Free Republic 4th Quarter Fundraising Target: $88,000 Receipts & Pledges to-date: $18,921
21%  
Woo hoo!! And the first 21% is in!! Thank you all very much!!

Keyword: hacking

Brevity: Headers | « Text »
  • Supreme Court Justice John Roberts Was ‘Hacked’ By Obama Officials

    10/13/2018 10:41:17 AM PDT · by gaijin · 95 replies
    Big League Politics ^ | July 12, 2017 | Patrick Howley
    (this story is 1 year old) Evidence shows that John Roberts, chief justice of the United States Supreme Court, was “hacked” by a Deep State surveillance operation overseen by Obama administration CIA director John Brennan and Obama director of national intelligence James Clapper. Roberts, the Bush appointee who made the decisive vote to uphold the constitutionality of Obamacare before the 2012 election, was allegedly the victim of the same Deep State surveillance program that spied on President Donald Trump. (continues at source)
  • Global Internet Outage Over Next 48 Hours Could Affect Some Users, According To ICANN

    10/12/2018 3:03:07 PM PDT · by SaveFerris · 16 replies
    fossbytes.com ^ | October 12, 2018 | Anmol Sachdeva
    ICANN has scheduled the Root Zone Key Signing Key (KSK) Rollover for today, and it could affect some DNS users all over the world. By Rolling the KSK, ICANN implies that a new cryptographic public and private key pair will be generated and the private key will be distributed to internet service providers, enterprise network administrators, and Domain Name System (DNS) resolver operators. KSK Rollover operations began in October 2016 and were scheduled for October 2017. However, ICANN announced that the rollover has been postponed due to the fact that “a significant number of resolvers used by Internet Service Providers...
  • I'm No Longer Using imgbb dot com For Posting FReep Images

    10/10/2018 11:01:15 PM PDT · by CaliforniaCraftBeer · 13 replies
    freerepublic.com ^ | October 10, 2018 | CaliforniaCraftBeer
    Effective immediately I won't be using the free image hosting service called imgbb.com. Over the last 2 weeks I've noticed a HUGE increase in pop-up ads in my lower right hand corner of my monitor (whether I'm online or not all), many ads seem legitimate software upgrade offers, but others are invitations to date various women of Asian countries. These small pop-up ads all have the source listed as ibb.co, which I've discovered is originating from imgbb.com. With all of my image posts I may be spreading this same '3rd Party Cookie' advertisements to my fellow FReeper's, so I've decided...
  • Chinese Hardware Hack Shows That the U.S. Needs More Than Tariffs to Contain the Dragon

    10/06/2018 7:22:15 AM PDT · by SeekAndFind · 18 replies
    PJ Media ^ | 10/06/2018 | Spengler (AKA David Goldman)
    We need to make our own hardware, now. Bloomberg/Business Week this morning broke the most disturbing spy story in years: Chinese cyber-spies embedded a secret back door onto computer motherboards intended for super-secret CIA cloud computing. The techies at Amazon Web Services discovered one particular back door in hardware built by Chinese subcontractors for Supermicro of San Jose, California, one of the world's biggest suppliers of motherboards.Bloomberg reports: Nested on the servers’ motherboards, the testers found a tiny microchip, not much bigger than a grain of rice, that wasn’t part of the boards’ original design. Amazon reported the discovery to...
  • Radical Activist Filmmaker Laura Poitras Shared Byline on WaPo NSA Story

    06/11/2013 5:59:29 PM PDT · by Nachum · 13 replies
    Free Beacon ^ | 6/11/13 | Alana Goodman
    The coauthor of the Washington Post’s bombshell story on the National Security Agency’s PRISM surveillance program is a long-time activist filmmaker who has railed against U.S. counterterrorism policies put into place after the Sept. 11 attacks. Filmmaker Laura Poitras, who shared the lead byline with former Post journalist Barton Gellman on the paper’s front-page NSA story, is not on the Post’s staff and is not a print reporter. Poitras has criticized the “illegal” Guantanamo Bay detention facility, described enhanced interrogation techniques as “legalized torture,” and criticized the intelligence community’s surveillance methods in her films and public comments. While traditional media...
  • Biggest threat to U.S. tech sector is Chinese espionage: Report

    09/06/2018 1:11:06 PM PDT · by SleeperCatcher · 6 replies
    The National Sentinel ^ | 9/6/18 | USA Features
    Theft: The Chinese are the biggest thieves of U.S. technology, according to a new report, stealing hundreds of billions worth of data a year. The report by the Foundation for Defense of Democracies warns Chinese cyber espionage is the “single greatest threat to U.S. technology,” draining more than $300 billion a year from the economy.
  • China and Clinton Emails: Hack or Invitation?

    08/30/2018 8:38:56 AM PDT · by SeekAndFind · 10 replies
    American Thinker ^ | 08/30/2018 | By Brian C. Joondeph
    A Chinese-owned company operating in the Washington, D.C. area hacked Hillary Clinton's private email server, gaining real-time access to her emails during her term as U.S. secretary of state. The Daily Caller reported this bombshell, corroborated by two sources. One might quibble about unnamed sources, but this is the new standard in journalism. CNN, NBC, the N.Y. Times, and the rest of the fakestream media regularly rely on anonymous sources for their anti-Trump stories. Apparently, the Chinese wrote code that they embedded into Clinton's home server in her Chappaqua home, which conveniently sent a copy of all of her emails...
  • REPORT: China systematically crippled CIA operations, killing or imprisoning up to 20 sources

    08/29/2018 2:33:50 PM PDT · by CivilWarBrewing · 67 replies
    Reuters / Business Insider ^ | MAY 21, 2017 | Doina Chiacu
    WASHINGTON (Reuters) - China killed or imprisoned 18 to 20 CIA sources from 2010 to 2012, hobbling U.S. spying operations in a massive intelligence breach whose origin has not been identified, the New York Times reported on Saturday. Investigators remain divided over whether there was a spy within the Central Intelligence Agency who betrayed the sources or whether the Chinese hacked the CIA's covert communications system, the newspaper reported, citing current and former U.S. officials.
  • That time CHINA hacked all of Hillary Clinton’s emails and the FBI…did nothing

    08/28/2018 12:27:13 PM PDT · by SleeperCatcher · 27 replies
    The National Sentinel ^ | 8/28/18 | USA Features
    Major Breach: Anyone who is honest about Hillary Clinton’s use of a private email server during her time as secretary of state knows that the former U.S. senator and first lady set it up so she could operate free from government recordkeeping requirements and transparency laws. Not content to merely create a secret email address using a commercial email platform like Google, Hillary wanted her own separate, controllable operation. Too bad she didn’t put as much effort into protecting our country as she did in trying to be a sneaky criminal.
  • CNBC: 'No, a Teen Did Not Hack a State Election'

    08/25/2018 5:50:41 PM PDT · by PJ-Comix · 7 replies
    Newsbusters ^ | August 25, 2018 | P.J. Gladnick
    It the latest example of fake news it turns out that all the recent hype in much of the mainstream media about teens being able to hack state election systems were untrue. The details of what actually happened were revealed in a CNBC article on Friday by Lilia Chang, "No, a teen did not hack a state election."  Among the MSM outlets hyping the teenage hacker story were Politico Magazine and CNN. Of course, once it was revealed that no such hacking really took place they immediately issued corrections to their original fables... I kid! As of this writing no...
  • CNN: DNC notified FBI of attempted hack of voter database

    08/22/2018 10:05:42 AM PDT · by yesthatjallen · 22 replies
    The Hill ^ | 08/22/18 | Jacqueline Thomsen
    The Democratic National Committee (DNC) has notified the FBI of what it believes to be an attempt to hack into its voter database, CNN reported Wednesday. A Democratic source told the network that the organization received an alert early Tuesday that a fake login site had been created to try and obtain usernames and passwords from those seeking to access the database. The alert was reportedly issued by the cloud service provider for the database and the San Francisco-based security firm Lookout. The fake pages were designed to look like the site used by Democratic officials and candidates across the...
  • Cash machines could be mass-hacked in global cyber attack, FBI warns (within days)

    08/13/2018 12:53:50 PM PDT · by MarchonDC09122009 · 95 replies
    UK Telegraph ^ | 8/13/2018 | Natasha Bernal
    Cash machines could be mass-hacked in global cyber attack, FBI warns https://www.telegraph.co.uk/technology/2018/08/13/uk-cash-machines-could-mass-hacked-global-cyber-attack-fbi-warns/ By: Natasha Bernal  13 AUGUST 2018 • 2:06PM Banks have been warned of an imminent threat that their cash machines could be mass-hacked by cyber criminals. In a confidential alert on Friday, America's Federal Bureau of Investigation told international banks that criminals are plotting a concerted global malware attack on cash machines in the next few days.  The FBI issued a warning about a highly choreographed fraud scheme known as an ATM "jackpotting", in which crooks hack a bank or payment card processor and use cloned cards at cash machines around the world to...
  • The Jig Is Not Yet Up: Kim Jong-Un Turns to Cyber Crime

    08/13/2018 9:44:38 AM PDT · by CondoleezzaProtege · 5 replies
    Korea Economic Institute ^ | July 2018 | Linnea Logie
    North Korea is rapidly amassing capabilities with arguably greater destructive potential than nuclear or ballistic missiles. Pyongyang’s elaborate licit and illicit financial networks grow more sophisticated and its army of cyber warriors grows more adept with each passing day, posing fearsome threats to Northeast Asia, the United States, and the entire international system. Meanwhile, behind a veil of nuclear belligerence, the ruling Kim family has been quietly and painstakingly preparing to fight the next war: a “Secret War” waged not with guns and bullets, but with information and network access. Former NSA deputy director Chris Inglis describes cyber as a...
  • AWAN WALKS

    08/11/2018 2:24:32 AM PDT · by Rabin · 34 replies
    power line ^ | JULY 3, 2018 | SCOTT JOHNSON
    Debbys’ Awan, & Robs’ magnificent nine. Free… snipp HTTP://DAILYCALLER.COM/2018/06/04/WASSERMAN-SCHULTZ-AWAN-ISLAMOPHOBE/ WASSERMAN SCHULTZ SCREAMED AT HOUSE OFFICIALS TO KILL HACKING PROBE, INTERVENED IN PAKISTANI CRIMINAL MATTER // snipp // https://www.fbi.gov/wanted/cyber/iranian-mabna-hackers On February 7, 2018, a grand jury sitting in the United States District Court for the Southern District of New York, indicted nine (non DWS) Iranian nationals for their alleged involvement in computer intrusion, wire fraud, and aggravated identity theft offenses. //snipp// State-Sponsored Cyber Theft Nine (non DWS)Iranians Charged in Massive Hacking Campaign on Behalf of Iran Government https://www.fbi.gov/news/stories/nine-iranians-charged-in-hacking-scheme-032318
  • North Korea's hackers are re-using old code to build new attacks

    08/09/2018 10:53:45 AM PDT · by 2ndDivisionVet · 9 replies
    ZD Net ^ | August 9, 2018 | Danny Palmer
    (VIDEO-AT-LINK) New analysis of malware campaigns suggests that North Korean hackers may have re-used malware and computer infrastructure, leaving a trail which increasingly allow incidents to be traced back to them. Examination of malware believed to be associated with North Korean cyber operations found the same code is often re-used in multiple attacks -- and increasing the confidence that a string of campaigns over the last decade have been the work of the hackers in the country. The joint research by security firms McAfee and Intezer reveals new connections between attacks believed to be the work of North Korea, a...
  • A Group of Top Government Spooks & Hackers on the FBI’s Payroll Just Tore Mueller’s Russian Indic

    07/31/2018 11:30:11 AM PDT · by bitt · 16 replies
    TRUEPUNDIT ^ | 7/31/2018 | Investigative Bureau
    We asked a number of government spooks and hackers and contractors who have worked for the FBI and other spooky federal agencies to examine Robert Mueller’s latest indictments of 12 alleged Russian “operatives.” Their conclusion? HOAX. Mueller’s team fabricated evidence. And a whole lot of evidence. What kind of evidence? It’s all right here. Whether you understand IT or not, the evidence Mueller claims points to Russia actually also points to India, Pakistan and of course China. Funny though, Mueller never mentions that in his indictment. Wonder why? President Trump has called it a witch hunt. And a number of...
  • Hackers demonstrate ability to break into any voting machine at Las Vegas convention

    07/30/2018 9:08:24 AM PDT · by SeekAndFind · 14 replies
    American Thinker ^ | 07/30/2018 | Thomas Lifson
    The only way to ensure the integrity of our elections is a return to paper ballots, a "back to the future" scenario that somehow doesn't seem to excite many Democrats.  They would rather wail about "Russia hacking the election" to delegitimize President Trump, even though Rod Rosenstein recently assured us that not one vote was changed. The fact that no electronic voting system can be reliably protected against hackers was once again demonstrated this weekend at "Defcon," a computer gathering in Las Vegas. Defcon last year (via CBS screen grab).Hackers there took on the challenge of hacking into 30 voting machines...
  • Hillary Clinton Mega-Donor Nabbed in NXIVM Sex Cult Arrest Spree

    07/24/2018 10:15:04 PM PDT · by a little elbow grease · 55 replies
    constitution.com ^ | 7/24/18 | Andrew West
    (snip) -- There is another echelon of society that you and I may never experience. It is reserved for the unhealthily wealthy who have long abandoned the concept of consequences. And, without consequences, these bizarre, left-leaning cretins of depravity have turned to sickening and abhorrent behavior that is just now finding exposure in the media. Such is the case with deplorable Hollywood sex cult NXIVM, whose leadership has found themselves targeted once again this week. Federal agents on Tuesday arrested NXIVM co-founder Nancy Salzman, her daughter Lauren Salzman and longtime bookkeeper Kathy Russell. Clare Bronfman, the longtime operations director for...
  • Microsoft discloses first known hacking attempts in midterm elections

    07/19/2018 4:36:01 PM PDT · by tcrlaf · 10 replies
    MSN/The Hill ^ | 7-19-2018 | Ali Breland
    Microsoft disclosed Thursday that it identified and helped thwart hacking attempts on three congressional candidates earlier this year, marking the first publicly known hacking efforts targeting candidates in the 2018 midterm elections. "Earlier this year, we did discover that a fake Microsoft domain had been established as the landing page for phishing attacks," Tom Burt, Microsoft's vice president for security and trust, said at the Aspen Security Forum. "And we saw metadata that suggested those phishing attacks were being directed at three candidates who are all standing for election in the midterm elections," he added. Burt said that Microsoft and...
  • Microsoft discloses first known hacking attempts in midterm elections

    07/19/2018 3:05:37 PM PDT · by yesthatjallen · 19 replies
    The Hill ^ | 07/19/18 | Ali Breland
    Microsoft disclosed Thursday that it identified and helped thwart hacking attempts on three congressional candidates earlier this year, marking the first publicly known hacking efforts targeting candidates in the 2018 midterm elections. “Earlier this year, we did discover that a fake Microsoft domain had been established as the landing page for phishing attacks,” Tom Burt, Microsoft’s vice president for security and trust, said at the Aspen Security Forum. “And we saw metadata that suggested those phishing attacks were being directed at three candidates who are all standing for election in the midterm elections,” he added. Burt said that Microsoft and...