NSA, PRISM saw it coming miles away

DfgDfg Admin
edited June 2013 in Spurious Generalities
If you told me, everything I do is being monitored and logged everyday, I wouldn't be surprised. I gave up trying to hide myself few years ago. I realized that unless I completely cut off and just become isolated I would always be leaked out. So I decided to try the other approach, I gave up on being paranoid and just enjoyed things. I am quite sure their is a file about me somewhere which states what I do, well if you really want to make things simpler for NSA and other agencies, I will give you a brief intro about what I do online.

I work as a freelancer, I setup things and work on videos.
I tweet a lot, I love tweeting.
I use Facebook for gaming but I stopped gaming so I seldom use Facebook.
My main purpose for using Internet is to socialize.
I download torrents, pretty much type of them. I don't buy entertainment products since I am in a 3rd World Country and privacy is something we all take granted for.
I am a low target, I neutral when it comes to Internet, I don't judge, I just want to be free to speak my mind and not get bombed or killed for religious reasons.


With that done, watch this Documentary and do read the quote text as well.
In 1957, with funding from a CIA front organization, Dr. Ewan Cameron of the Allan Memorial Institute in Montreal, Canada began MKULTRA Subproject 68.[121] His experiments were designed to first "depattern" individuals, erasing their minds and memories—reducing them to the mental level of an infant—and then to "rebuild" their personality in a manner of his choosing.[122] To achieve this, Cameron placed patients under his "care" into drug-induced comas for up to 88 days, and applied numerous high voltage electric shocks to them over the course of weeks or months, often administering up to 360 shocks per person. He would then perform what he called "psychic driving" experiments on the subjects, where he would repetitively play recorded statements, such as "You are a good wife and mother and people enjoy your company", through speakers he had implanted into blacked-out football helmets that he bound to the heads of the test subjects (for sensory deprivation purposes). The patients could do nothing but listen to these messages, played for 16–20 hours a day, for weeks at a time. In one case, Cameron forced a person to listen to a message non-stop for 101 days.[122] Using CIA funding, Cameron converted the horse stables behind Allen Memorial into an elaborate isolation and sensory deprivation chamber which he kept patients locked in for weeks at a time.[122] Cameron also induced insulin comas in his subjects by giving them large injections of insulin, twice a day for up to two months at a time.[104] Several of the children who Cameron experimented on were sexually abused, in at least one case by several men. One of the children was filmed numerous times performing sexual acts with high-ranking federal government officials, in a scheme set up by Cameron and other MKULTRA researchers, to blackmail the officials to ensure further funding for the experiments.[123]
http://en.m.wikipedia.org/wiki/Unethical_human_experimentation_in_the_United_Stat es


About the NSA, read this:
http://boingboing.net/2013/06/09/new-nsa-leak-boundlessinforma.html
In the Guardian, Glenn Greenwald and Ewen MacAskill leak a description of another NSA top-secret program, this one codenamed "BOUNDLESSINFORMANT." This is apparently a tool that helps spies keep track of which snooping tools they can deploy in which countries, and it produces pretty, color-coded maps showing where the NSA spying powers are strongest. The Guardian has excellent notes on how this fits in with the ongoing fight between the US Senate and the NSA on whether and how the NSA spies on Americans:
The Boundless Informant documents show the agency collecting almost 3 billion pieces of intelligence from US computer networks over a 30-day period ending in March 2013. One document says it is designed to give NSA officials answers to questions like, "What type of coverage do we have on country X" in "near real-time by asking the SIGINT [signals intelligence] infrastructure."
An NSA factsheet about the program, acquired by the Guardian, says: "The tool allows users to select a country on a map and view the metadata volume and select details about the collections against that country."
Under the heading "Sample use cases", the factsheet also states the tool shows information including: "How many records (and what type) are collected against a particular country."
A snapshot of the Boundless Informant data, contained in a top secret NSA "global heat map" seen by the Guardian, shows that in March 2013 the agency collected 97bn pieces of intelligence from computer networks worldwide.
They quote Judith Emmel, an NSA spokesperson who says, "The continued publication of these allegations about highly classified issues, and other information taken out of context, makes it impossible to conduct a reasonable discussion on the merits of these programs." However, the NSA would not admit the existence of these programs (not even to the senate),


And there is more, I mean you can ask how did they do it?

Well..

US spy satellites intercept microwave communications, radio communications and communication satellites.
http://en.wikipedia.org/wiki/Mentor_(satellite)
http://en.wikipedia.org/wiki/Magnum_(satellite)
US taps underwater communication cables; both copper and fibre
http://en.wikipedia.org/wiki/Operation_Ivy_Bells
http://en.wikipedia.org/wiki/USS_Jimmy_Carter_(SSN-23)
http://en.wikipedia.org/wiki/USS_Parche_(SSN-683)
United States, Canada, United Kingdom, Australia and New Zealand spy operation partnership.
http://en.wikipedia.org/wiki/Five_Eyes
http://en.wikipedia.org/wiki/AUSCANNZUKUS
http://en.wikipedia.org/wiki/Echelon_(signals_intelligence)

And there is more, I copied this from Reddit btw.



Shia Labeouf: One-In-Five Phone Calls Are Recorded (2008-09-16)
http://www.youtube.com/watch?v=3ux1hpLvqMw[1]
Report: FBI illegally collected phone records
http://www.usatoday.com/news/washington/2010-01-19-fbi-phone-records_N.htm[2]
FBI taps cell phone mic as eavesdropping tool
http://news.cnet.com/2100-1029_3-6140191.html[3]
Can you hear me now? Feds admit FBI warrantless cellphone tracking ‘very common’
http://www.washingtontimes.com/news/2013/mar/29/feds-fbi-warrantless-cell-tracking-very-common/[4]
FBI quietly forms secretive Net-surveillance unit
http://www.reddit.com/r/news/comments/u0sry/fbi_quietly_forms_secretive_netsurveillance_unit/[5]
Pentagon sets up new spy agency to eavesdrop on a changing world
Defense Clandestine Service will focus on global threats and emerging economic and military powers
http://www.guardian.co.uk/world/2012/apr/24/pentagon-new-spy-agency[6]
AT&T getting secret immunity from wiretapping laws for government surveillance
http://www.reddit.com/r/technology/comments/1d0zm5/att_getting_secret_immunity_from_wiretapping_laws/[7]
These Are The Prices AT&T, Verizon and Sprint Charge For Cellphone Wiretaps
http://www.forbes.com/sites/andygreenberg/2012/04/03/these-are-the-prices-att-verizon-and-sprint-charge-for-cellphone-wiretaps/[8]
Verizon, AT&T, Others Make Big Bucks Sharing Customer Data
http://www.pcworld.com/article/259628/verizon_atandt_others_make_big_bucks_sharing_custo mer_data.html[9]
Wireless providers side with cops over users on location privacy
The trade association representing AT&T, Verizon, and Sprint opposes a California proposal for search warrants to track mobile devices, claiming it will cause "confusion."
http://news.cnet.com/8301-31921_3-57418662-281/wireless-providers-side-with-cops-over-users-on-location-privacy/[10]
ACLU: Most police track phones' locations without warrants
http://edition.cnn.com/2012/04/03/tech/mobile/police-phone-tracking-gahran/index.html?hpt=hp_t3[11]
“Do not mention to the public or the media the use of cellphone technology or equipment used to locate the targeted subject,” the Iowa City Police Department warned officer
http://www.reddit.com/r/news/comments/ro3s4/do_not_mention_to_the_public_or_the_media_the_use/[12]
Pricey 'stingray' gadget lets cops track cellphones without telco help
http://redtape.msnbc.msn.com/_news/2012/04/03/10986778-pricey-stingray-gadget-lets-cops-track-cellphones-without-telco-help[13]
in Michigan, cops are copying contents of iphones in 2 min. Even for minor traffic violations.
http://www.reddit.com/r/politics/comments/ryk7q/in_michigan_cops_are_copying_contents_of_iphones/[14]
Judge says it's OK to use your seized phone to impersonate you and entrap your friends
http://www.reddit.com/r/technology/comments/wvahz/judge_says_its_ok_to_use_your_seized_phone_to/[15]
Exposed: Inside the NSA’s Largest and Most Expansive Secret Domestic Spy Center in Bluffdale, Utah
https://www.democracynow.org/2012/3/21/exposed_inside_the_nsas_largest_and[16]
The ATF Wants ‘Massive’ Online Database to Find Out Who Your Friends Are
http://www.wired.com/dangerroom/2013/04/atf-database[17]
Reminder To Congress: Cops' Cellphone Tracking Can Be Even More Precise Than GPS
http://www.forbes.com/sites/andygreenberg/2012/05/17/reminder-to-congress-cops-cellphone-tracking-can-be-even-more-precise-than-gps/[18]
Appeals Court OKs Warrantless Wiretapping
http://www.wired.com/threatlevel/2012/08/appeals-court-oks-wiretapping[19]
Senate votes to let the NSA keep spying on you without a warrant until 2017
http://www.reddit.com/r/technology/comments/15kpup/senate_votes_to_let_the_nsa_keep_spying_on_you/[20]
Obama Signs FISA Warrantless Wiretapping Program Extension Into Law
http://www.huffingtonpost.com/2012/12/30/obama-fisa-warrantless-wiretapping_n_2385690.html[21]
Obama administration bypasses CISPA by secretly allowing Internet surveillance
http://www.reddit.com/r/news/comments/1e0amj/obama_administration_bypasses_cispa_by_secretly/[22]
The Illuminati Recruitment Video
http://www.youtube.com/watch?v=QRO6CbmxYsM#t=13m19s[23]
more
NSA has massive database of Americans' phone calls
http://www.usatoday.com/news/washington/2006-05-10-nsa_x.htm[24]
NSA's Domestic Spying Grows As Agency Sweeps Up Data
Terror Fight Blurs Line Over Domain; Tracking Email
http://online.wsj.com/article/SB120511973377523845.html?mod=hps_us_whats_news[25]
NSA's Lucky Break: How the U.S. Became Switchboard to the World
http://www.wired.com/politics/security/news/2007/10/domestic_taps[26]
New York Times‘ NSA Whistleblower Reveals Himself
http://blog.wired.com/27bstroke6/2008/12/ny-times-nsa-wh.html[27]
NSA Domestic Surveillance Began 7 Months Before 9/11, Convicted Qwest CEO Claims
http://blog.wired.com/27bstroke6/2007/10/nsa-asked-for-p.html[28]
Exclusive: Inside Account of U.S. Eavesdropping on Americans
http://abcnews.go.com/Blotter/Story?id=5987804&page=1[29]
Nightline: The NSA Whistle-blower
http://abcnews.go.com/Video/playerIndex?id=2930944[30]
NPR reminds us that the NSA is scanning through EVERYONE's internet traffic.
http://www.reddit.com/r/politics/comments/elap0/npr_reminds_us_that_the_nsa_is_scanning_through/[31]
AT&T Sued Over NSA Eavesdropping
http://www.wired.com/science/discoveries/news/2006/01/70126[32]
Verizon Sued For Giving Records To NSA
http://www.cbsnews.com/2100-250_162-1613877.html[33]
Details Revealed on Secret U.S. “Ragtime” Domestic Surveillance Program
http://www.slate.com/blogs/future_tense/2013/02/28/deep_state_book_uncovers_details_on_ragtime_domest ic_surveillance_program.html[34]
NSA Watching Reporters: Whistleblower
http://go.bloomberg.com/political-capital/2013-03-15/nsa-watching-reporters-whistleblower/[35]
Room 641A
http://en.wikipedia.org/wiki/Room_641A[36]
Shady Companies With Ties to Israel Wiretap the U.S. for the NSA
http://www.wired.com/threatlevel/2012/04/shady-companies-nsa/all/[37]
more
Microsoft provides fusion center technology and funding for surveillance
Did you know Microsoft helps fund the National Fusion Center Association which, in turn, helps police departments buy surveillance tech? In fact, it provides fusion architecture and the Microsoft Fusion Core Solution.
https://www.networkworld.com/community/blog/microsoft-provides-fusion-center-technology-funding-surveillance[38]
NSA helped with Windows 7 development
Privacy expert voices 'backdoor' concerns, security researchers dismiss idea
http://www.computerworld.com/s/article/9141105/NSA_helped_with_Windows_7_development?taxonomyId=6 3[39]
It's Terrifying And Sickening That Microsoft Can Now Listen In On All My Skype Calls
http://www.forbes.com/sites/ericjackson/2012/07/22/its-terrifying-and-sickening-that-microsoft-can-now-listen-in-on-all-my-skype-calls/[40]
more
Google Teams Up with CIA to Fund "Recorded Future" Startup Monitoring Websites, Blogs & Twitter Accounts
http://www.democracynow.org/2010/7/30/google_teams_up_with_cia_[41]
Google Comes Under Fire for 'Secret' Relationship with NSA
http://www.pcworld.com/article/217550/google_comes_under_fire_for_secret_relationship_wi th_nsa.html[42]
Court Rules NSA Doesn't Have To Reveal Its Semi-Secret Relationship With Google
http://www.forbes.com/sites/andygreenberg/2012/05/11/court-rules-nsa-doesnt-have-to-reveal-its-semi-secret-relationship-with-google/[43]
FBI Pursuing Real-Time Gmail Spying Powers as “Top Priority” for 2013
http://www.slate.com/blogs/future_tense/2013/03/26/andrew_weissmann_fbi_wants_real_time_gmail_dropbox _spying_power.html[44]
Use These Secret NSA Google Search Tips to Become Your Own Spy Agency
http://www.wired.com/threatlevel/2013/05/nsa-manual-on-hacking-internet/[45]
more
Leaked Memo Says Apple Provides Backdoor To Governments
http://www.reddit.com/r/technology/comments/o7w2z/leaked_memo_says_apple_provides_backdoor_to/[46]
FBI says Carrier IQ files used for "law enforcement purposes" - Boing Boing
http://www.reddit.com/r/technology/comments/na2ku/fbi_says_carrier_iq_files_used_for_law/[47]
Apple iTunes flaw 'allowed government spying for 3 years'
An unpatched security flaw in Apple’s iTunes software allowed intelligence agencies and police to hack into users’ computers for more than three years, it’s claimed.
http://www.telegraph.co.uk/technology/apple/8912714/Apple-iTunes-flaw-allowed-government-spying-for-3-years.html[48]
Google 'faces $22.5m fine for snooping on iPhone and iPad users' (But it will take them just 17 hours to make)
http://www.dailymail.co.uk/news/article-2171417/Google-faces-22-5-fine-snooping-iPhone-iPad-users-But-just-17-hours-make.html[49]
Judge refuses to authorize FBI spy Trojan that can secretly turn your webcam into a surveillance camera.
http://www.reddit.com/r/technology/comments/1d3i1z/judge_refuses_to_authorize_fbi_spy_trojan_that/[50]
more
ACLU: License Plate Scanners Are Logging Citizen's Every Move: It has now become clear that this automated license plate readers technology, if we do not limit its use, will represent a significant step toward the creation of a surveillance society in US
http://www.reddit.com/r/technology/comments/mlim2/aclu_license_plate_scanners_are_logging_citizens/[51]
Your car, tracked: the rapid rise of license plate readers
Largely unregulated, cameras now collect millions of travel records every day.
http://arstechnica.com/tech-policy/2012/08/your-car-tracked-the-rapid-rise-of-license-plate-readers/[52]
Police cameras quietly capture license plates, collect data
http://www.startribune.com/local/minneapolis/165680946.html?refer=y[53]
U.S. Customs Tracks Millions Of License Plates And Has Shared Data With Insurance Firms
http://www.forbes.com/sites/andygreenberg/2012/08/21/documents-show-u-s-customs-tracking-millions-of-license-plates-and-sharing-data-with-insurance-firms/[54]
WIKILEAKS: Surveillance Cameras Around The Country Are Being Used In A Huge Spy Network.
http://www.reddit.com/r/AnythingGoesNews/comments/y0ijh/wikileaks_surveillance_cameras_around_the_country/[55]
Papers released by WikiLeaks show US department of homeland security paid $832,000 to deploy TrapWire system in two cities
http://www.reddit.com/r/evolutionReddit/comments/y7yur/papers_released_by_wikileaks_show_us_department/[56]
FBI moves forward with plans to build $1billion database of Americans' photographs for new facial recognition software
http://www.dailymail.co.uk/news/article-2200533/FBI-moves-forward-plans-build-1billion-photographic-database.html[57]
FBI launches $1 billion face recognition project
http://www.newscientist.com/article/mg21528804.200-fbi-launches-1-billion-face-recognition-project.html[58]
FBI Agrees to Share Facial Recognition Searches with All Police Departments
http://www.allgov.com/news/top-stories/fbi-agrees-to-share-facial-recognition-searches-with-all-police-departments?news=845099[59]
Undercover cops secretly use smartphones, face recognition to spy on crowds
http://blogs.computerworld.com/privacy/21010/undercover-cops-secretly-use-smartphones-face-recognition-spy-crowds[60]
New Jersey Bans Smiling in Driver’s License Photos
http://abcnews.go.com/blogs/headlines/2012/09/new-jersey-bans-smiling-in-drivers-license-photos/[61]
Court OKs warrantless use of hidden surveillance cameras
In latest case to test how technological developments alter Americans' privacy, federal court sides with Justice Department on police use of concealed surveillance cameras on private property.
http://news.cnet.com/8301-13578_3-57542510-38/court-oks-warrantless-use-of-hidden-surveillance-cameras/[62]
Armored truck with cameras will roam St. Pete neighborhoods
http://www.myfoxtampabay.com/story/20046476/2012/11/08/armored-truck-with-cameras-will-roam-st-pete-neighborhoods[63]
Obama signs secret directive to help thwart cyberattacks
http://www.washingtonpost.com/world/national-security/obama-signs-secret-cybersecurity-directive-allowing-more-aggressive-military-role/2012/11/14/7bf51512-2cde-11e2-9ac2-1c61452669c3_story.html[64]
Attorneys: Obama’s ‘secret’ cyber security law may allow ‘military deployment within the U.S.’
http://www.rawstory.com/rs/2012/11/15/attorneys-obamas-secret-cyber-security-law-may-allow-military-deployment-within-the-u-s/[65]
Public Buses Across Country Quietly Adding Microphones to Record Passenger Conversations
http://www.wired.com/threatlevel/2012/12/public-bus-audio-surveillance/[66]
New TriMet buses can record conversations
http://www.kgw.com/news/local/New-TriMet-buses-record-conversations-191078271.html[67]
more
Homeland Security opening private mail
http://www.nbcnews.com/id/10740935#.URtWe_Jcnn4[68]
Bush says feds can open mail without warrant
President Bush quietly has claimed sweeping new powers to open Americans' mail without a judge's warrant. Bush asserted the new authority...
http://seattletimes.com/html/nationworld/2003508676_mail04.html[69]
Law enforcement requests for postal info granted
http://usatoday30.usatoday.com/news/nation/2008-03-05-mail_N.htm[70]
more
Main Core
http://en.wikipedia.org/wiki/Main_Core[71]
Feds Warrantlessly Track Americans' Credit Cards in Real Time
http://www.reddit.com/r/business/comments/efcqt/feds_warrantlessly_track_americans_credit_cards/[72]
EXCLUSIVE - U.S. to let spy agencies scour Americans' finances
http://in.reuters.com/article/2013/03/13/usa-banks-spying-idINDEE92C0EH20130313[73]
IRS claims it can read your e-mail without a warrant. The ACLU has obtained internal IRS documents that say Americans enjoy "generally no privacy" in their e-mail messages, Facebook chats, and other electronic communications.
http://www.reddit.com/r/technology/comments/1c2gpg/irs_claims_it_can_read_your_email_without_a/[74]
IRS apologizes for targeting conservative groups
http://www.usatoday.com/story/news/politics/2013/05/10/irs-apology-conservative-groups-2012-election/2149939/[75]
Spies on the cloud? Amazon said working with CIA
Amazon is reported to be helping the CIA build out a cloud service worth up to $600 million over 10 years.
http://news.cnet.com/8301-1023_3-57575154-93/spies-on-the-cloud-amazon-said-working-with-cia/[76]


UK government to monitor web and email use under new legislation set to be announced soon
http://www.reddit.com/r/worldnews/comments/rnqst/uk_government_to_monitor_web_and_email_use_under/
GCHQ to trawl Facebook and Twitter for intelligence
Civil liberties fears as eavesdropping agency recruits maths, physics and computing experts to analyse social networks
http://www.guardian.co.uk/technology/2012/oct/31/gchq-facebook-twitter
The Kremlin’s New Internet Surveillance Plan Goes Live Today
http://www.wired.com/dangerroom/2012/11/russia-surveillance/all/
India's government can now snoop on all Internet communications: "The government has given itself unprecedented powers to monitor private internet records of citizens"
http://www.reddit.com/r/technology/comments/1dxupd/indias_government_can_now_snoop_on_all_internet/



So, in short. YOU'RE NOT FREE.

*waves to NSA <insert agency name here>*

Comments

  • DfgDfg Admin
    edited June 2013
    And more here:
    Wow that's some bullshit; following the story of AT&T and warrentless wiretaps from 2006, from this link about the case Election Frontier Foundation (EFF)v AT&T:[1]
    In June of 2006, the Court rejected both the government's attempt to dismiss the case on the grounds of the state secret privilege and AT&T's various arguments in favor of dismissal.
    In August of 2007, the Ninth Circuit Court of Appeals heard oral argument on the case. No decision was reached, however In July, 2008, after a long and contentious battle in Congress, the government and AT&T were awarded the so-called retroactive immunity from liability under the controversial FISA Amendments Act (FAA), which was enacted in response to our court victories in Hepting. Signed by President Bush in 2008, the FAA allows the Attorney General to require the dismissal of the lawsuits over the telecoms' participation in the warrantless surveillance program if the government secretly certifies to the court that the surveillance did not occur, was legal, or was authorized by the president. The AG filed the required certification in September of 2008.
    In June of 2009, a federal judge dismissed Hepting and dozens of other lawsuits against telecoms. EFF appealed that decision but it was affirmed, and in October, 2012, the Supreme Court declined to hear the case.
    And then another case Jewel v NSA[2] , (filed by EFF) on the same issue was reinstated by appeal on December 29th 2011 after being dismissed, however:
    As of June 2013 the case was still pending before Judge Jeffrey White of the U.S. District Court for the Northern District of California.
    Looks like we haven't been paying attention for a while now. When's the protest scheduled?
    edit: Oh god, looking at some more links:
    NSA helped with Windows 7 development[3] (11/18/2009)
    Court Rules NSA Doesn't Have To Reveal Its Semi-Secret Relationship With Google[4] (05/11/2012)
    Leaked Memo Says Apple Provides Backdoor To Governments[5] --article link[6] (01/08/2012)
    and from one of the comments[7] , pointing out this has been happening for years: :
    FBI pressuring Google, Facebook to allow ‘back doors’ for wiretapping[8] (11/17/2010)
    And apparently NSA warrentless wiretapping was revealed in 2005 by whistleblower Russ Tice[9] who was fired (05/2005), and the investigation into his claims said there was "no evidence" to support it. (09/2005)
  • DfgDfg Admin
    edited June 2013
    [h=3]List of Proven Conspiracies - from Wikipedia[/h]
    [This appears to have been removed from Wikipedia, where it originally was posted]

    List of proven conspiracies

    Wikipedia, the free encyclopedia
    Cite This Source

    This is a list OR INDEX of conspiracies considered proven to have existed or officially covered-up (and or later discovered) with or without newer evidence.

    Included are events described by different meanings of the word conspiracy: an agreement between two or more natural persons to break the law (or have the law unconstitually changed) at some time in the future (civil conspiracy and criminal conspiracy); conspiracy in the sense of conspiracy theory; or actions undertaken in secret (and outside public legislative processes) to obtain some goal, usually understood with negative connotations.

    1st century BC

    63 BC The second Catiline conspiracy
    Failed assassination of Cicero on the morning of November 7 and plans to take control of the government through arson and slaughter of the senators.
    44 BC Caesar assassination plot
    On March 15, 44 BC, Julius Caesar was assassinated by a conspiracy that included his friend Brutus.

    1600s
    1605 The Gunpowder Plot
    An attempt by a group of provincial English Catholic extremists to kill King James I of England, his family, and most of the Protestant aristocracy in one attack by blowing up the Houses of Parliament during the State Opening. Guy Fawkes Day is named after one of the (lesser) conspirators and is celebrated with fireworks. Some modern historians believe the plot may have been either orchestrated or allowed to run its course by the Protestant elite for propaganda value. See also: Popish Plot.

    1700's
    1763 Small pox infected blankets given to Native Americans
    In response to the 1763 uprising known as Pontiac's Rebellion, Jeffrey Amherst, 1st Baron Amherst suggested using smallpox as a weapon for ending the rebellion. In a series of letters to his subordinate Colonel Henry Bouquet, the two men discussed the possibility of infecting the attacking Indians with smallpox through gifts of blankets that had been exposed to the disease. Apparently unbeknownst to both Amherst and Bouquet, the commander at Fort Pitt had already attempted this very tactic. Although Amherst's name is usually connected with this germ warfare because he was the overall commander and because of his correspondence with Bouquet, evidence appears to indicate that the attempt was made without Amherst's prior knowledge. See Pontiac's Rebellion for references and details.

    1800's
    1810 to 1850 the Underground Railroad
    The Underground Railroad was a network of clandestine routes by which African slaves in the United States escaped to freedom, with the aid of abolitionists. It consisted of clandestine routes, transportation, meeting points, and safe houses maintained by sympathizers. These individuals were organized into small groups who, for the purpose of maintaining secrecy, knew only of connecting "stations" along the route.
    1865 The Assassination of President Abraham Lincoln
    President Lincoln was murdered by John Wilkes Booth but Booth was involved in a larger conspiracy to kill Lincoln and several members of his cabinet.
    1894 The Dreyfus affair
    In 1894 Alfred Dreyfus, a Jewish officer in the French army, was convicted of treason. Dreyfus was innocent; the conviction rested on false documents, and when officials realised this they attempted a cover up. The writer Émile Zola exposed the affair.
    1894 Overthrow of the Kingdom of Hawaii
    Queen Lili'uokalani was selected as the successor to King Kalākaua by Kalākaua upon his election in 1874. During her brother's reign the monarchy was left impotent by the Bayonet Constitution of 1887. In 1893, American businessmen organized in response to an attempt by Lili'uokalani to subvert the 1887 constitution, and took over the government of the Kingdom of Hawai'i. American troops aboard the USS Boston landed in Honolulu to protect American lives and property, while Sanford B. Dole and Lorrin A. Thurston's Committee of Safety, a 13 member council of businessmen, organized the Honolulu Rifles to depose Queen Lili'uokalani. The overthrow of the Kingdom of Hawai'i and the subsequent annexation of Hawai'i are sometimes cited as examples of American imperialism.
    1898-1913 Western Water Rights: Los Angeles vs. Owens Valley
    The agent of the Bureau was a close friend of Eaton, so Eaton had access to inside information about water rights. Eaton bought land as a private citizen, hoping to sell it back to Los Angeles at a vast profit. Eaton lobbied Theodore Roosevelt and got the local irrigation system cancelled. Mulholland misled residents of the Owens Valley, by claiming that Los Angeles would take water only for domestic purposes, not for irrigation. By 1905, through purchases and bribery, Los Angeles purchased enough water rights to enable the aqueduct. The aqueduct was sold to the citizens of Los Angeles as vital to the growth of the city. However, unknown to the public, the initial water would be used to irrigate the San Fernando Valley, north of the city. A syndicate of investors (again, close friends of Eaton, including Harrison Gray Otis) bought up large tracts of land in the San Fernando Valley with this inside information. This syndicate made substantial efforts to the passage of the bond issue that funded the aqueduct including creating a false drought (by manipulating rainfall totals) and publishing scare articles in the Los Angeles Times. See California Water Wars.

    1900's
    1913 Federal Reserve Act
    Claimed to have been written by Paul Warburg. Passed by quorum remaining as many left for Christmas break. Planned in secret on Jekyll Island some 3 years earlier1910. See among other sources "The Creature from Jekyll Island" by G. Edward Griffin; Secrets of the Federal Reserve by Eustace Mullins
    1919 Black Sox Scandal
    During the 1919 World Series, Eight members of the Chicago franchise conspired with gamblers to intentionally lose games.
    1930's National Crime Syndicate
    1932 General Motors streetcar conspiracy
    Before WWII, Los Angeles had the largest electric trolley system in the world. It is generally believed that General Motors, Firestone Tire and Rubber, Standard Oil, and National City Lines conspired to eliminate it. A federal court decided that the companies had violated the Sherman Antitrust Act and each was "fined" the paltry sum of $5,000. Company officials were also found guilty and fined one dollar each.
    1932 to 1972 Tuskegee Syphilis Study
    U.S. Public Health Service monitors 399 poor blacks with syphilis and withholds their diagnosis from them. Partners and children (congenially) are subsequently infected.
    1945 Nazi gold
    The whereabouts of the Nazi regime's gold deposits are still unknown. See also PBS Frontline: Nazi Gold
    1950 Project MKULTRA
    Project MKULTRA (also known as MK-ULTRA) was the code name for a CIA mind-control research program lasting from the 1950s through the late 1960s. It was first brought to wide public attention by the U.S. Congress (in the form of the Church Committee) and a presidential commission (known as the Rockefeller Commission) (see Revelation below) and also to the U.S. Senate. Also mentioned in the Rockefeller Commission report are other operations where informed consent was waived or unethically ignored for other operations like Operation Whitecoat.
    1953 Operation Midnight Climax
    Operation Midnight Climax was an operation initially established by Dr. George Hunter White under the alias of Morgan Hall for the CIA. The project consisted of a web of CIA run brothels in San Francisco and New York. It was established in order to study the effects of LSD on unconsenting individuals after the supply of consenting patients ran out.
    1953 Operation Ajax
    Operation Ajax (officially TP-AJAX) was an Anglo-American covert operation to overthrow the democratically elected government of Iran and Prime Minister Mohammed Mossadegh and restore the exiled Shah Mohammed Reza Pahlavi to the throne as a dictator.
    1954 Operation PBSUCCESS
    Operation PBSUCCESS was a CIA-organized covert operation that overthrew the democratically-elected President of Guatemala, Jacobo Arbenz Guzmán in 1954.
    1956 COINTELPRO
    An FBI program originally begun to "increase factionalism, cause disruption and win defections" inside the Communist Party U.S.A., the program was soon enlarged to include the Socialist Workers Party, it quickly expanded to cover Black Liberation groups, Puerto Rican independence groups, the American Indian Movement, the Students for a Democratic Society & Student Nonviolent Coordinating Committee, antiwar, community, and religious groups. Its most infamous act was the assassination, carried out by the Chicago Police Department, of Black Panther Fred Hampton. The program was secret until 1971, when an FBI field office was burglarized by a group of left-wing radicals calling themselves the Citizens' Commission to Investigate the FBI.
    1961 Bay of Pigs invasion
    Cuban expatriates backed by the U.S. government attempted to invade Cuba at Cuba's Bay of Pigs in the Bay of Pigs invasion of April 1961. The expected urban revolt failed to materialise due to popular support for Castro. The Soviet Union had also warned Castro, who ordered executions and preemptive mass arrests of those thought likely to support a counter-revolution.
    1961 The Cuban Project
    The Cuban Project, also known as "Operation Mongoose" is the general name for CIA covert operations and plans initiated by President John F. Kennedy on November 30, 1961 which authorized aggressive covert terrorist operations against Communism in the Cuban Republic, including several assassination attempts against the Cuban head of state, Fidel Castro. The operation was led by Air Force General Edward Lansdale and came into being after the failed Bay of Pigs invasion.
    The goal of The Cuban Project was to "help Cuba overthrow the Communist regime", overthrow its leader Fidel Castro, and aim "for a revolt which can take place in Cuba by October 1962". See also, "Operation Northwoods", proposed by the Joint Chiefs of Staff, which included terrorist actions against targets in the U.S. that were to be blamed on Cuba ("false flag" operations), which was never carried out.
    1962 Operation Northwoods
    Operation Northwoods or Northwoods was the code name for various proposals for false flag actions, including domestic terror attacks on U.S. soil, proposed in 1962 by senior U.S. Department of Defense leaders to generate U.S. public support for military action against Cuba. The proposal was presented in a document entitled "Justification for US Military Intervention in Cuba," a draft memorandum pdf) written by the Department of Defense (DoD) and Joint Chiefs of Staff (JCS) representative to the Caribbean Survey Group. The draft memo was presented by the JCS to Secretary of Defense Robert McNamara on March 13 with one paragraph approved, as a preliminary submission for planning purposes. However, McNamara rejected the proposal. The draft memorandum was declassified in recent years through a Freedom of Information Act request by the National Security Archive.
    1964 Gulf of Tonkin incident
    On August 4, 1964, North Vietnamese ships had allegedly attacked US destroyers, in what has come to be known as the Gulf of Tonkin Incident which led to Lyndon B. Johnson to drastically increase troop levels in Vietnam. On November 30, 2005, the National Security Archive released hundreds of pages of documents revealing that President Johnson was shown only selective intelligence and that the August 4th attack in all likelihood never occurred.
    1965 Suppressing Sarkhan
    The followup book to The Ugly American by William Lederer and Eugene Burdick disappears from bookstores. Lederer claims the CIA did it because it revealed too much about then current operations in Thailand. It was finally released in 1977 under the title 'The Deceptive American'.
    1967 to ? USS LIBERTY
    Attack on USS Liberty (AGTR-5) LBJ called back rescue planes TWICE after Radio operator found a workaround jamming and called to carrier group for mayday. Israel used unmarked planes and boats to twice attack U.S.Navy listening post ship; jamming American radio channels as a "no flag"/false flag operation. Ruled officially a accident but some largely symbolic reparations were paid. Official coverup continues. The purpose was allegedly to suggest an attack on US by Egypt, in an attempt to get USA involved in the war, fighting on the Israeli side.
    1969 Secret Bombing of Cambodia
    Operation Menu was the codename for secret US bombing of alleged North Vietnamese strongholds and supply lines in Cambodia during the Vietnam War in 1969. The bombing, of a nation the US was not at war with, began with Operation Breakfast on March 17, 1969 and was conducted in secret until the New York Times broke the story on May 8, 1969.
    1969 to 1982 Italian Strategy of tension
    Conspiracy involving NATO and the Italian masonic lodge Propaganda Due
    1970 to ? Air America & Operation Scatback
    (linked to Mena Arkansas) Book By Terry Reed Contra/CIA contractor flight instructor:
    Compromised: Clinton, Bush and the CIA* (How
    the Presidency was co-opted by the Central Intelligence Agency) *
    1972 to 1974 Watergate scandal
    Grand conspiracy involving the President of the United States.
    1975-1999 Indonesian occupation of East Timor
    U.S. President Gerald Ford and Secretary of State Henry Kissinger had met President Suharto of Indonesia in Jakarta where Ford made it clear that "we will not press you on the issue" of the invasion and occupation of East Timor. Several U.S. administrations up to and including that of Bill Clinton did not ban arms sales to the Indonesian government, though the latter did eventually end U.S. support of Suharto's regime. The territory was declared the 27th province of Indonesia in July 1976 as Timor Timur. However, internationally its legal status was that of a "non-self-governing territory under Portuguese administration." See also Manufacturing Consent: Noam Chomsky and the Media: A centerpiece of the film is a long examination into the history of The New York Times's coverage of Indonesia's invasion and occupation of East Timor, which Chomsky claims exemplifies the media's unwillingness to criticize an ally and uses as an example of self-censorship in western media.
    1981 to 1986 Iran-Contra
    The Iran-Contra Affair (also known as "Irangate") was a mid-1980s political scandal in the United States. President Ronald Reagan's administration sold arms to Iran, an avowed enemy. At the time, Americans were being held hostage in Lebanon by Hezbollah, a militant Shi'a organization loyal to Ayatollah Khomeini, and it was hoped that Iran would influence them to release the hostages; at the same time, Iran, which was in the midst of the Iran-Iraq War, could find few nations willing to supply it with weapons. The U.S. diverted proceeds from the sale to the Contras, anti-Communist guerrillas engaged in an insurgency against the left wing Sandinista government of Nicaragua. Both the sale of weapons and the funding of the Contras violated stated administration policy as well as legislation passed by the Democratic-controlled Congress, which had blocked further Contra funding. * Incomplete without mentioning Mena Arkansas as a base of operations and the drugs for arms bartering * with among other connections, to The Bluegrass Conspiracy a book by Sally Denton detailing drugs and corrupton involving the commissioner of Kentucky State Police, (who resigned) officers and other officials as reported in newspapers.
    1988 Nelson Bunker Hunt and Silver Thursday
    Nelson Bunker Hunt declared bankruptcy and was convicted in August 1988 of conspiring to manipulate the market.
    1990 Las Vegas American Coin Fixed Video Poker Conspiracy
    Las Vegas Sun: November 06, 1997 Arrest made in '90 murder; warrant issued for second man "American Coin, at the time, was the state's fourth largest slot route operator, with more than 1,000 machines in various Las Vegas locations. The company was charged with altering 300 machines." "After Volk told authorities of the computer chip scam at American Coin, the company was closed and the gaming licenses of the owners -- Rudolph and Rudy M. LaVecchia and Frank Romano -- were surrendered in a deal that required them to pay a $1 million fine to the state in the February 1990 deal." Larry Volk, the programmer of the fixed computer chip (ROM), was found shot dead, execution style, after agreeing to testify in the case. See also Comdex '99: The mysterious death of Larry Volk, Las Vegas Review Journal: Harris case nothing compared to the big one that went away
    1993 Assassination plot against President George H.W. Bush
    On April 13, 1993, several Iraqi nationals were arrested in Kuwait and charged with plotting to assassinate former President Bush via car bomb during a visit to Kuwait. Later, a court in Kuwait convicted all but one of the defendants. On 26 June, 1993, President Clinton launched a missile attack targeting Baghdad intelligence headquarters in retaliation for the attempted attack against Bush.
    1993 WTC terrorist attack
    In the 1993 World Trade Center bombing, a truck filled with explosives was planted by terrorists and detonated in the underground garage of the north tower, opening a 30m hole through 4 sublevels of concrete. Six people were killed and over a thousand injured.
    According to a presiding judge, the conspirators' chief aim at the time of the attack was to de-stabilize the north tower and send it crashing into the south tower, toppling both landmarks.
    1994 Diamonds are forever?
    In 1994 De Beers was charged by the United States Justice Department with Sherman Antitrust Act violations for conspiring to fix prices for industrial diamonds. On 14 July 2004 De Beers pleaded guilty to the charges and paid a $10 million fine. According to PBS: Frontline: The Diamond Empire: "EDWARD EPSTEIN, Author, "The Rise and Fall of Diamonds": Well, what I learned was that the diamond business wasn't a business of extracting, as I originally expected, something of enormous value and then simply seeing how much of this object you could get out of the ground and selling it. That was what the business appeared to be when I started my venture. But their real business was restricting what came out of the ground, restricting what was discovered, restricting what got cut, restricting what actually found its way into the retail market and, at the same time, through movies, through advertising, through Hollywood, through the manipulation of perceptions, creating the idea that there was this enormous demand for these shiny little objects that they seemed to have in abundant supply. So I wound up on this voyage of discovery starting off with the idea that there was this object of great value, and it was just a question of how many could you get out, and I wound up discovering it was just the opposite." See also Crater of Diamonds.
    1995 The Bojinka Plot
    The Bojinka plot refers to a three-part conspiracy: the plot to destroy 11 airliners on January 21 and 22, 1995; the plan to kill Pope John Paul II on January 15, 1995 during a papal visit to the Philippines; and the third part of this conspiracy was a plan to crash a plane into the CIA headquarters in Fairfax County, Virginia and other buildings. The Bojinka plot was prevented on January 6 and 7, 1995.
    1995 Oklahoma City bombing
    The Oklahoma City bombing was a terrorist attack on April 19, 1995, in which the Alfred P. Murrah Federal Building, a U.S. government office complex in downtown Oklahoma City, Oklahoma, was destroyed, killing 168 people. The (Oklahoma) McCurtain Daily Gazette has reported that at least one member of the secret services and an informant for the BATF (Bureau of Alcohol, Tobacco and Firearms) had prior knowledge that the attack was about to take place, a charge which the FBI deny. The newspaper also alleges that the FBI and the Southern Poverty Law Section, as part of a top-secret undercover operation, may have indeed assisted the bombers in their plans as part of a failed sting operation, citing evidence given in a court case by a BATF informant and data published under the Freedom of Information Act as 'proof'.
    Other reports point variously to the quick response of agents dressed in full 'mop-gear' clothing, as if pre-prepared for an explosion; the fact that the BATF offices (in the bombed building) were empty at the time of the explosion; FBI reluctance to release sensitive documentation relating to the case, and rumours of an SMS warning sent out to BATF staff as further 'evidence' of a major conspiracy. These reports are largely based on empirical evidence and circumstantial information, and remain unproven.
    1995 to 2004 Jack Abramoff Indian lobbying scandal
    The Jack Abramoff Indian lobbying scandal is a United States political scandal relating to the work performed by political lobbyists Jack Abramoff, Ralph E. Reed, Jr., Grover Norquist and Michael Scanlon on behalf of Indian casino gambling interests for an estimated $85 million in fees. Abramoff and Scanlon grossly overbilled their clients, secretly splitting the multimillion-dollar profits. In one case, they secretly orchestrated lobbying against their own clients in order to force them to pay for lobbying services.

    2000's
    2001 Enron and Arthur Andersen
    The company and its Big Five accounting firm conspired to commit accounting fraud. Fortune named Enron "America's Most Innovative Company" for six consecutive years.
    2002 Las Vegas Venetian Rigged Drawing
    The Venetian casino employees conspired to rig drawings. According to the Las Vegas Sun: July 15, 2004 Venetian contest rigger lectured by regulators: "Mok said he rigged the drawing because a high-roller he was hosting lost $5 million gambling and the employee "didn't want to see him go home empty-handed."" The Venetian agreed to pay a $1 million fine to settle a 12 count complaint. "Board member Bobby Siller ... compared the additional damage inflicted by attempting to cover up the scheme with the trouble former President Richard Nixon brought upon himself during the Watergate burglary investigation." Four Venetian employees lost their licenses to work in the Nevada gaming industry but were quickly hired by casinos in other states. According to the Las Vegas Sun: "Michael French, the former senior vice president of operations, became the chief operating officer for the Inn of the Mountain Gods casino in Mescalero, N.M. Brian Parrish, formerly the vice president of marketing, became the marketing director for the same New Mexico tribal casino. The Mescalero Apache Tribe said they believed the involvement by French and Parrish in the scheme was more than offset by their wide-ranging experience. Don Richardson, another Venetian executive involved in the incident, surfaced as the director of operations at the Wildfire, a small casino owned by Station Casinos Inc. Station officials said the company's regulatory compliance department investigated the matter and determined that Richardson was suitable for the position."
    2004 Secret CIA Prisons
    A story by reporter Dana Priest published in The Washington Post of November 2, 2005, reported that "The CIA has been hiding and interrogating some of its most important al Qaeda captives at a Soviet-era compound in Eastern Europe, according to U.S. and foreign officials familiar with the arrangement."[4]
    The report contends that the CIA has a worldwide covert prison system with facilities in Asia, Eastern Europe, and in Guantanamo Bay in Cuba. The system is central to the agency's anti-terror role, and according to the report has been kept secret from government officials (including Congressional committees that oversee the CIA) through the agency's own efforts as well as cooperation with foreign intelligence services.
    This conspiracy was proven in 2006 when President Bush admitted that indeed there are secret CIA prisons in Europe and elsewhere.
    2005 Ahmed Omar Abu Ali
    On November 23 a federal jury convicted Ahmed Omar Abu Ali, a citizen of the United States, on nine counts, including conspiracy to assassinate the president, and conspiracy to commit aircraft piracy.
    2005 DRAM price fixing
    In October Samsung pled guilty to conspiring with other companies, including Infineon and Hynix Semiconductor, to fix the price of DRAM. Samsung was the third company to be charged in connection with the international cartel and was fined $300M. In October 2004 four executives from Infineon were sentenced to 4 to 6 months in prison and $250,000 in fines after agreeing to aid the U.S. Department of Justice with their investigation of the conspiracy.
    2005 Bernard Ebbers
    He was convicted of fraud and conspiracy in the largest (to date) accounting scandal in U.S. history, as a result of WorldCom's false financial reporting, and subsequent 180 billion dollar loss to investors.

    Via http://conspiraciesthatweretrue.blogspot.com/2007/01/list-of-proven-conspiracies-from.html
  • DfgDfg Admin
    edited June 2013
    I wonder when we'll talk about Carnivore (2003, NSA) and Miranda (2000? Microsoft coording with NSA).
    Carnivore analyzes all available data for persons of interest (people on the list). If you're on the list of any department at all, Carnivore is stalking you. Not little bit, but a lot. The original intention was to unify the intelligence of the agencies so they could cross reference each other. It has grown to include tracking the data transactions of people on the list. Any agency and lean on its knowledge, no warrant required. They can't get away with using that knowledge publicly without a warrant, but they can access it.
    Miranda is a Microsoft cooperation initiative that puts a finger on your OS to distinguish data streams and track targets. IIRC This expanded with Windows 7 in ways that add the ability to run a process without reporting CPU usage or memory usage. It can also make undisclosed network connections (OS won't report it but Wiresharp will catch it embedding a destination packet payload in a packet targeting the local network). Back in 2009 Anon caught found this, believe it's archived from /g/.
    I don't think it's really sunk in for you yet. They're not just logging the data transactions. They're storing the payloads and they don't need any external authorization to go through it. Hell, agents will even use it to spot check the person their kid is dating.
    Tricky bit about all of it is that there's too much raw data captured to do anything with unless it's targeted. Thought from what I hear the Utah facility will handle that problem.



    Yeah and here is some more information to help you fight it.
    Chat:
    Anything that supports OTR (Off-The-Record messaging) is secure and desirable. It's a plugin that encrypts your chat, ensuring that only you and your friend can see the contents of the messages. Anyone listening in would have to spend hundreds of thousands of computer hours decrypting even a single message.
    • Use Adium on OS X and Pidgin with OTR on Windows or Linux.
    • Use Gibberbot on Andorid (Free) or ChatSecure on iOS (price?). These both support OTR.
    Do not chat on Facebook.com or with Google Talk in Gmail.com/Google+/Google Hangouts.
    • These services log your communication, provide it to third parties, and do not support encryption. You and your Facebook friends can still chat on that account with OTR if you both use Pidgin/Adium or another client.
    Do not use text messages, Skype, or iChat.
    • Your data is shared with third parties and they don't support encryption. Microsft actually removed Skype's secure architecture on purpose so they could surveil their users.
    Switching to encrypted chat is one of the easiest and most effective ways to take back some of your privacy.
    Storing Files:
    Whenever you want to store anything sensitive, use TrueCrypt and create either an encrypted USB drive or an encrypted file container.
    • You'll have to enter a secure password to open the drive or container, and you'll then be able to store files to it securely. When you close the container it'll encrypt your files.
    Use OwnCloud or SpiderOak to store files in the cloud.
    • Both of these support encryption and ensure that only you and the people you choose can access your files.
    Do not use Google Drive, iCloud, or DropBox to store any personally identifiable information (or preferably anything).
    • Cloud services store your files in a way that allows them to read their contents, and they will provide your files to any law enforcement agency. Like other popular services, these products were explicitly mentioned as having backdoors that allow for easy surveillance.
    Consider using a system that supports Full Disk Encryption. This will ensure that as soon as you turn your computer off all of your files are secure. You'll have to enter a secure password when you turn your computer on.
    • Ubuntu (Linux), OS X, and Windows all support FDE, and there are many guides online. You'll most likely have to reinstall your operating system to switch over.
    Phones:
    Your smartphone reports your location to your telephone company and the company that sold you the phone at all times.
    • Your location is obtained via GPS, WiFi SSID reporting, cell phone tower triangulation, and your IP address. (The upshot being that if your phone connects to anything, it's capable of determining your location.)
    If your phone backs up your personal settings to Apple or Google (such as WiFi password, your contacts, etc.), those companies can access it and will provide it to third parties if legally required to do so.
    Check the permissions of the apps you install. Any app that needs access to phone permissions is probably sending your contact list to its creators. This information is highly valuable.
    There is no secure smartphone.
    There's no smartphone that does not expose personally identifiable information about you.
    There's currently no way to use a smartphone in a way that's even remotely as secure as a computer.
    • A WiFi-only device running a build of the Android Open Source Project is as close as you can get. Even then the privacy tools aren't as good as on a desktop, and mobile apps are desgned from the ground up to obtain usage analytics. It's just considered normal on mobile platforms.
    Even if you have a lock screen, law enforcement can plug in a device that dumps the contents of your phone's storage and memory, bypassing this security.
    • It's also speculated that iOS's device-level encryption has a backdoor for law enforcement. Their solution is closed-source and thus cannot be vetted by security professionals.
    • It's unclear whether Android also supports this.
    Browsing:
    Use Firefox or Chromium for all web browsing
    • Both of these browsers are open source and have been vetted for security and privacy
    • Firefox has robust privacy addons that tend to superior to Chrome's/Chromiums' (in my opinion). I find Ghostery, NoScript, and AdBlock Plus superior on Firefox, and it supports addons like Convergence and Google Sharing. Its syncing options also allow you to do client-side encryption and to use your own server.
    • Firefox is also not made by a company whose business is built around obtaining your personal information.
    Do not use Google Chrome.
    • It's closed-source and thus it cannot be vetted by programmers and public security researchers.
    • Google's Privacy Policy grants them permission to monitor all information you enter into Chrome.
    • The Google Instant bar searches Google as you type. Which means that if you type Facebook.com it will search Google for every letter, revealing what sites you visit to Google.
    • Choosing to sync your Chrome settings will send your browsing history, bookmarks, cookies, and other settings to Google.
    • It has many additional features that send your personal information to Google, such as text fields that send your data to Google to get spelling suggestions.
    Use the Tor Browser Bundle for anything sensitive.
    • Tor is an anonymity network as well as a "deep web." You can either obscure the location and identity of your computer, or connect to websites that are inaccessible to the Internet at large, and only to people using Tor. This is extremely secure.
    • Using Tor doesn't mean you're always safe to post personally identifiable information, or that your connection to public Internet sites (not on the darknet) is encrypted from the exit node to the site.
      • If possible, do not use Facebook. There is absolutely zero information on Facebook that is not actively shared with Facebook and dragnet surveillance efforts.
      • If possible, do not use Google+. It suffers from the same insecure design as Facebook, except Google is even more plugged into your personal life.
    Other popular deepweb projects are I2P and Freenet. They're used for free speech activities, and I2P also operates exit nodes as an anonymizing proxy.
    For extremely sensitive browsing, burn a live CD or a live USB key of Ubuntu or another Linux distribution. This ensures that none of your personal data will be saved to the drive, and your machine will be secured as soon as you turn it off.
    Email:
    There are no secure web-based email providers.
    • All of your emails are stored in a way where it can be easily accessed.
    • The legal requirements for reading old email are far more lax than the requirements for reading recent email.
    • There have been legal rulings stating that because your email is on a remote server, it is not your personal information.
    To my knowledge, the only slightly realistic way to secure email is to use GPG.
    • You can use a plugin like FireGPG in Firefox. You and your contacts will have to generate key pairs and exchange public keys. The process is not nearly as simple as OTR.
    • No web provider makes it easy to do this. Changes in the web interfaces will break your GPG plugin. The only really good way to do this is to stop using the web interface at all, and use a standalone email client like Thunderbird or Evolution.
    • It's not in any free email provider's best interest to make your email secure.
    Basically, do not send sensitive emails. Do not assume you can ever delete an email.
  • DaktologistDaktologist Global Moderator
    edited June 2013
    Fuck if you were to plan something big, I'd go the old fashioned way and use pen and paper. Now watch the government spy on that (probably won't stop them kicking the door in at 4 am because they suspect something). Or go all out and write it all in coded messages. Chances are they wouldn't suspect a thing straight away considering they think everyone will store such documents on their PC. Obviously its fairly limited to what you can do on paper but is one way of keeping it relatively secure plus you can incinerate paper easier than an HDD.

    Sooner or later they will have mandatory monitoring of everything and CCTV installed in our homes, cars and whatnot. You won't even be able to take a shit without at least 50 spooks knowing about it in great detail. Thing is most people have the whole "you have nothing to worry about unless you are hiding something" mentality these days and the media only fuels that fact. They don't know how dangerous the world is becoming with this extra surveillance of society in general.
Sign In or Register to comment.