Skip to content
Category: Surveillance Network
Tags: authorized, Blackphone, Blackphone 2, Blackphone 3, Blarney, Boundless Informant, cell phone, confirms, cryptology, David Miranda, Edward Snowden, encryption, end-to-end encryption, executive action, Fairview, Glenn Greenwald, government communications headquarters, guardian, humini, icreah, iso, mobile phone, monitoring, mystic, national security agency, noc, nsa, nsa prism, NSA whistleblower, Oakstar, Office of General Council, ogc, Penetrating Hard Targets, pirate bay, pirate bay users, PRISM, prism software, proxies, PROXY, proxy users, SENTRY EAGLE, silent circle, smart phone, snowden, SOMALGET, spying, stellar wind, Stormbrew, Threat Operations Center Oversight and Compliance, torrents, wiretapping, XKeyscore
Category: Surveillance Network
Tags: axis of evil, Blackphone, Blackphone 2, dmz, encryption, janke, kim jong-un, korea, korean peninsula, korean war, Mike Janke, n.korea, north korea, nuclear war, privateos, pyongyang, secure, secure smartphone, seoul, silent circle, smartphone, south korea, state of war, thermonuclear war
Category: Surveillance Network
Tags: 1984, android, anti-snooping, big brother, Blackphone, Blackphone maker, blacktablet, data collection, data communications bill, datamining, digital privacy, digital rights, fingerprint recognition, fingerprints, fisa, gchq, identification, jon callas, mark of the beast, monitoring, national security agency, nsa, orwell, Plans, privacy, privacy-focused, profiling, rfid, silent circle, silent phone, silent phone app, snoopers charter, snooping, spying, surveillance, surveillance state, tablet, tracing, tracking, wiretap, wiretapping
Category: Surveillance Network
Tags: 1984, big brother, black phone, cell phone, data collection, data communications bill, datamining, digital privacy, digital rights, encryption, fingerprint recognition, fingerprints, fisa, FreedomPop, gchq, identification, mark of the beast, mobile phone, monitoring, national security agency, nsa, orwell, privacy, profiling, rfid, secure phone, security, Semi-Secure, silent circle, smart phone, snoopers charter, snooping, spying, surveillance, surveillance state, tracing, tracking, wiretap, wiretapping
Category: Surveillance Network
Tags: Blackphone, boeing, communication, created, deletes, inoperable, nano, secure communications, Self-Destructing, silent circle, smart, smartphone, top-secret, top-secret communications
Category: Surveillance Network
Tags: android, authorized, big brother, Blackphone, Blarney, David Miranda, Edward Snowden, Encrypted, encryption, executive action, Fairview, Glenn Greenwald, government communications headquarters, guardian, iso, monitoring, national security agency, noc, nsa, nsa prism, NSA whistleblower, Oakstar, Office of General Council, ogc, Penetrating Hard Targets, pirate bay, pirate bay users, PRISM, prism software, proxies, PROXY, proxy users, security, silent circle, smart phone, smartphone, snowden, spying, stealth, stellar wind, Stormbrew, surveillance, Threat Operations Center Oversight and Compliance, torrents, tracking, wi-fi security, wifi, wireless, wiretapping, XKeyscore
Category: Surveillance Network
Tags: authorized, Blarney, David Miranda, deal, Dutch Telecom Operator, Edward Snowden, Encrypted, encrypted phone service, executive action, Fairview, Glenn Greenwald, government communications headquarters, guardian, iso, kpn, monitoring, national security agency, noc, nsa, nsa prism, NSA whistleblower, Oakstar, offer, Office of General Council, ogc, Penetrating Hard Targets, phone calls, phone records, phone service, pirate bay, pirate bay users, PRISM, prism software, proxies, PROXY, proxy users, silent circle, snowden, spying, stellar wind, Stormbrew, telecom, text messages, Threat Operations Center Oversight and Compliance, torrents, wiretapping, XKeyscore
Category: Cell phones, Microwaves, EMF and Wifi
Tags: 1984, big brother, Blackphone, data collection, data communications bill, datamining, digital privacy, digital rights, fingerprint recognition, fingerprints, fisa, gchq, geeksphone, identification, mark of the beast, mobile privacy, monitoring, national security agency, nsa, orwell, privacy, PrivatOS, profiling, promise, rfid, silent circle, snoopers charter, snooping, spying, surveillance, surveillance state, tracing, tracking, wiretap, wiretapping
Category: Surveillance Network
Tags: Blarney, Dark Mail, Dark Mail Kickstarter, David Miranda, Edward Snowden, email, EMAIL PRIVACY, Fairview, Glenn Greenwald, guardian, kickstarter, Ladar Levison, launched, Lavabit, metadata, national security agency, nsa, nsa prism, NSA whistleblower, Oakstar, PRISM, prism software, private email, secure email, silent circle, snowden, spying, stellar wind, Stormbrew, wiretapping, XKeyscore
Category: Surveillance Network
Tags: Blarney, Dark Mail, dark mail alliance, David Miranda, Edward Snowden, email, EMAIL SERVICE, email spying, ENCRYPTED EMAIL, encryption, Fairview, Glenn Greenwald, guardian, hinder, Lavabit, metadata, national security agency, nsa, nsa prism, NSA whistleblower, Oakstar, PRISM, prism software, private email, silent circle, snowden, spying, stellar wind, Stormbrew, unite, wiretapping, XKeyscore
Category: Surveillance Network
Tags: 1984, Anonymizing services, Anonymous, anonymous web-search, big brother, data collection, data communications bill, datamining, digital privacy, digital rights, fingerprint recognition, fingerprints, fisa, gchq, identification, mark of the beast, monitoring, national security agency, nsa, orwell, privacy, private search engines, profiling, rfid, rises, SEARCH ENGINE, silent circle, snoopers charter, snooping, snooping reports, spying, surveillance, surveillance state, tracing, tracking, wiretap, wiretapping
Category: Surveillance Network
Tags: Blarney, Cryptographic, David Miranda, ditches, Edward Snowden, Fairview, Glenn Greenwald, guardian, national security agency, nist, nist cryptographic standards, nsa, nsa prism, NSA SPYING, NSA whistleblower, Oakstar, PRISM, prism software, silent circle, snowden, spying, stellar wind, Stormbrew, thwart, wiretapping, XKeyscore
Category: Surveillance Network
Tags: 1984, Android application, android security, big brother, Blarney, burn, data collection, data communications bill, datamining, David Miranda, defeat NSA, deletion, digital privacy, digital rights, Edward Snowden, erase, Fairview, fingerprint recognition, fingerprints, fisa, gchq, Glenn Greenwald, guardian, identification, mark of the beast, monitoring, national security agency, nsa, nsa prism, NSA whistleblower, Oakstar, orwell, PRISM, prism software, privacy, profiling, rfid, sensitive messages, silent circle, Silent Text, snoopers charter, snooping, snowden, spying, stellar wind, Stormbrew, surveillance, surveillance state, tracing, tracking, wiretap, wiretapping, XKeyscore
Category: Surveillance Network
Tags: 1984, beat, big brother, data collection, data communications bill, datamining, digital privacy, digital rights, Edward Snowden, encryption, end-to-end, fingerprint recognition, fingerprints, fisa, gchq, identification, mark of the beast, monitoring, national security agency, nsa, nsa prism, NSA whistleblower, orwell, PRISM, prism software, privacy, profiling, redphone, rfid, silent circle, snoopers charter, snooping, snowden, spying, stellar wind, surveillance, surveillance state, text secure, tracing, tracking, whisper systems, wiretap, wiretapping