Cyberwar /cyberwar Cyberwar Robots Hackers Machine Takeover Sat, 14 Jan 2017 06:58:13 +0000 en-US hourly 1 http://wordpress.org/?v=4.2.2 10 hard lessons the healthcare industry learned about cybersecurity in 2016 /cyberwar/2017-01-14-10-hard-lessons-the-healthcare-industry-learned-about-cybersecurity-in-201 /cyberwar/2017-01-14-10-hard-lessons-the-healthcare-industry-learned-about-cybersecurity-in-201#respond Wed, 30 Nov -0001 00:00:00 +0000 http://162.244.66.231/cyberwar/2017-01-14-10-hard-lessons-the-healthcare-industry-learned-about-cybersecurity-in-201 Big Med has been hit hard this past year by cyber criminals intent on disrupting and disabling the industry. The vulnerabilities exposed by these attacks point to the need for more robust security measures in 2017. At issue is not only invasion of privacy when personal medical records are hacked, but also rising costs to the healthcare industry, which as always, is passed on to the consumer. And losing access to computer systems via ransomware could cripple a healthcare business, endangering patient safety. (RELATED: Read more cyber security news at Cyberwar.news)

Health Care IT News spoke with four experts regarding recent security breaches. Pam Hepp of Buchanan, Ingersoll & Rooney, Cynergis CEO and co-founder Mac McMillan, ESET Security Researcher Lysa Myers, and ICIT Senior Fellow James Scott offered their take on the most significant weaknesses, dangers, and insights gathered from the events of 2016:

1. Human error allows hackers an entrance of attack. Unconcerned and unaware persons are targeted as a prime defect in the system.

2. The Internet of Things and obsolete technology create a shortcoming. A connected device such as a digital camera can be exploited if the item is not sufficiently updated. This can become a big problem when an unprotected piece of equipment is not taken into account, because with automated tools in the hands of criminals, a single vulnerability can be uncovered.

3. Vendors and associates can be the point of entry for a breach. A thorough vetting of third parties is essential to assure security, along with having a good understanding between all parties.

4. Ransomware is malicious computer code that when superstitiously installed can render a system unusable until the entity pays a sum of money to the cyber pirates. Once successful, it’s a way introduce further attacks.

5. Cyber breaches are increasing in frequency. Medical data is a valuable for an organization to operate, as well as for a hacker to exploit.

6. Backups are key to providing continuity not only for hardware or software glitches, but also to elude the grip of a ransomer.

7. Impeccable cyber-hygiene, including improvements in infrastructure, networks, and software; and pertinent hands-on training, can eliminate nearly all pitfalls.

8. Cybercrime is big business, and the lucrative healthcare industry is a prime target.

9. Contingency planning and risk management are vitally important, to mitigate and recover from a worst case scenario.

10. Partnerships are essential as a strategy for success, for the ability to share expertise and resources.

We are all patients

One egregious shortcoming of Obamacare is the laying bare of patients’ private, personal and intimate information; things most people are reluctant to share with anyone besides their physician, if that. The ramifications go beyond possible public humiliation; the leaking of personal medical records could conceivably be a strategic threat to one’s career or personal relationships. Natural Society notes the idiocracy that reigns in Washington that has manifested as a sizable cybersecurity liability.

The Health Information Technology for Economic and Clinical Health (HITECH) Act provided $30 billion for the medical industry to digitize patient records. At first glance, this would seem to be a good idea; the quick, accurate, and efficient storage, retrieval and portability of patient histories would save lives, one would hope. But studies suggest a cost of up to $100 billion to implement, and the undertaking does nothing to save money, nor improve patient health. The glaring problem is that the software designed by Epic Systems, the firm that stores the largest number of patient records, does not allow hospitals to share them. So the obvious question becomes, why bother? This boondoggle is not only useless, it opens up patients to the theft of their medical records…all of the risk with none of the benefit. This is not a theoretical problem; it is already happening. You can thank the inept and unresponsive federal bureaucracy for this one. And so much for the Obama ‘legacy.’ (Read more news about technology glitches and failures at Glitch.news)

Sources:

HealthcareITNews.com

NaturalSociety.com

]]>
/cyberwar/2017-01-14-10-hard-lessons-the-healthcare-industry-learned-about-cybersecurity-in-201/feed 0
Invasive Amazon.com now wants to monitor your refrigerator and track everything you eat /cyberwar/2017-01-12-invasive-amazon-com-now-wants-to-monitor-your-refrigerator-and-track-everything-you-eat /cyberwar/2017-01-12-invasive-amazon-com-now-wants-to-monitor-your-refrigerator-and-track-everything-you-eat#respond Wed, 30 Nov -0001 00:00:00 +0000 http://162.244.66.231/cyberwar/2017-01-12-invasive-amazon-com-now-wants-to-monitor-your-refrigerator-and-track-everything-you-eat As part of a joint project with Amazon.com, LG Electronics is planning to unveil a new “smart” refrigerator equipped with cameras and other spying equipment designed to monitor what people eat and keep track of their food purchasing habits. The refrigerator will reportedly work in tandem with Amazon’s “Echo” device to listen to, watch and track not only what’s inside the refrigerator, but also how people use it — all in the name of providing customers “a pleasurable cooking and dining experience,” of course.

At the recent CES 2017 expo event in Las Vegas, the Korean tech giant announced the “InstaView” fridge as the latest in cutting-edge food storage for the modern world. Equipped with a 29-inch, high-definition (HD) touchscreen display on the door, the InstaView fridge is basically a computer-slash-robot that can create shopping lists, check the weather and even set cooking timers. According to the online edition of the Daily Mail, it can even send text message notifications to users’ smartphones informing them of what needs to be purchased from the store.

Don’t feel like opening the door of the InstaView fridge to see what’s inside? No worries. The interior cameras can take a live scan and show you right on the HD display what’s there, a feature that LG claims prevents energy from being wasted — even though the camera and display both require energy to perform this function. The InstaView fridge also has its own built-in operating system that a family can use to leave each other notes or instructions, all of which the fridge itself uses to “learn” and customize features over time.

“Our Smart InstaView Door-in-Door refrigerator will allow users to enjoy their kitchen experience like never before,” announced Song Dae-Hyun, LG’s head of home appliances, before an eager tech crowd in Vegas. (Related: Stay up to date on electronic devices, privacy and surveillance technology at Glitch.news)

LG, Amazon want ‘tens of millions’ of smart devices to track people in their homes

Another so-called “feature” of LG’s InstaView fridge is that it has built-in Amazon Echo integration, allowing Amazon’s “Alexa” personal assistant to listen in on users’ conversations and “take notes.” LG is marketing the concept as an exclusive way to enhance users’ experiences with the fridge, but from a privacy perspective it implies even further risk of invasive spying or tracking by potential hackers.

And LG isn’t stopping with just the InstaView fridge; the company’s vice president of marketing, David VanderWaal, told expo attendees that, starting in 2017, LG will be equipping all of its home appliances with “advanced WiFi connectivity,” describing the change as a way to unleash “tens of millions of smart connected devices” into consumers’ homes.

This means that any future products sold by LG, whether they be televisions, washers and dryers, or even kitchen stoves and microwaves, will be equipped with wireless capabilities that connect these appliances to the outside world. In other words, it will be a world without privacy — and a hacker’s paradise — not to mention all the added electromagnetic frequencies swirling around people’s homes.

For Amazon, this brave new world will spell higher profits, as customers will be pushed by every new WiFi- or Echo-equipped appliance to purchase more Amazon products. Out of milk? Don’t worry; that InstaView fridge can tell “Alexa” to order you some more. Need more laundry detergent? Amazon’s got you covered with its Echo-integrated washers and dryers. And so on and so forth.

Following this trend is appliance manufacturer Whirlpool, which also plans to start integrating Amazon’s Alexa into its own “smart” appliances. Reports indicate that in 2017, Whirlpool plans to unveil 21 new WiFi-connected appliances that can be given verbal commands to perform various functions on their own, without human users even having to lift a finger. (Related: Follow more news on ways people are controlled in society by reading Sheeple.news)

Sources for this article include:

DailyMail.co.uk

TechHive.com

]]>
/cyberwar/2017-01-12-invasive-amazon-com-now-wants-to-monitor-your-refrigerator-and-track-everything-you-eat/feed 0
FDA admits cybersecurity vulnerabilities in pacemakers, insulin pumps and MRI systems /cyberwar/2017-01-09-fda-admits-cybersecurity-vulnerabilities-in-pacemakers-insulin-pumps-and-mri-systems /cyberwar/2017-01-09-fda-admits-cybersecurity-vulnerabilities-in-pacemakers-insulin-pumps-and-mri-systems#respond Wed, 30 Nov -0001 00:00:00 +0000 http://162.244.66.231/cyberwar/2017-01-09-fda-admits-cybersecurity-vulnerabilities-in-pacemakers-insulin-pumps-and-mri-systems People who use various medical devices, such as pacemakers, insulin pumps and MRI systems, already have enough to be concerned with just in terms of dealing with their medical conditions. But on top of that, now they also need to deal with the issue of cybersecurity vulnerabilities that affect these devices and that have been admitted by the FDA.

FDA acknowledges that medical devices are at risk

Not just the computer systems of large corporations, governments and financial organizations are vulnerable to cybersecurity threats. The FDA is now admitting that medical devices, and in turn the patients who use them, could be victims of hacking. “Cybersecurity threats are real, ever-present and continuously changing,” admitted Suzanne Schwartz, a senior Food and Drug Administration official. “And as hackers become more sophisticated, these cybersecurity risks will evolve.” Unlike hacks that involve other computers and are mere inconveniences in the big picture, threats that involve medical devices are potentially life-threatening, such as in the case of certain heart devices. This is certainly not what any patient who uses a device like this or their loved ones wants to hear.

How the FDA has attempted to address the risks

In light of these security risks, it is clear that the FDA needs to develop rules and policies that will help to identify these vulnerabilities and then address them, with the goal of reducing the threats to these devices that many patients rely on. The FDA has taken some actions in recent years to try to do that:

  • It published a 30-day document providing guidance on cybersecurity issues.
  • In 2014, it published a document explaining how medical device manufacturers need to deal with cybersecurity threats when they are developing various new products. This did not address products that were already being sold at the time the document was published.
  • In 2015, it told hospitals to stop using a particular infusion pump made by Hospira Inc. because a security risk could open the door for hackers to control the device from a distance

The FDA will need to stay on top of this issue and do as much as possible, because there has been mounting evidence in recent years that these threats and bugs in medical devices are real. In addition, the issues of cybersecurity risks and hacking seem to worsen over time.

What manufacturers need to do

Manufacturers of medical devices that could potentially be affected by cybersecurity threats should be extremely vigilant as well. They need to determine which products that are already on the market are at risk for threats and then determine a way to remedy the situation. If threats are severe enough to require such severe action, they need to remove products from the market that have risks so severe that they cannot be remedied. They also need to develop new products with cybersecurity threats at the forefront of their minds by designing products to be more insulated from cybersecurity threats. With all their products, they need to have ways for security experts to quickly and efficiently report potential cybersecurity threats. Finally, they need to openly communicate with medical organizations, patients and the FDA regarding any information about cybersecurity threats.

Technology can lead to many medical advances but often also brings down sides such as cybersecurity threats. Patients who use medical devices that could be affected by cybersecurity threats should stay well informed and educated about what to do. Find out if the devices you use are vulnerable to cybersecurity threats. Discuss the issue of cybersecurity threats with the doctor who prescribed the device, and ask them for advice.

Sources:

Reuters.com

ManagedCareMag.com

]]>
/cyberwar/2017-01-09-fda-admits-cybersecurity-vulnerabilities-in-pacemakers-insulin-pumps-and-mri-systems/feed 0
Independent journalists to be forcibly micro-chipped by government after being labeled with a “mental disorder” for not believing propaganda /cyberwar/2017-01-09-independent-journalists-will-be-forcible-micro-chipped-by-government-after-being-labeled-with-a-mental-disorder-for-not-believing-propaganda /cyberwar/2017-01-09-independent-journalists-will-be-forcible-micro-chipped-by-government-after-being-labeled-with-a-mental-disorder-for-not-believing-propaganda#respond Wed, 30 Nov -0001 00:00:00 +0000 http://162.244.66.231/cyberwar/2017-01-09-independent-journalists-will-be-forcible-micro-chipped-by-government-after-being-labeled-with-a-mental-disorder-for-not-believing-propaganda It seems too far-fetched to be true, especially in the “land of the free” where the Constitution supposedly recognizes and enshrines certain “inalienable” human rights like individual choice and privacy, but it’s true nonetheless: In the United States, we have all come one step closer to being microchipped by mandate.

As reported by True Activist, about six years ago NBC Nightly News made a bold prediction: That by 2017, all Americans would be fitted with a radio frequency identifier (RFID) chip so that all of us could be tracked by the government in real time (except for the elites doing the tracking, of course). That prediction doesn’t appear to have come true—and with Hillary Clinton soundly defeated Nov. 8, it doesn’t look like it will happen anytime soon.

But what if it did? What if somehow some of us began to be “chipped,” sold to us as a way to ‘enhance public safety’ (which is always the excuse government uses to take away our rights and freedoms)?

Don’t look now, but it just happened.

The government will decide who is ‘mentally unfit’ and must be tracked

As noted by the Daily Caller, in recent days the U.S. House of Representatives “overwhelmingly” passed a bill that would require the U.S. attorney general to provide grants to local law enforcement agencies so they can create, establish and operate “locative tracking technology programs.”

In other words, the legislation—known as Kevin and Avonte’s Law—makes it “legal” for police to track certain U.S. citizens, despite the fact that their privacy is guaranteed by the Constitution’s Fourth Amendment.

The program, which many have likened to the opening of a Pandora’s Box of wider tracking in the future, gives local police the authority to use technology to locate “individuals with forms of dementia, such as Alzheimer’s disease, or children with developmental disabilities, such as autism, who have wandered from safe environments.”

Advocates of the legislation, including Rep. Sheila Jackson Lee, D-Texas, and Rep. Chris Smith, R-N.J., say the measure can help police intervene to avert tragedies through the use of location technology before the mentally disabled wander into trouble. But opponents, like Rep. Louie Gohmert, R-Texas, see it as a way for government to broadly interpret how it uses the technology.

“While this initiative may have noble intentions, ‘small and temporary’ programs in the name of safety and security often evolve into permanent and enlarged bureaucracies that infringe on the American people’s freedoms,” he said. That is exactly what we have here. A safety problem exists for people with Alzheimer’s, autism and other mental health issues, so the fix, we are told, is to have the Department of Justice start a tracking program so we can use some device or method to track these individuals 24/7.”

Later, Gohmert said the bill’s sponsors implore lawmakers and the American people not to worry because it has language saying that any tracking device cannot be invasive and is totally voluntary.

What’s to stop some future authoritarian from widening a tracking program?

But he added that he was confused as to why Republican majorities in both chambers of Congress—the party historically at odds with big government and the massive federal bureaucracy—would be taken in and fooled into approving yet another massive, invasive government program.

He was also astounded that the GOP-controlled Congress would allow the tracking of people with “developmental disabilities”—a term that could have very broad applications—but not approve any tracking of illegal aliens, criminals and other malcontents.

Therein lies the rub: Who gets to define “mentally incapacitated?” And is that description only limited to persons who have been medically, clinically diagnosed with a “mental” problem?

Because in the recent past, Left-wing activists, politicians and academics have accused alternative media types of being mentally deranged and “propagandists.” Should alternative media journalists be tracked, for the public’s safety?

It’s not that farfetched anymore to think that could happen someday, especially when a “program” establishing ‘official’ tracking of ‘certain’ persons has already been implemented.

Sources:

TrueActivist.com

DailyCaller.com

AnotherDayInTheEmpire.com

]]>
/cyberwar/2017-01-09-independent-journalists-will-be-forcible-micro-chipped-by-government-after-being-labeled-with-a-mental-disorder-for-not-believing-propaganda/feed 0
Amazon Echo devices spy on you in your own home… police are now trying to acquire those recordings /cyberwar/2017-01-09-police-are-tapping-amazon-echo-devices-to-function-as-spies-in-your-own-home /cyberwar/2017-01-09-police-are-tapping-amazon-echo-devices-to-function-as-spies-in-your-own-home#respond Wed, 30 Nov -0001 00:00:00 +0000 http://162.244.66.231/cyberwar/2017-01-09-police-are-tapping-amazon-echo-devices-to-function-as-spies-in-your-own-home Well, it sure didn’t take long for the authorities to find yet another way to use technology—specifically “the Internet of things”—to violate our constitutional right to privacy.

As reported by EnGadget, police in Arkansas want to know if one of Amazon’s Echo devices, which are constantly connected to the Internet and listening for the sound of voice commands and questions, might have overheard something that can help them solve a murder case.

Only, they will have to get a court—or Amazon, voluntarily—to allow them access to loads of information in addition to whatever the device might have “overheard” and, thus, stored.

The report said that police in Bentonville, home to retail giant Walmart, have issued a warrant to Amazon, ordering the company to turn over any audio or other records from an Echo that belongs to James Andrew Bates; he is set to go to trial for first-degree murder for the death of Victor Collins next year.

So far, Amazon has declined to give police specifics on the information that the Bates Echo device logged on its servers, but the company has turned over information regarding Bates’ account info and purchases. And cops say they’ve managed to pull data off of the speaker, though it is not clear what they were able to access.

Always on, always ‘listening’ and tracking and recording…

Because the device is always “on” and connected to the Internet, police say they are looking for any audio that the speaker may have picked up the night of the alleged murder. Though the device is activated by keywords, it is not uncommon for the IoT gadget to be alerted to listen in by accident.

Or, maybe, even by design.

Police said that Bates had a number of other smart home devices, including a water meter, which showed that 140 gallons of water had been used between 1 a.m. and 3 a.m. the night Collins was found dead in Bates’ hot tub. And who says there is nothing invasive about smart meters?

Anyway, investigators have theorized that Bates used the water to wash away evidence of what happened on his patio. But retrieving the data from the smart meter and request for additional data from the Echo is raising major issues about privacy, which seems to be all but gone in the Digital Age.

Frankly, at a time when there are any number of devices tracking and automating our habits—at home, at work, in public—should that data be available for the taking by law enforcement for use in criminal cases? Some, especially the government, believes it should be; but privacy experts and civil libertarians think that any information not immediately pertinent to such investigations should remain off-limits, as the founders intended.

Look for more attempts in the future by police and federal authorities to get their hands on as much of our personal information as possible.

J.D. Heyes is a senior writer for Natural News and News Target, as well as editor of The National Sentinel.

Sources:

EnGadget.com

NaturalNews.com

]]>
/cyberwar/2017-01-09-police-are-tapping-amazon-echo-devices-to-function-as-spies-in-your-own-home/feed 0
Google gives driverless cars the green light for business, but are we really ready for AI piloted vehicles on our roads? /cyberwar/2017-01-08-google-gives-driverless-cars-the-greenlight-for-business-but-are-we-really-ready-for-them /cyberwar/2017-01-08-google-gives-driverless-cars-the-greenlight-for-business-but-are-we-really-ready-for-them#respond Wed, 30 Nov -0001 00:00:00 +0000 http://162.244.66.231/cyberwar/2017-01-08-google-gives-driverless-cars-the-greenlight-for-business-but-are-we-really-ready-for-them It all sounds so futuristic and exciting, this concept of driverless cars, but the reality is, our society may not be nearly as ready for it as other people in other lands may be. That’s because if there is one thing Americans are infatuated with, it is the automobile.

And yet, the technology is here and it is getting better every year. So we may have little choice about whether or not we want our vehicle to do the driving for us in the near future.

Indeed, the technology has even advanced to the point where media and technology giant Google has given them a “greenlight” for business, The New York Times reported recently.

Google’s parent company, Alphabet, announced earlier this month that driverless technology was ready to be commercialized. The company said it would be spinning off the autonomous vehicle technology from its research lab X and will be opening a stand-alone company under the name of Waymo.

But are we ready for this technology?

We don’t know what we don’t know about this technology

For the past 10 years, the Times noted, several industries including car makers, technology, telecom and e-commerce have been feeding and stoking the public’s increasing desire to live in a wireless world. During that time tech companies have been working at a breakneck pace to bring the telephone and Internet into the driving environment. That’s largely been a success; hands-free Bluetooth technology allows drivers to answer the phone without letting go of the wheel and talk in a less distracting way, while emergency roadside and location services have led to advances in that realm.

But the thing is, this rapidly advancing meld of Internet and automobile has never been voted on by the general public nor debated much in Congress or state legislatures along the way. And even when the Senate Committee on Commerce, Science and Transportation brought in industry leaders to the nation’s capital in the spring for a hearing, lawmakers basically wanted to hear how government could assist in the ushering in of the new driverless technology.

It appeared as though the committee’s assumption was that the outcome had already been decided—the world would have to accept it as the [emerging] new normal.

Now, precisely what are the selling points of driverless technology? The usual—reduction in accidents, lives saved, congestion eased, energy consumption declines, less harmful emissions, none of which there exists any evidence, only supposition and baseless claims. And how having no driver will cut emissions and ease congestion, of course, makes no sense whatsoever, given that the same vehicles will be on the road, just without a human driver.

So, even if there is stipulation that at least some of those claims pan out, “the near- and midterm picture from a public-interest perspective is not the same favorable one that industry sees,” the Times noted. “Legitimate areas of question and concern remain.”

What will happen to all those jobs involving driving a vehicle?

For one, what about the proposed “safety” benefits of self-driving cars and trucks that says we’ll avoid tens of thousands of highway accidents and deaths each year—is that valid? Who knows? There, of course, is no legitimate data on that at all, so to make the claim that “driver deaths will decrease” is blatantly absurd and nonsensical. Can’t even use anecdotal evidence to support such a claim, because it doesn’t exist. So that’s misleading at best.

Plus, the kind of accidents we may see with self-driving cars may be different; they could be much more horrific, and lead to greater loss of life. We just don’t know. What we can surmise, however, is that a lot of people traveling at high speed trying to get to the same place is going to result in accidents, even if no human is actually doing the driving.

Another aspect of creating driverless cars is the “human” aspect, so to speak. Yes, the driverless car industry will create jobs, but it will also destroy jobs—millions of them. Cab drivers will go the way of the dodo bird, along with new start-ups like Uber. What about truck drivers? A thing of the past. And because of the hit employment will take, that could lead to fewer people buying fewer cars altogether, which will result in even less employment.

There are a lot of things to consider shifting to a driverless automobile that, frankly, the country has yet to consider and debate through their elected representatives. Before we “green light” this technology, we sure ought to have a much more thorough discussion about it.

J.D. Heyes is a senior writer for Natural News and News Target, as well as editor of The National Sentinel.

Sources:

NYTimes.com

C-Span.org

]]>
/cyberwar/2017-01-08-google-gives-driverless-cars-the-greenlight-for-business-but-are-we-really-ready-for-them/feed 0
ARS Technica: White House fails to make case that Russian hacking tampered with election /cyberwar/2017-01-07-ars-technica-white-house-fails-to-make-case-that-russian-hacking-tampered-with-election /cyberwar/2017-01-07-ars-technica-white-house-fails-to-make-case-that-russian-hacking-tampered-with-election#respond Wed, 30 Nov -0001 00:00:00 +0000 http://162.244.66.231/cyberwar/2017-01-07-ars-technica-white-house-fails-to-make-case-that-russian-hacking-tampered-with-election Dan Goodin of Ars Technica writes that the DHS-FBI report on Russian hacking in 2016 “provides almost no new evidence to support the Obama Administration’s claims Russia attempted to interfere with the US electoral process.”

(Article by Breitbart News, republished from breitbart.com)

From Ars Technica:

Talk about disappointments. The US government’s much-anticipated analysis of Russian-sponsored hacking operations provides almost none of the promised evidence linking them to breaches that the Obama administration claims were orchestrated in an attempt to interfere with the 2016 presidential election.

The 13-page report, which was jointly published Thursday by the Department of Homeland Security and the FBI, billed itself as an indictment of sorts that would finally lay out the intelligence community’s case that Russian government operatives carried out hacks on the Democratic National Committee, the Democratic Congressional Campaign Committee, and Clinton Campaign Chief John Podesta and leaked much of the resulting material. While security companies in the private sector have said for months the hacking campaign was the work of people working for the Russian government, anonymous people tied to the leaks have claimed they are lone wolves. Many independent security experts said there was little way to know the true origins of the attacks.

Sadly, the JAR, as the Joint Analysis Report is called, does little to end the debate. Instead of providing smoking guns that the Russian government was behind specific hacks, it largely restates previous private-sector claims without providing any support for their validity. Even worse, it provides an effective bait and switch by promising newly declassified intelligence into Russian hackers’ “tradecraft and techniques” and instead delivering generic methods carried out by just about all state-sponsored hacking groups.

Read more at: breitbart.com

]]>
/cyberwar/2017-01-07-ars-technica-white-house-fails-to-make-case-that-russian-hacking-tampered-with-election/feed 0
Tour de FARCE: US Intel report on Russian “interference” a hilarious parade of paranoia politics… zero evidence… just rehashed delusional conspiracy theories /cyberwar/2017-01-06-tour-de-farce-us-intel-report-on-russian-interference-a-hilarious-parade-of-paranoia-politics-rehashed-delusional-conspiracy-theories /cyberwar/2017-01-06-tour-de-farce-us-intel-report-on-russian-interference-a-hilarious-parade-of-paranoia-politics-rehashed-delusional-conspiracy-theories#respond Wed, 30 Nov -0001 00:00:00 +0000 http://162.244.66.231/cyberwar/2017-01-06-tour-de-farce-us-intel-report-on-russian-interference-a-hilarious-parade-of-paranoia-politics-rehashed-delusional-conspiracy-theories We really have reached the point where everything that’s run by the political left has devolved into a parade of delusional paranoia. Whether it’s man-made “climate change,” the purely imagined “KKK hate crimes” epidemic, or the hilarious delusional conspiracy theory about Russians “hacking the election,” everything the left has come up with in recent memory is rooted in sheer fiction (if not slobbering mental illness).

The latest laughable attempt at creating a Russian boogeyman to scare all the little leftist snowflake children has arrived in the form of a US intel report released Friday. Titled, “Assessing Russian Activities and Intentions in Recent US Elections,” the report is so laughably devoid of a single shred of credible evidence that actual journalists all across the world are rolling on the floor with hysterical laughter.

“Every time IC repackages its same assertions in a new form, media acts like it’s been proven, even though it – again – includes no evidence,” Tweeted one of the few remaining independent journalists on the planet, Glenn Greenwald.

In another tweet, Greenwald followed up with, “It’s shocking how much this report was hyped and how literally no effort was made to include *any* evidence at all.”

In response, left-wing trolls on Twitter accused Greenwald himself of “working for the Russians.” (That’s now the excuse the everything the left doesn’t like. Must be the Russians!)

A circle jerk of rehashed left-wing paranoia

In essence, a tiny number of Obama puppets inside the CIA and FBI just “made s##t up” and then tried to pass it off as legitimate intelligence. The laughably hysterical document — widely and blindly repeated everywhere in the obedient but mindless left-wing media — is nothing more than a circle jerk rehash of delusional conspiracy theories.

Notably, there isn’t a single piece of actual evidence found in the entire report.

The report spends much of its time covering RT, a media organization funded by the Kremlin: “RT’s coverage of Secretary Clinton throughout the US presidential campaign was consistently negative and focused on her leaked e-mails and accused her of corruption, poor physical and mental health, and ties to Islamic extremism,” says the report.

In other words, anyone who was critical of Hillary Clinton was obviously working with the Russians, right? Never mind that she was an unlikable, deeply corrupt, criminal-minded mob boss with an obvious neurological disorder who pre-sold the White House to foreign interests.

Opponents of fracking are also working for the Russians, you see

It gets even better. The report also implies that environmentalists and opponents of fracking are working for the Russians, too. (Yes, I know. It’s just beyond hilarious.)

“RT runs anti-fracking programming, highlighting environmental issues and the impacts on public health.”

Noooooo! Say it isn’t so! You mean to tell me that people who are concerned about the environmental impact of fracking are really working for the Russians? For the record, that’s about 90% of all leftists, by the way. Apparently, not only are all the people on the right working for the Russians (because they hate Hillary), but also all the people on the left are working for the Russians, too (because they hate fracking).

According to the CIA, then, everyone is working for the Russians. Except, not Hillary Clinton, we’re told, even though she was the U.S. Secretary of State who approved the Russian takeover of U.S. strategic uranium mines… a convenient fact the lying left-wing media refuses to report.

A Tour de Farce of intelligence bullsh#ttery

If you can stop laughing, consider the fact that the left-wing media takes this bogus intelligence report as “fact” even though it is completely devoid of any evidence. The entire thing is nothing more than Obama sycophants ginning up scary bedtime stories to tell each other, then labeling it all “intelligence.”

In truth, there’s no intelligence to be found in the report at all. It’s so devoid of facts, evidence and sources — but rife with opinions, conclusions and “analysis” of opinions — that the whole thing should probably be renamed Tour de Farce: The CIA’s Drug-Induced Assessment of Make-Believe Threats to the Kingdom of F##ktardia.

In conclusion, the report wildly discredits the CIA, FBI and NSA with its cringe-worthy (and obviously politically biased) “analysis” that reads more like twisted, drug-induced paranoid delusions than meaningful intelligence. The very first thing President Trump should do after being sworn in, obviously, is to drain the swamp at the CIA and remove every single analyst churning out this paranoid hogwash.

]]>
/cyberwar/2017-01-06-tour-de-farce-us-intel-report-on-russian-interference-a-hilarious-parade-of-paranoia-politics-rehashed-delusional-conspiracy-theories/feed 0
Former Clinton Foundation CEO missing since October 2016 – #WheresEric internet chatter reaches a fevered pitch /cyberwar/2017-01-05-former-clinton-foundation-ceo-missing-since-october-2016-whereseric-internet-chatter-reaches-a-fevered-pitch /cyberwar/2017-01-05-former-clinton-foundation-ceo-missing-since-october-2016-whereseric-internet-chatter-reaches-a-fevered-pitch#respond Wed, 30 Nov -0001 00:00:00 +0000 http://162.244.66.231/cyberwar/2017-01-05-former-clinton-foundation-ceo-missing-since-october-2016-whereseric-internet-chatter-reaches-a-fevered-pitch Former Clinton Foundation CEO, Eric Braverman, was hired in July 2013, supposedly backed by Chelsea Clinton to “impose McKinsey-like management rigor,” to the foundation. The foundation board approved a $395,000 salary, plus bonuses, then voted to extend his term through 2017. Weeks after that vote to extend his board term, Braverman abruptly quit in January 2015.

(Article by Sudan Duclos, republished from allnewspipeline.com)

According to a Politico article about Braverman from March 2015, “his exit stemmed partly from a power struggle inside the foundation between and among the coterie of Clinton loyalists who have surrounded the former president for decades and who helped start and run the foundation.”

Six days after that Politico story was published and about two months after Braverman resigned, Joe Scarborough, host of Morning Joe on MSNBC, tweeted “A source close to the Clintons tell @ron_fournier to “follow the money” and find the real HRC scandal.”

According to leaked emails published by Wikileaks from the Podesta emails, Center for American Progress President Neera Tanden emailed Clinton campaign chairman John Podesta “@JoeNBC: A source close to the Clintons tell @ron_fournier to “follow the money” and find the real HRC scandal. http://t.co/lPTQY0L0o4 – I’m hoping someone is keeping tabs on Doug Band. Quote in here is from someone who worked in Clinton Foundation.”

Podesta responded with one name “Eric Braverman.” To which Tanden replied “Holy Moses.”

That same month is when the news of Clinton’s private email server broke nationally, became major headline news.

Wikileaks published those emails during the height of the election season, in October 2016, around the same time that Eric Braverman disappeared from public view. His last public activity can be traced to an October 12, 2016 retweet. A look at his Twitter history shows he was wasn’t very active, as the one before that was on August 3rd and before that, one in June.

Is it a coincidence that Braverman cannot be contacted in any manner, from emails sent to him and to Yale University, where he is still listed for Spring 2017 classes in the School of Management and the law school, all not responded to?

Rachel Alexander from Stream, writes the following: “I left a voicemail on Braverman’s personal phone and sent him an email, but received no response. He is still listed as a lecturer at Yale University and, contrary to some reports, there is a record of his lectures going back several years. I contacted the press office and Braverman’s department at Yale and received no response.”

ANP has also attempted to reach out to Braverman as well as contacts connected to him, to no avail.

Videographer George Webb, who runs a popular YouTube channel has been tracking Braverman’s disappearance, providing daily feature video updates, and believes Braverman officially went missing 12 days after his last tweet, on October 24, 2016, which was just two days after Wikileaks published the Podesta email where it became public knowledge that Podesta suspected Braverman of being behind the “follow the money and find the real HRC scandal,” scoop given to Ron Fournier.”

Internet chatter and conspiracy theories have surrounded Braverman’s disappearance from the public, originating with a rumor that he had sought asylum from Russia, but due to his intimate knowledge of the inner workings of the Clinton Foundation, in conjunction with the fact that five FBI bureaus across the country, in New York, Little Rock, Washington, D.C., Los Angeles and Miami , are all involved in a massive probe of the Clinton Foundation, it is more likely that Braverman is in protective custody as witness to the crimes he uncovered during his tenure at the Clinton Foundation, since no official missing persons report has been filed on him.

In November 2016, Brett Bauer from Fox News reporters that FBI sources believed the Clinton Foundation case was moving towards “likely an indictment.”

Transcript via Real Clear Politics:

BRET BAIER: Breaking news tonight — two separate sources with intimate knowledge of the FBI investigations into the Clinton emails and the Clinton Foundation tell Fox the following:

The investigation looking into possible pay-for-play interaction between Secretary of State Hillary Clinton and the Foundation has been going on for more than a year. Led by the white collar crime division, public corruption branch of the criminal investigative division of the FBI.

The Clinton Foundation investigation is a, quote, “very high priority.” Agents have interviewed and reinterviewed multiple people about the Foundation case, and even before the WikiLeaks dumps, agents say they have collected a great deal of evidence. Pressed on that, one sources said, quote, “a lot of it,” and “there is an avalanche of new information coming every day.”

Some of it from WikiLeaks, some of it from new emails. The agents are actively and aggressively pursuing this case. They will be going back to interview the same people again, some for the third time.

As a result of the limited immunity deals to top aides, including Cheryl Mills and Heather Samuelson, the Justice Department had tentatively agreed that the FBI would destroy those laptops after a narrow review. We are told definitively that has not happened. Those devices are currently in the FBI field office here in Washington, D.C. and are being exploited.

The source points out that any immunity deal is null and void if any subject lied at any point in the investigation.

 

Another interesting point that we would remiss to ignore is how it became public knowledge that immunity deals had been offered to Clinton aides, regarding the investigations, not one peep from the FBI, nor the mainstream media, has mentioned any such “deal” for Braverman, a man who held the CEO position for the Foundation for over a year, and would be far more knowledgeable about any crimes committed by the Clinton Foundation.

#WheresEric has now been created as a hashtag on Twitter and depending on whether we go from the October 12 retweet by Braverman or the videographer’s date of October 24th, he has now been missing anywhere from 70 to 82 days.

BOTTOM LINE

It all comes back to the “follow the money to find the real HRC scandal,” because the private server use, the internal corruption and collusion by the DNC and the Clinton campaign, and the mainstream media, makes for good headlines, but when you follow the money, all roads lead back to the Clinton Foundation, under investigations by multiple FBI bureaus, and the man that has been missing for well over two months was in a position to know all of their dirty secrets.

Since the initial questions about Braverman’s disappearance from the public eye started months ago, all it would take is one public statement, one returned email, one video, for Braverman to dispel all theories, rumors and talk of his disappearance, yet not one word has come from him or anyone that knows him. No public statements saying he is alive and well. ….. nothing.

The silence is deafening, and troublesome.

XMyqbnX

Read more at: allnewspipeline.com

]]>
/cyberwar/2017-01-05-former-clinton-foundation-ceo-missing-since-october-2016-whereseric-internet-chatter-reaches-a-fevered-pitch/feed 0
Woman allergic to WiFi and cell phone signals now permanently housebound /cyberwar/2017-01-05-woman-allergic-to-wifi-and-cell-phone-signals-now-permanently-housebound /cyberwar/2017-01-05-woman-allergic-to-wifi-and-cell-phone-signals-now-permanently-housebound#respond Wed, 30 Nov -0001 00:00:00 +0000 http://162.244.66.231/cyberwar/2017-01-05-woman-allergic-to-wifi-and-cell-phone-signals-now-permanently-housebound A British woman has a case of electromagnetic hypersensitivity (EH) so severe that she has had to relocate twice to new parts of the country, and even now cannot leave her house without wearing a shielded bed net.

Kim De’Atta says her condition has been severely socially isolating.

“Most of the time people think I am mad. It is so difficult because people are not feeling it themselves,” she said. “I have not seen friends and family for so long. I have had two visitors for half a day each this year. It’s heart-breaking really.”

Like a laser to the brain

De’Atta is a growing number of what have been dubbed EMF refugees, or people with EH so severe that they are forced to move to increasingly remote areas in search of places not swamped by wireless signals from WiFi, cell phone towers and smart meters.

Although EH is not a diagnosis accepted by mainstream medical science, a growing number of doctors use the term to describe a variety of health conditions connected by greater-than-average sensitivity to electromagnetic fields generated by electric devices. The stronger the signal generated, the stronger people’s reaction tends to be. EH is also known by a number of other names, including electrical sensitivity (ES), microwave or radiation sickness, and EMF injured.

According to the EMF Safety Network, symptoms of EH include headaches, fatigue, sleep problems, nausea, ringing ears, rashes, disruption to memory and concentration, immune dysfunction, heart palpitations, joint pain, facial swelling, eye problems and cancer.

De’Atta’s own symptoms include migraines, fatigue and increased susceptibility to infection. She first became aware of her problem at age 16, when she realized that she felt sick when she sat near televisions. Several years later, she got her first cell phone to be on call while working as an intensive care nurse.

“The first time I put it up to my head it was like a laser going into my brain,” she said.  “Every time I put it up to my head I got the pain.”

“After that I was finding I was getting more and more fatigued and my immune system was getting knocked meaning I was getting infections.”

Trapped in her home

After learning more about EH, De’Atta decided to try moving to Glastonbury, a town with little in the way of cell phone towers or other high-emitters of EMF. But a few years later, a cell phone tower was installed in the town center. She began feeling sick again immediately.

“I now realize my health started to deteriorate from that point and I started to experience migraines, fatigue and infections,” she said.

The problem intensified when a 3G signal was installed to continually blanket the whole town. De’Atta started suffering from breathlessness and heart palpitations.

“My head felt like it was going to implode and explode at the same time,” she said. “I was also getting breathlessness, heart palpitations and lower back pain. I had started to suffer from serious ear aches and was becoming really sensitive to light.”

So she moved again, this time to Chard, Somerset.

A period of intense seclusion followed, in which she had almost no face-to-face contact with her loved ones.

“I had not seen my closest aunt for ten years and she didn’t really understand why,” she said. “We were so close before. I could not bear it anymore and she was 91 at the time. I had to wear my shielded bed net over my head and you can imagine I got some funny looks on the bus.”

“It was so tough for me but I’m pleased I did it because she died the next year and if I hadn’t seen her I would never have forgiven myself.”

Sources:

Metro.co.uk

NaturalNews.com

EMFSafetyNetwork.org

]]>
/cyberwar/2017-01-05-woman-allergic-to-wifi-and-cell-phone-signals-now-permanently-housebound/feed 0