Category Archives: Freedom

Financial Freedom – How to keep your data secure and private

[The following post about cybersecurity was stolen by the creator of Hacked .com and Crypto Coin News .com in March of 2017.  It is my original work.  The creator of those sites stole it from me without payment.  Do not visit either of those sites.]


Your most important information exists within cyberspace.

With each passing day, that information becomes more valuable, as well as more vulnerable.  Cybersecurity also becomes more important.

There are two main parties that want your information: cybercriminals and overreaching government spy agencies.  The former want financial information first and foremost.  The latter want everything.

According to William Binney, a former high-ranking official at the National Security Administration (NSA), everything you do online – email, banking, credit cards, surfing the web, etc., all get recorded and archived by spy agencies such as the NSA.

Why do they want this information?  For criminals, the answer is simple: to profit.  Either through direct theft or by selling bulk information to third parties, cybercriminals seek to make a quick buck for relatively little effort.

Government spy agencies, however, have even more nefarious intentions.

All stored data can be used against you at any time, for any reason.  Sound paranoid?  It has happened before.

The Importance of Privacy

The United States Federal Government (USFG) used such data in order to direct IRS agents toward impeding the actions of conservatives within the Tea Party movement.  The IRS targeted members within the movement with increased scrutiny, in some cases auditing them for no apparent reason.

When this information came to light, the presiding Acting Director of Exempt Organizations, Lois Lerner, was eventually put on trial in front of a congressional committee for her alleged crimes.  In the end, she would face no criminal charges.  Her infamous testimony consisted of only four words: “I plead the fifth” (referring to the fifth amendment of the constitution of the United States of America, which defends against self-incrimination).

Unlike corrupt politicians such as Lerner, pleading the fifth may not always be an option for the rest of us everyday citizens.  Everything you do, when watched and recorded for years, can amount to self-incrimination.  It has been estimated that the average person commits about three felonies a day, just going about their daily life.  This has occurred as a result of an explosion in federal laws and regulations, as well as those laws becoming more and more vague and malleable.  If you become a target for whatever reason, your data can be sifted through, and within it, something will be found to charge you with.  This occurred with members of the conservative Tea Party movement, as well as members of the liberal Occupy Wallstreet movement.  This shows that the state does not take sides in terms of politics.  Anyone disrupting the status quo can be labeled a threat and dealt with.

Perhaps the best speech ever given on the subject of privacy comes from Glenn Greenwald, the journalist at The Guardian who first broke the Snowden story:

In addition to so-called “privacy” concerns (which have more to do with potential government overreach and protection of individual rights than just wanting to be private), cybersecurity has shown to be of the utmost importance in recent years.

Historic Hacks Shed Light on The Value of Security

A number of high-profile hacks have happened in the recent past.  Among them are the Yahoo hack (largest in history), hacking of several large retailers and their customer’s data, and a laundry list of cloud-hosting companies such as Dropbox being compromised (do a search for “cloud data break” or “cloud hacking” – you’ll be shocked).  That’s not to mention the recent Meltdown and Spectre revelations, which dwarf everything else in terms of cybersecurity flaws.

Now that you’ve been terrified by the insecurity of the Internet and the potential misuses of your data (if not, you should be), this brings us to the question: what can be done about it?

 Fortunately, there are several steps that anyone can take in order to make the vast majority of one’s online activity, including financial data, both secure and private.  And as we will see, they are simple, easy, and affordable.

Let’s begin with something most people do every day: email.

Cybersecurity Basics

All of your emails can be accessed and viewed by the company that holds them.  The company can also be required to hand this data over to government spy agencies.  This isn’t very secure at all, and it’s definitely not private by any means.

Alternatives to the many mainstream email providers do exist.  One of the most popular is Protonmail.  Protonmail uses advanced encryption on all of its servers.  This makes it much more difficult for your messages to be intercepted.  In addition, even the company itself cannot access your data.  From

“ProtonMail’s zero access architecture means that your data is encrypted in a way that makes it inaccessible to us. Data is encrypted on the client side using an encryption key that we do not have access to. This means we don’t have the technical ability to decrypt your messages, and as a result, we are unable to hand your data over to third parties. With ProtonMail, privacy isn’t just a promise, it is mathematically ensured. For this reason, we are also unable to do data recovery. If you forget your password, we cannot recover your data.”

This also ensures that ProtonMail cannot hand over your information to spy agencies, even if it wanted to.  In addition, your most sensitive information, such as financial communications, will be far more secure.    

ProtonMail provides free accounts with a 500-megabyte storage limit.  For a small monthly fee, you can also upgrade to accounts with additional storage and features.  If you can afford it, I definitely recommend this option.  Not only will you support their efforts, but you also get added features such as using your own domain, access to aliases, and priority customer support.

If for some reason you don’t like Protonmail, alternatives do exist, but won’t be covered in detail here.  If you’re interested, just do a search for “ProtonMail alternatives”, or something similar.  (Side note on search engines – for privacy concerns, do not use Google – they keep an archive of everything you search for and click on.  Consider as an alternative  They use Google’s results, but do not track your movements.  In addition, they allow you to view external links using a proxy server, meaning your activity will appear to be coming from a server other than your personal computer or mobile device.). is also a reasonable alternative.

Your email can be made secure and private with relative ease, but what about your browsing habits and IP address?  Options exist there as well.

Tor and VPNs

The two most common options for securing and protecting what you view and do online include the Tor network and Virtual Private Networks (VPNs).

The following definition of Tor comes from

“Tor (The Onion Router) – The largest implementation of onion routing, which is a method for transmitting data anonymously over the Internet. Run by volunteers, there are approximately a thousand Tor proxy servers on the Internet that provide the routing paths.”

In essence, Tor works via a network of proxy servers.  When you utilize Tor, the network makes it appear as though your device is communicating with one of their servers, rather than whatever you are really doing.  This provides anonymity and some measure of cybersecurity (although the Tor network has proven to be vulnerable in the past).

While Tor is a free service, VPNs come with a small price.  For as little as three to four dollars per month, you can both encrypt your activity and cloak your IP address.  VPNs are a great step to take toward better cybersecurity, and an easy one to use.

The following definition of a VPN comes from

“A Virtual Private Network (VPN) is a network technology that creates a secure network connection over a public network such as the Internet or a private network owned by a service provider. Large corporations, educational institutions, and government agencies use VPN technology to enable remote users to securely connect to a private network.”

 A VPN can connect multiple sites over a large distance just like a Wide Area Network (WAN). VPNs are often used to extend intranets worldwide to disseminate information and news to a wide user base. Educational institutions use VPNs to connect campuses that can be distributed across the country or around the world.”

For a list of popular VPN services, search for “Top Ten VPNs”.  Shop around for the best deal.

When using a VPN, you can typically install it on up to five devices.  So your laptop, smartphone, tablet, and two other devices can all be made secure and anonymous.  It’s simple enough that if you can access this webpage and read this article, you can install and use a VPN.

You can choose between a number of servers to route your IP address through, located in locations around the globe.  Most often, a server in your home country will have the least delay.  When using foreign servers, you may experience a slight lag time in browsing.

To be sure, securing your communications and computer system will not mean much if your accounts do not have the appropriate safeguards in place.

Encrypted Passwords & 2 FA

Now let’s turn our attention to more local aspects of cybersecurity.  One of the first things to do that is even easier than what has been described so far involves using encrypted passwords and two-factor authentication (2 FA).  Most financial institutions (e.g., PayPal and Bank of America) now provide options for two-factor authentication.

2 FA works by requiring (you guessed it) two factors in order to verify your identity.  First, you will need a password, which I’ll tell you how to encrypt in just a moment.  Then, you will be sent either an SMS text message or email containing a six-digit numerical code.  You will enter this code before gaining access to your account.

Now, when it comes to passwords, what is considered secure?  Hackers can use sophisticated cracking programs in order to try millions of potential character combinations in a matter of seconds.  To defend against this, you must create a complex password.  A few simple methods exist to do this (side note – remember when John Podesta had his email account hacked and the data released to Wikileaks?  Believe it or not, his password was: p@ssw0rd.  Hah!  It’s no wonder he got hacked!)

First, take a word.  Let’s try: security.

Let’s add some special characters – secur!ty&.

Now throw in a few numbers – 1s3cur!ty&

Finally, add capital letters – 1S3cUr!Ty&.

Now you have a far more secure password.  Yet it can be made better still.

This example is only ten characters long – a bare minimum.  I recommend at least twelve to fifteen characters or more.  This can be done either by adding random characters or creating a physical pattern on your keyboard.

For example N^B%v4c3X@Z! looks random and very secure.  But if you type these characters, you will see a pattern.  The pattern alternates between a letter on the bottom line and a number on the top.  The first four holding Shift, the next four without Shift, and so on.

This is just one example out of an infinite number of such patterns that can be created.  If someone looks over your shoulder, they may decipher the code with ease.  But in this digital age, that’s not our main concern.

Now that we’ve covered the basics, allow me to mention a few random facts.  Let’s briefly look at Secured Socket Layer (SSL) tech and Google account options.

Websites can obtain an SSL certificate.  This encrypts the data sent between the site and its visitors.  For most sites, the simplest version will do.  For e-commerce sites, however, a more elaborate (and expensive) version will be required.  When you see the padlock symbol in the URL bar of your browser, along with https:// instead of HTTP://, you can be assured that no one will access anything you submit to that website (email address, credit card numbers, etc.).  This blog does not have an SSL certificate for the simple fact that readers don’t enter any information here other than an email address (because you subscribed to my mailing list, of course).

Even having taken all the steps above, Google can still track much of the moves you make online (in some online communities, Google gets referred to as “Big Brother”, and for good reason!).  They do this by tracking your Google account, connected to your Youtube, Gmail, and Google Plus accounts.  If you don’t use those three sites, just delete your Google account.  But if you do use them, you can either go into your account or click the arrow displayed on a Google Adsense ad.  You can then access your options and turn off many of the tracking features (this takes a bit of poking around, but if you’ve read this far, I trust you’re more than capable of getting there on your own).  In addition, you may want to delete what has been tracked up to the present.


So there you have it.  If you do everything described above, you will be taking some serious action toward making your activity online more secure and private.  The more business you conduct online, and the more wealth you store within the digital realm, the more vital cybersecurity becomes. 

We should all feel a personal obligation to take this matter into our own hands.  We must not allow spy agencies to do as they see fit with our data, violating our rights in the process.  And we must remain vigilant against the ever-growing threat of hackers and cybercriminals.  One can work toward accomplishing this by utilizing encrypted emails, VPNs or the Tor network, SSL certificates, and encrypted passwords combined with two-factor authentication.

As a disclaimer, keep in mind that the author of this article has no formal education in matters of cybersecurity or computer science.  What has been described results from little more than self-education and is only the tip of the proverbial iceberg.

There’s more to cybersecurity than one article can hope to describe, as one might imagine.  Protecting your data from all manner of digital predators grows more vital with each passing day.

I encourage you to educate yourself on the elementary aspects of cybersecurity.  It will be worth it.

Freedom of speech today

Oppression of freedom of speech comes in many forms. The most overt form arises when dictators control the flow of information and silence all dissenting voices. Countries like Saudi Arabia are prime examples.

However, more covert mechanisms of controlling freedom of speech and freedom of thought also exist. Those in power utilize more subtle and hidden forms of oppression in wealthy Western countries where the populace is more likely to stage a successful revolution.

Conspiracy theory

Of all the means of silencing dissenting voices, none have ever proven so fruitful as the term “conspiracy theory”. These two words have an uncanny, almost supernatural ability to shut down all intelligent discourse and rational conversation on almost any topic. All you have to do is mention a simple fact – say, for example, that jet fuel can’t melt steel beams or collapse an entire high-rise building at free-fall speed – and most people will slap the conspiracy theorist label on you.

What’s remarkable is the hypocrisy of it all. You don’t even have to suggest that a conspiracy exists to be called this pejorative term. And yet those who will label you as such in the style of a fifth-grade bully fail to see that they are the ones speaking of conspiracy nonsense. You never said anything about any conspiracy. And yet here they are, accusing you of the very thing they are doing.

Social shaming is a powerful mechanism. Human beings are social animals. We have a built-in need to fit in and be accepted by others. This stems all the way back to our hunter-gatherer times, where being shunned by the tribe often meant certain death.

Today this takes the form of accepting official narratives force-fed to us by mass media. The overwhelming majority of people alive today do not have the courage to face simple facts that may bring unwanted and unpleasant feelings of pain, anguish, fear, or distress. They would much rather believe whatever makes them feel good and ignore or deny everything that contradicts whatever leads to those feelings.

As Ayn Rand once said, “you can avoid reality, but you cannot avoid the consequences of avoiding reality”. At some point, people’s weakness in accepting reality will always catch up with them. If you lack the courage to face facts, your world will one day come crumbling down around you.

All in all, a tyranny of the mind is a far greater threat than a tyranny by physical force. Those in throes of mental manipulation cannot see how they have been blinded. They will never know or even suspect that they are being controlled, and they would not believe or even care if someone told them. This kind of control has far greater power, as it cannot be resisted.  What cannot be perceived cannot be fought.

These days, most everything is a conspiracy. By making fun of those who ask questions, point out simple facts, or see through various facades, those in power have somehow achieved complete and total silencing of the truth via methods of social shaming similar to those used by children in elementary school.  We must not allow our freedom of speech to be silenced in this manner.

Fight back

Fight back against silence

The only way to combat such mental tyranny is to never back down. How does one deal with a childhood bully in school? Beat him into the ground. There is no other solution. The bully will not understand anything else. No substitute for brute force exists. While we are indoctrinated to believe that violence solves nothing, there are times when nothing gets solved without violence.

Thankfully, being bullied by weak and feeble-minded adults does not require physical violence. It simply involves facing facts, having the courage to state them to others, and never backing down. So not shy away when faced with the conspiracy lunacy nonsense. Do not fail to speak your mind when you know things don’t add up. And don’t hesitate to ask questions to those who sheepishly buy into ideas that make no sense.

That last point bears repeating. Asking questions often can prove far more productive than anything else. By asking someone a question regarding their line of thought, they will have to begin formulating an answer. And in doing so, they will see that their conclusion does not add up.   Often times this is the only way to burst their pathetic little bubble.  Do not let childhood bullies take away your freedom of speech.

Vegas Shooting and the Coming Restrictions on Freedom

Three weeks prior to the largest mass shooting in American history, a mysterious thread on one of the Internet’s largest messaging boards appears to have foreshadowed the event. allows users to post anonymously. The user, who referred to himself as “John”, somehow seemed to have known in advance that a violent event involving large numbers of people was imminent within Las Vegas.  Did he have foreknowledge of the Vegas shooting?

He warned people who live in Vegas to stay inside and avoid large groups. He seems to have believed that something would happen on Sept.11th or soon thereafter. How could anyone know this unless the event was planned and coordinated in advance? Was this yet another false flag to justify further increases in security and decreases in freedom?  Is this an indication that the coming economic crisis draws nearer?

I recommend reading the threads in detail. They describe the true motives behind the Vegas shooting. There are people who stand to profit from this if new laws end up being passed as a result.

Other ominous warnings, unanswered questions

In addition, someone else apparently unconnected to the alleged shooter also had foreknowledge of the violence. Sky News reports that 45 minutes prior to the first shots ringing out, a woman walked through the crowd saying “you’re all going to die tonight”. She was later escorted off the premises by security.

There is a host of unanswered questions regarding the Vegas shooting. Images clearly show two windows being broken. The windows appear ten rooms apart. Police scanner audio indicates that law enforcement saw at least two shooters, which corroborates the audio recordings of multiple weapons firing simultaneously. Why did it take police 72 minutes to find the alleged shooter? The suspect has been widely reported as taking his own life. Yet why does CBS report that a veteran led the police to him, saying that they “took him out”? How does someone smuggle twenty-three large rifles with a thousand rounds of ammo into a hotel room without anyone noticing the extra luggage? Why have we not yet seen any video from inside Mandalay Bay? The list goes on.

Such a high casualty event necessitates extensive planning and training. There is no possible way that one lone lunatic somehow smuggled 23 rifles into Mandalay Bay and let off over 600 rounds within 9 minutes killing 59 people.

Vegas shooting used by some to promote political agendas

As happens all too often after such tragedies, politicians and others immediately began exploiting the incident to push their own personal agendas. Within less than twenty-four hours of the last shots being fired, Hillary Clinton and others were calling for gun control. Late Night hosts Jimmy Kimmel and Stephen Colbert echoed similar sentiments. Why do these people not speak out regarding the violence that occurs on a regular basis in cities like Los Angeles, Chicago, New York, etc.?

Media and “alt media” psychological operations

Within hours of the Vegas shooting, Alex Jones and his Infowars team began reporting about the conspiratorial aspects of the event.

One needs only to have scrolled through the hashtag on Twitter #alexjones during Monday afternoon to see the scores of news outlets that immediately began tweeting the “conspiracy theories” of Jones and his followers. It’s as if a mockingbird sang a sweet song of a ludicrous nature that got picked up by other mockingbirds. They all joined in a chorus of the mockery of Jones, and by extension anyone else who questions anything about the official narrative of events.

What does all of this accomplish? One thing in particular: anyone who questions the official narrative becomes associated with these questionable characters, and therefore is seen in a similar light. All dialogue around anything related gets shut down by the many masses of people tuned into the mainstream matrix.

In addition, it plays right into the divide and conquer strategy being deployed on so many levels at present. Jones and his followers also continue to promote the baseless idea that the shooter had Antifa literature in his room.   But wait, wasn’t this a false flag perpetrated by someone other than the shooter? Such glaring inconsistencies make it difficult to take this joker seriously.


All indications are that the Vegas shooting was a false flag carried out by black ops agents of some sort. Who carried it out is not as important as what it will be used to justify.

It will be used as an excuse to increase security protocol and infringe upon our freedoms. Metal detectors and X-ray imaging machines and the like will become mandatory in public places. Everywhere you go may soon resemble airport security.

Already, the Rose Bowl is seeing massive amounts of security -in response to what, exactly? If the shooter indeed acted alone, and had no obvious motive, what need exists for increased security at all? If one assumes the official narrative is true, then the actions being presented as a solution to or response of this attack do not make any sense.

This is nothing more than another giant leap forward into a police state. The terrible tragedy is already being exploited to that end. We must stop giving in to this fear. How can the public allow themselves to be manipulated to this extreme?

Of course, mainstream news has begun to show all of the false flag mass shooting of recent years in succession, implying that “something must be done”. “How can we continue to do nothing?” they ask, either directly or implicitly. As if anything can be done in the first place, other than limiting freedoms.

That may be the easiest way to distinguish these false flags from genuine, spontaneous acts of violence and terror. When it was planned and coordinated by the power structure, calls for more laws and regulation and pleas to “do something” immediately follow the incident. Meanwhile, people get shot and killed day after day in large metropolitan areas (and other areas) and no one says anything at all.

My next post will cover the police scanner broadcast in detail. There are many shocking details revealed within. Evidence exists there that proves beyond any shadow of a doubt that the official narrative has no basis in reality. More to come on that later.

Real people died and were injured in the Vegas shooting. Let us pray for the victims and their families. We owe it to them to ask the hard questions, investigate the evidence, and get to the bottom of things.