{"id":210,"date":"2010-02-22T03:01:14","date_gmt":"2010-02-22T11:01:14","guid":{"rendered":"http:\/\/bellrock2012.com\/2012blog\/?p=210"},"modified":"2010-02-22T05:38:32","modified_gmt":"2010-02-22T13:38:32","slug":"22-february-2010","status":"publish","type":"post","link":"https:\/\/bellrock2012.com\/2012blog\/22-february-2010\/","title":{"rendered":"22 February 2010 PAGeNEWS"},"content":{"rendered":"<p><span style=\"font-size: small;\"><a href=\"http:\/\/bellrock2012.com\/2012blog\/category\/uncategorized\">Bookmark this category<\/a><\/span><\/p>\n<div><span style=\"font-size: small;\"><span style=\"font-family: verdana,geneva;\"> <\/span><\/span><\/div>\n<div><span style=\"font-size: small;\"><span style=\"font-family: verdana,geneva;\"><em>Some jerk infected the Internet with an outright lie. It shows how easy it is to do and how credulous people are.<\/em><em> &#8211;Kurt Vonnegut<\/em><\/span><\/span><\/div>\n<div><span style=\"font-size: small;\"><span style=\"font-family: verdana,geneva;\">&#8212;&#8212;&#8212;-<\/span><\/span><\/div>\n<div><span style=\"font-size: small;\"><span style=\"font-family: verdana,geneva;\"><strong>PAG e-NEWS: <\/strong><strong>22 February 2010<\/strong><strong> <\/strong><\/span><\/span><\/div>\n<div><span style=\"font-size: small;\"><span style=\"font-family: verdana,geneva;\">&#8212; questioning dogma, ideology, authority, reality, and whatever is left<\/span><\/span><\/div>\n<div><span style=\"font-size: small;\"><span style=\"font-family: verdana,geneva;\"> &#8212; peeking behind the curtain<\/span><\/span><\/div>\n<div><span style=\"font-size: small;\"><span style=\"font-family: verdana,geneva;\"> &#8212; thinking outside the program<\/span><\/span><\/div>\n<div><span style=\"font-size: small;\"><span style=\"font-family: verdana,geneva;\"> &#8212; looking below the surface <\/span><\/span><\/div>\n<div><span style=\"font-size: small;\"><span style=\"font-family: verdana,geneva;\"> &#8212; lifting the veil<\/span><\/span><\/div>\n<div><span style=\"font-size: small;\"><span style=\"font-family: verdana,geneva;\">&#8212;&#8212;&#8212;-<\/span><\/span><\/div>\n<div><span style=\"font-size: small;\"><em><span style=\"font-family: verdana,geneva;\">Published by Peter A. Gersten, Esq. (ufolawyer@msn.com) <\/span><\/em><\/span><\/div>\n<div><span style=\"font-size: small;\"><em><span style=\"font-family: verdana,geneva;\"> <\/span><\/em><\/span><\/div>\n<div><span style=\"font-size: small;\"><em><span style=\"font-family: verdana,geneva;\">Website: http:\/\/www.pagenews.info<\/span><\/em><\/span><\/div>\n<div><span style=\"font-size: small;\"><span style=\"font-family: verdana,geneva;\">&#8212;&#8212;&#8212;-<\/span><\/span><\/div>\n<div><span style=\"font-size: small;\"><strong><span style=\"font-family: verdana,geneva;\">CYBER-ATTACKs, WEB SPYING, &amp; MALICIOUS SOFTWARE<\/span><\/strong><\/span><\/div>\n<div><span style=\"font-size: small;\"><strong><span style=\"font-family: verdana,geneva;\"> <\/span><\/strong><\/span><\/div>\n<div><span style=\"font-size: small;\"><span style=\"font-family: verdana,geneva;\">Behold the three horsemen of the cyber-apocalypse. I am convinced that silicon-based technology is actually a Trojan horse. We bring it our homes and schools and it is used by \u2018others\u2019 to spy on us. We are attracted to its technological toys and ignore the side-effects on the biosphere. We become obsessed with its cyber world and are oblivious to our own transformation.<\/span><\/span><\/div>\n<div><span style=\"font-size: small;\"><span style=\"font-family: verdana,geneva;\"> <\/span><\/span><\/div>\n<div><span style=\"font-size: small;\"><strong><span style=\"font-family: verdana,geneva;\">Google Asks Spy Agency for Help With Inquiry Into Cyberattacks <\/span><\/strong><\/span><\/div>\n<div><span style=\"font-size: small;\"><span style=\"font-family: verdana,geneva;\"> <\/span><\/span><\/div>\n<div><span style=\"font-size: small;\"><em><span style=\"font-family: verdana,geneva;\">Google has turned to the National Security Agency for technical assistance to learn more about the computer network attackers who breached the company\u2019s cybersecurity defenses last year, a person with direct knowledge of the agreement said Thursday.<\/span><\/em><\/span><\/div>\n<div><span style=\"font-size: small;\"><span style=\"font-family: verdana,geneva;\"> <\/span><\/span><\/div>\n<div><span style=\"font-size: small;\"><a href=\"http:\/\/www.nytimes.com\/2010\/02\/05\/science\/05google.html?th&amp;emc=th\"><span style=\"font-family: verdana,geneva;\">http:\/\/www.nytimes.com\/2010\/02\/05\/science\/05google.html?th&amp;emc=th<\/span><\/a><\/span><\/div>\n<div><span style=\"font-size: small;\"><span style=\"font-family: verdana,geneva;\"> <\/span><\/span><\/div>\n<div><span style=\"font-size: small;\"><strong><span style=\"font-family: verdana,geneva;\">Political hacktivists turn to web attacks <\/span><\/strong><\/span><\/div>\n<div><span style=\"font-size: small;\"><span style=\"font-family: verdana,geneva;\"> <\/span><\/span><\/div>\n<div><span style=\"font-size: small;\"><em><span style=\"font-family: verdana,geneva;\">Political activists are increasingly using net attacks as a means of protest, reveals a report.<\/span><\/em><\/span><\/div>\n<div><span style=\"font-size: small;\"><span style=\"font-family: verdana,geneva;\"> <\/span><\/span><\/div>\n<div><span style=\"font-size: small;\"><a href=\"http:\/\/news.bbc.co.uk\/2\/hi\/technology\/8506698.stm\"><span style=\"font-family: verdana,geneva;\">http:\/\/news.bbc.co.uk\/2\/hi\/technology\/8506698.stm<\/span><\/a><\/span><\/div>\n<div><span style=\"font-size: small;\"><span style=\"font-family: verdana,geneva;\"> <\/span><\/span><\/div>\n<div><span style=\"font-size: small;\"><strong><span style=\"font-family: verdana,geneva;\">US school accused of web spying <\/span><\/strong><\/span><\/div>\n<div><span style=\"font-size: small;\"><span style=\"font-family: verdana,geneva;\"> <\/span><\/span><\/div>\n<div><span style=\"font-size: small;\"><span style=\"font-family: verdana,geneva;\"><em>Parents in the <\/em><em>US<\/em><em> have accused a school of spying on children by remotely activating webcams on laptops<\/em>.<\/span><\/span><\/div>\n<div><span style=\"font-size: small;\"><span style=\"font-family: verdana,geneva;\"> <\/span><\/span><\/div>\n<div><span style=\"font-size: small;\"><a href=\"http:\/\/news.bbc.co.uk\/2\/hi\/uk_news\/education\/8523807.stm\"><span style=\"font-family: verdana,geneva;\">http:\/\/news.bbc.co.uk\/2\/hi\/uk_news\/education\/8523807.stm<\/span><\/a><\/span><\/div>\n<div><span style=\"font-size: small;\"><span style=\"font-family: verdana,geneva;\"> <\/span><\/span><\/div>\n<div><span style=\"font-size: small;\"><strong><span style=\"font-family: verdana,geneva;\">Malicious Software Infects Computers <\/span><\/strong><\/span><\/div>\n<div><span style=\"font-size: small;\"><span style=\"font-family: verdana,geneva;\"> <\/span><\/span><\/div>\n<div><span style=\"font-size: small;\"><em><span style=\"font-family: verdana,geneva;\">A malicious software program has infected the computers of more than 2,500 corporations around the world, according to NetWitness, a computer network security firm.<\/span><\/em><\/span><\/div>\n<div><span style=\"font-size: small;\"><span style=\"font-family: verdana,geneva;\"> <\/span><\/span><\/div>\n<div><span style=\"font-size: small;\"><a href=\"http:\/\/www.nytimes.com\/2010\/02\/19\/technology\/19cyber.html?th&amp;emc=th\"><span style=\"font-family: verdana,geneva;\">http:\/\/www.nytimes.com\/2010\/02\/19\/technology\/19cyber.html?th&amp;emc=th<\/span><\/a><\/span><\/div>\n<div><span style=\"font-size: small;\"> <\/span><\/div>\n<div><span style=\"font-size: small;\"> <\/span><\/div>\n<p><!--YMLPUFE--><\/p>\n<iframe src=\"http:\/\/www.facebook.com\/plugins\/like.php?href=https%3A%2F%2Fbellrock2012.com%2F2012blog%2F22-february-2010%2F&amp;layout=standard&amp;show_faces=true&amp;width=450&amp;action=like&amp;colorscheme=light&amp;height=80\" scrolling=\"no\" frameborder=\"0\" style=\"border:none; overflow:hidden; width:450px; height:80px;\" allowTransparency=\"true\"><\/iframe><!-- AddThis Advanced Settings generic via filter on the_content --><!-- AddThis Share Buttons generic via filter on the_content -->","protected":false},"excerpt":{"rendered":"<p>Bookmark this category<\/p>\n<p> Some jerk infected the Internet with an outright lie. It shows how easy it is to do and how credulous people are. &#8211;Kurt Vonnegut &#8212;&#8212;&#8212;- PAG e-NEWS: 22 February 2010 &#8212; questioning dogma, ideology, authority, reality, and whatever is left &#8212; peeking behind the curtain &#8212; thinking outside the program &#8212; looking [&#8230;]<!-- AddThis Advanced Settings generic via filter on get_the_excerpt --><!-- AddThis Share Buttons generic via filter on get_the_excerpt --><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[5],"class_list":["post-210","post","type-post","status-publish","format-standard","hentry","category-pagenews","tag-pagenews","odd"],"_links":{"self":[{"href":"https:\/\/bellrock2012.com\/2012blog\/wp-json\/wp\/v2\/posts\/210","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bellrock2012.com\/2012blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/bellrock2012.com\/2012blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/bellrock2012.com\/2012blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/bellrock2012.com\/2012blog\/wp-json\/wp\/v2\/comments?post=210"}],"version-history":[{"count":0,"href":"https:\/\/bellrock2012.com\/2012blog\/wp-json\/wp\/v2\/posts\/210\/revisions"}],"wp:attachment":[{"href":"https:\/\/bellrock2012.com\/2012blog\/wp-json\/wp\/v2\/media?parent=210"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/bellrock2012.com\/2012blog\/wp-json\/wp\/v2\/categories?post=210"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bellrock2012.com\/2012blog\/wp-json\/wp\/v2\/tags?post=210"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}