Feb 24

- This Man’s $600,000 Facebook Disaster Is A Warning For All Small Businesses (FB) (Business Insider, Feb 22, 2014)

Tags: , ,

Jan 30

- GCHQ taught NSA how to monitor Facebook, Twitter in real time – Snowden leak (RT, Jan 27, 2014):

British intelligence officials can infiltrate the very cables that transfer information across the internet, as well as monitor users in real time on sites like Facebook without the company’s consent, according to documents leaked by Edward Snowden.

The internal documents reveal that British analysts gave instruction to members of the National Security Agency in 2012, showing them how to spy on Facebook, Twitter, and YouTube in real time and collect the computer addresses of billions of the sites’ uploaders.

Continue reading »

Tags: , , , , , , , , , , , , , , , ,

Jan 07

- It’s A Click Farm World: 1 Million Followers Cost $600 And The State Department Buys 2 Million Facebook Likes (ZeroHedge, Jan 6, 2014):

Recently, Facebook got into hot water with investors when it was revealed that as many of its 1.18 billion active users 14.1 million (and likely orders of magnitude more) were fraudulent. Things are even worse at Twitter, where Italian security researchers Andrea Stroppa and Carlo De Micheli found that of the social network’s 232 million monthly active users about 20 million are fake and for sale, while Jason Ding of Barracuda Labs said 10% of more of all Twitter accounts are fake.

Welcome to the world of click farms, where nothing is what it seems, and where social networking participants spend millions of dollars to appear more important, followed, prestigious, cool, or generally “liked” than they really are.

Continue reading »

Tags: , , , , , , ,

Dec 17

- Facebook saves everything you type – even if you don’t publish it (The Age, Dec 14, 2013)

Tags: , , , , ,

Nov 07

- 14 Facts About The Absolutely Crazy Internet Stock Bubble That Could Crash And Burn In 2014 (Economic Collapse, Nov 5, 2013):

Shouldn’t Internet companies actually “make a profit” at some point before being considered worth billions of dollars?  A lot of investors laugh when they look back at the foolishness of the “Dotcom bubble” of the late 1990s, but the tech bubble that is inflating right in front of our eyes today is actually far worse.  For example, what would you say if I told you that a seven-year-old company that has a long history of not being profitable and that actually lost 64 million dollars last quarter is worth more than 13 billion dollars?  You would probably say that I was insane, but the company that I have just described is Twitter and Wall Street is going crazy for it right now.  Please don’t get me wrong – I actually love Twitter.  On my Twitter account I have sent out thousands of “tweets”.  Twitter is a lot of fun, and it has had a huge impact on the entire planet.  But is it worth 13 billion dollars?  Of course not.

When it comes to the Internet, what is hot today will probably not be hot tomorrow. Continue reading »

Tags: , , , , , ,

Oct 12

- Google Is Going to Include Your Face in Its New Ads (Businessweek, Oct 11, 2013):

Google (GOOG) is tinkering with the ever-delicate balance between selling advertisements and creeping its users out. On Friday the company said it would begin including recommendations that Google+ users make in advertisements. The new policy kicks in on Nov. 11.

Here’s how it works: You use Google+ to rate some product or service. It turns out the company behind that product wants to advertise on Google. When the company purchases an ad, your friends will see a version that includes your photo along with what you said about the product.

Continue reading »

Tags: , , , ,

Aug 24

- Terms and Conditions May Apply:

Terms and Conditions May Apply Preview from Hyrax Films Private on Vimeo.

Tags: , , , , ,

Aug 19

- Want To Be “Liked”? There’s A Virus For That (ZeroHedge, Aug 18, 2013):

There was a time when the shadier online “element” was mostly interested in procuring credit card numbers, usually from Eastern European sources, in order to turn a quick buck. However, over time, interest in credit card fraud declined and according to RSA the going rate for 1000 credit card numbers has now dropped to a mere $6. What has taken the place of monetary online fraud, is artificial “likability” and “popularity.” Reuters reports that with the rise of social networking, instead of obtaining credit card numbers, hackers have used their computer skills to create and sell false endorsements – such as “likes” and “followers” – that purport to come from users of Facebook, its photo-sharing app Instagram, Twitter, Google’s YouTube, LinkedIn and other popular websites. This can be seen in the costs charged by “service” providers: 1,000 Instagram “followers” can be bought for $15, while 1,000 Instagram “likes” cost $30. It is likely that the going rates for fake popularity on other online social networks, FaceBook and Twitter is comparable.

In other words, being “liked” and “followed” online – traditionally an indication of influence, importance and power – has become more important than having instant access to liquidity, and naturally, since there is demand for online popularity shortcuts, there is also supply.

Enter Zeus: a computer virus that was once widely used to steal credit card numbers, has now been modified to create bogus likes that can be used to generate buzz for a company or individual.

In short: marketing and self-promotion is now the most impotant gray market commodity on the internet.

From Reuters:

These fake “likes” are sold in batches of 1,000 on Internet hacker forums, where cyber criminals also flog credit card numbers and other information stolen from PCs. According to RSA, 1,000 Instagram “followers” can be bought for $15 and 1,000 Instagram “likes” go for $30, whereas 1,000 credit card numbers cost as little as $6.

Continue reading »

Tags: , , , , , , ,

Aug 03

Flashback:

- UK’s Electronic Eavesdropping And Security Agency GCHQ Also Accesses NSA’s Secret PRISM Programme


Fears of customer backlash over breach of privacy as firms give GCHQ unlimited access to their undersea cables


Verizon, BT and Vodafone Cable have given GCHQ secret unlimited access to their network of undersea cable

- BT and Vodafone among telecoms companies passing details to GCHQ (Guardian, Aug 2, 2013):

Some of the world’s leading telecoms firms, including BT and Vodafone, are secretly collaborating with Britain’s spy agency GCHQ, and are passing on details of their customers’ phone calls, email messages and Facebook entries, documents leaked by the whistleblower Edward Snowden show.

BT, Vodafone Cable, and the American firm Verizon Business – together with four other smaller providers – have given GCHQ secret unlimited access to their network of undersea cables. The cables carry much of the world’s phone calls and internet traffic.

Continue reading »

Tags: , , , , , , , , , , , , , , , , ,

Jul 29

- Edward Snowden’s not the story. The fate of the internet is (Guardian, July 28, 2013):

The press has lost the plot over the Snowden revelations. The fact is that the net is finished as a global network and that US firms’ cloud services cannot be trusted

Repeat after me: Edward Snowden is not the story. The story is what he has revealed about the hidden wiring of our networked world. This insight seems to have escaped most of the world’s mainstream media, for reasons that escape me but would not have surprised Evelyn Waugh, whose contempt for journalists was one of his few endearing characteristics. The obvious explanations are: incorrigible ignorance; the imperative to personalise stories; or gullibility in swallowing US government spin, which brands Snowden as a spy rather than a whistleblower.

Continue reading »

Tags: , , , , , , , , , , , , , , , , ,

Jul 13

FYI.


-  7 People Who Were Arrested Because Of Something They Wrote On Facebook (Business Insider, July 9, 2013)

Tags: , , , , ,

Jul 03

- Washington Post releases four new slides from NSA’s Prism presentation (Guardian, June 30, 2013):

Newly published top-secret documents detail how NSA interfaces with tech giants such as Google, Apple and Microsoft

The Washington Post has released four previously unpublished slides from the NSA’s PowerPoint presentation on Prism, the top-secret programme that collects data on foreign surveillance targets from the systems of nine participating internet companies.

The newly published top-secret documents, which the newspaper has released with some redactions, give further details of how Prism interfaces with the nine companies, which include such giants as Google, Microsoft and Apple. According to annotations to the slides by the Washington Post, the new material shows how the FBI “deploys government equipment on private company property to retrieve matching information from a participating company, such as Microsoft or Yahoo and pass it without further review to the NSA”.

Continue reading »

Tags: , , , , , , , , , , , , , , , , , , , , , ,

Jun 29

- Infowars.com BLOCKED From Sharing on Facebook (Veterans Today, June 26, 2013):

”When they come for our guns, the time has come to use them!”–Jim Fetzer

In another stunning display of the power and arrogance of the national security state, when I attempted to “share” the below article from about a new legislative proposal for internment camps around the county, should there be an emergency need for them, I was blocked by the following notice:

What more proof do we need that we are already in the grip of the national security state, that we are no longer “the home of the brave and the land of the free” and that heavily-armed soldiers supported by light tanks and using assault weapons will soon be knocking at our door to confiscate any weapons we may have.

Permanent Link to Concentration Camps Revisited: National Emergency Centers Establishment Act 2013 Infowars.com – June 25, 2013


On Tuesday, a caller to the Alex Jones Show brought up H.R.390, the National Emergency Centers Establishment Act, introduced in the House of Representatives on January 23 of this year by Florida Democrat Alcee L. Hastings.

The bill – submitted to the Subcommittee on Intelligence, Emerging Threats & Capabilities – is a reformulation of an earlier bill going by the same name, H.R. 645, introduced in 2009. That bill was referred to committee and subsequently died there.

If it had made it out of committee, the earlier legislation would direct the Secretary of Homeland Security to do the following:

Continue reading »

Tags: , , , , , , , , , , , , , , ,

Jun 23

- Facebook Says Technical Flaw Exposed 6 Million Users (New York Times, June 21, 2013):

SAN FRANCISCO — Facebook has inadvertently exposed six million users’ phone numbers and e-mail addresses to unauthorized viewers over the last year, the company said late Friday.

Facebook blamed the data leaks, which began in 2012, on a technical flaw in its huge archive of contact information collected from its 1.1 billion users worldwide. As a result of the problem, Facebook users who downloaded contact data for their list of friends obtained additional information that they were not supposed to have.

Continue reading »

Tags: , , ,

Jun 13


YouTube Added: 11.06.2013

Full Keiser Report:

Keiser Report: PRISM, SOPA, PIPA, ACTA, etc. Copyright Prostitutes!

(Don’t miss his guest “The artist taxi driver”!)

YouTube Added: 11.06.2013

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Jun 08

Related info:

- President Obama & America’s Internet Companies Are ALL LYING – Here Is How Your Data Is Handed Over To Uncle Sam

- UK’s Electronic Eavesdropping And Security Agency GCHQ Also Accesses NSA’s Secret PRISM Programme

- Obama Regime To Shoot The PRISM-Gate Messenger, Launches Criminal Probe Into NSA Leaks

- President Obama Defends Unconstitutional Surveillance Programs In San Jose Speech


- How Google, Facebook, Skype, Yahoo and AOL are all blatantly lying to their own users in denying NSA spy grid scheme (Natural News, June 8, 2013):

What do Google, AOL, Skype, Facebook, Apple, Hotmail and Yahoo all have in common? They have all been caught turning over private user data to the government’s spy agency, the NSA. All these companies routinely turn over the emails, voice calls, text chats, photos, files and even logins and passwords of their users, including Americans.

“There is a massive apparatus within the United States government that with complete secrecy has been building this enormous structure that has only one goal,” journalist Glenn Greenwald recently told Piers Morgan (who knows all about spying and hacking people’s private data). “And that is to destroy privacy and anonymity not just in the United States but around the world.”

Tech companies rush to issue (false) denials

Continue reading »

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , ,

Jun 08

- “You Should Use Both” – How America’s Internet Companies Are Handing Over Your Data To Uncle Sam (ZeroHedge, June 8, 2013):

In the aftermath of the PRISM spying scandal, the first and logical response was an expected one: lie. The president did it, and so did the various companies implicated in the biggest US surveillance scandal ever exposed. To wit:

  • Zuckerberg: “Facebook is not and has never been part of any program to give the US or any other government direct access to our servers.”
  • Google CEO Larry Page: “We have not joined any program that would give the US government – or any other government – direct access to our servers.”
  • Yahoo: “We do not provide the government with direct access to our servers, systems, or network.”

One small problem: they are all lying.

The NYT explains just how the explicit handover of private customer data from Corporate Server X to NSA Server Y takes place.

The companies that negotiated with the government include Google, which owns YouTube; Microsoft, which owns Hotmail and Skype; Yahoo; Facebook; AOL; Apple; and Paltalk, according to one of the people briefed on the discussions. The companies were legally required to share the data under the Foreign Intelligence Surveillance Act. People briefed on the discussions spoke on the condition of anonymity because they are prohibited by law from discussing the content of FISA requests or even acknowledging their existence.

In at least two cases, at Google and Facebook, one of the plans discussed was to build separate, secure portals, like a digital version of the secure physical rooms that have long existed for classified information, in some instances on company servers. Through these online rooms, the government would request data, companies would deposit it and the government would retrieve it, people briefed on the discussions said.

Continue reading »

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , ,

Jun 08

UK security agency GCHQ gaining information from world’s biggest internet firms through US-run Prism programme


Documents show GCHQ (above) has had access to the NSA’s Prism programme since at least June 2010. Photograph: David Goddard/Getty Images

- UK gathering secret intelligence via covert NSA operation (Guardian, June 7, 2013):

The UK’s electronic eavesdropping and security agency, GCHQ, has been secretly gathering intelligence from the world’s biggest internet companies through a covertly run operation set up by America’s top spy agency, documents obtained by the Guardian reveal.

The documents show that GCHQ, based in Cheltenham, has had access to the system since at least June 2010, and generated 197 intelligence reports from it last year.

The US-run programme, called Prism, would appear to allow GCHQ to circumvent the formal legal process required to seek personal material such as emails, photos and videos from an internet company based outside the UK.

Continue reading »

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Jun 08

- Spy state shock: Gmail, Yahoo Mail, Facebook, Skype, AOL, Apple all secretly sharing private user communications with NSA (Natural News, June 7, 2013)

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , ,

Jun 06

- Disclosed classified docs show vast, real-time, warrantless NSA online surveillance (RT, June 6, 2013):

Classified information obtained by the Washington Post and The Guardian has revealed a massive, warrantless online surveillance system in use by a US military intelligence agency, giving access to Americans’ search history, emails, live chats and more.

The 41-page PowerPoint presentation, which has been verified by both papers and published almost concurrently on Thursday evening, outlines details of a previously undisclosed program known as PRISM, which allows the fabled military intelligence agency to harvest massive amounts of data on everything from electronic correspondence to file transfers.

The slides were meant to be declassified in 2036.

According to the documents, the program currently boasts access to some of the largest Internet companies in the world, with Microsoft thought to be the first corporation to sign onto the surveillance arrangement in 2007.

That company’s participation was followed by Yahoo in 2008, Google, Facebook and PalTalk in 2009, YouTube in 2010, Skype and AOL in 2011, and Apple joining in 2012. Meanwhile, cloud storage company Dropbox is described as “coming soon.”

With the participation of those companies, PRISM and thereby Washington intelligence workers have access to the bulk of Americans’ email, video and voice chat, videos, photos, voice-over-IP (Skype) chats, file transfers, social networking details and more. Continue reading »

Tags: , , , , , , , , , , , , , , , , , , , , , , , ,