Two nights ago, Wikileaks started releasing what the whistleblowing platform dubbed as the #Vault7 Series of damaging information into the inner workings of the CIA.
The first iteration “Year 0” describes the specific tools that the Deep State agency has been using against its friends and foes. Continue reading CIA: Deadliest Intel Organization on Earth, #Vault7 Confirms
The password to the first iteration of Wikileaks’ Vault7 series has been released. The first Vault7 iteration codenamed “Year 0” is a 500mb file which could be opened through your browser.
The Vault7 series is the largest intelligence publication in history.
Continue reading CIA Malware Targets iPhone, Android, Smart TVs | #Vault7 Year0
The Khazarian Mafia admits that they are collecting data about you and your activities over cyberspace, and they are having a hard time dealing which ones are more relevant than others. They are very worried that they might be forming inaccurate assessments which would lead to the curtailment of your freedoms. Continue reading What Data Are We Keeping About You? | Rand Corp.
The prevailing system of multi-layered cartels are founded on secrets, and compartmentalization. Any attempt at uncloaking these operational secrets risks incurring the wrath of the gods in the Capitol. Continue reading 14-Year Jailtime vs. Spies, Gov’t Workers in New UK Anti- Squealing Law
A tectonic-level battle could soon take place over the fundamental structure of America, and hardly anyone sees it coming. Nevertheless, I am making a bold prediction for 2017.
Continue reading Goodbye Democracy, Hello Technocracy | Patrick Wood
Do the committees that oversee the vast U.S. spying apparatus take intelligence community whistleblowers seriously? Do they earnestly investigate reports of waste, fraud, abuse, professional negligence, or crimes against the Constitution reported by employees or contractors working for agencies like the CIA or NSA? For the last 20 years, the answer has been a resounding “no.”
Continue reading When CIA & NSA Workers Blow the Whistle, Congress Plays Deaf
In another example of a broken irrelevant system, the United States Supreme Court just allowed the FBI’s wholesale intrusion into any computers wherever they are on the planet.
Continue reading US Supreme Court Approves FBI Hacking on Computers Worldwide
Here on this planet exists one giant multi-layered corporation comprising of thousands sub-corporations, with each layer promoting and protecting each own interests which when summed up lead only to one definite conclusion, i.e. self-destruction.
Continue reading When Idiots Control Technology, This is What Happens…
Christmas season is that time of the year when so-called non-profit organizations intensify their fund raising campaigns capitalizing on the prevailing spirit of giving, and your own government silently passes unpopular legislations while you are too busy haggling for some knick-knacks just in time for the family’s gift-giving ceremony.
Continue reading CISA Quietly Passed by Congress thru Sleight of Hand
Reiterating his prior ruling which found the U.S. government’s surveillance of civilians’ telephone records to be unconstitutional—”Orwellian,” even—a federal judge on Monday ordered the National Security Agency to halt its bulk collection program.
Continue reading Snowden Celebrates ‘Broadly Influential’ Ruling Against NSA Dragnet
After spending over £12 million on this ridiculous attempt to arrest Julian Assange of Wikileaks, the stupid Cabalists in London called it quits.
Continue reading London Ends Stakeout vs. Assange at Ecuadorian Embassy
Tor is an encrypted network that is used by people who desire to preserve their privacy intact, or so they believe. But the inherent problems with the Tor encrypted network are two-fold: slow speed and it was the US Navy that started it all.
Continue reading HORNET: Bigger and Faster than Tor
We are sharing Edward Snowden’s appeal to the Internet Engineers to make the next internet evolution be safer for the end user and not just a tool for government’s surveillance.
Continue reading Building an Internet for the People
We can’t boot from our PC. We are using the alternative system.
Russian news network are also inaccessible from the time of posting this short notice.
Continue reading Russian News Networks are Inaccessible; Our Terminals are Hacked
To all the Sheeples and government trolls out there, these conspiracy theories have been confirmed so many times over. Even a portion of the mainstream media can’t hold their punches anymore.
Continue reading NSA Spying on “Allied” Leaders; Google is Spying on You
The sunsetting of the US Patriot Act was deliberate and was meant to render all contravening articles on the Net moot and academic. In its stead is the new USA Freedom Act that is advertised to reduce invasive surveillance of the state, and yet the actual gathering of metadata has not been curtailed, nor will it be even if we close down the NSA today. Continue reading Shadow NSA: Private Intelligence Contractors & NSAC
The founder of WikiLeaks Julian Assange has told an an audience in London that governments and security agencies need to be policed by the public. His lecture was part of the ‘Web We Want’ Festival which runs this weekend at the Southbank Centre.
Continue reading Transparency for Governments and Privacy for Individuals
The National Security Agency has developed and employed voice recognition technology to create transcripts of phone calls so they can be more easily searched and stored. Privacy advocates are demanding more information as to who might be the technology’s intended targets.
Continue reading NSA Turns Conversations into Searchable Text [Snowden]
More than a decade ago, the notorious US Patriot Act was passed by the US Congress without most of its lawmakers having read and completely understood what’s in there.
Continue reading Bipartisan Anti-Patriot Act Bill Filed in U.S. Congress
With its friends leaving in favor of the BRICS, the United States is resorting to indirect terror blackmail in order to pressure Germany about Snowden’s application for asylum.
Continue reading US Threatened Germany with Terror Attack Over Snowden
Why do we have to protest in order to make our sentiments heard?
Because that’s how democracy works.
Continue reading FCC Voted for “Net Neutrality”; Congress Next Battlefront
While the NSA is embedding itself in our computer hard drives, UK’s GCHQ is at the frontseat of our mobile phones.
Continue reading The Great SIM Heist: UK’s Global Phone Snooping
Firmware is a software, or digital instructions, embedded with any hardware components our computers are equipped with. From the motherboard to the storage media we use, there is a firmware in each of them, to function properly.
With the right equipment or an outright cooperation of the hardware manufacturers, they are all hackable.
Continue reading NSA Spying Firmware is in Our Hard Disks
We’ve watched Snowden’s documentary “CitizenFour” this weekend in order to have a full understanding of how pervasive the surveillance mechanism is and to know more of the man.
Continue reading UK-US Surveillance Regime was Unlawful ‘for seven years’
by Veterans Today on January 22, 2015
For most any government, maintaining power is the ultimate bottom line. Without a power foundation solid as a 47-story steel-frame skyscraper, a government cannot climb the stairway to tyranny—hold the aphrodisia.
Continue reading Stairway to Tyranny
One of those who stand up to the system, even at an early age, is Julian Assange.
Others would connect him to the CIA to malign his reputation, but we can look at where he is today, and conclude that CIA agents are mostly spending their most valuable time with ISIL rather than holed themselves up in a virtual prison cell like the Ecuadorian embassy.
Continue reading Spy Files 4.0
The Digital Hunt for Duqu, a Dangerous and Cunning U.S.-Israeli Spy Virus
By Kim Zetter
Boldizsár Bencsáth took a bite from his sandwich and stared at his computer screen. The software he was trying to install on his machine was taking forever to load, and he still had a dozen things to do before the Fall 2011 semester began at the Budapest University of Technology and Economics, where he taught computer science. Despite the long to-do list, however, he was feeling happy and relaxed. It was the first day of September and was one of those perfect, late-summer afternoons when the warm air and clear skies made you forget that cold autumn weather was lurking around the corner.
Continue reading The Hunt for The Duqu Virus
By Cora Currier and Morgan Marquis-Boire
When Apple and Google unveiled new encryption schemes last month, law enforcement officials complained that they wouldn’t be able to unlock evidence on criminals’ digital devices. What they didn’t say is that there are already methods to bypass encryption, thanks to off-the-shelf digital implants readily available to the smallest national agencies and the largest city police forces — easy-to-use software that takes over and monitors digital devices in real time, according to documents obtained by The Intercept.
Continue reading Secret Manuals Show the Spyware Sold to Despots and Cops Worldwide