Thursday, September 5, 2024
Song of the Summer: "Apt." (Rose & Bruno)
Thursday, October 20, 2022
Jimmy Dore Show HACKED! (Apple Podcasts)
![]() |
| Find The Jimmy Dore Show on Apple Podcasts because website has been hacked, taken offline |
![]() |
| Audiobooks narrated by Jimmy Dore | Audible.com |
![]() |
| It was strange that the website didn't work on Thursday, which is when a new episode drops along with daily new segments posted from the daily YouTube presentation. The browser would not access the website no matter what. Viewing it was banned by someone with a grudge at Dore's whistle blowing. Find past segments on YouTube. |
Wednesday, February 18, 2015
"Astonishing" malware linked to NSA spying
![]() |
| The NSA is watching You, and now the rights you did not fight for are lost. |
![]() |
| My computer has sucked for years because of NSA and CIA spyware, malware, back doors placed with the help and knowledge of computer manufacturers pressured by US spies (WQ). |
![]() |
| "The Very Naughty Whistle-blower" (Tom Tomorrow/thismodernworld.com) |
![]() |
| Tell me your secrets; I won't tell anyone (N |
![]() |
| GCHQ is the United Kingdom's own NSA. |
![]() |
| I am not Big Brother watching you; the anonymous face of the NSA is! (Ed Snowden) |
![]() |
| When peaceful protesters and demonstrators speak up, local police violate our rights. |
![]() |
| "The N.S.A. Comes Clean" (Tom Tomorrow/thismodernworld.com) |
![]() |
| Did you see Laura Poitras' film of Ed Snowden? Did you read Greenwald's book? |
![]() |
| You may want to check The Interecept, and Occupy.com, and the Pacifica Evening News |
NSA spies on ME? New US spying exposed!

| This is a National Security Agency (NSA) data gathering facility in Bluffdale, about 25 miles (40 kms) south of Salt Lake City, Utah, Dec. 17, 2013 (Reuters/Jim Urquhart). |
![]() |
| This is why I've been saying for how long? (TI) |
This gives the agency the means to spy, steal from, violate the civil liberties of, and eavesdrop on the majority of the world's computers, according to cyber researchers and former spying operatives.
- Your hard drives are RIDDLED with NSA SPYWARE The NSA does not care about who it spies on...The agency spread its performance-corrupting and data-exposing spy tools through compromised watering hole...back doors are left open for other spies and hackers, such as China and Iran, to exploit (theregister.co.uk)
![]() |
| Who will report the unbiased truths? |
[No one in the U.S. uses computer parts by SanDisk, Micron, Seagate, Toshiba, Western Digital, or other top manufacturers, right? Wrong. We use more of these than anybody. Do you know the manufacturers of your internal computer parts? Of course, not. Open it and have a look.]
The targets included government and military institutions, telecommunication companies, banks, energy companies, nuclear researchers, media, and Islamic activists, Kaspersky said.
![]() |
| Spy infected computers around the world due to NSA (Kaspersky Lab/reut.rs/1L5knm0) |
The firm declined to publicly name the country behind the spying campaign, but said it was closely linked to Stuxnet, the NSA-led cyberweapon that was used to illegally attack Iran's alleged uranium enrichment facility, a violent act of war and subterfuge.
The NSA is the agency responsible for gathering electronic intelligence on behalf of the United States government and black budget projects.
A former NSA employee told Reuters that Kaspersky's analysis was correct, and that people still in the intelligence agency valued these spying programs as highly as Stuxnet.
Another former intelligence operative confirmed that the NSA had developed the prized technique of concealing spyware in hard drives, but said he did not know which spy efforts relied on it.
NSA spokeswoman Vanee Vines declined to comment. (What a surprise).
Kaspersky published the technical details of its research on Monday, which should help infected institutions detect the spying programs, some of which trace back as far as 2001.
The disclosure could further hurt the NSA's surveillance abilities, already damaged by massive leaks by former contractor Edward Snowden. Snowden's revelations have hurt the United States' relations with some allies and slowed the sales of (contaminated) U.S. technology products abroad.
The exposure of these new spying tools could lead to greater backlash against Western technology, particularly in countries such as China. More
- NSA spied through Seagate, SanDisk, Micron hardware, Russian... (bizjournals.com) According to the Kaspersky tech report, the U.S. spying apparatus known as the NSA spies with malicious software in the fundamental firmware, which launches each time a computer...
- Kaspersky says NSA planted Stuxnet-type cyberweapon(s) in hard drives... (techtimes.com) That means YOUR hard drive, too, even if you built your own computer, nerd. Did you make your own parts from scratch? No, obviously not. Were you exploited? Yes, obviously.
- The NSA hides surveillance software in hard drives (Engadget)
- Millions of computers compromised by U.S. spyware... (telegraph.co.uk)
![]() |
| How the NSA, CIA, FBI, NSC spy on me. |
Monday, December 30, 2013
The NSA's new TAO of Spying (video)
The German publication Der Spiegel ("The Mirror") has revealed new details about a secretive hacking unit inside the National Security Agency called the Office of Tailored Access Operations, or TAO. The unit was created in 1997 to hack into global communications traffic.
![]() |
| Panel backs major curbs on NSA |
- Orwellian or blunt tool? - Conflicting rulings on illegal NSA spying sets up likely Supreme Court showdown
- Inside the "Electronic Omnivore": new leaks show NSA spying on U.N., Climate Summit, text messaging
- Pres. Obama wrongs the Bill of Rights
Friday, June 1, 2012
Stuxnet: Obama, Israel attacked Iran (cartoon)
(thismodernworld.org)Obama, Israel ordered computer attacks on Iran
The Stuxnet worm, developed by U.S. and Israeli agencies, targeted Iran's nuclear program, says the New York Times.(IDG) U.S. President Barack Obama ordered the Stuxnet cyberattacks on Iran in an effort to slow the country's development of a nuclear program, according to a report in The New York Times.
Quoting anonymous sources, the Times reported that in the early days of his presidency, Obama accelerated attacks related to an effort begun by the George W. Bush administration. The Stuxnet worm, long rumored to have been developed by Israel or the U.S., escaped from Iranian computers in mid-2010 and compromised computers across the Internet.
Obama considered shutting down the cyberattacks after Stuxnet began compromising other computers, but decided to continue with the program, according to the Times. The Stuxnet worm came from a joint U.S. and Israeli effort to target the Iranian nuclear program, the Times said. The newspaper interviewed U.S., Israeli and European officials currently and formerly involved with the cyberattack program, it said. More
One Per Cent: Obama "gave full backing to Stuxnet attack on Iran"In Confront and Conceal: Obama's Secret Wars and Surprising Use of American Power, author David Sanger alleges that Stuxnet...
Cyberweapons: Obama becomes most killing-est president, surpassing Pres. Cheney
Barack Obama "ordered Stuxnet cyber attack on Iran"
Pres. B.S. Obama ordered the viral Stuxnet attack on Iran as part of a wave of cyber sabotage and espionage against the would-be nuclear. It then leaked onto the Internet.
Obama's wave of cyberattacks against Iran
Presidents Bush and Obama behind Stuxnet
Israel and the United States were indeed behind a military-grade computer worm that sabotaged an Iranian nuclear-[power plant] fuel processing facility.
Obama ordered Stuxnet assault on Iran (BankInfoSecurity)
Monday, September 19, 2011
Testosterone Makes the Man
Sadly most US men suffer from "testosterone poisoning" or they behave like they do. From the example of our political leaders (Clinton's satyriasis, Hillary's lesbianism, Pres. Obama's bisexuality) to the use of toxic plastics and other major sources of xenoestrogens, our hormones are all over the map.This hormone disruption is inflamed by hyper-masculinity in video games, sports, music, gun use and, oddly, homosexuality. Sexual misconduct of obsession and acting like wolves leads to indiscriminate behavior with almost any receptive and some unreceptive partner.
In the military, for example, sexual assault and rape are commonplace. Many of those attacks are male on male. Just as Afghan Pashtuns are accused and condemned for engaging in bacha bazi (dancing boy pederasty/molestation), US soldiers hypocritically engage in similar behavior in the name of top dog pirate/prison machismo. Pirates are famous for the booty they make off with, and they are not the only ones.A new report, however, reveals that it is a biological trick. Genes and social training gear men for excessive interest in spreading seeds and making conquests, upping the chances of impregnating someone and spreading those genes. But when the baby comes, dwoop! Testosterone levels drop precipitously -- and with those levels attitudes must change uncomfortably. Suddenly it's my daughter, and I think I know what men are thinking when they look at her. Testosterone makes men, not fatherhood. But NPR disagrees.
(NPR, Weekend Edition, Sept. 17, 2011) A new study says that when men become fathers, our testosterone levels drop. Like a brick. I doubt that many fathers are surprised. Transcript
Heidi Klum is the most dangerous celebrity in cyberspace, according to a new list compiled by Internet security developers McAffee. One in ten websites that come up in searches have more than pictures. They have viruses and malware that ruin computers and steal personal information. It is not only supermodels and scandalous actresses. Number 3 on the list is CNN's Larry King replacement Piers Morgan. But most searches are seeking salacious photos of women.- AUDIO: The new Bossa Nova (Alt Latino NPR)
- Get cancer answers without pharmaceuticals or surgery
- PHOTOS: Siddhartha striving in Theravada Indonesia
- AUDIO: When it rains, it spores (Mushrooms in Mass.)
- VIDEO: "Suicidal" mountain cows puzzle police
- Visit the Huntington Library and gardens FREE
- VIDEO: What is nudism and would I like it?
- VIDEO: one of the 10 Most Shocking Animal Attacks Ever
- Defender of Nepalese Gurkhas (who helped British) target of hate
- Panic in India as an 10,000 lb elephant rampages during a religious festival in Kerala (AnimalPlanetTV)
Thursday, June 9, 2011
Macs hit by Malware, iPhones could be next

Unless Apple, Inc. acts fast, Macs are no immune from malware, and iPhones could be hit next. It has taken steps to stop a malware "phishing" program (Image: cutcaster.com).
The ploy, says technology columnist Rich Jaroslovsky of Bloomberg News, uses an infected website to install a piece of software on Apple computers. The software then pops up a new window, with an urgent message about a security vulnerability.
CALLING THE INTERNET POLICE
Hackers Target FBI Affiliate, Post Passwords Online
The hacking collective, Lulz Security, also recently targeted Nintendo, Sony, and PBS.
Nintendo: Server Breached, No Data Lost
Wednesday, April 15, 2009
Check for Computer Virus
Home computers hunt for rare "jewel" 50,000 computers are searching for a number so rare it's compared to the Hope diamond. Miles long (NPR.org)Monday, March 30, 2009
Conficker: Vast Computer Spy Network
In a report provided to the newspaper, a team from the Munk Center for International Studies in Toronto said at least 1,295 computers in 103 countries had been breached in less than two years by the spy system, which it dubbed GhostNet.Embassies, foreign ministries, government offices and the Dalai Lama's Tibetan exile centers in India, Brussels, London, and New York were among those infiltrated, said the researchers, who have detected computer espionage in the past. More>>
- Free patch (and removal tool) at www.Symantec.com
- If you can't log on to Symantec.com, you're infected.
- Contact your ISP or Internet security provider.
Sunday, March 29, 2009
Cyber-spying Ring targets Dalai Lama
Massive cyber-spying ringA vast electronic spying system has hit government and private computers in 103 countries.























