Facebook Twiter Goole Plus Linked In YouTube Blogger

Internet Knowledge and Tools - World Wide Web Information


Internet Privacy - Internet Safety - Child Safety - Internet Education - Safe Browsing - Privacy

Data Protection - Internet Scams - Open Internet - Censorship - Consumer Safety

Previous SubjectNext Subject

Learning how to Safely and Effectively use the Internet.
Learning how to Effectively and Efficiently Navigate the Internet
.

Baby in front of A Computer Warning: When visiting other websites be very careful what you click on because some software downloads are very dangerous to your computer, so be absolutely sure what you are downloading. Read the '.exe file name by either mousing over the link and reading the bottom browser bar or by reading the file name in the download box. Even search engines can link directly to websites that have viruses, malicious software, key stroke recorders, parasites, tracking cookies and many other vulnerabilities and threats, so be very aware of the websites you are visiting. And don't click on links in e-mails too, unless you know for sure, because they could also take you to fraudulent and threatening websites. Don't ever click on Links in Social Networks unless you are absolutely positive.

What is the Internet ?


The Internet is a Network of computers that are all over the world that people can use to access information 24 hours a day. A Computer Network consisting of a worldwide network of Servers that use the TCP/IP Network Protocols to facilitate data transmission and exchange. Of course it's a lot more then just that. Simply trying to define what the internet is, is almost impossible. It's the biggest and the most important human advancement ever. Second only to the advancements in computers, and right before that, the advancements in language and the written word, which was our first defining moment. And because of this early Writing System, we learned to communicate much more effectively, and convey a lot more knowledge and information. And now with computers, and the Internet, and the digitizing of language, we are now transmitting more knowledge and information then any other time in our history. So just like when we look back at see how language changed our world, future generations will look back at the internet and see how the internet transformed our world. A world that will be greatly improved. The internet is a lot bigger then you think, literally, figuratively and philosophically. But instead of listing the thousands of benefits that are coming from this internet network, I want to talk briefly about an interesting similarity. It seems that the internet is just a natural process of life. Just like the internet, life wants to branch out and make connections. Similar to the root systems Mycorrhiza found in Mushrooms located in Michigan’s Upper Peninsula. And also like the Quaking Aspen's, or Pando Trees, in Utah and Colorado. But life not only branches out and makes more connections, life also lives Symbiotically, and learns how to adapt. If not, that life form eventually dies, as history has proven. And when that happens, then you become a fossil for future life to look back on and say, "Hey, I wonder what happened to these creatures, they seemed to have had a brain, but I guess they never learned how to use it? I will write more about the internet, but for now, I like analyzing the similarities between life and the internet, it reminds me of the similarities between the human brain and computers. The internet is a human's way of mimicking biology. Human intelligence is advancing faster then any other time in human history, and Artificial Intelligence is just another tool that we have created to enhance our abilities and increase our potential. (The first internet message was sent from UCLA's campus on Oct. 29, 1969).

Hyperlinks link documents and information. Synapses in the human brain are connections between neurons through which "information" flows from one neuron to another. Some hypertext hyperlinks can be bidirectional: they can be followed in two directions, so both ends act as anchors and as targets. More complex arrangements exist, such as many-to-many links.

Anchor Text is the link label, link text, or link title is the visible, clickable text in a hyperlink.

Artificial Neural Network

Neurobiology is the study of cells of the nervous system and the organization of these cells into functional circuits that process information and mediate behavior. It is a subdiscipline of both biology and neuroscience.

DNA

Intranet is a private network accessible only to an organization's staff.

Extranet is a website that allows controlled access to partners, vendors and suppliers or an authorized set of customers – normally to a subset of the information accessible from an organization's intranet. An extranet is similar to a DMZ in that it provides access to needed services for authorised parties, without granting access to an organization's entire network. An extranet is a private network organization. Historically the term was occasionally also used in the sense of two organizations sharing their internal networks over a VPN.

LAN, or Local Area Network, is a computer network that interconnects computers within a limited area such as a residence, school, laboratory, university campus or office building and has its network equipment and interconnects locally managed. By contrast, a wide area network (WAN), not only covers a larger geographic distance, but also generally involves leased telecommunication circuits or Internet links.

The Wood Wide Web, are Plants Inter-Connected by a Subterranean Fungal Network?

Mycorrhizal Network are underground hyphal networks created by mycorrhizal fungi that connect individual plants together and transfer water, carbon, nitrogen, and other nutrients and minerals. The formation of these networks is context dependent, and can be influenced by soil fertility, resource availability, host or myco-symbiont genotype, disturbance and seasonal variation.

Humongous Fungus

Clonal Colony is a group of genetically identical individuals, such as plants, fungi, or bacteria, that have grown in a given location, all originating vegetatively, not sexually, from a single ancestor. In plants, an individual in such a population is referred to as a ramet.

Rhizoid are protuberances that extend from the lower epidermal cells of bryophytes and algae. They are similar in structure and function to the root hairs of vascular land plants. Similar structures are formed by some fungi. Rhizoids may be unicellular or multicellular. Roots are multicellular organs composed of multiple tissues that collectively carry out a common function.

Matrix

Populus Tremuloides often propagates through its roots to form large groves originating from a shared system of rhizomes.

The Internet is Human Intelligence in Action
Internet Infrastructure

"How could we become so connected and yet be so disconnected at the same time?"

Social Networks
Search Engines
Internet Searching Tips
Human Search Engine
Language Translations

The main reason why most people don't use the internet is because most people do not understand the value, the importance or the potential that the internet offers. So when the other 3/4's of the worlds population does get access, they should know better on how to use the internet, as well as know why, when and where to access the internet. 

Los Alguiens - El Internet (ORIGINAL VERSION) (Internet Song on youtube)
Lyrics Translated: If you want to download a song, download it from internet,  If you want a girlfriend, look for her in internet.
You want to host a party, host it on internet,   If you want to read the news, do it on internet, The internet, the internet, the internet, the internet,  the internet, the internet, the internet, the internet.

4 Billion People Still Don't Have Internet Access in 2016, and most of the 3 billion who do have Internet Access, are not using the internet effectively or efficiently. Just having access does not say anything. 60 percent of the world isn’t online. There is more mobile phone coverage.

List of Countries by Number of Internet Users
Internet Use Demographics (PDF)
How Many Computers?

44% of offline adults have asked a friend or family member to look something up or complete a task on the internet for them.
50 million people in America don't log on.  Laptops for Senior Citizens

Pew Internet
Internet Society
Project Link


World Internet Usage

Reasons why some people don't use the internet

F the Internet (youtube) Funny video about this women's idea what the internet is.


What people are Searching for on the Internet?


Of course people will never know the true details of what search engines know about what people are looking for on the internet. Or will people know what information Google is selling, or know who is buying this information, or know what certain people plan to do with that information?  So what do our internet searches say about us? What does your Search History say about you? What does your Browser History say about you?

Google will display their pretty trends, but they will not share the most important information. So people will only see the stupid stuff that people search for on Google. The amount of Things that happen in one day are enormous.

2001 Top Internet Queries
1. Nostradamus   2. CNN  3. World Trade Center  4. Harry Potter  5. Anthrax  6. Windows XP  7. Osama Bin Laden 
8. Audiogalaxy  9. Taliban  10. Loft Story  11. Afghanistan  12. Nimba  13. American Airlines  14. American Flag
15. Aaliyah  16. FBI  17. Kazaa  18. Lord of the Rings  19. Jennifer Lopez  20. Xbox

The 2013 list of top-trending searches (global) included Nelson Mandela, Paul Walker, iPhone 5s, Cory Monteith,
Harlem Shake, Boston Marathon, Royal Baby, Samsung Galaxy s4, PlayStation 4 and North Korea.

Most searched beauty question: How to get rid of acne
Most searched dog question: Why do dogs eat grass?
Top-trending memes search: Tim Howard memes
Top-trending natural events search: Hurricane Arthur
Most searched places on Google maps: Wal-Mart
Top-trending podcast search: Serial
Top-trending book search: Boy, Snow, Bird

Top Internet Searches from each State in America

Top internet searches are most related to what's happening in the media, and since the media is mostly irrelevant, that means people are not learning as much as they should be from the internet, which is extremely alarming. There is nothing more damaging to a person then the belief that they are learning enough in order to be accurately aware of themselves and the world around them. This is what is happening in our education system, as well as the media, and now the internet. And this false sense of learning enough, is demonstrated throughout the world in the form of violence, wars, crimes and mental disorders. So your biggest mass murderers are not just the people who control the media, your largest mass murders are the people who control education and what is being taught in schools. But try to explain that to people is almost impossible, considering the amount of damage that has been afflicted on them from our media outlets and from our schools. You can't speak or understand a language that you never heard of. And this language is called intelligence, where knowledge and information is clearly understood. Teach the language of intelligence and you will eventually solve every problem in the world.

Google indexes no more than 16 percent of the surface Web and misses all of the Deep Web. Any given search turns up just 0.03 percent of the information that exists online (one in 3,000 pages)  Much of the Deep Web’s unindexed material lies in mundane data­bases such as LexisNexis or the rolls of the U.S. Patent Office.

Wikipedia Statistics

"The internet connects more then just computers, the internet connects minds. And when people finally do understand this ability, the saying "the word travels fast" will be an understatement."

Internet of Things
Web at 25 

"Most people don't understand the internet, they don't realize the potential of the internet, or what it means to be connected to the worlds most valuable knowledge and information."

"The world is moving so fast these days that the man who says it can't be done is generally interrupted by someone doing it."

Disclaimer


Basic Knowledge 101.com does not share our users personal information. But that does not mean that your personal information is secure because we cannot control other websites privacy policies and what they do with your personal information. So we encourage our members and site visitors to be aware of the privacy policies of the other websites that we link too. When a new browser window opens we encourage our users to be aware of the privacy statements of each website that collects personally identifiable information. Please be aware that Basic Knowledge 101.com can not be responsible for Links that no longer point to the original site on which it was intended because the Domain name, or ULR, was sold or high jacked by the people where the domain name was registered. We apologize and will remove the link as soon as we are notified. If a site we link to is found to be fraudulent in any way we will remove it and no longer link to that website. If a website that we link to does not want us to link to them we will remove it and no longer link to that site. 

Personal Information - Confidentiality

I do not indorse every opinion or every action that other people do. Nor do I indorse every opinion or every action that I do because I make mistakes. I like to confirm the accuracy of opinions and actions through the process of Intelligent consensuses. But even then, that will still not guarantee that you wont learn anything new, which would ultimately change your opinion, or change your action.

I do not agree with everything that is portrayed in Documentaries, Movies, TV Shows or any other Media Outlets. I assimilate the most logical parts of information and put them together to form an understanding. Then I write down my understandings so that I can share this information with others. Every person must learn how to recognize what information is accurate and valuable. So what is your procedure for filtering and assimilating information? 
Media Literacy

Disclaimer is a statement intended to specify or delimit the scope of rights and obligations that may be exercised and enforced by parties in a legally recognized relationship. In contrast to other terms for legally operative language, the term disclaimer usually implies situations that involve some level of uncertainty, waiver, or risk.

Do you have to make a disclosure even when you're not misleading anyone? Almost all information can be misinterpreted. But if you intentionally present information that can be misinterpreted, then that's propaganda, those are when disclosures are absolutely necessary. But you never see disclosures in the news, on TV, in books or in the movies. Even if you do see disclosures they too can be misleading, so the disclosure needs a disclosure. And you wonder why learning Information Literacy and Media Literacy are extremely important.

Disclosure is the act of making something evident, to make visible. To make known to the public information that can be misinterpreted. To make vulnerabilities known.

Full Disclosure is the acknowledgement of possible conflicts of interest in one's work.

Computer Security Full Disclosure are flaws in software that can be abused to cause unintended behaviour, these flaws are called vulnerabilities.

Terms of Service are rules by which one must agree to abide in order to use a service. Terms of service can also be merely a disclaimer, especially regarding the use of websites.

Release Form is a legal instrument that acts to terminate any legal liability between the releasor and the releasee(s), signed by the releasor.

Confidentiality Agreement or Non-disclosure agreement, is a legal contract between at least two parties that outlines confidential material, knowledge, or information that the parties wish to share with one another for certain purposes, but wish to restrict access to or by third parties. It is a contract through which the parties agree not to disclose information covered by the agreement. An NDA creates a confidential relationship between the parties to protect any type of confidential and proprietary information or trade secrets. As such, an NDA protects non-public business information.

End-User License Agreement is the contract between the licensor and purchaser, establishing the purchaser's right to use the
software. The license may define ways under which the copy can be used, in addition to the automatic rights of the buyer including the first sale doctrine and 17 U.S.C. § 117 (freedom to use, archive, re-sale, and backup). Many form contracts are only contained in digital form, and only presented to a user as a click-through where the user must "accept". As the user may not see the agreement until after he or she has already purchased the software, these documents may be contracts of adhesion. Software companies often make special agreements with large businesses and government entities that include support contracts and specially drafted warranties.

Contracts (law)

Fair Use

BK101 contains copyrighted material the use of which has not always been specifically authorized by the copyright owner. We are making such material available in our efforts to advance understanding of issues of humanitarian significance. We believe this constitutes a 'fair use' of any such copyrighted material as provided for in section 107 of the US Copyright Law. In accordance with Title 17 U.S.C. Section 107, the material on this site is distributed without profit to those who have expressed a prior interest in receiving the included information for research and educational purposes. If you wish to use copyrighted material from this site for purposes of your own that go beyond 'fair use', you must obtain permission from the copyright owner.

Humanitarian is marked by humanistic values and devotion to human welfare. Someone devoted to the promotion of human welfare and to social reforms. An advocate of the principles of humanism; someone concerned with the interests and welfare of humans.

Social Service - Humanism

Welfare
is something that aids or promotes well-being. A satisfied state of being happy and healthy and prosperous.



Keeping Kids Safe on The Internet


Internet Safety is the knowledge of maximizing the user's personal safety and security risks to private information and property associated with using the internet, and the self-protection from computer crime in general.

Stay Safe Online.org
On Guard Online.gov
Safe Browsing
Enough
Internet Safety 101
Online Family Norton
Safe Kids.com
Safe Kids.org
Safety Clicks
Google Safety Tips
Safe Eyes
Kidoz Kid Safe Internet Browser
Internet Filters for Safe Browsing
Connect Safely.org
Wired Safety.org

The World Wide Web is one of the greatest tools ever invented and literally the biggest library in the world. But the Internet is not a safe and secure place so be aware of the dangers and take some time to educate yourself on How to be Safer on the Internet. Whatever your age your personal information can be exploited and used against you, so be careful.

There is a strong privacy law that protects your cable viewing habits, but there is no such law that protects records of what you buy online or is there a law that protects information that is collected by other services such as social networks or advertising networks.

FCC rules offer protections against your mobile phone company selling the location data it has on you from tracking your cell phone all over town and beyond, but at the same time you are not protected under these same rules given by the USA Patriot Act.

Bullying

101 East : Web of Hate (youtube)

Cyber-Bullying is a form of bullying or harassment using electronic forms of contact.

Stop Bullying

Troll is a person who sows discord on the Internet by starting arguments or upsetting people, by posting inflammatory, extraneous, or off-topic messages in an online community (such as a newsgroup, forum, chat room, or blog) with the intent of provoking readers into an emotional response or of otherwise disrupting normal, on-topic discussion, often for the troll's amusement. Patent Troll

Trolling is what the Media does sometimes  

App:
Stop it Cyber Bully

Crime Help (bullies)

Stalking Amanda Todd : The Man in the Shadows (youtube)
The Fifth Estate (youtube 40:52)

Sextortion

Internet Searching Tips
PC Problem Solving
Technology is Just Another Tool
Information Sources
What did I Learn from the Internet
Human Search Engine
Online Education
Family Relationships
Censorship
Media Literacy
Child Development
Bad TV

The Greatest Tool for Internet Safety will always be Knowledge.
Spying on your child is not recommended. Only when all other methods of Communication have failed, and only if you believe that your child may be in danger, should you even try to attempt to violate your child's privacy, because you could easily make the situation worse. All parents need to continually educate themselves and keep up with today's information and knowledge.
And let your child know that you are both responsible for each others actions. 

You don't Know Everything
Relationships

Is Social Network Monitoring just another word for Spying?   If you want to know a person you have to talk to that person and have an open and honest conversation with them. Just listening in on someone's conversations, or watching them from a distance, and then judging them, or exploiting that information, without the decency of a fair and open trial, that is not just insane and insultingly ignorant, it is very dangerous. The damage that could come from these types of errors could be catastrophic. Spying is not a productive process for learning, it is flawed and vulnerable. You create more problems then you solve.

Censorship

Make sure all computers are well-positioned so they cannot be pulled over by inquisitive children. Also make sure that cables are dressed and secured properly to avoid being tripped on. 

Social Network Scams and Vulnerabilities
Social Network Knowledge
Social Network Safety
Chat Room Dangers
Social Media Etiquette
Morals
Internet Addiction
Kids Growing up Online (PBS)  DVD

Assange talks about Facebook, called Facebook the "most appalling spying machine that has ever been invented."
Face Book is the world's most comprehensive database about people, their relationships, their names, their addresses,
their locations, their communications with each other, their relatives, all sitting within the United States,
all accessible to U.S. intelligence.

Facebook & the CIA
More about Social Networks
Internet Security Alliance

Dunbar Number is a suggested cognitive limit to the number of people with whom one can maintain stable social relationships. These are relationships in which an individual knows who each person is and how each person relates to every other person.


Internet Education


Get Net Wise
Seniors Guide to using Computers and Software
Child Technology Education
Technology Addiction
Tek Mom
Inter Lingo, Acronyms, Jargon and Text Message Shorthand
Internet 101
Internet Basic Knowledge
Internet History begins with the development of electronic computers in the 1950s.
Advanced Research Projects Agency Network (ARPANET)
Net Smartz
Computer Definitions
Printout Definitions
Computer Knowledge


Fraud - Scams


Fraud, Fake, Scam, Rip-Off Fraud is deliberate deception to secure unfair or unlawful gain, or to deprive a victim of a legal right. Fraud itself can be a civil wrong.

Ponzi Scheme - Confidence Trick
 
FBI Scam Alerts - Watch out for bogus IRS agents, fake offers from tech support, and faux beaus or fake friends.

Phone Scams

Scam Busters
Victims of Fraud Help

Fight Fraud - Fraud is a multi-billion dollar criminal industry, costing Americans more than the combined annual spending of many countries around the world.

How to Report Fraud - Whistle Blowers
FBI Crime Reporting
Department of Justice
Crime Help Websites
Internet Crime Complaint Center
Federal Trade Commission click on Consumer Protection
Fight Fraud in Connecticut
Report Spam and unsolicited e-mails
Contact your States Attorney General

Travel Scams & Fraudulent Travel Deals
Vacation Rentals Scams and Complaints

Corporate Crimes

Computer Crime is crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target.

Internet Security Alliance

Information Protection Tools
Privacy Rights

Misappropriation is the unauthorized use of another's name, likeness, or identity without that person's permission, resulting in harm to that person.

Remember that the internet is not the only place where you can be scammed and have your identity stolen. Be cautious of suspicious phone calls, suspicious letters in the US mail and suspicious e-mails.

CAN-SPAM Act: A Compliance Guide for Business
CAN-SPAM Act of 2003 (wiki)

"The first principle is that you must not fool yourself -- and you are the easiest person to fool." (Richard Feynman)

Government Accountability


Consumer Protection


Consumer Product Safetyconsumer protection word cloud
Product Consumer Safety
Consumer Action
Dangerous Goods are solids, liquids, or gases that can harm people, other living organisms, property, or the environment.
Drug Warnings
Trigger Warnings
Consumer Complaint Form for Ct. (PDF)
Consumer Complaints
Top 10 Consumer Complaints for 2014
Consumer Protection
Consumer Safety
Safer Products

Comparitech research's, tests, reviews and compares consumer tech products and services so you can make a more informed decision before you buy. Technology News

National Consumers League
Safer Chemicals
Green Science Policy
Consumer Info
Consumer Lab

Consumer Protection is a group of laws and organizations designed to ensure the rights of consumers, as well as fair trade, competition, and accurate information in the marketplace.

Consumer Dangers
Public Interest Research Groups

Lead, if ingested or inhaled, its compounds are poisonous to animals and humans. Lead is a neurotoxin that accumulates both in soft tissues and the bones, damaging the nervous system and causing brain disorders. Excessive lead also causes blood disorders in mammals. Lead poisoning has been documented since ancient Rome, ancient Greece, and ancient China.

Phthalate are used in a wide range of common products, and are released into the environment. high doses have been shown to change hormone levels and cause birth defects.

Toxins

Perfectly Safe
One Step Ahead
Recalls
National Institute of Environmental Health Sciences
American Chemistry
Consumer Info
E Opinions
Educational Toys and Games that Teach
Green Products
Physical Health News
Mental Health News
Lawyers, Court Information and Legal Help
National Association of Consumer Advocates 
Government Agencies

Nearly 700 Children Have Perished In Hot Cars Since 1998.

According to The Internet Crime Complaint Center victims of Internet-related crimes lost $559 million in 2009, which is more because not all crimes are reported. The mission of most Social Networks like Facebook, is to get you to share as much information as possible so it can be shared with advertisers. Playing some of those free online games is one way to get people to share information. A few times a year Facebook puts your privacy settings back to a default setting, which essentially makes all of your information to be made public. And on top of that, your security is only as good as your friend's security. So if your friend is hacked you are at risk. Plus 40 percent of all Facebook profiles are fake, so please know your friends. Facebook has not been able to screen all of its ads either. Some ads have Malicious Code Embedded in them. And be absolutely sure what you are downloading because some antivirus software is actually a virus. Facebook reported that hackers using stolen username and password credentials try to break into at least 600,000 accounts every day.

More Tech News



Protecting the Internet Information Highway


Internet Connects the World Save the Internet

Go FCC Yourself.com - Keep Title II Net Neutrality Rules Strong. Protect Net Neutrality. No censorship and no deliberate slowing down of Data. Speed and accuracy is extremely important. (click on express).

Net Competition
Internet Innovation
Center for Democracy and Technology
Internet Freedom
Info War Monitor
Open Net
Hacker - Hakerspaces
Can You Hack It? (video)

Freedom Tower
Free Network Foundation
Ad Busters
Scan Eye
Outernet
Lantern

Free the TV White Space
Free the Airwaves (youtube) Video
Free the Airwaves
FCC White Space Rules
White Space

Free-space Optical Communication is an optical communication technology that uses light propagating in free space to wirelessly transmit data for telecommunications or computer networking. "Free space" means air, outer space, vacuum, or something similar. This contrasts with using solids such as optical fiber cable or an optical transmission line. The technology is useful where the physical connections are impractical due to high costs or other considerations. Li-Fi

FSO uses visible or infrared light to wirelessly transmit data through open air as opposed to using cables.

Improving Internet with Mid-Wavelength Infrared

High-Speed, Affordable, and Accessible Broadband

LTE (telecommunication) is a standard for high-speed wireless communication for mobile phones and data terminals. It is based on the GSM/EDGE and UMTS/HSPA network technologies, increasing the capacity and speed using a different radio interface together with core network improvements.

Affordable High-Speed Broadband for All Americans (youtube)
Lifeline Program for Low-Income Consumers (affordable internet access)
Google Fiber Connecting Public Housing at Gigabit Speeds
Connect Home
List of Countries by Internet Connection Speeds (wiki)
How to Connect to the internet when access is Limited

Mesh Networking is a network topology in which each node relays data for the network. All mesh nodes cooperate in the distribution of data in the network.

Wireless Mesh Network (WMN) is a communications network made up of radio nodes organized in a mesh topology. It is also a form of wireless ad hoc network. Wireless mesh networks often consist of mesh clients, mesh routers and gateways. The mesh clients are often laptops, cell phones and other wireless devices while the mesh routers forward traffic to and from the gateways which may, but need not, be connected to the Internet. The coverage area of the radio nodes working as a single network is sometimes called a mesh cloud. Access to this mesh cloud is dependent on the radio nodes working in harmony with each other to create a radio network. A mesh network is reliable and offers redundancy. When one node can no longer operate, the rest of the nodes can still communicate with each other, directly or through one or more intermediate nodes. Wireless mesh networks can self form and self heal. Wireless mesh networks can be implemented with various wireless technologies including 802.11, 802.15, 802.16, cellular technologies and need not be restricted to any one technology or protocol.

Channel Bonding is a computer networking arrangement in which two or more network interfaces on a host computer are combined for redundancy or increased throughput. Channel bonding is differentiated from load balancing in that load balancing divides traffic between network interfaces on per network socket (OSI model layer 4) basis, while channel bonding implies a division of traffic between physical interfaces at a lower level, either per packet (OSI model Layer 3) or a data link (OSI model Layer 2) basis.

OSI Model Open Systems Interconnection Model is when a layer serves the layer above it and is served by the layer below it.
For example, a layer that provides error-free communications across a network provides the path needed by applications above it, while it calls the next lower layer to send and receive packets that comprise the contents of that path. Two instances at the same layer are visualized as connected by a horizontal connection in that layer.

Load Balancing (computing) improves the distribution of workloads across multiple computing resources, such as computers, a computer cluster, network links, central processing units, or disk drives. Load balancing aims to optimize resource use, maximize throughput, minimize response time, and avoid overload of any single resource. Using multiple components with load balancing instead of a single component may increase reliability and availability through redundancy. Load balancing usually involves dedicated software or hardware, such as a multilayer switch or a Domain Name System server process. Load balancing differs from channel bonding in that load balancing divides traffic between network interfaces on a network socket (OSI model layer 4) basis, while channel bonding implies a division of traffic between physical interfaces at a lower level, either per packet (OSI model Layer 3) or on a data link (OSI model Layer 2) basis with a protocol like shortest path bridging.

Connection Types

H.R. 2454: Aaron’s Law Act of 2013
Was Aaron Swartz Murdered?
Guerilla Open Access Manifesto
Activism
UK Parliament calls for internet to be classified as a Public Utility
Vodafone Communications

Named Data Networking: Instead of numbers, use names. Focus not on the locations of things, but on the things themselves by retrieving information from the nearest computer that has it, rather than wait to get it from a heavily-trafficked centralized servers.

From a Point to Point system to a Peer to Peer system. 

Internet Access Rights


Right to Internet Access states that all people must be able to access the Internet in order to exercise and enjoy their rights to Freedom of expression and opinion and other fundamental human rights, that states have a responsibility to ensure that Internet access is broadly available, and that states may not unreasonably restrict an individual's access to the Internet. Internet Access is a Human RightMedia Literacy
Stop Online Piracy Act (wiki)
SOPA Info (youtube)
Net Coalition (twitter)
PIPA - Protect IP Act (wiki)
Support a  Free and Open Internet
ITU - International Telecommunication Union - Film
Protect IP Act (youtube)
Controlling the Web (youtube)
Internet Society
Protect Internet Freedom

Center for Democracy & Technology global online civil liberties and human rights, driving policy outcomes that keep the internet open, innovative, and free.

Fight for the Future
F2C2012: Aaron Swartz keynote - "How we stopped SOPA" (youtube)
Pirate Bay (youtube)

Petitioning (start a petition or sign a petition)

How Iran Censors Internet
A2K Network
Why Sopa is a Bad Idea (video)

Firewall is a network security system that monitors and controls the incoming and outgoing network traffic based on predetermined security rules. A firewall typically establishes a barrier between a trusted, secure internal network and another outside network, such as the Internet, that is assumed not to be secure or trusted.

Proxy Server is a server (a computer system or an application) that acts as an intermediary for requests from clients seeking resources from other servers. A client connects to the proxy server, requesting some service, such as a file, connection, web page, or other resource available from a different server and the proxy server evaluates the request as a way to simplify and control its complexity. Proxies were invented to add structure and encapsulation to distributed systems. Today, most proxies are web proxies, facilitating access to content on the World Wide Web and providing anonymity.

Virtual Private Network

DNS Blocking is not the same as Domain Name Filtering used by Internet Browsers for Kids. Censoring Links.

Web Content Control Software or Web Filtering Software just another form of Censorship?

Copyright Information

From July to December 2012, Google Received 2,285 Government Requests to remove 24,179 pieces of content, which is an increase from the 1,811 requests to remove 18,070 pieces of content that we received during the first half of 2012.

United States Computer Emergency Readiness Team

Internet Engineering Task Force

Web Engineering focuses on the methodologies, techniques, and tools that are the foundation of Web application development and which support their design, development, evolution, and evaluation. Web application development has certain characteristics that make it different from traditional software, information system, or computer application development.

Media Literacy - Information Literacy

Internet Infrastructure

Denial-of-Service Attack (wiki)

Internet System Consortium

Bandwidth (signal processing photonics)
Internet Declaration
Kopimism (Missionary Church)
Chaos Communication Congress (wiki)

IT industry consumes between three and five percent of the world’s energy budget. The cost of powering the Internet, which is 1.5% of global electricity, is 8.5 billion dollars annually and is growing at an incredible rate. There are 2.4 billion internet users today, which means more backbone bandwidth, more content, more data centers, more applications, more computers.


Internet Connection Types


Super Wi-fiInternet Connection Types
Super Wi-Fi (wiki) using the unused broadcast spectrum. WiMAX (wiki)

LVX System
IPv6 (wiki)
Radiation (electromagnetic)

White Space (alternate transmission space)

Federal Communications Commission (FCC)

Universal Service Fund (wiki)

A Human Right
Public Knowledge 
Internet.org
Internet Modem Battery Backup (brck)
Ushahidi
Open Garden
Broadband Across America

Internet Access is the process that enables individuals and organisations to connect to the Internet using computer terminals, computers, mobile devices, sometimes via computer networks. Once connected to the Internet, users can access Internet services, such as email and the World Wide Web. Internet service providers (ISPs) offer Internet access through various technologies that offer a wide range of data signaling rates (speeds).

Satellite Internet Access is Internet access provided through communications satellites. Modern consumer grade satellite Internet service is typically provided to individual users through geostationary satellites that can offer relatively high data speeds, with newer satellites using Ka band to achieve downstream data speeds up to 50 Mbps.
ViaSat-1

High-Altitude Platform is a station on an object at an altitude of 20 to 50 km and at a specified, nominal, fixed point relative to the Earth.
Google Loon
Universal Service Administrative Company

Fiber-Optic Communication is a method of transmitting information from one place to another by sending pulses of light through an optical fiber. The light forms an electromagnetic carrier wave that is modulated to carry information. Fiber is preferred over electrical cabling when high bandwidth, long distance, or immunity to electromagnetic interference are required.
Optical Fiber Cable - Li-Fi

Passive Optical Network is a telecommunications technology that implements a point-to-multipoint architecture, in which unpowered fiber optic splitters are used to enable a single optical fiber to serve multiple end-points such as customers, without having to provision individual fibers between the hub and customer.

Spectrum Access

NG-PON2 adding new colors of light onto the existing fiber.

In 2015, 2.1 Million People Still Use AOL Dial-Up.
Phone Network
Home Plug

Your Karma WiFi
Hotspot Wi-Fi
ZeusPro - Wireless Network Solution Universal non-Electrical Wi-Fi Amplifier. WiFi signal Anywhere.
Fingbox - Network Security & Wi-Fi Troubleshooting.

Beartooth is a handheld device that works with your smartphone to keep you connected when there is no cell service. Your phone connects to your Beartooth using Bluetooth, and your Beartooth connects to other Beartooth devices up to 10 miles away over the 900 MHz ISM band.

Freedom of Speech - First Amendment
Government Websites
About Information Sources
Broadband Subscribership

Information Protection
Is a Website Down or is My Connection a Problem?


Internet Infrastructure


World Network Map of the Internet Infrastructure Connections and Internet Hubs
Internet Topology Map

Internet Backbone are the principal data routes between large, strategically interconnected computer networks and core routers on the Internet.

Backbone Network is a part of computer network that interconnects various pieces of network, providing a path for the exchange of information between different LANs or subnetworks. A backbone can tie together diverse networks in the same building, in different buildings in a campus environment, or over wide areas. Normally, the backbone's capacity is greater than the networks connected to it.

Network Access Point was a public network exchange facility where Internet service providers (ISPs) connected with one another in peering arrangements.

Core Router is a router designed to operate in the Internet backbone, or core. To fulfill this role, a router must be able to support multiple telecommunications interfaces of the highest speed in use in the core Internet and must be able to forward IP packets at full speed on all of them. It must also support the routing protocols being used in the core. A core router is distinct from an edge router: edge routers sit at the edge of a backbone network and connect to core routers.

Core Network is the central part of a telecommunications network that provides various services to customers who are connected by the access network. One of the main functions is to route telephone calls across the PSTN.
Coding
Networks

Submarine Cable Map

Submarine Communications Cable is a cable laid on the sea bed between land-based stations to carry telecommunication signals across stretches of ocean. The first submarine communications cables, laid in the 1850s, carried telegraphy traffic. Subsequent generations of cables carried telephone traffic, then data communications traffic. Modern cables use optical fiber technology to carry digital data, which includes telephone, Internet and private data traffic.

International Cable Protection Committee
Telegeography

How the Internet works: Submarine fibre, brains in jars, and coaxial cables

Internet Connection Speed Testing
Broadband Speed Test
Test My Internet Connection Speed
DSL Reports
Page Loading Speed Test
Webpage Test
Website Speed Test by Country


Rights To Information - Personal Information


Note: Peoples access to information and knowledge is incredibly important. The Freedom of Information Act is under constant attack and our Right to Information is being denied, and even worse, it's also being Manipulated and Censored. With the Internet being filtered and manipulated means that our information is in jeopardy. You have to be diligent and prolific if you want to stay informed and educated about the truth.

Transparency
Education Reform
Government Accountability 

Freedom of Information Act (United States) is a federal freedom of information law that allows for the full or partial disclosure of previously unreleased information and documents controlled by the United States government. The Act defines agency records subject to disclosure, outlines mandatory disclosure procedures and grants nine exemptions to the statute.

Education is also a Human Right, because it's the right thing to do, it's just common sense.

Freedom of Information Laws by Country (wiki)
National Freedom of Information CoalitionRight to Information
European Digital Rights
Data Protection Facts
Privacy Blog
Media Literacy

Public Records are documents or pieces of information that are not considered confidential and generally pertain to the conduct of government. Information includes Records of law court proceedings. Records of births, marriages, and deaths. Records of land ownership. Statistics regarding population and the economic activity of a country, to name a few.

Knowledge Management

Proprietary information Agreement also known as a confidentiality agreement (CA), confidential disclosure agreement (CDA), proprietary information agreement (PIA), or secrecy agreement (SA), is a legal contract between at least two parties that outlines confidential material, knowledge, or information that the parties wish to share with one another for certain purposes, but wish to restrict access to or by third parties. It is a contract through which the parties agree not to disclose information covered by the agreement. An NDA creates a confidential relationship between the parties to protect any type of confidential and proprietary information or trade secrets. As such, an NDA protects non-public business information.

Sensitive Information is the control of access to information or knowledge that might result in loss of an advantage or level of security if disclosed to others. Loss, misuse, modification, or unauthorized access to sensitive information can adversely affect the privacy or welfare of an individual, trade secrets of a business or even the security and international relations of a nation depending on the level of sensitivity and nature of the information.

Family Educational Rights and Privacy Act is a law that governs the access of educational information and records.
Privacy Waiver

Information Rights Management is a subset of digital rights management (DRM), technologies that protect sensitive information from unauthorized access. It is sometimes referred to as E-DRM or Enterprise Digital Rights Management. This can cause confusion, because digital rights management (DRM) technologies are typically associated with business to consumer systems designed to protect rich media such as music and video. IRM is a technology which allows for information (mostly in the form of documents) to be ‘remote controlled’. This means that information and its control can now be separately created, viewed, edited & distributed. A true IRM system is typically used to protect information in a business-to-business model, such as financial data, intellectual property and executive communications. IRM currently applies mainly to documents and emails.

Classified Information Procedures

Classified Information is material that a government body claims is sensitive information that requires protection of confidentiality, integrity, or availability. Access is restricted by law or regulation to particular groups of people, and mishandling can incur criminal penalties and loss of respect. A formal security clearance is often required to handle classified documents or access classified data.

Information Privacy is the relationship between collection and dissemination of data, technology, the public expectation of privacy, and the legal and political issues surrounding them. Privacy concerns exist wherever personally identifiable information or other sensitive information is collected, stored, used, and finally destroyed or deleted – in digital form or otherwise. Improper or non-existent disclosure control can be the root cause for privacy issues. Data privacy issues can arise in response to information from a wide range of sources, such as: Healthcare records, Criminal justice investigations and proceedings, Financial institutions and transactions, Biological traits, such as genetic material, Residence and geographic records, Ethnicity, Privacy breach, Location-based service and geolocation, Web surfing behavior or user preferences using persistent cookies. The challenge of data privacy is to utilize data while protecting individual's privacy preferences and their personally identifiable information. The fields of computer security, data security and information security design and utilize software, hardware and human resources to address this issue. As the laws and regulations related to Privacy and Data Protection are constantly changing, it is important to keep abreast of any changes in the law and continually reassess compliance with data privacy and security regulations.

List of Personal Information Managers
Confidentiality
Privacy Rights
Anonymity

Information Rights
Journalism Tools

Copyright Information Websites
Online Buying Tips
Open Rights Group
Privacy Association
Information Sources

Digital Accountability and Transparency Act of 2013

Demand Progress
Public Documents

National Security Archive is an investigative journalism center, open government advocate, international affairs research institute, and is the largest repository of declassified U.S. documents outside of the federal government. The National Security Archive has spurred the declassification of more than 10 million pages of government documents by being the leading non-profit user of the U.S. Freedom of Information Act (FOIA), filing a total of more than 50,000 FOIA and declassification requests in its nearly 30-year history.

History

How to Make an Open Records Request 
First review the laws in your state at State Sunshine Laws - How To

Come up with as precise a description as you can of the documents or records you want. Figure out which office -- school district, city government, state agency, etc. -- will have the records or documents you want. Contact that unit of government and ask them who at the agency is responsible for providing copies of documents. Prepare your request using the fully automated, fill-in-the-blanks, state open records letter generator. Mail or email your request, or deliver it in person. Make a note on your calendar of the deadline for the agency to provide you with the documents you've requested. 

Open Records

Declassified is the process of documents that used to be classified as secret ceasing to be so restricted, often under the principle of freedom of information. Procedures for declassification vary by country. Papers may be withheld without being classified as secret, and eventually made available.

Expect professional behavior from the custodians of the records you seek, and behave professionally yourself. If you encounter resistance, document what happened. State Sunshine Laws has information about each state's open records law, including contact information sorted by state for many school districts and city and county governments. Many states have organizations devoted to freedom of information. Don't hesitate to ask for help. If you will want to share information about the documents you receive--what the documents say or reveal--consider starting a blog.

Public Knowledge does not mean that the knowledge is available to everyone. It means that there is knowledge, but only if you know where to find it. And only if you know what questions to ask, and know which people to talk to. 

Knowledge Gap

What would you consider to be public information?
I have been asking that question for over 7 years, and here's what I found.

Public Relations (PR) is the practice of managing the spread of information between an individual or an organization and the public.

The Hacker Wars - Full HD 91 min. Director: Vivien Lesnik Weisman.


Censorship


Censored Content ControlThe Real Danger is not the Internet, the real danger is ignorance. We must learn to balance freedom of expression with the rights of an individual.

Censorship is the suppression of free speech, public communication or other information which may be considered objectionable, harmful, sensitive, politically incorrect or inconvenient as determined by governments, media outlets, authorities or other groups or institutions.

Censorship in the United States
Internet Censorship
Banned Websites Awareness
Banned Books - Challenge Literature
History being Censored and Propagandized 

You can’t fight diseases, or in this case the dangers of the Internet, by simply isolating, blocking and filtering websites or quarantining children because eventually people will be infected. You fight diseases or dangers by building the immune system just like a vaccine does by giving a small amount of the disease so that the body builds up its immunity to that particular disease. The immune system in this case is a child’s capacity to think logically and to possess extensive knowledge about vulnerabilities and hazards that are on TV, the Internet and at the Library. A teacher or parent needs to explain why certain things are inappropriate, and If a teacher or parent can not teach this then they must learn. Everyone must learn about the importance of moral practices and ethical standards but they must also learn why some things in this world do not have moral practices or ethical standards.

American Censorship
Public Knowledge
Stop Censorship
Media Literacy
Copyright Infringement Protection should not Violate Constitutional Rights.
Freedom of Speech and The First Amendment

Children must learn the difference between being funny and what is insensitive and cruel. Children must also learn that just because something is called entertainment does not mean that it is safe or that it will not have any repercussions or undesirable affects on the human mind. I'm all for Protecting Children from Inappropriate Material as long as someone teaches them why it's not suitable and dangerous. But controlling, limiting or censoring children’s freedoms is not teaching, you are just delaying the fact that they will make mistakes and most likely never learn from their mistakes, with some children being ultimately devastated by their mistakes. The only real protection children have against vulnerabilities and hazards in our world is a very comprehensive and a very effective education. Educate children, communicate with children and learn from children.

Money is a form of Censorship
National Coalition Against Censorship
Human Rights

If you see any connection errors on any of the pages on BK101, that means the website might be being blocked and censored. Your right to be knowledgeable and educated is being restricted and denied by criminals.
406 Not Acceptable or Server Not Found
The Connection was Reset, the connection to the server was reset while the page was loading. Webpage doesn't load, shows only a blank white screen, while other websites load normally.
Not Acceptable: An appropriate representation of the requested resource could not be found on this server. Error 406 sometimes due to Mod Security updates on the server. (Refresh Browser Window)

Distributed Denial of Service (DDoS) Madory, BackConnect had regularly spoofed internet addresses through a technique known as a “BGP hijack,” an aggressive tactic that pushes the bounds of accepted cyber-security industry practices. "Zombie” machines, referred to as botnets. A botnet is formed of personal computers in homes or offices infected with malicious code which, upon the request of a hacker, can start flooding a web server with data. One or two machines wouldn’t be an issue, but if
tens or hundreds of thousands fire such data simultaneously, it can be enough to cripple even the most sophisticated of web servers. Dyn incident, the computers targeted were DNS servers



Protecting Internet Communications during Protests


Are You Safe?

Haystack Software program intended for network traffic obfuscation and encryption. It was promoted as a tool to circumvent internet censorship in Iran. Shortly after the release of the first test version, reviewers concluded the software didn't live up to promises made about its functionality and security, and would leave its users' computers more vulnerable.

Fire Chat App

Mesh Networking is a network topology in which each node relays data for the network. All mesh nodes cooperate in the distribution of data in the network.

Wireless Mesh Network is a communications network made up of radio nodes organized in a mesh topology. It is also a form of wireless ad hoc network. Wireless mesh networks often consist of mesh clients, mesh routers and gateways. The mesh clients are often laptops, cell phones and other wireless devices while the mesh routers forward traffic to and from the gateways which may, but need not, be connected to the Internet. The coverage area of the radio nodes working as a single network is sometimes called a mesh cloud. Access to this mesh cloud is dependent on the radio nodes working in harmony with each other to create a radio network. A mesh network is reliable and offers redundancy. When one node can no longer operate, the rest of the nodes can still communicate with each other, directly or through one or more intermediate nodes. Wireless mesh networks can self form and self heal. Wireless mesh networks can be implemented with various wireless technologies including 802.11, 802.15, 802.16, cellular technologies and need not be restricted to any one technology or protocol. MN

Glasswire firewall software reveals threats your antivirus missed.

Peer to Peer computing or networking is a distributed application architecture that partitions tasks or workloads between peers. Peers are equally privileged, equipotent participants in the application. They are said to form a peer-to-peer network of nodes.

Peer-to-peer file sharing is the distribution and sharing of digital media using peer-to-peer (P2P) networking technology. P2P file sharing allows users to access media files such as books, music, movies, and games using a P2P software program that searches for other connected computers on a P2P network to locate the desired content. The nodes (peers) of such networks are end-user computers and distribution servers (not required).

Bulletproof Hosting is a service provided by some domain hosting or web hosting firms that allows their customer considerable leniency in the kinds of material they may upload and distribute.

TOR: Private Communications
Anonymous Internet Web Browsing
Identity Obfuscation (PDF)
Mega Proxy
Be-Bound app connects to the Internet even when you have no data connection or WiFi

Private Messaging
Tox
Briar Project
Invisible
Cuban youth build secret computer network despite Wi-Fi ban

Hola is one of the most popular ways to access geo-blocked websites. How to Geek

VPN's or a Virtual Private Network is another option. These allow you to tunnel your traffic through an encrypted connection and come out on the other side.
Shellfire Box VPN Evolution

SIPRNet is "a system of interconnected computer networks used by the U.S. Department of Defense and the U.S. Department of State to transmit classified information (up to and including information classified SECRET) by packet switching over the 'completely secure' environment". It also provides services such as hypertext document access and electronic mail. As such, SIPRNet is the DoD's classified version of the civilian Internet.

Keezel: Protect your privacy and security online! Portable WiFi solution that unblocks content worldwide

Turris Omnia: Hi-Performance Open-Source Router
Code Words

HOLY $H!T - Long Distance Wi-Fi (Up to 25 KILOMETER range!?) (youtube)
Ubiquiti Networks
Linus Tech Tips (youtube channel)

How to Unblock US Websites using DNS Proxy
Protecting The Information Highway

Lantern is a free desktop App that delivers fast, reliable and secure access to the open Internet.

Freebrowser is a free App gives access to websites even if they are blocked by national or corporate firewalls.

Secure My Email
Gotenna Text & GPS On Your Phone, No Service Required.


Data Protection - Safe Web Surfing - Encryption


Data Protection Data Protection Act 1998 defines the law on the processing of data on identifiable living people and is the main piece of legislation that governs the data protection.
Data Protection Act

Information Privacy is the relationship between the collection and dissemination of data, technology, the public expectation of privacy, and the legal and political issues surrounding them. Privacy concerns exist wherever personally identifiable information or other sensitive information is collected, stored, used, and finally destroyed or deleted – in digital form or otherwise. Improper or non-existent disclosure control can be the root cause for privacy issues. Data privacy issues may arise in response to information from a wide range of sources, such as: Healthcare records, Criminal justice investigations and proceedings, Financial institutions and transactions, Biological traits, such as genetic material, Residence and geographic records, Privacy breach, Location-based service and geolocation, Web surfing behavior or user preferences using persistent cookies. The challenge of data privacy is to utilize data while protecting individual's privacy preferences and their personally identifiable information. The fields of computer security, data security, and information security design and utilize software, hardware, and human resources to address this issue. Since the laws and regulations related to Privacy and Data Protection are constantly changing, it is important to keep abreast of any changes in the law and to continually reassess compliance with data privacy and security regulations
Privacy Protection (gov)

Data Protection Directive is the protection of individuals with regard to the processing of personal data and on the free movement of such data.

Privacy Rights

Data Breach is the intentional or unintentional release of secure or private/confidential information to an untrusted environment.

Cyberwarfare actions by a nation-state to penetrate another nation's computers or networks for the purposes of causing damage or disruption.

Cyber Security Standards are techniques generally set forth in published materials that attempt to protect the cyber environment of a user or organization.

Information Security is the practice of preventing unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction of information.

Security Engineering is a specialized field of engineering that focuses on the security aspects in the design of systems that need to be able to deal robustly with possible sources of disruption, ranging from natural disasters to malicious acts. It is similar to other systems engineering activities in that its primary motivation is to support the delivery of engineering solutions that satisfy pre-defined functional and user requirements, but with the added dimension of preventing misuse and malicious behavior. These constraints and restrictions are often asserted as a security policy.

Data Remanence is the residual representation of digital data that remains even after attempts have been made to remove or erase the data. This residue may result from data being left intact by a nominal file deletion operation, by reformatting of storage media that does not remove data previously written to the media, or through physical properties of the storage media that allow previously written data to be recovered. Data remanence may make inadvertent disclosure of sensitive information possible should the storage media be released into an uncontrolled environment (e.g., thrown in the trash or lost).

How Hackers Could Wirelessly Bug Your Office (youtube)

VAULTCARD Protection from RFID Fraud. Pocket-sized protection against RFID fraud, shielding credit cards to keep personal data safe.

Data - Knowledge Management

Confidentiality, Integrity, and Availability
Health Records

Secure Internet Communications
Protecting Internet Communications during Protests
Protecting the Internet
Laws


Privacy - Anonymity


Anonymity on the Internet,Internet Privacy - Guy Fawkes Mask most commentary on the Internet is essentially done anonymously, using unidentifiable pseudonyms. While these usernames can take on an identity of their own, they are frequently separated and anonymous from the actual author. Anonymizing services such as I2P and Tor address the issue of IP tracking. In short, they work by encrypting packets within multiple layers of encryption. The packet follows a predetermined route through the anonymizing network. Each router sees the immediate previous router as the origin and the immediate next router as the destination. Thus, no router ever knows both the true origin and destination of the packet. This makes these services more secure than centralized anonymizing services (where a central point of knowledge exists.

Privacy

I2P, the Invisible Internet Project (I2P) is an overlay network and darknet that allows applications to send messages to each other pseudonymously and securely. Uses include anonymous Web surfing, chatting, blogging and file transfers. The software that implements this layer is called an I2P router and a computer running I2P is called an I2P node.

Tor (anonymity network) is free software for enabling anonymous communication. The name is derived from an acronym for the original software project name "The Onion Router". Tor directs Internet traffic through a free, worldwide, volunteer network consisting of more than seven thousand relays to conceal a user's location and usage from anyone conducting network surveillance or traffic analysis.

Tor Project
Tor Browser
Tor Servers

Whisper Systems Signal App Scalable Encryption Tool.

Crypto Party goal is to pass on knowledge about protecting yourself in the digital space. This can include encrypted communication, preventing being tracked while browsing the web, and general security advice regarding computers and smartphones.

Crypto Christmas - Cutealism

Anonymizer is a tool that attempts to make activity on the Internet untraceable. It is a proxy server computer that acts as an intermediary and privacy shield between a client computer and the rest of the Internet. It accesses the Internet on the user's behalf, protecting personal information by hiding the client computer's identifying information.

Anonysurfer

Pseudonymity meaning 'false name', is a state of disguised identity. The pseudonym identifies a holder, that is, one or more human beings who possess but do not disclose their true names (that is, legal identities). Most pseudonym holders use pseudonyms because they wish to remain anonymous, but anonymity is difficult to achieve, and is often fraught with legal issues. True anonymity requires unlinkability, such that an attacker's examination of the pseudonym holder's message provides no new information about the holder's true name.

Online Tracking Web Privacy Measurement (PDF)

Freedom Hosting

Deep Web - Dark Internet

Bit-Coin

Encryption Software
Cryptography - Decode
IP Cloaking

Cypherpunk is any activist advocating widespread use of strong cryptography and privacy-enhancing technologies as a route to social and political change.

Virus Protection

VPN - Private Networks (safe browsing)

Anonabox Tor & VPN Router For Privacy, Bypassing Censorship & Deterring Hackers to Fund Draper Bio. Project Blue:
Flter: Privacy & Security Router - VPN protection, malicious ad blocking, and Tor anonymity on all the devices in your home.
Betterspot: A Smart VPN Router or secure online surfing and unblocking websites for All Devices.
InvizBox Go: Privacy & security, wherever you are. Use public Wi-Fi safely. Protect your browsing. Stream blocked shows at home. Block ads. Power bank.

Virtual Private Networks

Windscribe desktop application and browser extension to block ads and trackers.

How do you know it's Me?

Authentication is the act of confirming the truth of an attribute of a single piece of data (a datum) claimed true by an entity. In contrast with identification which refers to the act of stating or otherwise indicating a claim purportedly attesting to a person or thing's identity, authentication is the process of actually confirming that identity. It might involve confirming the identity of a person by validating their identity documents, verifying the authenticity of a website with a digital certificate,[1] determining the age of an artifact by carbon dating, or ensuring that a product is what its packaging and labeling claim to be. In other words, authentication often involves verifying the validity of at least one form of identification.

Authentication Methods (wiki)
Identity (who am I?)

Password is a word or string of characters used for user authentication to prove identity or access approval to gain access to a resource (example: an access code is a type of password), which is to be kept secret from those not allowed access.

Biometrics refers to metrics related to human characteristics. Biometrics authentication (or realistic authentication) is used in computer science as a form of identification and access control. It is also used to identify individuals in groups that are under surveillance.

Retinal Scan is a biometric technique that uses the unique patterns on a person's retina blood vessels. It is not to be confused with another ocular-based technology, iris recognition, commonly called an "iris scanner."

Facial Recognition is a computer application capable of identifying or verifying a person from a digital image or a video frame from a video source. One of the ways to do this is by comparing selected facial features from the image and a facial database.

Voice Recognition is the identification of a person from characteristics of voices (voice biometrics). It is also called voice recognition. There is a difference between speaker recognition (recognizing who is speaking) and Speech Recognition (recognizing what is being said).

Identity Management Systems refers to an information system, or to a set of technologies that can be used for enterprise or cross-network identity management. Additional terms are used synonymously with "identity management system" including; Access governance system. Identity and access management system. Entitlement management system. User provisioning system.

Identity Management is the security and business discipline that "enables the right individuals to access the right resources at the right times and for the right reasons". It addresses the need to ensure appropriate access to resources across increasingly heterogeneous technology environments and to meet increasingly rigorous compliance requirements. The terms "identity management" (IdM) and "identity and access management" are used[by whom?] interchangeably in the area of Identity access management.[citation needed] "Identity management" comes under the umbrella of IT security. Identity-management systems, products, applications and platforms manage identifying and ancillary data about entities that include individuals, computer-related hardware, and software applications. IdM covers issues such as how users gain an identity, the protection of that identity and the technologies supporting that protection (e.g., network protocols, digital certificates, passwords, etc.).

Open ID is an open standard and decentralized authentication protocol.

Identity Provider provides identifiers for users looking to interact with a system. Asserts to such a system that such an identifier presented by a user is known to the provider. Possibly provide other information about the user that is known to the provider.

Researcher ID provides a solution to the author ambiguity problem within the scholarly research community. Each member is assigned a unique identifier to enable researchers to manage their publication lists, track their times cited counts and h-index, identify potential collaborators and avoid author misidentification. In addition, your ResearcherID information integrates with the Web of Science and is ORCID compliant, allowing you to claim and showcase your publications from a single one account. Search the registry to find collaborators, review publication lists and explore how research is used around the world!

Public Key Infrastructure is a set of roles, policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates and manage public-key encryption.

Public-Key Cryptography is any cryptographic system that uses pairs of keys: public keys that may be disseminated widely paired with private keys which are known only to the owner. There are two functions that can be achieved: using a public key to authenticate that a message originated with a holder of the paired private key; or encrypting a message with a public key to ensure that only the holder of the paired private key can decrypt it.

Bitcoin
Browsers
Code Words

Public Key Certificate
Digital Certificates
Scalable Provable Data Possession
Dynamic Provable Data Possession
Lattice-Based Access Control

Privacy and Protecting of Personal Information
Privacy Rights

Enigma Machine were a series of electro-mechanical rotor cipher machines developed and used in the early- to mid-twentieth century to protect commercial, diplomatic and military communication.

Proton Mai
Electronic Privacy Center

Biodata is biographical data, factual kinds of questions about life and work experiences, as well as items involving opinions, values, beliefs, and attitudes that reflect a historical perspective.

Digital Footprint is created when data is collected without the owner knowing, where as active digital footprints are created when personal data is released deliberately by a user for the purpose of sharing information about oneself by means of websites or social media.

Collusion
Life Lock

Data Retention defines the policies of persistent data and records management for meeting legal and business data archival requirements; although sometimes interchangeable, not to be confused with the Data Protection Act 1998.

Staats Trojaner

User Profile is a visual display of personal data associated with a specific user, or a customized desktop environment. A profile refers therefore to the explicit digital representation of a person's identity. A user profile can also be considered as the computer representation of a user model.

Filtering

The National Security Archive
Public Data Sources
Heartbleed Bug
Crowd Strike

Information Security Operations Center
ICANN
Computers
Computer Crimes

Use 256 encryption and a Wpa/wpa2 password
Quantum Key Distribution (wiki)

Dangers of Anonymity and the Psychological Effects of being Anonymous


Privacy Rights - Surveillance Abuses and Dangers


NSA Espionage is the obtaining of information considered secret or confidential without the permission of the holder of the information.

False Flag - Espionage Act of 1917 (wiki)

Treason is the crime of betraying one's country, especially by attempting to kill the sovereign or overthrow the government, or its Constitution.

Traitor is someone who betrays his country by committing treason. Counterintelligence?

War Crimes - Secrecy - Monopolies

Confidentiality involves a set of rules or a promise that limits access or places restrictions on certain types of information.

Big Data - Profiling

Your Private Information is being Stolen and Sold. Almost everything that you say or do over a cellphone and the internet can be recorded. And that information can be sold to someone who can then use your information to manipulate you and used to manipulate other people who have also shared similar information that they naively thought was private and secure. These Profiles are being used as a source of violence instead of being used as a source for improvements.
"What kind of person would profit from your personal information and then not share that profit with you? Everything that Information exploiters have is from other people. But some how they believe that they earned it, when in fact they just used other people. That's called being a scrounge and a moocher. It's time for the users to give back to the producers. No more free rides. Everyone is responsible for life and the maintenance that we all must do in order to live a beautiful life.

Hacking or Security Breach is just another word for "We sold your personal information and blamed it on Hacking", just like a False Flag Attack.

Industrial Espionage is a form of espionage conducted for commercial purposes instead of purely national security.

Any criminal with money can buy surveillance equipment, so your government is not the only corporation that you need to worry about. Scams are worldwide.

Surveillance Abuse is the use of surveillance methods or technology to monitor the activity of an individual or group of individuals in a way which violates the social norms or laws of a society.

How the US Government Spies on People who Protest — including you (video and interactive text)

IMSI-Catcher is a telephone eavesdropping device used for intercepting mobile phone traffic and tracking movement of mobile phone users. Essentially a "fake" mobile tower acting between the target mobile phone and the service provider's real towers, it is considered a man-in-the-middle (MITM) attack. IMSI-catchers are used in some countries by law enforcement and intelligence agencies, but their use has raised significant civil liberty and privacy concerns and is strictly regulated in some countries such as under the German Strafprozessordnung (German) (StPO / Code of Criminal Procedure). Some countries do not even have encrypted phone data traffic (or very weak encryption), thus rendering an IMSI-catcher unnecessary.

Interception refers to the facilities in telecommunications and telephone networks that allow law enforcement agencies with court order or other legal authorization to selectively wiretap individual subscribers. Most countries require licensed telecommunications operators to provide their networks with Legal Interception gateways and nodes for the interception of communications. The interfaces of these gateways have been standardized by telecommunication standardization organizations. With the legacy public switched telephone network (PSTN), wireless, and cable systems, lawful interception (LI) was generally performed by accessing the mechanical or digital switches supporting the targets' calls. The introduction of packet switched networks, softswitch technology, and server-based applications the past two decades fundamentally altered how LI is undertaken. Lawful interception differs from the dragnet-type mass surveillance sometimes done by intelligence agencies, where all data passing a fiber-optic splice or other collection point is extracted for storage or filtering. It is also separate from the data retention of metadata that has become a legal requirement in some jurisdictions.

Warrant a specific type of authorization which permits an otherwise illegal act that would violate individual rights and affords the person executing the writ protection from damages if the act is performed. FISA Warrant - Search Warrant

United States Foreign Intelligence Surveillance Court is a U.S. federal court established and authorized under the Foreign Intelligence Surveillance Act of 1978 (FISA) to oversee requests for surveillance warrants against foreign spies inside the United States by federal law enforcement and intelligence agencies. Such requests are made most often by the National Security Agency (NSA) and the Federal Bureau of Investigation (FBI). Congress created FISA and its court as a result of the recommendations by the U.S. Senate's Church Committee. Its powers have evolved to the point that it has been called "almost a parallel Supreme Court.

Infiltrate is to enter a group or organization in order to spy on the members.

Mass Surveillance is an unlawful surveillance of an entire or a substantial fraction of a population, often for corrupt purposes.

NSA collected more than 151 million records of Americans' phone calls in 2016, even after Congress limited its ability to collect bulk phone records.

Surveillance is the monitoring of behavior, activities, or other changing information for the purpose of influencing, managing, directing, or sometimes protecting people. This can include observation from a distance by means of electronic equipment (such as closed-circuit television (CCTV) cameras) or interception of electronically transmitted information (such as Internet traffic or phone calls). It can also include simple no- or relatively low-technology methods such as human intelligence agents and postal interception.

Patriot Act roving wiretaps, searches of business records, and conducting surveillance of "lone wolves"—individuals suspected of terrorist-related activities not linked to terrorist groups, now called the USA Freedom Act.

Indefinite Detention without Trial is the incarceration of an arrested person by a national government or law enforcement agency without a trial, and violates many national and international laws, including human rights laws.
Gamma International

Trading with the Enemy Act says don't help or support scumbags who violate Human Rights, including people and leaders in your own country. Immunity?

Trading with the Enemy Act of 1917 restrict trade with countries hostile to the United States, that includes American Corporations.

Official Secrets Act is legislation that provides for the protection of state secrets and official information, mainly related to national security.

Foreign Intelligence Surveillance Act prescribes procedures for the physical and electronic surveillance and collection of "foreign intelligence information" between "foreign powers" and "agents of foreign powers" (which may include American citizens and permanent residents suspected of espionage or terrorism). It has been repeatedly amended since the September 11. attacks.
Hacking Team

Means, Motive, and Opportunity

Tempora is the codeword for a formerly secret computer system that is used by the British Government Communications Headquarters (GCHQ).

Privacy Law refers to the laws that deal with the regulation of personal information about individuals, which can be collected by governments and other public as well as private organizations and its storage and use. Privacy laws are considered in the context of an individual's privacy rights or reasonable expectation of privacy.

Data Mining (Information Overload)

Biometrics refers to metrics related to human characteristics. Biometrics authentication (or realistic authentication) is used in computer science as a form of identification and access control. It is also used to identify individuals in groups that are under surveillance.

Metadata is "data [information] that provides information about other data, relating to emails, telephone calls, web pages, video traffic, IP connections and cell phone locations. Descriptive metadata describes a resource for purposes such as discovery and identification. It can include elements such as title, abstract, author, and keywords. Structural metadata indicates how compound objects are put together, for example, how pages are ordered to form chapters. Administrative metadata provides information to help manage a resource, such as when and how it was created, file type and other technical information, and who can access it.

Information Broker collects information about individuals from public records and private sources including census and change of address records, motor vehicle and driving records, user-contributed material to social networking sites such as Facebook, Twitter and LinkedIn, media and court reports, voter registration lists, consumer purchase histories, most-wanted lists and terrorist watch lists, bank card transaction records, health care authorities, and web browsing histories. The data are aggregated to create individual profiles, often made up of thousands of individual pieces of information such as a person's age, race, gender, height, weight, marital status, religious affiliation, political affiliation, occupation, household income, net worth, home ownership status, investment habits, product preferences and health-related interests. Brokers then sell the profiles to other organizations that use them mainly to target advertising and marketing towards specific groups, to verify a person's identity including for purposes of fraud detection, and to sell to individuals and organizations so they can research people for various reasons. Data brokers also often sell the profiles to government agencies, such as the FBI, thus allowing law enforcement agencies to circumvent laws that protect privacy.

Intelligence Analysis is the application of individual and collective cognitive methods to weigh data and test hypotheses within a secret socio-cultural context. The descriptions are drawn from what may only be available in the form of deliberately deceptive information; the analyst must correlate the similarities among deceptions and extract a common truth. Although its practice is found in its purest form inside national intelligence agencies, its methods are also applicable in fields such as business intelligence or competitive intelligence.

Computer Surveillance is the monitoring of computer activity and data stored on a hard drive, or data being transferred over computer networks such as the Internet.

Electronic Communications Privacy Act is to extend government restrictions on wire taps from telephone calls to include transmissions of electronic data by computer.

Senate votes to let ISPs sell your Web browsing history to advertisers. The US Senate today voted to eliminate broadband privacy rules that would have required ISPs to get consumers' explicit consent before selling or sharing Web browsing data and other private information with advertisers and other companies.

Online Tracking - Web Privacy Measurement (PDF)

Behavioral Targeting comprises a range of technologies and techniques used by online website publishers and advertisers aimed at increasing the effectiveness of advertising using user web-browsing behavior information. In particular, "behavioral targeting uses information collected from an individual's web-browsing behavior (e.g., the pages that they have visited or searched) to select advertisements to display".

Tailored Access Operations is a cyber-warfare intelligence-gathering unit of the National Security Agency (NSA).
Suspicious Activity Database
NSA Warrantless Surveillance Controversy (wiki)

Cellebrite is an Israeli company that manufactures data extraction, transfer and analysis devices for cellular phones and mobile devices.

PRISM surveillance program under which the NSA collects internet communications from at least nine major US internet companies.

ECHELON is a surveillance program (signals intelligence / SIGINT collection and analysis network) operated on behalf of the five signatory nations to the UKUSA Security Agreement—Australia, Canada, New Zealand, the United Kingdom and the United States, also known as the Five Eyes.

Stellar Wind is the code name of information collected under the President's Surveillance Program (PSP)

The Nationwide SAR Initiative
Level 3 Communications
Trapwire

Signals Intelligence is intelligence-gathering by interception of signals or communications between people.
Global Surveillance Disclosures

Thin Thread program involved wiretapping and sophisticated analysis of the resulting data.

Automatic Number Plate Recognition is a technology that uses optical character recognition on images to read vehicle registration plates. It can use existing closed-circuit television, road-rule enforcement cameras, or cameras specifically designed for the task.

Telephone Tapping is the monitoring of telephone and Internet conversations by a third party, often by covert means.

Eavesdropping is secretly listening to the private conversation of others without their consent.

WatchHound Cell Phone Monitor

Police officers across the country misuse confidential law enforcement databases to get information on romantic partners, business associates, neighbors, journalists and others for reasons that have nothing to do with daily police work, an Associated Press investigation has found.

Foreign Intelligence Surveillance Act prescribes procedures for the physical and electronic surveillance and collection of "foreign intelligence information" between "foreign powers" and "agents of foreign powers" (which may include American citizens and permanent residents suspected of espionage or terrorism).

Trailblazer Project is a program intended to develop a capability to analyze data carried on communications networks like the Internet. It was intended to track entities using communication methods such as cell phones and e-mail.

More Corporate Crimes
Health Records

Smith Act set criminal penalties for advocating the overthrow of the U.S. government and required all non-citizen adult residents to register with the government.

Pentagon to boost cyber security force

Computer Security is the protection of computer systems from the theft or damage to the hardware, software or the information on them, as well as from disruption or misdirection of the services they provide.

"The Insider threat is our own Government, and the corporations who own our politicians. Together they're subverting the Constitution."

First comes Mass Surveillance then the Police State

FBI Criminal, Cyber, Response, and Services Branch was created in 2002 as part of the U.S. government's post-911 response, the CCRSB is responsible for investigating financial crime, white-collar crime, violent crime, organized crime, public corruption, violations of individual civil rights, and drug-related crime. In addition, the Branch also oversees all computer-based crime related to counterterrorism, counterintelligence, and criminal threats against the United States.

Let us avoid another Shit Storm
This mass collection of information is the same thing that the Nazi's did. Our Government claims it's for Security reasons, which we know is a white lie. You're not using this information on peoples behalf, or to benefit people, or to protect people, you're using this information to profit from it, just like any scumbag corporation would. And you're also selling this information to other scumbag criminals at a hefty price. And on top of that you're also using this information to manipulate people, to control people, to blackmail people, and to incriminate people. You have raped humankind for the last time. It's time for your rehabilitation, your education, your realization. You are now going to feel like a child who just realized that the world is not what they thought it was. And that you're not in power, you're just living in a delusional dream, which is a reality and a nightmare for everyone else. But the good news is that you can wake up. Brain Plasticity + Learning = Change. So all is not lost, we can turn this clusterf*ck around and use this information, and our information collection abilities, for good instead of using it for evil purposes. We have a lot to learn, but luckily humans have brains with enormous memory capacity. Sounds familiar?

I Know There's Something Going On - Frida (youtube)

"What are you planning to calculate with those details?"

National Security Letter is an administrative subpoena issued by the United States federal government to gather information
for national security purposes. NSLs do not require prior approval from a judge. The Stored Communications Act, Fair Credit Reporting Act, and Right to Financial Privacy Act authorize the United States federal government to seek such information that is "relevant" to authorized national security investigations. By law, NSLs can request only non-content information, for example, transactional records and phone numbers dialed, but never the content of telephone calls or e-mails. NSLs typically contain a nondisclosure requirement, frequently called a "gag order", preventing the recipient of an NSL from disclosing that the FBI had requested the information. The nondisclosure order must be authorized by the Director of the FBI, and only after he or she certifies "that otherwise there may result a danger to the national security of the United States, interference with a criminal, counterterrorism, or counterintelligence investigation, interference with diplomatic relations, or danger to the life or physical safety of any person." Even then, the recipient of the NSL may still challenge the nondisclosure order in federal court. The constitutionality of such nondisclosure orders has been repeatedly challenged. The requirement was initially ruled to be unconstitutional as an infringement of free speech in the Doe v. Gonzales case, but that decision was later vacated in 2008 by the Second Circuit Court of Appeals after it held the USA PATRIOT Improvement and Reauthorization Act gave the recipient of an NSL that included a nondisclosure order the right to challenge the nondisclosure order in federal court. In March 2013, district court judge Susan Illston of Federal District Court in San Francisco struck down the law, writing that the prohibition on disclosure of receipt of an NSL made the entire statute impermissibly overbroad under the First Amendment. On August 24, 2015, the Ninth Circuit Court of Appeals vacated the district court's decision and remanded the case back to the district court for further proceedings.

Administrative Subpoena a subpoena issued by a federal agency without prior judicial oversight. Critics say that administrative subpoena authority is a violation of the Fourth Amendment to the United States Constitution.

Stored Communications Act is a law that addresses voluntary and compelled disclosure of "stored wire and electronic
communications and transactional records" held by third-party internet service providers (ISPs). It was enacted as Title II of the Electronic Communications Privacy Act of 1986 (ECPA).

Fair Credit Reporting Act is U.S. Federal Government legislation enacted to promote the accuracy, fairness, and privacy of
consumer information contained in the files of consumer reporting agencies.

Right to Financial Privacy Act gives the customers of financial institutions the right to some level of privacy from government
searches.

Information Awareness Office in January 2002 to bring together several DARPA projects focused on applying surveillance and information technology to track and monitor terrorists and other asymmetric threats to U.S. national security by achieving "Total Information Awareness" (TIA).

Mobile Phone Tracking is the ascertaining of the position or location of a mobile phone, whether stationary or moving. Localization may occur either via multilateration of radio signals between (several) cell towers of the network and the phone, or simply via GPS. To locate a mobile phone using multilateration of radio signals, it must emit at least the roaming signal to contact the next nearby antenna tower, but the process does not require an active call. The Global System for Mobile Communications (GSM) is based on the phone's signal strength to nearby antenna masts.

Stingray Phone Tracker is an IMSI-catcher, a controversial cellular phone surveillance device, manufactured by Harris Corporation. Initially developed for the military and intelligence community, the StingRay and similar Harris devices are in widespread use by local and state law enforcement agencies across the United States and possibly covertly in the United Kingdom.

17 Fake Cell Towers
Hailstorm

Triggerfish Surveillance describes a technology of cell phone interception and surveillance using a mobile cellular base station (microcell or picocell). The devices are also known as cell-site simulators or digital analyzers.

FinFisher also known as FinSpy, is surveillance software marketed by Lench IT solutions PLC with a UK-based branch Gamma International Ltd in Andover, England, and a Germany-based branch Gamma International GmbH in Munich, which markets the spyware through law enforcement channels.

NSA Theme Song - Every Breath You Take, By the Police (youtube)
Glenn Greenwald: Why Privacy Matters (video)

The Third-Party Doctrine is a United States legal theory that holds that people who voluntarily give information to third parties—such as banks, phone companies, internet service providers (ISPs), and e-mail servers—have "no reasonable expectation of privacy. A lack of privacy protection allows the United States government to obtain information from third parties without a legal warrant and without otherwise complying with the Fourth Amendment prohibition against search and seizure without probable cause and a judicial search warrant. Libertarians typically call this government activity unjustified spying and a violation of individual and privacy rights.

Films
Naked Citizens - World (youtube)
Edward Snowden: Here is how we take back the Internet (video)
State of Surveillance' with Edward Snowden and Shane Smith (FULL EPISODE) (youtube)
Heather Brooke: My Battle to Expose Government Corruption (youtube) 
Hubertus Knabe: The Dark Secrets of a Surveillance State (video)
Your Cell Phone Company is Watching (video) 
Mikko Hypponen: Three Types of Online Attack (video)
Avi Rubin: All your Devices can be Hacked (video)
VICE Meets Glenn Greenwald: Snowden's Journalist of Choice (youtube)
Big Brother Big Business: Another film about Data Mining and the information War (video)
Activist Repression, FBI Activities, & the AR Movement - Ryan Shapiro (youtube)
A Video about how your personal information is being sold - Dispatches - The Data Theft Scandal (video)
Filming Police
Surveillance Cameras don't reduce Crime, they just cause more crime to happen in other places, like in our Government
America’s Surveillance State 1 (The Surveillance Machine) (youtube)
TalkingStickTV - Robert Scheer - They Know Everything About You (youtube 1:08:40)  Robert Scheer
An Eye on You: Citizens Under Surveillance Citizens of the 21st century are the focus of prying eyes, whether they agree to it or not. This investigation identifies the stakes and scandals of global surveillance and opens up the debate on our threatened individual freedoms. Aired: 03/27/2016 | 54 min.
Citizens Under Surveillance (youtube)
The Haystack Documentary Investigation into 21st century surveillance in the UK and the Investigatory Powers (IP) Bill
currently before Parliament.

How many Cameras does your city have?

Observation Flaws

Panopticon concept of the design is to allow all (pan-) inmates of an institution to be observed (-opticon) by a single watchman without the inmates being able to tell whether or not they are being watched. Although it is physically impossible for the single watchman to observe all cells at once, the fact that the inmates cannot know when they are being watched means that all inmates must act as though they are watched at all times, effectively controlling their own behaviour constantly. The name is also a reference to Panoptes from Greek mythology; he was a giant with a hundred eyes and thus was known to be a very effective watchman.

Drones

Time to turn those cameras around and start filming the real criminals.
Since officers started wearing body cameras complaints against officers fell 88%, and the use of force dropped 60%.
So if cameras worked in controlling that criminal behavior of police, then they will also help control criminal behavior of bankers, presidents, politicians and corporations. And since we already have enough cameras, it's just a matter of direction and focus.

Nanny State are policies that are overprotective and interfering unduly with personal choice. The term "nanny state" likens government to the role that a nanny has in child rearing.
Mosaic Theory (intelligence) is a method used by American intelligence analysts.

Social Engineering refers to psychological manipulation of people into performing actions or divulging confidential information. A type of confidence trick for the purpose of information gathering, fraud, or system access, it differs from a traditional "con" in that it is often one of many steps in a more complex fraud scheme.

Home Monitoring

The only effective counterterrorism is improving education and public knowledge

Google was Asked to Remove 345 Million Pirate Links in 2014  (who's verifying all these requests?)

Cyber Intelligence Sharing and Protection Act (CISPA) is a proposed law in the United States which would allow for the sharing of Internet traffic information between the U.S. government and technology and manufacturing companies.

United States Foreign Intelligence Surveillance Court is to oversee requests for surveillance warrants against foreign spies inside the United States by federal law enforcement and intelligence agencies.

Computer Fraud and Abuse Act limiting federal jurisdiction to cases "with a compelling federal interest-i.e., where computers of the federal government or certain financial institutions are involved or where the crime itself is interstate in nature."

Songs
Every Breath You Take, I"ll be watching you - The Police (youtube)
Somebody's Watching Me - Rockwell (youtube)

Cyber Threats or Cyber Hackers actually make our computer systems safer and more stable because hackers make us more aware of our vulnerabilities and software flaws. This way we can secure them properly, and make sure our systems have backups, as well as, Fail Safe methods that include protections against total power failure. Where human manual labor is the final step in guaranteeing that systems operate normally. So this is not just a software issue, this is a human issue. People need to be educated about system failures and vulnerabilities, and the options and choices that we have during these failures. We don't need another 911 where Cyber Warfare is used as an excuse for the government and the military to attack citizens and the internet. "They cause the problem, and then they try to sell us a cure, which is not a cure, just part of the same problem." So a Cyber War is not our biggest threat, corruption is our biggest threat, and corruption has been our biggest threat for a very long time. Exploit Sales and Government Corruption, or Corporate Corruption, are the same thing. Malware and Government Corruption are the same thing. Both Actions exploit the system for profit, just like wall street and the major banks do. Zero Days is just another vulnerability in a world that has thousands of vulnerabilities. And knowledge is our best defense against ignorance, and vulnerabilities.

Human Rights

"The spying is not all about National Security, or even Malicious Greed, the Spying that is the most disturbing is the spying related to Paranoia. So you have to ask the question, what are they paranoid about? Why do they feel weak and insecure? You got caught with your hands in the cookie jar, but there's no cookie jar. You know how manipulating and dangerous misinformation can be, but can they tell when it's their own misinformation? When you're asking the wrong questions, you will never find the answers that you're hoping to find, so why continue to ask the wrong questions? You're wasting precious time Lord of the Flies. The only way this will work, is when we work together.


Whistle Blowing Hero's


whistle blowerWhistleblower is a person who exposes any kind of information or activity that is deemed illegal, unethical, or not correct within an organization that is either private or public.

Public Interest Defense allows a defendant who disclosed classified or protected information to avoid criminality by establishing that the public interest in disclosure of the information outweighs the public interest in nondisclosure. It is aimed at protecting whistleblowers of government misconduct.

False Claims Act is an American federal law that imposes liability on persons and companies (typically federal contractors) who defraud governmental programs. It is the federal Government's primary litigation tool in combating fraud against the Government. The law includes a qui tam provision that allows people who are not affiliated with the government, called "relators" under the law, to file actions on behalf of the government (informally called "whistleblowing" especially when the relator is employed by the organization accused in the suit). Persons filing under the Act stand to receive a portion (usually about 15–25 percent) of any recovered damages. As of 2012, over 70 percent of all federal Government FCA actions were initiated by whistleblowers. Claims under the law have typically involved health care, military, or other government spending programs, and dominate the list of largest pharmaceutical settlements. The government recovered $38.9 billion under the False Claims Act between 1987 and 2013 and of this amount, $27.2 billion or 70% was from qui tam cases brought by relators.

Turn State's Evidence is for an accused or convicted criminal to testify as a witness for the state against his associates or accomplices. Turning state's evidence is occasionally a result of a change of heart or feelings of guilt, but is more often in response to a generous offer from the prosecution, such as a reduced sentence or a favorable location for serving time. In particularly high-profile or dangerous cases such as organized crime trials and other federal crimes trials, witnesses may be offered immunity from prosecution even if they have committed serious crimes themselves, sometimes even murder. The state may also offer the witness a place in the witness protection program, giving them a new identity, so they need not fear retaliation from their former accomplices.
Corruption in the Justice System

List of Whistleblowers (wiki)
Famous Infamous Whistleblowers 
Russ Tice
Thomas Andrews Drake
Daniel Ellsberg
Edward Snowden
Julian Assange  WikiLeaks
Aaron Swartz
5 New Whistleblowers Speak on Exposing Corruption Since Snowden (video)

Activism - Activists
Journalism Hero's

If you See Something, Say Something
Whistle Blowers Center
Whistleblower
Whistleblower Protection Act
Whistleblowers Protection Program
Conformity Dangers
Whistleblower Rights (PDF)
Government Watchdogs
Key Words
Expose Facts
I Paid a Bribe
The Intercept
Pentagon Papers
Freedom of the Press
Freedom of Speech
National Security Archive (wiki)
Workplace Fairness
War on Whistleblowers (ft. Edward Snowden & David Carr) 2015 (youtube)
Gary Webb
CIA and Contras Cocaine Trafficking in the US
Allegations of CIA Drug Trafficking
Congress 1998

"Sometimes hero's reap rewards that were never intended for them, and other times the rewards are not even rewards at all."

Implicated - Legal Terms

When you hear someone talk about fraud, theft, or corruption that they have witnessed, that is a cry for help. And people need to respond, because we cannot always be reliant on a justice system that is corrupt itself, if we don't act who will? If you have a chance to correct flaws and mistakes, you should. Even if your search for justice or change comes up short, we can still benefit from that experience of seeking change. Things that you learn can be used towards other methods of communication. Things that you learn can also be used to correct other injustices, now and in the future. Sadly we don't even have one trusted source for information, there's not one source for trusted information, how can that be? Communication is our greatest strength. Collectively our power is limitless, but when we can't communicate effectively, we lose a tremendous amount of power, wealth and potential. And these are the things that all humans seek, but the problem is that we have not yet figured out how to correct our communication flaws. Our ability to transfer knowledge using language is a gift, we should not take this ability for granted. Communication is a power that everyone can share and benefit from.


Nothing to Hide ?


If you have nothing to hide then you have nothing to worry about, which is actually what an ignorant moron would say.
Most all of us have friends that we can trust and feel comfortable with, friends who we don't mind sharing our personal thoughts or secrets with. But, if you had a friend who was a deviate criminal who couldn't be trusted, a person who wouldn't mind sharing your personal information or secrets with other people, other people with other motives then your friendship, then you would most likely not share any personal information with that person. So the real question is, what if that deviate criminal was able to spy on you and document almost every move that you make or every word you speak? That would suck because you would be always worrying about what information and knowledge could be exploited and used against you, or, used against some other innocent people. Nothing to hide is one thing, something that can be misconstrued is another, after all, we're talking about criminals. So I would not want you to be too complacent about the possible dangers and scams that are on the Internet or any where else. So please educate yourself, and if you are concerned about something then please get as many opinions as you can, and always ask for help from a well trusted source.
nothing to hide
"I have nothing to hide so I why should I worry? That actually means you have nothing between your ears, so yes you have nothing to hide except your own ignorance. Maybe you have nothing to hide because you have nothing of value to add to society, or you just don't care about victims of crimes or the vulnerabilities of our society, so how do you hide your shame?"

You don't have to worry about your personal information being exploited by normal and respectable people, because those people don't care about your personal information, unless that information provided something of value to society, in that case they would just ask for your consent. The real danger is criminals, and those criminals can be from your government, your businesses, your associates, or any one involved with criminal activities. So you have nothing to worry about except criminals. And knowing who exactly the criminals are is not easy, but not impossible.

Teaching the public extensively about how and where personal information can be exploited can greatly increase their protection. Criminals and persons that are steeling and manipulating personal information are everywhere, in almost every type of business, legal and illegal. So start educating the young about how this morally destructive behavior, which in most cases are fueled by greed and power, is wrong on so many levels that it not just threatens our character, but our survival. Though the freedom to information is highly essential to our growth, we must know that criminal minds are not going away anytime soon. So back up your data and secure it with a trusted friend or relative. It’s not just about your personal information falling into the wrong hands, it’s more about your personal information never being found when needed.  

Information Brokers or Data Brokers have information on you that's similar to your Personal FBI Files. Your Personal Dossier Profile can have over 1,500 separate pieces of information: Political Views, Voting History, Medical History, Psychiatric Problems, Religion, Friends Names, Family Names, Race, Income, Credit Report, Bank Accounts, SS #'s, Credit Card #'s, Properties owned, Cars, Weapons, Police Reports, Drug Problems, Driving Record, Lawsuits, Jobs you had, Sexual Orientation, Restaurants, Items Purchased, Websites you visited over the years, Search Words you used, Geo-Location Data from Cell Phones, and so on and so on. This Information is mostly used by scumbag marketing advertisers who ignorantly believe that they are actually necessary, not even close. You are a defect in the system that lives off another defect in the system, none of which benefits people in the ways it should.

Epsilon
Acxiom
Dataium
Lotame
Spokeo

You can use a Disposable Identity or Fake Identity if you feel the need.
Fake Your Identity Online (wiki how)
Identity Forgery

The word 'Hacker' is just another stereotyping keyword that the media uses to manipulate and distract the public from the facts. A Hacker is just someone who has a unique set of computer skills and knowledge, which does not make them a criminal. When someone uses advanced knowledge to commit a crime that does not make having that knowledge a crime, it only suggests that someone committed a crime, which still needs to be determined in a court of law, a court of law that is not corrupt or manipulated. Corporations and Governments are involved in criminal activities everyday. Committing the same crimes that so called Hackers commit. And corporations and governments are much more destructive and dangerous to society then any hacker or terrorist could ever dream of being. So don't allow yourself to be distracted.

Anonymous
Guy Fawkes Mask

People need Anonymity, but not to hide deviate behavior, but to protect themselves from idiots and criminals.

Anonymity meaning "without a name" or "namelessness". In colloquial use, "anoortant idea here is that a person be non-identifiable, unreachable, or untrackable. Anonymity is seen as a technique, or a way of realizing, certain other values, such as privacy, or liberty.

Privacy is the ability of an individual or group to seclude themselves, or information about themselves, and thereby express themselves selectively. The boundaries and content of what is considered private differ among cultures and individuals, but share common themes. When something is private to a person, it usually means that something is inherently special or sensitive to them. The domain of privacy partially overlaps security (confidentiality), which can include the concepts of appropriate use, as well as protection of information. Privacy may also take the form of bodily integrity. Not to be Confused with Secrecy

Anonymous is someone or something not known or lacking marked individuality. Nameless. Being or having an unknown or unnamed source.

Inconspicuous
is someone or something not prominent or readily noticeable, Not drawing attention.

Concealment - Shielded
is to protect, hide, or conceal from danger or harm. Protected. Kept safe or defended from danger or injury or loss.

Discretion
is the freedom to act or judge on one's own. Knowing how to avoid embarrassment or distress. The power of making free choices unconstrained by external agencies. The trait of judging wisely and objectively.

Privacy Tools


PC Threats - Vulnerabilities - Protection Tools


Vulnerability (computing) is a weakness which allows an attacker to reduce a system's information assurance. Vulnerability is the intersection of three elements: a system susceptibility or flaw, attacker access to the flaw, and attacker capability to exploit the flaw. To exploit a vulnerability, an attacker must have at least one applicable tool or technique that can connect to a system weakness. In this frame, vulnerability is also known as the attack surface.)Threats to Computers

"Making sure that the virus protection doesn't turn into a virus itself"

Nothing to Hide
Safe Surfing - Anonymity  
Data Protection

Keep your Operating System updated To avoid Threats & Vulnerabilities
PC Problem Solving

Banking

If you do online banking: If you use your bank account to send and receive money make sure it is not linked to any other bank accounts that you have. This way you can keep the minimal money needed in your online account so that you do not risk having all your money being stolen. When typing in personal information make sure you see the 'S' after the http ( https:// ) in the browser address bar. S stands for SSL certificate which is short for Secure Sockets Layer. You should see this when putting in personal information like credit card numbers, social security numbers and passwords. The SSL help protects you from hackers seeing what you are typing because what you type is Encrypted. But still this does not guarantee that your information is safe because of other vulnerabilities like hackers, key stroke recorders, viruses and fake websites.

A Video about how your personal information is being sold - Dispatches - The Data Theft Scandal (video)
Big Brother Big Business another film about Data Mining and the information War (video)

Credit Cards
If you use a credit card for online purchases: Please have a low credit limit and try to use only one credit card on the internet. So if that credit card information is stolen thieves will not be able to make any big charges on your credit card. If you do need to increase your credit limit to buy something expensive, then you can call your credit card provider to increase your credit limit.
This will also keep you from doing any impulse purchases because you now have to make a phone call first to ask for the credit increase.

Warning:
If you have good credit and you are financially secure you must take extra steps in order to secure your personal information and finances. One step is to put a freeze on new accounts being open so that thieves are not able to get credit cards in your name.

ID Theft Affidavit (FTC)
Identity Theft
Monitoring Credit Scores
Money Management Education

Track your Laptop, Cell Phone and Tablet whenever stolen or missing: Open source software with full and remote control, 24/7  -  Tracking Devices


Browsers

Temporary Internet files, Cookies, Virus Protection and Browser Settings: It's a good idea to delete your temporary internet files as well as your Cookies, especially knowing that some tracking cookies record every website you visit. This way advertisers can manipulate what adds you see on websites, manipulate what websites you see in your internet searches and also know what kind of spam e-mails to send you. They can also sell this information to others. The Wall Street Journal measured  50 of the most popular websites and found that they installed a total of 3,180 tracking files on a test computer. This is very annoying and intrusive but there are ways to minimize these types of attacks on your privacy. Each browser has a different way of clearing these files and cookies so please learn how to do this yourself so that you can do it once a month. At the top of your browser window look for 'Tools' and then 'Options' and learn how to adjust your security settings (Like Private Browsing, Note: Certain privacy browser settings 'Like Private Browsing' and not allowing cookies can cause some of your usernames & passwords from working). Before you clear the passwords from your browser make sure you write each one down incase you need to retype them in later. Always have at least 2 internet browsers on your PC incase one does not work or gets infected. 

Privacy Choice
ULR Query

Mozilla Firefox Lightbeam (see who's tracking you online)
Lightbeam
Disconnect.me (stop online advertiser tracking)

Super Cookie is a type of browser cookie that is designed to be permanently stored on a user’s computer. Super cookies are generally more difficult for users to detect and remove from their devices because they cannot be deleted in the same fashion as regular cookies. Super cookies serve the same function as regular cookies in that they can contain just about any information including browsing history, authentication details or ad-targeting data.

Browsers for the Internet that are Free: 
Mozilla Firefox
Chrome
Opera
Apple Safari
Tor (safe browsing)
Internet Browsers for Kids
Hatdex RUMPEL Web Browser

Web Browser is one of the most efficient and effective tools for navigating through information.

Anansi Browser is a lightweight Windows utility designed to help users navigate on the Internet in a clean and intuitive working environment.

Browser Usage Stats
Usage Share of Web Browsers
Avecto: Windows Vulnerabilities 

Internet Searching Tips
Internet Access Tools
Cookie Central

3rd Party Cookies, you only need them on certain websites when you are accessing certain information that requires 3rd party cookies to be excepted in order for certain software functions to work properly, like forms or windows that need to open.

Computer VirusComputer Virus Word Cloud is a type of malicious software program ("malware") that, when executed, replicates by reproducing itself (copying its own source code) or infecting other computer programs by modifying them. Infecting computer programs can include as well, data files, or the "boot" sector of the hard drive. When this replication succeeds, the affected areas are then said to be "infected" with a computer virus
Malware is any software used to disrupt computer or mobile operations, gather sensitive information, gain access to private computer systems, or display unwanted advertising.

Spyware is software that aims to gather information about a person or organization without their knowledge, that may send such information to another entity without the consumer's consent, or that asserts control over a device without the consumer's knowledge.

Keystroke Logging is the action of recording (logging) the keys struck on a keyboard, typically covertly, so that the person using the keyboard is unaware that their actions are being monitored.

Keystroke Dynamics is the detailed timing information which describes exactly when each key was pressed and when it was released as a person is typing at a computer keyboard.

Trojan Horse is any malicious computer program which is used to hack into a computer by misleading users of its true intent.

Computer Worm is a standalone malware computer program that replicates itself in order to spread to other computers. Often, it uses a computer network to spread itself, relying on security failures on the target computer to access it. Worms almost always cause at least some harm to the network, even if only by consuming bandwidth, whereas viruses almost always corrupt or modify files on a targeted computer.

Pwn is to compromise or control, specifically another computer (server or PC), website, gateway device, or application. It is synonymous with one of the definitions of hacking or cracking, including iOS jailbreaking. The Pwnie Awards are awarded by a group of security researchers.

Hacker (definitions)

The Shadow Brokers is a hacker group originating in summer 2016. They published several leaks of some of the National Security Agency (NSA) hacking tools including zero-day exploits. Specifically, exploits and vulnerabilities targeting enterprise firewalls, anti-virus products and Microsoft products, tied to the Equation Group threat actor, NSA's Tailored Access Operations (TAO).

DNS

Ransomware Malware is computer malware that installs covertly on a victim's device (e.g., computer, smartphone, wearable device) and that either mounts the cryptoviral extortion attack from cryptovirology that holds the victim's data hostage, or mounts a cryptovirology leakware attack that threatens to publish the victim's data, until a ransom is paid.

Computer Fraud and Abuse Act was enacted by Congress in 1986 as an amendment to existing computer fraud law (18 U.S.C. § 1030), which had been included in the Comprehensive Crime Control Act of 1984.

Electronic Communications Privacy Act was enacted by the United States Congress to extend government restrictions on wire taps from telephone calls to include transmissions of electronic data by computer.

Stuxnet Malware

Storm Botnet is a remotely controlled network of "zombie" computers (or "botnet") that have been linked by the Storm Worm, a Trojan horse spread through e-mail spam.

Botnet is a number of Internet-connected devices used by a botnet owner to perform various tasks. Botnets can be used to perform Distributed Denial Of Service Attack, steal data, send spam, allow the attacker access to the device and its connection. The owner can control the botnet using command and control (C&C) software. The word botnet is a combination of the words robot and network. The term is usually used with a negative or malicious connotation.

Virus Protection
Keep your Virus Software Up to Date because that will also help protect your private information, though it is not a guarantee
1 in 1,000 Websites are infected with Malicious Software. The moment you visit these infected websites malicious software or viruses are downloaded to your PC without you even knowing, so stay protected and be careful what you click on.

Free Virus Protection - Spyware Protection Software
Security Essentials
Avira
AVG
Avast
Trend Micro

Computer Resources
Protect yourself from 15 Million Malicious Computer Programs

Lava Soft Ad-Ware
Spybot Search and Destroy
CCleaner
Malwarebytes
Hijack This
Spyware Blaster
Download.com has the software above.
Identify Programs Running on PC
Stop Badware

Be very careful not to click on the wrong download item. Please Verify the correct ".exe file."

ULR Query detecting and analyzing web-based malware. It provides detailed information about the activities a browser does while visiting a site and presents the information for further analysis.

Know when someone spies on you

Tip: Make up fake answers to the most common security questions.
Use a VPN. A VPN (virtual private network)
Routing your internet traffic through a middleman server.
Disk Encryption

Market researchers say nearly 300 billion e-mails are sent each day.

E-Mail Software to help Control Spam
Spamato
Spam Bayes
Get pop file
Mail Washer
Sane Box
Google Priority-inbox Email Filter 

Stop Junk Mail from your Mailman 

Stop Annoying Phone Calls: 
Do not Call
Get a Human Direct Company Phone Numbers without Menu.

Telemarketing
Auto Dialer
Robo Call (wiki)
Stop Robocalls
Reverse Phone Number Lookup
Complaint Database

Call Them All

Mass Calling System Delivers phone messages to thousands of call recipients at once. 

Marketing Madness Hang-up when you are talking, this way they will think that you were cut off and lost connection.

Don't forget, before you hang up the phone, make this request below, by law they have to remove you from the call list.....

" Please put me on your do not call list "..especially if you are just wasting valuable time, energy, resources, people and money..


The Thinker Man