The All Blacks Have Arrived Back in New Zealand After Winning Rugby World Cup

Meanwhile as thousands worship their rugby idols the The Inspector General of Intelligence and Security has released a report finding the SIS (Security Intelligence Service) has been continuing to break the law with it's use of new video surveillance powers.

The Green Party has stated:
“The powers of the SIS need to be curbed and it needs proper oversight by a democratically representative Parliamentary Select Committee, as the Green Party has repeatedly called for in the past.”

“The SIS was given extra powers of video surveillance which it has used twice, and both times have been found to have broken the law. At the very least, these new powers have to go,”

Prime Minister Rt Hon John Key (Corrupt Liar) has today tabled in Parliament the Annual Report of the Inspector-General of Intelligence and Security, Cheryl Gwyn.

Windows 10 will automatically download on to Windows 7 or 8 PCs

Microsoft’s efforts to entice users to upgrade to Windows 10 will soon see it automatically downloaded on to users computers without their knowledge.

The company announced that Windows 10 will become a “recommended update” starting next year, which means anyone with Windows 7 or 8 that has automatic updates activated – the default and the best way to keep a computer protected against security bugs – will have Windows 10 automatically downloaded without asking.

What’s more, the installer for Windows 10 will start once it has been downloading, presenting users with a popup.

Want Cash? Next-Gen ATMs Demand Biometric Verification: “Smartphone and Eye Scan To Dispense Money”

Some of the longest standing fears have been based around the idea that once cash is fully banned, the last remaining vestiges of freedom will go with it.

While that remains to be seen in total, it is clear that a digital matrix of computer-based spending, surveillance and control is taking over more and more of our lives.

Now that system wants to scan your iris and even talk with your smartphone in order to allow you to access your own hard-earned money. Sadly, this eerie new world order scenario is closer to reality than ever before.

'Codifying' Government Surveillance, Senate Passes CISA

"Every senator supporting #CISA today voted against a world with freedom, democracy, and basic human rights," tweeted digital rights organization Fight for the Future. "If President Obama does not veto this bill, he'll be showing that his administration never truly cared about the open Internet."

"This vote will go down as the moment Congress codified the US government’s unconstitutional spying. A sad day for the Internet," the group added.

Given Spy Agencies' Love For Exploits And Malware, It's Never Been More Dangerous To Be A Security Researcher

There's probably never been a great time to be a security researcher, what with the attacks they suffer in response to their work, not to mention far too many corporations greeting the discovery of vulnerabilities with legal threats and criminal charges.

The worldwide adoption of the Wassenaar Arrangement threatens to treat the products of security research like weapons-grade plutonium, making every outbound flight with a laptop or USB drive akin to smuggling weapons out of the country.

But that's not the end of it. Security researchers work in the same shadowy areas as national security agencies, as well as other government entities focused on espionage. These agencies not only create their own malware and exploits, but also purchase them from companies in the vulnerabilities business.

We're getting kick-ass at seeing through walls using just Wi-Fi – MIT

Eggheads at MIT are getting better and better at using Wi-Fi signals to see through walls, capturing motion accurate to within a few centimetres.

Using the same signals sent out by your wireless router, the team built a device it has called RF-Capture, and placed it behind an ordinary lab building wall. It was able to pick up coarse images of individuals on the other side of the wall by analyzing reflected radio waves, which they then converted into a heat-map-style graphic.

Interestingly, the group then worked on the system to track motion. The combination of many different pictures that in themselves are not very detailed helps build up an accurate picture of what – and who – is on the other side of the wall.

Boycott Westpac Bank

We all need to have a bank account in this stupid society but we don't have to bank with Westpac Bank. If you or anyone you know banks with Westpac you should close your accounts and move to a New Zealand owned bank such as KiwiBank or the Taranaki Savings Bank (TSB)

Westpac Bank have just shown everyone they do not give a fuck about your privacy or the rule of law.

The NZ Police are a Political Weapon for John Key

If you choose to stand up to the government here in New Zealand, whether you are an opposition politician or investigative journalist you now know that the government might send it's attack dogs in the form of our intelligence agencies or the police force to dig through your private business and use it against you without warrant or court order.

Corruption is flourishing in New Zealand since we voted in pathological liar John Key as Prime Minister.

Sustainable Cities is not About the Environment it is About Mass Surveillance and Fascist Control of Populations

Brought to you by corrupt criminal corporations and sold to you by mindless dimwit cunts like Wellington City Mayor Celia Wade Brown.

Orwell’s Dystopic Nightmare Comes True: Agenda 21 Smart Cities Are Here:

City to consider 'smart' LED street lights:

Celia Wade-Brown's vision for a smart city:

Wellingtons Smart Motorway:

One Secret Text Gives any Police State Agency Total Control of Your Phone – Even When It’s Off

Whistleblower Edward Snowden, in an interview with the BBC’s ‘Panorama,’ spoke in detail about a stunning array of cyber spying tools used by the U.K.’s GCHQ to hack smartphones with a single text message. The spyware package is named after the little blue cartoon characters; the Smurfs.

“It’s called an ‘exploit’,” Snowden said. “That’s a specially crafted message that’s texted to your number like any other text message but when it arrives at your phone it’s hidden from you. It doesn’t display. You paid for [the phone] but whoever controls the software owns the phone,” he added.

Syndicate content