background preloader

Big brother

Facebook Twitter

Free NetFlix Movies Premium Account Login Username and Password. Monsanto Now Owns Blackwater (Xe) A report by Jeremy Scahill in The Nation (Blackwater’s Black Ops, 9/15/2010) revealed that the largest mercenary army in the world, Blackwater (now called Xe Services) clandestine intelligence services was sold to the multinational Monsanto.

Monsanto Now Owns Blackwater (Xe)

Blackwater was renamed in 2009 after becoming famous in the world with numerous reports of abuses in Iraq, including massacres of civilians. It remains the largest private contractor of the U.S. Department of State “security services,” that practices state terrorism by giving the government the opportunity to deny it. How to stop your phone from being tracked. New Bill Known As Enemy Expatriation Act Would Allow Government To Strip Citizenship Without Conviction.

First, Congress considered the National Defense Authorization Act, sections of which gave the President the authority to use the military to arrest and indefinitely detain Americans without trial or charge.

New Bill Known As Enemy Expatriation Act Would Allow Government To Strip Citizenship Without Conviction

#3038363. SOPA Emergency IP list: So if these ass-fucks in DC decide to ruin the internet, here’s how to access your favorite sites in the event of a DNS takedown


7 Lessons: Surviving A Zero-Day Attack - Security - Attacks/breaches. Pacific Northwest National Laboratory CIO Jerry Johnson takes you inside the cyber attack that he faced down--and shares his security lessons learned.

7 Lessons: Surviving A Zero-Day Attack - Security - Attacks/breaches

When Pacific Northwest National Laboratory detected a cyber attack--actually two of them--against its tech infrastructure in July, the lab acted quickly to root out the exploits and secure its network. PNNL then did something few other cyber attack victims have been willing to do. 10 programming languages that could shake up IT. Do we really need another programming language?

10 programming languages that could shake up IT

There is certainly no shortage of choices already. Between imperative languages, functional languages, object-oriented languages, dynamic languages, compiled languages, interpreted languages, and scripting languages, no developer could ever learn all of the options available today. And yet, new languages emerge with surprising frequency. Some are designed by students or hobbyists as personal projects. Others are the products of large IT vendors. Anonymous leaks 10,000 ‘top secret’ Iranian gov’t emails. Free File Downloads and Software Discussion. How to Open God Mode on Windows 8, 7 & Vista.

ANONYMOUS MESSAGE: TO AUSTRALIA & ITS GOVERNMENT:MISSING:Human Rights.wmv. CIA installed nuclear surveillance device atop Himalayas mountains. CIA, Mossad made up fairytale al-Qaeda. CIA, Mossad made up fairytale al-Qaeda Wayne Madsen An American investigative journalist says the al-Qaeda is a fairytale terrorist group made up by the Central Intelligence Agency (CIA) and the Israeli spy agency, Mossad.

CIA, Mossad made up fairytale al-Qaeda

"In the US, the Zionist propagandists are spinning the fanciful tale that Iran was involved with "al-Qaeda," the fairy tale organization concocted by Mossad and the CIA, in carrying out the 9/11 attacks," Wayne Madsen wrote in an article published in Global Research. Madsen was referring to the latest US allegation that Iran was involved in the September 11, 2001 attacks on New York and Washington.

On December 22, a US federal judge in Manhattan alleged that Iran, together with the Taliban and al-Qaeda, had been involved in the 9/11 attacks. The Decline of the American Empire. Hackers plan space satellites to combat censorship. 4 January 2012Last updated at 06:52 ET By David Meyer Technology reporter 50 years after Russia's first piloted mission, hackers plan to send their own people beyond orbit Computer hackers plan to take the internet beyond the reach of censors by putting their own communication satellites into orbit.

Hackers plan space satellites to combat censorship

The scheme was outlined at the Chaos Communication Congress in Berlin. 10 Search Engines to Explore the Invisible Web. No, it’s not Spiderman’s latest web slinging tool but something that’s more real world.

10 Search Engines to Explore the Invisible Web

Like the World Wide Web. The Invisible Web refers to the part of the WWW that’s not indexed by the search engines. Most of us think that that search powerhouses like Google and Bing are like the Great Oracle”¦they see everything. Unfortunately, they can’t because they aren’t divine at all; they are just web spiders who index pages by following one hyperlink after the other. But there are some places where a spider cannot enter. Search engine technology has progressed by leaps and bounds. Julian Assange Explains Who The Bastards Are. Wikipedia Leaves GoDaddy Over Stop Online Piracy Act (SOPA) Top Secret Alan Watt: The World Has been Planned out.. And we are to be removed, HAARP YELLOWSTONE. Meet Telecomix, The Hackers Bent On Exposing Those Who Censor And Surveil The Internet. The 101 Most Useful Websites on the Internet. Anonymous attacks security firm Stratfor, $1M stolen/donated.

'Anonymous' hackers hit US security firm Stratfor. 26 December 2011Last updated at 00:14 Stratfor urged its members to notify authorities about any suspicious credit card activities The activist hacker group Anonymous says it has stolen thousands of emails, passwords and credit card details from a US-based security think tank.

'Anonymous' hackers hit US security firm Stratfor

The 1 Percenters Who Act Like Scrooge...and the Ones Who Don't. December 22, 2011 | Like this article?

The 1 Percenters Who Act Like Scrooge...and the Ones Who Don't

Join our email list: Stay up to date with the latest headlines via email. This Dynamic Planet. Facebook. Can Anonymous Cripple Critical U.S. Infrastructure? - Security - Vulnerabilities and threats. Homeland Security says Anonymous can cause DDoS attacks, but says chance of attack on scale of Stuxnet is slim. 10 Companies Driving Mobile Security (click image for larger view and for slideshow) Does the hacktivist collective known as Anonymous pose a threat to the nation's critical infrastructure security?

According to a recent government report, the group may well be able to launch a distributed denial of service attack against critical infrastructure. But the likelihood of Anonymous developing bespoke critical infrastructure attacks--on par with Stuxnet--is slim. The Department of Homeland Security (DHS) study, "Assessment of Anonymous Threat to Control Systems," evaluated the group's potential to disrupt the critical infrastructure. The CIA in Australia: AMERICA’S FOREIGN WATERGATE. The CIA in Australia: “The CIA’s aim in Australia was to get rid of a government they did not like and that was not co-operative… it’s a Chile, but in a much more sophisticated and subtle form.” - VICTOR MARCHETTI, ex-CIA officer, 1980. Virginia Tech's Wu Feng unveils HokieSpeed, a new powerful supercomputer for the masses.

Public release date: 21-Dec-2011 [ Print | E-mail Share ] [ Close Window ] Contact: Steven 540-231-4787Virginia Tech Virginia Tech crashed the supercomputing arena in 2003 with System X, a machine that placed the university among the world's top computational research facilities. Now comes HokieSpeed, a new supercomputer that is up to 22 times faster and yet a quarter of the size of X, boasting a single-precision peak of 455 teraflops, or 455 trillion operations per second, and a double-precision peak of 240 teraflops, or 240 trillion operations per second.

Police Device Used To Steal Your Cell Phone Data During Traffic Stop. You may have heard about the Cellebrite cell phone extraction device (UFED) in the news lately. It gives law enforcement officials the ability to access all the information on your cell phone within a few short minutes. When it became known that Michigan State Police had been using the tool to access cell phones during traffic stops, it raised concern with the ACLU.

Now, everyone is wondering if cops will be using devices like this elsewhere. Will this new law enforcement tool be abused, or will it be used responsibly in the pursuit of justice? Call us paranoid, but we obtained a law-enforcement-grade software extraction tool for the iPhone to see exactly what data is up for grabs. Click the gallery below to find out... RAP NEWS X - #Occupy2012. Photos of Occupy Wall Street. Russian Intelligence Calls Facebook Information Warfare Weapon. A senior Federal Security Service (FSB) official speaking off the record to reporters this morning in the Kremlin labeled the US social media website Facebook as the world’s most dangerous “Information Warfare Weapon” and stated that unless its powers were curbed the freedoms of everyone on Earth would be stripped away entirely.

Important to note is that this top FSB official had previously (April, 2011) urged Russia to ban Skype, Gmail and Hotmail as “major threats to national security,” a request quickly rejected by the Kremlin due to how such a move would be characterized in the West. The IAO states that TIA would be achieved by creating enormous computer databases to gather and store the personal information of everyone in the United States, including personal e-mails, social networks, credit card records, phone calls, medical records, and numerous other sources, without any requirement for a search warrant.

Its goals include programmes to: Facebook Privacy Statement. Are We Living in a Super-Computer Simulation with Aliens Beings? Steve Antonoff - Weighing the Risks of Solid-State Drives. Islamic extremists call for death of lesbian author / DIVA Magazine Lesbian News. Obama: I can’t comment on Wall Street prosecutions. (updated below) President Obama was interviewed by 60 Minutes‘ Steve Kroft last night. Kroft mentioned a new poll showing that 42% of Americans believe Obama’s policies most favor Wall Street rather than average Americans (only 35% believe the opposite).

Future Riot Shields Will Suffocate Protestors with Low Frequency Speakers. Rock fans have heads shaved and get 'cleansed' in river in Islamic law crackdown. 65 youths have been sent to a police school in Indonesia's Aceh province to receive mental and spiritual guidance for ten daysOnly then are they are allowed to return home By Graham Smith Updated: 11:46 GMT, 15 December 2011.

FEMA Imprisonment - Obama Announces Proplonged Detention ( 14 December 2011 Speech ) TrendLabs - by Trend Micro.

Science - Download Free Software. Panoramas archive. Free Video Converter. History. - Download Freeware and Shareware Computer Utilities. Pentagon Partners With NATO To Create Global Cyber Warfare System. Stop NATO October 8, 2010 Pentagon Partners With NATO To Create Global Cyber Warfare System Rick Rozoff U.S. Cyber Command is scheduled to be activated this month, in the words of a Reuters dispatch “ready to go to war in cyberspace” with full operational capability. The launching of the world’s first multi-service – with the involvement of all major branches of the U.S. armed forces: Air Force, Army, Marine Corps and Navy – military command is being coordinated with a complementary initiative by the North Atlantic Treaty Organization in Europe, the joint effort striving toward a worldwide cyber warfare system.

Last month the U.S. Downloadable Computer Repair CDs. Wikileak: This is How the Government Tracks You. Your Likes.