2017: Here’s How to Delete Yourself from the Internet – at the Click of a Button

In our smart phone-obsessed digital age, we effectively live our entire lives online, which makes us increasingly vulnerable to unseen threats.  Cybercrime, fraud, and identity theft are exponentially growing concerns. Our personal lives, locations, and increasingly our passwords are made public online for anyone to find. If the highly invasive Investigatory Powers Bill (AKA the Snooper’s Charter) isn’t blocked, then every single digital move you make will be recorded for up to 12 months. Also, infinite junk mails. But erasing your digital trace from the World Wide Web can seem overwhelming, especially since each person has on average 1,000,000,000 preferences, passwords, subscriptions and linked accounts. So how would you go about tracking them all down? In step two Swedish developers, with the easy-assemble, Ikea-style approach.  Wille Dahlbo and Linus Unnebäck have created Deseat.me, which allows you to log in with a Google account, and immediately see which apps and services are linked to it. […] Read More

New 5G Cell Towers and Smart Meters to Increase Microwave Radiation and Invade Privacy

By John P. Thomas When the Federal Communication Commission (FCC) approved the use of 5-G microwave communication technology in 2016 and approved the use of microwave frequencies in the 30 Ghz range, [1], they opened the door to even higher levels of human illness and severe disability for American children and adults. Microwave radiation such as that currently being used in cell phones, Wi-Fi routers, and smart meters has already been linked to numerous health effects. The introduction of even more intense levels of microwave exposure at higher frequencies will push many people into life-threatening chronic illness. High frequency microwave radiation is often overlooked as a causative factor in illness, because most conventional healthcare providers, government regulators, telecom companies, and electric utilities believe microwave radiation used in communication technology is harmless. [2] Despite the warnings being raised by scientists, well informed healthcare providers, and grassroots organizations about existing and […] Read More

Orwellian: Feds Spend $500,000 to Tap “Extensive Tracking Infrastructure” to “Combat Online Trolling”

The National Science Foundation has issued two quarter-of-a-million-dollar grants for “Leveraging Personalized Internet Services to Combat Online Trolling”. The grant defines online trolling as, “scenarios in which various groups deploy tactics to influence public opinion on the Internet, by leaving biased, false, misleading, and inauthentic comments, and then artificially amplifying their ratings,” so you can immediately see where that’s a slippery slope to shutting down free speech and dissent because who decides what is “false, misleading, and inauthentic” online? The government’s researchers? Creepier, the grant admits that we are increasingly tracked as our privacy is increasingly going extinct on the internet, and it is this built-in “extensive tracking infrastructure” that will be tapped to combat trolling online: Users have often expressed concern about the lack of privacy and control over their personal data. Nonetheless, despite a substantial effort to expose and control this prevalent behavior, the reality is that users […] Read More

Yahoo! Just Exposed One Of The FBI’s Most Secretive Tricks To Unethically Obtaining Your Info

By Claire Bernish For the first time since the implementation of the USA Freedom Act, Yahoo! published three National Security Letters — perhaps the most secretive and contentious method the FBI has for obtaining information on individuals — after the lifting of repressive and equally-contentious gag orders. Mainstays of the USA PATRIOT Act, National Security Letters (NSLs) generally request customer data information from businesses such as banks, internet service providers, travel agencies, and phone and telecommunications companies — without a warrant required. Worse, NSLs include onerous, mandatory orders prohibiting their recipients from disclosing to anyone — including coworkers, friends, and family — that they even received the letter. “Yahoo has always maintained a strong commitment to protecting our users’ safety, security and privacy,” the company said in an announcement of the disclosure. “The release of these documents and information regarding NSLs today is consistent with our commitment to share […] Read More

25 Rules Of Disinformation, Propaganda, “PSYOPS”, Debunking Techniques

By Kristan T. Harris 25 Rules of Disinformation – Possible rules of Operation Mockingbird 1. Hear no evil, see no evil, speak no evil. Regardless of what you know, don’t discuss it — especially if you are a public figure, news anchor, etc. If it’s not reported, it didn’t happen, and you never have to deal with the issues. 2. Become incredulous and indignant. Avoid discussing key issues and instead focus on side issues which can be used show the topic as being critical of some otherwise sacrosanct group or theme. This is also known as the “How dare you!” gambit. 3. Create rumor mongers. Avoid discussing issues by describing all charges, regardless of venue or evidence, as mere rumors and wild accusations. Other derogatory terms mutually exclusive of truth may work as well. This method works especially well with a silent press, because the only way the public can […] Read More

Hilary Clinton to Face Indictment within 60 Days, says Former Attorney

January 11th, 2016 | by AnonWatcher The leaking of the Clinton emails has been compared to as the next “Watergate” by former U.S. Attorney Joe DiGenova this week, if current FBI investigations don’t proceed in an appropriate manner. The revelation comes after more emails from Hilary Clinton’s personal email have come to light. “[The investigation has reached] a critical mass,” DiGenova told radio host Laura Ingraham when discussing the FBI’s still pending investigation. Though Clinton is still yet to be charged with any crime, DiGenova advised on Tuesday that changes may be on the horizon. The mishandling over the classified intelligence may lead to an imminent indictment, with DiGenova suggesting it may come to a head within 60 days. ‘I believe that the evidence that the FBI is compiling will be so compelling that, unless [Lynch] agrees to the charges, there will be a massive revolt inside the FBI, […] Read More

Extraditing Kim Dotcom

However much of a prat he might seem to some, Kim Dotcom’s relevance goes far beyond his self generating hyperbole and excessive enthusiasm. In the legal battles of extradition and how services on the Internet matter, Dotcom, resident in New Zealand, remains a person of importance.  So important, in fact, that the US Department of Justice has been on to him and three associates since 2012. His arrest in January 2012, along with associates Mathias Ortmann, Bram van der Kolk, and Finn Batato, demonstrated how the US state prioritises economic interest.  Most terrorist suspects, actual or otherwise, get the drone treatment, airstrikes and the like.  Dotcom got dozens of agents, some heavily armed, and two police helicopters. As Wired noted in perplexed wonder, it was the sort of “paramilitary assault reserved for drug lords, murderers, and terrorists, not copyright infringers.” The seizure covered 18 luxury vehicles, 150 terabytes of […] Read More

How Big Tech Convinced Us to Become Our Own Informants

In exchange for the digital goods we crave, we willingly give Google, Facebook and others access to our entire private lives. In 1992, two years after East and West Germany reunited, the new government made an unprecedented gesture in response to demands from the people: It released the archives of East Germany’s former security administration, the dreaded Stasi. Probing the vast files, German artist Simon Menner compiled a collection of the Stasi’s photographs which he published in 2013, affording a voyeuristic glance at the former voyeurs. Or as the artist puts it, giving us a look at what Big Brother “gets to see when he’s watching us.” Some of the photos are frankly hilarious. We’re privy to a seminar on disguises—basically, pics of men with dad bods wearing fake mustaches. The agents of the notorious surveillance state look oddly harmless with their double chins and 1980s turtlenecks. Other images are […] Read More

CISA Systemic Domestic Spying

Technology in cyber space is designed to be the instrument of a totality surveillance society. Secretive methods, back doors, observation and collection of data have been in place for decades. CISA is the latest legislation authorization agreement that provides liability exemption for law enforcement and spooks to conduct their systematic assimilation with the codes and functions of technological development for the intended purpose of efficient monitoring of electronic communication. Coercion for compliance from any resisting tech giant will provide the government with the brute force to muscle their way past any remnants of Fourth Amendment Bill of Right protections. The fact that there is so much enthusiasm in Congress to further gut civil liberties comes as no surprise but is frightening that the push back is so weak. Senate overwhelmingly passes historic cybersecurity bill is reported by CNN accordingly, “It took several tries, but on Tuesday the U.S. Senate […] Read More