Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
22:21
10 6 11
629
www.journalistethics.com iIi
Peepers p. 2 Applied Case Studies
Political p. 3 Surveillance-Gate p. 4
Police p. 5 Silk Road p. 6
Pentagon et al p. 7 Snowden p. 9
Profiteers p. 10 Slimeballs p. 12
People p. 13 Sweden p. 14
Information p. 18
Identity p. 19 Tips p. 20
Ideology p. 21 TexMex p. 22
Itinerary p. 23 Ticketing p. 24
Involvement p. 25 Triangulation p. 26
Voluntary p. 28
VPN p. 29 Tor p. 30
Applications p. 31
Android et al. p. 32 Embedding p. 33
Adware p. 38 .EXE p. 39
AI p. 40 Envelopes p. 41
Technology p. 42
Telephones p. 43 Blackberry p. 45
Tablets p. 46 Buying p. 47
Transport p. 48 Boeing p. 50
Tools p. 51 Bo-Peep p. 52
Evasion p. 54
Encryption p. 55 Eleven Privacy Tips p. 56
Examination p. 57 Ethics p. 64
www.journalistethics.com i
Acronyms
www.journalistethics.com ii
Para(site)bles
The owner of a trained to be vicious Pit Bull mongrel bitch took his pampered pooch to a blue-
ribbon pet show – a first outing for this carnivorous canine. Prior to leaving his house, her master
gave the following instruction. “Honeycomey, this event will be attended by the bloody types that
you forever suck dry. Healthy hens, chubby chicks, and kibble-like kitties. I insist you take a day
off and be a dainty doggy. Relax, socialize, and simply enjoy the company of your fellow animals.
So, the story goes, of a naïve, nerdy lone-wolf newshound who wisely invested hundreds of hours
socializing with pervy plants who he knew were after more than just a whiff of his private and
professional lives. Give a bitch a bone and it goes away. So, the theory goes. Peace at last. Afterall,
I have nothing to hide. False. Offering my man-scent has further frenzied a pack of wicked wolves.
Workers in certain fields can never take time out to be an empathetic human. Compassion
equates to weakness. There is always a newbie to nab for a petty undetected crime from the past
century. A ‘good boy Rufus’ pat on the head as reward. Many thousands of personnel hours have
been spent by agents who have investigated every aspect of my life in recent years. They will
never be able to prove their false hyper-paranoid hunches that: I secretly teach English to Chinese
Diplomats; I’m a cannibal, pipe bomber, and a ‘P’. The stench of frustration among some sadists
grows. One may eventually fabricate ‘evidence’ to ‘prove’ their hunch and get a new head pat.
This is part evidence that I am secretly a cannibal. The others are old private emails sent to a still
breathing, happy as, adult partner about eating their ‘asset’. The degree of spiritual sickness that
I have witnessed in recent months is profoundly disturbing. MK Ultra (low) intelligence agencies.
advice for those Discussion identifies the types of agents who covertly
who seek to monitor others’ affairs. The data types they seek appears in
maximize their the subsection titled ‘Information’. It also outlines the rights
privacy when
and remedies available for those who seek to retain privacy.
they engage in
online and offline
The second part outlines how software and hardware are
domains.
deployed and infiltrated to secretly collect private data.
Case studies
center on the
The conclusion reiterates the core argument that the notion
online realm for
of privacy for the individual in online domains is a myth. The
journalists and
practical 11-point checklist in this chapter may aid readers
related careers
to outfox amateur and mediocre hackers and online spies.
such as
investigative
researchers. The final subsection ‘Examination’ illustrates seven online
Privacy breaching peepers fall into one of three categories: governmental, corporate, or informal
entities such as lone wolves. Political operatives are worthy of first mention. They are the most
sophisticated and best funded. In America, high-level Federal political surveillance entities
include, among numerous others, the FBI, CIA, Department of Justice, Homeland Security, NSA,
DIA, and intelligence agencies of the Army, Navy, Air Force, Marines and Coast Guard. There are
many hundreds of state and federal law enforcement agencies in this country whose combined
annual budget totals in the trillions (no, not billions) of dollars. Does this sound like a police state?
With ultra-rare exception, small-time media agents such as freelance journalists cannot
successfully deploy counter-privacy breaches to block governmental collectives who act within
lawful frameworks to monitor the private and business affairs of an entity of interest. Journalists
who are employed by major fake news corporations such as Fox may enjoy a far higher level of
privacy guarantee. Fox employs many dozens of elite IT professionals who specialize in data
security. They also have access to a sophisticated team of attorneys who may challenge law
Small- and medium- operatives who desire to neuter America’s political machine will likely find
zero to little value in this introductory book about privacy. If you are a person of interest (POI) to
the state and you have something gravely nefarious to hide as a journalist, such as withholding
So-called Watergate was a global profile major political scandal that unfolded in Washington DC
during the early 1970s. Details about this sordid spying affair are easy to find online.
Watergate may remind journalists and others that surveillance tracking, and other covert data
collection devices existed long before the internet mainstreamed during the 1990s.
Left: Moving
According to folk lore, those with nothing to hide should never fear law enforcement agents.
Wrong. False flag, trigger-happy, spree killing cops exist in a range of jurisdictions in numerous
nations. To simplify a complex topic, I offer two sets of advice only about engaging with police.
1. If confronted by police, never offer any more than the minimum amount of information
required, by law, until you can consult with an attorney who you trust. Remain silent.
Allow your attorney to speak on your behalf. In some jurisdictions, it is an offence to not
offer your name/address to a law enforcement officer, when requested. It may also be an
offence to provide a false name/address. In most cases, the police officer should have
probable cause to ask such questions, otherwise they may be charged with harassment.
Exceptions exist. If you have witnessed a major crime, it may be best to say to a police officer, for
example, “I saw the 33 shooters flee down Shandooky Street 37 seconds ago”.
2. Journalists and others should never feel compelled to share their property with a law
enforcement officer merely because they ask you or bark their intimidating request in
your face. Ask the officer if they have a warrant to confiscate/inspect your property.
Exceptions exist. Law enforcement may have emergency search, seizure and detain powers,
without the need for a warrant, if they arrive on the scene of a crime moments after it occurred.
The infamous, now defunct Silk Road online global drug trafficking empire is a classic case study
about naivety and the need for a new paradigm where people question everything that fails the
sniff test. According to fairy tale folk lore, agents of the so-called ‘Dark Web’ were able to covertly
traffic ‘Class A’ narcotics such as cocaine and heroin on the internet on a mass scale. Their
identities were concealed from global law enforcement agencies for years as they used
encryption software to conceal their ISPN address, location, and transactions. Absolute rubbish.
Western nations such as Britain, Japan, America, and Canada collectively employ hundreds of
thousands of law enforcement personnel. Per global internet protocols, governments may
instantly cancel the domain of any website that blatantly engages in organized felonious crime.
The Silk Road empire was obviously owned and controlled by an all-powerful apex entity such as
the Chinese Communist Party, House of Windsor Nazi Crime Family or Rome’s Venetian Mafia. It
is ludicrous to believe that intelligence agencies such as the Mossad, MI6, and CIA could not
decode Silk Road’s modus operandi. The sexy word ‘encryption’ is used by slick sales agents to
brand their privacy goods and services as invincible. Wrong. If you are a high-profile target, you
will soon be decoded by those who employ the best IT personnel and software, such as Interpol.
In most countries, uniformed and civilian personnel employed by the military do not have
jurisdiction to monitor or detain civilian personnel in their nation. In countries such as America,
domestic surveillance is the role of local law enforcement agencies such as the FBI.
Exceptions exist. America’s Defense Intelligence Agencies may have jurisdiction to monitor and
detain enemy agents on American soil who are known to serve another nation’s military.
America’s National Security Agency probably holds the most comprehensive intelligence data set
in history. There is much evidence that the NSA can access, among numerous other things:
Every text message and voice mail sent/received (including deactivated accounts)
from popular America-based providers such as AT&T and Verizon and others;
jurisdictions over the past three decades in addition to most other nations.
Journalists should never be fooled into thinking that deleting a text message, email or other
electronic records can protect the privacy of third parties whose identities they aim to protect.
This CBS news article extract shown below is a suggested research topic.
To this writer, this fake news media article fails the sniff test. The NSA’s mandate empowers and
guides it to capture and forever store anything and everything that takes place in cyberspace.
This writer urges readers to question all mockingbird media narratives that propagate the same
fake news stories about high-stakes global heroes. Fake news like CNN and Fox award billions of
dollars of free advertising for individual brands such as Assange, former NSA employee Edward
Snowden, and dubious documentary journalists such as Michael Moore. In most cases, popular
media heroes who supposedly represent We the People are controlled Deep State puppets.
This free book featured below, left, was published by this author in 2019.
Jericho (2019)
Slime magazine is owned by the Rothschild crime family. This mafia clan has awarded the
Snowden brand billions of dollars in free advertising on purpose. They obviously like him. A lot.
Certain corporations and non-corporate entities peep on our private data sometimes within the
bounds of the law and sometimes outside of these bounds. Information is powerful. Marketing
managers may exploit our data to maximize sales and for other purposes that are more devious.
Free strings-attached spy networks such as Gmail may permanently store and transmit email and
document drafts that are abandoned or revised. This writer suspects that Microsoft likewise
collects such data from commercial products. His Microsoft Office license expired in 2017 and he
declined every ‘final notice request’ from Microsoft to extend this license. He was able to use this
software for three more years – until his laptop crashed in 2020. It appears that the ability to
capture this user’s data superseded Microsoft’s interest in receiving a $75 new license payment.
Citizens at-large should be wary of sharing sensitive data with free carriers such as the Alphabet-
Google empire. The terms and conditions of these carriers generally contain dozens to hundreds
of paragraphs. Most providers reserve the right to vary conditions, at any time, without notice.
Many free public access data sharing platforms were secretly established as fronts for spy
agencies such as the CIA, MI6, and Mossad. The original founders are phony shills, whose entire
public biography may be fake. This writer suspects that Quora, as one example among many, fits
this category. Former Facebook Chief Technology Officer Adam D’Angelo supposedly invested
USD 20 million of his own money to establish Quora in 2009, age 25. Well, so vile Wikipedia says.
pursue a core, covert agenda that diverges from their official public fake objectives.
These allegations have never been proven. They are not mainstream views. Airbnb is not a free
service or a social media provider. Wikileaks is included in this table for illustration purposes. You
may ask yourself these questions and reflect on your answers. What if Wikileaks was always
nothing more than a data collection front for intelligence agencies? Might this be the ideal trojan
horse for a dark intelligence agency/government to find out who is subversive of their agenda?
The News of the World was a weekly nation-wide circulation tabloid rag that was published in
Britain between 1843 and 2011. This rag’s ‘legacy’ is classifiable among the gossip, muckraking,
gutter-press, lunacy, and fake news categories. The demise of this sensationalist rag, part of the
Murdoch fake news brigade, is attributed to its involvement in illegal covert phone tapping.
7reasons (2011)
Covert spying is also an act that certain corrupt journalists do to others. Phone calls and
voicemail are highly susceptible to remote hacking. No one went to jail for this scandal. In
the present paradigm, fake news empires such as NewsCorp are on the same team as apex
crime institutes such as Europe’s fake royal families – The House of Orange as an example.
Other hackers and spies infiltrate the work of journalists, beyond those who shill for political,
military, and corporate entities. Broadly speaking, these agents tend to be less sophisticated than
organized entities, because they have less access to funds and a large pool of specialist personnel.
Never underestimate the success of those who engage in so-called shoulder surfing spying. This
old technique predates computer technology. It merely requires an observer to watch a person
do anything such as entering their password into a device such as a keypad or keyboard.
It is best to use passwords that are difficult for strangers to guess such as CLeVer$ME8 as opposed
to something that is easy to guess like Password123. Change your passwords often. Most
applications allow you to check the login history of a device or application. You should change
your password immediately if you do not recognize the internet address of a recorded login.
This press release about spying modus operandi may arouse those who believe in the Assange
Encryption King fairytale about the lone wolf journalist who outfoxed all spy agencies on Earth.
In this author’s opinion, all-powerful nations such as America, do not allow material to remain
in cyberspace that poses a grave danger to national security. He is skeptical of claims above.
jurisdictions may regulate the activity of journalists: Federal, State, and County. In certain
contexts, International Law may be relevant. The onus is on journalists to familiarize themselves
with the legal rights and obligations imposed on them in the jurisdiction/s where they engage.
America’s First Amendment guarantees freedom of speech for all forms of news media:
television, print, radio, online, public event forums and others. Exceptions to this rule are rare
and fair – in this author’s mere opinion. The table below summarizes the most common
America’s Government and military institution have wide scope to restrict military personnel
speech. The SCOTUSA (1974) upheld this view in Parker v. Levy (1974). It stated that the military
is a “specialized society from civilian society”. Journalists embedded in the military should consult
authorities beyond the table above. An open-access article by Congress Attorney Kathleen Ruane
(2014): ‘Freedom of Speech and Press: Exceptions to the First Amendment’ may be useful.
The so-called ‘Pentagon Papers Affair’ set a precedent in American journalism concerning the
freedom of the press. These papers refer to a dossier that is officially titled ‘Report of the Office
of the Secretary of Defense Vietnam Task Force’. According to official narratives, these classified
military papers were leaked by its co-researcher and co-author Daniel Ellsberg. Ellsberg was
The New York Times published excerpts of this dossier during 1971. Its counsel argued that it had
a right to do so under the First Amendment as the content was in the national public interest.
Diligent readers may consult the Supreme Court case law publication at its source. In a world of
mass disinformation and misinformation, it is invariably best to consult primary sources direct.
Historical narratives such as the Pentagon Papers fable may remind journalists and others that
we often must trust historical materials that we consult. This court case date above, 1971,
predates the birth date of this author. It is possible that the Pentagon Papers saga was an
orchestrated psychological operation that aimed to empower corrupt Deep State assets such as
The New York Times. It would take years of research to confirm or debunk this fabled narrative.
seek to extract from journalists and others. These realms discussed in order concern aspects
Axis of Vile
This writer calls for lovers of freedom, peace, and justice to pay close attention to this chapter.
As at early 2021, so-called ‘free’ countries such as America and Australia are sliding rapidly
towards a dark totalitarian surveillance state. Political censorship among anti-America, pro-CCP
tech giant criminals such as Twitter, Alphabet-Google and Facebook are the new abnormal.
The noun ‘identify theft’ is a well-known compound word that refers to criminals assuming the
identity of another entity for nefarious purposes. This activity is beyond the scope of this page.
In most cases, journalists and investigators have a fair right to protect their identity from those
who have no legitimate interest in their personal details. For example, journalist Jane Doe is
researching illegal insider trading on Wall Street. She does so within the bounds of the law. She
has good reason to believe that high-level insider trading is the norm and law enforcement
authorities and their high-level handlers purposefully turn a blind eye to this rampant practice.
Jane Doe has a right to quarantine her professional activities from her private life. This includes
details such as her home address, private cellphone number and names of family members.
Certain entities may have a legitimate and lawful right to monitor Jane’s private information. For
example, the New York Police Department receive credible evidence that Jane may have
unlawfully offered bribes to an AT&T employee to place phone taps on a Wall Street trader’s
phonelines. In such instances, this law enforcement agency should obtain a warrant to monitor
Jane’s private details such as her home phone calls and her bank account.
The page overleaf offers tips that may aid journalists such as Jane to separate their private and
professional lives. This author strongly recommends that journalists demarcate these realms.
Always use a separate cellphone handset, cellphone number, email address, and
Never provide your home mailing address for professional purposes such as registering
for a conference – supply your work address and/or a secure private postal box;
Use a reasonable abbreviation of your first name in professional settings – For example,
Barbara Watergatorade may assume the identity Babs Gatergatorade in public settings.
According to slick marketing managers, a range of free and commercial software enable
computer users to maximize their privacy options in cyberspace. These claims may be true in
certain contexts. I advise writers to always assume that such claims are always bogus or
susceptible to failure. In many cases, simple explanations about how these products work are
never made available to people like this human-oriented author who are proudly not tech-savvy.
Not.
Journalists who cannot separate their social, cultural, political, and economic ideologies from
their professional work may be engaging in what this writer terms ‘advocacy journalism’ (Jericho,
2020, p. 19). It is questionable whether such engagement is bona fide journalism or something
else such as political activism or the work of ‘presstitutes’. The profession ‘journalism’ supposedly
is a field that objectively assesses and disseminates facts that are in the public interest.
This writer speaks from extensive experience when he testifies that data collection peepers, such
as law enforcement, show a super-strong interest in detecting the activities of journalists who
constantly act within the bounds of the law. In many cases, the techniques used to gather such
information mirror those discussed in the prior section. Much information about a person’s
political suasions can be gauged from monitoring their email account and bank accounts. For
example, being a paid member of the Libertarian Party may be detected from both sources.
How journalists navigate such infiltrations are ultimately a private matter. Many people who
fiercely protect all information about their family, residential address and bank statements do
not care less who can detect any information about their religious and political beliefs. To a large
extent, this author falls in this category. He does not advertise such details openly. He also could
not care less who finds out such details via lawful methods. In merely his subjective viewpoint,
there is an air of creepiness about people who go out of their way to hide their outlook on life.
Gill Shill infiltration moles are easy to spot. We can keep a social conversation light. They can’t.
Guapo: Hello, there. Nice to meet you today in this hostel lounge!
Porcupine: Hey there buddy, I didn’t see you sitting behind me. Good to meet you too.
Guapo: Yeh, but I get this vibe. You have the classic look of an academic or journalist.
Guapo: Oh, so you are in those fields. Geez, there’s a lot of slave trade out there, hey.
Porcupine: Yeh, sure. Ace suntan. Are you visiting DC – like on a holiday or something?
Guapo: A business trip. Here a few days. What do you think about illegal Mexican workers?
Porcupine: Ah, I don’t know much about that. Where did you get your cool suntan? Florida?
Guapo: Sure – Florida. Human trafficking is bad, right? What’s your view on trafficking?
Porcupine: Oh, is that the time? Oops, I’m late for my toenail clipping appointment. Bye!
Above: adapted from a staged encounter in a DC hostel TV lounge, January 2021. Yawn.
Peepers love to know the maximum amount of generic and specific details of your movements.
Generic data refers to non-descript information such as Pippa Bramble’s cellphone was
monitored moving around Oklahoma City Central Business District constantly on January 5, 2021.
Specific data refers to rich, detailed information that can be gathered from human observation
and devices. For example, NSA satellites detect that Sandra Hooke’s smartwatch travelled in the
same chip monitored vehicle, a rented Green Hyundai SUV, alongside Fay Bai on June 6, 2006. F
Bai used her cellphone at 17:37 hours to book a hotel suite at the Nohtel Motel in New Haven.
Location and activity data about certain persons of interest are narrow or universal. A court order
may permit a law enforcement team to only monitor a team of journalists when they are in
proximity of foreign embassies within a specific jurisdiction such as DC. High profile targets are
normally subject to 24/7 surveillance. Julian Assange’s movements during 2012 fits this category.
According to court records, he was considered a high risk to flee Britain while on bail. Universal
surveillance is customary when the intentions of a dangerous person of interest are not clear.
people) are the classic ways to observe a person’s involvement. No method is foolproof or
conclusive. Jane Doe’s husband Joe, or any other person may be the only person who is driving
around Orlando in possession of Jane’s phone. Jane may be many miles away from her phone.
Journalists and others who wish to retain their privacy tend to avoid using transportation that
registers identifying details such as their name and credit card number. Public metro train and
bus system rarely collects a person’s name as policy. Your identity can be captured if you buy a
ticket using a registered credit or debit card. You may retain your privacy if you purchase using a
non-registered disposable debit card. Such cards are easier to obtain in countries like Australia.
In America most disposable debit cards are not anonymous. You must activate them online or
over the phone via a recognized identity document such as your social security card or passport.
Some innocent, law abiding citizens may choose to offer an alias when travelling on commercial
vehicles such as a Greyhound bus. Based on extensive observation, this writer notes that most
bus drivers only check that the passenger has a valid ticket. They do not ask for identification to
confirm that the name on the ticket matches the identification of the person holding the ticket.
Commercial drivers and conductors, such as those employed by Amtrak, may reserve the right to
deny passage to a ticket holder who cannot produce photographic identification that matches a
ticket’s passenger name. Undercover officials may carry alias identifications. I don’t take three-
letter strangers seriously who show their ID cards and say: “You can see that I am F Agnelli from
South Texas”. The thieving Defense Intel agent who did this upon meeting me is a rank amateur.
Monitoring a person’s involvement in any activity is often more complex than merely monitoring
their movements. Measuring a person’s involvement concerns two measures – nature and
degree. This concerns nefarious and lawful activities. John Con has no idea that his brother
planned to rob a pharmacy or that his brother robbed the pharmacy. John has no criminal history.
He has never assisted his brother’s string of criminal behaviors, bar one time. John learns of this
pharmacy robbery three months after it happened. Under severe threats from his brother, he
agrees to dispose of the weapon used in the robbery in a lake. The nature of John’s involvement
in this crime is arguably lesser than his brothers due to time lapse. The degree of his crime is
aiding and abetting – after the fact. The nature is duress, as opposed to proactive collaboration.
outsider, such as a spy, investigative journalist, or law enforcement officer. News reporter Clare
Kent knows that her local senator visits Forbidden Fruit Secret Society Templar every Friday. He
has done so for the past year. He always enters at 6pm and leaves at 7pm. He always enters with
an empty brown paper bag in his hand and leaves with the same bag. It is always stuffed full of
contents that cannot be detected by covert observation. Clare cannot obtain further details.
This vague scenario could describe almost anything. This senator may be a master pastry chef.
His contribution to this society is baking tuition. He cooks gourmet foodstuffs every Friday
evening, and takes home a sample of these cakes and biscuits in his brown paper bag.
Data collection peeps are aware of the limitations of merely tracking devices and administrative
records from a distance. A good operative aims to triangulate multiple independent data sets to
confirm each suspected observation. Consider this example. Bob Doun sees that journalist Tinker
Doe’s credit card records a purchase of military grade binoculars over the phone. Tinker is known
to share her credit card with her nine roommates. The NSA can access all conversations at 137
Party Place by tapping into the infamous creepy voice detection device marketed as the ‘Alexa’
encyclopedia directory. Alexa grooms us to never think and passively believe anything computers
tell us. Each person has a unique sonic voice pattern. It is as original as DNA and a fingerprint.
There is much party noise inside house #137 at the time that the
binoculars were ordered over the telephone. The voice signature data is
not conclusive. It could be Tinker or her twin sister Bell, who shares near-
warrant to enter 137 Party Palace. They do so when the premises are
The only conclusion that can be reached from this data set is that Bell likely has some involvement
with the purchase. It is possible that all other room mates in this property also use the binoculars.
Some may have used them in the past wearing gloves. Tinker may be the only person involved in
the purchase. She may have placed Bell’s fingerprints on the device when Bell was in a deep
drunken sleep. Welcome to the creepy, paranoid world of surveillance and counter surveillance.
The creepy overreach of original vocal biometric data is far and wide. Alphabet-Google is among
the masters of this dark field. On several occasions, I have proven beyond reasonable doubt that
Google and its subsidiaries, such as YouTube, have recorded and utilized my speech pattern via
other persons’ devices. For example, I have been travelling on a public train, dozens of miles away
from home, and have not carried any electronic devices on me at the time. Random
conversations that I have had with strangers have shown up on my YouTube suggested playlists
and YouTube commercial adverts on my cellphone when I returned home. These themes relate
to topics that I have never searched for online at any time in the past decade.
For example, I may have enjoyed a conversation with a holidaymaker stranger on the train who
is from Hawaai. As a result, I discuss many issues about Hawaai and holidays with this friendly
passerby on the train. When I return home, my YouTube Google account features numerous
playlists that concern holidays in Hawaai. This pattern persists on my phone for a few weeks, until
Google’s AI realizes that this author’s interest in Hawaai and holidays was merely a fleeting event.
What does VPN stand for? Officially this acronym refers to a Virtual Private Network. There is
no such thing in the online world. A Vulgar Peeping Nuisance may be a more apt description.
application that is free or dirt-cheap that markets itself as way to achieve privacy in the world of
cyberspace and other radio communications. Many of these tacky schemes are created and
managed by covert law enforcement branches and dubious intelligence agencies. Only a naïve
journalist would voluntarily upload highly confidential information via such platforms.
Products and services that blatantly market themselves as anti-law enforcement, i.e., maverick
agents are almost certainly stings that are managed by law enforcement entities or criminals.
Are these tacky online adverts promoting fake services that spy on your computer?
It never ceases to amaze me how many people blindly accept that a good or service guarantees
privacy because their marketing literature says so. They never inquire about basic details. These
include information such as business owner’s names, the year that business commenced and
physical locations of its head office and branch offices – if such premises exist. See pages 57-63.
Deep State fake database Wikipedia, and its criminal business partner Google makes prominent
a summary box about so-called Tor software. Google and Wikipedia push their dark agenda. They
aim to convince their billions of users that privacy can be secured online, free-of-charge. Liars.
Forte, A., et al. (2017), Privacy, anonymity, and perceived risk in open collaboration: A study of
Tor users and Wikipedians,
www.researchgate.net/profile/Nazanin_Andalibi2/publication/312261496_Privacy_Anonymity_and_Perceived_Ris
k_in_Open_Collaboration_A_Study_of_Tor_Users_and_Wikipedians/links/5ab9b1d445851515f5a0d4c3/Privacy-
Anonymity-and-Perceived-Risk-in-Open-Collaboration-A-Study-of-Tor-Users-and-Wikipedians.pdf
Sanatinia, A. (2018), Abusing privacy infrastructures: Case study of Tor, Doctoral dissertation,
Northeastern University,
https://repository.library.northeastern.edu/files/neu:cj82r932h/fulltext.pdf
Beal (2021)
Data peepers harbor a strong preference for infecting the entire operating system of a target
device where possible. For those who are novice to basic computer concepts, please consider
this analogy. You are a Five Star General Battle Commander for Space Force X. Your brutal
wartime enemy is Space Force Y. You have the option of neutralizing the entire Fleet of Space
Force Y or you can neutralize one spaceship from its massive fleet. Infecting the entire operating
system (full fleet) is more powerful than eliminating just one component such as a spaceship.
My laptop computer is a device that supports several software applications that may operate
independently from the Internet. Examples of these applications include Microsoft Excel, Adobe
Spaceship 1
Spaceship 2
A remotely located data spy peep would obviously prefer to infect my laptop’s hard drive, and
exert full view over the entire operating system, rather than just infect one application such as
Microsoft Excel. This way they can peep into every window in my house, and not just one window.
In January 2021 one of the many ridiculously obvious ‘undercover’ agents who stalked me in DC
was a fake anti CCP protestor who carried an anti CCP petition for people to sign. As time passed,
it was obvious this plump plant was not asylum seeker Mr Dim Sum. He was Mr Calculating Sum
from some three-letter alphabet trashcan. It was constantly peeping over my shoulder while I
worked on my laptop. It incessantly asked private questions. The usual modus operandi. Yawn.
Like other data peeps, this spook obtained my phone number during our initial contact when I
thought that it was genuinely a vulnerable person who struggled to learn English. I am known to
give free English lessons to refugees, asylum seekers and others in dire situations. With the
intention of being a helpful tutor, I read the many Epoch Times articles that it sent me via a text
message link. Every message said: “please tell me what you think about this article”. I gradually
tired of the routine and only answered when it sent a third follow up text message for the most
recent article. The last download that it texted to me was not a weblink. It was a virus labelled
‘download’ embedded in the message. Its first 10 messages embedded recognizable trusted links
such as YouTube videos. This spy had lulled me into a pattern of assuming that all links were from
mundane trusted sources. I opened his latest link without looking at it. My phone is permanently
infected with military grade spyware that probably cannot be removed by a layperson.
official spy agency or a rogue entity. Never assume that all spies look or act like
James Bond. My favorite thus far – a grey long haired hippy fake Yoga teacher.
surroundings even when it was not officially turned on and the light, that supposedly indicates
the camera is in use, was not activated. I had read and heard accounts by Deep State researchers
who make the same claim. I won’t have a mental breakdown if an online leak shows me at home
in ‘private’ enjoying lawful content. So, what. Potential blackmailers – don’t waste your time.
This writer was laden with a large, heavy suitcase and did not react fast enough. He tried to return
the favor, with interest, in self-defense. The thespian dropped its iPhone device on the floor prior
to running out the vehicle’s exit door, just as it was closing. I kept the cellphone, realizing that it
could be used as evidence to identify this attacker should I decide to file a police report.
Dazed and confused, I decided to smash this phone and put it in a trashcan, along with the Debit
card that was in the phone cover. By coincidence, I saw that a large amount of pre-used aluminum
foil, that had holes, was next to the trashcan. I wrapped the phone two times in this foil. It could
not be switched off as it was locked by fingerprint scan and had 95% charge. This writer, a non-
violent, non-criminal type responded on impulse. I may have had mild concussion when acting
post assault. I surmised that this violent nutcase had no right to receive its phone back.
response to this staged incident. I showed no financial crime tendencies as I never tried to use
the Debit card in a cash machine or in a no password required vendor such as a candy machine.
If you or I were to stage a premeditated crime such as the one described above, we could be
charged, imprisoned, and be registered as a violent criminal offender for life. Some law-abiding
citizens, who have no history of violence, may overreact to an unprovoked assault. They could
panic and smash the assailant’s skull, causing death. Police entrapment may be a defense.
This agent, who has accessed my personal data, dating back decades, is well-aware that there is
not a shred of evidence to lead any reasonable person to suspect this notion. Federal agencies
may employ part-useless one trick ponies who are adept at infiltrating a narrow demographic.
When deployed to general cases, they cannot adapt and bait their target into self-incrimination
in any topic beyond their pitiful mono specialization. It is ironic that these MK Ultra zombies are
obsessed with psychoanalysis, as evident from their vocabulary. Freudian. Baphometic. Ill.
This writer tried the stunt above using 25 meters of aluminum foil. I performed this test using
pre-used tin foil, which was bumpy and lumpy and contained small holes. My cellphone received
a call when I dialed using another phone. I am yet to conduct this test using unused foil that is
flat and hole free. Your cellphone may not receive calls if it is wrapped several times in tin foil,
and the foil is hole free. It is invariably best to prove or debunk such myths for yourself first-hand.
This writer has nothing to hide. He may eventually test this again if he has nothing better to do.
a dominant social media and/or communications provider. Registering and logging in via an
existing Facebook or Gmail account is the most popular. I cite this example from academic.edu:
I advise people to establish a blank template Gmail and/or Facebook account that you only use
to access websites such as academia.edu. Some of these online providers force you to agree to
share viewing rights to your contacts and/or other details such as your demographics, as
recorded in your account (age, gender etc.). Even better – establish an account that uses fake
demographics. Like this writer’s name is Gihz Az and she’s forever the fabulous age 29.
Please people consider supporting academia.edu where you can. They are among the few online
repositories that are not owned by Alphabet-Google global crime empire. This writer has been
banned/censored by ResearchGate, SlideShare and Scribd. His open-access forever free works
had been downloaded more than 300,000 times on ResearchGate before this site caved in.
This page builds on the previous section by mentioning malicious and destructive infiltration that
goes beyond mere spying. The most popular examples of downloads sources include weblinks
and files that are embedded in cellphone text messages, emails, web pages and chat providers
such as MSN. Some unwanted infiltrations act to damage, destroy, delete, or alter data in a covert
of overt manner. Adware files, such as ‘website cookies’, may cloak malicious files.
Those who work in high-stakes privacy professions such as bona fide investigative journalism may
employ two protocols for all online activities. I term this the ‘double-check and double-device’.
Many professionals never download any material as a matter of policy unless it is an urgent
situation. They are convinced that the internet and commercial software are saturated with bugs.
For those who think this way, you should only download a link, file, or application if you double-
check via the provider. For example, you may phone your manager and say: “Excuse me Ginah,
is it utterly essential for me to download this file that has an Execution (.EXE) extension?”
It may be good practice to own secondary devices that are only used for viewing and
manipulating weblinks, files and applications that are sent from external sources. This routine
may ensure that your core working devices cannot be infected with a destructive virus or a
spyware that monitors or alters your private and professional files/data. Cellphones, tablets,
desktop computers, USBs and notebook computers are the most popular hardware work devices.
Hundreds of file types can contain malware (malicious files) or spyware (spy files). Execution Files
are recognizable by their dot EXE extension. An extension is a file name ending. It typically ends
in three or four letters after a full stop/dot. A dot doc extension depicts a word document.
Advanced IT users and others are naturally suspicious of any .EXE file that is not sent via a trusted
source. They may also expect to know in advance exactly what instructions this file is designed
to automatically perform. Execution files are potentially the most powerful devices for criminals
and others who harbor seriously nefarious intentions in cyberspace. An elite programmer may
be able to deploy an execution file that can automatically log into your online bank account and
transfer the remaining balance to a foreign bank account owned by the criminal.
an example.
I advise readers to be suspicious of so-called antivirus software. A former roommate of mine was
once employed by the DIA as an IT analyst. In his own words “Antivirus scanners a scam as they
do nothing”. I can only trust his word. Firewall software may protect you from most commercial
spyware and malware. It will unlikely protect you from adept spy agencies such as the Mossad.
Artificial Stupidity, a.k.a. Artificial Intelligence, is a vast field. Observations on this page and the
next are basic. This writer strongly suspects that law enforcement and intelligence agencies have
full access privileges to intercept (i.e., receive a full automated copy) any communication that
raises a red flag based on its text, images, phonology, and other content such as binary code.
For example, consider these phone conversation extracts below, that are illustrations only.
(A) Jester to Lester: Let’s make a massive bomb and explode this on the balcony tomorrow.
(B) Lester to Jester: The Police Academy teaches engineers how to neuter explosive devices.
Conversation (A) may be a context that should genuinely concern law enforcement agencies. This
conversation, out-of-context, may transpire among frat college students, who plan to explode a
harmless flour bomb to haze incoming freshmen. Conversation (B) seems to merely discuss an
observation of fact. It does not seem to plot an explosion. AI listening devices will likely flag this
conversation merely because it detects a human voice speaking the syntax “explosive devices”.
In year 2021, humans remain far smarter than Artificial Stupidity. For example, some dating
applications do not allow unpaid guest subscribers to send their phone number via their online
message service. AI will replace my 696-555-6969 content with ***-***-**** characters. If I send
a string in my message such as “cal_l m_e, on S_IX – PHIVE” (etc), the stupidity message service
Not all people who act to avoid AI interception are hard core criminals. Many investigative
journalists who expose corruption and crime rely on the trust of a network of reliable, honest,
well-intended sources who will only support law enforcement agencies via a third-party broker.
This writer encourages high-stakes law abiding private investigators to always assume that all
computer-based and radio (analog and digital) communications are automatically intercepted by
AI or another device, such as a traditional phone wire tap (‘bug’). Furthermore, they should offer
a warning at the start of every conversation such as “Please be advised that I cannot guarantee
that this radio/phone/online conversation is not being intercepted externally in real time”.
Receiving information via trusted hand-delivered couriers or face-to-face meetings, away from
all electronic devices, may be the best way to ensure privacy. Any package that is not delivered
by a highly trusted associate is susceptible to interception. This includes material sent via
commercial couriers such as Fedex, USPS and UPS. Material that arrives via these couriers may
have been opened by police, via a warrant, prior to delivery. Fedex et al. may not inform you.
According to fairy tale fake news, media darling Bin Laden avoided detection and capture for
more than a decade because he only communicated via couriers on a donkey who delivered
messages via rugged, remote mountains. Bin Laden never used a phone or computer. Multiple
couriers were employed so that none could identify the origin of Bin Laden’s package. A fanciful,
cute story. More likely the media construction of asset Bin Laden was managed by the Clowns.
are introductory. They are not an all-encompassing directory of all the tricks of the privacy trade.
Remotely controlled drones enable peepers to observe people, vehicles and static infrastructure
at closer range that can be achieved via satellites and some street mounted cameras.
Journalists should think carefully about using drones to engage in overt or covert surveillance.
Such acts may be unlawful in certain jurisdictions. They may also distress unwilling participants.
Nowadays, most people aged under circa age 55 use their handheld cellphone as their sole or
primary voice communications device. I therefore avoid discussion of traditional phone lines. TV
shows and movies from the old days show how easy it is to bug a traditional home/office phone.
Your cellphone can be tracked when it is not connected to a commercial voice/text carrier such
as AT&T. For example, your phone can access Google Maps, in most places on this planet, if it
connects to a free WIFI service provider. Your cellphone clearly has a remote Global Positioning
System (GPS) embedded into its motherboard that does not rely on commercial SIM cards.
Apple iPhones can communicate with another iPhone user via iPhone’s inbuilt free iPhone to
iPhone messenger service. Apple obviously build in their own SIM card equivalent into their
device. This SIM works free-of-charge and independent of commercial carriers such as Vodafone.
A three-letter agency agent who offered me a job (thanks, but no thanks, and never) verbally
confirmed my theory that most cellphones can be tracked – only if the phone battery has charge.
voice calls on the internet via a unique phone number. You may use a desktop computer,
notebook, tablet, or cellphone to access these online services. Some services are available for a
free trial. No credit card is required. Services that request payment via a registered debit or credit
card can be traced back to the holder of that debit/credit card. Using a prepaid, non-registered
disposable debit is a way around this problem for privacy seeking journalists and others.
I voluntarily discussed this option with three letter agent ‘Chris’, the bogus Bible believer, at a
Moore Street venue. This Raspberry Award thespian’s facial expressions for Live Action Role Play
(LARP) and genuinely personal nutjob views are easy to discern. This House of Windsor double
agent was noticeably agitated that I was aware of these services discussed above, on this page.
It was equally disgusted that I endorsed them as a lawful way to obtain privacy. So yes, they work.
I strongly endorse these services for those law-abiding citizens who seek to maintain full
separation between their personal contact devices and work contact devices. The location of
online service users cannot be tracked in real time. Your location will only be known at the point
of time when you log into a computer device to send/receive/view data. Cellphones carried by
individuals are an antenna that constantly allow others to track your movements in real time.
Between circa 2006 and 2009, Blackberry was the iPhone/Samsung darling of the cellphone
world. It was the go-to purchase for most high-flying executives and cool cutting-edge innovators.
In 2021, Blackberry’s security software technology retains elite status. To my surprise, a three-
letter undercover agent showed me his ancient Blackberry which was concealed in his pocket. A
cute, spontaneous incident. I was the one who initiated the topic about the legend of Blackberry
security. His response “Blackberry is still among the best when it comes to cellphone security”.
I’ll take his word for it. A repeat theme in this book is the novice IT knowledge of this writer. May
this ultimately be my strength. My desires seek meaningful face-to-face people encounters, and
Speaking of freedom, may your beautiful mind seek the truth about Blackberry’s elite longevity.
Please see also the open-access article by Rialdi et al. (2018) in this book’s references section.
Whilst working in DC, I also peeped over shoulders of some slack moles at an infamous, creepy
hostel where they rest. And guess what kitties. Most prefer DuckDuckGo to Gulag Google.
In 2010, I accidentally discovered that Gmail could detect the serial and barcode numbers of my
fabulous Toshiba Satellite 16” notebook. When checking the login audit trail – location and ISPN
address – Gmail showed the serial number and bar code of the device used to access my account.
Nowadays, I don’t see Google display this feature. I suspect this barcode identification capability
still exists. It may have been removed as it was too obvious that Google could detect information
about personal data that transcends computerized transactions. People who buy hardware via
cash purchases may be shocked to learn that Google can identify their device’s serial number.
Kitty bought her tablet from Walmart. She paid in cash and did not provide verifiable customer
registration details, for example, to obtain a redeemable voucher. Her tablet purchase cannot be
traced. She was wearing a large mandatory shopper’s face mask inside Walmart. She was also
wearing a floppy winter hat and thick framed spectacles inside Walmart. Her face is therefore
not recognizable by CCTV cameras. She was not carrying a global tracking device, such as another
cellphone on her inside Walmart. Fabulous Kitty did not connect her tablet to a phone carrier
such as Ultra Mobile. She never connects her tablet to a traceable spy service such as Gmail. She
only uses free public access WIFI that does not request verifiable/traceable registration details.
Kitty wears her mask, hat, and thick spectacles when she sends a message in a public space that
This writer bears no joy when he provides this realistic and somewhat extreme example of a way
in which a person may communicate anonymously in the online world. With rare exception, no
method that aims to avoid detection is guaranteed 100% safe. In the fictitious example above,
Kitty sent her message via a public library’s free WIFI service. To avoid detection, she drove 177
miles from home, in a computer chip free car made in 1969. The NSA note that her message was
sent at 11:11 am on February 2, 2020. Only one person was using this WIFI service at that time.
Unbeknown to Kitty, the on-duty librarian recognized Kitty as a former classmate from the 1980s.
She informs the detective that she suspects the sender was Miss Kitty Cator from Pink, Oklahoma.
It is obvious that a vehicle’s Global Positioning System (GPS) can be used to trace the movements
of the person who uses this device. Two criteria must be met. The device must be registered and
therefore trackable. Moreover, triangulation is required. A GPS that is registered to Kitty Caton
could be used by another driver, such as her daughter, without Kitty being in the car. Spies need
to check at least one other device, such as the location of Kitty’s cellphone for higher certainty.
This book centers around issues of spying that concern those who work in high-stakes privacy
professions such as law enforcement and media. This page takes time out to focus on a separate
issue that cannot be filtered out merely because the core issue does not concern privacy.
There is an ever-growing body of evidence which claims that manufacturers of certain motor
vehicles may be able to remotely control key aspects of their vehicle’s trajectory. This includes
functions such as the accelerator, braking and direction of travel, i.e., the steering. This article is
offered merely as a point of inquiry for those who wish to delve deeper into the taboo topic.
Remote car hijackings that have gravely nefarious purposes are more likely to target muckraking
journalists and investigative journalists. Those fitting this category who work for major players
have been using such technologies for decades to identify banned card counting customers.
These technologies work in part by identifying unique contours of a person’s skull below the skin.
BBC
Nowadays, one should assume that thousands of partially/fully concealed cameras track the
movements of people and vehicles in populous towns and cities. Facial recognition technology
must produce a lot of false positives and negatives – especially cameras that track moving targets
from a distance more than circa 10 meters. There are too many factors that change on a person’s
face and head over time. Examples include moustaches, beards, hairstyles, slimming and weight
gain. Facial recognition technologies work best in situations where people must stand still and
stare into a camera at close range. Immigration ports of entry are an obvious example.
Wigs, spectacles, jewelry, and medical masks are lawful ways to navigate imperfect software.
Fingerprint scans and iris scans are precise technologies that are most difficult to circumnavigate.
Image below: Remote control piloting of Boeing aircraft may have existed since 2006.
For the purposes of reiteration, I repeat verbatim an extract from a prior page (p. 47).
“To avoid detection, she drove 177 miles from home, in a computer chip free car made in 1969.”
Some readers may be surprised to learn that a host of tools, home/office appliances, and other
gadgets contain a computer chip that automatically sends data to a third-party, such as the
manufacturer. Computer chips, with remote WIFI access exist in certain family white goods (e.g.,
washing machines, dryers), wrist watches, ‘Alexa’, and garden machinery such as lawnmowers.
applications that may transmit user patterns and performance data to a remote third party.
Cloud online data storage services makes it much easier for remote agents to monitor your device
usage and performance 24/7. Most people may associate cloud online storage with online
notebook storage spaces offered by Google in conjunction with major notebook manufacturers
The diagram below accurately depicts the ever-growing popularity of cloud storage beyond
laptops. Cloud storage may be used to store digital photographs, digital music files, motion video
picture files and other digital files and applications sent independently of a computer.
Johnson (2021)
I seriously suspect that three letter alphabet agencies are in love with cloud services. There’s no
need for them to wait until your home is empty to execute a search warrant covertly. They can
simply tap away on their keyboards and access your private data 24/7. In real time.
rare event. A message box invited me to store my reminders and work notes on my notebook.
© Left, michelleredfern.com
Someone wants PPC to store his working notes on a computer and cease using pen on paper
handwritten notes filed at home away from digital devices. Mischievous mere moi couldn’t resist
the offer. I created my first and last ever sticky note, which was a set of bullet points:
Rumor has it that one NSA agent had a heart attack. Another had a …. on.
Evasion
This is America.
And no one can shut you up.
Roseanne Barr
The fantasy noun ‘encryption’ is an apt word to head this book’s conclusion. May this prominent
repetition remind critical-thinking, super-smart legends like you to assess this author’s claim that
the know have long understood that sophisticated entities such as the Defense Intelligence
Agency can and do intercept and decode virtually all radio communications and online activities.
The subtext of this book centers around this writer’s experience of subjection to unwanted 24/7
perving – in the flesh and in online domains. Such attention is inevitable for a real person who
dares, emphasis on this word, to launch an attempt at bona fide journalism, in a fake news world
that is dominated by presstitute hound dog harlots who shill for the infamous Ro Clubs.
The efficacy of old school peep methods is the second key message to emphasize. In recent
weeks, this shy little thing has half-heartedly attempted to creep under the radar and live a less
abnormal life. Travelling without a cellphone as an example. Fail. Thanks to some cutesy
comments from so-called (never requested) protection plants, these movements were tracked,
even when travelling underground and via a spaghetti network of streets over many miles and
hours. Long zoom binoculars and a predictable routine were likely the identifiers. Whatever.
If not, I may question why this lumpy mark on my arm from a PPD Tuberculosis test in 2016 is
prominent. PPC ain’t worried. Yet. The only evidence that I am a cannibal may be bogus broth
brewing. Out of smart dust thick air. Paranoid? Nope. You need to give a shit to fit that category.
Tip Reference
1.
Golden rule: There is no privacy online. The NSA can track
Pages 2 to 14.
virtually every activity that is conducted online.
3. Avoid offering too much detail over the phone for sensitive conversations. You
can say to a colleague “let’s meet tomorrow at noon at our favorite place”.
4. Never download weblinks, files, and applications unless
you trust the sender and must access the offering.
Pages 33, 36
5. Avoid travelling with tracking devices such as motor
vehicles that use engineer computer chips and cellphones
Pages 47-48
in cases where you must conceal your location.
10. Clear your web browsers, temporary files, and cookie files from your hard
drives on a regular basis.
11. Never overlook the power of the oldest spy methods.
Much critical information is stolen by those who peep
Page 13
over your shoulder such as when you log into devices.
Cover key pin access pads with your hand as you type.
This section briefly explores seven online strategies that may enable novice researchers to verify
the identity of unknown agents who try to engage with us online and in other locations such as
our home porch. Examples of known agencies include the United Nations (which is inherently
corrupt) and Amtrak – a respected corporation. For most, these entities require no introduction.
It is wise to never assume that a person is a representative of a known agency just because they
say they are and/or show a plastic ID card. They may be genuine or former employees who lie
about their job title or delegated authority. People should be wary of dealing with so-called
delegates of official agencies who represent an entity in public spaces in civilian clothes or
uniform. Criminals may use fake CONEDISON identifications to gain access to private homes.
In most cases, you have a right to independently confirm a person’s professional identity before
you agree to cooperate with their lawful and reasonable requests. How you go about this, is a
tricky matter that is beyond the scope of this section which focuses on unobtrusive, simple online
searches. If a person or persons introduces themselves as a law enforcement agent, you should
ask to see their identifications and official shields. With ultra-rare exception, they should carry
one of these items when they engage. It may be a good idea to request uniformed patrol car
attend the scene to independently confirm their identities. It may be dangerous to agree to enter
their car and drive to a police station to do this check. You may be abducted. Police should never
forcibly take you to a new location unless you are under arrest and your Miranda rights are read.
Archive.org
This free service website captures screen prints of web domains by day and year. You can view
the content that was uploaded on web pages of domains for the dates that this website existed.
You can modify the date above to see if this article exists on this page on December 31, 2019.
The Internet Corporation for Assigned Names and Numbers (ICANN) for web domains. You can
conduct a WHOIS search. You may access this free service at https://lookup.icann.org/
website: www.lvnworth.com ?
As shown above, C-Vine News created their web domain name in 2018. This is a relatively new
media agency. Some registrants do not show the human name of the domain owner. They may
pay a fee to a domain registration company such as GoDaddy to conceal their identity.
DuckDuckGo has more credibility than biased Deep State criminal entities such as Google.
Pre 2021 references to C-Vine News exist on other web pages such as this example.
Testimonials
This writer has engaged C-Vine for more than two years. He has stayed at the hostel above. He
strongly commends both entities. What weight do you afford the mere views of this person?
https://journalistethics.com/contact-us/
by owners and their staff who shill as fake customers. Harsh reviews can be posted by
competitors who seek to sabotage their competition. People need to use their discernment to
vet popular online business review sites such as Trip Advisor www.tripadvisor.com
Social Media
It takes much time, energy, and money to fake a large, engaging following on social media
platforms. Tracking the history of posts and subscriber engagement on social media is a way to
confirm who follows that person or entity and their views on their reputation and content.
Researchers can extract content from recognized websites such as LinkedIn to confirm other
information such as personal identities. Per the prior page, it is also time-consuming to fake 500+
followers on LinkedIn. A rating of 500+ followers is the highest follower ranking on LinkedIn.
How would you independently verify the claim about charity tax status, above?
What official source would you consult? Does the source own a .gov domain?
http://7reasons.org/wp-content/uploads/2011/05/notw_hacking.gif
Akram (Ed), Epps, G & Oppenheimer, D. (2008), Freedom of the Press: The First Amendment: Its
www.amazon.com/Freedom-Press-Amendment-Constitutional-Contemporary/dp/159102563X
Anti Virus Software Guide (2021), Top 10 Best Free Spyware Removal Software 2021,
www.antivirussoftwareguide.com/best-free-spyware-removal
AP News (Krisher, T.) (2013), Hackers find weaknesses in car computer systems,
https://apnews.com/article/06376296f72a4b23b1f2da7a8502bd2a
www.webopedia.com/definitions/application/
Blog of the APA (2021), Philosophy in the Contemporary World: Thinking about Ideology,
https://blog.apaonline.org/2017/03/30/philosophy-in-the-contemporary-world-thinking-about-
ideology/
https://patents.google.com/patent/US7142971B2/en
Business Insider (Weir, M.) (2019), How to use private browsing on your iPhone, and turn it off
www.businessinsider.com/how-to-turn-off-private-browsing-on-iphone
www.cardbox.com/downloading/other/samples.htm
CBS (2018), Trump calls out NSA for deleting data: Here are the facts,
www.cbsnews.com/news/trump-calls-out-nsa-for-deleting-data-here-are-the-facts/
www.forbes.com/sites/barrycollins/2020/07/14/does-wrapping-your-phone-in-tin-foil-make-it-
untraceable-no-ghislaine-maxwell-it-
doesnt/#:~:text=The%20most%20likely%20effect%20of,and%20can't%20dissipate%20heat.
Forte, A., et al. (2017), Privacy, anonymity, and perceived risk in open collaboration: A study of
Tor users and Wikipedians, In Proceedings of the 2017 ACM Conference on Computer
Supported Cooperative Work and Social Computing, pp. 1800-1811.
www.researchgate.net/profile/Nazanin_Andalibi2/publication/312261496_Privacy_Anonymity_and_Perceived_Ris
k_in_Open_Collaboration_A_Study_of_Tor_Users_and_Wikipedians/links/5ab9b1d445851515f5a0d4c3/Privacy-
Anonymity-and-Perceived-Risk-in-Open-Collaboration-A-Study-of-Tor-Users-and-Wikipedians.pdf
Gardena Worldwide (2016), GARDENA Robotic Lawnmower R70Li R80Li Installation Chapter 4
https://edu.gcfglobal.org/en/computerbasics/understanding-applications/1/
http://www.academia.edu/30136974/Teaching_English_as_a_Foreign_Language_to_native_sp
eakers_of_Tai_languages
www.lendup.com/blog/seven-steps-if-victim-identity-theft.html
News (Charles, M.) (2017), Never-before-seen footage reveals Russian-backed rebels arriving at
footage-reveals-russianbacked-rebels-arriving-at-the-wreckage-of-mh17/news-
story/c5f6bc5e9629a22d17fe2680bfbd61a5
Riadi, I., & Umar, R. (2018), ‘Forensic tools performance analysis on android-based blackberry
www.academia.edu/download/63995838/70_15May18_13Apr18_12964-19831-1-
ED_edit_lia_fix20200722-7733-18qpdnq.pdf
Ruane, K. (2014), Freedom of speech and press: Exceptions to the First Amendment,
https://fas.org/sgp/crs/misc/95-815.pdf
Science with Robert (2017), Wrapping a cellphone in aluminum foil without and with holes a
https://dv-website.s3.amazonaws.com/uploads/2018/01/shutterstock_141489301.jpg
https://supreme.justia.com/cases/federal/us/417/733/
Time (Slime) Magazine (2013), TIME POLL: Support for Snowden—and His Prosecution,
https://swampland.time.com/2013/06/13/new-time-poll-support-for-the-leaker-and-his-
prosecution/
USA Today (Brown, D.) (2020), BlackBerry is releasing a new 5G-enabled device with a physical
enabled-phone-coming-2021/5615028002/
www.youtube.com/watch?v=LLjpDyXjYa0
https://en.wikipedia.org/wiki/Adam_D%27Angelo
₭0
J Jericho
Free School publication
Royalty free use of © per fair use in education. jay@journalistethics.com
America pp. 3-4, 6-11, 15-18, 24, 54, 71; Most of this book
Data, information pp. 2-4, 8, 10-11, 14, 18-27, 29-30, 32-33, 35, 38,
41, 44, 46, 51-52, 56, 59
Cellphone, landline phones pp. 4, 13, 19-20, 23, 26-7, 33, 36, 38, 43-5, 48, 55-6
Psychological operations, disinformation pp. 14, 17, 35; see also Fake news, above.
Spies, spying pp. 2, 13, 22, 33, 48 et al. – The whole book
Low intelligence agencies pp. 6-7, 10-11, 13, 17, 29, 40, 55