Posts Tagged ‘computer’

screen-shot-2014-11-20-at-10-24-35-v1-620x277

Amnesty International’s anti-spyware tool is the epitome of post-Snowden software

Amnesty and other groups have vouched for this. It appears to have an open source code available for inspection.

DETEKT

 

 

Drive train from Michael Hasting’s Mercedes landed 100ft. from the crash site. 450x287xhastings-450x287.jpg.pagespeed.ic.hDVZ1lo5iB

 

 

Confirmed, proven, demonstrated and joked about.

 

terms

The Internet was created by DARPA as a way for communications to survive a nuclear war.  When servers go down, packets are automatically rerouted to a different server, no matter how long the route takes, in order to finally reach the recipient.  This was by military necessity.  The packet transfer scheme tags the sender with IP address information, something that is hard to get around, and makes for tracking and surveillance to be that much easier.  Proxy servers and TOR encryption attempt to anonymize the traffic, but users are still at the mercy of those involved in those schemes.  If they are compromised, then the supposed encryption security is also compromised.

This film attempts to tackle the rest of the internet, the search engines and social networks that store and exploit personal data voluntarily given to it.  Here is where our lives are open books to the data miners from private corporations as well as intelligence services.  I’ve had a queasy sick feeling over these behemoths for a long time, seeing Facebook as the obvious repository of personal information.  Now that these organizations are in direct partnerships with the government, nothing there should be considered secure or private.  All connections, the “metadata” are fair game.  All utterances are recorded forever, and can land one in prison if they can be sold by a prosecutor as a threat or a matter of “national security.”  Police regularly go into Facebook accounts of suspects and gather up all their friends and acquaintances’ information.  This is standard practice, you should be aware.

As we descend into totalitarianism, here is where it all went wrong.  Here is where the corporate/government collusion has stripped your lives bare and left you at the mercy of the US STASI, as well as every other level of so-called “law” enforcement, although the laws that limit the activities of the government itself are never enforced by anybody..

Trailer:

http://www.youtube.com/watch?feature=player_embedded&v=yzyafieRcWE

hacked

We Are Change citizen journalists are targeted repeatedly.  See what the tactics are.

http://www.youtube.com/watch?v=zislzpkpvZc&feature=player_embedded

Department of Homeland Gestapo and their National Operations Center have leaked a verboten list of words that you should not be associated with on your social media, lest you incur the interest of the secret, unaccountable repression organs of the federal tyranny.

ic137f146684fd39387e5e73a670d3f58_dhs2

Your beloved Obama presides over this police state abomination, and you mindlessly cheer on his every abuse.

policestate

The assaults are coming every day now, perhaps multiple times. US military industrial partner RAYTHEON is having a “RIOT” and you can see how they track your cell phone, your social media, your images, and can predict where to find you… for any and all unspecified reasons, by any and all customers who may find this sort of thing useful. These include the US government, foreign governments (dictatorships), corporations, organized crime, the “market” is wide open.

RIOT Training Video on Guardian Websiteraytheon-riot

 But Raytheon is not the only corporation in on the domestic surveillance game:

Google Moves to Destroy Online Anonymity

And “Homeland Security” (sic!) lets us know:

“Under the National Operations Center (NOC)’s Media Monitoring Initiative that came out of DHS headquarters in November, Washington has the written permission to retain data on users of social media and online networking platforms.

Specifically, the DHS announced the NCO and its Office of Operations Coordination and Planning (OPS) can collect personal information from news anchors, journalists, reporters or anyone who may use “traditional and/or social media in real time to keep their audience situationally aware and informed.”

And military contractor General Dynamics is also in on the feeding frenzy (feeding on citizen’s civil liberties:

“Some of the more high profile and highly trafficked sites being monitored include the comments sections of The New York Times, The Los Angeles Times, Newsweek, the Huffington Post, the Drudge Report, Wired, and ABC News. In addition, social networking sites Facebook, MySpace and Twitter are being monitored. For the first time, the public not only has an idea who the DHS is pursuing with their surveillance and where, but what they are looking for as well. General Dynamics contract requires them to “[identify] media reports that reflect adversely on the U.S. Government, DHS, or prevent, protect, respond government activities.” The DHS also instructed General Dynamics to generate “reports on DHS, Components, and other Federal Agencies: positive and negative reports on FEMA, CIA, CBP, ICE, etc. as well as organizations outside the DHS.” In other words, the DHS wants to know who you are if you say anything critical about the government.”

Is there anyone left who disputes the techno-fascist police state?  Can any informed person deny the breathtaking scope of an out of control fascist system designed to track and squash political opponents?

The current fascist, hyper-nationalist propaganda relies on ignorance, an uneducated, gullible population too distracted to rub neurons together.  Anyone who can read, and has the self respect to stay informed about the important issues affecting us cannot blindly accept this monstrosity of an out of control, unaccountable police state, the likes of which Goebbels and Hitler could only dream.

logo 2

Your tax dollars at work:

Who’s Faking It? Pentagon “Cyber-Warriors” Planting “False Information on Facebook”

LA TIMES:

Cyber Corps program trains spies for the digital age

Students learn not only how to rifle through trash, sneak a tracking device on cars and plant false information on Facebook. They also are taught to write computer viruses, hack digital networks, crack passwords, plant listening devices and mine data from broken cellphones and flash drives.

It may sound like a Jason Bourne movie, but the little-known program has funneled most of its graduates to the CIA and the Pentagon’s National Security Agency, which conducts America’s digital spying. Other graduates have taken positions with the FBI, NASA and the Department of Homeland Security.

This illegal spying is being taught at a public US university now.  Pretty much, this signals open fascism, a lawless security state that scoffs at any and all citizen rights and restraints on government power.  The next-gen Brownshirts and SS drink lattes and plant false evidence from Starbucks.

With Swiss Cheese operating systems like Windows, with innumerable “back door” security holes, courtesy of Gates’ “bloatware” we are vulnerable to these new crop of hackers on the government payroll.  Not everything in the world of bits and bytes is as it seems, people.  You’ve been warned.