*** An updated report on our fund raising. We wish to thank everyone who contributed to meeting our deficit goals this month for the first when they are due. We are most grateful for the responses to our call for aid. Unlike any other month in the past, we now have legal fees in fighting what Fritz Springmeier experienced on going to jail on bogus charges. He eventually got out, but the damage to anyone going through this is horrific and the powers that be know this... its why they do it to silence those who try to get the truth out.
We find ourselves in the same situation after reposting all his great research and under a similar threat on bogus charges. So we need help for the attorney now, anywhere from $500 for the retainer to more for the trial. I won't know whether I will need more until after the next hearing. So for now we are asking for help at the retainer level only since we are going to fight any charges and hopefully will not have to go to trial. With a lot of good energy and prayers I am certain we will be able to remove the need for more. If you feel you would like to help us out on this, please donate at the pay pal button on the right side of the blog at the top. We thank you so much for your much needed support. Fortunately this is not an ongoing expense, we hope. LOL
http://www.pakalertpress.com/2012/05/30/new-big-brother-cyber-weapon-can-turn-on-your-computers-microphone-take-screen-shots-copy-data-record-communications/
By: Mac Slavo
Date: 2012-05-30
To the disbelief of many of our readers, in a 2011 report titled Everything You Do Is Monitored,
we noted that microphones and cameras on cell phones and computers
allow interested parties (translated to mean your respective government - VN: run by a foreign nation that does it to their own people, so of course they would think nothing of doing it to those they perceive as cattle in another country such as ours)
to hear and see everything going on in the direct vicinity of the
device without the knowledge of its owner.
That these monitoring features are available on cell phones was a known fact, as FBI surveillance
networks already have the ability to turn on any cell phone microphone
or camera remotely without tipping off the user. It’s believed that this
surveillance
technique can work even when the cell phone user has shut down their
phone, with the only surefire way to prevent such surveillance being
removal of the unit’s battery.
Computers, however, were believed to be
secure from these kinds of backdoors, and the majority of computer users
believe their PC’s are protected from such intrusive technologies once they install virus and malware protection software.
However, a new virus identified by
leading digital security firm Kaspersky Lab, is reportedly capable of
not only embedding itself onto computer systems without being identified
by traditional anti-virus applications, but able to execute total
surveillance and monitoring that includes turning on your camera and
microphone, copying your data, and recording emails and chat
conversations.
Evidence suggest that the virus, dubbed Flame, may have been built on behalf of the same nation or nations that commissioned the Stuxnet worm that attacked Iran’s nuclear program in 2010, according to Kaspersky Lab, the Russian cyber security software maker that took credit for discovering the infections.
Kaspersky researchers said they have yet to determine whether Flame had a specific mission like Stuxnet, and declined to say who they think built it.
Cyber security experts said the discovery publicly demonstrates what experts privy to classified information have long known: that nations have been using pieces of malicious computer code as weapons to promote their security interests for several years.
…
Symantec Security Response manager Vikram Thakur said that his company’s experts believed there was a “high” probability that Flame was among the most complex pieces of malicious software ever discovered.
…
Kaspersky’s research shows the largest number of infected machines are in Iran, followed by Israel and the Palestinian territories, then Sudan and Syria.
The virus contains about 20 times as much code as Stuxnet, which caused centrifuges to fail at the Iranian enrichment facility it attacked. It has about 100 times as much code as a typical virus designed to steal financial information, said Kaspersky Lab senior researcher Roel Schouwenberg.
Flame can gather data files, remotely change settings on computers, turn on PC microphones to record conversations, take screen shots and log instant messaging chats.
Kaspersky Lab said Flame and Stuxnet appear to infect machines by exploiting the same flaw in the Windows operating system and that both viruses employ a similar way of spreading.
…
“The scary thing for me is: if this is what they were capable of five years ago, I can only think what they are developing now,” Mohan Koo, managing director of British-based Dtex Systems cyber security company.
Source: Reuters
With a new National Security Agency data center coming online and capable of capturing, aggregating and analyzing every digital communication in the United States,
cellphones and computers having in excess of 99% penetration across the
country, and some 30,000 drones being prepared for domestic
operations, we can safely say that a total police state surveillance infrastructure is now in place and fully capable of monitoring everything - and we mean EVERYTHING – that you do.
The Matrix has you…
The article is reproduced in accordance with Section 107 of title 17 of the Copyright Law of the United States relating to fair-use and is for the purposes of criticism, comment, news reporting, teaching, scholarship, and research.
No comments:
Post a Comment
Vatic Clerk Tips: After 7 days, all comments to an article go into the moderation queue for approval which happens at least once a day. Please be patient.
Be respectful in your comments, keeping in mind that these discussions will become the Zeitgeist of our time that future database archeologists will discover. Make your comments worthy and on the founding father's level in their respectfulness, reasoning, and sound argumentation. Prove we weren't all idiots in our day and age. Comments that advocate sedition or violence are not encouraged. Racist, ad hominem, and troll-baiting comments might never see the light of day.