FREEDOM OR ANARCHY,Campaign of Conscience.

Joseph F Barber | Create Your Badge
This blog does not promote, support, condone, encourage, advocate, nor in any way endorse any racist (or "racialist") ideologies, nor any armed and/or violent revolutionary, seditionist and/or terrorist activities. Any racial separatist or militant groups listed here are solely for reference and Opinions of multiple authors including Freedom or Anarchy Campaign of conscience.

To be GOVERNED

Not For Profit - For Global Justice and The Fight to End Violence & Hunger world wide - Since 1999
"Liberty cannot be preserved without a general knowledge among the people" - John Adams - Second President - 1797 - 1801

This is the callout,This is the call to the Patriots,To stand up for all the ones who’ve been thrown away,This is the call to the all citizens ,Stand up!
Stand up and protect those who can not protect themselves our veterans ,the homeless & the forgotten take back our world today


To protect our independence, We take no government funds
Become A Supporting member of humanity to help end hunger and violence in our country,You have a right to live. You have a right to be. You have these rights regardless of money, health, social status, or class. You have these rights, man, woman, or child. These rights can never be taken away from you, they can only be infringed. When someone violates your rights, remember, it is not your fault.,


DISCOVER THE WORLD

Facebook Badge

FREEDOM OR ANARCHY,Campaign of Conscience

↑ Grab this Headline Animator

The Free Thought Project,The Daily Sheeple & FREEDOM OR ANARCHY Campaign of Conscience are dedicated to holding those who claim authority over our lives accountable. “Each of us has a unique part to play in the healing of the world.”
“Every record has been destroyed or falsified, every book rewritten, every picture has been repainted, every statue and street building has been renamed, every date has been altered. And the process is continuing day by day and minute by minute. History has stopped. Nothing exists except an endless present in which the Party is always right.” - George Orwell, 1984

"Until the philosophy which holds one race superior and another inferior is finally and permanently discredited and abandoned, everywhere is war and until there are no longer first-class and second-class citizens of any nation, until the color of a man's skin is of no more significance than the color of his eyes. And until the basic human rights are equally guaranteed to all without regard to race, there is war. And until that day, the dream of lasting peace, world citizenship, rule of international morality, will remain but a fleeting illusion to be pursued, but never attained... now everywhere is war." - - Haile Selassie I of Ethiopia - Popularized by Bob Marley in the song War

STEALING FROM THE CITIZENRY

The right to tell the Government to kiss my Ass Important Message for All Law Enforcers Freedom; what it is, and what it is not. Unadulterated freedom is an unattainable goal; that is what the founders of America knew and understood, which was their impetus behind the documents that established our great nation. They also knew that one of the primary driving forces in human nature is the unconscious desire to be truly free. This meant to them that mankind if totally left completely unrestricted would pursue all things in life without any awareness or acknowledgement of the consequences of his/her own actions leaving only the individual conscience if they had one as a control on behavior. This would not bode well in the development of a great society. Yet the founders of America chose to allow men/women as much liberty as could be, with minimum impact on the freedom or liberties of others

Wednesday, October 26, 2016

SOME TRUTH ABOUT HILLARY & THE HACKERS

SOME TRUTH ABOUT HILLARY & THE HACKERS




hillarythe-hackers
I’ve been watching ridiculous stories on the “hacked” emails of Hillary, John Podesta, et al, and I think it’s time to insert a bit of reality to the discussion. So, if you have any interest in this, here are some points to consider:

1. Anyone could have hacked Hillary.

People ask me, “Do you think it was the Russians who hacked Hillary?” I tell them that I have no idea who did it, but, “Yeah, sure, it could have been the Russians. Given the lack of security on her server, however, it could also have been the teenager down the street.”
Hillary’s server was more or less wide open. Given enough motivation and a bit of time, any reasonably technical person could have stolen those emails. In the words of one specialist, Hillary’s server was “total amateur hour.” How that happens for a Secretary of State (or a President) is a rather serious question.
Bear in mind that this would be the right setup for purposely leaking information while still being able to claim ignorance, or at least incompetence. I have no idea whether that’s true or not, but I do have to wonder.

2. No one broke into Podesta’s computer.

John Podesta, by all available information, wasn’t hacked, as most people envision hacking. Instead, he fell for a phishing scheme. Someone pretending to be Google suckered him into giving them his password. (You didn’t really think the elite were smarter than the rest of us, did you?)
Once the phishers had Podesta’s password, the rest was simply a vacuuming operation. Then came some kind of handoff to Wikileaks, and the rest was history. And there will be fallout from this for a long time, whether or not media sellouts allow it to be reported. Lots of people are insulted and exposed in those emails.

3. Google has plenty of it.

John Podesta, if you’ve noticed, used a gmail address, meaning that Google sucked his messages up as they were being written – all of them. They also had a ton of Hillary’s “lost” emails. Google literally owned every email from these addresses and dozens of others involved:
john.podesta@gmail.com, cheryl.mills@gmail.com, brianefallon@gmail.com, lauren.elena.smith@gmail.com
And perhaps more importantly, they have everything from bigcampaign@googlegroups.com.
Please understand that Google processed those messages for profitable information immediately. If you have any doubt on this point, consider this: How long does it take them to show you ads for ski resorts after you search for ski boots?
Please don’t imagine that they don’t look at political things; those are far more valuable than your skiing habits, and Google survives by mining information. (In other words, they grab everything they can… which you agreed to in their terms of service.) Google doesn’t charge for your searches, do they? And yet they bring in billions of dollars per month.
This is a useful question: What might you do with tens of thousands of emails to and from insiders and acres of computers to sort them all? Well, that’s about what Google’s doing.

4. NSA has it all.

The NSA has almost everything. We’ve known for a decade or more that they were simply copying everything that went through AT&T facilities. Their data center in Utah was built to store and search all those communications.
William Binney, formerly a senior official at NSA, says that it was probably an intelligence worker behind the DNC leaks, and he might be right – they have it all.
The NSA, put simply, is the largest hacker collective on the planet. They can take over more or less what they want, when they want.

5. Other people have the emails.

All those “lost” emails had recipients, didn’t they? Sure they did, and all those people – and their email servers – have or had copies of everything. And yet I’m not aware of any effort to gather them all up.
This guy says hackers used his servers and that he has records… and that no one from the FBI has bothered to call him.

6. Julian Assange is a front man.

Another good thing to understand is that Julian Assange is the face of Wikileaks, but he doesn’t do all the work himself, and he’s not manning the switches. Lots of other people are doing the daily work. Julian just volunteered to stand in front. And given what’s been happening to him over the past six years or so, you have to say that he’s one seriously brave and tough guy.
One thing Julian gets solo credit for is exposing the Google-State Department connection. (Or perhaps partnership is a better term.) If you’d like the details, see this book by Assange. It’s pretty damning.
* * * * *
Serious data protection requires a professional provider, not amateurs or hucksters. If you’re ready to be serious, Cryptohippie will let you try their service for free. One week, no credit card, no BS. Try it, then either buy or don’t. Use this link.

SOME TRUTH ABOUT HILLARY & THE HACKERS




hillarythe-hackers
I’ve been watching ridiculous stories on the “hacked” emails of Hillary, John Podesta, et al, and I think it’s time to insert a bit of reality to the discussion. So, if you have any interest in this, here are some points to consider:

1. Anyone could have hacked Hillary.

People ask me, “Do you think it was the Russians who hacked Hillary?” I tell them that I have no idea who did it, but, “Yeah, sure, it could have been the Russians. Given the lack of security on her server, however, it could also have been the teenager down the street.”
Hillary’s server was more or less wide open. Given enough motivation and a bit of time, any reasonably technical person could have stolen those emails. In the words of one specialist, Hillary’s server was “total amateur hour.” How that happens for a Secretary of State (or a President) is a rather serious question.
Bear in mind that this would be the right setup for purposely leaking information while still being able to claim ignorance, or at least incompetence. I have no idea whether that’s true or not, but I do have to wonder.

2. No one broke into Podesta’s computer.

John Podesta, by all available information, wasn’t hacked, as most people envision hacking. Instead, he fell for a phishing scheme. Someone pretending to be Google suckered him into giving them his password. (You didn’t really think the elite were smarter than the rest of us, did you?)
Once the phishers had Podesta’s password, the rest was simply a vacuuming operation. Then came some kind of handoff to Wikileaks, and the rest was history. And there will be fallout from this for a long time, whether or not media sellouts allow it to be reported. Lots of people are insulted and exposed in those emails.

3. Google has plenty of it.

John Podesta, if you’ve noticed, used a gmail address, meaning that Google sucked his messages up as they were being written – all of them. They also had a ton of Hillary’s “lost” emails. Google literally owned every email from these addresses and dozens of others involved:
john.podesta@gmail.com, cheryl.mills@gmail.com, brianefallon@gmail.com, lauren.elena.smith@gmail.com
And perhaps more importantly, they have everything from bigcampaign@googlegroups.com.
Please understand that Google processed those messages for profitable information immediately. If you have any doubt on this point, consider this: How long does it take them to show you ads for ski resorts after you search for ski boots?
Please don’t imagine that they don’t look at political things; those are far more valuable than your skiing habits, and Google survives by mining information. (In other words, they grab everything they can… which you agreed to in their terms of service.) Google doesn’t charge for your searches, do they? And yet they bring in billions of dollars per month.
This is a useful question: What might you do with tens of thousands of emails to and from insiders and acres of computers to sort them all? Well, that’s about what Google’s doing.

4. NSA has it all.

The NSA has almost everything. We’ve known for a decade or more that they were simply copying everything that went through AT&T facilities. Their data center in Utah was built to store and search all those communications.
William Binney, formerly a senior official at NSA, says that it was probably an intelligence worker behind the DNC leaks, and he might be right – they have it all.
The NSA, put simply, is the largest hacker collective on the planet. They can take over more or less what they want, when they want.

5. Other people have the emails.

All those “lost” emails had recipients, didn’t they? Sure they did, and all those people – and their email servers – have or had copies of everything. And yet I’m not aware of any effort to gather them all up.
This guy says hackers used his servers and that he has records… and that no one from the FBI has bothered to call him.

6. Julian Assange is a front man.

Another good thing to understand is that Julian Assange is the face of Wikileaks, but he doesn’t do all the work himself, and he’s not manning the switches. Lots of other people are doing the daily work. Julian just volunteered to stand in front. And given what’s been happening to him over the past six years or so, you have to say that he’s one seriously brave and tough guy.
One thing Julian gets solo credit for is exposing the Google-State Department connection. (Or perhaps partnership is a better term.) If you’d like the details, see this book by Assange. It’s pretty damning.
* * * * *
Serious data protection requires a professional provider, not amateurs or hucksters. If you’re ready to be serious, Cryptohippie will let you try their service for free. One week, no credit card, no BS. Try it, then either buy or don’t. Use this link.



No comments :