Skip to content
Category: Surveillance Network
Tags: critical flaws, cryptology, cyber-security, encrypt, encryption, encryption software, flaws, malware, open source, Open Source Technology Improvement Fund, OSTIF, Quarkslab, security, truecrypt, uefi, veracrypt
Category: Surveillance Network
Tags: a.i, ai, alchemist, Alice Bailey, All-Seeing Eye, Allen Dulles, apple, artificial intelligence, bill gates, Blavatsky, catholic church, central intelligence agency, cfr, Church of Scientology, cia, cia front, computer liberation, COMPUTERS, Congregational Church in America, council on foreign relations, counterculture, crowley, Cybernetic Frontiers, cybernetics, Cybernetics Group, cybernetics visionary Norbert Wiener, dan brown, darpa, darwin, darwinism, dod, Dr. Jerome Wiesner, electronics media, evolution, facebook, First Psychic Tournament, Frank Fremont-Smith, Frankfurt School, gnostic doctrine, Gnostica Aquarian Convention, gnosticon, golden dawn, graphical user interface, gui, H.G. Wells, hotwired, Howard Rheingold, hubbard, human consciousness, Human Potential, human race, Hurtak, huxley, ibm watson, ILLUMINATI, Information Machine, John Dee, john irving, john winthrop, kabbalah, langley, lsd, macintosh, macy conferences, magicians, Mark Zuckerberg, Marshall McLuhan, Massachusetts Bay Colony, microsoft, mind control, mk ultra, nasa, Neopagans, new age, Noetic Sciences, Noosphere, occult revival, occulus rift, open source, OTO, pc, pentagon, personal computer, plymouth colony, pope, psychic, psychology, remote viewing, Rosicrucian, Sabbatai Zevi, scientology, secret, secret society, sir john dee, social media, social network, Sons of Light of the Order of Melchizedek, stanford university, Stargate Project, steve jobs, Stewart Brand, techology, The Aquarian Conspiracy, the nine, transhumanism, usaf, vatican, Whole Earth Catalogue, Wiccans, witches, xerox parc, zionism, zionist
Category: Surveillance Network
Tags: ai, Aleister Crowley, Ar nDraiocht Fein, artificial intelligence, Association for Consciousness Exploration, atheism, Aurora Shooting, Barbara Reid, bavarian illuminati, black magic, bob dobbs, branch davidians, burning man, Cacophony Society, celtic, celtic ritual, central intelligence agency, CHAOS MAGIC, chuck hammill, Chuck Palahniuk, Church of All Worlds, CHURCH OF THE SUBGENIUS, cia, cia agent, clay shaw, conspiracy, cyberdelic, Cyberpunks, dada, David Ferrie, David Pearce, Deltaphiles, deutsche verteidigungs dienst, dimension, Discordian Society, DISCORDIANISM, Discordians, Elijah Mohammed, Entropists, eros, eugenics, fight club, fractal graphics, From Crossbows to Cryptography, Galidor, Gay Liberation Movement, General Ramsey Clark, Gerald Gardner, Global Brain Group, golden dawn, Gordon Novel, Grace Zabriskie, greg hill, guy banister, Hackers, hakim bey, harry hay, horned god, human sacrifice, humanism, hypnotism, Illuminates of Thanateros, Institute for Ethics and Emerging Technologies, Institute of Chaos studies, jack ruby, james holmes, Jean-Claude Van Damme, John DeLorean, kennedy, kennedy assassination, kerry thornley, langley, lee harvey oswald, Libertarians, lsd, Machine Intelligence Research Institute, Mae Brussell, magic, magical consciousness, manchurian candidate, Marshal McLuhan, Masonic Temple Annex Building, Michael Jackson, Michael Valentine Smith, miri, mk ultra, mkultra, mondo 2000, monotheistic religions, Moorish Orthodox Church, Moorish Science Temple of America, NAMBLA, nation of islam, nazi, necrophilia, neopaganism, New Hacker’s Dictionary, new world order, Nick Bostrom, Noble Drew Ali, noi, North American Man/Boy Love Association, Oberon Zell-Ravenheart, Objectivists, occult, OCCULTISM, Ontological Anarchism, open source, Operation Mindfuck, OTO, outer dimension, paedophilia, pagan, paganism, paramus runways, paypal, peter thiel, Principia Discordia, process church, psychedelics, r.u sirius, Radical Faerie, religion, Robert Anton Wilson, Robert Shea, robot, robotics, Rudy Rucker, satanism, selena fox, sensory-deprivation chamber, Serial Killer Groupie, sex, sex magic, sexual freedom, SINGULARITY, Situationism, Situationist influenced Cacophony Society, Soldiers of Fortune, sondra london, spooks, spring equinox, Starwood Festival, Survivalists, Symbolic Systems Program, TECHNOPAGANISM, technopunk, Teilhard de Chardin, temporary autonomous zones, thanat, the egg, the gate, The Illuminatus, The Virtual Community, the well, transhuman, transhumanism, trips to the zone, usenet, voodoo priestess, waco, Walter J. Ong, wicca, wicker man, witches, World Transhumanist Association, zone trips
Category: Surveillance Network
Tags: all-in-one PC, amd, avolga Terminal, baikal, baikal electronics, baikal processors, Baikal-T1 processor, COMPUTERS, computing, cpu, debian, ELBRUS, freebsd, icore, Imagination Technologies, intel, linux, MIPS, MIPS chip, open source, operating system, os, P5600, processor, russia, Russian pc, RUSSIAN PROCESSOR, system-on-chip, T-Platforms, TB-T22BT, traditional CPUs, vpro, windows, x86
Category: Surveillance Network
Tags: approached, authorized, backdoor, Blarney, Boundless Informant, controlled software, David Miranda, Edward Snowden, executive action, Fairview, Glenn Greenwald, government communications headquarters, guardian, humini, icreah, iso, Linus Torvalds, linux, monitoring, mystic, national security agency, nil torvalds, noc, nsa, nsa backdoor, nsa prism, NSA whistleblower, Oakstar, Office of General Council, ogc, open source, operating system, os, Penetrating Hard Targets, pirate bay, pirate bay users, PRISM, prism software, proprietary software, proxies, PROXY, proxy users, SENTRY EAGLE, snowden, SOMALGET, spying, stellar wind, Stormbrew, Threat Operations Center Oversight and Compliance, torrents, torvalds, wiretapping, XKeyscore
Category: Surveillance Network
Tags: anti-virus, blackhat, breach, computer users, cyber-criminals, cyber-security, cyber-warfare, data breach, exploit, exploitation, hack, hacked, hacker, Hackers, hacking, malware, open source, Open Source Malware, ransom, ransomware, spyware, trojan, vulnerabilities, vulnerability
Category: General information
Tags: blackout, cheap electricity, crowdfunding, doomsday preppers, electricity bills, electricity generator, energy, energy wars, Fix the World Council, free energy, Free Energy Generator, free energy plans, future, hopegirl, nikola tesla, open source, open source free energy, Plans, power outage, preppers, prepping, qeg, qeg project, Quantum Electric Generator system, survival, technology, tesla, UTILITY BILLS, World Organization
Category: Surveillance Network
Tags: android, android os, apple, authorized, baikal, Blarney, Boundless Informant, building, cell, cellphone, David Miranda, Edward Snowden, ELBRUS, executive action, Fairview, Glenn Greenwald, google, google os, government communications headquarters, guardian, humini, icreah, iOS, iphone, iso, jolla, linux, mobile, mobile operating system, mobile os, monitoring, mystic, national security agency, noc, nsa, nsa prism, NSA whistleblower, o.s, Oakstar, Office of General Council, ogc, open source, operating system, os, Penetrating Hard Targets, pirate bay, pirate bay users, PRISM, prism software, proxies, PROXY, proxy users, russia, russian os, RUSSIAN PROCESSOR, Sailfish OS, SENTRY EAGLE, snowden, SOMALGET, spying, stellar wind, Stormbrew, Threat Operations Center Oversight and Compliance, Tizen, torrents, wiretapping, XKeyscore
Category: Surveillance Network
Tags: amd, arm, ARM CHIP, ARM-401, ATHLON, authorized, Blarney, Boundless Informant, David Miranda, Edward Snowden, ELBRUS, Elbrus MCST, ELBRUS OS, ELBRUS PC, ELBRUS PROCESSOR, Elbrus-4C, executive action, Fairview, freedom, Glenn Greenwald, government communications headquarters, guardian, humini, icore, icreah, intel, INTEL CHIPS, iso, MICROPROCESSOR, microsoft, monitoring, mystic, national security agency, noc, nsa, nsa prism, NSA whistleblower, Oakstar, Office of General Council, ogc, open source, Penetrating Hard Targets, pentium, pirate bay, pirate bay users, PRISM, prism software, processor, processors, proxies, PROXY, proxy users, RUSSIAN PROCESSOR, SENTRY EAGLE, snowden, SOMALGET, spychips, spying, stellar wind, Stormbrew, TECH FREEDOM, Threat Operations Center Oversight and Compliance, torrents, vpro, wiretapping, XKeyscore
Category: Surveillance Network
Tags: 1984, big brother, data collection, data communications bill, datamining, digital privacy, digital rights, fingerprint recognition, fingerprints, fisa, gchq, identification, linux, mark of the beast, microsoft, monitoring, national security agency, nsa, open source, Open-source Windows, operating system, orwell, privacy, profiling, rfid, snoopers charter, snooping, spying, surveillance, surveillance state, tracing, tracking, unthinkable, windows, Windows 10, windows 11, windows 8.1, wiretap, wiretapping
Category: Surveillance Network
Tags: authorized, Blarney, Boundless Informant, broke, David Miranda, Edward Snowden, email, Email Encryption Software, EMAIL PRIVACY, encryption, encryption software, Enigmail, executive action, Fairview, FREE SOFTWARE, funding, Glenn Greenwald, government communications headquarters, GPG4Win, GPGTools, guardian, humini, icreah, iso, monitoring, mystic, national security agency, noc, nsa, nsa prism, NSA whistleblower, Oakstar, Office of General Council, ogc, open source, Penetrating Hard Targets, pirate bay, pirate bay users, pretty good protection, PRISM, prism software, proxies, PROXY, proxy users, relies, secure email, SENTRY EAGLE, snowden, SOMALGET, spying, stellar wind, Stormbrew, Threat Operations Center Oversight and Compliance, torrents, wiretapping, XKeyscore
Category: Surveillance Network
Tags: anti-virus, blackhat, breach, cyber defense code, cyber-criminals, cyber-security, cyber-warfare, data breach, dshell, exploit, exploitation, github, GitHub project, hack, hacked, hacker, Hackers, hacking, malware, open source, open sources, spyware, trojan, us army, vulnerabilities, vulnerability
Category: Surveillance Network
Tags: anti-virus, at risk, blackhat, breach, cross-site scripting, cyber-criminals, cyber-security, cyber-warfare, data breach, devaldi, exploit, exploitation, flaw, FlexPaper, hack, hacked, hacker, Hackers, hacking, malware, open source, pdf, pdf viewer, spyware, trojan, vulnerabilities, vulnerability, wikileaks, Wikileaks users, WikiLeaks.org, xss
Category: Surveillance Network
Tags: anti-virus, backdoor, blackhat, breach, cd00r, cyber-criminals, cyber-security, cyber-warfare, cyberespionage, data breach, Epic Turla, espionage, exploit, exploitation, hack, hacked, hacker, Hackers, hacking, infected Linux systems, infection, kaspersky, linux, linux kernel, linux malware, LINUX SECURITY, malware, netstat, open source, operating system, snake, spyware, tcp, trojan, turla, Turla espionage operation, UDP, Uroburos, vulnerabilities, vulnerability, windows
Category: Surveillance Network
Tags: Anonymous, anonymous chat, anonymous skype, big brother, chatting, messages, messenger, microsoft skype, networking, open source, p2p, peer-2-peer, privacy, privacy-focused, skype, Skype replacement, skyping, social media, social network, Tox, tox id, utox, video chat, web chat
Category: Surveillance Network
Tags: bsd, COMPUTERS, computing, free operating system, free OS, kernel, linux, linux kernel, MINIX, minix os, o.s, open source, operating system, Optimized, pc, small operating system, windows, windows 8.1, windows 9, Windows XP
Category: Surveillance Network
Tags: adobe, adobe cloud, Adobe Photoshop, Adobe Photoshop Express, cheap, cloud, cloud services, Cloud subscriptions, free, free programs, freedom, gimp, liberty, open source, paint.net, photoshop, photoshop subscription, picmonkey, pixlr, rip-off, ripoff, scam, software
Category: Surveillance Network
Tags: browser, browsers, censor, censorship, Closed Source, Digital rights management, drm, DRM-in-HTML, eme, fair use, firefox, freedom, liberty, mozilla, net freedom, open source, open web, opera, suppression, We All Lose
Category: Surveillance Network
Tags: amir taaki, Anonymous, arbiter, bitcoin, blackmarket, communicate privately, cutillo, daemon, dark wallet, DarkMarket, darknet, digital black market, fbi, Federal Bureau of Investigation, file-sharing, github, internet, napster, net, online marketplace, online traders, open source, p2p, peer-to-peer, private net, private web, Ross Ulbricht, seize, seizure, silk road, source code, swanson, taaki, The onion router, tor, trading, underground, underground internet, underground web, Unsystem, zeromq
Category: Surveillance Network
Tags: Adam Schlesinger, coder, goldman, Goldman Sachs, intellectual property, jail, JAILS CODER, license, open source, open-source code, steals
Category: Surveillance Network
Tags: gnu, gnu linux, limux, LiMux project, linux, Munich, Munich Project leader, open source, operating system, Peter Hofmann, political backing, Richard Stallman, windows, wollmux
Category: Surveillance Network
Tags: bpi, bpi website, British Phonographic Industry, copyright, hypocrisy, infringing code, intellectual property, open source, open source license, pirated, Recording Industry Association of America, riaa, riaa website, source code
Category: Surveillance Network
Tags: anti-virus, blackhat, breach, chromium, cyber-criminals, cyber-security, cyber-warfare, data breach, exploit, exploitation, google, hack, hacked, hacker, Hackers, hacking, malware, open source, open-source code, open-source security, pay rewards, reward, security fix, security fixes, Security improvements, security team, spyware, trojan, vulnerabilities, vulnerability