Oct 24, 2014 | Enlightened Influences
Actor, Musician, Activist “It’s time for American citizens to stand up and pay attention to what we’re here for, and what this country was founded upon…and where it could be going if we, each one of us, does not stand up and write our...
Oct 18, 2014 | Activism, News
Few websites have demonstrated the resilience of distributed infrastructure quite like The Pirate Bay. Despite facing legal action across multiple countries, hardware seizures, domain takedowns, and the imprisonment of its founders, the torrent tracking platform has...
May 15, 2014 | Anonymous, Leaks, News, Video
Privacy advocates urged everyday internet users to adopt email encryption after a previously unseen tutorial video created by Edward Snowden became publicly available in May 2014. The former NSA contractor produced the 12-minute clip to teach journalists how to...
Oct 24, 2012 | News
UN Report Pushes for Expanded Internet Monitoring In October 2012, the United Nations released a 148-page report titled “The Use of the Internet for Terrorist Purposes,” calling for increased surveillance of internet users as a tool for investigating and...
Oct 13, 2012 | Anonymous, Survivalism
Whonix is an anonymous general purpose operating system based on Virtual Box, Ubuntu GNU/Linux and Tor. By Whonix design, IP and DNS leaks are impossible. Not even malware with root rights can find out the user’s real IP/location. Whonix consists of two...
Oct 10, 2012 | Activism, News
Supreme Court Declines to Review NSA Surveillance Case In October 2012, the U.S. Supreme Court refused to hear a case challenging telecom companies’ cooperation with the National Security Agency’s warrantless surveillance of American citizens. The decision...
Oct 2, 2012 | Activism, News, WAR: By Design
Everyday Actions That Could Flag You as a Suspected Terrorist Since the September 11 attacks, a staggering number of anti-terrorism statutes have been enacted across the United States. The sheer volume of these laws makes it nearly impossible for ordinary citizens to...
Sep 28, 2012 | Black Technology, Government Agenda
You are looking at an insect spy drone for urban areas, already in production, funded by the US Government. It can be remotely controlled an is equipped with a Camera and Microphone. It can land on you and may have the potential to take a DNA sample, or leave...
Sep 28, 2012 | Activism, News
In September 2012, three major legal battles over civil liberties converged in American courts. Cases involving indefinite detention, targeted killing by drones, and warrantless surveillance each tested the boundaries between national security authority and...
Sep 27, 2012 | Abuses of Power, Activism
Smartphones can be a cop’s best friend. They are packed with private information like emails, text messages, photos, and calling history. Unsurprisingly, law enforcement agencies now routinely seize and search phones. This occurs at traffic stops, during raids...
Sep 27, 2012 | Abuses of Power, Government Agenda, Video
While we in the civil liberties community disagree strongly with private investigator Steven Rambam’s admonition to “Get Over It,” after listening to him describe electronic surveillance powers it’s hard to disagree with the first part of the...
Sep 25, 2012 | DCMX Radio
Topics of Discussion: Police State Build Up Surveillance Technology Life After Martial Law Elite Globalist Agenda Specific Solutions for Humanity Bob Tuskin An eternal student of economics, science and the arts. His radio career began at age 15, then with 911 as the...
Sep 7, 2012 | Government Agenda, News
The FBI invested approximately one billion dollars in the Next Generation Identification (NGI) program, a massive upgrade to the national fingerprint database that incorporated facial recognition technology, iris scans, DNA analysis, and voice identification into a...
Sep 4, 2012 | Anonymous, News
Security professionals, geeks and hackers around the world are hosting a series of cryptography training sessions for the general public. The ‘crytoparty’ sessions were born in Australia and kicked off last week in Sydney and Canberra along with two in the...
Aug 23, 2012 | Black Technology, News
In 2008, a Reston, VA based corporation called Oceans’ Edge, Inc. applied for a patent. On March, 2012 the company’s application for an advanced mobile snooping technology suite was approved. The patent describes a Trojan-like program that can be secretly...
Aug 20, 2012 | Globalist Corporations, Video
In January 2012, two controversial pieces of legislation were making their way through the US Congress. SOPA, the Stop Online Piracy Act, and PIPA, the Protect Intellectual Property Act, were meant to crack down on the illegal sharing of digital media. The bills were...
Aug 16, 2012 | Anonymous
For years Anonymous worked hard to protect our world and its peoples. NOW LISTEN CAREFULLY, This is an ALERT ABOUT SURVEILLANCE. Privacy of the people all over the world is suffering more and more outrages. We should not tolerate it. Cameras are everywhere even in our...
Aug 14, 2012 | Black Technology, News, Video
The age of massive data aggregation has arrived, and with it comes a convergence of corporate power and government surveillance that threatens to blur the line between security and totalitarian control. Defense contractors, advertising firms, social media platforms,...
Aug 10, 2012 | Leaks, News
A Covert Surveillance Network Hidden in Plain Sight Leaked emails obtained by the hacktivist collective Anonymous revealed the existence of a sprawling surveillance apparatus operating across the United States, largely without public knowledge. The system, known as...
Aug 9, 2012 | Activism, Globalist Corporations
From Innovation Factory to Advertising Machine In March 2012, James Whittaker, a former Google engineering director, published an account of his departure from the company that resonated widely across the technology industry. His central thesis was straightforward:...
Aug 3, 2012 | DCMX Radio
Cyber Security Industry Explosion, Intelligence Spying, Data-mining, Black-Hats, White-Hats, Gray-Hats abound. Alphabet Agencies, Corrupt Globalist Corporations exploiting your info. Micro Tutorial on Protecting Your Computer, Securing Your Internet Connection,...
Jul 23, 2012 | Black Technology, News
Predator Drone Used to Arrest North Dakota Farmer on His Own Land In Lakota, North Dakota, the same unmanned aerial technology that transformed military operations over Iraq and Afghanistan found a controversial new mission: domestic law enforcement on American soil....
Jul 15, 2012 | Anonymous
Satellite Internet Signals Vulnerable to Interception and Hijacking Satellite internet brings connectivity to some of the most remote locations on Earth — desert installations, Arctic outposts, and naval vessels at sea. But the same broad signal coverage that makes...
Jul 14, 2012 | Black Technology, News
Surveillance technology has evolved at an alarming rate, granting governments, intelligence agencies, and multinational corporations an unprecedented ability to monitor everyday citizens. Tools that would have seemed like dystopian fiction just a generation ago now...
Jul 12, 2012 | Abuses of Power, News
UK Law Criminalizes Failure to Surrender Encryption Keys Under the Regulation of Investigatory Powers Act 2000, the United Kingdom made it a criminal offense to fail to produce encryption keys when demanded by authorities. The law, specifically Section 53 of the act,...