May 19, 2014 | Abuses of Power, Black Technology, Leaks
Understanding NSA Naming Conventions The National Security Agency and related U.S. intelligence organizations use a structured system of nicknames and codewords to identify their surveillance programs, tools, databases, operations, and targets. These designations...
Sep 5, 2013 | News
Obama Promises Outside Review of NSA Surveillance In August 2013, amid growing public outrage over Edward Snowden’s revelations about the National Security Agency’s domestic surveillance programs, President Obama announced the formation of what he...
Aug 16, 2013 | Anonymous
We do not forgive We do not forget Expect Us ...
Apr 9, 2013 | Abuses of Power, News
The United States government routinely classifies documents to protect genuine national security interests. However, the classification system also provides a convenient mechanism for officials to bury materials that would expose embarrassing, unethical, or outright...
Mar 20, 2013 | Activism, Government Agenda
RT talks to William Binney, whistleblower and former NSA crypto-mathematician who served in the agency for decades. Virtual privacy in US, Petraeus affair and whistleblowers’ odds in fight against the authorities are among key topics of this exclusive interview...
Dec 27, 2012 | Leaks, News, Survivalism
In early 2013, investigative journalist Douglas J. Hagmann published a second interview with an individual claiming to be a high-ranking source within the Department of Homeland Security. The conversation covered sweeping allegations about planned firearms...
Dec 6, 2012 | Abuses of Power
Conversations about police misconduct often hit the same wall: disbelief. People who have never had a negative encounter with law enforcement struggle to accept that officers can operate with so few constraints. For anyone working in criminal defense, though, that...
Oct 28, 2012 | Black Technology
What Are Stingray Cell Phone Surveillance Devices? Among the most invasive surveillance tools deployed by law enforcement agencies in the United States, few remain as poorly understood by the general public as the Stingray. Formally known as an International Mobile...
Oct 10, 2012 | Activism, News
Supreme Court Declines to Review NSA Surveillance Case In October 2012, the U.S. Supreme Court refused to hear a case challenging telecom companies’ cooperation with the National Security Agency’s warrantless surveillance of American citizens. The decision...
Oct 10, 2012 | Activism, Government Agenda
The publication of journalist Kurt Eichenwald’s investigative work has shed additional light on how the National Security Agency constructed its warrantless surveillance apparatus, confirming that senior legal advisors within the Bush White House recognized the...
Sep 28, 2012 | Activism, News
In September 2012, three major legal battles over civil liberties converged in American courts. Cases involving indefinite detention, targeted killing by drones, and warrantless surveillance each tested the boundaries between national security authority and...
Sep 21, 2012 | Abuses of Power, Globalist Corporations
Book Description Publication Date: May 12, 2009 For the faction controlling the Pentagon, the military industry, and the oil industry, the Cold War never ended. They engineered an incredible plan to grab total control of the planet, of land, sea, air, space, outer...
Sep 14, 2012 | Government Agenda, Taboo Terminology
I’ve been hearing rumours for a few months now that Godlike Productions has a “banned words” list that will result in you being blocked from reading the website should you decide to use one. While I fully expect certain keywords to result in you unable to make a...
Jul 10, 2012 | Activism, Government Agenda
EFF Asks Court to Reject Stale State Secret Arguments So Case Can Proceed San Francisco – Three whistleblowers – all former employees of the National Security Agency (NSA) – have come forward to give evidence in the Electronic Frontier Foundation’s...
May 31, 2012 | Activism, News, Satire, Video
Juice Rap News: Episode XIII – A NEWS HOPE. It is a time of corporate war; deprived of a reliable media the people of Planet Earth are kept misinformed and in a state of perpetual conflict. Is an honest Fourth Estate the only Force than can restore peace and...
May 24, 2012 | News
When the NYPD cleared the Zuccotti Park encampment in downtown Manhattan in November 2011, many observers declared the Occupy movement effectively finished. Mainstream media coverage dwindled, and commentators attributed the decline to what they characterized as a...
May 10, 2012 | Abuses of Power, News
Michigan State Police were found to be using a handheld forensic device capable of extracting the entire contents of a smartphone in under two minutes — including deleted data — during routine traffic stops, raising serious Fourth Amendment concerns about...
May 8, 2012 | Activism, Government Agenda, Video
In his first television interview since he resigned from the National Security Agency over its domestic surveillance program, William Binney discusses the NSA’s massive power to spy on Americans and why the FBI raided his home after he became a whistleblower. Binney...
Apr 28, 2012 | Abuses of Power
The FBI’s ambitions to monitor social media in real time raise fundamental questions about the balance between national security and individual privacy. In early 2012, the bureau began soliciting the technology industry for help building an open-source...
Apr 28, 2012 | Activism, Video
Jacob Appelbaum: WikiLeaks Volunteer Subjected to Persistent Government Surveillance Jacob Appelbaum, a computer security researcher and volunteer with the whistleblowing website WikiLeaks, became one of the most visible examples of government surveillance targeting...
Jan 31, 2012 | Activism, Video
To Serve or Not to Serve. I’m submitting my story because I feel it’s one a lot of people need to hear. I have been getting some negative feedback on CopBlock’s Facebook page from the cops that visit it, so here we go. I was a member of the united states marine corps...
Jan 15, 2012 | Black Technology, Government Agenda
Courtesy of Cryptome’s link distribution, we get a glimpse into the mind of 1952 (an era when crypto on land lines was very limited, indeed). We get to see how the US tapped and how it worked with the phone company to tap others – in the course of determining that...