Tuesday, 28. June 2016

Racism is spreading like arsenic in the water supply


Now neo-Nazis are being given a voice on the news. Britain must guard against extremists seducing others with racist views One of the genies uncorked by the referendum of the EU has been low-lying fascism and extreme nationalism. This is not to say that all leavers were racists. Far from it. But one of the political forces that have been unleashed is a form of dangerous nativism that unchecked will threaten us all. It’s clear from the barrage of reports that a form of bigotry in everyday conversation is being legitimised. It is not racist to worry about high levels of immigration but a climate of fear is being created in the name of leavers. There are reports of schoolchildren terrified of being deported. “Polish vermin”, “Paki cunt” and “send them home” seem to be becoming something that immigrants and non-whites have to once again have to endure.

theguardian.com

... Link (0 comments) ... Comment



BREXIT THE MOVIE


is a feature-length documentary film to inspire as many people as possible to vote to LEAVE the EU in the June 23rd referendum.

... Link (0 comments) ... Comment



Zunahme rassistischer Vorfälle in Großbritannien


Stimmung gegen Migranten und Ausländer verschärft sich nach dem Brexit Dass der Brexit die britische Gesellschaft spaltet, davor hatten selbst prominente Politiker des Pro-Ausstiegs-Lagers während des Wahlkampfs gewarnt. Die Konservative Sayeeda Warsi etwa wechselte aus Protest gegen den zunehmend fremdenfeindlichen Ton der Debatte die Seite. Der britische Finanzminister George Osborne hatte Anfang Juni in einem Fernsehinterview kritisiert, dass die rechtspopulistische Ukip das EU-Referendum in eine Abstimmung über Einwanderer verwandelt habe.

derstandard.at

... Link (0 comments) ... Comment



Return of the Reich - Mapping the Global Resurgence of Far Right Power


Return of the Reich: Mapping the Global Resurgence of Far Right Power — an INSURGE intelligence investigative series commissioned by Tell MAMA In May’s presidential elections in Austria, Norbert Hofer, the candidate for the far-right Austrian Freedom Party (FPO), lost by less than one percentage point to his rival, Alexander van der Bellen. But the FPO is not merely a ‘far-right’ political party. It is, more precisely, a neo-Nazi party which harbours an insidious fascist ideology inspired by Adolf Hitler. If Hofer had won, he would have been the first neo-Nazi head of state in the European Union. While Europe breathed a collective sigh or relief at his loss, the narrowness of his rival’s victory reveals how close we are to a dangerous tipping point in party politics, not just in Austria, but across the continent. The project was commissioned by the national hate crime charity, Tell Mama, as a four-part investigative series into the evolution of the far-right as a trans-Atlantic network.

medium.com

... Link (0 comments) ... Comment



Rechtsextreme und menschenverachtende Phänomene im Social Web


Rechtspopulistische und rechtsextreme Rhetorik im Internet haben 2015 rasant an Fahrt aufgenommen. Doch wer sind die treibenden Kräfte? Welche Akteurinnen und Akteure sind relevant, welche Phänomene und Narrative sind am verbreitetsten? Der vorliegende Bericht gibt einen Überblick und sortiert die Strömungen, Instrumente und Narrative in die Ereignisse der letzten anderthalb Jahre ein.

Inhalt der Broschüre

Vorwort

Phänomene

Instrumente:

Bürgerliche Mimikry
Gewaltaufrufe
Falschmeldungen und Gerüchte

Narrative und Motive:

Volk, Staat und Widerstand
Opferrolle: Pack und Nazi
"Lügenpresse" und "Gegenöffentlichkeit"
Flüchtlinge als "Invasoren"
Flüchtlinge als "Kriminelle", "Kulturlose" und "übergriffige Fremde"
Flüchtlinge als "Schmarotzer"

Strömungen und Akteure

Pegida
AfD
NPD
Ein Prozent für unser Land
Identitäre Bewegung Deutschland
Der III. Weg
German Defence League

Friedensquerfront:

Anonymous.Kollektiv
Compact
KenFM

amadeu-antonio-stiftung.de

... Link (0 comments) ... Comment



Scientists claim the US government is still limiting cannabis research


A group of scientists just published an article claiming the US government is holding back proper research into marijuana, due to its overzealous regulation of the substance. While millions of patients are already using medical marijuana - and more and more states are decriminalising the drug - scientists are still denied access to high-quality weed, which makes it hard to properly investigate the risks and benefits of consuming the plant.

sciencealert.com

... Link (0 comments) ... Comment



How hackers hijacked petition demanding second EU referendum and named 42,000 signatories from the Vatican City which only has a population of 840


The full extent of how hackers managed to hijack the petition demanding a second EU referendum can be revealed by MailOnline. Hackers boasted about their exploits in online forums and openly mocked how easy it was to infiltrate the UK Parliament petition website. The petition has attracted more than 3.7million signatures and has led high profile figures to use the petition as proof of the public appetite for a re-run of last week's referendum, which was won by the Brexit campaign by more than 1.2million votes.

dailymail.co.uk

... Link (0 comments) ... Comment



The Weaponising Of Social Part 2: Stomping On IOError’s Grave


I once tried to tell Jacob Appelbaum a funny joke. He did not think it was funny. In fact, he was visibly mortified and uncomfortable. My joke was a retelling of something that had happened to me when I was still on the opposite side of the planet. I have a really dark, sardonic, acerbic Kiwi sense of humour, that has been sharpened by surviving everything that has been thrown at me to date. Unfortunately, it didn’t translate well. Fortunately, he didn’t make a smear website lambasting me about it. Warning There are Persons of Interest who the surveillance state merely monitors – and there are those who it actively harms. The latter, and those who facilitate and inflict that harm, will instantly understand that every word of this article is true. Everyone else is going to need to read carefully, do a lot of thinking, and click on all the links and their source links in turn. For this post is not just about a group of women who accused Jacob Appelbaum of heinous assaults and social improprieties, although that will be extensively covered. This article is, as promised, about the mammoth and monumental, colossal issues which are intertwined with that and are conveniently being overshadowed by it. For we are all being polarised into a fake diametric supposition – that either Jacob Appelbaum targets people, or Jacob Appelbaum is being targeted. But the real target is WikiLeaks.

theindicter.com The Weaponising Of Social Part 1

... Link (0 comments) ... Comment



Large CCTV Botnet Leveraged in DDoS Attacks


Our security operations team investigate and mitigate multiple denial of service (DDoS) attacks every single day. One recent case caught our attention because of the intensity and duration of the attack, and – as we discovered through some research – how it was being done. In this article, we’ll share the specifics in an effort to track down the vulnerable devices and to help get them patched. DDoS Against a Small Business It all started with a small brick and mortar jewelry shop that signed up with us to help protect their site from a DDoS that had taken them down for days. By switching their DNS to the Sucuri Network, we were able to quickly mitigate the attack for them. It was a layer 7 attack (HTTP Flood) generating close to 35,000 HTTP requests per second (RPS) which was more than their web servers could handle.

sucuri.net arstechnica.com

... Link (0 comments) ... Comment



How a Kitten Video Can Transmit Secret Instructions to Criminals


An ancient form of information-hiding known as steganography has infiltrated the viral internet. Imagine your computer is infected. The virus that has infiltrated your machine commands it to perform tasks and open applications that you would normally use–except you’re not there to run them. At the same time every day, it launches Twitter, then generates user handles and hunts through tweets. It searches and waits until, bingo—it finds a recently tweeted link that leads to a photo of a flower. But, this is no ordinary photo. Laced into the Github image file’s long string of code are secret instructions that it needs to extract and upload information from your compromised computer to an internet cloud service set up by a hacker.

atlasobscura.com

... Link (0 comments) ... Comment



Tor Project Battled Over Hiring Ex-CIA Agent, Chat Logs Show


The Tor Project, the nonprofit that maintains the world's most popular anonymity software, is often protective of its public image. In particular, the organization faces regular—and often unsubstantiated—attacks about the motivations of its funders, and specifically its reliance on money from the US government. Related to that delicate PR dance are recently unearthed logs from an internal chat channel for the Tor Project, which show how staff were torn over the brief hiring of an ex-CIA official, and how that would affect the organization's image and safety of activists' family members too. Overall, the logs show an organization that is stuck between a rock and a hard place: one that wishes to develop and perhaps have greater links with government if they would be beneficial, but which then has to deal with the public's’ perception of that.

motherboard.vice.com a list of the pseudonyms used in the chat matched to core Tor Project names This is an IRC log from #tor-internal - our water cooler irc channel

... Link (0 comments) ... Comment