Tag Archive: Security


Windows 10 Preview Has A Keylogger To Watch Your Every Move

 

 

 

” This week Microsoft announced the next version of its Operating system, dubbed WIndows 10, providing Windows 10 Technical Preview release under its “Insider Program” in order to collect feedback from users and help shape the final version of the operating system, but something really went WRONG!

Inside Microsoft’s Insider Program you’ll get all the latest Windows preview builds as soon as they’re available. In return, we want to know what you think. You’ll get an easy-to-use app to give us your feedback, which will help guide us along the way.” Microsoft website reads.

  Well, how many of you actually read the “Terms of Service” and “Privacy Policy” documents before downloading the Preview release of Windows 10? I guess none of you, because most computer users have habit of ignoring that lengthy paragraphs and simply click “I Agree” and then “next“, which is not at all a good practise.”
” Do you really know what permissions you have granted to Microsoft by installing Free Windows 10 Technical Preview edition? Of Course, YOU DON’T. Well, guess what, you’ve all but signed away your soul .
 
  If you are unaware of Microsoft’s privacy policy, so now you should pay attention to what the policy says. Microsoft is watching your every move on the latest Windows 10 Technical Preview, Thanks to portions of Microsoft’s privacy policy, which indicates that the technology giant is using keylogger to collect and use users’ data in a variety of astounding ways without the user being aware.”
Hacker News has all the details
About these ads

How To Find Out If You’ve Been Hacked In Under A Minute

 

 

 

 

 

” If it feels like the Internet is plagued by seemingly constant cybersecurity breaches, sometimes the best thing you can do is find out if your usernames and passwords are already owned by an enterprising criminal.

  The search engine Have I been pwned? (HIBP) is one of your best free and easy bets to find out if your sensitive information is floating out in cyberspace for all to see. There are other worthwhile options but HIBP’s new real-time monitoring tool separates it from the pack. 

  HIBP, which has provided easy access to stolen user credentials from newsworthy security breaches since last year, just introduced a major new feature that gives it access to about 175 million vulnerable accounts—a number that will keep growing rapidly—and alerts your within a minute to possible problems.

  Now, with the new feature, scores of smaller breaches are documented and made easy for anyone to search.”

 

Read more

 

 

 

 

 

 

 

 

 

Apple Will No Longer Unlock Most iPhones, iPads For Police, Even With Search Warrants

 

 

 

 

 

 

 

” Apple said Wednesday night that it is making it impossible for the company to turn over data from most iPhones or iPads to police — even when they have a search warrant — taking a hard new line as tech companies attempt to blunt allegations that they have too readily participated in government efforts to collect user information.

  The move, announced with the publication of a new privacy policy tied to the release of Apple’s latest mobile operating system, iOS 8, amounts to an engineering solution to a legal quandary: Rather than comply with binding court orders, Apple has reworked its latest encryption in a way that prevents the company — or anyone but the device’s owner — from gaining access to the vast troves of user data typically stored on smartphones or tablet computers.

  The key is the encryption that Apple mobile devices automatically put in place when a user selects a passcode, making it difficult for anyone who lacks that passcode to access the information within, including photos, e-mails and recordings. Apple once maintained the ability to unlock some content on devices for legally binding police requests but will no longer do so for iOS 8, it said in the new privacy policy.

“ Unlike our competitors, Apple cannot bypass your passcode and therefore cannot access this data,” Apple said on its Web site. “So it’s not technically feasible for us to respond to government warrants for the extraction of this data from devices in their possession running iOS 8.” “

 

Washington Post

 

 

 

 

 

 

 

 

 

Rightwing News

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

How The NSA Could Bug Your Powered-Off iPhone, and How To Stop Them

 

 

 

 

 

” Just because you turned off your phone doesn’t mean the NSA isn’t using it to spy on you.

  Edward Snowden’s latest revelation about the NSA’s snooping inspired an extra dose of shock and disbelief when he said the agency’s hackers can use a mobile phone as a bug even after it’s been turned off. The whistleblower made that eye-opening claim when Brian Williams of NBC Nightly News, holding his iPhone aloft during last Wednesday’s interview, asked, “What can the NSA do with this device if they want to get into my life? Can anyone turn it on remotely if it’s off? Can they turn on apps?

They can absolutely turn them on with the power turned off to the device,” Snowden replied.

  Snowden didn’t offer any details on this seemingly magical feat. But a group of particularly cunning iPhone hackers say it’s possible. They also say you can totally and completely turn off your iPhone so no one—not even the NSA—can use it to spy on you.”

 

 

Learn mored at Wired

 

 

 

 

 

 

 

 

 

 

Entrepreneur Invents Holiday Beach Locker That Screws Into The Sand

 

 

Hidden treasure: Laying on the towel over the beach vault means you can rest-assured your valuables will be safe

 

 

” It’s the age-old problem of deciding where to store your valuables at the beach while enjoying a day-time snooze or a dip in the sea.

  However, an entrepreneur has invented a unique locker that can screw into the sand and hold personal items such as purses, mobile phones, small tablets and money.”

 

 

BEACH VAULT

 

 

” Marcal DaCunha’s Beach Vault, which is expected to retail for £18, is closed by a special waterproof lid to stop any liquid seeping inside, and then covered by a towel and pillowcase.”

 

 

” DaCunha, a church pastor from New Jersey in the US, said: ‘The whole thing started when my wife, Krystal, and I were travelling back from the beach.

‘ She said “What if we had a container you could put underneath your towel that could hide all of your stuff?”
‘The idea was that if you were lying on the towel and you fell asleep you wouldn’t have to worry about watching your stuff or trying to keep hold of it while closing your eyes.

‘ We spoke about it and spent a while making prototypes and coming up with ideas and we have now worked with engineers to come up with the Beach Vault.”

Read more  and you can donate to Pastor DaCunha’s Kickstarter effort to manufacture and market this clever idea here .

Kill The Password. And The PIN Number. And The Car Key.

 

 

 

 

 

 

 

” We’re living in a crazy world,” Karl Martin says, “where, to prove who we are to our computers, we have to remember a long string of letters and numbers.”

  Martin, the chief executive of the biometric identity startup Bionym, is only half right. I’m sure I’m not the only one who has given up actually remembering my passwords and outsourced the job to a password manager. (Current tally: 112 separate strings of letters and numbers.) Experts agree that the only reliable way to secure a password is to memorize it so there is no record. But, really. Come on.

  Bionym is hoping to shape a more sensible and intuitive way of proving your identity to devices, databases, and financial instruments. In the fall, Bionym will release the Nymi, a wristband that replaces conventional passwords with a reading of a person’s electrocardiogram pattern.

  But Bionym is dreaming bigger. One day, the Nymi could turn out the lights when you leave the house, lock the front door, start your car with a gesture, help a restaurant remember your name, then let you pay for your meal — all with empty pockets.

  The Nymi has competition for the role in that future scenario. One contender is a small black fob called the AxisKey, made by Palm Beach Gardens, Fla.-based Sonavation, that uses ultrasound to authenticate a person. The device is expected to go on sale in mid-June.”

 

 

Continue reading

 

 

 

 

 

 

Michelle Obama Riverdances Through Dublin, Helps Rack Up $7,921,638.66 Vacation Tab For Taxpayers

Barack Obama, Michelle Obama

” When it comes to tracking the cost of Obama family vacations there are two primary challenges.  First, the Obamas are prolific jet-setters, so there are many details to track. And second, the Obama administration, clearly embarrassed by these lavish and frequent family vacations, stonewalls the release of records at every turn.

  But we have been relentless in pursuit of this information. Our attorneys file the lawsuits and make our case, and our investigators pour through pages of records and crunch the numbers. And the information we’ve uncovered – information that would otherwise remain under lock and key – shows that the Obamas have a disturbing lack of regard for taxpayer resources.

  Most recently, when reviewing the Obama family travel log, Judicial Watch recently obtained records from the U.S. Department of the Air Force and the U.S. Department of Homeland Security revealing that President Obama’s June 2013 trip to Belfast, Ireland, including a Dublin sightseeing side trip by Michelle Obama, her daughters, and her entourage, cost the taxpayers $7,921,638.66. (Per usual, and owing to the enormous public interest in Michelle Obama’s luxury travel, our discovery earned quite a bit of press coverage.)

Here’s the breakdown from the two agencies.

  •  According to the Department of Air Force documents, the flights to, from, and around Ireland for the June 17 – 19, 2013 trip totaled 33.6 hours at $228,288 an hour, which comes to a flight expense alone of $7,670,476.80  (These records came in response to a Judicial Watch Freedom of Information lawsuit filed on January 13, 2014.)
  •  According to the DHS documents, the total cost for “security and/or other services” for the Dublin side-trip by Michelle Obama and her entourage was $251,161.86, including $55,004.85 at the Shelbourne Hotel and $70,855.44 at the Westbury Hotel. Vehicle rental charges were $114,721. (These records also came in response to a Judicial Watch Freedom of Information lawsuit filed on January 13, 2014.)

  Now I can hear the White House’s defense. This was a business trip. It’s all about diplomatic relations, etc., etc.  And while this might at times be true for the president, it is certainly not true for the other members of the First Family.”

Read on

 

Some Very Good News About Americans

 

United America

 

 

” We are all besieged daily by bad news. It is easy to become depressed about the present state of the nation, but there is some very good news as well.

  This is not to say there aren’t legitimate problems and concerns. The last two elections put a President in office that lies all the time. The nation’s economy has been so awful that 100 million Americans are either out of work or have ceased looking for work. Democrat political leaders are actually telling Americans that being unemployed is a good thing because it leaves them free to pursue their hobbies.

  The President has been pursuing a campaign to make Americans believe that there is massive income inequality when, in fact, there is relatively little. There has always been a very wealthy class and a very poor one. What there is, however, is a loss of wealth primarily in the Middle Class. As for poverty, America has long provided income mobility to those who wish to study and work hard to improve their status.

  What is rarely addressed is the seething power of American entrepreneurship which, at present, is trapped by a largely socialist federal government imposing a mountain of regulations that thwart growth and take money from the private sector that would otherwise be invested in the creation or expansion of business and industry nationwide.

  Americans have repeatedly suffered, survived, and overcome financial crises to come back to build the greatest economy in the world. Part of the reason for this are the long established values that Americans of every description embrace.

  That is why Wayne Baker’s new book, “United America: The Surprising truth about American values, American identity and the 10 beliefs that a large majority of Americans hold dear” is a welcome review that the author’s extensive research confirms.

The beliefs are:

  • Respect for others
  • Symbolic patriotism
  • Freedom
  • Security
  • Self-Reliance & Individualism
  • Equal Opportunity
  • Getting ahead
  • Pursuit of happiness
  • Justice & Fairness
  • Critical patriotism “

 

 

    Division is the tool of tyrants and their lackies in the MSM . Contrary to the endless attempts by our current rulers to foment class warfare we are more united in our core beliefs than the common media memes would have you believe .

Read more about “United America” at Canada Free Press

 

 

 

 

 

 

 

 

 

Ready When You Need It Tactical Firearm Storage

 

Tactical Shelve

 

 

   A company from Virginia that specializes in hidden tactical storage for your firearms has come up with a new item(s) that are due to ship this month . Tactical Walls.com is a family owned and operated business in the beautiful Shenandoah valley .

 

 

” The founder, Tim Matter, is a husband and father. After four years of active duty in the USAF where he served as a crew chief on F-16′s, he attended the Art Institute of Philadelphia where he received a bachelor’s degree in Industrial Design. He enjoys, creating and designing, as well as shooting, and riding motorcycles. He loves to make people laugh, and he is always working on some new project.    In addition to running  TACTICAL WALLS,  he is still a full-time designer in the Shenandoah Valley of Virginia. Several weekends out of the year he can be found instructing high performance riding techniques at Cornerspin in North Carolina. He always seems to be on the go, but you can easily get in touch with him here, he’d love to talk with you. (He LOVES to talk!). “

 

 

   They offer a nice line of hidden storage units that are 100% American made and very reasonably priced , but what really caught our eye is the new Tactical Shelf unit that they are just now bringing to market .

 

Tactical Shelf Opened

 

 

     The Tactical Shelf is available in two models , the larger (above) that will hold a rifle/shotgun and pistol(s) and a smaller unit that will hold a couple of handguns . Here are the specs for the larger unit which sells for $380.00 :

 

” Our 1242 RLS (Rifle Length Shelf) is handmade right here in the United States! This product is an elegant storage solution for handguns and accessories. Comes standard in black with cherry finished wooden shelf. Includes: (1) 1242 RLS Shelf, (2) Magnetic Keys, (1) 42”x12”x1.5” Customizable Foam Pad, Mounting Hardware.

  This is currently available for preorder and will ship in February. Shipping is completely FREE for all preordered items.”

 

The 825 PLS – Pistol Length Shelf sells for $280.00 and looks like this :

 

 

PLS Tactical Shelf

 

    

 In addition to the tactical shelves they offer a range of other decorative firearm storage solutions to choose from including the wall unit described in the video below .

 

 

 

 

   These units look like just the ticket to keep your guns safe and handy while at the same time placating your partner’s decorating sensibilities . Learn more at TacticalWalls.com and see more at their YouTube channel .

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Protect Firefox Browser From The U.S. Government, Says Mozilla Exec

 

 

” Among the issues that President Obama did not address in his lukewarm call for “reform” of NSA spying practices are allegations that U.S. government officials have used their clout to compromise encryption technology and strongarm companies into inserting backdoors into their technology. That’s not a small issue, because it gives the NSA and other agencies access to vast quantities of information at least as sensitive as what they gather from sucking up phone meta data. Last week, even before the president’s speech, Brendan Eich, the Chief Technology Officer of Mozilla, the organization behind the Firefox Web browser, called on the public to help resist such threats.

Wrote Eich in a blog post:

As a result of laws in the US and elsewhere, prudent users must interact with Internet services knowing that despite how much any cloud-service company wants to protect privacy, at the end of the day most big companies must comply with the law. The government can legally access user data in ways that might violate the privacy expectations of law-abiding users. Worse, the government may force service operators to enable surveillance (something that seems to have happened in the Lavabit case).”

 

 

 

 

 

 

 

 

Hacking Expert Reveals How He Cracked Obamacare Site In Under 4 Minutes

 

” David Kennedy, the hacking expert that shook the country this week with his congressional testimony about the security failures of HealthCare.gov, explained Sunday how he was able to penetrate the site.

“ There’s a technique called, what we call ‘passive reconnaissance,’” Kennedy explained to “Fox News Sunday” host Chris Wallace, “which allows us to query and look at how the website operates and performs.”

“ And these type of attacks that I’m mentioning here, and the 70,000 [personal records Kennedy found] that you’re referencing, is very easy to do,” Kennedy continued. “It’s a rudimentary type attack that doesn’t actually attack the website itself. It extracts information from it without actually having to go into the system.” “

 

 

 

 

 

 

 

 

APP TURNS SMARTPHONE INTO PERSONAL PANIC BUTTON,ALERT SYSTEM

 

 

” A “panic button” smartphone app that can alert friends and family if you are in trouble or feel threatened has been released, its British developers say.

PanicMe, created by developer DataMe in consultation with local police forces, allows a user to set up a personalized response network of friends and family to be contacted when a panic alert is activated, The Daily Telegraph reported Friday.

A traffic light system offers three panic options — green, amber or red — depending on the seriousness of the event, and as many as 30 numbers in the phone’s contact list can be selected for each panic option.”

 

 

 

 

 

 

 

Frag Grenade In 8 Minutes

Grenade

 

” Security researcher builds grenade in under 8 minutes using items available in airport terminal.All materials required to build this weapons were purchased in an airport AFTER the security screening.”

This is a profoundly disturbing video .

 

 

 

 

 

 

 

 

 

 

Stuxnet: UK And US Nuclear Plants At Risk As Malware Spreads Outside Russia

 

 

 

 

” Security experts have warned the notorious Stuxnet malware has likely infected numerous power plants outside of Russia and Iran.

Experts from FireEye and F-Secure told V3 the nature of Stuxnet means it is likely many power plants have fallen victim to the malware, when asked about comments made by security expert Eugene Kaspersky claiming at least one Russian nuclear plant has already been infected.

“[The member of staff told us] their nuclear plant network, which was disconnected from the internet [...] was badly infected by Stuxnet,” Kaspersky said during a speech at Press Club 2013.

Stuxnet is sabotage-focused malware that was originally caught targeting Windows systems in Iranian nuclear facilities in 2010. The malware is believed to originally have been designed to target only the Iranian nuclear industry, but subsequently managed to spread itself in unforeseen ways.

F-Secure security analyst Sean Sullivan told V3 Stuxnet’s unpredictable nature means it has likely spread to other facilities outside of the plant mentioned by Kaspersky.

It didn’t spread via the internet. It spread outside of its target due to a bug and so it started traveling via USB. Given the community targeted, I would not be surprised if other countries had nuclear plants with infected PCs,” he said.”

 

 

Here is a very thorough and detailed article for those readers interested in learning more about the history of Stuxnet .

 

Illlustration "How Stuxnet Worked"

 

 

” Computer cables snake across the floor. Cryptic flowcharts are scrawled across various whiteboards adorning the walls. A life-size Batman doll stands in the hall. This office might seem no different than any other geeky workplace, but in fact it’s the front line of a war—a cyberwar, where most battles play out not in remote jungles or deserts but in suburban office parks like this one. As a senior researcher for Kaspersky Lab, a leading computer security firm based in Moscow, Roel Schouwenberg spends his days (and many nights) here at the lab’s U.S. headquarters in Woburn, Mass., battling the most insidious digital weapons ever, capable of crippling water supplies, power plants, banks, and the very infrastructure that once seemed invulnerable to attack.

Recognition of such threats exploded in June 2010 with the discovery of Stuxnet, a 500-kilobyte computer worm that infected the software of at least 14 industrial sites in Iran, including a uranium-enrichment plant. Although a computer virus relies on an unwitting victim to install it, a worm spreads on its own, often over a computer network.

This worm was an unprecedentedly masterful and malicious piece of code that attacked in three phases. First, it targeted Microsoft Windows machines and networks, repeatedly replicating itself. Then it sought out Siemens Step7 software, which is also Windows-based and used to program industrial control systems that operate equipment, such as centrifuges. Finally, it compromised the programmable logic controllers. The worm’s authors could thus spy on the industrial systems and even cause the fast-spinning centrifuges to tear themselves apart, unbeknownst to the human operators at the plant. (Iran has not confirmed reports that Stuxnet destroyed some of its centrifuges.)”

 

 

Further reading :

How Digital Detectives Deciphered Stuxnet, the Most Menacing Malware in History

Confirmed: US and Israel created Stuxnet, lost control of it

The History of Stuxnet: Key Takeaways

Stuxnet: Anatomy of a Computer Virus on Vimeo

 

 

 

 

 

 

 

 

ObamaCare Website Might Have To Be Rebuilt

 

2 Years $600 Million

” The chairman of the House Intelligence Committee said ObamaCare’s Web site, already a tangled mess, might need to be rebuilt from scratch to to protect against cyber-thieves because he fears it’s not a safe place right now for health-care consumers to deposit their personal information.

“ I know that they’ve called in another private entity to try to help with the security of it. The problem is, they may have to redesign the entire system,” Rep. Mike Rogers said on Sunday on CNN’s “State of the Union” political talk show. “The way the system is designed, it is not secure.” “

 

 

 

 

 

 

 

Investigators Stumped By What’s Causing Power Surges That Destroy Equipment

 

 

” Chronic electrical surges at the massive new data-storage facility central to the National Security Agency’s spying operation have destroyed hundreds of thousands of dollars worth of machinery and delayed the center’s opening for a year, according to project documents and current and former officials.

There have been 10 meltdowns in the past 13 months that have prevented the NSA from using computers at its new Utah data-storage center, slated to be the spy agency’s largest, according to project documents reviewed by The Wall Street Journal.”

 

 

 

 

 

 

 

 

 

 

Surf Without Surveillance: Tor’s Karen Reilly

 

 

 

 

“People are under the impression that the Internet is sort of anonymous by default,” says Karen Reilly, development director of the Tor Project. “They don’t know how many digital trails they’re leaving behind.” 

“There’s a lot of everyday reasons why people would use Tor,” Reilly says. “You don’t necessarily have to be somebody who’s under a particular threat to want privacy.” Among the half million people who use Tor include victims of violence, people with medical conditions, people who don’t trust their Internet service provider, and those who object to government surveillance on principle.”

 

 

 

 

 

Phones Leave A Telltale Trail

 

” The NSA, through secret court orders served to U.S. telecommunications firms, scoops up metadata relating to almost all calls made into and within the U.S., which it can later query as part of a terror investigation. U.S. officials say that kind of work, in concert with other techniques, has helped thwart “dozens” of terrorist plots in the U.S. and overseas. Critics charge it represents an invasion of privacy.

The typical smartphone user can give off a total of nearly 100 pieces of highly technical data through calls, texts and other activities, according to research by Tracy Ann Kosa, a digital-privacy expert at the University of Ontario. This information includes the time that phones make contact with cellphone towers, the direction of the tower with respect to the phone and the signal strength at the time.

Ms. Kosa said much of the data is “insignificant on its own.” But “every little piece counts,” she said. “Think of it like footsteps—or calories.” “

 

 

 

 

 

 

Just How Much Did Tech Companies Play Footsie With the NSA?

 

 

 

” How complicit are tech companies in the National Security Agency’s massive spying scheme? They certainly bear some responsibility, but the rules under which the surveillance is conducted make it unclear — perhaps deliberately — the extent to which companies have resisted or folded, and also limit the channels available to the more privacy-minded to put up a fight.

News reports make it clear that many companies not only cooperated with the NSA, but even modified their systems to allow government spooks easier access to data. Others are known to have been less willing to make life easy for snoops.

Make no mistake, even the Twitters of the world are required to surrender information about their users when ordered to do so under the Foreign Intelligence Surveillance Act. And, they are forbidden to tell targeted users, civil liberties advocates or the public at large anything about such orders. Resistant companies can appeal, but only through the secretive process allowed them by the law. And we know that the Foreign Intelligence Surveillance Court approved all but one of the 1,856 surveillance requests it received in 2012. One was withdrawn. None were disapproved. So, even the most privacy-minded tech executives have limited options when it comes to protecting their cutomers’ information.

From Reuters:

U.S. Internet companies that want to resist government demands to hand over customer data for intelligence investigations have few legal options, due to the classified nature of such probes and a court review process shrouded in secrecy.

Some of the complaints about government pressure from business executives are, no doubt, sincere. But take them all with a grain of salt.”

 

 

 

 

 

 

 

 

How to Enable Two-Factor Authentication On Twitter (And Everywhere Else)

 

 

 

” Twitter rolled out two-factor authentication last week, joining a growing group of tech companies to support the important security feature. Two-factor authentication can help mitigate the damage of a password breach or phishing attack.

The Three Authentication Factors

  • A knowledge factor, like a password or PIN. Something you know.
  • A possession factor, like a key or a hardware dongle. Something you have.
  • An inherence factor, like a fingerprint or an iris. Something you are.

The principle comes from the idea that any authentication system—whether it’s the deadbolt on your front door, the lockscreen on your smartphone, or the bouncer at a secret clubhouse—works by confirming something you know, something you have, or something you are. Each of these are called “factors.”

Normal password logins just check whether you know a password, which means anybody else who learns it can log in as you. Adding a second factor—in this case, checking something you have, your phone—means that even if your password is compromised by, say, a keylogger in an Internet cafe, or through a company’s security breach, your account is safe.”

 

 

 

 

 

 

FBI’s Latest Proposal For A Wiretap-Ready Internet Should Be Trashed

 

 

 

” The FBI has some strange ideas about how to “update” federal surveillance laws: They’re calling for legislation to penalize online services that provide users with too much security.

I’m not kidding. The proposal was revealed in The Washington Post last week — and a couple days ago, a front-page story in The New York Times reported the Obama administration is preparing to back it.

Why? Federal law enforcement agencies like the FBI have long feared their wiretap capabilities would begin “going dark” as criminals and terrorists — along with ordinary citizens — shift from telephone networks, which are required to be wiretap-ready under the 1994 Communications Assistance for Law Enforcement Act (CALEA), to the dizzying array of online communications platforms available today.”

 

 

 

 

 

 

 

 

Cannon Safe Releases Seven Tips For Purchasing A Safe

 

 

 

 

” Cannon Safe has created a step-by-step guide for finding the perfect safe for your home. The guide is aptly titled Seven Tips For Purchasing A Safe and can be downloaded for free at cannonsafe.com or a hardcopy can be received by mail upon request.

Like all consumer products, home safe technology has improved drastically in recent years and with so many new features and options, the process of selecting the right safe can be confusing.  Luckily, the new safe-buying guide from Cannon Safe will make the choice easier.

“The great thing about this guide is that it’s a one-stop source for all of the factors that should go into buying a full-sized safe, including size, location, fire rating, optional features and much more,” said Aaron Baker, president of Cannon Safe.  “Seven Tips for Purchasing a Safe helps you prioritize your needs and select the right safe for you and your family.” “

 

 

 

 

 

 

5 Benghazi Mysteries That Must Be Solved

 

 

 

 

” On Wednesday, at least three State Department employees will testify before the House Government Oversight and Reform Committee on Benghazi. They are expected to say that yes, there was a stand-down order during the battle. They may also testify that the State Department itself has tried to bully them into silence. What else they may say is not yet known.

As the Benghazi story has unfolded, many mysteries have persisted. Why wasn’t the Benghazi mission’s security enhanced? Where was President Obama? What role, if any, did Obama campaign officials play in crafting the government’s communications after the attack? Perhaps Wednesday’s witnesses can help shed some light on them.”

 

 

 

 

 

 

Follow

Get every new post delivered to your Inbox.

Join 6,838 other followers