Category: Privacy

All Things DARPA: The Newest Stuff

Follow @PhotonicPortal on Twitter!

We all know that we will never REALLY know what it is that #DARPA has secretly achieved in recent decades under various names, alphabet letters and guises, but what they DO allow us to see is just plain amazing. Here are a few choice gems from today’s #science and #militarytechnology search. Check this blog’s new DARPA Page for the latest updates every week or so.

DARPA Earlier Achievements:

Copyright 2012-3012 Photonic Portal 2037 All Rights Reserved. Re-posts OK w/ content, blog name, URL & copyright intact. 100% reader supported: Shop here!  Subscribe to our YT video feed here. Subscribe to Photonic Portal 2037 Feedburner feed here. Follow @PhotonicPortal on Twitter.

Yahoo.com’s Email Privacy Policies, Datamining Accounts Without Your Consent

Headquarters of Yahoo! next to Mathilda Avenue...

Yahoo's Headquarters in California

Copyright 2011-3011 Alternative News Forum, All Rights Reserved.

Privacy is disappearing on the web, and the only real way to avoid having details about your life posted without your permission or consent is to NOT use the internet. Since many millions now depend on the web, this is not an option that works. I recently found out that all my yahoo.com emails were being read by someone, somewhere, on their back end, and the salient details about me were being harvested from them. This is also called “data mining.”

I was in a dialogue with a distant relative via email. This relative had not seen or heard from me in 20 years. I temporarily forgot where I was during our email exchange [which was on Yahoo.com email ] and told her my age.

Within 48 hours my age appeared in my Youtube.com channel, without my consent, without my permission and without me even knowing it until I logged and found it posted. I quickly deduced where this information had been datamined from. Someone from Yahoo.com had provided it to Google, which owns Youtube and it appeared in my Youtube account so quickly I was stunned. And furious too.

I need to warn all readers and subscribers not to EVER discuss anything of a private or confidential nature on yahoo.com email. Your emails are being archived, examined and harvested for details about you with each send.

I learned the hard way. What made this worse is that there is NO function now operative in the new youtube.com settings where you can remove your age from their database. Now every time I log into youtube my channel is hammered with ads for a certain age group that I have no interest whatsoever in viewing or clicking. Below are yahoo.com’s protocols for “deactivating” and then eventually deleting your account. All information that passed through the account, as far as I can tell from their statements, may be stored on their servers indefinitely. Not good.

Here it is. Read, and learn.

CK Hunter

Data Storage and Anonymization

In order to provide products and services, Yahoo! collects and stores information from user account registration and site usage. Yahoo!’s policy is to de-identify user log file data within 90 days of collection, with limited exceptions to fight fraud, secure systems, and meet legal obligations. Yahoo! takes additional steps so that data collected and used to customize interest based advertising and some content on Yahoo! are not associated with personally identifiable information. Yahoo! is committed to continuous improvements and implementation of our data protection and de-identification measures.  We describe the data we store, our processes and your choices in more detail here.

Account Information

  • When you register with Yahoo! or submit information to Yahoo!, a temporary copy of that information is routinely made to prevent accidental loss of your information through a computer malfunction or human error.
  • Yahoo! keeps your account information active in our user registration databases in order to provide immediate access to your personalization preferences each time you visit Yahoo!.
  • If you ask Yahoo! to delete your Yahoo! account, in most cases your account will be deactivated and then deleted from our user registration database in approximately 90 days. This delay is necessary to discourage users from engaging in fraudulent activity.
  • Please note that any information that we have copied may remain in back-up storage for some period of time after your deletion request. This may be the case even though no account information remains in our active user databases.

Servers Log Files

  • The Yahoo! computers (called “servers”) that send your web pages and advertising banners process and store an enormous amount of information every day. These computer records are called “log files”.
  • Log files are used for analysis, research, auditing, and other purposes, as described above. After this information has been used, it is stored and is inaccessible. Until the information is stored, your Yahoo! ID may remain in our active server log files.

Anonymization/de-identification

  • Anonymization is a process of removing or replacing personal identifiers in data records so that the resulting data is no longer personally identifiable. This is also referred to as de-identification. We use these terms interchangeably.
  • Yahoo! uses a multi-step process to replace, truncate, or delete identifiers in order to de-identify data.

Log file anonymization

  • Yahoo!’s anonymization policy applies to user log file data and includes searches, ad views, ad clicks, page views and page clicks.
  • Yahoo! stores this data in an identifiable form for up to 90 days for most log file data.
  • There are certain exceptions to this policy. Yahoo! will store a limited amount of log file data in identifiable form for up to 6 months for select log file systems involved in product and financial fraud detection and abuse management. There are also exceptions for legal obligations.

Your Interests and Yahoo!

  • Yahoo collects and maintains information about your interests based on your web surfing activity when you are visiting the branded Yahoo! network of web sites as well as when you are visiting other websites in the Yahoo! advertising network.
  • Yahoo! maintains information in both identifiable and de-identified forms. When you are signed-in to the Yahoo! network, Yahoo! associates your observed interests and activity with your Yahoo! account.
    • When you log in to your Yahoo! account, a cookie is placed on that computer which contains information about your interests. This is stored on the hard drive of whatever computer or device you are using when you log in. Your browsing habits on your work computer or a library computer may affect the kinds of advertisements you see when using your home computer.
    • Information that Yahoo! collects related to your activities and interests on and off the Yahoo! network is maintained by Yahoo! on its servers and is associated with Yahoo! cookies regardless of what computer or device you use to sign in to Yahoo!.
    • If you are a Yahoo! registered user who is not signed-in, Yahoo! will continue to store information about your interests based on a unique browser cookie. This cookie is an encrypted (or “one-way secret hashed”) form of a Yahoo! cookie that is de-identified from your Yahoo! account information. This de-identified cookie cannot be used by any third-parties to identify you.
    • When you are not signed in to Yahoo!, Yahoo! will use this encrypted cookie and its stored associated interest information, to match advertisements and content to your interests.

Your Preference and Opt-out Choices

  • To see and/or customize the information that Yahoo! has stored about interests that we use for advertising customization, you can visit our Ad Interest Manager. Ad Interest Manager allows you to opt out of one or more specific interest categories or opt out of all interest-based ads that Yahoo! serves.
  • Yahoo! refreshes cookie information for registered Yahoo! users each and every time you log in to Yahoo! on whichever computer or device you are using at that time. Accordingly, if you do not want Yahoo! to store your interests to deliver more relevant advertising, deleting your cookies will not be an effective way to express this choice. Instead, you should use the persistent opt-out that Yahoo! provides for you. If you are signed-in when you exercise the opt-out, your opt-out cookie will be refreshed each time you log in to Yahoo! – even if you have had previously deleted your cookies and/or moved to a new computer.
  • You can visit the Network Advertising Initiative site to see other networks that you may want to opt-out of or to use other tools to manage your opt-out choices.

My Zip Code is My Business, Not Yours, California

PC054257

Image by @@ i-cha-ri-ba-cho-de @@ via Flickr

Copyright 2011-3011 By Chase Kyla Hunter, All Rights Reserved.

One of the many odd things I noticed as I traveled through California during 2009 was the peculiar new invasion of personal privacy that occurred at the grocery check-out counter. After ringing up your groceries the clerk would ask you for your zip code when you began to pay. I would invariably reply:

1-2-3-4-5-6 or

blah-blah-blah-blah-blah-blah,

and then stare blankly at the poor befuddled clerk, who was usually someone long accustomed to doing whatever someone in authority told he or she to do, without ever stopping once to ponder why. They would try to explain the inane retail reason that my zip code was now needed to finish the transaction, upon which I would flatly reply:

“I have been buying groceries for at least 35 years. No one EVER needed my zip code to check me out before, and you don’t need it now. Wanna debate this? I think the courts will agree with me….”

And the clerk would agree it was silly, type zeros on the designated spot, ring me up and I was on my way.

Apparently at one particular local grocery store no one had mustered the courage to NOT comply with this newest invasion of privacy until I was observed refusing one day, and then the next 5 people in line refused also. I knew I was right, and I knew a court of law would agree. The courts have now caught up with me and they agree.

Big Lesson: It took one person saying “no” to yet another invasion of privacy for the next 6 people standing in line to realize that they too could say “no,” and so they did. I’m glad the California court system has done right by the people of California and that the courts agree with us. They have ruled that clerks may NOT require consumers in California to provide their zip code when they shop. Here’s the link.

http://www.latimes.com/business/la-fi-0211-privacy-20110211,0,6098077.story

Know your legal and civil rights. And remember the power of “no” in numbers.

Chase Kyla Hunter

Donald Rumsfeld’s Problematic Memoir: WMD “Lost and Found” Question Still at Large

rumsfeld [unknown unknowns]

Donald Rumsfeld

Copyright 2011-3011 By Chase Kyla Hunter, All Rights Reserved.

Author’s note: As much as Julian Assange may be reviled by those in high political places, his exposed Wikileaks diplomatic cables reveal something that causes more rewriting [again] of what we thought we knew to be true about the Iraq war. Numerous links are posted on these pages:

http://exposingliberallies.blogspot.com/2010/12/wikileaks-is-confirming-iraqs-wmd.html

http://hotair.com/archives/2010/10/24/wikileaks-documents-show-wmds-found-in-iraq/

These two posts purport that [ after everything, including ruined careers aplenty ] there was, in fact, WMD located in Iraq before the war, and that Russia removed part of it and the US removed other parts.  The operative dilemma is what constitutes the actual definition of “WMD.” I am taking the position in the essay below that nuclear weapons of mass destruction is the defined term. Only the hidden files of the American Military Industrial complex contain the actual truth on the matter. Whatever was located by Russian and US forces, confiscated, squirreled away for future uses, we may never know.

So I am posting this note to let readers know there is still controversy over what was found, who found it, where it is, and how it may be used in the future.

I had written the essay below before I located the information above. I have now been exposed to so much contradictory information about “Iraqi WMD” that I don’t really know what to believe. But such is the reality of trying to report as a citizen journalist in the current American milleau of media spin, left wing disinformation, right wing counter-disinformation and all the rest.

It is truly maddening. I wanted to post the link to the information above, but I cannot verify it. Most of it comes from one blog, so buyer beware. Here’s an excerpt:

‘The release by Julian Assange’s web site Wikileaks of classified documents reveals that U.S. military intelligence discovered chemical weapons labs, encountered insurgents who were specialists in the creation of toxins, and uncovered weapons of mass destruction in Iraq. However, Washington, DC officials and the news media have ignored this information.

One of the WikiLeaks document dumps reveals that as late as 2008, American troops continued to find WMD in the region.

There are numerous mentions of chemical and biological weapons in the WikiLeaks documents, however the U.S. media appear only interested in those portions of the leaked material that highlight actions that are viewed as embarrassing for the U.S. military such as the accusation that U.S. commanders were aware of abuse and “torture” of prisoners by Iraqi soldiers and police officers.

The U.S. Defense Department continues to demand that WikiLeaks founder Julian Assange immediately return the stolen military documents in his possession, including recent documents that created another stir when published, according to Elaine Wilson of American Forces Press Service.

The department also wants the whistle-blowing web site to permanently delete all versions of these documents, which contain classified and sensitive information, from its web site, computers and records, Pentagon Press Secretary Geoff Morrell told reporters during a Pentagon briefing.

WikiLeaks documents don’t reveal evidence of a massive weapons program by Saddam Hussein — the Bush administration’s leading rationale for invading Iraq — or some enormous stockpile of WMD, but do reveal that chemical weapons did vanish from the Iraqi battlefield.

According to the latest WikiLeaks document “dump,” Saddam’s toxic arsenal, significantly reduced after the Gulf War, remained intact. Jihadists, insurgents and foreign (possibly Iranian) agitators turned to these stockpiles during the Iraq conflict and may have brewed up their own deadly agents, according to the WikiLeaks web site.

During that time, former Iraqi General Georges Sada, Saddam’s top commander, detailed the transfers of Iraq’s WMD. “There [were] weapons of mass destruction gone out from Iraq to Syria, and they must be found and returned to safe hands,” Mr. Sada said. “I am confident they were taken over.”

Gen. Sada’s comments came just a month after Israel’s top general during Operation Iraqi Freedom, Moshe Yaalon, claimed that Saddam Hussein “transferred the chemical agents from Iraq to Syria.”

In 2004, for example, American special forces members secretly purchased what they believed to be containers of liquid sulfur mustard which have been used since World War I. Following testing in a military lab, the chemical was then secured and transferred to a secret location.’

[end excerpt]

Chase Kyla Hunter 02.04.2011

Below is my original essay from yesterday:


I always knew that the only man more arrogant than Dick Cheney in the George W. Bush White House was Donald Rumsfeld.I had grown tired of watching geriatric old white men try to run the country at least 20 years earlier when George’s father was in the White House, running up the national debt to near crisis levels back then. It took Ross Perot to remind us all about that, with his charts and graphs and funny ears.Then came the high IQ southern rooster, Bill Clinton, another Bilderberg man all the way, brainy, but a poor excuse for a national leader on moral, marital and ethical terms.Clinton played the saxophone on late night TV to get the youth vote. He was a flagrant womanizer, and no amount of public relations media sheen would be able to eventually obfuscate that fact. His wife seemed to be a lot smarter than he was, but she had chronic “bad hair” and Americans took deep umbrage at her crack about “not staying home and making cookies” during Bill’s presidency. Hillary too, seemed doomed by her behaviors and commentary to become a tolerated political thorn in the nation’s side.

By the time we got to George Junior, via his crooked relatives in Florida and his old boy’s club cronies who sat on the Supreme Court, I was already so disgusted with the sad sorry affair of what we are offered as an excuse for presidential leadership in this country, that I was mostly tuning it all out. I was historically apolitical, found it all distasteful and routinely dishonest and for the most part could have cared less. I watched sadly as Al Gore went home and accepted the fact that his election night win and his presidency had been stolen from him.

The popular vote was turning out to be irrelevant after all, just like intelligent political observers had noted many years earlier.

I continued to assume that the national electoral college was honest and ethical for the most part, because I hated considering the alternative.

But it was a hard pill to swallow, seeing it all play out on national TV right before our eyes. Looking back I know now it had nothing to do with “hanging chads in Florida.” America was still in denial back then I suppose. We really did not want to believe that it was who you knew, who you paid off, who your daddy knew, and most importantly, what the Bilderbergers wanted, that dictated who would run the country.

In 2000 many of us still thought our voices mattered and our presidential votes counted. We were naive and we just didn’t know better.

Right after George Junior took office he began to plan the Iraq war. As Michael Moore noted in “Fahrenheit 9-11” the younger Bush enjoyed golf, and he played frequently. He was playing lots and lots of golf in the weeks and months right before 9-11 took place. He took fishing trips. He played cowboy on his Texas ranch.

Then came 9-11 and the shock and grief of a nation stunned by an act of evil so monstrous we could barely comprehend it. Every American alive right now who was an adult when 9-11 occurred will always recall where they were and what they were doing when the event took place. It was an obelisk driven into the ground of our collective memory, a moment in time which marked the end of our political innocence and the beginning of our descent into the incomprehensible.

A lone lady FBI agent working in a field office in the northern Midwest had seen this coming. She had warned her superiors about the probability and likelihood of a terrorist attack involving jihadists who would use American jetliners to fly into buildings. Her repeated field reports were disregarded. She was ignored. The attack took place. The Bilderberg plan proceeded.

Not knowing the horrendous back end of the event at the time, after 9-11 a furious and desperate patriotism in America foamed at a fever pitch I had never witnessed before.

Everywhere people who were usually politically aloof now flew American flags: on their car radio antennas, on their front porches, on t-shirts and jewelry, on houseboats, at rodeos, in shabby trailer parks and even in graffiti washed inner city ghettos. We had been told that Osama Bin Laden was the culprit, the mastermind of this attack, and we all wanted his head on a platter.

Tell me, have you heard anyone in the press even mention Bin Laden’s name in the past few years? More oddly: have you ever heard Barack Obama mention the name “Osama Bin Laden?”

The CIA knows all about the hidden truth on the Bin Laden story. They are holding the master dossier. And unless we burn them out with ever more scalding truth reports that “out” more of their horrendous secrets from the deep rabbit-hole of hidden black ops, they will never reveal what they know.

By late 2001, post 9-11, western style wanted posters of Bin Laden were appearing on hundreds of websites. Open plans for the war on Iraq were discussed and debated on Big Media news outlets.

We were being told again and again about Saddam Hussein and his colossal stash of “weapons of mass destruction.” We all became familiar with the term “WMD.”

One of our favorite American sons at the time, Colin Powell, who was a trusted political figure before the Iraq war, went before the UN and made his case for war. In spite of the dissent and debate which roared over it, the decision had been made in secret, years prior, without our knowledge, without our consent, as usual. The decision had most likely been made before George junior was artificially appointed President, in hidden halls of power that Alex Jones has now made very familiar to everyone with his ranting mega horn blaring, screaming patriotic platitudes at the passing black limousines that swoosh by as they enter some secret destination somewhere for the annual Halloween Witches and Warlocks political carnival that is commonly referred to as the “Annual Secret Bilderberg Meeting.”

We were going to war in Iraq, all costs and consequences be damned.

I distinctly recall those heady moments for Donald Rumsfeld during the early opening moments of theIraq war, during the “shock and awe” phase, when he would strut into the daily national White House press conference and hold court before bewildered and submissive reporters who were trying to understand what was really taking place.

Rumsfeld glowed. He conducted himself like the happiest man in the universe. By God he was at last having his war his way, the war which had been planned for so long, the war which was on the Bilderberg blueprint for America far in advance of 9-11. And now by God he was in charge of it all, having a grand time appearing daily before American TV cameras as the public relations centerpiece of the whole operation. Rumsfeld would strut into those press conferences during the first 90 days of “shock and awe” like the President himself. He could not have been more proud of what was taking place.

It was all enough to make one lose the contents of their stomach, just observing what could only be described as Rumsfeld’s “military glee” with the deluge of death that we were raining down on Baghdad. The media bought the whole thing lock stock and barrel. That was the directive which had been given: “support the war effort, and constrain any dissent.”

Rumsfeld would be questioned with hushed tones of reverence and respect back then, young reporters perspiring to choose their words just right so as not to offend the great military warrior king who was in charge of ridding the world of Iraq’s dreaded “weapons of mass destruction.” For a fleeting moment in American history, Donald Rumsfeld was the most important man in America. Invigorated by all the press and attention, his step had a little extra spring in it when he walked toward the podium to address the press about the progress of our military machine as it pummeled Baghdad.

What a different story history will finally write. Americans are not nearly as uninformed as they were ten years ago about who and what really runs the country and what they have done.

The scripted Rumsfeld daily press conference which played out for about two years described above began to dissipate into national agony and outrage, as we all finally learned the terrible truth. There was no WMD stash hidden in Iraq that our soldiers could locate anywhere. Once again, the inconceivable was being delivered to us via those hated Big Media news heads that strained credulity to the breaking point. It became the most world famous “WTF moment” in modern times.


We had gone to war over a CIA intelligence “mythology,” a fabrication which had been passed along via double-speaking double agents in the Mideast, like an old oral tradition, the original story changing and getting worse with each retelling, until the final version we heard on American Big Media newscasts bore no resemblance whatsoever to the original lie. It was now twenty times worse instead.

Do you suppose Donald Rumsfeld secretly knew the truth all along? Do you suppose that the ruined credibility and dashed career of Colin Powell could have been averted? Or was Powell in on the “WMD terrible truth”  too?

Knowing what I now know about just how dark and sinister our American industrial military complex really is, I don’t know who or what to believe and I trust no history book any longer. I trust no written accounts of any person who worked in any political or media outlet administration, as almost every book written in this nation has some hidden ax to grind, some motive to advance, or some specific agenda to sell to the people.

So, sad and pathetic as it is, and now nearly seven years late, the aging and greatly discredited Donald Rumsfeld is apparently attempting to clear his conscience and buy back a small morsel of his perceived place in history and his need for Americans’ respect by admitting in his new autobiography what we all well know, and have known for years: the three dreadful words that any American male in political public life almost never utters out of the sheer enormity of his ego: “I was wrong.”

Rumsfeld is finally admitting that he was wrong about Iraq having WMD. Why should we care at this point? It seems so irrelevant now. I think about the thousands of good American men and women who have been killed, maimed, and the tens of thousands of children in America who will grow up without their mothers and fathers who died in the Iraq war. These families deserve better than Rumsfeld’s lame ass seven years late admission. His book only makes me more furious about the mountain of lies we have all been told.

Once upon a time in the old American west the lynch mob took care of rotten-to-the-core men like Donald Rumsfeld who lusted for power and tried to rule young western American outposts crookedly by the “might is right” plan. But now, one hundred and fifty years later, we let our national disgraces retire to their ranches, their golf courses, their lobster, their banquet halls.  We are politically correct to our eventual ruin.

Had Rumsfeld admitted what he REALLY knew seven years ago, would it have made any difference? How long must the American people be forced to put up with such screaming hubris, sheer wickedness, corruption and incompetence in our political leaders?

How many more people have to die in these NWO pre-planned and pre-packaged wars, designed by and for the gain of the Bilderberg ruling elites at the top of the Illuminati pyramid before we finally get some intelligent independent leadership in the White House, that’s not owned by the UN / CFR mandate?

Beginning just a few months back, at the end of 2010, the opinion and commentary of the CFR is now openly broadcast on NBC Evening News, on radio newscasts and in the press, with little public outcry. The brainwashing of the unawakened American sheeple is just about complete. As events line up for World War III they will march more tens of thousands of US soldiers to their graves for the profit of the Illuminati clan at the top of the Freemason pyramid, unless the American people say “No more. We will not fight your Illuminati ‘designer wars’ any longer.”

When will the White House be returned to the American people and wrested from the Bilderberg usurpers who have ruined our country, escalated our national debt into the stratosphere, and lied to generations of Americans like me until I now have come to the culminating moment when I trust no man, no book, no news report, no talking head, and no current world event?

I now know EXACTLY how the character “Truman” in the film “The Truman Show” felt as he sailed his little boat to the edge of his fake make-believe world, and crashed it into the “edge of the sky” where the dome’s floor met the sea line. I know exactly how he felt as he groped his way along the seam, looking for an exit, trying to find the door.

I want OUT of this psychotic “orchestrated American reality show” that we have all been forced to live in for 50 years or more, with most world events that we thought were the result of natural processes instead having been the product of hidden Bilderberg, CFR, CIA, NSA, and other machinating elitist orgs behind the scenes, pulling strings while pushing their cover stories down our throats. Modern television “programming” was basically invented to placate, distract and inebriate the national psyche while international actuality was pre-planned for us months and years in advance from behind the scenes. Where does it end?

When will we have a President that is not a CIA bred Manchurian, who does not exist simply to carry out the Bilderberg, CFR and UN mandate, existing more or less as a “public relations hood ornament” to the globalist agenda of the ruling elites?

At this point most Americans would be happy with any man or woman of any race or combination of races who has the sheer courage to stand up and face the ruling elites, decline their directives, run the country without them, and manage the cunning to stay alive and not be assassinated in so doing. John F. Kennedy was trying to “go public” about numerous hidden directives from the elites which he refused to comply with when he was assassinated. It’s not hard to do the math on that.

It’s time to pour some cleansing Red Devil Lye down that CIA black ops rabbit-hole. It’s time to put an end to the Bilderberg group. God will show us how He wants this done. I maintain that there is a Divine Intervention afoot in this nation, and I believe devoutly that the Holy Spirit will lead the American people and show them how to proceed. How NOT to proceed is what we are all watching play out in Egypt. That is the typical testosterone solution and it will never be the answer.

It’s past time to put a woman in the White House. It’s twenty years past time. Nothing is more feared on the planet than the righteous fury of a spiritually empowered woman who walks with the Holy Spirit and knows what she has to do. Nothing is more formidable than a woman in political power who walks with God, and inwardly knows it. If she walks with God, she won’t have to tell the nation. The nation will know. The Holy Spirit will make sure of it.

Is she out there? Is she ready? Is she fully prepared for the hatred and rage will rise up against a woman President in this misogynist male dominated nation of bumbling fumbling aging fools who have now careened our country to the precipice of absolute financial and moral abyss? Is she ready to face all the NYC elitist patriarchal women of power, women who have become “female men,” women like Katie Couric, who will riddle her with queries designed to give her the educational and foreign policy litmus test that Sarah Palin so publicly failed?

The calculated and fomented “hatred of Sarah Palin” that is part of the current directive for Big Media to deploy between now and 2012 has just about guaranteed that would-be supporters and voters will be just as hated as she is by the left. I experience this every time I open my mouth and say anything in support of Sarah Palin.

But the divine equation stands: the more a woman in politics is hated and despised by the ruinous far left, the more likely she is to lead the nation in the spiritual, moral and financial right direction. Rumsfeld needs to take his “talking points” memoir, go home to his ranch, and never return to public life. His day in the Bilderberg sun is over. It’s time to prepare for REAL hope and change. It’s time to put an independent politically free, [ not a bought and paid for Muslim CIA Manchurian fraud ], into the White House, and it’s time to return the White House to her people.

Where the men have failed, I believe the right woman, with the right wisdom, and the right comprehension of the task at hand, and the right determination and courage, can and will do this during her presidency, supported by the majority in this country who want out from under the UN’s thumb. I am waiting for her to step forward. I am waiting to see if she really has what it takes. If you are out there, will you please step forward? It’s time.

Chase Kyla Hunter

This essay was picked up and re-posted by the 2.4.11 release of The Blogs Daily on Twitter.

Related Articles

Without A Trace: Tips for Using the Web with Little or No Digital Footprint

Reposted from the Web By Chase Kyla Hunter on 01.20.2011

Without a Trace

If you value your rapidly disappearing privacy while surfing the Internet you need to know about these tools. Whether you want to protect yourself from snoopers, want to spy on those out to get you, or want to be able to track trends that you know will lead to something big, then these tools will help you get the job done. The best part about them is they are FREE!

“If you have something that you don’t want anyone to know, maybe you shouldn’t be doing it in the first place.”

-Google CEO Eric Schmidt

Without a Trace

If you want to use the Internet without anyone knowing who you are or leave an untraceable phone number or email address, then these tools are for you.

  1. Big String. Big String offers self-destructing IMs and emails for those who don’t want any evidence of their online communications. Use with many popular IM clients.
  2. Mozilla Firefox, Portable Edition. This free web browser leaves no personal information on your computer. Not only can you use this anywhere, but no one will know you were there.
  3. x Paranoia mod. This Firefox extension is great for those who want to leave nothing behind on the computer. With a couple of clicks you can clear all your Internet history, passwords, cookies, and cache.
  4. Bugmenot.com. If you’ve ever had to register with a site just to read an article or watch a video, then you will want this tool. Find login information for many websites that require registration and never have to give your information again.
  5. 10 Minute Mail. Use this tool to get an email address that is good for 10 minutes, then expires. This is a great way to register with sites that require an email validation or just to cover your tracks.
  6. inumbr. Get a disposable phone number that you can use to forward calls to any other phone in the U.S. No one will be able to trace you with this number.
  7. GrandCentral. Here’s another phone option when you don’t want to be traced by your number. Consolidate all your phones into one with this tool that gives you one voice mailbox and one number for all your phones.
  8. drop.io. Want to share a top-secret online file with someone and then have no sign of the evidence later? This is the tool for you. The file is deleted after 30 days.
  9. Fake Name Generator. If you need a name, address, email, or even a UPS tracking code, use this handy tool to generate any one of the necessary fakes.
  10. cl1p.net. Create a note or upload a photo that you can keep for yourself or share, then delete it when you are finished with absolutely no sign of what you had.

Browsing Security

If you want to browse the Internet in privacy, these tools will help you do just that. Use these to do the actual browsing or to check the security of your browsing privacy.

  1. Hide My Ass!. Hide your identity with this free tool. This proxy service will hide your IP address so no one will know you.
  2. Tor. Like getting secreted away, this free service allows you to hide your Internet identity with a “network of virtual tunnels.” Join journalists, government agencies, and more who use Tor for the ultimate in Internet privacy.
  3. Guardster. Another proxy service that hides your IP, this one is available in both free and for a fee versions. The free version does not work with encrypted SSL sites.
  4. Megaproxy. Paste the URL for whatever website you want to visit into this tool and you will have a completely private look at your target site. No registration or downloads needed to use this tool.
  5. Scandoo. Get real time protection when surfing the Internet with warnings about websites before you click on them. Based on ScanSafe technology, this home version is free.
  6. ShieldsUP!. Check out this tool to learn what information your browser is sending out. You can also test the effectiveness of your personal firewall when running ShieldsUP! testing.
  7. Privoxy. Privoxy is an open source non-caching web proxy with advanced filtering capabilities for enhancing privacy, modifying web page data and HTTP headers, controlling access, and removing ads and other obnoxious Internet junk.
  8. What Is My IP Address?. Use this tool to ensure your IP blocking software is working correctly and not revealing your true IP address.
  9. Clusty. Use this search engine when browsing. Clusty doesn’t save your information or track you at all when you use it.
  10. Scroogle. Try searching Google with this tool. Scroogle uses SSL to send your search terms to Google with encryption, then does the same when sending the results back to you.

Computer Security

Using the Internet is a huge open door for people to stick their nose in your business. Use these tools to slam that door tightly shut.

  1. Malwarebytes’ Anti-Malware. This anti-malware software is one of the best tools available for removing crap from your computer. Best when used in conjunction with Ad-Aware to keep your PC 99.999% malware free.
  2. avast!. This free anti-virus software is one of the best available (for free or for a fee) at protecting your computer. This tool will alert you any time malware is detected and even checks incoming email. avast! also includes a boot-time scan option.
  3. Ad-Aware. The free version of this software does an excellent job of protecting your computer against spyware and adware. The paid version gives you real-time protection which is not available with the free one.
  4. Sandboxie. This free tool is great for both protecting your computer and getting rid of evidence. It works as a temporary storage area for information that would normally go to and from your hard drive. When you are finished in the “sandbox,” you can just clear it out.
  5. ThreatFire. Use this in conjunction with your anti-virus to fend off malware. ThreatFire detects malicious behavior such as capturing keystrokes and also serves to defend against zero-day threats.
  6. SnoopFree Privacy Shield. The ultimate free software for the ultra-cautious, this tool will detect any method of privacy invasion through your keyboard, screen, and open windows.
  7. Comodo Firewall. Keep out hackers with this free firewall. This program is one of the best when it comes to protecting your computer.
  8. WinPatrol. Protect your privacy and your computer with this free tool that works by alerting you to “hijackings, malware attacks and critical changes made to your computer without your permission.”
  9. AVG Free Anti-Virus. Get anti-virus and anti-spyware protection from this free software. This software also includes a scheduled scan option.
  10. TrueCrypt. This disk encryption software will keep nosey-parkers at bay. You can create a virtual encrypted disk, encrypt USB flash drives and hard drives, and more.
  11. Trustable Downloader. Download files from the Internet without worries of Trojans, worms, or viruses with this free application. As described, this tool will help guard you against government spying on its citizens.
  12. SiteAdvisor. This software alerts you before you visit a website that has spyware or harvests your information for spam. Use their color-coded system to alert you to the potential dangers of websites.
  13. Peer Guardian 2. This IP blocker is capable of blocking incoming and outgoing connections. You can also select to block spyware, adware, and educational and government ranges.
  14. GlowWorm FW Lite . Mac users can use this software to be informed when a program attempts to make an outgoing connection. Not only will this tool protect your information, it also guards against malware.

Laptop Tracking

If someone makes off with your laptop, know how to stop them with these tools.

  1. Adeona. If you want to guard against someone taking your laptop, check out this tool. This software continually tells you where your laptop is located without the interference of any third party to help you track and recover your computer.
  2. iAlertU. Another laptop protection and tracking device, this one specifically for Macs, this software is based off mouse and keyboard movement which sets off an alarm, takes a photo of the thief, and emails the photo to a specified email address.

Spying on Those Out to Get You

If you know someone is trying to get to you, then turn the tables on them with these tools that will help you get the dirt on them.

  1. GotVoice. Take advantage of the 14 day free trial to have your target’s voice mail sent directly to you. If you need more time, get another 14 day trial with different information.
  2. Decoding Social Security Numbers in One Step. You can’t get everything out of that magical number with this tool, but you can narrow down the state and year of issue with any social security number instantly.
  3. Keylogger. This free software allows you to log everything entered on the keyboard so you can track computer usage. Be sure to use the stealth mode so your target doesn’t know you are tracking him.
  4. Decode Your License. This article describes how you can get a driver’s license from any state and decode the barcode on it to receive personal information. You will need the Internet tool described in the article and a scanner.
  5. Webcam Spy. Use this software to spy on your target using a webcam. The software activates the webcam with a motion sensor for an auto on and off feature. Spying on your target isn’t the only use for this–you can also use it in your home to see who comes by when you are gone.

Maps for Monitoring Occurrences

Whether you are looking for evidence for your conspiracy theory or trying to put all the pieces together on a plot you know is about to be hatched, then these maps will help you get all the information you need.

  1. Global Incident Map. Find out where terrorism is occurring around the world with this mapping tool. You be able to find plenty of patterns to put together your own theories.
  2. HealthMap. This tool will keep you posted on health alerts. Find outbreaks by geographical location, disease, or chronological occurrence.
  3. Who is Sick?. This Google map-based tool shows symptoms for any geographical spot. You’ll be able to track any type of outbreaks with this tool.
  4. Incident1. Track police, fire, and emergency services on this map. You can also do a search by zip code or select a region within the states.
  5. Incidentlog. If you live in the northeast and couldn’t find anything on Incident1, try Incidentlog for more options. This map is populated from a different pool of data.
  6. Havaria Information Service Alert Map. Find everything from earthquakes to hazmat incidences to biological hazards on this world map. You can narrow the results by country if you don’t want to see the world view.
  7. GeoMAC Wildfire Information. This map shows where wildfires are currently burning throughout the United States or check out past wildfires since 2002.
  8. Piracy Attacks Maps. Pirates on the high seas are not a thing of the past. Use this map to track current piracy around the world.
  9. UNEP: Atlas of Our Changing Environment. Sponsored by the United Nations Environment Programme, this map includes incidents that document environmental changes around the world. Click on each incident to see photos and read the story.
  10. Google Maps Mania. This unofficial site follows the incredible array of various interactive maps being used in conjunction with Google Maps. Find a map that tracks your favorite passion or create one of your own.

 

 

Tags: internet privacy