- Censorship of GitHub https://en.wikipedia.org/wiki/Censorship_of_GitHub
- Stackexchange Questions - My GitHub account has been suddenly "flagged" and hidden from public view - how come?
- Identity: the unique set of characteristics that can be used to identify a person and their unique physical body as themself and no one else.
- Pseudonymity: the near-anonymous state in which a person has a consistent identifier that is not their real name.
- Anonymity: the state of a person's identity being unknown to all other people than themself.
👷🛠️UNDER CONSTRUCTION🚧🏗
IDENTITY / PRIVACY LEVEL | PUBLIC | SEMI-PRIVATE | PRIVATE |
---|---|---|---|
TRUE IDENTITY |
|
|
|
PSEUDONYMITY |
|
|
|
ANONYMITY |
|
|
|
- Whonix - Tips on Remaining Anonymous
- Whonix - Study: Anonymity and Pseudonymity are not the same.
- Adrelanos - Do not Mix Anonymity Modes
Flag Theory - https://flagtheory.com
EFF’s “Street-Level Surveillance” - https://eff.org/sls
https://dni.gov/index.php/what-we-do/what-is-intelligence
"The intelligence cycle is a process of collecting information and developing it into intelligence for use by IC customers. The steps in the process are direction, collection, processing, exploitation, and dissemination. IC products can either be based on a single type of collection or “all-source,” that is, based upon all available types of collection. IC products also can be produced by one IC element or coordinated with other IC elements, and delivered to IC customers in various formats, including papers, digital media, briefings, maps, graphics, videos, and other distribution methods."
SIGINT — Signals intelligence is derived from signal intercepts comprising -- however transmitted -- either individually or in combination: all communications intelligence (COMINT), electronic intelligence (ELINT) and foreign instrumentation signals intelligence (FISINT). The National Security Agency is responsible for collecting, processing, and reporting SIGINT. The National SIGINT Committee within NSA advises the Director, NSA, and the DNI on SIGINT policy issues and manages the SIGINT requirements system.
IMINT — Imagery Intelligence includes representations of objects reproduced electronically or by optical means on film, electronic display devices, or other media. Imagery can be derived from visual photography, radar sensors, and electro-optics. NGA is the manager for all imagery intelligence activities, both classified and unclassified, within the government, including requirements, collection, processing, exploitation, dissemination, archiving, and retrieval.
MASINT — Measurement and Signature Intelligence is information produced by quantitative and qualitative analysis of physical attributes of targets and events to characterize, locate, and identify them. MASINT exploits a variety of phenomenologies, from a variety of sensors and platforms, to support signature development and analysis, to perform technical analysis, and to detect, characterize, locate and identify targets and events. MASINT is derived from specialized, technically-derived measurements of physical phenomenon intrinsic to an object or event and it includes the use of quantitative signatures to interpret the data. The Director of DIA is both the “Intelligence Community Functional Manager for MASINT” and the “DOD MASINT Manager.” The National MASINT Office (NMO) manages and executes MASINT services of common concern and related activities for the D/DIA in response to National and Department of Defense requirements. If interested in learning more about MASINT, check out the NMO's primer here.
HUMINT — Human intelligence is derived from human sources. To the public, HUMINT remains synonymous with espionage and clandestine activities; however, most of HUMINT collection is performed by overt collectors such as strategic debriefers and military attaches. It is the oldest method for collecting information, and until the technical revolution of the mid- to late 20th century, it was the primary source of intelligence.
OSINT — Open-Source Intelligence is publicly available information appearing in print or electronic form including radio, television, newspapers, journals, the Internet, commercial databases, and videos, graphics, and drawings. While open-source collection responsibilities are broadly distributed through the IC, the major collectors are the DNI's Open Source Center (OSC) and the National Air and Space Intelligence Center (NASIC).
GEOINT — Geospatial Intelligence is the analysis and visual representation of security related activities on the earth. It is produced through an integration of imagery, imagery intelligence, and geospatial information.
PUBLIC INTERNATIONAL LAW | |||
---|---|---|---|
LAWS OF WAR | LAWS OF PEACE | ||
"Jus ad bellum" | "Jus in Bello" | Occupation and "Jus Post Bellum" | Human Rights Law |
The international rules pertaining to which extent the use of military force against another state is allowed. | The international rules pertaining to how armed conflict must be conducted. | The Justice at the end of the war, helps move from conflict to peace.Reasonable
peace treaties, civilian population should be protected,
leaders who broke Hague/Geneva laws must face prosecution, cities must be reconstructed. |
International Bill on Human Rights. Treaties and Conventions. Covenats and Declarations. |
👷🛠️UNDER CONSTRUCTION🚧🏗
Anonymous Developer
How to Create an Anonymous GitHub Account
OUTDATED!
This guide will help you set up an anonymous developer account:
- Create a new browser profile:
- Firefox: Profile Manager
- Chrome: Create a profile
- Create a new ProtonMail account:
- ProtonMail does not require personally identifiable information.
- For recovery options, avoid using an email or phone number that could reveal your identity.
- Create a ProtonVPN account:
- Use this VPN whenever you are in anon mode.
- Create a GitHub
account with your new email:
- Generate new SSH keys and add them to your GitHub account.
- Create a new Twitter account using your new identity.
- Create a new Reddit account:
- Use a relevant subreddit to obtain a unique profile picture for your anonymous account.
- Create accounts on CryptPad and HackMD for encrypted note-taking and storage.
- Visit PrivacyTools.io for additional privacy tools.
- (Optional) Install uBlock Origin, Privacy Badger, and HTTPS Everywhere in your new browser profile.
- For further reading, check out 0xngmi's guide for staying anonymous.
Credits: GitHub
Secure Systems
For anonymity and secure browsing. See the Tor Wiki for operational security tips.
Visit Whonix for information and community support.
Learn more about protection measures on Whonix's Protocol Leak Protection page.
Learn more about Qubes OS and visit the Qubes forum for discussions.
For a comparison, visit this comparison page.
Explore various attacks on Tor at GitHub.
Secure Internet
- That One Privacy Site
- PrivacyTools.io target="_blank" rel="noreferrer">Choosing the VPN That's Right for You
- VPN Alert
- r/vpnrecommendations
- r/VPN Wiki
- r/VPNTorrents
- Choosing the Best VPN
- Torrent VPN Setup
- That One Privacy Site VPN Section rel="noreferrer">VPN over SSH
- Mullvad
- Mullvad (Onion)
- ProtonVPN
- AirVPN
- IVPN
- VPN.XXX
- Windscribe
- ExpressVPN
- Private Internet Access
- NordVPN
Secure Communication
Feature | Telegram | SimpleX | Session |
---|---|---|---|
Protocol Type | MTProto | Custom (Double Ratchet) | LibP2P |
Primary Use Case | General messaging, media sharing | Privacy-focused messaging | Anonymous, decentralized messaging |
Encryption | Client-server encryption (default), End-to-end encryption (Secret Chats) | End-to-end encryption (default) | End-to-end encryption (default) |
Decentralization | Centralized servers | Decentralized communication nodes | Fully decentralized (no central servers) |
Identity Management | Phone number-based | Username-based (no phone number required) | Anonymous (no phone number or email required) |
Message Persistence | Cloud storage (optional local storage) | Client-side only (no cloud storage) | Client-side only (no cloud storage) |
Group Chats | Up to 200,000 members | Supported | Supported |
File Sharing | Supports large files (up to 2GB) | Limited to client-side capacity | Limited to client-side capacity |
Metadata Protection | Limited (metadata stored on servers) | Strong (no central server metadata storage) | Strong (no central server metadata storage) |
Open Source | Partially (client is open-source, server is proprietary) | Fully open-source | Fully open-source |
Cross-Platform Availability | iOS, Android, Windows, macOS, Linux, Web | iOS, Android, Linux, Web | iOS, Android, Windows, macOS, Linux |
License | Custom (Telegram license) | AGPLv3 | GPLv3 |
"Reticulum is the cryptography-based networking stack for building local and wide-area networks with readily available hardware. Reticulum can continue to operate even in adverse conditions with very high latency and extremely low bandwidth.
The vision of Reticulum is to allow anyone to operate their own sovereign communication networks, and to make it cheap and easy to cover vast areas with a myriad of independent, interconnectable and autonomous networks. Reticulum is Unstoppable Networks for The People."
- Reticulum Network - A complete networking stack.
- Anonymous Chat, IRC, XMPP in Whonix: whonix.org/wiki/Chat
- XMPP vs Matrix vs MQTT: rst.software/blog
Feature | XMPP | Matrix | MQTT |
---|---|---|---|
Protocol Type | XML-based messaging protocol | Real-time communication protocol | Lightweight messaging protocol |
Primary Use Case | Instant messaging, presence | Decentralized messaging, VoIP | IoT, M2M communication |
Architecture | Client-server | Decentralized (federated) | Client-broker |
Scalability | Scalable with federated servers | Highly scalable with federation | Highly scalable with broker clusters |
Message Format | XML | JSON | Binary (Optimized for low bandwidth) |
Security | Supports TLS, SASL, and end-to-end encryption (OMEMO) | Supports TLS and end-to-end encryption (Olm, Megolm) | Supports TLS, username/password, and client certificates |
Offline Messaging | Supported | Supported | Supported (via retained messages) |
Quality of Service (QoS) | Basic message delivery with presence notifications | Basic message delivery with event notifications | Three levels: 0 (at most once), 1 (at least once), 2 (exactly once) |
Supported Clients | Wide range of clients (e.g., Pidgin, Gajim) | Wide range of clients (e.g., Element, FluffyChat) | Numerous IoT clients (e.g., Eclipse Paho, Mosquitto) |
Extensibility | Highly extensible with XEPs (XMPP Extension Protocols) | Extensible via custom events and modules | Extensible with custom topics and payloads |
License | Open standard (IETF RFCs) | Open standard (Matrix.org) | Open standard (OASIS) |
- hs3x.com
- smsget.net
- sms-online.co
- catchsms.com
- sms-receive.net
- sms.sellaite.com
- receivefreesms.net
- receive-a-sms.com
- receivesmsonline.in
- receivefreesms.com
- receivesmsonline.me
- smsreceivefree.com
- smsreceiveonline.com
- receive-sms-online.com
- receivesmsonline.net
- temp-mails.com
- freeonlinephone.org
- getfreesmsnumber.com
Privacy-Focused Email
Email Aliases
Telegram
Be cautious of impersonators. Always verify Telegram bios as scammers may leave their own nickname blank. Beware of fake notifications about logins, phishing links, and fake bots that may DM you first. Check official Telegram news and tips channels.
“No regular Telegram chats (1:1 or group) are end-to-end encrypted. Only secret chats are E2E encrypted.”
- Phone Number → Who can see my phone number: Nobody
- Phone Number → Who can find me by my number: My Contacts
- Last Seen and Online → Who can see my timestamp: Nobody
- Profile Photo → Who can see my profile photo: My Contacts
- Calls → Who can call me: My Contacts (or Nobody)
- Calls → Peer-to-peer: My Contacts (or Nobody to avoid exposing your IP)
- When starting a call, verify the emojis at the top-right corner with the other person to prevent MitM attacks.
- Forwarded Messages → Who can add a link to my account: My Contacts
- Groups and Channels → Who can add me: My Contacts
- Disable sticker loop animations. Animated stickers are a security risk.
- Disable auto-downloading (Wi-Fi and cellular): Privacy and Security → Data Settings
- Set up 2FA (cloud password)
- Disable P2P calls and secret chats if you don’t want to expose your IP address.
- Disable link and image previews in secret chats: Privacy and Security settings
- Disable autoplay GIFs: Learn more
- Never activate or DM any Telegram bot. Only use public chat bots via commands.
- When opening PDFs (e.g., CVs), use Dangerzone or Google Drive's preview mode.
- Monitor active sessions and terminate inactive ones. Be wary of session stealers.
- If you receive a login alert, verify it through the official Telegram notification and news channels. Scammers may impersonate these to steal your account.
- Check out this Telegram security guide.
- Learn more about Telegram limitations: GitHub Project | Crowdin Translation
Discord
- Use a randomly generated password. Use password managers like KeePassXC or BitWarden to generate and store your passwords. Learn more.
- Enable two-factor authentication (2FA) in User Settings. Discord supports apps like Aegis or Authy (disable multi-device for better security).
- Configure privacy settings under Privacy and Safety. Choose whether to allow direct messages from server members. Note: some servers with Captcha or verification bots may require DMs to be open.
- In Privacy and Safety, set who can add you as a friend. For higher security, you can restrict friend requests to only server members or no one.
- Use a VPN. Alternatively, rent a VPS and set up your own open-source VPN server. Learn more.
- A scammer selects a victim from a Discord channel.
- The scammer creates a fake account impersonating the target.
- He begins causing trouble in the channel, leading to a ban.
- Using Discord Nitro tricks, the scammer fools moderators into banning the real target's account.
- After the ban, the scammer creates a fake discussion image showing the moderators banning the target.
- Pretending to be a moderator, the scammer contacts the target via DM, offering to help reverse the ban.
- The scammer creates urgency and asks the target to prove innocence by joining a Discord call.
- He instructs the target to open Discord Developer Tools and reveal their Discord token, giving full access to the account.
- The scammer then takes control of the target’s account, potentially causing damage to the victim or their organization.
Email and Social Media
Privacy-Focused Email Providers
Self-Hosted Email Solutions
- Burnermail.io
- AnonAddy.com
- SimpleLogin.io
- SimpleLogin (GitHub)
- Forward Email
- r/selfhosted Discussion on Throwaway Emails
Temporary Email Services
- Guerrilla Mail
- 10MinuteMail
- Temp-Mail
- AltMails
- Maildrop
- Snapmail
- Linshi Email
- Fake Mail Generator
- Chacuo - Mail Send
- Chacuo - Mail Anonymous
- Yopmail
- Mastodon(Decentralized, Twitter Alternative)
- Nostr(Decentralized Social Media Protocol)
- Lemmy(Decentralized, Reddit Alternative)
- Nitter(Privacy-Friendly Twitter Frontend)
- Diaspora(Decentralized, Facebook Alternative)
- Kbin(Decentralized, Reddit Alternative)
- Saidit.net(Reddit Alternative)
- Friendica(Decentralized, Facebook Alternative)
- Gettr(Free Speech Social Media)
- Truth Social(Free Speech Social Media)
- Okuna(Ethical Social Network)
- Gab(Free Speech Social Media)
- Hubzilla(Decentralized, Social Media and Web Publishing)
- Parler(Free Speech Social Media)
- Socialhome(Decentralized Social Media Platform)
- MeWe(Privacy-Focused Facebook Alternative)
- Twister(P2P Microblogging)
- Element(Decentralized Chat, Matrix Protocol)
- PixelFed(Decentralized, Instagram Alternative)
- Scuttlebutt(P2P Social Network)
- Minds(Free Speech Social Network)
- PeerTube (Decentralized, Open-Source YouTube Alternative)
- Invidious (Alternative YouTube Frontend, Privacy-Focused)
- FreeTube (Privacy-Focused YouTube Client)
- NewPipe (Lightweight YouTube Client for Android)
- Piped (Privacy-Respecting YouTube Frontend)
- yt-dlp (Command-Line YouTube Downloader with Advanced Features)
- UntrackMe (Redirect YouTube Links to Privacy-Friendly Frontends like Invidious)
- WriteFreely(Decentralized Blogging)
- Ghost(Open Source Blogging)
- Jekyll(Static Site Generator for Blogging)
- Medium(Popular Blogging Platform)
- Hashnode(Developer-Focused Blogging)
- Substack(Email Newsletters and Blogging)
- Telegraph (Instant View Page)
- HackMD (Collaborate and Document in Markdown)
- GitBook (Custom Docs platform)
- CryptPad (Encrypted Collaboration Platform)
- HedgeDoc (Collaborative Markdown Editor)
- Notion (All-in-One Workspace for Notes and Collaboration)
- Standard Notes (Private, Encrypted Note-Taking)
- Obsidian (Knowledge Base with Markdown)
- Slite (Collaborative Documentation Platform)
- Riseup Pad (Real-Time Collaborative Editing)
- Etherpad (Collaborative Text Editor)
Secure File Sharing
- OnionShare (Anonymous File Sharing via Tor)
- TempSend(Temporary File Sharing)
- WeTransfer(Simple File Sharing Service)
- Send Anywhere(Cross-Platform File Transfer)
- SendGB(Large File Transfers up to 5GB)
- Volafile(Temporary File Sharing with Live Chat)
- SendSpace(Send Large Files Easily)
- MyAirBridge(Secure File Transfer up to 20GB)
- Gofile(Free and Unlimited File Sharing)
- OTF (One-Time File)(Secure One-Time File Sharing)
- Bitwarden Send(Secure File & Text Sharing via Bitwarden)
- Filebin(Temporary File Uploads)
- AnonFiles(Anonymous File Upload Service)
- Transfer.sh(Command-Line File Sharing Service)
- File.io(One-Time Download File Sharing)
- Cryptshare(Encrypted Secure File Transfer)
- Tresorit(End-to-End Encrypted File Sharing)
- Firefox Send (Unofficial)(End-to-End Encrypted File Sharing)
- Wormhole(Encrypted File Sharing with Link Expiry)
- Syncthing(Decentralized File Sync and Sharing)
- Lufi(Encrypted Anonymous File Sharing)
- Magic Wormhole (Secure CLI-Based File Transfer)
- Drop.ch(Anonymous File Sharing with Expiry via Email)
- One-Time Link(Self-Destructing Encrypted Links)
- SecureShare(Temporary Encrypted File Links)
- SlashTmp(Temporary File Hosting)
Online Utilities
- Malpedia
- CVE Details
- Exploit Database
- FileInfo
- xCyclopedia
- The Windows Binary Index
- Palo Alto Applipedia
- Windows Security Logs
- National Vulnerability Database (NVD)
- IPVOID
- AbuseIPDB
- Grabify IP Logger
- IP Logger
- IP Tracker
- IP Location Tracker
- IP Location
- URL Checker
- MAC Address Lookup
- MAC Vendor
- Ip-api
- Ipify
- Ipapi
- Vpnapi
- Ipapi
- The ZMap Project
- WiGLE
- Shodan
- Censys
- urlscan.io
- Virus Total
- Hybrid Analysis
- Cuckoo Sandbox
- AlienVault OTX
- IBM X-Force Exchange
- Cisco Talos
- Maltiverse
- GreyNoise
- SANS Internet Storm Center
- Intelligence X
- MetaDefender Cloud
- RiskIQ Community Edition
- Pulsedive
- Valhalla YARA Rules
- ANY.RUN
- Binvis
- JoeSandbox
- Verexif
- Reverse Shell Generator
- Rainbow Tables (Hashes)
- File Signatures ("Magic Numbers")
- List of File Signatures
- CyberChef
- explainshell
- VirusShare
- Reverse.IT
- Commonly Used Software Development Tools
- DeHashed
- Dencode
- Text Fixer
- SS64 Syntax Utils
- Cryptii
- MD5Hashing
- Tools4noobs
- Regex Generator
- Regex101
- Cron Expression Generator
- Epoch Converter
- Text to ASCII Art Generator
- DeepL
- Markdown Toolbox
- Online LaTeX Equation Editor
- Mermaid
- Table Convert
- Tables Generator
- ffmpeg buddy
- Kutt your links shorter
- Grammarly
Generators
- This Person Does Not Exist
- This Waifu Does Not Exist
- These Cats Do Not Exist
- Gallery of AI Generated Faces | Generated.photos
- Pixel-me
- Artbreeder
- Comixify
- Which Face is Real?
- SPADE Project Page
- Selfie2Anime
- Reflect.tech
- PaddleGAN
- Random Pic
- Fake Name Generator
- Fake ID
- Fake Person/Name Generator
- Random User Generator
- Just Delete Me
- Fake Address, Random Address Generator
- Behind the Name
- Easy Random Name Picker
- Credit Card Generator
- Credit Card BINs generator and validator
- US SSN / Driver License (DL) / State ID / Passport / Tax ID Generator
- US Car License Plates Registration Tags Generator
- airob0t/idcardgenerator
- gh0stkey/RGPerson
- naozibuhao/idcard
- Fake Person/Name Generator | User Identity, Account and Profile Generator
- faker.js
- Full Contact Information Generator
- My Fake Information Generator and Validator
- Random Word Generator
- Random.org
- Username Generator
- Random Password Generator
- Meal Plan Generator
- Random Number Generator
- Fantasy Name Generator
- Plot Generator
- AI Writing Generator
- Weather Data Generator
- Citation Generator
- Character Generator
Others
https://torrentfreak.com
https://github.com/Igglybuff/awesome-piracy
https://github.com/lkrjangid1/Awesome-Warez
https://github.com/Illegal-Services/Illegal_Services
https://github.com/Lucetia/piracy
https://github.com/the-rarbg/yaps
https://reddit.com/r/Piracy
https://lemmy.dbzer0.com/c/piracy
https://bitmagnet.io
https://rentry.co/megathread
https://1337x.to
https://fitgirl-repacks.site
https://fmhy.net
https://github.com/syncthing/syncthing
https://github.com/anonaddy/anonaddy
https://reddit.com/r/selfhosted
• exifcleaner (GUI)- https://github.com/szTheory/exifcleaner
• Exif Pilot - https://colorpilot.com/exif.html
• Vereexif - https://verexif.com/en/
• Seceptive Design - https://deceptive.design
• Product Liability landmark - Omegle
https://whonix.org/wiki/MAC_Address
To opt-out of global maps (https://wigle.net), rename your network WiFi SSID to
andlt;SSIDandgt;_optout_nomap
*If it is not possible to hide the SSID or it is a commercial network.
Go to https://location.services.mozilla.com/optout
👷🛠️UNDER CONSTRUCTION🚧🏗
Biometrics Anti-surveillance
- Anti-Surveillance Glasses
- Anti-Surveillance Clothing
- Face Masks and Coverings
- Infrared and Reflective Materials
- 3D-Printed Masks
- Software for Makeup Alteration
Research paper: Invisible Mask: Practical Attacks on Face Recognition with Infrared
Technology overview: Facial Recognition Hat with Infrared
Read the research paper: Adversarial Mask Research Paper
Watch a video: Adversarial Mask Video
Read the research paper: Fawkes: Protecting Privacy against Unauthorized Deep Learning Models
GitHub repository: Fawkes GitHub
GitHub repository: Biometric Backdoors GitHub
Explore adversarial machine learning resources: Awesome Adversarial Machine Learning
Watch the presentation: Bypassing Biometric Systems with 3D Printing
Read about the most insane moments and stories from El Chapo's trial: The 10 Most Insane Moments and Stories from El Chapo's Trial
*DNA-generated estimation and voice analysis would deserve further study.
*Behavioral machine learning.
Physical Anti-surveillance
https://paladinpressbooks.com
https://us.artechhouse.com/storehome.aspx
Hidden Objects
• How to Hide Things in Public Places - Dennis Fiery
• DIY Secret Hiding Places: 90 Places To Hide What You Don't Want
Found! - Steve Plant
• The Big Book of Secret Hiding Places - Jack Luger
• https://boredpanda.com/how-to-hide-things-secret-hiding-places
• Hire an object storage service anonymously ("box self storage")
Trickery and Deception
There are various ways to circumvent the law. Generally, techniques fall under two main categories: Coercion/Power (e.g., intimidation, blackmail, torture) and Fraud/Deception (e.g., manipulating evidence, altering behavior, informal agreements, secretive tactics, or using third-party informants). In essence, as Machiavelli and Bentham suggested, "all means are permissible."
If you're savvy and aware of these tactics, you can turn the tables. By using your acting or cynical skills—similar to the way politicians do—you can become an “undercover agent of yourself” or engage in personal marketing.
- Interrogation Techniques: Build rapport or offer perceived advantages to coax information or confessions, often through casual conversation (e.g., discussing harmless topics like pets to disarm a suspect).
- Intimidation or Blackmail: Pressure individuals by threatening consequences, such as implying that “failure to cooperate will result in worse outcomes.”
- Surveillance: Leave someone alone with a secret recording device (e.g., a phone or recorder in a police station) to gather information unknowingly.
- Evidence Manipulation: Use torture or illegal access to computer systems (e.g., hacking) to acquire evidence. A judge in such a case might be seen as complicit (cuckold). Interesting case like Wong Sun v. United States, 371 U.S. 471 (1963).
- Tech-Based Evidence Manipulation: Employ backdoor access to systems or devices, often praised as OSINT (Open Source Intelligence) techniques.
- Tracking Evidence: Use tools like GPS devices (e.g., GSM chips, Apple AirTags) or surveillance technologies (e.g., drones, IMSI catchers, Kyllo v. United States) to monitor movements.
- Covert Agents: Utilize fake informants, such as a fake cellmate or an undercover agent planted within a group to gather information.
- Public Surveillance: Exploit facial recognition cameras, whether in public spaces, CCTV systems, or transportation hubs.
- Evidence Bias: Control the narrative by manipulating the context in which evidence is presented (e.g., showing evidence out of context to influence interpretation).
- Exploitation of Trusted Relationships: Coerce individuals (e.g., lawyers, doctors, clergy, family members) to break confidentiality, violating ethical guidelines.
- Human Sources Manipulation: Engage in covert conversations or interventions that lead the target to self-incriminate, often through subtle provocations or simulated scenarios.
- Provocation and Behavior Manipulation: Act as an agent provocateur to manipulate the target’s actions, further incriminating them or exacerbating the situation.
- Public Opinion Manipulation: Control public perception of a target by influencing media or online content, such as manipulating Google searches to highlight negative information.
- Conspiratorial Reasoning: Exploit natural biases to create perceived connections, often using conspiratorial thinking.
- Deliberate Provocation: Encourage specific reactions through baiting and trolling.
- Impersonation: Gain access to trusted communities by pretending to be someone else.
- Manufacturing Doubt: Undermine consensus by distorting scientific or factual information.
- Emotional Manipulation: Evoke strong emotions to cloud rational thought and decision-making.
- Polarization: Amplify division by highlighting differences between groups or individuals.
- Discrediting the Opponent: Attack the person rather than addressing their arguments directly.
These techniques focus on systematically discrediting a person's reputation. They involve a combination of true, verifiable information and false but plausible data to create doubt and mistrust. The goal is to weaken confidence in individuals, fostering suspicion within social groups. This method can also be used to manipulate professional or societal standing, such as through job demotion or forced relocation.
For example, as stated by the Stasi: “By systematically organizing failures—both real and fabricated—you create doubt in the individual’s personal perspective, eroding trust and generating internal division within groups or organizations.”
WeCopwatch
• "We Need More Copwatchers, Not Cops With Cameras" - https://wecopwatch.org
• Having possession of the evidence helps you have control of the
narrative.
• Your evidence loses power when you broadcast it live and allow the
police to write their use of force reports around your video. Film
the Police for the Victim.
• We suggest that you let the officers get their story together publicly.
Your video will contradict their testimony, and it is here that you
have the power to helpful.
Geolocation Strategy
• RV Van with starlink
• AirBnB paid with Monero
https://reddit.com/r/Monero/comments/75tm5q/i_have_created_a_crypto_airbnb_accepting_btc_and
• Multi-Family House
Multi-Family House with shared wifi.
• Coffee
Business Intelligence
• Financial Intelligence Units (FIUs)
• Automated triage of financial intelligence reports - Algorithms
• Artificial Intelligence, Machine Learning and Big Data in Finance
https://oecd.org/finance/financial-markets/Artificial-intelligence-machine-learning-big-data-in-finance.pdf
•
Criminal
Ways law enforcement investigate
• Trash Pull
• Backdoors and Malwares
• Digital forensics
• Search warrant
• Photographs enhancement techniques
• Video enhancement techniques
• Audio enhancement techniques
• Fingerprints
• DNA testing
• Blood tests
• Ballistics
• Undercover Employees, Informants, and Cooperating Witnesses
• Agent provocateur – Person who incites others to commit incriminating acts
• Nosy neighbors
• Interrogation techniques
• US Guantanamo
• SS Nazi Training
Intel References
- WikiLeaks
- DDoSecrets
- Cryptome
- Public Intelligence
- The Intercept
- Unredacted
- Cognitive Liberty
- Payback Politics
- Electrospaces.net
- MuckRock
Others
• Surveillance Report
https://surveillancereport.tech
• IntelTechniques
https://inteltechniques.com/links.html
Considerations
• "Nothing is political, everything is politicizable ".
• UN doesn't work as well as the Supreme Court.
• The technical apparatuses for "social control " that a "democratic " government can use for legitimate purposes are easily co-opted by "authoritarian " efforts and practices for the political persecution of "detractors " or "dissenters ". Could it be that after taking over the technical or power apparatus for "social control " there would be a point of no return (A.I.)? Would it be like the thesis of mutual destruction of atomic power?
• Marginalized sectors cannot attack each other, exploit each other, but terrorize the powerful, the owners of state institutions, of "order "/control.
• To marginalized sectors reduce the use of violence, it is necessary to modify the economic model to a certain extent.
• To be one step ahead, only with a lot of money or military (power) from the state. Resistance will always be asymmetric. People in high positions do not want to lose the benefits of belonging to the system.
• As a rule, groups are stronger than individuals. However, there are dissidents in high positions. People in high positions do not want to lose the benefits of belonging to the system, they are entangled in the web of power.
• Organic intellectuality, institutions, economic groups and religiuous groups.
• Criminology concepts, policy of "zero tolerance ", "war on drugs/terrorism ", "enemy ".
• Analysis of fallacious speeches.
• Colonialist and neo-colonialist objectives, ‘unquestionable inferiority’, biologically "inferior ", Christian message, non-chistian, degree of ‘civilisation’, "mental illness ".
Brainstorm
• Foucault perspective: • Basic strategic ambiguity/mimicry, copy the oppressor's speech.
• Analysis of fallacious speeches justified on the basis of high moral values/democracy/terrorism/fear.
• It is necessary to create a form of political innovation, political creation and political experimentation outside the large political parties, and outside the normal or common program. Is it possible to do politics without being a politician? Is revolution desirable? By whom? Is he who rebels right?
• The possibility of building a new law, supported by a post-identity perspective and able to foster practices of resistance to heteronormalizing and excluding technologies.
• To resist or destabilise government from an immanent vantage point and thus seeks to open "governmental " arrangement to new creative possibilities. To produce something that doesn’t exist yet -- without being able to know what it will be.
• We need to facilitate the conditions of power to create a society organized in defense of its rights.
• Gradually shift the limit of social exclusion, increasing the power of excluded agents (minorities) by creating marginal spaces in which they can articulate themselves.
• To be critical is to pose questions of the government of conduct, principles, objectives and methods using the available political resources and repertoire furnished by government itself, a kind of refractory turning of government against itself from within the discursive and political field of possibilities opened up by government.
• BUT force/power decides between equal rights. The projects that seek to gain political traction collapes themselves into the idiom of the "human rights ".
• Three types of social struggles: those that confront forms of domination (ethnic, social and religious); those that contest the forms of exploitation that separate individuals from what they produce; and the struggles against subjection, against forms of subjectivation and submission, which face everything that connects the individual to himself and subjects him to others.
• We don't have politicians talking to the people; everything is through the media. Politicians are tied to the mass media, out of opportunism or fear, they adopt the media's unique discourse (because of votes, power!).
• Voter-oriented policies based on "governing by fear of crime ".
• Analysis of forms of resistance by dominated groups using means that do not disturb their internal unity.
• Deconstruct Carl Schmitt, deconstruct the image of the enemy. Deconstruct the concrete tangible characteristics that make it a suitable target for hatred and struggle. Nothing is political, everything is politicizable !
• Crime is fundamental, as it is the nucleus through which the process of panoptization of society and, therefore, the exercise of power/control by the government becomes possible. The feeling of “threat” must be constant so that control can be exercised to “combat” such delinquency.
• For the presence of the police or army in society to be seen as necessary and even desired, there must be legitimization for this, which will occur through fear.
• Crime is also based on capitalism, the "war on drugs " fuels a market for weapons, vehicles, cameras, personnel, private prisions.
• We the people have a legitimate interest in preserving our ability to
investigate and prosecute the distribution of government hacking
tools that creates the market and fuels the demand for creating more
panoptization and manipulating society (surveillance capitalism,
technocolonilism, technofeudalism). The government's investigative
efforts would be severely hampered if a copy of hacking tools got
into the wrong hands.
• "The existence of rights against the Government would be jeopardized
if the Government were able to defeat such a right by appealing to
the right of a democratic majority to work its will. A right against
the Government must be a right to do something even when the majority
thinks it would be wrong to do it, and when the majority would be
worse off for having it done. If we now say that society has a right
to do whatever is in the general benefit, or the right to preserve
whatever sort of environment the majority wishes to live in, and
we mean that these are the sort of rights that provide justification
for overruling any rights against the Government that may conflict,
then we have annihilated the later rights. " (Ronald Dworkin, Taking
Rights Seriously)
-
Legislative
- Creation and enforcement of laws
- Influence by lobbying and special interest groups
-
Judiciary
- Judicial activism (sneak jurisprudence)
- Interpretation of laws affecting civil liberties
-
Media
- Veiled propaganda (media, hybrid memes)
- Control of information flow
-
Private Sector
- Corporate influence on policy
- Economic power and lobbying
-
Sneak Law
- Calculated law-making to benefit specific groups
- Hidden agendas in legislative processes
-
Creative Narratives
- Shaping public opinion through storytelling
- Hybrid memes and cultural manipulation
-
Disruptive Technology
- Cryptocurrency and blockchain
- 3D printing, ghost guns, drones
-
Cryptography
- VPN, onion routing, Tails OS
-
Direct Action
- Information leakage (e.g., whistleblowers)
-
Preventive Police Laws
- Designed for prevention of future dangers
-
Intelligence Law
- Early warning systems against state dangers
- Uncertain loyalties of spies
-
Laws of War
- Dealing with exceptional threats and armed attacks
- "Wars " on terror, drugs, organized crime, cyberwars
-
Ideological State Apparatuses (ISAs)
- Education: Schools and universities
- Religion: Churches and religious institutions
- Family: Structures and values
- Media: Newspapers, television, internet
- Cultural: Arts, literature, sports
-
Repressive State Apparatuses (RSAs)
- Government: Centralized authority and bureaucracy
- Police: Law enforcement
- Military: Armed forces
- Judicial: Courts and prisons
- Security agencies: Intelligence and surveillance
-
State of Exception (Carl Schmitt)
- Concept of sovereignty and emergency powers
- Decisions made during crises
-
Actual Idealism (Giovanni Gentile)
- Philosophical foundation of fascist ideology
- Emphasis on the state as the manifestation of the ethical will
-
Religious Sociology (Ernst Troeltsch)
- Interplay between religion and societal structures
- Influence of religious ethics on social norms
-
Cultural Hegemony (Antonio Gramsci)
- Dominance of ruling class ideologies
- Subtle perpetuation of the status quo
- The distinction between ordinary and political prisoners is illusory. Perhaps murder is the only real crime, although genocide is not a crime.
- Moral panic – Fear that some evil threatens society
- Obscurantism – Practice of obscuring information
- Swiftboating – Political jargon for a particular form of character assassination as a smear tactic
- Push polling – Use of polling to spread misinformation
- Negotiation and association
- Tenders with the companies themselves
- Enticement of the media and state (secret) agents
- Using the system for your own benefit
- Offering positions and promotions
- Tailor-made laws or omission
- Whistleblowers
- Discrediting tactic – Effort to damage someone's reputation
- Hoax – Widespread deliberate fabrication presented as truth
- International Journalism Festival
- Freedom of the Press Foundation
- Committee to Protect Journalists
- BIRD
- Security Training
- Accessnow Guides
- Accessnow Guides (Index)
- Global Investigative Journalism Network
- https://thebureauinvestigates.com
- The Investigative Journalism Manual (IJM)
- Hack the Media
- Hollywood Propaganda (films, docs etc)
- Series Propaganda (FBI...)
- Propaganda – Communication used to influence opinion
- Steve Bannon - Cambridge Analytica
- FUD - Fear, uncertainty, and doubt
- The “demonization” of the delinquent’s image – the construction of the enemy’s identity generates the great production of terror discourse around crime, whether in the journalistic media or in police programs favoring social control mechanisms.
- Al Capone
- El Chapo
- Juan Pablo Abadia
- Unmasking the informant inside the cartel
- Criminal populism
- Criminal law is not war
- We need to participate in political-criminal discourse. We need to educate ourselves philosophically to identify what is political and what is political abuse. But pure theory is not enough, we need to verify the practical consequences of theories.
- "Make love, not war "
- Fake news
- New rhetoric
- Document leakage
- Books about American, British, and Russian spies
- Dead drop technique
- Cold pitch technique
- Denial and deception – Framework in military intelligence theory
- False flag – Covert operation designed to deceive
- Chilling Effect
- ‘Unquestionable inferiority’
- Biologically inferior
- Raid and Pillage
- Degree of ‘civilisation’
- Christian message
- Evangelization of Aboriginal Groups
- Degree of ‘civilisation’
- Christian message
- Vietcong
- Vietcong Guerrilla warfare
- Books, books, books...
- Freemasons
- Books, books, books...
- Kafka
- Anarch.cc Library
- The Anarchist Library
- Libcom
- CrimethInc Library
- Azinelibrary
- Cryptoanarchy Wiki (GitHub)
Defend Against Totalitarian and Police States
Aspect | Totalitarian State | Police State | Democratic State |
---|---|---|---|
Definition | A political system where the state holds total authority over the society and seeks to control all aspects of public and private life wherever feasible. | A political system characterized by the government's pervasive use of police power to control the populace, often with extensive surveillance and repression. | A political system where power resides in the people, who elect representatives to make decisions and ensure individual rights and freedoms. |
Ideology | Often has a guiding ideology (e.g., communism, fascism) that seeks to transform society according to specific principles. | May lack a coherent ideology, focusing instead on maintaining order and the power of the ruling regime. | Rooted in principles of liberty, equality, and justice, often enshrined in a constitution or legal framework. |
Control Mechanisms | Uses propaganda, censorship, mass surveillance, and political repression to enforce its ideology and maintain control. | Relies heavily on police and security forces to monitor and suppress dissent, often without concern for legality or civil rights. | Utilizes democratic institutions, free press, and civil society to promote transparency and accountability, allowing for dissent and debate. |
Leadership | Typically led by a single party or leader with absolute power and authority. | Can be led by a single ruler or a group, but the focus is on the enforcement of laws and orders by police and security forces. | Leadership is determined through elections, with power distributed among multiple branches of government to prevent abuses. |
Public Life | Seeks to control nearly every aspect of public and private life, including politics, education, and social relationships. | Primarily concerned with public order and political stability, allowing some private autonomy as long as it doesn't threaten the state. | Encourages active participation in political processes, freedom of expression, and protection of civil liberties. |
Opposition | Eliminates all opposition through extreme measures, including purges, forced labor camps, and executions. | Suppresses opposition primarily through police actions, arrests, and intimidation. | Allows for political opposition and dissent, providing mechanisms for peaceful protest and legal challenges. |
Examples | Nazi Germany, Soviet Union under Stalin, North Korea. | East Germany (GDR), modern-day Belarus, China, EUA. | Germany, Netherlands. |
- Maintain a Low Profile:
- Avoid drawing attention to yourself or your activities.
- Do not openly criticize the government or its officials.
- Dress and behave in ways that do not attract undue attention.
- Avoid Bragging: don’t boast about your activities, connections, or capabilities, as this can draw unwanted attention.
- Stay Informed:
- Listen to news from foreign radio stations (the modern news or podcasts) or other underground sources to stay informed about political developments and potential threats.
- Share information discreetly with trusted friends and family.
- Stay Informed about Surveillance Practices: educate yourself about common surveillance techniques used by law enforcement and intelligence agencies, so you can take appropriate precautions to protect your privacy.
- Build Trusted Networks:
- Develop and maintain a close-knit group of trusted friends and family.
- Form or join underground resistance groups if necessary.
- Exercise Caution with Trust: be wary of trusting anyone, and never allow yourself to be blackmailed.
- Utilize Community Support:
- Engage in mutual aid with trusted community members.
- Support and be supported by others facing similar threats.
- Avoid nosy neighbors.
- Keep Personal and Professional Separate: Don't mix your personal life with any potentially sensitive or illegal activities.
- Create and Use Safe Spaces:
- Establish safe meeting places where you can discuss sensitive matters.
- Use homes of trusted friends or remote locations to avoid surveillance.
- Operate Discreetly: avoid conducting any sensitive activities from your home or easily traceable locations.
- Secure Communication:
- Use coded language or signals to communicate sensitive information (the modern cryptography).
- Write letters using invisible ink or steganography (the modern cryptography).
- Use face-to-face communication in secluded areas to avoid interception (the modern E2EE).
- Be Mindful of Metadata: understand that even seemingly harmless metadata (e.g., location data, timestamps) can be used to track your activities, so be cautious about what information you share and how it can be interpreted.
- Maintain OpSec: operational Security is crucial; don't reveal your plans, strategies, or tactics.
- Travel Discreetly:
- Avoid traveling frequently or taking predictable routes.
- Use aliases and travel documents that do not reveal your true identity.
- Stay Silent: avoid discussing sensitive information, especially online or in public.
- Financial Caution:
- Avoid transactions that could be traced or arouse suspicion.
- Use cash and barter systems rather than banks or official financial channels.
- Document Security:
- Keep important documents hidden or disguised.
- Destroy incriminating evidence that could be used against you or others.
- Use false identities or forged documents when necessary.
- Keep Operational Details Confidential: never disclose specific details about your operations or plans to anyone.
- Document and Share Truths Discreetly:
- Keep a record of injustices and human rights abuses.
- Share these records with trusted sources, both locally and internationally, when safe to do so.
- Prepare for Searches:
- Keep your home clean of any incriminating materials.
- Have hiding places for important documents or objects.
- Be prepared to answer questions convincingly if interrogated.
- Plan Escape Routes:
- Have a plan for quickly leaving your home or country if necessary.
- Keep emergency supplies and documents ready for a quick departure.
- Stay Physically and Mentally Fit:
- Maintain your health to endure physical and mental stress.
- Practice stress-relief techniques and maintain a positive mindset.
- Learn Self-Defense and Survival Skills:
- Acquire basic self-defense skills to protect yourself physically.
- Learn survival skills in case you need to flee or live off the grid.
- Observe and Adapt:
- Stay alert to changes in the political environment and adapt accordingly.
- Learn from the experiences of others who have successfully evaded state scrutiny.
- Cultivate Safe Habits: practice cautious behaviors online and offline to minimize risks.
- Know Your Rights:
- Familiarize yourself with your legal rights and protections regarding surveillance and privacy (e.g. search warrant rules), so you can assert them if necessary.
- Seek Specialized Advice if Needed: if you believe you are being unfairly targeted or monitored, seek legal advice from a qualified attorney who specializes in privacy and surveillance issues. Report suspicious behavior or incidents to journalists or tech NGOs.
- Understand Human Vulnerabilities:
- Remember that humans can be the weakest link in security, so be mindful of social engineering tactics.
Interesting News
- CATFISHED BY COPS - The Hamas Terrorist Who Wasn’t
- THE SNITCH IN THE SILVER HEARSE - The FBI Paid a Violent Felon to Infiltrate Denver’s Racial Justice Movement
- “They Believed Anything but the Truth” — 14 Years in Guantánamo
- Police Tech Isn’t Designed to Be Accurate — It’s Made to Exert Social Control
- NYPD Has Used Drones to Monitor Pro-Palestine Protests, Make 239 Arrests
- In New York, Inadequate Treatment Is Turning Drug Arrests Into Death Sentences
- I Faced Death by Incarceration. The UN Heard My Plea to Abolish Life Sentences.
- The FBI somehow obtained the IP address of someone who allegedly visited an ISIS-related site on the dark web. The DOJ is blocking discussion of the issue from entering the public docket.
- This Is the ‘GrayKey 2.0,’ the Tool Cops Use to Hack Phones
- Researchers Find ‘Backdoor’ in Encrypted Police and Military Radios
Academic Considerations
- Sun Tzu (544-496 BC)
The Art of War(5th century BC) - Niccolò Machiavelli (1469-1527)
The Prince(1532)
Discourses on Livy(1531) - Carl von Clausewitz (1780-1831)
On War(1832) - Jeremy Bentham (1748-1832)
An Introduction to the Principles of Morals and Legislation(1789)
The Panopticon Writings(1787-1791)
- Thomas Hobbes (1588-1679)
Leviathan(1651) - Jean-Jacques Rousseau (1712-1778)
The Social Contract(1762)
Émile, or On Education(1762) - Immanuel Kant (1724-1804)
Groundwork of the Metaphysics of Morals(1785)
Critique of Pure Reason(1781) - Sigmund Freud (1856-1939)
Civilization and Its Discontents(1930)
- Gaston Bachelard (1884-1962)
The Formation of the Scientific Mind(1938)
The Poetics of Space(1958) - Karl Popper (1902-1994)
The Logic of Scientific Discovery(1934)
The Open Society and Its Enemies(1945)
- Carl Schmitt (1888-1985)
Political Theology(1922)
The Concept of the Political(1932) - Giovanni Gentile (1875-1944)
The Theory of Mind as Pure Act(1916)
Origins and Doctrine of Fascism(1929) - Arthur Rosenberg (1889-1943)
A History of Bolshevism(1934)
Democracy and Socialism(1938) - Ernst Troeltsch (1865-1923)
The Social Teaching of the Christian Churches(1912)
Protestantism and Progress(1912) - Hannah Arendt (1906–1975)
The Human Condition(1958)
The Origins of Totalitarianism(1951)
- John Locke (1632–1704)
Two Treatises of Government(1689)
An Essay Concerning Human Understanding(1689) - Voltaire (1694–1778)
Candide(1759) - Thomas Paine (1737-1809)
Common Sense(1776)
The Rights of Man(1791)
The Age of Reason(1794-1807)
First Principles of Government(1795)
Agrarian Justice(1797) - Pierre-Joseph Proudhon (1809-1865)
What is Property?(1840)
The Philosophy of Poverty(1846)
The General Idea of the Revolution in the Nineteenth Century(1851)
System of Economical Contradictions: or, The Philosophy of Misery(1846)
The Principle of Federation(1863) - John Maynard Keynes (1883-1946)
The General Theory of Employment, Interest and Money(1936)
A Treatise on Money(1930) - Max Weber (1864-1920)
Economy and Society(1922)
The Protestant Ethic and the Spirit of Capitalism(1905) - Norberto Bobbio (1909–2004)
Left and Right: The Significance of a Political Distinction(1996)
The Future of Democracy(1984) - Immanuel Kant (1724-1804)
The Metaphysics of Morals(1797)
Critique of Pure Reason(1781)
Groundwork of the Metaphysics of Morals(1785)
Metaphysical Principles of the Doctrine of Right(1797) - Georg Wilhelm Friedrich Hegel (1770-1831)
Elements of the Philosophy of Right(1820) - Alexis de Tocqueville (1805-1859)
Democracy in America(1835, 1840) - John Stuart Mill (1806-1873)
On Liberty(1859)
Considerations on Representative Government(1861) - James Madison (1751-1836), Alexander Hamilton (1755-1804), and John Jay
(1745-1829)
The Federalist Papers(1787-1788)
- Karl Marx (1818-1883)
Das Kapital(1867)
The Communist Manifesto(1848, with Friedrich Engels)
The Sacred Family(1845, with Friedrich Engels)
The Eighteenth Brumaire of Louis Bonaparte(1852)
Critique of the Gotha Program(1875) - Antonio Gramsci (1891-1937)
Selections from the Prison Notebooks(1971) - Nicos Poulantzas (1936-1979)
Political Power and Social Classes(1968)
State, Power, Socialism(1978) - Louis Althusser (1918-1990)
For Marx(1965)
Reading Capital(1968, with Étienne Balibar)
- Adam Smith (1723-1790)
The Wealth of Nations(1776)
The Theory of Moral Sentiments(1759) - John Stuart Mill (1806–1873)
On Liberty(1859)
Utilitarianism(1863) - Milton Friedman (1912-2006)
Capitalism and Freedom(1962)
Free to Choose(1980, with Rose Friedman) - Ludwig von Mises (1881-1973)
Human Action(1949)
Socialism(1922) - Friedrich Hayek (1899-1992)
The Road to Serfdom(1944)
The Constitution of Liberty(1960) - Margaret Thatcher (1925-2013)
The Downing Street Years(1993)
Statecraft: Strategies for a Changing World(2002) - Ronald Reagan (1911-2004)
An American Life(1990)
The Reagan Diaries(2007)
- Friedrich Nietzsche (1844-1900)
Thus Spoke Zarathustra(1883-1885)
Beyond Good and Evil(1886) - Michel Foucault (1926-1984)
Madness and Civilization(1961)
The Birth of the Clinic(1963)
Discipline and Punish(1975)
The History of Sexuality(1976-1984)
Security, Territory, Population: Lectures at the Collège de France 1977-1978 The Government of the Living: Lectures at the Collège de France 1979-1980 Society Must Be Defended(2003, posthumous) - Herbert Marcuse (1898-1979)
One-Dimensional Man(1964)
Eros and Civilization(1955) - Gilles Deleuze (1925-1995)
A Thousand Plateaus(1980, with Félix Guattari)
Difference and Repetition(1968) - Giorgio Agamben (1942- )
Homo Sacer: Sovereign Power and Bare Life(1995)
State of Exception(2005)
The Coming Community(1990)
The Use of Bodies(2015)
Means Without End: Notes on Politics(2000)
Remnants of Auschwitz: The Witness and the Archive(1999) - Pierre Bourdieu (1930-2002)
Outline of a Theory of Practice(1972)
Distinction: A Social Critique of the Judgement of Taste(1979)
Homo Academicus(1984)
The Field of Cultural Production(1993)
Practical Reason: On the Theory of Action(1994)
Pascalian Meditations(1997) - Félix Guattari (1930-1992)
Anti-Oedipus(1972, with Gilles Deleuze)
Chaosmosis(1992) - Pierre Bourdieu (1930-2002)
Distinction: A Social Critique of the Judgement of Taste(1979)
Outline of a Theory of Practice(1972)
- Frankfurt School
Dialectic of Enlightenment(1944, by Max Horkheimer and Theodor Adorno)
Minima Moralia(1951, by Theodor Adorno) - Existentialism: Jean-Paul Sartre (1905-1980) v. Albert Camus (1913-1960)
Sartre: Being and Nothingness(1943)
Sartre: Existentialism is a Humanism(1946)
Camus: The Stranger(1942)
Camus: The Myth of Sisyphus(1942)
- Emma Goldman (1869-1940)
Anarchism and Other Essays(1910)
Living My Life(1931) - Simone de Beauvoir (1908-1986)
The Second Sex(1949)
The Ethics of Ambiguity(1947) - Audre Lorde (1934-1992)
Sister Outsider(1984)
Zami: A New Spelling of My Name(1982) - Amia Srinivasan (1984- )
The Right to Sex(2021) - Judith Butler (1956- )
Gender Trouble(1990)
Bodies That Matter(1993) - Lélia Gonzalez:
"Lugar de Negro" (1982)
"Racismo e Sexismo na Cultura Brasileira" (1984) - Rita Segato (1949- )
La guerra contra las mujeres(2016)
Contrapedagogías de la crueldad(2018)
- The Age of Extremes: The Short Twentieth Century, 1914-1991 - Eric Hobsbawm (1994)
- Slouching Towards Utopia: An Economic History of the Twentieth Century - James Bradford DeLong (2022)
- Noam Chomsky (1928- )
Manufacturing Consent(1988, with Edward S. Herman)
Hegemony or Survival(2003) - Slavoj Žižek (1949- )
The Sublime Object of Ideology(1989)
Living in the End Times(2010) - Achille Mbembe (1957- )
Necropolitics(2019)
On the Postcolony(2000) - Frantz Fanon:
"Black Skin, White Masks " (1952)
"The Wretched of the Earth " (1961) - Simone Browne:
"Dark Matters: On the Surveillance of Blackness " (2015) - Ruha Benjamin:
"Race After Technology: Abolitionist Tools for the New Jim Code " - Shoshana Zuboff (1951- )
- Éric Sadin (1973- )
La Siliconisation du Monde(2016)
L’Intelligence artificielle ou l’enjeu du siècle(2018)
In the Age of the Smart Machine(1988)
The Age of Surveillance Capitalism(2018)
Libraries
- Anna's Archive
- Z-Library Official (Telegram)
- Z-Library (APP)
- Z-Library (WEB)
- Z-Library (ONION)
- Library Genesis (.rs alias domain)
- Library Genesis (.is alias domain)
- Library Genesis (.st alias domain)
- Library Genesis (APP)
- Library Genesis (ONION)
- Imperial Library (ONION)
- Just Another Library (ONION)
- InfoCon (ONION)
- The Anarchist Library
- The Anarchist Library (ONION)
- Animal Anomie (Library)
- libcom.org
- CrimethInc
- Internet Archive: The Anarchist Library Collection
- The Anarchist Library: Insurrectionary Anarchism
- The Anarchist Library: Anarcho-Communism
- Anarhija Library
- Enough is Enough Library
Book Guerrilla
Guerilla Open Access Manifesto
How to facilitate access to books? Easy methods of digitizing books?
• Awesome Scanning
https://github.com/ad-si/awesome-scanning
• DIY Book Scanner
https://diybookscanner.org
• A few scanning tips
https://scantips.com
• Android PDF document scanning app
https://github.com/LittleTrickster/PDF-Doc-Scan
Intelligence, Conflict, and Warfare Publications
- The NATO Cooperative Cyber Defence Centre of Excellence
- Council on Foreign Relations (CFR)
- International Security Studies Section (ISSS)
- Taylor and Francis - Intelligence and National Security - Open access articles
- The Journal of Intelligence, Conflict, and Warfare - Archive of past issues
- DCAF - Geneva Centre for Security Sector Governance - Publications on security sector governance
- E-International Relations - Open access scholarly books
- CIA.gov - Center for the Study of Intelligence - Studies in Intelligence
- Journal of Strategic Studies - Scholarly articles on strategic studies, intelligence, and military affairs
- International Journal of Intelligence and CounterIntelligence - Articles on intelligence operations, security, and counterintelligence
- RAND Corporation - Research and analysis on security, defense, and intelligence
- Chatham House - International Security Programme - Publications on international security and conflict
- Brookings Institution - Foreign Policy - Articles and research on global security and intelligence
- Foreign Affairs - Articles and analyses on international affairs, security, and intelligence
- Small Wars Journal - Discussions on military strategy, defense policy, and irregular warfare
- The International Journal of Intelligence, Security, and Public Affairs - Research on intelligence, security, and public affairs
- Bundeswehr University Munich - Metis Institute for Strategy and Foresight - Research on strategy, security, and military affairs
- Real Instituto Elcano - Elcano Royal Institute - Publications on international and strategic studies
- Institute for National Defense and Security Research (INDSR) - Research and analysis on security and defense
- Strategic Research Center - Expediency Discernment Council - Research papers and publications on strategic issues (limited English content)
- Venezuelan Institute for Social and Political Studies (INVESP) - Publications on political and social issues (limited English content)
- Russian International Affairs Council (RIAC) - Articles and analysis on international relations and security
- Centre for Strategic and International Studies (CSIS) Indonesia - Research and publications on security and international affairs
- Cambodian Institute for Cooperation and Peace (CICP) - Publications on peace, security, and cooperation
- Institute for Southeast Asian Studies (ISEAS) - Vietnam Academy of Social Sciences - Research on regional security and international relations
Privacy Software Alternatives
- General
- Nitter instances
- Invidious instances
- Bibliogram instances
- SimplyTranslate instances
- OpenStreetMap tile servers
- Telegram’s blogging platform
- Reddit alternatives:
- Lemmy - Communities
- Libreddit
- Teddit
- Snew
- SaidIt.net (Source) (Mobile)
- Raddle (Source)
- /kbin (Source)
- Steemit
- Hacker News
- Old Redditandamp; (Mobile)
Others
- Internet Archive - https://archive.org
- Citizenlab - https://citizenlab.ca
- Necessary and Proportionate - https://necessaryandproportionate.org
- Bad Internet Bills - https://badinternetbills.com
- UN Internet Governance Forum - https://intgovforum.org
- USENIX Conferences - https://usenix.org/conferences
- Computer Crime Research Center - https://crime-research.org
- Internet Crime Complaint Center (IC3) - https://ic3.gov/Home/AnnualReporlis
- Exposing the Invisible (ETI) - https://kit.exposingtheinvisible.org
- BBW - https://bigbrotherwatch.org.uk
- Mental Outlaw - https://youtube.com/c/MentalOutlaw
- Seytonic - https://youtube.com/c/Seytonic
- DoingFedTime - https://youtube.com/@DoingFedTime
- Surveillance Report - https://youtube.com/c/SurveillanceReport
- Hack In The Box Security Conference - https://youtube.com/@hitbsecconf
- May Contain Hackers - https://youtube.com/@MCh3022NL
- European Digital Rights - https://youtube.com/@EuropeanDigitalRights
- Techlore - https://youtube.com/c/Techlore
- David Bombal - https://youtube.com/c/DavidBombal
- Hak5 - https://youtube.com/c/hak5
- John Hammond - https://youtube.com/c/JohnHammond010
- Linus Tech Tips - https://youtube.com/c/LinusTechTips
- Naomi Brockwell: NBTV - https://youtube.com/@NaomiBrockwellTV
- SecurityFWD - https://youtube.com/c/SecurityFWD
- Sir Sudo - https://youtube.com/c/SirSudo
- SomeOrdinaryGamers - https://youtube.com/c/SomeOrdinaryGamers
- spacehuhn - https://youtube.com/c/spacehuhn
- ThioJoe - https://youtube.com/c/ThioJoe
- Luke Smith - https://youtube.com/c/LukeSmithxyz
- Rob Braxman Tech - https://youtube.com/c/BraxMe
- The Hated One - https://youtube.com/c/TheHatedOne