Thursday, October 30, 2014

France Investigates Mystery Drones Over Nuclear Plants

from Unidentified drones seen over several of France's nuclear reactors in recent weeks prompted the French government to launch an investigation on Thursday.

"Measures are being taken to know what these drones are and neutralize them," French Interior Minister Bernard Cazeneuve told France Info Radio.

According to the state electricity company EDF, the unmanned aircraft were spotted over seven nuclear plants across the country between October 5th and October 20th, without any impact on the plants' safety or functioning.

It is not known who was behind the mysterious flights. Aircraft are not permitted to fly within a 5-kilometer (3-mile) radius and an altitude of 1,000 meters (3,280 feet) over nuclear plants.

In France, suspicion immediately fell on the anti-nuclear lobby. The environmental campaign group Greenpeace denied any involvement in the incident and called the drone sighting "very worrisome." 

Its activists have carried out several break-ins at nuclear plants in recent years in a bid to raise awareness about nuclear safety.

Wednesday, October 29, 2014

#FBI Created Fake Seattle Times Web Page To Nab Bomb-Threat Suspect

from The FBI in Seattle created a fake news story on a bogus Seattle Times web page to plant software in the computer of a suspect in a series of bomb threats to Lacey’s Timberline High School in 2007, according to documents obtained by the Electronic Frontier Foundation (EFF) in San Francisco.

The deception was publicized Monday when Christopher Soghoian, the principal technologist for the American Civil Liberties Union in Washington, D.C., revealed it on Twitter. 

In an interview, Soghoian called the incident “outrageous” and said the practice could result in “significant collateral damage to the public trust” if law enforcement begins co-opting the media for its purposes.

The EFF documents reveal that the FBI dummied up a story with an Associated Press byline about the Thurston County bomb threats with an email link “in the style of The Seattle Times,” including details about subscriber and advertiser information. 

The link was sent to the suspect’s MySpace account. When the suspect clicked on the link, the hidden FBI software sent his location and Internet Protocol information to the agents. A juvenile suspect was identified and arrested June 14. 

Tuesday, October 28, 2014

Elon Musk Likens Artificial Intelligence to a Demon

from CEO of SpaceX and Tesla Motors Elon Musk is sounding the warning bell about artificial intelligence.

Musk compared AI to a demon during a recent interview at the MIT AeroAstro Centennial Symposium, describing it as a danger to the human race.

“I think we should be very careful about artificial intelligence. If I had to guess at what our biggest existential threat is, it’s probably that. So we need to be very careful with artificial intelligence,” Musk said.

“I’m increasingly inclined to think that to there should be some regulatory oversight, maybe at the national and international level, just to make sure that we don’t do something very foolish. With artificial intelligence we’re summoning the demon. You know those stories where there’s the guy with the pentagram, and the holy water, and he’s like — Yeah, he’s sure he can control the demon? Doesn’t work out.”

Musk for months has been the voice of doom when it comes to AI and, it seems, his comments become more dire as time passes. In June he likened AI to the Terminator movies during an interview with NBC.

Musk posted a tweet in August describing AI as being, potentially, “more dangerous than nukes.”

Musk says he invested in AI firm Deep Mind, which has since been snapped up by Google, just so he could keep tabs on what is going on.

Top Secret Unmanned US Space Plane Returns After 'Unspecified Experiments'

from A top secret US military space plane has landed in California after almost two years in orbit above Earth. The unmanned X-37B, which is also known as the orbital test vehicle, was launched in December 2012 by the US Air Force. It was the space plane's third known and longest mission. 

The Air Force said the X-37B robotic space plane landed at Vandenberg Air Force Base in central California on Friday, ending a classified 22-month mission that marked the third in Earth orbit for the experimental program.

The X-37B, a 9-metre winged craft that resembles a miniature NASA space shuttle, touched down at 9:24am (local time).

The craft was carried into orbit for its latest mission aboard an unmanned Atlas 5 rocket from Cape Canaveral Air Force Station in Florida on December 11, 2012.

The spacecraft conducted unspecified experiments while in orbit, the Air Force said.

Video: Unmanned #NASA Rocket Explodes Shortly After Takes Off

from Several months ago, a Russian rocket, carrying Russia's most advanced communications satellite, exploded on launch and the west was amused at Russia's seeming incompetence, while birthing extensive speculation of the NSA's involvement. Well, moments ago either Karma, or Russian hackers, intervened, and 6 seconds after launch, the NASA unmanned Antares rocket of rocket-maker Orbital Sciences, likewise ended its mission prematurely in a massive flaming fireball.

RELATED: “Classified Crypto Equipment” Onboard Crashed Rocket -

Thursday, October 2, 2014

How #HongKong Protesters Get Around Official #Censorship

from They're going up against one of the most brutal, heartless regimes on the planet that censor everything. Yet demonstrators in Hong Kong are still getting their message out. Here's how they're doing it...

Sunday, September 28, 2014

Secret Recordings Show #GoldmanSachs and #TheFed In Bed

As the Fed's secrets are revealed, will the world turn to #Bitcoin?
from Today secret tapes of correspondence from Goldman Sachs and the Federal Reserve were released. The truth is not pretty and it may be even more shocking than you think. Observers of the Fed have long known that it is extremely secretive. What they haven't known is what it is secretive about. Much of the work is guess work. Now we finally know what is actually going inside the Fed.

Saturday, September 13, 2014

U.S. Teen Wins $50,000 Grant For Fingerprint-Access Handgun Sensor

from A young inventor in Boulder, Colorado will receive a $50,000 grant from the Smart Tech Challenges Foundation to continue working on a biometric sensor that prevents unauthorized individuals from firing a weapon.

Kai Kloepfer, a high school student from Boulder, Colorado, is the first benefactor of the $1 million Smart Tech for Firearms Challenge, which will award grants to a total of 15 innovators “who are working to improve firearm safety by developing personalization features in firearms, locking devices, and ammunition systems,” the foundation said in a release.

Kloepfer, 17, first developed the sensor on a plastic model of a Beretta Px4 for less than $3,000.

Using stored fingerprints, the sensor enables authorized users who are holding a gun to activate the trigger, while those users who are unauthorized will not be able to fire the weapon. In Kloepfer’s tests, the sensor prototype successfully worked 99.99 percent of the time.

U.S. Tech Giant Fined $58 Million for Bribery

from A subsidiary of U.S. technology giant Hewlett-Packard was hit with a multi-million-dollar fine Thursday for bribing Russian government officials.
The company's Russian division will have to pay $58.7 million after pleading guilty in a California court to violating U.S. anti-bribery and accounting laws.

HP Russia admitted to paying off government officials to secure a $45 million contract with the Office of the Prosecutor General of the Russian Federation.

Principal Deputy Assistant Attorney General Marshall Miller of the Justice Department’s Criminal Division called the illicit deal in Russia "troubling."

"Tech companies, like all companies, must compete on a level playing field, not resort to secret books and sham transactions to hide millions of dollars in bribes," Miller said in a written statement. "The Criminal Division has been at the forefront of this fight because when corruption takes hold overseas, American companies and the rule of law are harmed."

Other HP subsidiaries in Poland and Mexico were convicted under the same law earlier this year, bringing total fines to the company and its affiliates to $108 million.

Friday, September 5, 2014

The Police Tool That Pervs Use to Steal Nude Pics From Apple’s iCloud

from As nude celebrity photos spilled onto the web over the weekend, blame for the scandal has rotated from the scumbag hackers who stole the images to a researcher who released a tool used to crack victims’ iCloud passwords to Apple, whose security flaws may have made that cracking exploit possible in the first place. But one step in the hackers’ sext-stealing playbook has been ignored—a piece of software designed to let cops and spies siphon data from iPhones, but is instead being used by pervy criminals themselves.

On the web forum Anon-IB, one of the most popular anonymous image boards for posting stolen nude selfies, hackers openly discuss using a piece of software called EPPB or Elcomsoft Phone Password Breaker to download their victims’ data from iCloud backups. That software is sold by Moscow-based forensics firm Elcomsoft and intended for government agency customers. In combination with iCloud credentials obtained with iBrute, the password-cracking software for iCloud released on Github over the weekend, EPPB lets anyone impersonate a victim’s iPhone and download its full backup rather than the more limited data accessible on And as of Tuesday, it was still being used to steal revealing photos and post them on Anon-IB’s forum.

“Use the script to hack her passwd…use eppb to download the backup,” wrote one anonymous user on Anon-IB explaining the process to a less-experienced hacker. “Post your wins here ;-)”
Apple’s security nightmare began over the weekend, when hackers began leaking nude photos that included shots of Jennifer Lawrence, Kate Upton, and Kirsten Dunst. The security community quickly pointed fingers at the iBrute software, a tool released by security researcher Alexey Troshichev designed to take advantage of a flaw in Apple’s “Find My iPhone” feature to “brute-force” users’ iCloud passwords, cycling through thousands of guesses to crack the account.