Creepy and Unexplained Enigmatic Codes on the Internet

We live in a digital world now, our planet connected by this vast wilderness we know as the Internet. It is one of the most powerful creations that we have managed to come up with, connecting us across vast distances no matter where we are and changing our lives in a myriad of ways. Yet it has also brought with it its fair share of strange mysterious and creepy enigmas. Among these are numerous codes and ciphers which have emerged from the depths of the web to tease and tantalize all who look at them, their origins cloaked in shadow and their meanings buried beneath the cloud of the unknown. With its strong presence on the Internet, it is perhaps no surprise that many of these mysterious codes and ciphers pop up and are analyzed and disseminated on Reddit. One strange such case emerged in 2013, when a poster […] Read More

Here’s How to Delete Yourself from the Internet – at the Click of a Button

In our smartphone-obsessed digital age, we effectively live our entire lives online, which makes us increasingly vulnerable to unseen threats.  Cyber crime, fraud and identity theft are exponentially growing concerns. Our personal lives, locations, and increasingly our passwords are made public online for anyone to find. If the highly invasive Investigatory Powers Bill (AKA the Snooper’s Charter) isn’t blocked, then every single digital move you make will be recorded for up to 12 months. Also, infinite junk mails. But erasing your digital trace from the World Wide Web can seem overwhelming, especially since each person has on average 1,000,000,000 preferences, passwords, subscriptions and linked accounts. So how would you go about tracking them all down? In step two Swedish developers, with the easy-assemble, Ikea-style approach.  Wille Dahlbo and Linus Unnebäck have created Deseat.me, which allows you to log in with a Google account, and immediately see which apps and services are linked to it. The genius part is, instead […] Read More

New 5G Cell Towers and Smart Meters to Increase Microwave Radiation and Invade Privacy

By John P. Thomas When the Federal Communication Commission (FCC) approved the use of 5-G microwave communication technology in 2016 and approved the use of microwave frequencies in the 30 Ghz range, [1], they opened the door to even higher levels of human illness and severe disability for American children and adults. Microwave radiation such as that currently being used in cell phones, Wi-Fi routers, and smart meters has already been linked to numerous health effects. The introduction of even more intense levels of microwave exposure at higher frequencies will push many people into life-threatening chronic illness. High frequency microwave radiation is often overlooked as a causative factor in illness, because most conventional healthcare providers, government regulators, telecom companies, and electric utilities believe microwave radiation used in communication technology is harmless. [2] Despite the warnings being raised by scientists, well informed healthcare providers, and grassroots organizations about existing and […] Read More

Orwellian: Feds Spend $500,000 to Tap “Extensive Tracking Infrastructure” to “Combat Online Trolling”

The National Science Foundation has issued two quarter-of-a-million-dollar grants for “Leveraging Personalized Internet Services to Combat Online Trolling”. The grant defines online trolling as, “scenarios in which various groups deploy tactics to influence public opinion on the Internet, by leaving biased, false, misleading, and inauthentic comments, and then artificially amplifying their ratings,” so you can immediately see where that’s a slippery slope to shutting down free speech and dissent because who decides what is “false, misleading, and inauthentic” online? The government’s researchers? Creepier, the grant admits that we are increasingly tracked as our privacy is increasingly going extinct on the internet, and it is this built-in “extensive tracking infrastructure” that will be tapped to combat trolling online: Users have often expressed concern about the lack of privacy and control over their personal data. Nonetheless, despite a substantial effort to expose and control this prevalent behavior, the reality is that users […] Read More

Yahoo! Just Exposed One Of The FBI’s Most Secretive Tricks To Unethically Obtaining Your Info

By Claire Bernish For the first time since the implementation of the USA Freedom Act, Yahoo! published three National Security Letters — perhaps the most secretive and contentious method the FBI has for obtaining information on individuals — after the lifting of repressive and equally-contentious gag orders. Mainstays of the USA PATRIOT Act, National Security Letters (NSLs) generally request customer data information from businesses such as banks, internet service providers, travel agencies, and phone and telecommunications companies — without a warrant required. Worse, NSLs include onerous, mandatory orders prohibiting their recipients from disclosing to anyone — including coworkers, friends, and family — that they even received the letter. “Yahoo has always maintained a strong commitment to protecting our users’ safety, security and privacy,” the company said in an announcement of the disclosure. “The release of these documents and information regarding NSLs today is consistent with our commitment to share […] Read More

25 Rules Of Disinformation, Propaganda, “PSYOPS”, Debunking Techniques

By Kristan T. Harris 25 Rules of Disinformation – Possible rules of Operation Mockingbird 1. Hear no evil, see no evil, speak no evil. Regardless of what you know, don’t discuss it — especially if you are a public figure, news anchor, etc. If it’s not reported, it didn’t happen, and you never have to deal with the issues. 2. Become incredulous and indignant. Avoid discussing key issues and instead focus on side issues which can be used show the topic as being critical of some otherwise sacrosanct group or theme. This is also known as the “How dare you!” gambit. 3. Create rumor mongers. Avoid discussing issues by describing all charges, regardless of venue or evidence, as mere rumors and wild accusations. Other derogatory terms mutually exclusive of truth may work as well. This method works especially well with a silent press, because the only way the public can […] Read More

Hilary Clinton to Face Indictment within 60 Days, says Former Attorney

January 11th, 2016 | by AnonWatcher The leaking of the Clinton emails has been compared to as the next “Watergate” by former U.S. Attorney Joe DiGenova this week, if current FBI investigations don’t proceed in an appropriate manner. The revelation comes after more emails from Hilary Clinton’s personal email have come to light. “[The investigation has reached] a critical mass,” DiGenova told radio host Laura Ingraham when discussing the FBI’s still pending investigation. Though Clinton is still yet to be charged with any crime, DiGenova advised on Tuesday that changes may be on the horizon. The mishandling over the classified intelligence may lead to an imminent indictment, with DiGenova suggesting it may come to a head within 60 days. ‘I believe that the evidence that the FBI is compiling will be so compelling that, unless [Lynch] agrees to the charges, there will be a massive revolt inside the FBI, […] Read More

Extraditing Kim Dotcom

However much of a prat he might seem to some, Kim Dotcom’s relevance goes far beyond his self generating hyperbole and excessive enthusiasm. In the legal battles of extradition and how services on the Internet matter, Dotcom, resident in New Zealand, remains a person of importance.  So important, in fact, that the US Department of Justice has been on to him and three associates since 2012. His arrest in January 2012, along with associates Mathias Ortmann, Bram van der Kolk, and Finn Batato, demonstrated how the US state prioritises economic interest.  Most terrorist suspects, actual or otherwise, get the drone treatment, airstrikes and the like.  Dotcom got dozens of agents, some heavily armed, and two police helicopters. As Wired noted in perplexed wonder, it was the sort of “paramilitary assault reserved for drug lords, murderers, and terrorists, not copyright infringers.” The seizure covered 18 luxury vehicles, 150 terabytes of […] Read More

How Big Tech Convinced Us to Become Our Own Informants

In exchange for the digital goods we crave, we willingly give Google, Facebook and others access to our entire private lives. In 1992, two years after East and West Germany reunited, the new government made an unprecedented gesture in response to demands from the people: It released the archives of East Germany’s former security administration, the dreaded Stasi. Probing the vast files, German artist Simon Menner compiled a collection of the Stasi’s photographs which he published in 2013, affording a voyeuristic glance at the former voyeurs. Or as the artist puts it, giving us a look at what Big Brother “gets to see when he’s watching us.” Some of the photos are frankly hilarious. We’re privy to a seminar on disguises—basically, pics of men with dad bods wearing fake mustaches. The agents of the notorious surveillance state look oddly harmless with their double chins and 1980s turtlenecks. Other images are […] Read More

CISA Systemic Domestic Spying

Technology in cyber space is designed to be the instrument of a totality surveillance society. Secretive methods, back doors, observation and collection of data have been in place for decades. CISA is the latest legislation authorization agreement that provides liability exemption for law enforcement and spooks to conduct their systematic assimilation with the codes and functions of technological development for the intended purpose of efficient monitoring of electronic communication. Coercion for compliance from any resisting tech giant will provide the government with the brute force to muscle their way past any remnants of Fourth Amendment Bill of Right protections. The fact that there is so much enthusiasm in Congress to further gut civil liberties comes as no surprise but is frightening that the push back is so weak. Senate overwhelmingly passes historic cybersecurity bill is reported by CNN accordingly, “It took several tries, but on Tuesday the U.S. Senate […] Read More

Internet Is Less Safe, Less Free And Less Private

(The Real Agenda) The world wide web is becoming a police state in itself where users, who have paid for its construction and dissemination, are less safe and less free to navigate. Internet freedom has declined for the fifth consecutive year, and, not surprisingly governments are the parties the bear the bulk of the responsibility for such a decrease as they are the ones imposing restrictions on the rights of Internet users and illegally monitoring their activity. These are some conclusions of the report published by Freedom House, an organisation that analyzed the current state Internet freedom in 65 countries. The study indicates that more and more governments try to censor information that is of general interest and puts pressure on the private sector to remove content they do not approve. Although some of the grossest infringements on Internet freedom are though to be committed in places like China […] Read More

The Zombiefication Of America

Do you know people that seem like they have had their souls sucked out of them?  On dictionary.com, a “zombie” is defined as “the body of a dead person given the semblance of life, but mute and will-less, by a supernatural force, usually for some evil purpose”.  And that sounds very much like what has happened to tens of millions of Americans.  When you look into their eyes, it doesn’t look like anything is even there.  That is because who they once were is now dominated and controlled by the overwhelmingly powerful “matrix” that is being constructed all around us.  As I wrote about the other day, virtually all news, information and entertainment that Americans consume is controlled by just six monolithic corporations.  And today, Americans are more “plugged in” than ever before.  The average person watches 153 hours of television a month in addition to spending countless hours […] Read More

Vista 10 Inherently Broken, Anti-Competitive (Against GNU/Linux and Free Software), Privacy-Infringing, and Definitely Not Secure

…but some people install it because it doesn’t cost them anything upfront “I’m going to f—ing kill Google.”  – Steve Ballmer, Microsoft CEO Summary: A roundup of recent reports about Windows 10, which is akin to Windows Vista in many ways VISTA 10 is a mess. Ask the management of Microsoft what it thinks of it (while no cameras or microphones point at the management’s direction). When Vista was released the company gloated and dubbed it the “best ever” although later E-mails (requested by subpoena) showed that internally the opposite was being said. Ask Microsoft’s engineers what they think of Vista 10 (I have). Look at how a third mega patch got released within just 2.5 weeks, essentially acting almost like a re-release of the whole operating system given its massive size (almost everything at the core gets replaced). See “Bill Gates dumped a huge amount of Microsoft stock this year” […] Read More