Unless you’ve been living under a rock for the past few months you have probably heard about the dump from the 2012 LinkedIn hack being released. TrustedSec was able to acquire a copy of the list and use it for research purposes. Our friends over at Korelogic have already posted an excellent analysis of the list showing the most common words, patterns, and other statistics so we are not going to rehash that information. The LinkedIn list offers an opportunity for us at TrustedSec to share our password recovery methodology step by step and show how we attack large password breach lists. The passwords gained from these types of breaches are very valuable to us on penetration tests because people often reuse passwords across work and social media. Our hope is that by now everyone on this list has reset their password and is no longer using the password they used for LinkedIn in 2012, however since we cannot be sure, we have no plans to share the list so please don’t ask.
The list we received contained 167,370,909 entries in a SHA1 unsalted hash format. The list contains a large number of duplicate hashes which is valuable for statistical analysis but we don’t need that to go over cracking methodology. After removing all of the duplicates and blank lines we were left with 117,205,871 unique hashes to crack.
We’ve written plenty of times about ridiculous European plans to create a so-called “snippet tax” which is more officially referred to as “ancillary rights” (and is really just about creating a tax on Google). The basic concept is that some old school newspapers are so lazy and have so failed to adapt to the internet — and so want to blame Google for their own failures — that they want to tax any aggregator (e.g., Google) that links to their works with a snippet, that doesn’t pay for the privilege of sending those publishers traffic. As you may remember, Germany has been pushing for such a thing for many, many years, and Austria has been exploring it as well. But perhaps the most attention grabbing move was the one in Spain, which not only included a snippet tax, but made it mandatory. That is, even if you wanted Google News to link to you for free, you couldn’t get that. In response, Google took the nuclear option and shut down Google News in Spain. A study showed that this law has actually done much to harm Spanish publishers, but the EU pushes on, ridiculously.
The United Nations Security Council wants a global “framework” for censoring the Internet, as well as for using government propaganda to “counter” what its apparatchiks call “online propaganda,” “hateful ideologies,” and “digital terrorism.” To that end, the UN Security Council this week ordered the UN “Counter-Terrorism Committee” — yes, that is a real bureaucracy — to draw up a plan by next year. From the Obama administration to the brutal Communist Chinese regime, everybody agreed that it was time for a UN-led crackdown on freedom of speech and thought online — all under the guise of fighting the transparently bogus terror war.
The UN, ridiculed by American critics as the “dictators club,” will reportedly be partnering with some of the world’s largest Internet and technology companies in the plot. Among the firms involved in the scheme is Microsoft, which, in a speech before the Security Council on May 11, called for “public-private partnerships” between Big Business and Big Government to battle online propaganda. As this magazine has documented, Google, Microsoft, Yahoo, and other top tech giants have all publicly embraced the UN and its agenda for humanity. Many of the more than 70 speakers also said it was past time to censor the Internet, with help from the “private sector.” Continue reading »
READ FULL DESCRIPTION: As many of you may have suspected, Israel is paying and training internet bloggers to delete, rewrite, and revise internet content to shape public opinion to Israel’s benefit. Video of the Israeli-sponsored training programs have been leaked to the web (like the video here).
Additionally, investigative reporters that infiltrated these groups have reported that Israelis are being trained to spread disinformation and to try to create conflicts among different religious, racial, and ethnic groups if it would benefit Israel. Some of the seminars also encouraged the workers to spread disinformation on the internet and to attempt to recruit free (unpaid) labor. For example, many of these bloggers have been trained to attempt to make friends with you by pretending that they share an interest in your favorite sports team or movie, or that they went to the same school, but they will ultimately try to recruit you to attack other groups or individuals that Israel thinks is against its national interests (e.g., ‘Muslims,’ ‘Russians,’ ‘Germans,’ ‘Latinos,’ ‘United Nations representatives’ and ‘human rights groups’). Others have been trained to personally attack, stalk, and harass anyone personally that does not agree with Israel. Not only is this type of behavior a terrible injustice to the accuracy of content (it’s actually state-sponsored propaganda), it is also damaging to the public trust because people are being misguided into working as unpaid servants of a government through false pretenses. People really should speak out about this.
Belgian police are warning users not to use the Facebook Reactions feature to respond to posts if they want to protect their privacy. In February, the series of six emoticons, allowing users to express a range of emotions from anger to love, were added to the original thumbs-up option. They came in response to calls for a ‘Dislike’ button.
However, the new expressions are another big ‘like’ for Facebook and a ‘dislike’ for its users — according to Belgian police who claim the site is using them as a way to collect information on people to target advertising toward them. In a statement released on their official website on Wednesday, the Belgian force warned people to avoid using the series of emoticons if they want to preserve their privacy. Continue reading »
It’s turning out to be a bad week for Facebook. As we reported earlier, it was learned that Facebook’s news feed routinely suppressed conservative news. Now, Recode is reporting that Facebook training documents given to its editors have leaked, and they reveal that editors select trending news topics from just ten editors, only one of which could be considered right-wing.
Regulators in Washington are showing increasing interest in tightening rules on political speech on the web, arguing that the dissonant voices enabled by “new media” have become too influential. If that effort is successful, experts wonder whether it could impact more traditional media as well, especially in how it relates to conservatives.
“The best example we can give is going back a few years to when the [Federal Communications Commission] was looking at trying to silence talk radio, which was obviously a realm of conservatism,” said Drew Johnson, executive director of the nonprofit group “Protect Internet Freedom.”
He was referring to the agency’s “Fairness Doctrine,” which required broadcasters to grant equal time to opposing political candidates.
Democrats on the Federal Election Commission demonstrated a similar regulatory ambition in February, when they voted unsuccessfully to apply campaign finance laws, which are traditionally intended to govern paid political advertisements, to unpaid political accounts on Twitter. Continue reading »
Governmental control is nothing compared to what Google is up to. The company is creating a wholly new genus of capitalism, a systemic coherent new logic of accumulation we should call surveillance capitalism. Is there nothing we can do?surveillance capitalism
Google surpassed Apple as the world’s most highly valued company in January for the first time since 2010. (Back then each company was worth less than 200 billion. Now each is valued at well over 500 billion.) While Google’s new lead lasted only a few days, the company’s success has implications for everyone who lives within the reach of the Internet. Why? Because Google is ground zero for a wholly new subspecies of capitalism in which profits derive from the unilateral surveillance and modification of human behavior. This is a new surveillance capitalism that is unimaginable outside the inscrutable high velocity circuits of Google’s digital universe, whose signature feature is the Internet and its successors. While the world is riveted by the showdown between Apple and the FBI, the real truth is that the surveillance capabilities being developed by surveillance capitalists are the envy of every state security agency. What are the secrets of this new capitalism, how do they produce such staggering wealth, and how can we protect ourselves from its invasive power?
“Most Americans realize that there are two groups of people who are monitored regularly as they move about the country. The first group is monitored involuntarily by a court order requiring that a tracking device be attached to their ankle. The second group includes everyone else…”Continue reading »
A couple of days ago I received a disturbing message from a reader in Australia.
* * *
I’m a long term but previously silent reader in Sydney Australia. For most of 2016 your site has been unreachable for me, and I thought it must be down. Turns out it is being blocked by the Australian carrier Optusnet* (my ISP.) I’m now using the Tor Browser to access your site.
(MiddleEastEye) Twitter suspended over 125,000 accounts, most of them linked to the Islamic State (IS) group, as part of a stepped-up effort to eradicate “terrorist content” on the popular messaging platform, it said on Friday.
The accounts frozen since mid-2015 were targeted “for threatening or promoting terrorist acts,” said Twitter, which is under pressure from governments to act but faces a delicate balancing act and is keen not to be seen as censoring free speech.
If you’re an American citizen, then the government has a personal file on you. Think of it like your permanent record from your grade school days. These records contain highly sensitive personal information about you such as where you live, your contact info, your relatives and associates, arrest records, and even speeding tickets. But what many people don’t know, is that this information is all considered “public record,”—and anyone can access it.
Now, a controversial new site is taking things a step further by gathering these records together and posting them online, so anyone with a computer and Internet access can see them. Continue reading »
Earlier today, I published a report which detailed the threat posed to Facebook users. Reportedly, Facebook is releasing private information to the Chinese military. This is to aid the Chinese military when they are called in by the UN to restore order inside the United as civil unrest is tearing apart the country in an economic collapse scenario. I have also covered how Facebook data is mined by the NSA and is being used to compile an enemies of the state list, we frequently refer to as the “Red List”.
Below is an astute Info Wars report on the creation of a world-wide martial law force. There is no question that Infowars and The Common Sense Show are speaking about the same programs with the same objectives. Continue reading »
On Monday the Supreme Court declined to hear a petition from the Electronic Privacy Information Center (EPIC) that sought to force the Department of Homeland Security to release details of a secret “killswitch” protocol to shut down cellphone and internet service during emergencies.
EPIC has been fighting since 2011 to release the details of the program, which is known as Standard Operating Procedure 303. EPIC writes, “On March 9, 2006, the National Communications System (‘NCS’) approved SOP 303, however it was never released to the public. This secret document codifies a ‘shutdown and restoration process for use by commercial and private wireless networks during national crisis.’”Continue reading »
In 2015, the iron fist of power clamped down on humanity, from warfare to terrorism (I repeat myself) to surveillance, police brutality, and corporate hegemony. The environment was repeatedly decimated, the health of citizens was constantly put at risk, and the justice system and media alike were perverted to serve the interests of the powers that be.
However, while 2015 was discouraging for more reasons than most of us can count, many of the year’s most underreported stories evidence not only a widespread pattern that explicitly reveals the nature of power, but pushback from human beings worldwide on a path toward a better world.
1. CISA Pushed Through the Senate, Effectively Clamping Down on Internet Freedom: For years, Congress has attempted to legalize corporate and state control of the internet. In 2011, they attempted to pass PIPA and SOPA, companion bills slammed by internet and tech companies and ultimately defeated after overwhelming public outcry. Then they passed CISPA — which the president threatened to veto, having caught wind of the public’s opposition to heavy regulation of the internet (earlier this year, Obama reversed his position). However, corporate interests, like Hollywood’s studio monopoly, kept lawmakers’ tenacity afloat. Continue reading »
Update: CISA is now the law: OBAMA SIGNS SPENDING, TAX BILL THAT REPEALS OIL EXPORT BAN
* * *
Back in 2014, civil liberties and privacy advocates were up in arms when the government tried to quietly push through the Cybersecurity Information Sharing Act, or CISA, a law which would allow federal agencies – including the NSA – to share cybersecurity, and really any information with private corporations “notwithstanding any other provision of law.” The most vocal complaint involved CISA’s information-sharing channel, which was ostensibly created for responding quickly to hacks and breaches, and which provided a loophole in privacy laws that enabled intelligence and law enforcement surveillance without a warrant.
Ironically, in its earlier version, CISA had drawn the opposition of tech firms including Apple, Twitter, Reddit, as well as the Business Software Alliance, the Computer and Communications Industry Association and many others including countless politicians and, most amusingly, the White House itself. Continue reading »
The controversial Cybersecurity Information Sharing Act (CISA) may be added as a provision in the looming government budget bill.
(TRUTHINMEDIA) The Cybersecurity Information Sharing Act (CISA) was officially approved by the Senate back in October. Since that time, the bill has languished in committee as lawmakers sought to align the Senate bill with the versions passed by the House of Representatives in April.
CISA is designed to allow private companies to easily share threat intelligence with government agencies. Sharing of intelligence is supposed to be voluntary. Critics of the bill say the provisions will only increase the indiscriminate monitoring of legal activity by giving companies immunity from lawsuits for sharing information with the government. Continue reading »
The Pentagon has been given formal approval to start an online propaganda campaign against the Islamic State following a recent push by the US Department of Defense (DoD).
Congress approved the National Defense Authorization Act for 2016 last week and included in it a whole section (1056) on “Information operations and engagement technology demonstrations.”
The section states that the Secretary of Defense “should develop creative and agile concepts, technologies, and strategies across all available media to most effectively reach target audiences, and to counter and degrade the ability of adversaries and potential adversaries to persuade, inspire, and recruit inside areas of hostilities or in other areas in direct support of the objectives of commanders.”
“The Islamic State has grown that strong due to the irresponsible policy of the United States,” exclaimed Russian PM Dmitry Medvedev this morning, demanding that “really consolidated efforts” are needed to counter ISIS’ terrorist threats. This comes just hours after President Obama toughened his rhetoric, vowing that the global coalition formed to destroy ISIS “will not relent,” adding, rather oddly, that the group responsible for the Paris terror attacks is “a bunch of killers with good social media.”
Obama toughens up…
Obama was hit with a wave of criticism in the wake of the terrorists’ attacks in France and Lebanon, which left hundreds dead, having described that burst of violence as a “setback” in the battle against ISIS. So now, as CNN reports, U.S. President Barack Obama toughened his rhetoric against ISIS at a weekend press conference in Malaysia… Continue reading »
Get off Facebook NOW, and NEVER hit anyone elses profile or click a like again, EVER, Facebook is now BANNED for anyone with an ounce of awareness
Via a bug Facebook installs when you visit their web site or click a like, even if you have no account with facebook Facebook can keep on monitoring visitors permanently forever after, including all phone numbers, PASSWORDS TO OTHER WEB SITES, every site you ever visit ever again, and more.
There has been a new development with Facebook. Facebook now plants a bug on your computer that hands them your phone numbers, browsing history, and tracks all future history as well as all photos and anything else you do on your computer if you ever hit the web site or ever click a like, even if you have no facebook account. Facebook has gone full hostile, AVOID FACEBOOK LIKE THE PLAGUE.
How do I know this? Easy, Belgium ordered them to stop doing it, and published the court case.Continue reading »
The following story exemplifies the human spirit at its best, and provides an example of the kinds of things communities can achieve when they bound together to overcome adversity. The sky really is the limit, and as Doe Bay Internet Users Association founder, Chris Sutton, defiantly proclaims:
I think relying on corporate America to come save us all is just not going to happen, but if we all get together and share our resources, communities can do this themselves and be more resilient.
In the wake of Edward Snowden’s revelations detailing pervasive secretive and unconstitutional government spying, many tech companies have taken steps to secure users privacy via end-to-end encryption.
Of all the world’s “leaders,” one person has stood out from the crowd by consistently advocating the most destructive, ignorant and authoritarian solutions. That man is UK Prime Minister David Cameron.
I’ve highlighted this fact time and time again here at Liberty Blitzkrieg. Here are a few examples in case you need some context: Continue reading »
Police are to be given the power to view everyone’s entire internet history in a new surveillance bill to be published next week, according to reports.
The proposed legislation will make it a legal requirement for telecoms and internet service providers to retain all of the web browsing history for all customers for a period of 12 months, according to the Daily Telegraph.
Authorities such as the police, intelligence services and the National Crime Agency would be able to access specific web addresses people had visited, but would need approval from a judge to view the content of websites, emails and social media messages. Continue reading »
There’s a privacy destroying bill moving through Congress called the Cybersecurity Information Sharing Act, or CISA, and it’s imperative that the American public stop it in its tracks. Here are a few bullet points on the bill from Fight for the Future:
All privacy policies effectively null and void. Companies can share any private user data with the government, without a warrant, as long as the government says it is being used for a “cybersecurity” purpose.
In exchange, companies are given blanket immunity from civil and criminal laws, like fraud, money laundering, or illegal wiretapping (if a violation was committed or exposed in the process of sharing data).
Data is shared with a wide array of government agencies, from the FBI and NSA, to the IRS and local law enforcement. Many of these agencies have been breached within the last year and have outdated security systems, opening up the doors to even more cyber attacks.
Companies that play along can get otherwise classified intelligence data from the government, including private information about their competitors.
While the Constitution protects Americans from the federal government, private companies don’t care about your 4th Amendment rights, particularly if you waive them in a “terms of service” agreement. CISA would essentially allow the U.S. government to violate the U.S. Constitution by coercing companies to provide them with data on American citizens it would not otherwise be allowed to collect on its own.
You know things are not well in the world when you hear claims that the Prime Minister of Great Britain had sex with a dead pig’s head and you barely flinch. That’s because sexual relations with farm animal carcasses simply pales in comparison to the man’s disastrous, authoritarian political positions.
In his latest act of verbal diarrhea, David Cameron has gone on the offensive…against Twitter. Little did he know it, but he’s actually quite late in his perceived “insight” into those who use the social media platform. For instance, it was over two years ago when Saudi authorities made their position quite clear. Here’s a excerpt from the post, Saudi Religious Police Chief Goes on the Attack…Against Twitter: Continue reading »
The very foundation of the free Internet is under severe threat from copyright laws that could ban independent media outlets, according to Matt Drudge. “I had a Supreme Court Justice tell me it’s over for me,” said Drudge, warning web users that they were being pushed “pawn-like” into the cyber “ghettos” of Twitter, Facebook and Instagram.
“Reclusive” Drudge says he has not had a photo taken in 8 years
On Monday, we learned that global “leaders” had come to an agreement on the infamous Trans Pacific Partnership, or TPP. While discouraging, this doesn’t mean the game is over – far from it.
Although politicians have come to a secret agreement, this democracy killing, corporate monstrosity still has to pass the U.S. Congress. So it’s now up to all of us to create an insurmountable degree of opposition and make sure this thing is dead on arrival.Continue reading »