Thursday, August 16, 2012

US GOVT. NOW CLASSIFYING AMMUNITION PURCHASES


What, you don't think they're NOT going to come after us once this Potemkin Village known as modern day America can't be sustained any longer? It's either fight them or accept a more straightforward form of slavery than the one we have now-y'know with the taxation of us at every turn, millions of pages of laws and regulations and millions of armed government officials to enforce every edict.

They are SWAT teaming on people selling organic food.

The southern border's wide open for narcoterrorists but the government goes off on Patriotic Americans. Guess who is the enemy...

Arm up. Read and study "Second American Revolution Victory Guide" and "How To Start A Militia-And Get Away With It".

LEMONADE AND RAW MILK FREEDOM DAY THIS WEEKEND

August 17th & 18th
Washington, DC

http://lemonadefreedom.com
http://rawmilkfreedomriders.com

Friday, August 17th: Know Your Rights Workshop & Dinner Registration: http://farmfoodfreedom.wufoo.com/forms/20120817-rights-workshop-dinner-regist...

Saturday, August 18th: Lemonade Freedom Day 2012 - Washington, DC Facebook Event: https://www.facebook.com/events/337640829653020/347109408706162/?notif_t=plan...

Timeline of FDA raids on raw milk by Mike Adams http://www.naturalnews.com/033280_FDA_raids_timeline.html

For more, check out Lemonade & Raw Milk Freedom Day posted to CopBlock.org on August, 3rd, 2012 http://www.copblock.org/lemonade-freedom-day/


AWRM CHARLES DYER UPDATE

From EDOGZ818
:Charles Dyer
1200 South main St
Fredrick, Oklahoma, 73542

Please write Charles Dyer / July 4 Patriot for his B Day.

Charles Dyer needs help researching his appeals.
Two main issues that he needs us to research are:

Can he be convicted for a string of sexual assaults, as opposed to a specific incident.

IE: Raped so & so over the course of 1 yr, as opposed to raping so & so on a specific date.
IE: He wasn't convicted for a specific incident, because the government didn't have enough evidence to substantiate a specific charge, so they generalized it.

Also:
What is the standard of proof required for a sexual assault on a child?
Is it only a statement, supported by a missing vaginal flap, or does an examination have to be preformed by a physician who was specifically trained to conduct an examination to determine sexual assault.

In a nutshell, there was no physical examination by a qualified physician, and no specific dates of the incident(s).

He was railroaded and now, has virtually no access to the law library to prepare for his appeals.

Please find the related info, download it, print it and mail it to him, or post a link here,PM, or email it me & I will download it, print it out & send it to him, with your information if you don't mind, to let him know who helped him.

Thank you, in advance, for your time and attention to this life saving activity.

Please send him money orders for personal supplies and make sure you sign them where the signature line indicates that the "PURCHASER" should sign.

https://www.facebook.com/photo.php?fbid=418584888178610&set=a.243292662374501.52499.217156764988091&type=1&comment_id=946123&ref=notif&notif_t=like&th eater




ART OF THE RIFLE: RANGING PART 1

Ironically the distance at which the eyeball is most effective coincides with the distance that a rifle can be fired point blank at most targets, given the proper zero.  If you have a target at a distance inside 200-300 yards, the eye may be used to estimate range and make corrections accordingly to good effect.  The rifle’s trajectory at these distances undergoes radically less change inside these distances than it does farther out, where your eye won’t work quite as accurately.
Things that affect the apparent range to target are terrain and environmental factors.  According to the reference materials I have on hand, targets uphill will tend to appear farther away than they actually are, and targets downhill will tend to appear closer.   A valley between you and your target will make it appear closer.  Looking around at stuff would suggest that a target in a narrow clearing with obstructions to either side of your field of view would create a tunnel effect that makes the target appear to be farther.  A straight visual line, such as a path or road, leading to the target is supposed to make it look closer.  I would have checked all these out as part of my research for this article, but I don’t have a rangefinder to verify my estimations.
 

Wednesday, August 15, 2012

IT'S WEDNESDAY... MORE GREAT NEWS!

Police can now legally track your cell phone without a warrant-don't have your cell on you, you can always call back: http://www.presstv.ir/usdetail/256292.html


U.S. downgrades crop outlook: http://www.wsws.org/articles/2012/aug2012/crop-a15.shtml

How Obama is robbing the suburbs to pay for the cities-cities are the enemy's strongholds, the country will be raided more and more.  http://www.forbes.com/sites/realspin/2012/08/13/how-obama-is-robbing-the-suburbs-to-pay-for-the-cities/

You will not believe what Americans are doing for a paycheck these days: http://theeconomiccollapseblog.com/archives/you-will-not-believe-what-some-people-are-willing-to-do-for-a-paycheck-these-days

Investors prepare for Euro collapse http://www.spiegel.de/international/business/investors-preparing-for-collapse-of-the-euro-a-849747.html

China is running out of money http://www.forbes.com/sites/gordonchang/2012/08/12/china-is-running-out-of-money/

Social Security Administration needs ammo too... http://thedorkfishexpress.blogspot.com/2012/08/ssa-ammo-bandwagon.html

...And so does the National Weather Service http://www.infowars.com/national-weather-service-follows-dhs-in-huge-ammo-purchase/

Ann Barnhardt goes over the destruction of protections for Americans financial accounts


http://dl.dropbox.com/u/32961642/SentinelRuling.pdf  
That's the ruling...



Wired discovered that the online encrypted e-mail company Hushmail had created a way for governments that had a Mutual Assistance Legal Agreement with Canada to subpoena Hushmail users’ accounts. Hushmail even created rogue downloadable software to help bust open encrypted accounts for the government, though it’s not clear the company was under any legal obligation to do so….
http://www.wired.com/threatlevel/2012/08/wired_opinion_patrick_ball/all/



Tuesday, August 14, 2012

HOW TO SPOT-AND DEFEAT-DISRUPTION ON THE INTERNET

How to Spot – and Defeat – Disruption on the Internet

George Washington's picture




David Martin’s Thirteen Rules for Truth Suppression,  H. Michael Sweeney’s 25 Rules of Disinformation (and now Brandon Smith’s Disinformation: How It Works) are classic lessons on how to spot disruption and disinformation tactics.
We’ve seen a number of tactics come and go over the years.  Here are the ones we see a lot of currently.
1.  Start a partisan divide-and-conquer fight or otherwise push emotional buttons to sew discord and ensure that cooperation is thwarted.   Get people fighting against each other instead of the corrupt powers-that-be.  Use baseless caricatures to rile everyone up.  For example,  start a religious war whenever possible using stereotypes like “all Jews are selfish”, “all Christians are crazy” or “all Muslims are terrorists”.  Accuse the author of being a gay, pro-abortion limp-wristed wimp  or being a fundamentalist pro-war hick when the discussion has nothing to do with abortion, sexuality, religion, war or region.  Appeal to people’s basest prejudices and biases. And – as Sweeney explains – push the author into a defensive posture:
Sidetrack opponents with name calling and ridicule … Associate opponents with unpopular titles such as “kooks”, “right-wing”, “liberal”, “left-wing”, “terrorists”, “conspiracy buffs”, “radicals”, “militia”, “racists”, “religious fanatics”, “sexual deviates”, and so forth. This makes others shrink from support out of fear of gaining the same label, and you avoid dealing with issues.
2.  Pretend it’s hopeless because we’ll be squashed if we try.  For example, every time a whistleblower leaks information, say “he’s going to be bumped off”.   If people talk about protesting, organizing, boycotting, shareholder activism, spreading the real facts, moving our money or taking other constructive action, write things to scare and discourage people, say something like  “we don’t have any chance because they have drones and they’ll just kill us if we try”,  or “Americans are too stupid, lazy and greedy, so they’ll never help out.”  Encourage people to be apathetic instead of trying to change things.
3.  Demand complete, fool-proof and guaranteed solutions to the problems being discussed.   For example, if a reporter breaks the story that the big banks conspired to rig a market, ask “given that people are selfish and that no regulation can close all possible loopholes … how are you going to change human nature?”, and pretend that it’s not worth talking about the details of the market manipulation.  This discourages people from reporting on and publicizing the corruption, fraud and other real problems.  And it ensures that not enough people will spread the facts so that the majority know what’s really going on.
4. Suggest extreme, over-the-top, counter-productive solutions which will hurt more than help, or which are wholly disproportionate to what is being discussed.   For example, if the discussion is whether or not to break up the big banks or to go back on the gold standard, say that everyone over 30  should be killed because they are sell-outs and irredeemable, or that all of the banks should be bombed. This discredits the attempt to spread the facts and to organize, and is simply the web method of the provocateur.
5.  Pretend that alternative media – such as blogs written by the top experts in their fields, without any middleman – are untrustworthy or are motivated solely by money (for example, use the derogatory term “blogspam” for any blog posting, pretending that there is no original or insightful reporting, but that the person is simply doing it for ad revenue).
6.  Coordinate with a couple of others to “shout down” reasonable comments.  This is especially effective when the posters launch an avalanche of comments in quick succession … the original, reasonable comment gets lost or attacked so much that it is largely lost.
7.  Use an army of sock puppets.  You can either hire low-wage workers in India or other developing countries to “astroturf” or – if you work for the government – you can use hire military personnel and subcontractors to monitor social media and “correct” information which you don’t like (and see this), or use software which allows you to quickly create and alternate between numerous false identities, each with their own internet address.
8. Censor social media, so that the hardest-hitting information is buried. If you can’t censor it, set up “free speech zones” to push dissent into dank, dark corners where no one will see it.
9.  When the powers-that-be cut corners and take criminally reckless gambles with our lives and our livelihoods, protect them by pretending that the inevitable result - nuclear accidents, financial crisesterrorist attacks or other disasters – were “unforeseeable” and that “no could have known”.
10.  Protect the rich and powerful by labeling any allegations of criminal activity as being a “conspiracy theory”.  For example, when Goldman gets caught rigging markets, label the accusations as mere conspiracies.
The following 4 tactics from Sweeney are also still commonly used …
11. Become incredulous and indignant. Avoid discussing key issues and instead focus on side issues which can be used show the topic as being critical of some otherwise sacrosanct group or theme. This is also known as the “How dare you!” gambit.
12. Use a straw man. Find or create a seeming element of your opponent’s argument which you can easily knock down to make yourself look good and the opponent to look bad. Either make up an issue you may safely imply exists based on your interpretation of the opponent/opponent arguments/situation, or select the weakest aspect of the weakest charges. Amplify their significance and destroy them in a way which appears to debunk all the charges, real and fabricated alike, while actually avoiding discussion of the real issues.
13. Hit and Run. In any public forum, make a brief attack of your opponent or the opponent position and then scamper off before an answer can be fielded, or simply ignore any answer. This works extremely well in Internet and letters-to-the-editor environments where a steady stream of new identities can be called upon without having to explain criticism reasoning — simply make an accusation or other attack, never discussing issues, and never answering any subsequent response, for that would dignify the opponent’s viewpoint.
14. Question motives. Twist or amplify any fact which could so taken to imply that the opponent operates out of a hidden personal agenda or other bias. This avoids discussing issues and forces the accuser on the defensive.
15. Associate opponent charges with old news. A derivative of the straw man usually, in any large-scale matter of high visibility, someone will make charges early on which can be or were already easily dealt with. Where it can be foreseen, have your own side raise a straw man issue and have it dealt with early on as part of the initial contingency plans. Subsequent charges, regardless of validity or new ground uncovered, can usually them be associated with the original charge and dismissed as simply being a rehash without need to address current issues — so much the better where the opponent is or was involved with the original source.
Postscript:  Over a number of years, we’ve found that the most effective way to fight disruption and disinformation is to link to a post such as this one which rounds up disruption techniques, and then to cite the disinfo technique you think is being used.
Specifically, we’ve found the following format to be highly effective in educating people in a non-confrontational manner about what the disrupting person is doing:
Good Number 1!
Or:
Thanks for that textbook example of Number 7!
(Include the link, so people can see what you're referring to.)
The reason this is effective is that other readers will learn about the specific disruption tactic being used … in context, like seeing wildlife while holding a wildlife guide, so that one learns what it looks like “in the field”.   At the same time, you come across as humorous and light-hearted instead of heavy-handed or overly-intense.
Try it … It works.

 http://www.zerohedge.com/contributed/2012-08-13/15-rules-web-disruption

FLORIDA TAX ASSESSOR: THIS IS A DICTATORSHIP

ONE MILIITA'S MINIMUM EQUIPMENT CHECKLIST

I WAS AMBUSHED FOR TRYING TO JOIN A MILITIA

ANONYMOUS COMPUTER USAGE IN THE AGE OF TOTAL INFORMATION AWARENESS


ANONYMOUS COMPUTER USAGE IN THE AGE OF TOTAL INFORMATION AWARENESS


J. Croft

Privacy in the Information Age has all but been eradicated. 

Your controlling numbers-your driver’s license and social security numbers-are used by every government and private organization in an integrated grid to monitor everything you do, every purchase you make, every interaction consensual or otherwise.  And that was decades before 9/11 was exploited by the enemy to enact ready-made thousand plus page bills such as the Patriot Acts, the Victory Act, to further integrate and strengthen their control grid, to further clamp down on the American People.  Of course, the power hungry never, ever rest; read the latest revelation about Trapwire, a company engaged in the globalized surveillance state.  I’ll make appropriate comments to help with the legalese.

SAFE HARBOR PRIVACY POLICY
Scope
This Policy outlines our general policy and practices regarding personal information entered into our United States based systems by European Economic Area (“EEA”) subscribing customers, and personal information entered into our EEA based systems which may be accessed from the United States.  Sure there’s a duplicate system doing likewise to ‘murkans.

Definitions
For purposes of this Policy, the following definitions apply:

“TrapWire” means TrapWire Inc., a Reston, VA based company in the United States.

“Personal Information” means any information or set of information (such as name, address, date of birth, social security number, etc.) that may be used to identify an individual. Personal information does not include information that is encoded or anonymized, or publically available information that has not been combined with non-public information.

“Sensitive Personal Information” means personal information that confirms race, ethnic origin, political opinions, religious or philosophical beliefs, or trade union memberships, or that concerns health or sex life.  In other words everything you carelessly spew out.

TrapWire complies with the U.S.-EU Safe Harbor Framework as set forth by the U.S. Department of Commerce regarding the collection, use, and retention of personal information from European Union member countries.   Oh, wait you’ll love the clauses…

TrapWire has certified that it adheres to the Safe Harbor Privacy Principles of notice, choice, onward transfer, security, data integrity, access, and enforcement. To learn more about the Safe Harbor program, and to view TrapWire’s certification, please visit http://www.export.gov/safeharbor/ .

Here we go…
Notice

TrapWire is a risk mitigation technology and services company that designs, builds and markets software products intended to prevent terrorist and other criminal attacks directed against critical infrastructure, key assets and personnel. Our flagship product, the TrapWire software system, has been designed to provide a simple yet powerful means of collecting and recording suspicious activity reports. They collect EVERYTHING, from everywhere.  They’re also pretty flexible about calling people ‘terrorist’ and ‘criminal’.

Once a suspicious activity in entered into the system it is analyzed and compared with data entered from other areas within a network for the purpose of identifying patterns of behavior that are indicative of pre-attack planning. Generally, no Personal Information or Sensitive Personal Information is recorded by the TrapWire system, and no such information is used by the system to perform its various functions. In the event a system user were to enter either Personal Information or Sensitive Personal Information in a comments field, TrapWire will not share or expose that information to any other subscriber on the system, unless required by law, (bold and underline mine: there’s the legal out-unless required by the Patriot Acts, the Victory Act, God knows what executive orders, regulations, procedures, court orders…) and, in any case, will otherwise adhere to Safe Harbor Privacy Principles with respect to that information.

Choice

Since TrapWire systems, in general, do not capture or store Personal or Sensitive Personal Information, there will be very few (if any) opportunities to offer opt-in or opt-out choices to individuals. “In general” doesn’t mean they don’t period.  Words mean things in legalese… and you can’t have an unavoidable information gathering tool if people can opt out.  On the rare (HA HA!)occasion where such information is entered into the system, it is likely to be recorded as law enforcement sensitive and will not be shared outside the law enforcement community. To the extent Personal or Sensitive Personal Information is entered into the TrapWire system, and is not designated as law enforcement sensitive, TrapWire will not share that information with any third party.  Just how extensive is the law enforcement community?  Just how much would be considered ‘sensitive’ and therefore recorded? 

Transfer To Third Parties

The TrapWire system is designed to share only suspicious activity data which does not include any Personal or Sensitive Personal Information. In the event Personal or Sensitive Personal Information is recorded by a system user, that information will not be shared or transferred to other than law enforcement or other authorized agencies as required by law.  So, who gets to be authorized?

Security

The data center housing the TrapWire infrastructure was constructed to the highest level of physical security standards. Access to the facility is controlled and logged through a system of biometric hand geometry readers, and the facility is carefully monitored by security officials on guard 24 hours per day, 7 days per week, 365 a year.
System Security is also of critical importance and is designed into all levels of the TrapWire application and infrastructure. All connections to the TrapWire application are made through a 256-bit encrypted SSL connection which terminates in a network DMZ. User authentication is performed from the DMZ and must be successful before a connection to TrapWire is permitted. Implemented security processes are intended to protect any information in the TrapWire system from loss, misuse, unauthorized access, disclosure, alteration or destruction.   This is just to make you feel secure that you’re personal information is ‘secure’… secure in their hands.  Think of TrapWire as a sock puppet with the government’s hand in it.




Data Integrity

TrapWire, by design and intent, attempts to avoid the collection of Personal or Sensitive Personal Information by the products it produces. However, when such information is entered into a TrapWire system, reasonable steps are taken to assure that information is relevant for the purposes for which it is to be used. We do, however, depend on our users to update and correct any information they enter. They “attempt” to avoid collecting your info-unless your public servants have an interest in it.  “Reasonable” is the most treacherous word in legalese.  If someone makes a “mistake” about your info, you’re boned.

Enforcement

TrapWire has established procedures for periodically verifying the implementation of and compliance with the Safe Harbor principles. We conduct an annual self-assessment of our practices with respect to Personal and Sensitive Personal Information to verify that representations we make about our privacy practices are true and that related privacy policies have been implemented as represented.

Individuals may file a complaint with our Privacy Office at the address below. TrapWire will investigate and attempt to resolve complaints and disputes in accordance with the principles contained in this Policy. If a dispute cannot be resolved by this process we will participate in the dispute resolution procedures of the panel established by the European Data Protection Authorities.  Yeah, the very government spying on you is going to come to your aid-ha ha!

Limitations

Adherence by TrapWire to these Safe Harbor Principles may be limited (a) to the extent required to respond to a legal or ethical obligation; and (b) to the extent expressly permitted by an applicable law, rule or regulation.   So basically, they don’t have to so long as they have some legal excuse not to.

Contact Information

Please direct any questions or comments regarding this Policy to our corporate office:
TrapWire Inc.
1875 Campus Commons Drive – Suite 301
Reston, VA 20191
Attn: Legal Department/Safe Harbor
Say, isn’t that near CIA headquarters in Langely, Virginia?  And the rest of the spooks?


Get the point?

It’s about control.

Control is power.

The enemy likes things nice and legal as a control mechanism via contract.  When you contract you give consent, to be monitored, exploited, extorted or otherwise stolen from.  Just rolling the tanks into the streets isn’t their style in America, they have to have an hermetically seal of laws, rules, regulations so that when you’re forced onto their legal hamster wheel and made to run until you’ve been utterly robbed, everyone else will be cowed by the example they make of you and just go along to get along.  Until they’re next.

But yeah, how to reclaim your privacy in this age of Total Information Awareness by the enemy, with a national network of cameras that can scan your face and license plate and read your very intent biometrically?  Tough.

Not impossible.

RECLAIM YOUR ANONYMITY

This is the single most expensive part of reclaiming your privacy but you will have to move out, and move to a place where your name is NOT on any bills or agreement.  If you have enough money to buy a place you will NOT do it under your name, you will form a Wyoming corporation, buy stock in it anonymously-because you’ll issue it to yourself-get a signature from someone you’ll pay a few bucks for being the CEO or whatever.  The stock sold in that corporation will buy property.

I would prefer to simply rent as you’re paying property tax on the land anyway, unless you’re in Texas and somehow get the Land Patent.  You’re renting to someone might as well save the expense and money-besides you’re probably too poor to go that route anyway.

You can always squat… have to deal with the cops-unless you’re in Gary Indiana, Flint or Detroit Michigan and then you have to deal with what feral humans remain that’ll come along and take your stuff so you have to guard your property 24/7.

But yeah, rent; find a place that will simply take your money and whatever name you want to call yourself.  Find a place with a flat rate plus sharing the utilities… but not with your name on the bill or lease.  Be the best renter you can and don’t attract the cops or otherwise annoy them with parties, loud music, turfing their lawn when you drunkenly come home at 3AM, somehow missing all the cops hunting you, or put a bullet through their walls.  Don’t do damage to their property, leave trash or used rubbers to stink up the joint, etc.  Be sociable and talk to your landlord-leave stuff you’d talk about from reading Freedom Guide for someone who can’t evict you for being a Tin Foil Hat Idiot.

OR you could do a house swap with someone with absolutely no connection to you whatsoever.  You don’t call, text, e-mail on anything that has your or their name on it.  Finding someone like that…

DON’T UPDATE YOUR PERSONAL INFO

What you’re going to do before you move is to get all your correspondence routed through a Post Office Box using your old address.  You come by, pick up your mail and smirk at all the bills addressed to you, all the threatening letters from your public servants, etc.

“Wait, what about work?  They have records on tax files so they know where you work.”  Which is why when you move you will work HARD towards a cash economy lifestyle.  Find a trade or product to sell that is basic and involves being paid in cash.  Adam Cash has a couple books on how to do just that.

COMPARTMENTALIZE YOUR LIFE

There’s no reason to mix varying aspects of your new life.  None. 

You will maintain your old government registered identity, connected now to a P.O. Box you can choose to simply let go of.  Your current computer is perfectly fine for this.  (Hey you’re not reading THIS on your current computer are you?  Don’t worry, the new protocols you’re going to enact involving your computer usage will take care of that.)  You’ll still use it if you decide to maintain a vehicle under your name instead of putting in ownership by a corporation outlined previously.  This you can call your LEGACY ID.

You will have an “identity” for your new place, so long as you’re name and ID are not on any bills.  Nothing with a SSN or DL#.  This is your LIVING ARRANGEMENT.

Now, since you’re reading Freedom Guide in general and this article in particular, you’re not at all with how this country’s run, so you are going to want to do some activism.  You need to.  So never, ever, intermix your activism with your actual living arrangement or your legacy ID.  Basically you’re a nonviolent Batman of three (or more) identities.  You will want an identity, a life partition for your activism, a partition for your legacy, a partition for your living arrangement because you will want something of a normal life in your living arrangement ID.

Don’t tell people you associate with in each of your identities about people in other partitions in your life, that’s what is known as a security breach.  Of greatest importance is keeping your legacy ID partitioned from your new lif(v)e(s). 

Vehicles unless you put under a corporation and trust, are a rolling security breach, you may want to invest in a new car or move to a place where you don’t need a car.

NOW WE CAN TALK ABOUT ANONYMOUS COMPUTER USAGE

Get a new computer.  You probably need to upgrade, but this upgrade isn’t for the latest one on the shelf loaded with spyware.  You’re going to go shopping for a decently recent computer that you can throw Windows XP or Linux on-and you will never, ever use it on any network.  This is your workstation, your central node in your disconnected network.

What would be better is to buy a computer for your own personal affairs, one for each of your identities.  Computers and programs put their IDs into every video, every document, every program and these registries can be tracked-unless you buy all your computers from private parties that interact solely in cash and don’t ask for ID.  And are honest. 

Your working computers will never, ever, interact with the internet nor be permitted to be accessed, nor interact with each other.  You will use external thumb drives for data transfer-it would be a great ideal to have some portable apps like Youtube Downloader, a video editing program, a website ripping program, some encryption program you feel safe with…. Though these devices might have their own unique identifiers and even if they don’t the apps you use on them might be a signature so have separate thumb drives for each computer/life partition-identity and use them to shuttle files and information.  Use these to shuttle from your netbook computers to your working computers.  You can also use your older thumb drives as dead drops, which I encourage for really covert transfer of information and files between security aware people.  More on that in a bit….

You will NOT use your personal computer for anything that you have to put your real name on, ever.  I will reiterate that save for the computer you already have for your legacy ID.

Okay, now to maintain anonymity on the web you have a couple choices; public access computers or computers expressely used for communication.  Public access computers, such as libraries or internet cafés are okay so long as they don’t require an ID, or just issue a guest pass.  Those you will have to scout out on your own.  A better bet would be to have a portable netbook computer for each of your identities.

Going out for wi-fi, don’t use the wi-fi at home or near your home for anything other than your living arrangement identity.  Use one set of wi-fi hotspots for one computer, another set of hotspots for another etc.  You can get away with intermixing some vanilla websites but you don’t want to be downloading bombmaking information onto a computer you use for your living identity or your legacy ID.  Keep your net surfing profiles strictly segregated.

A word on the I-phones and the like… they’re riddled with spyware, don’t use them if you can avoid it.  Yes they take great photos, you can surf the net, they have thousands of apps but you have to register to use them and the NSA can hack into and access ANY phone.  It becomes a portable bug keeping tabs on you and recording all your information.  Pass on those otherwise wonderful toys.

Use external drives to store archives, don’t rely on cloud computing you’re just putting your files at the mercy of the bad guys.

If you’re looking to buy online, you get one of those prepaid debit cards, register that with e-bay and go through paypal.  Find someone to use for a mail drop or if you’re dropping out entirely use your legacy ID P.O. Box… if you’re house swapping, don’t.  It’s not cool to get someone else in trouble like that.

Boston T. Party mentioned in Bulletproof Privacy a couple tricks.  Stick a mailbox out on some rural road with a number that makes sense.  You could also have mail delivered to a unused address, like a foreclosed home or vacant house-take your chances there though.

Okay, covert communication using a USB dead drop; I can’t go in too deeply on how you establish people worthy of being in your network of allies or I’d be typing a long time and this article’s already approaching my typically epic length, but when you do you establish a series of dead drops where people in your network continually monitor for notes.  They could be paper notes, they could be packages, or they could be files on a spare USB drive.  Use your activist identity netbook to retrieve the data and deposit.  Work out a series of codes with your group such as notes, packages, USB deposits, distress, and so forth.  Get creative as to where you put your dead drops. 

This provides a communications network that is impossible to decrypt or intercept save for the enemy getting a snitch or agent into your network. 

It may be a good idea to have a communications system devoted specifically for emergency traffic…

So that’s your choice; the path of Freedom or the path of convenience.  The path of convenience is wide and well packaged, and easy to traverse, but the terms are that you become a slave to people who use companies like TrackScan to steal your information.  The path of Freedom requires sacrifice and diligence, it is rather narrow and often treacherous and full of risk but you need to take them if you want to be Free.  Certainly need to take those risks if you want to stick it to the cocksuckers who’ve turned America into Orwell’s wet dream.