Inventing Anonymity - David Chaum the father of online anonymity. Chaum's quest for a shield
against Internet surveillance began before most of the world was even aware of the Internet at all. His
inventions include the first-ever cryptocurrency, a 1990s venture known as DigiCash, and DC Nets, a scheme
he invented in the early '80s to allow theoretically perfect anonymity within a group of computers. But
perhaps the most influential of Chaum's privacy ideas was an earlier, simpler scheme he called a “mix
network,” a term he coined in 1979.
PrivaTegrity is designed to allow fully secret, anonymous communications that no eavesdropper can crack, whether a hacker or an intelligence agency. It is meant to be both more secure than existing online anonymity systems like Tor or I2P and also more efficient; he claims it will be fast enough to work as a smartphone app with no perceptible delay.In future versions, Chaum and his collaborators plan to add features like larger file sharing for photos and video, the ability to follow Twitter-like feeds, and even financial transactions, all under the cover of strong anonymity with untraceable pseudonyms. Chaum is also building into PrivaTegrity another feature that's sure to be far more controversial: a carefully controlled backdoor that allows anyone doing something “generally recognized as evil” to have their anonymity and privacy stripped altogether.
Whoever controls that backdoor within PrivaTegrity would have the power to decide who counts as “evil”—too much power, Chaum recognizes, for any single company or government. So he's given the task to a sort of council system. When PrivaTegrity's setup is complete, nine server administrators in nine different countries would all need to cooperate to trace criminals within the network and decrypt their communications.
Anonymous the Modern Day American Folk Hero
Anonymous is a decentralized, online community of individuals around the world who protect the defenseless.
Grassroots Protesters ~ The Internet as Our Homeland
Deanonymization Made Simple
Reading articles of deanonymization of hidden services by controlling certain nodes or conducting correlation attacks, I came to an idea that in certain cases it might be much easier to break anonymity. Just by having the same vulnerabilities as in “clearnet”, applications can expose sensitive information and let an attacker gather data from the system and deanonymize the target, with certain “darknet” specifics in the approach.
1975 THE IRON FIST AND THE VELVET GLOVE an analysis of the U.S. Police by the Center
for Research on Criminal Justice.
This book is dedicated to the people of the United States and throughout the world fighting against exploitation and oppression and struggling for socialism. indybay.org
Collectively written by: Susie Bernstein, Lynn Cooper, Elliott Currie, jon Frappier, Sidney Marring, Tony Piatt, Pat Poyner, Gerda Ray, Joy Scruggs, Larry Trujillo With contributions by: Bill Bigelow, Michael Klare, Nancy Stein, and Millie Thayer.
Most spending on criminal justice still comes from the local level but the share of the states and especially of the Federal government is rising fast. Federal spending on criminal justice shot up by 62 percent between 1971-1974, and on police in particular by about 52 percent. For the first time in U.S. history, the Federal government has become deeply involved in the police system, mainly through the creation of the massive Federal Law Enforcement Assistance Administration (LEAA), devoted primarily to standardizing and centralizing the police and other criminal justice agencies, and to funding the development of new and increasingly sophisticated police strategies. At the same time, the 1960's saw the rise of a whole "police-industrial complex," a rapidly growing industry that took technical developments originally created for overseas warfare or for the space program and, backed by government funds, applied them to the problems of domestic "order" in the United States.
2015 EFF privacy report gives and Dropbox a clean bill of health Good news too for Apple and Yahoo, but big bad boos for WhatsApp.
How Imperialism Works
How the World is divided between the rich, who get richer, and the poor, who get poorer, and the rich
richer on the backs of the poor. That division hasn't changed for about 500 years, but there are new,
deceptive ways of shoring it up and ensuring that most of the world's resources are concentrated in as few
hands as possible. What is different today is there is a worldwide movement that understands this
and is gaining strength, especially among the young, many of whom are far better educated about the
chameleon nature of capitalism than those in the 1960s. Moreover, if the intensity of Establishment
propaganda is a guide, at times bordering on institutional panic, then the new movement is already
John Pilger - The .01% New Rulers Of The World  - video 25:43 what happened to Greece by World bank IMF agents http://ow.ly/P5BEF
The dark side of .io: How the U.K. is making web domain profits from a shady
Cold War land deal
"The rights for selling .io domains are held by a British company called Internet Computer Bureau (ICB), [...] The British government granted these rights to ICB chief Paul Kane back in the 1990s. ICB gets to run .io “more or less indefinitely, unless we make a technical mistake,” Kane told me. (ICB has so far run a stable .io namespace. It should be noted that Kane is a respected veteran of the infrastructure scene, and has been entrusted by ICANN with one of the 7 so-called “keys to the internet”.)"
Government is supposed to be there to do simple things to make people happy, and that's all. "Anonymous isn't an army, or a group, per se. There aren't members. Anyone who uses the loic is Anonymous, which means that anybody at any time in their lives can become Anonymous.
Gregg Housh Explains:
Chanology gave people the impression that "a thousand malcontent nerds can change the world by going out and yelling something."
Emory University has archived the Occupy Wall Street tweets. “Emory Libraries' Digital Scholarship Commons (DiSC) has collected more than 10 million tweets about the Occupy Wall Street movement and shaped them into visualizations, like word clouds and heat maps.”
Advocate: Meet the Lawyer Who Defends Anonymous - Oct 3, 2012
As a lawyer not particularly immersed in the technology world, Jay Leiderman first became interested in the hacker collective Anonymous around December 2010. That was when Anonymous activists launched distributed denial of service attacks (DDoS) against Mastercard and PayPal, who stopped processing donations to WikiLeaks.
Since then, he has represented a number of high-profile hackers, including Commander X, who is on the run from the FBI for a DDoS attack on a county website in Santa Cruz, California, to protest a ban on public sleeping, and Raynaldo Rivera, a suspected hacker from LulzSec who is accused of stealing information from Sony computer systems. Both Commander X and Rivera could face up to 15 years in prison.
Leiderman, who represents many of his hacker clients pro bono, argues that the law should be changed on DDoS. In an interview I conducted with Leiderman recently, he told me why slapping teenaged hackers with harsh prison sentences is counterproductive.
How did you first become involved with representing Anonymous?
The politics of it spoke to me and the fact that it was a newly emerging area of law really spoke to me. My partner and I do a lot of medical marijuana law. Primary among the reasons that we do that are that it's new and emerging so we can help shape the way that the law ultimately its society. And because we believe in the politics behind it. And it's the exact same with Anonymous.
We have an opportunity here to make the courts, as these cases wind their way up, understand privacy issues, emerging tech issues, against the backdrop of civil rights and through the prism of free information. And that was something that was just an amazing opportunity for me and something that still engages me as I continue to take on these cases. [...]
WHISTLE BLOWERS / JOURNALISTS / PROTESTORS
The National Union of Journalists issued a Freedom of Information Act
request to investigate possible federal involvement with law enforcement practices that appeared to target journalists. The New York
reported that "New York cops have arrested, punched, whacked, shoved to the ground and tossed a
at reporters and photographers" covering protests.
Reporters were asked by NYPD to raise their hands to prove they had credentials: when many dutifully did so, they were taken, upon threat of arrest, away from the story they were covering, and penned far from the site in which the news was unfolding.
see: Mass Media Information Center and Robert Waterman McChesney and Tom Foremski
Other reporters wearing press passes were arrested and roughed up by cops, after being - falsely - informed by police that "It is illegal to take pictures on the sidewalk."
In New York, a state supreme court justice and a New York City council member were beaten up; in Berkeley, California, one of our greatest national poets, Robert Hass, was beaten with batons.
Our system of government prohibits the creation of a federalized police force, and forbids federal or militarized involvement in municipal peacekeeping. The Mayor of Oakland acknowledged that the Department of Homeland Security had participated in an 18-city mayor conference call advising mayors on "how to suppress" Occupy protests. Britain is sleepwalking in a march toward total email surveillance, even as the US brings forward new proposals to punish whistle blowers by extending the Espionage Act. In an electronic world, evidence of these crimes lasts forever - if people get their hands on the books.
The Department of Homeland Security coordinated a violent crackdown . The DHS cannot on
its own initiative go after anonymous protesters. Rather, DHS is answerable up a chain of
command: first, to New York Representative Peter King, head of the House homeland security subcommittee,
naturally is influenced by his fellow congressmen and women's wishes and interests. And the DHS
directly, above King, to the president.
In other words, for the DHS to be on a call with mayors, the logic of its chain of command and accountability implies that congressional overseers, with the blessing of the White House, told the DHS to authorize mayors to order their police forces - pumped up with millions of dollars of hardware and training from the DHS - to make war on peaceful citizens. Members of Congress, with the collusion of the American president, sent violent, organized suppression against the people they are supposed to represent. Occupy has touched the third rail: personal congressional profits streams.<more>
The news media in the United States often fails to inform Americans about the uglier actions of our own government. We therefore have been deeply grateful for the accomplishments of WikiLeaks, and applaud Ecuador's decision to grant diplomatic asylum to its founder, Julian Assange, who is now living in the Ecuadorean Embassy in London. 8/21/2012
the rolE of art
The financial sector's corruption must be recognized as systemic.
"The Bank of England, as the institution that is responsible for the stability of the system and has the expertise and visibility across the entire market, I mean, their views are extremely relevant here," del Missier said. The false rates reported at this time were only part of the investigation. Investigators also found that individual traders at Barclays had persuaded colleagues to submit false rates in the hope of manipulating LIBOR to their advantage.
In the LIBOR case, notably, a major crime has not been greeted by much demand at the top for criminal prosecutions. That asymmetry is one of the insurance policies of power. Another is to crack down on citizens' protest.
The No 1 agenda item: get the money out of politics. Most often cited was legislation to
blunt the effect of the Citizens United ruling, which lets boundless sums enter the campaign
No 2: reform the banking system to prevent fraud and manipulation, with the most frequent item being to restore the Glass-Steagall Act - the Depression-era law, done away with by President Clinton in 1999, that separates investment banks from commercial banks. This law would correct the conditions for the recent crisis, as investment banks could not take risks for profit that create fake derivatives out of thin air, and wipe out the commercial and savings banks.
No 3 draft laws against the little-known loophole that currently allows members of Congress to pass legislation affecting Delaware-based corporations in which they themselves are investors.
EVEN THOUGH The Senate voted 96 to 3 to pass a watered-down STOCK Act, which would bar members of
Congress, their staff and some federal workers from profiting from non-public information obtained
4/2012 Obama signs Stop Trading on Congressional Knowledge Act law banning insider trading by Congress and for all executive branch employees who currently are required to file financial disclosure statements.
The bill also requires members of Congress, their senior staff and top-level executive branch officials to disclose the terms of their mortgages every year.
The final bill dropped a provision in the Senate's original bill that would have required “political intelligence” operatives to register as lobbyists. These are folks who prowl the halls of Capitol Hill for information that might be useful to hedge funds and other investors.
Mark Zuckerberg's vision of the world is that you should be comfortable sharing as your real self on the Internet. He thinks that anonymity represents a lack of authenticity, almost a cowardice.
Thomas Jefferson: Whenever the people are well-informed, they can be trusted with their own government
Anonymous Anonymous is not a hierarchical organization with it's leader at the top. Anonymous is you Anonymous is all of us. Anonymous is everyone and no one. Anonymous has been often been told and that it has no leaders, but in truth Anonymous has no followers. Anonymous is an ocean of leaders.
Let's try an analogy.
17th century pirates liked to steal booty. They sailed the high seas and pillaged. They had a common flag. But they WERE NOT A GROUP. Sure, there were groups of pirates that sailed on ships together. There was a common outlook -- that plundering booty was a worthwhile activity, ho ho and a bottle of rum, all of that. But they were not a group. There were pirate hangouts like pirate taverns, so there was congregation, but no leadership. Pirates were not a collective. So let's clear it all up. The anons are the pirates, IRC channels and imageboards like 4chan are their pirate taverns, and the various Anonymous outfits like @AnonymousIRC and @AnonOPS are pirate ships with multiple pirates aboard. They're groups of pirates! Simple! So when the American, French, Spanish, Turkish, British or "key members" of Anonymous are arrested the media is deliberately misleading the public and their masters.
The mask may be empowering, in the defense of their information rights which not everyone might be able to muster on his or her own. As a collective identity, Anonymous is also about the right of wearing a mask, to make use of a speaking position that would otherwise not be available, both online and in physical space.
Billionaire noted that in the early days of the demonstrations, the established media paid scant
to the protesters. By contrast, Anonymous ensured that news of the scene in Zuccotti Park went viral. He
claimed that Anons had been studying "the astroturfing that is being done in the name of conservative
politics,” referring to allegations of conservative political groups attempting to pass off events they
organize as evidence of a grassroots movement. Anonymous had used similar tactics to promote Occupy Wall
Street, he suggested. "We had teams of people seeding links all over the news comments, YouTube, FB,
etc, and making lists of interested FB groups, etc., and then telling them all to come.” In essence,
Billionaire was saying that Anonymous had done for Occupy Wall Street what they previously did for funny
pictures of cats. They had used their expertise in spreading memes to help turn the actions of a few
protesters into a national movement. "I am always interested in giving a meme a chance," said
Billionaire. "This one far outperformed our expectations."
Hollywood refuses to release movies for streaming online at the same time as DVDs. For example, of the top 100 movies of 2011 (in revenue), only about 2/3 are available. Even crazier is that broadcast TV (which itself is generally free to consumers as it is underwritten by advertisers) isn't in a much better shape. Piracy will always exist but it seems that the movie and TV industry are intent on feeding it by creating artificial scarcity of content due to their holding back their fares from legal outlets.
Liberate the Data Then Gives It to the Clueless Public.
When people can only find content chosen for them by those in government and instead have to useful web content censored, they suffer and, inevitably, some die as a result.
Those in power, with their superior access, means that secrecy kept us from using the power of the parallel distributed intelligence' the supercomputer of social mind. The decentralization of power works best as the muscle to the bone of centralization - the two work best hand in hand, parallel distributed intelligence is very dumb without leaders and without those who give us tools of thought, new ideas, new perspectives, and new action plans. Governments who determine that they must control what people can see, in order to attempt to control what they think, censor what people can find on the internet.
In the case of tyrants, the goal is always to dupe people into becoming willing slaves. Naturally, when people are most free to choose what information they see, they are best able to determine for themselves what to accept, what to doubt, what to act upon, what to disbelieve, and what to ignore.
THE DREAD DISEASE OPPRESSION
Who controls access to knowledge the informational content on the Internet. Is it the person seeking information or the governmental authorities seeking to limit access? The limits of oppression are set by the rebellion of the oppressed.
To search anonymously you must first understand what information you are
Use a free Anonymous Surfing test to find out.
VPN Virtual Private Network
A VPN, or virtual private network, creates your own private, encrypted channel that runs alongside the
normal Internet. From within any country, a VPN connects you with an Internet server somewhere else. You
pass your browsing and downloading requests to that American or Finnish or Japanese server, and it finds
sends back what you're looking for. It can't read the encrypted messages you're sending. Every
foreign business operating in any country uses such a network. VPNs are freely advertised in China, so
individuals can sign up, too. Every bank, every foreign manufacturing company, every retailer, every
software vendor needs a VPN to exist. This also will Encrypt your e-mail.
Download and use Firefox extension from the EFF foundation to encrypt your searches.
PROTESTS ARE FOR THE VOICELESS
John McCain Threatens Anti-Kissinger Protesters With Arrest, Calls Them "Low-Life Scum"
He's a thug, and a crook, and a liar, and a pseudo-intellectual and a murderer. Ok? Those things are factually verifiable.
- From the late Christopher Hitchens' outstanding interview: Christopher Hitchens' Polemic Against Henry Kissinger
OPPRESSION by its very nature creates the power that crushes it. A Champion arises - a Champion of the oppressed - whether it be a Cromwell or someone unrecorded, he will be there. He is born. Then out of the mystery of the unknown appeared a masked rider who rode up and down the great internet Hwy punishing and protecting and leaving upon the great oppressor the mark of ZORRO aka ANONYMOUS.
This is not about Federalist, Republican, Democrat, Libertarian, Progressive, Communist, Socialist, Populist, Reform, Christian, Freedom, Green, Labor, Union, Marxist, Leninist, Unity, Pirate or any other party - in every country of the world.
Us vs. Them
This is only about the Citizens of the world vs. the Power of the Church, Throne, Oligarchy, Fraternity and the Pirate Merchants, with the power to oppress people in the pursuit of wealth and power.
real drug smuggling pirates
Scull and Bones Yale 1832
William H. Russell (Scull & Bones; co-founder-1832) cousin Samuel Russell formally established Russell & Co. on January 1, 1824 for the purpose of acquiring opium and smuggling it to China.
Russell & Co. merged with the number one US trader, the J. & T. H. Perkins
"Boston Concern" in 1829. THE BIGGEST OPIUM SMUGGLER IN THE U.S.
By the mid-1830s the opium trade had become "the largest commerce of its time in any single commodity, anywhere in the world." Russell & Co. and the Scotch firm Jardine-Matheson, then the world's largest opium dealer working together were known as the "Combination."
George HW Bush(S&B 1948) was born in Milton, Massachusetts not far from the historic home of Robert Bennett Forbes, a Russell partner. Many great American, European and Chinese family fortunes were built on the "China"(opium) trade. Yes, they sold porcelain, tea, silks and other items at home in the US, but they "needed" the trade in opium for silver to pay for the desired goods and—opium smuggling returned "handsome" profits.
PIRATES: The Opium Trade using the skull-and-crossbones flag at the masthead of a clipper ship.
christies.com $2,125 Price includes buyer's premium Skull and Bones, Yale
University's secret society, was founded in 1832. The organization's annual membership roster
Henry Lear as a member in 1869.
Unknown - Skull and Bones Yearbook, 322, VI., c. 1869; Medium: albumen prints; Dimensions: each
Skull and Bones Yearbook, 322, VI., c. 1869
20 albumen prints, bound in a small 4 to volume; each approximately 3 3/8 x 2 1/8in. (8.5 x 5.2cm.) (arched); stamped 'Henry Lear' cover); stamped '322' (on the back cover)
Delta Kappa Epsilon
Yale University in 1900 Delta Kappa Epsilon, an exclusive fraternity whose members have included Presidents George Bush, Jr. and Sr., Vice-President Dan Quayle, banker J.P. Morgan, newspaper magnate William R. Hearst, chewing-gum millionaire William Wrigley and motel man, Howard Johnson.
American Liberty League
Changed it's Name to the TEA PARTY MOVEMENT
Key Financiers, Organizers and Groups
linked to the American Liberty League:
One of Russell and Company's Chief of Operations in Canton was Warren Delano, Jr., grandfather of Franklin Roosevelt, who would have known the truth about Skull and Bones Piracy and gave Franklin the information he needed to help the citizens of the U.S. understand how they were being exploited.
The American Liberty League
On Jan. 3, 1936, in an unprecedented joint session of Congress, when President Roosevelt announced a ban on military exports to fascist Italy, he blasted the American Liberty League:
"They steal the livery of great national ideals to serve discredited special interests…. This minority in business and industry... engage in vast propaganda to spread fear and discord among the people. They would gang up against the people's liberties…. They seek the restoration of their selfish power.….
Our resplendent economic aristocracy does not want to return to that individualism of which they prate, even though the advantages under that system went to the ruthless and the strong. They realize that in 34 months we have built up new instruments of public power. In the hands of a people's government this power is wholesome and proper. But in the hands of political puppets of an economic aristocracy, such power would provide shackles for the liberties of the people. Give them their way and they will take the course of every aristocracy of the past - power for themselves, enslavement for the public."
John F. Kennedy On Secrecy And Censorship vs. Wikileaks
Glyn Moody points us to a blog post that has a video/audio clip of a John F. Kennedy speech to the press
about secrecy and censorship, which is getting some attention for the contrast to the way our government
responding to the Wikileaks controversy.
The key paragraph is the one that opens the video:
The very word "secrecy" is repugnant in a free and open society; and we are as a people inherently and historically opposed to secret societies, to secret oaths and to secret proceedings. We decided long ago that the dangers of excessive and unwarranted concealment of pertinent facts far outweighed the dangers which are cited to justify it. Even today, there is little value in opposing the threat of a closed society by imitating its arbitrary restrictions. Even today, there is little value in insuring the survival of our nation if our traditions do not survive with it. And there is very grave danger that an announced need for increased security will be seized upon by those anxious to expand its meaning to the very limits of official censorship and concealment. That I do not intend to permit to the extent that it is in my control. And no official of my Administration, whether his rank is high or low, civilian or military, should interpret my words here tonight as an excuse to censor the news, to stifle dissent, to cover up our mistakes or to withhold from the press and the public the facts they deserve to know. Compare that to the way our government has been responding -- demanding that US companies block access to Wikileaks and other such moves.
Of course, if you read the full speech from JFK (which was given to the American Newspaper Publishers Association), it's really quite nuanced. JFK argues forcefully against censorship from the government -- but actually is suggesting that the press consider self-censoring itself, taking into account the impact that it could have if it publishes certain information. However, he does try to make it clear that he does not want criticism or errors to be shielded from the public -- just that he hopes the press will decide for themselves to avoid publishing info that directly reveals vital points to enemies of the country. In the end, I actually think these two paragraphs may be even more powerful than the one that most people are talking about:
I not only could not stifle controversy among your readers--I welcome it. This Administration intends to be candid about its errors; for as a wise man once said: "An error does not become a mistake until you refuse to correct it." We intend to accept full responsibility for our errors; and we expect you to point them out when we miss them.
Without debate, without criticism, no Administration and no country can succeed--and no republic can survive. That is why the Athenian lawmaker Solon decreed it a crime for any citizen to shrink from controversy. And that is why our press was protected by the First Amendment-- the only business in America specifically protected by the Constitution- -not primarily to amuse and entertain, not to emphasize the trivial and the sentimental, not to simply "give the public what it wants"--but to inform, to arouse, to reflect, to state our dangers and our opportunities, to indicate our crises and our choices, to lead, mold, educate and sometimes even anger public opinion. Too bad we're not hearing much of that from our politicians today.
40 Years after Leak, Pentagon Papers Coming Out by Calvin Woodward and Richard Lardner - WIKILEAKS OF IT'S TIME
WASHINGTON — Forty years after the explosive leak of the Pentagon Papers, a secret government study chronicling deception and misadventure in U.S. conduct of the Vietnam War, the report is coming out in its entirety on Monday.
WHO ARE THE
When you lose your fear you will be willing to stand up and fight using your Non Violent Strategy proves all Tyrants and other regimes crumble!!
Anonymous is a zealous defender of freedom of information; the free exchange of information; the right to be irreverent; and the necessity of calling out gross abuses of power.
THE FOLK HERO
COMES TO THE RESCUE
Dear Citizens of the United States of America,
It has come to our attention that the brothers, David and Charles Koch -- the billionaire owners of Koch Industries--have long attempted to usurp American Democracy. Their actions to undermine the legitimate political process in Wisconsin are the final straw. Starting today we fight back.
In a world where corporate money has become the lifeblood of political influence, the labor unions are one of the few ways citizens have to fight against corporate greed.
Anonymous hears the voice of the downtrodden American people, whose rights and liberties are being systematically removed one by one, even when their own government refuses to listen or worse - is complicit in these attacks.
U.S. BOYCOTT KOCH PRODUCT LIST
Vanity Fair, Quilted Northern, Angel Soft,
Sparkle, Brawny, Mardi Gras Dixie
Download Encrypted VPN Virtual Private Network
BEWARE OF WIKILEAKS WEBSITE SECURITY AND YOUR OWN EXPOSURE ~ John Young of Cryptome
Sep 27, 2011 LulzSec Anonymous Arrested:
With multiple arrests worldwide this year of LulzSec and Anonymous members, the number of at-large hackers in both hackers groups is rapidlydwindling. LulzSec's non-fingerprinted membership, in fact, could be down to two. According to a recent tweet by LulzSec / Anonymous leader Sabu, only he and one other member of LulzSec have not been arrested. Last week, the FBI arrested alleged LulzSec member Cody Kretsinger and alleged People's Liberation Front members Christopher Doyon and Joshua Covelli. Both groups are associated with the hacking group Anonymous.
ANONYMOUS MEETS ON 4chan
Wikileaks The First Information War
Defended by Anonymous Seahawks around the worl'
where everybody sets sail on Channel four . . . <KE>
MasterCard, according to Anonymous, was processing payments to the Ku Klux Klan but not to WikiLeaks, which Anonymous considers not just a kindred spirit but a legitimate journalistic enterprise. In fact, Housh has said that Anonymous launches DDoS attacks in some cases with the sole aim of spurring the press to ask questions, thereby giving Anonymous a forum in which to discuss its agenda.
In 2003, a 15-year-old named Christopher Poole creates a chat forum called 4chan. There is one rule on the site: No child porn. Reports suggest that even that rule is lightly enforced. People used the site to recruit armies of tricksters for elaborate online pranks, and because the site offers them the option of posting anonymously, they begin to call themselves Anonymous. An internet war culture is born. (Scientology)
sea hawk was
Sir Francis Drake
Oppression breeds the very cure - someone who is oppressed will step up to overthrow the oppressors.
Anonymous we appoint you Knights of the Realm.
Rise Sir and My Lady Anonymous.
Accept the homage of your county folk, the gratitude of your country's people. A grave duty confronts us all. To prepare our nations for war that none of us wants. We have tried by all means in our power to overt this war. But when the ruthless ambition of a few men, and their families, threaten to engulf the world it becomes the solemn obligation of all free people to affirm that the earth belongs NOT to anyone one man, one family, the Church, the Bank, the Corporation, Stock Holders, or Government, BUT to all people and the that freedom is indeed entitled to the soil and sea to which it exists. Firm in this fate be ready to meet the government that will be sent against you.
Just like the Folk Hero Zorro -- We Have Anonymous and the sword of technology will leave it's mark.
Zero's and Ones their bytes are cut out for all see.
Republicans and Corporatists have always
They hated them in FDR's day, and they hate them today. They hate them because unions stand in the way of gross exploitation and obscene profit maximization. If there are no unions around and no government regulation, employers can treat their workers as shabbily as they want and pay them as poorly as they want, and we'd be back to the Grapes of Wrath.
Download Encrypted VPN Virtual Private Network
Prosecuting WikiLeaks founder Julian Assange
Legal experts and good-government advocates say taking a hard-line approach to leaks has a chilling
effect on whistle blowers, who fear harsh legal reprisals if they dare to speak up. It is not a crime to
shine a light on the inner workings of government especially when there are measures that could protect
the nation's interests without hauling journalists into court and government officials off to jail.
Government Accountability demands that Freedom of the Press deals with leaks that embarrass the
ie: U.S. intelligence.
Double Standard Power Trip
Top White House and administration officials give unauthorized information to Washington reporters almost daily, So why do these same authorities bully rank and file employees who get caught doing the same thing. Top officials frequently leak classified information and nothing happens to them.
Daniel Ellsberg, a true patriot handed the Pentagon's top-secret assessment of the Vietnam War to New York Times reporters 40 years ago, and supports Julian Assange as we all should.
No one investigated classified leaks to Washington Post reporter Bob Woodward for the books he has written on war policy under both recent White Houses. POLITICO reported last year that Woodward sometimes arrived for official interviews carrying classified maps. If you don't support Army Private Bradley Manning, National Security Agency official Thomas Drake, Central Intelligence Agency officer Jeffrey Sterling, and mainstream journalists like Times reporter James Risen, YOU MIGHT BE THE NEXT TARGET FOR PROSECUTION.
What is the power of hacktivism?
The decentralization of communication and media that's what!
Anonymous is in fact an "online living consciousness, comprised of different individuals with, at times, coinciding ideals and goals." ~ Coldblood
- "Join our party on IRC,” Topiary, an Anonymous “supporter” posted on Twitter.
- AnonNewsSite “At least we destroyed him in anonymous style,” wrote one commenter.
- Support AnonNews
Paypal email@example.com Reference: AnonNews Donation Press can contact anonnews.org or email firstname.lastname@example.org.
- AnonNews Radio!
- Twitter: @AnonymousIRC & @anonnews_org
Want to help AnonLeaks out?
Donate UKash or PaySafeCard @ email@example.com
Feds gtfo (of) Token :: NEXT TARGET: (todo; good arguments pl0x)
Warning : these chats are NOT mirrors.
They are on different IRC networks, with different people and different customs.
- #Wikileaks channel on EFnet (http://irc.lc/efnet/wikileaks)
- #Wikileaks channel on QuakeNet (http://irc.lc/quakenet/wikileaks)
- #Wikileaks channel on freenode (http://irc.lc/freenode/wikileaks)
you can make any irc.lc url with that syntax :
- IRC LC v2 Connect
The code was entirely revisited !
You can now use irc:// urls on your browser (firefox).
You can post reports, or supply a new network / webchat available.
You can view the list of IRC networks configured.
- Initial Rules of the Chans & How To Ask a Question in IRC
Ask a question
- Anonymous Chat
The real problem is that the Feds refuse to enforce the laws. Why do states enforce some Federal laws and not others?
HISTORY OF ANONYMOUS
The adoption of the V for Vendetta mask as a multipurpose icon by the emerging global protest movements and the rise of Anonymous.
Back at the crack of the 17th century, Rushton Triangular Lodge was a strange architectural folly constructed to represent the Holy Trinity by an increasingly eccentric Sir Thomas Tresham while he endured decades of house-arrest for his outspoken Catholicism.
It was also one of the two locations, both owned by Tresham and both in Northamptonshire, at which the Gunpowder Plot of 1605 was formulated by a group of dissident Catholics that included Tresham's son Francis. By the early sixteen-hundreds, the bonfires traditionally lit around the start of November had been co-opted as trappings for a sort of national anti-Catholic day at which effigies of the Pope would be incinerated. As mastermind behind the terrorist outrage du jour, however, the plot's nominal leader Guido Fawkes rapidly replaced the pontiff as hate-mascot of choice on these occasions.
When parents explained to their offspring about Guy Fawkes and his attempt to blow up Parliament, there always seemed to be an undertone of admiration in their voices, or at least there did in Northampton. While that era's children perhaps didn't see Fawkes as a hero, they certainly didn't see him as the villainous scapegoat he'd originally been intended as.
At the start of the 1980s when the ideas that would coalesce into V for Vendetta were springing up from a summer of anti-Thatcher riots across the UK coupled with a worrying surge from the far-right National Front, Guy Fawkes' status as a potential revolutionary hero seemed to be oddly confirmed by circumstances surrounding the comic strip's creation: it was the strip's artist, David Lloyd, who had initially suggested using the Guy Fawkes mask as an emblem for our one-man-against-a-fascist-state lead character.
When this notion was enthusiastically received, he decided to buy one of the commonplace cardboard Guy Fawkes masks that were always readily available from mid-autumn, just to use as convenient reference. To our great surprise, it turned out that this was the year (perhaps understandably after such an incendiary summer) when the Guy Fawkes mask was to be phased out in favour of green plastic Frankenstein monsters geared to the incoming celebration of an American Halloween. It was also the year in which the term "Guy Fawkes Night" seemingly disappeared from common usage, to be replaced by the less provocative 'bonfire night'.
Background on Assange's rage against the state & Cypherpunks
The world's best-known 'cypherpunk' (ethics) has long been on a mission to stop governments watching our every move. It is said to be the key to understanding WikiLeaks. The cypherpunks emerged from a meeting of minds in late 1992 in the Bay Area of San Francisco.
Its founders were Eric Hughes, a brilliant Berkeley mathematician; Timothy C. May, an already wealthy former chief scientist at Intel who had retired at the age of 34; and John Gilmore, another already retired and wealthy computer scientist - once number five at Sun Microsystems - who had co-founded an organization to advance the cause of cyberspace freedom, the Electronic Frontier Foundation.
They created a small group, which met monthly in Gilmore's office. At one of the early meetings of
the group, an editor at Mondo 2000, Jude Milhon, jokingly called them cypherpunks, a play on cyberpunk,
the "high-tech, low-life" science-fiction genre. The name stuck.
Many cypherpunks were optimistic that the individual would ultimately triumph. Their optimism was based on developments in intellectual history and computer software: the invention in the mid-1970s of public-key cryptography by Whitfield Diffie and Martin Hellman, and the creation by Phil Zimmerman in the early 1990s of a program known as PGP, "Pretty Good Privacy". PGP democratised their invention and provided individuals, free of cost, access to public-key cryptography - and thus the capacity to communicate with others in near-perfect privacy.
The most authoritative political voice among the majority libertarian cypherpunks was Tim May, who, in 1994, composed a vast, truly remarkable document, Cyphernomicon. May thought the state to be the source of evil in history. Assange joined the cypherpunks email list in late 1995. There were many reasons he was likely to be attracted to them. Even before his arrest (for alleged hacking) he had feared the intrusion into his life of the totalitarian surveillance state.
"The Internet views censorship as a network failure, and routes around
it." ~ John Gilmore
You have suffered flagrant violations of personal privacy and autonomy, the extinction of both your
to travel within the country and your right to leave it without official permission -- and you barely
noticed. Secret blacklists, unaccountable goons making up the rules and imposing them without
quisling judges who can't see anything totalitarian even when officially told they aren't
to know or reveal what the law says, technology that literally strips you naked, "border"
searches at any lonely spot in any road. Innocent people arrested without cause, or fired from their
jobs, because a bureaucrat put them on a secret list. Detailed dossiers kept of every person's
travel, friendships, finances, and communications. IMPERIAL PRESIDENTIAL POWER
RESTORED (Not to mention torture of the accused, thousands thrown in prison due to their
religion, "the president can imprison anybody he likes, forever, without charges". Two
presidents have now claimed that power. But that's off the topic of TSA and DHS -- and besides,
they'd never do that to YOU.) And you just don't care. You keep submitting to these airport
Gestapo, over and over! You never sue them over it, you never complain to your legislators to overturn
these totalitarian intrusions into your lives. You never change your travel plans to avoid the
intrusions. You never challenge them at the checkpoints. Your crazies never head over to the airport
shoot a dozen of the layabouts manning the checkpoints. If even 5% of you made a fuss at the front of
line, the whole stinking farce would break down, but you never do. If ten friends agreed to run right
through a checkpoint at the same time in ten different airports, idiotic TSA rules would shut down
in the whole country, but nobody ever does that. If a hundred people just got it into their heads to
through checkpoints, without coordinating at all with each other, the same thing would happen. Your
activists focus on attacking businesses or attacking homosexuals while everyone appluads the growth of
intrusive government and the patient strangling of personal freedom. The whole idea of refusing or
resisting or rebelling never even occurs to you. More than half of you think the whole
"security" regime is a good idea, even when the precondition for moving around in your own
country is that you have to choose whether they grope your crotch or snap and save naked photos of you!
get used to it. Your chickens are coming home to roost. You John
PS: The next intrusion your puppet masters dream up will be even more fun for you to ineffectively whine about.
2009 From John Gilmore firstname.lastname@example.org, email@example.com pgp
to Dave Farber
Congratulations, Dave! It's not too often that the CSNET piece of history gets publicly remembered. Indeed I learned more about it from your email than I knew at the time. Being a non-academic, it never really touched me; I went straight from mainframe APL time-sharing, to a Tourist account at MIT-AI (accessed via a secret hookup at BBN between Telenet and ARPAnet), to microcomputer BBS's, to workstation Ethernets at Sun with UUCP/Usenet wide area connectivity, to UUNET's uucp service and then to Alternet and building my own regional cooperative ISP. From that perspective, CSNET seemed like a niche, sort of like BITnet; one of those odd kinds of addresses you'd sometimes see in emails, but not something you'd ever want to (or be allowed to) join.
It's kind of a backhanded compliment to say that CSNET was influential because it convinced a government agency to fund NSFNET. Kinda puts it on par with those railroad moguls who spent $75,000 in the 1800's to convince Congress to give them millions in free rights-of-way. More to the point, the social and economic and technical process of making CSNET educated a lot of people in the traditional Computer Science community (1) what value peer to peer networks created, (2) why that value made it worth paying for it yourself, and (3) how to create such a network yourself. And THAT would have led to the Internet, whether or not NSF ever bought T1 lines to enable teenage hackers to explore.
Mainstream media doesn't do it's job so now Anonymous Will
- Fourth Amendment? What
offered at cost by a"Spaf Security Visionary ~ USA TODAY"
- ETHICS FREEDOM FIRST:
Unethical Companies and or Products that restrict freedom.
- Sites Like Twitter Absent From Free Speech Pact
- Human rights activists - How Usenet invented online activism
Folk Song Army by Tom Lehrer
We are the Folk Song Army.
Everyone of us cares.
We all hate poverty, war, and injustice,
Unlike the rest of you squares.
There are innocuous folk songs.
Yeah, but we regard 'em with scorn.
The folks who sing 'em have no social conscience.
Why they don't even care if Jimmy Crack Corn.
If you feel dissatisfaction,
Strum your frustrations away.
Some people may prefer action,
But give me a folk song any old day.
The tune don't have to be clever,
And it don't matter if you put a coupla extra syllables into a line.
It sounds more ethnic if it ain't good English,
And it don't even gotta rhyme--excuse me--rhyne.
Remember the war against Franco?
That's the kind where each of us belongs.
Though he may have won all the battles,
We had all the good songs.
So join in the Folk Song Army,
Guitars are the weapons we bring
To the fight against poverty, war, and injustice.
Ready! Aim! Sing!
Several thousand people moved several million dollars
to small banks and credit unions.
To the tune of “Take Me Out To The Ball Game”
~ Betsy Rose, 2011
Take me out of the big banks
Take me out of their game
The credit union will get my dough
I'll cut up my credit cards, pay as I go
And it's root, root, root for the small banks
Give them our business and thanks
And its 1,2,3 million more and we'll close big banks
Let's go occupy Wall Street
In every city and town
We'll occupy houses the banks foreclosed
Make sure that no one's left out in the cold
And it's root, root, root for the new world
We're building right here today
And its 1,2,3 billion more ! It's a new ball game.
A march headed from NYU to the Occupy demonstration site. The column could be heard for blocks since
marchers were playing drums. Clearly the charivari, the sound of mass disapproval, was the key sonic
Charvari Folk custome know in the U.S. as Shivaree
The main purposes of the charivari in Europe were to facilitate change in the current social structure and to act as a form of censorship within the community. The goal was to enforce social standards and rid the community of socially unacceptable relationships that threatened the stability of the whole. In contrast to punitive charivari in small villages in Europe, meant to ostracize and isolate the evildoers, North American charivaris were used as "unifying rituals" in which those in the wrong were brought back into the community after what might amount to a minor hazing. A depiction of a shivaree in the American South occurs in the episode "The Shivaree" of The Waltons (season 3, episode 69).
I was arrested for first degree inciting to riot in Columbus, Ohio on the oval-the
student green-protesting against the American War on Vietnam. I daily had a Gibson RB-175 Long neck Pete
Seeger style banjo, a Gibson J-45 12-string guitar and a Martin D-28 with me on the oval. We were gassed
and in direct physical
confrontation with the "D" riot squad daily. Of course it's hard to plan an event when at any moment you can be raided----that's the point---you can't plan a protest event---it's gorilla theatre===you just DO IT
And PA system---I didn't have any PA system----we stood on a wooden stage that was make-shift and we sang as loud as we could and the crowd sang along
so loud 1-2-3 What are fightin for""" Don't ask me we don't give a damn---next stop is Vietnam....."
We didn't plan events---we just took the friggin streets
We didn't no PA system---we sang our hearts out with conviction amidst the tear gas and beatings----
A little education in how my generation---our generation--- did things---our protests were not Sunday socials---they were not "planned" they just happened and we sang like Hell to make it happen PA or no PA.
We had gumption and conviction and a cause ~ david@FOLKSCHOOL.ORG David Brose
Miranda, Article 31 and Constitutional Advisements
The best time to advise a suspect of his constitutional rights. There are both legal and psychological considerations in answering this question. Legally, Miranda rights must be administered prior to questioning a suspect who is in custody. Therefore, the investigator must have probable cause to arrest a suspect, and actually place the suspect in custody before the Miranda rights are required. The legal concept of custody exists when a suspect perceives that he is not free to leave an immediate area. The legal test, however, is different in the U.S. Military and in Canada. In those jurisdictions, a focus of suspicion prompts the necessity of obtaining a waiver of article 31 rights (military) or Constitutional Advisement (Canada). A focus of suspicion is a much broader concept than custody. It exists when the investigator forms a reasonable expectation of a suspect's possible involvement in an offense.