Tag Archive: Security


Michelle Obama Riverdances Through Dublin, Helps Rack Up $7,921,638.66 Vacation Tab For Taxpayers

Barack Obama, Michelle Obama

” When it comes to tracking the cost of Obama family vacations there are two primary challenges.  First, the Obamas are prolific jet-setters, so there are many details to track. And second, the Obama administration, clearly embarrassed by these lavish and frequent family vacations, stonewalls the release of records at every turn.

  But we have been relentless in pursuit of this information. Our attorneys file the lawsuits and make our case, and our investigators pour through pages of records and crunch the numbers. And the information we’ve uncovered – information that would otherwise remain under lock and key – shows that the Obamas have a disturbing lack of regard for taxpayer resources.

  Most recently, when reviewing the Obama family travel log, Judicial Watch recently obtained records from the U.S. Department of the Air Force and the U.S. Department of Homeland Security revealing that President Obama’s June 2013 trip to Belfast, Ireland, including a Dublin sightseeing side trip by Michelle Obama, her daughters, and her entourage, cost the taxpayers $7,921,638.66. (Per usual, and owing to the enormous public interest in Michelle Obama’s luxury travel, our discovery earned quite a bit of press coverage.)

Here’s the breakdown from the two agencies.

  •  According to the Department of Air Force documents, the flights to, from, and around Ireland for the June 17 – 19, 2013 trip totaled 33.6 hours at $228,288 an hour, which comes to a flight expense alone of $7,670,476.80  (These records came in response to a Judicial Watch Freedom of Information lawsuit filed on January 13, 2014.)
  •  According to the DHS documents, the total cost for “security and/or other services” for the Dublin side-trip by Michelle Obama and her entourage was $251,161.86, including $55,004.85 at the Shelbourne Hotel and $70,855.44 at the Westbury Hotel. Vehicle rental charges were $114,721. (These records also came in response to a Judicial Watch Freedom of Information lawsuit filed on January 13, 2014.)

  Now I can hear the White House’s defense. This was a business trip. It’s all about diplomatic relations, etc., etc.  And while this might at times be true for the president, it is certainly not true for the other members of the First Family.”

Read on

 

About these ads

Some Very Good News About Americans

 

United America

 

 

” We are all besieged daily by bad news. It is easy to become depressed about the present state of the nation, but there is some very good news as well.

  This is not to say there aren’t legitimate problems and concerns. The last two elections put a President in office that lies all the time. The nation’s economy has been so awful that 100 million Americans are either out of work or have ceased looking for work. Democrat political leaders are actually telling Americans that being unemployed is a good thing because it leaves them free to pursue their hobbies.

  The President has been pursuing a campaign to make Americans believe that there is massive income inequality when, in fact, there is relatively little. There has always been a very wealthy class and a very poor one. What there is, however, is a loss of wealth primarily in the Middle Class. As for poverty, America has long provided income mobility to those who wish to study and work hard to improve their status.

  What is rarely addressed is the seething power of American entrepreneurship which, at present, is trapped by a largely socialist federal government imposing a mountain of regulations that thwart growth and take money from the private sector that would otherwise be invested in the creation or expansion of business and industry nationwide.

  Americans have repeatedly suffered, survived, and overcome financial crises to come back to build the greatest economy in the world. Part of the reason for this are the long established values that Americans of every description embrace.

  That is why Wayne Baker’s new book, “United America: The Surprising truth about American values, American identity and the 10 beliefs that a large majority of Americans hold dear” is a welcome review that the author’s extensive research confirms.

The beliefs are:

  • Respect for others
  • Symbolic patriotism
  • Freedom
  • Security
  • Self-Reliance & Individualism
  • Equal Opportunity
  • Getting ahead
  • Pursuit of happiness
  • Justice & Fairness
  • Critical patriotism “

 

 

    Division is the tool of tyrants and their lackies in the MSM . Contrary to the endless attempts by our current rulers to foment class warfare we are more united in our core beliefs than the common media memes would have you believe .

Read more about “United America” at Canada Free Press

 

 

 

 

 

 

 

 

 

Ready When You Need It Tactical Firearm Storage

 

Tactical Shelve

 

 

   A company from Virginia that specializes in hidden tactical storage for your firearms has come up with a new item(s) that are due to ship this month . Tactical Walls.com is a family owned and operated business in the beautiful Shenandoah valley .

 

 

” The founder, Tim Matter, is a husband and father. After four years of active duty in the USAF where he served as a crew chief on F-16′s, he attended the Art Institute of Philadelphia where he received a bachelor’s degree in Industrial Design. He enjoys, creating and designing, as well as shooting, and riding motorcycles. He loves to make people laugh, and he is always working on some new project.    In addition to running  TACTICAL WALLS,  he is still a full-time designer in the Shenandoah Valley of Virginia. Several weekends out of the year he can be found instructing high performance riding techniques at Cornerspin in North Carolina. He always seems to be on the go, but you can easily get in touch with him here, he’d love to talk with you. (He LOVES to talk!). “

 

 

   They offer a nice line of hidden storage units that are 100% American made and very reasonably priced , but what really caught our eye is the new Tactical Shelf unit that they are just now bringing to market .

 

Tactical Shelf Opened

 

 

     The Tactical Shelf is available in two models , the larger (above) that will hold a rifle/shotgun and pistol(s) and a smaller unit that will hold a couple of handguns . Here are the specs for the larger unit which sells for $380.00 :

 

” Our 1242 RLS (Rifle Length Shelf) is handmade right here in the United States! This product is an elegant storage solution for handguns and accessories. Comes standard in black with cherry finished wooden shelf. Includes: (1) 1242 RLS Shelf, (2) Magnetic Keys, (1) 42”x12”x1.5” Customizable Foam Pad, Mounting Hardware.

  This is currently available for preorder and will ship in February. Shipping is completely FREE for all preordered items.”

 

The 825 PLS – Pistol Length Shelf sells for $280.00 and looks like this :

 

 

PLS Tactical Shelf

 

    

 In addition to the tactical shelves they offer a range of other decorative firearm storage solutions to choose from including the wall unit described in the video below .

 

 

 

 

   These units look like just the ticket to keep your guns safe and handy while at the same time placating your partner’s decorating sensibilities . Learn more at TacticalWalls.com and see more at their YouTube channel .

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Protect Firefox Browser From The U.S. Government, Says Mozilla Exec

 

 

” Among the issues that President Obama did not address in his lukewarm call for “reform” of NSA spying practices are allegations that U.S. government officials have used their clout to compromise encryption technology and strongarm companies into inserting backdoors into their technology. That’s not a small issue, because it gives the NSA and other agencies access to vast quantities of information at least as sensitive as what they gather from sucking up phone meta data. Last week, even before the president’s speech, Brendan Eich, the Chief Technology Officer of Mozilla, the organization behind the Firefox Web browser, called on the public to help resist such threats.

Wrote Eich in a blog post:

As a result of laws in the US and elsewhere, prudent users must interact with Internet services knowing that despite how much any cloud-service company wants to protect privacy, at the end of the day most big companies must comply with the law. The government can legally access user data in ways that might violate the privacy expectations of law-abiding users. Worse, the government may force service operators to enable surveillance (something that seems to have happened in the Lavabit case).”

 

 

 

 

 

 

 

 

Hacking Expert Reveals How He Cracked Obamacare Site In Under 4 Minutes

 

” David Kennedy, the hacking expert that shook the country this week with his congressional testimony about the security failures of HealthCare.gov, explained Sunday how he was able to penetrate the site.

“ There’s a technique called, what we call ‘passive reconnaissance,’” Kennedy explained to “Fox News Sunday” host Chris Wallace, “which allows us to query and look at how the website operates and performs.”

“ And these type of attacks that I’m mentioning here, and the 70,000 [personal records Kennedy found] that you’re referencing, is very easy to do,” Kennedy continued. “It’s a rudimentary type attack that doesn’t actually attack the website itself. It extracts information from it without actually having to go into the system.” “

 

 

 

 

 

 

 

 

APP TURNS SMARTPHONE INTO PERSONAL PANIC BUTTON,ALERT SYSTEM

 

 

” A “panic button” smartphone app that can alert friends and family if you are in trouble or feel threatened has been released, its British developers say.

PanicMe, created by developer DataMe in consultation with local police forces, allows a user to set up a personalized response network of friends and family to be contacted when a panic alert is activated, The Daily Telegraph reported Friday.

A traffic light system offers three panic options — green, amber or red — depending on the seriousness of the event, and as many as 30 numbers in the phone’s contact list can be selected for each panic option.”

 

 

 

 

 

 

 

Frag Grenade In 8 Minutes

Grenade

 

” Security researcher builds grenade in under 8 minutes using items available in airport terminal.All materials required to build this weapons were purchased in an airport AFTER the security screening.”

This is a profoundly disturbing video .

 

 

 

 

 

 

 

 

 

 

Stuxnet: UK And US Nuclear Plants At Risk As Malware Spreads Outside Russia

 

 

 

 

” Security experts have warned the notorious Stuxnet malware has likely infected numerous power plants outside of Russia and Iran.

Experts from FireEye and F-Secure told V3 the nature of Stuxnet means it is likely many power plants have fallen victim to the malware, when asked about comments made by security expert Eugene Kaspersky claiming at least one Russian nuclear plant has already been infected.

“[The member of staff told us] their nuclear plant network, which was disconnected from the internet [...] was badly infected by Stuxnet,” Kaspersky said during a speech at Press Club 2013.

Stuxnet is sabotage-focused malware that was originally caught targeting Windows systems in Iranian nuclear facilities in 2010. The malware is believed to originally have been designed to target only the Iranian nuclear industry, but subsequently managed to spread itself in unforeseen ways.

F-Secure security analyst Sean Sullivan told V3 Stuxnet’s unpredictable nature means it has likely spread to other facilities outside of the plant mentioned by Kaspersky.

It didn’t spread via the internet. It spread outside of its target due to a bug and so it started traveling via USB. Given the community targeted, I would not be surprised if other countries had nuclear plants with infected PCs,” he said.”

 

 

Here is a very thorough and detailed article for those readers interested in learning more about the history of Stuxnet .

 

Illlustration "How Stuxnet Worked"

 

 

” Computer cables snake across the floor. Cryptic flowcharts are scrawled across various whiteboards adorning the walls. A life-size Batman doll stands in the hall. This office might seem no different than any other geeky workplace, but in fact it’s the front line of a war—a cyberwar, where most battles play out not in remote jungles or deserts but in suburban office parks like this one. As a senior researcher for Kaspersky Lab, a leading computer security firm based in Moscow, Roel Schouwenberg spends his days (and many nights) here at the lab’s U.S. headquarters in Woburn, Mass., battling the most insidious digital weapons ever, capable of crippling water supplies, power plants, banks, and the very infrastructure that once seemed invulnerable to attack.

Recognition of such threats exploded in June 2010 with the discovery of Stuxnet, a 500-kilobyte computer worm that infected the software of at least 14 industrial sites in Iran, including a uranium-enrichment plant. Although a computer virus relies on an unwitting victim to install it, a worm spreads on its own, often over a computer network.

This worm was an unprecedentedly masterful and malicious piece of code that attacked in three phases. First, it targeted Microsoft Windows machines and networks, repeatedly replicating itself. Then it sought out Siemens Step7 software, which is also Windows-based and used to program industrial control systems that operate equipment, such as centrifuges. Finally, it compromised the programmable logic controllers. The worm’s authors could thus spy on the industrial systems and even cause the fast-spinning centrifuges to tear themselves apart, unbeknownst to the human operators at the plant. (Iran has not confirmed reports that Stuxnet destroyed some of its centrifuges.)”

 

 

Further reading :

How Digital Detectives Deciphered Stuxnet, the Most Menacing Malware in History

Confirmed: US and Israel created Stuxnet, lost control of it

The History of Stuxnet: Key Takeaways

Stuxnet: Anatomy of a Computer Virus on Vimeo

 

 

 

 

 

 

 

 

ObamaCare Website Might Have To Be Rebuilt

 

2 Years $600 Million

” The chairman of the House Intelligence Committee said ObamaCare’s Web site, already a tangled mess, might need to be rebuilt from scratch to to protect against cyber-thieves because he fears it’s not a safe place right now for health-care consumers to deposit their personal information.

“ I know that they’ve called in another private entity to try to help with the security of it. The problem is, they may have to redesign the entire system,” Rep. Mike Rogers said on Sunday on CNN’s “State of the Union” political talk show. “The way the system is designed, it is not secure.” “

 

 

 

 

 

 

 

Investigators Stumped By What’s Causing Power Surges That Destroy Equipment

 

 

” Chronic electrical surges at the massive new data-storage facility central to the National Security Agency’s spying operation have destroyed hundreds of thousands of dollars worth of machinery and delayed the center’s opening for a year, according to project documents and current and former officials.

There have been 10 meltdowns in the past 13 months that have prevented the NSA from using computers at its new Utah data-storage center, slated to be the spy agency’s largest, according to project documents reviewed by The Wall Street Journal.”

 

 

 

 

 

 

 

 

 

 

Surf Without Surveillance: Tor’s Karen Reilly

 

 

 

 

“People are under the impression that the Internet is sort of anonymous by default,” says Karen Reilly, development director of the Tor Project. “They don’t know how many digital trails they’re leaving behind.” 

“There’s a lot of everyday reasons why people would use Tor,” Reilly says. “You don’t necessarily have to be somebody who’s under a particular threat to want privacy.” Among the half million people who use Tor include victims of violence, people with medical conditions, people who don’t trust their Internet service provider, and those who object to government surveillance on principle.”

 

 

 

 

 

Phones Leave A Telltale Trail

 

” The NSA, through secret court orders served to U.S. telecommunications firms, scoops up metadata relating to almost all calls made into and within the U.S., which it can later query as part of a terror investigation. U.S. officials say that kind of work, in concert with other techniques, has helped thwart “dozens” of terrorist plots in the U.S. and overseas. Critics charge it represents an invasion of privacy.

The typical smartphone user can give off a total of nearly 100 pieces of highly technical data through calls, texts and other activities, according to research by Tracy Ann Kosa, a digital-privacy expert at the University of Ontario. This information includes the time that phones make contact with cellphone towers, the direction of the tower with respect to the phone and the signal strength at the time.

Ms. Kosa said much of the data is “insignificant on its own.” But “every little piece counts,” she said. “Think of it like footsteps—or calories.” “

 

 

 

 

 

 

Just How Much Did Tech Companies Play Footsie With the NSA?

 

 

 

” How complicit are tech companies in the National Security Agency’s massive spying scheme? They certainly bear some responsibility, but the rules under which the surveillance is conducted make it unclear — perhaps deliberately — the extent to which companies have resisted or folded, and also limit the channels available to the more privacy-minded to put up a fight.

News reports make it clear that many companies not only cooperated with the NSA, but even modified their systems to allow government spooks easier access to data. Others are known to have been less willing to make life easy for snoops.

Make no mistake, even the Twitters of the world are required to surrender information about their users when ordered to do so under the Foreign Intelligence Surveillance Act. And, they are forbidden to tell targeted users, civil liberties advocates or the public at large anything about such orders. Resistant companies can appeal, but only through the secretive process allowed them by the law. And we know that the Foreign Intelligence Surveillance Court approved all but one of the 1,856 surveillance requests it received in 2012. One was withdrawn. None were disapproved. So, even the most privacy-minded tech executives have limited options when it comes to protecting their cutomers’ information.

From Reuters:

U.S. Internet companies that want to resist government demands to hand over customer data for intelligence investigations have few legal options, due to the classified nature of such probes and a court review process shrouded in secrecy.

Some of the complaints about government pressure from business executives are, no doubt, sincere. But take them all with a grain of salt.”

 

 

 

 

 

 

 

 

How to Enable Two-Factor Authentication On Twitter (And Everywhere Else)

 

 

 

” Twitter rolled out two-factor authentication last week, joining a growing group of tech companies to support the important security feature. Two-factor authentication can help mitigate the damage of a password breach or phishing attack.

The Three Authentication Factors

  • A knowledge factor, like a password or PIN. Something you know.
  • A possession factor, like a key or a hardware dongle. Something you have.
  • An inherence factor, like a fingerprint or an iris. Something you are.

The principle comes from the idea that any authentication system—whether it’s the deadbolt on your front door, the lockscreen on your smartphone, or the bouncer at a secret clubhouse—works by confirming something you know, something you have, or something you are. Each of these are called “factors.”

Normal password logins just check whether you know a password, which means anybody else who learns it can log in as you. Adding a second factor—in this case, checking something you have, your phone—means that even if your password is compromised by, say, a keylogger in an Internet cafe, or through a company’s security breach, your account is safe.”

 

 

 

 

 

 

FBI’s Latest Proposal For A Wiretap-Ready Internet Should Be Trashed

 

 

 

” The FBI has some strange ideas about how to “update” federal surveillance laws: They’re calling for legislation to penalize online services that provide users with too much security.

I’m not kidding. The proposal was revealed in The Washington Post last week — and a couple days ago, a front-page story in The New York Times reported the Obama administration is preparing to back it.

Why? Federal law enforcement agencies like the FBI have long feared their wiretap capabilities would begin “going dark” as criminals and terrorists — along with ordinary citizens — shift from telephone networks, which are required to be wiretap-ready under the 1994 Communications Assistance for Law Enforcement Act (CALEA), to the dizzying array of online communications platforms available today.”

 

 

 

 

 

 

 

 

Cannon Safe Releases Seven Tips For Purchasing A Safe

 

 

 

 

” Cannon Safe has created a step-by-step guide for finding the perfect safe for your home. The guide is aptly titled Seven Tips For Purchasing A Safe and can be downloaded for free at cannonsafe.com or a hardcopy can be received by mail upon request.

Like all consumer products, home safe technology has improved drastically in recent years and with so many new features and options, the process of selecting the right safe can be confusing.  Luckily, the new safe-buying guide from Cannon Safe will make the choice easier.

“The great thing about this guide is that it’s a one-stop source for all of the factors that should go into buying a full-sized safe, including size, location, fire rating, optional features and much more,” said Aaron Baker, president of Cannon Safe.  “Seven Tips for Purchasing a Safe helps you prioritize your needs and select the right safe for you and your family.” “

 

 

 

 

 

 

5 Benghazi Mysteries That Must Be Solved

 

 

 

 

” On Wednesday, at least three State Department employees will testify before the House Government Oversight and Reform Committee on Benghazi. They are expected to say that yes, there was a stand-down order during the battle. They may also testify that the State Department itself has tried to bully them into silence. What else they may say is not yet known.

As the Benghazi story has unfolded, many mysteries have persisted. Why wasn’t the Benghazi mission’s security enhanced? Where was President Obama? What role, if any, did Obama campaign officials play in crafting the government’s communications after the attack? Perhaps Wednesday’s witnesses can help shed some light on them.”

 

 

 

 

 

 

Shots Fired At TVA Watts Bar Nuclear Plant

 

 

 

 

” A TVA spokesperson confirmed that a security officer patrolling TVA Watts Bar Nuclear Plant in Spring City was involved in a shootout with a suspect Sunday at about 2:00 a.m.

The security incident happened on the Tennessee River side of the plant property, more than a quarter mile from the plant’s protected area, which houses its reactor and power production facilities.

TVA spokesperson Jim Hopson said the subject traveled up to the plant on a boat and walked onto the property.  When the officer questioned the suspect, the individual fired multiple shots at the officer. The officer shot back, and when he called for backup, the suspect sped away on his boat. “

 

 

 

 

 

 

 

Boston, And The Future Of IEDs In America

 

 

 

 

” In the aftermath of 9/11 and the run-up to the Iraq war, the Bush administration raised the specter of terrorists using weapons of mass destruction (WMDs). Indeed, then-National Security Advisor Condoleezza Rice made the case for toppling Saddam Hussein’s regime by ominously stating, “We don’t want the smoking gun to be a mushroom cloud.” 

Yet, the bombing at the finish line of the Boston Marathon is a tragic reminder that the more likely terrorist threat has been (and will continue to be) old-fashioned explosives — otherwise known as improvised explosive devices or IEDs.

And unlike WMDs, IEDs are relatively cheap and easy. McVeigh’s truck bomb is estimated to have cost him $5,000 for the truck and all the materials. Backpack IEDs probably cost a few hundred dollars, if that. None of the component parts needed to build an IED are illegal (the Boston backpack bombs are believed to have been built using pressure cookers as the containers, black powder or gunpowder as the explosive charges, and nails, BBs, and ball bearings as shrapnel). And the know-how to build IEDs is pervasive.

So what should we do now that threat has come to roost at home?”

 

 

 

 

 

 

 

 

From All Shot Out :

 

 

AllShotOut Reviews: AR500ARMOR

 

 

 

” I recently came upon a company called AR500 Armor, primarily a web-based enterprise which started in 2012. My first impression: This stuff is too cheap to be real. The tactical market has conditioned us to believe that everything needs to be at least $100.00 and painted black before it is worth buying. My SRT unit has attempted to acquire modern body armor over the past three years while their existing carriers, soft armor, and single polymer front plates put overall cost at an approximate $2700.00 per officer. The rifle plates alone can range in prices of $500.00 – $900.00 depending on the material, vendor, and multi-hit capability. The low cost of AR500ARMOR.COM’s 10” x 12” trauma plates had me believing it was a scam, with costs ranging between $65.00 and $110.00 plus shipping.

I began with 10 rounds of .223 PMC Bronze FMJ training ammunition. Following the first few rounds I happened to notice where the surrounding vest carrier material was becoming absolutely shredded. The next observation was that not a single round had penetrated the plate. I examined the vest and found that none of the fragments had penetrated through the final layer. Although the plate was slightly bent and indentations could be seen on the strike face, there was no loss of material and no indentation that could be measured at more than 1mm.”

 

 

 

 

Game of Drones

 

 

 

” True enough: as Stanford Law’s Ryan Calo notes, under current law, “citizens do not enjoy a reasonable expectation of privacy in public, nor even on the portions of their property visible from a public vantage.”

That’s a problem. Drone technology dramatically enhances the government’s ability to monitor citizens in public places and on their own property — and privacy law hasn’t kept pace with technological change.

Law enforcement agencies already have access to some 146 commercial drones — and that may be just the beginning as drones get smaller and more capable.

Defense contractor AeroVironment is perfecting the “Nano Hummingbird,” a drone that weighs less than an AA battery and is capable of alighting on a window ledge to record video.”

 

 

Off-Grid Community ‘The Citadel Project’ Gets Thumbs Up To Manufacture Firearms

 

Citadel layout concept

 

 

 

” A company called III Arms has just received ATF approval to manufacture firearms. Setting up a gun manufacturer is just a small part of III Arms’ plan, which is to establish a completely self-sufficient community in the mountains of Idaho.

It will be called “The Citadel” and include a walled urban center—10 feet thick by 20 feet high and four miles long—surrounded by rural plots for farming. It is, to turn a phrase, a planned prepper community.

Despite being armed and armored, the Citadel isn’t being made to defend its people from military or government action, rather, it’s intended to be a safe haven for forward-thinkers to weather a social, economic or environmental collapse. It is at the leading edge of anti-establishment living, but it “is not designed to withstand any direct .mil or .gov attack. Nor is the Citadel, in any manner, attempting to provoke any government entity,” according to the project FAQ.

III Arms began taking pre-orders for AR-15 rifles and 1911 handguns last November anticipating the FFL. Both have pre-order prices of $1,550, reflecting the difficulty of making small batches of firearms and current market trends.”

This is a giant first step towards self-sufficiency for the proposed “off-grid” community which we have posted on before .

Bill Stevens – Gun Violence Prevention Working Group Public Hearing

Meet The Groundbreaking New Encryption App Set To Revolutionize Privacy And Freak Out The Feds.

” For the past few months, some of the world’s leading cryptographers have been keeping a closely guarded secret about a pioneering new invention. Today, they’ve decided it’s time to tell all.

Back in October, the startup tech firm Silent Circle ruffled governments’ feathers with a “surveillance-proof” smartphone app to allow people to make secure phone calls and send texts easily. Now, the company is pushing things even further—with a groundbreaking encrypted data transfer app that will enable people to send files securely from a smartphone or tablet at the touch of a button. (For now, it’s just being released for iPhones and iPads, though Android versions should come soon.) That means photographs, videos, spreadsheets, you name it—sent scrambled from one person to another in a matter of seconds.

“This has never been done before,” boasts Mike Janke, Silent Circle’s CEO. “It’s going to revolutionize the ease of privacy and security.”

Just in time for the revolution … truly secure comms

HT/Instapundit

Follow

Get every new post delivered to your Inbox.

Join 5,506 other followers