Gary Busey – Entertainer, Activist
Actor, Musician, Activist “It’s time for American citizens to stand up and pay attention to what we’re here for, and what this country was founded upon…and where it could be going if we, each one of us, does not stand up and write our congressman and senators and let them... Read more
The Edward Snowden guide to encryption: Secret 12-minute homemade video
Snowden made video to teach reporter how to speak with him securely It explains how to use Public Key Encryption to scramble online messages Privacy campaigners call on ordinary people to learn how to use the method +4 Whistleblower: The tutorial Edward Snowden made for reporters on to avoid... Read more
U.N. Calls For ‘Anti-Terror’ Internet Surveillance
United Nations report calls for Internet surveillance, saying lack of “internationally agreed framework for retention of data” is a problem, as are open Wi-Fi networks in airports, cafes, and libraries. The United Nations is calling for more surveillance of Internet users, saying it would help to investigate and prosecute... Read more
Whonix: The Anonymous Operating System
Whonix is an anonymous general purpose operating system based on Virtual Box, Ubuntu GNU/Linux and Tor. By Whonix design, IP and DNS leaks are impossible. Not even malware with root rights can find out the user’s real IP/location. Whonix consists of two machines, which are connected through an isolated... Read more
The Supreme Court Isn’t Bothered By the NSA’s Warrantless Wiretapping
The Supreme Court refused to hear a case on Tuesday that holds telecom companies accountable for letting the National Security Agency spy on unknowing Americans without a warrant. Dating back to 2006 when the American Civil Liberties Union and the Electronic Frontier Foundation first filed the class-action lawsuit, the... Read more
You Might Be Considered a “Potential Terrorist” By Government Officials If….
Find Out If You Are Doing Things Which Might Be Considered Suspicious There have been so many anti-terrorism laws passed since 9/11 that it is hard to keep up on what kinds of things might get one on a “list” of suspected bad guys. We’ve prepared this quick checklist... Read more
Micro-Drone: Mosquito Cyborg Spy with On-Board RFID NanoTech
  You are looking at an insect spy drone for urban areas, already in production, funded by the US Government. It can be remotely controlled an is equipped with a Camera and Microphone.  It can land on you and may have the potential to take a DNA sample, or... Read more
Shredding the Constitution: National Detention, Targeted Killing and Spying Cases
Indefinite detention, targeted killing and warrantless wiretapping are hot issues in the courts this week. Here’s the latest: INDEFINITE DETENTION // The National Defense Authorization Act (NDAA) of 2012 provision that allows the government to indefinitely detain US citizens without charge or trial is once again in effect, after... Read more
Keeping the Government Out of Your Smartphone
Smartphones can be a cop’s best friend. They are packed with private information like emails, text messages, photos, and calling history. Unsurprisingly, law enforcement agencies now routinely seize and search phones. This occurs at traffic stops, during raids of a target’s home or office, and during interrogations and stops... Read more
Private Investigator Steven Rambam’s Privacy Post-Mortem: OWS Attendee’s ID’d by Cell Phone Sniffers
While we in the civil liberties community disagree strongly with private investigator Steven Rambam‘s admonition to “Get Over It,” after listening to him describe electronic surveillance powers it’s hard to disagree with the first part of the title of his talk: “Privacy Is Dead.” (Part two of the talk... Read more
TheIntelHub Radio: Max Maverick Guest Appearance on the Bob Tuskin Show
Topics of Discussion: Police State Build Up Surveillance Technology Life After Martial Law Elite Globalist Agenda Specific Solutions for Humanity Bob Tuskin An eternal student of economics, science and the arts. His radio career began at age 15, then with 911 as the backdrop, his activist side began to... Read more
1 Billion Invested: FBI Launches Facial Recognition Project
The Next Generation Identification programme will include a nationwide database of criminal faces and other biometrics “FACE recognition is ‘now’,” declared Alessandro Acquisti of Carnegie Mellon University in Pittsburgh in a testimony before the US Senate in July. It certainly seems that way. As part of an update to... Read more
Cryptoparty Goes Viral: Pen testers, Privacy Geeks Spread Security to the Masses
Security professionals, geeks and hackers around the world are hosting a series of cryptography training sessions for the general public. The ‘crytoparty’ sessions were born in Australia and kicked off last week in Sydney and Canberra along with two in the US and Germany. Information security experts and privacy... Read more
PRIVACY SOS: Remote Monitoring & Access, Spy Tech Secretly Embeds Itself In Phones
In 2008, a Reston, VA based corporation called Oceans’ Edge, Inc. applied for a patent. On March, 2012 the company’s application for an advanced mobile snooping technology suite was approved. The patent describes a Trojan-like program that can be secretly installed on mobile phones, allowing the attacker to monitor... Read more
Fault Lines: Controlling the Web – Mini Documentary by Al Jazeera
In January 2012, two controversial pieces of legislation were making their way through the US Congress. SOPA, the Stop Online Piracy Act, and PIPA, the Protect Intellectual Property Act, were meant to crack down on the illegal sharing of digital media. The bills were drafted on request of the... Read more
#OpBigBrother – EMERGENCY ALERT ABOUT WORLDWIDE SURVEILLANCE FROM ANONYMOUS
For years Anonymous worked hard to protect our world and its peoples. NOW LISTEN CAREFULLY, This is an ALERT ABOUT SURVEILLANCE. Privacy of the people all over the world is suffering more and more outrages. We should not tolerate it. Cameras are everywhere even in our sky, and robots... Read more
Pre-Crime Software Moves One Step Closer to Reality
The era of Big Data is upon us. Major corporations in the areas of advertising, social media, defense contracting, and computing are forming partnerships with government agencies to compile virtual dossiers on all humans. This data integration initiative is taking place across the board in our largest federal agencies... Read more
TRAPWIRE: Wikileaks Drops a Surveillance Bombshell – Widescale Facial Recognition & Behavior Pattern Mapping
Former senior intelligence officials have created a detailed surveillance system more accurate than modern facial recognition technology — and have installed it across the US under the radar of most Americans, according to emails hacked by Anonymous. Every few seconds, data picked up at surveillance points in major cities... Read more
Why I Left Google
Ok, I relent. Everyone wants to know why I left and answering individually isn’t scaling so here it is, laid out in its long form. Read a little (I get to the punch line in the 3rd paragraph) or read it all. But a warning in advance: there is no... Read more
August 3, 2012 – DCMX Radio: Re-cap Week’s Alternative News, Intro to CyberWar: Viruses, Hacking, & Black Security Breaches, Protecting Your Computer, Securing Your Internet Connection & Maintaining Privacy Online
Cyber Security Industry Explosion, Intelligence Spying, Data-mining, Black-Hats, White-Hats, Gray-Hats abound. Alphabet Agencies, Corrupt Globalist Corporations exploiting your info. Micro Tutorial on Protecting Your Computer, Securing Your Internet Connection, Maintaining ‘some’ Privacy Online Every Week Night 12-1am EST (9-10pm PST) Read more
  “If you’re concerned about it, maybe there’s a reason we should be flying over you, right?” said Douglas McDonald, the company’s director of special operations and president of a local chapter of the unmanned vehicle trade group. LAKOTA, N.D. – The use of unmanned aerial drones, whose deadly... Read more
How To Hack Satellite Internet & Surf Anonymously
  A Spanish researcher demos new satellite-hijacking tricks with cybercriminal potential. Satellites can bring a digital signal to places where the Internet seems like a miracle: off-the-grid desert solar farms, the Arctic or an aircraft carrier at sea. But in beaming data to and from the world’s most remote... Read more
14 Incredibly Creepy Surveillance Technologies That Big Brother Will Be Using To Spy On You
Most of us don’t think much about it, but the truth is that people are being watched, tracked and monitored more today than at any other time in human history. The explosive growth of technology in recent years has given governments, spy agencies and big corporations monitoring tools that... Read more
Encryption Becomes Illegal In the UK: Jail Time For Failure To Provide Keys
There was some surprise in the comments of yesterday’s post over the fact that the United Kingdom has effectively outlawed encryption: the UK will send its citizens to jail for up to five years if they cannot produce the key to an encrypted data set. First of all, references... Read more
Soul Rape: New Scanners Will Instantly Know Everything About You From 50m Away
Within the next year or two, the U.S. Department of Homeland Security will instantly know everything about your body, clothes, and luggage with a new laser-based molecular scanner fired from 164 feet (50 meters) away. From traces of drugs or gun powder on your clothes to what you had... Read more