Monday, November 28, 2011

Government Increases Hysteria Over Cyber Attacks in Push to Crack Down on Internet


Republican senator John McCain called for the government to establish a special panel to come up with legislation to address supposed cybersecurity threats facing the United States. “The only way to move comprehensive cyber security legislation forward swiftly is to have committee chairmen and ranking members step away from preserving their own committees’ jurisdiction … (and) develop a bill that serves the national security needs of all Americans,” McCain said. As if on cue, the Pentagon announced two previously unpublicized attacks following McCain’s call for a bipartisan action. On Thursday, out-going deputy secretary of defense Bill Lynn said a foreign intelligence service had stolen 24,000 files on a sensitive weapons system from a defense contractor’s network. Lynn said the Defense Industrial Base Cyber Pilot was established to work with the private sector in the battle against cyber foes.
Qwest High-Speed Internet
“Our success in cyberspace depends on a robust public-private partnership,” said Lynn. “The defense of the military will matter little unless our civilian critical infrastructure is also able to withstand attacks.” Lynn cranked up the paranoia in February when he speculated that al-Qaeda might get its hands on the Stuxnet virus. He said “it is possible for a terrorist group to develop cyberattack tools on their own or to buy them on the black market.” The highly sophisticated malware virus was engineered by the United States and with Israeli Mossad assistance placed on an Iranian industrial computer network in order to undermine the country’s nuclear energy program.
$19.99 for Qwest High-Speed Internet!

President Obama on Cybersecurity [VIDEO]

Continue reading 'Government Increases Hysteria Over Cyber Attacks in Push to Crack Down on Internet' at Global Freedom Technology Firm.

Monday, November 21, 2011

11 shocking things you now realize to be true

We are living through a time of great awakening. The people of our world are beginning to open their eyes and realize the stunning depth of the scams and collusion taking place all around them. These scams that steal their wealth, poison them with chemicals, enslave them with financial trickery and control their minds with propaganda. These scams are the very fabric of modern government, the mainstream media, universities and so-called “science” institutions.
Here are 11 of those scams that you probably never would have believed just 2-3 years ago; but now you probably realize these are true!

Continue reading "11 shocking things you now realize to be true" at Global Freedom Technology Firm.

Friday, October 14, 2011

Bill Approved To Create Massive Surveillance Database Of Internet Users

 
Privacy busting legislation a “stalking horse for a massive expansion of federal power”
Legislation that will force Internet providers to store information on all their customers and share it with the federal government and law enforcement agencies was significantly beefed at the last minute yesterday and approved by a U.S. House of Representatives committee.
Under the guise of protecting children from internet pornographers, the House Judiciary committee voted 19-10 to approve a bill that will require Internet Service Providers to store temporarily assigned IP addresses for future government use.
In addition, the bill was re-written yesterday to also include the enforced retention of customers’ names, addresses, phone numbers, credit card numbers and bank account numbers.
As Declan McCullagh of CNet reports, the panel rejected an amendment that would have clarified that only IP addresses must be stored.
“The bill is mislabeled,” said Rep. John Conyers of Michigan, the senior Democrat on the panel. “This is not protecting children from Internet pornography. It’s creating a database for everybody in this country for a lot of other purposes.”
It represents “a data bank of every digital act by every American” that would “let us find out where every single American visited Web sites,” said Rep. Zoe Lofgren, who led Democratic opposition to the bill. The Californian Representative described the legislation as a “mess of a bill” and a “stalking horse for a massive expansion of federal power”.
Up to 75% off Blowout Sale on Selected Items at ZAGG.com. Check it out now.

Sunday, October 2, 2011

Obama Warmly Welcomes Al Qaeda At UN

NATO bombardment will continue

President Obama yesterday led the warm welcome to the al qaeda linked Libyan rebels that have been officially recognized as the country’s new leaders and handed a seat at the UN General Assembly. More diligent observers found the spectacle rather unsettling, to say the least.

“Libya is a lesson in what the international community can achieve when we stand together as one,” said Obama after formally meeting the Libyan Rebels leader Mustafa Abdel-Jalil at the UN.

“Today the world is saying, in one unmistakable voice, ‘We will stand with you as you seize this moment of promise; as you reach for the freedom, the dignity and the opportunity you deserve,’ ” Obama stated, with many noting that the same ‘reach for freedom’ has been deemed to be unhelpful by US officials at the UN where the Palestinian people are concerned.

The president also vowed that the NATO bombardment of Libya would continue, albeit with the “protection” of civilians spin added.

“So long as the Libyan people are being threatened, the NATO-led mission to protect them will continue,” Obama told the summit

“And those still holding out must understand — the old regime is over, and it is time to lay down your arms and join the new Libya.”

Continue reading "Obama Warmly Welcomes Al Qaeda At UN" at Global Freedom Technology Firm.

Friday, September 23, 2011

Border Control: Drug Cartel Demands $30,000 to Let Football Team Cross

In March, Homeland Security boss Janet Napolitano declared security along the U.S-Mexican border “is better now than it ever has been." Napolitano boasted about Congress approving funds for two new unmanned aircraft systems, the erection of two new forward operating bases, 250 Customs and Border Protection port offices and 250 Immigration and Customs Enforcement investigators.
Violent Cartel Thugs
Despite Napolitano’s claim, violence along the border is out of control thanks to the brutal drug war between rival cartels (including those funded by banks) and the Mexican government. In fact, it is not a stretch to say the drug cartels control the border. The cartels regularly threaten U.S. police when they attempt to interdict drug shipments flooding across the border. In 2010, it was widely reported that parts of southern Arizona have been ceded to the cartels.


Rule the office airspace with HELO TC, the RC helicopter you control with your Apple Device. Only at store.GriffinTechnology.com!
Now comes word that the cartels are deciding who will cross the border. The fact was underscored earlier this week when an Austin newspaper reported that a high school football game was cancelled after a Mexican team backed out. From the Statesman:
Round Rock ISD [a Texas school district] athletic director Jim Loerwald confirmed on Wednesday afternoon that Monterrey Tech has backed out of a game that was scheduled to be played on Thursday against Stony Point. According to Loerwald, Monterrey Tech, a football team from Mexico that played games at The Woodlands and Highland Park over the past two weeks, claimed that a cartel was demanding $30,000 in order to let Monterrey Tech cross and come back across the border.
Continue reading "Border Control: Drug Cartel Demands $30,000 to Let Football Team Cross" at Global Freedom Technology Firm.

Friday, August 19, 2011

'Anonymous' Hacks U.S. Law Enforcement Sites, Steals Data


ESET Smart Security - Save 25%

The group known as Anonymous said Saturday it hacked into some 70 mostly rural law enforcement websites in the United States, a data breach that at least one local police chief said leaked sensitive information about an ongoing investigation.


GoDaddy.com Hosting just $1.99/mo! 120x60

The loose-knit international hacking collective posted a cache of data to the Internet early Saturday, including emails stolen from officers, tips which appeared to come from members of the public, credit card numbers and other information.

Anonymous said it had stolen 10 gigabytes worth of data in retaliation for arrests of its sympathizers in the U.S. and Britain.

ESET Smart Security. Get award-winning virus protection with antispam and personal firewall.


Tim Mayfield, a police chief in Gassville, Ark., told The Associated Press that some of the material posted online – including pictures of teenage girls in their swimsuits – was sent to him as part of an ongoing investigation. He declined to provide more details.

Continue reading "'Anonymous' Hacks U.S. Law Enforcement Sites, Steals Data" at Global Freedom Technology Firm.
Globaltechfirm.com

Buy Now!

Summer Sale - 40% on the summer's Hottest Games

Sunday, July 31, 2011

WikiLeaks: Guantanamo Bay terrorist secrets revealed

Al-Qaeda terrorists have threatened to unleash a nuclear hellstorm on the West if Osama Bin Laden is caught or assassinated, according to documents to be released by the WikiLeaks website, which contain details the interrogations of more than 700 Guantanamo detainees. However, the shocking human cost of obtaining this intelligence is also exposed with dozens of innocent people sent to Guantanamo and hundreds of low-level foot-soldiers being held for years and probably tortured before being assessed as of little significance. The Daily Telegraph, along with other newspapers including The Washington Post, today exposes Americas own analysis of almost ten years of controversial interrogations on the worlds most dangerous terrorists. This newspaper has been shown thousands of pages of top-secret files obtained by the WikiLeaks website. The disclosures are set to spark intense debate around the world about the establishment of Guantanamo Bay in the months after 9/11 which has enabled the US to collect vital intelligence from senior Al Qaeda commanders but sparked fury in the middle east and Europe over the treatment of detainees. The files detail the background to the capture of each of the 780 people who have passed through the Guantanamo facility in Cuba, their medical condition and the information they have provided during interrogations.Only about 220 of the people detained are assessed by the Americans to be dangerous international terrorists. A further 380 people are lower-level foot-soldiers, either members of the Taliban or extremists who travelled to Afghanistan whose presence at the military facility is questionable. At least a further 150 people are innocent Afghans or Pakistanis, including farmers, chefs and drivers who were rounded up or even sold to US forces and transferred across the world. In the top-secret documents, senior US commanders conclude that in dozens of cases there is “no reason recorded for transfer”. However, the documents do not detail the controversial techniques used to obtain information from detainees, such as water-boarding, stress positions and sleep deprivation, which are now widely regarded as tantamount to torture. 

Continue reading 'WikiLeaks: Guantanamo Bay terrorist secrets revealed' at Global Freedom Technology Firm.

Globaltechfirm.com

125x125 - Summer Savings Get FREE activation from Sprint! Offer Valid: 8/23-8/30/2011

Saturday, July 23, 2011

Pentagon Declares War On Cyber Enemies


Adobe Creative Suite 5 (CS5) Family
  The Pentagon has announced that computer intrusions from abroad are to be considered acts of war against the United States and will be answered with conventional military force.
“If you shut down our power grid, maybe we will put a missile down one of your smokestacks,” a military official told The Wall Street Journal. In part, the Pentagon intends its plan as a warning to potential adversaries of the consequences of attacking the U.S., according to the Journal.
Save on shipping with Adobe, use Electronic Software Delivery to access your new software instantly.

The Pentagon document is 30 pages in its classified version and 12 pages in the unclassified one. It concludes that the Laws of Armed Conflict are applicable in cyberspace as in traditional warfare.



The Pentagon established a new command last year, headed by Gen. Keith B. Alexander, director of the NSA, to consolidate military network security and attack efforts. Alexander told the Washington Post last November that the new outfit wants maneuvering room to mount what he called “the full spectrum” of operations in cyberspace.
The NSA announced its ambitious cyber security plan last year. Dubbed “Perfect Citizen,” it is designed to detect cyber assaults on private companies and government agencies running such critical infrastructure as the electricity grid and nuclear-power plants, according to the New York Times.
According to the Post, offensive actions may include shutting down part of an opponent’s computer network to head off a cyber-attack or changing a line of code in an adversary’s computer to render malicious software harmless. They are operations that destroy, disrupt or degrade targeted computers or networks, the newspaper reported.

Alex Jones on US cyber mega-agency


World's Largest Registrar - GoDaddy.com

                              at Global Freedom Technology Firm.


Get Unlimited calling and texting from Net10 for just $79.98/month

Pentagon Declares War On Cyber Enemies

Adobe Creative Suite 5 (CS5) Family

The Pentagon has announced that computer intrusions from abroad are to be considered acts of war against the United States and will be answered with conventional military force.
“If you shut down our power grid, maybe we will put a missile down one of your smokestacks,” a military official told The Wall Street Journal. In part, the Pentagon intends its plan as a warning to potential adversaries of the consequences of attacking the U.S., according to the Journal.
The Pentagon document is 30 pages in its classified version and 12 pages in the unclassified one. It concludes that the Laws of Armed Conflict are applicable in cyberspace as in traditional warfare.

Adobe Creative Suite 5 (CS5) Family

Save on shipping with Adobe, use Electronic Software Delivery to access your new software instantly.

The Pentagon established a new command last year, headed by Gen. Keith B. Alexander, director of the NSA, to consolidate military network security and attack efforts. Alexander told the Washington Post last November that the new outfit wants maneuvering room to mount what he called “the full spectrum” of operations in cyberspace.
553_cyberwar

The NSA announced its ambitious cyber security plan last year. Dubbed “Perfect Citizen,” it is designed to detect cyber assaults on private companies and government agencies running such critical infrastructure as the electricity grid and nuclear-power plants, according to the New York Times.

Summer Savings! $7.49 .com domains at GoDaddy.com! World's Largest Registrar - GoDaddy.com

According to the Post, offensive actions may include shutting down part of an opponent’s computer network to head off a cyber-attack or changing a line of code in an adversary’s computer to render malicious software harmless. They are operations that destroy, disrupt or degrade targeted computers or networks, the newspaper reported.

Continue reading 'Pentagon Declares War on Cyber Enemies'

at Global Freedom Technology Firm.

LG501C QWERTY Phone Get Unlimited calling and texting from Net10 for just $79.98/month

Monday, July 18, 2011

SC Gov. Using Inflated Job List In Employment Boast

South Carolina Republican Gov. Nikki Haley is touting state job numbers, repeatedly saying she's thrilled about the 10,000 jobs announced since she took office. But there's a little more to the story.
Credited: S.C. Governor's Office. South Carolina Governor Nikki Haley.   

Some employers are hiring this year, but thousands of those jobs won't come online for years. And the governor's boast includes hundreds of jobs with Amazon.com that she actually fought.

Plus, after repeated questions from The Associated Press, the Haley administration changed its tally several times before dropping it to 9,000 jobs; 4,000 of those are with Wal-Mart.

To be sure, the six-month tally is encouraging for a state long suffering with high unemployment. And the head of the state manufacturers association says he's pleased with Haley's recruiting.

The governor's office says it is not being misleading. Haley says she is working on bringing more jobs to rural areas.

Sunday, July 17, 2011

Afghan CIA Drug Kingpin Shot Dead by Own Bodyguard

Ahmad Wali Karzai, the half brother of Afghan president Hamid Karzai, was assassinated by one of his own bodyguards Tuesday morning. Friend and trusted head of security Sardar Mohammed shot him in the head and chest. Mohammed was in turn shot and killed by fellow bodyguards. The Taliban claimed responsibility for the assassination.

Afghan President Karzai's brother shot dead


Thursday, July 14, 2011

Assange: "WikiLeaks is the intelligence agency of the people"



Send global bulk SMS easily with Communicator 2

Bulk SMS Gateway - Send SMS's from your PC; easy integration!

 The WikiLeaks chief discusses radical journalism and WikiLeaks's main threat in an exclusive New Statesman essay.


In an exclusive essay for the New Statesman, the editor-in-chief of WikiLeaks, Julian Assange, argues that WikiLeaks is a return to the days of the once popular radical press. He also discusses why the New York Times dislikes the whistle-blowing website, and reveals the biggest threat to WikiLeaks today.



the Ultimate Store for the Ultimate Fan

$4.99 Flat Rate Shipping at FansEdge.com
"WikiLeaks is part of an honourable tradition that expands the scope of freedom by trying to lay 'all the mysteries and secrets of government' before the public," writes Assange, who compares WikiLeaks to the pamphleteers of the English Civil War and the radical press of the early twentieth century. "We are, in a sense, a pure expression of what the media should be: an intelligence agency of the people, casting pearls before swine."

Assange argues that the New York Times's hostility to WikiLeaks stems from the newspaper's illiberal tradition of failing to back organisations or figures which challenge established elites. He highlights the newspaper's failure to support the American pacifist and anti-war campaigner Eugene Debs, who was imprisoned for ten years for making an anti-war speech in 1918.

"The New York Times, true to form, had been calling for [Debs's] imprisonment for more than two decades, saying in an editorial of 9 July 1894 that Debs was 'a lawbreaker at large, an enemy of the human race. There has been quite enough talk about warrants against him and about arresting him,'" writes Assange. "Seen within this historical perspective, the New York Times's performance in the run-up to the US-led invasion of Iraq, and its hostile attitude to WikiLeaks today, are not surprising." WikiLeaks only agreed to work with the newspaper, among others, in its major leaks "for reasons of realpolitik", according to Assange.

WikiLeaks is able to succeed because, unlike many of its forebears, it does not rely on advertisers, he continues. "As well as the hostility of governments, popular grass-roots publishers have had to face the realities of advertising as a source of revenue. [T]he Daily Herald...was forced to close despite being among the 20 largest-circulation dailies in the world, because its largely working-class readers did not constitute a lucrative advertising market."


WikiLeaks, however, has other problems, writes Assange: "How do we deal with an extrajudicial financial blockade by Bank of America, Visa (including Visa Europe, registered in London), MasterCard, PayPal, Western Union, the Swiss PostFinance, Moneybookers and other finance companies, all keen to curry favour with Washington?"

Read more at Global Freedom Technology Firm. WikiLeaks Articles.
Questions/Comments? Email me at: info@globaltechfirm.com