Internet Knowledge and Tools - World Wide Web Information
Learning how to safely and effectively use the
Learning how to effectively and efficiently Navigate the
When visiting other websites be very careful what you click on because
some software downloads are very dangerous to your computer, so be
absolutely sure what you are downloading. Read the '.exe
' file name by either mousing over the link and reading
the bottom browser bar or by reading the file name in the download box.
Even search engines can link directly to websites that have viruses,
malicious software, key stroke recorders, parasites, tracking cookies and
many other vulnerabilities and threats, so be very aware of the websites
you are visiting. And don't click on links in e-mails too, unless you know
for sure, because they could also take you to fraudulent and threatening
websites. Don't ever click on Links in
unless you are
Internet Searching Tips
Human Search Engine
What is the Internet ?
that are all over the world that people can use to access
information 24 hours a day. A
consisting of a
that use the
data transmission and exchange. Of course it's
a lot more then just that. Simply
trying to define what the internet is, is almost impossible.
It's the biggest and the most important human advancement ever. Second
only to the advancements in
, and right before that,
the advancements in language and
the written word
, which was
first defining moment. And because of this early
, we learned to communicate much more
effectively, and convey a lot more knowledge and information. And
now with computers
, and the
and the digitizing of language
, we are now transmitting more
knowledge and information then any other time in our history. So just like when we look back at see how
language changed our world, future generations will look back at
the internet and see how the internet transformed our world. A
world that will be greatly improved. The internet is a lot
bigger then you think, literally, figuratively and
philosophically. But instead of listing the thousands of
benefits that are coming from this internet network, I want to
talk briefly about an interesting similarity. It seems that the
internet is just a natural process of life. Just like the
internet, life wants to branch out and make connections. Similar
to the root systems
located in Michigan’s Upper Peninsula. And also
like the Quaking Aspen's
in Utah and Colorado. But life not only branches out and makes
more connections, life also lives
and learns how to adapt. If not, that life form eventually dies,
as history has proven. And when that happens, then you become a
fossil for future life to look back on and say, "Hey, I wonder
what happened to these creatures, they seemed to have had a
brain, but I guess they never learned how to use it? I will
write more about the internet, but for now, I like analyzing the
similarities between life and the internet, it reminds me of the
similarities between the human brain and computers
internet is a human's way of
. Human intelligence is advancing faster
then any other time in human history, and
is just another tool that we have created to
enhance our abilities and increase our potential.
link documents and information.
Synapses in the human brain
are connections between neurons
through which "information" flows from one neuron to another.
Some hypertext hyperlinks can be bidirectional: they can be
followed in two directions, so both ends act as anchors and as
targets. More complex arrangements exist, such as many-to-many
is the link label, link text, or link title is
the visible, clickable text in a hyperlink.
Artificial Neural Network
Neurobiology is the study of cells of the nervous system and the
organization of these cells into functional circuits that process
information and mediate behavior. It is a subdiscipline of both
is a private network accessible only to an
is a website that allows controlled access to
partners, vendors and suppliers or an authorized set of customers –
normally to a subset of the information accessible from an organization's
intranet. An extranet is similar to a DMZ in that it provides access to
needed services for authorised parties, without granting access to an
organization's entire network. An extranet is a private network
organization. Historically the term was occasionally also used in the
sense of two organizations sharing their internal networks over a
, or Local Area Network, is a computer network that interconnects computers
within a limited area such as a residence, school, laboratory, university
campus or office building and has its network equipment and interconnects
locally managed. By contrast, a
wide area network
(WAN), not only covers a larger geographic distance,
but also generally involves leased telecommunication circuits or Internet
The Wood Wide Web, are Plants Inter-Connected by a Subterranean
Internet is Human Intelligence in Action
"How could we become so connected and yet
be so disconnected at the same time?"
The main reason why most people don't use the internet is
because most people do not understand the value, the importance
or the potential that the internet offers. So when the other
3/4's of the worlds population does get access, they should know
better on how to use the internet, as well as know why, when and
where to access the internet.
Alguiens - El Internet (ORIGINAL VERSION)
(Internet Song on
If you want to download a song, download it
from internet, If you want a girlfriend, look for her in
You want to host a party, host it on internet, If
you want to read the news, do it on internet,
The internet, the internet, the internet, the internet,
the internet, the internet, the internet, the internet.
4.4 Billion People Still Don't Have Internet Access in 2014
most of the 3 billion who do have Internet Access, are not
using the internet effectively or efficiently. Just
having access does not say anything
60 percent of the world isn’t online. There is more mobile phone
List of Countries by Number of Internet Users
Internet Use Demographics
44% of offline adults
have asked a friend or family member to look something up or
task on the internet for them.
50 million people in America
don't log on.
(youtube) Funny video about this women's idea what
the internet is.
What people are Searching for on the Internet?
Of course people will never know the true details of what
know about what people are looking for on the internet.
Or will people know what information Google is selling, or know
who is buying this information
, or know what certain people plan
to do with that information? So what do our internet
searches say about us? What does your Search History say about
you? What does your Browser History say about you?
Google will display their
, but they will not share the most important
information. So people will only see the stupid stuff that
people search for on Google. The amount of
Things that happen in one day
2001 Top Internet Queries
1. Nostradamus 2. CNN 3. World Trade Center
4. Harry Potter 5. Anthrax 6. Windows XP 7.
Osama Bin Laden
8. Audiogalaxy 9. Taliban 10. Loft Story 11.
Afghanistan 12. Nimba 13. American Airlines
14. American Flag
15. Aaliyah 16. FBI 17. Kazaa 18. Lord of the
Rings 19. Jennifer Lopez 20. Xbox
The 2013 list of top-trending
(global) included Nelson
Mandela, Paul Walker, iPhone 5s, Cory Monteith,
Harlem Shake, Boston Marathon, Royal Baby, Samsung Galaxy s4,
PlayStation 4 and North Korea.
Most searched beauty question:
How to get rid of acne
Most searched dog question:
Why do dogs eat grass?
Top-trending memes search:
Tim Howard memes
Top-trending natural events
search: Hurricane Arthur
Most searched places on Google
Top-trending podcast search:
Top-trending book search: Boy, Snow, Bird
Top internet searches are most related to what's happening
, and since the media is mostly irrelevant, that means
people are not learning as much as they should be from the
internet, which is extremely alarming. There is nothing more
damaging to a person then the belief that they are learning
enough in order to be accurately aware of themselves and the
world around them. This is what is happening in our
, as well as the media, and now the internet. And this
false sense of learning enough, is demonstrated throughout the
world in the form of violence, wars, crimes and mental
disorders. So your biggest mass murderers are not just the
people who control the media, your largest mass murders are the
people who control education and what is being taught in
schools. But try to explain that to people is almost impossible,
considering the amount of
damage that has been afflicted on them from our media outlets
and from our schools. You can't speak or understand a language
that you never heard of. And this language is called
intelligence, where knowledge and information is clearly
understood. Teach the language of intelligence and you will
eventually solve every problem in the world.
Google indexes no more than 16 percent of the surface Web and
misses all of the Deep Web. Any given search turns up just 0.03
percent of the information that exists online (one in 3,000
pages) Much of the Deep Web’s unindexed material lies in
mundane databases such as LexisNexis or the rolls of the U.S.
"The internet connects more then
just computers, the internet connects minds. And when people
finally do understand this ability, the saying "the word travels
fast" will be an understatement."
Web at 25
"Most people don't understand the internet,
they don't realize the potential of the internet, or what it
means to be connected to the worlds most valuable knowledge and
"The world is moving so fast these days
that the man who says it can't be done is generally interrupted
by someone doing it."
Basic Knowledge 101.com
does not share our users personal information. But that
does not mean that your personal information is secure because we
cannot control other websites privacy policies and what they do
with your personal information. So we encourage our members and
site visitors to be aware of the privacy policies of the other websites that we link too.
When a new browser window opens we
encourage our users to be aware of the privacy statements
of each website that collects personally identifiable information. Please be aware that
Basic Knowledge 101.com
can not be responsible for Links that no
longer point to the original site on which it was intended
because the Domain name, or ULR, was sold or high jacked by the
people where the domain name was registered. We apologize and will remove
the link as soon as we are notified. If a site we link to is found to be
fraudulent in any way we will remove it and no longer link to that
website. If a website that we link to does not want us to link to them we
will remove it and no longer link to that site.
I do not indorse every opinion or
every action that other people do
. Nor do I indorse every
opinion or every action that I do. I like to confirm the
accuracy of opinions and actions through the process of
. But even then, that will still not
guarantee that you wont learn anything new, which would
ultimately change your opinion
, or change your action.
I do not agree with everything that is
portrayed in Documentaries, Movies, TV Shows or any other
I assimilate the most logical parts of
information and put them together to form an understanding. Then
I write down my understandings so that I can share this information
Every person must learn how to recognize
what information is accurate
So what is your
procedure for filtering and assimilating information?
is a statement intended to specify or delimit the scope of
rights and obligations that may be exercised and enforced by parties in a
legally recognized relationship. In contrast to other terms for legally
operative language, the term disclaimer usually implies situations that
involve some level of uncertainty, waiver, or
Do you have to make a disclosure even
when you're not misleading anyone?
Almost all information can be
misinterpreted. But if you intentionally present information
that can be misinterpreted, then that's
, those are
when disclosures are absolutely necessary. But you never see
disclosures in the news, on TV, in books or in the movies. Even
if you do see disclosures they too can be misleading, so the
disclosure needs a disclosure. And you wonder why learning
are extremely important.
is the act of making something evident, to make visible. To make
known to the public information that can be misinterpreted.
To make vulnerabilities known.
flaws in software can be abused to cause unintended behaviour, these flaws
are called vulnerabilities.
Terms of Service
are rules by which one must agree to abide in order to use a service.
Terms of service can also be merely a disclaimer, especially regarding the
use of websites.Personal Information
Keeping Kids Safe on The Internet
Stay Safe Online.org
On Guard Online.gov
Internet Safety 101
Google Safety Tips
Kidoz Kid Safe
Filters for Safe BrowsingConnect
World Wide Web
is one of the greatest tools
ever invented and literally the biggest library in the world.
But the Internet is not a safe and secure place so be aware of
the dangers and take some time to educate yourself on
How to be Safer on the Internet
Whatever your age your personal information can be exploited and
used against you, so be careful.
There is a
strong privacy law that protects your cable viewing habits
there is no such law that protects records of what you buy
online or is there a law that protects information that is
collected by other services such as social networks or
FCC rules offer protections against your mobile phone company
selling the location data
it has on you from tracking your cell
phone all over town and beyond, but at the same time you are not
protected under these same rules given by the USA Patriot Act
101 East :
Web of Hate
Stop it Cyber
Stalking Amanda Todd : The Man in the Shadows
Internet Searching Tips
PC Problem Solving
Technology is Just Another Tool
What did I Learn from the Internet
Human Search Engine
The Greatest Tool for Internet
Safety will always be Knowledge.
Spying on your child is not recommended. Only when all other
have failed, and
only if you believe that your child may be in danger, should you
even try to attempt to violate your child's privacy, because you
could easily make the situation worse. All parents need to
continually educate themselves and keep up with today's
information and knowledge.
And let your child know that you are
both responsible for each others actions.
You don't Know Everything
Social Network Monitoring
? If you want to know a person you
have to talk to that person and have an open and honest
conversation with them. Just listening in on someone's
conversations, or watching them from a distance, and then
judging them, or exploiting that information, without the
decency of a fair and open trial, that is not just insane and
insultingly ignorant, it is very dangerous. The damage that
could come from these types of errors could be catastrophic.
Spying is not a productive process for learning, it is flawed
and vulnerable. You create more problems then you solve.
Make sure all computers are well-positioned so they cannot be
pulled over by inquisitive children. Also make sure that cables
are dressed and secured properly to avoid being tripped on.
Social Network Scams and Vulnerabilities
Social Network Knowledge
Social Network Safety
Chat Room Dangers
Social Media Etiquette
Kids Growing up Online
Assange talks about Facebook
, called Facebook the "most
appalling spying machine that has ever been invented."
Face Book is the world's most comprehensive database about
people, their relationships, their names, their addresses,
their locations, their communications with each other, their
relatives, all sitting within the United States,
all accessible to U.S. intelligence.
Facebook & the CIA
More about Social Networks
is a suggested cognitive limit to the number of
people with whom one can maintain stable social relationships. These are
relationships in which an individual knows who each person is and how each
person relates to every other person.
Get Net Wise
Seniors Guide to using Computers and Software
Acronyms, Jargon and Text Message Shorthand
Internet Basic Knowledge
Fraud - Scams
is deliberate deception to secure unfair or
, or to deprive a victim of a legal right. Fraud itself can
be a civil wrong
- Confidence Trick
FBI Scam Alerts
Department of Justice
Victims of Fraud Help
Travel Scams & Fraudulent Travel Deals
Scams and Complaints
Crime Help Websites
Federal Trade Commission
click on Consumer Protection
Security AllianceInternet Crime Complaint Center
unauthorized use of another's name
likeness, or identity
without that person's permission, resulting in harm
to that person.
Remember that the internet
is not the only place where you can be scammed and have your
. Be cautious of suspicious phone calls,
suspicious letters in the US mail and suspicious e-mails.
Report Spam and unsolicited e-mails
CAN-SPAM Act: A Compliance Guide for Business
CAN-SPAM Act of 2003
"The first principle
is that you must not fool yourself -- and you are the easiest
person to fool." (Richard
Consumer Product Safety
Consumer Complaint Form for Ct.
Top 10 Consumer Complaints for 2014
researchs, tests, reviews and compares consumer tech products and services
so you can make a more informed decision before you buy.
Public Interest Research Groups
If ingested or inhaled, lead and its compounds are poisonous to
animals and humans. Lead is a neurotoxin that accumulates both in soft
tissues and the bones, damaging the nervous system and causing brain
disorders. Excessive lead also causes blood disorders in mammals. Lead
poisoning has been documented since ancient Rome, ancient Greece, and
are used in a wide range of common products, and are released into the
environment. high doses have been shown to change hormone levels and cause
birth defects. Toxins
One Step Ahead
National Institute of Environmental Health Sciences
Educational Toys and Games that Teach
Physical Health News
Mental Health News
Lawyers, Court Information and Legal Help
Association of Consumer Advocates
Nearly 700 Children Have Perished In
Hot Cars Since 1998.
The Internet Crime Complaint Center
victims of Internet-related
crimes lost $559 million in 2009, which is more because not all
crimes are reported. The mission of most Social Networks like
Facebook, is to get you to share as much information as possible
so it can be shared with advertisers. Playing some of those free
online games is one way to get people to share information. A
few times a year Facebook puts your privacy settings back to a
default setting, which essentially makes all of your information
to be made public. And on top of that, your security is only as
good as your friend's security. So if your friend is hacked you
are at risk. Plus 40 percent of all Facebook profiles are fake,
so please know your friends. Facebook has not been able to
screen all of its ads either. Some ads have
Malicious Code Embedded in them
. And be
absolutely sure what you are downloading because some antivirus
software is actually a virus.
Facebook reported that hackers using stolen username and
password credentials try to break into at least 600,000 accounts
More Tech News
Protecting the Internet Information Highway
Save the Internet
Center for Democracy and Technology
Info War Monitor
Can You Hack It?
Ad BustersScan Eye
Free the TV White Space
FCC White Space Rules
Free-space Optical Communication
is an optical communication
technology that uses light propagating in free space to wirelessly
transmit data for telecommunications or computer networking. "Free space"
means air, outer space, vacuum, or something similar. This contrasts with
using solids such as optical fiber cable or an optical transmission line.
The technology is useful where the physical connections are impractical
due to high costs or other considerations.
visible or infrared light
to wirelessly transmit data through open air as opposed to using cables.
Improving Internet with Mid-Wavelength Infrared
High-Speed, Affordable, and Accessible Broadband
is a standard for high-speed wireless communication for mobile phones and
data terminals. It is based on the GSM/EDGE and UMTS/HSPA network
technologies, increasing the capacity and speed using a different radio
interface together with core network improvements.
High-Speed Broadband for All Americans
Lifeline Program for Low-Income Consumers
(affordable internet access)
Google Fiber Connecting Public Housing at Gigabit Speeds
List of Countries by Internet Connection Speeds
How to Connect to the internet when access is Limited
is a network topology in which each node relays data
for the network. All mesh nodes cooperate in the distribution of data in
Wireless Mesh Network
(WMN) is a communications network made up of
radio nodes organized in a mesh topology. It is also a form of wireless ad
hoc network. Wireless mesh networks often consist of mesh clients, mesh
routers and gateways. The mesh clients are often laptops, cell phones and
other wireless devices while the mesh routers forward traffic to and from
the gateways which may, but need not, be connected to the Internet. The
coverage area of the radio nodes working as a single network is sometimes
called a mesh cloud. Access to this mesh cloud is dependent on the radio
nodes working in harmony with each other to create a radio network. A mesh
network is reliable and offers redundancy. When one node can no longer
operate, the rest of the nodes can still communicate with each other,
directly or through one or more intermediate nodes. Wireless mesh networks
can self form and self heal. Wireless mesh networks can be implemented
with various wireless technologies including 802.11, 802.15, 802.16,
cellular technologies and need not be restricted to any one technology or
is a computer networking arrangement in which two or
more network interfaces on a host computer are combined for redundancy or
increased throughput. Channel bonding is differentiated from load
balancing in that load balancing divides traffic between network
interfaces on per network socket (OSI model layer 4) basis, while channel
bonding implies a division of traffic between physical interfaces at a
lower level, either per packet (OSI model Layer 3) or a data link (OSI
model Layer 2) basis.
Open Systems Interconnection Model is when a layer serves the
layer above it and is served by the layer below it.
For example, a
layer that provides error-free communications across a network provides
the path needed by applications above it, while it calls the next lower
layer to send and receive packets that comprise the contents of that path.
Two instances at the same layer are visualized as connected by a
horizontal connection in that layer.
Load Balancing (computing
) improves the distribution of workloads
across multiple computing resources, such as computers, a computer
cluster, network links, central processing units, or disk drives. Load
balancing aims to optimize resource use, maximize throughput, minimize
response time, and avoid overload of any single resource. Using multiple
components with load balancing instead of a single component may increase
reliability and availability through redundancy. Load balancing usually
involves dedicated software or hardware, such as a multilayer switch or a
Domain Name System server process. Load balancing differs from channel
bonding in that load balancing divides traffic between network interfaces
on a network socket (OSI model layer 4) basis, while channel bonding
implies a division of traffic between physical interfaces at a lower
level, either per packet (OSI model Layer 3) or on a data link (OSI model
Layer 2) basis with a protocol like shortest path bridging.
H.R. 2454: Aaron’s Law Act of 2013
Was Aaron Swartz Murdered?
Guerilla Open Access Manifesto
UK Parliament calls for internet to be classified as a Public
Named Data Networking
: Instead of numbers, use names. Focus
not on the locations of things, but on the things themselves by
retrieving information from the nearest computer that has it,
rather than wait to get it from a heavily-trafficked centralized
Point to Point
system to a
Peer to Peer
Internet Access Rights
Right to Internet Access
Stop Online Piracy Act
Support a Free and Open Internet
Controlling the Web
Protect Internet Freedom
Fight for the Future
Aaron Swartz keynote - "How we stopped SOPA"
How Iran Censors Internet
Why Sopa is a Bad Idea
is not the same as Domain Name Filtering used by
Internet Browsers for Kids
Web Content Control Software
just another form of
From July to December 2012,
Google Received 2,285 Government Requests
to remove 24,179
pieces of content, which is an
increase from the 1,811 requests to remove 18,070 pieces of
content that we received during the first half of 2012.
United States Computer Emergency Readiness Team
Internet Engineering Task Force
Internet System Consortium
Chaos Communication Congress
consumes between three and five percent of the world’s
. The cost of powering the Internet,
which is 1.5% of global electricity, is
annually and is growing at an
incredible rate. There are
2.4 billion internet users
today, which means more backbone bandwidth, more content, more
data centers, more applications, more computers.
Internet Connection Types
(wiki) using the unused broadcast
Universal Service Fund
A Human Right
Battery Backup (brck)
Broadband Across America
Satellite Internet Access
Optical Fiber Cable
Passive Optical Network
adding new colors of light onto the existing fiber.
In 2015, 2.1 Million People Still Use AOL
Your Karma WiFi
ZeusPro - Wireless Network Solution
Universal non-Electrical Wi-Fi
Amplifier. WiFi signal Anywhere.
- Network Security & Wi-Fi Troubleshooting.
Freedom of Speech
About Information Sources
Is a Website Down or is My Connection a Problem
World Network Map of the Internet Infrastructure Connections and
Network Access Point
Submarine Cable Map
Submarine Communications Cable
Cable Protection Committee
How the Internet works: Submarine fibre, brains in jars, and
Internet Connection Speed Testing
My Internet Connection Speed
Page Loading Speed Test
Website Speed Test by Country
Rights To Information - Personal Information
Peoples access to
and knowledge is incredibly important.
The Freedom of Information Act
is under constant attack and our
Right to Information
is being denied and even worse it's
also being Manipulated
the Internet being filtered and manipulated means that our
information is in jeopardy. You have to be diligent and prolific
if you want to stay informed and educated about the truth.
Freedom of Information Act (United States)
is a federal freedom of
information law that allows for the full or partial disclosure of
previously unreleased information and
controlled by the United States government. The Act defines
agency records subject to disclosure, outlines mandatory disclosure
and grants nine exemptions
to the statute.
Freedom of Information Laws by Country
of Information Coalition
European Digital Rights
Data Protection Facts
are documents or pieces of information that are not
considered confidential and generally pertain to the conduct of
government. Information includes Records of law court proceedings. Records
of births, marriages, and deaths. Records of land ownership. Statistics
regarding population and the economic activity of a country, to name a
Proprietary information Agreement
also known as a
confidentiality agreement (CA), confidential disclosure agreement (CDA),
proprietary information agreement (PIA), or secrecy agreement (SA), is a
legal contract between at least two parties that outlines confidential
material, knowledge, or information that the parties wish to share with
one another for certain purposes, but wish to restrict access to or by
third parties. It is a contract through which the parties agree not to
disclose information covered by the agreement. An NDA creates a
confidential relationship between the parties to protect any type of
confidential and proprietary information or trade secrets. As such, an NDA
protects non-public business information.
is the control of access to
information or knowledge that might result in loss of an advantage or
level of security if disclosed to others. Loss, misuse, modification, or
unauthorized access to sensitive information can adversely affect the
privacy or welfare of an individual, trade secrets of a business or even
the security and international relations of a nation depending on the
level of sensitivity and nature of the information.
Educational Rights and Privacy Act
is a law that governs the
access of educational information and records.
Information Rights Management
is a subset of digital rights
management (DRM), technologies that protect sensitive information from
unauthorized access. It is sometimes referred to as E-DRM or Enterprise
Digital Rights Management. This can cause confusion, because digital
rights management (DRM) technologies are typically associated with
business to consumer systems designed to protect rich media such as music
and video. IRM is a technology which allows for information (mostly in the
form of documents) to be ‘remote controlled’. This means that information
and its control can now be separately created, viewed, edited &
distributed. A true IRM system is typically used to protect information in
a business-to-business model, such as financial data, intellectual
property and executive communications. IRM currently applies mainly to
documents and emails.
Classified Information Procedures
is material that a government body claims is sensitive
information that requires protection of confidentiality, integrity, or
availability. Access is restricted by law or regulation to particular
groups of people, and mishandling can incur criminal penalties and loss of
respect. A formal security clearance is often required to handle
classified documents or access classified data.
is the relationship between collection and
dissemination of data, technology, the public expectation of privacy, and
the legal and political issues surrounding them. Privacy concerns exist
wherever personally identifiable information or other sensitive
information is collected, stored, used, and finally destroyed or deleted –
in digital form or otherwise. Improper or non-existent disclosure control
can be the root cause for privacy issues. Data privacy issues can arise in
response to information from a wide range of sources, such as: Healthcare
records, Criminal justice investigations and proceedings, Financial
institutions and transactions, Biological traits, such as genetic
material, Residence and geographic records, Ethnicity, Privacy breach,
Location-based service and geolocation, Web surfing behavior or user
preferences using persistent cookies. The challenge of data privacy is to
utilize data while protecting individual's privacy preferences and their
personally identifiable information. The fields of computer security, data
security and information security design and utilize software, hardware
and human resources to address this issue. As the laws and regulations
related to Privacy and Data Protection are constantly changing, it is
important to keep abreast of any changes in the law and continually
reassess compliance with data privacy and security regulations.
List of Personal Information Managers
Copyright Information Websites
Digital Accountability and Transparency Act of 2013
National Security Archive
How to Make an Open Records Request
First review the laws in your state at
Come up with as precise a description as you can of the
documents or records you want. Figure out which office -- school
district, city government, state agency, etc. -- will have the
records or documents you want. Contact that unit of government
and ask them who at the agency is responsible for providing
copies of documents. Prepare your request using the fully
automated, fill-in-the-blanks, state open records letter
generator. Mail or email your request, or deliver it in person.
Make a note on your calendar of the deadline for the agency to
provide you with the documents you've requested.
Expect professional behavior from the custodians of the records
you seek, and behave professionally yourself. If you encounter
resistance, document what happened.
about each state's open records law, including contact
information sorted by state for many school districts and city
and county governments. Many states have organizations devoted
to freedom of information. Don't hesitate to ask for help. If
you will want to share information about the documents you
receive--what the documents say or reveal--consider starting a
does not mean that the knowledge is available to everyone. It
means that there is knowledge, but only if you know where to
find it. And only if you know what questions to ask, and know
which people to talk to.
What would you consider to be
I have been asking that question for
over 7 years, and
here's what I found
(PR) is the practice of managing the spread of
information between an individual or an organization and the
- Full HD 91 min. Director: Vivien Lesnik Weisman.
The Real Danger is not the
, the real danger is
. We must learn to balance freedom of expression with the rights of an individual.
is the suppression
, public communication or
other information which may be considered objectionable, harmful,
sensitive, politically incorrect or inconvenient as determined by
governments, media outlets, authorities or other groups or institutions.
Censorship in the United States
Banned Websites Awareness
You can’t fight diseases, or in this case the dangers of the
Internet, by simply isolating, blocking and filtering websites
or quarantining children because eventually people will be
. You fight diseases or dangers by building the immune
system just like a vaccine does by giving a small amount of the
disease so that the body builds up its immunity to that
The immune system
in this case is a child’s capacity to
think logically and to possess extensive knowledge about vulnerabilities
and hazards that are on TV, the Internet and at the Library. A teacher or
parent needs to explain why certain things are inappropriate, and If a
teacher or parent can not teach this then they must learn. Everyone must
learn about the importance of moral practices and ethical standards
they must also learn why some things in this world do not have moral
practices or ethical standards.
Copyright Infringement Protection
Violate Constitutional Rights.
Freedom of Speech and The First Amendment
Children must learn the difference between being
is insensitive and cruel
. Children must also learn that just
because something is called entertainment does not mean that it
is safe or that it will not have any repercussions or
undesirable affects on the human mind. I'm all for
Protecting Children from
as long as someone teaches
them why it's not suitable and dangerous. But controlling,
limiting or censoring children’s freedoms is not teaching, you
are just delaying the fact that they will make
likely never learn from their mistakes, with some children being
by their mistakes. The only real
protection children have against vulnerabilities and hazards in
our world is a very comprehensive and a very effective
education. Educate children, communicate with children and learn
is a form of Censorship
Coalition Against CensorshipHuman Rights
If you see any connection errors
on any of
the pages on BK101, that means the website might be being blocked and
censored. Your right to be knowledgeable and educated is
being restricted and denied by criminals.
406 Not Acceptable or Server Not Found
The Connection was Reset
the connection to the server was reset while the page was
Webpage doesn't load, shows only a blank white screen, while
other websites load normally.Not
An appropriate representation of the requested resource
could not be found on this server. Error 406 sometimes due to Mod
Security updates on the server. (Refresh Browser Window)
Distributed Denial of Service
(DDoS) Madory, BackConnect had regularly
spoofed internet addresses through a technique known as a “BGP hijack,” an
aggressive tactic that pushes the bounds of accepted cyber-security
industry practices. "Zombie” machines, referred to as botnets. A botnet is
formed of personal computers in homes or offices infected with malicious
code which, upon the request of a hacker, can start flooding a web server
with data. One or two machines wouldn’t be an issue, but if
hundreds of thousands fire such data simultaneously, it can be enough to
cripple even the most sophisticated of web servers.
, the computers
targeted were DNS servers
Protecting Internet Communications during Protests
Are You Safe?
Wireless Mesh Network
Peer to Peer
CommunicationsAnonymous Internet Web Browsing
app connects to the Internet even when you have no data
connection or WiFi
Cuban youth build secret computer network despite Wi-Fi ban
is one of
the most popular ways to access geo-blocked websites.
How to Geek
Virtual Private Network
is another option. These allow you to tunnel your
traffic through an encrypted connection and come out on the
Shellfire Box VPN Evolution
Keezel: Protect your privacy and security online! Portable WiFi
solution that unblocks content worldwide
Turris Omnia: Hi-Performance Open-Source Router
- Long Distance Wi-Fi (Up to 25 KILOMETER range!?)
Linus Tech Tips
How to Unblock US Websites using DNS Proxy
The Information Highway
a free desktop App that delivers fast, reliable and secure
access to the open Internet.
is a free App gives access to websites even if
they are blocked by national or corporate firewalls.
Secure My Email
Text & GPS On Your Phone, No Service Required.
Data Protection - Safe Web Surfing - Encryption
Data Protection Act
Data Protection Directive
Cyber Security Standards
Hackers Could Wirelessly Bug Your Office
Fraud. Pocket-sized protection against
RFID fraud, shielding credit cards to keep personal data safe.
Confidentiality, Integrity, and Availability
CommunicationsProtecting Internet Communications
during ProtestsProtecting the Internet
Privacy - Anonymity
on the Internet
on the Internet is
essentially done anonymously, using unidentifiable pseudonyms. While these
usernames can take on an identity of their own, they are frequently
separated and anonymous from the actual author. Anonymizing services such
as I2P and Tor address the issue of IP tracking. In short, they work by
encrypting packets within multiple layers of encryption. The packet
follows a predetermined route through the anonymizing network. Each router
sees the immediate previous router as the origin and the immediate next
router as the destination. Thus, no router ever knows both the true origin
and destination of the packet. This makes these services more secure than
centralized anonymizing services (where a central point of knowledge
Invisible Internet Project (I2P) is an overlay network and darknet that
allows applications to send messages to each other pseudonymously and
securely. Uses include anonymous Web surfing, chatting, blogging and file
transfers. The software that implements this layer is called an I2P router
and a computer running I2P is called an I2P node.
Tor (anonymity network)
is free software for enabling
anonymous communication. The name is derived from an acronym for the
original software project name "The Onion Router". Tor directs Internet
traffic through a free, worldwide, volunteer network consisting of more
than seven thousand relays to conceal a user's location and usage from
anyone conducting network surveillance or traffic analysis.
is a tool that attempts to make activity on the Internet untraceable. It
is a proxy server computer that acts as an intermediary and privacy shield
between a client computer and the rest of the Internet. It accesses the
Internet on the user's behalf, protecting personal information by hiding
the client computer's identifying information.Anonysurfer
Online Tracking Web Privacy Measurement
Anonabox Tor & VPN Router For Privacy, Bypassing Censorship &
Deterring Hackers to Fund Draper Bio. Project Blue
A Smart VPN Router or secure online surfing and unblocking
websites for All Devices.
desktop application and browser extension to block ads and
is the act of confirming the truth of an
attribute of a single piece of data (a datum) claimed true by an entity.
In contrast with identification which refers to the act of stating or
otherwise indicating a claim purportedly attesting to a person or thing's
identity, authentication is the process of actually confirming that
identity. It might involve confirming the identity of a person by
validating their identity documents, verifying the authenticity of a
website with a digital certificate, determining the age of an artifact
by carbon dating, or ensuring that a product is what its packaging and
labeling claim to be. In other words, authentication often involves
verifying the validity of at least one form of identification.
(who am I?)
is a word or string of characters used for user
authentication to prove identity or access approval to gain access to a
resource (example: an access code is a type of password), which is to be
kept secret from those not allowed access.
refers to metrics related to human
characteristics. Biometrics authentication (or realistic authentication)
is used in computer science as a form of identification and access
control. It is also used to identify individuals in groups that are under
is a biometric technique that uses the unique
patterns on a person's retina blood vessels. It is not to be confused with
another ocular-based technology, iris recognition, commonly called an
is a computer application capable of
identifying or verifying a person from a digital image or a video frame
from a video source. One of the ways to do this is by comparing selected
facial features from the image and a facial database.
is the identification of a person from characteristics of voices
(voice biometrics). It is also called voice recognition. There is a
difference between speaker recognition (recognizing who is speaking) and
what is being said).
Public Key Infrastructure
is a set of roles, policies, and procedures needed to create, manage,
distribute, use, store, and revoke digital certificates and manage
is any cryptographic system that uses pairs of keys: public keys that may
be disseminated widely paired with private keys which are known only to
the owner. There are two functions that can be achieved: using a public
key to authenticate that a message originated with a holder of the paired
private key; or encrypting a message with a public key to ensure that only
the holder of the paired private key can decrypt it.
Public Key Certificate
Scalable Provable Data Possession
Dynamic Provable Data Possession
Lattice-Based Access Control
Protecting of Personal InformationPrivacy Rights
Electronic Privacy Center
Deep Packet Inspection
National Security Archive
Public Data Sources
Information Security Operations Center
Use 256 encryption and a Wpa/wpa2 password
Quantum Key Distribution
Dangers of Anonymity and the Psychological Effects of being Anonymous
Privacy Rights - Surveillance Abuses and Dangers
is the obtaining of information considered secret
or confidential without the permission of the holder of the information.
Espionage Act of 1917
of betraying one's country,
especially by attempting to kill
the sovereign or
overthrow the government
someone who betrays his country by committing treason.
involves a set of rules or a promise that limits
access or places restrictions on certain types of information.
is a form of espionage conducted for
commercial purposes instead of purely national security
a specific type of authorization which permits
an otherwise illegal act that would violate individual rights and affords
the person executing the writ protection from damages if the act is
is to enter a
group or organization in order to spy
is an unlawful surveillance of an entire or a
substantial fraction of a population, often for corrupt purposes.
roving wiretaps, searches of business records, and
conducting surveillance of "lone wolves"—individuals suspected of
terrorist-related activities not linked to terrorist groups, now called
USA Freedom Act
Indefinite Detention without Trial
is the incarceration of an arrested
person by a national government or law enforcement agency without a trial,
and violates many national and international laws
including human rights laws
Motive, and Opportunity
is the codeword for a formerly secret computer
system that is used by the British Government Communications Headquarters
refers to the laws that deal with the regulation
of personal information about individuals, which can be collected by
governments and other public as well as private organizations and its
storage and use. Privacy laws are considered in the context of an
individual's privacy rights or reasonable expectation of privacy.
refers to metrics related to human
characteristics. Biometrics authentication (or realistic authentication)
is used in computer science as a form of identification and access
control. It is also used to identify individuals in groups that are under
is "data [information] that provides information about other data,
relating to emails, telephone calls, web pages, video traffic, IP
connections and cell phone locations. Descriptive
describes a resource for purposes such as discovery and
identification. It can include elements such as title, abstract, author,
and keywords. Structural metadata
how compound objects are put together, for example, how pages are ordered
to form chapters. Administrative metadata
provides information to help manage a resource, such as when and how it
was created, file type and other technical information, and who can access
is the application of individual and collective
cognitive methods to weigh data and test hypotheses within a secret
socio-cultural context. The descriptions are drawn from what may only be
available in the form of deliberately
; the analyst must correlate the similarities
among deceptions and extract a common truth. Although its practice is
found in its purest form inside national intelligence agencies, its
methods are also applicable in fields such as business intelligence or
is the monitoring of computer activity and data
stored on a hard drive, or data being transferred over computer networks
such as the Internet.
Electronic Communications Privacy Act
is to extend government restrictions on wire taps from telephone
calls to include transmissions of electronic data by computer.
Online Tracking - Web Privacy Measurement
comprises a range of technologies and techniques used by online
website publishers and advertisers aimed at increasing the effectiveness
of advertising using user web-browsing behavior information. In
particular, "behavioral targeting uses information collected from an
individual's web-browsing behavior (e.g., the pages that they have visited
or searched) to select advertisements to display".
Tailored Access Operations
is a cyber-warfare
intelligence-gathering unit of the National Security Agency (NSA).
Suspicious Activity Database
NSA Warrantless Surveillance Controversy
is an Israeli company that manufactures data extraction,
transfer and analysis devices for cellular phones and mobile devices.
surveillance program under which the NSA collects
internet communications from at least nine major US internet companies.
is a surveillance program (signals intelligence /
SIGINT collection and analysis network) operated on behalf of the five
signatory nations to the UKUSA Security Agreement—Australia, Canada, New
Zealand, the United Kingdom and the United States, also known as the Five
is the code name of information collected under the
President's Surveillance Program (PSP)
The Nationwide SAR Initiative
Level 3 Communications
is intelligence-gathering by interception of signals or
communications between people.
Global Surveillance Disclosures
program involved wiretapping and sophisticated
analysis of the resulting data.
Automatic Number Plate Recognition
is a technology that uses
optical character recognition
on images to read vehicle registration
plates. It can use existing closed-circuit television, road-rule
enforcement cameras, or cameras specifically designed for the task.
is the monitoring of telephone and
Internet conversations by a third party, often by covert means.
is secretly listening to the private conversation of others without their
WatchHound Cell Phone Monitor
Police officers across the country misuse confidential law enforcement
databases to get information on romantic partners, business associates,
neighbors, journalists and others for reasons that have nothing to do with
daily police work, an Associated Press investigation has found.
Foreign Intelligence Surveillance Act
for the physical and electronic surveillance and collection of "foreign
intelligence information" between "foreign powers" and "agents of foreign
powers" (which may include American citizens and permanent residents
suspected of espionage or terrorism).
is a program intended to develop a
capability to analyze data carried on communications networks like the
Internet. It was intended to track entities using communication methods
such as cell phones and e-mail.
More Corporate Crimes
set criminal penalties for advocating the
overthrow of the U.S. government and required all non-citizen adult
residents to register with the government.
Pentagon to boost cyber security force
is the protection of computer systems from
the theft or damage to the hardware, software or the information on them,
as well as from disruption or misdirection of the services they provide.
"The Insider threat is our own Government, and the
corporations who own our politicians
. Together they're subverting the
FBI Criminal, Cyber, Response, and Services Branch
created in 2002 as part of the U.S. government's
CCRSB is responsible for investigating financial crime, white-collar
crime, violent crime, organized crime, public corruption, violations of
individual civil rights, and drug-related crime. In addition, the Branch
also oversees all computer-based crime related to counterterrorism,
counterintelligence, and criminal threats against the United States.
Let us avoid another Shit Storm
mass collection of information is the same thing that the
did. Our Government claims it's for Security reasons, which we know is a
white lie. You're not using this information on peoples behalf, or to
benefit people, or to protect people, you're using this information to
profit from it, just like any scumbag corporation would. And you're also
selling this information to other scumbag criminals at a hefty price.
And on top of that you're also using this information to manipulate
people, to control people, to blackmail people, and to incriminate people.
You have raped humankind for the last time. It's time for your
rehabilitation, your education, your realization. You are now going to
feel like a child who just realized that the world is not what they
thought it was. And that you're not in power, you're just living in a
delusional dream, which is a reality and a nightmare for everyone else.
But the good news is that you can wake up. Brain Plasticity + Learning =
Change. So all is not lost, we can turn this clusterf*ck around and use
this information, and our information collection abilities, for good
instead of using it for evil purposes. We have a lot to learn, but luckily
humans have brains with enormous memory capacity. Sounds familiar?
I Know There's
Something Going On - Frida
"What are you planning to calculate with those details?"
National Security Letter
is an administrative subpoena issued by the
United States federal government to gather information
security purposes. NSLs do not require prior approval from a judge. The
Stored Communications Act, Fair Credit Reporting Act, and Right to
Financial Privacy Act authorize the United States federal government to
seek such information that is "relevant" to authorized national security
investigations. By law, NSLs can request only non-content information, for
example, transactional records and phone numbers dialed, but never the
content of telephone calls or e-mails. NSLs typically contain a
nondisclosure requirement, frequently called a "gag
", preventing the recipient of an NSL from disclosing that the
FBI had requested the information. The nondisclosure order must be
authorized by the Director of the FBI, and only after he or she certifies
"that otherwise there may result a danger to the national security of the
United States, interference with a criminal, counterterrorism, or
counterintelligence investigation, interference with diplomatic relations,
or danger to the life or physical safety of any person." Even then, the
recipient of the NSL may still challenge the nondisclosure order in
federal court. The constitutionality of such nondisclosure orders has been
repeatedly challenged. The requirement was initially ruled to be
unconstitutional as an infringement of free speech in the Doe v. Gonzales
case, but that decision was later vacated in 2008 by the Second Circuit
Court of Appeals after it held the USA PATRIOT Improvement and
Reauthorization Act gave the recipient of an NSL that included a
nondisclosure order the right to challenge the nondisclosure order in
federal court. In March 2013, district court judge Susan Illston of
Federal District Court in San Francisco struck down the law, writing that
the prohibition on disclosure of receipt of an NSL made the entire statute
impermissibly overbroad under the First Amendment. On August 24, 2015, the
Ninth Circuit Court of Appeals vacated the district court's decision and
remanded the case back to the district court
for further proceedings.
a subpoena issued by a federal agency without
prior judicial oversight. Critics say that administrative subpoena
authority is a violation of the Fourth
to the United States Constitution.
Stored Communications Act
is a law that addresses voluntary and
compelled disclosure of "stored wire and electronic
transactional records" held by third-party internet service providers
(ISPs). It was enacted as Title II of the Electronic Communications
Privacy Act of 1986 (ECPA).
Fair Credit Reporting Act
is U.S. Federal Government legislation
enacted to promote the accuracy, fairness, and privacy of
information contained in the files of consumer reporting agencies.
Right to Financial Privacy Act
gives the customers of financial
institutions the right to some level of privacy from government
Information Awareness Office
in January 2002 to bring
together several DARPA projects focused on applying surveillance and
information technology to track and monitor terrorists and other
asymmetric threats to U.S. national security by achieving "Total
Information Awareness" (TIA).
Mobile Phone Tracking
is the ascertaining of the position or
location of a mobile phone, whether stationary or moving. Localization may
occur either via multilateration of radio signals between (several) cell
towers of the network and the phone, or simply via GPS. To locate a mobile
phone using multilateration of radio signals, it must emit at least the
roaming signal to contact the next nearby antenna tower, but the process
does not require an active call. The Global System for Mobile
Communications (GSM) is based on the phone's signal strength to nearby
Stingray Phone Tracker
is an IMSI-catcher, a controversial
cellular phone surveillance device, manufactured by Harris Corporation.
Initially developed for the military and intelligence community, the
StingRay and similar Harris devices are in widespread use by local and
state law enforcement agencies across the United States and possibly
covertly in the United Kingdom.
is a telephone eavesdropping device used for intercepting
mobile phone traffic and tracking movement of mobile phone users.
Essentially a "fake" mobile tower acting between the target mobile phone
and the service provider's real towers, it is considered a
man-in-the-middle (MITM) attack.
Fake Cell Towers
describes a technology of cell
phone interception and surveillance using a mobile cellular base station
(microcell or picocell). The devices are also known as cell-site
simulators or digital analyzers.
also known as FinSpy, is surveillance software
marketed by Lench IT solutions PLC with a UK-based branch Gamma
International Ltd in Andover, England, and a Germany-based
branch Gamma International GmbH in Munich, which markets the
spyware through law enforcement channels.
Song - Every Breath You Take, By the Police
Glenn Greenwald: Why Privacy Matters
The Third-Party Doctrine
is a United States legal theory
that holds that people who voluntarily give information to third
parties—such as banks, phone companies, internet service
providers (ISPs), and e-mail servers—have "no reasonable
expectation of privacy. A lack of privacy protection allows the
United States government to obtain information from third
parties without a legal warrant and without otherwise complying
with the Fourth Amendment prohibition against search and seizure
without probable cause and a judicial search warrant.
Libertarians typically call this government activity unjustified
spying and a violation of individual and privacy rights.
Naked Citizens - World
Edward Snowden: Here is how we take back the Internet
Surveillance' with Edward Snowden and Shane Smith (FULL EPISODE)
Heather Brooke: My Battle
to Expose Government Corruption
Hubertus Knabe: The Dark Secrets of a Surveillance State
Your Cell Phone Company is Watching
Mikko Hypponen: Three Types of Online Attack
Avi Rubin: All your Devices can be Hacked
Glenn Greenwald: Snowden's Journalist of Choice
Big Brother Big Business:
Another film about Data Mining
and the information War
Repression, FBI Activities, & the AR Movement - Ryan Shapiro
A Video about how your personal information is being sold -
Dispatches - The Data Theft Scandal
Surveillance Cameras don't reduce Crime, they just cause more
crime to happen in other places, like in our Government
America’s Surveillance State 1 (The Surveillance Machine)
TalkingStickTV - Robert Scheer - They Know Everything About You
Eye on You: Citizens Under Surveillance
the 21st century are the focus of prying eyes, whether they
agree to it or not. This investigation identifies the stakes and
scandals of global surveillance and opens up the debate on
our threatened individual freedoms. Aired: 03/27/2016 | 54 min.
Investigation into 21st century
surveillance in the UK and the Investigatory Powers (IP) Bill
currently before Parliament.
How many Cameras does your city have
concept of the design is to allow all (pan-) inmates of an
institution to be observed (-opticon) by a single watchman without the
inmates being able to tell whether or not they are being watched. Although
it is physically impossible for the single watchman to observe all cells
at once, the fact that the inmates cannot know when they are being watched
means that all inmates must act as though they are watched at all times,
effectively controlling their own behaviour constantly. The name is also a
reference to Panoptes from Greek mythology; he was a giant with a hundred
eyes and thus was known to be a very effective watchman.
DronesTime to turn those
cameras around and start filming the real criminals.
officers started wearing
complaints against officers fell 88%, and the
use of force
cameras worked in controlling that criminal behavior of police, then they
will also help control criminal behavior of bankers, presidents,
politicians and corporations. And since we already have enough cameras,
it's just a matter of direction and focus.
are policies that are overprotective and
interfering unduly with personal choice. The term "nanny state" likens
government to the role that a nanny has in child rearing.
Mosaic Theory (intelligence)
is a method used by American
refers to psychological manipulation of people into performing
actions or divulging confidential information. A type of
for the purpose of
information gathering, fraud, or system access, it differs from a
traditional "con" in that it is often one of many steps in a more complex
Home MonitoringThe only
effective counterterrorism is improving education and public knowledge
Google was Asked to Remove 345 Million Pirate Links in 2014
(who's verifying all these requests?)
Cyber Intelligence Sharing and Protection Act
(CISPA) is a
proposed law in the United States which would allow for the sharing of
Internet traffic information between the U.S. government and technology
and manufacturing companies.
United States Foreign Intelligence Surveillance Court
oversee requests for surveillance warrants against foreign spies inside
the United States by federal law enforcement and intelligence agencies.
Fraud and Abuse Act
limiting federal jurisdiction to cases
"with a compelling federal interest-i.e., where computers of the federal
government or certain financial institutions are involved or where the
crime itself is interstate in nature."Songs
Every Breath You
Take, I"ll be watching you - The Police
Me - Rockwell
actually make our computer systems safer and
more stable because hackers make us more aware of our vulnerabilities and
software flaws. This way we can secure them properly, and make
sure our systems have
, as well as,
methods that include protections against
. Where human manual labor is the final step in
guaranteeing that systems operate normally. So this is not just
a software issue, this is a human issue. People need to be
educated about system failures and vulnerabilities, and the options and choices that
we have during these failures. We don't need another 911 where
is used as an excuse for the government and the military to attack
citizens and the internet. "They
cause the problem, and then they try to sell us a cure, which is
not a cure, just part of the same problem."
Cyber War is not our biggest threat, corruption is our
biggest threat, and corruption has been our biggest threat for a
very long time.
and Government Corruption, or Corporate
Corruption, are the same thing.
Corruption are the same thing. Both Actions exploit the system
for profit, just like wall street and the major banks do.
is just another vulnerability in a world that has
thousands of vulnerabilities. And knowledge is our best defense
against ignorance, and vulnerabilities.
"The spying is not all about
, or even
that is the most disturbing is the spying related to
. So you have to ask the question, what are they
paranoid about? Why do they feel weak and insecure? You got
caught with your hands in the cookie jar, but there's no cookie
jar. You know how
manipulating and dangerous
misinformation can be, but can
they tell when it's their own misinformation? When you're asking
the wrong questions, you will never find the answers that you're
hoping to find, so why continue to ask the wrong questions?
You're wasting precious time
Lord of the Flies
. The only way this will work, is
we work together
Whistle Blowing Hero's
Thomas Andrews Drake
Julian Assange WikiLeaks
List of Whistleblowers
Famous Infamous Whistleblowers
allows a defendant who disclosed classified or
protected information to avoid criminality by establishing that the public
interest in disclosure of the information outweighs the public interest in
nondisclosure. It is aimed at protecting whistleblowers of government
is a person who exposes any kind of information or
activity that is deemed illegal, unethical
, or not correct within an
organization that is either private or public.
5 New Whistleblowers
Speak on Exposing Corruption Since Snowden
If you See Something, Say Something
Whistle Blowers Center
Whistleblower Protection Act
Whistleblowers Protection Program
Freedom of the Press
Freedom of Speech
National Security Archive
Whistleblowers (ft. Edward Snowden & David Carr) 2015
CIA and Contras Cocaine Trafficking in the US
Allegations of CIA Drug Trafficking
"Sometimes hero's reap rewards that were
never intended for them, and other times the rewards are not
even rewards at all."
Show (someone) to be involved in a crime.
When you hear someone talk about
that they have witnessed, that is a
cry for help. And people need to respond, because we cannot
always be reliant on a justice system that is corrupt itself, if
we don't act who will? If you have a chance to correct flaws and
mistakes, you should. Even if your search for justice
comes up short, we can still benefit from that experience of
seeking change. Things that you learn can be used towards other
methods of communication. Things that you learn can also be used
to correct other injustices, now and in the future. Sadly we
don't even have one trusted source for information, there's not
one source for trusted information, how can that be?
is our greatest strength. Collectively our power
is limitless, but when we can't communicate effectively, we lose
a tremendous amount of power, wealth and potential. And these
are the things that all humans seek, but the problem is that we
have not yet figured out how to correct our communication flaws.
Our ability to transfer knowledge using language is a gift, we
should not take this ability for granted. Communication is a
power that everyone can share and benefit from.
Nothing to Hide ?
If you have nothing to hide then you have nothing to
which is actually
what an ignorant moron would say.
Most all of us have friends that we can
trust and feel comfortable with, friends who we don't mind
sharing our personal thoughts or secrets with. But, if you had a
friend who was a deviate criminal who couldn't be trusted, a
person who wouldn't mind sharing your personal information or
secrets with other people, other people with other motives then
your friendship, then you would most likely not share any
personal information with that person. So the real question is,
what if that deviate criminal was able to spy on you and
document almost every move
that you make
or every word you speak?
That would suck because you would be always worrying about what
information and knowledge could be
and used against you, or, used against some other
innocent people. Nothing to hide is one thing, something that
can be misconstrued is another, after all, we're talking about
criminals. So I would not want you to be too complacent about
the possible dangers and scams that are on the Internet or any
where else. So please educate yourself, and if you are concerned
about something then please get as many opinions as you can, and
always ask for help from a well trusted source.
"I have nothing to hide so I why should I worry? That
actually means you have nothing between your ears, so yes you
have nothing to hide except your own ignorance. Maybe you have
nothing to hide because you have nothing of value to add to
society, or you just don't care about victims of crimes or the
vulnerabilities of our society, so how do you hide your shame?"
You don't have to worry about your
personal information being exploited by normal and respectable
people, because those people don't care about your personal
information, unless that information provided something of value
to society, in that case they would just ask for your consent.
The real danger is criminals, and those criminals can be from
your government, your businesses, your associates, or any one
involved with criminal activities. So you have nothing to worry
about except criminals. And knowing who exactly the criminals
are is not easy, but not impossible.
Teaching the public extensively about how and where personal
information can be exploited can greatly increase their protection.
Criminals and persons that are steeling and manipulating personal
information are everywhere, in almost every type of business, legal and
illegal. So start educating the young about how this morally destructive
behavior, which in most cases are fueled by greed and power, is wrong on
so many levels that it not just threatens our character, but our survival.
Though the freedom to information is highly essential to our growth, we
must know that criminal minds are not going away anytime soon. So back up
your data and secure it with a trusted friend or relative. It’s not just
about your personal information falling into the wrong hands, it’s more
about your personal information never being found when needed.
or Data Brokers have information on you
that's similar to your
Personal FBI Files
. Your Personal Dossier
Profile can have over 1,500 separate pieces of information:
Political Views, Voting History, Medical History, Psychiatric Problems, Religion, Friends Names,
Family Names, Race, Income, Credit Report, Bank Accounts, SS
#'s, Credit Card #'s, Properties owned, Cars, Weapons, Police
Reports, Drug Problems, Driving Record, Lawsuits, Jobs you had,
Sexual Orientation, Restaurants, Items Purchased, Websites you
visited over the years, Search Words you used, Geo-Location Data
from Cell Phones, and so on and so on.
This Information is mostly used by scumbag
ignorantly believe that they are actually necessary, not even
close. You are a defect in the system that lives off another
, none of which benefits people in the ways it should.
You can use a Disposable Identity or Fake
Identity if you feel the need.
Your Identity Online
The word 'Hacker
is just another
the media uses to manipulate and distract the public from the
A Hacker is just someone who has a unique set of computer skills
and knowledge, which does not make them a criminal. When someone
uses advanced knowledge to commit a crime that does not make
having that knowledge a crime, it only suggests that someone
committed a crime, which still needs to be determined in a court
of law, a court of law that is not corrupt or manipulated.
Corporations and Governments
are involved in criminal
activities everyday. Committing the same crimes that so called
Hackers commit. And corporations and governments are much more
destructive and dangerous to society then any hacker or
terrorist could ever dream of being. So don't allow yourself to
Guy Fawkes Mask
, but not to hide deviate behavior, but to protect
themselves from idiots and criminals.
Not known or lacking marked individuality. Nameless. Being or
having an unknown or unnamed source.
Not prominent or
readily noticeable, Not drawing attention.
Concealment - Shielded:
hide, or conceal from danger or harm. Protected. Kept safe or
defended from danger or injury or loss.
Freedom to act or
judge on one's own. Knowing how to avoid embarrassment or
distress. The power of making free choices unconstrained by
external agencies. The trait of judging wisely and objectively.
PC Threats - Vulnerabilities - Protection Tools
"Making sure that the virus protection doesn't turn into a virus
Nothing to Hide
Keep your Operating System updated To avoid Threats &
PC Problem Solving
If you do online banking:
If you use your bank account to send and receive money make sure
it is not linked to any other bank accounts that you have. This
way you can keep the minimal money needed in your online account
so that you do not risk having all your money being stolen.
When typing in personal information
make sure you see the 'S' after the http ( https:// ) in the
browser address bar. S stands for SSL certificate which is short
for Secure Sockets
Layer. You should see this when putting in personal information
like credit card numbers, social security numbers and passwords.
The SSL help protects you from hackers seeing what you are
typing because what you type is Encrypted. But still this does not
guarantee that your information is safe because of other vulnerabilities
like hackers, key stroke recorders, viruses and fake websites.
A Video about how your personal information is being sold -
Dispatches - The Data Theft Scandal
Big Brother Big Business another film about Data Mining
and the information War
If you use
a credit card for online purchases:
Please have a low credit limit and try to use only one credit
card on the internet. So if that credit card information is
stolen thieves will not be able to make any big charges on your
credit card. If you do need to increase your credit limit to buy
something expensive, then you can call your credit card provider
to increase your credit limit.
This will also keep you from
doing any impulse purchases because you now have to make a phone
call first to ask for the credit increase.
If you have good
credit and you are financially secure you must take extra steps
in order to secure your personal information and finances. One
step is to put a freeze on new accounts being open so that
thieves are not able to get credit cards in your name.
ID Theft Affidavit
Money Management Education
Laptop, Cell Phone and Tablet whenever stolen or missing: Open
source software with full and remote control, 24/7
Temporary Internet files, Cookies, Virus Protection and
a good idea to delete your temporary internet files as well as your
, especially knowing that some tracking cookies
record every website you visit. This way advertisers can
manipulate what adds you see on websites, manipulate what
websites you see in your internet searches and also know what
kind of spam e-mails to send you. They can also sell this
information to others. The Wall Street Journal measured 50 of
the most popular websites and found that they installed a total
of 3,180 tracking files on a test computer. This is very
annoying and intrusive but there are ways to minimize these
types of attacks on your privacy. Each browser has a different
way of clearing these files and cookies so please learn how to
do this yourself so that you can do it once a month. At the top
of your browser window look for 'Tools' and then 'Options' and
learn how to adjust your security settings (Like Private
Browsing, Note: Certain privacy browser settings 'Like Private
and not allowing cookies can cause some of your usernames &
passwords from working). Before you clear the passwords from
your browser make sure you write each one down incase you need
to retype them in later. Always have at least 2 internet
browsers on your PC incase one does not work or gets infected.
Privacy ChoiceULR Query
Mozilla Firefox Lightbeam
(see who's tracking you online)
(stop online advertiser tracking)
A super cookie is a type of browser cookie that is designed to
be permanently stored on a user’s computer. Super cookies are
generally more difficult for users to detect and remove from
their devices because they cannot be deleted in the same fashion
as regular cookies. Super cookies serve the same function as
regular cookies in that they can contain just about any
including browsing history, authentication details
or ad-targeting data.
Browsers for the
Internet that are Free:
Internet Browsers for Kids
is one of the most efficient and effective tools
is a lightweight Windows utility
designed to help users navigate on the Internet in a clean and intuitive working
Browser Usage Stats
Usage Share of Web Browsers
Internet Searching Tips
Internet Access Tools
3rd Party Cookies,
you only need them on certain websites when you are accessing
certain information that requires 3rd party cookies to be
excepted in order for certain software functions to work
properly, like forms or windows that need to open.
Computer Fraud and Abuse Act
Electronic Communications Privacy Act
Keep your Virus Software Up to Date
because that will also help protect your
private information, though it is not a guarantee
1 in 1,000
are infected with
. The moment you visit these infected
websites malicious software or viruses are downloaded to your PC
without you even knowing, so stay protected and be careful what
you click on.
Free Virus Protection - Spyware
yourself from 15 Million Malicious Computer Programs
Lava Soft Ad-Ware
Spybot Search and Destroy
the software above.
Programs Running on PC
Be very careful not to click on the wrong download item. Please
Verify the correct ".exe file."
analyzing web-based malware. It provides detailed information
about the activities a browser does while visiting a site and
presents the information for further analysis.
Know when someone spies on you
Tip: Make up fake answers to the
most common security questions.
Use a VPN. A VPN (virtual private network)
Routing your internet traffic through a middleman server.
Market researchers say nearly 300 billion e-mails are sent each day.
E-Mail Software to help Control Spam
BayesGet pop file
Google Priority-inbox Email Filter
Stop Junk Mail from your Mailman
Stop Annoying Phone Calls:
Do not Call
Get a Human
Direct Company Phone Numbers without Menu.
Call Them All
Mass Calling System
Delivers phone messages to thousands of call
recipients at once.
Hang-up when you are talking, this
way they will think that you were cut off and lost connection.
Don't forget, before you hang up
the phone, make this request below, by law they have to
remove you from the call list.....
" Please put me on your do not call list "