May 21 18:44

U.S. Congresswomen Introduce “Smart Cities and Communities Act” Despite Opposition and Warnings in re “Smart Cities”

By B.N. Frank

Worldwide opposition to “Smart Cities” continues to increase due to concerns about significant cybersecurity, economic, privacy, safety, health and environmental risks. In 2020, Toronto cancelled its “Smart City” plans due to public outcry.

A 2018 survey revealed that 66% of Americans did NOT want to live in a “Smart City”. Nevertheless, two congresswomen have introduced new legislation to promote and provide funding for creating more of them...

May 21 12:57

Why Australia was RIGHT to block Huawei from running the 5G network - as top spy reveals China could have SHUT DOWN the nation's entire mobile phone system

  • In 2018 Australia banned Huawei from supplying equipment for 5G network
  • There was concern its involvement would allow China to spy or hack network
  • A top spy has revealed that China could also have shut down the entire system

China could have shut down Australia's 5G network and brought the nation to its knees if Huawei was not banned, a top spy has revealed.

The Chinese telecommunications company was forbidden from supplying equipment for the network in 2018 over security concerns, a move that enraged Beijing and was copied by several Western governments

Australian spies spent eight months working out how to safely involve Huawei but concluded the risk of China spying or hacking the network could not be fully mitigated
Beijing could even have shut down the whole system, an anonymous spy has told journalist Peter Hartcher for his new book Red Zone.

May 21 11:35

Amazon, Uber And America’s Biggest Delivery Companies All Fell For Basic ‘Fake Driver’ Scam

When Frankie DiGiacco, a former prosecutor for the southern California branch of the Justice Department, saw the scam, he couldn’t believe it had worked. It was so simple, he says, he was surprised that ride-share and delivery companies hadn’t spotted it.

May 21 09:45

Apple's rivals may never be able to catch up to its powerful new chip

Early in the testing phase of Apple's M1 chipset, a milestone new product for the company, the processor was installed in a batch of Mac computers and given to staffers working on applications that demanded heavy processing power. It was a pivotal moment: the first time Apple had made its own chip for any of its computers, shifting away from years of using a one-size-fits-all option from Intel.

After multiple teams tested the devices for a few hours while working on tasks, they reported lightning-fast performance but nearly all flagged an apparent problem. The MacBook Pro's battery indicator, featured on the upper right hand corner of the computers, was broken. It had barely moved despite running power-hungry programs, the company told CNN Business.

May 21 09:26

If you haven’t installed Apple’s latest iPhone update yet, read this first

Apple’s latest update to its mobile operating software has proven to be one of the most consequential and news-making software releases in recent memory from the iPhone maker, with iOS 14.5 accomplishing everything from introducing a strict new privacy regime that users can enjoy to this software release firing a shot across the bow against Facebook — and, specifically, against its business model that involves tracking users around the web.

May 21 09:26

Beware: This dangerous malware steals your bank account info and lets hackers rob you

Internet banking is one of the key activities that hackers target on computers and smartphones. Security has increased dramatically in the past few years to minimize the risks for consumers, but the users themselves are still the weakest link in the system. Inadvertently installing a malware app is enough for hackers to attempt attacks on your digital belongings, whether it’s personal data or cash.

Bizarro is the name of a banking trojan that has been wreaking havoc in Brazil, and the hackers behind the project are widening their scope by targeting other regions. The sophisticated trojan has been discovered in Europe and parts of South America. Its purpose is very simple, to steal money from unsuspecting victims, whether it’s digital coins like bitcoin or more traditional currency from their bank accounts.

May 21 09:26

Snap debuts true AR glasses that show the potential (and limitations) of AR

Snap Inc., the company best known for the popular Snapchat social camera app, has announced its first pair of augmented reality glasses that most people would agree actually qualify as real AR glasses. Like previous glasses the company has produced, they are called Spectacles.

Spectacles will not be available to buy as a mass-market consumer product—at least not in the immediately foreseeable future. Instead, Snap is seeding units to developers and content creators so the glasses can be used to create new experiences and filters. These creators will build these with Lens Studio, a Snapchat-specific tool that is already widely in use.
Spectacles enable new ways to view and create Snapchat Lenses, which are generally simple augmented reality filters that Snapchat users apply to the videos they send each other.

May 21 09:24

Frontier knowingly sold Internet speeds it can’t deliver, FTC lawsuit says

The Federal Trade Commission and officials from six states yesterday sued Frontier Communications, alleging that the telecom provider misrepresented Internet speeds and charged many customers for higher speeds than it actually provided or was capable of providing.

The complaint was filed in US District Court for the Central District of California by the FTC and attorneys general from Arizona, Indiana, Michigan, North Carolina, and Wisconsin. California-based customers are represented in the suit by the district attorneys of Los Angeles County and Riverside County.

May 21 09:21

Vulnerabilities in billions of Wi-Fi devices let hackers bypass firewalls

One of the things that makes Wi-Fi work is its ability to break big chunks of data into smaller chunks, and vice versa, depending on the needs of the network at a given moment. These mundane network plumbing features, it turns out, have been harboring vulnerabilities that can be exploited to send users to malicious websites or exploit or tamper with network-connected devices, newly published research shows.

In all, researcher Mathy Vanhoef found a dozen vulnerabilities, either in the Wi-Fi specification or in the way the specification has been implemented in huge numbers of devices. Vanhoef has dubbed the vulnerabilities FragAttacks, short for fragmentation and aggregation attacks, because they all involve frame fragmentation or frame aggregation. Broadly speaking, they allow people within radio range to inject frames of their choice into networks protected by WPA-based encryption.

May 21 09:17

Dumping Google Chrome resulted in one colossal benefit

After a year of lockdown, I'm back on the road. Me, my laptops, my other gadgets, and my off-grid kit for keeping everything charged up.

But the faster my gadgets run down their power, the more I have to charge them, and the more I have to charge them, the more pressure I'm putting on my portable power station.

Over the past months, I've been dabbling with dumping Google Chrome. What started out as a lightweight alternative to the sluggish incumbents has, itself, become the sluggish incumbent.

It's become a bloated battery and memory hog.

Not what I want on the road.

May 21 07:49

Facebook blames a 'technical issue' for failing to stop potentially MILLIONS of child abuse images and videos from appearing on its website over the past six months

From January to March 2021, Facebook removed five million pieces of child abuse content – down from 5.4 million from October to December 2020.

But both these quarters marked a massive slump in removals from the previous quarter – 12.4 million between July and September 2020.

May 21 07:46

RIP Internet Explorer: Microsoft announces it is retiring its web browser in 2022 - almost 26 YEARS after it first launched

Microsoft is putting the final nail in the coffin of Internet Explorer, revealing that the legacy web browser will retire for good in summer next year.

The tech giant has gradually shifted away from the aging software after some 25 years on the scene, starting afresh with the new Edge browser in 2015 to coincide with the launch of Windows 10.

Support for the final version, Internet Explorer 11, has been maintained, even though most people have already moved elsewhere.

By ending support, this means important security updates and bug fixes will no longer be rolled out.

The web browser will be officially retired on June 15 2022, Microsoft said.

May 21 06:14

Healthcare organizations in Ireland, New Zealand and Canada facing intrusions and ransomware attacks

Three healthcare institutions in Canada, Ireland and New Zealand are in the midst of security incidents this week, highlighting the perilous cybersecurity landscape within some of the world's most important organizations.

Ireland's Department of Health was attacked twice in the last week, eventually shutting down their entire IT system after a ransomware attack last Thursday. The same group also hit the Health Service Executive with a ransomware attack. Chief Operations Officer of the Health Service Executive Anne O'Connor told The Journal that the office had been hit by the Conti ransomware.

May 21 05:54

As developers consider quitting, here comes the next big skills crisis

New research suggests that more than half of the UK workforce lack essential digital skills needed for work, raising fears that the country is heading toward a digital skills shortage as employers begin ramping up their post-pandemic recruitment efforts.

Data from the Office for National Statistics this week showed "early signs of recovery" in the UK jobs market as lockdown restrictions eased and businesses resumed hiring.

Ten Windows 10 network commands everyone one should know
According to the figures, the UK unemployment rate fell 4.8% between January and March 2021 – the largest quarterly decrease since 2015.

May 20 20:23

The biggest threat to Android’s dominance might launch soon

Google just unveiled Android 12, a massive software update that features a significant design makeover and notable privacy improvements. Android 12 is already available in beta form on Pixel phones and several other devices, and the update will roll out to the general public at some point in late summer. But before that happens, the biggest threat to Android should be finally available to uses, and it’s not iOS 15, which will be revealed in a few weeks at WWDC 2021.

A few years ago, The US government banned Huawei from working with US companies or companies that deal in tech made in the US. This effectively stopped Huawei from using Google’s Android version on its phones and tablets and forced it to fork Android into an operating system devoid of all the Google magic.

May 20 19:47

Shape-shifting computer chip thwarts an army of hackers

have developed and tested a secure new computer processor that thwarts hackers by randomly changing its underlying structure, thus making it virtually impossible to hack.

Last summer, 525 security researchers spent three months trying to hack our Morpheus processor as well as others. All attempts against Morpheus failed. This study was part of a program sponsored by the U.S. Defense Advanced Research Program Agency to design a secure processor that could protect vulnerable software. DARPA released the results on the program to the public for the first time in January 2021.

A processor is the piece of computer hardware that runs software programs. Since a processor underlies all software systems, a secure processor has the potential to protect any software running on it from attack. Our team at the University of Michigan first developed Morpheus, a secure processor that thwarts attacks by turning the computer into a puzzle, in 2019.

May 20 13:40

Dominion Responds After Pennsylvania Election Officials Report "Coding Error" With Voting Machines

Authored by Jack Phillips via The Epoch Times (emphasis ours),

Election officials in Luzerne County, Pennsylvania, reported issues with voting equipment at polling places on Tuesday, prompting a response from Dominion Voting Systems saying that there was a ballot screen error regarding the viewing screen’s header.

Dominion Voting Systems told The Epoch Times that “Luzerne County’s election director has confirmed that there is a ballot screen error that is confined to the header on the viewing screen of the machine, and that all ballots are printing correctly with the Republican header and the Republican primary election races.”

The firm then noted that Luzerne County officials have assured the public that “all ballots will be correctly counted,” adding: “We regret any confusion this has caused.”

Webmaster's Commentary: 

Sorry, Dominion, but the optics on this look pretty damned vile; your credibility has been well and truly flushed; and it appears obvious to any thinking human being, what is being allowed to happen here and why.

May 20 08:45

Maricopa County System Has Capability For Verizon Wireless Cards;Forensic Team Needs Password Access

May 20 07:16

Ransomware attackers are now using triple extortion tactics

Attackers are not only demanding ransom from organizations, but also threatening their customers, users and other third parties.

Cybercriminals who specialize in ransomware have already been using double extortion tactics in which they not only decrypt stolen data but also threaten to leak it publicly unless the ransom is paid. Now, some attackers have progressed to a triple extortion tactic with the intent of squeezing out even more money from their malicious activities. In a report published Wednesday, cyber threat intelligence provider Check Point Research describes how this latest tactic is playing out.

May 20 06:14

Why Trailing Edge Semiconductor Manufacturing Matters

In the last few months, much has been said about the shortage of chips developed on leading edge manufacturing nodes of 7nm, 5nm, etc. While there are some shortages in chips using these advanced manufacturing processes, it turns out the semiconductor industry’s other issue is at the trailing edge. The leading edge gets all the attention because it is the most exciting.

The leading edge powers the supercomputers in the cloud, advanced servers, desktops, and laptops, and even the computers in our pockets. But many computing devices are not just made up of leading edge microprocessors. The vast majority of other components are made up using legacy nodes. Quite often many mainstream processors, especially those created for the autos, medical monitoring equipment, and a multitude of other products are created using much larger nodes in what is called the trailing edge.

May 20 02:54


A Jeep Cherokee factory is cutting 1,600 jobs in Northern Illinois as the auto industry continues to struggle with the global shortage of semiconductors.

The U.S. arm of Stellantis announced this week is was going to cut one of its two work shifts at the Belvidere Assembly Plant as of July 26. 1,641 workers could be affected, a local NBC affiliate reported over the weekend.

Company spokeswoman Jodi Tinson claimed that the company was trying to “balance sales with production,” and that the factory’s situation “has been further exacerbated by the unprecedented global microchip shortage.”

This stands at odds with comments made by the company’s CFO earlier this month, when we reported that Chief Financial Officer Richard Palmer said the semi shortage impact would be higher in Q2, but also said it "is still very controlled".

The plant has been idled since late March, the report notes. Its re-opening has been delayed and isn’t expected until "at least" later this month.

May 19 18:24

Community Control of Police Spy Tech

By Nathan Sheard and Adam Schwartz

All too often, police and other government agencies unleash invasive surveillance technologies on the streets of our communities, based on the unilateral and secret decisions of agency executives, after hearing from no one except corporate sales agents. This spy tech causes false arrests, disparately burdens BIPOC and immigrants, invades our privacy, and deters our free speech.

May 19 17:55

Internet Service Providers Forcing Low-Income Subsidy Applicants to Switch to Costlier Plans; Is Yours One of Them?

By B.N. Frank

The Federal Communications Commission (FCC) has been given $3.2 billion to distribute among low-income Americans for broadband assistance.

Now it appears that Internet Service Providers (ISPs) are making it tougher for qualified applicants to actually save money...

May 19 05:29

Facial recognition, fake identities and digital surveillance tools: Inside the post office's covert internet operations program

The post office’s law enforcement arm has faced intense congressional scrutiny in recent weeks over its Internet Covert Operations Program (iCOP), which tracks social media posts of Americans and shares that information with other law enforcement agencies. Yet the program is much broader in scope than previously known and includes analysts who assume fake identities online, use sophisticated intelligence tools and employ facial recognition software, according to interviews and documents reviewed by Yahoo News.

May 18 19:52

Silicon Chip Shortage Leads To Potato Chip Shortage: Farmers Halt Equipment Shipments To Dealers

Readers have been briefed on the ongoing semiconductor shortage that may last a "couple of years." The auto industry has grabbed the spotlight as the hardest-hit industry, with some of the world's biggest manufacturers restricting production.

According to a new report, the worldwide chip shortage is impacting the agriculture industry that may last for a couple of years and has already impacted the price of potato chips.

Hoosier Ag Today reports, "The biggest factor impacting the ability of US farmers to produce the food we need has nothing to do with the weather, the markets, trade, regulations, or disease. The worldwide shortage of computer chips will impact all aspects of agriculture for the next two years and beyond... farm equipment manufacturers have halted shipments to dealers because they don't have the chips to put in the equipment... "

May 18 15:16

WATCH: Viral Video Confirms Your Phone Takes Secret Pictures Of You Every 5 Seconds

A TikTok video has gone viral for revealing a creepy, and potentially sinister, action that our phones are performing that may pose a seriously threat to our privacy.

According to the video our phones, or at least IPhones, are taking photos of us, without our knowledge or consent, every 5 seconds.

In the video, a girl uses an infrared camera to prove that their IPhone was taking the secret photos.

May 18 12:49

Breaking — Colonial Pipeline suffers ‘network outage’…

Colonial Pipeline, the nation’s biggest fuel system that has been working to restart since being hacked two weeks ago, is experiencing network issues that leave customers unable to access their fuel shipments.

The system that allows customers to reserve space on the line, make changes to their batches or receive updates on fuel traveling through the system has been inaccessible as of Tuesday morning, according to shippers, asking not to be identified because the information isn’t public. The pipeline appears to still be operating despite the communication outage, the shippers said.

In a subsequent notice to shippers, Colonial said “it is currently experiencing network issues impacting customers’ ability to enter and update nominations,” and that it is working to restore service. Shippers on the pipeline use a third party communication system known as Transport 4 to access Colonial’s network daily to ensure timely receipts and shipments of various grades of fuel.

May 18 00:53

DuckDuckGo, Firefox & GitHub say ‘no Flocing way’ to Google’s privacy updates

Google’s proposed method for tracking and targeting consumers without third-party cookies is being met with a growing chorus of dissent. Within the past month, a who’s who of tech players – including DuckDuckGo, GitHub and Mozilla Firefox – have vowed to block Google’s Floc API. Here’s what it means for marketers who are searching for answers.

DuckDuckGo has long been a staple of the paranoid and the privacy-obsessed. The search engine enables users to surpass the personalized search results filter employed by most major search engines. So the fact that DuckDuckGo added a tool to its Chrome extension designed to block Google’s latest update – which is meant to enable targeted advertising – may not come as a surprise. Brave, another privacy-centric browser, was also quick out of the gate to thwart Google’s changes last month.

May 17 13:27

Almost Every Wi-Fi Device Affected by Flaw Dating Back to 1997; “…any vulnerabilities that affect virtually all devices are important.”

By B.N. Frank

There have been countless horrifying news stories about hackers breaking into baby monitors, security cameras, and systems, “Smart” home assistants, smartphones, and more.

Privacy and security experts continue to warn about vulnerabilities with ALL wireless-connected devices and technologyincluding 5G and Internet of Things (IoT).

Safer and more secure internet access can be achieved with a hard-wired internet connection. Those who choose to use Wi-Fi anyway are putting their privacy, safety, and health at risk as well as their families’. A university researcher recently made public a flaw that’s existed since 1997...

May 17 11:31

Cloudflare says it’s time to end CAPTCHA ‘madness’, launches new security key-based replacement

loudflare, which you may know as a provider of DNS services or the company telling you why the website you clicked on won’t load, wants to replace the “madness” of CAPTCHAs across the web with an entirely new system.

CAPTCHAs are those tests you have to take, often when trying to log into a service, that ask you to click images of things like busses or crosswalks or bicycles to prove that you’re a human. (CAPTCHA, if you didn’t know, stands for “Completely Automated Public Turing test to tell Computers and Humans Apart.”) The problem is, they add a lot of friction to using the web and can sometimes be difficult to solve — I’m sure I’m not the only person who has frustratingly failed a CAPTCHA because I didn’t see that corner of a crosswalk in one image.


May 17 11:30

The bizarre story of the inventor of ransomware

Eddy Willems was working for an insurance company in Belgium back in December 1989 when he popped the floppy disc into his computer.

The disc was one of 20,000 sent in the mail to attendees of the World Health Organization's AIDS conference in Stockholm, and Willems' boss had asked him to check what was on it.

Willems was expecting to see medical research when the disc's contents loaded. Instead he became a victim of the first act of ransomware — more than 30 years before the ransomware attack on the US Colonial Pipeline ignited a gas shortage in parts of the US last week.

A few days after inserting the disc, Willems' computer locked and a message appeared demanding that he send $189 in an envelope to a PO Box in Panama. "I didn't pay the ransom or lose any data because I figured out how to reverse the situation," he told CNN Business.

He was one of the lucky ones: Some people lost their life's work.

May 17 10:58

Gas Shortages and Simulations

By Matt

It makes perfect sense that those in both the public and private sectors spend time training for a crisis; it is better to be prepared than unprepared. But what happens when the ones doing the preparing also have the most to gain from the disaster?...

May 16 12:21

Chicago Cops Use Asset Forfeiture Funds to Buy Drones “Off the Books”

By Mike Maharrey

Asset forfeiture funds help build the ever-growing national surveillance state.

Civil asset forfeiture is a pernicious policy in its own right. It is nothing more than legalized, institutionalized, government-sanctioned theft. Forfeiture laws flip due process on its head and create perverse “policing for profit” incentives.

On top of that, we have long suspected that police departments use forfeiture money to secretly purchase surveillance technology. Recent Chicago Police Department emails obtained from a trove of hacked documents prove this happens, revealing that cops used asset forfeiture money to buy drones off the books with no oversight or accountability...

May 16 10:14

Apple's tiny new gadget turns nightmare, -hacker breaks reveals it can be used to Spy on us

Keep losing your keys? There’s an Apple device for that: the new AirTags, which can be attached to things you frequently lose so you can find them easily.

“AirTag is a supereasy way to keep track of your stuff,” Apple’s website reads.

“Attach one to your keys, slip another in your backpack. And just like that, they’re on your radar in the Find My app, where you can also track down your Apple devices and keep up with friends and family.”

According to Apple’s website, the $30 tag “sends out a secure Bluetooth signal that can be detected by nearby devices in the Find My network. These devices send the location of your AirTag to iCloud — then you can go to the Find My app and see it on a map. The whole process is anonymous and encrypted to protect your privacy. And it?s efficient, so there?s no need to worry about battery life or data usage.”

Unfortunately, that’s not quite the only thing the AirTag can do, as Vice’s Motherboard noted in a Thursday story.

May 16 10:00

"I Upended My Life For Apple": Newly-Hired Engineer Livid After Woke Witch-Hunt Gets Him Fired

A former Facebook project manager, author, and journalist who uprooted his life in Washington to take a job with Apple is livid, after a woke mob of employees circulated a petition demanding his ouster over controversial statements from a book he wrote five years ago.

The petition took aim at Cuban-American Antonio García Martínez over his book, Chaos Monkeys (dedicated to "all my enemies") - an autobiography which traces his journey from Wall Street to Silicon Valley. Martínez has described the book as "total Hunter S. Thompson/Gonzo mode."

According to woke Apple employees, it's both racist and sexist. And of course, when it comes to Silicon Valley, divergent opinions need not apply. Except, he did apply, and was hired - despite Apple being "well aware" of his writing, according to a pissed-off Martinez.

May 16 06:14

Factbox: DarkSide hackers in focus after Toshiba attack

A unit of Japan's Toshiba Corp (6502.T) said on Friday it had been hacked in Europe by the DarkSide ransomware group widely believed to have been behind a crippling fuel pipeline attack in the United States this week. read more


Experts who have tracked DarkSide said it emerged in the middle of last year and appears to be composed of veteran cybercriminals who are focused on squeezing as much money as they can from targets.

"They're very new but they're very organized," Lior Div, the chief executive of Boston-based security firm Cybereason, said this week when asked about the Colonial Pipeline attack.

"It looks like someone who's been there, done that."

May 16 06:11

Hacker attack shuts down IT system of Ireland’s health services, badly affecting one of Europe’s busiest maternity hospitals

Ireland’s health service has temporarily shut down all of its IT systems due to a “significant ransomware attack,” and one of Europe’s busiest maternity hospitals is badly affected as most appointments have been canceled.

The Health Service Executive (HSE) took to Twitter on Friday to announce a “significant ransomware attack” on its IT systems. The HSE says it has taken the precaution of shutting down all of its IT systems in order to protect them and to be able to fully assess the situation.

May 15 05:45

Israel is deliberately obliterating media buildings in Gaza to cover up the war crimes that will follow

The destruction of two important Gaza buildings housing 20 media outlets was both shocking and predictable. History shows that if the media aren’t around to document Israel’s war crimes, it’s a lot easier for it to commit them.
On Tuesday, Israel bombed the 10-storey Al-Jawhara Tower, causing it to collapse. Before doing so, it had ‘benevolently’ warned that the airstrikes were coming. The following day, it bombed the 14-storey Al-Shorouk Tower, also giving warning it was going to do so.

Most reports have the buildings as evacuated before being levelled. But without these media offices, reporting on Israel’s other war crimes will be left largely to what little media remain and citizen journalists.

May 15 03:46

Intel Uses Machine Learning To Make GTA’s Graphics Look Scarily Photorealistic

GTA 5’s graphics are decent and it looks good considering how old the game is, but we would never ever call it realistic-looking, but that might not be a bad thing. That being said, if you’ve ever wondered what a game like GTA could look like had it been developed with photorealistic graphics in mind, then you’re in luck.
This is because thanks to researchers at Intel Labs, they have decided to try and apply machine learning techniques to rendered footage from a console game, like GTA, and make it photorealistic. The end results can be seen in the video above, and we can tell you that it looks pretty damn real.

May 14 19:01

Victory! California City Drops Lawsuit Accusing Journalists of Violating Computer Crime Law

By Aaron Mackey

The City of Fullerton, California has abandoned a lawsuit against two bloggers and a local website. The suit dangerously sought to expand California’s computer crime law in a way that threatened investigative reporting and everyday internet use.

The city’s lawsuit against the bloggers and the website Friends For Fullerton’s Future alleged, in part, that the bloggers violated the California Comprehensive Computer Data Access and Fraud Act because they improperly accessed non-public government records on the city’s file-sharing service that it used to disclose public records. But the settlement agreement between the city and bloggers shows those allegations lacked merit and badly misrepresented the city’s online security practices. It also vindicates the bloggers, who the city targeted for doing basic journalism...

May 14 18:52

FDA Warns Cell Phones and Smart Watches Can Affect Medical Implants, Pacemakers, and Defibrillators

By B.N. Frank

There have been expert warnings about medical implants being vulnerable to cyberattacks and hacking. There have also been warnings (including by Apple) that people with pacemakers and other medical implants should NOT hold or charge Apple iPhones too close to their bodies.

The Food and Drug Administration (FDA) has now issued a warning that cell phones as well as smart watches are capable of messing with medical devices...

May 14 14:52

Hacked police data reveal Boogaloo Boy ‘target’ list on eve of Biden inauguration

A document from Washington, D.C.’s Metropolitan Police Department leaked by cybercriminals details the FBI’s concerns over two extremist groups in the wake of the Jan. 6 riot at the Capito

The Babuk ransomware gang on Thursday released a large cache of files it had stolen after attempts to extort the department for $4 million fell through.

As reported by the Daily Dot on Tuesday, alleged screenshots of the group’s negotiations with police showed the department offering $100,000 in an effort to keep Babuk from releasing their files.

In their Thursday post on the dark web, the group, which released 250GB of data in total, criticized police for refusing to agree to their terms.

One folder from the cache of documents details a Jan. 18 briefing at the FBI Command Post that centered on concerns over the Boogaloo Boys, an anti-government militia group.

May 14 12:46

Use this free tool to find all the pictures of you lurking on the web

This just in: You don’t own your face. Sure, technically, no one can copyright your face. But you can’t stop shady companies from selling your features for identification purposes.

As creepy as it sounds, companies can make millions of bucks by throwing you into their enormous facial recognition databases. Just look at Clearview AI, which can identify people based on a single selfie. Now worth $109 million, the company works with government agencies as well as businesses.

Tap or click here to find out how this app can find your address with just a photo of your face. When it comes to Clearview AI, there’s one silver lining: It’s not public, which means you don’t have to worry about every Tom, Dick or Harry stalking you throughout the internet. Unfortunately, another tool has hit the scene, and it’s 100% free.

May 14 12:22

DarkSide Ransomware Gang Quits After Servers, Bitcoin Stash Seized

The DarkSide ransomware affiliate program responsible for the six-day outage at Colonial Pipeline this week that led to fuel shortages and price spikes across the country is running for the hills. The crime gang announced it was closing up shop after its servers were seized and someone drained the cryptocurrency from an account the group uses to pay affiliates.

“Servers were seized (country not named), money of advertisers and founders was transferred to an unknown account,” reads a message from a cybercrime forum reposted to the Russian OSINT Telegram channel.

May 14 11:18

DarkSide, Hacking Group Linked to Colonial Pipeline Attack, Says It Is Closing

The criminal group linked to a cyberattack that disrupted gasoline delivery across parts of the southeastern U.S. this week has told hacking associates that it is shutting down, according to security research firms.

A website operated by ransomware group DarkSide, which U.S. officials have said is believed to originate in Eastern Europe, has been down since Thursday.

DarkSide has told associates it has lost access to the infrastructure it uses to run its operation and would be shutting down, citing pressure from law enforcement and from the U.S., according to security firms FireEye and Intel 471. DarkSide didn’t respond to requests for comment earlier in the week made through its web site before it was shut down.

May 14 10:07

Cybersecurity tycoon Kaspersky claims CIA hackers could actually be behind US Colonial Pipeline attack blamed on Russian group

A cyberattack that crippled fuel supplies on the East Coast of the US and sent gas prices soaring could have been an inside job conducted by American spooks, rather than foreign hackers, a prominent Russian IT expert has claimed.

After a massive systems failure caused the Colonial Pipeline to shut down, Natalya Kaspersky, the founder and former CEO of security software firm Kaspersky Lab, as well as one of Russia’s wealthiest women, made the explosive suggestions in an interview with RIA Novosti on Friday. She alleges that the US’ top foreign intelligence agency, the CIA, has a crack team of digital warriors who are able to masquerade as overseas hacking groups.

May 14 09:37

Hackers Used Fake GPU Overclocking Software to Push Malware

Computer hardware maker MSI is warning gamers not to visit a website that's impersonating the brand and its graphics card overclocking software, Afterburner, to push malware.

On Thursday, MSI published a press release warning of "a malicious software being disguised as the official MSI Afterburner."

"The malicious software is being unlawfully hosted on a suspicious website impersonating as MSI’s official website with the domain name https://afterburner-msi[.]space," the company wrote. "MSI has no relation with this website or the aforementioned domain."

May 14 09:36

Apple is working on crazy new iPhone tech that displays 3D images without special glasses

In light of the above, it may not come as a surprise that Apple has been exploring new display technology capable of offering up an AR-inspired experience without the need for a headset or specialized glasses.

In a recently granted patent titled Split-Screen Driving of Electronic Device Displays, which was initially spotted by AppleInsider, we learn that Apple has been looking at displays capable of showing users a 3D image without the need for any type of accessory.

It certainly sounds like magic and, in turn, even Apple concedes that pulling this type of technology without specialized lenses is fraught with technical hurdles.

“It can be difficult to provide this type of content on a multi-function device such as a smartphone or a tablet,” the patent reads in part, “without generating visible artifacts such as motion blur, luminance offsets, or other effects which can be unpleasant or even dizzying to a viewer.”

May 14 08:21

Flashback: Prepping for a cyber pandemic: Cyber Polygon 2021 to stage supply chain attack simulation

The World Economic Forum (WEF) will stage another cyber attack exercise as it continues to prep for a potential cyber pandemic that founder Klaus Schwab says will be worse than the current global crisis.

May 14 08:20

Ireland's healthcare system is paralysed, with hospital appointments cancelled as hackers carry out possibly the biggest ever cyber crime against the state and officials await ransom demand

The attack comes just one week after a fuel network in the US had to shut down its systems until a $5million ransom was reportedly paid.

The Irish attack was blamed on international criminals and was said to be targeting healthcare records, but officials said patient safety was not at risk.

'We have taken the precaution of shutting down all our IT systems in order to protect them from this attack and to allow us (to) fully assess the situation with our own security partners,' the Health Service Executive (HSE) said.

May 13 12:14

The Dystopian Future in Which Almost No One Owns a Car

Op-Ed by Zachary Yost

By this point readers are more than familiar with the previously unthinkable infringements on our traditional rights and liberties due to “health and safety” lockdowns that the state has inflicted upon us over the last year. While thankfully more and more restrictions are being lifted, it is important not to forget the period of veritable universal house arrest that was enacted in many states, in which even the freedom to go for a drive was denied to us. It unfortunately seems inevitable that we will face such scenarios again when a convenient excuse comes along, though I fear that the next time will be even worse thanks to the advent of self-driving cars...

May 13 10:02

Colonial Pipeline paid hackers nearly $5 million in ransom, sources say

Colonial Pipeline Co. paid nearly $5 million to Eastern European hackers on Friday, contradicting reports earlier this week that the company had no intention of paying an extortion fee to help restore the country’s largest fuel pipeline, according to two people familiar with the transaction.

The company paid the hefty ransom in untraceable cryptocurrency within hours after the attack, underscoring the immense pressure faced by the Georgia-based operator to get gasoline and jet fuel flowing again to major cities along the East Coast, those people said. A third person familiar with the situation said U.S. government officials are aware that Colonial made the payment.

Once they received the payment, the hackers provided the operator with a decrypting tool to restore its disabled computer network. The tool was so slow that the company continued using its own backups to help restore the system, one of the people familiar with the company’s efforts said.

May 13 06:35

Southern States Out Of Fuel-Thousands Stuck

Gas stations across the East Coast are beginning to run out of fuel as one of the biggest petroleum pipelines fights to recover from a cyberattack.

The operator of the country’s largest fuel pipeline, Colonial Pipeline, fell victim to a cybersecurity attack on Friday that involved ransomware, forcing it to temporarily shut down all pipeline operations and raising concern that the outage could lead to spot shortages of gas, diesel and jet fuel.

May 13 06:15

WOW! Same FBI that Pushed Trump-Russia Hoax for 3 YEARS then Exaggerated Russia 2020 Election Threat — NOW Blames Russia for Pipeline Hack

‘The Russians did it’ is still alive and well at the FBI and DOJ.

The corrupt and dishonest FBI began illegally spying on Candidate Trump in early 2016 and then spied on his administration.

They based it all on a lie that Trump was colluding with Vlad Putin to steal the US election.

They knew this was a lie.

This went on for years.

There was NEVER ONE SINGLE lead by the FBI telling the truth to the press that the Russia hoax was all a lie.

The corrupt and dishonest Chris Wray FBI then suggested that Russia was behind crackhead Hunter Biden’s leaked emails from his laptop that he left at a computer store in a blackout.

May 13 03:22

The highly anticipated quantum internet breakthrough is finally here. Is this the end of 5G?

We’ve all heard about 5G, the 5th generation mobile. According to wireless industry group GSMA, 5G is expected to be at least 10 times faster than the fastest 4G networks, with peak data rates of up to 10 gigabytes per second. But what about if it is possible to transmit data faster than the speed of light? Welcome to the world of a quantum internet.

About a year ago, we wrote about the US Department of Energy’s (DoE) new project aimed at laying a new foundation for quantum internet in the US after 60 years of the U.S. Defense Advanced Research Projects Agency (DARPA) in 1973. You can read about it here.

However, this quantum technology startup QphoX and Delft University spinout may probably be ahead of the DOE and the vision for quantum internet is now closer to becoming a reality. QphoX is working to commercialize a quantum modem that can link quantum machines into superfast networks. QphoX is the first company to take quantum transduction beyond university labs.

May 12 12:51

'Do whatever you want': Software to manipulate totals found on voting machines, lawyer says

A lawyer fighting an election-fraud case in Antrim County, Michigan, has revealed that the voting machines there contained a software program that could have been used to manipulate vote totals.

In fact, lawyer Matthew DePerno said in a podcast interview that with the MySQL program installed on the machines, and them all being linked, someone with access could "do whatever you want."

DePerno, just a day earlier confirmed in a court hearing that there were 1,061 "phantom votes" in the county during the 2020 presidential election, because while a recount of ballots tallied 15,962, the Michigan secretary of state's database showed only 14,901 votes were cast.

His latest concerns were raised during an interview with JD Rucker at the NOQ Report.

May 12 11:21

All Wi-Fi devices impacted by new FragAttacks vulnerabilities

Newly discovered Wi-Fi security vulnerabilities collectively known as FragAttacks (fragmentation and aggregation attacks) are impacting all Wi-Fi devices (including computers, smartphones, and smart devices) going back as far as 1997.

Three of these bugs are Wi-Fi 802.11 standard design flaws in the frame aggregation and frame fragmentation functionalities affecting most devices, while others are programing mistakes in Wi-Fi products.

"Experiments indicate that every Wi-Fi product is affected by at least one vulnerability and that most products are affected by several vulnerabilities," security researcher Mathy Vanhoef (New York University Abu Dhabi), who discovered the FragAttacks bugs, said.

May 12 11:13

Billions of devices vulnerable to Wi-Fi 'FragAttacks' — what to do

Up to a dozen serious security flaws affect almost all Wi-Fi-enabled devices, including PCs, Mac, iPhones, Android phones, most routers and smart-home devices, says a Belgian security researcher. You'll want to update Windows straight away; most other devices will have to wait for patches.

Mathy Vanhoef, who in 2017 co-discovered the widespread KRACK flaws in Wi-Fi, groups these 12 new flaws under the name "FragAttacks." He's put an impressive amount of documentation online to explain the flaws, including a dedicated FragAttacks website, an academic research paper, a presentation slideshow, two YouTube videos and a software tool to detect vulnerable devices.

Simply put, the FragAttacks, some of which date back to the first version of Wi-Fi in 1997, let nearby devices "within radio range" attack your Wi-Fi network to steal information and send devices to bad places online.

May 12 10:35

Did The NSA Create Bitcoin?

Op-Ed by Insight History

The mysterious origins of Bitcoin have led to endless theories pertaining to who Satoshi Nakamoto actually is. One prominent theory, which is sometimes circulated in the liberty movement, is that Bitcoin is nothing more than a trojan horse of the establishment, designed to move people away from cash and gold, and towards digital currencies.

The basis for this argument tends to lean heavily on a paper written by three employees of the National Security Agency (NSA) Office of Information Security Research and Technology, Cryptology Division, in June 1996. The paper was titled: How to Make a Mint: The Cryptography of Anonymous Electronic Cash...

May 12 08:20

China sentences bank computer hackers to death

China has sentenced two computer hackers to death to deter the growth of computer crime.

The sentence was imposed on the brothers Hao Jinlong and Hao Jingwen, who hacked their way into a state-owned bank and transferred money into secret accounts. One of the brothers was a bank accountant.

The judge in Zhenjian, Jiangsu province, said that hacking was a new form of crime and should not be treated lightly, according to a report in the Legal Daily.

The total sum they obtained was 260,000 Renminbi (£21,500). Although a large sum by Chinese standards, the sentence is unusually severe.

China has shown increasing concern about loopholes in its computer systems, which are being exploited both by political dissidents and for financial fraud.

Webmaster's Commentary: 

Sounds reasonable!

May 12 08:00

WhatsApp Explains What Will Happen if You Reject Its New Privacy Policy

It's been all over the news recently. WhatsApp is making a controversial change to its privacy policy, and many people aren't happy about it. However, WhatsApp has now explained what will happen to your account if you don't accept the new privacy policy.

How WhatsApp Will Limit Accounts That Don't Accept Its New Privacy Policy

WhatsApp recently updated its FAQ page with an entry regarding what will happen to users who don't accept the new privacy policy. After a period of several weeks from the acceptance date, May 15, users will see the notification to accept the new privacy policy become persistent.

Once the notification becomes persistent, users will lose access to their chat list on the app. Essentially this means you'll lose most of the app's functionality. You will only be able to accept voice and video calls, call back, and reply to messages from the notifications. This means you won't be able to start conversations or make calls.

May 12 07:36

Head of US 'SWAT Team of Nerds' Steps Down After Mysterious IP Address Decision

The head of the Defence Digital Service (dubbed "SWAT Team of Nerds" by its own members) has succeeded in expanding the scope of his department's operations beyond simply solving IT problems for the Pentagon. However, this required him to cut through a tangle of red tape put in place by the department's bureaucracy.

The chief of the Pentagon's Defence Digital Service (DDS), Brett Goldstein, said in an interview with Politico that he will be stepping down in July 2021 after two years in the post.

Goldstein's term expires this year, but it is not unheard-of for the DDS chief's contract to be extended. However, for reasons unknown, Goldstein's contract has not been prolonged despite his achievements in the post. His replacement has also not been announced so far, but his deputy, Katie Olson, who focused on counter-drone operations and assembling the Department of Defence's collection of pathology specimens, will serve as acting chief.

May 12 07:27

Huawei’s ability to eavesdrop on Dutch mobile users is a wake-up call for the telecoms industry

Chinese technology provider Huawei was recently accused of being able to monitor all calls made using Dutch mobile operator KPN. The revelations are from a secret 2010 report made by consultancy firm Capgemini, which KPN commissioned to evaluate the risks of working with Huawei infrastructure.

While the full report on the issue has not been made public, journalists reporting on the story have outlined specific concerns that Huawei personnel in the Netherlands and China had access to security-essential parts of KPN’s network – including the call data of millions of Dutch citizens – and that a lack of records meant KPN couldn’t establish how often this happened.

Both KPN and Huawei have denied any impropriety, though in the years since the 2010 report, Huawei has increasingly found itself labelled a high-risk vendor for telecoms companies to work with, including by the UK’s National Cyber Security Centre.

May 12 07:19

The American Cyber Stasi Will Suppress All Digital Dissent In Biden's Dystopia

CNN's recent report that the US' security services are considering contracting the services of so-called “researchers” as a legal workaround for spying on average Americans confirms that Biden's dystopian hellhole is rapidly moving in the direction of establishing a “Cyber Stasi” for suppressing all digital dissent against the Democrats as they continuing consolidating their de facto one-party rule of the country.

May 12 06:34

How AI Will Soon Change Special Operations

When Gen. Richard D. Clarke was leading special operations forces in Afghanistan years ago, he spent 90 percent of his time thinking about moving and shooting — “the raid, the mission, the kill-capture mission, the destruction of enemy forces,” Clarke said last week at the annual SOFIC conference. But when he returned to Afghanistan last year as the commander of U.S. Special Operations Command, he found that U.S. leaders were focusing most of their mental energy on information.

Commanders now spend about 60 percent of their time mulling what the Taliban and the Afghan population are thinking, and how U.S. actions might influence that, Clarke said. “As we look at the info space and in our fight for competition...working in the information space can have the greatest impact in the coming years.”

May 12 06:31

Multiple states declare emergency, 1,000+ pumps run out of gas, as White House insists there’s NO ‘shortage’ & blames ‘hoarders’

Motorists and even airlines struggled to find fuel across the southeastern US due to the Colonial Pipeline cyberattack, but the Biden administration denied there was a “shortage” and blamed “hoarders” for the “supply crunch.”

Virginia and Florida declared a state of emergency on Tuesday, following North Carolina’s declaration the day before, as the disruption in pipeline operations led to over 1,000 gas stations across a dozen states running out of fuel, according to S&P’s Oil Price Information Service.

May 12 06:21

Florida, Virginia, Georgia and North Carolina declare states of emergency over gas shortages after Colonial Pipeline hack as 1,000 fuel stations run dry in Southeast as people panic buy

The governors of Florida, Virginia and Georgia all declared states of emergency Tuesday in a bid to protect fuel supplies, with some gas pumps already dry in Atlanta and other cities, as the impact from the Colonial Pipeline ransomware attack continues to ripple across the country - hitting the Southeast especially hard.

Panic buyers streamed into gas stations across the Southeast as the key pipeline that supplies the area was threatened by the attack.

More than 1,000 gas stations in the Southeast are now running out of fuel, according to S&P's Oil Price Information Service.

May 12 05:54

Prepping for a cyber pandemic: Cyber Polygon 2021 to stage supply chain attack simulation

The World Economic Forum (WEF) will stage another cyber attack exercise as it continues to prep for a potential cyber pandemic that founder Klaus Schwab says will be worse than the current global crisis.

The SolarWinds hack served as a wake-up call to the supply chain attack vulnerabilities still present in public and private organizations, and it served as a warning that the next breach could be exponentially worse in spreading through any device connected to the internet.

Following up on last year’s Cyber Polygon cyber attack exercise and event aimed at preventing a digital pandemic, the WEF has announced that the 2021 edition will be taking place on July 9.

“A cyber attack with COVID-like characteristics would spread faster and farther than any biological virus” — World Economic Forum

May 12 05:48

Ransomware gang says D.C. police won’t pay $4 million demand, begins leaking files

A group of cybercriminals have begun leaking what it claims to be internal law enforcement files after Washington, D.C.’s Metropolitan Police Department was targeted with ransomware last month.

In a post on the dark web Tuesday, the Babuk ransomware gang alleged that negotiations had “reached a dead end” after declining a payment offer made by police.

May 11 19:08

U.S. Legislators Concerned about China’s Efforts to Genetically Engineer “Super Soldiers”

By B.N. Frank

Americans have had various concerns about the Chinese government for decades. Earlier this week, Full Measure aired a segment that reveals more disturbing details about all of that and more. Of course, it’s not just the Chinese government that Americans have to worry about – this research is being explored in the West as well. Will we see a super soldier arms race? Just what the world needs…

May 11 12:47

Can you hack an AirTag? Absolutely, and this guy shows how

German hacker pulls apart AirTag, gets it to do bad things

Apple's new AirTags have been hacked — but not in any way that you need to worry about.

German hardware hacker Thomas Roth, aka GhidraNinja, posted on Twitter Saturday (May 8) that he had managed to extract, alter and reload an AirTag's firmware

When he put the AirTag in "Lost Mode" and pointed his iPhone at it, the phone's browser was sent to Roth's own website instead of Apple's Find My website.

Later, Roth changed it so that the hacked AirTag Rickrolled him:

What are the dangers of this AirTag hack?
There aren't many.

A criminal could possibly distribute "lost" AirTags that would send the iPhone browsers of random people who come across it to malicious websites, as SlashGear pointed out.

May 11 12:40

5 Reasons Why I’m Not On WhatsApp (and Why You Should Also Consider A Return To SMS)

I’ll admit it. Being off WhatsApp isn’t easy in 2021. I can imagine many readers are wondering how it’s even possible – especially given the fact that so many have experienced the entirity of their human interaction being mediated through a pane of handheld glass since the start of this decade. But for those of you who are curious as to whether it’s possible to live a fully functioning life off WhatsApp – I can assure you it is indeed – and there are some important reasons why it even might be a good idea.
What follows is my list of 5 principled reasons why it’s best to say ‘what’s up?’ anywhere but on WhatsApp:

1. Closed Protocol

My pet hate isn’t something that’s specific to WhatApp, and in many ways is the key contributor to it’s success – but the number 1 problem with so many apps is that they are protocols disguised as platforms.

May 11 09:21

Millions Of Public Transit “Touch ‘N Go” Smartphone Users Can Be Tracked By Law Enforcement

By MassPrivateI

As more and more people use their smartphones to pay for everyday items, public transit agencies are encouraging millions of Americans to use their phones as their primary means of paying their fares.

In New York City and elsewhere, police can use ‘touch ‘n go’ or ‘touchless fares’ to track millions of public transit users’ movements.

New York’s Metropolitan Transit Authority’s OMNY Executive Director Al Putre said that as of December 2020 there have been over 34 million taps...

May 11 08:21

Colonial Says Pipeline Segments Being "Brought Back Online", Goal Is For Service To Be "Substantially Restored" By End Of Week

With fears growing that the Colonial shutdown could last for much longer than initially expected, with some analysts warning that a 5-day shutdown could lead to sharply higher prices, and the Biden admin activating a state of emergency to make sure that critical gasoline supplies continue to flow up the eastern seaboard, moments ago Colonial Pipeline issued an update on its attempts to restore operations, saying that "segments of our pipeline are being brought back online in a stepwise fashion" and that the goal now is to "substantially" restore operational service by the end of the week.

Just out from the company:

Monday, May 10, 12:25 p.m.

May 11 07:50

Colonial Pipeline says one fuel line operating under manual control after cyber attack

Colonial Pipeline said its Line 4 fuel line, which runs from Greensboro, North Carolina, to Woodbine, Maryland, has been restarted and is operating under manual control for a limited time after a cyber attack shut the pipeline system Friday.

Line 4 will be operating for a limited period of time while existing inventory is available, the company said in a notice to shippers.

Colonial’s main gasoline and distillate lines continue to be offline after a ransomware cyberattack shut down the pipeline system, which carries nearly half the fuel consumed along the U.S. East Coast.

May 11 07:05

Newt Gingrich: Pipeline cyber attackers should be 'subject to death penalty'

May 11 06:53

RISC-V is trying to launch an open-hardware revolution

May 11 06:52

Gas Stations Run Dry as Pipeline Races to Recover From Hacking

Gas stations along the U.S. East Coast are beginning to run out of fuel as North America’s biggest petroleum pipeline races to recover from a paralyzing cyberattack that has kept it shut for days.

From Virginia to Florida and Alabama, stations are reporting that they’ve sold out of gasoline as supplies in the region dwindle and panic buying sets in. An estimated 7% of gas stations in Virginia were out of fuel as of late Monday, according to GasBuddy analyst Patrick DeHaan.

The White House said in a statement it is monitoring the situation and directing government agencies to help alleviate any shortages. Colonial Pipeline Co. said it’s manually operating a segment of the pipeline running from North Carolina to Maryland and expects to substantially restore all service by the weekend.

May 11 06:25


The dystopian hellhole that I predicted would become a fait accompli following Biden’s confirmation as President by the Electoral College is quickly becoming a reality after CNN’s recent report that the US security services are considering contracting the services of so-called “researchers” as a legal workaround for spying on average Americans. CNN’s recent report that the US’ security services are considering contracting the services of so-called “researchers” as a legal workaround for spying on average Americans confirms that Biden’s dystopian hellhole is rapidly moving in the direction of establishing a “Cyber Stasi” for suppressing all digital dissent against the Democrats as they continuing consolidating their de facto one-party rule of the country.

According to the outlet, these ostensibly independent contractors would be charged with infiltrating the social media circles of white supremacists and other supposedly terrorist-inclined domestic forces within the country.

May 11 06:11

Biden says no evidence Russian government was involved in pipeline hack

Biden said that Putin still bears "some responsibility" to respond since DarkSide, a cybercrime gang the FBI says is responsible for the attack on a U.S. gasoline line.

May 11 06:08

FBI confirms cyberattack on US pipeline carried out by DarkSide

The cyberextortion attempt that has forced the shutdown of a vital United States pipeline was carried out by a criminal gang known as DarkSide, the Federal Bureau of Investigation (FBI) confirmed on Monday.

“The FBI confirms that the Darkside ransomware is responsible for the compromise of the Colonial Pipeline networks,” said a statement issued by the bureau. “We continue to work with the company and our government partners on the investigation.”

May 10 19:12

FDA: “Operation Quack Hack”: Medical Mafia vs. Medical Health Freedom Fighters

By Maryam Henein

“The past was erased, the erasure was forgotten, the lie became truth.” 1984, George Orwell

IRONY ALERT! “No form of human misery can be allowed to go unexploited, and the coronavirus pandemic is no exception.” WebMD

Under the guise of safety (read: control) and fueled by a narrative that COVID-19 is a pandemic devastating the world, the U.S. government has issued a veritable witch hunt against online health professionals and natural ancient remedies like silver, vitamin C, magnesium, and mineral salts (MMS).

Headed by the Food and Drug Administration (FDA), Operation Quack Hack is cyberstalking and softly terrorizing hundreds of doctors and health professionals who actually care about bolstering people’s health. And yes, “Operation Quack Hack” is the actual name the FDA has given this operation...

May 10 12:19

AAA on pipeline attack: gas price hikes, fuel shortages possible for these states

The national average for gas prices jumped 6 cents on the week to $2.96 and is poised to rise even higher in some areas due to Friday's cyberattack against Colonial Pipeline Co., according to the American Automobile Association.

Colonial Pipeline operates a 5,500-mile system taking fuel from the refineries of the Gulf Coast to the New York metro area.

The pipeline transports more than 100 million gallons a day, or roughly 45% of fuel consumed on the East Coast, according to the company's website. It delivers gasoline, diesel, jet fuel and heating oil and serves U.S. military facilities.

May 10 12:08

F.B.I. confirms group behind the hack of a top U.S. pipeline.

The F.B.I. on Monday confirmed that DarkSide, a hacking group, was responsible for the ransomware attack that closed a U.S. pipeline that provides the East Coast with nearly half of its gasoline and jet fuel.

The confirmation of the hack, which prompted emergency White House meetings over the weekend, comes as the Biden administration in the coming days is expected to announce an executive order to strengthen America’s cyberdefense infrastructure.

President Biden said on Monday that the government has mitigated any impact the pipeline hack might have on the U.S. fuel supply. He added that his administration has efforts underway to “disrupt and prosecute ransomware criminals.”

May 10 10:46

USDOT Declares Emergency Over Colonial Pipeline Shutdown - Waives Trucker Hours of Service Rules

The United States Department of Transportation, (DOT) and the Federal Motor Carrier Safety Administration have declared an emergency over the shut down of the Colonial Pipeline and waived trucker hours-of-service rules to transport fuel in 17 states.

May 10 10:45

DHS launches warning system to find domestic terrorism threats on public social media

The Department of Homeland Security has begun implementing a strategy to gather and analyze intelligence about security threats from public social media posts, DHS officials said.

The goal is to build a warning system to detect the sort of posts that appeared to predict an attack on the U.S. Capitol on Jan. 6 but were missed or ignored by law enforcement and intelligence agencies, the officials said.

The focus is not on the identity of the posters but rather on gleaning insights about potential security threats based on emerging narratives and grievances. So far, DHS is using human beings, not computer algorithms, to make sense of the data, the officials said.

"We're not looking at who are the individual posters," said a senior official involved in the effort. "We are looking at what narratives are resonating and spreading across platforms. From there you may be able to determine what are the potential targets you need to protect."

May 10 09:49


The billionaire’s role in perpetuating vaccine apartheid in the name of protecting intellectual property rights has begun to draw criticism.

May 10 08:13

Colonial Pipeline hack 'painful' for US: Gas analyst

May 10 07:42

Turn Over Routers Or Face Subpoenas, Arizona Lawmakers Tell Maricopa County

Legislators in Arizona and officials in the state’s largest county clashed anew this week over election audit subpoenas, with county officials refusing to hand over routers and claiming they do not have passwords to access administrative control functions of election machines.

Arizona’s Senate told Maricopa County on Friday that it would issue subpoenas for live testimony from the county’s Board of Supervisors unless it received the materials that are being withheld. “We’ve been asked to relay that the Senate views the County’s explanations on the router and passwords issues as inadequate and potentially incorrect,” a lawyer for the Senate said in an email to county officials.

The Arizona Senate subpoenaed a slew of election materials, such as ballots, following the 2020 election. Lawmakers also issued subpoenas for election machines, passwords, and other technology.

May 10 06:42

Maricopa County Elections Witness Testifies that Dominion Ran Entire Election – County Officials and Observers NEVER HAD Access or Passwords! (Video)

Back on November 30, 2020, Maricopa County elections witness Jan Bryant testified before the Arizona legislature.

Jan has a strong project management background. She could not believe what she witnessed during the 2020 election in Maricopa County, Arizona.

Jan said back on November 30, 2020, that Maricopa County officials DID NOT RUN THE ELECTION! Dominion employees John and Bruce did.

Jan’s testimony might explain why Maricopa County officials do not have Admin passwords or access to the Dominion voting machines.

May 10 06:05

US Declares State Of Emergency To Keep Gasoline Flowing After Colonial Fails To Restart Hacked Pipeline

Update 9:00pm ET: The US government declared a state of emergency late on Sunday, lifting limits on the transport of fuels by road in a bid to keep gas supply lines open as fears of shortages spiked after the continued shutdown of the Colonial Pipeline.

“This Declaration addresses the emergency conditions creating a need for immediate transportation of gasoline, diesel, jet fuel, and other refined petroleum products and provides necessary relief,” the Department of Transportation said. White House Press Sec Jen Psaki added that "as the Administration works to mitigate potential disruptions to supply as a result of the Colonial Pipeline incident, @USDOT is taking action today to allow flexibility for truckers in 17 states."

May 10 05:51

Clocks Ticking On Colonial Pipeline Restart: "After 72 Hours... It Gets Really Tough"

While cyber-attacks have disrupted the operations of other energy assets in the U.S. in recent years. this weekend's theft of Colonial’s data, coupled with the detonation of ransomware on the company’s computers, is by far the largest and most impactful.

As we detailed earlier, the hackers who caused Colonial Pipeline to shut down the biggest U.S. gasoline pipeline on Friday began their blitz against the company a day earlier, stealing a large amount of data before locking computers with ransomware and demanding payment, according to people familiar with the matter.

Bloomberg reports that the intruders are part of a cybercrime gang called DarkSide, took nearly 100 gigabytes of data out of the Alpharetta, Georgia-based company’s network in just two hours on Thursday, two people involved in Colonial’s investigation said.

May 10 05:29

Fears of gas price surge after 'DarkSide' cyber attack shuts Colonial Pipeline between Texas and NJ that carries 45% of East Coast fuel: Experts call it 'most significant assault on infrastructure to date in the US'

The largest gasoline pipeline in the country was shut down on Friday after a sophisticated ransomware attack, which experts are calling the most dramatic cyberattack on U.S. soil to date.

In a Saturday statement, Colonial Pipeline said that it 'proactively took certain systems offline to contain the threat, which has temporarily halted all pipeline operations, and affected some of our IT systems.'

The hackers are likely a professional cybercriminal group, and a group dubbed 'DarkSide' was among the potential suspects, two U.S. government officials told Reuters.