bothernews

Archive for the ‘Business’ Category

MOOD MODIFICATION WITH ELF MAGNETIC FIELDS – Robert C Beck, 1978

leave a comment »

Download the paper here:  beck-article-mood-modification-with-elf

Advertisements

Saudi Corruption Sweep and Paradise Papers – Nov 4th & 5th, 2017

leave a comment »

From:  New York Times

 

LONDON — Saudi Arabia announced the arrest on Saturday night of the prominent billionaire investor Prince Alwaleed bin Talal, plus at least 10 other princes, four ministers and tens of former ministers.

The announcement of the arrests was made over Al Arabiya, the Saudi-owned satellite network whose broadcasts are officially approved. Prince Alwaleed’s arrest is sure to send shock waves both through the kingdom and the world’s major financial centers.

From:  The Guardian

The world’s biggest businesses, heads of state and global figures in politics, entertainment and sport who have sheltered their wealth in secretive tax havens are being revealed this week in a major new investigation into Britain’s offshore empires.
The details come from a leak of 13.4m files that expose the global environments in which tax abuses can thrive – and the complex and seemingly artificial ways the wealthiest corporations can legally protect their wealth.

The material, which has come from two offshore service providers and the company registries of 19 tax havens, was obtained by the German newspaper Süddeutsche Zeitung and shared by the International Consortium of Investigative Journalists with partners including the Guardian, the BBC and the New York Times.

The project has been called the Paradise Papers

Scientists discover that our brain waves can be sent by electrical fields – ScienceAlert

with 2 comments

PETER DOCKRILL

15 JAN 2016

“The implications are that such directed fields can be used to modulate both pathological activities, such as seizures, and to interact with cognitive rhythms that help regulate a variety of processes in the brain.”

The results indicate that electric fields (ephaptic effects) are capable of mediating propagation of self-regenerating neural waves,” they write. “This novel mechanism coupling cell-by-volume conduction could be involved in other types of propagating neural signals, such as slow-wave sleep, sharp hippocampal waves, theta waves, or seizures.”

If their findings, which are reported in The Journal of Neuroscience, can be expounded in further studies, it could help us to better understand how brain waves are associated with things like memory, epilepsy, and healthy physiology.

Source URL:   http://www.sciencealert.com/scientists-discover-new-method-of-brain-wave-transmission-electrical-fields

Lest We Forget: The NSA already has backdoor access to your iPhone

leave a comment »

Amidst current attention on the Federal Court’s attempt to require Apple to install a backdoor allowing the FBI to access a criminal’s iPhone, may we remind ourselves of the NSA’s spectacular access to the same device using  DROPOUT JEEP:

From 2013

How The NSA Hacks Your iPhone (Presenting DROPOUT JEEP)

DROPOUT JEEP is a software implant for the Apple iPhone that utilizes modular mission applications to provide specific SIGINT functionality. This functionality includes the ability to remotely push/pull files from the device. SMS retrieval, contact list retrieval, voicemail, geolocation, hot mic, camera capture, cell tower location, etc. Command, control and data exfiltration can occur over SMS messaging or a GPRS data connection. All communications with the implant will be covert and encrypted.”

The flowchart of how the NSA makes your iPhone its iPhone is presented below:

  • NSA ROC operator
  • Load specified module
  • Send data request
  • iPhone accepts request
  • Retrieves required SIGINT data
  • Encrypt and send exfil data
  • Rinse repeat

And visually:

 

Jewel v NSA: EFF Allowed to Conduct Discovery Against Unwarranted NSA Surveillance Programs

leave a comment »

From:  https://www.eff.org/deeplinks/2016/02/big-victory-judge-pushes-jewel-v-nsa-forward

February 19, 2016 | By David Greene

Big Victory: Judge Pushes Jewel v. NSA Forward

We won a groundbreaking legal victory late Friday in our Jewel v. NSA case, which challenges the NSA’s Internet and telephone surveillance. Judge Jeffrey White has authorized EFF, on behalf of the plaintiffs, to conduct discovery against the NSA. We had been barred from doing so since the case was filed in 2008, which meant that the government was able to prevent us from requesting important information about how these programs worked.

This marks the first time a party has been allowed to gather factual evidence from the NSA in a case involving the agency’s warrantless surveillance. The government had fought all our requests to proceed with this lawsuit, arguing that the state secrets privilege protects it against both discovery and liability. Judge White previously rejected that argument for our statutory claims under the Wiretap Act, the Foreign Intelligence Surveillance Act, the Electronic Communications Privacy Act, and the Stored Communications Act. This ruling affirms Judge White’s previous decision and opens the door for discovery.

This is an important step forward to lifting the cloak of secrecy that has thus far shielded the NSA from judicial scrutiny, and EFF looks forward to finally getting to the nuts and bolts of this extraordinarily important lawsuit.

Who Has Your Back? Government Data Requests 2015 | Electronic Frontier Foundation

leave a comment »

 

From EFF:

In this, our fifth annual Who Has Your Back report, we took the main principles of the prior reports and rolled them into a single category: Industry-Accepted Best Practices. We’ve also refined our expectations around providing users notice and added new categories to highlight other important transparency and user rights issues.

We designed this report to take the basic principles of Who Has Your Back up a notch and see which companies were still leading the pack. Already, our newest report has had a similar effect on the industry as a whole, encouraging companies large and small to strive for more when it comes to standing by their users. In the months since we first told the companies what this year’s criteria would be, we’ve seen significant improvement in company practices. And we hope—and expect—that over the next year, we’ll see even more.

 

Download Report

Download the complete Who Has Your Back? 2015: Protecting Your Data From Government Requests report as a PDF.

 

Who Has Your Back? Government Data Requests 2015 | Electronic Frontier Foundation

Written by bothernews

July 22, 2015 at 1:59 am