HIGHLY POTENT NEWS THAT MIGHT CHANGE YOUR VIEWS

internet

The Internet Wired Directly Into Your Brain: Neural Interfaces [video]

Mark Dice
January 1, 2013

The plan is to have the internet wired directly into your brain and offer humans the ability to be trans-humanist cybernetic Gods.

http://www.Facebook.com/MarkDice
http://www.Twitter.com/MarkDice

Check out The Illuminati: Facts & Fiction in paperback on Amazon.com, or e-book on Kindle, iBooks, Nook, or Google Play. http://www.amazon.com/Illuminati-Facts-Fiction-Mark-Dice/dp/0967346657/ref=sr…


Jailed for Tweet: Activist given 2 yrs for ‘criticizing’ Kuwait ruler [video]

Russia Today
January 8, 2013

A Kuwaiti court has sentenced a youth activist for allegedly defaming the country’s ruling emir on Twitter. The opposition tweeter is the second person to fall foul of a recent government crackdown on social networking sites in Kuwait. READ MORE: http://on.rt.com/6siif3

RT LIVE http://rt.com/on-air

Subscribe to RT! http://www.youtube.com/subscription_center?add_user=RussiaToday

Like us on Facebook http://www.facebook.com/RTnews
Follow us on Twitter http://twitter.com/RT_com
Follow us on Google+ http://plus.google.com/+RT


How to Evade Government Surveillance and Stay Anonymous Online

by Chris Dougherty, Contributor
Activist Post
January 4, 2013

Why stay anonymous online? In today’s society there are people and automated devices that are recording your deepest, most private thoughts and activities. Each day we voluntarily divulge the most intimate details of our lives through social networking accounts, email, banking apps, online games and more. In addition, governments and corporations can censor and block our traffic based on whatever standards are in place that day.

Government agencies, hackers and sophisticated bot networks are capturing every piece of digital data that we transmit through all of our Internet-connected gadgets. Smartphones, Smart TVs, computers, tablets, and so much more…they are all vulnerable, nothing is safe these days. Even your old clam-shell phone isn’t safe. This is because many phone providers route your calls over media using the Internet Protocol at some point within their network. For example, long distance providers transfer calls over VoIP all the time.

Whether you’re browsing the Web, signing up for a new online game, or simply checking your email, you are constantly leaving tracks and giving away information to anyone with access and the knowledge to analyze the traffic. Once the data is compiled the attacker can build an incredibly accurate profile of not only your online life but your real-world life as well.

I know, most people say, “Why would hackers want to hack into my life? I am not that important.” You have to understand that these “intruders into our lives” are scanning huge blocks of Internet addresses at a time. They don’t care who you are. Your computer is simply another target IP address as they scan through thousands of computers and devices in their search for more information. Once collected they take all the information and funnel it into databases where they can search through it later for high-valued loot.

Don’t believe me? Just read the following two stories about what our own government does:

NSA Utah Data Center Largest Spy Compound Ever – Part 1

NSA Utah Data Center Largest Spy Compound Ever – Part 2

So, the big question is, how can you stay anonymous online? Free from government censorship and potential eavesdropping from some hacker or three-letter government agency that wants to invade your privacy while you use your computer. In comes Whonix, the Anonymous Operating System!

Use Whonix, The Anonymous Operating System, Stay Anonymous Online

Whonix is a free, general purpose computer operating system based on Virtual Box, Linux and Tor. The purpose of Whonix is to allow Internet users the ability to stay anonymous online. This is most beneficial to users in regimes that censor and monitor access to the Internet, but it can also be used by anyone who values their privacy, or doesn’t want their activities tracked online.

By design, IP address leaks are meant to be impossible while using Whonix. The developers claim even malware with admin privileges can’t find the Whonix Workstation’s real IP address or location. This is because Whonix consists of two (virtual) computers. One machine acts as a gateway or router and runs only Tor, a sophisticated anonymity software. This machine is called the Whonix-Gateway. The other machine, which called the Whonix-Workstation, is on a completely isolated network that only allows Internet connections to be routed through the Whonix-Gateway.

Tor, the technology on which Whonix is built, is a free software, along with an open network consisting of thousands of computers located around the world. Together they strive to provide anonymity for individuals accessing the Internet. The Tor Project helps you defend against a form of network surveillance, known as traffic analysis, that threatens everyone’s personal freedom and privacy.

Tor helps to reduce the risks of both simple and advanced traffic analysis by distributing your Internet requests over several places on the Internet, so no single point can link you to your destination. The idea is similar to using a hard-to-follow series of roads while driving in order to throw off somebody who is tailing you.

Whonix automatically sets up an isolated network environment where your virtual “Workstation” can perform all normal Internet related tasks such as checking email, browsing web sites, blogging, connecting to corporate VPNs, etc. However all of that outbound traffic is then routed in such a way that it can only pass through your virtual “Gateway”, which encrypts the packets and sends them over several hops on the TOR network prior to landing at their final destination.

How Whonix Works: Figure 1

Once your traffic leaves the Whonix Gateway it is routed directly through the TOR network. Instead of taking a direct route from source to destination, data packets on the Tor network take a random path through several relays, so no observer at any single point can tell where the data came from or where it’s going. The relays even take additional steps to erase your tracks periodically along the way.

How Whonix Works: Figure 2 – Routing Through TOR

In the event that the Workstation user initiates a request to a new website or Internet resource, the Gateway simply selects an alternate path through the TOR network as seen in Figure 3.

How Whonix Works: Figure 3 – Using An Alternate TOR Path

There is a bit of a caveat to this system, however. As indicated by the red dotted-lines in the images above, the last hop in the TOR network passes the traffic in the clear to the final destination. One of the primary functions of this computer, as an exit node, is to decrypt the data packets before they are passed off to their final destination. This means this exit node could be vulnerable to a man-in-the-middle attack, or it could have even been placed there for the specific purpose of monitoring exit traffic by a hacker or government agency. While the exit node would still have no information regarding the IP address or location of the original Workstation user, it would know the type of Internet request that they sent to the destination server.

This scenario can be averted by using SSH tunnels or a VPN on top of the TOR network. One would only have to install the appropriate software on the Whonix Workstation in order to provide an end-to-end encryption solution for the traffic. Another method to bypass the man-in-the-middle scenario would be to employ the use of TOR Private Bridges or Private Exit Nodes.

It is important to note however that Whonix can be effectively used by most people right out of the box for web browsing, blogging and private conversations.

In order to make use of Whonix you will need to download a free copy of VirtualBox from the link below:

https://www.virtualbox.org/wiki/Downloads

Once VirtualBox has been downloaded and installed you can download the Whonix-Workstation and the Whonix-Gateway packages from SourceForge:

http://sourceforge.net/projects/whonix/files/whonix-0.4.5/

Once downloaded, just import the machine files into VirtualBox as-is and start them up, you don’t need to change any settings…also be sure to start the Whonix-Gateway machine before firing up the Workstation image.

The default login credentials for both virtual machines are as follows:

====================

Username: user
Password: changeme

Username: root
Password: changeme

====================

Once the images have completed the boot process you can login and run the “whonixcheck” command from the CLI (command line interface) in order to verify proper connectivity to the TOR network. The Workstation output should look similar to the following (click image to enlarge):

How Whonix Works: Figure 4 – Workstation output from the “whonixcheck” command.

Be sure to watch for my article in the next few days detailing step-by-step instructions on how to install VirtualBox and Whonix on your computer. Let me know what you think of this anonymity solution in the comments below…

Chris Dougherty is a hacker and online security expert.  Please visit his blog, www.VirtualThreat.com, for more excellent news and information about protecting yourself in cyberspace.


Legalize DDoS? Anonymous lobby White House for right to digitally protest [video]

Russia Today
January 11, 2013

Is temporarily slowing down a website a legal form of protest? Current US law says it isn’t, but hacktivists want the White House to make changes that would force the government to reconsider their witch-hunt against alleged computer criminals. READ MORE: http://on.rt.com/mcqh98

RT LIVE http://rt.com/on-air

Subscribe to RT! http://www.youtube.com/subscription_center?add_user=RussiaToday

Like us on Facebook http://www.facebook.com/RTnews
Follow us on Twitter http://twitter.com/RT_com
Follow us on Google+ http://plus.google.com/+RT


Pakistan blocks YouTube once again [video]

PressTV
January 1, 2013

After almost three months, the YouTube has finally been reopened in Pakistan. But its reopening did not last for a long time. Pakistan Tele-Communication Authority, the official internet regulator, has once again ordered the internet service providers all over the country to block the YouTube.

What has now triggered the new blockage of YouTube is said to be the technical failure by Pakistan’s official filtering system to block the anti-Islam movie that was produced in the United States.

That controversial video caused widespread protests across Pakistan and led to the death of over two dozen people. But critics say this so-called official technical error may not be free of political motives.

Follow our Facebook on: https://www.facebook.com/presstvchannel
Follow our Twitter on: http://twitter.com/presstv


Chinese Hackers Suspected in Cyber Attack on Council on Foreign Relations

Conscious Life News
December 28, 2012

cfr_logoBy  | Free Beacon

Computer hackers traced to China carried out an advanced cyberespionage attack against one of America’s most elite foreign policy web groups – the website of the Council on Foreign Relations (CFR).

According to private computer-security forensic specialists, the hacking incident involved a relatively new type of ploy called a “drive-by” website cyber attack that was detected around 2:00 p.m. on Wednesday.

The specialists, who spoke on condition of anonymity, said the attack involved penetrating the computer server that operates the New York City-based CFR’s website and then using the pirated computer system to attack CFR members and others who visited or “drove by” the site.

The activity ended on Thursday and the specialists believe the attackers either removed their malicious software to prevent further details of the attack from being discovered, or CFR was able to isolate the software and remove it.

The FBI was notified of the attack and is said to be investigating.

FBI spokeswoman Jennifer Shearer declined to comment when asked about the attack. But she told the Washington Free Beacon: “The FBI routinely receives information about threats and takes appropriate steps to investigate those threats.”

However, David Mikhail, a Council on Foreign Relations spokesman, confirmed the attack. “The Council on Foreign Relations’ website security team is aware of the issue and is currently investigating the situation,” Mikhail said in an email. “We are also working to mitigate the possibility for future events of this sort.” He provided no details.

Read the full article


Blogger James MacArthur Denied Bail, Facing Multiple Assault Charges for “Threatening” Tweets

By JG Vibes
theintelhub.com
December 29, 2012

Blogger James MacArthur of the “Baltimore Spectator” has been denied bail again, and could now be facing new assault charges for tweets that he made which were allegedly “threatening to police”.  Apparently now tweeting can legally amount to assault.

All month theintelhub.com has been doing a series of exclusive reports on the story of Frank James MacArthur, founder of the “Baltimore Spectator” activist blog and radio show.

After years of exposing crooked cops and politicians in his community, MacArthur became a target for police aggression, even more so recently because he was beginning to publicize information that would cost a few people high up in local government their jobs and reputations.

In early December, MacArthur was the victim of an elaborate kidnapping where dozens of armed SWAT team members were sent by the state to coax him out of his house and snatch him up so he could be taken to the Baltimore City dungeons, where he remains today.

Today the Baltimore Sun reported that:

“A Baltimore circuit judge denied another bail request Friday for the blogger who held a publicized standoff with city police this month that was broadcast live to thousands of listeners.  Judge Lynn K. Stewart said Frank James MacArthur, also known locally as the Baltimore Spectator, posed a continuing threat to public safety and should remain jailed without bail.

It was the third time that MacArthur, 37, who lives in the Waverly neighborhood, has been denied bail.  MacArthur’s attorney, Jill P. Carter, called the revocation a knee-jerk overreaction when many other suspects facing similar charges are often offered bail.  MacArthur faces two weapons charges: illegal possession of a firearm and possessing an unregistered shotgun. He has no felony convictions, Carter pointed out.”

Carter, his attorney, said that “It’s a charge that doesn’t warrant his being held without bail.  His history doesn’t indicate he’s a threat to public safety.”

In addition to the phoney gun charges that have already been thrown against him, prosecutors are also now talking about bringing up assault charges over tweets made during and prior to the standoff which were apparently “threatening to police”.

The article goes on to say that:

“Prosecutors said in court Friday that they plan to file second-degree assault charges against MacArthur for the alleged threats he made against officers attempting to execute an arrest warrant on Dec. 1.  Mark Cheshire, a spokesman for the state’s attorney’s office, said later that the number of charges will correlate with the number of officers MacArthur allegedly threatened; prosecutors did not have a specific number Friday.”

It is obvious that he has been targeted because of his activism and his outspoken attitude towards authority.

He has been relentless on issues of police brutality and legal oppression, and has probobly been an annoyance to the department for years.

*****

Read more articles by this author HERE.

J.G. Vibes is the author of an 87 chapter counter culture textbook called Alchemy of the Modern Renaissance, a staff writer and reporter for The Intel Hub and host of a show called Voluntary Hippie Radio. 

You can keep up with his work, which includes free podcasts, free e-books & free audiobooks at his website www.aotmr.com

Related Articles and Interesting Reports