Data from 47 hard drives, plus more than 600 million pages of information taken away by NSA/CIA contractor Dennis Montgomery, can prove that a “systematic illegal surveillance” on prominent Americans and US businessmen, including Donald Trump” did occur. Continue reading Trump, Prominent Americans Surveilled | Judicial Watch
In addition to the vulnerability of Apple’s expensive gadgetry, iPhones and iMac, to CIA hacking, Bill Gates’ Windows 10 is surveilling its users by default, i.e. no need for the CIA to hack it anymore. What this means is: your PC’s camera, microphone, and keystrokes are being recorded and stored in their cloud-based databases, for future reference. Continue reading Windows 10 Keeps Spying Even When All Privacy Options are Turned Off
Wikileaks has released its second Vault7 installment codenamed “Dark Matter,” which details how the Central Intelligence Agency CIA purposely infects the entire iPhone supply chain with undetectable, persistent malwares for its unfettered, highly unlawful surveillance activities. Continue reading CIA Infects iPhone Supply Chain with Persistent Surveillance Malwares | Vault7
Two nights ago, Wikileaks started releasing what the whistleblowing platform dubbed as the #Vault7 Series of damaging information into the inner workings of the CIA.
The first iteration “Year 0” describes the specific tools that the Deep State agency has been using against its friends and foes. Continue reading CIA: Deadliest Intel Organization on Earth, #Vault7 Confirms
The password to the first iteration of Wikileaks’ Vault7 series has been released. The first Vault7 iteration codenamed “Year 0” is a 500mb file which could be opened through your browser.
The Vault7 series is the largest intelligence publication in history.
The Khazarian Mafia admits that they are collecting data about you and your activities over cyberspace, and they are having a hard time dealing which ones are more relevant than others. They are very worried that they might be forming inaccurate assessments which would lead to the curtailment of your freedoms. Continue reading What Data Are We Keeping About You? | Rand Corp.
The prevailing system of multi-layered cartels are founded on secrets, and compartmentalization. Any attempt at uncloaking these operational secrets risks incurring the wrath of the gods in the Capitol. Continue reading 14-Year Jailtime vs. Spies, Gov’t Workers in New UK Anti- Squealing Law
A tectonic-level battle could soon take place over the fundamental structure of America, and hardly anyone sees it coming. Nevertheless, I am making a bold prediction for 2017.
Do the committees that oversee the vast U.S. spying apparatus take intelligence community whistleblowers seriously? Do they earnestly investigate reports of waste, fraud, abuse, professional negligence, or crimes against the Constitution reported by employees or contractors working for agencies like the CIA or NSA? For the last 20 years, the answer has been a resounding “no.”
In another example of a broken irrelevant system, the United States Supreme Court just allowed the FBI’s wholesale intrusion into any computers wherever they are on the planet.
Here on this planet exists one giant multi-layered corporation comprising of thousands sub-corporations, with each layer promoting and protecting each own interests which when summed up lead only to one definite conclusion, i.e. self-destruction.
Christmas season is that time of the year when so-called non-profit organizations intensify their fund raising campaigns capitalizing on the prevailing spirit of giving, and your own government silently passes unpopular legislations while you are too busy haggling for some knick-knacks just in time for the family’s gift-giving ceremony.
Reiterating his prior ruling which found the U.S. government’s surveillance of civilians’ telephone records to be unconstitutional—”Orwellian,” even—a federal judge on Monday ordered the National Security Agency to halt its bulk collection program.
After spending over £12 million on this ridiculous attempt to arrest Julian Assange of Wikileaks, the stupid Cabalists in London called it quits.
Tor is an encrypted network that is used by people who desire to preserve their privacy intact, or so they believe. But the inherent problems with the Tor encrypted network are two-fold: slow speed and it was the US Navy that started it all.
We are sharing Edward Snowden’s appeal to the Internet Engineers to make the next internet evolution be safer for the end user and not just a tool for government’s surveillance.
We can’t boot from our PC. We are using the alternative system.
Russian news network are also inaccessible from the time of posting this short notice.
To all the Sheeples and government trolls out there, these conspiracy theories have been confirmed so many times over. Even a portion of the mainstream media can’t hold their punches anymore.
The sunsetting of the US Patriot Act was deliberate and was meant to render all contravening articles on the Net moot and academic. In its stead is the new USA Freedom Act that is advertised to reduce invasive surveillance of the state, and yet the actual gathering of metadata has not been curtailed, nor will it be even if we close down the NSA today. Continue reading Shadow NSA: Private Intelligence Contractors & NSAC
The founder of WikiLeaks Julian Assange has told an an audience in London that governments and security agencies need to be policed by the public. His lecture was part of the ‘Web We Want’ Festival which runs this weekend at the Southbank Centre.
The National Security Agency has developed and employed voice recognition technology to create transcripts of phone calls so they can be more easily searched and stored. Privacy advocates are demanding more information as to who might be the technology’s intended targets.
More than a decade ago, the notorious US Patriot Act was passed by the US Congress without most of its lawmakers having read and completely understood what’s in there.
With its friends leaving in favor of the BRICS, the United States is resorting to indirect terror blackmail in order to pressure Germany about Snowden’s application for asylum.
Why do we have to protest in order to make our sentiments heard?
Because that’s how democracy works.
While the NSA is embedding itself in our computer hard drives, UK’s GCHQ is at the frontseat of our mobile phones.
Firmware is a software, or digital instructions, embedded with any hardware components our computers are equipped with. From the motherboard to the storage media we use, there is a firmware in each of them, to function properly.
With the right equipment or an outright cooperation of the hardware manufacturers, they are all hackable.
We’ve watched Snowden’s documentary “CitizenFour” this weekend in order to have a full understanding of how pervasive the surveillance mechanism is and to know more of the man.
One of those who stand up to the system, even at an early age, is Julian Assange.
Others would connect him to the CIA to malign his reputation, but we can look at where he is today, and conclude that CIA agents are mostly spending their most valuable time with ISIL rather than holed themselves up in a virtual prison cell like the Ecuadorian embassy.
The Digital Hunt for Duqu, a Dangerous and Cunning U.S.-Israeli Spy Virus
By Kim Zetter
Boldizsár Bencsáth took a bite from his sandwich and stared at his computer screen. The software he was trying to install on his machine was taking forever to load, and he still had a dozen things to do before the Fall 2011 semester began at the Budapest University of Technology and Economics, where he taught computer science. Despite the long to-do list, however, he was feeling happy and relaxed. It was the first day of September and was one of those perfect, late-summer afternoons when the warm air and clear skies made you forget that cold autumn weather was lurking around the corner.