Category Archives: Features

Another Potential Coverup Looms in America

In part one of our series on Data Rape and Brainjacking, we focused on describing systems that are in place in industry and the criminal world that allow organic networks to follow people and steal information by compromising the employee or executive that is being attacked. Part Two is about the government role and how it is hindering public safety by suppressing or ignoring important information that the public needs to protect itself.

End of Summer in Baja California: a warm morning with not a cloud in the sky. As the taxi draws to a stop on the hillside overlooking the Pacific Ocean, a high school boy wearing short sleeves and a fur lined hat that covers his ears climbs aboard. In most places the extreme winter gear on a 70 degree morning would seem out of place. In Rosarito, Mexico it is a more common form of protection from people hitting you in the head from afar with a sonic weapon.

US: Military Intelligence Owns Your Phone Data

US Citizens, residents and visitors will have at least two more years of blanket government collection of their phone records after Congress rejected a proposal to end the NSA’s practice of collecting all phone records of domestic calls.

The distinction that was being argued about in Washington D.C. was clear.

Peru: Archaeologist Giersz shows his hand- 3 Queens, Gold found in Royal Tomb

As a poker hand, 3 queens is nothing to sneeze at.  If you are an archaeologist in the 21st century, happening upon an undisturbed tomb that contains 3 queens and all of the possessions traditionally buried with royalty after their death can be priceless.

So when Milosz Giersz, the head of a University of Warsaw research team reported his findings to National Geographic , stating that “We are talking about the first, unearthed royal imperial tomb.”,  there was a lot of excitement in the region.

Of Data Rape and Brain Jacking: Part One Corporate Espionage

Twelve years ago, when information thieves wanted data from someone who had access to the entire codebase for one of the world’s largest security software firms, they used a rudimentary form of conditioning response to attack the person in their home by hitting them with electro-magnetic waves combined with sonic weapons and microwaves.