As government agencies and tech companies develop more and more intrusive means of watching and influencing people, how can we live free lives? By Walter Kirn I knew we’d bought walnuts at the store that week, and I wanted to add some to my oatmeal. I called to my wife and asked her where she’d…
Category: Information Warfare
Anti-Texas Campus Carry Petition Trips Over Inconvenient Truth
USA – -(Ammoland.com)- “Overturn SB 11 ‘Campus Carry,’” busybody hoplophobe and legislative process ignoramus Sara Peters of Portland, OR, demands in a Change.org petition to the Texas State Senate, State House and Governor. When the petition was posted is unclear, but it looks like the earliest signature and comment was made 18 days ago, and…
Cold War Espionage: How Soviets used IBM Selectric keyloggers to spy on US diplomats
How Highly sophisticated bugs went undetected for 8 years during the Cold War. By Dan Goodin A National Security Agency memo that recently resurfaced a few years after it was first published contains a detailed analysis of what very possibly was the world’s first keylogger—a 1970s bug that Soviet spies implanted in US diplomats’ IBM…
Here is How World War 3 Could Start Tomorrow
By PW Singer and August Cole There is an old adage that militaries set themselves up by failure by preparing to fight the last war. When it comes to 21st Century warfare, the problem however may not be with looking back, but that we aren’t looking back far enough. For the last two decades, leaders…
Obama tweeted support of Muslim clockmaker before clock pic released
Well whatta you know, this was all a STAGED PR event in obama’s overtly aggressive campaign to coerce the brain dead American public to see muslims as the victims versus the invaders.-SF It is increasingly obvious that this was a staged, planned attempt to create an “Islamophobia” event and intimidate people into not reporting suspicious…
The CIA’s Campaign to Steal Apple’s Secrets
RESEARCHERS WORKING with the Central Intelligence Agency have conducted a multi-year, sustained effort to break the security of Apple’s iPhones and iPads, according to top-secret documents obtained by The Intercept. The security researchers presented their latest tactics and achievements at a secret annual gathering, called the “Jamboree,” where attendees discussed strategies for exploiting security…
Malicious Conspiracy Theories on the WDBJ News Crew Shooting
To make the lie seem real, all the video conspiracy theorists had to do was delete that one frame and, presto, no slide movement and no ejected casing appears. Covington VA –-(Ammoland.com)- I am totally disgusted with a bunch of conspiracy-theory videos on the internet dealing with the WDBJ shootings. The people (for lack…
Apt. 29, aka “The Dukes”: 7 Years of Russian Cyber Espionage
Today we release a new whitepaper on an APT group commonly referred to as “the Dukes”. We believe that the Dukes are a well-resourced, highly dedicated, and organized cyber-espionage group that has been working for the Russian government since at least 2008 to collect intelligence in support of foreign and security policy decision-making. The Dukes…
16 basic principles of Mass Indoctrination
1.Start While They are Young 2. Create the Illusion of Political Freedom 3. Use Simplistic Stereo-types to Sway Public Opinion Read the Remainder at Medium
21st Century Facial Recognition Software: What the CO Needs to Know
By Hammerhead With America well on its way to becoming known as “Uncle Snoopy” versus “Uncle Sam”, one has only to look at the current surveillance state of Great Britain to see where most American cities will be in five years. At current count, Great Britain has over 5.9 Million CCTV cameras spread over…