Tagged: information Toggle Comment Threads | Keyboard Shortcuts

  • ancavge 2:49 pm on September 14, 2009 Permalink | Reply
    Tags: , , AV malware, , , , crimeware, FAKEAV, , , , information, , internet security software, malicious software, , , , rootkits, , shadow war, , spyware, , , Trend Micro, trojan horses, , , worms   

    Internet Security Software Company Says 9/11 Searches Infected with Malware 

    Kurt Nimmo
    Infowars
    September 14, 2009

    Prior to the eighth anniversary of 9/11, researchers at Trend Micro, an anti-virus software company, warned on their blog that Google searches of the term “September 11″ lead to “rogue AV malware.” Malware, short for malicious software, is software designed to infiltrate a computer without the owner’s knowing it. Malware includes computer viruses, worms, trojan horses, rootkits, spyware, misleading adware, crimeware and other malicious and unwanted software.

    Trend Micro’s suggestion? People should rely on “reputable news agencies” for their information on 9/11 — you know, the same corporate media “sources” that spread the official fairy tale generated by the government and its hand-picked whitewash commission of insiders. After its release, the commission report was questioned by highly respected university professors, over 50 senior government officials, medical professionals, victim family members, over 200 pilots and aviation professionals, hundreds of architects and engineers, military officers, senior Republican appointees, federal engineers and scientists, and even members of the commission itself.

    As with most malware, the perpetrators behind the TROJ_FAKEAV.BOH virus are unknown. The obvious question is who stands to gain from this exploit? If the creators of this particular malware wanted to spread their virus far and wide, they would likely use a more popular search term — for instance the name of a celebrity or popular television show.

    Excuse my paranoia, but the obvious culprit here is the government, not a band of rogue hackers and virus programmers. The government — in league with the Mockingbird corporate media — have turned somersaults in a tireless effort to debunk and discredit the 9/11 truth movement and derail any attempt to initiated a new and independent investigation. “The people behind FAKEAV still show no sign of slowing down,” writes Jessa De La Torre, threat response engineer for Trend Micro — and they won’t until they scare everybody away from investigating 9/11.

    Rumsfeld’s Pentagon unleashed a “shadow war” of covert special-forces computer and internet operations soon after 9/11. “But unlike rebellious teenagers sitting at their bedroom computers, these hackers work for intelligence agencies and have advanced training in computer science, math and cryptology,” the Montreal Gazette reported in October, 2001. More recently, General Dynamics Corp., Lockheed Martin Corp., CACI International Inc., Northrop Grumman Corp., and Raytheon Co. competed for “cyber warfare contracts as the Obama administration prepares to spend billions to obtain cyber warfare capabilities to outperform the Chinese and Russians,” according to Washington Technology.

    Free exchange of information, according to the Pentagon, is a threat. “The Pentagon’s Information Operations Roadmap is blunt about the fact that an internet, with the potential for free speech, is in direct opposition to their goals. The internet needs to be dealt with as if it were an enemy ‘weapons system,’” writes Brent Jessop. “It should come as no surprise that the Pentagon would aggressively attack the ‘information highway’ in their attempt to achieve dominance in information warfare. Donald Rumsfeld’s involvement in the Project for a New American Century sheds more light on the need and desire to control information.” The PNAC document, Rebuilding America’s Defenses, states: “It is now commonly understood that information and other new technologies… are creating a dynamic that may threaten America’s ability to exercise its dominant military power.”

    Last year, according to Wired, the U.S. Special Operations Command suggested “clandestinely recruiting or hiring prominent bloggers” to fight against the enemy. The 2006 report for the Joint Special Operations University, “Blogs and Military Information Strategy,” suggested co-opting bloggers, or even putting them on the payroll. “Hiring a block of bloggers to verbally attack a specific person or promote a specific message may be worth considering,” James Kinniburgh and Dororthy Denning wrote.

    The effort was a follow-up to a Pentagon program that worked “with a carefully culled list of military analysts, bloggers, and others who can be counted on to parrot the Bush Administration’s line on national security issues,” Ken Silverstein wrote for Harpers.

    Earlier this year, the Department of Homeland Security actively recruited hackers who “think like the bad guy,” National Terror Alert reported.

    Considering the above, it is not a stretch to conclude that the Pentagon would infect 9/11 searches with malware. Once again, cui bono – the principle that probable responsibility for an act or event lies with one having something to gain — comes into play.

    URL to article: http://www.infowars.com/internet-security-software-company-says-911-searches-infected-with-malware/

     
  • ancavge 6:37 pm on August 30, 2009 Permalink | Reply
    Tags: , browser, corporations, Dispute Finder, , , information, , , red flags, ,   

    New browser red-flags disputed facts on the web 

    James Keller
    The Canadian Press
    August 30, 2009

    Editor’s note: Apparently multinational corporations and governments will decide what information on the internet is “questionable.”

    Developers of new web browsing software that flags questionable claims or outright lies on the web hope it will become a valuable tool to deal with the misinformation that litters the Internet.

    But observers say Dispute Finder, an experimental browser extension developed by Intel, and the many websites that already aim to debunk online rumours and falsehoods face an enormous task. It isn’t as easy as simply telling someone they’re wrong.

    Once installed, Dispute Finder highlights in red what it determines are disputed claims on websites, then offers users links to alternative points of view and evidence to back them up.

    “It’s important to be aware when something you’re reading is not the only opinion, when there is another point of view worth paying attention to,” says California-based Intel researcher Rob Ennals.

    Read entire article

    URL to article: http://www.infowars.com/new-browser-red-flags-disputed-facts-on-the-web/

     
    • sleepyeagle 6:48 pm on August 30, 2009 Permalink | Reply

      It’ll never work, plain and simple. It’s just not that easy to distinguish good sources from bad.

  • ancavge 3:01 pm on August 6, 2009 Permalink | Reply
    Tags: , disinformation, information, , ,   

    Obama’s dissident database could be secret — and permanent 

    Byron York
    Washington Examiner
    August 6, 2009

    Editor’s note: See our article from August 5, White House Asks People to Spy on Health Care Dissidents.

    The White House request that members of the public report anyone who is spreading “disinformation” about the proposed national health care makeover could lead to a White House database of political opponents that will be both secret and permanent, according to Republican lawyers on the Senate Judiciary Committee who are examining the plan’s possible implementation.

    • A d v e r t i s e m e n t
    • efoods

    On Monday, White House director of new media Macon Phillips posted a note on the White House web site complaining of “disinformation about health insurance reform.” “These rumors often travel just below the surface via chain emails or through casual conversation,” Phillips wrote. “Since we can’t keep track of all of them here at the White House, we’re asking for your help. If you get an email or see something on the web about health insurance reform that seems fishy, send it to flag@whitehouse.gov.”

    In a letter to Obama Tuesday, Republican Sen. John Cornyn wrote that, given Phillips’ request, “it is inevitable that the names, email address, IP addresses, and private speech of U.S. citizens will be reported to the White House.” Cornyn warned the president that “these actions taken by your White House staff raise the specter of a data collection program.”

    “I can only imagine the level of justifiable outrage had your predecessor asked Americans to forward emails critical of his policies to the White House,” Cornyn continued. “I urge you to cease this program immediately.”

    Senate Judiciary Committee lawyers studying the proposal say that although there is no absolutely settled law on the matter, the White House plan is likely not covered by the Privacy Act, which prohibits government agencies from keeping any records “describing how any individual exercises rights guaranteed by the First Amendment unless expressly authorized by statute or by the individual about whom the record is maintained.” Therefore, it appears the White House can legally keep records of the emails and other communications it receives in response to Phillips’ request.

    Read entire article

    URL to article: http://www.infowars.com/obamas-dissident-database-could-be-secret-and-permanent/

     
  • ancavge 6:32 pm on July 1, 2009 Permalink | Reply
    Tags: , , , , blogosphere, , , , , , independent media, , information, , , internet blogs, , John Hartigan, , , , National Press Club, , , , , , , Political Extremists, , , , , , , ,   

    Murdoch CEO Labels Bloggers “Political Extremists” 

    Paul Joseph Watson
    Prison Planet.com
    Wednesday, July 1, 2009

    Murdoch CEO Labels Bloggers Political Extremists 010709top

    A stinging attack by John Hartigan, the CEO of Rupert Murdoch’s News Limited, labels bloggers and alternative media outlets as “political extremists”. Hartigan implies that bloggers should be jailed as they are in oppressive police states like China and Burma.

    In a speech to the National Press Club, Hartigan savagely dismissed blogs as, “Something of such little intellectual value as to be barely discernible from massive ignorance.”

    Bloggers don’t go to jail for their work. They simply aren’t held accountable like real reporters….It could be said the blogosphere is all eyeballs and no insights,” barked Hartigan.

    “In the blogosphere, of course, the mainstream media is always found wanting. It really is time this myth was blown apart.”

    “Blogs, and a large number of comment sites, specialise in political extremism and personal vilification. Radical sweeping statements without evidence are common.”

    Hartigan doesn’t seem to grasp the fact that the mainstream media is always found wanting because they habitually lie about news events and spin stories to suit the demands of their corporate owners. This is the very reason why blogs and alternative media outlets have become so popular and have eaten into the mainstream media’s audience share, because people are sick of being treated like idiots, sick of being lied to, and are desperately in search of the truth.

    Indeed, Hartigan’s boss Rupert Murdoch confessed to the fact that his media empire tried to shape public opinion to support the war in Iraq In other words, Murdoch’s many prominent news outlets wantonly put out propaganda supporting the manufactured case for invasion. Murdoch admitted to this while lamenting the corporate media’s “loss of power” to alternative media and Internet blogs, seemingly unaware of the fact that the two are directly connected.

    When the people know that the corporate media is deliberately lying to them about Niger yellowcake and weapons of mass destruction, they are going to seek alternative avenues of information. The fact that the corporate media habitually lies is a manifestly provable reality, not a “myth” as Hartigan ludicrously claims.

    • A d v e r t i s e m e n t
    • efoods

    In addition, while mainstream media routinely uses anonymous sources and little more than bluster and hot air to back up their stories, blogs provide links to almost every claim they make so readers can research the source evidence for themselves. This is the opposite from Hartigan’s claim that blogs make “radical sweeping statements without evidence.” Indeed, this phrase perfectly characterizes tactics employed by the mass media on a daily basis.

    The corporate media monopoly has terminal cancer and they are losing their power to blogs and alternative media, which is why people like Hartigan are so angry and also why the establishment is aggressively moving to phase out the old Internet altogether and replace it with “Internet 2,” a highly regulated and controlled electronic Berlin wall, where alternative voices will be silenced and giant corporate propaganda organs will dominate once again.

    As blogger Darryl Mason writes today, “John Hartigan is full of shit. Bloggers have gone to jail for their work, and to protect their sources, in North Korea, Iran, Egypt, the list of countries persecuting bloggers grows longer by the week. And the CEO of Australia’s biggest news corporation doesn’t know this?”

    The jailing of bloggers for speaking too much truth is obviously not the kind of news that John Hartigan, a Rupert Murdoch CEO, is interested in. How could he not know about those jailing and prosecutions.

    Remember those words. “Political extremism”.

    You will hear that call more and more as the major news corporations scale up their war against independent media, and bloggers.

    The source of the establishment’s move to claim that bloggers and alternative media outlets are “extremists” or at worst “terrorists,” as we first reported in September 2006, was a White House strategy document that the government had been following since 9/11.

    In a September 5, 2006 speech President George W. Bush referred to the document as “an unclassified version of the strategy we’ve been pursuing since September the 11th, 2001,” that takes into account, “the changing nature of this enemy.”

    The strategy paper on how to ‘win the war on terror’ cites “conspiracies” as one of the wellsprings of terrorism and threatens to “address” and “diminish” the problems they are causing the government in fulfilling their agenda.

    This notion then reappeared in a March 2009 Homeland Security document entitled “Domestic Extremism Lexicon,” in which the “alternative media” is listed alongside other radical extremist groups with the implication that people who disagree with the mass media’s version of events are potential domestic terrorists.

    According to World Net Daily, the DHS document was almost immediately rescinded, but the groups listed alongside Neo-Nazis, Aryan prison gangs and black power extremists again prove that the federal government is targeting American citizens who are merely knowledgeable about their rights and up on current issues as potential domestic terrorists to be treated as a “threat” to law enforcement.

    URL to article: http://www.infowars.com/murdoch-ceo-labels-bloggers-political-extremists/

     
  • ancavge 12:42 am on June 28, 2009 Permalink | Reply
    Tags: , aenfroy87, , , American patriots, , , , , , information, Information Revolution, , , , , , ,   

    Fighting the New World Order: Information Revolution 2009 

    aenfroy87
    June 27, 2009

    The information revolution has begun! This is a set of new clips from 2009 exposing the new world order, Barack Obama, and the fraudulent Federal Reserve system. Watch as great American patriots like Alex Jones, Judge Andrew Napolitano, Jeremy Scahill, Jesse Ventura, Dennis Kucinich, Gerald Celente, Peter Schiff and Ron Paul speak truth to power. The information you will see in these clips is still pushed as a minority opinion by the corporate controlled media. You be the judge.

    URL to article: http://www.infowars.com/fighting-the-new-world-order-information-revolution-2009/

     
  • ancavge 2:11 am on June 3, 2009 Permalink | Reply
    Tags: , , , , , , , , , , , , , , , , information, Information Week, , , , J. Nicholas Hoover, names, , , , officials, , , , , , , , , ,   

    Homeland Security Names New Cybersecurity Officials 

    J. Nicholas Hoover
    InformationWeek
    June 2, 2009

    The Department of Homeland Security filled out its cybersecurity team Monday, two months after Rod Beckstrom resigned as director of the department’s National Cybersecurity Center. He had clashed with the National Security Agency and complained about lack of funding.

    • A d v e r t i s e m e n t
    • efoods

    Taking Beckstrom’s place as director of the National Cybersecurity Center (NCSC) will be Philip Reitinger, who is currently Homeland Security deputy undersecretary for the National Protection and Programs Directorate (NPPD). Reitinger, who also worked in cybersecurity forMicrosoft (NSDQ: MSFT) and fought cybercrime for the Department of Justice, will help to coordinate cybersecurity efforts across the government.

    Reitinger will continue to hold his position at the NPPD, where he heads up Homeland Security-specific cybersecurity efforts. “Holding both positions simultaneously will allow Reitinger to provide broader strategic direction to the department’s cybersecurity efforts while ensuring preparedness and response capabilities across all federal computer systems,” the Department of Homeland Security said in a statement. It’s unclear how his role would shift as the White House brings in its new cybersecurity czar.

    Read entire article

    URL to article: http://www.infowars.com/homeland-security-names-new-cybersecurity-officials/

     
  • ancavge 5:13 pm on May 21, 2009 Permalink | Reply
    Tags: , , , , government officials, information, , , , , , signed, signing statement, signing statements, , whistle-blowers,   

    Obama signing statement weakens “whistle-blower” protections 

    Tom Eley
    WSWS
    May 21, 20099

    When he signed into law a $410 billion omnibus spending bill on March 10, President Barack Obama included a “signing statement” weakening a rider in the bill that would have given protection to government officials who turn over information to Congress.

    As a candidate for the presidency, Obama campaigned in favor of broad protection for federal whistle-blowers and against the sort of presidential signing statements that, under the Bush administration, had eviscerated the intent of congressional legislation.

    The traditional purpose of signing statements was largely symbolic or pertained to the practical implementation of new laws by federal employees. President Bush used this mechanism more than 1,200 times—a record by far—to interpret and substantially alter the intent of laws, effectively usurping power from both the legislative branch of the government, which the Constitution tasks with creating laws, and from the judicial, which is invested with the power to interpret laws.

    Prior to the Reagan administration, all previous presidents used the signing statement only 75 times combined—mostly for celebratory purposes. The scope and scale of the practice accelerated rapidly under the Reagan administration, who issued 250 such statements. A young staff attorney in Reagan’s Office of Legal Counsel, Samuel Alito—now a US Supreme Court Justice—argued in 1986 that “interpretive signing statements” could be used to “increase the power of the Executive to shape the law.” The practice continued under George H.W. Bush (228 statements) Clinton (381 statements), and increased enormously under George W. Bush.

    • A d v e r t i s e m e n t
    • efoods

    Obama’s signing statement on the omnibus spending bill suggests that he will carry on Bush’s policy, in spite of his campaign pledges to the contrary. In reference to the congressional rider, which had appeared on appropriations bills since the mid-1990s, Obama wrote, “I do not interpret this provision to detract from my authority to direct the heads of executive departments to supervise, control and correct employees’ communications with the Congress in cases where such communications would be unlawful or would reveal information that is properly privileged or otherwise confidential.”

    The signing statement asserts broad executive privilege over the control of information. Its vague reference to Obama’s ability to “supervise, control and correct employees’ communications,” and to “information that is properly privileged” are clearly designed to have a chilling effect on any government employee that might step forward to expose the ways in which government appropriations are being used.

    A top Republican lawmaker, Senator Charles Grassley of Iowa, has drawn attention to the whistle-blower signing statement to embarrass Obama. Grassley cites specific Obama campaign promises, including his pledge to only “sign legislation in the light of day without attaching signing statements that undermine the legislative intent,” and that he would not “use signing statements as a way of doing an end run around Congress.”

    Yet Obama’s use of the signing statement to usurp powers of the legislative and judicial branches is only secondarily a partisan issue, as Bush’s rampant use of the stratagem shows. Rather, its use by recent administrations is bound up with the development of the “imperial presidency.”

    Since at least the 1960s, presidents—whether Democrat of Republican—have progressively accumulated ever greater powers in the executive branch, and within that, to the office of the presidency. In essence, the growth of the imperial presidency is an expression of the incompatibility of democratic forms of governance with heightening social inequality.

    Among the powers that the presidency has effectively arrogated to itself is the power to declare war, which the Constitution insists belongs to the legislature. Though the US has engaged in numerous military engagements in recent decades, the last congressional approval of a declaration of war was issued against the Axis powers during World War Two.

    Since the Nixon administration, the office of the presidency has also been the conspiratorial center of attacks on the democratic rights of the people. This function accelerated markedly under the Bush administration. Bush claimed the right to arrest and hold indefinitely without trial anyone, anywhere in the world, including US citizens.

    Obama’s signing order aiming to silence whistle-blowers is one further sign that he intends to maintain the powers of the imperial presidency intact.

    URL to article: http://www.infowars.com/obama-signing-statement-weakens-whistle-blower-protections/

     
c
Compose new post
j
Next post/Next comment
k
Previous post/Previous comment
r
Reply
e
Edit
o
Show/Hide comments
t
Go to top
l
Go to login
h
Show/Hide help
shift + esc
Cancel
Follow

Get every new post delivered to your Inbox.