For a healthy brain and nervous system – Gotta hava GABA

(NaturalNews) The frenzy of day to day life with its stress, worries and constant stimuli, can overwhelm the brain. Constantly running in hyperdrive causes the brain and body to eventually succumb to hyperactivity, anxiety disorders, panic attacks, seizures, addictions, headaches, Parkinson’s disease and even cognitive impairment

That is where GABA comes in. Gamma-Amino Butyric acid (GABA) is an amino acid which acts as a neurotransmitter in the central nervous system. GABA is the main neurotransmitter in your brain that inhibits nerve transmission and calms nerve activity. GABA normalizes brain waves and brings the nervous system back to a calmer and more stable state to meet the challenges coming at you in life.

Defining GABA

GABA was discovered as an amino acid in 1863 but it wasn’t until 1950 that it was found that GABA works as an inhibitory neurotransmitter. GABA is made in brain cells from glutamate and works by blocking nerve impulses. Glutamate fires the nerve impulses and GABA does the opposite by telling the nerves not to fire. In the case of GABA deficiency, nerve cells fire too often and too easily.

GABA supplements act as a natural tranquilizer and have many other benefits with no known side effects other than a possible mild tingling and increase in heart rate when first used. The supplement GABA works wonders for ADHD as GABA helps brainwaves flow in calm rhythms. In effect, it does naturally for the brain what ritalin does chemically – but without the deadly side effects.

GABA enhances normal sleep cycles, can improve blood pressure and can also be an effective pain killer, providing relief from back pain and arthritis. GABA stimulates the pituitary gland to secrete Human Growth Hormone (HGH) leading to weight loss and an increase in muscle tissue. GABA also helps in the production of endorphins to provide you with a sense of well-being after a good physical workout or sexual intercourse.

Technical aspects of GABA

When activated, GABA receptors permit chloride to diffuse into the cell and hyperpolarize the membrane to inhibit the excitability of the cell. In the event of high internal chloride, GABA causes an efflux of chloride and depolarizes the membrane. Either action still inhibits neuronal flow by creating a “current shunt” for excitatory neuron currents (Kuffler and Eyzaguirre, 1955).

In short, GABA is required to relax muscles and to reset posture by making a normal wave of motion when walking, running or swimming. GABA also stimulates the enteric muscles for intestinal peristalsis and feces elimination. In a GABA deficiency, the intestines fail to contract properly and the gut becomes bloated with food.

GABA deficiency

In addition to bowel trouble, other problems that GABA deficiencies cause are carbohydrate cravings, trembling, twitching, hyperventilation, flushing, tachycardia, palpitations, sweating, cold or clammy hands, paresthesia, chest pain or discomfort, restlessness, blurred vision, abnormal sense of smell, abnormal odors, lump in throat, butterflies in stomach, unusual allergies, anxiety, hypertension, cystitis, gastrointestinal disorders, tinnitus and PMS.

Getting enough GABA

Vitamins B6 and B12 are essential nutrients required in the synthesis of many neurotransmitters including GABA. Natural sources of GABA are foods rich in complex carbohydrates such as whole grains, brown rice and oats. Foods that are high in glutamine, glutamic acid and glutamate (NOT monosodium glutamate), include bananas, beef liver and other organ meats, broccoli, citrus fruits, halibut, lentils, molasses and nuts.

GABA is considered safe for children and adults alike. You can find it at the health food stores. It’s food! In reasonable amounts, if your body doesn’t need GABA it will burn it as fuel or use it to build other amino acids.

Sources for this article

David E. Golan, Armen H. Tashjian, Ehrin J. Armstrong. (2011). Principles of Pharmacology: The Pathophysiologic Basis of Drug Therapy.
George Siegel, Scott Brady, R. Wayne Albers, Donald Price. (2011). Basic Neurochemistry: Principles of Molecular, Cellular, and Medical Neurobiology
Florey, E. (1991). GABA: history and perspectives. Can J Physiol Pharmacol

About the author:
Craig Stellpflug is a Cancer Nutrition Specialist, Lifestyle Coach and Neuro Development Consultant at Healing Pathways Medical Clinic, Scottsdale, AZ. With 17 years of clinical experience working with both brain disorders and cancer, Craig has seen first-hand the devastating effects of vaccines and pharmaceuticals on the human body and has come to the conclusion that a natural lifestyle and natural remedies are the true answers to health and vibrant living. You can find his daily health blog at and his articles and radio show archives at Real Health Talk Home Page

Hacker News: How CIA Agents Covertly Steal Data From Hacked Smartphones (Without Internet)


WikiLeaks has today published the 16th batch of its ongoing Vault 7 leak, this time instead of revealing new malware or hacking tool, the whistleblower organisation has unveiled how CIA operatives stealthy collect and forward stolen data from compromised smartphones.

Previously we have reported about several CIA hacking tools, malware and implants used by the agency to remotely infiltrate and steal data from the targeted systems or smartphones.

However, this time neither Wikileaks nor the leaked CIA manual clearly explains how the agency operatives were using this tool.

But, since we have been covering every CIA leak from the very first day, we have understood a possible scenario and have illustrated how this newly revealed tool was being used.

Explained: How CIA Highrise Project Works

In general, the malware uses the internet connection to send stolen data after compromising a machine to the attacker-controlled server (listening posts), but in the case of smartphones, malware has an alternative way to send stolen data to the attackers i.e. via SMS.

But for collecting stolen data via SMS, one has to deal with a major issue – to sort and analyse bulk messages received from multiple targeted devices.

To solve this issue, the CIA created a simple Android application, dubbed Highrise, which works as an SMS proxy between the compromised devices and the listening post server.

“There are a number of IOC tools that use SMS messages for communication and HighRise is a SMS proxy that provides greater separation between devices in the field (“targets”) and the listening post” by proxying “”incoming” and “outgoing” SMS messages to an internet LP,” the leaked CIA manual reads.

What I understood after reading the manual is that CIA operatives need to install an application called “TideCheck” on their Android devices, which are set to receive all the stolen data via SMS from the compromised devices.

The last known version of the TideCheck app, i.e. HighRise v2.0, was developed in 2013 and works on mobile devices running Android 4.0 to 4.3, though I believe, by now, they have already developed an updated versions that work for the latest Android OS.


Once installed, the app prompts for a password, which is “inshallah,” and after login, it displays three options:

  1. Initialize — to run the service.
  2. Show/Edit configuration — to configure basic settings, including the listening post server URL, which must be using HTTPS.
  3. Send Message — allows CIA operative to manually (optional) submit short messages (remarks) to the listening post server.

Once initialized and configured properly, the app continuously runs in the background to monitor incoming messages from compromised devices; and when received, forwards every single message to the CIA’s listening post server over a TLS/SSL secured Internet communication channel.

Previous Vault 7 CIA Leaks

Last week, WikiLeaks dumped two alleged CIA implants that allowed the agency to intercept and exfiltrate SSH credentials from targeted Windows and Linux operating systems using different attack vectors.

Dubbed BothanSpy — implant for Microsoft Windows Xshell client, and Gyrfalcon — targets the OpenSSH client on various distributions of Linux OS, including CentOS, Debian, RHEL (Red Hat), openSUSE and Ubuntu.

Since March, the whistleblowing group has published 16 batches of “Vault 7” series, which includes the latest and last week leaks, along with the following batches:

  • OutlawCountry – An alleged CIA project that allowed it to hack and remotely spy on computers running the Linux operating systems.
  • ELSA – Alleged CIA malware that tracks geo-location of targeted computers and laptops running the Microsoft Windows operating system.
  • Brutal Kangaroo – A tool suite for Microsoft’s Windows used by the spying agency to target closed networks or air-gapped computers within an organisation or enterprise without requiring any direct access.
  • Cherry Blossom – An agency’s framework used for monitoring the Internet activity of the targeted systems by exploiting vulnerabilities in Wi-Fi devices.
  • Pandemic – A CIA’s project that allowed the agency to turn Windows file servers into covert attack machines that can silently infect other computers of interest inside a targeted network.
  • Athena – An agency’s spyware framework that has been developed to take full control of the infected Windows machines remotely, and works for every version of Microsoft’s Windows operating systems, from XP to Windows 10.
  • AfterMidnight and Assassin – Two CIA malware frameworks for the Windows platform that has been designed to monitor activities on the infected remote host computer and execute malicious actions.
  • Archimedes – Man-in-the-middle attack tool allegedly developed by the CIA to target computers inside a Local Area Network (LAN).
  • Scribbles – Software reportedly designed to embed ‘web beacons’ into confidential documents, allowing the agency to track insiders and whistleblowers.
  • Grasshopper – Framework that allowed the CIA hackers to easily create their custom malware for breaking into Microsoft’s Windows OS and bypassing antivirus protection.
  • Marble – Source code of a secret anti-forensic framework used by the agency to hide the actual source of its malware.
  • Dark Matter – Hacking exploits the spying agency designed to target iOS and Mac systems.
  • Weeping Angel – Spying tool used by the CIA hackers to infiltrate smart TVs, transforming them into covert microphones.
  • Year Zero – Alleged CIA hacking exploits for popular software and hardware.
Swati - Hacking News
Technical Writer, Security Blogger and IT Analyst. She is a Technology Enthusiast with a keen eye on the Cyberspace and other tech related developments.

Hacker News: AlphaBay Shut Down After Police Raid; Alleged Founder Commits Suicide in Jail


AlphaBay Market — one of the largest Dark Web marketplaces for drugs, guns, and other illegal goods — that mysteriously went dark earlier this month without any explanation from its admins has reportedly been shut down by the international authorities.

On July 4th, the dark web marketplace suddenly went down without any explanation from its admins, which left its customers who have paid large sums in panic.

Some customers even suspected that the site’s admins had pulled an exit scam to steal user funds.

However, according to the Wall Street Journal, the disappearance of the AlphaBay came after authorities in the United States, Canada, and Thailand collaborated to conduct a series of raids and arrest Alexandre Cazes, who allegedly was one of the AlphaBay’s operators.

Citing “people familiar with the matter,” the publication claims that Cazes, a resident of Canada, was arrested in Thailand and taken into custody in Bangkok on July 5th, the same day the police executed two raids on residences in Quebec, Canada.

The 26-year-old Canadian citizen was awaiting extradition to the United States when a guard found him hanged in his jail cell on Wednesday, the Chiang Rai Times confirms. Cazes is believed to have hanged himself using a towel.


Cazes had been living in Thailand for nearly 8 years. During his arrest, authorities also seized “four Lamborghini cars and three houses worth about 400 million baht ($11.7 million) in total.”

AlphaBay, also known as “the new Silk Road,” also came in the news at the beginning of this year when a hacker successfully hacked the AlphaBay site and stole over 200,000 private unencrypted messages from several users.

After the disappearance of Silk Road, AlphaBay emerged in 2014 and became a leader among dark web marketplaces for selling illicit goods from drugs to stolen credit card numbers, exploits, and malware.

Unlike dark web market ‘Evolution‘ that suddenly disappeared overnight from the Internet, stealing millions of dollars worth of Bitcoins from its customers, AlphaBay Market was shut down by the law enforcement, suffering the same fate as Silk Road.

Silk Road was shut down after the law enforcement raided its servers in 2013 and arrested its founder Ross William Ulbricht, who has been sentenced to life in prison.

The FBI also seized Bitcoins (worth about $33.6 million, at the time) from the site. Those Bitcoins were later sold in a series of auctions by the United States Marshals Service (USMS).

Swati - Hacking News
Technical Writer, Security Blogger and IT Analyst. She is a Technology Enthusiast with a keen eye on the Cyberspace and other tech related developments.

Hacker News: Ubuntu Linux for Windows 10 Released — Yes, You Read it Right!


Windows and Linux in the same line? Yes, you heard that right… and that too, on the same computer and within the same operating system.

Two months ago, Microsoft announced its plans to let its users install three different flavours of the Linuxoperating system – UbuntuFedora, and SUSE – directly through their Windows Store, allowing them to run Windows and Linux apps side-by-side.

Now, downloading an entire operating system has just become as easy as downloading an application with the availability of popular Linux distro ‘Ubuntu’ in the Windows App Store.

However, unlike a conventional Ubuntu installation, this Ubuntu version runs in a sandboxed alongside Windows 10 with limited interaction with the operating system and is focused on running regular command-line utilities like bash or SSH as a standalone installation through an Ubuntu Terminal.

For now, Ubuntu is currently only available to Windows 10 Insiders users and would be made available to the public with the upcoming Windows 10 Fall Creator Update, which is expected to release in September/October 2017.

Here’s How to Install and Run Ubuntu on Windows 10

Users registered in Windows 10 Insiders Program with at least “Build 16215” installed can directly install Ubuntu from the Windows Store, which will allow them to “use Ubuntu Terminal and run Ubuntu command line utilities including bash, ssh, git, apt and many more.”

After installing Ubuntu, Windows 10 users will require enabling “Windows Subsystem for Linux” that was previously added to Windows 10.

To enable it, follow these simple steps:

  • Navigate to Control Panel and go to “Apps and features” settings.
  • Select “Programs and Features” from the right panel.
  • Open the “Turn Windows features on or off” from the left menu.
  • Select the “Windows Subsystem for Linux” and save it.
  • Reboot Your system.

While the company has not revealed exactly when its users can expect to see the other two Linux distro, Fedora and SUSE Linux, to the Windows Store, this step by Microsoft follows its commitment to the open source community.

In 2013, the Microsoft launched Visual Studio, and a year later, the company open-sourced .NET. In 2015, the tech giant open sourced the Visual Studio Code Editor, as well.

Last year, Microsoft took many steps to show its love for Linux, which includes bringing of Ubuntu on Windows 10, working with FreeBSD to develop a Virtual Machine image for its Azure cloudchoosing Ubuntu as the OS for its Cloud-based Big Data services, and even joining the Linux Foundation as a Platinum member – the highest level of membership.

Have you tried out Ubuntu on Windows 10? If yes, let us know your experience in the comments below.

Mohit Kumar - Hacking News
Entrepreneur, Hacker, Speaker, Founder and CEO — The Hacker News and The Hackers Conference.

CONFIRMED: US and France abandon regime change in Syria

Tales from the Conspiratum

This would be good news but I highly doubt that the US and France will stay out of countries they have no business being in. It’s in their genetic nature to dictate to other nations how they should live. And of course, they want the resources of said countries. We’ll see.

Summit of US and French Presidents provides final confirmation that the West’s regime change war in Syria has failed and is being abandoned.

Source: CONFIRMED: US and France abandon regime change in Syria

July 13, 2017
Summit of US and French Presidents provides final confirmation that the West’s regime change war in Syria has failed and is being abandoned.

The hints and signals that have been flickering on and off from Washington and Paris since the change of governments in the US and France that the regime change attempt in Syria is being officially abandoned has…

View original post 288 more words