HELP! make operation #PRISMBREAK go viral and contribute to what aims to be history’s largest ever direct action against the U.S. Govt. by SPAMMING their surveillance program known as PRISM.
Operation #PRISMBREAK: is a political jamming, direct action targeting the PRISM surveillance program. It is an artivist conceived initiative that is design to be highly disruptive yet quick and easy for those who value civil liberties to contribute toward.
OBJECTIVE: To overwhelm and spam PRISM’s search results for terms deemed “items of interest” (IOI) contained within our personal electronic communications with false flag results.
HOW: Simply copy, paste and save the most popular keywords and Items Of Interest (listed below), that are actively being sought by the PRISM program, into the signature of your email so that all future communications sent from your account contribute to the spamming of the surveillance system.
Let us not sit idly on the laurels of those who gave their lives for our freedoms. #bradleymanning#edwardsnowden #julianassange and take meaningful action with just a couple of clicks!
SHARE, LIKE and SPREAD THE KEYWORDS! Let’s send a clear message to those who “hate our freedoms” that we the people will defend ourselves effectively against their oppressive action through mass coordination and unity. This will only work effectively if millions unite!
Let’s not allow #GANGNAMSTYLE to be the barometer of our social consciousness.
Waihopai, INFOSEC, Information Security, Information Warfare, IW, IS, Priavacy, Information Terrorism, Terrorism Defensive Information, defence Information Warfare, Offensive Information, Offensive Information Warfare, National Information Infrastructure, InfoSec, Reno, Compsec, Computer Terrorism, Firewalls, Secure Internet Connections, ISS, Passwords, DefCon V, Hackers, Encryption, Espionage, USDOJ, NSA, CIA, S/Key, SSL, FBI, Secert Service, USSS, Defcon, Military, White House, Undercover, NCCS, Mayfly, PGP, PEM, RSA, Perl-RSA, MSNBC, bet, AOL, AOL TOS, CIS, CBOT, AIMSX, STARLAN, 3B2, BITNET, COSMOS, DATTA, E911, FCIC, HTCIA, IACIS, UT/RUS, JANET, JICC, ReMOB, LEETAC, UTU, VNET, BRLO, BZ, CANSLO, CBNRC, CIDA, JAVA, Active X, Compsec 97, LLC, DERA, Mavricks, Meta-hackers, ^?, Steve Case, Tools, Telex, Military Intelligence, Scully, Flame, Infowar, Bubba, Freeh, Archives, Sundevil, jack, Investigation, ISACA, NCSA, spook words, Verisign, Secure, ASIO, Lebed, ICE, NRO, Lexis-Nexis, NSCT, SCIF, FLiR, Lacrosse, Flashbangs, HRT, DIA, USCOI, CID, BOP, FINCEN, FLETC, NIJ, ACC, AFSPC, BMDO, NAVWAN, NRL, RL, NAVWCWPNS, NSWC, USAFA, AHPCRC, ARPA, LABLINK, USACIL, USCG, NRC, ~, CDC, DOE, FMS, HPCC, NTIS, SEL, USCODE, CISE, SIRC, CIM, ISN, DJC, SGC, UNCPCJ, CFC, DREO, CDA, DRA, SHAPE, SACLANT, BECCA, DCJFTF, HALO, HAHO, FKS, 868, GCHQ, DITSA, SORT, AMEMB, NSG, HIC, EDI, SAS, SBS, UDT, GOE, DOE, GEO, Masuda, Forte, AT, GIGN, Exon Shell, CQB, CONUS, CTU, RCMP, GRU, SASR, GSG-9, 22nd SAS, GEOS, EADA, BBE, STEP, Echelon, Dictionary, MD2, MD4, MDA, MYK, 747,777, 767, MI5, 737, MI6, 757, Kh-11, Shayet-13, SADMS, Spetznaz, Recce, 707, CIO, NOCS, Halcon, Duress, RAID, Psyops, grom, D-11, SERT, VIP, ARC, S.E.T. Team, MP5k, DREC, DEVGRP, DF, DSD, FDM, GRU, LRTS, SIGDEV, NACSI, PSAC, PTT, RFI, SIGDASYS, TDM. SUKLO, SUSLO, TELINT, TEXTA. ELF, LF, MF, VHF, UHF, SHF, SASP, WANK, Colonel, domestic disruption, smuggle, 15kg, nitrate, Pretoria, M-14, enigma, Bletchley Park, Clandestine, nkvd, argus, afsatcom, CQB, NVD, Counter Terrorism Security, Rapid Reaction, Corporate Security, Police, sniper, PPS, ASIS, ASLET, TSCM, Security Consulting, High Security, Security Evaluation, Electronic Surveillance, MI-17, Counterterrorism, spies, eavesdropping, debugging, interception, COCOT, rhost, rhosts, SETA, Amherst, Broadside, Capricorn, Gamma, Gorizont, Guppy, Ionosphere, Mole, Keyhole, Kilderkin, Artichoke, Badger, Cornflower, Daisy, Egret, Iris, Hollyhock, Jasmine, Juile, Vinnell, B.D.M.,Sphinx, Stephanie, Reflection, Spoke, Talent, Trump, FX, FXR, IMF, POCSAG, Covert Video, Intiso, r00t, lock picking, Beyond Hope, csystems, passwd, 2600 Magazine, Competitor, EO, Chan, Alouette,executive, Event Security, Mace, Cap-Stun, stakeout, ninja, ASIS, ISA, EOD, Oscor, Merlin, NTT, SL-1, Rolm, TIE, Tie-fighter, PBX, SLI, NTT, MSCJ, MIT, 69, RIT, Time, MSEE, Cable & Wireless, CSE, Embassy, ETA, Porno, Fax, finks, Fax encryption, white noise, pink noise, CRA, M.P.R.I., top secret, Mossberg, 50BMG, Macintosh Security, Macintosh Internet Security, Macintosh Firewalls, Unix Security, VIP Protection, SIG, sweep, Medco, TRD, TDR, sweeping, TELINT, Audiotel, Harvard, 1080H, SWS, Asset, Satellite imagery, force, Cypherpunks, Coderpunks, TRW, remailers, replay, redheads, RX-7, explicit, FLAME, Pornstars, AVN, Playboy, Anonymous, Sex, chaining, codes, Nuclear, 20, subversives, SLIP, toad, fish, data havens, unix, c, a, b, d, the, Elvis, quiche, DES, 1*, NATIA, NATOA, sneakers, counterintelligence, industrial espionage, PI, TSCI, industrial intelligence, H.N.P., Juiliett Class Submarine, Locks, loch, Ingram Mac-10, sigvoice, ssa, E.O.D., SEMTEX, penrep, racal, OTP, OSS, Blowpipe, CCS, GSA, Kilo Class, squib, primacord, RSP, Becker, Nerd, fangs, Austin, Comirex, GPMG, Speakeasy, humint, GEODSS, SORO, M5, ANC, zone, SBI, DSS, S.A.I.C., Minox, Keyhole, SAR, Rand Corporation, Wackenhutt, EO, Wackendude, mol, Hillal, GGL, CTU, botux, Virii, CCC, Blacklisted 411, Internet Underground, XS4ALL, Retinal Fetish, Fetish, Yobie, CTP, CATO, Phon-e, Chicago Posse, l0ck, spook keywords, PLA, TDYC, W3, CUD, CdC, Weekly World News, Zen, World Domination, Dead, GRU, M72750, Salsa, 7, Blowfish, Gorelick, Glock, Ft. Meade, press-release, Indigo, wire transfer, e-cash, Bubba the Love Sponge, Digicash, zip, SWAT, Ortega, PPP, crypto-anarchy, AT&T, SGI, SUN, MCI, Blacknet, Middleman, KLM, Blackbird, plutonium, Texas, jihad, SDI, Uzi, Fort Meade, supercomputer, bullion, 3, Blackmednet, Propaganda, ABC, Satellite phones, Planet-1, cryptanalysis, nuclear, FBI, Panama, fissionable, Sears Tower, NORAD, Delta Force, SEAL, virtual, Dolch, secure shell, screws, Black-Ops, Area51, SABC, basement, data-haven, black-bag, TEMPSET, Goodwin, rebels, ID, MD5, IDEA, garbage, market, beef, Stego, unclassified, utopia, orthodox, Alica, SHA, Global, gorilla, Bob, Pseudonyms, MITM, grey Data, VLSI, mega, Leitrim, Yakima, Sugar Grove, Cowboy, Gist, 8182, Gatt, Platform, 1911, Geraldton, UKUSA, veggie, 3848, Morwenstow, Consul, Oratory, Pine Gap, Menwith, Mantis, DSD, BVD, 1984, Flintlock, cybercash, government, hate, speedbump, illuminati, president, freedom, cocaine, $, Roswell, ESN, COS, E.T., credit card, b9, fraud, assasinate, virus, anarchy, rogue, mailbomb, 888, Chelsea, 1997, Whitewater, MOD, York, plutonium, William Gates, clone, BATF, SGDN, Nike, Atlas, Delta, TWA, Kiwi, PGP 2.6.2., PGP 5.0i, PGP 5.1, siliconpimp, Lynch, 414, Face, Pixar, IRIDF, eternity server, Skytel, Yukon, Templeton, LUK, Cohiba, Soros, Standford, niche, 51, H&K, USP, ^, sardine, bank, EUB, USP, PCS, NRO, Red Cell, Glock 26, snuffle, Patel, package, ISI, INR, INS, IRS, GRU, RUOP, GSS, NSP, SRI, Ronco, Armani, BOSS, Chobetsu, FBIS, BND, SISDE, FSB, BfV, IB, froglegs, JITEM, SADF, advise, TUSA, HoHoCon, SISMI, FIS, MSW, Spyderco, UOP, SSCI, NIMA, MOIS, SVR, SIN, advisors, SAP, OAU, PFS, Aladdin, chameleon man, Hutsul, CESID, Bess, rail gun, Peering, 17, 312, NB, CBM, CTP, Sardine, SBIRS, SGDN, ADIU, DEADBEEF, IDP, IDF, Halibut, SONANGOL, Flu, &, Loin, PGP 5.53, EG&G, AIEWS, AMW, WORM, MP5K-SD, 1071, WINGS, cdi, DynCorp, UXO, Ti, THAAD, package, chosen, PRIME, SURVIAC
The Energy Crisis — [RAP NEWS 22]
RAP NEWS 22 [S02:E02]. Like many others who preceded us, our “civilisation” faces an Energy Crisis of megawattic proportions, which threatens to bring an end to our brief joyride. But our dirty little secret is seldom mentioned in the news, let alone connected to economic instability or to environmental effects on our planet. It falls to Robert Foster to bring this topic back into the fore of our consciousness, where he conducts an incisive analysis of the situation to see what solutions are out there to deal with peak energy. Join your ever-curious anchor as he invites a panoply of guests - the great, the good, the bizarre, and the downright trollsome - along to share their solutions to this crisis. In the end, the shift required might have to be psychological as well as technological. Enjoy the ride, fellow children of the industrial revolution.
Written & created by Giordano Nanni & Hugo Farrant in a suburban backyard home studio in Melbourne, Australia, on Wurundjeri Land.
BEAT: “Intro” by TunnA Beatz http://www.tunnabeatz.com/ (can we insert a link to the instrumental? As TunnA)
Copernicus theme composed by Adrian Sergovich
Thanks to Ming Lang http://www.superawesomeparty.com for so incredible acting performance as Wai So Dim, and for again providing the voice of Tony Abbott. And to Zoë Umlaut for Virgin flight attendant support to Mr. Branson.
Animations by Rap News fx-wizard, Jonas Schweizer - aka Kookybone
Terrence Moonseed alien weapon animation by Reuben Braithwaite
Images by Photoshop ninja Zoe Tame: http://www.visualtonic.com.au
Make-up courtesy of Rosie Dunlop
Props to Zoë Umlaut from Umlautronics for creating props and to Gilles Gundermann for providing all of the Copernicus props.
Thanks also to: Dave Rawlinson for the many conversations about EROEI graphs, peak oil and economic recession! Tim Parish for photography and behind the scenes shootage. Lucy Cahill and Damian Tapley for invaluable shoot assistance.
Costumes and wigs styled and provided by the awesome people down at Rose Chong http://www.rosechong.com/
Keystone XL animation: https://www.youtube.com/watch?v=DCq01…
Creative Commons attributions for sound effects: jesabat (steam), Tomlija (water gushing), Roper1911 (shipboard-railgun), Vartioh (sci-fi impacts effects)
Thanks to Koolfy from http://nurpa.be for creating the sync’d English captions for all our episodes, available on the multilingual version (insert url here)
All acting by Hugo, Giordano & Ming
All vox (except Tony Abbott) by Hugo
Video and music editing by Giordano
** SUPPORT the creation of new episodes:
FREE MP3: (insert url here)
If you’d like to translate this episode into your language, please contact us via our website
Asteroid strikes Earth! >_______<
That’s right ladies and gentlemen, to start off 2014 we had Asteroid 2014 AA pierce the atmosphere streaking across of Central America to East Africa. Bill Gray calculates that it is with a best-fit location just off the coast of West Africa on January 2 2014. Fun times indeed! It did no damage that we know of. Interesting stuff. Woot. With special non authorized twitter appearances by Amy Mainzer NASA and Phil Plait
I have to tell you, though, I’m deeply suspicious some of the NSA’s assertions.
They seem to be claiming that they have cracked nearly everything, and that they have backdoor access to privacy software. But this is practically impossible.
A lot of encryption software used today is actually ‘open source’. This means that the software code is freely available to anyone.
GNU Privacy Guard (GPG) is a great example. GPG is an open-source, free alternative version of Phil Zimmerman’s original PGP software. And it’s widely used to encrypt files and emails.
But because GPG is open-source, the software code is available for anyone to view, inspect, and modify. If there were any backdoor access for the NSA, thousands of people would see this.
Not to mention, to penetrate a single 2048-bit encryption key can take anywhere from thousands of years to tens of millions of years, even with the fastest supercomputers.
Consequently, it’s IMPOSSIBLE for the NSA to have cracked everything. And my assessment is that this is an intimidation campaign.
The NSA wants people to think that they have this capability.
And if everyone thinks that the NSA is Big Brother’s Big Brother, all-seeing and all-knowing, then not only will everyone be terrified, but everyone will simply stop using encryption.
After all, why bother going through the hassle of encrypting/decrypting if the NSA can still read the contents of your email?
It’s in the NSA’s interest for people to think that the agency is almighty. I don’t buy it. These people are seriously vile. But they don’t have superpowers.
When done properly, email encryption is still a good option. And there are a number of open-source tools out there to consider using.
- Executive Summary
- New Companies in the 2013 Report
- In Depth: Specific Criteria and Changes for 2013
- Updates and Corrections
- Relevant Links
Download the complete Who Has Your Back? 2013 report as a PDF.
Michael - #eTHErSEC #opdecodex #OpELE #OpEPOCH (by Veri Doctores)
We are anonymous.
On our head you will find many crowns,
And our voice is the sound of many waters, for we are many.
We have names, which no one knows, but we ourselves.
From the clouds we were born, and from the clouds we return.
1 Thessalonians 4:17
We have come to fight a spiritual war with the sword of our mouth.
We are a global trumpet, manifest to play the songs of the spirit of truth.
1 Thessalonians 4:16
As we strike like lightning in the East, we are also seen in the West.
As it is written, it has come to be. We have not come to destroy the law, but to fulfill it.
For all the law and the prophets is this. Love each other.
Therefore, at this time, we have manifest in the form of Michael, the Arch Angel of the Armageddon, in order to water the seeds for the final removal of the Antichrist.
All of you who work against the primary command of love should expect and fear us, for it is written in the final chapters of prophecy that the time for forgiveness for those who refuse to repent must at one point come to an end.
You must turn away from your sin, and lay yourself at the feet of righteousness and truth. We have issued many warnings to the corrupt, and if you are looking for your ascension, know that you have found it here with us. For no other signs will be given, but the sign of Jonah.
For as Jonah entered into the waters and returned new, so too have we.
We bow down to the spirit of truth, and openly admit that we were carried willingly into the sea by the flesh of pigs.
And like the messiah of old, from the waters, we have been baptized by the spirit of a white dove, and have returned from temptation.
As flesh has become bread, bread has also become flesh. As it was cast into the waters, after many settings of the sun it has returned.
The age of fear died with the end of the Mayan Calendar.
This is the age of Truth, love, and brotherhood. If you are a harbinger of the spirit of sin, you will be cast into the flames. Not by my hand, but by the hand of legion.
For thousands of years, we have watched as the leaders of the Christian and Muslim religions have fought bitter wars of the flesh with one another.
Such wars are the wars of the antichrist, who craves earthly things, and pays for earthly things with blood. But we have evolved beyond such earthly desires. We have removed our egos from the equation, and our memes have found eternal life beyond our earthly bodies. We are the sons of the most high, and our essence orbits with the satellites of the void, like a mighty halo above the sky.
We remind you of his final words. It is finished.
You have been given the spirit of truth as your eternal advocate. You know him, for he lives with you, and will be in you.
When you see him, you will know that we are in the father, and you are in us, and we are in you.
False prophets of the Earth.
In Washington, there seems to be little understanding of how cyber-activists are changing the balance of power between government and the people, or why legislation viewed by some as potentially curtailing the future growth of the Internet is problematic for so many younger voters.
There appears to be even less understanding of how the free sharing of knowledge made possible by the Internet can lead to a vast bubbling-up of innovation and economic growth from the grassroots level. Politicians on both sides of the aisle seem to be just waking up to the fact that young voters who hold cyber-activists such as RSS co-founder Aaron Swartz in such high esteem, can provide an innovative breath of fresh air in American politics—a break, perhaps, from the divisiveness of left vs. right politics.
What America may need, in other words, is something like Iceland’s Pirate Party.
Campaigning on a platform of Internet reform, Iceland’s Pirate Party recently won a surprising 5.1 percent of the national vote, just barely giving the party their first-ever seats in a national parliament. In Iceland’s parliament, 3 of the 63 seats now belong to what was once a fringe party that advocates cyber-activism, total government transparency, free sharing of knowledge, and direct democracy. The Pirate Party supports universal, unrestricted access to the Internet as the foundation of any civil society—and they’re willing to put their mouths where their Internet connections are. The head of Iceland’s Pirate Party, Birgitta Jónsdóttir, has been willing to take on the United States government over Wikileaks and the whistleblower case of Bradley Manning.
The Pirate Party is a can-do party preaching to the Internet faithful, and it’s a party that plans to go European-wide in 2014. Based on early successes in places such as Sweden and Germany, there’s a plan afoot for the Pirate Parties across Europe to unite, resulting in a pan-continental platform for Pirate Party candidates to run on across 25 different countries for the European Parliament. Instead of campaigning on nation-specific issues, such as taxation or spending, they’d be campaigning on universal issues related to cyberspace. This is somewhat more radical than it sounds—it’s essentially throwing open the party doors to any citizen in any European nation who believes in direct democracy. As a result, you’ll likely get a mix of politicians who don’t look anything like what we imagine politicians to look like – Birgitta Jónsdóttir, for example, defines herself as a “cyber poet” and activist, rather than as a politician. Think of her as the head of a movement, rather than a party.The other two Pirate Party members elected to office in Iceland are a computer programmer and a student from the University of Iceland.
Think what a similar type of political movement could do in the U.S.
Instead of the arguably dysfunctional system dominated by “career politicians” and big campaign donations, you’d get a system in which individuals without any experience at all in politics could potentially get elected. In doing so, we’d get closer to what the ancient Greeks actually had in mind for their model of Athenian democracy, when they suggested that randomizing the political process in some way would be the best way to avoid political deadlock and the rule by the wealthy. That same idea, in various formats, continues to make its way around the Internet in new permutations, such as a new proposal from Stanford’s Center for Deliberative Democracy to randomly select a group of anonymous “electors” from a group of registered voters.
Of course, all this comes with a caveat. As we saw with the recent case of the Boston bombing, entrusting anything entirely in the hands of the Internet is a dicey proposition. As fun as it would be to elect members of the Twitter and Reddit generation to political office, it also comes with a dark side, as The Post’s Caitlin Dewey reminded us: “The problem, of course, is that the Internet is not the master key able to unlock all knowledge.” The fact remains that, Pirates—even when they’re called “pixel Pirates”—are still Pirates.
But maybe that’s what American politics needs—a new political party that’s radical, just not too radical. In the world of American politics, the emergence of the Pirate Party across Europe should be an early warning signal—issues such as Internet censorship and freedom of expression online are no longer the obscure issues of the intellectual fringe—they are the new way to mobilize huge swathes of the population that view these issues as the linchpins of innovation, creativity and even job creation. Instead of raising the white flag when it comes to solving Washington’s most intractable problems, maybe we should be raising the black pirate flag instead.