Submitted by: James P. Harvey
By NWV News writer Jim Kouri
Posted 1:00 AM Eastern
February 10, 2010
An alleged intrusion into Google’s immense cyber system has provoked the Obama White House to accelerate in plans for government monitoring of the Internet, something that should be triggering alarms throughout the nation, according to security experts.
According to the Obama White House, Google will now work with the National Security Agency (NSA) to stem a “crisis.” However, more than a few Washington insiders are wary of such a partnership.
One political strategist points to a statement by President Barack Obama’s chief of staff Rahm Emanuel: “Never let a crisis go to waste.”
“Rahm Emanuel is a Chicago from-the-gut politician who is the last person you want having access to your personal information or monitoring your Internet activities,” said political strategist Mike Baker. “This is a crisis that will be used against Americans not the Chinese.” 
During a segment of Glenn Beck’s Fox News Channel show, the popular host declared that while the Chinese government and businesses pose a threat to U.S. economic stability, the Obama White House and government agencies are powerless to stop the enormous amount of espionage perpetrated by Chinese spies.  More

FBI is on Facebook, MySpace, Twitter, etc.

Leave a comment

Well, now that the mainstream media, in this case, Associated Press, has admitted it, it’s official: the FBI – and no doubt the NSA, CIA, DOD and other intelligence agencies – are using social networking sites such as Facebook, MySpace, Twitter and others to spy on citizens.

While the AP article in question attempts to make it sound legitimate by mentioning a specific case in which a felon on the lam from law enforcement in Mexico posted information about himself on Facebook and was subsequently arrested and is now awaiting extradition, the fact is that the intelligence services and law enforcement are spying on everyone indiscriminately.

This is the same situation we were complaining about in regard to China’s internet policy, just a few years ago when Google, Yahoo and Microsoft all joined together to help the government of China restrict internet access and spy on its citizens via the internet. It’s being done to us, also.

Anyone, especially, who is using Facebook, MySpace or Twitter as a portal for their own anti-NWO activities is surely being monitored.

Cryptome: Yahoo list for spying on YOU!

Leave a comment

SUPPORT WELCOMED By generous donation or $25 for two DVDs of the Cryptome 13-year collection of 43,000 files from June 1996 to June 2009 (~7 GB).

  • Click Paypal or mail check/MO made out to John Young, 251 West 89th Street, New York, NY 10024.
  • The collection includes all files of cryptome.org,
  • cryptome.info,
  • jya.com, cartome.org,
  • eyeball-series.org and
  • iraq-kill-maim.org, and
  • tsa-screening.zip     TSA Sensitive Screening Doc Redactions Lifted    December 8, 2009 (1.8MB)
    army-request.htm U.S. Army Requests Removal of Document December 7, 2009

in-dual-tech.pdf      India’s Quest for Dual-Use Technology            December 7, 2009
att-spy-doc-01.pdf    ATT Lawful Spying Document 1                     December 6, 2009 More

Yahoo Issues Takedown Notice for Spying Price List

Leave a comment

Sent by www.beatthechip.com:


Spying Price List


Yahoo isn’t happy that a detailed menu of the spying services it provides law enforcement agencies has leaked onto the web.

IN OTHER WIRED ACCOUNTS: YAHOO! , VERIZON: “Our spy capabiltes would “shock”, “confuse” customers

Shortly after Threat Level reported this week that Yahoo had blocked the FOIA release of its law enforcement and intelligence price list, someone provided a copy of the company’s spying guide to the whistleblower site Cryptome.

The 17-page guide describes Yahoo’s data retention policies and the surveillance capabilities it can provide law enforcement, with a pricing list for these services. Cryptome also published lawful data-interception guides for Cox Communications, SBC, Cingular, Nextel, GTE and other telecoms and service providers.

But of all those companies, it appears to be Yahoo’s lawyers alone who have issued a DMCA takedown notice to Cryptome demanding the document be removed. Yahoo claims that publication of the document is a copyright violation, and gave Cryptome owner John Young a Thursday deadline for removing the document. So far, Young has refused. More

A Partial Defense Against the NWO’s Hardware Keylogger in Your New Laptop


Several days ago, an article appeared in PPJG about the government’s collusion with computer manufacturers to install a hardware keystroke logger in all new laptop computers.

For the technically-inclined, defense against this device (which is the KeyGhost Keylogger) is fairly simple: you just open up the case and remove it.

For those who are not as technically inclined and who don’t want to pay someone else to remove the device, there is at least a partial solution readily available for free, and that is the virtual or on-screen keyboard, a software emulation of your hardware keyboard.

While an on-screen keyboard is too slow and clumsy for use in typing messages and other documents (you click its keys with your mouse, one at a time), it can at least be useful in entering passwords and other sensitive login data without the need to touch your hardware keyboard. This way, at least you keep the Department of Homeland Security away from your login data.

There are several on-screen keyboard applications available for free download on the internet and there is at least one for all Windows, Mac and Linux users.

For Windows:

Windows XP Onscreen Keyboard


On-Screen Keyboard

For Mac:

Switch XS

For Linux:

Gnome On-Screen Keyboard

In addition to manual removal of the hardware keylogger and the virtual keyboard software route, there is yet another solution, if you’re using Firefox as your web browser. It’s a Firefox add-on called KeyScrambler, which can be used to encrypt your keystrokes so that they can’t be read. The only drawback is that KeyScrambler works on software keyloggers but may not be able to defeat a hardware keylogger like KeyGhost.

%d bloggers like this: