shopify traffic stats
Mysterious Shadow Hackers: The Equation Group
An unnamed scientific researcher walks out to her mailbox, shuffles through some bills and advertisements, and pulls out an envelope containing a CD of pictures from a recent scientific conference the researcher had attended in Houston. Excited – though maybe a bit nervous – to see the candid photos... Read more
Chemtrails Exposed: A History of the New Manhattan Project
“Discoveries and inventions are not terminals; they are fresh starting points from which we can climb to new knowledge.” – Dr. Willis R. Whitney, founder of General Electric Laboratories After so many years of watching airplanes produce the lines in the sky, largely without knowing of what this Project... Read more
Home Hacks and Smart Grids: Data Theft Made Even Simpler
There is often times a trade-off between security and convenience. The more easily you can access your personal data, the easier someone else can too, making anything that you put online a potential target for hackers. A growing source of concern for many people is their home security and... Read more
DEEP UNDERGROUND MILITARY BASES IN AMERICA
Unknown to most Americans is a dark secret, and it’s right under our noses. It’s the reality of the existence of DEEP UNDERGROUND MILITARY BASES. These Underground bases get prominent play in dark rumors circulating about captured extraterrestrials and alien technology. The fringe culture rumors of underground alien-human shenanigans... Read more
Mehran Tavakoli Keshe – Science, Free Energy
Mehran Tavakoli Keshe is an Iranian-born (in 1958) nuclear engineer known for his research on plasma reactors and interests in free energy applications and for his claim that he pioneered a space technology that was, according to some, used by Iran and resulted in the subdue and capture of a US... Read more
Coral Castle

Coral Castle

Black Technology December 9, 2014 0

Coral Castle is a stone structure created by the Latvian-American eccentric and mysterious Edward Leedskalnin north of the city of Homestead, Florida in Miami-Dade County at the intersection of South Dixie Highway and SW 157th Avenue. Read more
Your Voice is Being Used to ID and Track You
Voice biometrics—the use of voice-recognition software to record and use your speech patterns as a unique “fingerprint” that can be used to identify you—will be increasingly standardized for government and businesses in the next two to three years Everybody has a unique voice—and it can now be used to track... Read more
Extraterrestrial UFOs are real : Ben Rich Lockheed Skunk Works CEO Admits
Ben Rich, the “Father of the Stealth Fighter-Bomber” and former head of Lockheed Skunk Works,had once let out information about Extraterrestrial UFO Visitors Are Real. He states “we’ve” been to the stars” and “have the technology to go to the stars”, however, put in context–as many insiders believe–we’ve been... Read more
The NSA Helped Israel Blackmail Palestinians
Scores of former members of Israeli military intelligence’s very secret and quite elite Unit 8200 have publicly refused to collect information that is “used for political persecution” or “driving parts of Palestinian society against itself.”Courteous allies at the NSA, we now know, helped make that spying possible. The news... Read more
The NSA Was Going to Fine Yahoo $250K a Day If It Didn’t Join PRISM
When we first learned about NSA metadata collection, we wondered how readily the biggest tech companies acquiesced to the government. Today we start to find out. This is the story of how Yahoo was coerced into PRISM, as told by court documents cited by the Washington Post today. According... Read more
Hack Back: A DIY Guide for Those Without the Patience to Wait for Whistleblowers
  –– Introduction I’m not writing this to brag about what an 31337 h4x0r I am and what m4d sk1llz it took to 0wn Gamma. I’m writing this to demystify hacking, to show how simple it is, and to hopefully inform and inspire you to go out... Read more
Raw List of NSA Nicknames and Codewords
Below is a listing of nicknames and codewords related to US Signals Intelligence (SIGINT) and Communications Security (COMSEC). Most of them are from the NSA, some are from other government or military agencies. Some of them also have an abbreviation which is shown in brackets. NICKNAMES are generally unclassified. NSA... Read more
Science Faction?
In a somewhat disturbing case of life imitating art, it seems that real world turmoil is catching up with classic science fiction projections of a dystopian future as envisioned by writers like George Orwell and Ray Bradbury — a world where the general populace is under constant surveillance, and... Read more
DARPA Hackers Show How Cars Can Be Remotely Controlled
Hackers Chris Valasek and Charlie Miller have demonstrated from the backseat of a Toyota Prius that all you need is a Macbook and a USB cable in order to hack into a computer-controlled car. Valasek is the director of security intelligence for IOActive and Miller is a security engineer... Read more
Americas Most Secret Structures
http://youtu.be/HT-pJboZjxo Explore the world of secret structures- government labs, experiments gone wrong, anything is possible with Deep Underground Military Bases. Read more
Newly Released Drone Records Reveal Extensive Military Flights in U.S.
Via: Electronic Frontier Foundation: Today EFF posted several thousand pages of new drone license records and a new map that tracks the location of drone flights across the United States. These records, received as a result of EFF’s Freedom of Information Act (FOIA) lawsuit against the Federal Aviation Administration... Read more
Public Buses Across Country Quietly Adding Microphones to Record Passenger Conversations
Transit authorities in cities across the country are quietly installing microphone-enabled surveillance systems on public buses that would give them the ability to record and store private conversations, according to documents obtained by a news outlet. The systems are being installed in San Francisco, Baltimore, and other cities with... Read more
Biometric Voice-Identification Technology Leads to Arrests of Terrorist Suspects in Europe
Officials who apparently thwarted an alleged terror plot against Europe used voiceprinting technology to catch several suspects. The British Government Communications Headquarters, which snoops on criminal suspects and works with MI6 spies, used voice identification technology to help uncover the plot, AP says. Several of the voices were recorded... Read more
Stingrays: The Biggest Technological Threat to Cell Phone Privacy You Don’t Know About
  On Friday, EFF and the ACLU submitted an amicus brief in United States v. Rigmaiden, a closely-followed case that has enormous consequences for individuals’ Fourth Amendment rights in their home and on their cell phone. As the Wall Street Journal explained today, the technology at the heart of... Read more
Boeing Develops Flying Blackout Drone to Deliver Targeted EMP
While everyone in Washington is talking about the upcoming presidential debate today, one of the U.S. Air Force’s newest high-tech toys was taking big step — er, flight — forward. The Counter-electronics High-powered Microwave Advanced Missile Project (CHAMP) is an effort to build a missile that flies over —... Read more
Space Weapons: Russia’s Zombie Gun Technology
http://youtu.be/fQG3YO9RrmQ Military and technology analyst Andy Lightbody talked about the mind-altering ‘zombie’ gun being developed by Russia and North Korea’s failed missile testing. Andy Lightbody was the Military & Aerospace Editor for CBS Radio, the Gulf War Military Analyst for Channel 11 –Multi Media Television–Los Angeles (Now FOX News),... Read more
DARPA And Navy Reveal Advanced Technology For Naval Warfare
The Defense Advanced Research Projects Agency’s (DARPA) new director, Dr. Arati Prabhakar, will share her vision Oct. 22 at the Office of Naval Research (ONR) 2012 Naval Science and Technology Partnership Conference and ASNE Expo. Prabhakar, who took the helm at DARPA on July 30, will take the podium at 11:30 a.m. on the... Read more
How To Secure Your Android Phone Like the NSA
Rejoice, paranoid security fanatics! There’s finally a version of Android that enables your obsessive need to lock and control each and every file on your mobile device. There’s just one catch: you’ve got to trust the National Security Agency to use it. The NSA has released its security-enhanced version... Read more
TrapWire Tied to Anti-Occupy Internet-spy Program Tartan by NTrepid Abraxas Cubic
How do you make matters worse for an elusive intelligence company that has been forced to scramble for explanations about their ownership of an intricate, widespread surveillance program? Just ask Cubic, whose troubles only begin with TrapWire. Days after the international intelligence gathering surveillance system called TrapWire was unraveled... Read more
Micro-Drone: Mosquito Cyborg Spy with On-Board RFID NanoTech
  You are looking at an insect spy drone for urban areas, already in production, funded by the US Government. It can be remotely controlled an is equipped with a Camera and Microphone.  It can land on you and may have the potential to take a DNA sample, or... Read more