![]() |
Microsoft Online Services Global Criminal Compliance Handbook
Some reading for those funny guys who still believe their internet activities are anonymous and "safe" :haha:.
http://file.wikileaks.org/files/microsoft-spy.pdf Quote:
In case you do not know that site, link it. It does not hurt to have a look there every once in a while, to check out the latest stuff they got. Tells you a lesson on the difference between what you've been told and what's really going on while you watch at the other direction: http://wikileaks.org/ |
Take the word of a 30-year Telecomm Broadband Network Operations Specialist.
Privacy of Communications is DEAD! It has gone the way of the dodo and the passenger pigeon. Read my articles on the growth of the Worldwide Surveillance Society here: http://www.boilingfrogspost.com/2009...apping-part-i/ http://www.boilingfrogspost.com/2009...pping-part-ii/ Also download and listen to the podcast interviews with James Bamford and NSA whistleblower Russell Tice there for more information. http://www.boilingfrogspost.com/ |
Quote:
Even most banking transfers I do manually, not automatically or via PC-banking. Some things, though, cannot be avoided (like paying electricity or the health insurrance via automatic debit teansfer - it's mandatory). EC-card I use very rarely, credit card almost never (only for internet buys where I have no alternative), and payback cards and such nonsens I reject alltogether. If you have any more tips for this "paranoid" over here, I'm a happy listener! :DL the bad thing is that the young ones simply do not get raised in sufficient knowledge about these things. they get trained and streamlined for uncritical naivety regarding privacy and data protection. that way they serve the function that market and control wants them to fulfill, and cannot even imagine that maybe the way of going that they know could be put in question. They cannot even imagine why one eventually may want to do that. Nice article, btw, although I did not fully understand the technical part in part 1, but the conclusions from it I got. Now I go to the rest of part 2. |
@Skybird
Actually it's even worse. I know a lot of people who are fully aware of all that stuff and are still using Facebook, payback cards and Google. They just don't care....But I'm afraid one day they will... it just will be too late then when the Gestapo knocks at the door.:dead: |
Quote:
It remains to be true in sevewral very different contexts: people who cannot value freedom, do not deserve it. And maybe they even do not take note of freedom being taken away from them. |
Quote:
As for me, I don't self-censor at all. My attitude is F__k 'em. What are they going to do? Put me on a destroyer and send me to Westpac? Send me to Guantanamo, Cuba? I've already BEEN there. So I routinely advocate the violent overthrow of the US government as part of my own, PERSONAL, plan of World Domination. In this way, I'm dismissed as a crackpot and as the Abbe Faria said, "Thus neglect becomes our ally." Plus now, since I'm effectively broke, I don't even worry about identity theft. If somebody tries to steal MY identity, they'll have MY bill collectors coming after THEM. So here's MY Facebook page picture: http://img32.imageshack.us/img32/780...correctcou.jpg Now consider that I have both: 1. A nuclear weapons background. 2. I've been to Pakistan, Iran and most of the rest of the Muslim world from Morocco to Malaysia. Think they have a dossier on me? But I also know one other thing. As a fourth-generation Native Californian AND a genuine Ventura-born Beach Boy, that makes me, The Last, Best Hope of the Uttermost West. So, Cowabunga, Dude! Keep her between the anchors. http://img714.imageshack.us/img714/6508/dukes3.jpg PS. You also may be interested in my pieces on the Minot/Barksdale loose Nukes episode here: http://www.boilingfrogspost.com/2009...cident-part-i/ http://www.boilingfrogspost.com/2010...ident-part-ii/ One quick note on that. More people were disciplined over THAT incident than 9/11. |
Quote:
Hmmm. that would be me. I do everything by computer, ATM, and credit card. And sure enough, they found me; a guy knocked on the door today, said he was painting house numbers on the street curb for $10. I screamed, "The Internet sent you, didn't it? Be gone!" Let's do the time warp again. |
Quote:
|
Yeah, you could be right. I cannot really wrap my head around it, but I won't say it's impossible.
|
This has been used many times already around the nets, but:
http://en.wikipedia.org/wiki/Nineteen_Eighty-Four I dunno, really. I try not to worry too much about the possibilities and whatever the realities may be in this day and age. I still try to limit how much personal information I let slip out. If I were a really good analyst of computer and internet systems, along with the security aspects (however many there are), I might have a better idea of how many holes my computer has open to the agencies. Wasn't more than a couple of months ago, though, that China hacked the Medicare databases here in Iowa. Information of about 80,000 beneficiaries is now in their hands. What they intend on doing with it is anyone's guess. I'm actually more concerned about how well our government can protect the information they keep than what they can "take" from us. I'll have to cite some sources on the Medicare hacking a bit later. We're about to partake of some fine peasant food. :up: |
Ummm I got a suspicion that cell phone makers are shipping their products with special chip that's put in just to help tapping and monitoring :D even the infrastructure itself could be tampered with.
Umm I would be suspicious for paid Chinese firewall too, the mobile version too. . . As for microsoft spying on its users well that's even a stronger case of suspicion....well the temptation is so strong and the intelligence agency just couldn't resist it they just couldn't I'm sure. Sometimes I type profanity directed at certain villain into google when I'm in a foul mood :D Heck the worst part is internet monitoring or communication tapping in general is nothing compared to mind reading that is more known as remote viewing. That's really intruding into a person's most sacred and private space:his mind and hearts. But of course so many people are either ignorant or skeptic. added to the fact that people in general would panic at having this knowledge disclosed at least in the beginning and it's a secret weapon best kept secret for as long as possible. |
Quote:
|
Castout: Read my pieces and look at Klein's affadavit. The actual surveillance takes place in the telco central offices where all the voice, wireless, internet and data come together in a telecom choke point. The surveillance looks at blocks of traffic at the OC-3/12/48 level. that's 3, 12 or 48 DS-3s, each containing the equivalent of 672 voice channels. So it's a Blanket surveillance ongoing through the use of Semantic Traffic Analyzers which look for key words like Jihad or terror, or explosives of "F__K the government. I hope that clears things up for you.
|
Quote:
I'll educate myself with the provided links. And umm yea this post is gonna make it on their list as it contains the filtered words :O: |
Quote:
http://www.youtube.com/watch?v=s64x3yAm410 Yatta Hey! Anawashte, Kola! http://img520.imageshack.us/img520/8416/yeibichiia2.jpg Yei Bi Chii, The Surf Kachina |
All times are GMT -5. The time now is 03:29 PM. |
Powered by vBulletin® Version 3.8.11
Copyright ©2000 - 2025, Jelsoft Enterprises Ltd.
Copyright © 1995- 2025 Subsim®
"Subsim" is a registered trademark, all rights reserved.