Home Blog Page 2167

NYPD Officer Violently Tackling Pregnant Woman Onto Her Stomach

5

A New York Police Department officer was caught on camera attacking and throwing a visibly pregnant woman to the ground, and then pushing with this weight on top of her while she was face-down on the ground. Yet, doctors do not know if her baby was harmed during the altercation.

Police reported that the five-months pregnant woman, Sandra Amezquita, was trying to intervene in the arrest of her 17-year-old son early Saturday morning in Brooklyn. Residents reported that Amezquita is nearly six months along.

Watch The Full Video below:

pregnant woman attacked by police

Read more here: http://worldtruth.tv/nypd-officer-caught-on-camera-violently-tackling-pregnant-woman-onto-her-stomach/

China Hacks Pentagon 9 Times

15

Written by: Anon.Dos

 

 

China is not only good for its Chinese food and culture – oh! Believe me when I say that. According to many news papers and bloggers, Chinese military hackers have hacked into the Pentagon System 9 times! And it was not hacked for defacing their websites or anything like that. But to further enter into different networks like of commercial shipping companies – logistic companies and they even uploaded different spywares or malicious software into an airlines network database.

However, the investigation on this matter was done by the Senate Armed Services Committee. And after a few days of research they came to know that their systems were compromised more than twenty times for information related to contracting companies with specific and non specific data. Though, even after the investigation Senate Armed Services Committee was unable to identify which contracting companies were affected.

Furthermore, when the investigation was done, the Senate Armed Services Committee announced that the attack originated from the Chinese soil. On which the Chinese’s government did not respond on the same day. No press releases were made and neither was there any response from the Chinese embassy in the United States capital.

But as always, the government never takes the blame for anything so they decided to blame the companies. The logistic or contracting companies that are in business with the Pentagon are to report if they find any suspicious or network breaching activities in their networking systems as stated on their business agreement with the American government.

Now according to the National Security Council, White House has created a team of licensed ethical hackers that will be helping Pentagon in network security by staying up-to-date with complex network security breaches and cyber attacks.

As far as those people who hacked the Pentagon; Attorney General says they should be brought to justice on the American soil. For now we believe that they are living freely.

Links: Protect your mobile devices from hackers & governments and surf anonymously 

_______________________________________________________________

Sources:

http://www.ft.com/cms/s/0/9dba9ba2-5a3b-11dc-9bcd-0000779fd2ac.html#axzz3E4QboRj0

http://www.theguardian.com/world/2014/sep/17/china-hacked-pentagon-contractors-senate-hearing

http://www.techworm.net/2014/09/china-hacked-pentagon-contractor-networks.html

http://www.beliefnet.com/columnists/bemore/files/2013/11/bigstock-Hacker-Typing-On-A-Laptop-44548564.jpg

 

 

 

 

The Future Of Cryptography Lies in Old Nokia Phones?

3

Written by: Anon.Dos

 

 

Ever wondered what happens to the password you enter in your Gmail or Facebook account? Our computers do not understand our spoken language so from a basic “a” or zero, one, one, zero binary code to twelve or fourteen digit combination of letters and numbers are called passwords. And when it comes to protecting information like your passwords when you hit enter or any sensitive email that needs to be sent from CIA’s server to MI6 is heavily protected in different security socket layers and that is basic cryptography. And it’s been there for ages, from the times of kings to this day and age, messages that had to be delivered in secret to keep the information safe were never written simply, they were always written differently. Sometimes a symbol representing a word or sometimes a whole paragraph written upside down with possible spelling mistakes that were done intentionally. nokia-n9-0914-mdn

The Outdated Nokia N9

However, when we talk about today’s age and time, creating random combination of numbers and alphabets on a computer is truly difficult and especially when it comes to large data and files. It is difficult because at the end of the day the program that encrypts data was written with specific instructions which allow the software to work within those confined boundaries of the code that was written to create them.

Due to this problem, scientists from University of Geneva are working on quantum cryptography. As we already know that software used for creating a set of strings or codes are limited because of the programming language used by the programmer in his software. So quantum cryptography is a way in which light is used in a particular way to generate codes. These lights are taken from atoms namely photons; because it is impossible to figure out exactly when an atom emits light (energy) and since it is impossible to calculate the exact amount of time it takes to burst that energy.

So keeping that in our heads, the scientists took a Nokia N9’s eight megapixel camera and used a laser to stimulate the chip inside the camera and the results were amazing. The camera in the N9 is very sensitive, it detected even the petty changes in the in the light from the laser. So every photon that was emitting random light the chip under the N9’s camera was capturing it and all that information was converted from Nokia N9’s open source software called MeeGo version 1.2 Harmattan to a truly random ten to the power of sixty times random code.

Now that is proper randomness, scientists are stilling working on making it better and the future of Nokia is bright on this project..

Links: Protect your mobile devices from hackers & governments and surf anonymously 

_______________________________________________________________________

Sources:

http://en.wikipedia.org/wiki/Quantum_cryptography

http://www.popularmechanics.com/technology/how-to/computer-security/the-future-of-cryptography-is-outdated-nokia-phones-17199208?click=pm_latest

http://www.popularmechanics.com/technology/how-to/computer-security/the-future-of-cryptography-is-outdated-nokia-phones-17199208?click=pm_latest

http://deepcor.com/news/1223/obsolete-nokia-phone-a-solution-for-quantum-cryptography

NSA Representative Freaking Out When Confronted by Student

12

Written by: Tiobe

 

A University of New Mexico (UNM) student and UNM alum got more than just answers when they asked a National Security Agency recruiter named “Neal Z.” questions at a UNM Engineering and Science Career Fair Weds. Sept. 17.

UNM student Sean Potter and UNM alum Andy Beale began asking Mr. “Z.” questions about the nature of the organization he was recruiting for, the NSA. In an exchange Beale and Potter caught on camera and posted to YouTube, the interaction took a turn when “Z.” grabbed Potter’s phone whilst simultaneously denying touching the student’s phone, and ended with both “Z.” and Beale calling for security.

“Excuse me sir, I have a legal question that your colleague wasn’t able to help me out with,” begins Beale. “I’ve been trying to locate my mom. She’s been traveling across the country for a couple of weeks, and I haven’t heard from her. Do you guys know where she is?”

“No. NSA is not permitted to track or collect intelligence about U.S. persons,” responds Neal Z.

“You absolutely do. You collect all the metadata on all U.S. phone calls,” counters Beale.

“Ah. Actually, we do not ‘collect’ it. If you look carefully at the law, you’ll see that we get that data under law,” argues “Z.” “We have legal authority through the FISA court to collect certain data that aids foreign intelligence. Do your research before you come and heckle me… The FISA court is someone that we have to work with very closely. If there’s something that does not fall within the law, we don’t approach them with it, because we know the law, and we stay within it.”

Beale continues to pose questions about the NSA to Neal Z., with Z. becoming visibly hostile and reticent to respond to Beale. NSA-600x315

“I am not a lawyer. But I have been to our internal classes. I understand the legal basis from which we operate. We work very closely with the justice department. And we are operating within the law,” states Neal Z. “You do not understand what that collection is about. And if you don’t leave soon, I’m going to call the University security to get you out of my face. I am here to recruit. Not to argue legal basis with someone who is uninformed about the law… Okay, we’re done. And you’re done.” At this point in the video, one can see Neal Z. grabbing at Potter’s cell phone, hear Potter asking Z. not to touch him, while Z. insists he is not touching the phone.

“So why did you choose to come and heckle a government agency who’s honestly just trying to recruit at your university?” asks Z.

“We asked questions. I’m just asking you questions,” responds Beale. “I wasn’t intending to start a fight with you. We never touched you.”

“Your approach to making – yeah, you can stop filming. Did you get permission from our public affairs office to film us?” demands Z. “Thank you for being hecklers. Is this the way you want to disrupt a career fair at your university? Your fellow students are here to get jobs!”

“No, no. This is a public place. You have no reasonable expectation of privacy in a public place, and you know that,” says Potter.

At this point, two unidentified UNM employees approach, and one of them begins lecturing Beale and Potter on their audacity for asking a recruiter questions in a public forum.

“I think it’s important to express your opinion, but that’s not what this venue is about today,” says the second UNM employee. “There is free speech, but there’s certain appropriate times where you come in and you express things, and I think you can set things up in an appropriate way. Just like if I had an issue with you, I wouldn’t talk about it in public; I’d meet you somewhere private and say, ‘this is what I have to share with you.’ That’s just my way of approaching things. I think that’s just the more adult way to do that.”

Beale and Potter pointed out they typically lack open access to the NSA, and would wait for security to respond to the assault charge against Neal Z.

Visit https://www.youtube.com/watch?v=vDsYp1fWi-I to view the entire conversation.

Links: Protect your mobile devices from hackers & governments and surf anonymously 

_______________________________________________________________________

Sources:

https://firstlook.org/theintercept/2014/09/17/irate-nsa-staffer-doesnt-like-filmed-public-reason/

http://deepcor.com/news/1225/video-students-confront-nsa-representative

 

The Largest Environmental protest in history – The Climate March 2014

5

Written by: Tiobe

 

 

In what is being called “the largest environmental protest in history,” over 400,000 people gathered in New York City for the People’s Climate March yesterday, Sept. 21, joined by people in 166 other countries marching to bring attention to climate change before the United Nations (U.N.) convenes its Climate Summit 2014 on Sept. 23. World leaders will gather in New York for the one-day conference and discuss the consequences of increasing global carbon emissions and possible solutions.  4

“Climate change is not a far-off problem. It is happening now and is having very real consequences on people’s lives… But there is a growing recognition that affordable, scalable solutions are available now that will enable us all to leapfrog to cleaner, more resilient economies,” states the U.N. Climate Summit website. “(U.N. Secretary-general Ban Ki Moon) has asked these leaders to bring bold announcements and actions to the Summit that will reduce emissions, strengthen climate resilience, and mobilize political will for a meaningful legal agreement in 2015. Climate Summit 2014 provides a unique opportunity for leaders to champion an ambitious vision, anchored in action that will enable a meaningful global agreement in 2015.”

While the U.N. seems to acknowledge the need for immediate, decisive action, out of the three top contributors to Carbon emissions globally – China, India and the United States – only the U.S. will be represented at the Summit.

“Climate change is an issue that affects everyone, regardless of what beliefs you hold, where you live; it’s literally planet-wide,” says Kathryn Barron, a Junior Biodesign student at Swarthmore College in Pennsylvania who attended the march in NYC yesterday. “It’s also such a monumental show of concern that I wanted to do what I could to ‘snowball”’ it, even by just showing up and convincing a few friends to join me.”

“I felt it was obligatory (to attend),” says Swarthmore Sustainable Architecture Sophomore Adan Leon. “The issue is well past-due, and is in need of public support and attention. Moreover, it was such a massive convergence of ALL the issues surrounding climate change that it would be negligent to ignore it. We’ve been neglecting the issue for so long that by attending the march it sort of marked a turning point.”

Not only were the motivations for attending the event unique, Barron and Leon observed a unique atmosphere at the climate march. 7

“At first I was going to say (it was) defiant, but that doesn’t capture the positivity, the sense that everyone there also wanted to propose solutions, not just say ‘down with the system!’” says Barron. “So on second thought, ‘motivated’ is a better word. Everyone was spurred on to do something to change our negligent treatment of the environment.”

“Too often people attack activists as having misanthropic priorities,” says Leon. “The idea seems to get perpetuated that loving life and all that supports it is mutually exclusive from loving humanity, and I think such a massive, cooperative, non-violent demonstration reveals some of the human aspect. After all, sustainability is as much about respect of other life forms as it is respect for ourselves, humanity, and future generations.”

Above all, Barron, Leon and conceivably the other protesters want YOU to be paying attention.

“Not to be melodramatic, but our existence is at stake,” Barron says. “We have to do a better job of relating to and using the environment and its resources, or we won’t be able to count on a habitable planet anymore. Fundamental needs— agriculture, water, stable temperatures and weather – cannot be met by an environment that is trashed, specifically (and most importantly) by excess greenhouse gases in the atmosphere.”

“People should be worried about this because it affects everyone living on planet Earth. Frankly, even if we abuse every resource and frack every inch of this Earth, it is going to keep revolving around the sun,” says Leon. “The Earth, and life in general, is going to be fine. The question instead is: will we, and our cohabitants, survive? Even if you are unconcerned with the wellbeing of your fellow man, you will experience the effects of climate change in a variety of different ways. Changes in costs, availability of resources, health, weather patterns… Our current form of consumerism is built off old ways of thinking, a mindset that commodifies people and abuses livelihoods and it seems that this is finally coming to the attention of the mainstream. We must either cut back our tendencies to consume, or start providing alternative ways of living.”

_________________________________________________________________________

Sources:

http://www.huffingtonpost.com/2014/09/21/peoples-climate-march_n_5857902.html

http://www.democracynow.org/2014/9/22/this_is_history_peoples_climate_march

http://www.un.org/climatechange/summit/