Comments Subscribe to Personal Liberty News Feed Subscribe to Personal Liberty

Hacking, And The Truth About The Cyberwar

June 15, 2011 by  

Hacking, And The Truth About The Cyberwar

Hackers are getting a lot of press lately for using their skills to effect change (or wreak havoc) on a global scale. High-profile cyberattacks on Sony, Nintendo, the Public Broadcasting Service (PBS), Google, the United States Senate and the International Monetary Fund (to name a few) have started a cybersecurity panic. Governments across the globe are calling for international Internet-control measures.

“While some civil liberties campaigners fear giving governments greater control of the Internet would undermine privacy, others say that same privacy is already being undermined by both criminal and state-linked hackers,” read a article.

But not all hackers are alike.

Anonymous, perhaps the most well-known hacktivist collective, spends most of its time engaging in international cyberwarfare with governments. For example, on Friday Anonymous announced that it had successfully taken down several government websites in Turkey in retaliation for that government’s plans to institute an Internet browsing filter. Anonymous despises censorship.

Anonymous has also helped foment rebellion in the Middle East by spreading the word about government corruption and providing safe havens for rebels online. The group is reportedly planning an operation against Bashar al-Assad and the Syrian regime. One could argue that Anonymous’ support of WikiLeaks has kept the site going, and its editor in chief, Julian Assange, is a hacker himself.

The Federal government says these are the bad guys, by the way.

It’s true not all hacker groups are trying to save the world. LulzSec, for example, has claimed responsibility for the Sony, Nintendo, PBS and Senate hacks mentioned above, among others. And Russia and China are both reportedly at the forefront of military-led cyberwarfare.

“In the view of Mike McConnell, a former spy chief, the effects of full-blown cyberwar are much like nuclear attack. Cyberwar has already started, he says, ‘and we are losing it,’” read an article in The Economist.

And there’s the key. Governments across the world are all telling their citizens the same thing: “We are losing the cyberwar.” To what end?

“The Western power elites have three main thrusts in our humble view to pursue. 1. They have an evident urgent need to continue their lunge toward world government. 2. They have to create war and chaos to do so. (Out of chaos, order.) 3. And finally, they have to ameliorate the damage that is being done to their plans by the Internet,” read an article on

“An Internet false flag within this context would be a kind of masterstroke.”

Has the Internet suddenly become a much scarier place? Or do governments across the globe want us to think the Internet is scary, in an attempt to gain further control over its content? Or is it much, much worse?

The Pentagon will treat cyberattacks from foreign nations as acts of war and may choose to respond, not in cyberspace, but in a coordinated military strike.

With one attack, hacktivists can deprive you of your Internet service. With one attack, the Pentagon can start World War III.

And who are the bad guys?

Bob Livingston

is an ultra-conservative American and author of The Bob Livingston Letter™, founded in 1969. Bob has devoted much of his life to research and the quest for truth on a variety of subjects. Bob specializes in health issues such as nutritional supplements and alternatives to drugs, as well as issues of privacy (both personal and financial), asset protection and the preservation of freedom.

Facebook Conversations

Join the Discussion:
View Comments to “Hacking, And The Truth About The Cyberwar”

Comment Policy: We encourage an open discussion with a wide range of viewpoints, even extreme ones, but we will not tolerate racism, profanity or slanderous comments toward the author(s) or comment participants. Make your case passionately, but civilly. Please don't stoop to name calling. We use filters for spam protection. If your comment does not appear, it is likely because it violates the above policy or contains links or language typical of spam. We reserve the right to remove comments at our discretion.

Is there news related to personal liberty happening in your area? Contact us at

  • TIME

    Interesting blog Bob.

    • lkar

      If I understand Bob’s blog, he is wondering why people are “scared” of the internet. I guess if I were a Wiener, this should scare me as it could lead to my resignation (hope, hope). The internet is what you put into it.
      On the one hand, we have a mindless society that thrives on electronic socializing. So the media hype easily scares these people as they live their lives on the internet. On the other hand, I use it for information and news to share with real live people when we get together.
      Now I understand the concern for sensitive information like banking and security. But I think the real scare is the government control that can lead to corruption (think tracking you and your web viewing habits). With this control, one group can impose their will (and ultimately their thoughts , think 1984) onto individuals.
      I see it like this, anyone wanting to hack my information and accounts will see that I do not have any money, I got a bunch of old junky stuff, and I work hard to get by. Not much they can take. But if the government can monitor me and turn off my freedom to make my own informed choices, then I have really lost something.

      • Random in Texas

        While I agree with you with regard to government monitoring, you should not be so quick to dismiss the threat to your personal life by anonymous hackers. True, they could care less about you as an individual, but then again so does a mugger. A mugger probably isn’t going to get much from you either but that doesn’t stop them from taking what you have and beating the heck out of you at the same time just for fun.

        Hackers are the same way. You are just an IP address to them. If they steal your credit card accounts or your identity, perhaps they won’t get rich – but you won’t enjoy the experience either; trust me. And you won’t enjoy the experiece of the SWAT team busting out your windows at three in the morning, holding you at gunpoint, and confiscating all your computers much either. Why would they do so? Maybe its the child porn site you are hosting on your system. Didn’t know you had a porn site? Well, that hacker who doesn’t know you from Adam found your IP and decided that all that drive space and that nifty high speed connection that you never turn off was a real nifty place to serve his wares from. Now try proving to the authorities that you didn’t know it was there. And even if you can, try putting your life back in order. Or maybe it isn’t a porn site. Maybe you have just turned into a spambot. Is your connection suddenly slower than normal? Does your drive light blink all the time?

        This is not a trivial thing. And the more reliant we become on our computer systems, the less trivial it becomes.

    • FreedomFighter

      All internet traffic can be tracked, and global position determined.

      Let the NSA or CIA or some other Black OPs teams start extermination of the offenders-safe haven idea will die with them. Or get them to work for us, either way is good for the USA.

      Laus Deo
      Semper Fi

  • Dan

    All this attention to cyberwars and hacking is only give the government complete control over the internet, which is what they want. Remember “Net Neutrality”? Remember the “Internet Kill Switch” the government wants? They have seen what the internet can do in a rebellious country and want to avoid that at all costs in the US.

    • DaveH

      This period of time in my life reminds me of a football game where the opposing team is on the one-yard line. All other subtle strategies are abandoned for that one final push.
      Obama is pulling out all the stops for that final push to take what Freedom we have left. It’s a risky gambit which might have worked much better before we had access to such instant communications. Government needs to end that to achieve their goal.
      Do Not Let Them Get Control of our Internet!

    • Jean

      You bet,it is all all about power and control. Most of the media keeps you in the dark about the truth. The Internet on the other hand lets you sort out the truth. With the control over the Internet, what a way to control what the controllers want you to know. And the truth is not on the agenda.

      • Bob Marshall

        Jean You are so right. Sites and vidoes i used to be able to find on the internet are gone. Even youtube and goggle. There has to be a reason the government doesn’t want the public to know the truth.

        • Kate8

          It’s amazing how, every time the government is ready to take over something, a big problem suddenly arises where they must step in and control it. For our safety, of course.

          I was listening to an ex-FBI agent awhile back, and he said that by the time we learn of something the government “pleans to do”, it’s already been in place for several years.

  • Thor

    Let the truth be told thought the heavens fall.

    • Thor

      Minus the ‘t’ of course.

  • DaveH

    Government doesn’t need to “control” the Internet to stop evil hackers, they need merely to establish laws to punish those caught. They want to “control” the Internet for one thing only — Censorship. How can they retain their evil power when people can learn their dirty deeds so rapidly through the Internet.
    As far as wars go, keep this in mind:
    If you allow your Government to train a military force to Kill on Command and intrude on sovereign countries’ business around the world, don’t be “shocked and awed” when they use that force against you.

    • BrotherPatriot

      A Government strong enough to give you everything…is strong enough to take it ALL away.

      Fiscal responcibility, smaller government & a free market.

      We REALLY should fire all of the polititions & congress and then just start over. Appoint new rep’s (most likely those who have honorably served in the military) who have a proven history of loyalty to America & to the Constitution with no affiliatin to the Masonic Agenda.

      If we did that…it would sure solve many of our problems.

      Yol Bolsun & God Bless.

      P.S. Oh, and don’t forget the investigation & prosecution of those criminals involved…such as George Soros, Obama, Bilderberg cronies, Skull & Bonesmen who have been slowly destroying the sovereignity of this once great Nation. Their Vast wealth could then go towards repairing all the damage done.

      • Kate8

        BrotherPatriot – I’m all for it. How do we start?

  • 45caliber

    So far I can’t really tell that hackers are doing anything that is causing any real problems for the individuals. All the complaints I’ve seen is that the hackers are getting into private stuff that could embarrass or stop plans that harm only a few rich and “elites”. So why should I worry about it? To be honest, I believe that any interferance to those people is good for the rest of us in most cases. Sure, they try to scare us by insisting that some hackers “might” start WWIII but the more I hear about it the more I tend to be skeptical. I think that they are really more concerned about some politician getting embarrassed and being forced to resign from office.

    • DaveH

      Evil rulers everywhere are afraid of suffering Tunisia’s fate.

    • independant thinker

      “So far I can’t really tell that hackers are doing anything that is causing any real problems for the individuals.”

      45 you must have missed the reports of hacking into the banks, retailers, etc. and getting access to the individual customer account information. I know this is not directly hacking the individuals computer having access to that information is still used for neferious purposes by some of the hackers.

      • DaveH

        There are already laws against that sort of behavior. The Government doesn’t need to regulate (control) the Internet to punish them.

  • Dan az

    All it would take for marshal law would be hackers to take out the grid.Our own guvmnt used a virus to stop Iran from completing there goal of refining uranium.What makes you think that they wont hack the grid to accomplish there goal here? What scares me is that we have kids out there that can start world war 111 and not realize that they are even doing it,because of the lack of education from our guvmnt indoctrination camps.Its true that they can cause great destruction within our guvmnt and financial institutes across the world,but in the end we will be left with out the access of the internet.So what do we do?For one thing we need to go back to secure satellites and not put every thing on the internet which can be hacked.Like our financial and military and infrastructure that should be on a designated satellite like it used to be.Why was it changed to begin with?

    • 45caliber


      I suspect our government helped with that Iranian virus but from everything I’ve seen it was an Israeli virus and attack. Not that I don’t think our government wouldn’t have done it – I just believe in giving credit where credit is due. And I think Israel did a good job.

      • Dan az

        I agree 100% what is confusing is that it was russian scientist that worked on their equipment.I have heard that we may have been involved but who knows.

        • 45caliber

          Since the USSR went down there are a lot of Russian scientists who are starving. They don’t really have a weapons program any more and few places there hire scientists. The scientists have to go where they can earn a living. So Iran gets some, Saudi gets some, etc.

  • Raggs

    The fbi has just granted themselves greater powers to search without a warrant… Welcome to the police state.

  • Flynn

    The internet outlaws are circling their wagons to defeat any and all controls on an out-of-control internet media. The internet is essentially a part of the telephone (voice) communications system in most parts of the world, and the telephone system must be controlled; else, there is cayuse out there. Decocracy is impossible amid cayuse.

    • 45caliber


      Did you actually mean Chaos rather than “cayuse”?

      • Dan az

        I think it is,some times I have a problem spelling that one too.

  • Skyskiers


    Click on the link to hear a private investigator explain that Obama is
    using a FAKE social security number from Connecticut.


    This is an article written by an ex IRS investigator..very interesting.

    Trump is correct, Barry Soetoro, AKA Obama is hiding something in his past that is very bad. and it may not be his citizenship. (Trump would not say this if he did not know something and he has the money to get the dirt.) As an IRS tax examiner, one of many former federal jobs, I have seen what it appears Barry Soetoro has done, mostly
    by illegal aliens, attempting to acquire a new identity in the U.S and/or criminals looking to acquire a new ID.

    Barry, AKA Obama, was lawfully adopted by a foreign national, Lolo Soetoro, and Barry’s name was legally changed to “Barry Soetoro”. (Barry’s own admission) Barry Soetoro was also made an official legal Indonesian citizen. (again Barry’s own admission) The adoption would be noted in Barry’s vital statistics record in Hawaii on his original birth certificate.

    OR Lolo Soetoro may have always been Barry’s legal birth father. The public does notknow for sure at this point who Barry’s father really was and Barry himself may not know. Barry was raised as a Muslim in Indonesia and attended a Catholic funded schoolthat permitted all faiths to attend. Barry’s mother dropped him as a dependent for
    some reason, maybe even when Barry was adopted by Lolo Soetoro. His mother’s passport records dropped Barry as a dependent indicating Barry was no longer a legal dependent of his mothers. (The passport records of his mother have been produced showing Barry was no longer a dependent when Barry was permanently residing in Indonesia.)

    Barry went to Hawaii to live with his alleged grand parents after Lolo Soetoro and Barry’s mother divorced. A “certificate of live birth” can have names changed on it including a child’s birth name, and birth parent’s names. Even a modified date of birth
    can be on a “certificate of live birth”. This occurs frequently for adopted children where the birth parent does not want the child to know who they are. The public has no idea
    who Barry’s real birth father is or who Barry’s real birth mother is. (Barry could have been adopted by his mother) The original birth certificate is the only legal vital statistics record of a person’s birth parents, birth location, birth date, etc. I can get a
    “certificate of live birth” for a dead person; I cannot get a birth certificate of a dead person without “Deceased” on it. (I’ve tried)

    There is no evidence Barry Soetoro ever lawfully changed his name to “Barrack Hussein Obama”. There is no proof Barry Soetoro was born with the name “Barrack Hussein Obama”. I’m willing to bet the name”Barrack Hussein Obama” is not present on the real birth certificate as Barry’s birth name or as Barry’s birth father. I have pictures of me with my mother and Jimmy Buffet. that doesn’t make him my father even if I start using the name Jimmy Buffet.

    The public knows Barry Soetoro finished high school in Hawaii as Barry Soetoro and attended Occidental as Barry Soetoro where he did drugs and flunked out of school. After dropping out of Occidental, Barry showed up in New York , homeless and on drugs. (Barry’s own admission) Barry then hooked up with a Pakistani to live with and
    traveled back to Indonesia on his new boyfriend’s dime to renew his Indonesian passport and traveled to Pakistan with him.

    Ask any law enforcement officer in a large city or detective and they will tell you homeless young men on drugs in large cities usually end up as male prostitutes. Barry ended up as a world traveler with a degree. (Not likely) Barry Soetoro returned to New York from Pakistan and began using the fictitious name “Obama” for some reason. (again Barry Soetoro’s own admission) One could only suspect that a person
    addicted to drugs returning from Pakistan to New York , the main route for Afghan heroin into the U.S., maybe Barry had a reason to start using a new name. There are literally over 1 million open warrants on file in New York . maybe Barry is one of them?..

    After spending some time in New York allegedly working under the name “Obama”, It appears Barry used the fictitious name “Barrack Hussein Obama” for the first time to file his federal taxes in Connecticut at a Post Office Box for the purpose of evading
    paying taxes in New York and /or to establish a new identity. (This is a felony with no statute of limitation.)

    When the IRS received Barry Soetoro’s federal tax filing, the IRS could not attach the name Barrack Hussein Obama to the SSI number provided or the address provided. So the IRS assigned the fictitious name “Barrack Hussein Obama” a tax ID number for a person from Connecticut (Where Barry unlawfully filed a federal tax form using a false name). Barry Soetoro began using the tax ID number as his SSI number when using the fictitious name Barrack Obama. This is why Barry Soetoro has a Connecticut SSI number. When I worked for
    the IRS, I saw this occur more than once and yes, it is a felony to knowingly file a fraudulent federal tax forms.

    Most of the politicians that cheat on their taxes claim it was an accident. That is how they get away with their tax cheat crimes. Using a fake name is no accident.

    It appears Barry fled New York to Chicago using his new identity to get a job . He likelyordered a fake diploma to bolster his new identity as “Obama”. Fake Diploma’s were very big in the 80′s and diploma mills were even being used by federal workers to get
    promotions. There is evidence his alleged attendance at Columbia was faked (Barry never attended Columbia ) and Barry lied his way into Harvard (he had no transcripts to get in). Including telling the Saudi royal family he was fighting in Afghanistan with the Muslim Jihad against the Russians, so they would help him get into a law school.

    The Saudi’s apparently loved Barry’s story of Jihad in Pakistan/Afghanistan and paid for Barry to attend Harvard under the name “Obama”. The Saudi family has admitted to paying for Obama to attend Harvard and gave Harvard a gift of $20 million dollars.
    Harvard in turn made their special attendee President of the law review a person that never wrote a single law review..

    I guess that is what $20 million buys at Harvard. It is unlikely Barry was a Jihadist and was most likely a drug mule if anything, maybe even a CIA street hire to haul Afghan heroin back to New York, so the Afghans could buy U.S. made stinger missiles with U.S.
    dollars to shoot down Russian helicopters?. I hired people over seas to do work below my pay grade all the time, even foreign nationals. I think this is the story Barry told the Saudi’s, but he was most likely really just a drug mule/dealer and probably still wanted
    on an outstanding warrant in New York .

    Barry’s selective service registration is not normal either.

    Click on the link for info on Barry’s Selective Service number.

    After I looked at Barry’s selective service filing I noticed it was most likely fraudulent too based on the name he used. Barry did not start using the name “Obama” until he returned from Pakistan (long after he flunked out of school in California ) His selective
    service record (maintained in Chicago coincidentally) shows he registered at a Hawaiian post office as “Obama” in Sept 1980. Problem, Barry was getting high in California at Occidental in Sept 1980 (Barry’s own admission) and was not using the fictitious name “Obama” at that time. Barry began using the fictitious name
    “Obama” only after he returned from Pakistan.

    The selective service filing is fraudulent. NEW NOTE – On the the Selective Service Registration, Barry did not have the Connecticut Tax ID number he used on the Registration until after he began using the name “Obama” in New York . More evidence his Selective Service
    filing is fraudulent.

    Barry returned to Chicago and attended a semi-christian radical black church with his first female love Michelle. Barry admits keeping in touch with Phil Boener, who traveledto New York from Occidental to be with Barry and was most likely Barry’s first love.

    Barry still could not get a real job, because he was still a fraud, even with his Harvard degree in hand he could lie and take the Bar exam, but he could not work as a lawyer for a major law firm without a back ground investigation and he would never pass one. So, Michelle got Barry a job at her law firm. Barry never filed a case alone and never filed a motion. He wrote lots of memos according to the law firm where Barry worked.

    (I think they knew Barry was a fraud and didn’t want to be sued by previous clients)

    Barry rescinded his law licenses, so as not to be disbarred for fraud. The Bar knows Barry lied on his application. Michelle also had to turn over her law license for her involvement in corruption with the Chicago mayors office.

    With time on his hands Barry, a well spoken black man, was able to get elected to a state office, oddly because he looked for fraud in his opponents voter registrations and got his opponent disqualified from running. Barry a well versed liar was a natural in
    state politics. He used his political influence to get himself a position as a lecturer at Chicago ‘s law school. Barry embellished this position as a “professor of law” which everyone knows is completely false. Barry was not a professor or even a specialist at
    anything but lying.

    On a whim Barry ran for United States Senate for the State of Illinois . Politicians do this all the time to make a name for themselves even if they can’t win. At the time the Republican
    Ryan was a shoe in for the Senate seat, so no real Democrat contenders entered the race, but Barry did. On a fluke after the primary Ryan’s wife Jeri Ryan (Seven of nine from Star Trek)
    went public that her husband was making her have sex with other people while he watched. Ryan dropped out and Alan Keys moved from Maryland to run against Barry Soetoro.

    The election got all kinds of press because there were no blacks in the U.S. Senate and one of these black men was going to be a Senator. Alan Keys did his best to warn everyone Barry was not who he claimed to be, but the public saw him as a carpet bagger.

    Barry kept the lie going and presented himself as a clean black man that talked like a white man. Illinois elected Barry to the U.S. Senate. The Democrats had already began scrubbing Barry’s back
    ground when Ryan dropped out. Phil, Barry’s boy friend from Occidental, was found working in California as a communications specialist (receptionist) for a dental hygienist school and given a
    diploma from Columbia and cover story. The rest of Barry’s drug friends were all given jobs or money by the Democrat machine to keep quiet.

    Because Barry was such a news maker as the only Black in the Senate, and he could speak like a white man he was made key speaker for the Democrat convention. Barry then decided to run for President to keep the lie going. No one thought to question Barry’s back ground in the Democratic party. They helped cover up the ugly back ground.
    The only person jumping up and down warning Barry was not who he claimed to be was Alan Keys and he was discarded as just an angry loser.

    Now we have a complete fraud sitting in the Office of the President. Clearly the most corrupt, inexperienced, and ignorant President in the history of the United States who’s only quality is that he can lie with a straight face.

    Barry Soetoro is more of a fraud than Bernie Madoff and we can only hope his house of cards will one day fall down. This is what the main stream media is feeding to the American people as a fine up standing leader who deserves a second term as our President. This needs to be passed around all over the Internet.

    • Dan az

      I have read this one before and have passed it on to my list of people on my email.It was one of the best reports I have read but don’t think they will do anything about it.It will go down in history that wont be taught in schools but as a joke on all of us instead.

    • 45caliber

      I’ve recently heard (true or false, I don’t know) that the Conneticut SS# actually belonged to a man who died many years ago in Hawaii. Barry’s grandmother worked at the SS office when he came to live with her. When the man died, he hadn’t been able to file for SS benefits. The story said that they believed that the grandmother changed the name on the # to his so as to get him a SS# that reflected birth in the US. Since no money had been drawn against it and the man didn’t have heirs no one would pay any attention to the change. Again, true? I don’t know.

    • vicki

      Nice story. You should set up a website (before the government takes them all :) ) with the story and the many links to your supporting evidence.

      Absent that it’s just a nice story and there are lots of MSM resources to convince people that it is just another conspiracy theory.

  • FreedomFighter

    This letter is pertains to the internet and the powergrab/suppression of it by the goverment under Obummer.


    Dear President Obama:

    You are the thirteenth President under whom I have lived and unlike
    any of the others, you truly scare me.

    You scare me because after months of exposure, I know nothing about you.

    You scare me because I do not know how you paid for your expensive
    Ivy League education and your upscale lifestyle and housing with no
    visible signs of support.

    You scare me because you did not spend the formative years of youth
    growing up in America and culturally you are not an American.

    You scare me because you have never run a company or met a payroll.

    You scare me because you have never had military experience, thus
    don’t understand it at its core.

    You scare me because you lack humility and ‘class’, always blaming others.

    You scare me because for over half your life you have aligned
    yourself with radical extremists who hate America and you refuse to
    publicly denounce these radicals who wish to see America fail..

    You scare me because you are a cheerleader for the ‘blame America ‘
    crowd and deliver this message abroad.

    You scare me because you want to change America to a European style
    country where the government sector dominates instead of the private sector.

    You scare me because you want to replace our health care system
    with a government controlled one.

    You scare me because you prefer ‘wind mills’ to responsibly
    capitalizing on our own vast oil, coal and shale reserves.

    You scare me because you want to kill the American capitalist goose
    that lays the golden egg which provides the highest standard of
    living in the world.

    You scare me because you have begun to use ‘extortion’ tactics
    against certain banks and corporations.

    You scare me because your own political party shrinks from
    challenging you on your wild and irresponsible spending proposals.

    You scare me because you will not openly listen to or even consider
    opposing points of view from intelligent people.

    You scare me because you falsely believe that you are both
    omnipotent and omniscient.

    You scare me because the media gives you a free pass on everything
    you do.

    You scare me because you demonize and want to silence the
    Limbaugh’s, Hannity’s, O’Reillys and Becks who offer opposing,
    conservative points of view

    You scare me because you prefer controlling over governing.

    Finally, you scare me because if you serve a second term I will
    probably not feel safe in writing a similar letter in 8 years.

    Lou Pritchett
    This letter was sent to the NY Times but they never acknowledged it.

    • Dan az

      I got that one in an email and passed it on as well.Looks like its still going,hope that it did some good too.

  • Larry Pierson

    Anytime an additional feature is added to the web it allows hackers more opportunity to gain control. Given Barak Obama’s obsessive-compulsive addiction to wanting to control others, ordering ISPs to give him the ability to shut down the web is inevitable.

    Now all the Chicoms have to do is wait until this feature is implemented, figure out how to hack into it, and they can shut our web down any time they desire to do so! Brilliant move, Barak! What a way to leave us wide open to economic, political, military, and social extortion at the hands of our enemies.

    The design of the web is such that it naturally and on its own routes around the very things Obama is trying to fill us full of fear with. We don’t need more government tinkering in it.

    The only thing the web needs upgrading with is a means of identifying and shutting down individual IP addresses that are engaged in denial of service attacks. Given what it costs ISPs to handle these attacks, they are already sufficiently motivated to deal with this problem without the government telling them what to do.

    It is the responsibility of individual IP address owners to secure their computers against hacking. There are numerous free, as well as low cost, firewalls available to protect ones computers. There is no excuse for individuals not to protect themselves. Connecting a computer to the web without a firewall is like leaving the keys in the ignition in the wrong part of town.

    • Dan az

      I agree.You said there were numerous free firewalls out there,Could you supply a site for me that isn’t full of virus’s that I could trust.Thanks.

      • Random in Texas

        If you are concerned about downloading malware from a site offering free firewalls, the choice is simple. Buy one. They aren’t that expensive. And you need one if you are going to be on the internet today. In fact, I would recommend a layered defense. A router between you and the incoming connection from your ISP (routers have buildin hardware firewalls and are configurable by the user), a software firewall on every computer on your internal home network, anti-virus software on each computer, and anti-spyware software on each computer. Some of this can be obtained free if you like. Avast! anti-virus is free, Spybot Search and Destroy anti-spyware is free and both are not bad; much better than no protection at all. Google them and download from the homesite webpages. A good router can be had for under a hundred dollars (much less if you search for a deal online). Wired connections are inherently more secure than wireless; if you run wireless (and most folks do) make sure your security is as good as you can make it. Don’t just go with the defaults out of the box.

  • BigBen

    War Game comes ALIVE!


    Shall we play again, HAL?


  • BigBen



  • Bob Marshall

    They are those not only in government but behind the scenes who would like nothing more than a war with either Iran or China. Why not? It will not be their lives that will be lost.It will not be their sons or daughters. Husbands or wives who will die and be wounded for their purposes.

  • coal miner

    Anyone can be a Hacker!

    ScienceDaily (June 2, 2011) — A study of more than 100 popular web sites used by tens of millions of people has found that three quarters directly leak either private information or users’ unique identifiers to third-party tracking sites. The study, co-authored by Craig Wills, professor of computer science at Worcester Polytechnic Institute (WPI), also demonstrated how the leakage of private information by many sites, including email addresses, physical addresses, and even the configuration of a user’s web browser — so-called browser fingerprints — could permit tracking sites to link many disparate pieces of information, including browsing histories contained in tracking cookies and the contents of searches on health and travel sites, to create detailed profiles of individuals.

    The study, presented last week at the Web 2.0 Security and Privacy conference in Oakland, Calif., concluded that efforts made to date to curb the leakage of personal information from web sites and online social networking suites, including proposals made in a 2010 Federal Trade Commission (FTC) report on protecting consumer privacy, would be largely ineffective in preventing the identified leakage and linkage. They asserted that web sites need to take greater responsibility for privacy protection.

    “Despite a number of proposals and reports put forward by researchers, government agencies, and privacy advocates, the problem of privacy has worsened significantly,” Wills said. “With the growing disconnect between the existing and proposed privacy protection measures and the increasing and increasingly worrisome linkage of personal information from all sorts of web sites, we believe it is time to move beyond what is clearly a losing battle with third-party aggregators and examine what roles first-party sites can play in protecting the privacy of their users.”

    The researchers, who had previously brought attention to the leakage of personal information from many popular social networking sites, decided to explore the handling of private information by conventional web sites, an area that has gone largely unexamined, Wills said. They focused on sites that encourage users to register, since users often share personal and personally identifiable information, including their names, physical address, and email address, during the registration process. They also examined popular health and travel sites, since users conduct searches on these sites that can point to their health issues or reveal their travel plans.

    They found that information is leaked through a number of routes to third-party sites that track users’ browsing behavior for advertisers. In some cases, information was passed deliberately to the third-party sites. In others it was included, either deliberately or inadvertently, as part of routine information exchanges with these sites. Depending on the site, the leakage occurred as users were creating, viewing, editing, or logging into their accounts, or while navigating the web sites. They also observed sensitive search terms (such as pancreatic cancer) being leaked by health sites and travel itineraries being leaked by travel sites.

    The researchers examined the types of information being leaked by the web sites and rated them according to their sensitivity and their ability to identify users. A user’s name, phone number, or email address rated highest on the identifiability scale, for example, while health information and travel itineraries rated highest on the sensitivity scale. While the majority of leaked information rated low on both scales, the authors said this does not necessarily suggest that users need not be concerned about privacy leaks from web sites.

    They noted that third-party tracking sites receive a wide range of information from popular web sites that could be used to connect diverse bits of leaked information and connect them to an individual user’s identity. These include the user ID that a web site assigns to a user (leaked by nearly half of the sites studied), unique identifiers like email addresses or home addresses, and browser fingerprints — information on how an individual browser is configured, including the list of installed plugins, which the authors found is leaked by a number of sites.

    The study also evaluated a range of actions that web users could take to prevent their information from being leaked, including blocking the setting of cookies and using an advertising blocking utility or the blocking features built into the newest versions of some popular browsers. They found that all of these techniques miss some types of leakage; ad blockers, for example, do not reliably block leakage to so-called hidden third-party sites and also impair the usability of some web sites.

    They also reviewed proposals included in a December 2010 report on online privacy release by the FTC. “The report advocates the Privacy by Design initiative, which seeks proactive embedding of privacy at the design stage, defaults to be set to private, transparence about users’ information, and access to all user-related sensitive data stored in aggregators,” the study notes. But even these proposals fail to provide safeguards against the linkage of user information by third-party sites or leakage to hidden third parties, and they do not include methods for either verifying that third-party sites abide by the guidelines or penalizing those that do not.

    “A key failure of the FTC report is that it largely ignores the responsibility of web sites in safeguarding the privacy of their users,” Wills said. “These sites should play a custodial role in protecting their users and preventing the leakage of their sensitive or identifiable information. Third-party sites have a powerful economic incentive to continue to collect and aggregate user information, so relying on them to protect user privacy will continue to be a losing battle. It is time to put the focus on what first-party sites can and should do.”

  • Dan az

    I don’t think that anything will be done because the guvmnt needs our names to pin point serversive that are a threat to them.The patriot act gives them right to spy on all of us and like it or not we are a prime target for them.The last thing they are going to do is interfere with protecting our rights.We have know rights.Its a police state and all of the information gathering by them is far greater worry than some advertising junk.Some day all of this will come back to bite us in some closed room court and we will not be seen of again.

  • Antonio

    I am a systems administrator and i know how to crack(hack) other systems. Hacking computer’s is fun also remote access amongst your friends or family’s computer’s.
    Hacking is not really all that hard to do. It can be complicated when hacking a secure system but a basic system such as your own is relatively easy.
    Information that you should never tell anyone is what type of operating system you have, what is your computers name, and what type antivirus program you use. keep that info to yourself. Hacking requiers the use of viruses and trojans so as to install “backdoors” which allows a hack to enter by passing through the security settings. With that in mind,understand that most hacking is a direct result of a lack of knowledge from the computers own user. Users who clik on any link, download any file, visit any web page are at great risk.
    Most companies that are hacked had someone on the inside giving some info to the hacker, some on purpose, and some by accident. Beware the art of manipulation professional hackers can trick an employee into giving info without relizing what they are doing. To prevent hacking you should get yourself a firewall device (the physical one) close all your ports except for the few that are needed. Note your computer has about 65,500 ports and most of them are open. Buy software that will give you the IP address of the one sending you emails and if a foriegn IP address block it. Be cautious as to the web pages you visit. Check your event logs for supicous activity.
    Remember if you ever get hacked 9 times out of 10 it was your fault.
    Do not put 100% trust in your antivirus program for they only detect olded versions of viruses.

  • BimBam

    So let it be known that if you continue to hack into our computers we will send a missle up your arse.

    I like that. Sending a message to the bad guys from the good guys – the USA Pentagon.

  • TIME

    Folks this I think is going to be how they, the {Political Freaks} get the Net Neutrality act in place.

    MAKE as much noise as you can with your Congress persons, tell them to “keep their bloody hands off OUR INTERNET.” Do this daily!!

    Tell them too; Stop regulating, Stop making laws just to make laws! Stay out of the life of all Citizens and Business. Being an American is not a CRIME! Being a TAX payer is not a CRIME and your damm tired of these SOB’s treating you like your a criminal.

    *** Look let me make this very clear, if the Political Freaks get total control of the Internet, as well then close out the few parts of the 1st Amendment that we still have, and as you all must know Barry is working behind the curtain on the 2nd Amendment.
    People – these are the ONLY two that are still in our court.

    YOU all must Call, FAX, and Email your Congress people no matter what you get back as an answer no matter what party they are in, AND don’t be fooled by thinking they are on your slde, THEY ARE NOT!

    Please wake up people.

    • Dan az

      Good advise Time,Thanks.

  • independant thinker

    There is a short story by Harold
    Coyle called Cyberknights 1 that all should read.

  • coal miner

    Hacking can be dangerous to your political career,ask Wiemer.Ha Ha Ha

    • coal miner

      I meant (WARNING).

      • Random in Texas

        I think you also meant Wiener.

    • Random in Texas

      Actually, Wiener’s problem wasn’t hacking – it was sheer stupidity.


Sign Up For Personal Liberty Digest™!

PL Badge

Welcome to,
America's #1 Source for Libertarian News!

To join our group of freedom-loving individuals and to get alerts as well as late-breaking conservative news from Personal Liberty Digest™...

Privacy PolicyYou can opt out at any time. We protect your information like a mother hen. We will not sell or rent your email address to anyone for any reason.