Showing posts with label Internet worm. Show all posts
Showing posts with label Internet worm. Show all posts

Thursday, September 5, 2024

Song of the Summer: "Apt." (Rose & Bruno)


Apt. (song) LYRICS:

[Intro: ROSÉ]
채영이가 좋아하는 랜덤 게임
랜덤 게임
Game start!

[Chorus: ROSÉ]
아파트, 아파트
아파트, 아파트
아파트, 아파트
Uh, uh-huh, uh-huh
아파트, 아파트
아파트, 아파트
아파트, 아파트
Uh, uh-huh, uh-huh

[Verse 1: ROSÉ]
Kissy face, kissy face
Sent to your phone, but
I'm tryna kiss your lips for real (Uh-huh, uh-huh)
Red hearts, red hearts
That's what I'm on, yeah
Come give me somethin' I can feel, oh-oh, oh

[Pre-Chorus: ROSÉ]
Don't you want me like I want you, baby?
Don't you need me like I need you now?
Sleep tomorrow, but tonight, go crazy
All you gotta do is just meet me at the
See pop shows near Los Angeles
Get tickets as low as $38

You might also like
drinks or coffee
ROSÉ
gameboy
ROSÉ
Mantra
JENNIE

[Chorus: ROSÉ]
아파트, 아파트
아파트, 아파트
아파트, 아파트
Uh, uh-huh, uh-huh
아파트, 아파트
아파트, 아파트
아파트, 아파트
Uh, uh-huh, uh-huh

[Verse 2: Bruno Mars, Bruno Mars & ROSÉ]
It's whatever (Whatever), it's whatever (Whatever)
It's whatever (Whatever) you like (Woo)
Turn this 아파트 into a club (Uh-huh, uh-huh)
I'm talkin' drink, dance, smoke, freak, party all night (Come on)
건배, 건배, girl, what's up? Oh-oh, oh

[Pre-Chorus: Bruno Mars & ROSÉ]
Don't you want me like I want you, baby?
Don't you need me like I need you now?
Sleep tomorrow, but tonight, go crazy
All you gotta do is just meet me at the

[Chorus: ROSÉ & Bruno Mars]
아파트, 아파트
아파트, 아파트
아파트, 아파트
Uh, uh-huh, uh-huh
아파트, 아파트
아파트, 아파트
아파트, 아파트
Uh, uh-huh, uh-huh


[Bridge: ROSÉ, ROSÉ & Bruno Mars]
Hey, so now you know the game
Are you ready?
'Cause I'm comin' to get ya, get ya, get ya
Hold on, hold on
I'm on my way
Yeah, yeah, yeah-yeah, yeah
I'm on my way
Hold on, hold on
I'm on my way
Yeah, yeah, yeah-yeah, yeah
I'm on my way

[Pre-Chorus: ROSÉ & Bruno Mars]
Don't you want me like I want you, baby?
Don't you need me like I need you now?
Sleep tomorrow, but tonight, go crazy
All you gotta do is just meet me at the

[Chorus: ROSÉ & Bruno Mars, ROSÉ, Bruno Mars]
아파트, 아파트
아파트, 아파트
아파트, 아파트
Just meet me at the (Uh, uh-huh, uh-huh)
아파트, 아파트
아파트, 아파트
아파트, 아파트
Just meet me at the (Uh, uh-huh, uh-huh)
아파트, 아파트
아파트, 아파트
아파트, 아파트
Just meet me at the (Uh, uh-huh, uh-huh)
아파트, 아파트
아파트, 아파트
아파트, 아파트
Uh, uh-huh, uh-huh


Thursday, October 20, 2022

Jimmy Dore Show HACKED! (Apple Podcasts)

Jimmy Dore ("The Jimmy Dore Show," JimmyDore.com website down); Eds., Wisdom Quarterly
Find The Jimmy Dore Show on Apple Podcasts because website has been hacked, taken offline
Audiobooks narrated by Jimmy Dore | Audible.com

It was strange that the website didn't work on Thursday, which is when a new episode drops along with daily new segments posted from the daily YouTube presentation. The browser would not access the website no matter what. Viewing it was banned by someone with a grudge at Dore's whistle blowing. Find past segments on YouTube.


Wednesday, February 18, 2015

"Astonishing" malware linked to NSA spying

Pat Macpherson, CC Liu, Wisdom Quarterly; Ryan Gallagher (firstlook.org/theinterecept)
The NSA is watching You, and now the rights you did not fight for are lost.
My computer has sucked for years because of NSA and CIA spyware, malware, back doors placed with the help and knowledge of computer manufacturers pressured by US spies (WQ).

"The Very Naughty Whistle-blower" (Tom Tomorrow/thismodernworld.com)
 
Researchers Find ‘Astonishing’ Malware Linked to NSA Spying
Tell me your secrets; I won't tell anyone (N
(Feb. 17, 2015) Security researchers have uncovered highly sophisticated malware that is linked to a secret National Security Agency (NSA) hacking operation exposed by The Intercept last year. Russian security firm Kaspersky published a report Monday documenting the malware, which it said had been used to infect thousands of computer systems and steal data in 30 countries around the world... More

Thousands Join Legal Fight Against UK Spying — You Can, Too 
Thousands Join Legal Fight Against UK Surveillance — And You Can, Too
GCHQ is the United Kingdom's own NSA.
(Feb. 18, 2015) Thousands of people are signing up to join an unprecedented legal campaign against the United Kingdom’s leading electronic surveillance agency. On Monday, London-based human rights group Privacy International launched an initiative enabling anyone across the world to challenge covert spying operations involving Government Communications Headquarters, or GCHQ, the National Security Agency’s British counterpart. The campaign... More
 
I am not Big Brother watching you; the anonymous face of the NSA is! (Ed Snowden)

When peaceful protesters and demonstrators speak up, local police violate our rights.

"The N.S.A. Comes Clean" (Tom Tomorrow/thismodernworld.com)




Did you see Laura Poitras' film of Ed Snowden? Did you read Greenwald's book?
You may want to check The Interecept, and Occupy.com, and the Pacifica Evening News

NSA spies on ME? New US spying exposed!

Pat Macpherson, Pfc. Sandoval, Ashley Wells, Wisdom Quarterly; Joseph Menn (Reuters)

A National Security Agency (NSA) data gathering facility is seen in Bluffdale, about 25 miles (40 kms) south of Salt Lake  City, Utah, December 17, 2013. REUTERS/Jim Urquhart
This is a National Security Agency (NSA) data gathering facility in Bluffdale, about 25 miles (40 kms) south of Salt Lake City, Utah, Dec. 17, 2013 (Reuters/Jim Urquhart).
.
Russian researchers expose breakthrough U.S. spying program
Joseph Menn (Reuters), San Francisco, Feb. 16, 2015 edited by WQ
This is why I've been saying for how long? (TI)
The U.S. National Security Agency (NSA) has figured out how to hide spying software deep within hard drives made by Western Digital, Seagate, Toshiba, and other top manufacturers.

This gives the agency the means to spy, steal from, violate the civil liberties of, and eavesdrop on the majority of the world's computers, according to cyber researchers and former spying operatives.

That long-sought and closely guarded ability was part of a cluster of spying programs discovered by Kaspersky Lab, the Moscow-based security software maker that has exposed a series of Western cyberespionage operations.
  • Your hard drives are RIDDLED with NSA SPYWARE The NSA does not care about who it spies on...The agency spread its performance-corrupting and data-exposing spy tools through compromised watering hole...back doors are left open for other spies and hackers, such as China and Iran, to exploit (theregister.co.uk)
Who will report the unbiased truths?
Kaspersky said it found personal computers in 30 countries infected with one or more of the spying programs, with the most infections seen in Iran, followed by Russia, Pakistan, Afghanistan, China, Mali, Syria, Yemen, and Algeria.

[No one in the U.S. uses computer parts by SanDisk, Micron, Seagate, Toshiba, Western Digital, or other top manufacturers, right? Wrong. We use more of these than anybody. Do you know the manufacturers of your internal computer parts? Of course, not. Open it and have a look.]

The targets included government and military institutions, telecommunication companies, banks, energy companies, nuclear researchers, media, and Islamic activists, Kaspersky said.
 
Spy infected computers around the world due to NSA (Kaspersky Lab/reut.rs/1L5knm0)
   
The firm declined to publicly name the country behind the spying campaign, but said it was closely linked to Stuxnet, the NSA-led cyberweapon that was used to illegally attack Iran's alleged uranium enrichment facility, a violent act of war and subterfuge.

The NSA is the agency responsible for gathering electronic intelligence on behalf of the United States government and black budget projects.


A former NSA employee told Reuters that Kaspersky's analysis was correct, and that people still in the intelligence agency valued these spying programs as highly as Stuxnet.

Another former intelligence operative confirmed that the NSA had developed the prized technique of concealing spyware in hard drives, but said he did not know which spy efforts relied on it.
 
NSA spokeswoman Vanee Vines declined to comment. (What a surprise).
 
Kaspersky published the technical details of its research on Monday, which should help infected institutions detect the spying programs, some of which trace back as far as 2001.

The disclosure could further hurt the NSA's surveillance abilities, already damaged by massive leaks by former contractor Edward Snowden. Snowden's revelations have hurt the United States' relations with some allies and slowed the sales of (contaminated) U.S. technology products abroad.
 
The exposure of these new spying tools could lead to greater backlash against Western technology, particularly in countries such as China.
More
Where can anyone get real news?

How the NSA, CIA, FBI, NSC spy on me.

We are spun and lied to daily by the "mainstream" media. Where can we go? If you want honest news about north America, you better go outside the country to get it. The BBC is sold out, but the Guradian, Telegraph, Register, Daily Mail used to be reliable, and RT (Ruptly Russian news), Al Jazeera English and other outlets can still tell truths that the AP, FOX, CNN, MSNBC, and other U.S.-based outlets dare not touch without getting a visit from their internally-implanted spies and handlers. Listen to Pacifica Free Speech Radio. Read the Intercept (firstlook.org/theintercept) with Glenn Greenwald, Laura Poitras, and Jeremy Scahill, which gives voice to Ed Snowden, Julian Assange, Chelsea Bradley Manning, and other whistle blowers, particularly former insiders at the CIA and the U.S. military-industrial complex.

Monday, December 30, 2013

The NSA's new TAO of Spying (video)

Wisdom Quarterly; Der Spiegel, Glenn Greenwald, Amy Goodman (DemocracyNow.org)

Glenn Greenwald and story on the NSA's TAO of Spying starts at Minute 25:30
 
The TAO, in NSA terms, refers to a unit of hackers it hires, trains, and continues to develop, the office of Tailored Access Operations.

NSA can "watch every keystroke [we] make"
The German publication Der Spiegel ("The Mirror") has revealed new details about a secretive hacking unit inside the National Security Agency called the Office of Tailored Access Operations, or TAO. The unit was created in 1997 to hack into global communications traffic. 

Hackers inside the TAO have developed a way to break into (hack) computers running Microsoft Windows by gaining passive access to machines when users report program crashes to Microsoft [both installing malware and getting the cooperation of Microsoft], according to Glenn Greenwald.

Panel backs major curbs on NSA
In addition, with help from the CIA and FBI, the NSA has the ability to intercept computers and other electronic accessories purchased online in order to secretly insert spyware and components that can provide backdoor access for the intelligence agencies. American Civil Liberties Union (ACLU) Deputy Legal Director Jameel Jaffer and journalist Glenn Greenwald join Democracy Now! to discuss the latest revelations, along with the future of Edward Snowden.
Greenwald is the journalist who first broke the NSA spying document revealed by Edward Snowden. Snowden now lives in Russia for safety. He was previously a columnist at Britain's The Guardian newspaper and is creating a new media venture with Laura Poitras (who is forced to live in abroad because England is redefining journalism that reveals a country's secrets as "terrorism"), Jeremy Scahill (author of Dirty Wars: The World is a Battlefield, which is also a movie), and eBay founder Pierre Omidyar.

Friday, June 1, 2012

Stuxnet: Obama, Israel attacked Iran (cartoon)

(thismodernworld.org)

A CAMPAIGN FOR THE CYNICS: The candidates know elections are decided by the least informed, the least involved and the least interested in politics.

Obama, Israel ordered computer attacks on Iran
Grant Gross, ComputerWorld.com, June 1, 2012
The Stuxnet worm, developed by U.S. and Israeli agencies, targeted Iran's nuclear program, says the New York Times.

(IDG) U.S. President Barack Obama ordered the Stuxnet cyberattacks on Iran in an effort to slow the country's development of a nuclear program, according to a report in The New York Times.

Quoting anonymous sources, the Times reported that in the early days of his presidency, Obama accelerated attacks related to an effort begun by the George W. Bush administration. The Stuxnet worm, long rumored to have been developed by Israel or the U.S., escaped from Iranian computers in mid-2010 and compromised computers across the Internet.

Obama considered shutting down the cyberattacks after Stuxnet began compromising other computers, but decided to continue with the program, according to the Times. The Stuxnet worm came from a joint U.S. and Israeli effort to target the Iranian nuclear program, the Times said. The newspaper interviewed U.S., Israeli and European officials currently and formerly involved with the cyberattack program, it said. More

Mainstream Media Admissions

One Per Cent: Obama "gave full backing to Stuxnet attack on Iran"
In Confront and Conceal: Obama's Secret Wars and Surprising Use of American Power, author David Sanger alleges that Stuxnet...
Cyberweapons: Obama becomes most killing-est president, surpassing Pres. Cheney
Barack Obama "ordered Stuxnet cyber attack on Iran"
Pres. B.S. Obama ordered the viral Stuxnet attack on Iran as part of a wave of cyber sabotage and espionage against the would-be nuclear. It then leaked onto the Internet.
Obama's wave of cyberattacks against Iran
Presidents Bush and Obama behind Stuxnet
Israel and the United States were indeed behind a military-grade computer worm that sabotaged an Iranian nuclear-[power plant] fuel processing facility.
Obama ordered Stuxnet assault on Iran (BankInfoSecurity)

Monday, September 19, 2011

Testosterone Makes the Man

PFC Michael Sandoval, Ashley Wells (Wisdom Quarterly)
Liberal Brian and closeted, hyper-masculine killer Stewie in the Army (Fox TV)

Sadly most US men suffer from "testosterone poisoning" or they behave like they do. From the example of our political leaders (Clinton's satyriasis, Hillary's lesbianism, Pres. Obama's bisexuality) to the use of toxic plastics and other major sources of xenoestrogens, our hormones are all over the map.

This hormone disruption is inflamed by hyper-masculinity in video games, sports, music, gun use and, oddly, homosexuality. Sexual misconduct of obsession and acting like wolves leads to indiscriminate behavior with almost any receptive and some unreceptive partner.

In the military, for example, sexual assault and rape are commonplace. Many of those attacks are male on male. Just as Afghan Pashtuns are accused and condemned for engaging in bacha bazi (dancing boy pederasty/molestation), US soldiers hypocritically engage in similar behavior in the name of top dog pirate/prison machismo. Pirates are famous for the booty they make off with, and they are not the only ones.

A new report, however, reveals that it is a biological trick. Genes and social training gear men for excessive interest in spreading seeds and making conquests, upping the chances of impregnating someone and spreading those genes. But when the baby comes, dwoop! Testosterone levels drop precipitously -- and with those levels attitudes must change uncomfortably. Suddenly it's my daughter, and I think I know what men are thinking when they look at her. Testosterone makes men, not fatherhood. But NPR disagrees.

Fatherhood, Not Testosterone, Makes The Man
(NPR, Weekend Edition, Sept. 17, 2011) A new study says that when men become fathers, our testosterone levels drop. Like a brick. I doubt that many fathers are surprised. Transcript

Heidi Klum is the most dangerous celebrity in cyberspace, according to a new list compiled by Internet security developers McAffee. One in ten websites that come up in searches have more than pictures. They have viruses and malware that ruin computers and steal personal information. It is not only supermodels and scandalous actresses. Number 3 on the list is CNN's Larry King replacement Piers Morgan. But most searches are seeking salacious photos of women.

Thursday, June 9, 2011

Macs hit by Malware, iPhones could be next


Unless Apple, Inc. acts fast, Macs are no immune from malware, and iPhones could be hit next. It has taken steps to stop a malware "phishing" program (Image: cutcaster.com).

(NPR, June 6) Apple's computers have been able to avoid most serious hacking attacks, but that era may be over. As Steve Jobs and his colleagues prepared for this week's developers conference, the company was also taking steps to stop a malware "phishing" program.

The ploy, says technology columnist Rich Jaroslovsky of Bloomberg News, uses an infected website to install a piece of software on Apple computers. The software then pops up a new window, with an urgent message about a security vulnerability.

As Jaroslovsky tells NPR's Renee Montagne, the rogue window includes "a scary-sounding message that tells you that your computer is infected, and that you need software to eradicate the infection — and to please give your credit card number." More

Technology
CALLING THE INTERNET POLICE
Hackers Target FBI Affiliate, Post Passwords Online
The hacking collective, Lulz Security, also recently targeted Nintendo, Sony, and PBS.
Nintendo: Server Breached, No Data Lost

Wednesday, April 15, 2009

Monday, March 30, 2009

Conficker: Vast Computer Spy Network

WASHINGTON (Reuters) – Canadian researchers have uncovered a vast electronic spying operation that infiltrated computers and stole documents from government and private offices around the world, including those of the Dalai Lama, The New York Times reported on Saturday.

In a report provided to the newspaper, a team from the Munk Center for International Studies in Toronto said at least 1,295 computers in 103 countries had been breached in less than two years by the spy system, which it dubbed GhostNet.

Embassies, foreign ministries, government offices and the Dalai Lama's Tibetan exile centers in India, Brussels, London, and New York were among those infiltrated, said the researchers, who have detected computer espionage in the past. More>>
WHAT TO DO?
  • Free patch (and removal tool) at www.Symantec.com
  • If you can't log on to Symantec.com, you're infected.
  • Contact your ISP or Internet security provider.