Archive | Anonymity RSS feed for this section

Big Brother – Beware……

18 Feb

The Care Data Project – A Snoopers Charter……BB_Eye_01

During these times of austerity our Government has announced its latest hugely expensive, unnecessary and intrusive IT project, which based on their track record will cost three times as much as has been budgeted for and not work……

The new database will include medical information collected from your GP and hospital records.  It is unclear if this a re-launch of a proposal made at the start of the coalition or something entirely unconnected.  But, like the last attempt, it is an ‘opt out’ rather than ‘opt in’ system.

nhs_logoThe proposed database is intended to improve patient outcomes and, although the data stored will be anonymous, it is not beyond the capability of hackers to trace its source.  It is unclear at this stage who will have legitimate access to the information stored and as we have learnt, it is not beyond major multinational companies to employ dubious and illegal methods to obtain whatever they need……

GPs have expressed concerns over the new database and although it is reported to be ‘anonymous’, the Police can access the database under certain circumstances; no specific details of what circumstances would warrant this……

The Pharmaceutical industry would also have access.big-brother-01

Cost Benefit Analysis……

In yet another disturbing story, the Government is pushing the BMA and NICE to apply a cost benefit analysis to the prescribing of some medications.  There has been talk of withholding medications from older people.  Although it may be beneficial for the patient, their contribution to society may not be as good as that of a younger man with the same condition.  It is almost as if they are regarding us as batteries……

‘Since writing this article is has become clear that this IT project is the one previously……’

 

The original article was entitled ’The Snoopers Charter (Cont’d)’ posted on 28 December……

Advertisements

Coincidence, Convenience or Conspiracy……

27 May

‘It could pure chance but recent events point conveniently toward a reason to advance the timetable of government policy to control the internet and curtail freedom of speech……’

 

All Roads Lead to Rome……

In the past few weeks events both here and abroad have shone a spotlight on the ‘war on terror’ and a new agenda to contain the spread of information, starting with the Boston bombing which is where my investigation begins.

On 15 April 2013 two devices exploded near to the finish line of the Boston marathon.  The event was caught on camera by individuals and the media alike.  Many questions remain as to precisely what happened but is does not appear to be the straight forward ‘extremist’ attack portrayed in the mainstream media.  There are many inconsistencies with the events of that day which have been highlighted predominantly by eagle eyed internet users and seemingly ignored by the broadcast media.  Here are a few of the issues.

The blasts were filmed from many angles by many people and highlight equally as many apparent incongruities.  An examination of the blasts is a good place to start.

Boston Explosion Flags

This image is one of many taken at the instant of the blast.  The smoke is very impressive and I’m sure any pyrotechnic of that magnitude was capable of breaking nearby windows but note:  The row of flags seems completely unaffected by the explosion.  Surely, any blast capable of removing peoples’ limbs (which we’ll come to shortly) would have contained enough energy to move a few flags?

Now let’s look at the guy whose trousers were almost completely blown off.  Any explosion capable of blowing a man’s lower garments to shreds would surely have left some degree of injury to his legs?  Still, he escaped with only grazes and his modesty in tact.  My mother always told me to wear clean underwear just in case I was involved in an accident.  She never mentioned wearing bomb proof underwear but I’ll consider it next time I go out.  At this point it is worth pointing out the pain on this mans face.  Clearly he loved those trousers; unlike our next ‘victim’ who seems unaffected by the loss of his lower garments, and limbs.

Boston Explosion Trousers

‘Wheelchair Guy’, as he has become known is a bit of a celebrity.  Here he is just after the blast having had both legs blown off, surrounded by some pretty unconcerned people, in what can best be described as ‘Freddy Krueger’ styled blood.

Wheelchair Man 01

Next we see him, presumably having been attended to by the paramedics, being wheeled away in a chair.

Wheeelchair man 03

Wheeelchair man 02Note how he does not appear to be in much pain and unconcerned by the bone sticking out of what used to be his leg.  Now, I’m not a paramedic but I would have thought a man who’d lost so much blood would have been put on a drip to maintain his blood pressure and stop his heart from failing, but no IV lines can be seen.  He also appears very alert for a man who one would have expected to have received some heavy weight pain killers on top of loosing so much blood.  Then one has to ask the question why a double amputee was placed in wheel chair and pushed 400 yards to an Ambulance with, one assumes a perfectly serviceable engine and driver?

The inconsistencies in the Boston story are many and if I detailed them all my computer and ISP would probably crash but have a look for yourself and you’ll see what I’m getting at……

Timing is Everything……

On the other side of the Atlantic in the UK two events have unfolded, giving the Government an opportunity to revisit the Communications Data Bill, aka the ‘snoopers charter’, with impeccable timing as the CEO of Google is the guest of honour at the forthcoming Bilderberg Group meeting in June.

First there was the apparent ‘hijacking’ of a Pakistani Airlines flight by two unarmed men.  The flight was escorted by RAF Typhoon jets to StanstedAirport where the men were arrested without incident or injury to passengers.  The precise details of the ‘hijacking’ are unclear but do not follow the ‘standard’ modus operandi of a hijacking.  The hijackers did not divert the plane, attempt to crash it, injure any of the crew or passengers or appear to have any motive behind their actions.

Second, is the attack on Lee Rigby, the off duty soldier which, although abhorrent, has lead to some interesting events.  Thus far eleven people have been arrested in connection with the attack, some on charges of conspiracy to commit murder.  One must assume that unless Lee Rigby operated like clockwork and rotated his T-shirt wearing with an anally retentive consistency, that this attack was a random event and, therefore, its preconception and planning, highly unlikely.

From past experience it would seem that Theresa May, the feckless Home Secretary, has found, or created, the perfect bilderberg - logoopportunity to resume plans for the ‘snoopers charter’, a step toward control of the internet and the inconvenient freedom of speech it provides, and at just the right point in the calendar to coincide with the shady meeting of the Bilderberg Group……

DT_Triangle_Banner

‘Ask questions, check details, search the internet and never take anything at face value……’

Bilderberg 2013……

22 May

‘The shadowy globalist Bilderberg Group will meet at the Grove Hotel, Watford, England from June 6th to June 9th.  Amongst the usual invited ‘guests’ including government ministers, financiers, policy makers and royalty will be the CEO from Google with potentially worrying items on the secretive agenda……’

 

bilderberg - logoBilderberg – A Brief History……

The group first met in 1954 at the Bilderberg Hotel in Oosterbeek in the Netherlands which is where it got its name.  Originally intended to bring about convivial relations between Europe and America after the World War II it was intended to develop a better understanding of the political, strategic and financial policies of the two sides.

Over time the annual meetings of the Bilderberg Group have become ever more elitist with some of the most influential people on the planet in attendance.  Although they claim it is simply an opportunity to talk frankly about policies, they are in reality the policy makers that affect everything from economics to war.  The meetings are held in secret surrounded by tight security and the locations kept tightly under wraps with disinformation used to keep journalists at bay as far as is possible, a practice that is proving harder with social networks and citizen journalists having the means to communicate instantly.

Insiders and infiltrators in recent years have reported surprisingly accurate details about future events including economics and warfare which have come to pass.  For an innocent ‘think tank’ the Bilderberg Group go to great lengths to keep their ‘guest list’, meeting locations and discussions as secret as possible and many well informed journalists who have followed Bilderberg closely for many years speculate that they are a globalist shadow government agreeing policies and represent a New World Order……

Google-Zeitgeist-2011Google & Bilderberg……

Google CEO, Eric Schmidt, has been a regular attendee of previous Bilderberg meetings and the annual ‘Google Zeitgeist Conference’ will be taking place at the Grove just before the Bilderberg meeting.  On the agenda will be how an association between Google and Bilderberg will benefit both parties.

It is hard to understate the potential power of Google’s vast database.  Around 70% of all internet searches are done using Google and it has even slipped into everyday language as the generic term for a search.  It is the way in which information and trends in everything from economics to politics can be gleaned from analysing Google searches and the sites they lead users too.  There is virtually no other company in the world that knows more about your habits than Google.  Thus far we have been assured that Google respects our privacy and I have no reason to doubt that claim, but trends can prove particularly useful when making judgements about financial markets.  Chatter can also indicate where political uprisings are stirring; useful if you are in the arms trade or running an army of mercenaries.  With geo-location software which is built in to most new smart phones can even tell you the whereabouts of a group or individuals.  Under US anti-terrorism laws all new mobile phones are fitted with an RFID chip which can locate a phone even when it contains no SIM card and the battery is removed……

Conspiracy Theories and Crackpots……                                                                                                                                                            The Grove 2013                                                     

Doubtless the accusation of paranoid conspiracy theorists will be levelled at those of us who are concerned at the dominance of one company on the worldwide web and even more so when the business dealings of the Bilderberg Group are included.  But when the worlds global elite and policy makers team up with the worlds largest internet service provider, there is good reasons to be concerned……

The Snoopers Charter (Cont’d)……

28 Dec

The Draft Communications Data Bill……

 

The Prime Minister’s spokesperson said earlier this month that he had accepted the criticism [of the Draft Communications Data Bill], which was wide ranging from all sides of the political spectrum and from human rights organisations, and would re-write it.  They have dedicated a huge amount of time and resources on legislation which, despite their protestation that it is a necessity to protect us from terrorism, will, in reality, make very little difference to the existing powers of MI5, MI6, the Police or immigration services……

 

Principles, Proportionality and Responsibility……

 

Most of us go about our daily lives minding our own business and don’t break the law.  It is on the that assumption that our legal system is based; innocent until proven guilty, habeas corpus, you get the picture, which is why I object to all of my email, text and social network communications being stored in ‘the cloud’ just in case it might be of use to the security services should I decide to become a deranged terrorist megalomaniac at some point in the future.  You could compare it to the Post Office making photocopies of all your correspondence and post cards, or asking Boots to keep a duplicate of your holiday snaps.  Based on the fact that 99.9% of the population are not terrorists, that is my objection on principle and proportionality.

 

Responsibility is a whole different matter and the one which, as a law abiding citizen, bothers me more.  On numerous occasions the Government have demonstrated just how easy it is to ‘loose’ our personal data, either by leaving laptops on trains, loosing CDs in the mail, having ministers’ wave sensitive paperwork in front of the media’s long lenses or being infiltrated by hackers.  There are already hundreds of databases which hold personal information about us and we do not need another opportunity for our personal information to be lost’ for what is nothing more than an over reaction to a minority problem.  And, I would assume the baddies don’t plan their attacks on Facebook or in un-encrypted emails……

 

If only they would dedicate the same amount of effort to tackle tax ‘avoidance’, corruption and lobbying……

 

Take Action……

 

I’m changing my email over to ‘hushmail’ which uses PGP encryption.  Although this is not foolproof, it’s at least adds some degree of privacy and I encourage everybody to do the same.

 

Write to your MP to make your feelings known but don’t always expect a congenial reply!

 

Sign up to Liberty, 38 Degrees and other human rights campaigns.

liberty_logo

 

38 Degrees

http://www.liberty-human-rights.org.uk/index.php

http://www.38degrees.org.uk/

To contact your MP: http://www.theyworkforyou.com/ 

 

 

Don’t just sit there and allow your privacy and human rights to be slowly but surely undermined……

Government Stupidity and Terrorism……

7 Apr

Western Governments are fundamentally to blame for most acts of terrorism carried out against them, if not the architects of them.  If they weren’t up to their necks in politics of Middle Eastern countries and completely reliant upon the flow of the oil they provide, they wouldn’t give a toss.  A quick Google search for ‘non-democratic countries’ returns an answer of 139, most of which you’ve probably never heard of.  The attitude of Western Governments toward these countries varies according to several factors.  For example; North Korea and Iran are portrayed as the ‘baddies’ whilst Saudi Arabia, which operates an equally oppressive and non-democratic regime and is fully tooled up with all the latest military hardware courtesy of the west, is not subject to UN sanctions and is welcomed with open arms in the US and UK where its rulers are given the ‘red carpet’ treatment and meet frequently with the PM and Mr. President.

  Another shining example of western hypocrisy is the American’s relationship with Communist China.  Once upon time, not so long ago, China was portrayed as a dangerous country with a nuclear capability and a list of human rights violations even Stalin would have been hard pressed to beat.  Nothing has changed with regard to the politics, arms or human rights abuses carried out by China, only now they are the biggest foreign lender to the US government.  Many other inimical positions exist in the west’s relationship with Middle Eastern countries.  We were happy to supply Sadam Hussein with military hardware, including biological weapons, during the Iran/Iraq war which we would later use as an excuse to invade.  Similarly, the US provided the Mujahideen with arms and CIA training when they were fighting the Russians in Afghanistan.

All of this warmongering and double dealing was primarily linked to paranoia and oil.  However, it wasn’t long before the Neo-Conservatives pulling the strings in the corridors of power found another practical upshot of the instability in the Middle East.  Wars cost money, lots of money and the reconstruction of countries destroyed by wars also costs money, lots of money.  And who pays for all of this destruction and rebuilding?  You do.  The privately owned banks with charitable public sounding names like ‘The World Bank’, ‘The Federal Reserve’ and ‘The International Monetary Fund’ simply print off some money at no cost to themselves, lend it to our governments to fight their wars with and then you and I pay it back, with interest.  And who owns the corporations that make the military hardware and are awarded the contracts to rebuild?  Why if it isn’t the same people who decided to start the wars in the first place.  (See: Haliburton and The Caryle Group etc, who have familiar names on the board of directors like Bush, Rumsfeld, Cheyney and Wolfowitz).

The Erosion of Freedom is a topic I have covered before but to reiterate a few basic points of interest.  The American Government is still holding 171 detainees at Guantanamo Bay.  They have had little, if any, access to lawyers.  They have not been presented with any evidence of the crimes they are accused of.  They have, by internationally agreed standards and the US’s confirmation, been subjected to torture and degrading inhumane treatment.  The British Government has been complicit in the ‘extraordinary rendition’ of UK citizens to Gitmo without any judicial process.  In the latest development Mohamed Atta, ‘the lead 9/11 hijacker’ and 5 other detainees are to face trial by a military court and could face the death penalty if found guilty.

The United States has carried out the extra-judicial execution of numerous citizens using ‘drones’ on other countries sovereign territory.  These people have been labelled as ‘enemy combatants’ in ‘the theatre of war’ which it seems is anywhere the US says it is.  Again, there has not been any judicial process to establish that any of the victims were in fact ‘enemy combatants’ and, as for other occupants of the houses or vehicles targeted, these fall under the heading of ‘collateral damage’.

The Patriot Acts I & II and the Homeland Security act has effectively destroyed the American Constitution and Bill of Rights and given hitherto unprecedented powers to the state to act as it sees fit.  For example; the authorities no longer require a warrant to carry out searches and seizures of property or to carry out invasive covert monitoring of citizen’s communications, this includes bugging peoples’ homes.  The original intention of the Constitution was to protect US citizens from oppressive governments, not the other way around.

Meanwhile in the United Kingdom the Government has announced new measures to monitor all communications in real time.  This, we are told, is not to monitor the content but to keep a record of the act of communicating.  How precisely this will work in practice is as yet undecided and what benefit this will have in protecting us from terrorism is unclear.  We already have perfectly adequate legislation to deal with any unlawful activity but the paranoia of our Government is boundless.

Hypothetically, Suppose Myself & a Group of People Decided to Carry Out an Act of Terror?  Firstly, I/we would be stupid if we openly discussed our cunning plans by email or on Facebook.  I/we could easily set up multiple email accounts using a pre arranged incremental address and false information and only send and collect our messages from a publicly accessible hotspot using each account only once.  Secondly, I/we could purchase multiple pay as you go mobile phones which could again be disposed of after each call.  If our emails were encrypted with 2040bit PGP code they would be almost un-readable even if they were found.  My point is basically this; any half-wit could easily evade detection unless they were already being followed by the security services, making the monitoring of 70 million people as a standard procedure completely disproportionate to the problem they face, one which was created by them in the first place.

The Question is: Just how much invasion of privacy are we prepared to put up with and will we accept the erosion of our basic civil liberties when there are already mechanisms in place to deal with the problem?

Go Private – Online Anonymity……

21 Jan

Why Go Private……

There are many reasons you may want to keep your communications and surfing habits private.  These include:  Preventing companies from collecting data regarding which sites you visit and what you buy.  If you are politically active and feel that there is a threat from your government watching you and to those with whom you communicate.  To circumvent any restrictions placed on the sites you want to access by repressive governments (as in the case of China and North  Korea). 

NB:  I certainly do not advocate the use of anonymity software for illegally accessing child pornography or extreme violent pornography.

How to Achieve Anonymity……

There are several routes to internet anonymity.  They have differing degrees of security depending on your needs.  Some are pretty simple, others a little more complicated.  Depending on the level of security you require dictates the system you should choose.

One of the simplest is a program called “TOR”.  TOR works by routing the information you send and receive through a network of other users.  It effectively bounces your data across the world from one computer to another, then another and so on, until it finally arrives at its desired location.  Where your data is sent is dependent on the number of users connected to the TOR network but with thousands of users there are enough portals to accommodate the data spread.  TOR also updates and re-routes its connections regularly (default is 10 minutes I believe).  Although this method is not encryption and does not offer complete anonymity, it is useful for stopping all of the market research companies from tracking your movements and bombarding you with “special offers”.  It is also useful for anonymous blogging if you post through TOR and, anonymity is enhanced if you use the time delay functions on your blog server.  That way, any patterns relating to the timing of your posts becomes variable.  This stops patterns from becoming obvious in situations when you post at the same time everyday say, when you get home from work.

TOR is easy to install and set up.  Using Mozilla Firefox as your browser enables you to install a button to switch TOR on or off, as required.  It offers a world map showing the route your data is taking and the interface is easy to use and self explanatory.

There are only 2 downsides which I am aware of.  Firstly, your internet data transfer rate slows down a little as it takes slightly longer to go around the world and a small amount of your bandwidth is allocated to other users sending data via your portal.  Secondly, you may not be able to access some local geographical services due to your connection appearing to be from outside of your locality.  The only time this has affected me is using Channel 4 catch-up TV, as the terms of their copyright only allows them to show programs in the UK……

More Secure Options……

There are a number of encryption programs, the most popular of which is PGP (Pretty Good Protection).  The name was given by its creators with caution but it is actually Pretty Unbreakable Protection.  PGP is quite complicated but in essence the idea is quite simple and works with a “lock and key” arrangement.

To simplify; imagine the person you’re sending your message to has the key “3”.  This means they move each letter of the alphabet along by 3 positions, so A becomes D, B becomes E, D becomes G etc.  So, “Hello” becomes “Khoor”.  PGP does the same thing, only using binary and the key is a very complicated algorithm.  It is estimated that it would take 1 billion years to crack a PGP code at current computing speeds. 

For further information and downloads:

How PGP works: http://www.pgpi.org/doc/pgpintro/

PGP Freeware Downlaods: http://www.pgpi.org/products/pgp/versions/freeware/

TOR Information & Downloads: https://www.torproject.org/download/download.html.en

I hope you find this update useful and happy private surfing……