Domestic extremist is code for terrorist. Anarchists, militia and sovereign citizens have been classified as such along with many other groups not
having anything to do with terrorism. Hackers are considered soldiers and feared more than physical threats by governments worldwide. Anonymous was
accused of plotting to bring down the power grid, an attempt to scare governments into action against them. Occupy Wallstreet had snipers trained on
them several times despite being peaceful. Everyone remembers the MIAC report citing Ron Paul supporters as threats. Even privacy advocates that just
talk about encryption or anonymity tools are extremists now. “Political language is designed to make lies sound truthful and murder respectable, and
to give an appearance of solidity to pure wind.” -Orwell. These tactics are used to enable the roll out of counter terrorism tactics on anyone
they’ve labeled. Whether you’re protesting in the street, protesting taxes or the state itself you’re now an extremist threat.
COINTELPRO tactics are not new but the FBI using the NSA’s capability’s without warrants against domestic persons for anything federal agencies
want is new. It’s not just that they’re spying on people they dislike, hacking has become common place in their investigations. They’re being
allowed to use the same highly sophisticated MITM injection techniques and likely the same type of malware being used against foreign terror suspects
(if it’s the FBI whos hacking me). They’re creating modern day witch hunts against certain political targets that if convicted would advance their
agenda in the media.
Challenges to the status quo of bureaucratic dictatorship, executive overreach or systemic corruption can lead to you being treated as a terrorist.
This is the new reality. There is little middle ground between enemy of the state and globalist minion. This is the Bush era’s “If you’re not
with us you’re with the terrorists” mentality. The surveillance state has decided that the fourth amendment is no longer relevant, that the rule
of law is for us to follow not them. The select few that oversee the massive secret government rubber stamp everything and encourage the most invasive
underhanded tactics. The end justifies the means in the age of terror.
They’re currently seeking to shift the Overton window right now on backdoors but hacking is next. Specifically they want to be allowed to present
evidence in court from their hacking exploits but not be forced to reveal methods or the code involved. If this is allowed to pass you will be
accepting a secret police that can at their will hack into your computer, view anything they want and if they want, frame you. You would have no
ability to have experts challenge evidence because without the methods being exposed there’s nothing to challenge. The court would be forced to
trust the FBI or other federal agency. Parallel construction already works in a similar fashion where one agency hands another inadmissible or
secretly gathered evidence and forces agents to lie on the stand about how they became aware of certain facts.
Government shouldn’t be trusted with god like omniscience or Hollywood hacker style exploits, no one should. To hack someone is more of an intimate
search than rifling through their car or home. Most people keep every detail of their life on their devices, their pictures, video’s, contacts etc.
This type of search is not trivial, it’s not necessary in any way for people whom are just politically active or peaceful foes of the government.
This is NOT how open free societies are supposed to run. Warrants are an essential check on government to prevent arbitrary searches. If a legal
search turns up evidence prosecute or move on. Only they don’t move on, you stay on the list until you become uninteresting or die. I know from
The only way to prove government hacking today is to have a lot of money and very smart experts. Even then the best like Kaspersky can only get a few
lines of ineligible code out of the samples they analyze, this makes attribution a loose patchwork of connections. This is a government that makes
F-22’s if you’re thinking a guy like me can “prove” that I got hacked by government you’re dreaming. Hacked in general, that’s not too
hard to prove. The method they use to get it on a computer is the smoking gun of government intrusion. Most people have no clue that /they’re
hacked, they’re oblivious. For this reason they’re brazen they really can’t get caught even if you’re able to grab a sample or capture every
packet. It’s totally deniable on every level.
What’s stopping them from using this on everyone? Laws? Congress? Diane Feinstein? Never going to happen they’re cheerleaders if anything. Even if
you had real proof it would go nowhere, government won’t prosecute or stop itself. No one in the power structure cares as long as it doesn’t end
up in the news. It’s actually much more likely given their history and what’s come out with Snowden that they’re hacking absolutely anyone of
interest or as much as their budget can handle. A 60 billion dollar budget mind you. Hacking is the new wiretap.
They already “collect it all” but that isn’t enough. End to end encryption along with anonymity tools like Tor introduce blind spots for them.
To a power crazed predator this is completely unacceptable. They have a complete disregard for your privacy, it’s a word without meaning to them.
Any communication they can’t read is a threat. Absolute control of what they increasingly see as a prison population (no crypto for inmates!) is
their endgame. We’re not being treated like US citizens the methods and ideology being used today is more in tune with an occupation than law and
I’m going to give you some of what I’ve learned about mitigating state level threats but if you don’t have some minimal experience with linux,
networking and computers in general this will be very difficult. I’m assuming you’ve read a few books on computer security / hacking because
without it you could have the best setup and fail due to simple misconfigurations let alone having an advanced adversary try to pick you apart. If you
don’t have these prerequisites you can however use a live Tails or Subgraph DVD and still have decent security.
Your starting point to the internet matters because of timing attacks / metadata. Public WIFI, anonymously bought 3G/4G dongles (used at locations not
associated with you) or connections not belonging to you significantly decreases the chances of correlation in real time or at a later date. Tor is
not magical it’s just three hops and governments own many of the nodes. Governments also share data with each other to identify Tor users.
What you read in the news about how they figure people out is mostly BS. They already know then put together something they can use in court and for
media headlines. Whats a good bust without a good sleuth story demonstrating the competence and sophistication of the arresting agency? There’s a
huge difference between the government knowing you’re part of a movement or group and proving it in court. Most of the time they can’t use the
evidence 1. because it’s illegally obtained and 2. they would have to expose how they obtained it. They don’t expose methods to the public even
when it comes to very large and important cases.
I have the rest at www.thelasersshadow.com...