Tag: Spying

  • John Oliver – Activist First, Comedian Second

    John Oliver – Activist First, Comedian Second

    John Oliver is an English comedian who first attracted US attention through his work on The Daily Show with Jon Stewart. In April 2014, he began taping episodes of Last Week Tonight with John Oliver, a weekly half-hour program that satirizes news and current events. Even as a comedy program, it focuses heavily on topics…

  • Schools Now Monitoring kids with Insecure Impero Software, PR Issues Abound

    Schools Now Monitoring kids with Insecure Impero Software, PR Issues Abound

    One of the most widely used tools for Schools monitoring kids and restricting pupils’ internet use in UK schools has a serious security flaw which could leave hundreds of thousands of children’s personal information exposed to hackers, a researcher has warned. Impero Education Pro, a product that restricts and monitors’ students’ website use and searches,…

  • Adam Bennett Anon

    Adam Bennett Anon

    Anonymous radio host know as Lorax aka Adam Bennett Anon was arrested (full article). Everybody who has known Adam ‘Lorax’ Bennett aka Adam Bennett Anon knows he’s an awesome anon. Furthermore, the article now let us know he was also involved in his local community as an experienced life saver and a fundraising manager for Cancer…

  • Aaron Swartz – Programmer, Activist

    Aaron Swartz – Programmer, Activist

    Aaron Swartz was a computer programmer and Internet activist who is often referred to as the third founder of Reddit. “”I don’t think I have any particular technical skills. I just got a really large head start.”” -Aaron Swartz Early Years Aaron Swartz was born on November 8, 1986, in Chicago. Precocious from the start,…

  • Leaked: NSA Spies Steal Encryption Keys from Global SIM Manufacturer

    Leaked: NSA Spies Steal Encryption Keys from Global SIM Manufacturer

    AMERICAN AND BRITISH Leaked: NSA Spies hacked into the internal computer network of the largest manufacturer of SIM cards in the world, stealing encryption keys used to protect the privacy of cellphone communications across the globe, according to top-secret documents provided to The Intercept by National Security Agency whistleblower Edward Snowden. The hack was perpetrated…

  • Home Hacks and Smart Grids: Data Theft Made Even Simpler

    Home Hacks and Smart Grids: Data Theft Made Even Simpler

    There is often times a trade-off between security and convenience. With Home Hacks the more easily you can access your personal data, the easier someone else can too, making anything that you put online a potential target for hackers. A growing source of concern for many people is their home security and home automation systems.…

  • NSA Spy Program So Secret Judge Can’t Explain Why It Can’t Be Challenged

    NSA Spy Program So Secret Judge Can’t Explain Why It Can’t Be Challenged

    NSA Spy Program A federal judge ruled in favor of the National Security Agency NSA Spy Program in a key surveillance case on Tuesday, dismissing a challenge which claimed the government’s spying operations were groundless and unconstitutional. Filed in 2008 by the Electronic Frontier Foundation, the lawsuit, Jewel v. NSA, aimed to end the agency’s…

  • How to identify CIA ‘Limited Hangout Op’? The Snowden Example

    How to identify CIA ‘Limited Hangout Op’? The Snowden Example

    How to identify CIA  The operations of secret intelligence agencies aiming at the manipulation of public opinion generally involve a combination of cynical deception with the pathetic gullibility of the targeted populations. There is ample reason to believe that the case of Edward Joseph Snowden fits into this pattern. We are likely dealing here with…

  • Barrett Brown – Journalist, Activist

    Barrett Brown – Journalist, Activist

    Barrett Brown is an American journalist, essayist and satirist. He is often referred to as an unofficial spokesperson for the hacktivist collective Anonymous, a label he disputes. He is credited with the creation of Project PM, a research outfit and information collective determined to expose agents of the corporate military spying apparatus. Brown’s large vocabulary and…

  • Ed Snowden – Intelligence, Leaker

    Ed Snowden – Intelligence, Leaker

    Edward Joseph “Ed” Snowden is an American computer professional who leaked classified information from the National Security Agency, starting in June 2013.Edward Joseph “Ed” Snowden is an American computer professional who leaked classified information from the National Security Agency, starting in June 2013.Edward Joseph “Ed” Snowden is an American computer professional who leaked classified information…

  • William Binney – Intelligence, Leaker

    William Binney – Intelligence, Leaker

    William Binney William Edward Binney is a former highly placed intelligence official with the United States National Security Agency turned whistleblower who resigned on October 31, 2001, after more than 30 years with the agency. We need more truthers like this guy. Without people coming forward we wil never have the kind of freedom of…

  • Thomas Drake – Intelligence, Leaker

    Thomas Drake – Intelligence, Leaker

    Thomas Drake is a former senior executive of the U.S. National Security Agency, a decorated United States Air Force and United States Navy veteran, and a whistleblower.is a former senior executive of the U.S. National Security Agency, a decorated United States Air Force and United States Navy veteran, and a whistleblower.is a former senior executive…

  • COINTELPRO

    COINTELPRO

    The FBI began COINTELPRO—short for Counterintelligence Program—in 1956 to disrupt the activities of the Communist Party of the United States. In the 1960s, it was expanded to include a number of other domestic groups, such as the Ku Klux Klan, the Socialist Workers Party, and the Black Panther Party. All COINTELPRO operations were ended in…

  • Recommendations for the Hacktivist Community

    Recommendations for the Hacktivist Community

    Statement of Purpose I have been observing the hacker and hacktivist communities, at times very closely, for many years. The exact definition of “hacker” and “hacktivist” varies from author to author, so I shall make my interpretation of these words very clear. Let us define a “hacker” as someone who utilizes their knowledge of computers…

  • The FBI Can Bypass Encryption: Cyber Security Is a Magic Act

    The FBI Can Bypass Encryption: Cyber Security Is a Magic Act

    Encryption has gained the attention of actors on both sides of the mass surveillance debate. For example in a speech at the Brookings Institution FBI Director James Comey complained that strong encryption was causing U.S. security services to “go dark.” Comey described encrypted data as follows: “It’s the equivalent of a closet that can’t be…

  • The NSA Was Going to Fine Yahoo $250K a Day If It Didn’t Join PRISM

    The NSA Was Going to Fine Yahoo $250K a Day If It Didn’t Join PRISM

    When we first learned about NSA metadata collection, we wondered how readily the biggest tech companies acquiesced to the government. Today we start to find out. This is the story of how Yahoo was coerced into PRISM, as told by court documents cited by the Washington Post today. According to the documents, corroborated by a…

  • Snowden Saga Decrypted: NSA Leaker or Distraction Double Agent?

    Snowden Saga Decrypted: NSA Leaker or Distraction Double Agent?

    http://youtu.be/SrCEq7S4se0   Max Maverick breaks down everything we know, don’t know, and should be asking about this mainstream media ‘circus’ that has become of the Snowden NSA Leak Disclosure. Major Players – Hidden Hands Past NSA Leaks & Leakers Advanced Technologies Covered-Up Artificial Intelligence Disclosure Snowden Leak Pros & Cons The Attack on the Internet…

  • US Police Have Killed Over 5,000 Civilians Since 9/11

    US Police Have Killed Over 5,000 Civilians Since 9/11

    Statistically speaking, Americans should be more fearful of the local cops than “terrorists.” Though Americans commonly believe law enforcement’s role in society is to protect them and ensure peace and stability within the community, the sad reality is that police departments are often more focused on enforcing laws, making arrests and issuing citations. As a result…

  • DEA Gets Unchecked Access To Call Records; Taught To Lie About Where They Got Them

    DEA Gets Unchecked Access To Call Records; Taught To Lie About Where They Got Them

    Shortly after the Snowden leaks began exposing the NSA’s massive collection efforts, the New York Times uncovered the DEA’s direct access to AT&T telecom switches (via non-government employee “analysts” working for AT&T), from which it and other law enforcement agencies were able to gather phone call and location data. Unlike the NSA’s bulk records programs…

  • NSA and FBI Duck Dive Dodge Accountabilty, Absolute Figures on Search

    NSA and FBI Duck Dive Dodge Accountabilty, Absolute Figures on Search

    NSA says it has no idea how much US info it collects, but FBI searches for it so much it can’t count how many times.   The blowback against the National Security Agency has long focused on the unpopular Patriot Act surveillance program that allows the NSA to vacuum up billions of US phone records…

  • Raw List of NSA Nicknames and Codewords

    Raw List of NSA Nicknames and Codewords

    Below is a listing of nicknames and codewords related to US Signals Intelligence (SIGINT) and Communications Security (COMSEC). Most of them are from the NSA, some are from other government or military agencies. Some of them also have an abbreviation which is shown in brackets. NICKNAMES are generally unclassified. NSA uses single word nicknames, outside NSA…

  • Palantir 101: InfoSec Gov Deployed Malware Explained

    Palantir 101: InfoSec Gov Deployed Malware Explained

    War   For those who are completely new to the Palantir Platform or could simply use a refresher, this talk will start from scratch and provide a broad overview of Palantir’s origins and mission. A live demonstration of the product will help to familiarize newcomers with Palantir’s intuitive graphical interface and revolutionary analytical functionality, while…

  • World of Spycraft: NSA and CIA Spied in Online Games

    World of Spycraft: NSA and CIA Spied in Online Games

    This story has been reported in partnership between The New York Times, the Guardian and ProPublica based on documents obtained by The Guardian. Not limiting their activities to the earthly realm, American and British spies have infiltrated the fantasy worlds of World of Warcraft and Second Life, conducting surveillance and scooping up data in the…

  • Bitcoins: A Fully-Compliant Currency The Government Can Love

    Bitcoins: A Fully-Compliant Currency The Government Can Love

    I’m finishing up a novel, a piece of speculative fiction in a genre you could call “economic-thriller”. The Mark of the Beast? In the book, the dollar crashes in a hyperinflationary fire (natch), replaced by a new currency called the american. The exchange rate at the time of the changeover is $1,000 equals ₳1. To…

  • September 19, 2013 – Decrypted Matrix Radio: News Updates, Navy Yard False Flag Indicators, NSA Latest Leaks, High Tech Exploitation Round-Up

    Local police departments are now receiving a FBI document painting “9/11 truthers” as potential terrorists. Michael Jackson 1 Day Before Death: A ‘Group of People’ Want to ‘Get Rid of Me’, DoD Whistleblower Confirms Ben Fulford Updates, Project Camelot Updates Grid ShutDown Reminder! Recent Warnings of ‘Castestrophic’ Event Corroborated?   ***Navy Yard Shooting – False…