Keyword: tor

Brevity: Headers | « Text »
  • Pressure mounts against Rule 41 – the FBI's power to hack Tor, VPN users on sight (Privacy Alert)

    06/22/2016 10:24:06 AM PDT · by dayglored · 19 replies
    The Register ^ | Jun 21, 2016 | Iain Thomson
    The campaign against Rule 41 – which will give cops and Feds in America the power to hack people's computers around the world – has kicked up a gear. Leaders of the US House of Representatives and Senate got a letter today urging them to block the rule change before it becomes permanent in December. The proposed legislative tweak, quietly passed by an obscure committee and approved by the Supreme Court in April, would allow a US magistrate judge to grant law enforcement access to any stored data on a computer, phone, or any storage device around the world that...
  • [October 21, 2015] Foundation of 'dark Web' steps into the light

    05/28/2016 5:32:14 PM PDT · by Cats Pajamas · 10 replies
    Politico ^ | 10/21/15 04:52 PM EDT | David Perera
    The Tor Project, the foundation of the crime-infiltrated "dark Web," is trying to soften its public image — but without backing away from the anonymous Web-surfing technology that has made it so controversial with law enforcement and intelligence agencies. For about a decade, the Massachusetts-based nonprofit has provided free software that lets activists and political dissidents visit websites and exchange messages outside the scrutiny of oppressive governments. But the same software HAS ALLOWED HIDDEN MARKETS FOR CHILD PORNOGRAPHY, GUNS, ILLEGAL DRUGS AND STOLEN CREDIT CARD INFORMATION TO FLOURISH, while heightening U.S. intelligence agencies' worries about technology providing an unbreakable wall...
  • How Ugandans Overturned An Election Day Social Media Blackout

    02/25/2016 7:20:06 PM PST · by Utilizer · 15 replies
    Motherboard online site ^ | February 24, 2016 // 07:00 AM EST | Written by G.S. Phillips and Grace Atuhaire
    When Ugandans went to the polls last Thursday in presidential and parliamentary elections, they participated in the most heavily-contested political battle since multiparty democracy began in 2005. But they also discovered that their access to social media and mobile payment services had been cut off, part of a three-day ban by the government that limited political discussion and temporarily halted financial transactions across the country. When the dust had cleared, incumbent, 30-year president Gen. Y.K. Museveni had been re-elected for another five-year term along with his National Resistance Movement (NRM) party, the leader of the largest opposition party was under...
  • FBI Seeks To Legally Hack You If You're Connected To TOR Or a VPN

    01/25/2015 11:15:40 PM PST · by LibWhacker · 55 replies ^ | 1/20/15
    The investigative arm of the Department of Justice is attempting to short-circuit the legal checks of the Fourth Amendment by requesting a change in the Federal Rules of Criminal Procedure. These procedural rules dictate how law enforcement agencies must conduct criminal prosecutions, from investigation to trial. Any deviations from the rules can have serious consequences, including dismissal of a case. The specific rule the FBI is targeting outlines the terms for obtaining a search warrant. It's called Federal Rule 41(b), and the requested change would allow law enforcement to obtain a warrant to search electronic data without providing any specific...
  • Leaked NSA Documents Reveal How To Hide From The NSA

    01/01/2015 12:14:53 PM PST · by Libloather · 33 replies
    Huffington Post via MSN ^ | 1/01/15 | Damon Beres
    If you want a truly anonymous life, then maybe it's time you learned about Tor, CSpace and ZRTP. These three technologies could help people hide their activities from the National Security Agency, according to NSA documents newly obtained from the archive of former contractor Edward Snowden by the German magazine Der Spiegel. The combination of Tor, CSpace and ZRTP (plus another anonymizing technology for good measure) results in levels of protection that the NSA deems "catastrophic" -- meaning the organization has "near-total loss/lack of insight to target communications," according to Der Spiegel. "Although the documents are around two years old,...
  • The Trouble with Tor

    12/17/2014 3:45:46 AM PST · by ShadowAce · 7 replies
    eSecurity Planet ^ | 16 December 2014 | Paul Rubens
    For over a decade, people all over the world have used Tor (formerly known as the Onion Router) to protect their privacy. The U.S. Naval Research Laboratory developed the system using open source technology, to protect U.S. government communications. It is used by people living under restrictive regimes who want to access forbidden information or data on the Internet, whistle-blowers and dissidents who want to communicate with journalists, and anyone who wants to use the Internet without being tracked or to publish information on the Net without compromising their privacy.How Tor Works Tor works by sending traffic from its source...
  • FBI Arrests SpaceX Employee, Alleging He Ran The 'Deep Web' Drug Marketplace Silk Road 2.0

    11/06/2014 10:30:03 AM PST · by blam · 21 replies
    BI ^ | 11-6-2014 | James Cook
    James Cook November 6, 2014 The FBI and Europol have conducted a joint operation to take down the internet's thriving "deep web" drug marketplaces. The official FBI New York Twitter account just confirmed the seizure of Silk Road 2.0, saying that the site's alleged operator, Blake Benthall, was arrested in San Francisco on Wednesday. He now potentially faces life in prison, the FBI says. Benthall appears to be an employee of SpaceX, Elon Musk's private rocket company. (snip)
  • Researcher Finds Tor Exit Node Adding Malware to Binaries

    10/24/2014 6:54:44 PM PDT · by Utilizer · 22 replies
    The Kaspersky Lab Security News Service ^ | October 24, 2014 , 12:07 pm | Dennis Fisher
    A security researcher has identified a Tor exit node that was actively patching binaries users download, adding malware to the files dynamically. The discovery, experts say, highlights the danger of trusting files downloaded from unknown sources and the potential for attackers to abuse the trust users have in Tor and similar services. Josh Pitts of Leviathan Security Group ran across the misbehaving Tor exit node while performing some research on download servers that might be patching binaries during download through a man-in-the middle attack. Downloading any kind of file from the Internet is a dodgy proposition these days, and many...
  • Here’s one way to land on the NSA watch list

    07/10/2014 6:41:50 AM PDT · by ShadowAce · 31 replies
    Wonky News Nerd ^ | 10 July 2014 | Julia Angwin and Mike Tigas
    Last week, German journalists revealed that the National Security Agency has a program to collect information about people who use privacy-protecting services, including popular anonymizing software called Tor. But it’s not clear how many users have been affected. So we did a little sleuthing, and found that the NSA’s targeting list corresponds with the list of directory servers used by Tor between December 2010 and February 2012 – including two servers at the Massachusetts Institute of Technology. Tor users connect to the directory servers when they first launch the Tor service.That means that if you downloaded Tor during 2011, the NSA may have scooped up your...
  • Browser Change From Firefox?

    05/30/2014 11:24:40 AM PDT · by UScbass · 65 replies
    Have been using the Firefox browser since it was introduced; with all the controversies (political), it has been suggested that I change to Chrome (Google), Safari (Apple), or Opera browser. Any suggestions as to whether a change is recommended and, if so, to what?
  • Going Dark: The Internet Behind The Internet

    05/26/2014 12:49:19 PM PDT · by Mean Daddy · 28 replies
    NPR ^ | May 25, 2014
    The average computer user with an Internet connection has access to an amazing wealth of information. But there's also an entire world that's invisible to your standard Web browser. These parts of the Internet are known as the Deep Web. The tools to get to there are just a few clicks away, and more and more people who want to browse the Web anonymously are signing on. Fans of the series House of Cards might recall the Deep Web being worked into the plot of latest season. The character Lucas, a newspaper editor who was trying find a hacker, gets...
  • Russia keen to sell anti-missile defence system to India

    02/18/2014 9:15:01 PM PST · by sukhoi-30mki · 4 replies
    The Hindu BusinessLine ^ | February 12, 2014 | Amrita Nair-Ghaswalla
    Hard-sells fully operational combat model at Defexpo Mumbai, February 12: Even as the Indian Army has entered the global market to buy short-range surface-to-air missile defence systems, Russia is keen to offer its anti-missile system Tor-M2KM to India, with the latter slated to undergo a series of tests. Exhibited outside of Russia for the first time, a fully operational combat model of the Tor-M2KM anti missile system was displayed at the Defexpo-2014 exhibition held in Delhi recently. Defence purchases have risen from just over $200 million in 2001 to over $14 billion currently. As part of the recently announced tender...
  • Russia to Arm Warships with New Air Defense System

    02/09/2014 6:31:33 AM PST · by sukhoi-30mki · 3 replies
    Ria Novosti ^ | 06/02/2014
    NEW DELHI, February 6 (RIA Novosti) – A naval version of the Tor short-range air defense system will be installed on all Russian warships, the manufacturer, Almaz-Antey Concern, said Thursday. The new system, dubbed M-Tor, is a variant of the modernized Tor-M2KM system featuring modular assembly, high reliability and improved precision, according to Yuri Baykov, spokesman for Almaz-Antey. M-Tor will gradually replace the outdated Kinzhal (SA-N-Gauntlet) systems, which have been in service since 1989, Baykov said at the DEFEXPO INDIA-2014 exhibition in New Delhi. He also said Russia will offer Tor-M2KMs to India as part of the recently announced tender...
  • Group Thinks Anonymity Should Be Baked Into the Internet Itself

    11/27/2013 9:12:38 AM PST · by Bobalu · 36 replies
    MIT Technology Review ^ | November 26, 2013 | David Talbot
    The Internet’s main engineers have asked the architects of Tor—networking software designed to make Web browsing private—to consider turning the technology into an Internet standard. If widely adopted, such a standard would make it easy to include the technology in consumer and business products ranging from routers to apps. This would, in turn, allow far more people to browse the Web without being identified by anyone who might be spying on Internet traffic. If the discussions bear fruit, it could lead to the second major initiative of the Internet Engineering Task Force (IETF) in response to the mass surveillance by...
  • Attacking Tor: how the NSA targets users' online anonymity

    10/04/2013 11:47:48 AM PDT · by shego · 10 replies
    The Guardian ^ | 10/4/13 | Bruce Schneier
    The online anonymity network Tor is a high-priority target for the National Security Agency. The work of attacking Tor is done by the NSA's application vulnerabilities branch, which is part of the systems intelligence directorate, or SID. The majority of NSA employees work in SID, which is tasked with collecting data from communications systems around the world. According to a top-secret NSA presentation provided by the whistleblower Edward Snowden, one successful technique the NSA has developed involves exploiting the Tor browser bundle, a collection of programs designed to make it easy for people to install and use the software. The...
  • FBI seizes ‘Silk Road' black market domain, arrests owner

    10/02/2013 9:18:08 AM PDT · by Pan_Yan · 48 replies
    Russia Today ^ | October 02, 2013 15:48
    Authorities have arrested a man in San Francisco, California accused of operating an underground website that allowed users to purchase guns and drugs from around the world using encrypted, digital currency. Ross William Ulbricht, also known as “Dread Pirate Roberts,” was arrested by the Federal Bureau of Investigation on Tuesday for his alleged involvement in the Silk Road online marketplace, according to court papers published this week. A sealed complaint dated September 27 was unearthed by security researcher Brian Krebs in which Ulbricht is accused of narcotics trafficking conspiracy, computer hacking conspiracy money laundering conspiracy and more. According to prosecutors,...
  • FBI Controlled Freedom Hosting Tor Servers, Agency Admits

    09/16/2013 10:10:45 AM PDT · by Eagle of Liberty · 3 replies ^ | 09/14/2013 | Eduard Kovacs
    As highlighted by Wired, this doesn’t really surprise anyone. Researchers almost immediately noted that the Tor malware, which leveraged a vulnerability in Firefox, had to be operated by a law enforcement agency. That’s because the threat didn’t cause too much damage, despite the fact that it had the potential. Instead, it simply collected MAC addresses and Windows hostnames, sending the data back to a server in Northern Virginia. Back in August, Irish authorities arrested 28-year-old Eric Eoin Marques, the man believed to have operated Freedom Hosting, one of the largest Tor hidden services hosting providers. Marques is accused of facilitating...
  • Meet The Dread Pirate Roberts

    08/15/2013 3:37:21 AM PDT · by Bobalu · 16 replies
    Forbes ^ | 8/14/2013 | Andy Greenberg
    An entrepreneur as professionally careful as the Dread Pirate Roberts doesn’t trust instant messaging services. Forget phones or Skype. At one point during our eight-month preinterview courtship, I offer to meet him at an undisclosed location outside the United States. “Meeting in person is out of the question,” he says. “I don’t meet in person even with my closest advisors.” When I ask for his name and nationality, he’s so spooked that he refuses to answer any other questions and we lose contact for a month. All my communications with Roberts are routed exclusively through the messaging system and forums...
  • A bunch of Tor sites spread malware. Was the FBI behind it?

    08/05/2013 11:13:27 AM PDT · by markomalley · 23 replies
    Tor users visiting secret sites hosted by Freedom Hosting early Sunday morning weren’t able to reach their desired destinations. Instead they were met with a “Down for Maintenance” notice and, if they had javascript enabled, malware that could effectively identify Tor users. The Internet is wild with speculation that malware was planted by the FBI. And that isn’t as paranoid as you might think. Eric Eoin Marques, the man believed to be behind Freedom Hosting, was arrested in Ireland Thursday and is currently awaiting extradition to the U.S. on child pornography charges. While Freedom Hosting was the largest hosting service...
  • Alex Coelho, Head Stomped by Dirty Blondes' Bouncer, Plans to Sue Bar (Video)

    08/05/2013 11:24:59 AM PDT · by NotYourAverageDhimmi · 45 replies
    Broward Palm Beach New Times ^ | August 2, 2013 | Terrence McCoy
    The violent video showing three Dirty Blondes' bouncers savaging two patrons that has sparked sweeping and nationwide outrage may soon spill over into the courts. According to a statement released this morning by two lawyers "overseeing the lawsuit against" Dirty Blondes, the recent violence inflicted upon Alex Coelho and David Parker -- who were subsequently arrested by police -- was beyond reprehensible. "Businesses such as Dirty Blondes Sports Bar have legal duties and responsibilities in the operation and management of their affairs, namely, to use reasonable care in the hiring, training, and supervising of their employees for the safety and...
  • Anonymous Jihad After NSA leaks Jihadists flock to federally funded Tor network to hide

    07/01/2013 10:01:22 AM PDT · by Nachum · 17 replies
    Free Beacon ^ | 7/1/13 | Lachlan Markay
    Jihadists are seeking out more secure methods of online communications, including an avenue created by the U.S. government and financed by American taxpayers, in the wake of revelations about the U.S. monitoring of online messages. The Tor network has become a go-to means for jihadists and criminals to communicate, raise money, and buy and sell illicit goods and services without fear of being identified or traced by intelligence or law enforcement officials. The network uses technology called “onion routing” (Tor is an acronym for The Onion Router), which refers to layers of encryption that prevent governments or other users from...
  • How to Keep Your Communications Private

    06/09/2013 10:45:10 AM PDT · by Rusty0604 · 27 replies
    Legal Insurrection ^ | 06/06/1955 | Kit Lange
    You’re not running a domestic terrorism group (well, there are those new DHS criteria…). You’re not even sending around emails about what a dismal failure President Obama’s administration is (THIS hour, anyway). You just want to be able to chat with friends, conduct your financial business, and argue with your spouse without Big Daddy Gummint all up in your biz. Believe it or not, that’s your right. Harry “Who Cares” Reid may blow it off and say the government’s been “doing that stuff for years,”but we’ve got a news flash for Harry: just because you’ve been doing it a while...
  • Whither the jihadi forums?

    08/01/2011 1:10:28 PM PDT · by Cindy · 114 replies · 1+ views ^ | August 1, 2011 | n/a "Whither the jihadi forums?" SNIPPET: "There are currently only three jihadi forums that are sufficiently active and well-connected to be of any interest whatsoever. Why we claim to be on the verge of defeating al-Qaida while simultaneously watching passively as they use these forums to regroup and regenerate is beyond me. These are the forums three: • al-Fidaa, a forum created by al-Qaida core. That it is directly linked to al-Qaida by definition moves it to the top of the list. Current membership: 2,462, all of whom can be considered "active" if only because they just joined the forum....
  • What You Need to Know About the Internet Snooping Bill (and How You Can Protect Yourself)

    07/31/2011 4:38:42 PM PDT · by lbryce · 19 replies
    Lifehacker ^ | July 29, 2011 | Adam Dachis
    On Thursday, the US House of Representatives approved an internet snooping bill that requires internet service providers (ISPs) to keep records of customer activity for a year so police can review them as needed. Here's what this bill means for you and what you can do about it. What Is This Internet Snooping Bill, Exactly, and Why Is It Bad? The lovingly titled Protecting Children From Internet Pornographers Act of 2011 (PCFIPA of 2011) requires ISPs to retain customer names, addresses, phone numbers, credit card numbers, bank account numbers, and dynamic IP addresses. It's a record of your personal information...
  • House Committee passes bill requiring your ISP to spy on every click and keystroke you make online

    07/30/2011 6:43:38 PM PDT · by BfloGuy · 59 replies ^ | 7/29/2011 | Cory Doctorow
    Yesterday, the House Judiciary Committee voted 19-10 for H.R. 1981, a data-retention bill that will require your ISP to spy on everything you do online and save records of it for 12 months. California Rep Zoe Lofgren, one of the Democrats who opposed the bill, called it a “data bank of every digital act by every American” that would “let us find out where every single American visited Web sites.”
  • House panel approves broadened ISP snooping bill

    Internet providers would be forced to keep logs of their customers' activities for one year--in case police want to review them in the future--under legislation that a U.S. House of Representatives committee approved today. The 19 to 10 vote represents a victory for conservative Republicans, who made data retention their first major technology initiative after last fall's elections, and the Justice Department officials who have quietly lobbied for the sweeping new requirements, a development first reported by CNET. A last-minute rewrite of the bill expands the information that commercial Internet providers are required to store to include customers' names, addresses,...
  • No Conspiracy Theory Needed: Tor Created for U.S. Gov't Spying

    03/29/2011 1:54:23 PM PDT · by george76 · 14 replies
    Network World ^ | 03/28/11 | Ms. Smith
    An interesting discussion started on tor-talk about Iran cracking down on "web dissident technology" before Cryptome posted, "TOR Made for USG Open Source Spying Says Maker." There is an interesting post on Cryptome, TOR Made for USG Open Source Spying Says Maker, in which one of Tor's creators, Michael Reed, says to look at why the government created Tor from a common sense point-of-view instead of as conspiracy theory. The Tor Project is free software that lets people be anonymous online but it's not an invisibility cloak that's meant to protect privacy. People use Tor to be anonymous for all...
  • The Twitter Revolution

    07/08/2009 1:55:35 PM PDT · by AJatTheDCWriteUp · 1 replies · 529+ views
    The DC Write Up ^ | July 8, 2009 | AJ Fluehr
    New media innovations, like Facebook and Twitter, influenced the course of last month’s unrest in Iran, panelists at the National Endowment for Democracy said Tuesday. Hundreds of thousands of Iranian opposition leader Mir-Hossein Mousavi’s supporters took to Iran’s streets in June to protest the results of a disputed presidential election between Mousavi and incumbent president Mahmoud Ahmadinejad. Officially, Ahmadinejad won the election, but Mousavi’s supporters claim that it was rigged.
  • AQ {{Hearts}} TOR

    08/15/2010 4:48:10 PM PDT · by Cindy · 18 replies ^ | August 15, 2010 | n/a
    Quote: 15 August 2010 AQ {{HEARTS}} TOR click to view archive of post Posted on 15 August 2010 @ 17:54

    06/07/2010 4:16:27 PM PDT · by Cindy · 84 replies · 103+ views
    OSINT.INTERNET ^ | June 7, 2010 | n/a
    June 07, 2010 I SUPPOSE IF I SUGGESTED SUMMARY EXECUTION I WOULD BE CALLED "HARSH"? SNIPPET: "U.S. Intelligence Analyst Arrested in Wikileaks Video Probe Note that he didn't just lift a video and send it to Wikileaks. He also stole and released 260,000 classified US State Department diplomatic cables."
  • Wikileaks Releases U.S. Afghanistan War Files; Partners With NY Times, UK Guardian, Der Spiegel

    07/25/2010 2:51:21 PM PDT · by kristinn · 193 replies · 6+ views
    Sunday, July 25, 2010 | Kristinn
    Read reports on the files at:Der SpiegelThe New York TimesThe GuardianIntro by Der Spiegel:Close to 92,000 US documents have been uncovered that shed new light on the war in Afghanistan. In an unprecedented development, close to 92,000 classified documents pertaining to the war in Afghanistan have been leaked. SPIEGEL, the New York Times and the Guardian have analyzed the raft of mostly classified documents. They expose the true scale of the Western military deployment -- and the problems beleaguering Germany's Bundeswehr in the Hindu Kush. A total of 91,731 reports from United States military databanks relating to the war in...
  • Researcher detained at U.S. border, questioned about Wikileaks

    08/01/2010 8:36:48 PM PDT · by thecodont · 6 replies · 2+ views
    CNET / ^ | July 31, 2010 4:16 PM PDT | By Elinor Mills
    LAS VEGAS -- A security researcher involved with the Wikileaks Web site was detained by U.S. agents at the border for three hours and questioned about the controversial whistleblower project as he entered the country on Thursday to attend a hacker conference, sources said on Saturday. He was also approached by two FBI agents at the Defcon conference after his presentation on Saturday afternoon about the Tor Project. Jacob Appelbaum, a Seattle-based programmer for the online privacy protection project called Tor, arrived at the Newark, New Jersey, airport from Holland flight Thursday morning when he was pulled aside by customs...
  • Al-Qaeda Second-in-Command Ayman Al-Zawahiri: The Only Hope for Palestine...

    07/19/2010 3:22:37 PM PDT · by Cindy · 15 replies · 3+ views - Report ^ | July 19, 2010 | n/a
    July 19, 2010 Special Dispatch No.3106 SNIPPET: "Al-Qaeda Second-in-Command Ayman Al-Zawahiri: The Only Hope for Palestine is to Depose the 'Arab Zionists' In a new 1-hour 3-minute audio recording, Al-Qaeda second-in-command Ayman Al-Zawahiri reaffirms Al-Qaeda's basic strategy regarding Palestine and promised imminent victory in Afghanistan, and addresses words of praise and encouragement to the jihadist groups in North Africa, Somalia, the Arabian Peninsula, Iraq, the Caucasus, Afghanistan, and Pakistan. The video, dated Rajab 1431 (June-July 2010), was produced by Al-Qaeda's media wing, Al-Sahab, and posted on jihadist websites on July 19, 2010. Despite the date shown on the release, it...
  • Is That a Real Tor Bridge You're Connecting To?

    06/28/2010 4:30:40 PM PDT · by Cindy · 5 replies ^ | June 28, 2010 | n/a
    28 June 2010 IS THAT A REAL TOR BRIDGE YOU'RE CONNECTING TO? Or is it a fake Tor bridge being run by the Dogs of Intelligence™?
  • Using TOR with UBUNTU

    02/02/2010 10:11:43 PM PST · by Cindy · 16 replies · 953+ views
    INTERNET ^ | February 2, 2010 | n/a
    02 February 2010 USING TOR WITH UBUNTU All the cool kids are doing it...

    01/10/2010 3:48:46 PM PST · by Cindy · 9 replies · 620+ views ^ | Posted on 10 January 2010 @ 18:57 | n/a
    10 January 2010 SNIPPET: "I'm sure the suspect, known only by his initials of Y.S., was familiar with, and a regular user of, Tor. And yet he didn't get away with it. Can you imagine?"
  • A pill for longer life? A drug slows the march of time in middle-aged mice.

    07/08/2009 11:37:08 PM PDT · by neverdem · 11 replies · 774+ views
    Nature News ^ | 8 July 2009 | Kerri Smith
    Could a pill one day slow ageing in humans?Punchstock Rapamycin, a drug commonly used in humans to prevent transplanted organs from being rejected, has been found to extend the lives of mice by up to 14% — even when given to the mice late in life. In flies and worms, drug treatments have been shown to prolong lifespan, but until now, the only robust way to extend life in mammals has been to heavily restrict diet. The researchers caution, however, that using this drug to extend the lifespan of humans might be problematic because it suppresses the immune system —...
  • Internet Anonymity (Technical info)

    04/14/2009 9:43:06 PM PDT · by NowApproachingMidnight · 39 replies · 1,296+ views
    TOR | self | self
    Brothers, it is time to help you disappear! No, I have not invented a magic cloak, but DARPA (under bush) invented an anonymizing engine called TOR ( that accomplishes that with your Internet traffic. You can download the following file: exe (Note the extra space between the . and the "exe". Remove that and paste into your browser window for direct down load (DDL). Or, alternately go here for more information ( Now, the .exe link is better because it is a standalone copy of firefox with all the proxies and whatnot configured. All you do is run the...
  • Obama to appoint talk radio's executioner?

    11/08/2008 4:04:09 AM PST · by Man50D · 79 replies · 618+ views ^ | November 08, 2008
    Democrat Henry Rivera, a former commissioner of the Federal Communications Commission, is expected to head President-elect Barack Obama's FCC transition team, a move that has sparked fear in media circles that the Fairness Doctrine may return to silence conservative talk radio. If reenacted, the "Fairness Doctrine" would require broadcasts over the public airwaves to give equal time to opposing political views. For talk radio, which boomed after the law's repeal in 1987 by building an audience devoted to conservative talk, the law's return would decimate the industry's marketability. Many fear the "Fairness Doctrine" would drive talk radio hosts – like...
  • How to surf anonymously without a trace

    03/13/2007 6:29:37 AM PDT · by ShadowAce · 93 replies · 19,520+ views
    ComputerWorld ^ | 12 March 2007 | Preston Gralla
    The punchline to an old cartoon is "On the Internet, nobody knows you're a dog," but these days, that's no longer true. It's easier than ever for the government, Web sites and private businesses to track exactly what you do online, know where you've visited, and build up comprehensive profiles about your likes, dislikes and private habits. And with the federal government increasingly demanding online records from sites such as Google and others, your online privacy is even more endangered. But you don't need to be a victim. There are things you can do to keep your surfing habits anonymous...
  • Iran says test of Russian anti-aircraft system was successful

    02/07/2007 5:29:13 AM PST · by HAL9000 · 2 replies · 347+ views
    AFP via translation | February 7, 2007
    Iran successfully tests its system of Russian anti-aircraft defence TEHERAN - Iran tested successfully its new system of delivered anti-aircraft defence Russian TOR-M1 less than one month ago by Russia in spite of criticisms of the United States, declared Wednesday a high person in charge military Iranian, quoted by the Isna agency. “We tested successfully the system of anti-aircraft defence TOR-M1 during the operations Saegheh (the lightning)” which began Wednesday morning in the area of the Gulf and at sea of Oman, declared the general Hossein Salami, the commander of the Air Force of the Guards of the revolution....

    01/23/2007 3:54:47 PM PST · by nuconvert · 40 replies · 1,177+ views
    menewsline ^ | 1 - 23 - 07
    RUSSIA COMPLETES SAM DELIVERY TO IRAN MOSCOW [MENL] -- Russia has confirmed the completion of anti-aircraft deliveries to Iran. A senior Russian official asserted that Moscow delivered all 29 TOR-M1 mobile, short-range surface-to-air missile systems to Iran in late December 2006. The official confirmed a previous statement by Russian Defense Minister Sergei Ivanov, who reported that the deliveries to Iran had been completed. "Russia has fulfilled its contract obligations and fully completed deliveries of TOR-M1 air defense systems to Iran," Sergei Chemezov, the director of the state arms export agency Rosoboronexport, said on Tuesday. "The systems were delivered in late...
  • US urges Russia to reconsider missile export to Iran

    05/26/2006 4:43:26 PM PDT · by familyop · 3 replies · 425+ views
    Xinhua News Agency (government owned) ^ | 26MAY06 | Editor: Luan Shanglin
    WASHINGTON, May 26 (Xinhua) -- The United States on Friday urged Russia to reconsider its decision to honor its commitment to sell Iran the Tor-M1 air defense missile system. "We would hope that Russia would take a second look at this issue," State Department spokesman Sean McCormack told a news briefing. Russia said earlier in the day that it would fulfill a contract to supply its sophisticated Tor-M1 air defense systems to Iran. "Russia has signed a contract with Iran for the supply of Tor-M1 close-range air defense systems to Iran," Russian Defense Minister Sergei Ivanov said. "The contract will...
  • Reports: Russia to Sell Missiles to Iran

    12/02/2005 3:13:48 PM PST · by nuconvert · 18 replies · 760+ views
    yahoo news/AP ^ | Dec 2, 2005
    Reports: Russia to Sell Missiles to Iran By MIKE ECKEL, Associated Press Writer Fri Dec 2, 2005 Russia has agreed to sell more than $1 billion worth of missiles and other defense systems to Iran, Russian news media reported Friday, a move expected to draw a heated reaction from the United States. The Interfax and ITAR-Tass news agencies cited unidentified sources in the Russian military-industrial complex as saying that Russian and Iranian officials had signed contracts in November that would send up to 30 Tor-M1 missile systems to Iran over the next two years. Interfax said the Tor-M1 system could...
  • Russia sells anti-missile systems to Iran (per agreement with Al Gore)

    12/02/2005 2:30:17 AM PST · by HAL9000 · 31 replies · 15,786+ views
    AFP via Babelfish translation | December 2, 2005
    Russia sells anti-missile systems in Iran MOSCOW - Iran signed a contract with Russia on the sale of 29 Russian systems anti-missile Tor M-1, affirmed Friday the financial daily newspaper Russian Vedomosti, quoting sources in Russian military industry. "Iran will defend itself against the United States and Israel with the Russian systems Tor M-1", titrated Vedomosti with the one. According to the sources of the daily newspaper, expressing itself under cover of anonymity, 29 systems' anti-missile Tor M-1 able to intercept cruise missiles and airborne bombs were manufactured by the military factory Koupol with Ijevsk (the Volga) for Greece...
  • Putting Relativity To The Test, NASA's Gravity Probe B To Reveale If Einstein Was Right

    10/09/2005 2:43:18 PM PDT · by Southack · 130 replies · 2,724+ views
    Stanford University ^ | 10/3/2005 | Bob Kahn
    NEWS RELEASE October 3, 2005 Contact: Bob Kahn, Gravity Probe B Public Affairs: (650) 723-2540, Comment: Francis Everitt, Gravity Probe B Principal Investigator: (650) 725-4104, Editor Note: Photos and graphics are available on the web at Relevant Web URLs: Putting relativity to the test, NASA's Gravity Probe B experiment is one step away from revealing if Einstein was right Almost 90 years after Einstein postulated his general theory of relativity—our current theory of gravity—scientists have finally finished collecting the data that will put this theory to an experimental test. For the past 17 months, NASA's...
  • Main (Jewish) Underground Suspect is Released

    09/09/2003 12:52:12 PM PDT · by anotherview · 3 replies · 202+ views
    Arutz Sheva ^ | 9 September 2003
    Main Underground Suspect is Released 19:28 Sep 09, '03 / 12 Elul 5763 The alleged "second Jewish underground" appears to be sizzling down to nothing, or at most very little. The main suspect in the case, Sela Tor - about whom the GSS leaked that he was suspected of "murder" - was released this afternoon. No indictment is expected to be served against him. Tor was incarcerated for three weeks, most of the time without being allowed to meet with a lawyer or his family. Seven of the more than a dozen original suspects remain in prison, only two...
  • Geology Picture of the Week, August 10-16, 2003

    08/13/2003 9:02:56 AM PDT · by cogitator · 6 replies · 214+ views
    Not the best quality picture, but an interesting landform.