Backdoors… for Everything: “Citizens Should Have No Secrets Gov’t Can’t Access”

This article was written by J.D. Heyes and originally published at NaturalNews.com. Editor’s Comment: The Thought Police are here, and they want preemptive full access to every electronic activity you ever make — whether or not you are ‘doing something wrong.’ The potential for abuse is enormous, and privacy advocates have argued that weakening encryption for authorities to have access will destroy consumer protections for things like bank accounts, creative and patent activities, not to mention that people had before technology… yes, privacy. The 4th Amendment has been reduced to a specter; and there is much rolling around in graves. FBI says that citizens should have no secrets that the government can’t access: the Orwellian cyber police state has arrived by J.D. Heyes The police and surveillance state predicted in the forward-looking 1940s classic “1984” by George Orwell, has slowly, but steadily, come to fruition. However, like a frog […] Read More

Leaked Documents Show FBI, DEA, & Army Can Control Your Computer

Leaked emails from an Italian-based hacking company reveal that government agencies engage in surveillance more invasive than previously thought, spending millions of dollars on spyware and malware software to accomplish their questionable goals. Tellingly, their use of the product places them squarely in the same category as other repressive regimes around the world. After hackers ironically hacked Hacking Tools, a Milan-based company that sells strictly to governments, hundreds of gigabytes of emails and financial records were leaked. The emails show that the FBI, DEA, and U.S. Army all purchased software that enables them to view suspects’ photos, emails, listen to and record their conversations, and activate the cameras on their computers, among other things. While this may seem like old news, the most controversial revelation was the government’s purchases of “Remote Control Systems.” The FBI, DEA, and U.S. Army, courtesy of Hacking Tools, possess the capability to take control of […] Read More