AIG & Paypal having a bit of Internet trouble?

Reblogged from American Kabuki. Bill says he got this from an ‘anonymous source’.  ;0)  Thanks for sharing, Bill. 

Interesting. And I got a fake email this week that was supposedly from Paypal. It didn’t seem to contain any hyperlinks, however—either that or my security program removed them. It wanted the recipient to download the ‘Update Page’ and follow several steps.

Paypal support assured me several times that my account is safe and secure, said I didn’t need to change my password (I did anyway) and asked me to forward the message to them; that they are shutting down these outfits. Message forwarded to   ~ BP


AIG having a bit of Internet trouble?

Got this from an anonymous source…. AK

Got this from an anonymous source…. -AK

American Kabuki is licensed under a Creative Commons Attribution 4.0 International License.
You may copy, quote, and redistribute this material so long as you do not alter it in any way, and you include this link:




Hacked Email Shows Pentagon’s Involvement in Chemical Attack in Syria

Hacked Email of US Intelligence Colonel Shows Pentagon’s Involvement in Chemical Attack in Syria

See the Source article for screenshots of the emails

The situation in Syria is still in the focus of world media. Experts predict another U.S. aggression for “human rights”. Washington regularly declares its readiness to attack Syria. The official version – to punish al-Assad and Syrian army for the use of chemical weapons against the civilian population.

Meanwhile, the media has spread new proofs of the U.S. intelligence involvement to chemical attack near Damascus. Hacker got access to U.S. intelligence correspondence and published U.S. Army Col. ANTHONY J. MACDONALD’s mail. Macdonald is General Staff Director, Operations and Plans Office of the Deputy Chief of Staff for Intelligence the Army Staff. It’s about chemical attack in Syria.

In the message August 22 Eugene Furst congratulates Col. on successful operation and refers him to Wasington Post publication about chemical attack in Syria. From the Anthony’s wife dialog with her friend it’s clear the video with the children killed in the chemical attack near Damascus was staged by U.S. Intelligence.

This is a huge coup for the people.  This proves that the chemical attack was indeed a false flag operation.  Thank you hackers and hacktivists for this.  You are what the media should be, you are an affront to government, you keep them in check.  You are the new journalists.  Journalists of the 21st century.  More to this story as it becomes available. Im blown away..  -Mort

‘New York Times’ Outage Traced to Phishing Email to Melbourne IT Partner

The New York Times Headquarters Ahead Of Earns Figures

This happened yesterday, August 27th. At least with cyber-crime no one gets killed. They’re sending a distinct message when they hit all these lamestream media outlets. I like it when anyone aiding the cabal gets a little nudge from the good guys as a reality check so they know who’s REALLY in charge.

Melbourne IT, an Australian firm that allows website owners to buy addresses such as, said the downtime suffered by the New York Times website Tuesday began when hackers gained access to the user name and password of one of the company’s sales partners.

Using those reseller’s credentials, hackers changed the records that tell computers around the world from where to download web pages when someone types into an Internet browser.

[Updated, 8:27 a.m. Aug. 28: The U.S.-based sales partner’s credentials ended up in the hackers’ hands after a targeted phishing attack was directed at the firm’s staff, Melbourne IT Chief Technology Officer Bruce Tonkin said early Wednesday. Essentially, several people at the U.S. firm were duped by emails that coaxed them into giving up log-in credentials.

“We have obtained a copy of the phishing email and have notified the recipients of the phishing email to update their passwords,” Tonkin said in an email. “We have also temporarily suspended access to affected user accounts until passwords have been changed.”]

Late Tuesday, Melbourne IT spokesman Tony Smith said said the company was reviewing how to improve security.

“We are currently reviewing our logs to see if we can obtain information on the identity of the party that has used the reseller credentials, and we will share this information with the reseller and any relevant law enforcement bodies,” he added.

Smith recommended that “for mission critical (domain) names,” domain-name owners use additional security features available from domain name registries that cost money but limit changes that can be made without extra authorization.

“Some of the domain names targeted on the reseller account had these lock features active and were thus not affected,” Smith said.

The hacking group also appeared to have tried to redirect visitors of some Twitter services and Huffington Post U.K., but they didn’t suffer easily visible outages.

Marc Frons, chief information officer for the New York Times Co., told the newspaper that he attributed the breach to “the Syrian Electronic Army or someone trying very hard to be them.” He warned company employees to refrain from sending sensitive email messages because the records changes made by the hackers could have allowed them to hijack emails.

The Syrian group did not immediately offer a reason for Tuesday’s attack, but it came as the White House debated how to respond to clear indications that the Syrian government launched a chemical attack on its civilians. Cybersecurity analysts said the incident highlighted the fact that every war will now have an online component.

“Website defacements … are more about image and propaganda than anything else, but the ubiquity of the World Wide Web and the amplification power of computer networks guarantee that information operations are more important than ever,” said Kenneth Geers, senior global threat analyst for the cybersecurity firm FireEye. He called the attack “a propaganda coup” for the Syrian Electronic Army that at least brought the hacking group free advertising.

Hackers have long defaced popular websites to direct attention to issues they consider important, but the number and intensity of the attacks continue to grow. The websites of the Washington Post, Financial Times, CNN and Time magazine have also been affected in recent months.

The website was down for more than six hours. In the meantime, visitors saw either error messages or web pages created by the Syrian Electronic Army. The New York Times was able to get the redirection blocked by working with other Internet service providers. The company that hosts the website of the Syrian Electronic Army, for example, suspended the account.

Experts say these kind of disruptions are expected to continue.

“As long as media organizations play a critical role as influencers and critics, they will continue to be targets of cyber-attacks,” said Michael Fey, chief technology officer for computer security giant McAfee.

As news organizations have improved their own computer security, hackers have looked for weak spots at outside services the companies use.

Security analysts said other hackers, driven primarily by a desire to make money, may have used the sort of power they held while inside Melbourne IT’s systems to send visitors to websites laden with computer viruses.

“It’s what they could have done that really scares me,” said HD Moore, chief research officer for cyber security firm Rapid7.

The New York Times suffered an hour long outage earlier this month but attributed it to “technical difficulties” during a routine morning maintenance operation.

How Laura Poitras Helped Snowden Spill His Secrets

Thanks to the CE-5 Initiative on Facebook for the heads up.

This story is really well done. I think you’ll enjoy it. Until The Event, it will probably be the biggest story of the year and instrumental in waking up the general public to the appalling breach of citizen privacy on the part of the U.S. shadow government.

This past January, Laura Poitras received a curious e-mail from an anonymous stranger requesting her public encryption key. For almost two years, Poitras had been working on a documentary about surveillance, and she occasionally received queries from strangers. She replied to this one and sent her public key — allowing him or her to send an encrypted e-mail that only Poitras could open, with her private key — but she didn’t think much would come of it.

The stranger responded with instructions for creating an even more secure system to protect their exchanges. Promising sensitive information, the stranger told Poitras to select long pass phrases that could withstand a brute-force attack by networked computers. “Assume that your adversary is capable of a trillion guesses per second,” the stranger wrote.

Before long, Poitras received an encrypted message that outlined a number of secret surveillance programs run by the government. She had heard of one of them but not the others. After describing each program, the stranger wrote some version of the phrase, “This I can prove.”

Seconds after she decrypted and read the e-mail, Poitras disconnected from the Internet and removed the message from her computer. “I thought, O.K., if this is true, my life just changed,” she told me last month. “It was staggering, what he claimed to know and be able to provide. I just knew that I had to change everything.”

Poitras remained wary of whoever it was she was communicating with. She worried especially that a government agent might be trying to trick her into disclosing information about the people she interviewed for her documentary, including Julian Assange, the editor of WikiLeaks. “I called him out,” Poitras recalled. “I said either you have this information and you are taking huge risks or you are trying to entrap me and the people I know, or you’re crazy.”

The answers were reassuring but not definitive. Poitras did not know the stranger’s name, sex, age or employer (C.I.A.? N.S.A.? Pentagon?). In early June, she finally got the answers. Along with her reporting partner, Glenn Greenwald, a former lawyer and a columnist for The Guardian, Poitras flew to Hong Kong and met the N.S.A. contractor Edward J. Snowden, who gave them thousands of classified documents, setting off a major controversy over the extent and legality of government surveillance. Poitras was right that, among other things, her life would never be the same.

Greenwald lives and works in a house surrounded by tropical foliage in a remote area of Rio de Janeiro. He shares the home with his Brazilian partner and their 10 dogs and one cat, and the place has the feel of a low-key fraternity that has been dropped down in the jungle. The kitchen clock is off by hours, but no one notices; dishes tend to pile up in the sink; the living room contains a table and a couch and a large TV, an Xbox console and a box of poker chips and not much else. The refrigerator is not always filled with fresh vegetables. A family of monkeys occasionally raids the banana trees in the backyard and engages in shrieking battles with the dogs.

Glenn Greenwald, a writer for The Guardian, at home in Rio de Janeiro.
Mauricio Lima for The New York Times

Glenn Greenwald, a writer for The Guardian, at home in Rio de Janeiro.

Greenwald does most of his work on a shaded porch, usually dressed in a T-shirt, surfer shorts and flip-flops. Over the four days I spent there, he was in perpetual motion, speaking on the phone in Portuguese and English, rushing out the door to be interviewed in the city below, answering calls and e-mails from people seeking information about Snowden, tweeting to his 225,000 followers (and conducting intense arguments with a number of them), then sitting down to write more N.S.A. articles for The Guardian, all while pleading with his dogs to stay quiet. During one especially fever-pitched moment, he hollered, “Shut up, everyone,” but they didn’t seem to care.

Amid the chaos, Poitras, an intense-looking woman of 49, sat in a spare bedroom or at the table in the living room, working in concentrated silence in front of her multiple computers. Once in a while she would walk over to the porch to talk with Greenwald about the article he was working on, or he would sometimes stop what he was doing to look at the latest version of a new video she was editing about Snowden. They would talk intensely — Greenwald far louder and more rapid-fire than Poitras — and occasionally break out laughing at some shared joke or absurd memory. The Snowden story, they both said, was a battle they were waging together, a fight against powers of surveillance that they both believe are a threat to fundamental American liberties.

Visit the Source page to read the rest of this article…

RT: Encrypted email service used by Snowden mysteriously shuts down

2012: What's the 'real' truth?

Published time: August 08, 2013 21:00
Edited time: August 08, 2013 23:08

The highly encrypted email service reportedly used by NSA leaker Edward Snowden has gone offline – and its administrator claims the company is legally barred from explaining why.

On Thursday, the homepage of was changed to a letter from the company’s owner announcing that the site’s operations have ceased following a six-week long ordeal that has prompted the company to take legal action in the Fourth Circuit Court of Appeals.

Now in the midst of an escalating fight from the federal government aimed at cracking down on encrypted communications, one of the last free and secure services has thrown in the towel under mysterious circumstances.

I have been forced to make a difficult decision: to become complicit in crimes against the American people or walk away from nearly ten years of…

View original post 1,162 more words

Activists Targeted in Child Porn Set-Up [video]

This is a perfect example of why we don’t want anyone having access to our computers, passwords, bank accounts, phone records, cars, SSN, or anything else.

When hacking or remote access is enabled in any number of ways, innocent people can be brutally attacked, and with the new executive orders, NDAA bill and blatant lawlessness rampant these days—tossed in jail without phone calls, legal representation, warrants or fair judicial oversight.

Innocent people, like activists and journalists who share the truth are labeled dissidents and either terrorized, threatened, their families threatened or killed, or worse—tortured.

We don’t know who these rogue entities are who perpetrate these attacks, but they most certainly are happening.

The clincher is, we can’t prove who does what in these sting operations—and they know it.

In this video they discuss the set-up of political activists Stewart Rhodes and Dan Johnson, how it was done—technologically speaking—and how to avoid it happening to us, as much as that may be possible.

See the StormCloudsGathering web site for more.

WikiLeaks Founder Julian Assange Releases US Data from Knightsbridge Embassy Building

Julian Assange will appear at the London building. File picture: Lewis Whyld/PA WireThis sounds like big, important leaks. I guess Julian’s not been just lolling on the sofa watching the telly while “captive” at the Ecuadorian embassy. Nice work! Hopefully he’ll soon be free to walk the Earth without the Illuminati after him.

Whistleblowing website WikiLeaks – whose founder is holed up in diplomatic buildings in west London – today published more than 1.7 million United States records covering diplomatic or intelligence reports on every country in the world.

Much of the work was carried out by Julian Assange during his time in the Ecuadorian Embassy in Knightsbridge, where he has been staying since last summer.

He sought refuge at the embassy last June over fears that he would be sent to the United States if he was extradited to Sweden to face sexual offence claims by two women – charges he denies.

The Ecuadorian Government has granted Mr Assange political asylum and has repeatedly offered Swedish prosecutors the chance to interview the Australian at the embassy, which is based in London’s Knightsbridge area.

The data released today comprises more than 1.7 million US diplomatic records from the beginning of 1973 to the end of 1976, covering a variety of diplomatic traffic including cables, intelligence reports and congressional correspondence.

WikiLeaks has called the collection the Public Library of US Diplomacy (PlusD), describing it as the world’s largest searchable collection of US confidential, or formerly confidential, diplomatic communications.

Mr Assange told the Press Association that the information showed the “vast range and scope” of US diplomatic and intelligence activity around the world.

Henry Kissinger was US Secretary of State and National Security Adviser during the period covered by the collection, and many of the reports were written by him, or were sent to him.

Thousands of the documents are marked NODIS (no distribution) or Eyes Only, as well as cables originally classed as secret or confidential.

Mr Assange said WikiLeaks had undertaken a detailed analysis of the communications, adding that the information eclipsed Cablegate, a set of more than 250,000 US diplomatic cables published by WikiLeaks from November 2010 and over the following year.

These documents were released after being anonymously leaked, detailing US foreign policy over the last decade.

The collection published today has not been leaked, but Mr Assange said WikiLeaks had been working for the past year to analyse and assess a vast amount of data held at the US national archives before releasing it in a searchable form.

Mr Assange said WikiLeaks had developed sophisticated technical systems to deal with “complex and voluminous” data.

Top secret documents were not available, while some others were lost or irreversibly corrupted for periods including December 1975 and March and June 1976, said Mr Assange.

He added that his mother, who lives in Australia, had told him he was being kept at the embassy “with nothing to do but work on WikiLeaks material”.