"Ghandi wasn’t killed by Pakistani nationals- Felipe Andres Coronel, aka Immortal Technique, “The Martyr” (via thinksquad)
He was assassinated by a Hindu radical
And Che Guevara, rebel to a U.S. continent
Was sold to the C.I.A. by Bolivian communists
Wasn’t Yitzhak Rabin murdered by a Zionist
And Anwar Sadat a victim of the same violence?
Malcolm X was seen as a threat to the F.B.I.
But to blast ‘em they used Muslims from the N.O.I.
Even the 35th President of the Republic
Was murdered by factions of his own government"
Watch the Trailer For Nas’ Documentary: “Nas: Time Is Illmatic”
Watch the new trailer for One9 and Erik Parker’s Nas: Time Is Illmatic documentary. Coming to theaters, iTunes, and Video on Demand this October.
Directed by One9, written by Erik Parker, with never before seen interviews from artist like Nas, Large Professor, Pete Rock, Q-Tip, L.E.S., DJ Premier, Pharrell Williams, Alicia Keys, and more, the story of Nas’ iconic album comes to life on the silver screen. The film takes viewers on a journey twenty years back in time, when Nas’ debut album Illmatic dropped and the young emcee commanded the attention of the masses. The film chronicles Nas’ influences from his environment, family, and music while uncovering details of his life story and career. Nas: Time Is Illmatic is scheduled for release in select theaters beginning October 1st in conjunction with the “Nas: Time Is Illmatic” Tour presented by Hennessy V S.
The film will also be released nationwide through Video On Demand, iTunes, and other digital platforms beginning October 3rd.
lightning illuminates an ash cloud that extends ten kilometres high in this june 5, 2011 eruption of puyehue volcano, near osorno in southern chile. known as a dirty thunderstorm, this phenomenon is yet to be explained by science, as the source of the lightning (or the specific mechanism by which particles of differing charges are separated in the ash cloud) continues to be debated.
Seventeen mysterious cellphone towers have been found in America which look like ordinary towers, and can only be identified by a heavily customized handset built for Android security – but have a much more malicious purpose, according to Popular Science.
The fake ‘towers’ – computers which wirelessly attack cellphones via the “baseband” chips built to allow them to communicate with their networks, can eavesdrop and even install spyware, ESD claims. They are a known technology - but the surprise is that they are in active use.
The towers were found by users of the CryptoPhone 500, one of several ultra-secure handsets that have come to market in the last couple of years, after an executive noticed his handset was “leaking” data regularly.
Its American manufacturer boasts that the handset has a “hardened” version of Android which removes 468 vulnerabilities from the OS.
Android Security: Towers in casinos
Despite its secure OS, Les Goldsmith of the handset’s US manufacturer ESD found that his personal Android security handset’s firewall showed signs of attack “80 to 90” times per hour.
The leaks were traced to the mysterious towers. Despite having some of the functions of normal cellphone towers, Goldsmith says their function is rather different. He describes them as “interceptors” and says that various models can eavesdrop and even push spyware to devices. Normal cellphones cannot detect them – only specialized hardware such as ESD’s Android security handsets.
Who created the towers and maintains them is unknown, Goldsmith says.
Origin of towers ‘unknown’
“Interceptor use in the U.S. is much higher than people had anticipated,” Goldsmith says. “One of our customers took a road trip from Florida to North Carolina and he found eight different interceptors on that trip. We even found one at South Point Casino in Las Vegas.”
Their existence can only be seen on specialized devices, such as the custom Android security OS used by Cryptophone, which includes various security features – including “baseband attack detection.”
The handset, based on a Samsung Galaxy SIII, is described as offering, a “Hardened Android operating system” offering extra security. “Baseband firewall protects against over-the-air attacks with constant monitoring of baseband processor activity, baseband attack detection, and automated initiation of countermeasures”, claims the site.
“What we find suspicious is that a lot of these interceptors are right on top of U.S. military bases.” says Goldsmith. “Whose interceptor is it? Who are they, that’s listening to calls around military bases? The point is: we don’t really know whose they are.”
Baseband attacks are considered extremely difficult – the details of the chips are closely guarded. “Interceptors” are costly devices – and hacking baseband chips is thought to be technically advanced beyond the reach of “ordinary” hackers, ESD says. The devices vary in form, and are sold to government agencies and others, but are computers with specialized software designed to defeat the encryption of cellphone networks. The towers target the “Baseband” operating system of cellphones – a secondary OS which sits “between” iOS or Android, for instance, and the cellular network.
Goldsmith says that the devices cost “less than $100,000” and does not mention what level or type of device his team has detected. Most are still out of reach of average hackers, although freely advertised. One model is the VME Dominator, which is described as, “a real time GSM A5.1 cell phone interceptor. It cannot be detected. It allows interception of voice and text. It also allows voice manipulation, up or down channel blocking, text intercept and modification, calling & sending text on behalf of the user, and directional finding of a user during random monitoring of calls.”
What has come as a surprise is how many “interceptors” are in active use in the U.S., and that their purpose remains mysterious.
"Their purpose remains mysterious" Yeah OKAY….