Friday, June 13, 2015 - [[[[[[[[[[[[[[[[[[[[[[ National Whistleblower Center ]]]]]]]]]]]]]]]]]]]]]]

Friday, June 13, 2015 - [[[[[[[[[[[[[[[[[[[[[[ National Whistleblower Center ]]]]]]]]]]]]]]]]]]]]]]
[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[ Disseminate Widely ]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]

Monday, August 11, 2014 - [[[[[[[[[[[[[[[[[[[[[[[[[ Project - N.N.O.M.Y ]]]]]]]]]]]]]]]]]]]]]]]]]]

Monday, August 11, 2014 - [[[[[[[[[[[[[[[[[[[[[[[[[ Project - N.N.O.M.Y ]]]]]]]]]]]]]]]]]]]]]]]]]]
[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[ The National Network Opposing The Militarization of Youth ]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]

Monday, August 11, 2014 - [[[[[[[[[[[[[[[[[[[[[[[[[[ Project - Y.A.N:D ]]]]]]]]]]]]]]]]]]]]]]]]]]]

Monday, August 11, 2014 - [[[[[[[[[[[[[[[[[[[[[[[[[[ Project - Y.A.N:D ]]]]]]]]]]]]]]]]]]]]]]]]]]]
[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[ The National Network Opposing The Militarization of Youth ]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]

Sunday, July 13, 2014 - [[[[[[[[[[[[[[[[[[[[[ One Nation Under Surveillance ]]]]]]]]]]]]]]]]]]]]]]

Sunday, July 13, 2014 - [[[[[[[[[[[[[[[[[[[[[ One Nation Under Surveillance ]]]]]]]]]]]]]]]]]]]]]]
[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[ Disseminate Widely ]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]

Saturday, January 18, 2014 - [[[[[[[[[[[[[[[[[[[ Nullify The NSA - OFFNOW.org ]]]]]]]]]]]]]]]]]]]]

Saturday, January 18, 2014 - [[[[[[[[[[[[[[[[[[[ Nullify The NSA - OFFNOW.org ]]]]]]]]]]]]]]]]]]]]
[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[ Disseminate Widely ]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]

Saturday, January 18, 2014 - [[[[[[[[[[[ Whatis Taxed.com - Income Tax Research ]]]]]]]]]]]]

Saturday, January 18, 2014 - [[[[[[[[[[[ Whatis Taxed.com - Income Tax Research ]]]]]]]]]]]]
[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[ Stop Funding Criminal Government - Disseminate Widely ]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]

Thursday, Sept 11, 2014 - [[[[[[[[[[[[[[[[[[[[ The Lone Gladio By Sibel Edmonds ]]]]]]]]]]]]]]]]]]]

Thursday, Sept 11, 2014 - [[[[[[[[[[[[[[[[[[[[ The Lone Gladio By Sibel Edmonds ]]]]]]]]]]]]]]]]]]]
[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[ Disseminate Widely ]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]

Thursday, Sept 11, 2014 - [[[[[[[ Bin Laden Worked With U.S. Government After 9/11 ]]]]]]

Thursday, Sept 11, 2014 - [[[[[[[ Bin Laden Worked With U.S. Government After 9/11 ]]]]]]
[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[ Disseminate Widely ]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]

Thursday, Sept 11, 2014 - [[[[[[ U.S. Government 'Directly Involved' In Terror Plots ]]]]]

Thursday, Sept 11, 2014 - [[[[[[ U.S. Government 'Directly Involved' In Terror Plots ]]]]]
[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[ Disseminate Widely ]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]

Thursday, October 12, 2015 - [[[[[[[[[[[[[[ The Attacks Will Be Spectacular ]]]]]]]]]]]]]]

Thursday, October 12, 2015 - [[[[[[[[[[[[[[ The Attacks Will Be Spectacular ]]]]]]]]]]]]]]
[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[ Disseminate Widely ]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]

Thursday, Sept 11, 2014 - [[[[[[[[[[[ Reality Check More Americans Rethinking 9/11 ]]]]]]]]]]

Thursday, Sept 11, 2014 - [[[[[[[[[[[ Reality Check More Americans Rethinking 9/11 ]]]]]]]]]]

Thursday, Sept 11, 2014 - [[[[[[[[[[[[[[[[[[[[[[[[ We Will N.E.V.E.R. Forget ]]]]]]]]]]]]]]]]]]]]]]

Thursday, Sept 11, 2014 - [[[[[[[[[[[[[[[[[[[[[[[[ We Will N.E.V.E.R. Forget ]]]]]]]]]]]]]]]]]]]]]]
[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[ N.E.V.E.R. Forget ]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]

Cost of War to the United States

TOPs Internet TIPS

Countermeasures Research - Original Research Archive 

Stratagies: The Hack Proof Network: TSCSTopo 

Send a email to tscscorp@gmail.com for password. 

(((3)))

The research herein provided is research that as a TI I've learned , developed and exercised. As such, it's important to note that the research consists of several different disciplines to countermeasure the effects of covert physical, electronic and psychological torture.

Strategies are also discussed and offered as an means to help deal with abhorrent government (a) buse of power that all TI's are subjected to. For emphasis, strategies are different for every individual and great care should be taken to keep what strategies that are working for you discreet as to not allow the Perps inroads insomuch as to how you're defeating them.

Effectively, the internet has allowed the government to spy on Americans with reckless impunity. More important, is that the internet is another avenue of approach into our minds and is part of the torture matrix network. When one considers current mind control patients and how they are used in conjunction with the internet to control our minds using math algorithms it's clear that we must develop defenses against such technology.

That being said information herein consist of low cost countermeasures that can be implemented to effectively countermeasure technology that is destroying our freedoms here within the United States of America.

EFF[US Govt. Spy Group] Posts Documents Detailing Law Enforcement Collection of Data From Social Sites

* Detecting Packet Injection: A Guide to Observing Packet Spoofing by ISPs 

* Glasnost: Bringing Transparency to The Internet  

* Test Your ISP

* Switzerland Network Testing Tool

* MLABs 

* GRC Port Authority 

* Comodo Free Products

* PortableApps.Com

In recent news SOS the need for encrypted web surfing is one of the most effective actions one can take in protecting their privacy. Listed below are some countermeasures that will enhance your surfing privacy whilst surfing the internet: A Great Free Resource I2PNetwork - Need This

* Stealthier Internet Access - Archive Copy Here

* Encrypt the Web with the HTTPS Everywhere Firefox Extension.

* Ixquick http (s) Search is Considered The World's Most Private Search Engine.

* Ixquick Protects Your Privacy!: The only search engine that does not record your IP address.

Your privacy is under attack ! Government Uses Social Sites for More than Investigations

Every time you use a regular search engine, your search data are recorded. Your search terms, the time of your visit, the links you choose, your IP address and your User ID cookies all get stored in a database. The identity profiles that can be constructed from this cloud of information represent modern day gold for marketers. But government officials, hackers and even criminals also have an interest in getting their hands on your personal search data. And sooner or later they will !

Another great free product is JonDoNYM that works with the Firefox web browser and don't forget Hotspot Shield for wireless access points.

The JonDonym anonymous proxy servers technology is based on the principle of multiple (layered) encryption, distribution and processing (Mixing). This unique procedure does not only protect your internet activities from being observed by third parties: also the individual JonDonym anonymous proxy providers (Mix operators) cannot follow your steps. Each internet/web access is individually anonymised. EFF.org

Another important measure is to turn off "geo location" in your web browser. Below are instructional links for Opera, Firefox, Safari, and Chromium "geo location" settings: See: Private browsing modes in four biggest browsers often fail ...STUDY HERE

NOTICE: Thunderbird also has a GeoLocation Aware setting under "options - config editior" ---

* Geolocation - Setting your position manually.

* Disable GeoLocation in Safari browser

* Turn off GeoLocation aware browsing in Firefox

* Disable GeoLocation tracking feature in Chrome

* Disable GeoLocation feature in Opera

A few nice tools to help keep your PC safe:

* ENCRYPTSTICK - Magic Jack - Panopticlick - Hide My IP - System Internals

* FlashCookiesView Download - Firefox Better Pirvacy - BCWipe

* Tracker Scan - Opt - Out - Tribal Fusion - Firefox Tracker Scan Add-on - SandBoxie - Ccleaner

* Malwarebytes - ClamWin Antivirus - ClamWin Daily Updates - Firefox Request Policy Add-on

* Firefox Add-on Greasemonkey Add-on - Userscripts.org - SpyBlaster - Wireshark

* Wireless Security Howto - PortableApplications - Certificate Patrol Firefox Add-On

* Https Everywhere Firefox Add-On - Hide Your IP Address - MLAB - Switzerland Testing Tool

* MVPS.org - Home of the MVPS HOSTS FileHosts File FAQ

* Blocking Unwanted Parasites with a Hosts FileHostsMan

* Dealing with Unwanted Spyware and Parasites - HostsXpert [B]

* GFI Email Security Testing Zone - SpywareInfo Forum - hpHosts [B]

* Alliance of Security Analysis Professionals - Internet Countermeasures

Encryption is another important step in protecting your online communications.  

Thunderbird is a MTA mail transport agent and is a excellent email client that offers built in encryption. Here are some videos links explaining how to install GPG4Win:

* GnuPG Tutorial Part 1: Installation

* GnuPG Tutorial Part 2: Generating Keys

* GnuPG Tutorial Part 3: Exchanging Keys

* GnuPG Tutorial Part 4: Importing Keys

* GnuPG Tutorial Part 5: Encrypting

PGP is the industry standard for encryption and have several videos for simple how too located here: PGP Data Encryption. Some more useful encryption tool are:

* The GNU Privacy Guard

GnuPG is the GNU projects complete and free implementation of the OpenPGP standard as defined by RFC4880 . GnuPG allows to encrypt and sign your data and communication, features a versatile key management system as well as access modules for all kind of public key directories. GnuPG, also known as GPG, is a command line tool with features for easy integration with other applications. A wealth of frontend applications and libraries are available. Version 2 of GnuPG also provides support for S/MIME.

GnuPG is Free Software (meaning that it respects your freedom). It can be freely used, modified and distributed under the terms of the GNU General Public License.

ENCRYPTION FOR DISKS AND MEMORY STICKS!

* FREE SafeHouse Explorer

SafeHouse Explorer is FREE encryption software which we're making available to everyone as a free download in order to promote data privacy and help you to protect your confidential files. This FREE security software is full featured and will never expire!

* PrivyPad 2.52 256bit Encryption

PrivyPad lets you create, edit, read and e-mail encrypted and plain text files with this Notepad-like text editor. It supports 4 strong encryption/decryption algorithms: BLOWFISH, Triple DES(3DES), RIJNDAEL(AES) and XOR. It allows to perform up to 100 encrypting/decrypting steps on highly sensitive information to ensure its highest level of protection and security.

Use this utility to protect your private info, to encrypt/decrypt a secret document or file, to store business and credit card data or to keep any other strictly confidential data. This software can also be used as a password and electronic key keeper.

With this tool you can send and receive an encrypted message through your default email client such as Microsoft Outlook Express or Eudora, and through popular Internet e-mail services such as Yahoo! Mail, Hotmail, AOL Mail, etc. This application can also be used for creating, editing and printing of a .txt, .html or any other text file. It is a very reliable, intuitive and easy-to-use program.

* Steganography: Hiding Data Within Data - Stools

* Information Hiding: Steganography & Digital Watermarking

* The ancient art of hidden writing

Steganography applications conceal information in other, seemingly innocent media. Steganographic results may masquerade as other file for data types, be concealed within various media, or even hidden in network traffic or disk space. We are only limited by our imagination in the many ways information and data can be exploited to conceal additional information.

For many years Information Hiding has captured the imagination of researchers. Digital watermarking and steganography techniques are used to address digital rights management, protect information, and conceal secrets. Information hiding techniques provide an interesting challenge for digital forensic investigations. Information can easily traverse through firewalls undetected. Research into steganalysis techniques aids in the discovery of such hidden information as well as leads research toward improved methods for hiding information.

Voice encryption - are they safe? Many voice encryption systems are hackable says anonymous researcher

BlackBerry Bans Suggest a Scary Precedent! Crypto Wars Again?

* SAFE tALK

Safe & Talk is a software solution that enables you to make encrypted secure calls over GSM network with an extreme reliability; other than that, Safe & Talk allows you to encrypt your sms!

* PhoneCrypt: What is PhoneCrypt

PhoneCrypt is advanced voice encryption technology offering businesses, professionals and individuals a solution to traditional insecure phone systems. PhoneCrypt is simple to use, and applies the strongest encryption available to preserve confidentiality and privacy. PhoneCrypt offers solutions for traditional phone systems, VOIP based systems, and mobile phones.

* The Zfone™ Project

Zfone™ is my new secure VoIP phone software which lets you make secure encrypted phone calls over the Internet. The ZRTP protocol used by Zfone will soon be integrated into many standalone secure VoIP clients, but today we have a software product that lets you turn your existing VoIP client into a secure phone. The current Zfone software runs in the Internet protocol stack on any Windows XP, Vista, Mac OS X, or Linux PC, and intercepts and filters all the VoIP packets as they go in and out of the machine, and secures the call on the fly. You can use a variety of different software VoIP clients to make a VoIP call. The Zfone software detects when the call starts, and initiates a cryptographic key agreement between the two parties, and then proceeds to encrypt and decrypt the voice packets. It has its own little separate GUI, telling the user if the call is secure.

Now that you have secured your data at the local host, your online surfing, your email communications we will discuss a few free tools to secure your internet circuit:

* Zentyal UTM - Linux Small Business Server

Zentyal can act as a Gateway, Infrastructure Manager, Unified Threat Manager, Office Server, Unified Communication Server or a combination of them. One single, easy-to-use platform to manage all your network services. Also, performs the following roles; Active directory Automatic failover Backup Centralized management Certification authority DHCP DNS Dashboard Filtering Firewall Groupware HTTP proxy IM Infrastructure Intrusion detection system LDAP replication Load balancing Mail server Monitoring Multi-gateway support NAT NTP Network Open Source Reporting Resource sharing Routing / Router Server Small business Traffic rate Traffic shaping Users and groups VLAN VPN VoIP Web server Workgroup

* SmoothWall Express 3.0

The SmoothWall Open Source Project was set up in 2000 to develop and maintain SmoothWall Express - a Free firewall that includes its own security-hardened GNU/Linux operating system and an easy-to-use web interface.

* Endian UTM

Endian UTM Software offers the same technology that resides in the Endian Unified Threat Management (UTM) appliances, allowing you to turn any PC into a full-featured security appliance. Unleash the power of Endian UTM using your preferred hardware to enable comprehensive security for your entire network infrastructure. Integrated security services such as stateful inspection firewall, VPN, gateway anti-virus, anti-spam, web security, and email content filtering offer granular protection in a single system, reducing management time and costs. Endian designed the Software UTM to meet the needs of every business from small to large.

* Untangle UTM

Untangle provides a secure Internet Gateway that acts as your first line of defense against all of these risks. The Untangle Gateway puts you back in control. Our web filtering solutions ensure that employees can only see what you want them to see online, avoiding the risk of one of your staff being offended by a colleague’s web browsing. These same web filters ensure that your staff stay focused on work-related matters, too, especially whilst you’re out of the office meeting with clients. At the same time, Untangle protects the computers in your business from outside attacks. By preventing unwanted intrusions into your network and protecting against Trojans entering your systems, you protect against loss of customer data.

 * Vyatta - Firewall - IPS

The free community Vyatta Core software(VC) is an award-winning open source network operating system providing advanced IPv4 and IPv6 routing, stateful firewalling, IPSec and SSL OpenVPN, intrusion prevention, and more. When you add Vyatta to a standard x86 hardware system, you can create an enterprise grade network appliance that easily scales from DSL to 10Gbps. Vyatta is also optimized to run in VMware, Citrix XenServer, Xen, KVM, and other hypervisors, providing networking and security services to virtual machines and cloud computing environments. Vyatta has been downloaded over 600,000 times, has a community of hundreds of thousands of registered users and counts dozens of fortune 500 businesses among its commercial customers.

Don't forget EMI/RFI & DIGITAL FILTERS You need to get at least a 80db and up EMI/EMF filter; most do offer 50db +; the more the better.

* EMI Solutions

* X2Y for EMI Filtering

* APC Performance SurgeArrest
Below are some of the 'Security" advisories sites that I visit often in ascertaining what virus, malware, security vulnerabilities that are current and need to be aware of:

Secunia - Stay Secure Advisories

* The Center For Internet Security

* Electronic Frontier Foundation

* Electronic Privacy Information Center

* Ubuntu Security Advisories

* IT Security Ubuntu Resource

* Microsoft Security Bulletin Advisories

* Network Security Journal

* Cisco IronPort Email/Web Security

* Cisco Security Advisories, Responses and Notices

* TREND M I C R O - Threat Encyclopedia

* Bruce Schneier on Security

* Snopes: Reference Scam Resource

* CNET - Computer And Internet Security

* CNET Security Starter Kit 

* eWeekly Security Article Archive

* Surveillance Self-Defense International

* SOPHOS Security Analysis

* Linux Security Advisories

* BELNET CERT Advisories

* Apple Security Updates

* VMWare Security Advisories

* SecurityFocus Security Advisories

* FreeBSD Security Advisories

* UNIX Security Advisories

* UNIX Security Sites 

TOPs Blogger Role