Nobody else is going to save you but yourself-but how? Read on. I hold no copyright to any articles, save that: 1)You reproduce in entirety 2)Link to freedomguide.blogspot.com 3)Accredit authorship to J. Croft
Thursday, August 16, 2012
US GOVT. NOW CLASSIFYING AMMUNITION PURCHASES
What, you don't think they're NOT going to come after us once this Potemkin Village known as modern day America can't be sustained any longer? It's either fight them or accept a more straightforward form of slavery than the one we have now-y'know with the taxation of us at every turn, millions of pages of laws and regulations and millions of armed government officials to enforce every edict.
They are SWAT teaming on people selling organic food.
The southern border's wide open for narcoterrorists but the government goes off on Patriotic Americans. Guess who is the enemy...
Arm up. Read and study "Second American Revolution Victory Guide" and "How To Start A Militia-And Get Away With It".
LEMONADE AND RAW MILK FREEDOM DAY THIS WEEKEND
August 17th & 18th
Washington, DC
http://lemonadefreedom.com
http://rawmilkfreedomriders.com
Friday, August 17th: Know Your Rights Workshop & Dinner Registration: http://farmfoodfreedom.wufoo.com/forms/20120817-rights-workshop-dinner-regist...
Saturday, August 18th: Lemonade Freedom Day 2012 - Washington, DC Facebook Event: https://www.facebook.com/events/337640829653020/347109408706162/?notif_t=plan...
Timeline of FDA raids on raw milk by Mike Adams http://www.naturalnews.com/033280_FDA_raids_timeline.html
For more, check out Lemonade & Raw Milk Freedom Day posted to CopBlock.org on August, 3rd, 2012 http://www.copblock.org/lemonade-freedom-day/
Washington, DC
http://lemonadefreedom.com
http://rawmilkfreedomriders.com
Friday, August 17th: Know Your Rights Workshop & Dinner Registration: http://farmfoodfreedom.wufoo.com/forms/20120817-rights-workshop-dinner-regist...
Saturday, August 18th: Lemonade Freedom Day 2012 - Washington, DC Facebook Event: https://www.facebook.com/events/337640829653020/347109408706162/?notif_t=plan...
Timeline of FDA raids on raw milk by Mike Adams http://www.naturalnews.com/033280_FDA_raids_timeline.html
For more, check out Lemonade & Raw Milk Freedom Day posted to CopBlock.org on August, 3rd, 2012 http://www.copblock.org/lemonade-freedom-day/
AWRM CHARLES DYER UPDATE
From EDOGZ818
:Charles Dyer
1200 South main St
Fredrick, Oklahoma, 73542
Please write Charles Dyer / July 4 Patriot for his B Day.
Charles Dyer needs help researching his appeals.
Two main issues that he needs us to research are:
Can he be convicted for a string of sexual assaults, as opposed to a specific incident.
IE: Raped so & so over the course of 1 yr, as opposed to raping so & so on a specific date.
IE: He wasn't convicted for a specific incident, because the government didn't have enough evidence to substantiate a specific charge, so they generalized it.
Also:
What is the standard of proof required for a sexual assault on a child?
Is it only a statement, supported by a missing vaginal flap, or does an examination have to be preformed by a physician who was specifically trained to conduct an examination to determine sexual assault.
In a nutshell, there was no physical examination by a qualified physician, and no specific dates of the incident(s).
He was railroaded and now, has virtually no access to the law library to prepare for his appeals.
Please find the related info, download it, print it and mail it to him, or post a link here,PM, or email it me & I will download it, print it out & send it to him, with your information if you don't mind, to let him know who helped him.
Thank you, in advance, for your time and attention to this life saving activity.
Please send him money orders for personal supplies and make sure you sign them where the signature line indicates that the "PURCHASER" should sign.
https://www.facebook.com/photo.php?fbid=418584888178610&set=a.243292662374501.52499.217156764988091&type=1&comment_id=946123&ref=notif¬if_t=like&th eater
:Charles Dyer
1200 South main St
Fredrick, Oklahoma, 73542
Please write Charles Dyer / July 4 Patriot for his B Day.
Charles Dyer needs help researching his appeals.
Two main issues that he needs us to research are:
Can he be convicted for a string of sexual assaults, as opposed to a specific incident.
IE: Raped so & so over the course of 1 yr, as opposed to raping so & so on a specific date.
IE: He wasn't convicted for a specific incident, because the government didn't have enough evidence to substantiate a specific charge, so they generalized it.
Also:
What is the standard of proof required for a sexual assault on a child?
Is it only a statement, supported by a missing vaginal flap, or does an examination have to be preformed by a physician who was specifically trained to conduct an examination to determine sexual assault.
In a nutshell, there was no physical examination by a qualified physician, and no specific dates of the incident(s).
He was railroaded and now, has virtually no access to the law library to prepare for his appeals.
Please find the related info, download it, print it and mail it to him, or post a link here,PM, or email it me & I will download it, print it out & send it to him, with your information if you don't mind, to let him know who helped him.
Thank you, in advance, for your time and attention to this life saving activity.
Please send him money orders for personal supplies and make sure you sign them where the signature line indicates that the "PURCHASER" should sign.
https://www.facebook.com/photo.php?fbid=418584888178610&set=a.243292662374501.52499.217156764988091&type=1&comment_id=946123&ref=notif¬if_t=like&th eater
ART OF THE RIFLE: RANGING PART 1
Ironically
the distance at which the eyeball is most effective coincides with the distance
that a rifle can be fired point blank at most targets, given the proper
zero. If you have a target at a distance
inside 200-300 yards, the eye may be used to estimate range and make
corrections accordingly to good effect.
The rifle’s trajectory at these distances undergoes radically less
change inside these distances than it does farther out, where your eye won’t
work quite as accurately.
Things that
affect the apparent range to target are terrain and environmental factors. According to the reference materials I have
on hand, targets uphill will tend to appear farther away than they actually
are, and targets downhill will tend to appear closer. A valley between you and your target will
make it appear closer. Looking around at
stuff would suggest that a target in a narrow clearing with obstructions to
either side of your field of view would create a tunnel effect that makes the
target appear to be farther. A straight
visual line, such as a path or road, leading to the target is supposed to make
it look closer. I would have checked all
these out as part of my research for this article, but I don’t have a
rangefinder to verify my estimations.
Wednesday, August 15, 2012
IT'S WEDNESDAY... MORE GREAT NEWS!
Police can now legally track your cell phone without a warrant-don't have your cell on you, you can always call back: http://www.presstv.ir/usdetail/256292.html
U.S. downgrades crop outlook: http://www.wsws.org/articles/2012/aug2012/crop-a15.shtml
How Obama is robbing the suburbs to pay for the cities-cities are the enemy's strongholds, the country will be raided more and more. http://www.forbes.com/sites/realspin/2012/08/13/how-obama-is-robbing-the-suburbs-to-pay-for-the-cities/
You will not believe what Americans are doing for a paycheck these days: http://theeconomiccollapseblog.com/archives/you-will-not-believe-what-some-people-are-willing-to-do-for-a-paycheck-these-days
Investors prepare for Euro collapse http://www.spiegel.de/international/business/investors-preparing-for-collapse-of-the-euro-a-849747.html
China is running out of money http://www.forbes.com/sites/gordonchang/2012/08/12/china-is-running-out-of-money/
Social Security Administration needs ammo too... http://thedorkfishexpress.blogspot.com/2012/08/ssa-ammo-bandwagon.html
...And so does the National Weather Service http://www.infowars.com/national-weather-service-follows-dhs-in-huge-ammo-purchase/
Ann Barnhardt goes over the destruction of protections for Americans financial accounts
http://dl.dropbox.com/u/32961642/SentinelRuling.pdf
That's the ruling...
Wired discovered that the online encrypted e-mail company Hushmail had created a way for governments that had a Mutual Assistance Legal Agreement with Canada to subpoena Hushmail users’ accounts. Hushmail even created rogue downloadable software to help bust open encrypted accounts for the government, though it’s not clear the company was under any legal obligation to do so….
http://www.wired.com/threatlevel/2012/08/wired_opinion_patrick_ball/all/
U.S. downgrades crop outlook: http://www.wsws.org/articles/2012/aug2012/crop-a15.shtml
How Obama is robbing the suburbs to pay for the cities-cities are the enemy's strongholds, the country will be raided more and more. http://www.forbes.com/sites/realspin/2012/08/13/how-obama-is-robbing-the-suburbs-to-pay-for-the-cities/
You will not believe what Americans are doing for a paycheck these days: http://theeconomiccollapseblog.com/archives/you-will-not-believe-what-some-people-are-willing-to-do-for-a-paycheck-these-days
Investors prepare for Euro collapse http://www.spiegel.de/international/business/investors-preparing-for-collapse-of-the-euro-a-849747.html
China is running out of money http://www.forbes.com/sites/gordonchang/2012/08/12/china-is-running-out-of-money/
Social Security Administration needs ammo too... http://thedorkfishexpress.blogspot.com/2012/08/ssa-ammo-bandwagon.html
...And so does the National Weather Service http://www.infowars.com/national-weather-service-follows-dhs-in-huge-ammo-purchase/
Ann Barnhardt goes over the destruction of protections for Americans financial accounts
http://dl.dropbox.com/u/32961642/SentinelRuling.pdf
That's the ruling...
Wired discovered that the online encrypted e-mail company Hushmail had created a way for governments that had a Mutual Assistance Legal Agreement with Canada to subpoena Hushmail users’ accounts. Hushmail even created rogue downloadable software to help bust open encrypted accounts for the government, though it’s not clear the company was under any legal obligation to do so….
http://www.wired.com/threatlevel/2012/08/wired_opinion_patrick_ball/all/
Tuesday, August 14, 2012
HOW TO SPOT-AND DEFEAT-DISRUPTION ON THE INTERNET
How to Spot – and Defeat – Disruption on the Internet
Submitted by George Washington on 08/13/2012 15:43 -0400David Martin’s Thirteen Rules for Truth Suppression, H. Michael Sweeney’s 25 Rules of Disinformation (and now Brandon Smith’s Disinformation: How It Works) are classic lessons on how to spot disruption and disinformation tactics.
We’ve seen a number of tactics come and go over the years. Here are the ones we see a lot of currently.
1. Start a partisan divide-and-conquer fight or otherwise push emotional buttons to sew discord and ensure that cooperation is thwarted. Get people fighting against each other instead of the corrupt powers-that-be. Use baseless caricatures to rile everyone up. For example, start a religious war whenever possible using stereotypes like “all Jews are selfish”, “all Christians are crazy” or “all Muslims are terrorists”. Accuse the author of being a gay, pro-abortion limp-wristed wimp or being a fundamentalist pro-war hick when the discussion has nothing to do with abortion, sexuality, religion, war or region. Appeal to people’s basest prejudices and biases. And – as Sweeney explains – push the author into a defensive posture:
Sidetrack opponents with name calling and ridicule … Associate opponents with unpopular titles such as “kooks”, “right-wing”, “liberal”, “left-wing”, “terrorists”, “conspiracy buffs”, “radicals”, “militia”, “racists”, “religious fanatics”, “sexual deviates”, and so forth. This makes others shrink from support out of fear of gaining the same label, and you avoid dealing with issues.2. Pretend it’s hopeless because we’ll be squashed if we try. For example, every time a whistleblower leaks information, say “he’s going to be bumped off”. If people talk about protesting, organizing, boycotting, shareholder activism, spreading the real facts, moving our money or taking other constructive action, write things to scare and discourage people, say something like “we don’t have any chance because they have drones and they’ll just kill us if we try”, or “Americans are too stupid, lazy and greedy, so they’ll never help out.” Encourage people to be apathetic instead of trying to change things.
3. Demand complete, fool-proof and guaranteed solutions to the problems being discussed. For example, if a reporter breaks the story that the big banks conspired to rig a market, ask “given that people are selfish and that no regulation can close all possible loopholes … how are you going to change human nature?”, and pretend that it’s not worth talking about the details of the market manipulation. This discourages people from reporting on and publicizing the corruption, fraud and other real problems. And it ensures that not enough people will spread the facts so that the majority know what’s really going on.
4. Suggest extreme, over-the-top, counter-productive solutions which will hurt more than help, or which are wholly disproportionate to what is being discussed. For example, if the discussion is whether or not to break up the big banks or to go back on the gold standard, say that everyone over 30 should be killed because they are sell-outs and irredeemable, or that all of the banks should be bombed. This discredits the attempt to spread the facts and to organize, and is simply the web method of the provocateur.
5. Pretend that alternative media – such as blogs written by the top experts in their fields, without any middleman – are untrustworthy or are motivated solely by money (for example, use the derogatory term “blogspam” for any blog posting, pretending that there is no original or insightful reporting, but that the person is simply doing it for ad revenue).
6. Coordinate with a couple of others to “shout down” reasonable comments. This is especially effective when the posters launch an avalanche of comments in quick succession … the original, reasonable comment gets lost or attacked so much that it is largely lost.
7. Use an army of sock puppets. You can either hire low-wage workers in India or other developing countries to “astroturf” or – if you work for the government – you can use hire military personnel and subcontractors to monitor social media and “correct” information which you don’t like (and see this), or use software which allows you to quickly create and alternate between numerous false identities, each with their own internet address.
8. Censor social media, so that the hardest-hitting information is buried. If you can’t censor it, set up “free speech zones” to push dissent into dank, dark corners where no one will see it.
9. When the powers-that-be cut corners and take criminally reckless gambles with our lives and our livelihoods, protect them by pretending that the inevitable result - nuclear accidents, financial crises, terrorist attacks or other disasters – were “unforeseeable” and that “no could have known”.
10. Protect the rich and powerful by labeling any allegations of criminal activity as being a “conspiracy theory”. For example, when Goldman gets caught rigging markets, label the accusations as mere conspiracies.
The following 4 tactics from Sweeney are also still commonly used …
11. Become incredulous and indignant. Avoid discussing key issues and instead focus on side issues which can be used show the topic as being critical of some otherwise sacrosanct group or theme. This is also known as the “How dare you!” gambit.
12. Use a straw man. Find or create a seeming element of your opponent’s argument which you can easily knock down to make yourself look good and the opponent to look bad. Either make up an issue you may safely imply exists based on your interpretation of the opponent/opponent arguments/situation, or select the weakest aspect of the weakest charges. Amplify their significance and destroy them in a way which appears to debunk all the charges, real and fabricated alike, while actually avoiding discussion of the real issues.
13. Hit and Run. In any public forum, make a brief attack of your opponent or the opponent position and then scamper off before an answer can be fielded, or simply ignore any answer. This works extremely well in Internet and letters-to-the-editor environments where a steady stream of new identities can be called upon without having to explain criticism reasoning — simply make an accusation or other attack, never discussing issues, and never answering any subsequent response, for that would dignify the opponent’s viewpoint.
14. Question motives. Twist or amplify any fact which could so taken to imply that the opponent operates out of a hidden personal agenda or other bias. This avoids discussing issues and forces the accuser on the defensive.
15. Associate opponent charges with old news. A derivative of the straw man usually, in any large-scale matter of high visibility, someone will make charges early on which can be or were already easily dealt with. Where it can be foreseen, have your own side raise a straw man issue and have it dealt with early on as part of the initial contingency plans. Subsequent charges, regardless of validity or new ground uncovered, can usually them be associated with the original charge and dismissed as simply being a rehash without need to address current issues — so much the better where the opponent is or was involved with the original source.
Postscript: Over a number of years, we’ve found that the most effective way to fight disruption and disinformation is to link to a post such as this one which rounds up disruption techniques, and then to cite the disinfo technique you think is being used.
Specifically, we’ve found the following format to be highly effective in educating people in a non-confrontational manner about what the disrupting person is doing:
Good Number 1!Or:
Thanks for that textbook example of Number 7!(Include the link, so people can see what you're referring to.)
The reason this is effective is that other readers will learn about the specific disruption tactic being used … in context, like seeing wildlife while holding a wildlife guide, so that one learns what it looks like “in the field”. At the same time, you come across as humorous and light-hearted instead of heavy-handed or overly-intense.
Try it … It works.
http://www.zerohedge.com/contributed/2012-08-13/15-rules-web-disruption
ANONYMOUS COMPUTER USAGE IN THE AGE OF TOTAL INFORMATION AWARENESS
ANONYMOUS
COMPUTER USAGE IN THE AGE OF TOTAL INFORMATION AWARENESS
J. Croft
Privacy in
the Information Age has all but been eradicated.
Your
controlling numbers-your driver’s license and social security numbers-are used
by every government and private organization in an integrated grid to monitor
everything you do, every purchase you make, every interaction consensual or
otherwise. And that was decades before
9/11 was exploited by the enemy to enact ready-made thousand plus page bills
such as the Patriot Acts, the Victory Act, to further integrate and strengthen
their control grid, to further clamp down on the American People. Of course, the power hungry never, ever rest;
read the latest revelation about Trapwire, a company engaged in the globalized
surveillance state. I’ll make
appropriate comments to help with the legalese.
SAFE HARBOR PRIVACY POLICY
Scope
This Policy outlines our
general policy and practices regarding personal information entered into our
United States based systems by European Economic Area (“EEA”) subscribing
customers, and personal information entered into our EEA based systems which
may be accessed from the United States. Sure there’s a duplicate
system doing likewise to ‘murkans.
Definitions
For purposes of this Policy,
the following definitions apply:
“TrapWire” means TrapWire Inc.,
a Reston, VA based company in the United States.
“Personal Information” means
any information or set of information (such as name, address, date of birth,
social security number, etc.) that may be used to identify an individual.
Personal information does not include information that is encoded or
anonymized, or publically available information that has not been combined with
non-public information.
“Sensitive Personal Information”
means personal information that confirms race, ethnic origin, political
opinions, religious or philosophical beliefs, or trade union memberships, or
that concerns health or sex life. In
other words everything you carelessly spew out.
TrapWire complies with the
U.S.-EU Safe Harbor Framework as set forth by the U.S. Department of Commerce
regarding the collection, use, and retention of personal information from
European Union member countries. Oh, wait you’ll love the
clauses…
TrapWire has certified that it
adheres to the Safe Harbor Privacy Principles of notice, choice, onward
transfer, security, data integrity, access, and enforcement. To learn more
about the Safe Harbor program, and to view TrapWire’s certification, please
visit http://www.export.gov/safeharbor/ .
Here we go…
Notice
TrapWire is a risk mitigation
technology and services company that designs, builds and markets software
products intended to prevent terrorist and other criminal attacks directed
against critical infrastructure, key assets and personnel. Our flagship
product, the TrapWire software system, has been designed to provide a simple
yet powerful means of collecting and recording suspicious activity reports. They
collect EVERYTHING, from everywhere.
They’re also pretty flexible about calling people ‘terrorist’ and
‘criminal’.
Once a suspicious activity in
entered into the system it is analyzed and compared with data entered from
other areas within a network for the purpose of identifying patterns of
behavior that are indicative of pre-attack planning. Generally, no Personal
Information or Sensitive Personal Information is recorded by the TrapWire
system, and no such information is used by the system to perform its various
functions. In the event a system user were to enter either Personal Information
or Sensitive Personal Information in a comments field, TrapWire will not share
or expose that information to any other subscriber on the system, unless required by law, (bold
and underline mine: there’s the legal out-unless required by the Patriot Acts,
the Victory Act, God knows what executive orders, regulations, procedures, court
orders…) and, in any case, will otherwise
adhere to Safe Harbor Privacy Principles with respect to that information.
Choice
Since TrapWire systems, in
general, do not capture or store Personal or Sensitive Personal Information,
there will be very few (if any) opportunities to offer opt-in or opt-out
choices to individuals. “In general” doesn’t mean they don’t period. Words mean things in legalese… and you can’t
have an unavoidable information gathering tool if people can opt out. On the
rare (HA HA!)occasion where such information is entered into the
system, it is likely to be recorded as
law enforcement sensitive and will not be shared outside the law enforcement
community. To the extent Personal or Sensitive Personal Information is
entered into the TrapWire system, and is not designated as law enforcement
sensitive, TrapWire will not share that information with any third party. Just how extensive is the
law enforcement community? Just how much
would be considered ‘sensitive’ and therefore recorded?
Transfer To Third Parties
The TrapWire system is designed
to share only suspicious activity data which does not include any Personal or
Sensitive Personal Information. In the event Personal or Sensitive Personal
Information is recorded by a system user, that information will not be shared
or transferred to other than law
enforcement or other authorized agencies as required by law. So, who gets to be
authorized?
Security
The data center housing the
TrapWire infrastructure was constructed to the highest level of physical
security standards. Access to the facility is controlled and logged through a
system of biometric hand geometry readers, and the facility is carefully
monitored by security officials on guard 24 hours per day, 7 days per week, 365
a year.
System Security is also of
critical importance and is designed into all levels of the TrapWire application
and infrastructure. All connections to the TrapWire application are made
through a 256-bit encrypted SSL connection which terminates in a network DMZ.
User authentication is performed from the DMZ and must be successful before a
connection to TrapWire is permitted. Implemented security processes are intended
to protect any information in the TrapWire system from loss, misuse,
unauthorized access, disclosure, alteration or destruction. This is just to make you
feel secure that you’re personal information is ‘secure’… secure in their
hands. Think of TrapWire as a sock
puppet with the government’s hand in it.
Data Integrity
TrapWire, by design and intent,
attempts to avoid the collection of Personal or Sensitive Personal Information
by the products it produces. However, when such information is entered into a
TrapWire system, reasonable steps are taken to assure that information is
relevant for the purposes for which it is to be used. We do, however, depend on
our users to update and correct any information they enter. They
“attempt” to avoid collecting your info-unless your public servants have an
interest in it. “Reasonable” is the most
treacherous word in legalese. If someone
makes a “mistake” about your info, you’re boned.
Enforcement
TrapWire has established
procedures for periodically verifying the implementation of and compliance with
the Safe Harbor principles. We conduct an annual self-assessment of our
practices with respect to Personal and Sensitive Personal Information to verify
that representations we make about our privacy practices are true and that
related privacy policies have been implemented as represented.
Individuals may file a
complaint with our Privacy Office at the address below. TrapWire will
investigate and attempt to resolve complaints and disputes in accordance with
the principles contained in this Policy. If a dispute cannot be resolved by
this process we will participate in the dispute resolution procedures of the
panel established by the European Data Protection Authorities. Yeah, the very government
spying on you is going to come to your aid-ha ha!
Limitations
Adherence by TrapWire to these
Safe Harbor Principles may be limited (a) to the extent required to respond to
a legal or ethical obligation; and (b) to the extent expressly permitted by an
applicable law, rule or regulation. So basically, they don’t
have to so long as they have some legal excuse not to.
Contact Information
Please direct any questions or
comments regarding this Policy to our corporate office:
TrapWire Inc.
1875 Campus Commons Drive –
Suite 301
Reston, VA 20191
Attn: Legal Department/Safe
Harbor
Say, isn’t that near CIA headquarters in Langely, Virginia? And the rest of the spooks?
Get the
point?
It’s about
control.
Control is
power.
The enemy
likes things nice and legal as a control mechanism via contract. When you contract you give consent, to be
monitored, exploited, extorted or otherwise stolen from. Just rolling the tanks into the streets isn’t
their style in America, they have to have an hermetically seal of laws, rules,
regulations so that when you’re forced onto their legal hamster wheel and made
to run until you’ve been utterly robbed, everyone else will be cowed by the
example they make of you and just go along to get along. Until they’re next.
But yeah,
how to reclaim your privacy in this age of Total Information Awareness by the
enemy, with a national network of cameras that can scan your face and license
plate and read your very intent biometrically?
Tough.
Not
impossible.
RECLAIM YOUR
ANONYMITY
This is the
single most expensive part of reclaiming your privacy but you will have to move
out, and move to a place where your name is NOT on any bills or agreement. If you have enough money to buy a place you
will NOT do it under your name, you will form a Wyoming corporation, buy stock
in it anonymously-because you’ll issue it to yourself-get a signature from
someone you’ll pay a few bucks for being the CEO or whatever. The stock sold in that corporation will buy
property.
I would
prefer to simply rent as you’re paying property tax on the land anyway, unless
you’re in Texas and somehow get the Land Patent. You’re renting to someone might as well save
the expense and money-besides you’re probably too poor to go that route anyway.
You can
always squat… have to deal with the cops-unless you’re in Gary Indiana, Flint
or Detroit Michigan and then you have to deal with what feral humans remain
that’ll come along and take your stuff so you have to guard your property 24/7.
But yeah,
rent; find a place that will simply take your money and whatever name you want
to call yourself. Find a place with a
flat rate plus sharing the utilities… but not with your name on the bill or
lease. Be the best renter you can and
don’t attract the cops or otherwise annoy them with parties, loud music,
turfing their lawn when you drunkenly come home at 3AM, somehow missing all the
cops hunting you, or put a bullet through their walls. Don’t do damage to their property, leave
trash or used rubbers to stink up the joint, etc. Be sociable and talk to your landlord-leave
stuff you’d talk about from reading Freedom Guide for someone who can’t evict
you for being a Tin Foil Hat Idiot.
OR you could
do a house swap with someone with absolutely no connection to you
whatsoever. You don’t call, text, e-mail
on anything that has your or their name on it.
Finding someone like that…
DON’T UPDATE
YOUR PERSONAL INFO
What you’re
going to do before you move is to get all your correspondence routed through a
Post Office Box using your old address.
You come by, pick up your mail and smirk at all the bills addressed to
you, all the threatening letters from your public servants, etc.
“Wait, what
about work? They have records on tax
files so they know where you work.”
Which is why when you move you will work HARD towards a cash economy
lifestyle. Find a trade or product to
sell that is basic and involves being paid in cash. Adam Cash has a couple books on how to do
just that.
COMPARTMENTALIZE
YOUR LIFE
There’s no
reason to mix varying aspects of your new life.
None.
You will
maintain your old government registered identity, connected now to a P.O. Box
you can choose to simply let go of. Your
current computer is perfectly fine for this.
(Hey you’re not reading THIS on your current computer are you? Don’t worry, the new protocols you’re going
to enact involving your computer usage will take care of that.) You’ll still use it if you decide to maintain
a vehicle under your name instead of putting in ownership by a corporation
outlined previously. This you can call
your LEGACY ID.
You will
have an “identity” for your new place, so long as you’re name and ID are not on
any bills. Nothing with a SSN or DL#. This is your LIVING ARRANGEMENT.
Now, since
you’re reading Freedom Guide in general and this article in particular, you’re
not at all with how this country’s run, so you are going to want to do some
activism. You need to. So never, ever, intermix your activism with
your actual living arrangement or your legacy ID. Basically you’re a nonviolent Batman of three
(or more) identities. You will want an
identity, a life partition for your activism, a partition for your legacy, a
partition for your living arrangement because you will want something of a
normal life in your living arrangement ID.
Don’t tell
people you associate with in each of your identities about people in other
partitions in your life, that’s what is known as a security breach. Of greatest importance is keeping your legacy
ID partitioned from your new lif(v)e(s).
Vehicles
unless you put under a corporation and trust, are a rolling security breach,
you may want to invest in a new car or move to a place where you don’t need a
car.
NOW WE CAN
TALK ABOUT ANONYMOUS COMPUTER USAGE
Get a new
computer. You probably need to upgrade,
but this upgrade isn’t for the latest one on the shelf loaded with
spyware. You’re going to go shopping for
a decently recent computer that you can throw Windows XP or Linux on-and you will
never, ever use it on any network. This
is your workstation, your central node in your disconnected network.
What would
be better is to buy a computer for your own personal affairs, one for each of
your identities. Computers and programs
put their IDs into every video, every document, every program and these
registries can be tracked-unless you buy all your computers from private
parties that interact solely in cash and don’t ask for ID. And are honest.
Your working
computers will never, ever, interact with the internet nor be permitted to be
accessed, nor interact with each other.
You will use external thumb drives for data transfer-it would be a great
ideal to have some portable apps like Youtube Downloader, a video editing
program, a website ripping program, some encryption program you feel safe with….
Though these devices might have their own unique identifiers and even if they
don’t the apps you use on them might be a signature so have separate thumb
drives for each computer/life partition-identity and use them to shuttle files
and information. Use these to shuttle
from your netbook computers to your working computers. You can also use your older thumb drives as
dead drops, which I encourage for really covert transfer of information and
files between security aware people.
More on that in a bit….
You will NOT
use your personal computer for anything that you have to put your real name on,
ever. I will reiterate that save for the
computer you already have for your legacy ID.
Okay, now to
maintain anonymity on the web you have a couple choices; public access
computers or computers expressely used for communication. Public access computers, such as libraries or
internet cafés are okay so long as they don’t require an ID, or just issue a
guest pass. Those you will have to scout
out on your own. A better bet would be
to have a portable netbook computer for each of your identities.
Going out
for wi-fi, don’t use the wi-fi at home or near your home for anything other
than your living arrangement identity.
Use one set of wi-fi hotspots for one computer, another set of hotspots
for another etc. You can get away with
intermixing some vanilla websites but you don’t want to be downloading
bombmaking information onto a computer you use for your living identity or your
legacy ID. Keep your net surfing
profiles strictly segregated.
A word on
the I-phones and the like… they’re riddled with spyware, don’t use them if you
can avoid it. Yes they take great
photos, you can surf the net, they have thousands of apps but you have to
register to use them and the NSA can hack into and access ANY phone. It becomes a portable bug keeping tabs on you
and recording all your information. Pass
on those otherwise wonderful toys.
Use external
drives to store archives, don’t rely on cloud computing you’re just putting
your files at the mercy of the bad guys.
If you’re
looking to buy online, you get one of those prepaid debit cards, register that
with e-bay and go through paypal. Find
someone to use for a mail drop or if you’re dropping out entirely use your
legacy ID P.O. Box… if you’re house swapping, don’t. It’s not cool to get someone else in trouble
like that.
Boston T.
Party mentioned in Bulletproof Privacy a couple tricks. Stick a mailbox out on some rural road with a
number that makes sense. You could also
have mail delivered to a unused address, like a foreclosed home or vacant
house-take your chances there though.
Okay, covert
communication using a USB dead drop; I can’t go in too deeply on how you
establish people worthy of being in your network of allies or I’d be typing a
long time and this article’s already approaching my typically epic length, but
when you do you establish a series of dead drops where people in your network
continually monitor for notes. They
could be paper notes, they could be packages, or they could be files on a spare
USB drive. Use your activist identity
netbook to retrieve the data and deposit.
Work out a series of codes with your group such as notes, packages, USB
deposits, distress, and so forth. Get
creative as to where you put your dead drops.
This
provides a communications network that is impossible to decrypt or intercept
save for the enemy getting a snitch or agent into your network.
It may be a
good idea to have a communications system devoted specifically for emergency
traffic…
So that’s
your choice; the path of Freedom or the path of convenience. The path of convenience is wide and well
packaged, and easy to traverse, but the terms are that you become a slave to
people who use companies like TrackScan to steal your information. The path of Freedom requires sacrifice and
diligence, it is rather narrow and often treacherous and full of risk but you need
to take them if you want to be Free.
Certainly need to take those risks if you want to stick it to the
cocksuckers who’ve turned America into Orwell’s wet dream.
Labels:
computer,
dead drop,
privacy,
tyranny,
USB dead drop,
war on terror
Subscribe to:
Posts (Atom)


