www.ofINTEREST.net

The focus with ..."of INTEREST"!? is to bring to you as much information, without taking sides, relating to the Subject matter links listed above and herein. You will have to decide! - www.ofINTEREST.net

www.AmericansNotWanted.com (click here)

The United States of America is undergoing CHANGE. Is it for the betterment of all, or just for those who are willing to play along? Why are U.S.A. citizens being driven into poverty, and who are the culprits? You will have to decide! - www.AmericansNotWanted.com

www.CorruptionCripples.com (click here)

Corruption does Cripples, and affects us all! Don't be silent, and know that there are others who share your thoughts of not accepting Corruption in any form or fashion by anyone - www.CorruptionCripples.com

.

www.Houseless.org (click here)

Houseless, not homeless! It is in so many cases, a dwelling, structure, place, abode and so forth that is missing, not a connection with others. - www.Houseless.org

www.TruthExposedAndRevealed.com (click here)

Scripture, is the manual for those descended from Adam and Eve. There are many versions of Scripture, but are they all with Truth? Abba, Elohiym loves his creations, but lest us not be so bold as to forsake him. You will have to decide, but do so with help from true Scripture, not man's versions thereof! - www.TruthExposedAndRevealed.com

Borneo's Mount Kinabalu, Flesh Eating, Giant Red Leech Swallows huge Blue Earthworm like Spaghetti [ VIDEO-Pics ] - www.ofINTEREST.net




For the first time, BBC filmmakers in the forests of Borneo's Mount Kinabalu have documented the so-repulsive-it's-captivating behavior of a large, red, worm-guzzling predator as part of their upcoming new series "Wonders of the Monsoon". While the predator remains unclassified by science, the animal is known to the area's tribespeople, fittingly, as the "Giant Red Leech."

A huge 1m leech has been filmed for the first time swallowing a giant earthworm in the forests of Borneo  Photo: BBC
The Giant Red Leech is one of the biggest in the world. The specimen captured on camera was around 30cm long but experts believe they could grow larger.
They have grown so big that they no longer simply suck blood but now actively hunt giant blue worms and suck them down like spaghetti. The worm it is eating is a whopping 78cm.
The new footage shows the leech detecting a worm's trail and following the scent like a sniffer dog.
When it encounters its prey it quickly latches on and moves its lips up and down the iridescent blue body.
"It was either searching for an end to grab, or was working out whether it was too big to eat" said documentary director Paul Williams.
"When it found an end it started to suck. It was incredible."
That this ambitious leech is roughly half the length of the worm it's eating only makes the footage more impressive. 

A big thanks to Paul Williams and the Giant Red Leech for this fascinating footage – and for ruining spaghetti for everyone, forever.


video
 Video is via BBC documentary Wonders of the Monsoon


Wonders of the Monsoon will air on BBC 2 at 8pm on Sunday October 5th:

Series producer Paul Bradshaw said: “This is natural history set in the planet's most glorious and dramatic theatre - the lands of the monsoon. 

“It's an incredibly rich mixture of extraordinary creatures, great and small, with some of the planet’s most colourful and ancient cultures, all bound together through the story of this rampaging weather system.”



RELATED: 
Compare the end-on technique of the Giant Red Leech with the side-bite employed by this Japanese Mountain Leech:

video



MORE RELATED:

The ant pictured below comes from entomologist, blogger and insect photographer Alex Wild. The remarkable image of a trapjaw ant, torn asunder to reveal the wriggling, 8-inch parasitic worm living inside. (The ant, by comparison, measures about half an inch long.)

Infected Ant via Alex Wild

In the jungles of Belize last January, entomologist Alex Wild noticed something odd about the trap-jaw ants passing through his outdoor insect photography class: They all had shrunken heads and swollen abdomens. A day after making the observation, Wild and his students came upon an ant with a worm bursting out of its side. Parasites were at work. Nematode worms enter the ants as larvae and grow inside the ants' body cavity, siphoning off nutrients and distorting their hosts' natural anatomy. When the eight-inch-long nematodes are ready to mate a few weeks later, they push their way out of their half-inch-long hosts, killing them.

INFECTED

In the abdomen of a trap-jaw ant, a parasitic nematode lives off nutrients from the surrounding fluids and changes the morphology of its host.

HEALTHY

The jaws of a parasite-free worker can snap shut on prey in just 1/10,000 of a second—the fastest known mechanical action in nature.

Fun fact:
 when they're not bursting at the seams with squirming parasites, trapjaw ants are capable of clamping their mandibles shut somewhere in the range of 35 to 64 meters per second (~78–145 miles per hour). The average duration of a trap-jaw clamp is just 0.13 milliseconds, making it among the fastest predatory strikes in the animal kingdom.

video
Trap-jaw ant, Odontomachus brunneus


In 2006, a team led by UC Berkeley biologist Sheila Patek used high-speed videography to determine that a trap-jaw's mandibles can accelerate at 100,000 times the force of gravity, and exert a force powerful enough to send its body soaring through the air in a defensive maneuver known as an "escape jump" (seen above). Below is another example of a different evasive maneuver (called a "bounce defense jump") with a more horizontal trajectory, from the same study:

video
This video shows a trap-jaw ant (Odontomachus bauri) that fired its jaws against a hard surface and launched itself into the air (filmed at 3000 frames per second, played back at 30 frames per second).

MISSING: Hannah Elizabeth Graham, 18 student from England since Friday, 12th Sept. 2014 from about University of Virginia, Charlottesville campus [ VIDEO/Pics ] - www.ofINTEREST.net


Via

Police searching for missing UVA student, 18, release last known footage of girl as it's revealed she texted friends at 01:20 am to say she was lost on way to party near her own house 

  • Hannah Elizabeth Graham, 18, was reported missing on Sunday on campus
  • Texted friends at 01:20 am on Saturday to say she was lost on the way to meet them
  • But according to Charlottesville police, she failed to arrive for the party
  • Surveillance shows her running along a corridor the night she went missing 
  • Family and friends have not heard from the second year student since 
  • Her parents are from England but she lives in America on a Green Card
Police have released CCTV images of a University of Virginia student on the night she disappeared after failing to show up for a party after texting to say she was lost near her own home.

Authorities are desperately searching for Hannah Elizabeth Graham who was reported missing near the Charlottesville campus on Sunday.

The 18-year-old texted her friends at 1.20am on Saturday to say she was lost on the way to a party near to her home at the Camden Plaza Apartments but never arrived. 

The same friends told police she had been drinking beforehand and last night surveillance images were released by police showing her running inside her apartment block at 9.30pm on the night she went missing.

At the request of the family her address is not being made public.

Last known pictures: Police have released this CCTV footage of Hannah Elizabeth Graham, 18, on the night she disappeared after failing to show up for a party

Search: University of Virginia officials have launched a huge hunt for the missing second year student in nearby woodland. Her parents are from England and she lives in the US on a Green Card

Friends and family have not heard anything from the second year student, whose parents are from England, since and police have launched a desperate search for her in wooded areas. 

It shows what she was wearing on the night she disappeared. Police have said she was 'fairly well intoxicated', according to CBS6.

Her friend, Sophia Lamrissi-Garcia, who was partying with Hannah at one of her sorority events, told the station she had considered getting a cab home, but decided she would walk instead. 


Appeal: Friends and family of the student have asked anyone with any information to call UVA police


Hunt: Police in Charlottesville have announced they are seeking any information from the public as they search for Hannah Elizabeth Graham


Hannah's parents are originally from the north of England - and she has spent at least two years in the United States

Her neighbor, Sam Blum said that he is devastated and worried about her disappearance.
'I saw her on Thursday…she seemed really happy,' said Blum to WTVR. 'Downtown Charlottesville, I wouldn’t expect that.'

The search area for Hannah is being focused around 14th Street Northwest to Wertland Street, including the railroad tracks, near to the UVA campus.

That was where she sent her last text to friends explaining she was lost.

UVA President Teresa Sullivan released a statement Monday afternoon saying the university is both concerned and cooperating fully.

'The members of the University of Virginia community are united in our deep concern for a UVa student who is missing and has not been in touch with her family or friends since early Saturday morning,' said Sullivan according to the Roanoke Dispatch.

Students who didn't know Hannah said they were worried about what it means for campus security,
"I think it's real tragic when anything like this happens," said Brannon Johnson, 4th year at the university to the Roanoke Dispatch.

"It definitely questions everything in terms of safety and how everyone is going to react and move around grounds for sure."

"It kind of hit home that something like this can really happen," said Madison Baril, 1st year at the university.
'Before it was kind of more like stories and warnings, but now it's a real person that's gone.

"If you are with a group of girls, make sure you leave with a group of girls," said Baril. 'Find friends don't wander off with people you just met.'
 

Hannah, who is not a US citizen is 5'11" with blue eyes and light brown hair. She is said to live off campus

Hannah, who is not a US citizen is 5'11" with blue eyes and light brown hair. She lives off campus, is from Northern Virginia and resides in the US using a Green Card.

"As some of you may have heard, Hannah Graham is missing. She was last seen leaving Camden Plaza around 11:50 late Friday night and last heard from a little after 1am, Saturday," one post shared on Facebook states. 

'On Sunday, her friends and family realized that none of them had seen or had contact with her since Friday night and a call was placed to the Emergency Communications Center by her friends, reporting her missing,' said Lt. Ronnie Roberts, of the Charlottesville Police Department to the Daily Progress.

"Police detectives responded immediately and have been working to find Hannah since learning of her disappearance. A search using a bloodhound was conducted Sunday evening, but that search did not turn up anything useful."

Anyone with information is asked to call Charlottesville Police Department at 970-3280 or Crimestoppers at 977-4000. 


David Cawthorne Haines, a Briton, purportedly Beheaded by Islamic State ( IS ) due to Corrupt U.S.A. & U.K. Policies related to GREED [ WARNING: FULL Graphic VIDEO / Pics ] - www.ofINTEREST.net

David Cawthorne Haines, a Briton, purportedly Beheaded by Islamic State (IS) due to Corrupt U.S.A. & U.K. Policies related to GREED [WARNING: FULL Graphic VIDEO / Pics]

Mikhael Love, IIO



The Islamic State group has released what it says is the beheading of British aid worker David Haines - an act described by the British prime minister as "pure evil". Remember though, both the United States of America top dog & the UK's prime minister both have their heads and keep out of harms way. Slaves pay the price for their mistakes and lies.


The video, released on the internet on late on Saturday, shows Haines, 44, being killed by in a desert location by a masked man. Haines, from Perth in Scotland, was abducted last year while working for the French aid agency Acted.

The US and the UK both seemingly have policies that they DO NOT pay off Terrorist, but in fact, for decades both make use a back-handed way of paying off dangerous, even murderous, criminals, that by any other description, are TERRORIST. This is done for some of the time tested reasons of Profit/Gain and/or Control.

Both men have come forth with declaring retaliation against IS. Sound familiar, but with different players (actors)?

The Department of State, aka State Department, has engaged in quite questionable practices and dealing with KNOWN very dangerous and even TERRORIST connected groups throughout the world. The State Dept. in the Benghazi ordeal intentionally put Americans in harms way all for Profit/ Gain and/or Control. Remember all of the finger pointing, lies, cover-ups and/or DECEPTION? They still refuse to come clean.

With having first had dealings with coming to find out the hard way about Department of State CORRUPTION and the USA's willingness to destroy even it's own citizen, I implore others to not stand down, nor stay complacent with tales, demand TRUTH!

Not to take away and/or express disrespect in any form or fashion with these purported beheadings, but my torture and first hand knowledge of Evil & Corruption at the hands of the USA, forced me on a sojourn that was designed by the State Department, and the Truth is a whole lot more unbelievable than fiction: Documentary-maker Lee Halpin meets death living Homeless in U.K. (Pics/VIDEO)

For me, it's not about conspiracy, it's about Truth. Demand It! DO Not be their fool!
Slaves aren't being told the whole Truth, let alone even a fraction of the Truth.

There is definitely something more taking place behind these purported beheadings.
Perhaps the world should be looking back in history with looking how these wars are brought on. Who, why, what and for WHOM do these actually serve.

What is it that "Islamic State" actually wants?

Are Smoke and Mirrors being used?


What is it that the USA, UK & others might actually seeking to gain?

Demand that even slaves are told the Truth!
 



Image of David Cawthorne Haines

David Haines with their youngest child, Athea, now age 4

David Haines has a 17-year-old daughter with his first wife Louise, and a four-year-old daughter with Dragana who described him as a "fantastic man and father".


The video was released hours after Mr Haines's family made a direct plea to his captors to contact them. His second wife, Dragana Prodanovic Haines (pictured with him), previously said she cried for her husband daily

Home: The garden of the house where Mr Haines lived with his wife and four-year-old daughter in Sisak, Croatia

In the video titled "A Message to the Allies of America,  Alan Henning, a second British hostage is paraded before the camera with an ultimatum to the USA & it's allies

'We will hunt them down': David Cameron has vowed justice against extremists who beheaded British aid worker David Haines and paraded another, Alan Henning (pictured in a Syrian refugee camp), in a video

The release of the video comes after the purported beheading of Steven Sotloff and James Foley, both American journalists, in a similar manner.


http://ofinterestnet.blogspot.fr/2014/09/breaking-islamic-state-is-releases.html


http://ofinterestnet.blogspot.nl/2014/08/he-would-have-gone-first-that-is-who-he.html


WARNING: Graphic video content may not be suitable for all ages.
video
WARNING: Graphic video content may not be suitable for all ages.


Some fabulous coverage concerning David Haines can be found here:

'We will hunt down the killers of this British hero': Cameron vows to bring Jihadi John to justice after he beheads David Haines and threatens that second British aid worker will be next

&

and if you are in a country that isn't blocking this video, give it a look see:

The Islamic State group’s power is focused in Iraq and Syria, but there are groups far beyond those borders who have aligned themselves with the armed rebel group. Several small rebel groups in the Philippines have pledged allegiance to the Islamic State group. Al Jazeera’s Jamela Alindogan reports from Manila.

Below is a link to a video related to those groups.

Breakaway Philippine rebels align with IS

 

&, yes that's a BIG &

How the West Created the Islamic State

 September 13th, 2014

“This is an organisation that has an apocalyptic, end-of-days strategic vision which will eventually have to be defeated,” Gen Martin Dempsey, chairman of the US Joint Chiefs of Staff, told a Pentagon press conference in August.

Military action is necessary to halt the spread of the ISIS “cancer,” said President Obama. Yesterday he called for expanded airstrikes across Iraq and Syria, and new measures to arm and train Iraqi and Kurdish ground forces.

“The only way to defeat [IS] is to stand firm and to send a very straightforward message,” declared Prime Minister Cameron. “A country like ours will not be cowed by these barbaric killers.”

Missing from the chorus of outrage, however, has been any acknowledgement of the integral role of covert US and British regional military intelligence strategy in empowering and even directly sponsoring the very same virulent Islamist militants in Iraq, Syria and beyond, that went on to break away from al-Qaeda and form ‘ISIS’, the Islamic State of Iraq and Syria, or now simply, the Islamic State (IS).

Since 2003, Anglo-American power has secretly and openly coordinated direct and indirect support for Islamist terrorist groups linked to al-Qaeda across the Middle East and North Africa. This ill-conceived patchwork geostrategy is a legacy of the persistent influence of neoconservative ideology, motivated by longstanding but often contradictory ambitions to dominate regional oil resources, defend an expansionist Israel, and in pursuit of these, re-draw the map of the Middle East.
 

The Home Depot investigating possible massive data breach: Adds Security Pressure [ Pics/Related info ] - www.ofINTEREST.net


The Home Depot investigating possible massive data breach: Adds Security Pressure

 Mikahel Love, IIO


Summary: Reports are out that a new batch of stolen credit and debit cards hit the cybercrime underground on Tuesday, with multiple banks confirming that The Home Depot stores may be the source.


Home Depot Inc. (HD)’s investigation of a suspected hacker attack is renewing pressure on retailers and credit-card providers to strengthen payment-system security. Home Depot spokesperson Paula Drake confirmed that the company is investigating. “I can confirm we are looking into some unusual activity and we are working with our banking partners and law enforcement to investigate,” Drake said, reading from a prepared statement. “Protecting our customers’ information is something we take extremely seriously, and we are aggressively gathering facts at this point while working to protect customers. If we confirm that a breach has occurred, we will make sure customers are notified immediately. Right now, for security reasons, it would be inappropriate for us to speculate further – but we will provide further information as soon as possible.”

The largest home-improvement chain said yesterday, 02 Sept. 2014, that it was working with banks and law enforcement on the possible incursion, following a report by KrebsOnSecurity that a “massive” batch of stolen credit- and debit-card information was posted for sale online.

There are signs that the perpetrators of this apparent breach may be the same group of Russian and Ukrainian hackers responsible for the data breaches at Target, Sally Beauty and P.F. Chang’s, among others. The banks contacted by Brian Krebs, reporter for KrebsOnSecurity.com, all purchased their customers’ cards from the same underground store – rescator[dot]cc — which on Sept. 2 moved two massive new batches of stolen cards onto the market.

A number of banks are telling Krebs that the breach dates as far back as April and that all 2,200 Home Depot locations in the U.S. could be involved. By comparison, there are 1,795 Target locations in the U.S.. That could make a Home Depot breach even bigger than that of Target, which began in November and was reported in December.

In that breach, Target said hackers had stolen credit or debit card information from about 40 million customers. The company also said criminals had stolen other pieces of personal information, like email and mailing addresses, from about 70 million people.

The number of customers affected by The Home Depot breaches amounts to more than one-third of the American population.

A recent Kaspersky Lab research examination of two command and control servers used by the Backoff point-of-sale malware revealed that a U.S.-based Mexican restaurant chain, a North American freight shipping company and a North American payroll association had also been breached.

The breaches prompted a warning by the U.S. Secret Service last week warning of a spree of point-of-sale attacks affecting more than 1,000 businesses. Backoff has experts concerned because it’s effective in swiping customer credit card data from businesses using a variety of exfiltration tools, including memory, or RAM scraping, techniques, keyloggers and injections into running processes.

A report from US-CERT said attackers use Backoff to steal payment card information once they’ve breached a remote desktop or administration application, one that’s using weak or default credentials that tumble in a brute-force attack.

Hackers then install Backoff on a point of sale device, injecting the code into a running process in order to scrape credit card numbers from memory before they’re encrypted on the device.
 
“The criminals are getting smarter faster than the companies,” said Jaime Katz, an analyst at Morningstar Inc. in Chicago. If the Home Depot breach is on the same scale as Target (TGT)’s incident last year, “there is obviously significant concern,” she said.

Most recently, a group is said to have stolen more than 1.2 billion Internet credentials — including usernames and passwords — with more than 500 million email addresses. In that case, however, most of the IDs exploited were used for sending spam on social networks, rather than illegal spending and selling on the black market.

The Home Depot also posted a note to shoppers on its website, urging them to monitor their accounts and report any suspicious activity.  

Home Depot shares fell 2 percent to $91.15 on 02 Sept. 2014, marking the largest one-day decline in almost five months, after the company said it was looking into the possible breach. It also prompted credit-card companies such as Citigroup Inc. to step up efforts to protect customers.

In a separate statement Tuesday, 02.09.14, Goodwill said its customers' credit and debit card numbers had been stolen at more than 300 stores in 19 states and Washington, D.C. rom February 2013 through Aug. 14. Goodwill blamed the security lapse on an unidentified contractor's payment processing system. Reports about fraud linked to shoppers' cards have been "very limited," Goodwill said.

The company had said in July that it was investigating the breach.

List of affected Goodwill stores: www.goodwill.org/payment-card-notice


( click image to enlarge )

( click image to enlarge )

( click image to enlarge )



More Home Depot BREACHES:

Theft of Home Depot laptop Puts 10,000 at Risk






Home Depot on Wednesday confirmed a company laptop was stolen that contains personal information about approximately 10,000 employees of the do-it-yourself retailing giant.

Several weeks ago, a Home Depot human-resources representative in Massachusetts took a laptop computer home to do some additional work and had the PC stolen from his vehicle parked in front of his house, according to a company official. The notebook stored personal information, including names, addresses and Social Security numbers of roughly 10,000 employees, she says. The data was not encrypted, but the system was password protected, she adds.

Once Home Depot investigated the theft and determined which employees' data was stored on the notebook, the company notified potential victims and is offering one year of credit monitoring for free, the official says.

"We have no reason to believe the data was the target of this theft," says the official, adding that the company has received no evidence of identity theft as a result of the incident.

Home Depot is continuing to work with law enforcement on an investigation into the theft.



RELATED:

Via:
http://arstechnica.com/

Hackers stole security check info on at least 25,000 DHS employees

Homeland Security tallies damage from breach at USIS, and it's not pretty.

by - Aug 30, 2014 3:41 pm UTC

Employees at the Department of Homeland Security may be feeling a bit less secure about their personal data.

On Aug. 2, Department of Homeland Security officials revealed that the agency's contractor for conducting security clearance background checks had been hacked, and an unknown number of DHS employees' personal data from those investigations had been stolen—potentially by a state-sponsored hacker. Now the DHS has a handle on how many records were stolen from contractor USIS: at least 25,000.

The Associated Press cites information from an unnamed DHS official, who spoke with the service under the condition of anonymity. "Homeland Security will soon begin notifying employees whose files were compromised and urge them to monitor their financial accounts," the Associated Press' Joce Sterman reported.

USIS is, as the Washington Post reported, the largest contract provider of background investigations to the federal government. The attack on USIS comes after the March revelation that the US Office of Personnel Management had been attacked by hackers based in China, potentially giving them access to the personal information of millions of government employees—though OPM offficials say that no personal data appeared to have been taken in the attack before it was detected.

The US Computer Emergency Response Team (US-CERT), which is part of DHS, is currently investigating the USIS breach, as are the FBI and other federal authorities. USIS was already under fire from Congress, and faces a federal whistleblower lawsuit over the alleged "dumping" of more than 600,000 background checks for security clearances—marking as complete checks that were only partially conducted. USIS was responsible for the background checks for Edward Snowden, and for Aron Alexis—the man responsible for the shootings at the Navy Yard in Washington, DC last year.



Continued Via

Security breach hit 25,000 federal workers


The estimate of Homeland Security workers affected by the breach at USIS may rise further. (WJLA)

WASHINGTON (AP) - A Homeland Security Department official says a recent computer breach at a major government security clearance contracting firm may have affected the internal files of as many as 25,000 of the agency's workers.

The official says the estimate of Homeland Security workers affected by the breach at USIS may rise further. The official spoke on condition of anonymity in order to discuss details of an incident that is under active federal criminal investigation. Homeland Security will soon begin notifying employees whose files were compromised and urge them to monitor their financial accounts, the official said.

A USIS spokeswoman declined to comment. The company said earlier in a statement on its website that the cyberattack appeared to "have the markings of a state-sponsored attack."

The FBI is investigating.


And Via:
Security Affairs

The network of USIS compromised by a cyber attack

by Pierluigi Paganini on August 12th, 2014

Internal network of USIS was compromised by a cyber attack which has exposed Government Employees’ Data. Investigators speculate on a state-sponsored attack

The USIS (U.S. Investigations Services), which provides background checks for the US government was recently hacked. This is the second data breach in a few months that threaten US government. The USIS recently acknowledged that its network was violated by a cyber attack and experts that are investigating on the case believe that the authors of the attack could be a state-sponsored hacking team.
“We are working closely with federal law enforcement authorities and have retailed an independent computer forensics investigations firm to determine the precise nature and extent of any unlawful entry into our network,” “Experts who have reviewed the facts gathered to date believe it has all the markings of a state-sponsored attack.” announced the USIS in a statement
Early July, alleged Chinese hackers hacked the system of the Office of Personnel Management(OPM), for this reason the USIS is collaborating with the Bureau and the Department of Homeland Security (DHS) to track the authors of the attack and to estimate exactly the compromised data and the impact of the data breach.
Government offices and subcontractors are privileged targets for cyber criminals and state-sponsored hackers, last years according to official documents of The U.S. Department of Energy in different breaches employees’ and contractors’ personal information was exposed.
USIS

The DHS spokesman Peter Boogaard reported to The Hill that groups of hackers are targeting some agency which maintains employees’ information, for this reason the DHS is suggesting to the employees to monitor their financial accounts for suspicious activity and is alerting them on possible spear phishing attacks that could be arranged in the next months to steal further data from Government Offices.
According Boogaard data belonging to some DHS personnel may have been exposed, but at the time I‘m writing there is no news on the number of employee records exposed.
“Our forensic analysis has concluded that some DHS personnel may have been affected, and DHS has notified its entire workforce”  “We are committed to ensuring our employees’ privacy and are taking steps to protect it.” Peter Boogaard said.
The journalists at The Washington Post  exclude a linked between the cyber attack on USIS and the data breach suffered in March 2014 by OPM.
“The intrusion is not believed to be related to a March incident in which the OPM’s databases were hacked, said officials, some of whom spoke on the condition of anonymity because they were not authorized to speak on the record.” states the Washington Post
It’s clear that such attacks represent a serious threat for the US Government, stolen information could be used by bad actors to organize dangerous attacks to critical infrastructure of the country.
Sen. Tom Carper, chairman of the Homeland Security and Governmental Affairs Committee, declared in a statement that this kind of incidents demonstrates the importance of cyber security in Homeland security.
“This latest report of a cyber attack on the major government contractor USIS is deeply troubling and underscores the scary reality of how much of a target our sensitive information has become in cyberspace,” “It also shows how urgent it is that we reform our laws to better combat attacks from malicious actors.” he said. 
The USIS breach “is very troubling news,”  “Americans’ personal information should always be secure, particularly when our national security is involved. An incident like this is simply unacceptable.” added said Sen. Jon Tester (D-Mont.), a Homeland Security Committee member.
It is necessary to improve security of high sensitive networks and maximize the information sharing between private companies and government entities to promptly identify cyber threats and adopt the necessary mitigation strategy.



And Via

China's Hack of 4.5 Million U.S. Medical Records? This Chart Will Make You Sick

Aug 21, 2014 7:26 PM ET

Divya Shroff, associate chief of staff at the Veterans Administration Hospital, left, shows medical students the facility's electronic medical records system in Washington, D.C. - Photographer: Joshua Roberts/Bloomberg

The Chinese hacking group that stole 4.5 million patient records from a Tennessee hospital chain may have gained some bragging rights from the heist, but they haven't come close to entering the ranks of the biggest breaches of all time. In fact, they haven't even cracked the top 10.

The attack has gained notoriety for its methods, rather than its size — the hacking group has been prolific in attacking U.S. medical-device companies and drug makers. The chart below shows how the Chinese breach compares with others.
\
The ranking provides little solace if you're one of the people whose personal information was stolen and used for identity theft. Yet, with security-software maker Symantec calling this the era of the "mega-breach" and some attacks hitting the nine digits, it's worth remembering that hackers have many, many other ways to obtain personal information. 




MORE:

Who will be the NEXT Target? Those of Poverty?

Mikahel Love, IIO

Inside a warehouse of a thriving non-profit business that uses the poor for business

It seems that businesses such as Home Depot, Target, Albertson's, Target, Michaels, Neiman Marcus, Sally Beauty, P.F. Chang’s China Bistro and SuperValu, as well as, some preferred banks appear to the targets, there resides a mountain of personal data including Social Security numbers, bank account info and even drivers license details held in insecure and vulnerable so-called non-profits: Food Banks and Food Pantries.



These so-called non-profit businesses have been collecting personal details for some time now. With investigating into how secure those of poverty details are, we found that security seemed to be brushed off and/or at most, bare security features were being used.


Although, one wouldn't think that a person who must go to a Food Bank and/or Food Pantry for what to eat would have huge amounts of money and/or assets on hand to steal, there are a multitude of other reasons why identity theft takes place: elections; travel; committing a crime to implicate another ...

It appears there exist hardly any security safe-guards in place to protect identity theft of those who MUST surrender personal details to eat: The abused and/or those of poverty in the U.S..

Not one food pantry expressed any law in place that commanded them to make clients surrender their personal details as they would when applying for a loan, government assistance, etc.

Could it be that Food Pantries and Food Banks are a cloaked arm of government?

DO NOT rely upon governments and/or others to safe-guard your personal details. YOU must be vigilant.



More:

500
you shouldn't be using:
 Mikhael Love, IIO

While it's not entirely sure how the recent theft of several celebrities’ private photos was carried out, the leading theory places the blame on a vulnerability in iCloud, Apple’s Internet storage system. 

Specifically, one such theory goes, the hacker (or hackers) was able to nail down the iCloud passwords of the celeb victims and root around in their Apple storage lockers after gaining access. The responsible party may have used a tool called iBrute, according to The Daily Dot, which exploited a (since-fixed) iCloud bug that allowed a forced digital entry by guessing several common passwords until the correct one unlocked the front door. 

It hasnt been confirmed that iBrute was used; the tool’s creator sees no evidence that it was, but concedes that it’s possible. iBrute used 500 of the most common passwords that were leaked from a service called RockYou, which leaked out 32 million usernames and passwords way back in 2009; the tool’s creators posted those passwords in a long list on the developer site GitHub.

Listed below are 500 common passwords below. The passwords that iBrute worked with included one capital letter and one number, so old standbys like “password” and “iloveyou” do not appear here.  

Even though these passwords are from 2009, the Great Celebrity Hack of 2014 serves as another reminder that if you use any of the following 500 passwords on any service, it’s way past time for a change.

Oh yes, and while you’re at it, you should make sure that you have two-factor authentication enabled on any account that offers it, and make sure you’re using as strong a password as possible. And remember, "Think SMART when developing a PASSWORD!

( click image to enlarge )

( click image to enlarge )
( click image to enlarge )