Monday, December 30, 2013

How The NSA Hacks Your iPhone (Presenting DROPOUT JEEP)

Tyler Durden's picture

Following up on the latest stunning revelations released yesterday by German Spiegel which exposed the spy agency's 50 page catalog of "backdoor penetration techniques", today during a speech given by Jacob Applebaum (@ioerror) at the 30th Chaos Communication Congress, a new bombshell emerged: specifically the complete and detailed description of how the NSA bugs, remotely, your iPhone. The way the NSA accomplishes this is using software known as Dropout Jeep, which it describes as follows: "DROPOUT JEEP is a software implant for the Apple iPhone that utilizes modular mission applications to provide specific SIGINT functionality. This functionality includes the ability to remotely push/pull files from the device. SMS retrieval, contact list retrieval, voicemail, geolocation, hot mic, camera capture, cell tower location, etc. Command, control and data exfiltration can occur over SMS messaging or a GPRS data connection.All communications with the implant will be covert and encrypted."
The flowchart of how the NSA makes your iPhone its iPhone is presented below:

Selective history running rampant

Sunday, December 29, 2013

Stunning Video Explains How NSA Tracks 5 Billion Records/Day

The National Security Agency is gathering nearly 5 billion records a day on the whereabouts of cellphones around the world, according to top-secret documents and interviews with U.S. intelligence officials, enabling the agency to track the movements of individuals — and map their relationships — in ways that would have been previously unimaginable.
The records feed a vast database that stores information about the locations of at least hundreds of millions of devices, according to the officials and the documents, which were provided by former NSA contractor Edward Snowden. New projects created to analyze that data have provided the intelligence community with what amounts to a mass surveillance tool.
A look at how the NSA collects cell phone data and uses it to track individual suspects.
Click Here to View Full Graphic Story
A look at how the NSA collects cell phone data and uses it to track individual suspects.
Read more:

NSA uses Google cookies to pinpoint users to hack

NSA uses Google cookies to pinpoint users to hack
How the NSA piggybacks onto the tracking behaviors of commercial companies to enable exploitation and surveillance.

How the NSA infers relationships from location data

How the NSA infers relationships from location data
A 24-page NSA whitepaper describes the agency’s techniques for inferring relationships from location data.

Tech companies unite to call for new limits on surveillance

Tech companies unite to call for new limits on surveillance
The firms, including Microsoft, Google and Facebook, say there is an “urgent need” for reform.
Click here to subscribe.

Our wonderful, Powerful President Voted by an non-partisan group telling “Lie of the Year”

I have to commend Nancy Pelosi she was absolutely correct in saying "We need to pass the bill so we can see whats in it".

Congratulations, Barack Obama, on winning PolitiFact’s “Lie of the Year”!

But now I'm a rascist.

My funny story of the day

So this guy shows up at my sheep farm and asks if he can predict with exact precision the number of sheep I own will I give him one. I said sure. So using his mental heuristics he surveys my herd of sheep for a brief minute and says "853" sheep. I was floored!! In less than a minute he guessed it correctly. So i told him to pick a sheep out. Being the challenging person I am I reversed it. I asked if him if I can guess with perfection his profession, I can get my animal back. He said sure absolutely. So I thought for about 10 seconds and I said you are an economist with the fed. he was completely surprised with sheer amazement. How did you know that he asked? I said because you picked out my dog.

Obama enjoy your vacation in Hawaii

Large Lot Jim Beam Convention Pinback Buttons and Souvenirs - Rare

I have about 175 pinback buttons representing many Jim Beam candidates for office. Very rare very difficult to find.

Released through the IAJBBSC (International Association of Jim Beam Bottle and SpecialtiesClubs) Collectors International.

Many from the 70's and 80's Convention. Great for collectors. 

Also included is 3 Caesars Palace Gold Medallions. There are also 6 convention trinkets in the original envelope and all stamped. Please do not hesitate to ask questions, more pictures, or make a reasonable offer. You wont see this again.


$250 OBO. Any reasonable offer accepted.

Sunday evening beauties

Friday, December 27, 2013

** Cash Paid for Silver Coins****

I am paying cash for pre-1964 junk or UNC silver coins.

I will pay $10.00 per $1.00 face value for any Pre-1964 circulated silver coins (90% silver).

I will pay silver spot for Silver eagles. Graded coins please call and I will make a fair offer.

I will also buy 1965-1970 circulated Kennedy halves. I will pay $4.00 per $1.00 of face value (40% silver).

Please call with questions


Local or non-local (I use paypal)

Prices Paid subject to change at any given moment.

Friday, December 20, 2013

Just a taste of how stupid this country looks now.

By today's standards, none of us was supposed to ever make it.

HIGH SCHOOL -- 1958 vs. 2013

Scenario 1:

Jack goes quail hunting before school and then pulls into the school parking lot with his shotgun in his truck's gun rack..

1958 - Vice Principal comes over, looks at Jack's shotgun, goes to his car and gets his shotgun to show Jack.

2013 - School goes into lock down, FBI called, Jack hauled off to jail and never sees his truck or gun again. Counselors called in for traumatized students and teachers.

Scenario 2:

Johnny and Mark get into a fist fight after school.

1958 - Crowd gathers. Mark wins. Johnny and Mark shake hands and end up buddies.

2013 - Police called and SWAT team arrives -- they arrest both Johnny and Mark. They are both charged with assault and both expelled even though Johnny started it.

Scenario 3:

Jeffrey will not be still in class, he disrupts other students.

1958 - Jeffrey sent to the Principal's office and given a good paddling by the Principal. He then returns to class, sits still and does not disrupt class again.

2013 - Jeffrey is given huge doses of Ritalin. He becomes a zombie. He is then tested for ADD. The family gets extra money (SSI) from the government because Jeffrey has a disability.

Scenario 4:

Billy breaks a window in his neighbor's car and his Dad gives him a whipping with his belt.

1958 - Billy is more careful next time, grows up normal, goes to college and becomes a successful businessman..

2013 - Billy's dad is arrested for child abuse, Billy is removed to foster care and joins a gang. The state psychologist is told by Billy's sister that she remembers being abused herself and their dad goes to prison. Billy's mom has an affair with the psychologist.

Scenario 5:

Mark gets a headache and takes some aspirin to school.

1958 - Mark shares his aspirin with a friend who also has a headache.

2013 - The police are called and Mark is expelled from school for drug violations. His car is then searched for drugs and weapons.

Scenario 6:

Pedro fails high school English.

1958 - Pedro goes to summer school, passes English and goes to college.

2013 - Pedro's cause is taken up by state. Newspaper articles appear nationally explaining that teaching English as a requirement for graduation is racist. ACLU files class action lawsuit against the state school system and Pedro's English teacher. English is then banned from core curriculum. 

Pedro is given his diploma anyway but ends up mowing lawns for a living because he cannot speak English.

Scenario 7:

Johnny takes apart leftover firecrackers from the Fourth of July, puts them in a model airplane paint bottle and blows up a red ant bed.

1958 - Ants die.

2013 - ATF, Homeland Security and the FBI are all called. Johnny is charged with domestic terrorism.

The FBI investigates his parents - and all siblings are removed from their home and all computers are confiscated. Johnny's dad is placed on a terror watch list and is never allowed to fly again.

Scenario 8:

Johnny falls while running during recess and scrapes his knee. He is found crying by his teacher, Mary. Mary hugs him to comfort him.

1958 -In a short time, Johnny feels better and goes on playing.

2013 - Mary is accused of being a sexual predator and loses her job. She faces 3 years in State Prison. Johnny undergoes 5 years of therapy.

You should SHARE this, to show how stupid we have become in the last 50 years or so!

Liberals are trying to stop men from looking at women

Lick Dick in 72 Anti Nixon Political Campaign Button

Lick Dick in 72 Anti Nixon Political Campaign Button

Monday, December 9, 2013

And Don't be fooled by Gwen Graham. She is an Obama Democrat

Gwen Graham Discusses Her Father, Obamacare #FL02 | The Candidate
Graham is running for Congress. (Courtesy Gwen Graham for Congress)

If you are elected (Question to Gwen Graham), and there is a vote to repeal the health care overhaul law, how would you vote?
First of all, I don’t think that’s going to happen. I think that Congressman Southerland has been focused on repealing Obamacare. It is the law now, and I think this is what people are tired of, of the partisan bickering. My focus will be on working to improve the law for the people of the 2nd Congressional District. And there will be modifications that will need to be made and that’s what my focus will be.

That interview was in May 2013.  Funny now Graham opposes Obamacare.  Which is it?  Fair weathered fan?  No Bill Nelson Flip-flopper extraordinaire.  Just like Daddy Bob.  Go back to government administration and be a good little puppet Gwen.

Don’t Be Fooled: Alex Sink Is An Obama Democrat

FROM AMERICA RISING PAC  Last Friday, at a candidate forum, Democrat candidate Alex Sink proclaimed: “Now, there’s been a lot of talk about the Affordable Care Act. The rollout has been a disaster. The administration has failed us.”
However, just over a year ago, Alex Sink was saying it was “really important” to re-elect President Obama:
Let it be clear: Alex Sink supports Barack Obama’s policies.

The Pre-Emptive War on Hillary Clinton

Crushed in the 2012 ground and data game, the GOP has learned its lesson—and is knee deep in Clinton oppo-research. From health care to the Hillary films, it’s already working.
Smack dab in the middle of this jolly holiday season, Republican National Committee chairman Reince Priebus set political tongues wagging when he told radio bomb-thrower Hugh Hewitt that the party’s oppo-research machine is already combing through the metaphorical trash of a certain blond Democratic presidential possible. (Hint: It’s not Elizabeth Warren.)

Tuesday, December 3, 2013

Former federal prosecutor claims new case against Obamacare ‘a slam dunk’

Daily Caller News Foundation Former federal prosecutor claims new case against Obamacare ‘a slam dunk’ Read more:

Monday, November 25, 2013

Sunday, November 24, 2013

Don't Tread on Me: The Second Amendment: An American Tradition

Self Shot of my very beautiful Girlfriend

Good old Patriot Act: You’re Much More Likely to Be Killed By Lightning than by a Terrorist

The U.S. Department of State reports that only 17 U.S. citizens were killed worldwide as a result of terrorism in 2011. That figure includes deaths in Afghanistan, Iraq and all other theaters of war.
In contrast, the American agency which tracks health-related issues – the U.S. Centers for Disease Control – rounds up the most prevalent causes of death in the United States:
Comparing the CDC numbers to terrorism deaths means:
– You are 35,079 times more likely to die from heart disease than from a terrorist attack
– You are 33,842 times more likely to die from cancer than from a terrorist attack
(Keep in mind when reading this entire piece that we are consistently and substantially understating the risk of other causes of death as compared to terrorism, because we are comparing deaths from various causes within the United States against deaths from terrorism worldwide.)

Why The President Could Not Explain That People Had To Lose Their Plans. Because That Would Be “Redistribution”

Why The President Could Not Explain That People Had To Lose Their Plans. Because That Would Be “Redistribution”

Why NSA’s Bulk Data Seizures Are Illegal and Unconstitutional

October 21, 2013
Randy E. BarnettJim Harper
Why NSA’s Bulk Data Seizures Are
Illegal and Unconstitutional
Randy E. Barnett* & Jim Harper**
The National Security Agency’s (“NSA”) data collection program, designed and built to collect information about every American’s telephone calls, stands on weak statutory footing and raises grave concerns under the Fourth and Fifth Amendments. If Congress does not revisit these programs, the courts should invalidate them.


On November 8, Representative Trent Franks (R-AZ) and thirty-nine other Republican members of the House of Representatives filed a "friend of the court" brief in support of a legal challenge to the Affordable Care Act ("Obamacare") based on the Origination Clause that will be heard by the District of Columbia Federal Court of Appeals in early 2014.

The case, Sissel v United States Department of Health and Human Services, was filed in the Washington, D.C. District Federal Court by the Pacific Legal Foundation on behalf of Matt Sissel, an Iraq war veteran who lives in Iowa, where he owns a small business, on July 26, 2010.
The Origination Clause of the Constitution, Article 1, Section 7, Clause 1 states "All Bills for raising Revenue shall originate in the House of Representatives; but the Senate may propose or concur with Amendments as on other Bills." Not a word of the Affordable Care Act originated in the House of Representatives. Instead, using a legislative trick, Senate Majority Leader Harry Reid (D-NV) took an innocuous bill that had passed the House unanimously on October 8, 2009 by a 416-0 vote, the Service Members Home Ownership Tax Act of 2009, removed every word of its text following the first sentence, and replaced it with the Affordable Care Act language.

Whenever Margin Debt Goes Over 2.25% of GDP The Stock Market Always Crashes

What do 1929, 2000 and 2007 all have in common?  Those were all years in which we saw a dramatic spike in margin debt. 

NEW YORK, NY - Designer Vera Wang and Coty CEO Michele Scannavini stand amoungst a sea of traders at the New York Stock Exchange Coty goes public on the New York Stock Exchange on June 13, 2013 in New York City. Global beauty company Coty made its public debut today. (Photo by Jemal Countess/Getty Images)
NEW YORK, NY – Designer Vera Wang and Coty CEO Michele Scannavini stand amoungst a sea of traders at the New York Stock Exchange Coty goes public on the New York Stock Exchange on June 13, 2013 in New York City. Global beauty company Coty made its public debut today. (Photo by Jemal Countess/Getty Images)
In all three instances, investors became highly leveraged in order to “take advantage” of a soaring stock market.  But of course we all know what happened each time.  The spike in margin debt was rapidly followed by a horrifying stock market crash.  Well guess what?  It is happening again.  In April (the last month we have a number for), margin debt rose to an all-time high of more than 384 billion dollars.  The previous high was 381 billion dollars which occurred back in July 2007.  Margin debt is about 29 percent higher than it was a year ago, and the S&P 500 has risen by more than 20 percent since last fall.  The stock market just continues to rise even though the underlying economic fundamentals continue to get worse.  So should we be alarmed?  Is the stock market bubble going to burst at some point?  Well, if history is any indication we are in big trouble.  In the past, whenever margin debt has gone over 2.25% of GDP the stock market has crashed.  That certainly does not mean that the market is going to crash this week, but it is a major red flag.

Saturday, November 23, 2013

Online Anonymity in a Box, for $49

Tor, a privacy tool used by activists, criminals, and U.S. intelligence to obscure traces of their online activities, is being repackaged for the mass market. A $49 device launched today and targeted at consumers makes it relatively easy to route a home Internet connection through the Tor network. The Safeplug, as the device is called, can also block most online ads.
“It’s meant to be a mass-market product,” says Jed Putterman, chief product officer of PogoPlug, the company that developed the Safeplug and whose main business is providing cloud storage and backup for home use. “We wanted to make a family-friendly way to get the protection Tor offers.”
The most straightforward way of using Tor today involves downloading a bundle of software, including a new Web browser, onto each device a person wants to use anonymously. The Safeplug, in contrast, is a small box that is simply plugged into a home Internet router to allow any Internet-connected device to make use of Tor. The Safeplug acts as a proxy server, meaning that computers on the same network use it as a go-between to access the Internet. The device also has a built-in advertising blocker, which is disabled by default.


Related Posts Plugin for WordPress, Blogger...