Does The CIA Control The Media? - (Video)
The Spanish Civil War Was 'The First Battle Of WWII' - (39 min. - audio) - (March 28, 2016 - Fresh Air/NPR) - Nearly 80 years ago, about 2,800 Americans volunteered to fight in the Spanish Civil War. The war began in July 1936, when Gen. Francisco Franco led a fascist military coup against the country's newly elected democratic government. It lasted until Franco's victory in 1939.
Journalist Adam Hochschild tells Fresh Air's Terry Gross that "it was by far the largest number of Americans before or since who've ever joined somebody else's civil war."
Hochschild chronicles Americans' involvement in the war in his new book, Spain in Our Hearts. ….
But Hochschild points out that not all Americans opposed Franco's regime. For instance, Torkild Rieber, CEO of Texaco, helped Franco by providing his military with a steady and guaranteed supply of oil.
"[Rieber] violated American law in a couple of ways," Hochschild says. "U.S. neutrality legislation was pretty strict and said that if you were selling anything to a country at war the oil couldn't travel on American ships, but he shipped it on Texaco tankers."
The moment the war began, Rieber signaled that he would cut off oil supplies to the Spanish Republic, the democratic side, and would sell oil to Franco's Nationalists. He not only did that, but he gave them the oil at a big discount, which as far as we can tell he never told Texaco shareholders or even his board of directors about.
He did something else as well. Texaco, being a major oil company, had offices, installations, agents, tank farms in ports all over the world, and he sent out orders to them saying, "Send us, as soon as possible, any information you acquire about oil tankers heading for the Spanish Republic." This information was passed on to the Nationalists to help submarine captains and bomber pilots look for targets. Twenty-nine oil tankers heading for the Spanish Republic were destroyed, damaged, or captured during the war, and in at least one or two cases, we can specifically tie it to information supplied by Texaco. So the United States might be neutral, but Texaco had gone to war. - http://tinyurl.com/z4z46l6
By Steve Gibson
Control Automatic and Unwanted
Windows 7 & 8.1 Upgrading to Windows 10
Never 10 is
an easy to use utility which gives users control over
whether their Windows 7 or 8.1 will upgrade itself to Windows 10.
The name “Never 10” is a bit of an overstatement, since this utility may also be used to easily re-enable Windows operating system automatic upgrading. But the primary reason for using this is to disable Windows' pestering insistence upon upgrading Windows 7 or 8.1 to Windows 10.
Many users of Windows 7 and 8.1 are happy with their current version of Windows, and have no wish to upgrade to Windows 10. There are many reasons for this, but among them is the fact that Windows 10 has become controversial due to Microsoft's evolution of their Windows operating system platform into a service which, among other things, aggressively monitors and reports on its users activities. This alone makes many users uncomfortable enough to cause them to choose to wait. In line with this, a few months into 2016, Windows 10 started displaying unsolicited advertisements on its users' desktops. Others dislike the changes Microsoft made by merging their failed “tiled” smartphone user-interface into the Windows UI. And, finally, some object to being force-fed whatever Microsoft wants and simply wish to choose for themselves.In July of 2015, responding to the significant user backlash, Microsoft added features to its Windows Update facility which allow it to be configured, on a machine-by-machine basis, to not forcibly upgrade qualifying Windows 7 and 8.1 operating systems to Windows 10. However, Microsoft did not make this configuration simple. It requires the use of the group policy editor (which is not present in some qualifying systems) and/or the system registry. In other words, they created some deep internal configuration options but chose not to provide a simple user-interface to give their users the choice. “Never10” provides that choice.
Private Probation Companies - (Video)
Rash Of Ransomware Flummoxes Security Experts, FBI
The Problem With Profits - (Video)
Who Is Stealing Your Vote And Why!?! - (Video)
U.S. nuclear plants deteriorating as regulators talk doubling life expectancy
TrueCrypt Programmer Had A Dark Side
Climate Activist Touches Nerve, Clinton Responds With Finger
Associated Press Nazi Connections Revealed By Historian
What Is A Warrant Canary?
How To Spot And Avoid Credit Card Skimmers
The Secret History Of Donald Trump's Goon Squad
5 Drugs That Shaped Major League Baseball - (April 2, 2016 - by Phillip Smith - AlterNet) - Drug issues have been part of professional ball from the very beginning. - http://tinyurl.com/jqyxmz7
The Ransomware That Knows Where You Live
Revealed – The Capitalist Network That Runs The World
Secrets Military Trainers Never Tell Young Recruits About War
Supreme Court Ruling That Led To 70,000 Forced Sterilizations
Get OFF Facebook As Soon As Possible! - (Video)
Hillary Clinton Received A Massive Donation From Walmart Heiress
#DemocracySpring March To The U.S. Capitol - (Video)
Federal Judge Says Confederate Emblem 'Anti-American'
Exposing The Corporate Media's Big Racket
Exposed: Coal Companies Secretly Funding Climate Science Denial
Oil Industry's Suppression Of Climate Science Began In 1940s
New Jersey Transit Is Recording The Conversations Of Its Riders
JFK Jr. Told The World Who Murdered His Father
Life Insurance Industry Under Investigation
Inside Panama Papers: Multiple Clinton Connections
Why Homelessness Is More Common Now Than Just 20 Years Ago
Los Angeles’ Sunset Boulevard - (Video)
How Big Government Helps Big Dairy Sell Milk - (Video)
We're A Secular Nation Guided By The Will Of The People - (Sun., May 8, 2016 - Mel Meyers - St. Louis Post-Dispatch) - "To deny America was founded as a Christian nation is to deny historical fact" is not correct. The framers of the Constitution omitted the words God and Creator from the Constitution. By stating in the very first words of the preamble, "We the people," they were making the point that the U.S. is a secular nation guided and governed by the will of the people, not God's will.
Further proof America was not set up as a Christian nation is the American treaty of 1797 that ended conflict with Tripoli (Treaties of the United States, Volume 2, Document 20, Article 11). It specifically states that "the government of the United States is not in any sense founded on the Christian religion." This treaty was unanimously approved by the U.S. Senate and signed by President John Adams in 1797. No dissent was heard from George Washington, Benjamin Franklin, Thomas Jefferson, James Madison, Alexander Hamilton and many other Founders then alive and active.
It is a paradox that religion has come to occupy such an important place in the public life of a nation founded on the separation of church and state. - http://tinyurl.com/z3mkpbq
Is There A UFO Cover-up? A Government Insider Speaks Out - (May 9, 2016 - by - The Huffington Post) - About six months ago, our board at UFODATA was privileged to welcome Christopher Mellon as the newest member of our team. Chris spent nearly 20 years in the federal government serving in various national security positions. For the first time, he has agreed to speak publicly about his experiences within government as they relate to UFOs.
Q: Do you recall any incidents involving UFOs while you were in government?
A: Yes, there were a handful of incidents. Knowing of my interest in UFOs, a breathless naval aviator called me one day to report that he was present minutes earlier when a Navy jet landed after being circled by a UFO in broad daylight. The Navy did not pursue the issue as far as I could tell. I also recall the Maui Optical Tracking Facility, which tracks satellites, recording a flight of four or five fiery UFOs traversing the night sky. Nobody knew what to make of it. But no government official expressed the slightest interest even after the tape was featured on ABC's Nightline. I found the utter lack of scientific curiosity due to political correctness highly frustrating.
Q: Are you certain there is no government cover-up?
A: It's impossible to prove the negative, so all I can say is that I never saw any evidence of official interest in UFOs. I'd love to believe we have a crashed saucer somewhere, but I've never seen anything remotely supportive of such incredible claims. In my experience, on those rare occasions when UFO incidents involving the government occur, they are highly inconvenient, awkward and embarrassing for the afflicted government officials who want nothing more than to put the issue behind them as quickly as possible! The military seems generally unwilling to investigate even when UFO reports come from our own military pilots or officials in high office such as Fife Symington, the former governor of Arizona. Senior officials are so fearful of being ridiculed that they conceal any expression of interest or curiosity. --- [Note: As far as I'm concerned there can be no doubt that there definitely is a long-standing government UFO cover-up in place. And frankly, anyone who makes a claim to the contrary is either woefully uninformed, misinformed, or a purposeful disinformation agent. Now, to my mind, Mellon’s responses would certainly seem to indicate that he is/was definitely not included in the need-to-know loop; or, just as likely, he's spewing disinformation. --BikeBob]: - http://tinyurl.com/zmxtefr
Hypervision: The Untold Story Of Magic Leap, The World’s Most Secretive Startup - (May 2016 - By Kevin Kelly - Wired Magazine) - Very soon, perhaps in five years, the bounded worlds within virtual reality will begin to be networked together into distributed virtual worlds.
…. Don’t let the relatively portable size of VR and MR wearables fool you. As they get smaller and lighter (and they will), the infrastructure behind them must grow larger and larger. The scale of the servers, bandwidth, processing, storage, and cleverness required to run networked virtual places at the scale of the planet for billions of people is beyond Big Data. It is Ginormous Data.
Which raises another issue. One of the underappreciated aspects of synthetic reality is that every virtual world is potentially a total surveillance state. By definition, everything inside a VR or MR world is tracked. After all, the more precisely and comprehensively your body and your behavior are tracked, the better your experience will be.
This comprehensive tracking of your behavior inside these worlds could be used to sell you things, to redirect your attention, to compile a history of your interests, to persuade you subliminally, to quantify your actions for self-improvement, to personalize the next scene, and so on. If a smartphone is a surveillance device we voluntarily carry in our pocket, then VR will be a total surveillance state we voluntarily enter.
[….]It’s very easy to imagine a company that succeeds in dominating the VR universe quickly stockpiling intimate data on not just what you and 3 billion other people favorite but what you do on weekends, what people you pay attention to, what scares you, where you go when you’re tired, how you greet strangers, whether you’re depressed, and a thousand other details. To do that in real life would be expensive and intrusive. To do that in VR will be invisible and cheap. - http://tinyurl.com/hsg64qs
With Voice, Offline No Longer Exists - (June 1, 2016 - by Evan Dashevsky - PC Magazine) - If you don't like the idea of being digitally tracked (and potentially hacked), you could always choose to not go online. However, with the advent of always-listening tech, going "offline" may no longer be an option. - http://tinyurl.com/zduk5ve
When It Comes To Your Health Care, Buyer Beware - (June 1, 2016 - by The American health care system is capable of many wonderful things, but not all of them are about health or care. It is just as often about selling you things you probably don’t need at a ridiculous price, or finding ways to charge you a ridiculous price even for what you do need.
The folks driving it aren’t generally physicians, nurses or other “health care providers” (to use the parlance of the times). They are businesspeople — executives that run hospitals, pharmaceutical concerns and insurance companies — using health care as their instrument to make money. And sadly, the average physician doesn’t have a lot of choice about lashing his raft to these organizations if he wants to practice his trade.
As a nation, we spend far more than other developed countries for health care, and our outcomes are not as good. Those other countries generally have some form of a single-payer system. ….
I’ve got news from the front lines of the U.S. system. People are dying here, too, in large numbers, and at the same time, they’re going broke paying the bills. Medical expenses, even now that many more people have some form of insurance, are a prime cause of bankruptcy and financial insecurity in the U.S.No health care system is perfect, but here’s what the rest of the civilized world understands: Health care is a right. There is no place for rampant capitalism in treating the sick. This advice is harsh but true: When it comes to your health care, buyer beware. - http://tinyurl.com/jmf7rub
Miranda Rights Explained - (Video)
The Secret Anti-Counterfeit Symbol - (Video)
“First They Came For The Muslims” - (Video)
A Frightening IoT (Internet Of Things) Home Security Camera Experience - (14 min. segment - YouTube audio/video) - (June 21, 2016 - by Steve Gibson - TWiTSecurityNow) - [Note: This jaw-dropping segment -- regarding the wide-open security holes in retail home security cameras (available at Best Buy, Target, Walmart, Amazon, etc.) -- begins at the 31 min. mark.]: - https://www.youtube.com/watch?v=W3AdFoJ8lCs
Do Our Computers Have A Designed-In Rootkit? - (18-1/2 min. segment - YouTube audio/video) - (June 21, 2016 - by Steve Gibson - TWiTSecurityNow) - Steve Gibson talks about the recently discovered "secret" computer chip (in use -- via a series of chip iterations -- for at least the past dozen years) that Intel has put on your computer motherboard. The chip is "always on" (even when your computer is turned OFF!) as long as your computer is plugged in, and/or has a laptop battery plugged in. Steve notes that the chip has access to both the NIC (Network Interface Controller) and your Internet connection. (It may, presumably, be "phoning home" without your knowledge or permission!) He notes that there is absolutely NO way for the user to access the chip, nor to turn it off! --- (In regards to this mysterious "always on" chip, one thing Steve left out of the conversation is any reference to the possible, or probable, involvement of the NSA. --Bike Bob) --- [Note: The segment begins at the 53 min. mark.]: - https://www.youtube.com/watch?v=W3AdFoJ8lCs
The Mystery Of Geronimo's Skull - (Video)
John Oliver: Olympic Sports Doping - (Video)
Want Less Regulation? Reduce The Need For It! - (Video)
USA Today Ducking The Question Of Militarism
The Origins Of Betty Boop - (Video)
2016 Election Fraud & Voter Suppression (Nationwide) Lawsuit - (20-3/4 min. - YouTube audio/video) - The Nationwide Racketeering Lawsuit being filed by Cliff Arnebeck and Bob Fitrakis to prove that Bernie Sanders has in FACT received more votes than Hillary Clinton and has won by such a large margin he does not need the vote of the super delegates to receive the Democratic Nomination. - https://www.youtube.com/watch?v=EKY7aH_9hVM
11 Police Robots Patrolling Around The World - (Photos)
Banks, Drug Cartels And Money Laundering - (Video)
DNC Leak EXPOSES Hillary Victory Fund Bribery - (Video)
SQRL May Eliminate Serious Concerns About
Online Security Security Info /Account Access!
On episode #571 of his weekly 'Security Now!' podcast, Steve Gibson gave an update on his long-awaited, but soon to be fully completed, free SQRL (Secure Quick Reliable Login) application, which is described as: “A highly secure, comprehensive, easy-to-use replacement for usernames, passwords, reminders, one-time-code authenticators . . . and everything else.” SQRL is destined to work with all platforms...Windows, OSX, iOS, Android, Linux, etc.
Gibson noted that SQRL either is -- or, will shortly be -- the most secure method available for essentially bullet-proof logins. He said that will particularly be the case if/when SQRL is made available as either an add-on or natively incorporated into various web browsers.
Steve Gibson has mentioned that SQRL, depending on a person's preference, can be used with a smartphone to scan a QR code, and/or via a simple computer button-click in/with a web browser. Assuming that all works as intended (and, given Steve Gibson's many years' track record, it would be highly improbable if it didn't), SQRL may be the ultimate secure-login solution.
Which brings me to Brian Krebs' article, “Social Security Administration Now Requires Two-Factor Authentication.” I can't say for sure as Steve Gibson didn't address this most recent Soc Sec concern raised by Krebs, but it seems like SQRL would possibly eliminate some of the related problems brought up in the Krebs' article.Let's hope that's the case...and, that the appropriate SQRL browser add-ons and/or in-browser incorporation/s occur sooner rather than later. --Bike Bob
Stealing Payment Card Data And PINs From POS Systems Is Dead Easy - (Aug. 3, 2016 - By Lucian Constantin - PC World) - Lack of authentication and encryption allow attackers to easily steal payment card data and PIN numbers from point-of-sale systems.
…consumers should never, ever, re-enter their PINs on a PIN pad if prompted to do so. They should also read the messages displayed on the screen and be suspicious of those that ask for additional information. - http://www.pcworld.com/article/3103925
The Ticking Time Bomb: Overpopulation! - (Video)
Are Vampires Real? - (Video)
WashPost Makes History: First Paper to Call for Prosecution of Its Own Source (After Accepting Pulitzer) - (Sept. 18, 2016 - by Glenn Greenwald - The Intercept) - Three of the four media outlets that received and published large numbers of secret NSA documents provided by Edward Snowden — The Guardian, the New York Times, and The Intercept –– have called for the U.S. government to allow the NSA whistleblower to return to the U.S. with no charges. That’s the normal course for a news organization, which owes its sources duties of protection, and which — by virtue of accepting the source’s materials and then publishing them — implicitly declares the source’s information to be in the public interest.
But not the Washington Post. In the face of a growing ACLU and Amnesty-led campaign to secure a pardon for Snowden, timed to this weekend’s release of the Oliver Stone biopic “Snowden,” the Post editorial page today not only argued in opposition to a pardon, but explicitly demanded that Snowden — the paper’s own source — stand trial on espionage charges or, as a “second-best solution,” “accept a measure of criminal responsibility for his excesses and the U.S. government offers a measure of leniency.”
…this highlights a chronic cowardice that often arises when establishment figures want to denounce Snowden. As has been amply documented, and as all newspapers involved in this reporting (including the Post) have made clear, Snowden himself played no role in deciding which of these programs would be exposed (beyond providing the materials to newspapers in the first place). He did not trust himself to make those journalistic determinations, and so he left it to the newspapers to decide which revelations would and would not serve the public interest. If a program ended up being revealed, one can argue that Snowden bears some responsibility (because he provided the documents in the first place), but the ultimate responsibility lies with the editors of the paper that made the choice to reveal it, presumably because they concluded that the public interest was served by doing so. - http://tinyurl.com/hajlap5
Is Aspartame Bad For You? - (Video)
Why We Didn't Hear About The FBI Arrest In Houston? - (Video)
Source Code For IoT Botnet ‘Mirai’ Released - (Oct. 16, 2016 - by Brian Krebs - KrebsOnSecurity) - The source code that powers the “Internet of Things” (IoT) botnet responsible for launching the historically large distributed denial-of-service (DDoS) attack against KrebsOnSecurity last month has been publicly released, virtually guaranteeing that the Internet will soon be flooded with attacks from many new botnets powered by insecure routers, IP cameras, digital video recorders and other easily hackable devices.
The leak of the source code was announced Friday on the English-language hacking community Hackforums. The malware, dubbed “Mirai,” spreads to vulnerable devices by continuously scanning the Internet for IoT systems protected by factory default or hard-coded usernames and passwords.
Vulnerable devices are then seeded with malicious software that turns them into “bots,” forcing them to report to a central control server that can be used as a staging ground for launching powerful DDoS attacks designed to knock Web sites offline. - https://krebsonsecurity.com/2016/10/source-code-for-iot-botnet-mirai-released
5 More Computer Viruses You Really Don't Want To Get - (Video)