Tuesday, July 22, 2014

Commission releases updated list of post 9/11 concerns

WASHINGTON -- Ten years ago Tuesday, the members of the National Commission on Terrorist Attacks upon the United States issued the 9/11 Commission Report, the official account of the horrific attacks of Sept. 11, 2001.

A decade later, the members have reconvened as private citizens to reflect upon the changes of the past 10 years and the emerging threats the U.S. faces as a country. In recent months, they have spoken with some of the country's most senior national security leaders -- current and recently retired. What the former commissioners, now working as the Bi-Partisan Policy Center, found: "counterterrorism fatigue and a waning sense of urgency among the public threaten U.S. security."

According to their report, "many Americans think that the terrorist threat is diminishing -- that, as a country, we can begin turning back to other concerns. They are wrong..."

http://www.wtop.com/215/3667024/10-years-after-911-Commission-report

Meet the Online Tracking Device That is Virtually Impossible to Block

Update: After this article was published, YouPorn contacted us to say it had removed AddThis technology from its website, saying that the website was "completely unaware that AddThis contained a tracking software that had the potential to jeopardize the privacy of our users." A spokeswoman for the German digital marketer Ligatus also said that is no longer running its test of canvas fingerprinting, and that it has no plans to use it in the future.

This story was co-published with Mashable.


A new, extremely persistent type of online tracking is shadowing visitors to thousands of top websites, from WhiteHouse.gov to YouPorn.com.

First documented in a forthcoming paper by researchers at Princeton University and KU LeuvenUniversity in Belgium, this type of tracking, called canvas fingerprinting, works by instructing the visitor’s Web browser to draw a hidden image. Because each computer draws the image slightly differently, the images can be used to assign each user’s device a number that uniquely identifies it.

Like other tracking tools, canvas fingerprints are used to build profiles of users based on the websites they visit — profiles that shape which ads, news articles, or other types of content are displayed to them.

But fingerprints are unusually hard to block: They can’t be prevented by using standard Web browser privacy settings or using anti-tracking tools such as AdBlock Plus.

The researchers found canvas fingerprinting computer code, primarily written by a company called AddThis, on 5 percent of the top 100,000 websites. Most of the code was on websites that use AddThis’ social media sharing tools. Other fingerprinters include the German digital marketer Ligatus and the Canadian dating site Plentyoffish. (A list of all the websites on which researchers found the code is here)...

http://www.propublica.org/article/meet-the-online-tracking-device-that-is-virtually-impossible-to-block

Black Hat Cancels Presentation on Cracking Tor

A presentation at the Black Hat conference about weaknesses within the Tor network has been canceled.

Alexander Volynkin, a researcher with CERT/Carnegie Mellon, was scheduled to give a talk titled "You Don't Have to be the NSA to Break Tor: Deanonymizing Users on a Budget" at the hacker conference, which kicks off Aug. 2.

But conference organizers this week announced that the presentation has been pulled form the lineup after the Software Engineering Institute (SEI) and Carnegie Mellon University informed them that "the materials that [Volynkin] would be speaking about have not yet [been] approved by CMU/SEI for public release..."

Thursday, July 17, 2014

9/11 Newt Gingrich Recommended A Homeland Security Agency Led By FEMA In...

9/11 Plane Removed - New Jersey Network News Sept 11 2001 (NJN)

Question: Should You Trust Tor?


Answer: Not If Your Life Is At Stake 
By Bill Blunden, July 16, 2014

In the ongoing drizzle of Snowden revelations the public has witnessed a litany of calls for the widespread adoption of online anonymity tools. One such technology is Tor, which employs a network of Internet relays to hinder the process of attribution. Though advocates at the Electronic Frontier Foundation openly claim that “Tor still works1” skepticism is warranted. In fact anyone risking incarceration (or worse) in the face of a highly leveraged intelligence outfit like the NSA would be ill- advised to put all of their eggs in the Tor basket. This is an unpleasant reality which certain privacy advocates have been soft-pedaling.

The NSA Wants You To Use Tor
Tor proponents often make a big deal of the fact that the NSA admits in its own internal documents that “Tor Stinks,” as it makes surveillance more work-intensive2. What these proponents fail to acknowledge is that the spies at the NSA also worry that Internet users will abandon Tor:...

http://cryptome.org/2014/07/trusting-tor-not.pdf

Wednesday, July 16, 2014

Part 1 of 4: Were Nuclear Reactors the Cause of the WTC Destruction?

Perhaps it was the boiling clouds—black, grey, white, and especially “nuclear brown”—surrounding the World Trade Center’s 110-story North and South Towers (WTC 1, 2) that made the world conclude the two hijacked airliners crashing into the buildings on September 11, 2001 had dropped nuclear bombs in elevator shafts. After all, the dreaded “stem-and-mushroom” cloud was rising from WTC 1 looking remarkably like a South Pacific atom-bomb test. How could they not, especially those familiar with media visuals of tests since 1946? Or those aware of a volcano’s powerful energy fields disgorging lava, pyroclastic flows, and lahars? [i]

The principal advocate for the theory that reactors were the primary causal agent that ultimately destroyed all seven WTC buildings is William Tahil, a British aerospace/technological consultant. He is the author of Ground Zero: The Nuclear Demolition of the World Trade Centre. He contends that 9/11 not only was the first nuclear attack against the United States, but “the world’s first nuclear controlled demolition.” [ii]

Tahil argues that signatures of a reactor were plentiful, beyond just brown clouds of dust and the curious application of the 1946 term “Ground Zero,” to the WTC. Its dictionary definition is the geographical point of a nuclear explosion.

As evidence, he cites radioactive fallout found by the U.S. Geological Survey in samples from 35 sites surrounding the WTC for nearly a mile. Other signs were the speed of the Towers disintegrations (8 to 10 seconds), the shock and blast waves, the pyroclastic main cloud, base-surges of street-level dust clouds, electromagnetic pulses (EMPs), upwellings of clouds from street gratings blocks away, the 2,800ºF heat under the WTC debris, and, possibly, the giveaway light-blue Cerenkov Radiation when the debris “pile” was cleared in mid-March. Add to all these signs, the molten metal in the footprints of WTC 1, 2, and 7 that for three months could not be extinguished by water or daily soil changes as it consumed concrete, steel, glass, office combustibles. The increasing incidence of radiation-only cancers from residents is another tell-tale sign of a nuclear “event.”

In short, reactors would seem to merit as much consideration as a causal theory to be investigated as any of the others suggested since September 11, 2001...

http://norfidid.wordpress.com/part-1-of-4-were-nuclear-reactors-the-cause-of-the-wtc-destruction/