On November 9th, 2021, St. Gabriel Communications, 88.5 mhz, Adel, IA, filed an application with the Federal Communications Commission for authority to construct a new noncommercial educational FM broadcast station to operate on 89.9 mhz, at Mason City, IA. Members of the public wishing to view this application or obtain information about how to file comments and petitions on the application can visit https://enterpriseefiling.fcc.gov/dataentry/views/public/nceDraftCopy?displayType=html&appKey=25076f917ce2e04b017d002e8c140a22&id=25076f917ce2e04b017d002e8c140a22&goBack=N#sect-chanFacility

On November 9th, 2021, St. Gabriel Communications, 88.5 FM, Adel, IA, filed an application with the Federal Communications Commission for authority to construct a new noncommercial educational FM broadcast station to operate on 89.9 FM, at Spencer, IA. Members of the public wishing to view this application or obtain information about how to file comments and petitions on the application can visit https://enterpriseefiling.fcc.gov/dataentry/views/public/nceDraftCopy?displayType=html&appKey=25076f917ce2e04b017ce708493e0cfb&id=25076f917ce2e04b017ce708493e0cfb&goBack=N
Breakthrough Web Design - 515-897-1144 - Web sites for businesses
News & Entertainment for Mason City, Clear Lake & the Entire North Iowa Region

Founded October 1, 2010


Hackers claim to have exposed nearly 171,000 military email accounts



This news story was published on March 27, 2012.
Advertise on NIT Subscribe to NIT

By Salvador Rodriguez, Los Angeles Times –

LOS ANGELES —The hacker group known as LulzSec appears to be back after many months of laying low, claiming to have exposed the accounts of nearly 171,000 members of the military.

The group, which in 2011 went after government agencies and companies including the FBI, CIA, Sony and the Public Broadcasting Service, claims to have exposed the email accounts of thousands of members on the website MilitarySingles.com.

“There are emails such as @us.army.mil; @carney.navy.mil; @greatlakes.cnet.navy.mil; @microsoft.com; etc.,” the group said in a note posted on the website PasteBin.

The group said it dumped a database including a total of 170,937 email accounts from the website, which bills itself as “the dating site for single soldiers.”

The Pentagon could not be reached for comment about the severity of the database dump.

After a busy summer of 2011, LulzSec has not posted on its Twitter account since late July, and since then, some members of the group have been arrested.

The latest posts came from a different account, with the handle @lulzboatR and name “LulzSec Reborn.”

The account began posting again March 8, and posted a YouTube video titled “Lulz Security is reborn!,” which plays a pirate song.

LulzSec began as a group of hackers that were originally part of the decentralized Internet group Anonymous. The original members of LulzSec claimed they went after companies and organizations to expose security holes and, of course, for the “lulz,” or for kicks or giggles.

Need help with your website?
Call your local professional,
Breakthrough Web Design:
515-897-1144
or go to
BreakthoughWebDesign.com

Leave a Reply

Your email address will not be published.

 characters available