(IND) – A British internet security company has demonstrated how to turn the Palm Pre into a secret bugging device, ideal for corporate espionage, and issued a warning that many other popular smartphones are also vulnerable to hackers.
In-house hackers at Basingstoke-based MWR InfoSecurity have created a bug hidden in an electronic business card, or vcard, which enabled them to use the Pre to record conversations and send the audio file back to them, whenever it is connected to a WiFi or 3G network – all without the user being aware anything at all is happening. Read More Here
(AntiFascistCalling) – Prussian military theorist Carl von Clausewitz once famously wrote that “war is the continuation of politics by other means.” A century later, radical French philosopher Michel Foucault turned Clausewitz on his head and declared that “politics is the continuation of war by other means.”
In our topsy-turvy world where truth and lies coexist equally and sociopathic business elites reign supreme, it would hardly be a stretch to theorize that cyber war is the continuation of parapolitical crime by other means. Continue reading →
Editor’s note: In February, the Bipartisan Policy Center held a war game and concluded cyber attacks would come from Russian, Chinese, and Sudanese hackers. It now appears the cyber threat in part originates from the CIA-supported Mujahadeen-e-Khalq.
(Reuters) – Iran has arrested 30 people suspected of belonging to a U.S.-linked cyber network gathering information on Iranian nuclear scientists and sending people abroad for training, a news agency reported on Saturday. Continue reading →
(PaulWatson) – Hackers protesting government censorship of the Internet have shut down several Australian government websites in a demonstration against the announcement that filters would be imposed to block access to websites deemed offensive by the authorities. Continue reading →
(FinancialPost) – caught up with Climategate, but the CBC’s Rex Murphy has. Most CBC listeners and viewers might be wondering what he’s talking about. Since the story broke two weeks ago with the release of emails from the world’s leading climate institute, there has only been one news report on the network and the only analysis item was on Anna Maria Tremonti’s The Current — a pooh-poohing academic from the United States who said there was nothing in the emails worth talking about. Continue reading →
(NaturalNews) – The inconvenient release of private email conversations among climate change scientists has been a boon for climate change skeptics. What emerges from the leaked emails is a depiction of a group of scientists who practice “intellectual protectionism” — meaning they know they’re right and they’ll do anything to protect their beliefs, even if it means hiding or manipulating data. Continue reading →
By now most of us in the alternative media are aware of the some 61 megabytes of global warming research data of emails, documents, and computer code released by whistleblowers (or hackers), that have exposed climate scientists, at the University of East Anglia in Great Britain, as the frauds they’ve proven themselves to be. Continue reading →
The picture that emerges of prominent climate-change scientists from the more than 3,000 documents and emails accessed by hackers and put on the Internet this week is one of professional backbiting and questionable scientific practices. It could undermine the idea that the science of man-made global warming is entirely settled just weeks before a crucial climate-change summit. Continue reading →
(WSJ) – The picture that emerges of prominent climate-change scientists from the more than 3,000 documents and emails accessed by hackers and put on the Internet this week is one of professional backbiting and questionable scientific practices. It could undermine the idea that the science of man-made global warming is entirely settled just weeks before a crucial climate-change summit. Continue reading →
(CBC-Canada) – Consumers around the globe have been caught up in cyber attacks targeting U.S. and South Korean websites, some coming from unknowingly infected computers that have jammed sites for legitimate users. Continue reading →
Devices to launch and control cyber, electronic and information attacks are being tested and refined by the U.S. military and industry in preparation for moving out of the laboratory and into the warfighter’s backback. Continue reading →
In what has become a bit of a disturbing trend this week, yet another computer infiltration article was posted today on CNN.com.
According to the article, “nearly 1,300 computers in more than 100 countries have been attacked and have become part of an computer espionage network apparently based in China, security experts alleged in two reports Sunday.”
I am a targeted individual (TI) whose surveillance goes back three decades and whose covert electronic stalking and mind control (ESMC) experiences began in the 1990’s. However, I did not fully realize that I had been targeted until December, 2005. Since the latter date, I have kept a detailed journal of the effects of the electronic and psychological torture and my empirical thoughts about them. Those notes now comprise five volumes of journals, totaling over eight hundred pages of single-spaced typescript.
I recently wrote an article called Mind Control and Law Enforcement Complicity, in which I state that the U. S. intelligence community and law enforcement in general must either conduct the electronic stalking and mind control (ESMC) activities or knowingly aid and protect the organizations that do so. ESMC activities simply cannot be conducted without the knowledge and acquiescence of U. S. intelligence. Period. Continue reading →