This page has been archived and commenting is disabled.

The Whistleblower's Guide To Secretly Tipping Off The Press In A "Turnkey Totalitarian" State

Tyler Durden's picture


When over four years ago we put together our "How To [Read/Tip Off] Zero Hedge Without Attracting The Interest Of [Human Resources/The Treasury/Black Helicopters]" Guide", many thought we were being paranoid. We weren't, as last week's revelations by Edward Snowden demonstrated to the entire world. And yet, besides those from the intelligence community, few realized just how deep the reach of the Turnkey Totalitarian Tyranny ("TTT" or the Orwellian Banana Republic) truly goes.

So as the Snowden enthusiasm spreads and more and more insiders with intimate knowledge of the broken system step up to expose the unconstitutional actions and illegal deeds that occur each and every day in the dark corner of US society well on its route to inevitable dissolution (ref USSR and WB Yeats), the question arises: how to do it, especially if one is not ready to take the full plunge and go public, facing the threat of death by treason by the same TTT state referenced above. How to leak information to the press and other distribution agents without tipping off the very espionage agency at the nexus of it all?

Luckily while information may be intercepted at every electronic turn, it still is largely free (at least until the advent of the Internet kill switch). So for all you wannabe Snowdens out there, here from Wired's Nicholas Weaver, is the perfectly timed "The Whistleblower’s Guide to the Orwellian Galaxy: How to Leak to the Press", which is by no means an exhaustive list of what one should do to preserve anonymity on the internet, but it certainly is a step in the right direction, and not just for leakers but for anyone who wishes to preserve some control over what information is intercepted daily. Because remember: assume everything you put out in the ether by electromagnetic waves is intercepted, decoded, stored and eventually used against you in a secret court above the law.

From Wired:

The Whistleblower’s Guide to the Orwellian Galaxy: How to Leak to the Press

Daniel Ellsberg, Mark Felt, Jeffrey Wigand, Sherron Watkins, Bradley Manning, and now… Edward Snowden. (He’s just the latest informant caught in the web of government administrations that view George Orwell’s 1984 as an operations manual.)

But while the list of government (and corporate) whistleblowers continues to grow, their options for leaking continue to shrink. It is, as one commenter noted, “a dangerous time to be right when the government is wrong.” We now live in a world where public servants informing the public about government behavior or wrongdoing must practice the tradecraft of spies and drug dealers à la The Wire. Even the head of the CIA can’t email his mistress without being identified by the FBI. And privately collected data isn’t immune, either; highly sensitive metadata is particularly vulnerable thanks to the Third Party Doctrine.

So how can one safely leak information to the press, let alone coordinate a Deep Throat-style meetup? The obvious choices: email, phone, and mail … but you’ve got to be really careful. Here’s a guide.

The parking garage where Bob Woodward met Mark Felt (Deep Throat).

Leaing by Email

The CIA supposedly already provided a guide to secure email, which the Russian Federal Security Service (FSB) translated back to English — convenient, given the situation we now find ourselves in.

Get a dedicated computer or tablet: the cheapest Windows laptop will do. And pay cash, as our normal laptops have a host of automatic synchronization and similar services. Our personal web browsers also contain all sorts of location-identifying cookies. Even if you’re logged in to but don’t actually visit Facebook’s home page, a subpoena to Facebook can still reveal where you connect and what pages you visit — every “Like” button reports to Facebook that you are visiting that particular page, at a particular time, from a particular IP address.

Leave your cellphone, your normal computer, and your metro card (like SmarTrip) at home: anything that speaks over a wireless link must stay behind. Then go to a coffee shop that has open Wi-Fi, and once there open a new Gmail account that you will only use to contact the press and only from the dedicated computer. When registering, use no personal information that can identify you or your new account: no phone numbers, no names.

Don’t forget: if you get anything at the cafe, or take public transit, pay cash. Be prepared to walk a bit, too; you can’t stay close to home for this.

Of course, the job still isn’t finished. When you are done you must clear the browser’s cookies and turn off the Wi-Fi before turning off the computer and removing the battery. The dedicated computer should never be used on the network except when checking your press-contact account and only from open Wi-Fi connections away from home and work.

Leaking Over the Phone

Again, start by leaving all electronic devices at home. Go to a small liquor store in a low-income neighborhood, and buy a pre-paid cellphone (TracPhone or similar) with cash. Make sure it has enough airtime to not expire for a few months — T-mobile prepaid is particularly good since the pay-as-you-go plan doesn’t expire for a full year if you buy $100 of airtime.

By the way, I would personally look for a store with security cameras that look old — a continuous tape or similar setup — since once the FBI has the number, the next step is to contact the store that sold the phone. Alternatively, you can get someone else to walk into the store and buy it for you.

You now own your very own “burner” phone — remember The Wire? – and this phone must remain off with the battery removed at all times. Because every active cellphone is effectively a continuous GPS, monitoring your location and feeding the information to the phone company which retains this information for weeks, months, even years. Just a warrant-step away.

Now, to use the phone … Once again, go to a different location without carrying your normal devices, turn on the phone, check your voicemail, make your call, turn it off again, and pull out the battery. Your phone calls are now (hopefully) anonymous so that when the FBI leak-hunt starts, there is no trail for them to follow.

Of course, the burner laptop or phone could still identify you if it’s ever found, as they both contain network identifiers built into the hardware. So if you ever need to abandon your device, first wipe the device back to its factory fresh configuration using any “secure erase” options available, then take a hammer and break the device. Put it in some other piece of trash (like an empty McDonald’s sack), go for another stroll, and drop in a public trashcan.

But if the feds are already following you, you’re caught anyway, so it doesn’t matter if they catch you taking out the trash instead of finding something when they search your home.

Leaking by Mail

Investigative journalist Julia Angwin of the Wall Street Journal pointed out that physical mail, dropped in a random post-box with a bogus return address, is perhaps the best way for anonymous one-way communication. Perhaps the best use of mail is simply to send the reporter a burner phone pre-programmed to only call your burner.

Believing that the U.S. Postal Service recorded specific mail address information only when asked by law enforcement, I had previously argued that there’s no history with mail — and even if there were, it could only be traced to the processing post office.

However, The Smoking Gun spotted — buried in an affidavit! — that the U.S. Postal Service records the outside of mail. According to the full affidavit (also available on RECAP; see page 5) the machine used to automate mail operations, the Automated Facer Canceler System, contains a “Mail Isolation Control and Tracking” program that photographs every single piece of mail and maintains this information for future access by law enforcement.

Although there’s no mention of optical character recognition to allow indexing by recipient rather than by postmark, leakers must now assume that the U.S. government is indeed recording the outside of everything we mail. A leaker should therefore access a public postbox in the same way s/he uses a burner phone:  Leave all devices behind, walk to a remote postbox, and follow all the other guidelines above. But be sure to include a note to the reporter telling him or her to trash the envelope immediately.


All of this may seem like a script for a fictional T.V. show. But such extreme measures are a modern necessity if you want to leak information. Any future Deep Throat needs to follow these sorts of procedures if he or she wishes to talk to the press.

Though just imagine if Mark Felt had to do all of the above when leaking to Woodward and Bernstein. Snowden might have been willing to out himself … but not everyone is.


- advertisements -

Comment viewing options

Select your preferred way to display the comments and click "Save settings" to activate your changes.
Mon, 06/17/2013 - 21:13 | 3666570 ACP
ACP's picture

You do all that so the ignorant public can say, "Yeah I totally agree with Obama suppressing the Tea Party and anyone else who doesn't agree with our Dear Leader."

Yeah, we're done.

Mon, 06/17/2013 - 21:21 | 3666591 howenlink
howenlink's picture

I prefer Leaking by Tree.  My neighbors are much less likely to turn me in.

Mon, 06/17/2013 - 21:38 | 3666633 Doña K
Doña K's picture

Getting a gmail account now I believe that you must give them a phone number for verification by sending you a text or a call back. At least that was true when I got a gmail acount overseas last month. I have not tried in the US.

Mon, 06/17/2013 - 21:41 | 3666637 oddjob
oddjob's picture

That's Reggie's baby.

Mon, 06/17/2013 - 21:57 | 3666663 ZerOhead
ZerOhead's picture

This has now left me wondering what kind of 'terrorist attack' would have to be unleashed on the public for the Cheney/Obama administration to get the support needed to pass legislation requiring that ALL mail be sent in clear plastic ziplock baggies... one sheet only... folded and written side out...

Oh... and garbage too.

Mon, 06/17/2013 - 22:04 | 3666689 Jendrzejczyk
Jendrzejczyk's picture

+1000 for "Cheney/Obama administration"!

Mon, 06/17/2013 - 23:32 | 3666912 Supernova Born
Supernova Born's picture

You only hear about the dumb criminals and hear from the very smart whistleblowers.

Tue, 06/18/2013 - 01:14 | 3667140 saveandsound
saveandsound's picture

Use Firefox and install Collusion:

Then you can easily see that ZH is tracking you by, and - just saying.

ZH is selling the book. 

Tue, 06/18/2013 - 01:59 | 3667198 putaipan
putaipan's picture

just google "putaipan" if want some shits and giggles.

Tue, 06/18/2013 - 10:58 | 3668085 Triggernometry
Triggernometry's picture

Leaving your devices behind still isn't enough, you may have to consider getting somebody to use your devices while you're not, mimicing the same activity from a routine location, if you really want an airtight seal.

Tue, 06/18/2013 - 01:39 | 3667175 Telemakhos
Telemakhos's picture

Hotmail accounts don't require any external forms of verification.  No phone number, no second e-mail address.

Gmail tries to get existing users to give a phone number; I don't know about new users. Facebook started doing the same a few years ago, about when I stopped using it.  

A number of services started to ask for "two-step verification" via phone, all about the same time.  The knee-jerk interpretation is that PRISM is tying together accounts via common data like phone numbers.  This has a, perhaps unintended, corollary, though: an account tied to a US phone number should be legally problematic for NSA's collection, if they want to claim that they don't knowingly collect data in-country.  If a Gmail account is flagged with a US phone number, and PRISM collects data from that account, the PRISM operators have absolutely no cover from accusations that they don't know what country they're collecting from.

I'm not suggesting by any stretch of the imagination that anyone is suddenly immune from eavesdropping by attaching a US phone number to a Gmail account, but, if the partner companies like Google have been associating accounts with phone numbers for years, it would go some way towards rebutting NSA arguments that they can't determine the location of their data collection targets.  It would be nice if someone in Congress asked about that at the next round of softball hearings.

Tue, 06/18/2013 - 03:30 | 3667261 zhandax
zhandax's picture

I have had my hotmail account since before MS bought it.  Consequentially, it attracts so much spam, it is the lowest tier of my junk accounts.  OT (maybe) has anyone else noticed the damage control Google is attempting now on their Firefox start page?

Tue, 06/18/2013 - 14:59 | 3669093 matrix2012
matrix2012's picture

Just dump the Gmail/Yahoo/Hotmail accounts or use them for trivia only... try some resources beyond the reach of Great Orwellian Republic apparatchiks such as Tencent QQMail with English user interface - more info here:  --> easy to set up, request only a little info, and definitely NO phone number is required!

Tue, 06/18/2013 - 15:59 | 3669221 Telemakhos
Telemakhos's picture

QQ?  The Chinese QQ?

Thanks, but I'll take my chances with the NSA.  At least they aren't as likely to censor what I say, just read it.

Wed, 06/19/2013 - 13:36 | 3672090 matrix2012
matrix2012's picture

What to censor??? have been using QQMail with no problem, they asked minimum questions; in fact yahoo did put some censor upon my outgoing emails many times, you may explore on your own if you happen to have email account at yahoo, just try to send out some emails with "agitative" subjects or "triggering" keywords, see how the yahoo reacts!

To choose between a giant Orwellian Republic and a said Police State, i prefer the latter knowing at least the latter won't drone you ;-) while the former has been repeatedly proven to favor violences and agressions into every part of the globe!! The giant Orwellian Republic simply knows no border in conducting their sickening violences and armed agressions!!


from my earlier post

"The fact that Snowden fled to Hong Kong, a Chinese territory, is not evidence that he is a spy, but rather of the collapse of basic legal and democratic norms in the United States and all of its allies in Europe, Asia and around the world. As the illegal NSA spying on US citizens demonstrates, the differences between American “democracy” and the Chinese police state are rapidly narrowing. The class logic is the same."

Mon, 06/17/2013 - 22:38 | 3666779 Joe Sixpack
Joe Sixpack's picture

"I prefer Leaking by Tree.  My neighbors are much less likely to turn me in."


Please. Don't turn and face them while leaking.

Mon, 06/17/2013 - 21:25 | 3666600 StarTedStackin'
StarTedStackin''s picture

We are done as long as good people do nothing.

Mon, 06/17/2013 - 21:47 | 3666651 WarriorClass
WarriorClass's picture

When democracy turns to tyranny, the armed citizen still gets to vote.

Time the Americans started voting.

Mon, 06/17/2013 - 22:40 | 3666753 ZerOhead
ZerOhead's picture

I can not even begin to tell you how bad of an idea that is...

Never forget that that particular outcome is EXACTLY what they need to get either the public support or create the apathy to gun rights necessary to remove all guns (and freedoms) from everyone ala the botched "Fast and furious" operation for good.

Remember it is the fear they may have of those with firearms (mostly just as a voting block right now) that stop them from taking everyones weapons away.

If shooting starts they have no choice but to act to preserve the status quo and remove your rights forever.

Besides there will be a whole lot of dangerous nuts out there if a state of anarchy ever arises... remember Iraq? ... just sayin'...

Now if you don't mind I've got to go and get back to my carrier pigeon breeding business... some guy with a heavy accent named 'Al' called and told me he'll take as many as he can get...

Mon, 06/17/2013 - 23:37 | 3666957 Herd Redirectio...
Herd Redirection Committee's picture

My take is: 'their' specialty is the use of force.  If you give them an excuse to use force, they will.  They will probably overdo it, even.  Think Ruby Ridge x1000.

Force is the last resort, and even then, the fighting will have to take the form of asymmetric warfare AKA guerilla warfae AKA 'terrorism'.  Guerilla warfare is what makes the continued use of force to oppress the population untenable. 

Preferably, IMO, we win the Information War.  But even that is easier said than done, when you are telling people not to trust the Gov't, the same gov't that has promised them SS, Pension, Medicare, old age benefits, etc etc etc.  The key is telling them those promises were made to be broken.  Still a tough sell at the end of the day, though.

Tue, 06/18/2013 - 00:06 | 3667012 ZerOhead
ZerOhead's picture

You are correct. The "Information War" is where freedom will be either won or lost. Either that or merely become self sufficient and withdraw from their economy as much as practicality permits and the beast will eventually starve. Heck... the bankers have practically done all of the heavy lifting for us already...

Do NOT give them an excuse to act with force or all (and I mean ALL) will be lost.

Tue, 06/18/2013 - 01:14 | 3667134 Spanky
Spanky's picture



Do NOT give them an excuse to act with force... -- ZerOhead

Amen. Have I mentioned how particularly charming you appear in this light? Perhaps we could chew the fat?

The "Information War" is where freedom will be either won or lost. -- ZerOhead

Tue, 06/18/2013 - 01:46 | 3667187 theabyss11
theabyss11's picture

I agree...A shooting war is what they want in the end. All these people who think that they can outshoot the military are delusional. Thats what they're counting on. They want anarchy so that they can bring in the military to "restore order". And the people will welcome it with open arms too. And it'll never go away after that...

If you want to really bring down the government I suggest going after their money. The financial system is the cornerstone of all the corruption this country but in reality its just a house of cards right now. The best way to take them down is to start a bank run. Have a coordinated effort to default on all debt and pull money out of the financial system. It wouldn't even take a majority of the country to pull it off. When they fall, refuse to bail them out and throw all those jackals in prison. Start again...hold new elections where all campaign donations are made by individual citizens and capped at a certain level..Make corporate and business donations illegal. They aren't people after all...they don't deserve to have a say.

Of course this would cause the whole system to crash...but I say better to take it down on our own terms. Its fucking coming down eventually anyway. But unfortunately this plan requires people to actually sacrifice and feel a little pain temporarily..which is always a tough sell...even when its better for them in the end..It requires people to get off their ass and take a risk. But its relatively bloodless and peaceful compared to the alternative.


Tue, 06/18/2013 - 02:05 | 3667204 Spanky
Spanky's picture

How delightfully twisted! I like the way you think. Care to share ideas?

Tue, 06/18/2013 - 02:06 | 3667207 theabyss11
theabyss11's picture

I mean...Imagine say..100K people all signing an agreement that they agree to default on their debt and empty their bank accounts as soon as that number of signers is reached. That would do some damage...Multiply whatever leverage the banks are using on that money at the would hurt them. If you publicize it well, then the panic would be contagious. As people started to see the number of signers rise they might get worried about their own money and pull it out before the number is even reached. Every new 20k or so after that would trigger the next wave of protesters...Some people might not agree with the idea of defaulting on their debts. But by doing it together you get more protection. I'm telling you...its the only right way to do it.

Tue, 06/18/2013 - 02:54 | 3667240 Spanky
Spanky's picture

Perhaps BOA would be a convenient, nation-wide target. Everybody can play -- it's for a worthy cause.

It's late and I'm tired, though I really would like to do a little brainstorming sometime. I like what you're describing. There is safety, and effectiveness, in numbers. We need numbers.

Tue, 06/18/2013 - 03:37 | 3667263 zhandax
zhandax's picture

An outstanding idea for your own financial preservation, but don't ever think an organized (or otherwise) 'bank run' on a TBTF can outrun <ctrl> <prnt>.

Tue, 06/18/2013 - 10:40 | 3667982 Fish Gone Bad
Fish Gone Bad's picture

Anyone remember the fable about putting a bell on the cat?  How about The Little Red Hen?


Tue, 06/18/2013 - 08:28 | 3667457 Ranger4564
Ranger4564's picture

I don't know if anyone else suggested this on any of the other Snowden posts, but it's my opinion that the NSA surveillance program is about monitoring for uprisings by the citizenry... they are not looking for foreign terrorists, they're looking for regional dissenters. And they're monitoring foreign nations not because they're snooping, they're aiding and abetting the authorities in those nations. This is all in support of the Oligarch intention to install the NWO, so they need all controlled regions to be monitored to prevent any uprisings that will become an obstacle to their NWO.

Now that that's out in the open, maybe we can stop wasting so much time chest thumping about how we're all going to do something, next time, if things get any worse than they are this time. No one will do anything. It's already too late. But, now you know why the global machine built the global surveillance mechanism... to stop the citizens.

Tue, 06/18/2013 - 15:16 | 3669130 matrix2012
matrix2012's picture


The NSA revelations and Obama’s “pivot to Asia”

By John Chan, 17 June 2013

Edward Snowden’s revelations about the vast and illegal American electronic surveillance and spying operations inside the US and internationally have punctured the propaganda propagated by the Obama administration to justify its aggressive “pivot to Asia” aimed against China.

The US cynically presents itself as a force for regional stability, peace and “human rights” and the leader of Asian democracies—Japan, India and Australia—against the bullying of autocratic China. Under this guise, Washington has waged a determined offensive throughout the region to strengthen strategic alliances, build up military forces and consolidate trade ties in a bid to undermine Beijing’s influence.

In the lead-up to the recent summit with Chinese President Xi Jinping, the Obama administration mounted a concerted campaign aimed at branding China as the number one “cyber threat” to the US and the world. A Pentagon report last month directly accused the Chinese government and military of large-scale cyber intrusions into American government, military and corporate computer networks. During the summit, Obama provocatively declared that alleged Chinese cyber espionage was the “direct theft of US property.”

In reality, as Snowden’s exposure of NSA operations confirms, the US military and intelligence apparatus has built up the world’s largest and most advanced cyber warfare machine, which it aggressively uses against the American people and any country regarded as a current or potential threat to the interests of American imperialism.

As Beijing has repeatedly alleged, China is a prime target. Snowden presented specific evidence to the South China Morning Post in Hong Kong last week that the NSA had hacked into hundreds of civilian computers in Hong Kong and China since 2009, including Hong Kong’s Internet Exchange, which handles all of the city’s web traffic. Having gained access to network backbones, the agency could gather information from hundreds of thousands of computers.

“The primary issue of public importance to Hong Kong and mainland China should be that the NSA is illegally seizing the communications of tens of millions of individuals without any individualised suspicion of wrongdoing. They simply steal everything so they can search for any topics of interest,” Snowden warned.

American intelligence expert Matthew Aid provided further confirmation of the NSA’s massive cyber operations against China in an article last week in Foreign Policy. He revealed that the US has been engaged in large-scale hacking of Chinese computer and telecommunications networks for the past 15 years.

Aid also exposed the existence of a highly secretive unit within the NSA’s Signal Intelligence Directorate known as the Office of Tailored Access Operations (TAO). The TAO, he said, employs 1,000 military and civilian hackers, analysts and engineers. Not only has it produced “some of the best and most reliable intelligence” about China, he stated, but it has been tasked with assembling the information needed for the US “to destroy or damage foreign computers and telecommunications systems with a cyber-attack.”

These revelations expose the Obama administration’s lies that the NSA spying is to protect the US from terrorist attack. The criminality of the American cyber operations against China is rooted in the imperialist character of the entire policy of the “pivot to Asia.” The US is determined to use its military might to prevent any challenge from China’s economic rise to its dominance in Asia since the end of World War II.

The NSA’s massive cyber operations are intimately bound up with US preparations for war against China. High-level US intelligence sharing with close allies in Asia goes hand in hand with establishing new military basing arrangements with Australia, Singapore and the Philippines, restructuring and reinforcing existing US bases in Japan, South Korea and Guam, and building up anti-ballistic missile systems in the region as part of Washington’s nuclear war plans.

The US has encouraged allies such as Japan and the Philippines to take a more assertive stance against China, heightening tensions in maritime disputes in the East China Sea, South China Sea and other regional flashpoints. By elevating the alleged cyber threat posed by China, Washington is preparing the pretext for a provocative cyber attack that risks escalating into a wider conflict. The Obama administration has already claimed the right to launch pre-emptive cyber attacks—as it has already done against Iran’s nuclear program.

In the wake of the NSA revelations, the American media and political establishment have launched an all-out campaign to vilify Snowden for exposing the NSA’s criminal operations at home and abroad. The latest lie that he might be a double-agent working for the Chinese government is particularly sinister, given the Obama administration’s history of targeted assassinations of US citizens.

The fact that Snowden fled to Hong Kong, a Chinese territory, is not evidence that he is a spy, but rather of the collapse of basic legal and democratic norms in the United States and all of its allies in Europe, Asia and around the world. As the illegal NSA spying on US citizens demonstrates, the differences between American “democracy” and the Chinese police state are rapidly narrowing. The class logic is the same. Just as the Chinese government is preoccupied with suppressing social unrest, so the US financial oligarchy regards the American people as a threat to its vast wealth and privileges.

The defence of Edward Snowden is an urgent issue not only for workers in America, but in Asia and internationally. He is being targeted for exposing the extent of the intelligence apparatus that has been established by the US to prosecute war against its international rivals and suppress domestic opposition to its austerity agenda at home.

The drive towards war and dictatorial forms of rule is rooted in the breakdown of the profit system, which has produced sharpening geo-political tensions between rival capitalist powers and growing opposition and resistance in every country to the relentless assault on the social position of the working class. The defence of democratic rights can be realised only through a unified socialist movement of the international working class to abolish capitalism. This means the building of sections of the International Committee of Fourth International, the world Trotskyist movement, throughout Asia and around the world.



Related link:

NSA leak fallout: LIVE UPDATES

Tue, 06/18/2013 - 20:55 | 3669937 Ranger4564
Ranger4564's picture

Thanks for the informative post and the link. Much apreciated.


By the way, I believe that all governments all over the world are working at the behest of the Oligarchs, at least all of the nations that engage in central banking / international banking. I include China and Russia in there, along with India, and all the western nations obviously. I often see these events / stories as equivalent to entertainment TV, good cop bad cop. Sure, there may be naive / gullible politicians and affiliates all across the globe, but there are many bankers who are complicit, and there are many political / military personnel who are willing to cooperate for a bribe / favor, in support of the Oligarchs demands. So I don't think of China or Russia as a potential enemy, I see them as playing the black uniforms against the white uniforms of the western powers, in a war that is mostly a show to strengthen the control infrastructure of the oligarchs. A lot of innocent people will die but the result will be the same no matter who wins, if there is a winner...


We as  a civilization are struggling through the transition from a Scarcity model to a Surplus model, and with the surplus comes a reduction in demand for labor... that is resulting in the global unemployment, that is resulting in the increasing debt, that is actually facilitated by the bankers in the first place. So we're living through 2 events... 1 is a natural evolution of civilization albeit the citizenry are completely unprepared / unaware, and 2 is the intentional destruction of the Surplus model by the Bankers / Politicians / Military / Police / Oligarchs, so they can retain control within the Scarcity model.  If only people could see the magnitude of the circumstance... we can either enter into a future of prosperity / plenty, or we return back into a depraved financial system of deprivation / dark ages. I'm trying my damndest to get these people to listen, but so many are hell bent on preserving the scarcity model so they can add value to their tiny penises. Go figure.

Best of luck to you.

Mon, 06/17/2013 - 22:39 | 3666782 Iocosus
Iocosus's picture

You gonna shoot an Apache with thermal vision from five miles away? How about a drone?

Mon, 06/17/2013 - 22:54 | 3666850 wisehiney
wisehiney's picture

Granny Clampett could.

Mon, 06/17/2013 - 22:16 | 3666683 ZerOhead
ZerOhead's picture

Which is why we are doomed...

Nial Ferguson said it best when he said "Empires in decline are always bloodier than those in ascension/revolution..." or something to that effect...

Mon, 06/17/2013 - 22:01 | 3666686 wisehiney
wisehiney's picture

The dangerous now are those who support tyranny. When good men have nothing left to lose, maybe then.

Mon, 06/17/2013 - 22:49 | 3666830 wisehiney
wisehiney's picture

Might as well fight. My hiding place is revealed.

Mon, 06/17/2013 - 21:56 | 3666672 nmewn
nmewn's picture

If they can't figure out all the Tea Bag senders and mark them for FEMA camp re-education, I'm thinkin mail it ALL in

Mon, 06/17/2013 - 23:28 | 3666937 TahoeBilly2012
TahoeBilly2012's picture

Yea good luck with the "rainbow coalition" going door to door for the guns. Of course in multiple languages and starting with "please", then reading some decree right out of a Monty Python script.

Mon, 06/17/2013 - 21:18 | 3666573 seek
seek's picture

This looks pretty good, but I'd suggest using Tails ( on a live USB drive on the throwaway computer. Tails will provide access via TOR, by default records nothing to the drive, and when removed from the PC, the PC behaves normally and will have no trace of the Tails activities on it, nor will the Tails USB drive have any information, either.

If you want to get fancy, use a USB wireless card as well, perhaps removing the laptop's own wireless card. Then you only have to dispose of a tiny USB dongle and the USB drive to get to deniability status.


Tue, 06/18/2013 - 07:43 | 3667316 Urban Redneck
Urban Redneck's picture

Tails includes macchanger out of the box, but it isn't configured to run automatically so you would need to run macchanger -a <devicename> from the command prompt w/ the desired interface temporailly disabled (or modify netcfg, or build your own customized live cd) - you can also install Tails on an SD (or micro SD) memory card instead of a USB drive which is easier to lose if necessary, and can be innocuously stored in a cell phone or digital camera when not needed. 

Mon, 06/17/2013 - 21:26 | 3666581 IridiumRebel
IridiumRebel's picture

Whatever you do, CNN should not be your "go to" press agency and definitely don't "check in" on Facebook. "Totes m'goats @ laundromat, cleaning whites and tipping Wolf Blitzer to rad USA spying. Later calamari."

Mon, 06/17/2013 - 22:10 | 3666711 Notarocketscientist
Notarocketscientist's picture

Follow the rules above..... and post your leak on ZH.

Mon, 06/17/2013 - 21:19 | 3666584 One And Only
One And Only's picture

Use the Orphan Annie Decoder ring.

Simple, discreet, easy.

Mon, 06/17/2013 - 21:27 | 3666602 WmMcK
WmMcK's picture

Will my PF Flyer one work?

Mon, 06/17/2013 - 22:44 | 3666797 Pool Shark
Pool Shark's picture








Tue, 06/18/2013 - 00:15 | 3667036 Hulk
Hulk's picture

ItS hArDeR tO DeCiPhEr WheN WrItTeN lIkE ThIs...

Tue, 06/18/2013 - 02:03 | 3667202 putaipan
putaipan's picture

cap'n crunch dialin' in ....

Mon, 06/17/2013 - 21:19 | 3666587 1C3-N1N3
1C3-N1N3's picture

Reads like the Hitman's Handbook.

Mon, 06/17/2013 - 21:22 | 3666589 Iocosus
Iocosus's picture

Not entirely convinced this guy is working for the people (us) just yet. His past does not pan out.

Mon, 06/17/2013 - 21:52 | 3666662 BlueCollaredOne
BlueCollaredOne's picture

Can't tell if trolling or serious.   

Mon, 06/17/2013 - 22:09 | 3666695 ZerOhead
ZerOhead's picture

So far it looks more like the real deal than not. I can't imagine for what reasons TPTB would wish to bring this kind of attention to their programs this early in the game unless they do something so horrible to him that they are certain no one will ever leak again.

Mon, 06/17/2013 - 22:18 | 3666728 The Thunder Child
The Thunder Child's picture

The one reason I am pretty sure this is real is implicating major companies like Google, Apple, MS and Facebook. Doing anything that effects the bottom line of these massive oligarch controlled corporations is a big no no in any op.

Tue, 06/18/2013 - 00:31 | 3667074 DollarMenu
DollarMenu's picture

Yes, but just how do you see this affecting those bottom lines?

Sheeple give up their Ithigys?

Key personnel leaving their highly paid, perk laden posts?

Advertising dropping off?

(Even ZH has resorted to pop-ups).

I don't see this having any affect beyond a vague BP-like negativity.

Tue, 06/18/2013 - 01:54 | 3667193 DeadFred
DeadFred's picture

Now the big companies can add the payments the government gives them for their compliance to their valuation. Maybe this is why Amazon, Netflix and others get their high market cap off low profit margin, free BennyBucks handed out to the most favored snitches.

Mon, 06/17/2013 - 22:34 | 3666766 Iocosus
Iocosus's picture

Here are some of my thoughts:

Could be blackmail for not going into Iran/Syria.

Mainstream media is all over it.

Soros's Free Press supports it.

He went from janitor at NSA to technical analyst in 3 months.

He is a Ron Paul supporter.

Greenwald, an avowed Marxist, is going all out for him.

Could be the Chinese pushing back.


Mon, 06/17/2013 - 22:58 | 3666831 ZerOhead
ZerOhead's picture

One just never knows so don't get too blinded by emotional attachment to the guy yet... but that said I just LOVE his actions to date.

Perhaps even Obama himself was compromised by information gleaned against him by these programs... I mean keeping Gates and taking back onboard Summers et al after what they did to the economy under Clinton?

To many people got emotionally attached to Obama's "Hope & Change" and as a result of being lied to will likely never vote for a "change messaging" politician (if any) ever again.

Tue, 06/18/2013 - 01:21 | 3667151 Spanky
Spanky's picture

Might want to recheck his employment history...

Mon, 06/17/2013 - 21:53 | 3666664 Unprepared
Unprepared's picture

A certain amount of skepticism would be healthy countering any information coming from Media, main stream or otherwise. However, this kind of paranoid dismissals based on nothing is particularly annoying.


What kind of past an individual should have to make you feel comfortable he's sincere and this is the real deal?

Now assume you were in his shoes and with the proper motives, what would you have done differently?

Assume this is a fake story which purpose is yet to be uncovered, cui buno?

Assume this was a set up, why would the satanic vampire Cheney come out in broad daylight?

Assume the company tried to neutralized him now, wouldn't that be a bigger blow to them than whatever he had to leak?

Assume this was a real story, and the only way they could burry it, is to make the news about HIM and not about what he had leaked?

Tue, 06/18/2013 - 00:18 | 3667044 Totentänzerlied
Totentänzerlied's picture

LOL. Revealing a surveillance program (which intelligent people have known about for years and decades) serves the interests of the people who run the program. The revelation alone is not enough to cause a backlash, that much is totally obvious. What it does cause is a slight modification of behavior from awareness of surveillance. Simple, really simple, psychology.

Most leaks end up benefitting the target organization. Sorry, that's just how it works. It takes a lot of dirt to bury a powerful organization. A lot more than one person, apparently, can gather. That's the real problem, the lack of any really damning and previously unknown material.

It's called a partial hangout. Part of a wag-the-dog operation. Cui bono ... I'll give you three guesses.

Mon, 06/17/2013 - 22:03 | 3666690 bunnyswanson
bunnyswanson's picture

Oh really?  Well now.  If he is giving a heads up to collection of all data available in electronic communication and files (medical), what could he be doing that could be sinister? 

I believe this man is preventing history from repeating itself.

Element of surprise has been blown.

Tue, 06/18/2013 - 02:05 | 3667205 putaipan
putaipan's picture

it's both. research ellsberg. grock and act accordingly

Mon, 06/17/2013 - 21:24 | 3666595 One And Only
Mon, 06/17/2013 - 22:06 | 3666700 philipat
philipat's picture

Warning: There is Malware on this URL

Mon, 06/17/2013 - 22:19 | 3666730 One And Only
One And Only's picture

Also monsters under the bed, and masturbating will cause hair to grow on your palms.

Mon, 06/17/2013 - 21:25 | 3666596 Chupacabra-322
Chupacabra-322's picture

Or, go old school and do the under ground garage Deep Throat style. Going rural is another option.

Mon, 06/17/2013 - 21:31 | 3666609 TahoeBilly2012
TahoeBilly2012's picture


Bolt and bar the shutter,
For the foul winds blow:
Our minds are at their best this night,
And I seem to know
That everything outside us is
Mad as the mist and snow.

Horace there by Homer stands,
Plato stands below,
And here is Tully's open page.
How many years ago
Were you and I unlettered lads
Mad as the mist and snow?

You ask what makes me sigh, old friend,
What makes me shudder so?
I shudder and I sigh to think
That even Cicero
And many-minded Homer were
Mad as the mist and snow.

Mon, 06/17/2013 - 22:05 | 3666692 wisehiney
wisehiney's picture
We'll drink our own liquor, our brandy from peaches,
A fig for the English, they may kiss all our breeches.
Those blood-sucking, beer-drinking puppies retreat;
But our peach-brandy fellows can never be beat.

Robert Munford died in 1783.

Mon, 06/17/2013 - 21:33 | 3666617 Robot Traders Mom
Robot Traders Mom's picture

Every Ron Paul supporter should feel vindicated at this point. 


Mon, 06/17/2013 - 21:38 | 3666630 StarTedStackin'
StarTedStackin&#039;'s picture

Except those dumb enough to vote for a man not running for President were Obowel Movement enablers.........



Down arrow me if you are so cowardly that you cannot refute the truisms I post.......

Mon, 06/17/2013 - 22:33 | 3666763's picture

Yeah, we could have had McCain or Romney for President and things would have been different. If only.

Mon, 06/17/2013 - 22:39 | 3666783 Room 101
Room 101's picture

-1.  Per your request.  Not because I'm a coward, but because you're being an asshole. 

Mon, 06/17/2013 - 22:45 | 3666803 newengland
newengland's picture

Yep, 101. He's jerking himself off. Just another troll, tosser.

Mon, 06/17/2013 - 22:45 | 3666805 Shell Game
Shell Game's picture

It is your type of reality-avoiding Statist with a man-vagina who betrayed conservatism in this country.  You vote over and over again for a percieved lesser evil and then wonder how the fuck it all went wrong. 

If you can't vote on priciple and embrace the lies both sides of the isle hold so dear, then you deserve the diapers and servitude this rogue government wants you in.

Mon, 06/17/2013 - 23:43 | 3666973 CaptainObvious
CaptainObvious's picture

You douchebag, the architects of Obamacare were the same people who authored the monstrosity of Romneycare, and Romney disarmed people in Massachusetts.  What was the fucking difference between the two?

And have a red, just for being a Red Team/Blue Team fuckwit.

Tue, 06/18/2013 - 00:18 | 3667043 howenlink
howenlink's picture

Maybe because you're dumb enough to believe that our rights come from your stupid votes.

Mon, 06/17/2013 - 21:59 | 3666684 Cabreado
Cabreado's picture

I can't speak for anyone else, but I never felt the need to be vindicated.

The more important force in play, I hope, is Regret from the marginalizers.

Mon, 06/17/2013 - 21:33 | 3666619 altgeek
altgeek's picture

Don't forget facial recognition systems, especially once you're on the hot list. These systems have become suprisingly good (when it comes to cutting edge in this field, look to the casino industry.)

Mon, 06/17/2013 - 21:43 | 3666641 StarTedStackin'
StarTedStackin&#039;'s picture

dudes in a Yukon snapped me the other night whilst walkin' mah dowg.....I snapped them also......




Fuck the Obowel Movement.....and I mean fuck them up.......figuratively, of course!

Mon, 06/17/2013 - 21:56 | 3666673 BlueCollaredOne
BlueCollaredOne's picture


Made me reply

Mon, 06/17/2013 - 23:46 | 3666979 CaptainObvious
CaptainObvious's picture

Good point, and don't forget they've got software that can recognize your walking gait, too.  So look different every time you go out to do your Deep Throating, and change your gait. Wear shoes of a different height, put a bottlecap in one shoe so you limp, walk slow one time, walk really fast the next, get shoes with lifts.

Mon, 06/17/2013 - 21:33 | 3666620 Evil Bugeyes
Evil Bugeyes's picture

I've heard that Windows 8 sends all sorts of information back to Microsoft (which I think was one of the first companies to agree to send information to the US gov.) Probably a good idea to avoid it. I've also heard that it is just a pain to use.

Mon, 06/17/2013 - 21:43 | 3666644 seek
seek's picture

All versions of Windows do. But they're not alone, so do Android and MacOS.

I've set up a network sniffer on my network and configured Android devices to only use WiFi, and there's a shitload of data sent to google the moment the thing is turned on, and periodically thereafter. Much of it is encrypted so you don't even know what it's sending. Two different Macs I've had did the same thing, and the amount of shit coming from Windows is staggering.

It's not great for gaming, etc, but linux, my friends, particularly distributions meant for security, is where it's at. I've done the same monitoring and the only thing you'll see that you didn't authorize is DHCP/BOOTP messages on boot unless you turn network boot off in BIOS. This is why I suggested Tails earlier, it covers all of this.

Mon, 06/17/2013 - 21:52 | 3666661 Aurora Ex Machina
Aurora Ex Machina's picture

Recently, an Android application came to us for analysis. At a glance, we knew this one was special. All strings in the DEX file were encrypted, and the code was obfuscated.

The file turned out to be a multi-functional Trojan, capable of the following: sending SMS to premium-rate numbers; downloading other malware programs, installing them on the infected device and/or sending them further via Bluetooth; and remotely performing commands in the console. Now, Kaspersky Lab’s products detect this malicious program as Backdoor.AndroidOS.Obad.a.  

The most important strings containing the C&C address undergo an additional stage of decryption. For this, the Trojan first checks if Internet access is available, then downloads the page It extracts a certain element of that page, and uses it as decryption key. Thus, Backdoor.AndroidOS.Obad.a can only decrypt C&C addresses when Internet access is available. This feature further complicates the analysis of this piece of malware...

After the first launch, the malicious application collects the following information and sends it to the C&C server at

  • MAC address of the Bluetooth device
  • Name of operator
  • Telephone number
  • IMEI
  • Phone user’s account balance
  • Whether or not Device Administrator privileges have been obtained
  • Local time

[Kaspersky - there's a lot more there for the technically minded]



For the less technically minded, try this - Panopticlick via EFF. It'll give you a (very rough) statistical rarity of your browser signature which can be used to trace you (cf mobile phone metadata methods)

Mon, 06/17/2013 - 22:21 | 3666739 Yen Cross
Yen Cross's picture

 I'm just getting started, with you.

Mon, 06/17/2013 - 23:21 | 3666819 Aurora Ex Machina
Aurora Ex Machina's picture

If I have offended, I apologise. If you think I had anything malicious in intent to you, ask Tyler to delete my account. Or I shall do so.

I can assure you I had neither in mind, and any comments directed at you were from things I read / were sourced by others (as I attempt to link to each time). All the other fluff was just humor / meta-play - and I have repeatedly stated that I am not important.


[Edit - if you aren't extremely pissed off with me, ignore: that phrase has a particular vibe to it in certain places.]

Tue, 06/18/2013 - 00:27 | 3667065 adeptish
adeptish's picture

Turning your shit off and/or removing the battery is probably pointless,,,

"In the fall of 1997, Bill McCoy, having recently gone off of his heart medication was found dead in his favorite chair. In the days and weeks before he had been advised by Tyree that a Pakistani hit man, on an Israeli contract had been in the states seeking to fulfill a hit on McCoy. There had been other hints that someone closer to McCoy might do the job. Tyree recently told FTW that just before his death, he had given McCoy information on "Elbit" flash memory chips, allegedly designed at Kir Yat-Gat south of Tel Aviv. The unique feature of the Elbit chips was that they worked on ambient electricity in a computer. In other words, they worked when the computer was turned off. When combined with another newly developed chip, the "Petrie," which was capable of storing up to six months worth of key strokes, it was now possible to burst transmit all of a computer's activity in the middle of the night to a nearby receiver - say in a passing truck or even a low flying SIGINT (Signals Intelligence) satellite. According to Tyree this was the methodology used by Jonathan Pollard and the Israeli Mossad to compromise many foreign embassies in Washington".

Just sayin'

Tue, 06/18/2013 - 07:43 | 3667366 New_Meat
New_Meat's picture

tin foil wrap

Tue, 06/18/2013 - 12:57 | 3668635 Citxmech
Citxmech's picture

That kind of labor-intensive shit is reserved for high priority targets.

Mon, 06/17/2013 - 23:48 | 3666985 tip e. canoe
tip e. canoe's picture

what's up with those system fonts?

why would they give so many identifying bits?

Mon, 06/17/2013 - 22:07 | 3666703 spine001
spine001's picture

I validate what seek says. Only use open source systems where people can look at the whole code, like Linux. Period. No experience with tails. Is it open source?

Until next time,


Mon, 06/17/2013 - 22:19 | 3666736 seek
seek's picture

Tails is an open-source prepackaged linux live distro. People are actively looking for security holes (which they find many with each update, and patch) to make is as anonymous as possible.

Tue, 06/18/2013 - 01:41 | 3667179 Spanky
Spanky's picture

Little Snitch for Mac OSX -- not only monitors, but stops all out going traffic if so desired.

Mon, 06/17/2013 - 21:36 | 3666623 Seasmoke
Seasmoke's picture

Still waiting for hacking of the airwaves and Fawkes to leak all the truths to the world.

Mon, 06/17/2013 - 21:42 | 3666628 Taint Boil
Taint Boil's picture



Some printers have "tracking dot" software built in so if you print something they can find ya ... Google that! Scary.

Mon, 06/17/2013 - 21:40 | 3666636 criticalreason
criticalreason's picture

if ur going to use physical mail then remember not to leave physical DNA..dont lick stamps / hairs/fingerprints....

Mon, 06/17/2013 - 21:45 | 3666647 StarTedStackin'
StarTedStackin&#039;'s picture

FUCK THAT "UR" shit.....

Mon, 06/17/2013 - 21:49 | 3666655 oddjob
oddjob's picture

Given the prepoderance of the postal service to hire reprobates, sending anything of value or importance via snail mail is risky.

Mon, 06/17/2013 - 22:02 | 3666687 BlueCollaredOne
BlueCollaredOne's picture


Not sure if you saw this or not.  You can still be anonymous, you are now just inconvenienced. 

Mon, 06/17/2013 - 21:44 | 3666645 Divine Wind
Divine Wind's picture



I wonder how someone can now go about making a political contribution without ending up in someone's target package?

The upcoming midterm elections are going to be a fucking joke in this regard.


Mon, 06/17/2013 - 22:41 | 3666785 newengland
newengland's picture

Twas ever thus.

Be brave, Divine Wind.

The world is a contest of ideas. Let no one silence you.

Mon, 06/17/2013 - 21:46 | 3666649 Yen Cross
Yen Cross's picture

   When speaking with liars, this mental technique works well.

    Basting (cooking) - Wikipedia, the free encyclopedia

Mon, 06/17/2013 - 21:49 | 3666653 StarTedStackin'
StarTedStackin&#039;'s picture

How many times while posting on ZEROHEDGE do you get a program that wants to load on your computer,. that when you say NO, crashes your system?




7 time tonite!!!!




woohoo, they are watching me!

Mon, 06/17/2013 - 22:33 | 3666757 newengland
newengland's picture

Your problem. No one else's, apparatchik.

Tue, 06/18/2013 - 00:00 | 3667010 Herd Redirectio...
Herd Redirection Committee's picture

A d b l o c k

Mon, 06/17/2013 - 22:06 | 3666696 kito
kito's picture

iknse seukne igpknse like a charm..............................

Mon, 06/17/2013 - 22:12 | 3666697 newengland
newengland's picture

Good job, ZH and Wired.

The Snowden story is full of holes, but ne'er mind. Good to advise others. 

Never let a crisis go to waste, hey?

Iceland, beware. Retract that offer to Snowden.

Valhalla awaits the brave...

Mon, 06/17/2013 - 22:19 | 3666735 Yen Cross
Yen Cross's picture

 Liar extranordinaire? 

Mon, 06/17/2013 - 21:49 | 3666653 StarTedStackin'
Mon, 06/17/2013 - 22:22 | 3666743 newengland
newengland's picture


Our only focus should be the safety, health and happiness of our loved ones. Liars have a big problem: we can walk away from them. They are stuck with themselves.

Best regards to you and yours. No surrender. Not this time.

Mon, 06/17/2013 - 22:40 | 3666791 Yen Cross
Yen Cross's picture

 SHTF Wednesday. It will be quiet for several hours, then the F/X markets will digest.  newengland

Mon, 06/17/2013 - 23:03 | 3666845 newengland
newengland's picture

Yes, Yen. Game on. I dislike people who use other people's blood and treasure. We don't.

Be ruthless, ie unrelenting, adamant, relentless.

 Best regards to Mrs Watanabe too, and Ms Wen.

Mon, 06/17/2013 - 22:06 | 3666701 MarcusLCrassus
MarcusLCrassus's picture

"...It’s not known how many of these requests are accompanied by a warrant, however, since Google doesn’t disclose this in its report, and U.S. laws are unclear on when a warrant is required."





I thought the Constitution was very clear about when a warrant is required.  The fact that this debate over whether they need a warrant to spy on Americans is even happening is an outrage. 

Mon, 06/17/2013 - 22:20 | 3666738 newengland
newengland's picture

Ridiculous, isn't it.

Mon, 06/17/2013 - 22:07 | 3666705 Notarocketscientist
Notarocketscientist's picture

Fuck Obama - Fuck America - the evil empire from hell

Mon, 06/17/2013 - 22:18 | 3666732 newengland
newengland's picture

You are not a rocket scientist, obviously. A boy in his mother's basement, most likely.

Mon, 06/17/2013 - 22:34 | 3666765 IridiumRebel
IridiumRebel's picture

Don't give up on America.

Mon, 06/17/2013 - 22:38 | 3666778 newengland
newengland's picture

His sort are lowly cowards, no friend of any nation, least of all the Republic.

Mon, 06/17/2013 - 22:48 | 3666815 IridiumRebel
IridiumRebel's picture

People need to disseminate between the oligarchy and the populace. It's ok rocketscience. Unite the clans!

Mon, 06/17/2013 - 23:11 | 3666883 newengland
newengland's picture

The not rocket scientist is pi$$ing on your ideals. You need to discern the difference between a genuine commenter and an apparatchik, my friend.

The world beyond our neighborhood hates the USA, our founding fathers, our Republic - and Washington DC is the most hateful, using us for nazionists.

My money and values vs their crimes against humanity. F'em.

Tue, 06/18/2013 - 00:03 | 3667015 Herd Redirectio...
Herd Redirection Committee's picture

You are turning away your natural allies, though.

Any one saying "Fuck Obama" can't be all bad  :)

Don't fall for the Divide and Conquer.  We need to stick together, assess the problem as a group, and go from there.

Tue, 06/18/2013 - 01:37 | 3667153 newengland
newengland's picture

My natural allies are honest, not hateful, blaming the USA for all the world's woes, inaccurately.

Like your point of view, 'Herd Redirection', but won't play that game. F'em.

Read a letter from Birmingham Jail written by Martin Luther King.  I will not wait any longer, and nor will I spill blood any longer.

My money vs the liars. I will win. This Republic will stand together. Others will fall apart. Their choice.

QE to infinity...burying the liars, the Fed in all its forms.

Tue, 06/18/2013 - 00:26 | 3667062 Totentänzerlied
Totentänzerlied's picture

"no friend of any nation"

No nation is any friend of liberty. Get it through your head. Jesus H. Christ.

Tue, 06/18/2013 - 01:20 | 3667150 newengland
newengland's picture

Says you, not history.

Mon, 06/17/2013 - 22:08 | 3666706 22winmag
22winmag's picture

Burner phones... they're not just for calling hookers and drug dealers anymore!

Mon, 06/17/2013 - 22:25 | 3666748 Lmo Mutton
Lmo Mutton's picture

I have only 1 thing i don't want to hide;


Mon, 06/17/2013 - 22:36 | 3666774 newengland
newengland's picture

Oh, gosh, coward you, inconsequential you, still bowing down to endless war, paid with the blood and treasure of others.

Put your body or money where your mouth is or pi$$ off, pet of politics.

Tue, 06/18/2013 - 01:55 | 3667195 Spanky
Spanky's picture

Put your body or money where your mouth is or pi$$ off... -- newengland

And what, may I ask, are your plans for my blood and treasure?

Mon, 06/17/2013 - 22:28 | 3666752 Poor Grogman
Poor Grogman's picture

Just do it the old fashioned way.

1. Get a sign that you can hang around your neck

2. Wear slightly outdated clothes with a funny hat.

3. Stand on a street corner handing out poorly worded pamphlets detailing
All the alleged issues. While loudly proclaiming/repeating the same.

4. This way the worst that will happen is you will get "moved along"

5. Rinse and repeat.

Mon, 06/17/2013 - 22:48 | 3666821 Boondocker
Boondocker's picture

Careful with burner phoned....they can "ping" the phone and determine your location by triangulating the position from cell towers.....the police do it to find missing persons.....

Mon, 06/17/2013 - 23:24 | 3666925 Who Laughed
Who Laughed's picture

An important addition to "leaking by mail"

Don't use your home printer. Some employ steganography to "encode printer serial number and timestamps"

look it up, pretty creepy 

Tue, 06/18/2013 - 08:32 | 3667471 espirit
espirit's picture


Best to educate yourself on present practices and detection.

Yeah, creepy.

Mon, 06/17/2013 - 23:36 | 3666953 UGrev
UGrev's picture

How NOT to tip off spooks. 


2. Paper

3. envelope (sticker kind, not glue kind)

4. tell your 9 year old to write down your message

5. pay hobo 5 bucks to drop envelope (with message inside) off at press location of choice. 

Mon, 06/17/2013 - 23:36 | 3666955 highwaytoserfdom
highwaytoserfdom's picture

knowledge is power  I think....       Orwellian Banana Republic ?  You are correct IMHO it is not 1984 but  Homage to Catalonia.....   Can't figure who the POUM anarchists are but we sure know who fascist were/are...        History tells us this is foreshadowing of some bad broken window things....         Is it too late  to have Kennedy  orders to get the missiles out of Turkey, or have do over on 64 conflicts by the military offense complex?    Oh yea China has less prisoners than US and spends 15 times more on defense (really offense)...  DID ANYONE EVER THINK FACTS WOULD BE TREASON?  How about the 700 page Constitution project?   Yes Cincinnati  be my guest....        coup d'état by 1% banker,medical,military cabal.       Sad the rule of law has stooped to  Dean Vernon Wormer of Animal House fame...  You know "double secret probation"...     in these courts...     

Mon, 06/17/2013 - 23:51 | 3666992 tip e. canoe
tip e. canoe's picture

absolutely brilliant

please comment MOAR

Mon, 06/17/2013 - 23:47 | 3666974 Widowmaker
Widowmaker's picture

.- -. .- .-.. --- --.

Mon, 06/17/2013 - 23:45 | 3666976 trillionaire
trillionaire's picture

There have been recent occurrences of online passwords needing to be reset because of "suspicious activity."  Once the password has been changed and the account is accessable, the record of account activity shows no unusual logins.  Anyone else seeing this?

Tue, 06/18/2013 - 00:39 | 3667085 RebelDevil
RebelDevil's picture

Yes. Google did for me.

Tue, 06/18/2013 - 00:23 | 3667054 Kirk2NCC1701
Kirk2NCC1701's picture

In the long run... you need to use the same principles, tactics and trick that those used, who hijacked the system in the first place:

Establish your own Circles of Trust.  By invitation, vetting & vouching.  Aspire to control Academia, Media, Finance, Politics.  Hire from within the Circle if possible.  Do it for 200 years.

Tue, 06/18/2013 - 00:55 | 3667122 The Heart
The Heart's picture

Darn, where's Boris when he needs to say this like he does.

No need for leak...only need to write truths on ZH and it flows into the main system because the food of truth is nourishing for those who still have some semblance of a connection to it....and it feels good in the!

Tue, 06/18/2013 - 08:31 | 3667465 CutOut
CutOut's picture


Your posting frequency has dropped substantially since being asked to explain your egregious Boston Marathon disinfo posts.

Is this a coincidence ?

We are still waiting for an explanation but you refuse to respond. Why ?

ZH readers are curious as to why HEART intentionally posts disinfo such as Boston bombing fake injuries / fake blood / crisis actors garbage which is 100% DISINFORMATION.
Boston bomb disinfo reposted again by heart #3616167

I have screen caps of your Boston bombing fake injuries / fake blood / crisis actors disinfo posts.


ZH is being targeted by FedGov spambots & human operatives saturating the comment sections with garbage and disinformation in addition to down voting certain posters.

They are not harmless trolls, they are professional operatives attempting to undermine and discredit ZH via multi nics & sock puppets.

Attacking this post by constant down voting speaks for itself: the shills exposed themselves.

Case closed.

Tue, 06/18/2013 - 01:29 | 3667159 Observery
Observery's picture

Some additional things worth considering :

While photographing 'outside' of Your mail they could potentially take scans similar to airport snans of your mail.Using subject/object recognition similar to used in digital cameras to recognize scene and faces they could discover if your ar sending mobile phone very rapidly. Thus one would avoid sending any 'suspicious object' by snail mail. Also with bright light it is possible to also 'scan' actual content of letter, using text recognition content could be analysed with same tools and speed as an e-mail. So I think snail mail is pretty unsecure.


Tue, 06/18/2013 - 01:34 | 3667168 PT
PT's picture

Years ago I figured that I needed at least 5 computers: One that would never be on the net, one that would only be used on a few sites (for subscriptions, purchases etc) and one that would be used for all unsecure net surfing, ready to be erased at the drop of a hat.  I can't remember what the other two would be for, probably some kind of "quarantine" (start with a new computer, download something, see what has changed).

Now I think we all should have an extra couple of computers that just continually shuffle large video and text files back and forth 24/7/365...

Tue, 06/18/2013 - 01:44 | 3667178 Observery
Observery's picture

More on e-mail and internet :

Please to educate Yourself about 'browser fingerprinting', 'cross browser cookies', 'user behaviour patterns'. Last one is more opaque but the idea is that it is possible with degree of certainty to identify you by way/speed you type, move your mouse, what spelling errors you make often. All this can be done with only browser.

Major email proveders have very sophisticated client side browser scripting, thus one would assume it does 'little' more than simply provide basic functions. 

Beware of google and their web applications, ther Ad Sense ads is essentialy a targeting super machine.

Thus another option would be to connect to e-mail providers with old software Outlook or Mozilla Thunderbird using POP3 protocol as client identification will be limited to IP address. No e-mail saving 'as you type' for example. One more advantage is that this way you can write message separately from being actually online to send it, thus even more reduce Your exposure.


Tue, 06/18/2013 - 01:45 | 3667180 PT
PT's picture

P.S.  How can anyone possibly be held accountable for what is on their computer?  My computer automatically "updates" itself every week or whenever it feels like it.  My pre-installed "anti-virus software" does fuck knows what whenever it does.  My so-called "28Mbps" and "54Mbps" modems rarely work faster than 30kbps (as far as I know).  To assume that stuff is on my computer only because I put it there is not "naive", it is out right BS from the start!  I have zero knowledge of what "updates" and "AV" is really doing, and I have zero knowledge of why my modem is working a thousand times slower than advertised - yes it could simply be a cheap ISP squeezing out the last bit of bandwidth amongst too many customers, but I can't prove that.

I can give my paranoia a 50-50 chance of being right, but at the moment my typing is appearing on the screen extra slowly.  And I have no way of finding out why. 

Tue, 06/18/2013 - 07:33 | 3667354 Urban Redneck
Urban Redneck's picture

How can anyone possibly be held accountable for Identity Theft - because the financiers of the totalitarian State wish it be that way...

Tue, 06/18/2013 - 03:28 | 3667259 Hobbleknee
Hobbleknee's picture

"Just a warrant-step away."


as if they use warrants

Tue, 06/18/2013 - 07:58 | 3667388 hootowl
hootowl's picture

This thread has degenerated into nonsensical gibberish.  Put down the bong and take a nap.

The evil corruptocraps aren't going to work for nothing.



Tue, 06/18/2013 - 10:48 | 3668013 tip e. canoe
tip e. canoe's picture

if you haven't noticed, the entire WASKI is obsessed with nonsensical gibberish right now.

an effective way to starve the beast might be to bounce that gibberish right back to from which it came.    more of a smother tactic, then starve, but these do not necessarily need to be mutually exclusive.

consider the parables of the hungry ghosts.

Tue, 06/18/2013 - 13:59 | 3668885 thisandthat
thisandthat's picture

It looks like you're trying to whistleblow on someone/something. Would you like me to help you?

  • Installing Tor.
  • Setting up an anonymous VPN account.
  • Mailing an anonymous letter.
  • All the above, please.
Do NOT follow this link or you will be banned from the site!