Tuesday, August 14, 2012

ANONYMOUS COMPUTER USAGE IN THE AGE OF TOTAL INFORMATION AWARENESS


ANONYMOUS COMPUTER USAGE IN THE AGE OF TOTAL INFORMATION AWARENESS


J. Croft

Privacy in the Information Age has all but been eradicated. 

Your controlling numbers-your driver’s license and social security numbers-are used by every government and private organization in an integrated grid to monitor everything you do, every purchase you make, every interaction consensual or otherwise.  And that was decades before 9/11 was exploited by the enemy to enact ready-made thousand plus page bills such as the Patriot Acts, the Victory Act, to further integrate and strengthen their control grid, to further clamp down on the American People.  Of course, the power hungry never, ever rest; read the latest revelation about Trapwire, a company engaged in the globalized surveillance state.  I’ll make appropriate comments to help with the legalese.

SAFE HARBOR PRIVACY POLICY
Scope
This Policy outlines our general policy and practices regarding personal information entered into our United States based systems by European Economic Area (“EEA”) subscribing customers, and personal information entered into our EEA based systems which may be accessed from the United States.  Sure there’s a duplicate system doing likewise to ‘murkans.

Definitions
For purposes of this Policy, the following definitions apply:

“TrapWire” means TrapWire Inc., a Reston, VA based company in the United States.

“Personal Information” means any information or set of information (such as name, address, date of birth, social security number, etc.) that may be used to identify an individual. Personal information does not include information that is encoded or anonymized, or publically available information that has not been combined with non-public information.

“Sensitive Personal Information” means personal information that confirms race, ethnic origin, political opinions, religious or philosophical beliefs, or trade union memberships, or that concerns health or sex life.  In other words everything you carelessly spew out.

TrapWire complies with the U.S.-EU Safe Harbor Framework as set forth by the U.S. Department of Commerce regarding the collection, use, and retention of personal information from European Union member countries.   Oh, wait you’ll love the clauses…

TrapWire has certified that it adheres to the Safe Harbor Privacy Principles of notice, choice, onward transfer, security, data integrity, access, and enforcement. To learn more about the Safe Harbor program, and to view TrapWire’s certification, please visit http://www.export.gov/safeharbor/ .

Here we go…
Notice

TrapWire is a risk mitigation technology and services company that designs, builds and markets software products intended to prevent terrorist and other criminal attacks directed against critical infrastructure, key assets and personnel. Our flagship product, the TrapWire software system, has been designed to provide a simple yet powerful means of collecting and recording suspicious activity reports. They collect EVERYTHING, from everywhere.  They’re also pretty flexible about calling people ‘terrorist’ and ‘criminal’.

Once a suspicious activity in entered into the system it is analyzed and compared with data entered from other areas within a network for the purpose of identifying patterns of behavior that are indicative of pre-attack planning. Generally, no Personal Information or Sensitive Personal Information is recorded by the TrapWire system, and no such information is used by the system to perform its various functions. In the event a system user were to enter either Personal Information or Sensitive Personal Information in a comments field, TrapWire will not share or expose that information to any other subscriber on the system, unless required by law, (bold and underline mine: there’s the legal out-unless required by the Patriot Acts, the Victory Act, God knows what executive orders, regulations, procedures, court orders…) and, in any case, will otherwise adhere to Safe Harbor Privacy Principles with respect to that information.

Choice

Since TrapWire systems, in general, do not capture or store Personal or Sensitive Personal Information, there will be very few (if any) opportunities to offer opt-in or opt-out choices to individuals. “In general” doesn’t mean they don’t period.  Words mean things in legalese… and you can’t have an unavoidable information gathering tool if people can opt out.  On the rare (HA HA!)occasion where such information is entered into the system, it is likely to be recorded as law enforcement sensitive and will not be shared outside the law enforcement community. To the extent Personal or Sensitive Personal Information is entered into the TrapWire system, and is not designated as law enforcement sensitive, TrapWire will not share that information with any third party.  Just how extensive is the law enforcement community?  Just how much would be considered ‘sensitive’ and therefore recorded? 

Transfer To Third Parties

The TrapWire system is designed to share only suspicious activity data which does not include any Personal or Sensitive Personal Information. In the event Personal or Sensitive Personal Information is recorded by a system user, that information will not be shared or transferred to other than law enforcement or other authorized agencies as required by law.  So, who gets to be authorized?

Security

The data center housing the TrapWire infrastructure was constructed to the highest level of physical security standards. Access to the facility is controlled and logged through a system of biometric hand geometry readers, and the facility is carefully monitored by security officials on guard 24 hours per day, 7 days per week, 365 a year.
System Security is also of critical importance and is designed into all levels of the TrapWire application and infrastructure. All connections to the TrapWire application are made through a 256-bit encrypted SSL connection which terminates in a network DMZ. User authentication is performed from the DMZ and must be successful before a connection to TrapWire is permitted. Implemented security processes are intended to protect any information in the TrapWire system from loss, misuse, unauthorized access, disclosure, alteration or destruction.   This is just to make you feel secure that you’re personal information is ‘secure’… secure in their hands.  Think of TrapWire as a sock puppet with the government’s hand in it.




Data Integrity

TrapWire, by design and intent, attempts to avoid the collection of Personal or Sensitive Personal Information by the products it produces. However, when such information is entered into a TrapWire system, reasonable steps are taken to assure that information is relevant for the purposes for which it is to be used. We do, however, depend on our users to update and correct any information they enter. They “attempt” to avoid collecting your info-unless your public servants have an interest in it.  “Reasonable” is the most treacherous word in legalese.  If someone makes a “mistake” about your info, you’re boned.

Enforcement

TrapWire has established procedures for periodically verifying the implementation of and compliance with the Safe Harbor principles. We conduct an annual self-assessment of our practices with respect to Personal and Sensitive Personal Information to verify that representations we make about our privacy practices are true and that related privacy policies have been implemented as represented.

Individuals may file a complaint with our Privacy Office at the address below. TrapWire will investigate and attempt to resolve complaints and disputes in accordance with the principles contained in this Policy. If a dispute cannot be resolved by this process we will participate in the dispute resolution procedures of the panel established by the European Data Protection Authorities.  Yeah, the very government spying on you is going to come to your aid-ha ha!

Limitations

Adherence by TrapWire to these Safe Harbor Principles may be limited (a) to the extent required to respond to a legal or ethical obligation; and (b) to the extent expressly permitted by an applicable law, rule or regulation.   So basically, they don’t have to so long as they have some legal excuse not to.

Contact Information

Please direct any questions or comments regarding this Policy to our corporate office:
TrapWire Inc.
1875 Campus Commons Drive – Suite 301
Reston, VA 20191
Attn: Legal Department/Safe Harbor
Say, isn’t that near CIA headquarters in Langely, Virginia?  And the rest of the spooks?


Get the point?

It’s about control.

Control is power.

The enemy likes things nice and legal as a control mechanism via contract.  When you contract you give consent, to be monitored, exploited, extorted or otherwise stolen from.  Just rolling the tanks into the streets isn’t their style in America, they have to have an hermetically seal of laws, rules, regulations so that when you’re forced onto their legal hamster wheel and made to run until you’ve been utterly robbed, everyone else will be cowed by the example they make of you and just go along to get along.  Until they’re next.

But yeah, how to reclaim your privacy in this age of Total Information Awareness by the enemy, with a national network of cameras that can scan your face and license plate and read your very intent biometrically?  Tough.

Not impossible.

RECLAIM YOUR ANONYMITY

This is the single most expensive part of reclaiming your privacy but you will have to move out, and move to a place where your name is NOT on any bills or agreement.  If you have enough money to buy a place you will NOT do it under your name, you will form a Wyoming corporation, buy stock in it anonymously-because you’ll issue it to yourself-get a signature from someone you’ll pay a few bucks for being the CEO or whatever.  The stock sold in that corporation will buy property.

I would prefer to simply rent as you’re paying property tax on the land anyway, unless you’re in Texas and somehow get the Land Patent.  You’re renting to someone might as well save the expense and money-besides you’re probably too poor to go that route anyway.

You can always squat… have to deal with the cops-unless you’re in Gary Indiana, Flint or Detroit Michigan and then you have to deal with what feral humans remain that’ll come along and take your stuff so you have to guard your property 24/7.

But yeah, rent; find a place that will simply take your money and whatever name you want to call yourself.  Find a place with a flat rate plus sharing the utilities… but not with your name on the bill or lease.  Be the best renter you can and don’t attract the cops or otherwise annoy them with parties, loud music, turfing their lawn when you drunkenly come home at 3AM, somehow missing all the cops hunting you, or put a bullet through their walls.  Don’t do damage to their property, leave trash or used rubbers to stink up the joint, etc.  Be sociable and talk to your landlord-leave stuff you’d talk about from reading Freedom Guide for someone who can’t evict you for being a Tin Foil Hat Idiot.

OR you could do a house swap with someone with absolutely no connection to you whatsoever.  You don’t call, text, e-mail on anything that has your or their name on it.  Finding someone like that…

DON’T UPDATE YOUR PERSONAL INFO

What you’re going to do before you move is to get all your correspondence routed through a Post Office Box using your old address.  You come by, pick up your mail and smirk at all the bills addressed to you, all the threatening letters from your public servants, etc.

“Wait, what about work?  They have records on tax files so they know where you work.”  Which is why when you move you will work HARD towards a cash economy lifestyle.  Find a trade or product to sell that is basic and involves being paid in cash.  Adam Cash has a couple books on how to do just that.

COMPARTMENTALIZE YOUR LIFE

There’s no reason to mix varying aspects of your new life.  None. 

You will maintain your old government registered identity, connected now to a P.O. Box you can choose to simply let go of.  Your current computer is perfectly fine for this.  (Hey you’re not reading THIS on your current computer are you?  Don’t worry, the new protocols you’re going to enact involving your computer usage will take care of that.)  You’ll still use it if you decide to maintain a vehicle under your name instead of putting in ownership by a corporation outlined previously.  This you can call your LEGACY ID.

You will have an “identity” for your new place, so long as you’re name and ID are not on any bills.  Nothing with a SSN or DL#.  This is your LIVING ARRANGEMENT.

Now, since you’re reading Freedom Guide in general and this article in particular, you’re not at all with how this country’s run, so you are going to want to do some activism.  You need to.  So never, ever, intermix your activism with your actual living arrangement or your legacy ID.  Basically you’re a nonviolent Batman of three (or more) identities.  You will want an identity, a life partition for your activism, a partition for your legacy, a partition for your living arrangement because you will want something of a normal life in your living arrangement ID.

Don’t tell people you associate with in each of your identities about people in other partitions in your life, that’s what is known as a security breach.  Of greatest importance is keeping your legacy ID partitioned from your new lif(v)e(s). 

Vehicles unless you put under a corporation and trust, are a rolling security breach, you may want to invest in a new car or move to a place where you don’t need a car.

NOW WE CAN TALK ABOUT ANONYMOUS COMPUTER USAGE

Get a new computer.  You probably need to upgrade, but this upgrade isn’t for the latest one on the shelf loaded with spyware.  You’re going to go shopping for a decently recent computer that you can throw Windows XP or Linux on-and you will never, ever use it on any network.  This is your workstation, your central node in your disconnected network.

What would be better is to buy a computer for your own personal affairs, one for each of your identities.  Computers and programs put their IDs into every video, every document, every program and these registries can be tracked-unless you buy all your computers from private parties that interact solely in cash and don’t ask for ID.  And are honest. 

Your working computers will never, ever, interact with the internet nor be permitted to be accessed, nor interact with each other.  You will use external thumb drives for data transfer-it would be a great ideal to have some portable apps like Youtube Downloader, a video editing program, a website ripping program, some encryption program you feel safe with…. Though these devices might have their own unique identifiers and even if they don’t the apps you use on them might be a signature so have separate thumb drives for each computer/life partition-identity and use them to shuttle files and information.  Use these to shuttle from your netbook computers to your working computers.  You can also use your older thumb drives as dead drops, which I encourage for really covert transfer of information and files between security aware people.  More on that in a bit….

You will NOT use your personal computer for anything that you have to put your real name on, ever.  I will reiterate that save for the computer you already have for your legacy ID.

Okay, now to maintain anonymity on the web you have a couple choices; public access computers or computers expressely used for communication.  Public access computers, such as libraries or internet cafés are okay so long as they don’t require an ID, or just issue a guest pass.  Those you will have to scout out on your own.  A better bet would be to have a portable netbook computer for each of your identities.

Going out for wi-fi, don’t use the wi-fi at home or near your home for anything other than your living arrangement identity.  Use one set of wi-fi hotspots for one computer, another set of hotspots for another etc.  You can get away with intermixing some vanilla websites but you don’t want to be downloading bombmaking information onto a computer you use for your living identity or your legacy ID.  Keep your net surfing profiles strictly segregated.

A word on the I-phones and the like… they’re riddled with spyware, don’t use them if you can avoid it.  Yes they take great photos, you can surf the net, they have thousands of apps but you have to register to use them and the NSA can hack into and access ANY phone.  It becomes a portable bug keeping tabs on you and recording all your information.  Pass on those otherwise wonderful toys.

Use external drives to store archives, don’t rely on cloud computing you’re just putting your files at the mercy of the bad guys.

If you’re looking to buy online, you get one of those prepaid debit cards, register that with e-bay and go through paypal.  Find someone to use for a mail drop or if you’re dropping out entirely use your legacy ID P.O. Box… if you’re house swapping, don’t.  It’s not cool to get someone else in trouble like that.

Boston T. Party mentioned in Bulletproof Privacy a couple tricks.  Stick a mailbox out on some rural road with a number that makes sense.  You could also have mail delivered to a unused address, like a foreclosed home or vacant house-take your chances there though.

Okay, covert communication using a USB dead drop; I can’t go in too deeply on how you establish people worthy of being in your network of allies or I’d be typing a long time and this article’s already approaching my typically epic length, but when you do you establish a series of dead drops where people in your network continually monitor for notes.  They could be paper notes, they could be packages, or they could be files on a spare USB drive.  Use your activist identity netbook to retrieve the data and deposit.  Work out a series of codes with your group such as notes, packages, USB deposits, distress, and so forth.  Get creative as to where you put your dead drops. 

This provides a communications network that is impossible to decrypt or intercept save for the enemy getting a snitch or agent into your network. 

It may be a good idea to have a communications system devoted specifically for emergency traffic…

So that’s your choice; the path of Freedom or the path of convenience.  The path of convenience is wide and well packaged, and easy to traverse, but the terms are that you become a slave to people who use companies like TrackScan to steal your information.  The path of Freedom requires sacrifice and diligence, it is rather narrow and often treacherous and full of risk but you need to take them if you want to be Free.  Certainly need to take those risks if you want to stick it to the cocksuckers who’ve turned America into Orwell’s wet dream.

No comments:

Post a Comment