Cometh The Censor

Submitted by Fred Reed via Fred On Everything blog, I see with no surprise that Washington is stepping up its campaign to censor the internet. It had to come, and will succeed.  It will put paid forever to America’s flirtation with freedom. The country was never really a democracy, meaning a polity in which final power rested with the people. The voters have always been too remote from the levers of power to have much influence. Yet for a brief window of time there actually was freedom of a sort. With the censorship of the net—it will be called “regulation”—the last hope of retaining former liberty will expire. Over the years freedom has declined in inverse proportion to the reach of the central government. (Robert E. Lee: “I consider the constitutional power of the General Government as the chief source of stability to our political system, whereas the consolidation […] Read More

5 Things Busy People Can Do to Fight the Rising Control System

Bernie Suarez Activist Post Want to implement small-scale, realistic tasks in your own life to strike back at the control system? Have you been seeing the daily headlines, the lies, the deceit and the global enslavement agenda in full swing and feeling that you aren’t doing enough to fight back because of your busy schedule? Feeling helpless and overwhelmed by the idea that a small group of psychopaths at the very top would push for a global order that involves their full enjoyment of life while you and the rest of humanity live as miserable slaves forever? Don’t have time to be a full-time activist, be involved in marches, or downright challenge the court system? Wondering what small things you can do to fight back as you deal with the hustle and bustle of your own life working to pay bills, obtain an education, or raising children? Here are […] Read More

Anonymous ‘Hacktivists’ Say Police Aren’t Solving Case Where Girl Was Burned To Death So They Will

Police not doing their job is hardly something new… But now the hacktivist group Anonymous has said that they will do the job of law enforcement investigators for them, since they are apparently unwilling or unable to make an arrest in the Jessica Chambers murder case. The case of Jessica’s murder horrified Mississippi’s after the young girl was found burned alive near her vehicle, nearly two weeks ago. Ben Chambers, the father of the 19-year-old Mississippi girl said he wants the killer or killers locked in solitary confinement, saying that “I promise as long as I have breath in me I can talk to people and make sure they’re not comfortable in there.” On December 6th, Jessica was found walking away from her burning vehicle. She had burns covering over 98% of her body. No arrests have been made yet, and Anonymous says that this is because the small, […] Read More

Censoring the Web Isn’t the Solution to Terrorism or Counterfeiting. It’s the Problem.

It’s an attractive idea because if you don’t think too hard, it appears to be a political no-brainer. It allows governments to avoid addressing the underlying social problem—a long and costly process—and instead simply pass the buck to Internet providers, who can quickly make whatever content has raised rankles “go away.” Problem solved! Except, of course, that it isn’t. Amongst the difficult social problems that Web censorship is often expected to solve are terrorism, child abuse and copyright and trade mark infringement. In recent weeks some further cases of this tactic being vainly employed against such problems have emerged from the United Kingdom, France and Australia. UK Court Orders ISPs to Block Websites for Trade Mark Infringement In a victory for luxury brands and a loss for Internet users, the British High Court last month ordered five of the country’s largest ISPs to block websites selling fake counterfeit goods. Whilst alarming […] Read More

5 Reasons To Question Apple’s Data Security

Submitted by Mike Krieger of Liberty Blitzkrieg blog, I’m the furthest thing in the world from a technology or security expert, but what I have learned in recent years is that a dedicated, sophisticated and well funded hacker can pretty much own your data no matter how many precautions you take. Nevertheless, the major technology companies on the planet shouldn’t go out of their way to make this as easy as possible. In the wake of the theft of private images from several prominent celebrities, many people are rightly wondering whether how vulnerable their data is. The answer appears to be “very,” and if you use Apple, the following article from Slate may leave you seething with a sense of anger and betrayal. David Auerbach wrote the following for Slate. Read it and weep:   In the wake of the theft of the private data and photos of dozens of celebrities, there […] Read More

Say Goodbye To “Net Neutrality” – New FCC Proposal Will Permit Discrimination Of Web Content

Submitted by Mike Krieger of Liberty Blitzkrieg blog, The concept of “net neutrality” is not an easy one to wrap your head around. Particularly if you aren’t an expert in how the internet works and if you don’t work for an ISP (internet service provider). In fact, I think that lobbyists and special interest groups make the concept intentionally difficult and convoluted so that the average person’s eyes glaze over and they move on to the next topic. I am by no means an expert in this area; however, in this post I will try to explain in as simple terms as possible what “net neutrality” means and what is at risk with the latest FCC proposal. I also highlight a wide variety of articles on the subject, so I hope this post can serve as a one-stop-shop on the issue. The concept of “net neutrality” describes how broadband […] Read More

2013: A World Without The Internet: What Would It Be Like? How Different Would Your Life Be?

Internet after all is not without enemies… The Internet has become the Archimedean point in our daily life. Almost nothing gets done without it nowadays. The more we rely on it, the more it seems impossible to live without it. It is undoubtedly the most reliable machine Man has ever made. However, could this blind dependence of ours in itself be a threat to mankind? Are we investing too much in this new medium that we are risking to lose too much if we ever were to live without it? Why is the Internet so successful? How does it invade all aspects of life? The Internet, as a matter of fact, is the only manmade machine that has an organic structure. The way everything is wired up is unbelievably complex. Seeing that it has this organic structure, it seems to fit the properties of vitalism perfectly, and all aspects of […] Read More

Hackvitist Sentenced To 10 Years In Prison For Exposing Corruption

By Susanne Posel Occupy Corporatism Jeremy Hammond , the Anonymous hacker who released information taken from Strategic Forecasting Inc. (SFI) in 2011, has been sentenced to a decade in prison under the guise that Hammond committed cyber attacks on the US government, intelligence agencies and private sector data-gathering corporations. According to the prosecutors, Hammond took 60,000 credit card numbers and records for more than 860,000 clients of SFI. Donations were made to the tune of $700,000 from those credit card numbers taken from SFI by Anonymous (like modern-day Robin Hoods). Non-profit organizations were the recipients of the funds. Hammond had the information he took published on WikiLeaks to expose connections between SFI with corporations such as Coca-Cola Company and banks such as Goldman Sachs. The prosecution claimed that Hammond is the “world’s most dangerous cyber terrorist” because he caused “maximum mayhem” for hacking into SFI to bring to light their corrupt activities regarding information […] Read More

2013: Google & Microsoft Hire Hackers To Identify Software Vulnerabilities

By Susanne Posel Occupy Corporatism Thanks to HackerOne , rewards will be given to hackers who can identify software vulnerabilities for programmers to overcome. Microsoft and Google have come together to fund this project. These “bug bounties” will not be tied to a specific technology. Criteria for a bounty exposing cheese holes in software include the widespread and severity of the compromise. First a hacker must crack Chrome, Internet Explorer 10 EPM, Adobe Reader, and Adobe Flash. Programs of interest include: • PHP • Open SSL • Ruby • Apache Google’s bounty program has been running for several years and paid out an estimated $2 million to hackers under the Chromium and Google Web Vulnerability Reward Programs (CGW-VRP). Microsoft has their own bounty program that has poured out $128,000 to hackers for uncovering issues with Windows 8.1. Facebook has invested $1.5 million for research into bounties and have hired full-time employees to ensure bugs are exposed and security […] Read More

2013: Online Anonymity Is Not Only for Trolls and Political Dissidents

David Plotz: People have a misguided belief in it, but, in general, the fact that anonymity is increasingly hard to get—Facebook doesn’t permit it, most commenting on a lot of sites doesn’t permit it—there’s a loss when you don’t have anonymity. Emily Bazelon: Oh god, I am so not with you on this one. There is a loss if you’re, like, a political dissident in Syria. If you are in this country, almost all of the time, there is a net gain for not having anonymous comments. We so err on the side of ‘Oh, free speech, everywhere, everywhere, let people defame each other and not have any accountability for it.’ And I think in free societies, that is generally a big mistake. And yes, you can make small exceptions for people who truly feel at risk, like victims of domestic violence are an example, but most of the […] Read More

Internet freedom on decline worldwide as governments tighten grip – report

Authors highlighted greater internet activism as a bright spot among worrying developments. A protest against cybercrime law near the presidential palace in Manila October 13, 2012. (Reuters / Cheryl Ravelo) Improved surveillance, takedown of opposition websites for “illegal content” and paid pro-government commentators are among the increasingly sophisticated tools used by authorities to restrict internet freedom, a new report claims. The 2013 Freedom on the Net report, compiled by non-profit Freedom House, says that 34 out of the 60 countries it surveyed suffered a falloff in internet freedom over the past year. Iran, Cuba, China and Syria were ranked as countries with the greatest restrictions. China, which blocks millions of websites and employs thousands-strong armies of censors, “led the way in expanding an elaborate technological apparatus for system internet censorship, while further increasing offline coercion and arrests to deter freedom of expression online.” Iceland, Estonia and Germany took the […] Read More

2013: WE EXPOSED THE PRIVATE DETAILS OF 6 MILLION USERS – FACEBOOK

SAN FRANCISCO (Reuters) – Facebook Inc has inadvertently exposed 6 million users’ phone numbers and email addresses to unauthorized viewers over the past year, the world’s largest social networking company disclosed late Friday. Facebook blamed the data leaks, which began in 2012, on a technical glitch in its massive archive of contact information collected from its 1.1 billion users worldwide. As a result of the glitch, Facebook users who downloaded contact data for their list of friends obtained additional information that they were not supposed to have. Facebook’s security team was alerted to the bug last week and fixed it within 24 hours. But Facebook did not publicly acknowledge the bug until Friday afternoon, when it published an “important message” on its blog explaining the issue. A Facebook spokesman said the delay was due to company procedure stipulating that regulators and affected users be notified before making a public […] Read More

2012: US Senators call for universal Internet filtering

US senators today made a bipartisan call for the universal implementation of filtering and monitoring technologies on the Internet in order to protect children at the end of a Senate hearing for which civil liberties groups were not invited. Commerce Committee Chairman Daniel K. Inouye (D-Hawaii) and Senate Commerce, Science, and Transportation Committee Vice Chairman Ted Stevens (R-Alaska) both argued that Internet was a dangerous place where parents alone will not be able to protect their children. While filtering and monitoring technologies help parents to screen out offensive content and to monitor their child’s online activities, the use of these technologies is far from universal and may not be fool-proof in keeping kids away from adult material,” Sen. Inouye said. In that context, we must evaluate our current efforts to combat child pornography and consider what further measures may be needed to stop the spread of such illegal material […] Read More