New Events

International

no events posted in last week

Blog Feeds

The Saker

Indymedia ireland

Indymedia Ireland is a volunteer-run non-commercial open publishing website for local and international news, opinion & analysis, press releases and events. Its main objective is to enable the public to participate in reporting and analysis of the news and other important events and aspects of our daily lives and thereby give a voice to people.

offsite link Fraud and mismanagement at University College Cork Thu Aug 28, 2025 18:30 | Calli Morganite
UCC has paid huge sums to a criminal professor
This story is not for republication. I bear responsibility for the things I write. I have read the guidelines and understand that I must not write anything untrue, and I won't.
This is a public interest story about a complete failure of governance and management at UCC.

offsite link Deliberate Design Flaw In ChatGPT-5 Sun Aug 17, 2025 08:04 | Mind Agent
Socratic Dialog Between ChatGPT-5 and Mind Agent Reveals Fatal and Deliberate 'Design by Construction' Flaw
This design flaw in ChatGPT-5's default epistemic mode subverts what the much touted ChatGPT-5 can do... so long as the flaw is not tickled, any usage should be fine---The epistemological question is: how would anyone in the public, includes you reading this (since no one is all knowing), in an unfamiliar domain know whether or not the flaw has been tickled when seeking information or understanding of a domain without prior knowledge of that domain???!

This analysis is a pretty unique and significant contribution to the space of empirical evaluation of LLMs that exist in AI public world... at least thus far, as far as I am aware! For what it's worth--as if anyone in the ChatGPT universe cares as they pile up on using the "PhD level scholar in your pocket".

According to GPT-5, and according to my tests, this flaw exists in all LLMs... What is revealing is the deduction GPT-5 made: Why ?design choice? starts looking like ?deliberate flaw?.

People are paying $200 a month to not just ChatGPT, but all major LLMs have similar Pro pricing! I bet they, like the normal user of free ChatGPT, stay in LLM's default mode where the flaw manifests itself. As it did in this evaluation.

offsite link AI Reach: Gemini Reasoning Question of God Sat Aug 02, 2025 20:00 | Mind Agent
Evaluating Semantic Reasoning Capability of AI Chatbot on Ontologically Deep Abstract (bias neutral) Thought
I have been evaluating AI Chatbot agents for their epistemic limits over the past two months, and have tested all major AI Agents, ChatGPT, Grok, Claude, Perplexity, and DeepSeek, for their epistemic limits and their negative impact as information gate-keepers.... Today I decided to test for how AI could be the boon for humanity in other positive areas, such as in completely abstract realms, such as metaphysical thought. Meaning, I wanted to test the LLMs for Positives beyond what most researchers benchmark these for, or have expressed in the approx. 2500 Turing tests in Humanity?s Last Exam.. And I chose as my first candidate, Google DeepMind's Gemini as I had not evaluated it before on anything.

offsite link Israeli Human Rights Group B'Tselem finally Admits It is Genocide releasing Our Genocide report Fri Aug 01, 2025 23:54 | 1 of indy
We have all known it for over 2 years that it is a genocide in Gaza
Israeli human rights group B'Tselem has finally admitted what everyone else outside Israel has known for two years is that the Israeli state is carrying out a genocide in Gaza

Western governments like the USA are complicit in it as they have been supplying the huge bombs and missiles used by Israel and dropped on innocent civilians in Gaza. One phone call from the USA regime could have ended it at any point. However many other countries are complicity with their tacit approval and neighboring Arab countries have been pretty spinless too in their support

With the release of this report titled: Our Genocide -there is a good chance this will make it okay for more people within Israel itself to speak out and do something about it despite the fact that many there are actually in support of the Gaza

offsite link China?s CITY WIDE CASH SEIZURES Begin ? ATMs Frozen, Digital Yuan FORCED Overnight Wed Jul 30, 2025 21:40 | 1 of indy
This story is unverified but it is very instructive of what will happen when cash is removed
THIS STORY IS UNVERIFIED BUT PLEASE WATCH THE VIDEO OR READ THE TRANSCRIPT AS IT GIVES AN VERY GOOD IDEA OF WHAT A CASHLESS SOCIETY WILL LOOK LIKE. And it ain't pretty

A single video report has come out of China claiming China's biggest cities are now cashless, not by choice, but by force. The report goes on to claim ATMs have gone dark, vaults are being emptied. And overnight (July 20 into 21), the digital yuan is the only currency allowed.

The Saker >>

Public Inquiry
Interested in maladministration. Estd. 2005

offsite link RTEs Sarah McInerney ? Fianna Fail?supporter? Anthony

offsite link Joe Duffy is dishonest and untrustworthy Anthony

offsite link Robert Watt complaint: Time for decision by SIPO Anthony

offsite link RTE in breach of its own editorial principles Anthony

offsite link Waiting for SIPO Anthony

Public Inquiry >>

Lockdown Skeptics

The Daily Sceptic

offsite link Two-Tier Justice on Full Display as Epping Protesters Get Longer Sentences Than Sex Attacker Whose C... Wed Oct 08, 2025 19:36 | Will Jones
Two-tier justice was on full display as three Epping protesters received longer prison sentences than the asylum seeker whose sex attack on a child they were protesting about, says Laurie Wastell.
The post Two-Tier Justice on Full Display as Epping Protesters Get Longer Sentences Than Sex Attacker Whose Crime They Were Protesting appeared first on The Daily Sceptic.

offsite link British Steel Industry Faces ?Existential Threat? as EU Hikes Tariffs to 50% Despite Starmer?s ?EU R... Wed Oct 08, 2025 17:23 | Will Jones
Britain?s Net Zero-ravaged steel industry is facing an "existential threat" as the EU threatens the UK with tariffs of up to 50% despite Keir Starmer's recent 'EU reset' giveaway on fishing rights and youth mobility.
The post British Steel Industry Faces “Existential Threat” as EU Hikes Tariffs to 50% Despite Starmer’s ‘EU Reset’ Giveaway appeared first on The Daily Sceptic.

offsite link The Fightback Against Politicised Art Has Begun Wed Oct 08, 2025 15:27 | Ferro
The public's indifference to art has never been greater. No wonder, says Ferro: it's all just tired Left-progressive politics by another means. But the fightback for real art that moves the human soul has begun.
The post The Fightback Against Politicised Art Has Begun appeared first on The Daily Sceptic.

offsite link Upon This Ice I Will Build My Church, Says Leo XIV Wed Oct 08, 2025 13:00 | James Alexander
Not until Leo XIV did we have a picture of a holy man staring at an ice cube with his hand on it, respectfully gazing as if imagining the whisky that could go with such a rock, says Prof James Alexander.
The post Upon This Ice I Will Build My Church, Says Leo XIV appeared first on The Daily Sceptic.

offsite link Sir Lenny Henry Wants ?18 Trillion of Slavery Reparations Wed Oct 08, 2025 11:17 | Sallust
Sir Lenny Henry has called for Britain to pay ?18 trillion in reparations to black people, arguing in a new book that high rates of black crime and unemployment are "all because of the slave trade".
The post Sir Lenny Henry Wants ?18 Trillion of Slavery Reparations appeared first on The Daily Sceptic.

Lockdown Skeptics >>

Iran: Sanctions siege turns into cyberwarfare

category international | anti-war / imperialism | other press author Thursday October 07, 2010 13:06author by pat c - Hands Off the People of Iran Report this post to the editors

Yassamine Mather writes on how the sanctions against Iran have developed into Warfare. But in thiis case the Imperialist-Zionist attack consists of Cyber Warfare. Full text at link.

While Israel, the US and Britain keep up their rhetoric of ultimatums and threats against Iran, and escalate the siege warfare of economic sanctions, Hands Off the People of Iran has been warning of the very real and ominous danger of a so-called pre-emptive attack. Now things have taken an unexpected and dangerous turn. Throughout the last couple of months Iran’s nuclear plants as well as a number of major industrial complexes have been targeted by a sophisticated piece of malware: Stuxnet.
1004117.jpg

According to computer experts the virus’s complexity suggests it was written by a “nation state” and it is the first known worm designed to target not software, but real-world infrastructure such as power stations, water plants and industrial units. Last week, after many denials, Iran confirmed that 30,000 computers in the country’s power stations, including the nuclear reactor in Bushehr, had been attacked by the virus, blaming Israeli or American spies for infiltrating the plant.

Related Link: http://www.hopi-ireland.org/
author by pat cpublication date Thu Aug 30, 2012 11:29author address author phone Report this post to the editors

Wiper has some similarities to Stuxnet but theres no smoking gun yet. Kaspersky Lab works on. Full text at link.

How does a security company study a strain of malware that systematically wipes a hard drive clean, including any traces of its own code? And is there any evidence that Wiper, one particular flavor of malware that hit computers in Iran’s oil industry in the spring, is connected to nation-state tools such as Stuxnet?

In an attempt to answer these questions and others about several pieces of malware that have cropped up recently, Kaspersky Lab has released new details about its investigation of Wiper.

According to Kaspersky, Wiper shares a couple of characteristics with the DuQu and Stuxnet attacks that suggest it might have been developed by Israel and the U.S. – the nations believed to be behind DuQu and Stuxnet. But, the researchers say in a blog post published Wednesday, that the similarities are circumstantial and not enough to draw firm conclusions just yet.

Wiper was an aggressive piece of malware that targeted machines belonging to the Iranian Oil Ministry and the National Iranian Oil Company in April. Iranian officials said at the time the malware was uncovered that it was designed to steal and destroy data.

Wiper left a trace of its existence on some hard drives, in the form of a registry key (highlighted in blue at left). Image courtesy of Kaspersky Lab
Wiper left a trace of its existence on some hard drives, in the form of a registry key (highlighted in blue at left). Image courtesy of Kaspersky Lab

Related Link: http://www.wired.com/threatlevel/2012/08/wiper-possible-origins/
author by pat cpublication date Tue Jun 19, 2012 23:13author address author phone Report this post to the editors

More on Flame/Stuxnet.

The United States and Israel are responsible for developing the sophisticated espionage rootkit known as Flame, according to anonymous Western sources quoted in a news report.

The malware was designed to provide intelligence about Iran’s computer networks and spy on Iranian officials through their computers as part of an ongoing cyberwarfare campaign, according to the Washington Post.

The program was a joint effort of the National Security Agency, the CIA and Israel’s military, which also produced the Stuxnet worm that is believed to have sabotaged centrifuges used for Iran’s uranium enrichment program in 2009 and 2010.

“This is about preparing the battlefield for another type of covert action,” a former high-ranking US intelligence official told the Post. “Cyber collection against the Iranian program is way further down the road than this.”

Flame was discovered last month by Russia-based antivirus firm Kaspersky Lab, following reports in Iran that malware aimed at computers belonging to that country’s oil industry had wiped data from the computers. In trying to investigate that issue, Kaspersky came across components of the Flame malware, which the researcher believed was not directly connected to the malware that wiped the Iranian computers clean but which they believed was created by the same nation states behind Stuxnet.

Kaspersky disclosed last week that Flame in fact contained some of the same code as Stuxnet, directly tying the two pieces of malware together.

According to the Post Flame was designed to infiltrate highly secure networks in order to siphon intelligence from them, including information that would help the attackers map a target network. Flame, as previously reported, can activate a computer’s internal microphone to record conversations conducted via Skype or in the vicinity of the computer. It also contains modules that log keyboard strokes, take screen shots of what’s occurring on a machine, extract geolocation data from images and turn an infected computer into a Bluetooth beacon to siphon information from Bluetooth-enabled phones that are near the computer.

Flame exploited a vulnerability in Microsoft’s terminal service system to allow the attackers to obtain a fraudulent Microsoft digital certificate to sign their code, so that it could masquerade as legitimate Microsoft code and be installed on a target machine via the Microsoft software update function.

Flame was developed at least five years ago as part of a classified program code-named Olympic Games, the same program that produced Stuxnet.

“It is far more difficult to penetrate a network, learn about it, reside on it forever and extract information from it without being detected than it is to go in and stomp around inside the network causing damage,” said Michael V. Hayden, a former NSA director and CIA director who left office in 2009, told the Post.

It’s still unclear whether the malware used to attack computers in Iran’s oil ministry is the same malware now known as Flame. According to the Post, the attack on the oil ministry computers was directed by Israel alone, a matter which apparently caught US officials off guard, according to anonymous sources who spoke with the newspaper.

Related Link: http://www.wired.com/threatlevel/2012/06/us-and-israel-behind-flame/
author by pat cpublication date Tue Jun 12, 2012 23:59author address author phone Report this post to the editors

More news on Stuxnet, its related to flame.

The game appears to be up for the US and Israeli intelligence agencies who created the potent Stuxnet worm and Duqu trojan: analysis by software engineers at Kaspersky Lab in Moscow shows they also created Flame, the powerful espionage software that has mainly been infecting computers in Iran.

Kaspersky Lab, which was commissioned by the UN to investigate the cause of massive document losses in a raft of Middle Eastern computer networks, identified Flame last week. In a bulletin issued today, Kaspersky says that a module from Stuxnet, known as "Resource 207" is actually a Flame plugin that allows the malicious code to spread via USB devices. "The code of the USB drive infection mechanism is identical in Flame and Stuxnet," says Kaspersky.

Coming soon after the New York Times detailed classified White House meetings that confirmed the US is behind Stuxnet, this is a further embarrassment for the Obama administration, which is now seen to be preaching cybersecurity defence at home while deploying a battery of offensive cyber threats abroad - and ones that undermine the software integrity of America's software champion, Microsoft, to do so.

Flame works by using cryptological skulduggery to scupper Microsoft's update system. And Stuxnet used vulnerabilities in Microsoft operating systems that, ordinarily, would be reported to Microsoft, repaired and sent out to millions of users as an update patch. Worse, perhaps, a coding error (the US reportedly blames Israel and vice versa) allowed Stuxnet to escape into the wild and reveal its existence - which a secret cyberweapon should of course not do.

It means the taxpayer-funded US National Security Agency is working at odds with the Department of Homeland Security, which is attempting to bolster online defences. Only last week, US homeland security secretary Janet Napolitano met industrialists at the White House to "discuss DHS's current efforts to secure cyberspace".

Napolitano says the DHS is "working with partners at universities and the private sector...to protect against evolving cyber threats". Whether those threats will be variants of this new breed of home-grown cyberweapon remains to be seen.

Related Link: http://www.newscientist.com/blogs/onepercent/2012/06/flame-stuxnet-share-code.html
author by opus diablos - the regressive hypocrite partypublication date Thu Oct 20, 2011 18:10author address author phone Report this post to the editors

..pat, is that when the going gets tough....the toughs are gonna pull the plugs on our incipient nets.

 Be prepared, as the girl guides say, we may be back to smoke signals before we calculate. If they can do it in China ....Meantime build while we can.

author by pat cpublication date Thu Oct 20, 2011 14:22author address author phone Report this post to the editors

The Zionist & Imperialist hackers are busy again with a new version of Stuxnet.

Researchers warn of new Stuxnet worm

Researchers have found evidence that the Stuxnet worm, which alarmed governments around the world, could be about to regenerate. Stuxnet was a highly complex piece of malware created to spy on and disrupt Iran's nuclear programme.

No-one has identified the worm authors but the finger of suspicion fell on the Israeli and US governments. The new threat, Duqu, is, according to those who discovered it, "a precursor to a future Stuxnet-like attack".

Its discovery was made public by security firm Symantec, which in turn was alerted to the threat by one of its customers. The worm was named Duqu because it creates files with the prefix DQ.

Symantec looked at samples of the threat gathered from computer systems located in Europe. Initial analysis of the worm found that parts of Duqu are nearly identical to Stuxnet and suggested that it was written by either the same authors or those with access to the Stuxnet source code.

Related Link: http://www.bbc.co.uk/news/technology-15367816
author by pat cpublication date Sat Mar 05, 2011 16:41author address author phone Report this post to the editors

More confirmation of the Israeli/US role in the creation of Stuxnet. Full text at link.

Israel and the United States created the Stuxnet worm to sabotage Iran's nuclear programme, a leading security expert has claimed.Ralph Langner told a conference in California that the malicious software was designed to cripple systems that could help build an Iranian bomb. Mr Langner was one of the first researchers to show how Stuxnet could take control of industrial equipment.

Speaking at the TED conference in Long Beach, California, Mr Langner said: "My opinion is that Mossad [Israel's intelligence agency] is involved."However he speculated that Israel was not the main driver behind the creation of Stuxnet.

"There is only one leading source, and that is the United States," said Mr Langner.

In a recent report on Stuxnet, the security firm Symantec said that it would have taken a team of between five and 10 developers, six months to create the worm.

Mr Langner said that the project would have required "inside information", so detailed that "they probably knew the shoe size of the operator."

Stuxnet first came to light in July 2010. Nearly 60% of reported infections were inside Iran.

Related Link: http://www.bbc.co.uk/news/technology-12633240
Number of comments per page
  
 
© 2001-2025 Independent Media Centre Ireland. Unless otherwise stated by the author, all content is free for non-commercial reuse, reprint, and rebroadcast, on the net and elsewhere. Opinions are those of the contributors and are not necessarily endorsed by Independent Media Centre Ireland. Disclaimer | Privacy