Mac Slavo

No one is immune to the surveillance state. Whether you’re a prepper, alternative news buff, or none of the above, the government wants to know what you’re doing.

“Just because you’re paranoid doesn’t mean they’re not out to get you.”

If there ever existed individuals and groups that threatened the status quo it’s now, and they can often be found congregating at alternative news websites, forums and preparedness oriented online communities. Government officials at the Department of Homeland Security and the FBI have done everything in their power to marginalize their dangerous ideas and activities going so far as to even issue security bulletins to private businesses like banks, surplus stores, coffee shops and other retailers outlining what employees should look for and when to say something to law enforcement officials.

Activities like putting a Ron Paul bumper sticker on your car, paying cash, buying gold, stocking up on food, promoting “anti-U.S.” and “radical theologies,” and demanding personal privacy are all now considered to be suspicious in the eyes of a government hell bent on destroying the Constitution.

While DHS has requisitioned the help of brick and mortar businesses in their efforts to identify persons-of-interest, they have realized that the best place to locate domestic threats to national security is the internet. As such, they have deployed a host of tools to not only monitor what is being posted online, but who is posting it, who their friends are, which sites they visit and what information they ‘like’ in particular.

A recent report from well known survival author James Rawles suggests that Preparedness oriented web sites are a prime target of government snooping and sniffing. A website like Rawles’ Survival Blog, or even our very own SHTFplan [and our own WhiskeyAndGunpowder.com -- Ed.], undoubtedly meets all of the criteria outlined in the multitude of security bulletins issued by DHS and FBI, thus it would only make sense that these types of communities would be primary destinations for government monitoring. In the case of Survival Blog, Rawles reports that a recent analysis of his logs by web forensic experts yielded some startling results:

It has come to my attention that from August of 2011 to November of 2011, the FBI secretly redirected the web traffic of more than 10% of SurvivalBlog’s US visitors through CJIS, their sprawling data center situated on 900 acres, 10 miles from Clarksburg, West Virginia. There, the Feebees surreptitiously collected the IP addresses of my site visitors.

In all, 4,906 of 35,494 selected connections ended up going to or through the FBI servers. (Note that this happened several months before we moved our primary server to Sweden.) Furthermore, we discovered that the FBI attached a long-lived cookie that allowed them to track the sites that readers subsequently visited. I suspect that the FBI has done the same to hundreds of other web sites. I find this situation totally abhorrent, and contrary to the letter of 4th Amendment as well as the intent of our Founding Fathers.

I recognize that I am making this announcement at the risk of losing some readers. So be it. But I felt compelled to tell my readers immediately, because it was the honorable and forthright course of action.

Working on my behalf, some volunteer web forensics experts dissected some cached version histories. (Just about everything is available on the Internet, and the footprints and cookie crumb trails that you leave are essentially there for a lifetime.) The volunteers found that the bulk of the FBI redirects were selected because of a reader’s association with “Intellectual Property” infringing sites like the now defunct Megaupload. But once redirected, you were assigned a cookie. However, some of these were direct connections to the SurvivalBlog site (around 4% of the total.) So if they had kept this practice up long enough and if you visited us enough times then the FBI’s computers would have given you a cookie. This has been verified with sniffer software.

Most alarming about this is that according to James Rawles’ analysis, users’ browsers were first redirected to an FBI server, then forced to download a cookie via their browser, and were then redirected back to his web site – the entire process unbeknownst to the end user because it happens almost instantly. Because the cookie isn’t removed unless you clear it from your browser (you can easily remove cookies manually) every web site subsequently visited by the user would then be logged by an FBI computer in real-time.

You can be assured that if the FBI is engaging in this type of surveillance, Survival Blog and other preparedness web sites aren’t alone. Chances are that, as Rawles mentions, there are hundreds, if not thousands, of websites being tracked and monitored in similar fashion. A report from the Intel Hub confirms our suspicions, as do our own visitor logs, and we’d venture to guess that most other web sites in the alternative news sphere will see similar access logs.

Perhaps for now the government surveillance net is somewhat limited to specific internet spheres of interest, as their surveillance infrastructure is still being constructed. But it won’t be long, in fact less than 18 months, before they have the ability to track every single phone call, text message, email, image and video upload, blog post, comment, search query and social networking activity in the world.

Yes, that’s right, EVERY SINGLE digital interaction:

Via The Daily Crux:

Under construction by contractors with top-secret clearances, the blandly named Utah Data Center is being built for the National Security Agency.

A project of immense secrecy, it is the final piece in a complex puzzle assembled over the past decade. Its purpose: to intercept, decipher, analyze, and store vast swaths of the world’s communications, as they zap down from satellites and zip through the underground and undersea cables of international, foreign, and domestic networks.

As we highlighted in Everything You Do Is Monitored, the government is rapidly taking steps across the nation’s entire security apparatus and its ancillary arms such as major search engines, private banks, telecommunications companies and social networks to log, aggregate and analyze the behavior of individual users as well as groups to which they belong. To what end is anybody’s guess (but we could, of course, venture a few theories).

We’re all suspects now.

They’re watching.

Regards,

Mac Slavo
SHTFPlan

Mac Slavo

Mac Slavo runs the SHTFplan http://www.shtfplan.com/

Recent Articles

The Awful Way Social Security Might Be “Saved”

Dave Gonigam

The US Social Security program is complete mess. The funds needed to pay these benefits are quickly drying up, and agreeable solutions are in short supply. But all is not lost... There actually IS a viable way to "save" Social Security. But as Dave Gonigam explains, you're probably not going to like it. Read on...


Important Facts You Need to Know the Ebola Outbreak

Stephen Petranek

This summer, the worst Ebola outbreak ever recorded hit sub-Saharan Africa. But the greatest danger, as Stephen Petranek explains, is that the virus will have a chance to mutate into a form that spreads more easily. And if that happens, there will be far reaching consequences - from both a health and an investment side. Read on...


Laissez Faire
A Free Way to Turn Your Unique Skill Into Real Money

Chris Campbell

Everyone in the world has a unique talent or skill that someone else might find useful. Whether it's editing video, speaking Spanish or even eating paper, chances are there is someone out there willing to pay for what you have to offer. Today, Chris Campbell shows you one way to find those consumers and how to make your skill work for you...


The End of the “Gun Control” Bull Market

Greg Guenthner

For the last few years, gun enthusiasts have been concerned that the Feds would find a way to block their access to firearms. Now those fears appear to be subsiding... and so do gun sales. Greg Guenthner explains how to navigate this market in the coming months and years. Read on...


The Most Important Trait of Any Successful Resource Investor

Henry Bonner

The gold mining sector is one of the most difficult areas of the market to navigate successfully. But there is money to be made here. Henry Bonner sits down with one of the giants of this industry and picks his brain about how to find winners in this market and the four things every great investment has in common. Read on...