Tags Archives: Cyber

23 Reasons Not to Reveal Your DNA

Editor’s note: the following is a good reminder why privacy is so important for the average person. Revolutionaries need to take these considerations even more seriously. via Mozilla / Internet Health Report Photo “Karyotype” by Can H. (CC BY-NC 2.0). DNA testing is a booming global business enabled by the internet. Millions of people have … Continue reading 23 Reasons Not to Reveal Your DNA

Operational Security 101 for Activists and Revolutionaries

     by Max Wilbert / Deep Green Resistance Those in power do not hesitate to assault, imprison, torture, and sometimes murder those who fight capitalism, patriarchy, racism, the murder of the planet, and other elements of global empire. In order to do this, they need information. State agencies, private military corporations, investigators, and far-right … Continue reading Operational Security 101 for Activists and Revolutionaries

Jacques Ellul: A Prophet for Our Tech-Saturated Times

     by Andrew Nikiforuk / Local Futures By now you have probably read about the so-called “tech backlash.” Facebook and other social media have undermined what’s left of the illusion of democracy, while smartphones damage young brains and erode the nature of discourse in the family. Meanwhile computers and other gadgets have diminished our attention … Continue reading Jacques Ellul: A Prophet for Our Tech-Saturated Times

Activist Guide to Security: Defeating Geolocation and Tracking

     by Max Wilbert / Deep Green Resistance We live in a surveillance state. As the Edward Snowden leaks and subsequent reporting has shown, government and private military corporations regularly target political dissidents for intelligence gathering. This information is used to undermine social movements, foment internecine conflict, discover weaknesses, and to get individuals thrown in jail … Continue reading Activist Guide to Security: Defeating Geolocation and Tracking

Guide to Private and Secure Operating Systems

     by Max Wilbert / Deep Green Resistance We live inside an unprecedented surveillance state. Government and corporations monitor all non-encrypted digital communications for the purposes of political control and profit. Political dissidents who wish to challenge capitalism need to learn to use more secure methods for communication, research, and other digital tasks. This … Continue reading Guide to Private and Secure Operating Systems

Technology and Its Discontents

Featured image: JD Lasica, Flickr, c.c. 2.0      by Steven Gorelick / Local Futures Tucked within the pages of the January issue of the Agriview, a monthly farm publication published by the State of Vermont, was a short survey from the Department of Public Service (DPS). Described as an aid to the Department in drafting … Continue reading Technology and Its Discontents

Bitcoin = Death Processors

     by Darin Stevenson / Medium bitcoin Is Makeworky Unmoney bitcoin is not exactly money. It’s a potentially valuable abstraction of computational ‘work’ that ‘earns’ bitcoin value. But what is bitcoin value and what is the nature of the work? The answers are bizarre because they are nonsensical. bitcoin value is an abstraction of participation in … Continue reading Bitcoin = Death Processors

Underground Action Calendar refreshed

Our Underground Action Calendar lists attacks from as far back as the 1970s, to inspire and serve as a research tool. We include a variety of actions from around the world, some carried out by individuals, some by organized militant groups. Targets range from local earth-destroying construction equipment to networks of oil wells and pipelines. … Continue reading Underground Action Calendar refreshed

Vulnerability of infrastructure to cyber attacks

In November, Admiral Michael Rogers spoke to the House Select Intelligence Committee on Cybersecurity. Rogers, the National Security Agency (NSA) Director & U.S. Cyber Command Commander, spoke on the vulnerability of U.S. infrastructure to cyberattacks due to the proliferation of network technologies which are relied upon for that infrastructure’s functioning. Sectors of the economy vulnerable … Continue reading Vulnerability of infrastructure to cyber attacks

Immigrant X Data Entry

A group called ‘Immigrant X’ infiltrated and sabotaged an immigration database, falsifying information about hundreds of undocumented immigrants:   IMMIGRANT X DATA ENTRY Original post by ImmigrantX on Friday, August 9, 2013, Immigrant In the last month we managed to get a way into the hotlines of the immigration department where the public can inform on an … Continue reading Immigrant X Data Entry