Sei sulla pagina 1di 77

S

22:21

10 6 11
629

www.journalistethics.com iIi
Peepers p. 2 Applied Case Studies
Political p. 3 Surveillance-Gate p. 4
Police p. 5 Silk Road p. 6
Pentagon et al p. 7 Snowden p. 9
Profiteers p. 10 Slimeballs p. 12
People p. 13 Sweden p. 14

Rights p. 15 The Pentagon Papers p. 17

Information p. 18
Identity p. 19 Tips p. 20
Ideology p. 21 TexMex p. 22
Itinerary p. 23 Ticketing p. 24
Involvement p. 25 Triangulation p. 26
Voluntary p. 28

VPN p. 29 Tor p. 30

Applications p. 31
Android et al. p. 32 Embedding p. 33
Adware p. 38 .EXE p. 39
AI p. 40 Envelopes p. 41
Technology p. 42
Telephones p. 43 Blackberry p. 45
Tablets p. 46 Buying p. 47
Transport p. 48 Boeing p. 50
Tools p. 51 Bo-Peep p. 52
Evasion p. 54
Encryption p. 55 Eleven Privacy Tips p. 56
Examination p. 57 Ethics p. 64

www.journalistethics.com i
Acronyms

CCP Chinese Communist Party


CCTV Closed Circuit Television (Camera)
CIA Central Intelligence Agency
CNN Cable Fake News Network
COVID Coronavirus Disease
DC District of Columbia
DIA Defense Intelligence Agency (USA)
EXE (.EXE) Execution file
FBI Federal Bureau of Investigation
GPS Global Positioning System
ICANN Internet Corporation for Assigned Names and Numbers
IT Information Technology
LARP Live Action Role Play
MI6 Military Intelligence, UK (Officially: ‘Secret Intelligence Service’)
MSN Microsoft Network
NSA National Security Agency (USA)
ISPN Internet Service Provider Number
PDF Portable Document Format
POI Person of Interest
SIM Subscriber Identity Module
USB Universal Serial Bus
USD United States Dollar/s
SCOTUSA Supreme Court of the United States of America
SUV Sport Utility Vehicle
VPN Virtual Private Network
WIFI Wireless Fidelity

www.journalistethics.com ii
Para(site)bles
The owner of a trained to be vicious Pit Bull mongrel bitch took his pampered pooch to a blue-
ribbon pet show – a first outing for this carnivorous canine. Prior to leaving his house, her master
gave the following instruction. “Honeycomey, this event will be attended by the bloody types that
you forever suck dry. Healthy hens, chubby chicks, and kibble-like kitties. I insist you take a day
off and be a dainty doggy. Relax, socialize, and simply enjoy the company of your fellow animals.

So, the story goes, of a naïve, nerdy lone-wolf newshound who wisely invested hundreds of hours
socializing with pervy plants who he knew were after more than just a whiff of his private and
professional lives. Give a bitch a bone and it goes away. So, the theory goes. Peace at last. Afterall,
I have nothing to hide. False. Offering my man-scent has further frenzied a pack of wicked wolves.

Workers in certain fields can never take time out to be an empathetic human. Compassion
equates to weakness. There is always a newbie to nab for a petty undetected crime from the past
century. A ‘good boy Rufus’ pat on the head as reward. Many thousands of personnel hours have
been spent by agents who have investigated every aspect of my life in recent years. They will
never be able to prove their false hyper-paranoid hunches that: I secretly teach English to Chinese
Diplomats; I’m a cannibal, pipe bomber, and a ‘P’. The stench of frustration among some sadists
grows. One may eventually fabricate ‘evidence’ to ‘prove’ their hunch and get a new head pat.

For grammar illustration purposes, this globally popular meme,


left, was used in two of my publications to show how one comma
can change the entire meaning of a mere three-word sentence.

This is part evidence that I am secretly a cannibal. The others are old private emails sent to a still
breathing, happy as, adult partner about eating their ‘asset’. The degree of spiritual sickness that
I have witnessed in recent months is profoundly disturbing. MK Ultra (low) intelligence agencies.

1 journalistethics.com Cyber Privacy is a Fantasy


Peepers
This text offers readers introductory level advice that may

aid them to maximize their invisibility and privacy when they

conduct their lawful affairs in online and offline situations.


This handbook
offers
elementary It contains three main sections. The first provides context.

advice for those Discussion identifies the types of agents who covertly

who seek to monitor others’ affairs. The data types they seek appears in
maximize their the subsection titled ‘Information’. It also outlines the rights
privacy when
and remedies available for those who seek to retain privacy.
they engage in
online and offline
The second part outlines how software and hardware are
domains.
deployed and infiltrated to secretly collect private data.
Case studies
center on the
The conclusion reiterates the core argument that the notion
online realm for
of privacy for the individual in online domains is a myth. The
journalists and
practical 11-point checklist in this chapter may aid readers
related careers
to outfox amateur and mediocre hackers and online spies.
such as
investigative
researchers. The final subsection ‘Examination’ illustrates seven online

search strategies that may verify an online identity.

2 journalistethics.com Cyber Privacy is a Fantasy


Political

Privacy breaching peepers fall into one of three categories: governmental, corporate, or informal

entities such as lone wolves. Political operatives are worthy of first mention. They are the most

sophisticated and best funded. In America, high-level Federal political surveillance entities

include, among numerous others, the FBI, CIA, Department of Justice, Homeland Security, NSA,

DIA, and intelligence agencies of the Army, Navy, Air Force, Marines and Coast Guard. There are

many hundreds of state and federal law enforcement agencies in this country whose combined

annual budget totals in the trillions (no, not billions) of dollars. Does this sound like a police state?

With ultra-rare exception, small-time media agents such as freelance journalists cannot

successfully deploy counter-privacy breaches to block governmental collectives who act within

lawful frameworks to monitor the private and business affairs of an entity of interest. Journalists

who are employed by major fake news corporations such as Fox may enjoy a far higher level of

privacy guarantee. Fox employs many dozens of elite IT professionals who specialize in data

security. They also have access to a sophisticated team of attorneys who may challenge law

enforcement interventions such as subpoenas to send witnesses and material to courts.

Small- and medium- operatives who desire to neuter America’s political machine will likely find

zero to little value in this introductory book about privacy. If you are a person of interest (POI) to

the state and you have something gravely nefarious to hide as a journalist, such as withholding

evidence related to a major felony, you will likely be detected – eventually.

3 journalistethics.com Cyber Privacy is a Fantasy


Surveillance-Gate

So-called Watergate was a global profile major political scandal that unfolded in Washington DC

during the early 1970s. Details about this sordid spying affair are easy to find online.

Watergate may remind journalists and others that surveillance tracking, and other covert data

collection devices existed long before the internet mainstreamed during the 1990s.

Data collection peeps know that much information that

they need to monitor/steal is never connected to

cyberspace ports such as WIFI. The movements of people

who walk in national parks, without a tracking device such

as a cellphone, are an example. Nowadays most people rely

on quality cameras inside their cellphone, such as a

Samsung, to take photographs that do not require perfect

resolution. Those who use old fashioned cameras such as

the one shown below, in routine settings, may be of interest

to investigative journalists. Such cameras capture higher

resolution images and zoom far closer than phone cameras.

Left: Moving

image camera. Photo spy peeps may become evasive or

hostile if you try to photograph them.

Above: still images camera

4 journalistethics.com Cyber Privacy is a Fantasy


Police

According to folk lore, those with nothing to hide should never fear law enforcement agents.

Wrong. False flag, trigger-happy, spree killing cops exist in a range of jurisdictions in numerous

nations. To simplify a complex topic, I offer two sets of advice only about engaging with police.

1. If confronted by police, never offer any more than the minimum amount of information

required, by law, until you can consult with an attorney who you trust. Remain silent.

Allow your attorney to speak on your behalf. In some jurisdictions, it is an offence to not

offer your name/address to a law enforcement officer, when requested. It may also be an

offence to provide a false name/address. In most cases, the police officer should have

probable cause to ask such questions, otherwise they may be charged with harassment.

Exceptions exist. If you have witnessed a major crime, it may be best to say to a police officer, for

example, “I saw the 33 shooters flee down Shandooky Street 37 seconds ago”.

2. Journalists and others should never feel compelled to share their property with a law

enforcement officer merely because they ask you or bark their intimidating request in

your face. Ask the officer if they have a warrant to confiscate/inspect your property.

Exceptions exist. Law enforcement may have emergency search, seizure and detain powers,

without the need for a warrant, if they arrive on the scene of a crime moments after it occurred.

5 journalistethics.com Cyber Privacy is a Fantasy


Silk Road

The infamous, now defunct Silk Road online global drug trafficking empire is a classic case study

about naivety and the need for a new paradigm where people question everything that fails the

sniff test. According to fairy tale folk lore, agents of the so-called ‘Dark Web’ were able to covertly

traffic ‘Class A’ narcotics such as cocaine and heroin on the internet on a mass scale. Their

identities were concealed from global law enforcement agencies for years as they used

encryption software to conceal their ISPN address, location, and transactions. Absolute rubbish.

Western nations such as Britain, Japan, America, and Canada collectively employ hundreds of

thousands of law enforcement personnel. Per global internet protocols, governments may

instantly cancel the domain of any website that blatantly engages in organized felonious crime.

The Silk Road empire was obviously owned and controlled by an all-powerful apex entity such as

the Chinese Communist Party, House of Windsor Nazi Crime Family or Rome’s Venetian Mafia. It

is ludicrous to believe that intelligence agencies such as the Mossad, MI6, and CIA could not

decode Silk Road’s modus operandi. The sexy word ‘encryption’ is used by slick sales agents to

brand their privacy goods and services as invincible. Wrong. If you are a high-profile target, you

will soon be decoded by those who employ the best IT personnel and software, such as Interpol.

6 journalistethics.com Cyber Privacy is a Fantasy


Pentagon et al.

In most countries, uniformed and civilian personnel employed by the military do not have

jurisdiction to monitor or detain civilian personnel in their nation. In countries such as America,

domestic surveillance is the role of local law enforcement agencies such as the FBI.

Exceptions exist. America’s Defense Intelligence Agencies may have jurisdiction to monitor and

detain enemy agents on American soil who are known to serve another nation’s military.

The general lack of civilian

jurisdiction of America’s Defense

intelligence agencies does not

equate to their irrelevance to

journalists. Quite the opposite.

America’s 17 intelligence agencies

frequently issue press statements

and speak at media events alongside

civilian executives such senators.

7 journalistethics.com Cyber Privacy is a Fantasy


NSA

America’s National Security Agency probably holds the most comprehensive intelligence data set

in history. There is much evidence that the NSA can access, among numerous other things:

 Every e-mail sent/received by every account (including deactivated accounts) from

America-based providers such as Yahoo, Gmail, Hotmail and other providers;

 Every text message and voice mail sent/received (including deactivated accounts)

from popular America-based providers such as AT&T and Verizon and others;

 Records of every web-based financial transaction conducted in America’s

jurisdictions over the past three decades in addition to most other nations.

Journalists should never be fooled into thinking that deleting a text message, email or other

electronic records can protect the privacy of third parties whose identities they aim to protect.

This CBS news article extract shown below is a suggested research topic.

To this writer, this fake news media article fails the sniff test. The NSA’s mandate empowers and

guides it to capture and forever store anything and everything that takes place in cyberspace.

8 journalistethics.com Cyber Privacy is a Fantasy


Snowden

This writer urges readers to question all mockingbird media narratives that propagate the same

fake news stories about high-stakes global heroes. Fake news like CNN and Fox award billions of

dollars of free advertising for individual brands such as Assange, former NSA employee Edward

Snowden, and dubious documentary journalists such as Michael Moore. In most cases, popular

media heroes who supposedly represent We the People are controlled Deep State puppets.

This free book featured below, left, was published by this author in 2019.

Jericho (2019)

Slime magazine is owned by the Rothschild crime family. This mafia clan has awarded the

Snowden brand billions of dollars in free advertising on purpose. They obviously like him. A lot.

9 journalistethics.com Cyber Privacy is a Fantasy


Profiteers

Certain corporations and non-corporate entities peep on our private data sometimes within the

bounds of the law and sometimes outside of these bounds. Information is powerful. Marketing

managers may exploit our data to maximize sales and for other purposes that are more devious.

Free strings-attached spy networks such as Gmail may permanently store and transmit email and

document drafts that are abandoned or revised. This writer suspects that Microsoft likewise

collects such data from commercial products. His Microsoft Office license expired in 2017 and he

declined every ‘final notice request’ from Microsoft to extend this license. He was able to use this

software for three more years – until his laptop crashed in 2020. It appears that the ability to

capture this user’s data superseded Microsoft’s interest in receiving a $75 new license payment.

Citizens at-large should be wary of sharing sensitive data with free carriers such as the Alphabet-

Google empire. The terms and conditions of these carriers generally contain dozens to hundreds

of paragraphs. Most providers reserve the right to vary conditions, at any time, without notice.

Many free public access data sharing platforms were secretly established as fronts for spy

agencies such as the CIA, MI6, and Mossad. The original founders are phony shills, whose entire

public biography may be fake. This writer suspects that Quora, as one example among many, fits

this category. Former Facebook Chief Technology Officer Adam D’Angelo supposedly invested

USD 20 million of his own money to establish Quora in 2009, age 25. Well, so vile Wikipedia says.

10 j o u r n a l i s t e t h i c s . c o m Cyber Privacy is a Fantasy


This table below summarizes illustration examples of claims that free online platforms willfully

pursue a core, covert agenda that diverges from their official public fake objectives.

Agency Examples of data that it allegedly collects, monitors


Facebook Most things: your location, family, friends, purchases,
hobbies, travels.
Google global spy empire: YouTube, Your viewing habits.
LinkedIn, SlideShare, Gmail, Scribd, Your entire life course and career.
et al. Your correspondences, digital files, online searches.
MSN Chat Your social habits.
Skype Your televised chats. It can monitor and record your
face shape and voice tone.
Change.org Monitors/registers those who disagree with
government policy.
Reddit Your opinions and knowledge.
Targets so-called ‘regular’ people.
Quora Your opinions and knowledge.
Targets so-called ‘intellectuals’.
Airbnb Peoples’ movements (guests) and tax avoiders (hosts).
Wikileaks Subversive insiders who leak classified data.

These allegations have never been proven. They are not mainstream views. Airbnb is not a free

service or a social media provider. Wikileaks is included in this table for illustration purposes. You

may ask yourself these questions and reflect on your answers. What if Wikileaks was always

nothing more than a data collection front for intelligence agencies? Might this be the ideal trojan

horse for a dark intelligence agency/government to find out who is subversive of their agenda?

11 j o u r n a l i s t e t h i c s . c o m Cyber Privacy is a Fantasy


Slimeballs

The News of the World was a weekly nation-wide circulation tabloid rag that was published in

Britain between 1843 and 2011. This rag’s ‘legacy’ is classifiable among the gossip, muckraking,

gutter-press, lunacy, and fake news categories. The demise of this sensationalist rag, part of the

Murdoch fake news brigade, is attributed to its involvement in illegal covert phone tapping.

7reasons (2011)

Covert spying is also an act that certain corrupt journalists do to others. Phone calls and

voicemail are highly susceptible to remote hacking. No one went to jail for this scandal. In

the present paradigm, fake news empires such as NewsCorp are on the same team as apex

crime institutes such as Europe’s fake royal families – The House of Orange as an example.

12 j o u r n a l i s t e t h i c s . c o m Cyber Privacy is a Fantasy


People

Other hackers and spies infiltrate the work of journalists, beyond those who shill for political,

military, and corporate entities. Broadly speaking, these agents tend to be less sophisticated than

organized entities, because they have less access to funds and a large pool of specialist personnel.

Never underestimate the success of those who engage in so-called shoulder surfing spying. This

old technique predates computer technology. It merely requires an observer to watch a person

do anything such as entering their password into a device such as a keypad or keyboard.

It is best to use passwords that are difficult for strangers to guess such as CLeVer$ME8 as opposed

to something that is easy to guess like Password123. Change your passwords often. Most

applications allow you to check the login history of a device or application. You should change

your password immediately if you do not recognize the internet address of a recorded login.

Sophisticated spy agencies such as the NSA

may access virtually all accounts such as

Gmail in a manner that will never show on

your audit trail. They may also establish

protocols that forward a full carbon copy of

every message sent/received by a certain

account. They may monitor all other actions

such as printing a bank statement online.

13 j o u r n a l i s t e t h i c s . c o m Cyber Privacy is a Fantasy


Sweden

This press release about spying modus operandi may arouse those who believe in the Assange

Encryption King fairytale about the lone wolf journalist who outfoxed all spy agencies on Earth.

In this author’s opinion, all-powerful nations such as America, do not allow material to remain

in cyberspace that poses a grave danger to national security. He is skeptical of claims above.

In the intelligence context, what is meant by the adjective ‘disinformation’?

In the intelligence context, what is meant by the noun-adjective ‘psychological operation’?

14 j o u r n a l i s t e t h i c s . c o m Cyber Privacy is a Fantasy


Rights

Amar (Ed) (2009)

15 j o u r n a l i s t e t h i c s . c o m Cyber Privacy is a Fantasy


The rights enjoyed by citizens and journalists varies by jurisdiction. In America, up to four

jurisdictions may regulate the activity of journalists: Federal, State, and County. In certain

contexts, International Law may be relevant. The onus is on journalists to familiarize themselves

with the legal rights and obligations imposed on them in the jurisdiction/s where they engage.

America’s First Amendment guarantees freedom of speech for all forms of news media:

television, print, radio, online, public event forums and others. Exceptions to this rule are rare

and fair – in this author’s mere opinion. The table below summarizes the most common

exceptions to the First Amendment of America’s Constitution.

Free speech exception: General principle


1. Incitement to commit crime is not protected.
2. Obscenity without foundation, such as artistic expression, is not protected.
3. Dissemination of child pornography is a crime and is not protected.
4. Speech that threatens, intimidates, or arouses violence is not protected.
5. Disseminating material owned by others such as copyright lyrics is not protected.
6. Disseminating false advertising and false commercial claims is unlawful.
7. The right of prison authorities to restrict speech to uphold prisoner discipline.
8. Civil sector employees may not leak information that damages national security.

America’s Government and military institution have wide scope to restrict military personnel

speech. The SCOTUSA (1974) upheld this view in Parker v. Levy (1974). It stated that the military

is a “specialized society from civilian society”. Journalists embedded in the military should consult

authorities beyond the table above. An open-access article by Congress Attorney Kathleen Ruane

(2014): ‘Freedom of Speech and Press: Exceptions to the First Amendment’ may be useful.

16 j o u r n a l i s t e t h i c s . c o m Cyber Privacy is a Fantasy


The Pentagon Papers

The so-called ‘Pentagon Papers Affair’ set a precedent in American journalism concerning the

freedom of the press. These papers refer to a dossier that is officially titled ‘Report of the Office

of the Secretary of Defense Vietnam Task Force’. According to official narratives, these classified

military papers were leaked by its co-researcher and co-author Daniel Ellsberg. Ellsberg was

initially charged with conspiracy, espionage, and theft of government assets.

The New York Times published excerpts of this dossier during 1971. Its counsel argued that it had

a right to do so under the First Amendment as the content was in the national public interest.

Diligent readers may consult the Supreme Court case law publication at its source. In a world of

mass disinformation and misinformation, it is invariably best to consult primary sources direct.

Historical narratives such as the Pentagon Papers fable may remind journalists and others that

we often must trust historical materials that we consult. This court case date above, 1971,

predates the birth date of this author. It is possible that the Pentagon Papers saga was an

orchestrated psychological operation that aimed to empower corrupt Deep State assets such as

The New York Times. It would take years of research to confirm or debunk this fabled narrative.

17 j o u r n a l i s t e t h i c s . c o m Cyber Privacy is a Fantasy


Information
This section outlines four types of information that embedded spying moles and remote hackers

seek to extract from journalists and others. These realms discussed in order concern aspects

about your identity, ideology, itinerary and involvement.

Axis of Vile

(Pronunciation: Poo Ket)

This writer calls for lovers of freedom, peace, and justice to pay close attention to this chapter.

As at early 2021, so-called ‘free’ countries such as America and Australia are sliding rapidly

towards a dark totalitarian surveillance state. Political censorship among anti-America, pro-CCP

tech giant criminals such as Twitter, Alphabet-Google and Facebook are the new abnormal.

18 j o u r n a l i s t e t h i c s . c o m Cyber Privacy is a Fantasy


Identity

The noun ‘identify theft’ is a well-known compound word that refers to criminals assuming the

identity of another entity for nefarious purposes. This activity is beyond the scope of this page.

In most cases, journalists and investigators have a fair right to protect their identity from those

who have no legitimate interest in their personal details. For example, journalist Jane Doe is

researching illegal insider trading on Wall Street. She does so within the bounds of the law. She

has good reason to believe that high-level insider trading is the norm and law enforcement

authorities and their high-level handlers purposefully turn a blind eye to this rampant practice.

Jane Doe has a right to quarantine her professional activities from her private life. This includes

details such as her home address, private cellphone number and names of family members.

Certain entities may have a legitimate and lawful right to monitor Jane’s private information. For

example, the New York Police Department receive credible evidence that Jane may have

unlawfully offered bribes to an AT&T employee to place phone taps on a Wall Street trader’s

phonelines. In such instances, this law enforcement agency should obtain a warrant to monitor

Jane’s private details such as her home phone calls and her bank account.

The page overleaf offers tips that may aid journalists such as Jane to separate their private and

professional lives. This author strongly recommends that journalists demarcate these realms.

19 j o u r n a l i s t e t h i c s . c o m Cyber Privacy is a Fantasy


Tips

 Always use a separate cellphone handset, cellphone number, email address, and

computer hardware for your private and professional lives;

 Never provide your home mailing address for professional purposes such as registering

for a conference – supply your work address and/or a secure private postal box;

 Use a reasonable abbreviation of your first name in professional settings – For example,

Barbara Watergatorade may assume the identity Babs Gatergatorade in public settings.

According to slick marketing managers, a range of free and commercial software enable

computer users to maximize their privacy options in cyberspace. These claims may be true in

certain contexts. I advise writers to always assume that such claims are always bogus or

susceptible to failure. In many cases, simple explanations about how these products work are

never made available to people like this human-oriented author who are proudly not tech-savvy.

According to Adam’s Apple, iPhone users may secure

covert browsing by selecting this Private option in Safari.

Q: How do we know that this claim by Apple is true?

A: Because Apple says so.

Yes, Apple. I believe you.

Not.

20 j o u r n a l i s t e t h i c s . c o m Cyber Privacy is a Fantasy


Ideology

Journalists who cannot separate their social, cultural, political, and economic ideologies from

their professional work may be engaging in what this writer terms ‘advocacy journalism’ (Jericho,

2020, p. 19). It is questionable whether such engagement is bona fide journalism or something

else such as political activism or the work of ‘presstitutes’. The profession ‘journalism’ supposedly

is a field that objectively assesses and disseminates facts that are in the public interest.

This writer speaks from extensive experience when he testifies that data collection peepers, such

as law enforcement, show a super-strong interest in detecting the activities of journalists who

constantly act within the bounds of the law. In many cases, the techniques used to gather such

information mirror those discussed in the prior section. Much information about a person’s

political suasions can be gauged from monitoring their email account and bank accounts. For

example, being a paid member of the Libertarian Party may be detected from both sources.

How journalists navigate such infiltrations are ultimately a private matter. Many people who

fiercely protect all information about their family, residential address and bank statements do

not care less who can detect any information about their religious and political beliefs. To a large

extent, this author falls in this category. He does not advertise such details openly. He also could

not care less who finds out such details via lawful methods. In merely his subjective viewpoint,

there is an air of creepiness about people who go out of their way to hide their outlook on life.

21 j o u r n a l i s t e t h i c s . c o m Cyber Privacy is a Fantasy


TexMex

Gill Shill infiltration moles are easy to spot. We can keep a social conversation light. They can’t.

Guapo: Hello, there. Nice to meet you today in this hostel lounge!

Porcupine: Hey there buddy, I didn’t see you sitting behind me. Good to meet you too.

Guapo: You look like an interesting person.

Porcupine: Really? You only just met me.

Guapo: Yeh, but I get this vibe. You have the classic look of an academic or journalist.

Porcupine: Yeh, sorta, whatever. I don’t identify with any profession.

Guapo: Oh, so you are in those fields. Geez, there’s a lot of slave trade out there, hey.

Porcupine: Yeh, sure. Ace suntan. Are you visiting DC – like on a holiday or something?

Guapo: A business trip. Here a few days. What do you think about illegal Mexican workers?

Porcupine: Ah, I don’t know much about that. Where did you get your cool suntan? Florida?

Guapo: Sure – Florida. Human trafficking is bad, right? What’s your view on trafficking?

Porcupine: Oh, is that the time? Oops, I’m late for my toenail clipping appointment. Bye!

Above: adapted from a staged encounter in a DC hostel TV lounge, January 2021. Yawn.

22 j o u r n a l i s t e t h i c s . c o m Cyber Privacy is a Fantasy


Itinerary

Peepers love to know the maximum amount of generic and specific details of your movements.

Generic data refers to non-descript information such as Pippa Bramble’s cellphone was

monitored moving around Oklahoma City Central Business District constantly on January 5, 2021.

Specific data refers to rich, detailed information that can be gathered from human observation

and devices. For example, NSA satellites detect that Sandra Hooke’s smartwatch travelled in the

same chip monitored vehicle, a rented Green Hyundai SUV, alongside Fay Bai on June 6, 2006. F

Bai used her cellphone at 17:37 hours to book a hotel suite at the Nohtel Motel in New Haven.

Location and activity data about certain persons of interest are narrow or universal. A court order

may permit a law enforcement team to only monitor a team of journalists when they are in

proximity of foreign embassies within a specific jurisdiction such as DC. High profile targets are

normally subject to 24/7 surveillance. Julian Assange’s movements during 2012 fits this category.

According to court records, he was considered a high risk to flee Britain while on bail. Universal

surveillance is customary when the intentions of a dangerous person of interest are not clear.

Digital, radio, telecommunications, financial transactions, and physical observation (following

people) are the classic ways to observe a person’s involvement. No method is foolproof or

conclusive. Jane Doe’s husband Joe, or any other person may be the only person who is driving

around Orlando in possession of Jane’s phone. Jane may be many miles away from her phone.

23 j o u r n a l i s t e t h i c s . c o m Cyber Privacy is a Fantasy


Ticketing

Journalists and others who wish to retain their privacy tend to avoid using transportation that

registers identifying details such as their name and credit card number. Public metro train and

bus system rarely collects a person’s name as policy. Your identity can be captured if you buy a

ticket using a registered credit or debit card. You may retain your privacy if you purchase using a

non-registered disposable debit card. Such cards are easier to obtain in countries like Australia.

In America most disposable debit cards are not anonymous. You must activate them online or

over the phone via a recognized identity document such as your social security card or passport.

Some innocent, law abiding citizens may choose to offer an alias when travelling on commercial

vehicles such as a Greyhound bus. Based on extensive observation, this writer notes that most

bus drivers only check that the passenger has a valid ticket. They do not ask for identification to

confirm that the name on the ticket matches the identification of the person holding the ticket.

Commercial drivers and conductors, such as those employed by Amtrak, may reserve the right to

deny passage to a ticket holder who cannot produce photographic identification that matches a

ticket’s passenger name. Undercover officials may carry alias identifications. I don’t take three-

letter strangers seriously who show their ID cards and say: “You can see that I am F Agnelli from

South Texas”. The thieving Defense Intel agent who did this upon meeting me is a rank amateur.

24 j o u r n a l i s t e t h i c s . c o m Cyber Privacy is a Fantasy


Involvement

Monitoring a person’s involvement in any activity is often more complex than merely monitoring

their movements. Measuring a person’s involvement concerns two measures – nature and

degree. This concerns nefarious and lawful activities. John Con has no idea that his brother

planned to rob a pharmacy or that his brother robbed the pharmacy. John has no criminal history.

He has never assisted his brother’s string of criminal behaviors, bar one time. John learns of this

pharmacy robbery three months after it happened. Under severe threats from his brother, he

agrees to dispose of the weapon used in the robbery in a lake. The nature of John’s involvement

in this crime is arguably lesser than his brothers due to time lapse. The degree of his crime is

aiding and abetting – after the fact. The nature is duress, as opposed to proactive collaboration.

Secret societies are an example of an institution that is difficult to infiltrate as an unwanted

outsider, such as a spy, investigative journalist, or law enforcement officer. News reporter Clare

Kent knows that her local senator visits Forbidden Fruit Secret Society Templar every Friday. He

has done so for the past year. He always enters at 6pm and leaves at 7pm. He always enters with

an empty brown paper bag in his hand and leaves with the same bag. It is always stuffed full of

contents that cannot be detected by covert observation. Clare cannot obtain further details.

This vague scenario could describe almost anything. This senator may be a master pastry chef.

His contribution to this society is baking tuition. He cooks gourmet foodstuffs every Friday

evening, and takes home a sample of these cakes and biscuits in his brown paper bag.

25 j o u r n a l i s t e t h i c s . c o m Cyber Privacy is a Fantasy


Triangulation

Data collection peeps are aware of the limitations of merely tracking devices and administrative

records from a distance. A good operative aims to triangulate multiple independent data sets to

confirm each suspected observation. Consider this example. Bob Doun sees that journalist Tinker

Doe’s credit card records a purchase of military grade binoculars over the phone. Tinker is known

to share her credit card with her nine roommates. The NSA can access all conversations at 137

Party Place by tapping into the infamous creepy voice detection device marketed as the ‘Alexa’

encyclopedia directory. Alexa grooms us to never think and passively believe anything computers

tell us. Each person has a unique sonic voice pattern. It is as original as DNA and a fingerprint.

There is much party noise inside house #137 at the time that the

binoculars were ordered over the telephone. The voice signature data is

not conclusive. It could be Tinker or her twin sister Bell, who shares near-

identical vocal sonic patterns with Tinker. Detectives obtain a search

warrant to enter 137 Party Palace. They do so when the premises are

empty. Only Bell’s fingerprints are located on these fabulous binoculars.

The only conclusion that can be reached from this data set is that Bell likely has some involvement

with the purchase. It is possible that all other room mates in this property also use the binoculars.

Some may have used them in the past wearing gloves. Tinker may be the only person involved in

the purchase. She may have placed Bell’s fingerprints on the device when Bell was in a deep

drunken sleep. Welcome to the creepy, paranoid world of surveillance and counter surveillance.

26 j o u r n a l i s t e t h i c s . c o m Cyber Privacy is a Fantasy


www.aware.com/voice-authentication/

The creepy overreach of original vocal biometric data is far and wide. Alphabet-Google is among

the masters of this dark field. On several occasions, I have proven beyond reasonable doubt that

Google and its subsidiaries, such as YouTube, have recorded and utilized my speech pattern via

other persons’ devices. For example, I have been travelling on a public train, dozens of miles away

from home, and have not carried any electronic devices on me at the time. Random

conversations that I have had with strangers have shown up on my YouTube suggested playlists

and YouTube commercial adverts on my cellphone when I returned home. These themes relate

to topics that I have never searched for online at any time in the past decade.

For example, I may have enjoyed a conversation with a holidaymaker stranger on the train who

is from Hawaai. As a result, I discuss many issues about Hawaai and holidays with this friendly

passerby on the train. When I return home, my YouTube Google account features numerous

playlists that concern holidays in Hawaai. This pattern persists on my phone for a few weeks, until

Google’s AI realizes that this author’s interest in Hawaai and holidays was merely a fleeting event.

27 j o u r n a l i s t e t h i c s . c o m Cyber Privacy is a Fantasy


Voluntary

Above – Wicked Wickr.

Sounds like Wicca as in Witchcraft.

Most dark truths hide in plain sight.

28 j o u r n a l i s t e t h i c s . c o m Cyber Privacy is a Fantasy


VPN

What does VPN stand for? Officially this acronym refers to a Virtual Private Network. There is

no such thing in the online world. A Vulgar Peeping Nuisance may be a more apt description.

This writer encourages people to be automatically suspicious of any hardware or software

application that is free or dirt-cheap that markets itself as way to achieve privacy in the world of

cyberspace and other radio communications. Many of these tacky schemes are created and

managed by covert law enforcement branches and dubious intelligence agencies. Only a naïve

journalist would voluntarily upload highly confidential information via such platforms.

Products and services that blatantly market themselves as anti-law enforcement, i.e., maverick

agents are almost certainly stings that are managed by law enforcement entities or criminals.

Are these tacky online adverts promoting fake services that spy on your computer?

It never ceases to amaze me how many people blindly accept that a good or service guarantees

privacy because their marketing literature says so. They never inquire about basic details. These

include information such as business owner’s names, the year that business commenced and

physical locations of its head office and branch offices – if such premises exist. See pages 57-63.

29 j o u r n a l i s t e t h i c s . c o m Cyber Privacy is a Fantasy


Tor

Deep State fake database Wikipedia, and its criminal business partner Google makes prominent

a summary box about so-called Tor software. Google and Wikipedia push their dark agenda. They

aim to convince their billions of users that privacy can be secured online, free-of-charge. Liars.

This writer’s deep skepticism

about the myth of online

privacy, for small and

medium operatives, is merely

his opinion. I welcome

readers to consult a range of

independent opinions on this

topic. Please always freely

draw your own conclusions. I

offer these samples.

Forte, A., et al. (2017), Privacy, anonymity, and perceived risk in open collaboration: A study of
Tor users and Wikipedians,
www.researchgate.net/profile/Nazanin_Andalibi2/publication/312261496_Privacy_Anonymity_and_Perceived_Ris
k_in_Open_Collaboration_A_Study_of_Tor_Users_and_Wikipedians/links/5ab9b1d445851515f5a0d4c3/Privacy-
Anonymity-and-Perceived-Risk-in-Open-Collaboration-A-Study-of-Tor-Users-and-Wikipedians.pdf

Sanatinia, A. (2018), Abusing privacy infrastructures: Case study of Tor, Doctoral dissertation,
Northeastern University,
https://repository.library.northeastern.edu/files/neu:cj82r932h/fulltext.pdf

30 j o u r n a l i s t e t h i c s . c o m Cyber Privacy is a Fantasy


Applications

Beal (2021)

31 j o u r n a l i s t e t h i c s . c o m Cyber Privacy is a Fantasy


Android et al.

Data peepers harbor a strong preference for infecting the entire operating system of a target

device where possible. For those who are novice to basic computer concepts, please consider

this analogy. You are a Five Star General Battle Commander for Space Force X. Your brutal

wartime enemy is Space Force Y. You have the option of neutralizing the entire Fleet of Space

Force Y or you can neutralize one spaceship from its massive fleet. Infecting the entire operating

system (full fleet) is more powerful than eliminating just one component such as a spaceship.

My laptop computer is a device that supports several software applications that may operate

independently from the Internet. Examples of these applications include Microsoft Excel, Adobe

Acrobat PDF reader and my laptop digital camera.

Spaceship 1

Spaceship 2

A remotely located data spy peep would obviously prefer to infect my laptop’s hard drive, and

exert full view over the entire operating system, rather than just infect one application such as

Microsoft Excel. This way they can peep into every window in my house, and not just one window.

32 j o u r n a l i s t e t h i c s . c o m Cyber Privacy is a Fantasy


Embedding

In January 2021 one of the many ridiculously obvious ‘undercover’ agents who stalked me in DC

was a fake anti CCP protestor who carried an anti CCP petition for people to sign. As time passed,

it was obvious this plump plant was not asylum seeker Mr Dim Sum. He was Mr Calculating Sum

from some three-letter alphabet trashcan. It was constantly peeping over my shoulder while I

worked on my laptop. It incessantly asked private questions. The usual modus operandi. Yawn.

Like other data peeps, this spook obtained my phone number during our initial contact when I

thought that it was genuinely a vulnerable person who struggled to learn English. I am known to

give free English lessons to refugees, asylum seekers and others in dire situations. With the

intention of being a helpful tutor, I read the many Epoch Times articles that it sent me via a text

message link. Every message said: “please tell me what you think about this article”. I gradually

tired of the routine and only answered when it sent a third follow up text message for the most

recent article. The last download that it texted to me was not a weblink. It was a virus labelled

‘download’ embedded in the message. Its first 10 messages embedded recognizable trusted links

such as YouTube videos. This spy had lulled me into a pattern of assuming that all links were from

mundane trusted sources. I opened his latest link without looking at it. My phone is permanently

infected with military grade spyware that probably cannot be removed by a layperson.

Image right: © Freepik. Any person can be an undercover agent from an

official spy agency or a rogue entity. Never assume that all spies look or act like

James Bond. My favorite thus far – a grey long haired hippy fake Yoga teacher.

33 j o u r n a l i s t e t h i c s . c o m Cyber Privacy is a Fantasy


I am grateful for one agent informing me that my phone camera has constantly recorded all

surroundings even when it was not officially turned on and the light, that supposedly indicates

the camera is in use, was not activated. I had read and heard accounts by Deep State researchers

who make the same claim. I won’t have a mental breakdown if an online leak shows me at home

in ‘private’ enjoying lawful content. So, what. Potential blackmailers – don’t waste your time.

In December 2020, this writer was brutally punched in the face,

without warning or provocation in a certain state jurisdiction on

public transport by a mature age, well-dressed person of clean-cut

appearance. A fake reason was offered at the time of the impact:

“You’re not wearing your COVID face mask properly”.

This writer was laden with a large, heavy suitcase and did not react fast enough. He tried to return

the favor, with interest, in self-defense. The thespian dropped its iPhone device on the floor prior

to running out the vehicle’s exit door, just as it was closing. I kept the cellphone, realizing that it

could be used as evidence to identify this attacker should I decide to file a police report.

Dazed and confused, I decided to smash this phone and put it in a trashcan, along with the Debit

card that was in the phone cover. By coincidence, I saw that a large amount of pre-used aluminum

foil, that had holes, was next to the trashcan. I wrapped the phone two times in this foil. It could

not be switched off as it was locked by fingerprint scan and had 95% charge. This writer, a non-

violent, non-criminal type responded on impulse. I may have had mild concussion when acting

post assault. I surmised that this violent nutcase had no right to receive its phone back.

34 j o u r n a l i s t e t h i c s . c o m Cyber Privacy is a Fantasy


An undercover three letter agency creep in DC later indicated that it was impressed with my

response to this staged incident. I showed no financial crime tendencies as I never tried to use

the Debit card in a cash machine or in a no password required vendor such as a candy machine.

If you or I were to stage a premeditated crime such as the one described above, we could be

charged, imprisoned, and be registered as a violent criminal offender for life. Some law-abiding

citizens, who have no history of violence, may overreact to an unprovoked assault. They could

panic and smash the assailant’s skull, causing death. Police entrapment may be a defense.

According to this vile creep, its occult like heavily tattooed

body provides it with the cover needed to infiltrate Neo-

Nazi white supremacist groups. During the hours that this

agent pretended to befriend me in a hostel TV room, it

occurred to me that most of its thinly-veiled, leading,

baiting questions centered around whether I passively or

actively support criminal white supremacist groups.

This agent, who has accessed my personal data, dating back decades, is well-aware that there is

not a shred of evidence to lead any reasonable person to suspect this notion. Federal agencies

may employ part-useless one trick ponies who are adept at infiltrating a narrow demographic.

When deployed to general cases, they cannot adapt and bait their target into self-incrimination

in any topic beyond their pitiful mono specialization. It is ironic that these MK Ultra zombies are

obsessed with psychoanalysis, as evident from their vocabulary. Freudian. Baphometic. Ill.

35 j o u r n a l i s t e t h i c s . c o m Cyber Privacy is a Fantasy


Fake news fibster Forbes may or may not be telling the truth in this illustration below.

This writer tried the stunt above using 25 meters of aluminum foil. I performed this test using

pre-used tin foil, which was bumpy and lumpy and contained small holes. My cellphone received

a call when I dialed using another phone. I am yet to conduct this test using unused foil that is

flat and hole free. Your cellphone may not receive calls if it is wrapped several times in tin foil,

and the foil is hole free. It is invariably best to prove or debunk such myths for yourself first-hand.

This writer has nothing to hide. He may eventually test this again if he has nothing better to do.

36 j o u r n a l i s t e t h i c s . c o m Cyber Privacy is a Fantasy


Nowadays, many applications and online service providers offer optional or mandatory login via

a dominant social media and/or communications provider. Registering and logging in via an

existing Facebook or Gmail account is the most popular. I cite this example from academic.edu:

I advise people to establish a blank template Gmail and/or Facebook account that you only use

to access websites such as academia.edu. Some of these online providers force you to agree to

share viewing rights to your contacts and/or other details such as your demographics, as

recorded in your account (age, gender etc.). Even better – establish an account that uses fake

demographics. Like this writer’s name is Gihz Az and she’s forever the fabulous age 29.

Please people consider supporting academia.edu where you can. They are among the few online

repositories that are not owned by Alphabet-Google global crime empire. This writer has been

banned/censored by ResearchGate, SlideShare and Scribd. His open-access forever free works

had been downloaded more than 300,000 times on ResearchGate before this site caved in.

37 j o u r n a l i s t e t h i c s . c o m Cyber Privacy is a Fantasy


Adware

This page builds on the previous section by mentioning malicious and destructive infiltration that

goes beyond mere spying. The most popular examples of downloads sources include weblinks

and files that are embedded in cellphone text messages, emails, web pages and chat providers

such as MSN. Some unwanted infiltrations act to damage, destroy, delete, or alter data in a covert

of overt manner. Adware files, such as ‘website cookies’, may cloak malicious files.

Those who work in high-stakes privacy professions such as bona fide investigative journalism may

employ two protocols for all online activities. I term this the ‘double-check and double-device’.

Many professionals never download any material as a matter of policy unless it is an urgent

situation. They are convinced that the internet and commercial software are saturated with bugs.

For those who think this way, you should only download a link, file, or application if you double-

check via the provider. For example, you may phone your manager and say: “Excuse me Ginah,

is it utterly essential for me to download this file that has an Execution (.EXE) extension?”

It may be good practice to own secondary devices that are only used for viewing and

manipulating weblinks, files and applications that are sent from external sources. This routine

may ensure that your core working devices cannot be infected with a destructive virus or a

spyware that monitors or alters your private and professional files/data. Cellphones, tablets,

desktop computers, USBs and notebook computers are the most popular hardware work devices.

38 j o u r n a l i s t e t h i c s . c o m Cyber Privacy is a Fantasy


.EXE

Hundreds of file types can contain malware (malicious files) or spyware (spy files). Execution Files

are recognizable by their dot EXE extension. An extension is a file name ending. It typically ends

in three or four letters after a full stop/dot. A dot doc extension depicts a word document.

Advanced IT users and others are naturally suspicious of any .EXE file that is not sent via a trusted

source. They may also expect to know in advance exactly what instructions this file is designed

to automatically perform. Execution files are potentially the most powerful devices for criminals

and others who harbor seriously nefarious intentions in cyberspace. An elite programmer may

be able to deploy an execution file that can automatically log into your online bank account and

transfer the remaining balance to a foreign bank account owned by the criminal.

Some network security systems and

anti-virus packages automatically

warn users about any file that has a

dot EXE extension. The image left is

an example.

I advise readers to be suspicious of so-called antivirus software. A former roommate of mine was

once employed by the DIA as an IT analyst. In his own words “Antivirus scanners a scam as they

do nothing”. I can only trust his word. Firewall software may protect you from most commercial

spyware and malware. It will unlikely protect you from adept spy agencies such as the Mossad.

39 j o u r n a l i s t e t h i c s . c o m Cyber Privacy is a Fantasy


AI

Artificial Stupidity, a.k.a. Artificial Intelligence, is a vast field. Observations on this page and the

next are basic. This writer strongly suspects that law enforcement and intelligence agencies have

full access privileges to intercept (i.e., receive a full automated copy) any communication that

raises a red flag based on its text, images, phonology, and other content such as binary code.

For example, consider these phone conversation extracts below, that are illustrations only.

(A) Jester to Lester: Let’s make a massive bomb and explode this on the balcony tomorrow.

(B) Lester to Jester: The Police Academy teaches engineers how to neuter explosive devices.

Conversation (A) may be a context that should genuinely concern law enforcement agencies. This

conversation, out-of-context, may transpire among frat college students, who plan to explode a

harmless flour bomb to haze incoming freshmen. Conversation (B) seems to merely discuss an

observation of fact. It does not seem to plot an explosion. AI listening devices will likely flag this

conversation merely because it detects a human voice speaking the syntax “explosive devices”.

In year 2021, humans remain far smarter than Artificial Stupidity. For example, some dating

applications do not allow unpaid guest subscribers to send their phone number via their online

message service. AI will replace my 696-555-6969 content with ***-***-**** characters. If I send

a string in my message such as “cal_l m_e, on S_IX – PHIVE” (etc), the stupidity message service

will likely send verbatim cal_l m_e, on S_IX – PHIVE”.

40 j o u r n a l i s t e t h i c s . c o m Cyber Privacy is a Fantasy


Envelopes

Not all people who act to avoid AI interception are hard core criminals. Many investigative

journalists who expose corruption and crime rely on the trust of a network of reliable, honest,

well-intended sources who will only support law enforcement agencies via a third-party broker.

This writer encourages high-stakes law abiding private investigators to always assume that all

computer-based and radio (analog and digital) communications are automatically intercepted by

AI or another device, such as a traditional phone wire tap (‘bug’). Furthermore, they should offer

a warning at the start of every conversation such as “Please be advised that I cannot guarantee

that this radio/phone/online conversation is not being intercepted externally in real time”.

Receiving information via trusted hand-delivered couriers or face-to-face meetings, away from

all electronic devices, may be the best way to ensure privacy. Any package that is not delivered

by a highly trusted associate is susceptible to interception. This includes material sent via

commercial couriers such as Fedex, USPS and UPS. Material that arrives via these couriers may

have been opened by police, via a warrant, prior to delivery. Fedex et al. may not inform you.

According to fairy tale fake news, media darling Bin Laden avoided detection and capture for

more than a decade because he only communicated via couriers on a donkey who delivered

messages via rugged, remote mountains. Bin Laden never used a phone or computer. Multiple

couriers were employed so that none could identify the origin of Bin Laden’s package. A fanciful,

cute story. More likely the media construction of asset Bin Laden was managed by the Clowns.

41 j o u r n a l i s t e t h i c s . c o m Cyber Privacy is a Fantasy


Technology
This section focuses on technical aspects of computer hardware and physical objects. Examples

are introductory. They are not an all-encompassing directory of all the tricks of the privacy trade.

Remotely controlled drones enable peepers to observe people, vehicles and static infrastructure

at closer range that can be achieved via satellites and some street mounted cameras.

Journalists should think carefully about using drones to engage in overt or covert surveillance.

Such acts may be unlawful in certain jurisdictions. They may also distress unwilling participants.

42 j o u r n a l i s t e t h i c s . c o m Cyber Privacy is a Fantasy


Telephones

Nowadays, most people aged under circa age 55 use their handheld cellphone as their sole or

primary voice communications device. I therefore avoid discussion of traditional phone lines. TV

shows and movies from the old days show how easy it is to bug a traditional home/office phone.

Your cellphone can be tracked when it is not connected to a commercial voice/text carrier such

as AT&T. For example, your phone can access Google Maps, in most places on this planet, if it

connects to a free WIFI service provider. Your cellphone clearly has a remote Global Positioning

System (GPS) embedded into its motherboard that does not rely on commercial SIM cards.

Apple iPhones can communicate with another iPhone user via iPhone’s inbuilt free iPhone to

iPhone messenger service. Apple obviously build in their own SIM card equivalent into their

device. This SIM works free-of-charge and independent of commercial carriers such as Vodafone.

It is reasonable to assume that any

spy or law enforcement agency can

remotely track the activities of any

device that they have infiltrated.

Learning the serial number of the

phone is an example of infiltration.

A three-letter agency agent who offered me a job (thanks, but no thanks, and never) verbally

confirmed my theory that most cellphones can be tracked – only if the phone battery has charge.

43 j o u r n a l i s t e t h i c s . c o m Cyber Privacy is a Fantasy


You may purchase cheap services online that offer one or more of: text messages, voicemail and

voice calls on the internet via a unique phone number. You may use a desktop computer,

notebook, tablet, or cellphone to access these online services. Some services are available for a

free trial. No credit card is required. Services that request payment via a registered debit or credit

card can be traced back to the holder of that debit/credit card. Using a prepaid, non-registered

disposable debit is a way around this problem for privacy seeking journalists and others.

I voluntarily discussed this option with three letter agent ‘Chris’, the bogus Bible believer, at a

Moore Street venue. This Raspberry Award thespian’s facial expressions for Live Action Role Play

(LARP) and genuinely personal nutjob views are easy to discern. This House of Windsor double

agent was noticeably agitated that I was aware of these services discussed above, on this page.

It was equally disgusted that I endorsed them as a lawful way to obtain privacy. So yes, they work.

I strongly endorse these services for those law-abiding citizens who seek to maintain full

separation between their personal contact devices and work contact devices. The location of

online service users cannot be tracked in real time. Your location will only be known at the point

of time when you log into a computer device to send/receive/view data. Cellphones carried by

individuals are an antenna that constantly allow others to track your movements in real time.

44 j o u r n a l i s t e t h i c s . c o m Cyber Privacy is a Fantasy


Blackberry

Between circa 2006 and 2009, Blackberry was the iPhone/Samsung darling of the cellphone

world. It was the go-to purchase for most high-flying executives and cool cutting-edge innovators.

In 2021, Blackberry’s security software technology retains elite status. To my surprise, a three-

letter undercover agent showed me his ancient Blackberry which was concealed in his pocket. A

cute, spontaneous incident. I was the one who initiated the topic about the legend of Blackberry

security. His response “Blackberry is still among the best when it comes to cellphone security”.

I’ll take his word for it. A repeat theme in this book is the novice IT knowledge of this writer. May

this ultimately be my strength. My desires seek meaningful face-to-face people encounters, and

independent research, as opposed to pleasing masters such as AI or a three-letter vendetta.

Speaking of freedom, may your beautiful mind seek the truth about Blackberry’s elite longevity.

Please see also the open-access article by Rialdi et al. (2018) in this book’s references section.

Whilst working in DC, I also peeped over shoulders of some slack moles at an infamous, creepy

hostel where they rest. And guess what kitties. Most prefer DuckDuckGo to Gulag Google.

45 j o u r n a l i s t e t h i c s . c o m Cyber Privacy is a Fantasy


Tablets

In 2010, I accidentally discovered that Gmail could detect the serial and barcode numbers of my

fabulous Toshiba Satellite 16” notebook. When checking the login audit trail – location and ISPN

address – Gmail showed the serial number and bar code of the device used to access my account.

Nowadays, I don’t see Google display this feature. I suspect this barcode identification capability

still exists. It may have been removed as it was too obvious that Google could detect information

about personal data that transcends computerized transactions. People who buy hardware via

cash purchases may be shocked to learn that Google can identify their device’s serial number.

Google offers this device tracking feature

within its Gmail account service.

My Nokia is turned off, partially because of

Mr Calculating Sum and partially because, I

don’t need to use this robot today.

Dear reader, you. Are you also existing in

that zone nowadays where you feel

liberated from turning off a global tracking

device that you don’t need and rarely use?

46 j o u r n a l i s t e t h i c s . c o m Cyber Privacy is a Fantasy


Buying

Kitty bought her tablet from Walmart. She paid in cash and did not provide verifiable customer

registration details, for example, to obtain a redeemable voucher. Her tablet purchase cannot be

traced. She was wearing a large mandatory shopper’s face mask inside Walmart. She was also

wearing a floppy winter hat and thick framed spectacles inside Walmart. Her face is therefore

not recognizable by CCTV cameras. She was not carrying a global tracking device, such as another

cellphone on her inside Walmart. Fabulous Kitty did not connect her tablet to a phone carrier

such as Ultra Mobile. She never connects her tablet to a traceable spy service such as Gmail. She

only uses free public access WIFI that does not request verifiable/traceable registration details.

Kitty wears her mask, hat, and thick spectacles when she sends a message in a public space that

offers free WIFI. She messages J Jericho at: https://journalistethics.com/genocide/

This writer bears no joy when he provides this realistic and somewhat extreme example of a way

in which a person may communicate anonymously in the online world. With rare exception, no

method that aims to avoid detection is guaranteed 100% safe. In the fictitious example above,

Kitty sent her message via a public library’s free WIFI service. To avoid detection, she drove 177

miles from home, in a computer chip free car made in 1969. The NSA note that her message was

sent at 11:11 am on February 2, 2020. Only one person was using this WIFI service at that time.

Unbeknown to Kitty, the on-duty librarian recognized Kitty as a former classmate from the 1980s.

She informs the detective that she suspects the sender was Miss Kitty Cator from Pink, Oklahoma.

47 j o u r n a l i s t e t h i c s . c o m Cyber Privacy is a Fantasy


Transport

It is obvious that a vehicle’s Global Positioning System (GPS) can be used to trace the movements

of the person who uses this device. Two criteria must be met. The device must be registered and

therefore trackable. Moreover, triangulation is required. A GPS that is registered to Kitty Caton

could be used by another driver, such as her daughter, without Kitty being in the car. Spies need

to check at least one other device, such as the location of Kitty’s cellphone for higher certainty.

This book centers around issues of spying that concern those who work in high-stakes privacy

professions such as law enforcement and media. This page takes time out to focus on a separate

issue that cannot be filtered out merely because the core issue does not concern privacy.

There is an ever-growing body of evidence which claims that manufacturers of certain motor

vehicles may be able to remotely control key aspects of their vehicle’s trajectory. This includes

functions such as the accelerator, braking and direction of travel, i.e., the steering. This article is

offered merely as a point of inquiry for those who wish to delve deeper into the taboo topic.

Remote car hijackings that have gravely nefarious purposes are more likely to target muckraking

journalists and investigative journalists. Those fitting this category who work for major players

are normally well protected/supported by a team of professionals such as motor mechanics.

48 j o u r n a l i s t e t h i c s . c o m Cyber Privacy is a Fantasy


Computerized facial recognition software technology is old. Casinos in Las Vegas and other cities

have been using such technologies for decades to identify banned card counting customers.

These technologies work in part by identifying unique contours of a person’s skull below the skin.

BBC

Nowadays, one should assume that thousands of partially/fully concealed cameras track the

movements of people and vehicles in populous towns and cities. Facial recognition technology

must produce a lot of false positives and negatives – especially cameras that track moving targets

from a distance more than circa 10 meters. There are too many factors that change on a person’s

face and head over time. Examples include moustaches, beards, hairstyles, slimming and weight

gain. Facial recognition technologies work best in situations where people must stand still and

stare into a camera at close range. Immigration ports of entry are an obvious example.

Wigs, spectacles, jewelry, and medical masks are lawful ways to navigate imperfect software.

Fingerprint scans and iris scans are precise technologies that are most difficult to circumnavigate.

49 j o u r n a l i s t e t h i c s . c o m Cyber Privacy is a Fantasy


Boeing

Image below: Remote control piloting of Boeing aircraft may have existed since 2006.

Left, free book by this

author. (Jericho, 2019)

Kim Jong Un doesn’t travel

by plane. I wonder why.

MH17 Departure: Amsterdam Years in service: 17 Maiden flight on 17 July 1997

An incident occurred at 17,000 feet on 17 July 2014

Location: Ukrainian airspace 48°8′17″N 38°38′20″E

50 j o u r n a l i s t e t h i c s . c o m Cyber Privacy is a Fantasy


Tools

For the purposes of reiteration, I repeat verbatim an extract from a prior page (p. 47).

“To avoid detection, she drove 177 miles from home, in a computer chip free car made in 1969.”

Some readers may be surprised to learn that a host of tools, home/office appliances, and other

gadgets contain a computer chip that automatically sends data to a third-party, such as the

manufacturer. Computer chips, with remote WIFI access exist in certain family white goods (e.g.,

washing machines, dryers), wrist watches, ‘Alexa’, and garden machinery such as lawnmowers.

It is becoming increasingly difficult to buy machinery that is not connected to internet-based

applications that may transmit user patterns and performance data to a remote third party.

51 j o u r n a l i s t e t h i c s . c o m Cyber Privacy is a Fantasy


Bo-Peep

Cloud online data storage services makes it much easier for remote agents to monitor your device

usage and performance 24/7. Most people may associate cloud online storage with online

notebook storage spaces offered by Google in conjunction with major notebook manufacturers

such as Dell, Hewlett Packard, ACER, Apple, and Samsung.

The diagram below accurately depicts the ever-growing popularity of cloud storage beyond

laptops. Cloud storage may be used to store digital photographs, digital music files, motion video

picture files and other digital files and applications sent independently of a computer.

Johnson (2021)

I seriously suspect that three letter alphabet agencies are in love with cloud services. There’s no

need for them to wait until your home is empty to execute a search warrant covertly. They can

simply tap away on their keyboards and access your private data 24/7. In real time.

52 j o u r n a l i s t e t h i c s . c o m Cyber Privacy is a Fantasy


In mid-2020, a Microsoft Sticky Notes advert appeared on my Dell notebook out-of-the blue. A

rare event. A message box invited me to store my reminders and work notes on my notebook.

Thanks, but not thanks, and never.

Stick Notes are Sticky Beaks.

© Left, michelleredfern.com

Someone wants PPC to store his working notes on a computer and cease using pen on paper

handwritten notes filed at home away from digital devices. Mischievous mere moi couldn’t resist

the offer. I created my first and last ever sticky note, which was a set of bullet points:

“espionage, money laundering, human trafficking, tax evasion”.

Rumor has it that one NSA agent had a heart attack. Another had a …. on.

53 j o u r n a l i s t e t h i c s . c o m Cyber Privacy is a Fantasy


[

Evasion

This is America.
And no one can shut you up.
Roseanne Barr

54 j o u r n a l i s t e t h i c s . c o m Cyber Privacy is a Fantasy


Encryption

The fantasy noun ‘encryption’ is an apt word to head this book’s conclusion. May this prominent

repetition remind critical-thinking, super-smart legends like you to assess this author’s claim that

references to ‘encryption technologies’ merely aim to excite non-savvy IT consumers. Those in

the know have long understood that sophisticated entities such as the Defense Intelligence

Agency can and do intercept and decode virtually all radio communications and online activities.

The subtext of this book centers around this writer’s experience of subjection to unwanted 24/7

perving – in the flesh and in online domains. Such attention is inevitable for a real person who

dares, emphasis on this word, to launch an attempt at bona fide journalism, in a fake news world

that is dominated by presstitute hound dog harlots who shill for the infamous Ro Clubs.

The efficacy of old school peep methods is the second key message to emphasize. In recent

weeks, this shy little thing has half-heartedly attempted to creep under the radar and live a less

abnormal life. Travelling without a cellphone as an example. Fail. Thanks to some cutesy

comments from so-called (never requested) protection plants, these movements were tracked,

even when travelling underground and via a spaghetti network of streets over many miles and

hours. Long zoom binoculars and a predictable routine were likely the identifiers. Whatever.

If not, I may question why this lumpy mark on my arm from a PPD Tuberculosis test in 2016 is

prominent. PPC ain’t worried. Yet. The only evidence that I am a cannibal may be bogus broth

brewing. Out of smart dust thick air. Paranoid? Nope. You need to give a shit to fit that category.

55 j o u r n a l i s t e t h i c s . c o m Cyber Privacy is a Fantasy


Eleven Privacy Tips

Tip Reference
1.
Golden rule: There is no privacy online. The NSA can track
Pages 2 to 14.
virtually every activity that is conducted online.

2. Never store top-secret private work notes online.


Handwritten notes work best. Lock these notes in a safe
Page 53
place away from the view of cameras and computers.

3. Avoid offering too much detail over the phone for sensitive conversations. You
can say to a colleague “let’s meet tomorrow at noon at our favorite place”.
4. Never download weblinks, files, and applications unless
you trust the sender and must access the offering.
Pages 33, 36
5. Avoid travelling with tracking devices such as motor
vehicles that use engineer computer chips and cellphones
Pages 47-48
in cases where you must conceal your location.

6. Paying with cash is the best way to avoid others tracking


your private transactions. Avoid card/online payments.
Page 47
7. Avoid using free online services for super-sensitive
projects. It is better to purchase commercial services
Page 11
from a provider who has an impeccable reputation.

8. Separate your personal contacts/devices from your


contacts/devices used for professional work.
Page 20
9. Change login passwords on a regular basis. Use long
alpha-numeric passwords that are not easy to guess.
Page 13
Password-protect private documents such as Excel.

10. Clear your web browsers, temporary files, and cookie files from your hard
drives on a regular basis.
11. Never overlook the power of the oldest spy methods.
Much critical information is stolen by those who peep
Page 13
over your shoulder such as when you log into devices.
Cover key pin access pads with your hand as you type.

56 j o u r n a l i s t e t h i c s . c o m Cyber Privacy is a Fantasy


Examination

This section briefly explores seven online strategies that may enable novice researchers to verify

the identity of unknown agents who try to engage with us online and in other locations such as

our home porch. Examples of known agencies include the United Nations (which is inherently

corrupt) and Amtrak – a respected corporation. For most, these entities require no introduction.

It is wise to never assume that a person is a representative of a known agency just because they

say they are and/or show a plastic ID card. They may be genuine or former employees who lie

about their job title or delegated authority. People should be wary of dealing with so-called

delegates of official agencies who represent an entity in public spaces in civilian clothes or

uniform. Criminals may use fake CONEDISON identifications to gain access to private homes.

In most cases, you have a right to independently confirm a person’s professional identity before

you agree to cooperate with their lawful and reasonable requests. How you go about this, is a

tricky matter that is beyond the scope of this section which focuses on unobtrusive, simple online

searches. If a person or persons introduces themselves as a law enforcement agent, you should

ask to see their identifications and official shields. With ultra-rare exception, they should carry

one of these items when they engage. It may be a good idea to request uniformed patrol car

attend the scene to independently confirm their identities. It may be dangerous to agree to enter

their car and drive to a police station to do this check. You may be abducted. Police should never

forcibly take you to a new location unless you are under arrest and your Miranda rights are read.

57 j o u r n a l i s t e t h i c s . c o m Cyber Privacy is a Fantasy


Case study

C-Vine News. Please see www.c-vine.com

Archive.org

This free service website captures screen prints of web domains by day and year. You can view

the content that was uploaded on web pages of domains for the dates that this website existed.

This web page’s archive date shows as September 27, 2020.

You can modify the date above to see if this article exists on this page on December 31, 2019.

58 j o u r n a l i s t e t h i c s . c o m Cyber Privacy is a Fantasy


ICANN

The Internet Corporation for Assigned Names and Numbers (ICANN) for web domains. You can

conduct a WHOIS search. You may access this free service at https://lookup.icann.org/

All online digital evidence is a weak

form of data proof. Virtually all

online data can be faked by those

who control that domain and by

those who can infiltrate that domain.

Sophisticated spy agencies can easily

create a fake record for any online

page and insert a fake “Created”

date. What do you make of this

website: www.lvnworth.com ?

As shown above, C-Vine News created their web domain name in 2018. This is a relatively new

media agency. Some registrants do not show the human name of the domain owner. They may

pay a fee to a domain registration company such as GoDaddy to conceal their identity.

59 j o u r n a l i s t e t h i c s . c o m Cyber Privacy is a Fantasy


Online

DuckDuckGo has more credibility than biased Deep State criminal entities such as Google.

Pre 2021 references to C-Vine News exist on other web pages such as this example.

Google Maps www.google.com/maps

This free service enables you to view the

premises that a business claims occupy to

conduct their affairs. Google Maps mostly

shows images that were taken prior to circa

2018. New businesses may not be shown.

C-Vine does not list a business premises on

its contact webpage.

60 j o u r n a l i s t e t h i c s . c o m Cyber Privacy is a Fantasy


This is an example of a small business that can be viewed on a Google Maps search.

Testimonials

This writer has engaged C-Vine for more than two years. He has stayed at the hostel above. He

strongly commends both entities. What weight do you afford the mere views of this person?

https://journalistethics.com/contact-us/

61 j o u r n a l i s t e t h i c s . c o m Cyber Privacy is a Fantasy


Testimonials on popular review sites can be faked. For example, flattering views may be posted

by owners and their staff who shill as fake customers. Harsh reviews can be posted by

competitors who seek to sabotage their competition. People need to use their discernment to

vet popular online business review sites such as Trip Advisor www.tripadvisor.com

Social Media

It takes much time, energy, and money to fake a large, engaging following on social media

platforms. Tracking the history of posts and subscriber engagement on social media is a way to

confirm who follows that person or entity and their views on their reputation and content.

62 j o u r n a l i s t e t h i c s . c o m Cyber Privacy is a Fantasy


Triangulation

Researchers can extract content from recognized websites such as LinkedIn to confirm other

information such as personal identities. Per the prior page, it is also time-consuming to fake 500+

followers on LinkedIn. A rating of 500+ followers is the highest follower ranking on LinkedIn.

How would you independently verify the claim about charity tax status, above?

What official source would you consult? Does the source own a .gov domain?

63 j o u r n a l i s t e t h i c s . c o m Cyber Privacy is a Fantasy


64 j o u r n a l i s t e t h i c s . c o m Cyber Privacy is a Fantasy
65 j o u r n a l i s t e t h i c s . c o m Cyber Privacy is a Fantasy
66 j o u r n a l i s t e t h i c s . c o m Cyber Privacy is a Fantasy
References

7Reasons (2011), notw_hacking.gif,

http://7reasons.org/wp-content/uploads/2011/05/notw_hacking.gif

Akram (Ed), Epps, G & Oppenheimer, D. (2008), Freedom of the Press: The First Amendment: Its

Constitutional History and the Contemporary Debate (Bill of Rights Series),

www.amazon.com/Freedom-Press-Amendment-Constitutional-Contemporary/dp/159102563X

Anti Virus Software Guide (2021), Top 10 Best Free Spyware Removal Software 2021,

www.antivirussoftwareguide.com/best-free-spyware-removal

AP News (Krisher, T.) (2013), Hackers find weaknesses in car computer systems,

https://apnews.com/article/06376296f72a4b23b1f2da7a8502bd2a

BBC (2013), FBI shuts down Silk Road website, www.bbc.com/news/av/technology-24378137

Beal, V. (2021), Application (Application Software),

www.webopedia.com/definitions/application/

Blog of the APA (2021), Philosophy in the Contemporary World: Thinking about Ideology,

https://blog.apaonline.org/2017/03/30/philosophy-in-the-contemporary-world-thinking-about-

ideology/

67 j o u r n a l i s t e t h i c s . c o m Cyber Privacy is a Fantasy


Boeing (2003), System and method for automatically controlling a path of travel of a vehicle,

https://patents.google.com/patent/US7142971B2/en

Book Riot (2021), Censorship image, https://bookriot.com/lets-talk-censorship/

Business Insider (Weir, M.) (2019), How to use private browsing on your iPhone, and turn it off

when you're done browsing,

www.businessinsider.com/how-to-turn-off-private-browsing-on-iphone

Card Box (2021), Sample databases (.EXE image),

www.cardbox.com/downloading/other/samples.htm

CBS (2018), Trump calls out NSA for deleting data: Here are the facts,

www.cbsnews.com/news/trump-calls-out-nsa-for-deleting-data-here-are-the-facts/

Chase City (2021), Activities image, https://chasecity-rehab.com/services/amenities/activities/

C-Vine News (2020), Home, https://c-vine.com/

DIA (2021a), Frequently Asked Questions, www.dia.mil/about/faqs/

DIA (2021b), Press Release, www.dia.mil/News/Articles/Tag/47212/press-release/

68 j o u r n a l i s t e t h i c s . c o m Cyber Privacy is a Fantasy


Forbes (Collins, B.) (2021), Does Wrapping Your Phone In Tin Foil Make It Untraceable? No,

Ghislaine Maxwell, It Doesn’t,

www.forbes.com/sites/barrycollins/2020/07/14/does-wrapping-your-phone-in-tin-foil-make-it-

untraceable-no-ghislaine-maxwell-it-

doesnt/#:~:text=The%20most%20likely%20effect%20of,and%20can't%20dissipate%20heat.

Forte, A., et al. (2017), Privacy, anonymity, and perceived risk in open collaboration: A study of
Tor users and Wikipedians, In Proceedings of the 2017 ACM Conference on Computer
Supported Cooperative Work and Social Computing, pp. 1800-1811.
www.researchgate.net/profile/Nazanin_Andalibi2/publication/312261496_Privacy_Anonymity_and_Perceived_Ris
k_in_Open_Collaboration_A_Study_of_Tor_Users_and_Wikipedians/links/5ab9b1d445851515f5a0d4c3/Privacy-
Anonymity-and-Perceived-Risk-in-Open-Collaboration-A-Study-of-Tor-Users-and-Wikipedians.pdf

Gardena Worldwide (2016), GARDENA Robotic Lawnmower R70Li R80Li Installation Chapter 4

Additional functions NEW, www.youtube.com/watch?v=jXeh5wWaaAo

GCF Global (2021), What is an application?,

https://edu.gcfglobal.org/en/computerbasics/understanding-applications/1/

Jericho, J. (2015), Teaching English to Native Speakers of Tai Languages,

http://www.academia.edu/30136974/Teaching_English_as_a_Foreign_Language_to_native_sp

eakers_of_Tai_languages

Jericho, J. (2019a), Julian Assange – News Cop or Psy-Op?,

Jericho, J. (2019b), MH17 – 17 Fascinating Questions,

69 j o u r n a l i s t e t h i c s . c o m Cyber Privacy is a Fantasy


Jericho, J. (2020), Print Press Prospects, https://journalistethics.com/

Lend Up (Lotz, A.) (2021), Identity theft image,

www.lendup.com/blog/seven-steps-if-victim-identity-theft.html

News (Charles, M.) (2017), Never-before-seen footage reveals Russian-backed rebels arriving at

the wreckage of MH17, www.news.com.au/travel/travel-updates/incidents/neverbeforeseen-

footage-reveals-russianbacked-rebels-arriving-at-the-wreckage-of-mh17/news-

story/c5f6bc5e9629a22d17fe2680bfbd61a5

Riadi, I., & Umar, R. (2018), ‘Forensic tools performance analysis on android-based blackberry

messenger using NIST measurements’, International Journal of Electrical and Computer

Engineering, 8(5), 3991.

www.academia.edu/download/63995838/70_15May18_13Apr18_12964-19831-1-

ED_edit_lia_fix20200722-7733-18qpdnq.pdf

Ruane, K. (2014), Freedom of speech and press: Exceptions to the First Amendment,

https://fas.org/sgp/crs/misc/95-815.pdf

Science with Robert (2017), Wrapping a cellphone in aluminum foil without and with holes a

science with bobert video short, www.youtube.com/watch?v=asmbgAeJqis

Shutterstock (2021), Cloud computing image,

https://dv-website.s3.amazonaws.com/uploads/2018/01/shutterstock_141489301.jpg

70 j o u r n a l i s t e t h i c s . c o m Cyber Privacy is a Fantasy


Supreme Court of the United States of America (1974), Parker v. Levy, 417 U.S. 733 (1974),

https://supreme.justia.com/cases/federal/us/417/733/

Text Port (2021), Online Text Messaging Service, https://textport.com/

The Guardian (2010), Unmanned drones may be used in police surveillance,


www.theguardian.com/uk/2010/sep/24/police-unmanned-surveillance-drones

Time (Slime) Magazine (2013), TIME POLL: Support for Snowden—and His Prosecution,

https://swampland.time.com/2013/06/13/new-time-poll-support-for-the-leaker-and-his-

prosecution/

Truth Hurts (2021), Political correctness meme, www.pinterest.ch/pin/25684660347927783/

USA Today (Brown, D.) (2020), BlackBerry is releasing a new 5G-enabled device with a physical

keyboard in 2021, www.usatoday.com/story/tech/2020/08/20/blackberry-comeback-new-5-g-

enabled-phone-coming-2021/5615028002/

Vhora Asit (2014), Porcupine fighting off SEVENTEEN lions,

www.youtube.com/watch?v=LLjpDyXjYa0

Wikipedia – Fake database (2021), Adam D’Angelo,

https://en.wikipedia.org/wiki/Adam_D%27Angelo
₭0
J Jericho
Free School publication
Royalty free use of © per fair use in education. jay@journalistethics.com

71 j o u r n a l i s t e t h i c s . c o m Cyber Privacy is a Fantasy


This writer was drugged with truth serum via laced vitamins, tea, and sweets. He was offered
illicit drugs by the same corrupt agents in hostels. He ‘loaned’ $50 to an anorexic military officer
that was deployed to interrogate this writer. It also used its Defense Intel credentials to arrange
for lobby staff to place it in the same two-bed shared hostel room as this foreigner for four nights.
It engaged Live Action Role Play and acted agitated when pretending it could not find its Debit
Card in its wallet. An insinuation that only I could be the thief. Under duress, I loaned it $50 on
the proviso that it returns this when it finds its card. It ‘found’ its card “outside the hostel”. It
offered the following response when I requested my money back: “I will pay you back when I am
rich and own a home”. During one interrogation, this ID-verified USMC agent (p. 24) shouted and
asked me if I receive stimulus check payments. It knows that I do not. This self-funded, homeless
writer lives below the poverty line and has not worked full time for pay since 2010. This agent,
who lives with its mother and receives a government salary and stimulus checks, is a scammer. It
has Defense access to my financial records and described a recent transaction on my debit card;
“$7.69 Subway”. It knew I had $500 or so in my account. This act and the fence around Capitol
Hill are metaphors for institutional corruption and brutality that has pushed our nation to the
brink. Prior to this event, I considered the mighty USMC to be a last bastion of integrity. Perhaps.

72 j o u r n a l i s t e t h i c s . c o m Cyber Privacy is a Fantasy


Index

America pp. 3-4, 6-11, 15-18, 24, 54, 71; Most of this book

Adware, malware, spyware pp. 4, 28, 38-39, 41, 43

Data, information pp. 2-4, 8, 10-11, 14, 18-27, 29-30, 32-33, 35, 38,
41, 44, 46, 51-52, 56, 59

Encryption/privacy fake services pp. 6, 14, 20, 29-30, 55

Fake mainstream news pp. 3, 8-9, 12, 17, 36, 41, 55

Hardware pp. 2, 26, 29, 38, 42-52

Cameras pp. 4, 32, 34, 42, 47, 49, 56

Cellphone, landline phones pp. 4, 13, 19-20, 23, 26-7, 33, 36, 38, 43-5, 48, 55-6

Desktop computers pp. 38, 44

Notebooks/laptops, tablets pp. 10, 20, 32-33, 38, 44, 46-47, 52

Tools, equipment pp. 51-52

Transport, travel pp. 11, 23-24, 27, 34, 48-50, 55, 56

Identity verification pp. 2, 18-20, 24, 57-63

Journalists pp. 2-8, 12-19, 21-26, 44, 47-48, 61

Law, rights pp. 2-3, 5, 12, 15-17, 19, 22, 37, 57

Psychological operations, disinformation pp. 14, 17, 35; see also Fake news, above.

Social media communications/email pp. 1, 8, 10-13, 20-21, 37-38, 44, 62

Software, applications pp. 2, 6, 10, 20, 30-41, 45, 49

Spies, spying pp. 2, 13, 22, 33, 48 et al. – The whole book

Businesses pp. 10-11

Individuals, small groups pp. 4, 10, 13

Law enforcement pp. 1, 3-5, 19, 34-35, 40-41

Low intelligence agencies pp. 6-7, 10-11, 13, 17, 29, 40, 55

Military pp. 1, 3, 7-9, 16-17, 26, 33, 71

Surveillance pp. 3-4, 7, 13, 18, 23, 26, 42

73 j o u r n a l i s t e t h i c s . c o m Cyber Privacy is a Fantasy

Potrebbero piacerti anche