Conspiracy Theory
Most conspiracy theories are completely nuts.
But some are absolutely true.
The trick is determining which are real and which are ridiculous.
Posted At: 12/3/2021 4:39:58 PM
Posted By: Comfortably Anonymous
Viewed: 1313 times
Likes: 0 Dislikes: 0
Many people are concerned about the number of organizations asking for their Social Security Numbers. They worry about invasions of privacy and the oppressive feeling of being treated as just a number. Unfortunately, I can't offer any hope about the dehumanizing effects of identifying you with your numbers. I *can* try to help you keep your Social Security Number from being used as a tool in the invasion of your privacy.Surprisingly, government agencies are reasonably easy to deal with; private organizations are much more troublesome. Federal law restricts the agencies at all levels of government that can demand your number and a fairly complete disclosure is required even if its use is voluntary. There are no comparable Federal laws restricting the uses non-government organizations can make of it, or compelling them to tell you anything about their plans. Some states have recently regulations on collection of SSNs by private entities. With private institutions, your main recourse is refusing to do business with anyone whose terms you don't like.
Short HistorySocial Security numbers were introduced by the Social Security Act of 1935. They were originally intended to be used only by the social security program, and public assurances were given at the time that use would be strictly limited. In 1943 Roosevelt signed Executive Order 9397 which required federal agencies to use the number when creating new record-keeping systems. In 1961 the IRS began to use it as a taxpayer ID number. The Privacy Act of 1974 required authorization for government ...
Posted At: 7/30/2020 5:05:32 PM
Posted By: Comfortably Anonymous
Viewed: 2556 times
Likes: 0 Dislikes: 0
WHEN I WAS working at the CIA, if you had told me that there would soon come a youth rebellion that relied on lasers and traffic cones as sword and shield, and that it would come to paralyze one of the world’s richest and most powerful governments, I would have—at the very least—raised an eyebrow. And yet as I write these words nearly a decade later, this is exactly what's happening in Hong Kong, the city where I met with journalists to reveal the secret that would transform me from an agent of government into one of the world’s most wanted men. As it happened, the very book that you now hold in your hands lay on the desk, the desk of the last hotel room I would ever pay for with a credit card.What I showed those journalists was proof, in the form of the government’s own classified documents, that the self-described “Five Eyes”—the state security organs of the United States, United Kingdom, Australia, New Zealand, and Canada—had together conspired to weaken their laws. They had forced clandestine access to the networks of their largest telecommunications and internet titans (some of whom hadn't needed much in the way of arm-twisting) in pursuit of a single goal: the transformation of the free and fragmented internet into history’s first centralized means of global mass surveillance. This violation of our fundamental privacy occurred without our knowledge or consent, or even the knowledge and consent of our courts and most lawmakers.Read the whole article ...
Posted At: 3/2/2020 9:43:10 PM
Posted By: Comfortably Anonymous
Viewed: 2161 times
Likes: 0 Dislikes: 0
1. COINTELPRO Techniques for dilution, misdirection and control of a internet forum2. Twenty-Five Rules of Disinformation3. Eight Traits of the Disinformationalist4. How to Spot a Spy (Cointelpro Agent)5. Seventeen Techniques for Truth SuppressionCOINTELPRO Techniques for dilution, misdirection and control of a internet forum..There are several techniques for the control and manipulation of a internet forum no matter what, or who is on it. We will go over each technique and demonstrate that only a minimal number of operatives can be used to eventually and effectively gain a control of a 'uncontrolled forum.'Technique #1 - 'FORUM SLIDING'If a very sensitive posting of a critical nature has been posted on a forum - it can be quickly removed from public view by 'forum sliding.' In this technique a number of unrelated posts are quietly prepositioned on the forum and allowed to 'age.' Each of these misdirectional forum postings can then be called upon at will to trigger a 'forum slide.' The second requirement is that several fake accounts exist, which can be called upon, to ensure that this technique is not exposed to the public. To trigger a 'forum slide' and 'flush' the critical post out of public view it is simply a matter of logging into each account both real and fake and then 'replying' to prepositined postings with a simple 1 or 2 line comment. This brings the unrelated postings to the top of the forum list, and the critical posting 'slides' down the front page, and quickly out of ...