2015-09-28



NEVER LOG-IN TO ANYTHING ON THE INTERNET. THAT IS HOW THE HACKERS AND SPIES GET YOU!

When you put a username and a password into any App, or website; you just identified yourself to every hacker, Peeping Tom, pervert and spy on Earth.

Never use anything that Google, Facebook, Twitter, Linked-In or other online system offers if you have to identify yourself. It is now a fact that every hacker, spy and psychological marketing analysis service can see all of your use history with ease.

If you are addicted to Netflix, and you feel; that you must use it. Create a totally fake account and lie about every question that you have to answer, about yourself, to sign up. Change your age, gender, city, interests, etc. Do everything you can to confuse anyone who iso not use a login and keep you anonymous. Do not let the internet know that you are using the internet or you will instantly be targeted. EVERY government network has already been broken into at least a dozen times. Every retail network has been broken into nearly a hundred times. Otherwi trying to track you and hack you on the web or on a phone App.

This can save your life, your reputation and your bank account.

Web Security 101 for The Average Person:

How to protect yourself on the internet.

The most average, boring, “uninteresting” consumers are the ones that are the most targeted, the most “mood-manipulated”, the most hacked and the most data-harvested!

Every single thing you write in an email or text, or click on, will, eventually be psychologically analyzed by governments, lawsuit adversaries, foreign interests, hackers and marketing companies in order to learn what you really think and how you think. They can ALL get ahold of all of that material going back at least ten years. Nothing is ever deleted off of a hard drive. Everything can be recovered using modern physics.

Here are a variety of recent news articles, from across the web, on how to take car of your personal web security:

Your most important link is: https://www.privacytools.io

This will tell you about all of the latest security tools you can use.

——————————————-

Basic Rules of Safety To Survive the Internet!

1. Never log in to anything without using a disposable email address. Never sign in to anything without using a disposable email address. Only use Apps and sites that do not use a login and keep you anonymous. Do not let the internet know that you are using the internet or you will instantly be targeted. EVERY government network has already been broken into at least a dozen times. Every retail network has been broken into nearly a hundred times. Otherwise: “Over 42 different countries spy agencies, thousands of hackers and thousands of marketing manipulation services will be all over you and your ID, money and life will get stolen”

2. Never send unencrypted email. Always use GPG, or other encryption, and change your password weekly.

3. Never backup or save files on “the cloud”. When you put files out on the web on other services you quadruple the ease with which your files can be broken into ando not use a login and keep you anonymous. Do not let the internet know that you are using the internet or you will instantly be targeted. EVERY government network has already been broken into at least a dozen times. Every retail network has been broken into nearly a hundred times. Otherwi stolen. It is like leaving all of your notebook computers on the curb every night.

4. Don’t buy any hardware unless it is open-source certified, globally, to be “back-door free”. Many companies built spy door gates into their hardware but now all of the hackers have the keys to those doors. If you have un-certified servers, routers, wifi, etc. then the gates of hell are wide-open to any hacker these days.

5. Never buy anything online with an account that has more than $200.00 in it. Have one account only for buying things online and never connect it to any other account and never put more than $200.00 in it. Expect your accounts to be hacked and your money to be stolen.

6. Always remember you are 3 CLICKS FROM DISASTER any time you are connected to a network. These days, ANYBODY can take everything of yours off of ANY electronic device with just 3 clicks of most modern hacking software. BE CAREFUL!

7. Always use fake ID, Disinformation and a false name if you must log-in to a service like NETFLIX or other subscription service. You will be tracked, tagged and process manipulated if you don’t.

8. Never post your picture online or you will be processed with imaging comparison software by third parties. Dating sites sell your image but hundreds of others run image comparison software on every image on the internet and abuse them for marketing too.

9. Never keep ANY files on your computer! Use an “air gap” where you never connect drives with actual documents to the live internet. Keep your Outlook .pst files, your photos, your documents, your movies and EVERYTHING you create, on an external encrypted hard drive. NEVER connect that hard drive to your computer unless your internet connection is physically unplugged and your wireless connection is removed or turned off in a way that you can check that it is turned off. If your mobile device is “always connected”, ANY kid can take EVERYTHING off of it, with just two mouse-clicks, any time they want to. It IS OK to keep fake files on your computer to keep hackers on a wild-goose chase.

10. Tape over any camera on any device you own. ANY kid can secretly turn your camera on and watch you taking a shower, getting undressed, cheating on your partner, having sex or writing your secrets, with just two mouse-clicks, any time they want to.

11. Don’t use the CONTACTS and CALENDER in OUTLOOK, ICAL or on your device. ANY kid can now download all of your contacts off of your phone and computer and watch them as well. A business competitor can download all of your calender appointments and bug your business meetings or get your business meetings cancelled. An ex lover and see who your new lover is and mess with that. Foreign countries can EASILY steal your technology Otherwise: “Over 42 different countries spy agencies, thousands of hackers and thousands of marketing manipulation services will be all over you and your ID, money and life will get stolen”

12. ALWAYS, ALWAYS pull the battery out of your device when you are not immediately using it. ANY kid can now download all of your contacts off of your phone and computer and watch them as well. A business competitor can download all of your calender appointments and bug your business meetings or get your business meetings cancelled. An ex lover and see who your new lover is and mess with that. Foreign countries can EASILY steal your technology. You device may appear to be turned off, you may have even seen it “turn off” but it is still on and pretending to be off.

———————————-

Inside the shadowy world of data brokers

From CIO Magazine. From: http://www.cio.com

By Matt Kapko

Most consumers would not recognize the names of the large data brokers that constantly collect detailed information on their finances, health and other personal information. It’s safe to say most people probably have no idea this is happening at all. Those who are aware should be shocked by the extent to which their online and offline behaviors are being sifted through for profit. Call it panning for gold in the digital age.

The World Wide Web has always been a vehicle for advertising, but as the Internet permeates every facet of society from our apps to our appliances its role is expanding in kind. While surfing the Web or updating social apps on our smartphones, we blindly share valuable information about ourselves often without considering the ramifications – or, in some cases, even knowing we are sharing it. Despite these growing privacy concerns, without advertising the Internet would deliver very few of the experiences many of us enjoy today. Companies need to be profitable to survive, and for most that path to revenue is advertising. While companies like Facebook and Google capture most of their data through consumer-facing products and services they offer for free, outside firms are collecting and organizing virtually all activity elsewhere.

As 2013 came to a close, Sen. Jay Rockefeller (D-W.Va.) issued a scathing report about the role and unchecked power of data brokers. Following a year-long investigation by the Senate commerce committee into the collection, use and sale of consumer data for marketing purposes, he called these companies and their practices “the dark underside of American life.”

“Your smartphones are basically mini tracking devices that supply the kind of information that really talks about who you are on a day-to-day basis.” –Federal Trade Commissioner Julie Brill

“In 2012, the data broker industry generated $150 billion in revenue. That’s twice the size of the entire intelligence budget of the United States government — all generated by the effort to detail and sell information about our private lives,” Rockefeller adds.

Privacy concerns have ebbed and flowed with the rise of the Internet for decades now, but the backlash against data collection has grown more recently as consumers wake up to the reality that their personal information is being bought and sold as a commodity. Former NSA contractor Edward Snowden’s revelations about the wide and almost unfathomable reach of the federal government’s surveillance apparatus has only stoked these flames of discontent.

Recent reports from the likes of CBS’ news magazine “60 Minutes” are shining fresh light on data brokers as well. During that featured report, Federal Trade Commissioner Julie Brill says “your smartphones are basically mini tracking devices” that supply “the kind of information that really talks about who you are on a day-to-day basis.”

That data may include information like when someone comes home or leaves, the places or establishments they frequent and when and where they swipe their credit cards to make purchases.

“I think most people have no idea that it’s being collected and sold and that it’s personally identifiable about them, and that the information is basically a profile of them,” Brill says. “Consumers don’t know who the data brokers are. They don’t know the names of these companies.”

By flying under the radar, data brokers have largely been able to keep consumers at bay. The sheer volume of them, which easily number in the thousands, confuses consumers and matters of privacy all the more.

“When you’re collecting across billions of data points, regardless of its accuracy, there’s going to be groups of individuals behaving the same way.”

The largest of these companies — Acxiom, Datalogix, Epsilon and Experian — are bridging together data from the online and offline worlds and selling it to the likes of Facebook, Twitter and others to enhance their respective ad products. The general approach is to group and categorize consumers for marketers’ online ad targeting efforts. Programmatic ads are then sold and targeted based on these profiles, which the industry insists are anonymous and not personally identifiable.

Regulators and legislators across the political spectrum are making it a top priority to investigate these data brokers and enact laws that could curtail their way of business. But as more troubling details about the operation and seemingly unrestricted reach of these data brokers come to the surface, it’s unclear what can or will be done to rein in their most damning practices.

Daniel Kaufman, deputy director for the FTC’s Bureau of Consumer Protection, says the agency is currently studying nine data brokers. “They collect an enormous amount of data and they are not consumer-facing,” he said at last week’s GigaOm Structure Data conference in New York City.

“How are they getting their data? How do they make sure it’s accurate? Who are they sharing it with?” Kaufman says. The FTC takes law-enforcement actions, and it doesn’t create regulations. However, he adds that “the commission has been supportive of legislation that would support or improve the transparency of data brokers.”

The how, when and where of data collection may be perceived by many as nefarious, but the real debate begins over why. “Quite simply, in the digital age, data-driven marketing has become the fuel on which America’s free market engine runs,” the Digital Marketing Association wrote to members of Congress in 2012. That generally sums up the view of almost marketer today, and the sentiment is even more on point and agreed upon in the world of real-time marketing on social media.

“It’s become an essential part of the marketing mix,” says Adam Kleinberg, CEO of Traction, an advertising and interactive agency in San Francisco. Data brokers are “becoming increasingly important because the way digital media is being purchased is moving toward the robots. Programmatic advertising and programmatic media buying is using tools that automate the process,” he says. “You enhance the targeting efficiency by leveraging that data. It’s just gotten to the point in the past few years where 30 to 40 percent of media is purchased that way.”

These profiles are directional and optimized behaviorally, Kleinberg says. The cookies that follow us around the Internet are being used to index us based on behaviors such as what we search, visit, click on or buy. “If you actually saw your data you’d think ‘wow, these people don’t know me at all,'” he says.

“The power of the data in certain circumstances is in the massive quantity and patterning that is possible. When you’re collecting across billions of data points, regardless of its accuracy, there’s going to be groups of individuals behaving the same way,” Kleinberg adds.

“There is sensitive data that is collected and sold on you… What’s new is this big data that is being collected and cross referenced with those things,” he says. “The reality is that most of this big data is simply being used anonymously to better target you with an ad.”

While he freely admits “the ability to look at that individual data is a little scary,” he adds that “anyone who’s buying digital media today is buying data.”

From that the debate usually pivots around the promise of self-regulation versus the need for legal protections and regulations. Industry groups like the Internet Advertising Bureau and the Network Advertising Initiative have already developed standards and best practices which member companies must adhere to, but it appears unlikely that will remain their exclusive responsibility. Regulatory agencies and elected officials aren’t subscribing to simple notion that the ends justify the means. Legislation could be on the horizon as they aim for a middle ground.

Sharing the view of the industry at large, Kleinberg says he thinks the responsibility should come from within because regulators don’t have a deep understanding. “I think that the industry organizations are actually taking it very seriously and putting together standards that accommodate reasonable privacy restrictions like allowing people to opt out,” he says.

“I think consumers care less than we think in the moment. They care in the abstract sense,” Kleinberg says. “I can’t tell you of an example where data has been abused.”

To embolden the case for self-regulation, the industry needs to do more to explain what data means, Kleinberg adds. “The terms data and big data get lumped together as this big sinister beast and a lot of it is not innocuous … it’s anonymized by obscurity,” he says. “We should not rush to judge all of it without understanding that nuance.”

——————————————–

How your enemies, competitors and corporate theives can have you attacked and robbed on “data-mining” services?

Every time you touch a keyboard, you hand your opposition the tools of your own destruction!

There are a group of BIG DATA Data Mining, privacy harvesting companies that can: find your kids for any stalker, kill off any chance you have of ever getting a job, destroy your credit, destroy your chances of getting a home, anticipate what you might do tomorrow, make you buy things you would not have otherwise bought, tell spammers and junk phone callers where and when to find you, tell everyone what your political affiliations are, and millions of other things that you never thought you were actually showing to the internet.

They grab every mouse move, hand twitch, the direction of your mouse travel, every word, password, page and link that you engage in. They know how long you looked at something, when you back-spaced, how many stories about sex you looked at and in what order. Are you a politician? This is the way your opponents wipe you out in elections.

OR… do YOU have an opinion that conflicts with certain politicians? BANG! Push a button and you are TOAST via a “data burn”! You saw what happened to Micheal on the “BURN NOTICE” tv series, Right?

If someone does not like you, they can get input data to these services that will wipe you out and there is nothing you can do; there is no way to know if they data really came from you, an attacker or a mistake. When you fill out that apartment credit application, you just handed these guys a knife to stab you in the heart with.

What are you going to do about it?

Make it a FELONY for ANY data mining operation to NOT let you see EVERY single bit of data they have on you and correct OR DELETE IT!?

How Spy Agencies Destroy Members of The Public That Politicians Put Hits On!

Did you piss off a corrupt Senator, The President’s press secretary or the head of a federal agency by speaking out or reporting corruption?

Then you get a “hit job”

Got some dating site profiles? Suddenly very pretty girls will contact you, on your dating sites, but they will harrass, disparage and harangue you in an attempt to give you low self-esteem and demoralize you so you don’t feel motivated. Those girls aren’t actually girls, though, they are intelligence interns in a warehouse in Virginia. Those OK CUPID, Plenty of Fish and Match.com hotties may just be some nerd named Norman with a neck beard and six computer screens outside of DC.

Have you heard of the term: “Honey Trap” websearch that term and then try searching the term: “Snowden Honey Trap”. Read about that. The hot girls they send to manipulate you are hot coed undergrads from Stanford and Yale, with a hankering for the spy business.

Did you just get fired after your boss got a phone call from a helpful party who wanted to “share some important information about you..” That was a slander job by those boys in Virginia.

Are you suddenly finding it hard to get an interview? Is it strange that recruiters and interviewers suddenly stop talking to you after the first contact? Those potential hirers have databases, that you can’t see, and your enemies have put code phrases in your employment profile that makes you un-hireable.

Did your company get a bad review on Yelp or Google? Did it suddenly get frozen into the top position on every Google search. Yes, the CIA-Funded Google does have the power to destroy your life on-command.

All that surveillance for “Your protection” …it’s being used to monitor your actions and figure out how to put roadblocks in front of you, as punishment for pissing of that Senator.

It is called a “Q Request Filing”. Q Requests are not even supposed to exist, but they do. Q Request processors are experts in psychological warfare, mood manipulation, brand damage, character assassination and personal attacks.

So, how do you counter-measure such political and business attacks?

– Hire private investigators to track down the attackers.

– Sue them in Civil court, the U.S. Court of Claims and small claims court

– Engage in massive press outreach to expose the attackers

– Expose the funding sources and investments of the attackers

– File complaints with every relevant regulatory and law enforcement agencu and make sure the media tracks the status of those complaint investigations

———————————————————-

We live in a whole new world!

How many tens of millions of dollars have you spent on your personal web security?

What\92s that, you didn\92t spend tens of millions of dollars on your personal web security?

Sony Pictures did, Target did, Home Depot did, JP Morgan did, The White House did, PF Chiang did.. and they all got hacked!

What do we learn from this? You are more at risk than you realize!

There are a few problems that have caused all this:

First there are the \93backdoors\94. Spy agencies had companies like Cisco, Intel, Juniper and others, put hardware and software backdoors in all of their network equipment so that spies, and law enforcement, can get inside any network if there are \93bad-guys\94 on it. The hackers got ahold of the keys to many of those backdoors. In many cases, they only need to get past one door to be inside your whole network. The problem is, many of the backdoors are in the hardware of the devices and those devices are distributed all over the Earth. None of these companies want to shoulder the cost of pulling out and upgrading all of those devices. Many users believe the companies should be liable for any break-ins via their backdoors. There is a big legal discussion around all of that.

Next we have bad IT. If you, or your network provider, are using funky, simple, passwords; then the hackers are auto-testing all of the ports and will eventually get in via computerized trial-and-error. They will just point $35.00 worth of software, that they downloaded off some Russian site, at your IP address and let it run for a few weeks until it gets in and texts them that they can now scrounge through your life. Some of these hackers are just bored teenagers in Thailand, the Ukraine or other impoverished areas where they can\92t find work. They have plenty of time on their hands. Other\92s are state agencies with $100M budgets and orders to \93get as much as they can find\94 from the competing nations.

Third we have non-distributed networks. Networks are just too big. There are wide open football sized file repositories that should only be ping-pong table sized.

Fourth we have a glut of Silicon Valley companies who made their business model revolve around harvesting and manipulating your activities and personal information. Not only do they make billions doing this, they also get paid by federal and third party marketing groups to do it. They have every incentive to do it and no incentive to not do it.

\93Internet security\94 means keeping your assets from getting stolen or abused. What are your \93assets\94?

They are:

Your money

Your credit

Your identity

Your privacy

Your intentions (ie: what you might do online and how to trick you into doing specific things)

Your activity history

Your time

Your brand

All of these things have monetary value. They are worth money to someone. Other\92s can make money off of these things that you own.

You may not be an evil bad guy with dark intentions, but to marketing companies, you are going to get tracked, monitored and manipulated just as much, if not more. The thought that you \93have nothing to hide\94 is the biggest falsity on the internet. You have everything to hide from the hackers and harvesters.

All of these companies, (most you probably never heard of), are panning for digital gold in your private records: White Pages: Address.com; Google; Spokeo; Marketo; Been Verified; Facebook; Peek You; Intellius; ZabaSearch; US Search; inBloom; Salesforce.com; IBM Data Services; People Finders; TWITTER; Veromi; US People Search; Private Eye; Public Records Now; Addresses.com; People Smart; Advanced Background Checks; People Lookup; TalentShield; BeenVerified; GIS BackGround Checks; CVCertify; Conair; Social Intelligence; Dun And Bradstreet; EquiFax; Infortal; Kroll Backgrounds; Onesource; Checkpeople. Most consumers would not recognize the names of the large data brokers that constantly collect detailed information on their finances, medical, legal, sexual and other personal information. It\92s safe to say most people probably have no idea this is happening at all. Those who are aware should be shocked by the extent to which their online and offline behaviors are being sifted through for profit. Axciom openly stated that they sell your information to government agencies. They got in trouble for selling your sexual, drinking, STD, abuse and mental issues to third parties.

In 2013 Sen. Jay Rockefeller (D-W.Va.) issued a scathing report about the role and unchecked power of data brokers. Said Federal Trade Commissioner Julie Brill: \93Your smartphones are basically mini tracking devices that supply the kind of information that really talks about who you are on a day-to-day basis.\94

There are a group of Data Mining, privacy harvesting companies that can: find your kids for any stalker, kill off any chance you have of ever getting a job, destroy your credit, destroy your chances of getting a home, anticipate what you might do tomorrow, make you buy things you would not have otherwise bought, tell spammers and junk phone callers where and when to find you, tell everyone what your political affiliations are, and millions of other things that you never thought you were actually showing to the internet.

They grab every mouse move, hand twitch, the direction of your mouse travel, every word, password, page and link that you engage in. They know how long you looked at something, when you back-spaced, how many stories about sex you looked at and in what order.

OR\85 do YOU have an opinion that conflicts with certain politicians? BANG! Push a button and you are TOAST via a \93data burn\94! You saw what happened to the character Michael on the \93BURN NOTICE\94 TV series, Right?

If someone does not like you, they can get input data to these services that will wipe you out and there is nothing you can do; there is no way to know if they data really came from you, an attacker or a mistake. When you fill out that apartment

So you wonder: \93hmmm, If all network devices are now hacked! How can I have a NETWORK-FREE LIFE!

Touching any device connected to a network is the same as asking the Russian mob to \93keep an eye on your stuff while you run to the store\94:

You might as well leave your unlocked safe deposit box at the curb of your nearest ghetto.

Do you ever take off your clothes? That camera on your cell phone, tablet, PC or appliance is recording you in secret. All those nude photos of all of the starlets that are online from \93The Fappening\94…you could be next\85

Hundreds of millions of consumers are having their personal data hacked from most big retailers.

The White House, NASA, The CIA and all those other sites you thought were super secure.. nope..not so much: Hacked!

The Snowden, Assange and Manning leaks, along with the CIA Torture report, show, more than anything else, that all nation states lie to each other and they have played a one-ups-man-ship game of you-hack-me-I\92ll-hack you, that now every single network has been broken into hundreds of times.

CBS news revealed that the U.S. and Israel built the STUXNET virus to take out Iran\92s nukes but Iran got ahold of it, and has passed derivatives of it to every anti-U.S. group.

Now nation-state-class regenerative virus attacks are running daily against U.S. corporations with complex viruses that self-mutate like the T3 Terminator in the famous sci-fi film franchise.

Want to see all of Hollywood\92s secret movie contracts and all of the movie star\92s social security numbers? Say hello to \93Sony-Pocalypse\94! The Koreans appear to have gutted all of the personal records and private communications of the whole studio system. Now we know that Sony\92s own staff think that Adam Sandler is a Dick!

The USB connector, on all USB devices, has high odds of having a hacking virus built into the USB connection itself.

The sad thing is that there are hundreds of ways to solve the problem but those ways involve making networks hacker-proof and the spy agencies won\92t allow that.

A large group of public organizations and consumer companies, who have brought hardware and software forward that is actually hacker proof, have been attacked for doing so.

Even famous companies: Apple and Google were just attacked by the FBI for adding a slightly stronger encryption to their phones.

Think you are a boring, non-attractive target? Think again! Ever take your clothes off? ..have sex? ..Buy stuff? Got a credit card?

Technology can absolutely fix the problem. Technologists are being blockaded from fixing the problem because of certain person\92s over-whelming need for \93control\94. Where will it end?

How can you survive as a company, agency or individual in the mean-time? Since the \93mean-time\94 could last for the next 20 years, at the \93pace-of-politics\94, you need to be ready to make a big commitment:

To be truly NETWORK FREE:

\96 You cannot own anything with a built-in hard drive. Boot any device from an external drive and try to never connect the drive when the device is on a network. Have a USB nub to put things on when you need to email or go online. Disconnect the main external hard-drive when you must go online. Use the external operating system on a USB drive called: TAILS from the people who brought you TOR.

\96 Consider having a tablet that is only for surfing the web. Set up ALL accounts on it with the universal login that all web users default to: John Doe. 1 Main Street, Anytown, USA, 91111. Never take any download off of it and never connect it to your home network or any other device.

\96 Buy old typewriters, paper file cabinets and 1990\92s flip phones. Use pre-hack technology. The Russian\92s have now switched to this.

\96 Don\92t write anything on a social network.

Companies now realize that sending their design plans, CAD, campaign plans and electronic layouts by email, or FTP, is the same as handing them directly to Chinese and Korean copycat factories. Hackers can get into anything on-line with two mouse clicks, these days. Your personal assets are just as valuable to the hackers.

YAHOO

Stay safe. Be Aware. Once you adopt security techniques they will, eventually, become second nature.

——————————————-

When a technology company hires “opposition researchers” to spy on you, this is what they do to “build an interdiction file on you”:

– Acquisition and tracking of your Comcast, Netflix, Hulu and related media uses for the last 10 years.

– Acquisition and tracking of your PG&E bills and usage curves for the last 10 years.

– Live feed observation from all cameras on your mobile devices, computers, smart devices and nearby surveillance cameras, even though those devices appear to be turned off.

– Acquisition and tracking of every keystroke on your devices via a delayed buffer file that remotely sends itself to surveillance servers when you believe your devices are turned off.

– Acquisition and tracking of all of your Paypal, credit card, debit card, club card and service card transactions for the last 10 years.

– “Stingray” device deployment in your neighborhood to spoof all of your wireless devices and create a archived database of all phone calls, text messages, voicemails and web search URLS.

– Routing your computer to spoofed URLS for Facebook, LinkedIn, Twitter and other sites that appear to be authentic but are actually monitoring sites.

– Acquisition, tracking and archiving of all third party business surveillance camera feeds on your daily routes of travel and any off-route deviations you may take.

– Identification and file creation for all investors, family members and associated partners who may have stock holdings or revenue access to your companies.

– Acquisition and tracking of all of your bank accounts, trust funds, shell corporations and any professional financial services people identified in the international databases for the last 20 years.

– Acquisition and tracking of the RFID circuits in your car and the radio system in your car.

– Wifi and Laser inteferomtry observance of speech surface vibrations and air space disruptions, which, essentially, mean that they can see inside buildings and hear speech without bugging anything by listening to the vibrations of nearby windows, ceramics, plastics or other objects.

– Computerized cross matrix comparison of all IRS and State tax filings compared with all revenue streams from the last 15 years.

– Computerized Cross matrix studies on you and your psychological state via the surveillance databases of Palantir, LucidWorks, Epic, PINWALE, XKeyScore, Stormwatch and others.

– Use of nearby Zone satellite array transponders for signal-specific targeting of your activities.

——————-

How an adversary will conduct a surveillance operation on you and how to trip them up:

#1 How you get targeted for surveillance:

– By being a human that owns, or is near, any device that can connect to a network

– By having any police record

– By having any tax record

– By making any public statement in social media, that is a political opinion

– By owning a business

– By doing anything that causes three or more people to regulary pay attention to you

– By shopping on line

– By using email

– By having a website or socal media page

– By being in a lawsuit

– By writing a complaint letter

– By signing a petition

#2. When you engage in any of these actions you are assigned a surveillance code. The more you do any of these things, above, the deeper your surveillance becomes

#4. Who surveils you:

– Your government

– Foreign governments

– Local police

– State police

– Federal intelligence agencies

– Democrat opposition researchers

– Republican opposition researchers

– Marketing companies

– Business competitors

– Lovers

– Ex-lovers

– Family members

– Your children

– Hackers

– Foreign organized crime groups

– Neighbors

– Bored teenage gangs

– Lobby groups

– Think tanks

– Political psychologists

– Consumer electronics companies

– Silicon Valley data harvesters

– the CIA

– the NSA

– the DIA

– the FBI

– NEST

– Senators

– the White House press office

– Gawker Media

– the Verge

– Unit 52 of the Chinese surveillance group

– Google

– Linked-in

– Amazon.com

– Experion

– or by “information services” who sell your data to the parties above

#5. Why do they target you:

– to acquire political advantage

– to manipulate political advantage

– to damage political efforts

– to trick you into buying things

– to determine if you might be causing trouble

– to determine if you might be about to cause trouble

– to sell your data assets without your knowledge

– to determine your voting intentions

– to manipulate your voting intentions

– to see if you are a threat to government

– to see if you are a financial threat to a competitor

– to determine the best ways to damage your effort if you are a threat to a competitor

– to get secret information in order to write news stories

– to put misleading information in front of you in order to steer you away from competing with something

– to find out who you are talking to in order to manipulate your contacts

– to trick you by putting manipulated information in front of you with missing pieces and watching how you fill in the missing parts, there-by exposing your thinking

– to trick you into thinking many other people are doing a certain thing and that you should “follow the crowd”

– to put certain words, or short phrases in front of you that candidates then repeat on tv so that you become programmed to accept those phrases

– to identify a city, or region, which might be about to unite under a common complaint, or goal

– to disinform

– to capture location, use and input data about you from your mobile device apps

– to secretly update the spyware already on your system

– to look at other spies that are spying on you and spy on them

– too turn off, or destroy, your device, remotely, iff you “cause trouble”

– to identify if you are exhbiting too much independent thinking and deepen your surveillance if you are

————

Deep dive into QUANTUM INSERT

http://blog.fox-it.com/2015/04/20/deep-dive-into-quantum-insert/

What is a QUANTUM INSERT attack on you?

QUANTUMINSERT is described as a \91HTML Redirection\92 attack by injecting malicious content into a specific TCP session. A session is selected for injection based on \91selectors\92[3], such as a persistent tracking cookie that identifies a user for a longer period of time.

The injection is done by observing HTTP requests by means of eavesdropping on network traffic. When an interesting target is observed, another device, the shooter, is tipped to send a spoofed TCP packet. In order to craft and spoof this packet into the existing session, information about this session has to be known by the shooter.

All the information required by the shooter is available in the TCP packet containing the HTTP request:

\95Source & Destination IP address

\95Source & Destination port

\95Sequence & Acknowledge numbers

For the attack to succeed the packet injected by the shooter has to arrive at the target before the \91real\92 response of the webserver. By exploiting this speed difference or race condition, one can impersonate the webserver.

A video was posted online by The Intercept that shows the inner workings of QUANTUMHAND, which uses QUANTUMINSERT against targets visiting Facebook: https://vimeo.com/88822483.

Any nation state, or skilled hacker, could perform QUANTUM attacks as long as the traffic passes through their country or they possess other capabilities to get the required TCP session data.

<p style="margin-bottom:0;line-

Show more