trump

What struck me as someone who worked in digital communications from right back in the early 1970s was how from Trump’s using the generic phrase ‘tapping my phones’, the contoversy became centred on ‘wiretapping’ an obsolete technique using physical circuit breakers, that probably would not even work with the technology in Trump tower (each floor would have a wi-fi server and link via a fibreoptic backbone to a central comms hub).
Thus while Obama, Comey et al can truthfully deny ‘wiretapping trump’s phone they have not actually denied involvement in electronic eavesdropping by mean of software.
It is well known the NSA and GCHQ (and probably the CIA too) as well as agencies in Russia and China monitor all electronic communication, filtering text files and phone call metadata for keywords.

 

RELATED POSTS:

Former FBI Chief Comey Caught In Another Lie, He Buried Evidence Of Spying On Trump
Evidence given in a congressional hearing revealed that former FBI director James Comey, recently fired by President Trump, seized and buried evidence that Trump was the target of government surveillance before he became president. Former FBI director Comey seized and buried volumes of information that demonstrated a wide-ranging government surveillance operation targeting Donald Trump before he became president …

Wikileaks Drops Hillary Email Bomb That Could End Her Campaign but FB Censored It
Servergate: Hillary Clinton, Arrogant, Ignorant or both?
Servergate: ‘Immune’ Hillary IT-Staffer Reportedly A “Devastating Witness” – FBI
<a href="http://www.desertsun.co.uk/blog/?p=4393&cpage=1#comment-387251"The FBI and Political Campaigning
Undemocratic Democrats – Nearly 10% Of Democratic Party Superdelegates Are Corporate Lobbyists
Hillary Should Be Terrified After Judge Grants Staffer Immunity On Email Scandal
America leadership fail
American paranoia
Trump for US of America?

Elsewhere: [ The Original Boggart Blog] … [ Daily Stirrer.shtml ]…[Little Nicky Machiavelli]… [ Ian’s Authorsden Pages ]… [ It’s Bollocks My Dears, All Bollocks ] [Scribd]…[Wikinut] … [ Boggart Abroad] … [ Grenteeth Bites ] … [ Latest Posts ] [Ian Thorpe at Flickr ] … [Latest Posts] … [ Tumblr ] … [ Authorsden blog ] … [Daily Stirrer Headlines]
[ Ian at Facebook ] 

Google Meets White House Officials Every Week Why?

Google is massive. Its dominant position in the internet seach market was achieved with little apparent effort and in a relatively short period. Just over ten years ago Google trailed Yahoo although many self styled experts insisted iut was the best search engine (this was never true, unless you agree that the most viewed or most linked to item must automatically be the best quality information available). That was just over a decade ago.

Since then, while web journalist (who had enjoyed Google’s lavish hospitality or just had sheep like tendencies) continued to insist on google’s superiority even while Google carried on a battle with people who were trying (and often succeeding) in bumping their web sites up the listings by dubious means such as link spamming.

Now Google does everything it seems (but still delivers crap search results based on commercial considerations rather than quality of content). From running the most powerful web ads network in the world (and rigging its search results to ensure the pages that will bring it most revenue get the most traffic) to building “terminator” robots for the government.

Soon, as we have reported Google will use a new algorithm to determine search engine position. This new algorithm is supposed to weed out “false” data. Essentially, at least within the Google world Google is seeking to determine what is “true” online and what is not.

Given the close relationship the company has with the Obama administration, an administration which has shown itself to be severely “truth challenged,” in its dealings with the public, this is of some concern.

(From Venture Beat)

Google’s relationship with the administration runs deeper than mere money. Google chairman Eric Schmidt helped design a get-out-the-vote system for the Obama campaign in 2012, and personally oversaw it on election night. Google employees helped dig Healthcare.gov out of its painful and glitch-ridden launch phase. Former Google VP Megan Smith is now the CTO for the White House. And, as the WSJ notes, Obama has mentioned Google in half of his State of the Union speeches to date.

Read more on Google unfair business activities below the links for this section >>>

READ FULL ARTICLE

RELATED POSTS: Google’s evil technology

Google attempts to become the Internet’s Ministry of Truth

Intrusive Surveillance Technology, Internet control freaks and The Orwell-Huxley-Dick Dystiopianometer

Technowanks for technowankers with Google Glass?

Don’t be Evil, Google Will Do It For You

Don’t Be Evil, That’s Our Job Is Google’s Real Motto
Google Evil Empire In New Privacy Violation
Google Has Comptely Forgotten ‘Don’t Be Evil’ As The World Domination Agend Gathers Pace

How Much Power Does Google Wield In Washington?

The question asked by the title is an obvious one in the light of the Wall Street Journal (WSJ) article linked in part one of this investigation. Supporters of the Obama administration predictably insist that Google are merely providing technical advice on internet matters.

Were that true, it would be bad enough. The possible conflicts on interests in obtaining advice from a commericial organisation that enjoys a near monopoly position in internet search should be completely unacceptable in a democratic nation.

Information we have acquired however suggests the links between Google and Washington are far deeper and more sinister. Because Obama’s sycophantic supporters will try to discredit the WSJ report so we dug a little deeper by looking at the investigatins of the US Federal Trade Commission (FTC) into the cosy, crony relationship between Gooogle and The White House.

Here are some significant snippets quoted from the FTC report:

1) The FTC investigated whether Google was unlawfully giving preference to its own products. This document shows that the FTC staff found evidence of monopolistic behavior by Google when it comes to its prize search engine, but recommended not pursuing an antitrust lawsuit. “…we do not recommend that the Commission issue a complaint against Google for this conduct” (Read Read original text, P18 – We cannot link you to the full official report as it is not released into the public domain so links to screenshots of the pdf pages are provided. The WSJ artile is available HERE with material supporting it HERE and HERE and HERE. Should be enough for reasonable people.)

2)While the FTC staff recommended not filing an antitrust case against Google for its search engine business, it uncovered evidence that Google promoted its own search results and demoted those of its rivals. Google “adopted a strategy of demoting or refusing to display, links to certain vertical websites in highly commercial categories.” (Read Original – p28)

3)FTC staff concluded that Google’s conduct harmed consumers and competitors. “Staff concludes that Google’s conduct has resulted – and will result – in real harm to consumers and to innovation…” (Read Original -p116)

4) In a footnote to its report, the FTC staff detailed precisely how Google promoted its own search results over rivals. “Although Google originally sought to demote all comparison shopping websites, after Google raters provided negative feedback to such a widespread demotion, Google implemented the current iteration of its so-called ‘diversity’ algorithm.” (Read Original – p132)

In this footnote, the FTC staff quotes Google’s top economist, Hal Varian, saying that its market share was being underestimated. He added that the artificially low market share estimate could help Google steer clear of antitrust regulators. “From an antitrust perspective, I’m happy to see them underestimate our share.” (Read Original – p144)

RELATED POSTS:
Teacher Forced To Resign For ‘Sharing’ Material Critical Of Obama And His Beloved Muslim Terrorists
The supporters of the wannabe King of the American Empire like to describe themselves as ‘liberal’, ‘progressive’, and left wing. If they were really any of those things they would not be as fanatically committed to the idea of suppressing free speech as they are.
Obama’s Big Brother Regime
Obama and Kerry touting for war
Obama’s Jihad Against Western Democracy
Obama the real danger to world peace
New World Order War On free Speech Comes To Britain – Guardian editor accused of treasonCensorship Approved behind closed doors, curbs that end three centuries of Press freedom

Thousands To Make Legal Stand Againt UK Government Surveillance

Digital Surveillance – everything your gadgets do is monitored (Image source)

On Monday, the human rights group Privacy International launched a campaign that will make it possible for people anywhere in the world to challenge covert spying operations involving Government Communications Headquarters(GCHQ), or the USA’s National Security Agency.

In the few days since the launch, thousands of people have already signed up to join the unprecedented legal campaign against government mass surveillance programmes.

A historic court ruling earlier this month that deemed intelligence sharing between GCHQ and the NSA to have been unlawful because of the extreme secrecy shrouding it has made such a challenge to the two governments possible.

Members of the public now may now take part in a lawsuit against the spying in the Investigatory Powers Tribunal, the court that handles complaints in the UK about surveillance operations conducted by police and security agencies.

Anyone wanting to join the legal challenge to submit their name, email address and phone number through a this page on the Privacy International website. The group intends to lodge a case against GCHQ with the court that will seek to discover whether each participant’s emails or phone calls have been illegally obtained by surveillance organisations in violation of the privacy and freedom of expression provisions of the European Convention on Human Rights and The Geneva Convention.

If it is established that any of the communications have been unlawfully collected, the court could force GCHQ to delete them from its vast repositories of intercepted data.

By Tuesday evening,(16 February) more than 10,000 people had signed up to the campaign, a spokesman for Privacy International said.

RELATED POSTS:

Government Paid Trolls Are Using ‘Psychology-Based Influence Techniques’ in Social Media

Have you ever come across someone on the Internet that you suspected was a paid government troll? Well, there is a very good chance that you were not imagining things. Thanks to Edward Snowden, we now have solid proof that paid government trolls are using “psychology-based influence techniques” on social media websites such as YouTube, Facebook and Twitter.

“Smart City” Projects are Really Police Extreme Surveillance Programs.


World’s largest supercomputers took 40 minutes to calculate 1 second worth of human brain activity

Google Meets White House Officials Every Week, Why?
Surveillance the tool of the totalitarian state
Governments will achieve total surveillance soon
Surveillance turning democracy into prison state
Surveillance software in every gadget – technology companies corrupted
Cellphone fascism
Technology for biometric surveillance available
Computer technology: Open Windows lets in government snoopers
Internet: No such thing as privacy online
Google’s surveillance society
Google’s evil technology

Proof GCHQ are pants

Those of us who were involved in the telecomms and certain branches of the computer industry have always known it of course. The whole purpose of the internet and the world wide web was to spy on us. Do you think it was coincidence that an unknown company headed by a college dropout with no work experience in either business or technology but who happened to be the son of a senior boss of America’s CIA was handed the project to provide an operating system for the PC destined to be promoted as the defacto standard for personal computers.

The march towards total surveillance has been under way for a long time. Search up Project Echelon if you do not believe me.

Only one thing protects our privacy now, and that is the incompetence of the public servants in MI5, the CIA, the NSA and GCHQ. They’re morons.

The NSA allowed a geek like Ed Snowden to walk out with millions of sensitive and embarrassing documents encrypted on a memory stick. And GCHQ, whell they’re just pants as this story from 4bit news proves.

Govt watchdog rejects evidence of GCHQ human rights breeches

For the benefit of people slow to see the joke, that headline should read
“breaches”. These (below) are riding breeches.

Heartbleed Not New – US Government used It For Years

When the story of the Heartbleed internet security bug broke last week I was quick to tell people computer makers, internet service providers and software firms had been aware of it for years. In fact, if you have read The Girl With The Dragon Tattoo and the other books in that trilogy, the hack used by the eponymous girl, which she and her hacker friends call Asphixia, describes perfectly how hackers have been exploiting the bug in the so called “Secure Socket” system since the late 1990s.

the girl with the dragon tattoo
Rooney Mara as Lisbeth Salander (preferred the Swedish version with Noomi Rapace myself)

And yet even people who know about the long and successful career I had in computer and digital networks called me a dinosaur and resistant to progress when I refused to do online banking, get a pay pal account and all the other bullshit because I said there was no real security in internet technology. And I change my Amazon password on every purchase.

The fact is, I knew about heartbleed almost twenty years ago. And obviously if you are going to open a back door for government agencies and control freak corporate bodies, (who you would not want in your computer if you had been told) then other undesirables are going to find their way in.

The real stupidity was in letting ourselves be conned into allowing so much of our business and personal life to be made dependent on a single, very flaky, technology.

The biggest joke was the science heads who told me “of course the technology is safe, very big prime numbers are involved.” I find it quite endearing that science heads believe in magic numbers the way children believe in fairies. What they failed to understand is they very last place anyone who knows their way round comms protocols would try to catch your personal data is the place where encryption starts to protect it. Much easier to grab it between keyboard and screen and the comms processor. I’d have your account number and password long before the data was encrypted.

But while the various contenders for Evil Empire of the Year, Microsoft, Facebook, Google and the rest issue bland assurances, the problem (government paranoia and obessive surveillance programs, political control freakery, corporate greed) is getting worse. The alternative media are on the case however, see Washington’s blog, linked below:

From Washington’s Blog

Top computer and internet experts say that NSA spying breaks the functionality of our computers and of the Internet. It reduces functionality and reduces security by – for example – creating backdoors that malicious hackers can get through.

Remember, American and British spy agencies have intentionally weakened security for many decades. And it’s getting worse and worse. For example, they plan to use automated programs to infect millions of computers.

NSA also encourages large internet companies to delay patching vulnerabilities, to allow the NSA time to exploit them. See this and this. In other words, the NSA encourages companies to allow vulnerabilities to remain unfixed.

Read full story at Washingtons Blog
NSA Exploited Heartbleed Bug For YEARS, Leaving Consumers Vulnerable To Attack

It’s true, don’t listen to those authority worshippers who yell “conspiacy theory”, the news on these plans is out there.

RELATED POSTS:
Don’t call me a conspiracy theorist
Internet privacy theft
Intrusive Surveillance Technology, Internet control freaks and The Orwell-Huxley-Dick Dystiopianometer

MORE FROM THE GREENTEETH STABLE

Boggart AbroadDaily Stirrer homeBoggart-Eft at Blogster Greenteeth BitesBoggart BlogGreenteeth LabyrinthIan at WikinutPost Any ArticleAuthorTold By An IdiotGatherBubblewsAuthorsdenScribdLittle Nicky Machiavelli
Ian Thorpe at Facebook


By TwitterButtons.net

Obama’s Big Brother Is Watching You

Beyond Orwell’s Worst Nightmare says the headline and it truly is.

orwells big brother
Picture source: talesuntangled

from Global Research:

“In his recent speech on NSA reforms, President Obama cited as precedent Paul Revere and the Sons of Liberty, who patrolled the streets at night, “reporting back any signs that the British were preparing raids against America’s early Patriots.” This was a weak effort to find historical support for the NSA spying program. After all, Paul Revere and his associates were patrolling the streets, not sorting through people’s private communications.”

In order to get better contextual references, The Emperor Obama should have considered how the American revolutionaries had reacted to searches conducted by the British before the revolution. The British used “general warrants,” which authorized blanket searches without any individual suspicion or clear identification of what the colonial authorities were snooping for.

In a petition to King George III in 1774, The American Colonial Congress protested against British officers’ unlimited power of search and seizure. The petition complained that the power had been abused “to break open and enter houses, without the authority of any civil magistrate.”
Read More

When leaders of the Revolution later drafted the Bill Of Rights, the Fourth Amendment was a prohibition on unreasonable searches and seizures, they were attempting to ensure that our country would not become a police state.

Obama is citing the Founding Fathers of the American nation as justification for his administration’s behaving like the people they were rebelling against.

I’m not siding with the American insurrectionists however. If they had just toughed it out and helped us bring the plundering Hanoverians to heel or even restore The Plantagenet dynasty (OK, they were wankers but they had a great name) the instead of the Jug Eared Jihadist America now has as it’s leaders, they could have had a loveable little old lady and her tree hugging, half wit son who is good for a laugh if nothing else.

How The Evil Ones Are Profiling You

In the early days after information contained in the documents leaked by Ed Snowden began to leak into the public domain, many people (admittedly mostly Scienctism Cult devotees and lefties were saying, “Oh is nothing, what does it matter if NSA keep records of your activities, it is for your safety and wellbeing.

Well we know lefties and Scientism Cultists are crazy so we ignored them.

And lo and behold, there is nothing harmless or “for our own good” about the high tech total surveillance program. They are using computer systems and collected data to build psychological profiles of everybody to enable the authorities to predict behaviour, chiefly so that potential criminals pre crime patters can be detected and they can be arrested before they have done anything wrong.

The only good thing is that while computers might be good at predicting the behaviour of scientists who behave like machines and so are completely predictable, they are utterly useless at predicting the actions of real people.

Here’s an indication of how far they have progressed with the task so far.

More at Global Research

Getting Priorities Right

As we suspected the alleged “government shut down” over the pond and the temporary lay off of thousands of non-essential federal employees has not prevented the opening of a $2 billion dollar NSA spy center in Utah which will snoop on Americans’ private emails, Google searches and phone calls.

As we highlighted yesterday (or the day before), the shut down will only affect the tiny amount of services government provides that Americans actually like.

Meanwhile the Transport Security Agency (TSA) grope downs, VIPR checkpoints, drone attacks, SWAT team raids, tax collection, torturing terrorists at Guantanamo Bay, arming jihadists in Syria and running guns to Mexican drug dealers will all continue unimpeded – as will NSA domestic spying. And the African American Gay and Lesbian Outreach Agency will still be promoting same sex, same colour sexual liaisons.

Although the NSA itself refuses to comment, to all intents and purposes the agency’s mammoth new spy center in Bluffdale, Utah “may be open already,” according to Denver news bulletins.

“The facility is expected this fall to quietly begin sucking in massive amounts of information for the intelligence community and storing it in the cavernous buildings in Bluffdale, Utah, according to NSA officials.

And Denver is a the mile high city so the leaves will be falling about now.

Nice to know Washington is on top of the really important stuff.