2017: New 5G Cell Towers and Smart Meters to Increase Microwave Radiation and Invade Privacy

By John P. Thomas When the Federal Communication Commission (FCC) approved the use of 5-G microwave communication technology in 2016 and approved the use of microwave frequencies in the 30 Ghz range, [1], they opened the door to even higher levels of human illness and severe disability for American children and adults. Microwave radiation such as that currently being used in cell phones, Wi-Fi routers, and smart meters has already been linked to numerous health effects. The introduction of even more intense levels of microwave exposure at higher frequencies will push many people into a life-threatening chronic illness. High-frequency microwave radiation is often overlooked as a causative factor in illness, because most conventional healthcare providers, government regulators, telecom companies, and electric utilities believe microwave radiation used in communication technology is harmless. [2] Despite the warnings being raised by scientists, well-informed healthcare providers, and grassroots organizations about existing and future […] Read More

2017: WikiLeaks’ ‘Dark Matter’ Dump Shows CIA’s iPhone, MacBook Hacks

CIA documents published by WikiLeaks Thursday reveal hacks used by the agency against Apple cellphones and computers. Dubbed “Dark Matter,” the documents, a new addition to WikiLeaks’ ongoing “Vault 7” dump, detail hacks leveraged against iPhones and MacBooks as far back as 2008. “These documents explain the techniques used by CIA to gain ‘persistence’ on Apple Mac devices, including Macs and iPhones and demonstrate their use of EFI/UEFI and firmware malware,” a WikiLeaks press release says. By targeting the firmware, CIA hackers can remain in control of an infected device even if the target wipes the data and re-installs the operating system. One such tool, known as “Sonic Screwdriver,” is, according to the CIA, a “mechanism for executing code on peripheral devices while a Mac laptop or desktop is booting…” By providing a target with a compromised peripheral device such as an Apple Thunderbolt-to-Ethernet adapter, which stores “Sonic Screwdriver” […] Read More

Hello Biometrics: Windows 10 To Add Facial Recognition, Iris Scans And Fingerprint Reader (VIDEO)

By: Nicholas | Tech Swarm – After several years of consumer complaints, Microsoft Windows 10 has been getting a lot of attention as of late for many upgrades slated for their new version of the popular operating system. However, it appears that one feature being added to supposedly consumer-friendly applications is a suite of biometrics called Windows Hello and Windows Passport. It’s all a part of the move toward a full-fledged Smart World where YOU become the password in a matrix of online and real-world activity. Naturally, the fear of identity theft and cyber crime of all stripes has been the sales pitch to accept this new pervasive identity tech. Apple’s Touch ID was introduced in iPhone 5 which employed a fingerprint scanner for phone locking as well as to make purchases in Apple stores. Yet, it didn’t take long for this new ultra-security measure to be hacked. As Melissa […] Read More

2014: The Era Of Widespread Biometric Indentification And Microchip Implants Is Here

Are you ready to have your veins scanned every time you use your bank account?  Are you ready to use a “digital tattoo” or a microchip implant to unlock your telephone?  Once upon a time, we read about such technologies in science fiction novels, but now they are here.  The era of widespread biometric identification and microchip implants is upon us, and it is going to change the way that we live. Proponents of these new technologies say that they will make our private information and our bank accounts much more secure.  But there are others that warn that these kinds of “Big Brother technologies” will set the stage for even more government intrusion into our lives.  In the wrong hands, such technologies could prove to be an absolute nightmare. Barclays has just announced that it is going to become the first major bank in the western world to […] Read More

2014: 5 Reasons To Question Apple’s Data Security

Submitted by Mike Krieger of Liberty Blitzkrieg blog, I’m the furthest thing in the world from a technology or security expert, but what I have learned in recent years is that a dedicated, sophisticated and well funded hacker can pretty much own your data no matter how many precautions you take. Nevertheless, the major technology companies on the planet shouldn’t go out of their way to make this as easy as possible. In the wake of the theft of private images from several prominent celebrities, many people are rightly wondering whether how vulnerable their data is. The answer appears to be “very,” and if you use Apple, the following article from Slate may leave you seething with a sense of anger and betrayal. David Auerbach wrote the following for Slate. Read it and weep: >In the wake of the theft of the private data and photos of dozens of celebrities, there […] Read More

2014: Your IPhone, Android & Tablet Are Impacting Your Sleep. Not In A Good Way

The body has an internal clock called a circadian rhythm, helping you to go to sleep in the evening and to wake up in the morning. Your sleep health and overall well-being is dependent on your circadian rhythm working correctly and remaining synchronized with night and day. The most important external indicator to help keep your body synchronized with this routine is light. When the eye senses light, it sends a signal to your brain to be awake. When it becomes dark in the evening, your body produces melatonin, often called the sleepy hormone signaling your body to sleep at night. The combination of biological processes in response to light and darkness are crucial factors for your body to remain synchronized and able to sleep at the right time. Artificial light is one of the biggest causes of sleep deprivation in modern humans, and, stay with me here, it’s […] Read More

2013: Why the NSA’s attacks on the internet must be made public | Bruce Schneier

By reporting on the agency’s actions, the vulnerabilities in our computer systems can be fixed. It’s the only way to force change Today, the Guardian is reporting on how the NSA targets Tor users, along with details of how it uses centrally placed servers on the internet to attack individual computers. This builds on a Brazilian news story from last week that, in part, shows that the NSA is impersonating Google servers to users; a German story on how the NSA is hacking into smartphones; and a Guardian story from two weeks ago on how the NSA is deliberately weakening common security algorithms, protocols, and products. The common thread among these stories is that the NSA is subverting the internet and turning it into a massive surveillance tool. The NSA’s actions are making us all less safe, because its eavesdropping mission is degrading its ability to protect the US. […] Read More

2013: The Snowden files: why the British public should be worried about GCHQ

When the Guardian offered John Lanchester access to the GCHQ files, the journalist and novelist was initially unconvinced. But what the papers told him was alarming: that Britain is sliding towards an entirely new kind of surveillance society In August, the editor of the Guardian rang me up and asked if I would spend a week in New York, reading the GCHQ files whose UK copy the Guardian was forced to destroy. His suggestion was that it might be worthwhile to look at the material not from a perspective of making news but from that of a novelist with an interest in the way we live now. I took Alan Rusbridger up on his invitation, after an initial reluctance that was based on two main reasons. The first of them was that I don’t share the instinctive sense felt by many on the left that it is always wrong […] Read More