Federal agencies are circumventing constitutional obligations by utilizing a secret fusion center where illegally obtained information is passed on to be used against American citizens. All federal law enforcement agencies are teaching their agents how to fabricate evidence and commit perjury under oath if necessary in order to protect and conceal the illegal sources of their investigations.
Attorney Robert Bernhoft and Former IRS Special Agent Joe Banister tell you how this unprecedented case will affect you.

U.S. defense lawyers to seek access to DEA hidden intelligence evidence

The Bernhoft Law Firm

Advertisements

In an extensive profile on Marlinspike, The Wall Street Journal details how an encryption program he wrote was so robust, simple, and efficient that WhatsApp — one of the more popular messaging apps on the planet — “made it a standard feature for many of the app’s 800 million users.”

While he may appear to be like any other dreadlocked dude you might see at a Grateful Dead concert, don’t let the hairstyle fool you. He’s the real deal, having formerly served as the head of Twitter’s security team.

The Journal reports:

In a research paper released Tuesday, 15 prominent technologists cited three programs relying on Mr. Marlinspike’s code as options for shielding communications.

His encrypted texting and calling app, Signal, has come up in White House meetings, says an attendee. Speaking via video link last year as part of a panel on surveillance, former National Security Agency contractor Edward Snowden, who leaked troves of U.S. spying secrets, urged listeners to use “anything” that Mr. Marlinspike releases.

All the more impressive, the report relays an anecdote detailing how a Johns Hopkins University cryptography class examined Marlinspike’s code only to find that there were no errors to be found. Anywhere.

In typical coder fashion, Marlinspike is extremely private. We don’t know his age or much else about him aside from his elegant code. And while the ultimate functionality of what Marlinspike’s accomplishes may not be new in and of itself, his code stands out because it’s extremely easy to use.

Source: [BGR]

A new facial recognition system being used by the FBI has managed to track down and capture a convicted paedophile on the Most Wanted List who disappeared 19 years ago.

Lynn Cozart, 63, from Beaver County, Pennsylvania was convicted for sexually assaulting his three children in February 1996, and he went missing just before his sentencing hearing two months later.

He managed to leave the state and stay under the radar for almost two decades, until the FBI used the $1bn (£650m, €900m) Next Generation Identification (NGI) system built by Lockheed Martin to track him down.

The FBI submitted Cozart’s mug shot to the NGI system, which used facial recognition to capture biometric data of his face.

The system then sought matches from other databases belonging to state agencies across the US, from government-issued licence databases to any form of government-collected data of scanned facial images taken from video or photos.

The system spotted a match amongst driving licence photos held by Arkansas’ motor vehicle department, and from there, the fugitive was tracked down to yet another state – Muskogee in Arkansas, more than 1,160 miles away from Pennsylvania.

Cozart was found working in Walmart under an assumed name, David Stone, and was apprehended by the town’s police officers.

Source: [ibtimes]

The company Hacking Team internally tested its code against a wide range of antivirus engines and Internet security apps. Testing was done using Windows 7, 64bit. In this color coded scheme, red means the code was not only detected but issued an alert whereas black just blocked with no notification. Click on the image for the full list.

  • Green – Antivirus does not react to the launch of the agent.
  • Yellow – Agent connects to the server, but can sometimes issues a warning. The antivirus has a non-standard configuration (ie the firewall turned off).
  • Black – the agent can not connect to the server, but there is no anti-virus warnings, or agent is in the antivirus black list.
  • Red – the agent can not connect to the server, an antivirus warning appears (agent is detected as malicious).

av-chart-hackingteam

Source: [exploit.in]

RAS-47 USA Made AK 47 Rifle

Posted: July 8, 2015 in SWIG
Tags: , ,

Federal agents raided the offices of a Jewish college that has prospered from millions of dollars in federal aid even though almost all its students live in Israel and hardly any of them graduate.

Federal officials declined to comment on the reason for the July 7 raid at Michigan Jewish Institute, in a suburb of Detroit.

But in 2012, the Forward showed how MJI’s assets soared as the college enrolled thousands of students in distance and online learning courses.

During a five-year period, MJI’s students claimed $25 million under the Federal Pell Grant Program, which is designed for the neediest American students.

Almost all those students took degree courses in Judaic studies at yeshivas and seminaries in Israel that they never completed.

Although MJI’s academic record has been poor, its assets have increased to $4.6 million in 2013, the most recent tax year available, from $1.2 million in 2008.

Source: [haaretz]

virus

A MYSTERIOUS new disease is afflicting children in the United States. It starts as a cold — but ends as weakness and paralysis. Does polio have a twin? Or are several new, potentially debilitating, viruses on the loose?

In the past 12 months, more than 118 children across 34 US states have been reported with a condition called “acute flaccid myelitis”.

It’s a condition that seems to start out as a respiratory infection like a serous bout of the common cold.

In these cases the muscle pain doesn’t go away. Then they lose their strength in their arms and legs.

While such symptoms are enough to panic any parent, disease experts say the cause does not appear to be particularly infectious.

But the number of cases seeking hospitalization in the US has raised eyebrows.

Early suspicions have fallen on the viruses which belong to the family we know as the common cold, the rhinoviruses.

The Centers for Disease Control and Prevention (CDC) have named enterovirus D68 (EV-D68) as the chief suspect.

But new figures show only 20 per cent of the known cases in the US tested positive for D68 — and it isn’t certain if this virus is linked to the paralysis anyway.

Enterovirus C105 is something new. It was first detected in patients from Peru and the Republic of Congo in 2010. The Congo case also suffered paralysis.

It’s now thought to be circulating worldwide.

Dr Turner says his six-year-old patient may simply be the first known case in the US because the C105 virus is particularly hard to detect.

Dr Senanayake says its ties to polio makes guilt by association understandable.

What makes the polio virus different — and deadly — is that it is highly contagious. A century ago, polio paralyzed hundreds of thousands of children every year. But it infected many more.

Are these immigrant children that are coming to the U.S. receiving vaccinations that are mutating with a normally harmless virus into a new virulent strain?

Source: [news.com.au]

8edb1-url

Researchers sifting through the confidential material stolen from spyware developer Hacking Team have already uncovered a weaponized exploit for a currently unpatched vulnerability in Adobe Flash, and they also may have uncovered attack code targeting Microsoft Windows and a hardened Linux module known as SELinux.

Hacking Team documentation accompanying the Flash exploit said it targeted “the most beautiful Flash bug for the last four years,” according to a blog post published Wednesday by researchers from antivirus provider Trend Micro. The use-after-free flaw resides in a Flash Bytearray object. Researchers at competing AV company Symantec have confirmed the existence of a Flash exploit that works against the latest version of Flash (18.0..194). They also have confirmed it works against people viewing content with Internet Explorer, and it’s presumed it will work against other browsers as well.

“Symantec has confirmed the existence of a new zero-day vulnerability in Adobe Flash which could allow attackers to remotely execute code on a targeted computer,” they wrote in a blog post published Tuesday. “Since details of the vulnerability are now publicly available, it is likely attackers will move quickly to exploit it before a patch is issued.”

Full Story @ [arstechnica]