Web Analytics Made Easy -
Decrypted Matrix Truth Seekers Archive
Hacked Intel Email: NYPD Involved in “Damn Right Felonious Activity”
The New York City Police Department (NYPD) really has gone rogue; at least that’s what a high-level FBI official believes. Among the 5 million emails the group Anonymous hacked from the servers of private intelligence firm Stratfor in February, one seems to not only confirm the controversial NYPD surveillance... Read more
Thousands of UK Workers ‘Blacklisted’ Over Political Views
Activists threaten legal action over failure to investigate Corporations in the UK who used a secret “blacklisting” database to screen out ‘left wing trouble-makers’ and union sympathizers as potential job recruits are facing renewed scrutiny after the UK-activist group Liberty called for a fresh investigation Monday night. A demonstration... Read more
Former US Service Member DETAINED via NDAA for Anti-Government Facebook Posts
http://www.youtube.com/watch?v=UVWA_u6Uk_Q The Police, FBI and Secret Service swarmed in and took Brandon Raub to John Randolph Metal Hospital.   This patriotic Marine had posted 5 posts on the Dont-Tread-On.Me blog linked below.  Just glancing over them they seem to be of the religious and patriotic fight for truth and... Read more
FinFisher Illegal Spyware Found On At Least Five Continents
The FinFisher spyware made by U.K.- based Gamma Group likely has previously undisclosed global reach, with computers on at least five continents showing signs of being command centers that run the intrusion tool, according to cybersecurity experts. FinFisher can secretly monitor computers — intercepting Skype calls, turning on Web... Read more
Out of Control: Flame, Stuxnet, and the Cyber-Security Landscape
Big Brother is watching. No kidding. And the warning is coming from none other than Google, which says government spies may be spying on you. Some believe the Google announcement may be related  to the recent discovery of the data-mining virus named “Flame.” In a June 3 New York... Read more
Congress: Trading Stocks on Insider Information?
  SOURCE: CBSNews Read more
InfoGraphic: Vaccines History – 1940 – 1980 -2012
Educate before you Vaccinate. Proud Parents of unvaccinated Children – find them on Facebook. Read more
LOBBYING: Closer to Bribery, or Extortion?
We’ve certainly talked quite a bit about the institutional-level corruption of the way Congress and lobbying works, but a recent This American Life episode, done in partnership with thePlanet Money team takes a much deeper dive into how lobbying works. You absolutely should listen to it. It’s really fascinating, even for folks who follow a... Read more
Raw Milk Advocate James Stewart Arrested & Assaulted by Government Impersonator Bounty Hunters
James Stewart, the 65-year-old raw “milk man” and founder of Rawesome Foods, was assaulted near his home today by three armed men driving unmarked luxury vehicles with no license plates. Carrying firearms on their hips and dressed in gangster-style street clothes, Satanic T-shirt imagery and tattoos, they claimed to... Read more
Sex, Technology, and its Harm To Children
Information technology, among all that it does, brings together two things which are wonderful when apart, and frightening when combined: children, and sex. For the past couple decades, this has, understandably, freaked us all out. We need to calm down and have a talk about it. In his defense... Read more
FBI Wants To Make It Easier For You To Tell Your Customers They Might Be Felonious Pirates
The following may look familiar to you: It’s the FBI’s special “anti-piracy” warning. For the past few years, under a special “pilot” program, the FBI has allowed the RIAA, MPAA, BSA, ESA and SIIA (basically, the big record labels, movie studios, video game makers and software companies) to make... Read more
Encryption Becomes Illegal In the UK: Jail Time For Failure To Provide Keys
There was some surprise in the comments of yesterday’s post over the fact that the United Kingdom has effectively outlawed encryption: the UK will send its citizens to jail for up to five years if they cannot produce the key to an encrypted data set. First of all, references... Read more
Americans Are Being Prepared For Full Spectrum Tyranny
Totalitarian governments, like persistent forms of cancer, have latched onto the long history of man, falling and then reemerging from the deep recesses of our cultural biology to wreak havoc upon one unlucky generation to the next. The assumption by most is that these unfortunate empires are the product... Read more
NZ Judge: Raid on Megaupload’s Kim Dotcom Illegal, Search Warrants Unlawful
Published: 28 June, 2012, 10:15 The High Court of New Zealand has ruled that the police raid on Kim Dotcom’s mansion was unlawful along with seizure of the hard drives that were later cloned and illegally taken from New Zealand to the US by the FBI. ­The warrants issued... Read more
The Warlord and the Basketball Star: A Story of Congo’s Corrupt Gold Trade
When an athlete-turned-humanitarian and an energy executive tried to buy gold in Kenya, they found themselves mired in Congo’s dangerous world of conflict minerals — and totally outmatched.  Former NBA player Dikembe Mutombo, left, on a humanitarian trip to Kenya. Right, warlord Bosco Ntaganda speaking to reporters in eastern... Read more
Propaganda Firm Leonie Owner Admits Targeting Journalists
WASHINGTON – The co-owner of a major Pentagon propaganda contractor publicly admitted Thursday that he was behind a series of websites used to discredit two USA TODAY journalists who had reported on the contractor. Screengrab from home page of leoniegroup.comCamille Chidiac, a minority owner of Leonie Industries, says he... Read more
US Police Can Copy Your iPhone’s Contents In Under Two Minutes
It has emerged that Michigan State Police have been using a high-tech mobile forensics device that can extract information from over 3,000 models of mobile phone, potentially grabbing all media content from your iPhone in under two minutes. The CelleBrite UFED is a handheld device that Michigan officers have been using since... Read more
How the US Uses Sexual Humiliation as a Political Tool to Control the Masses
In a five-four ruling this week, the supreme court decided that anyone can be strip-searched upon arrest for any offense, however minor, at any time. This horror show ruling joins two recent horror show laws: the NDAA, which lets anyone be arrested forever at any time, and HR 347,... Read more
Map of US Police Departments’ Policies on Tracking Cell-Phone Use Without a Warrant
ACLU affiliates across America requested information on local law enforcement’s use of cell-phone tracking, and received a wealth of disturbing information about the extent of wireless tracking. They produced a map showing which police departments were discovered to be tracking people’s phones without a warrant, either by getting gutless... Read more
Operation COLTAN: Raising Awareness of the Slave Labor Exploitation Super Mineral
Coltan: What You Should Know What is Coltan? Coltan is short for Columbite-tantalite – a black tar-like mineral found in major quantities in the Congo.. The Congo possesses 80 percent of the world’s coltan. When coltan is refined it becomes a heat resistant powder that can hold a high... Read more
First Man Arrested With Drone Evidence Vows to Fight Case
The tiny town of Lakota, N.D., is quickly becoming a key testing ground for the legality of the use of unmanned drones by law enforcement after one of its residents became the first American citizen to be arrested with the help of a Predator surveillance drone. The bizarre case... Read more
Cops can request a copy of your complete Facebook activity
If police officers were to file a subpoena for your Facebook information, they would receive a printout of the data from the social network. This printout would be so detailed, complete and creepy that you should strive to be a good law-abiding citizen, just to prevent it from ever existing. We... Read more
Twitter, the FBI, and You
In the future, if you tweet out a photo of a hilarious, meme-tastic kitten, it might be best not to include terms like “white powder,” “dirty bomb,” or “Death to America.” Since late January, the Federal Bureau of Investigation has been asking the IT industry to help it develop an... Read more
STOP CISPA: Come Togeter – Take Action
COME TOGETHER TO STOP CISPA! WHAT IS CISPA? The Cyber Intelligence Sharing and Protection Act (H.R. 3523) is a bill introduced in the United States House of Representatives by Reps. Mike Rogers (D-MI) and C.A. “Dutch” Ruppersberger (D-MD) in late 2011. It amends the National Security Act of 1947... Read more
Dis-Info Campaign Against Journalists Who Investigate Contracting Firms
(Left) Tom Vanden Brook (on C-Span in 2010), a senior reporter for USA Today apparently targeted by a cyber-attack of misinformation and harassment. Photograph: guardiannews.com The report by USA Today in which two of the paper’s employees became targets of a widespread and dishonest online disinformation campaign immediately after making inquiring calls to... Read more