Fake News Outlet New York Times Forced To Retract ‘Russian Hacking’ story


Source: HangTheBankers.com
July 1, 2017

The New York Times has finally admitted that one of the favorite Russia-gate canards – that all 17 U.S. intelligence agencies concurred on the assessment of Russian hacking of Democratic emails – is false.

On Thursday, the Times appended a correction to a June 25 article that had repeated the false claim, which has been used by Democrats and the mainstream media for months to brush aside any doubts about the foundation of the Russia-gate scandal and portray President Trump as delusional for doubting what all 17 intelligence agencies supposedly knew to be true.

In the Times’ White House Memo of June 25, correspondent Maggie Haberman mocked Trump for “still refus[ing] to acknowledge a basic fact agreed upon by 17 American intelligence agencies that he now oversees: Russia orchestrated the attacks, and did it to help get him elected.”

However, on Thursday, the Times –…

View original post 684 more words

A Roman War Tool Still Influences the World

True Strange News

You may have heard the quotes, “Truth is the first casualty of war,” or “The winner of a war rewrites history,” but few know we still today experience a history rewrite by Romans who won an ancient war.

If independent historical religiousresearchers are correct, the Flavian emperors of Rome left behind not just language, pottery, art and architecture, but an entire religion… one you’ve most likely heard about.

Watch this video:

There you have it, a real mothership of conspiracy theories. It seems to be compellingevidence thatChristianity is a manufactured religion, a Roman war propaganda tool. The writers built the story of Jesus from the life story of Caesar andcombined Roman ideology with existing Jewish ideas.

The writings, adapted from previous works, contain useful, practicalmoral guidance and wisdom, intriguing human stories, and, built in, at the center of it all,an invented, non-historical, peacefulJewish king (Jesus) who…

View original post 340 more words

Cover-up! Obama buried Trump spying evidence for YEARS

Former President Barack Obama’s administration spied on then-Republican presidential candidate Donald Trump, unmasked the names of private citizens, and leaked them for political reasons.

Now that members of the Obama team are facing potential jail time, the Deep State has pulled one last, desperate attempt to bury all the evidence.

They have removed all the records from government files and put them under lock and key for five years — inside Obama’s private library.

Judicial Watch filed a Freedom of Information Act (FOIA) demanding everything related to the alleged Russian hacking scandal — especially anything produced by Susan Rice, Obama’s national security adviser. In the past, Rice admitted she unmasked the names of Trump officials, feeding the phony story to the media that they colluded with Russia to steal the election.

But the government says those records are missing and are now sealed inside a library that hasn’t even been built yet in Hoffman Estates, Illinois.

“Documents from the Obama administration have been transferred to the Barack Obama Presidential Library,” an NSC letter to Judicial Watch dated May 23 said.

The NSC said, if the group wants, it can ask Obama to turn over the records himself… ‘pretty please.’

“You may send your request to the Obama Library,” the NSC wrote. “However, you should be aware that under the Presidential Records Act, presidential records remain closed to the public for five years after an administration has left office.”

Now the papers that could prove Rice broke the law are sealed — just like Obama’s college transcripts, his financial aid applications, and everything else he wanted to hide.

“It is a shell game of documents being shifted over to the library,” said Judicial Watch president Tim Fitton. “These documents are the smoking gun that investigators are looking for, and everyone knows it.”

Why? If the records turn up, lots of Obama figures could be in hot water.

Judicial Watch wrote in one of its six FOIA requests that Rice may have “contributed to the unauthorized disclosure of classified national security information.”

The whole operation looks like “unlawful domestic political intelligence operation being run out of the Obama White House,” said Chris Farrell, director of research and investigation for Judicial Watch.

Of course, Rice has denied all wrongdoing.

In April, she told MSNBC’s Andrea Mitchell that she had unmasked the names of several Trump officials… but “absolutely not for any political purpose.” Then again, this is the same Susan Rice who lied to the American people over, and over, and over about the massacre at Benghazi being caused by an anti-Islamic YouTube video.

When Sen. Lindsey Graham asked Rice to testify, Rice’s lawyer Kathryn Ruemmler wrote, “Ambassador Rice respectfully declines” the “invitation to testify.” (Ruemmler, who used to work for the Obama White House, is a master at stonewalling. She told investigators Obama had released everything about the Solyndra energy scandal. Another 15,000 pages of documents were later discovered.)

Congressional Republicans have recently ratcheted up the stakes. Rice was one of 7 people subpoenaed by the House Intelligence Committee over the unmasking of Trump staffers’ names on May 31. Other Obama officials include UN Ambassador Samantha Power and CIA Director John Brennan.

Now, using a legal loophole, these records have been mysteriously moved and handed over to Obama and his loyalists for safekeeping. That’s something you’d expect in a banana republic, not the United States of America.

Instead of telling the American people whether she broke the law to smear Donald Trump, Susan Rice is playing the race card.

She has said she’s just another victim of racist, sexist, deplorable America.

Rice said she doesn’t think the subpoena is “only about race and gender,” but she’s pretty sure the fact that she’s a black woman plays a part. It definitely isn’t her fault she’s being called to account for her potentially criminal behavior.

But don’t cry for Rice too hard. According to New York Magazine, she has spent most of her time since January “relaxing: vacationing in the Maldives for two and a half weeks, playing lots of tennis, doing some writing and speaking.”

Nice work if you can get it.

Rice and a lot of other Obama officials could be in for a long stay in a concrete cell if these records ever come to light — and the president may hold the physical key himself.

According to Fitton, sealed presidential records have to be released if Congress, or the president, say they need them.

All President Trump has to do is ask. And he should, at once, to clear his good name.

The NSC noted that the Barack Obama Presidential Library can be reached by e-mail at obama.library@nara.gov.

Maybe you’d like to write them, too?

— Walter W. Murray is a reporter for The Horn News. He is an outspoken conservative and a survival expert, and is the author of “America’s Final Warning.

Hacker News: Windows 10 to Get Built-in Protection Against Most Ransomware Attacks

Ransomware Ransomware Everywhere Not a Single Place to Hide!

But, Microsoft has a simple solution to this problem to protect millions of its users against most ransomware attacks.

Two massive ransomware attacks — WannaCry and Petya (also known as NotPetya) — in a month have caused chaos and disruption worldwide, forcing hospitals, ATMs, shipping companies, governments, airports and car companies to shut down their operations.

Most ransomware in the market, including WannaCry and NotPetya, are specifically designed to target computers running Windows operating system, which is why Microsoft has been blamed for not putting proper defensive measures in place to prevent such threats.

But not now!

In the wake of recent devastating global ransomware outbreaks, Microsoft has finally realized that its Windows operating system is deadly vulnerable to ransomware and other emerging threats that specifically targets its platform.

To tackle this serious issue, the tech giant has introduced a new anti-ransomware feature in its latest Windows 10 Insider Preview Build (16232) yesterday evening, along with several other security features.

Microsoft is planning to introduce these security features in Windows 10 Creator Update (also known as RedStone 3), which is expected to release sometime between September and October 2017.

The anti-ransomware feature, dubbed Controlled Folder Access, is part of Windows Defender that blocks unauthorized applications from making any modifications to your important files located in certain “protected” folders.

Applications on a whitelist can only access Protected folders. So you can add or remove the apps from the list. Certain applications will be whitelisted automatically, though the company doesn’t specify which applications.

Once turned on, “Controlled folder access” will watch over files stored inside Protected folders and any attempt to access or modify a protected file by non-whitelisted apps will be blocked by Windows Defender, preventing most ransomware to encrypt your important files.

So, whenever an application tries to make changes to Protected files but is blacklisted by the feature, you will get a notification about the attempt.

How to Enable Controlled Folder Access, Whitelist Apps and Add or Remove Protected Folders

Here’s how to enable the Controlled folder access feature:

  • Go to Start menu and Open the Windows Defender Security Center
  • Go to the Virus & Threat Protection settings section
  • Set the switch to On

Here’s how to allow apps that you trust is being blocked by the Controlled folder access feature to access Protected folders:

  • Go to Start menu and Open the Windows Defender Security Center
  • Go to the Virus & Threat Protection settings section
  • Click ‘Allow an app through Controlled folder access’ in the Controlled folder access area
  • Click ‘Add an allowed app’ and select the app you want to allow

Windows library folders like Documents, Pictures, Movies, and Desktop are designated as being compulsorily “protected” by default, which can not be removed.


However, users can add or remove their personal folders to the list of protected folders. Here’s how to add folders to Protected folders list:

  • Go to Start menu and Open the Windows Defender Security Center
  • Go to the Virus & Threat Protection settings section
  • Click ‘Protected folders’ in the Controlled folder access area
  • Enter the full path of the folder you want to monitor

Users can also enter network shares and mapped drives, but environment variables and wildcards are not supported at this moment.

Other Security Feature Introduced in Windows 10 Insider Program

With the release of Windows 10 Insider Preview Build 16232, Windows Defender Application Guard (WDAG) for Edge — a new system for running Microsoft Edge in a special virtual machine in order to protect the OS from browser-based flaws — also received improvements in usability.

Windows 10 Insider Preview Build also comes with support for Microsoft Edge data persistence when using WDAG.

“Once enabled, data such as your favorites, cookies, and saved passwords will be persisted across Application Guard sessions,” Microsoft explains.
“The persisted data will be not be shared or surfaced on the host, but it will be available for future Microsoft Edge in Application Guard sessions.”

Another new security feature called Exploit Protection has been introduced in Windows 10 16232, which blocks cyber attacks even when security patches are not available for them, which means the feature will be useful particularly in the case of zero-day vulnerabilities.

Exploit Protection works without Microsoft’s Windows Defender Antivirus tool, but you can find the feature in Windows Defender Security Center → App & Browser Control → Exploit Protection.

In the Fall Creators Update for Windows 10, Microsoft has also planned to use a broad range of data from Redmond’s cloud services, including Azure, Endpoint, and Office, to create an AI-driven Antivirus (Advanced Threat Protection) that can pick up on malware behavior and protect other PCs running the operating system.

Also, we reported about Microsoft’s plan to build its EMET or Enhanced Mitigation Experience Toolkit into the kernel of the upcoming Windows 10 to boost the security of your PC against complex threats such as zero-day vulnerabilities.

Also, the company is planning to remove the SMBv1 (Server Message Block version 1) — a 30-year-old file sharing protocol which came to light last month after the devastating WannaCry outbreak — from the upcoming Windows 10 (1709) Redstone 3 Update.

Besides this, some other changes and improvements have also been introduced with the release, along with patches for several known issues.

Swati - Hacking News
Technical Writer, Security Blogger and IT Analyst. She is a Technology Enthusiast with a keen eye on the Cyberspace and other tech related developments.

Hacker News: Wikileaks Reveals CIA Malware that Hacks & Spy On Linux Computers


WikiLeaks has just published a new batch of the ongoing Vault 7 leak, this time detailing an alleged CIA project that allowed the agency to hack and remotely spy on computers running the Linux operating systems.

Dubbed OutlawCountry, the project allows the CIA hackers to redirect all outbound network traffic on the targeted computer to CIA controlled computer systems for exfiltrate and infiltrate data.

The OutlawCountry Linux hacking tool consists of a kernel module, which the CIA hackers load via shell access to the targeted system and create a hidden Netfilter table with an obscure name on a target Linux user.

“The new table allows certain rules to be created using the “iptables” command. These rules take precedence over existing rules, and are only visible to an administrator if the table name is known. When the Operator removes the kernel module, the new table is also removed,” CIA’s leaked user manual reads.

Although the installation and persistence method of the OutlawCountry tool is not described in detail in the document, it seems like the CIA hackers rely on the available CIA exploits and backdoors to inject the kernel module into a targeted Linux operating system.

However, there are some limitations to using the tool, such as the kernel modules only work with compatible Linux kernels.

“OutlawCountry v1.0 contains one kernel module for 64-bit CentOS/RHEL 6.x; this module will only work with default kernels. Also, OutlawCountry v1.0 only supports adding covert DNAT rules to the PREROUTING chain,” WikiLeaks says.

Previous Vault 7 CIA Leaks

Last week, WikiLeaks dumped a classified CIA malware that tracks geo-location of targeted PCs and laptops running the Microsoft Windows operating system.

Dubbed ELSA, the malware captures the IDs of nearby public hotspots and then matches them with the global database of public Wi-Fi hotspots’ locations.

Since March, the whistleblowing group has published 14 batches of “Vault 7” series, which includes the latest and last week leaks, along with the following batches:

  • Brutal Kangaroo – a CIA tool suite for Microsoft Windows that targets closed networks or air-gapped computers within an enterprise or organization without requiring any direct access.
  • Cherry Blossom – a CIA’s framework, generally a remotely controllable firmware-based implant, used for monitoring the Internet activity of the target systems by exploiting flaws in WiFi devices.
  • Pandemic – a CIA’s project that allowed the spying agency to turn Windows file servers into covert attack machines that can silently infect other computers of interest inside a targeted network.
  • Athena – an agency’s spyware framework that has been designed to take full control over the infected Windows machines remotely, and works with every version of Microsoft’s Windows operating systems, from Windows XP to Windows 10.
  • AfterMidnight and Assassin – Two apparent CIA’s malware frameworks for the Microsoft Windows platform that is meant to monitor and report back actions on the infected remote host computer and execute malicious code.
  • Archimedes – A man-in-the-middle attack tool allegedly built by the spying agency to target computers inside a Local Area Network (LAN).
  • Scribbles – A piece of software reportedly designed to embed ‘web beacons’ into confidential documents, allowing the CIA hackers to track insiders and whistleblowers.
  • Grasshopper – A framework that allowed the CIA to easily create custom malware for breaking into Microsoft’s Windows and bypassing antivirus protection.
  • Marble – The source code of a secret anti-forensic framework, primarily an obfuscator or a packer used by the spying agency to hide the actual source of its malware.
  • Dark Matter – Hacking exploits the agency designed and used to target iPhones and Mac machines.
  • Weeping Angel – Spying tool used by the CIA to infiltrate smart TV’s, transforming them into covert microphones in target’s pocket.
  • Year Zero – CIA hacking exploits for popular hardware and software.
Swati - Hacking News
Technical Writer, Security Blogger and IT Analyst. She is a Technology Enthusiast with a keen eye on the Cyberspace and other tech related developments.

Hacker News: WordPress Plugin Used by 300,000+ Sites Found Vulnerable to SQL Injection Attack


A SQL Injection vulnerability has been discovered in one of the most popular WordPress plugins, installed on over 300,000 websites, which could be exploited by hackers to steal databases and possibly hijack the affected sites remotely.

The flaw has been discovered in the highly popular WP Statistics plugin, which allows site administrators to get detailed information related to the number of users online on their sites, the number of visits and visitors, and page statistics.

Discovered by Sucuri team, WordPress plugin WP Statistics is vulnerable to SQL Injection flaw that allows a remote attacker, with at least a subscriber account, to steal sensitive information from the website’s database and possibly gain unauthorized access to websites.

SQL Injection is a web application bug that allows hackers to inject malicious Structured Query Language (SQL) code to web inputs in order to determine the structure and location of key databases, which eventually allows stealing of the database.


The SQL injection vulnerability in WP Statistics plugin resides in multiple functions, including wp_statistics_searchengine_query().

“This vulnerability is caused by the lack of sanitization in user-provided data,” researchers said. “Some attributes of the shortcode wpstatistics are being passed as parameters for important functions and this should not be a problem if those parameters were sanitized.”

“One of the vulnerable functions wp_statistics_searchengine_query() in the file ‘includes/functions/functions.php’ is accessible through WordPress’ AJAX functionality thanks to the core function wp_ajax_parse_media_shortcode().”

This function does not check for additional privileges, which allows website subscribers to execute this shortcode and inject malicious code to its attributes.

The researchers at Sucuri privately disclosed the flaw to the WP Statistics team and the team had patched the vulnerability in its latest version WP Statistics version 12.0.8.

So, if you have a vulnerable version of the plugin installed and your website allowing user registration, you are definitely at risk, and you should install the latest version as soon as possible.

Wang Wei - Hacking News
Security Researcher and Consultant for the government, Financial Securities and Banks. Enthusiast, Malware Analyst, Penetration Tester.

Student Handed Out Copies Of The Constitution. She Was Arrested! Happy 4th everyone, remember why we celebrate this day!

Student Handed Out Copies Of The Constitution. She Was Arrested.

A student was arrested and handcuffed for distributing copies of the U.S. Constitution on a college campus, prompting a federal lawsuit.

A video shows officers handcuffing and arresting Michelle Gregorie for trespassing at Kellogg Community College (KCC) in Battle Creek, Mich. A member of Young Americans for Liberty (YAL), Gregoire was handing out pocket-sized copies of the Constitution at the time of the arrest, a lawsuit from the legal group Alliance Defending Freedom (ADF) alleged.

The college maintains the student was arrested in September 2016 because YAL is not a registered student organization, a KCC press release stated. KCC staff asked the students to register and move their activities to the Student Center. When they refused, they were arrested, which prompted the lawsuit.

“By policy and practice, Kellogg Community College … claims the unchecked right to prohibit students from engaging in practically any constitutionally protected expression anywhere on campus unless they first obtain permission from KCC officials,” the ADF suite states. “When students request permission, the College’s Solicitation Policy … grants KCC officials unbridled discretion to restrict the content and viewpoint of student speech if it does not ‘support the mission of Kellogg Community College (KCC) or the mission of a recognized college entity or activity.’ Thus, students may not speak spontaneously anywhere on campus.”

The college maintains its policy is constitutional.

“This case is not about free speech or viewpoint discrimination,” KCC spokesman Eric Greene said. “We have felt from day one of this unnecessary lawsuit that the plaintiffs’ claims are without merit and that the College’s Solicitation Policy is constitutional and appropriate in its scope.”

The Alliance Defending Freedom charges that the college violated the students’ First Amendment rights.

What do you think? Should colleges be able to restrict this type of speech? Share your thoughts in the section below:


Source: http://www.offthegridnews.com/current-events/student-handed-out-copies-of-the-constitution-she-was-arrested/