NSA Whistleblower: Everyone in US under virtual surveillance..

total information awareness-IAO-DARPA
..all info stored, no matter the post

I had my first real taste of being tracked, surveilled, what ever you want to call it back in I think it was 2004. I was pinging around and found myself hopping through some very strange nodes. I did not like what I saw and got the freak outta there. I knew in my mind it was too late as my hardware firewall began to sing with attempted access. I looked through the logs of my travels through the inter and outerwebs and of those of my adversary trying to gain entrance. You guessed it, I hit a honeypot run by the NSA. I immediately fired up my WYSIWYG program. No, not a ‘What You See Is What You Get’ .. but a ‘What You Send Is What You Get’ and let it run for days until I felt comfortable enough to resume my internet travels. I’m still here, so I assume they realized I was no threat then or now. Anyway .. I hope you enjoy this video below and understand the only way to not be surveilled in this day and age one must completely go off grid.

RT talks to William Binney, whistleblower and former NSA crypto-mathematician who served in the agency for decades. Virtual privacy in US, Petraeus affair and whistleblowers’ odds in fight against the authorities are among key topics of this exclusive interview.

Executive Order 13526- Classified National Security Information http://www.whitehouse.gov/the-press-office/executive-order-classified-national-security-information

I think it’s time for me to weed my way through my database and pull out some old info on this subject matter and others for later posting. After all, what may be old Rancid News to myself might just be fresh news for many newcomers.


Send #Email like a Spy Not #Petraeus and #Broadwell

It’s well known that regardless of which online email you use [Gmail, Yahoo, Hotmail etc] they spy on you. How else do you think you get all that targeted spam email after creating a new account.

Anyway, long story short, here are a few services that allow you to send messages or links and once the messages or links are read, they self destruct. Now I’ll tell you up front, I haven’t used any of these but hey, what do you have to loose. Some of these encrypt the data and store it encrypted until it’s deleted.

Via ComputerWorld

The way these work is that you type your message on a website, rather than sending email. The site will send email, not with the message, but with a link.

In some cases, the services will allow the recipients to read the message once, after which time it’s deleted. In others, you can set an expiration date.

The best of these are OneShar.es, Burn Note, Privnote, Destructing Message and This Message Will Self Destruct.

Note that the “Destructing Message” service has an interesting twist: It doesn’t identify the sender. Of course, you can identify yourself in the message, but you don’t have to. It’s both temporary and anonymous. Some email services, including Gmail, may block incoming mail from Destructing Message.

There’s a related type of service that’s useful when you want to keep a link private. You paste your link into the service, and set the “expiration date.” Then, the service creates a temporary link that leads to the real link.

Examples of this type of service include This Link Will Self Destruct or Dying Links.

Note that Dying Links is highly configurable, enabling you to specify a delayed activation, an expiration date and time, and even a maximum number of clicks before it expires. It also shortens URLs.

Sometimes you just want to show someone a picture, but you want to do it securely and privately. In that case, you might try SnapChat. SnapChat is an iOS and Android app that lets you send pictures from your phone to a list of recipients, who can view the picture only from within the SnapChat application, and only for a maximum of 10 seconds. The sender can even choose to set the time limit to less than 10 seconds. While the picture is displayed, the screen capture feature on the recipient’s phone is disabled.

Cyber Pearl Harbor – #Cybersecurity Act of 2012 – Cyber ShockWave Video

The Cybersecurity Act of 2012 was voted down. I would vote it down as well as I see it as another arm of the Patriot Act. Don’t get me wrong though, I practice CyBeRSeCuRiTy myself running a dedicated hardware firewall. The problem with the Cybersecurity Act is ‘they’ want to manage it and want you and I [tax payers] to fund it. Bullshit. Here’s why … Companies that operate critical infrastructure like power plants (especially nuclear), chemical plants, railroads, etc etc, should not be on a network that is connected to the outside world. All control systems should be off the grid and managed from within. PERIOD ! As far as government systems, they should already have adequate protection from outside intrusions. Of course we know this not to be the case. WHY ?

One thing we have learned in past years, ‘Fear Sells‘>

The next attack, Defense Secretary Leon Panetta said in an Oct. 11 speech, could derail passenger trains, spill toxic chemicals or cause widespread blackouts.

“The collective result of these kinds of attacks could be a cyber Pearl Harbor; an attack that would cause physical destruction and the loss of life,” Panetta said. “In fact, it would paralyze and shock the nation.”

Bloomberg News

I have often wondered when they will go live with their ‘Digital Pearl Harbor’. I’ve wrote before on my old website about this dating back to 2007. I feel time is running out and they will soon be letting the bits and bytes fly to destroy and kill Americans to ‘Shock the Nation’ into submission once again, just as 9/11 did. After all, the economy is still in shambles and the country is falling apart at the seams. They need something to unite and sew it back together. Doing this, and blaming it on oh I guess Iran for their long wanted war will do the trick. It’s how they roll.

They even had a Exercise called Cyber ShockWave which was a simulated cyber attack on the United States on Tuesday, February 16, 2010. Cyber ShockWave was an unprecedented look at how the government would develop a real-time response to a large-scale cyber crisis affecting much of the nation.