CIA spies on Senate. Here’s how to take back your digital privacy [FREE]

August 15, 2014
Spoleto, Italy

Back in March serious allegations came out of the Senate that the CIA was monitoring and even hacking Senate computers. They were denied vehemently at the time by CIA director John Brennan, who went so far as to say “that’s just beyond the scope of reason.”

Unsurprisingly, of course, the CIA has now come out saying that, yes, they did in fact spy on Senate aides’ computers. Oh,[...] Click here to continue reading

Do you want financial privacy? Do this.

August 14, 2014
Spoleto, Italy

Remember in the first Bourne movie when Jason wakes up after being rescued from the Mediterranean Sea?

Suffering from amnesia he doesn’t remember who he is, or what had happened to him. The only clue he has is a tiny surgically implanted projector that displays a safe deposit box number for a bank in Zürich.

For a very long time Switzerland was the hallmark of privacy, especially[...] Click here to continue reading

Five tools to protect your privacy online

We’ve discussed many times before—hardly a month goes by without some major action against Internet users… from Obama’s ‘kill switch’, to ACTA, SOPA and PIPA, to stasi tactics against people like Kim Dotcom.

Online privacy is becoming more important by the day. And nobody is going to give it to you, you have to take steps yourself to secure it.

Below are five different tools and services that will get you started:

[...] Click here to continue reading

Go to this city if you want to disappear

January 18, 2010

Tangier, Morocco

If you're on the run and looking for a place to lay low, one city you should consider is Tangier.

You have to start with a bit of history-- as far back as the days of the Phoenicians and Carthaginians, Tangier was an important commercial center due to its location at the entrance of the Mediterranean.

For the next 2,000 years, the city was conquered by[...] Click here to continue reading

Multiple Flags Overview

Reporting from: Malaga, Spain

I do not have tremendous faith in world 'leaders' (as ridiculous a moniker as that is to use); last month's debacle in Copenhagen only further underscored how perverse and ineffective the existing political process is, and everyone is really starting to see it.

The Social Contract is deteriorating rapidly, and in the end, the one thing that you can count on is that people will ultimately do what they[...] Click here to continue reading

Planting your electronic flag

We all know that Google is in bed with the government... I suppose it's nice that CEO Eric Schmidt is at least open about it.

In a recent interview with CNBC, Schmidt effectively admits that Google archives everything about a user-- web searches (google), email and contact lists (gmail), online office documents (google docs), photographs (picasa), text and voice messages (google voice), and even a user's current location (google maps).

The depth of[...] Click here to continue reading

How to send secure email

Sending an unsecured email is like shouting something across a crowded room... if you expect the information to be kept private that is probably one of the worst methods available. You might as well rent a billboard so everyone can see.

The problem with the internet is that there are so many touch points. Email traffic is routed across a hierarchy of networks, and between the sender, the receiver, the various email hosts, internet[...] Click here to continue reading

Spying on your phone and email


It was with great irony and despicable deceit that UK Prime Minister Gordon Brown was commemorating the fall of communism in Berlin on Monday.  In his remarks, he insisted that the tide of history was moving towards our "best hopes," and praised the people who helped end tyranny and bring down the wall.

Too bad it was all poppycock.

Simultaneously, Brown's government back in London was announcing its plans for[...] Click here to continue reading

How to have an anonymous phone conversation

Do you think your government doesn't have the means to listen to your phone calls?

Think again.

Governments from around the world, not just exclusive to North America, have technologically advanced eavesdropping programs which can capture mobile phone conversations without anyone ever knowing.  And just in case the government isn't so technologically advanced, they coerce wireless carriers into coughing up encryption schemes (cough, cough, Russia)...

Unless you have your own two-way encryption[...] Click here to continue reading

Why you need an offshore email account

Last month, a Wyoming bank employee was routinely emailing some loan documents to a customer's personal Gmail account. It sounds like a simple enough task, yet somehow the employee made an enormous error.

Not only did he erroneously attach a file to the email that included the names, addresses, tax IDs, and loan information for 1,325 customers, but he sent it to the wrong Gmail address!

We've all been there... victims of our[...] Click here to continue reading

A loophole at the border

He was brown.

A few inches shy of 6 feet tall and well-dressed in a tailored suit, my guess was that he was of Lebanese origin given his easy command of French, English, and Arabic... but regardless, he was standing in the US citizen line at the airport immigration checkpoint.

I don't know exactly what was said between the man and the border patrol agent, but the encounter was brief; within 30-seconds he[...] Click here to continue reading