y Resources to help us rethink, reimagine, & reFeel our world


top of page

“I was told that there was really only one thing I needed to know and these words began to repeat over and over in my head: ‘Infinite Love is the only truth –– everything else is illusion’. … Love in the context of Infinite Love is the balance of all. Infinite ‘Love’ is also Infinite Intelligence, Infinite Knowing, Infinite Everything. Thus, it is and it isn't; it is everywhere and nowhere, everything and nothing. It is All Possibility in perfect balance.”

–David Icke, Infinite Love Is the Only Truth: Everything Else Is Illusion. Page 43. ISBN# 978–0–9538810–6–2

“I know that most men — not only those considered clever, but even those who are very clever and capable of understanding most difficult scientific, mathematical, or philosophic, problems — can seldom discern even the simplest and most obvious truth if it be such as obliges them to admit the falsity of conclusions they have formed, perhaps with much difficulty — conclusions of which they are proud, which they have taught to others, and on which they have built their lives.”

–Lev Nikolayevitch Tolstoy (Leo Tolstoy), From the Opening to Ch 14. Translation from: What Is Art and Essays on Art (Oxford University Press, 1930, trans. Aylmer Maude); Source: Wikiquote page on Leo Tolstoy; License: Attribution–ShareAlike 3.0 Unported (CC BY–SA 3.0)

“Spitsbergen[, Norway] is nearly 79 degrees north; yet fossil flowers and corals and beds of coal thirty feet thick have been found. Antarctica is known to have seams of coal at a latitude of 85 degrees. For this coal to have formed, the polar regions must have had great forests in the past. How can relatively recent and sudden changes in the Earth's climate and simultaneous wide–spread destruction of plant and animal species be explained?”

–Excerpt of “Egyptian History and Cosmic Catastrophe: The Ideas of Dr. Immanuel Velikovsky” by “Gerard”, which appeared in Suppressed Inventions & Other Discoveries: Revealing the World's Greatest Secrets of Science and Medicine by Jonathan Eisen. Garden City Park, New York: Avery Publishing Group, 1999. ISBN# 0–89529–809–0. Page 211

The term “corporament” comes from the equation: corporation + government = “corporament” while recognizing that the corporation = government, i.e., the government institutions and corporations have the same source. I originally defined the term in an article entitled “A personal look at our government” which was printed in The Daily Beacon as “Opinion: Our government can not be trusted” on Monday 26 August 2002. {Find the article at https://www.questionuniverse.com/oldway/columns.html.}

In the USA, the “corporament” exists as the:

military (defense/offense) + industrial + academic (schooling — at all levels — as prison) + “corporament” entertainment (Hollywood, media, advertising/consumerism/commercialization, propaganda/psychological warfare) + judicial (defense and prosecutorial lawyers, judges, law enforcement/police, prisons) + financial (banks, accounting firms) + religion + petrochemical/pharmaceutical (drugs, antibiotics, antibacterials, vaccines, pesticides — toxins to kill or put you at “dis–ease” and drugs to “treat” you) + imperial commu–soci–capitofasdemorepubcracism system/society/economy/Western thinking = Military–industrial–academic–“corporament” entertainment–judicial–financial–religion–petrochemical/pharmaceutical complex.

Commu–soci–capitofasdemorepubcracism is derived from communism, socialism, capitalism, fascism, democracy, and republic as these concepts all have the same root. The complex was originally defined in the aforementioned article, but it has been recently revised to reflect a new understanding of the complex's nature.

The complex was broken down further in an excerpt of a still “Untitled” song written by the Hip Hop artist Vibration Kunvorted off of his What Do U Feel? album [http://www.vibrationkunvorted.com]:

“We are all One / Awareness / of Infinite Consciousness / don't be fooled / or schooled / by the Illuminati — Global Elite — Higher Dimensional Negative Consciousness / imprinting their design / in tha vocal chords & symbolism / of da Intelligentsia, media personalities, journalists, scientists, designers, engineers, architects, intellectuals, medical personnel, social services (SS) workers, religionists, globalists, musicians, activists, politicians, teachers, actors, leaders, executives, ad nauseum for centuries past / ‘cause their rule is not going to last”

Basically, the US “corporament” is one head of the galactic/global elite body.

–Irucka Ajani Embry, from “Attack of the …” out of Balancing the Rift: ReCONNECTualizing the Pasenture. Page 103–105. ISBN# 978–0–9914994–0–3 {Questioning the Universe Publishing (QUP), 2014]; License: Creative Commons Attribution–NoDerivatives 4.0 International License (CC BY–ND 4.0)

“Rise like Lions after slumber

In unvanquishable number —

Shake your chains to earth like dew

Which in sleep had fallen on you —

Ye are many — they are few.”

–The Mask of Anarchy: Written on the Occasion of the Massacre at Manchester By Percy Bysshe Shelley (1819), St. 91. (XCI); Source 1: Wikiquote page on Percy Bysshe Shelley; License: Attribution–ShareAlike 3.0 Unported (CC BY–SA 3.0); Source 2: The Mask of Anarchy by Percy Shelley, 1819, following the Peterloo Massacre. He also wrote about Britain's rulers in the same year.; Source 3: The Mask of Anarchy: Written on the Occasion of the Massacre at Manchester By Percy Bysshe Shelley; Source 4: David Icke. Human Race Get Off Your Knees: The Lion Sleeps No More. Page 879. ISBN# 978–0–9559973–1–0

“Well, how does the soul get sick? What's the disease of the soul? I believe it is due to submission, expecting love to come from outside, from external authorities. We're giving others the power to make us happy. Hypothetically, if my mom doesn't like me, I'm sad and I get sick. Whereas, if I realize that I am the only authority, that love is within me, that I am pure, divine, unlimited love, then I don't need other people's approval to do what I want to do in my life. I'll just listen to my inner voice, and do what my inner voice tells me to do. This is what I call in the book “sovereignty.” So, the illness of the soul is submission, and the wellness or healing of the soul is sovereignty, individual sovereignty. Now, we've always been led to believe that sovereignty exists for a country or for a kind or queen.

Well, it's a major leap in consciousness to realize that there's no such thing. For instance, if you think about a country, a country is limited. A kind or queen is limited. Whereas sovereignty has no limit. Therefore, a country cannot be sovereign. Only a Divine entity, only God, the Creator, is sovereign; and only God within us, our inner god/goddess, can be sovereign. So, we are the Creator living in our bodies; so we are divine. Since we are immortal and divine individuals we do not need to die. Why do we die? We believe death is going to happen so we make it happen. If we make death happen we can make immortality happen. If we make suffering happen we can make joy happen for us and the society we are living in. We are creators by nature. We can create everything we want. We can create a terrible future or a fantastic one. We've got the option. Why were we never told that? For centuries all of the authorities, especially the religious ones, have taught us that God is outside. God makes the rules and God, although he is pure love, will punish us if we don't do this or that. Is this possible? I believe it is impossible! When people realize they are god/goddess, that God lives within them, you cannot dominate or exploit them anymore! People can only be kept in slavery if you make them believe they are sheep and need someone to obey other than themselves. The moment people realize they are their only authority and obey their conscious, the outside authorities no longer have control over them!”

–Guylaine Lanctot; Source: The HiddenMysteries.org: The Medical Mafia: How To Get Out Of It Alive & Take Back Our Health & Wealth By Kenneth & Dee Burke: An Interview With Guylaine Lanctot, M.D.

“I know you're out there. I can feel you now. I know that you're afraid … you're afraid of us. You're afraid of change. I don't know the future. I didn't come here to tell you how this is going to end. I came here to tell you how it's going to begin.

… I'm going to show these people what you don't want them to see. I'm going to show them a world without you. A world without rules and controls, without borders or boundaries. A world where anything is possible …”

–Neo in The Matrix; Source: David Icke. The Perception Deception: Or … It's ALL Bollocks — Yes, ALL of It. Page 879. ISBN# 978–0–9559973–8–9

“When we try to pick out anything by itself, we find it hitched to everything else in the Universe.”

–John Muir in My First Summer in the Sierra (1911); Source: Wikiquote page on John Muir; License: Attribution–ShareAlike 3.0 Unported (CC BY–SA 3.0)

“When you turn on your computer, you're making a political statement. If, like most people, your computer boots Microsoft Windows, the statement you're making is that transnational corporations should control access to the most powerful public media that ever existed. You're passively accepting, too, that non–industrial nations should be kept from developing, and helping to preserve a monoculture that threatens the existence of minority languages. At a personal level, you're accepting that these same corporations should control your access to educational and government services and have a right to install lock–down technologies on your computer without your permission — to say nothing of controlling what other software you can use and how you use it. Most people, of course, never think of these implications. When confronted, some will claim that none of this matters. Most, even social activists, accept the situation because they don't know of any alternative. Yet an alternative does exist, and it's becoming more viable by the day. It's called Free Software. It has already built and still runs most of the internet. Now, increasingly, Free Software is finding its way on to the desktops of those who want their ethics to extend to their computers.”

Source: “Free software!”: You can't usually do the right thing without inconveniencing yourself. Bruce Byfield reckons free software is a rare opportunity. Featured in Issue 395 of the New Internationalist magazine; License: Attribution–NonCommercial–NoDerivs 3.0 Unported (CC BY–NC–ND 3.0)

“it's our decision / to break free / to set us free / afraid we don't have to be / let's pump love & peace / in our hearts & not allow us to be deceived / we must believe / that we can achieve / anything / that is what I sing / & rep consciously for my people”

–from “Untitled: The Solution — You” by Vibration Kŏn'vûrt'ɛd [Kunvorted}

“Muslims tell the story of a mullah (a magic figure in Sufism) who finds a cheese sandwich in his lunch pail one day. The next day and the day after that he also finds a cheese sandwich in his lunch pail. After ten days he says, ‘I am sick and tired of these cheese sandwiches.’ When his co–workers ask him, ‘Why don't you ask your wife to make you another kind of sandwich,’ he answers ‘But I am not married. I make my own sandwiches.’”

“So awareness is needed to break out of old patterns.”

–from “A Muslim View of September 11” By Grace Lee Boggs, The Michigan Citizen, October 21–27, 2001

“Taoist story of ancient China:

“When Yen Ho was about to take up his duties as tutor to the heir Fo Ling, Duke of Wei, he went to Ch'u Po Yu for advice. ‘I have to deal,’ he said, ‘with a man of depraved and murderous disposition. . . . How is one to deal with a man of this sort?’ ‘I am glad,’ said Ch'u Po Yu, ‘that you asked this question. . . . The first thing you must do is not to improve him, but to improve yourself.’””

–from Martin Luther King, Jr. on Leadership: Inspiration & Wisdom for Challenging Times by Donald T. Phillips, page 271

“Love isn't about what we did yesterday; it's about what we do today and tomorrow and the day after.”

–Grace Lee Boggs, from The Next American Revolution: Sustainable Activism for the Twenty–First Century by Grace Lee Boggs with Scott Kurashige

“I love this country not only because my ancestors' blood is in the soil but because of its potential, what I believe it can become.”

–Jimmy Boggs, from “Journey To a New America”: Who are We the people at a time when democracy is under assault? How can all Americans, of all races, help build a country that “has never been and yet must be?” by Grace Lee Boggs, YES! Magazine, posted September 30, 2002

“For our own health and safety, we need to love America enough to change it.”

– Grace Lee Boggs, from “Journey To a New America”: Who are We the people at a time when democracy is under assault? How can all Americans, of all races, help build a country that “has never been and yet must be?” by Grace Lee Boggs, YES! Magazine, posted September 30, 2002

“… I have a mate who is disabled. How can I help him?”

“I have a mate out of work. What can I do to help?”

“I have a brother who is angry at the world. Is there anything I can do?”

We all want to help. We want to give, or do, or say something that will make it better for someone.

But take care; a helping hand is not always what it appears to be.

If you'll think about those questions for a minute, you'll see the focus is squarely on the other guy. And when it's on the other guy's pain, you're joining with that vibration, merging it with your own until your valve becomes as closed as theirs. Your focus is on the negative condition, which is giving you more negative feelings than you had to begin with. And even worse, you're helping your friend to more negativity than they had before you joined up with them vibrationally.

So how do you help? The first thing to do is get into a good feeling place and get your own valve open before you do any thinking about the person. Then you can inspire—not ensure, just inspire—that same valve openness in the person you're thinking about. You're no longer attempting to paint on their canvas, but you're genuinely offering them paints and brushes.

On the other hand, if you keep thinking about how awful it is that your someone has cancer, or is out of a job, or just had their house burn down, that lackful vibration stands to reinforce the lackful vibration they're already in.

Instead, as you think about them, see them the way you want them to be. If there's anything within them wanting to move forward, your bursts of positive, loving energy will have a strong influence on their thinking, feeling, and being.

That's why prayers for the sick so rarely work. When we see the one for whom the prayer is being offered as being deficient in some way, we're coming from a place of lack. We are viewing that person as deficient in some way, when in fact they are every bit as adequate as any power in the universe. They've just forgotten; and for a time, so did those of us doing the praying. …”

–from “Relationships and Other Treasures”: “How Can I Help?” in Excuse Me, Your Life Is Waiting: The Astonishing Power of Feelings by Lynn Grabhorn, Pages 215–216

“The freedom we are looking for is the freedom to be ourselves, to express ourselves. But if we look at our lives we will see that most of the time we do things just to please others, just to be accepted by others, rather than living our lives to please ourselves. That is what has happened to our freedom. And we see in our society and all the societies around the world, that for every thousand people, nine hundred and ninety–nine are completely domesticated.

The worst part is that most of us are not even aware that we are not free. There is something inside that whispers to us that we are not free, but we do not understand what it is, and why we are not free.

The problem with most people is that they live their lives and never discover that the Judge and the Victim rule their mind, and therefore they don't have a chance to be free. The first step toward personal freedom is awareness. We need to be aware that we are not free in order to be free. We need to be aware of what the problem is in order to solve the problem.

Awareness is always the first step because if you are not aware, there is nothing you can change. If you are not aware that your mind is full of wounds and emotional poison, you cannot begin to clean and heal the wounds and you will continue to suffer.

There is no reason to suffer. With awareness you can rebel and say, “This is enough!” You can look for a way to heal and transform your personal dream. The dream of the planet is just a dream. It is not even real. If you go into the dream and start challenging your beliefs, you will find that most of the beliefs that guided you into the wounded mind are not even true. You will find that you suffered all those years of drama for nothing. Why? Because the belief system that was put inside your mind is based on lies.

That is why it is important for you to master your own dream; that is why the Toltecs became dream masters. Your life is the manifestation of your dream; it is an art. And you can change your life anytime if you aren't enjoying the dream. Dream masters create a masterpiece of life; they control the dream by making choices. Everything has consequences and a dream master is aware of the consequences.”

–from The Four Agreements: A Practical Guide to Personal Freedom by Don Miguel Ruiz, pages 98–100

Free Software PDF readers

top of page

Please consider using a Free Software PDF reader pdfreaders.org to view the PDFs on this page! Thank you!


top of page

The following resources are provided for reference purposes only. Their inclusion on this Web page, created by Questioning the Universe Publishing (QUP)/Irucka Ajani Embry, does not represent any endorsement on the part of Questioning the Universe Publishing (QUP)/Irucka Ajani Embry nor does it represent their endorsement of Questioning the Universe Publishing (QUP)/Irucka Ajani Embry. The use of any of the listed software libraries, programs, tools, etc. and the interpretation of any results obtained remains the responsibility of the user. As well, the use of any of the resources and the interpretation of any results obtained remains the responsibility of the user. [This disclaimer is a revised version of the one found online at Internet Finite Element Resources (IFER).]

Fair Use Notice

top of page

Note: I have revised the Fair Use Notice found at Virtual Library / http://www.bibliotecapleyades.net/)

This Web page contains links to copyrighted material encountered in the Internet, the use of which has not been specifically authorized by the copyright owner. This Web page also contains excerpts of printed copyrighted material, the use of which has not been specifically authorized by the copyright owner.

I am making such material available in an effort to advance understanding of the world that we live in so that we can heal and change ourselves from the inside out thus making a world that truly thrives and works for all.

I believe this constitutes a “fair use” of any such copyrighted material as provided for in Section 107 of the United States Copyright Law.

In accordance with Title 17 U.S.C. (United States Code) Section 107, the material on this Site is distributed without profit to those who have expressed a prior interest in receiving the included information for research and educational purposes.

For more information please visit: http://www.law.cornell.edu/uscode/text/17/107

Why did Irucka Ajani Embry create this Web page?

top of page

The resources (and the questions to be added later) on this page will help us break out of the prison (that we created and foster) and filter out the Truth from the lies and manipulation.

This resource Web page is not exhaustive nor is it meant to be. This page just represents various resources that will help us view ourselves and the Universe(s) differently thus ending our enslavement. We must remember that We are the Universal Creator/Infinite Awareness/Infinite Consciousness/Divine Love/etc. and we are not “I” — separate from the rest of the Universe(s). We are all ONE. We are not “human beings” — we are only having an experience as “human beings” in this hologram (illusion). We must also remember that the veil is lifting that has concealed the True Reality. Also remember that since we create our own “individual” and collective Real–ity, then we can live in a world of abundance once we believe and feel the power of Infinite Possibilities that we ALL have.

Perform your own research and 1) follow your Intuition, 2) follow the bloodlines/genealogy, 3) look at the eyes (Are they black? What do the eyes say about this being? How does that make you feel?), 4) secret society affiliation/membership for the individual and those around him/her, and 5) follow the money. Ask questions. Feel. Love. Be Love. Follow your Intuition/Heart and leave “their hive mind” behind, but use your open, whole mind (left and right brain together).

Last modified on 14 September 2015 (Remember too that there is no such thing as time, space, place, matter, energy, etc., but I use the date here as a reference point in this illusion. All that we experience is an illusion or hologram.)


top of page

Mainstream Movies & Television (TV) Shows to Check Out

top of page

Internet Resources (Documentary Films, Television (TV) Shows, Web sites, Articles, Magazines, etc.)

top of page

Documentary Films and Videos

top of page

Web sites, Articles, Magazines, etc.

top of page

Irucka Embry's Collection of Internet Resources

top of page

Real–ity Where Art Thou?

top of page

Waking Up and Breaking out of the Matrix/Prison (Or Remaining in the Matrix/Prison?)

top of page

Consciousness (Beyond the Mechanistic Brain view)

top of page


top of page

Survival, DIY (Do–it–Yourself), Homesteading, Beyond Scientism to Real Science, Renewable Energy, Free Energy/Zero Point Energy, Levitation/Anti–Gravity, Earth Healing, Earth Spirits, Dowsing, Geomancy, Ancient Mysteries, Extra–Terrestrials/Aliens, Inter–/Intra–Dimensional Beings, etc.

top of page


top of page

Death by “Scientific Medicine” [Rx (Drugs), Doctors, and the Ignorant System Itself}

top of page


top of page


top of page


top of page

Influenza (Flu)

top of page

Eugenics & Abortions

top of page

Controversial & Banned Media

top of page

Schooling/Prison and Education/De–Schooling, etc.

top of page

Scientism (False Science) is Lame/Questioning the Validity of Scientific Paradigms

top of page

Skeptical About Science & Skeptic of Skeptics (Follow the Money)

top of page

Germ Theory of Disease Causation & Pasteurization

top of page

Big Bang Theory

top of page

Plate Tectonics & the Hollow Earth

top of page

Second Law of Thermodynamics

top of page

Darwinism (the False Theory of Evolution)

top of page

Did All Life Living at the Time of the Dinosaurs go Extinct? If not, then why are we fed this fucking bullshit?!

top of page

Mind Control & Propaganda

top of page


top of page


top of page


top of page

War = Terrorism — It's Not the Answer and “It's Good for Nothing” & “It's a Racket” (Why do the bloodthirsty forces manipulate us into war? Why do we allow this to happen? Why do we participate in the orgy of War?)

of page

The War Against the People of Iraq

top of page

The Elite–manipulated “Arab Spring” on the road to a nuclear World War III and a Global Prison with a Greatly Reduced Population (Unless we Wake the Fuck Up and Stop all of this Madness!)

top of page

Al Qaeda, ISIS, ISIL, Hamas, Kosovo Liberation Army (KLA), etc. are created, funded, supplied, and/or used by the Elites to foment fear and terror, to have bloodshed, to aid in drug and human trafficking, & to instigate World War III

top of page

Advanced Weapon Systems & Targeted Assassinations

top of page


top of page

AIDS/HIV Virus/Cancer

top of page


top of page


top of page


top of page


top of page


top of page

The Continent of Africa

top of page

the Rothschild Zionist fiefdom {Isis-Ra-El(ohim) “Israel”] illegally occupies Palestine and continues its genocidal intentions

top of page

the Continuum of Violence Represented by the Events of 11 September 2001 and Beyond

top of page

9/11 Dust

Global Police State/Surveillance

top of page

Global Surveillance

top of page

  • EcoC²S: Break Out of Surveillance (Irucka Embry)

  • EcoC²S: Digital/Internet Freedom (Irucka Embry)

  • Privacy Tools: Encryption against global mass surveillance: You are being watched. Private and state–sponsored organizations are monitoring and recording your online activities. privacytools.io provides knowledge and tools to protect your privacy against global mass surveillance.

  • CrunchBang Linux Forums: The paranoid #! Security Guide

  • Free Software Foundation (FSF): Help us raise awareness of free software within your social networks

  • Free Software Foundation (FSF): Protect your freedom and privacy; join us in creating an Internet that's safer from surveillance by Zak Rogoff — Published on Jul 18, 2013

  • An Open Letter to the Radical Left — Let's Truly Get Radical and Heal the Planet By Wade Frazier, June 2007

  • An Open Letter to the Free Software Movement By Wade Frazier, July 2006

  • Freedom and Linux: Defending freedom and Linux from corporate tyranny

  • Free software!: You can't usually do the right thing without inconveniencing yourself. Bruce Byfield reckons free software is a rare opportunity. Featured in Issue 395 of the New Internationalist magazine

  • International Principles on the Application of Human Rights to Communications Surveillance

  • Access is an international human rights organization premised on the belief that political participation and the realization of human rights in the 21st century is increasingly dependent on access to the internet and other forms of technology. Founded in the wake of the 2009 Iranian post–election crackdown, Access teams with digital activists and civil society groups internationally to build their technical capacity and to help them advocate globally for their digital rights. Access provides thought leadership and practical policy recommendations in the broader field of internet freedom, and based on that expertise mobilizes its global movement of citizens to campaign for an open internet accessible to all.

  • Access: Protecting Your Security Online

  • Fight for the Future, defending our basic rights and freedoms

  • The SSD Project: The Electronic Frontier Foundation (EFF) has created this Surveillance Self–Defense site to educate the American public about the law and technology of government surveillance in the United States, providing the information and tools necessary to evaluate the threat of surveillance and take appropriate steps to defend against it.

  • Newsletter: Internet Freedom Is Fundamental, We Might Lose It By Kevin Zeese and Margaret Flowers, www,PopularResistance.org, May 6th, 2017

  • The Free Thought Project: ‘Don't ask for privacy, Take it back’: Anti–NSA #ResetTheNet campaign kicks off Posted By Matt Agorist on June 5, 2014

  • Email Self–Defense: a guide to fighting surveillance with GnuPG encryption

  • Free Software Foundation: Upgrade from Windows 8 — Free Software Foundation — working together for free software

  • The Lumen database collects and analyzes legal complaints and requests for removal of online materials, helping Internet users to know their rights and understand the law. These data enable us to study the prevalence of legal threats and let Internet users see the source of content removals.

  • Who Supports Comcast/Time–Warner Merger? Follow the Money: And who opposes it? Customers. By John Queally, Global Research, April 06, 2015/Common Dreams

  • The Vigilant Citizen: Symbols Rule the World

  • The Vigilant Citizen: Origins and Techniques of Monarch Mind Control, December 12th, 2012

  • The Vigilant Citizen: Mind Control Theories and Techniques used by Mass Media, April 28th, 2010

  • Cryptome Archive

  • Socio–Economics History Blog: Wikileaks is a Front for the CIA and Mossad!

  • Who is Behind Wikileaks? By Prof Michel Chossudovsky, Global Research, April 30, 2015/Global Research 13 December 2010

  • WikiLeaks

  • Deep Politics Forum

  • The purpose of WikiSpooks is to build a repository of documents about deep political structures and events, together with development of the information they contain through user contributed articles, additions, edits and discussion. Emphasis is on the period from about 150 years ago to the present, although analysis of events in earlier times, by way of illustration and understanding of how deep politics operates, is encouraged – a classic example would be the Gunpowder Plot of 1605 in England.

  • Global Research: Intelligence

  • ProPublica: Dragnets: Tracking Censorship and Surveillance

  • ProPublica: Surveillance

  • THIRD WORLD TRAVELER: U.S. National Security State

  • The National Security Archive, The George Washington University

  • The National Security Archive News

  • Democracy Now!: NSA

  • Network World

  • Wired.com

  • Techdirt

  • Deep Dot Web: Jolly Roger's Security Guide for Beginners

  • Naked Security: ‪Computer Security News, Advice and Research

  • SC Magazine: IT Security News and Security Product Reviews

  • Wired.com: Surveillance: Threat Level

  • Linux Journal: Security

  • Schneier on Security: A blog covering security and security technology

  • A Few Thoughts on Cryptographic Engineering

  • Ars Technica

  • Securelist: Information about Viruses, Hackers and Spam

  • Techrights: People's rights in the digital age | Plutocracy threatened by freedom, democracy, privacy & civil rights

  • NCOIC Civil Intelligence Association, Defense Oversight Group

  • Privacy.org: The Source for News, Information, and Action

  • Electronic Privacy Information Center (EPIC)

  • Center for Democracy & Technology: Keeping the Internet Open, Innovative and Free

  • CSO Online: Security and Risk

  • Cyber–Rights & Cyber–Liberties (UK)

  • Statewatch: monitoring the state and civil liberties in Europe

  • Statewatch Observatory: EU–UK–USA: Data surveillance

  • The Citizen Lab is an interdisciplinary laboratory based at the Munk School of Global Affairs, University of Toronto, Canada focusing on advanced research and development at the intersection of Information and Communication Technologies (ICTs), human rights, and global security.

  • History Commons: US Civil Liberties

  • [redacted] news: CovertAction Quarterly: Back Issues

  • Federation of American Scientists (FAS): Intelligence Resource Program

  • Federation of American Scientists (FAS): World Intelligence and Security nncies

  • Secrecy News from the FAS (Federation of American Scientists) Project on Government Secrecy

  • Eye Spy Intelligence Magazine

  • Eye Spy Intelligence Magazine Intelligence Articles (Declassified)

  • The Guardian: Glenn Greenwald on security and liberty

  • ProPublica: Surveillance

  • Spying on Americans: Outgoing Obama's “Privacy Guidelines” on CIA Use of Information on Americans By Stephen Lendman, Global Research, January 20, 2017

  • Middle Finger News: Sticking It To the Poobahs: News Hot Enough To Fry Eggs – Wal–Mart Is Big Brother By Sherman H. Skolnick and Lenny Bloom, SkolnicksReport.com/CloakandDagger.ca, 12–18–3

  • “Intelligence–driven” Global War on Terror: Newly Released NSA “WARgram Documents” Used to Build “Global Surveillance Infrastructure” By Jason Koebler, Global Research, September 08, 2016/Motherboard 6 September 2016

  • The NSA Revelations All in One Chart By Julia Angwin and Jeff Larson, ProPublica, illustrations by Alberto Cairo, special to ProPublica, Published June 30, 2014

  • “The Mother of All Black Ops”: The terrorist attacks on 9–11–2001 represent the worst black operation ever perpetrated. This site documents this false flag operation as well as my experiences with precedent setting color of law violations, perpetrated against this author by the FBI, NSA & DHS. Moreover, The NSA's Use Of EEG heterodyning technology and a Signals Intelligence EMF Scanning Network, to electromagnetically fingerprint the EMF fields of Americans, is Orwellian — James F. Marino

  • 500 Years of History Shows that Mass Spying Is Always Aimed at Crushing Dissent By Washington's Blog, Global Research, January 10, 2014/Washington's Blog 9 January 2014

  • R–bloggers: The FBI's aerial surveillance program, visualized with R By David Smith, April 11, 2016

  • Rense.com: Feds Open ‘Total’ Tech Spy System On US Citizens by Steve Meyers, 8–9–2

  • TechCrunch: FBI, CIA Join NSA In “Backdoor“ Searches On Americans: Posted Jun 30, 2014 by Alex Wilhelm

  • Stasi Social Network Analysis by Julia Angwin, ProPublica, February 11, 2014

  • NSA spying scandal may have roots in 2005 Bilderberg documents by Kenneth Schortgen Jr, Examiner.com, June 9, 2013

  • Worldwide Militarization and the Weapons Industry: America's Surveillance and Targeted Assassination Machine By William C. Lewis, Global Research, September 29, 2013

  • The hi–tech spy: BBC News, Wednesday, 4 April, 2001

  • Why Does Anyone Still Believe the NSA? By Washington's Blog, Global Research/Washington's Blog, January 14, 2014

  • Spy Agency Engaged In Internet “False Flag” Attacks By Washington's Blog, Global Research/Washington's Blog, February 06, 2014

  • Federal Judge Rules NSA Phone Data Collection is Legal and Justified by the 9/11 Attacks By Patrick Martin, Global Research/World Socialist Web Site, December 28, 2013

  • Swedish Intelligence Service Spying on Russia for US National Security Agency By Jordan Shilton, Global Research/World Socialist Web Site, December 30, 2013

  • NSA Feeds Raw Intelligence Data to Israel By Bill Van Auken, Global Research/World Socialist Web Site, September 13, 2013

  • No economic espionage? NSA docs show US spied on Brazil oil giant Petrobras: RT News, September 09, 2013

  • The core Internet institutions abandon the US Government: (Internet Governance Project) IGP Blog, October 11, 2013

  • The BRICS “Independent Internet” Cable. In Defiance of the “US–Centric Internet” By Umberto Pascali, Global Research, September 17, 2013

  • Undermining Privacy, Internet Spying: The “Hidden” Security Agenda Behind the “Hidden” Browsing Histories” Issue. Theresa May and the Snooper’s Charter By Dr. Binoy Kampmark/Global Research, December 29, 2015

  • The U.S. Secret State and the Internet: “Dirty Secrets” and “Crypto Wars” from “Clipper Chip” and ECHELON to PRISM By Tom Burghardt, Global Research, May 19, 2015/Antifascist Calling and Global Research 11 November 2013

  • Revealed: The NSA's Secret Campaign to Crack, Undermine Internet Security by Jeff Larson, ProPublica, Nicole Perlroth, The New York Times, and Scott Shane, The New York Times, Sep. 5, 2013

  • Guardian Weekly: Revealed: how US and UK spy agencies defeat internet privacy and security by James Ball, Julian Borger and Glenn Greenwald, 5 September 2013

  • Did NSA Put a Secret Backdoor in New Encryption Standard? By Bruce Schneier, Wired News, November 15, 2007

  • Secret Documents Reveal N.S.A. Campaign Against Encryption: Documents show that the N.S.A. has been waging a war against encryption using a battery of methods that include working with industry to weaken encryption standards, making design changes to cryptographic software, and pushing international encryption standards it knows it can break. The New York Times, Published: September 5, 2013

  • Wired.com: NSA Has Been Hijacking the Botnets of Other Hackers By Kevin Poulsen, Wired.com, 03.12.14

  • SSL broken! Hackers create rogue CA certificate using MD5 collisions By Ryan Naraine for Zero Day, ZDNet, December 30, 2008

  • How the NSA Plans to Infect ‘Millions’ of Computers with Malware By Ryan Gallagher and Glenn Greenwald, The Intercept, 12 Mar 2014

  • Wired.com: Law Enforcement Appliance Subverts SSL By Ryan Singel, Wired.com, 03.24.10

  • Gonzales calls for law to require Internet companies to preserve customer data By Hope Yen, The Associated Press, USATODAY.com, Posted 9/19/2006

  • A Few Thoughts on Cryptographic Engineering: On the NSA by Matthew Green, September 5, 2013

  • Trisquel GNU/Linux Forum: Your battery status is being used to track you online

  • Trisquel GNU/Linux: Tweak your browser to enhance security and privacy Submitted by pizzaiolo on 07/07/2015

  • The Guardian: Your battery status is being used to track you online: Battery status indicators are being used to track devices, say researchers from Princeton University — meaning warnings of privacy exposure have come to pass by Alex Hern, 2 August 2016

  • App Center Mozilla Developer Network (MDN): Retrieving Battery status information

  • Compromising Electromagnetic Emanations of Wired and Wireless Keyboards by Martin Vuagnoux and Sylvain Pasini — [Requires PDF Software]

  • Wired.com: How to Keep the NSA From Spying Through Your Webcam By Kim Zetter, Wired.com, 03.13.14

  • Hardware Backdooring Is Practical Presented By Jonathan Brossard, Black Hat USA 2012 Briefings, July 26

  • AgainstCronyCapitalism.org: How big business is helping expand NSA surveillance By Editor on April 7, 2015

  • How NSA access was built into Windows by Duncan Campbell, 04.09.1999

  • Only NSA can listen, so that's OK by Duncan Campbell, 01.06.1999

  • NSA helped with Windows 7 development: Privacy expert voices ‘backdoor’ concerns, security researchers dismiss idea By Gregg Keizer, Computerworld, November 18, 2009

  • NSA Backdoor Exploit in Windows 8 Uncovered By Jacob Kleinman, TechnoBuffalo, August 22, 2013

  • Report accuses BT of supplying backdoors for GCHQ and NSA: Researchers accuse BT of placing backdoors into firmware, linking their modems to network in the U.K. with IPs assigned to the U.S. Department of Defense By Steve Ragan, CSO, December 16, 2013

  • Welcome to the (Don't Be) Evil Empire by Rebecca Solnit, Utne Reader, 6/26/2013

  • Tech Wellness: Instagram and Facebook's Policies: Do You Know What You've Agreed To?
  • Business Insider: Well, These New Zuckerberg IMs Won't Help Facebook's Privacy Problems by Nicholas Carlson, May 13, 2010

  • Cover Up Surrounding Pentagon Funding of Facebook's Psychological Experiment?: Army Research Office's bankrolling of ‘emotional contagion’ study scrubbed from Cornell press release By Paul Joseph Watson, Global Research, July 03, 2014/InfoWars 2 July 2014

  • Facebook involved in Massive Secret Pentagon Psychological Experiments Against Users By RT, Global Research/RT, July 03, 2014

  • Facebook And It's Connections To The C.I.A. And D.A.R.P.A. by Brian S Staveley, 01/19/2012

  • Naked Security: ‪Facebook's DeepFace tech is highly accurate in identifying users by Lee Munson on February 6, 2015

  • Google and Facebook Discussed Secret Systems for the U.S. Government to Spy on Users By Pratap Chatterjee, Global Research, June 11, 2013/CorpWatch 8 June 2013

  • Consumer Watchdog: Google

  • Get Holistic Health: ‪Google Maps Has Been Tracking Your Every Move, And There's A Website To Prove It, Oct 11th, 2014

  • Google's “Smart Home” Surveillance Plans, or, How Not to be Colonized By Josh del Sol, Global Research, February 02, 2014/takebackyourpower.net

  • CNET News: NSA disguised itself as Google to spy, say reports: If a recently leaked document is any indication, the US National Security Agency –– or its UK counterpart –– appears to have put on a Google suit to gather intelligence. by Edward Moyer, CNET, September 12, 2013

  • After Bilderberg Meeting, Facebook Official Says End Internet Anonymity Written by Joe Wolverton, II, J.D., The New American, 01 August 2011

  • BBC Reporter: Google Moving to “Suppress Legitimate Journalism”: “Right to be forgotten” ruling threatens to “curb freedom of expression” By Paul Joseph Watson, Global Research, July 04, 2014/InfoWars 3 July 2014

  • Google Online Security Blog: Protecting data for the long term with forward secrecy Posted by Adam Langley, November 22, 2011

  • Consumer Watchdog: Inside Google: A Consumer Watchdog Investigation

  • End the Lie: Google–CIA–NSA Connections: Google Teams Up with CIA to Fund “Recorded Future“ Startup Monitoring Websites, Blogs & Twitter Accounts

  • End the Lie: Lost in the Cloud: Google and the US Government — [Requires PDF Software]

  • Network World: Watchdog Group Questions Google's Relationship with NSA By Ms. Smith, Feb 1, 2011

  • Google's deep CIA and NSA connections by Eric Sommer, English pravda.ru, 17.06.2013

  • Group Calls for Hearings Into Google's Ties to CIA and NSA: Prisonplanet.com, July 20, 2010

  • Infowars.com: Group Calls for Hearings Into Google's Ties to CIA and NSA, July 19, 2010

  • Google Online Security Blog: Google Jet Fleet Loses a Pentagon Fuel Perk: Questions Raised About Founders Use for Non–Government Flights By Mark Maremont, September 13, 2013, on page B1 in the U.S. edition of The Wall Street Journal

  • U.S. enables Chinese hacking of Google By Bruce Schneier, Special to CNN, January 23, 2010

  • Type The Wrong Thing Into A Search Engine And The Secret Police Will Come Knocking On Your Door By Michael Snyder, Global Research, August 04, 2013/endoftheamericandream.com

  • NSA Spying and Search Engine “Tracking Technologies“: It's not Okay if the NSA Spies on us, but it's okay when Google does… By Ming Chun Tang, Global Research, January 19, 2014

  • Social Media is A Tool of the CIA: “Facebook, Google and Other Social Media Used to Spy on People” By Prof Michel Chossudovsky, Global Research, December 14, 2017/Global Research 28 August 2017

  • CBS News MoneyWatch: Social Media Is a Tool of the CIA. Seriously By Jim Edwards, July 11, 2011

  • Domestic Spying and Social Media: Google, Facebook “Back Doors” for Government Wiretaps By Andre Damon, Global Research, May 09, 2013/World Socialist Web Site

  • NSA Tapping Internet Backbone, Spying On Our Social Networks By Washington's Blog, Global Research/Washington's Blog, September 29, 2013

  • Sherman Skolnick's Report: Big Brother Internet––Nameless & Faceless in Cyberspace by Sherman H. Skolnick

  • Sherman Skolnick's Report: Chief Crook Enters Microsoft Case by Sherman H. Skolnick

  • Sherman Skolnick's Report: Carnivore Eats FBI by Sherman H. Skolnick

  • The U.S. Secret State and the Internet: “Dirty Secrets” and “Crypto Wars” from “Clipper Chip” and ECHELON to PRISM By Tom Burghardt, Global Research/Antifascist Calling and Global Research, November 10, 2013

  • Schneier on Security: GoGo Wireless Adds Surveillance Capabilities for Government Posted on April 14, 2014

  • America is Now Officially an Orwellian Totalitarian State: The Complete Interactive Guide To How The NSA Spies On Everything You Do By Tyler Durden, Global Research/Scoop new Zealand, April 07, 2014

  • Institutionalized US Spying: More Than NSA Involved By Stephen Lendman, Global Research, August 17, 2013

  • Health Freedom Alliance: The Era Of Widespread Biometric Identification And Microchip Implants Is Here by Alice

  • ‪U.S. Government Buys “Truly Orwellian” Surveillance Technology To Track Drivers in Real Time By Pratap Chatterjee, Global Research, February 11, 2015/CorpWatch 10 February 2015

  • High Times: ‪DEA Tracking License Plates Since 2008 By Mike Adams, Jan 30, 2015

  • Naked Security: Massive DEA license plate reader program tracks millions of Americans by Lisa Vaas on January 28, 2015

  • Is the “Common Core” Educational Standards Initiative Part of a Domestic Spy Program?: The US Department of Education and the P–20 Agenda By Timothy Alexander Guzman, Global Research/Silent Crow News, May 29, 2014

  • NaturalNews.com: Is your TV spying on you? For millions of viewers, the answer is YES! by Jayson Veley, February 09, 2017

  • Techdirt: Vizio Fined $2.2 Million For Not Telling Customers Their TVs Were Spying On Them from the from the I–always–feel–like–somebody's–watching–me dept by Karl Bode, Feb 7th 2017

  • The Daily Beast: Your Samsung SmartTV Is Spying on You, Basically by Shane Harris, 02.05.15

  • Techdirt: Smart TV Exploit Means Hackers Can Watch You Watch TV from the i–spy–with–my–little–eye dept by Timothy Geigner, Dec 12th 2012

  • That's No Phone. That's My Tracker by Peter Maass and Megha Rajagopalan, ProPublica, July 13, 2012

  • Mobile phone tracking: From Wikipedia, the free encyclopedia

  • Brasscheck TV: Apple hardware completely compromised: Installed at the time of manufacture

  • The Geek Stuff: FBI vs Apple: Should Apple Create a Backdoor for iPhone by Ramesh Natarajan on February 22, 2016

  • Free Software Foundation: Free Software Foundation statement on the new iPhone, Apple Pay, and Apple Watch by Free Software Foundation, Published on Sep 09, 2014

  • CNET News: FBI to Apple: We don't need your iPhone hack: The law enforcement agency reveals an outside party has shown it a way that could unlock a terrorist's iPhone 5C without Apple's help. by Laura Hautala and Shara Tibken, March 21, 2016

  • Der Spiegel: iSpy: How the NSA Accesses Smartphone Data: The US intelligence agency NSA has been taking advantage of the smartphone boom. It has developed the ability to hack into iPhones, android devices and even the BlackBerry, previously believed to be particularly secure. By Marcel Rosenbach, Laura Poitras and Holger Stark, September 09, 2013

  • CNET News: ‪How police have obtained iPhone, iPad tracking logs: It's no secret to police investigators that the Apple iPhone keeps track of its owners' approximate location. And Android devices appear to do the same as well. by Declan McCullagh, April 21, 2011

  • CNET News: FBI taps cell phone mic as eavesdropping tool By Declan McCullagh and Anne Broache, December 1, 2006

  • The NSA developed software for backdoor access to iPhones: The software being developed in 2008 would let the agency locate phones and remotely turn on cameras and mics, Der Spiegel reported By Stephen Lawson, Computerworld, December 31, 2013

  • Cell Phone Surveillance: US Law Enforcement Can Intercept Apple iMessages By Clarence Walker, Global Research, April 17, 2013/Stop the Drug War

  • Veterans Today: FBI ‘secret rules’ revealed: Massive trove of documents unmask agency's shady tactics By GPD on January 31, 2017

  • The FBI's Secret Rules: President Trump has inherited a vast domestic intelligence agency with extraordinary secret powers. A cache of documents offers a rare window into the FBI's quiet expansion since 9/11.

  • https://www.globalresearch.ca/police-state-canada-communications-security-establishment-canada-csec-runs-massive-domestic-spying-program/5339250 Police State Canada: Communications Security Establishment Canada (CSEC) Runs Massive Domestic Spying Program By Keith Jones Global Research, June 16, 2013 World Socialist Web Site https://www.globalresearch.ca/csec-and-harper-government-assert-right-to-spy-on-canadians/5367380 CSEC and Harper Government Assert Right to Spy on Canadians By Keith Jones Global Research, February 04, 2014 World Socialist Web Site https://www.globalresearch.ca/data-retention-and-australias-police-state-consensus/5439830 “Data Retention” and Australia's Police State Consensus By Binoy Kampmark Global Research, March 31, 2015 https://www.globalresearch.ca/britains-gchq-domestic-spying-apparatus-to-be-granted-greater-surveillance-powers-after-paris-attacks/5424406 Britain's GCHQ Domestic Spying Apparatus to be granted Greater Surveillance Powers after Paris Attacks By Steven MacMillan Global Research, January 13, 2015 https://www.globalresearch.ca/authoritarians-use-paris-terror-attack-as-excuse-for-power-grab/5425134 Authoritarians Use Paris Terror Attack As Excuse for Power Grab: In the Wake of French Terror, Governments Demand More Mass Surveillance By Washington's Blog Global Research, January 17, 2015 Washington's Blog https://www.globalresearch.ca/once-again-the-fbi-is-caught-in-drama-setting-up-islamic-youngster-as-domestic-terrorist/5425099 Once Again the FBI is Caught in Drama, “setting up” Islamic Youngster as “Domestic Terrorist” By Shepard Ambellas Global Research, January 17, 2015 Intellihub https://www.globalresearch.ca/latest-fbi-terror-entrapment-case-used-to-push-surveillance-state/5425176 Latest FBI Terror Entrapment Case Used To Push Surveillance State Boehner: Government would not have known about Cornell without surveillance By Kurt Nimmo Global Research, January 17, 2015 Infowars 16 January 2015 https://www.globalresearch.ca/digital-electronic-internet-of-things-and-smart-grid-technologies-to-fully-eviscerate-privacy/5428595 Digital Electronic “Internet of Things” (IoT) and “Smart Grid Technologies” to Fully Eviscerate Privacy By Prof. James F. Tracy Global Research, February 02, 2015 https://www.gnu.org/philosophy/who-does-that-server-really-serve.html Who does that server really serve? by Richard Stallman (The first version was published in Boston Review.) https://www.fsf.org/news/reform-corporate-surveillance Reform corporate surveillance by Free Software Foundation, Dec 11, 2013 http://www.wired.com/2013/10/a-necessary-evil-what-it-takes-for-democracy-to-survive-surveillance/ Stallman: How Much Surveillance Can Democracy Withstand? By Angela Watercutter, 10.14.13
  • Wired.com: https://www.globalresearch.ca/fbi-wiretapping-of-internet-users-all-your-data-belongs-to-us/22025 FBI Wiretapping of Internet Users. “All Your Data Belongs to Us”: A Seamless Global Surveillance Web By Tom Burghardt Global Research, November 21, 2010 Antifascist Calling… 21 November 2010 http://www.cryptogon.com/?p=624 High–Traffic Colluding Tor Routers in Washington, D.C., and the Ugly Truth About Online Anonymity cryptogon.com May 2nd, 2007 http://www.cryptogon.com/?p=193 Microsoft Vista Developed with Help from U.S. National Security Agency January 9th, 2007 https://www.blackhat.com/html/bh-us-12/bh-us-12-archives.html#Brossard Black Hat USA 2012 | Briefings Hardware Backdooring Is Practical July 26 http://www.storyleak.com/tor-developer-fears-nsa-interception-amazon-purchase/ Tor Developer Suspects NSA Interception Of Amazon Purchase by Mikael Thalen January 25th, 2014 Storyleak https://www.globalresearch.ca/cia-emails-expose-access-journalist-at-work-la-timesassociated-press-reporter-or-covert-cia-spokesperson/5400030 CIA Emails Expose “Access Journalist” at Work – LA Times/Associated Press Reporter or Covert CIA Spokesperson? By Jonathan Cook Global Research, September 07, 2014 jonathan–cook.net 5 September 2014 https://www.globalresearch.ca/beware-facebooks-soft-censorship/5399498 Beware: Facebook's “Soft Censorship” By Tony Cartalucci Global Research, September 05, 2014 Local Org http://rt.com/usa/nsa-radio-wave-cyberattack-607/ NSA able to target offline computers using radio–waves for surveillance, cyber–attacks Published time: January 15, 2014 RT USA http://thefreethoughtproject.com/whistleblower-nsa-stores-80-phone-calls-metadata-full-audio/ The Free Thought Project Whistleblower: NSA stores 80% of all phone calls, not just metadata — full audio Posted By Matt Agorist on July 12, 2014 RT.com http://thefreethoughtproject.com/revealed-governments-control-smartphones/ The Free Thought Project Revealed: How governments can take control of smartphones Posted By Matt Agorist on June 25, 2014 RT.com http://thefreethoughtproject.com/dhs-funds-1984-style-total-tracking-system-move-subject-review/ The Free Thought Project DHS Funds 1984–Style Total Tracking System, Your Every Move is Now Subject to Review Posted By Matt Agorist on November 12, 2013 http://thefreethoughtproject.com/facecrook-nsa-storing-facial-web-images-millions-intercepted-daily/ The Free Thought Project Facecrook: NSA storing your facial web images, millions intercepted daily Posted By Matt Agorist on June 1, 2014 RT.com https://firstlook.org/theintercept/2015/02/19/great-sim-heist/ ‪The Great SIM Heist: How Spies Stole the Keys to the Encryption Castle By Jeremy Scahill and Josh Begley The Intercept
  • Democracy Now!: NSA & British GCHQ Hacked SIM Card Maker to Steal Encryption Keys to Spy on Billions of Cellphones, February 20, 2015

  • http://www.opednews.com/articles/SOMALGET-NSA-Recording-al-by-Donn-Marten-Government_Intelligence_Lies_Metadata-140520-623.html OpEdNews Op Eds 5/20/2014 SOMALGET: NSA Recording all Cell Phone Calls in the Bahamas By Donn Marten https://www.globalresearch.ca/from-ancient-egypt-to-modern-america-spying-has-always-been-used-to-crush-dissent/5388776 From Ancient Egypt to Modern America: Spying has Always been used to Crush Dissent What Americans Need to Know About the History of Spying By Washington's Blog Global Research, June 27, 2014 Washington's Blog https://www.globalresearch.ca/pentagon-funds-cold-war-style-science-study-to-track-political-protest-in-america/5387601 Pentagon Funds “Cold War–Style” Science Study to Track Political Protest in America By Shawn Helton Global Research, June 19, 2014 21st Century Wire 18 June 2014 https://www.globalresearch.ca/intrusive-brain-reading-surveillance-technology-hacking-the-mind/7606 Intrusive Brain Reading Surveillance Technology: Hacking the Mind By Carole Smith Global Research, December 13, 2007 Dissent Magazine, Australia, Summer 2007/2008 13 December 2007 https://www.globalresearch.ca/big-brother-darpa-s-control-freak-technology/7603 Big Brother: DARPA's Control Freak Technology By Kurt Nimmo Global Research, December 12, 2007 inforwars,com 12 December 2007 https://www.globalresearch.ca/web-of-deceit-britains-stealth-internet-censorship-program/5386142 Web of Deceit: Britain's Stealth Internet Censorship Programme By Matthew Butler Global Research, June 08, 2014 consciousreporter.com https://citizenlab.org/2014/02/hacking-team-targeting-ethiopian-journalists/ Hacking Team and the Targeting of Ethiopian Journalists February 12, 2014 Authors: Bill Marczak, Claudio Guarnieri, Morgan Marquis–Boire, and John Scott–Railton. https://citizenlab.org/2014/02/mapping-hacking-teams-untraceable-spyware/ Mapping Hacking Team's “Untraceable” Spyware February 17, 2014 Authors: Bill Marczak, Claudio Guarnieri, Morgan Marquis–Boire, and John Scott–Railton. https://www.globalresearch.ca/hacking-teams-us-nexus-untraceable-spyware-and-us-dedicated-foreign-espionage-infrastructure/5374407 Hacking Team's US Nexus: “Untraceable Spyware” and US Dedicated Foreign Espionage Infrastructure By Global Research News Global Research, March 19, 2014 citizenlab.org by Bill Marczak, Claudio Guarnieri, Morgan Marquis–Boire, John Scott–Railton, and Sarah McKune, citizenlab.org, Munk School of Global Affairs, University of Toronto http://keccak.noekeon.org/ The Keccak sponge function family http://www.nist.gov/itl/csd/sha-100212.cfm NIST Selects Winner of Secure Hash Algorithm (SHA–3) Competition From NIST Tech Beat: October 2, 2012 The National Institute of Standards and Technology (NIST) is an agency of the U.S. Department of Commerce. https://en.wikipedia.org/wiki/SHA-3 SHA–3 From Wikipedia, the free encyclopedia http://www.maxkeiser.com/2014/03/busted-u-s-tech-giants-knew-of-nsa-spying-says-agencys-senior-lawyer/ BUSTED — U.S. Tech Giants Knew of NSA Spying Says Agency's Senior Lawyer Posted on March 19, 2014 by Michael Krieger http://arstechnica.com/security/2014/03/virtually-no-evidence-for-claim-of-remote-backdoor-in-samsung-galaxy-phones/ “Virtually no evidence” for claim of remote backdoor in Samsung phones: Security researcher offers a different take on warning of secret Galaxy spy code. by Dan Goodin, Mar 13, 2014 http://redmine.replicant.us/projects/replicant/wiki/SamsungGalaxyBackdoor Samsung Galaxy Back–door Replicant http://rt.com/news/nsa-smart-phones-spying-563/ NSA can tap into BlackBerry, iOS, and Android systems – report Published time: September 08, 2013 00:19 Edited time: September 09, 2013 09:04 http://www.wired.com/threatlevel/2013/04/verizon-rigmaiden-aircard/all/ Secrets of FBI Smartphone Surveillance Tool Revealed in Court Fight By Kim Zetter, 04.09.13
  • Wired.com: http://www.prisonplanet.com/financial-times-editorial-admits-agenda-for-dictatorial-world-government.html Financial Times Editorial Admits Agenda For Dictatorial World Government: Jaw–dropping report concedes that “global governance” is a euphemism for anti–democratic global government Paul Joseph Watson Prison Planet.com Tuesday, December 9, 2008 http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html Privacy Scandal: NSA Can Spy on Smart Phone Data: SPIEGEL has learned from internal NSA documents that the US intelligence agency has the capability of tapping user data from the iPhone, devices using Android as well as BlackBerry, a system previously believed to be highly secure. September 07, 2013 htto://blog.cryptographyengineering.com/2012/12/the-anatomy-of-bad-idea.html A Few Thoughts on Cryptographic Engineering: The anatomy of a bad idea Matthew Green Friday, December 28, 2012 http://www.wnd.com/2013/06/now-fbi-wants-back-door-to-all-software/ Now FBI wants back door to all software But leading security experts say strategy would help enemies Bob Unruh WND http://www.nytimes.com/2014/01/15/us/nsa-effort-pries-open-computers-not-connected-to-internet.html?_r=0 N.S.A. Devises Radio Pathway Into Computers By David E. Sanger and Thom Shanker Jan. 14, 2014 The New York Times http://techrights.org/2014/02/19/espionage-and-lync/ NSA/PRISM on Steroids: Microsoft Lync Posted in Microsoft at 5:28 am by Dr. Roy Schestowitz 02.19.14 http://www.kaspersky.com/about/news/virus/2015/equation-group-the-crown-creator-of-cyber-espionage Equation Group: The Crown Creator of Cyber–Espionage | Kaspersky Lab 16 Feb 2015 http://securelist.com/blog/research/68750/equation-the-death-star-of-malware-galaxy/ Equation: The Death Star of Malware Galaxy By GReAT (Kaspersky Labs' Global Research & Analysis Team), February 16, 2015 Securelist http://arstechnica.com/security/2015/02/how-omnipotent-hackers-tied-to-the-nsa-hid-for-14-years-and-were-found-at-last/ How “omnipotent” hackers tied to NSA hid for 14 years—and were found at last: “Equation Group” ran the most advanced hacking operation ever uncovered. by Dan Goodin, Feb 16, 2015 Ars Technica http://www.reuters.com/article/2015/02/16/us-usa-cyberspying-idUSKBN0LK1QV20150216 Russian researchers expose breakthrough U.S. spying program By Joseph Menn Feb 16, 2015 Reuters.com http://arstechnica.com/security/2013/12/we-cannot-trust-intel-and-vias-chip-based-crypto-freebsd-developers-say/ “We cannot trust” Intel and Via's chip–based crypto, FreeBSD developers say: Following NSA leaks from Snowden, engineers lose faith in hardware randomness. by Dan Goodin - Dec 10, 2013 7:00am CST Ars Technica http://www.prisonplanet.com/intel-ceo-refuses-to-answer-questions-on-whether-nsa-can-access-processors.html Prison Planet.com » Intel CEO Refuses To Answer Questions On Whether NSA Can Access Processors:Previously leaked NSA slide bragged that Intel chips were compromised by Steve Watson Prisonplanet.com February 20, 2014
  • “Secret” 3G Intel Chip Gives Snoops Backdoor PC Access: Trisquel GNU/Linux Users Forum

  • http://wccftech.com/intel-possibly-amd-chips-permanent-backdoors-planted-nsa/ NSA could have planted Permanent Backdoors in Intel and AMD Chips Posted 2 weeks ago by Usman Pirzada, Wccftech.com
  • Truthout: Why the Close Collaboration Between the NSA and AT&T Matters By Julia Angwin and Jeff Larson, ProPublica, 18 August 2015

  • Globalization and the Police State: CIA Pays AT&T to Spy on Phone Data By Bill Van Auken, Global Research, November 08, 2013/World Socialist Web Site

  • https://www.globalresearch.ca/government-lies-about-spying-again-and-again-heres-whats-really-going-on/5352951 Government Lies About Spying Again and Again … Here's What's REALLY Going On By Washington's Blog Global Research, October 05, 2013 Washington's Blog 4 October 2013 https://www.globalresearch.ca/why-spying-on-metadata-is-even-more-intrusive-than-listening-to-content/5365133 Why Spying On Metadata Is Even More Intrusive than Listening to Content By Washington's Blog Global Research, January 16, 2014 Washington's Blog https://www.globalresearch.ca/nsas-spying-on-metadata-violates-our-freedom-of-association/5351947 NSA's Spying On Metadata Violates Our Freedom of Association By Washington's Blog Global Research, September 28, 2013 Washington's Blog http://boingboing.net/2013/09/07/90-percent-of-tor-keys-can-be.html 90 percent of Tor keys can be broken by NSA: what does it mean? Cory Doctorow Sep 7, 2013 Boing Boing http://www.linuxjournal.com/content/nsa-linux-journal-extremist-forum-and-its-readers-get-flagged-extra-surveillance NSA: Linux Journal is an “extremist forum” and its readers get flagged for extra surveillance Jul 03, 2014 By Kyle Rankin http://www.wired.com/2014/07/nsa-targets-users-of-privacy-services/ The NSA Is Targeting Users of Privacy Services, Leaked Code Shows by Kim Zetter 07.03.14
  • Wired.com: https://www.eff.org/deeplinks/2014/01/after-nsa-backdoors-security-experts-leave-rsa-conference-they-can-trust January 30, 2014 | By April Glaser After NSA Backdoors, Security Experts Leave RSA for a Conference They Can Trust http://www.linuxforums.org/forum/security/3515-rsa-versus-dsa.html Linux Forums GNU Linux Zone Security RSA versus DSA https://crypto.stackexchange.com/questions/1677/when-to-use-rsa-and-when-elgamal-asymmetric-encryption/1679 public key – When to use RSA and when ElGamal asymmetric encryption – Cryptography Stack Exchange https://crypto.stackexchange.com/questions/3153/sha-256-vs-any-256-bits-of-sha-512-which-is-more-secure/3156 hash – “SHA–256” vs “any 256 bits of SHA–512”, which is more secure? – Cryptography Stack Exchange https://www.eff.org/deeplinks/2010/09/government-seeks SEPTEMBER 27, 2010 | BY SETH SCHOEN Government Seeks Back Door Into All Our Communications https://spideroak.com/privacypost/cloud-security/nsas-commercial-partnership-with-rsa-to-break-encryption-standards/ NSA Partners With RSA to Weaken Encryption Standards Posted by Kalyani M. on Dec 30, 2013 http://www.theguardian.com/technology/2013/sep/16/nsa-gchq-undermine-internet-security Academics criticise NSA and GCHQ for weakening online encryption Spies undermining security to listen in to enemy traffic also weakens security for all of us, say university researchers Charles Arthur The Guardian, Monday 16 September 2013 16.54 EDT https://www.schneier.com/blog/archives/2014/04/heartbleed.html Heartbleed https://www.schneier.com/blog/archives/2014/04/more_on_heartbl.html More on Heartbleed http://www.zdnet.com/institutional-failure-led-to-nsa-missing-the-heartbleed-flaw-7000028366/ How the NSA shot itself in the foot by denying prior knowledge of Heartbleed vulnerability: Summary: In admitting it didn't know about a massive security flaw in one of the Web's most used encryption libraries, the NSA inadvertently revealed a massive institutional failure. By Zack Whittaker for Zero Day, April 12, 2014 http://www.wired.com/2014/04/nsa-heartbleed Has the NSA Been Using the Heartbleed Bug as an Internet Peephole? By Kim Zetter, 04.10.14
  • Wired.com: http://www.pcworld.com/article/2142565/report-nsa-secretly-exploited-devastating-heartbleed-bug-for-years.html Report: NSA secretly exploited devastating Heartbleed bug for years (Update: NSA denies) by Brad Chacos, Apr 11, 2014 http://www.bloomberg.com/news/2014-04-11/nsa-said-to-have-used-heartbleed-bug-exposing-consumers.html NSA Said to Exploit Heartbleed Bug for Intelligence for Years By Michael Riley, Apr 11, 2014 https://www.globalresearch.ca/did-the-department-of-homeland-security-just-admit-that-the-government-knew-about-the-heartbleed-bug/5377813 Did the Department of Homeland Security Just Admit that the Government Knew about the Heartbleed Bug? Why Were Government Computers Immune to the Bug? By Washington's Blog, Global Research, April 14, 2014/Washington's Blog https://www.schneier.com/blog/archives/2014/04/unbreakable_enc.html "Unbreakable" Encryption Almost Certainly Isn't http://ftp.heanet.ie/mirrors/fosdem-video/2014/Janson/Sunday/NSA_operation_ORCHESTRA_Annual_Status_Report.webm http://video.fosdem.org/2014/Janson/Sunday/NSA_operation_ORCHESTRA_Annual_Status_Report.webm For more on how OpenSSL is a nightmare, and why this bug is one among many that will never be found, listen to FreeBSD developer Poul–Heening Kamp's excellent talk at the FOSDEM BSD conference. Source: Julian Assange: Debian Is Owned By The NSA « IgnorantGuru's Blog
  • NSA's Linux: Schneier on Security

  • http://trisquel.info/en/forum/julian-assange-debian-owned-nsa Julian Assange: Debian Is Owned By The NSA | Trisquel GNU/Linux http://igurublog.wordpress.com/2014/04/08/julian-assange-debian-is-owned-by-the-nsa/ Julian Assange: Debian Is Owned By The NSA « IgnorantGuru's Blog http://lwn.net/Articles/420858/ Update on the OpenBSD IPSEC backdoor allegation [LWN.net] http://marc.info/?l=openbsd-tech&m=129236621626462&w=2 'Allegations regarding OpenBSD IPSEC' - MARC https://en.wikipedia.org/wiki/Binary_blob Binary blob From Wikipedia, the free encyclopedia http://www.tuxradar.com/content/microsoft-contributes-linux-kernel Microsoft contributes to the Linux kernel Posted on Monday July 20th 2009, TuxRadar Linux http://linux.slashdot.org/story/13/09/19/0227238/linus-torvalds-admits-hes-been-asked-to-insert-backdoor-into-linux http://www.eweek.com/developer/linus-torvalds-talks-linux-development-at-linuxcon.html https://pay.reddit.com/r/technology/comments/1mp633/linus_torvalds_admits_ http://www.reddit.com/r/linux/comments/1fxyzb/how_do_we_know_that_linux_doesnt_have_a/ How do we know that Linux doesn't have a government backdoor?: reddit linux http://forum.prisonplanet.com/index.php?topic=43629.0 PrisonPlanet Forum > Globalization and the plan for NWO > Technology (Moderator: Monkeypox) > WTF? Ubuntu caving in to NSA's SELInux?! http://www.linuxtoday.com/developer/2001040900720SCBZKN NSA Grants $1.2 Million Contract to Continue Work on Its Security Enhanced Linux Apr 09, 2001 By Michael Hall, LinuxToday http://www.ibm.com/developerworks/library/l-secure-linux-ru/ Secure Linux: Part 1. SELinux – history of its development, architecture and operating principles Evgeny Ivashko, Specialist, Author 30 May 2012 http://www.ibm.com/developerworks/library/l-selinux/ Anatomy of Security–Enhanced Linux (SELinux) M. Tim Jones (mtj@mtjones.com), Consultant Engineer, Emulex Corp. 17 May 2012 (First published 29 April 2008) http://forums.fedoraforum.org/showthread.php?t=171053 Selinux = NSA-Backdoor? - FedoraForum.org https://www.nsa.gov/research/selinux/index.shtml Security–Enhanced Linux - NSA/CSS https://www.nsa.gov/research/selinux/faqs.shtml SELinux Frequently Asked Questions (FAQ) - NSA/CSS https://www.nsa.gov/research/selinux/docs.shtml SELinux Documentation - NSA/CSS http://lwn.net/2001/0308/security.php3 Security http://lwn.net/ LWN.net is a reader–supported news site dedicated to producing the best coverage from within the Linux and free software development communities. See the LWN FAQ for more information, and please consider subscribing to gain full access and support our activities. http://www.scmagazine.com/black-hat-bruce-schneier-talks-incident-response-trends/article/365255/ August 07, 2014 Black Hat: Bruce Schneier talks incident response, trends Adam Greenberg, Reporter SC Magazine http://security.stackexchange.com/ Information Security Stack Exchange is a question and answer site for Information security professionals. http://security.stackexchange.com/questions/tagged/bash Newest ‘bash’ Questions - Information Security Stack Exchange http://unix.stackexchange.com/questions/157477/how-can-shellshock-be-exploited-over-ssh bash – how can shellshock be exploited over SSH? – Unix & Linux Stack Exchange http://serverfault.com/questions/631257/how-to-test-if-my-server-is-vulnerable-to-the-shellshock-bug security – How to test if my server is vulnerable to the ShellShock bug? – Server Fault http://security.stackexchange.com/questions/68325/shellshock-attack-scenario-exploiting-php Shellshock attack scenario exploiting php – Information Security Stack Exchange https://www.fsf.org/news/free-software-foundation-statement-on-the-gnu-bash-shellshock-vulnerability Free Software Foundation statement on the GNU Bash “shellshock” vulnerability by Free Software Foundation — 25/09/2014 http://www.scmagazine.com/linux-and-os-x-flaw-may-have-greater-impact-than-heartbleed/article/373743/ Teri Robinson, Associate Editor September 25, 2014 ‘Bash Bug’ affects Linux, OS X, may be worse than Heartbleed SC Magazine http://apple.stackexchange.com/questions/146849/how-do-i-recompile-bash-to-avoid-shellshock-the-remote-exploit-cve-2014-6271-an osx – How do I recompile Bash to avoid Shellshock (the remote exploit CVE–2014–6271 and CVE–2014–7169)? - Ask Different Answers for your Apple questions https://www.schneier.com/blog/archives/2014/07/studying_networ.html Schneier on Security: Studying Network Incident Response Teams Using Anthropological Methods https://www.schneier.com/blog/archives/2014/07/gchq_catalog_of.html Schneier on Security: GCHQ Catalog of Exploit Tools https://www.schneier.com/blog/archives/2014/07/the_war_against.html Schneier on Security: Legal Attacks Against Tor http://rt.com/news/nsa-smart-phones-spying-563/ NSA can tap into BlackBerry, iOS, and Android systems – report Published time: September 08, 2013 Edited time: September 09, 2013 RT http://www.wired.com/threatlevel/2013/04/verizon-rigmaiden-aircard/all/ Secrets of FBI Smartphone Surveillance Tool Revealed in Court Fight By Kim Zetter 04.09.13
  • Wired.com: http://www.zerohedge.com/news/2013-07-09/nsa-has-inserted-its-code-android-os-bugging-three-quarters-all-smartphones The NSA Has Inserted Its Code Into Android OS, Or Three Quarters Of All Smartphones Submitted by Tyler Durden on 07/09/2013 http://www.wirelessforums.org/comp-security-misc/does-kernel-2-6-include-nsa-backdoor-39865.html Does kernel 2.6 include an NSA backdoor?, on Wireless Forums http://www.reddit.com/r/linux/comments/1lucdy/did_linus_torvalds_backdoor_linux_random_number/ Did Linus Torvalds backdoor Linux random number generation? : linux REDDIT
  • Open source self–tied knots By John Carroll for A Developer's View, ZDNet, April 18, 2006

  • Security–Enhanced Linux: From Wikipedia, the free encyclopedia

  • Selinux = NSA–Backdoor?: FedoraForum.org

  • Security–Enhanced Linux: NSA/CSS (National Security Agency / Central Security Service)

  • https://www.globalresearch.ca/video-nsa-spying-program-has-the-government-lied-on-snooping-lets-go-to-the-videotape/5344847 VIDEO: NSA Spying Program — Has the Government Lied on Snooping? Let's Go to the Videotape By Global Research News Global Research, August 03, 2013 ProPublica 30 July 2013 https://www.globalresearch.ca/a-history-of-americas-war-on-whistleblowers-and-journalists-since-911/5423048 A History of America's War on Whistleblowers and Journalists Since 9/11 By Joachim Hagopian Global Research, January 06, 2015 https://www.globalresearch.ca/memo-to-potential-whistleblowers-if-you-see-something-say-something/5385860 Memo to Potential Whistleblowers: If You See Something, Say Something By Norman Solomon Global Research, June 06, 2014 https://www.globalresearch.ca/obamas-insider-threat-program-views-whistleblowers-as-enemies-of-america/5340351 Obama's “Insider Threat Program” Views Whistleblowers as “Enemies of America” By Patrick Henningsen Global Research, June 25, 2013 21st Century Wire https://www.globalresearch.ca/the-governments-spying-is-not-as-bad-as-the-whistleblower-said-its-worse/5339213 The Government's Spying Is Not As Bad As The Whistleblower Said … It's WORSE By Washington's Blog Global Research, June 16, 2013 Washington's Blog https://www.schneier.com/blog/archives/2013/06/government_secr.html June 10, 2013 Government Secrets and the Need for Whistle–blowers https://www.globalresearch.ca/nsa-whistleblower-snowden-never-had-access-to-the-juiciest-intelligence-documents/5386231 NSA Whistleblower: Snowden Never Had Access to the “Juiciest” Intelligence Documents NSA Spying On Congress, Admirals, Lawyers … Content As Well As Metadata … Cheney Was Running the Show By Washington's Blog Global Research, June 09, 2014 Washington's Blog 7 June 2014 https://www.globalresearch.ca/12-years-before-edward-snowden-high-level-nsa-whistleblower-warned-congress-about-mass-surveillance-by-the-nsa-against-americans/5357755 Twelve Years Before Edward Snowden, High–Level NSA Whistleblower Warned Congress About Mass Surveillance Against Americans By Washington's Blog Global Research, November 11, 2013 Washington's Blog 10 November 2013 http://www.informationliberation.com/?id=5443 NSA Accused of Psychologically Abusing Whistleblowers Article posted Jan 25 2006, 6:53 PM (CNSNews.com) informationliberation http://www.informationliberation.com/?id=5512 NSA Whistleblowers Were Allegedly Isolated, Intimidated Article posted Jan 26 2006 (CNSNews.com) informationliberation https://www.globalresearch.ca/obama-has-prosecuted-more-whistleblowers-than-all-other-presidents-combined-but-refuses-to-go-after-white-collar-criminals/30455 | Obama has Prosecuted More Whistleblowers than All Other Presidents COMBINED. But Refuses to Go After White Collar Criminals … But Refuses to Go After White Collar Criminals By Washington's Blog Global Research, April 22, 2012/Washington's Blog 22 April 2012 https://www.globalresearch.ca/nsa-whistleblowers-nsa-collects-word-for-word-every-domestic-communication/5344851 | NSA Whistleblowers: NSA Collects ‘Word for Word’ Every Domestic Communication By Washington's Blog Global Research, August 03, 2013/ Washington's Blog 2 August 2013 http://thinkprogress.org/justice/2013/06/07/2120141/why-the-nsas-secret-online-surveillance-should-scare-you/?mobile=nc Why The NSA's Secret Online Surveillance Should Scare You By Zack Beauchamp on Jun 7, 2013 ThinkProgress http://www.usatoday.com/story/news/nation/2013/09/05/nsa-snowden-encryption-cracked/2772721/ NSA uses supercomputers to crack Web encryption, files show: Snowden documents reveal spy agency campaign to compromise online privacy for national security. Michael Winter, USA TODAY, September 5, 2013 http://www.thenewamerican.com/usnews/crime/item/15929-journalist-probing-nsa-and-cia-abuses-dies-in-mysterious-crash Monday, 08 July 2013 12:29 Suspicions Growing Over Death of Journalist Probing NSA and CIA Abuses Written by Alex Newman The New American
  • Sibel Edmonds' Boiling Frogs: The Entire Snowden NSA Cache Exposed Once and for All by Sibel Edmonds, January 31, 2014

  • Manufactured Hero Edward Snowden — The NSA Whistleblower Exposed as Career NSA, CIA, Special Forces Trained Agent by Scott Creighton, Posted on June 9, 2013

  • : The Greenwald–Omidyar–NSA Connection By James Corbett, Global Research, January 09, 2014/BoilingFrogsPost.com 8 January 2014

  • Sibel Edmonds' Boiling Frogs: BFP Breaking News– Omidyar's PayPal Corporation Said To Be Implicated in Withheld NSA Documents: The U.S. Government, An Implicated Billionaire, Fortune–Seeking Journalists & A Public in the Dark by Sibel Edmonds, December 11, 2013

  • Follow the Money: The Secret Heart of the Secret State. The Deeper Implications of the Snowden Revelations By Chris Floyd, Global Research, June 23, 2013/Empire Burlesque

  • Clues to Future Snowden Leaks Found In His Past By Washington's Blog, Global Research, January 02, 2014/Washington's Blog

  • Inconsistencies and Unanswered Questions: The Risks of Trusting the Snowden Story By Kevin Ryan, Global Research, January 01, 2014/digwithin.net

  • My Creeping Concern that the NSA Leaker Edward Snowden is not who he Purports to be… By Naomi Wolf, Global Research, June 15, 2013/NaomiWolf.org

  • From Gore to Greenwald: Establishment–Made Heroes By Sibel Edmonds, Global Research, December 29, 2013/Boiling Frogs Post 27 December 2013

  • Secrecy News: Secret Surveillance and the Crisis of Legitimacy By Steven Aftergood, June 10, 2013

  • Panopticon: From Wikipedia, the free encyclopedia

  • From The Wilderness Publications: Promis by Michael C. Ruppert

  • INSLAW, CIA and the Danny Casolaro Murder

  • Inslaw: From Wikipedia, the free encyclopedia

  • OpEdNews: The new totalitarianism of surveillance technology By Naomi Wolf, August 15, 2012

  • StartPage.com: Giant US government Internet spying scandal revealed

  • http://www.mattberkus.com/blog/miss-your-car-payment-car-gets-disabled/ http://news.bbc.co.uk/2/hi/asia-pacific/1259940.stm http://www.absolute.com/en/partners/alliances/intel Strategic Alliances / Intel http://cryptome.org/2013/07/intel-bed-nsa.htm Intel In Bed with NSA, From Cryptography mail list http://www.tgdaily.com/hardware-opinion/39455-big-brother-potentially-exists-right-now-in-our-pcs-compliments-of-intels-vpr Big Brother potentially exists right now in our PCs, compliments of Intel's vPro Posted September 24, 2008 by Rick C. Hodgin http://www.tomshardware.com/news/sandy-bridge-vpro-core-i7,12353.html Intel's vPro Core CPUs Can Take SMS “Poison Pill” By Marcus Yam, March 11, 2011 - Source: Tom's Hardware US http://www.prisonplanet.com/secret-3g-intel-chip-gives-snoops-backdoor-pc-access.html “Secret” 3G Intel Chip Gives Snoops Backdoor PC Access vPro processors allow remote access even when computer is turned off Paul Joseph Watson Prison Planet.com September 26, 2013 http://news.techeye.net/chips/intel-responds-to-always-on-3g-processor-conspiracy Intel responds to always-on 3G processor conspiracy Rumour Intel Inside's on even if your PC's off, claim 27 Sep 2013 by a staff writer http://www.afr.com/p/technology/intel_chips_could_be_nsa_key_to_ymrhS1HS1633gCWKt5tFtI Intel chips could let US spies inside: expert Published 30 Jul 2013 http://www.eteknix.com/expert-says-nsa-have-backdoors-built-into-intel-and-amd-processors/ Expert Says NSA Have Backdoors Built Into Intel And AMD Processors Ryan Martin http://www.absolute.com/en/resources/whitepapers/absolute-persistence-technology Absolute Persistence Technology http://www.absolute.com/en/partners/bios-compatibility BIOS & Firmware Compatibility http://www.theguardian.com/commentisfree/2013/sep/05/government-betrayed-internet-nsa-spying https://id.theguardian.com/profile/ptanarchist/public http://www.theguardian.com/technology/2013/feb/26/kim-dotcom-mega-encrypted-email If you trust companies that sign their work with labels such as "1984" (http://www.mailpile.is/) http://www.wired.co.uk/news/archive/2013-05/17/australia-internet-block https://trisquel.info/en/forum/internet-censorship-authoritarian-countries#comment-30744 http://www.theguardian.com/world/2007/apr/24/usa.comment http://www.theguardian.com/world/2013/sep/05/nsa-how-to-remain-secure-surveillance http://rt.com/news/nsa-smart-phones-spying-563/ http://falkvinge.net/2013/09/12/the-nsa-and-u-s-congress-has-destroyed-ssl-we-must-rebuild-web-security-from-the-ground-up/ https://en.wikipedia.org/wiki/Pike_Committee United States House Permanent Select Committee on Intelligence From Wikipedia, the free encyclopedia http://nsa.lophofo.com/ Illegal NSA Spying Across America: Got Internet? You've Already Lost Your Privacy. http://www.computerworld.com/s/article/9245092/Unencrypted_Windows_crash_reports_give_significant_advantage_to_hackers_spies Unencrypted Windows crash reports give 'significant advantage' to hackers, spies Microsoft transmits a wealth of information from Windows PCs to its servers in the clear, claims security research By Gregg Keizer December 31, 2013 https://www.techdirt.com/articles/20130711/11540623769/latest-leak-shows-microsoft-handed-nsa-fbi-unencrypted-access-to-outlook-skydrive-skype.shtml Latest Leak Shows Microsoft Handed the NSA and FBI Unencrypted Access to Outlook, SkyDrive and Skype http://nsa.lophofo.com/2009/11/illegal-nsa-spying-continues-through-a-backdoor-in-windows-7/ Illegal NSA Spying Continues through a Backdoor in Windows 7 | Illegal NSA Spying Across America http://www.washingtonpost.com/wp-dyn/content/article/2007/01/08/AR2007010801352.html For Windows Vista Security, Microsoft Called in Pros By Alec Klein and Ellen Nakashima Washington Post Staff Writers January 9, 2007 http://www.tomheneghanbriefings.com/NSA-Totally-Exposed-as-a-Nazi-Gestapo.html NSA Totally Exposed as a Nazi Gestapo by Tom Heneghan, International Intelligence Expert June 23, 2013 https://www.globalresearch.ca/my-doctor-can-disclose-my-medical-records-to-the-nsa-without-my-authorization-and-so-can-yours/5365346 My Doctor Can Disclose My Medical Records to the NSA Without My Authorization (and so can yours) By Peter Van Buren Global Research, January 17, 2014 The Dissenter http://www.storyleak.com/obama-signs-fisa-warrantless-wiretapping-legislation-extension/ Obama Signs FISA Warrantless Wiretapping Legislation Extension by Anthony Gucciardi February 16th, 2013 http://www.wnd.com/2013/06/shady-firms-tied-to-israel-wiretap-u-s-for-nsa/?cat_orig=politics Shady firms tied to Israel wiretap U.S. for NSA ‘Known for its ability to capture and collect data from the largest networks around the world’ WND https://www.globalresearch.ca/1984-was-an-instruction-manual-welcome-to-the-memory-hole/5360175 1984 Was an Instruction Manual: Welcome to the Memory Hole. “Disappearing” Edward Snowden By Global Research News Global Research, December 04, 2013 tomdispatch.com https://www.globalresearch.ca/australian-spy-agencies-central-to-nsas-pivot-to-asia/5356847 Australian Spy Agencies Central to NSA's “Pivot to Asia” By Peter Symonds Global Research, November 05, 2013 World Socialist Web Site https://www.globalresearch.ca/mass-surveillance-of-personal-data-by-eu-member-states-and-its-compatibility-with-eu-law/5357578 Mass Surveillance of Personal Data by EU Member States and its Compatibility with EU Law By Global Research News Global Research, November 10, 2013 CEPS https://www.globalresearch.ca/nsa-able-to-target-offline-computers-using-radio-waves-for-surveillance-cyber-attacks/5364989 NSA able to Target Offline Computers using Radio-waves for Surveillance, Cyber-attacks By Russia Today Global Research, January 15, 2014 RT https://www.globalresearch.ca/is-the-nsa-quartering-digital-troops-within-our-homes/5363256 Is The NSA Quartering “Digital” Troops Within Our Homes? Are “Digital” Troops Being Sent Into Our Digital Devices Like British Troops Were Sent Into American Colonists' Homes? By Washington's Blog Global Research, January 01, 2014 Washington's Blog https://www.globalresearch.ca/passport-to-freedom-world-government-of-world-citizens-garry-davis-vs-national-borders/5363200 “Passport to Freedom”, World Government of World Citizens: Garry Davis vs. National Borders By Greg Guma Global Research, December 31, 2013 Maverick Media https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/winter98_99/art07.html http://pennyforyourthoughts2.blogspot.ca/2013/07/jon-rappoport-surveillance-state-and.html https://www.globalresearch.ca/nsa-spying-and-intelligence-collection-a-giant-blackmail-machine-and-warrantless-wiretapping-program/5340204 http://www.myfoxdc.com/story/20286045/black-boxes-in-cars-raise-privacy-concerns https://www.globalresearch.ca/cell-phone-users-beware-how-to-protect-yourself-from-government-spying/5340221 https://www.globalresearch.ca/are-the-us-armed-forces-a-rape-culture/5340335 https://www.globalresearch.ca/digital-warfare-stuxnet-and-flame-viruses-could-have-three-sister-viruses/5305160 https://www.globalresearch.ca/microsoft-sued-by-beijing-student-for-invasion-of-privacy-and-collection-of-personal-data/6797 https://www.globalresearch.ca/u-s-launching-cyber-warfare-towards-an-era-of-computer-virus-wars/5303069 https://www.globalresearch.ca/spying-on-americans-before-911-nsa-built-back-door-in-all-windows-software-by-1999/5338215 https://www.globalresearch.ca/is-the-government-spying-on-you-through-your-own-computers-webcam-or-microphone/5340304 https://www.globalresearch.ca/obama-as-a-third-world-strongman/5340371 https://www.globalresearch.ca/ireland-financial-playground-for-the-global-elites/5340375 https://www.globalresearch.ca/time-for-an-economy-of-by-and-for-the-people/5340471 https://www.globalresearch.ca/challenging-liberty-the-danger-of-dna-databases/5340517 https://www.globalresearch.ca/the-national-security-industrial-complex-and-nsa-spying-the-revolving-doors-between-state-agencies-and-private-contractors/5339634 http://www.guardian.co.uk/world/2013/jun/08/nsa-boundless-informant-global-datamining https://www.globalresearch.ca/a-free-quick-and-easy-way-to-protest-government-spying/5339156 https://www.globalresearch.ca/obamacare-compromises-privacy/5353948 Obamacare Compromises Privacy By Stephen Lendman Global Research, October 11, 2013 https://www.globalresearch.ca/state-of-emergency-and-continuity-of-government-what-is-the-real-reason-the-government-is-spying-on-americans/5338508 State of Emergency and “Continuity of Government”: What is the Real Reason the Government is Spying on Americans? By Washington's Blog Global Research, October 08, 2013 Washington's Blog and Global Research 10 June 2013 https://www.globalresearch.ca/north-american-integration-and-the-militarization-of-the-arctic/6586 North American Integration and the Militarization of the Arctic By Prof Michel Chossudovsky Global Research, September 24, 2013 Global Research 20 August 2007 https://www.globalresearch.ca/spy-agencies-are-doing-what-the-government-is-spying-on-essentially-everything-we-do/5351041 Spy Agencies Are Doing WHAT? “The Government is Spying on Essentially Everything We Do By Washington's Blog Global Research, September 23, 2013 Washington's Blog https://www.globalresearch.ca/government-spying-on-americans-and-then-giving-info-to-giant-corporations/5338565 https://www.globalresearch.ca/the-next-nsa-spying-shoe-to-drop-pre-crime-artificial-intelligence/5339360 https://www.globalresearch.ca/communications-of-millions-subject-to-us-uk-spying/5340025 https://www.globalresearch.ca/big-data-dynamo-how-giant-tech-firms-help-the-government-to-spy-on-americans/5344211 https://www.globalresearch.ca/nsa-spying-directly-harms-internet-companies-silicon-valley-california-and-the-entire-u-s-economy/5344541 https://www.globalresearch.ca/debunking-the-bush-and-obama-administrations-justification-for-mass-surveillance/5340066 https://www.globalresearch.ca/britains-surveillance-state-the-secret-ops-of-the-government-communications-headquarters-gchq/5340053 https://www.globalresearch.ca/congress-authorizes-vast-expansion-of-domestic-spying/6489 https://www.globalresearch.ca/lawless-domestic-spying-homeland-security-s-national-applications-office-noa/32072 https://www.globalresearch.ca/nsa-deception-operation-questions-surround-leaked-prism-documents-authenticity/5338673 https://www.globalresearch.ca/hidden-intelligence-operation-behind-the-wikileaks-release-of-secret-documents/20580 https://www.globalresearch.ca/adl-spies-the-strange-history-of-the-anti-defamation-league/5338994 https://www.globalresearch.ca/the-national-security-agency-a-global-superpower/5338989 https://www.globalresearch.ca/the-history-of-americas-secret-wars-corporate-espionage-and-the-outsourcing-of-national-security/5338982 https://www.globalresearch.ca/nsas-digital-dragnet-on-americans-government-is-trading-your-info-with-mega-corps/5338957 https://www.globalresearch.ca/top-national-security-experts-spying-program-doesnt-make-us-safer-and-spying-leaks-dont-harm-america/5338896 https://www.globalresearch.ca/modern-day-slave-trade-americas-offshore-industrial-sweat-shops/5338891 https://www.globalresearch.ca/the-secret-war-infiltration-sabotage-devastating-cyber-attacks/5338882 https://www.globalresearch.ca/surveillance-can-be-used-to-frame-you-if-someone-in-government-happens-to-take-a-dislike-to-you/5338559 http://www.usatoday.com/tech/news/internetprivacy/2006-09-19-gonzalez-net-records_x.htm?csp=24 Gonzales calls for law to require Internet companies to preserve customer data https://www.globalresearch.ca/everything-you-wanted-to-know-about-spying-but-were-afraid-to-ask/5342031 Since President Obama Is Asking Us To Trade Some Of Our Privacy With Respect To Our Phone Calls And Our Use Of The Internet For Greater Protection Against Terrorism, At The Very Least We Need To Know Exactly How Our Privacy Is Being Violated Posted on July 7, 2013 by Washington's Blog http://www.washingtonsblog.com/2012/08/u-s-government-planned-indefinite-detention-of-citizens-long-before-911.html U.S. Government Planned Indefinite Detention of Citizens, Suspension of Constitution, Spying on Americans and Other “Post–9/11 Realities” LONG BEFORE 9/11 Posted on August 23, 2012 by Washington's Blog https://www.globalresearch.ca/obama-says-hell-reform-nsa-spying-should-we-believe-him/5345558 Obama Says He'll “Reform“ NSA Spying … Should We Believe Him? By Washington's Blog Global Research, August 10, 2013 https://www.globalresearch.ca/fbi-using-hacker-techniques-to-spy-on-americans/5345030 FBI Using Hacker Techniques to Spy on Americans By Thomas Gaist Global Research, August 05, 2013 World Socialist Web Site https://en.wikipedia.org/wiki/United_States_House_Permanent_Select_Committee_on_Intelligence https://en.wikipedia.org/wiki/Church_Committee https://en.wikipedia.org/wiki/Otis_G._Pike http://intelligence.house.gov/ http://www.historycommons.org/entity.jsp?entity=_pike_committee_1 https://en.wikipedia.org/wiki/Policeware Computer surveillance From Wikipedia, the free encyclopedia https://en.wikipedia.org/wiki/DCSNet DCSNet From Wikipedia, the free encyclopedia https://en.wikipedia.org/wiki/Room_641A Room 641A From Wikipedia, the free encyclopedia https://en.wikipedia.org/wiki/NarusInsight Narus (company) From Wikipedia, the free encyclopedia https://en.wikipedia.org/wiki/Total_Information_Awareness Information Awareness Office From Wikipedia, the free encyclopedia https://en.wikipedia.org/wiki/PRISM_%28surveillance_program%29 PRISM (surveillance program) From Wikipedia, the free encyclopedia https://en.wikipedia.org/wiki/UKUSA_Agreement UKUSA Agreement From Wikipedia, the free encyclopedia https://en.wikipedia.org/wiki/ECHELON ECHELON From Wikipedia, the free encyclopedia Jump to: navigation, search https://en.wikipedia.org/wiki/Frenchelon Frenchelon From Wikipedia, the free encyclopedia https://en.wikipedia.org/wiki/Onyx_%28interception_system%29 Onyx (interception system) From Wikipedia, the free encyclopedia https://en.wikipedia.org/wiki/Carnivore_%28software%29 Carnivore (software) From Wikipedia, the free encyclopedia http://www.zdnet.com/news/fbis-carnivore-hunts-in-a-pack/111254 FBI's Carnivore hunts in a pack By Brock Meeks | October 18, 2000 ZDNet http://www.au.af.mil/au/awc/awcgate/fbi/carnivore_tool.htm Testimony of Donald M. Kerr, Assistant Director, Laboratory Division, FBI Before the United States Senate, The Committee on the Judiciary September 6, 2000 "Carnivore Diagnostic Tool" http://www.assatashakur.org/forum/prison-police-industrial-complex/13442-phone-company-sleeps-fbi.html Overthrow Of The American Republic Part 81 Phone Companies Sleep With The Fbi by Sherman H. Skolnick 9/24/05 http://www.democraticunderground.com/discuss/duboard.php?az=view_all&address=389x2990965 The Pike Committee - Democratic Underground http://www.historycommons.org/entity.jsp?entity=_pike_committee_1 Profile: Pike Committee a.k.a. "House Select Committee on Intelligence" The History Commons http://www.maryferrell.org/mffweb/archive/docset/getList.do?docSetId=1918 Pike Committee Reports The Mary Ferrell Foundation http://www.maryferrell.org/wiki/index.php/Main_Page The Mary Ferrell Foundation https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/winter98_99/art07.html The Pike Committee Investigations and the CIA Looking for a Rogue Elephant Gerald K. Haines US Central Intelligence Agency http://en.wikipedia.org/wiki/TEMPEST Tempest (codename) From Wikipedia, the free encyclopedia http://www.c4i.org/erehwon/echelon.html Echelon: Exposing the Global Surveillance System by Nicky Hager http://www.theguardian.com/world/2001/may/29/qanda.janeperrone http://www.fas.org/irp/program/process/echelon.htm http://www.cyber-rights.org/interception/ http://pennyforyourthoughts2.blogspot.com/2013/07/james-banford-nsa-us-space-command.html http://whatreallyhappened.com/RANCHO/POLITICS/ECHELON/echelon.html http://wikispooks.com/wiki/Echelon https://ce399fascism.wordpress.com/2011/05/15/amy-goodman-and-james-bamford-omit-echelon-ukusa-agreement-from-nsa-discussion-14102008/ Amy Goodman and James Bamford Omit ECHELON, UKUSA Agreement from NSA Discussion (14/10/2008) Posted in Uncategorized by ce399 on 15/05/2011 ce399 | research archive: (anti)fascism http://www.washingtonpost.com/wp-srv/WPcap/1999-11/14/019r-111499-idx.html http://cryptome.org/nsa-bamford.htm http://www.newyorker.com/online/blogs/books/2013/06/the-nsas-chief-chronicler.html http://www.amazon.com/James-Bamford/e/B000APPIUM http://www.hermetic.ch/crypto.htm Cryptography and Security: Encryption, Steganography, Secure File Deletion http://www.hermetic.ch/cryptog.htm Kryptographie und Sicherheit https://www.globalresearch.ca/indefinite-surveillance-say-hello-to-the-national-defense-authorization-act-of-2014/5339863 Indefinite Surveillance: Say Hello to the National Defense Authorization Act of 2014 By Stephen Benavides Global Research, June 20, 2013 inverseengine.com 18 June 2013 https://www.globalresearch.ca/uncle-sam-and-corporate-tech-domestic-partners-raising-digital-big-brother/5339824 Uncle Sam and Corporate Tech: Domestic Partners Raising “Digital Big Brother” By Norman Solomon Global Research, June 20, 2013 https://www.globalresearch.ca/say-no-to-surveillance-uavs-and-drone-warfare/5339367 Say No To Surveillance UAVs and Drone Warfare By Global Research News Global Research, June 17, 2013 DroneWars,net https://www.globalresearch.ca/war-from-above-domestic-drones-patrolling-the-skies-of-america/5363336 War From Above: Domestic Drones Patrolling the Skies of America By Richard Hugus Global Research, January 02, 2014 richardhugus.wordpress.com https://www.globalresearch.ca/fbi-director-acknowledges-use-of-surveillance-drones-in-the-us/5339805 FBI director acknowledges use of Surveillance Drones in the US By Eric London Global Research, June 20, 2013 World Socialist Web Site https://www.globalresearch.ca/the-terror-con-booz-allen-hamilton-and-the-nsa/5339719 The Terror Con, Booz Allen Hamilton and the NSA By Robert Scheer Global Research, June 19, 2013 Truthdig 18 June 2013 https://www.globalresearch.ca/snowden-reveals-massive-national-security-agency-hacking-uunit/5363265 Snowden reveals Massive National Security Agency Hacking Unit By Robert Stevens Global Research, January 01, 2014 World Socialist Web Site https://www.globalresearch.ca/civil-liberties-and-cctv-camera-surveillance-landmark-court-case-in-australia/5334423 Civil Liberties and CCTV Camera Surveillance. Landmark Court Decision in Australia Government seeks to Change Law to Resume Surveillance By Charles Farrier Global Research, May 09, 2013 https://www.globalresearch.ca/secret-spy-court-authorizes-100-of-us-government-requests/5334012 Secret Spy Court Authorizes 100% of US Government Requests By Lauren McCauley Global Research, May 05, 2013 Common Dreams 3 May 2013 https://www.globalresearch.ca/irs-to-spy-on-our-shopping-records-travel-social-interactions-health-records-and-files-from-other-government-investigators/5333697 IRS to Spy on Our Shopping Records, Travel, Social Interactions, Health Records and Files from Other Government Investigators By Washington's Blog Global Research, May 02, 2013 Washington's Blog https://www.globalresearch.ca/high-tech-surveillance-u-s-internal-revenue-snooping-social-media-and-emails-without-warrant/5332682 High Tech Surveillance: U.S. Internal Revenue Snooping Social Media and Emails Without Warrant By Clarence Walker Global Research, April 24, 2013 https://www.globalresearch.ca/artificial-intelligence-and-death-by-drones-the-future-of-warfare-will-be-decided-by-drones-not-humans/5353699 Artificial Intelligence and Death by Drones: the Future of Warfare will be “Decided by Drones” not Humans By Shawn Helton Global Research, October 09, 2013 21st Century Wire https://www.globalresearch.ca/the-implanted-radio-frequency-identification-chip-smart-cards-in-a-surveillance-society/10097 “Smart Cards” in a Surveillance Society: The Implanted Radio–Frequency Identification Chip RFID tags implanted in physical objects or human beings By Tom Burghardt Global Research, February 02, 2013 Antifascist Calling… and Global Research 6 September 2008

    https://www.globalresearch.ca/secret-space-war-americas-former-nazi-scientists-dream-of-ruling-world/5321383 Secret Space War: America's Former Nazi Scientists Dream of Ruling the World By Bruce Gagnon and John Robles Global Research, February 01, 2013 Voice of Russia and Stop NATO
  • Adverse Health Effects from the Operation of Digital Broadcast Television Stations (DVB–T) By Dr. Cornelia Waldmann–Selsam, Dr. Christine Aschermann, and Dr. Markus Kern, Global Research, March 07, 2009

  • Stop Smart Meters!: Fighting for health, privacy, and safety

  • https://www.globalresearch.ca/florida-media-ignores-scientific-data-regarding-health-impacts-of-smart-meters/5399893 Health Impacts of “Smart Meters“. Florida Media Ignores Dangers of Exposure to Non–ionizing Microwave Radiation By James F. Tracy Global Research, September 06, 2014 https://www.globalresearch.ca/health-impacts-of-rf-radiation-us-media-blackout-on-smart-meter-dangers/5365598 Health Impacts of RF Radiation: Media Blackout on Smart Meter Dangers By James F. Tracy Global Research, January 21, 2014 https://www.globalresearch.ca/the-stop-start-meters-campaign-the-health-impacts-of-wireless-technologies/5364545 The Stop Start Meters Campaign. The Health Impacts of Wireless Technologies FCC Chair Wheeler Hounded By Wireless Health Activists By Global Research News Global Research, January 11, 2014 Stop Smart Meters https://www.globalresearch.ca/occupy-your-home-confronting-electro-pollution-and-smart-meter-toxification/5338198 “Occupy Your Home“: Confronting “Electro Pollution” and Smart Meter Toxification Health Impacts of Radio Frequency (RF) Microwave Emissions By James F. Tracy Global Research, June 08, 2013 http://takebackyourpower.net/ Take Back Your Power: The “Smart Meter” Agenda Unveiled http://www.orgoneenergy.org/blog/post/3507048 Do Solar Panels Create Dirty Electricity, EMF's And Radiation? Orgone Energy Australia › Protection Blog http://www.aimtolive.com/radiation_solar_panels.htm BHealthy | Aim to Live | Solar Panels & Dirty Electricity http://www.magdahavas.com https://www.globalresearch.ca/electromagnetic-fields-emf-extremely-low-frequencies-elf-and-radio-frequencies-rf-what-are-the-health-impacts/5335801 Electromagnetic Fields (EMFs), Extremely Low-Frequency (ELF) and Radiofrequency (RF): What are the Health Impacts? By Global Research News Global Research, January 02, 2014 ANH EUROPE and Global Research 20 May 2013 http://aaemonline.org/emf_rf_position.html Electromagnetic and Radiofrequency Fields Effect on Human Health:: The American Academy of Environmental Medicine (AAEM) http://www.agrinewsinteractive.com/frontpage.htm Eastern Ontario AgriNews - agrinews.ca http://www.agrinewsinteractive.com/fullstory.htm?ArticleID=12872&ShowSection=News January, 2013 Vol. 37, No. 1 Speaker connects ‘dirty electricity’ to wind power By Nelson Zandbergen - AgriNews Staff Writer http://www.naturalnews.com/035211_dirty_electricity_myths_facts.html Dirty electricity – Myth or reality? Sunday, March 11, 2012 by: Lloyd Burrell
  • NaturalNews.com: http://www.sammilham.com/index.shtm Sam Milham Dirty Electricity http://microwavenews.com/milham.html Microwave News https://www.globalresearch.ca/smart-meter-dangers-the-health-hazards-of-wireless-electromagnetic-radiation-exposure/ Smart Meter Dangers: The Health Hazards of Wireless Electromagnetic Radiation Exposure The Latest from Dr. David O. Carpenter By Dr. Ilya Sandra Perlingieri Global Research, July 13, 2012 July 13, 2012 https://www.globalresearch.ca/radiofrequency-radiation-the-invisible-hazards-of-smart-meters/ Radiofrequency Radiation: The Invisible Hazards of “Smart” Meters By Dr. Ilya Sandra Perlingieri Global Research, August 19, 2011 August 19, 2011 http://www.npr.org/blogs/alltechconsidered/2013/09/30/226820044/phantom-phone-vibrations-so-common-they-ve-changed-our-brains Phantom Phone Vibrations: So Common They've Changed Our Brains? by ELISE HU September 27, 2013 2:09 PM Listen to the Story All Things Considered https://www.globalresearch.ca/student-science-experiment-finds-plants-wont-grow-near-wi-fi-router/5336877 Student Science Experiment Finds Plants won't Grow near Wi-Fi Router By Global Research News Global Research, June 08, 2014 mnn.com and Global Research 30 May 2013 http://educate-yourself.org/cn/wifiandcellphonedangers03jul12.shtml
  • Educate–Yourself: WiFi & Cell Phones Pose a Much Greater Danger Than Most People Realize; Find Out the Facts From Ken Adachi, July 3, 2012 https://www.globalresearch.ca/whats-causing-the-epidemic-of-gun-violence/5323572 What's Causing the Epidemic of Gun Violence? By Washington's Blog Global Research, February 20, 2013 Washington's Blog
  • Campaign to Stop Killer Coke: Tell Coca–Cola to STOP the VIOLENCE!

  • AirCrap.org: Alcoa Can't Wait to Kill You Link to Fluoride, Chemtrails, Aerospace and Defense Industry

  • https://www.globalresearch.ca/charity-versus-solidarity-do-development-ngos-do-more-harm-than-good/5343236 https://www.globalresearch.ca/big-banks-manipulated-energy-markets-in-california-and-the-midwest-ripping-off-tens-of-millions-of-dollars-in-9-months/5344388 https://www.globalresearch.ca/shocking-extermination-fantasies-by-the-people-running-americas-empire-on-full-display-at-aspen-summit/5344535 https://www.globalresearch.ca/oligarchs-demagogues-and-mass-revolts-against-democracy/5362923 Oligarchs, Demagogues and Mass Revolts … against Democracy By Prof. James Petras Global Research, December 29, 2013 https://www.globalresearch.ca/biotechnology-genetically-modified-crops-and-the-destruction-of-the-local-economy/5340058 Biotechnology, Genetically Modified Crops and the Destruction of the Local Economy By Lesley Docksey Global Research, June 22, 2013 https://www.globalresearch.ca/genetically-modified-foods-and-pr-wars-fighting-against-biotech-giants/5353538 Genetically Modified Foods and PR Wars: Fighting Against Biotech Giants By James Corbett Global Research, October 11, 2013 Global Research TV 29 October 2012 https://www.globalresearch.ca/the-stunning-hypocrisy-of-the-u-s-government/5340083 https://www.globalresearch.ca/known-charities-pay-disabled-workers-wages-as-low-as-22-cents-an-hour-and-its-legal/5340094 https://www.globalresearch.ca/political-lessons-from-greece-fake-social-movements-and-the-role-of-alter-summits/5340122 http://powerofnarrative.blogspot.co.uk/2013/06/intelligence-corporatism-and-dance-of.html http://www.danielvitalis.com/ Daniel Vitalis https://www.globalresearch.ca/corporate-child-abuse-the-unseen-global-epidemic/5352919 Corporate Child Abuse: The Unseen Global Epidemic By Prof. John McMurtry Global Research, October 04, 2013 http://www.cheniere.org/priore/index.html Antoine Prioré: The Tom Bearden Website http://www.TheSpectrumNews.org The SPECTRUM newspaper https://www.globalresearch.ca/transcanadas-anr-pipeline-will-bring-to-market-shale-gas-from-hydraulic-fracking/5377041 TransCanada's ANR Pipeline Will Bring to Market Shale Gas From Hydraulic “Fracking” By Steve Horn Global Research, April 08, 2014 desmogblog.com https://www.globalresearch.ca/oil-consultant-turned-whistleblower-exposes-fracking-crimes-in-alberta/5377139 The Frack Files: Oil Consultant Turned Whistleblower Exposes Fracking Crimes in Alberta By Anthony Hall Global Research, April 08, 2014 EcoWatch
  • What?! Another Massive BP Oil Spill Cover–Up?: Interview with Greg Palast By David Icke, 13 September 2014 (Video)

  • https://www.globalresearch.ca/fourth-anniversary-of-gulf-oil-spill-wildlife-is-still-suffering-from-toxic-cover-up/5377749 Fourth Anniversary of Gulf Oil Spill: Wildlife Is Still Suffering from Toxic Cover Up By Washington's Blog Global Research, April 14, 2014 Washington's Blog https://www.globalresearch.ca/covering-up-the-gulf-oil-spill-with-corexit-was-a-deadly-action-what-happened-in-the-gulf-was-a-political-act-an-act-of-cowardice-and-greed/5351445 “Covering Up The [Gulf] Oil Spill With Corexit Was a Deadly Action … What Happened In the Gulf Was a Political Act, an Act of Cowardice and Greed” By Washington's Blog Global Research, September 25, 2013 Washington's Blog 24 September 2013
  • Science in Society Archive: Gulf of Mexico Oil Catastrophe Worst in History & What to Do Instead: An estimated 3.4 million gallons are spewing out daily with no end in sight while toxic oil and dispersants are killing all ocean life Dr. Ilya Sandra Perlingieri interviews Ohio scientist Mike Castle on what can be done instead (ISIS Report 02/06/10)

  • http://meria.net/category/american-union/ American Union | Talk Radio With Meria http://www.thirdworldtraveler.com/Book_Excerpts/Book_Excerpts.html Excerpted Books page THIRD WORLD TRAVELER http://www.thirdworldtraveler.com/Ruling_Elites/Ruling_Elites.html Ruling Elites page THIRD WORLD TRAVELER http://www.thirdworldtraveler.com/New_World_Order/New_World_Order.html New World Order page THIRD WORLD TRAVELER http://www.thirdworldtraveler.com/One_World_Government/One_World_Government_page.html One World Government page THIRD WORLD TRAVELER https://www.globalresearch.ca/world-population-alarmism-twelve-billion-people-by-2100/5403796 World Population Alarmism: Twelve Billion People by 2100 By Tony Cartalucci Global Research, September 23, 2014 New Eastern Outlook

    Net Neutrality

    top of page

    Political Economics (Economics as an electrical system)

    top of page