Extreme Privacy (4th Edition)

  • On ·
  • By ·

Michael Bazzell has helped hundreds of celebrities, billionaires, and everyday citizens disappear completely from public view. He is now known in Hollywood as the guy that “fixes” things. His previous books about privacy were mostly REACTIVE and he focused on ways to hide information, clean up an online presence, and sanitize public records to avoid unwanted exposure. This textbook is PROACTIVE. It is about starting over. It is the complete guide that he would give to any new client in an extreme situation. It leaves nothing out and provides explicit details of every step he takes to make someone completely disappear, including legal documents and a chronological order of events. The information shared in this book is based on real experiences with his actual clients, and is unlike any content ever released in his other books. The stories are all true, with the exception of changed names, locations, and minor details in order to protect the privacy of those described. For many, this is the only privacy manual needed to secure a new digital life.


The Surveillance Report - featuring Techlore & The New Oil to keep you updated on the newest weekly security & privacy news.
The National Security Agency (NSA) has released guidance warning that location data from mobile phones and other internet-connected devices can be a security threat for
Get a daily rundown of the top global open source national security stories and previews of the exclusive content available on The Cipher Brief.
Michael Bazzell has helped hundreds of celebrities, billionaires, and everyday citizens disappear completely from public view. He is now known in Hollywood as the guy
The Shadow War: Inside Russia's and China's Secret Operations to Defeat America In The Shadow War, CNN anchor and chief national security correspondent Jim Sciutto
The Shared Security Show brings you news, tips, advice, and interviews with cybersecurity and privacy experts to help you live more secure and private in
From two former military officers and award-winning authors, a chillingly authentic geopolitical thriller that imagines a naval clash between the US and China in the
Chris Parker, the founder of WhatIsMyIPAddress.com, interviews guests and tells real-life stories about topics to open your eyes to the danger and traps lurking in
In T-Minus AI: Humanity's Countdown to Artificial Intelligence and the New Pursuit of Global Power, author Michael Kanaan explains the realities of AI from a human-oriented
SecurityCheckli.st provides a beginner’s checklist for staying safe on the internet. The list is dynamic and can change. The website allows you to check things
Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journalists, and politicians.
The Long Game: China's Grand Strategy to Displace American Order For more than a century, no US adversary or coalition of adversaries has ever reached
Go Incognito is a video-based course teaching users of varying experience levels about privacy, security, and anonymity. The goal is to educate users around the
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you
Zero day: a software bug that allows a hacker to break into your devices and move around undetected. One of the most coveted tools in
The VPN Toolkit provides transparent, community-driven VPN tools and utilizes community oversight and contribution to provide unbiased reviews.
The guide to restoring your online privacy. Massive organizations are monitoring your online activities. Privacy Guides is your central privacy and security resource to protect
A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers In 2014, the world witnessed the start of a mysterious series
decentralize.today (dt.gl) is a digital media platform that covers all things tech. They publish news, analyses, op-eds and articles across a broad spectrum of topics,
The Promise and the Peril of the Digital Age Microsoft President Brad Smith operates by a simple core belief: When your technology changes the world,
Why and How You Should Take Back Control of Your Data Every minute of every day, our data is harvested and exploited… It is time
Surveillance Self-Defense is a project of the Electronic Frontier Foundation, an independent non-profit working to protect online privacy for nearly thirty years. Surveillance Self-Defense is
Who Has Your Data and Why You Should Care Cyber Privacy demystifies the digital footprints we leave in our daily lives and reveals how our
NOTHING TO HIDE is an independent documentary dealing with surveillance and its acceptance by the general public through the “I have nothing to hide” argument.
You are being watched. Private and state-sponsored organizations are monitoring and recording your online activities. privacytools.io provides knowledge and tools to protect your privacy against
Reclaim Your Digital, Financial, and Lifestyle Freedom Written with new privacy-seekers in mind, this step-by-step guide walks you through each dimension of private living, from
Darknet Diaries is a podcast covering true stories from the dark side of the Internet. Stories about hackers, defenders, threats, malware, botnets, breaches, and privacy.
The Original Manual for Living off the Land & Doing It Yourself The definitive book of basic skills and country wisdom for living off the
Data has surpassed oil as the world’s most valuable asset. It’s being weaponized to wage cultural and political warfare. People everywhere are in a battle
America's Battle Against Russia, China, and the Rising Global Cyber Threat With each passing year, the internet-linked attacks on America's interests have grown in both

The Shadow War

  • On ·
  • By ·

The Shadow War: Inside Russia’s and China’s Secret Operations to Defeat America

In The Shadow War, CNN anchor and chief national security correspondent Jim Sciutto provides us with a revealing and at times disturbing guide to this new international conflict. This Shadow War is already the greatest threat to America’s national security, even though most Americans know little or nothing about it. With on-the-ground reporting from Ukraine to the South China Sea, from a sub under the Arctic to unprecedented access to America’s Space Command, Sciutto draws on his deep knowledge, high-level contacts, and personal experience as a journalist and diplomat to paint the most comprehensive and vivid picture of a nation targeted by a new and disturbing brand of warfare.

Thankfully, America is adapting and fighting back. In The Shadow War, Sciutto introduces readers to the dizzying array of soldiers, sailors, submariners and their commanders, space engineers, computer scientists, civilians, and senior intelligence officials who are on the front lines of this new kind of forever war. Intensive and disturbing, this invaluable and important work opens our eyes and makes clear that the war of the future is already here.


The Surveillance Report - featuring Techlore & The New Oil to keep you updated on the newest weekly security & privacy news.
The National Security Agency (NSA) has released guidance warning that location data from mobile phones and other internet-connected devices can be a security threat for
Get a daily rundown of the top global open source national security stories and previews of the exclusive content available on The Cipher Brief.
Michael Bazzell has helped hundreds of celebrities, billionaires, and everyday citizens disappear completely from public view. He is now known in Hollywood as the guy
The Shadow War: Inside Russia's and China's Secret Operations to Defeat America In The Shadow War, CNN anchor and chief national security correspondent Jim Sciutto
The Shared Security Show brings you news, tips, advice, and interviews with cybersecurity and privacy experts to help you live more secure and private in
From two former military officers and award-winning authors, a chillingly authentic geopolitical thriller that imagines a naval clash between the US and China in the
Chris Parker, the founder of WhatIsMyIPAddress.com, interviews guests and tells real-life stories about topics to open your eyes to the danger and traps lurking in
In T-Minus AI: Humanity's Countdown to Artificial Intelligence and the New Pursuit of Global Power, author Michael Kanaan explains the realities of AI from a human-oriented
SecurityCheckli.st provides a beginner’s checklist for staying safe on the internet. The list is dynamic and can change. The website allows you to check things
Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journalists, and politicians.
The Long Game: China's Grand Strategy to Displace American Order For more than a century, no US adversary or coalition of adversaries has ever reached
Go Incognito is a video-based course teaching users of varying experience levels about privacy, security, and anonymity. The goal is to educate users around the
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you
Zero day: a software bug that allows a hacker to break into your devices and move around undetected. One of the most coveted tools in
The VPN Toolkit provides transparent, community-driven VPN tools and utilizes community oversight and contribution to provide unbiased reviews.
The guide to restoring your online privacy. Massive organizations are monitoring your online activities. Privacy Guides is your central privacy and security resource to protect
A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers In 2014, the world witnessed the start of a mysterious series
decentralize.today (dt.gl) is a digital media platform that covers all things tech. They publish news, analyses, op-eds and articles across a broad spectrum of topics,
The Promise and the Peril of the Digital Age Microsoft President Brad Smith operates by a simple core belief: When your technology changes the world,
Why and How You Should Take Back Control of Your Data Every minute of every day, our data is harvested and exploited… It is time
Surveillance Self-Defense is a project of the Electronic Frontier Foundation, an independent non-profit working to protect online privacy for nearly thirty years. Surveillance Self-Defense is
Who Has Your Data and Why You Should Care Cyber Privacy demystifies the digital footprints we leave in our daily lives and reveals how our
NOTHING TO HIDE is an independent documentary dealing with surveillance and its acceptance by the general public through the “I have nothing to hide” argument.
You are being watched. Private and state-sponsored organizations are monitoring and recording your online activities. privacytools.io provides knowledge and tools to protect your privacy against
Reclaim Your Digital, Financial, and Lifestyle Freedom Written with new privacy-seekers in mind, this step-by-step guide walks you through each dimension of private living, from
Darknet Diaries is a podcast covering true stories from the dark side of the Internet. Stories about hackers, defenders, threats, malware, botnets, breaches, and privacy.
The Original Manual for Living off the Land & Doing It Yourself The definitive book of basic skills and country wisdom for living off the
Data has surpassed oil as the world’s most valuable asset. It’s being weaponized to wage cultural and political warfare. People everywhere are in a battle
America's Battle Against Russia, China, and the Rising Global Cyber Threat With each passing year, the internet-linked attacks on America's interests have grown in both

2034: A Novel of the Next World War

  • On ·
  • By ·

From two former military officers and award-winning authors, a chillingly authentic geopolitical thriller that imagines a naval clash between the US and China in the South China Sea in 2034—and the path from there to a nightmarish global conflagration. So begins a disturbingly plausible work of speculative fiction, co-authored by an award-winning novelist and decorated Marine veteran and the former commander of NATO, a legendary admiral who has spent much of his career strategically outmaneuvering America’s most tenacious adversaries.

Written with a powerful blend of geopolitical sophistication and human empathy, 2034 takes us inside the minds of a global cast of characters–Americans, Chinese, Iranians, Russians, Indians–as a series of arrogant miscalculations on all sides leads the world into an intensifying international storm. In the end, China and the United States will have paid a staggering cost, one that forever alters the global balance of power.

Everything in 2034 is an imaginative extrapolation from present-day facts on the ground combined with the authors’ years working at the highest and most classified levels of national security. Sometimes it takes a brilliant work of fiction to illuminate the most dire of warnings: 2034 is all too close at hand, and this cautionary tale presents the reader a dark yet possible future that we must do all we can to avoid.


The Surveillance Report - featuring Techlore & The New Oil to keep you updated on the newest weekly security & privacy news.
The National Security Agency (NSA) has released guidance warning that location data from mobile phones and other internet-connected devices can be a security threat for
Get a daily rundown of the top global open source national security stories and previews of the exclusive content available on The Cipher Brief.
Michael Bazzell has helped hundreds of celebrities, billionaires, and everyday citizens disappear completely from public view. He is now known in Hollywood as the guy
The Shadow War: Inside Russia's and China's Secret Operations to Defeat America In The Shadow War, CNN anchor and chief national security correspondent Jim Sciutto
The Shared Security Show brings you news, tips, advice, and interviews with cybersecurity and privacy experts to help you live more secure and private in
From two former military officers and award-winning authors, a chillingly authentic geopolitical thriller that imagines a naval clash between the US and China in the
Chris Parker, the founder of WhatIsMyIPAddress.com, interviews guests and tells real-life stories about topics to open your eyes to the danger and traps lurking in
In T-Minus AI: Humanity's Countdown to Artificial Intelligence and the New Pursuit of Global Power, author Michael Kanaan explains the realities of AI from a human-oriented
SecurityCheckli.st provides a beginner’s checklist for staying safe on the internet. The list is dynamic and can change. The website allows you to check things
Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journalists, and politicians.
The Long Game: China's Grand Strategy to Displace American Order For more than a century, no US adversary or coalition of adversaries has ever reached
Go Incognito is a video-based course teaching users of varying experience levels about privacy, security, and anonymity. The goal is to educate users around the
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you
Zero day: a software bug that allows a hacker to break into your devices and move around undetected. One of the most coveted tools in
The VPN Toolkit provides transparent, community-driven VPN tools and utilizes community oversight and contribution to provide unbiased reviews.
The guide to restoring your online privacy. Massive organizations are monitoring your online activities. Privacy Guides is your central privacy and security resource to protect
A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers In 2014, the world witnessed the start of a mysterious series
decentralize.today (dt.gl) is a digital media platform that covers all things tech. They publish news, analyses, op-eds and articles across a broad spectrum of topics,
The Promise and the Peril of the Digital Age Microsoft President Brad Smith operates by a simple core belief: When your technology changes the world,
Why and How You Should Take Back Control of Your Data Every minute of every day, our data is harvested and exploited… It is time
Surveillance Self-Defense is a project of the Electronic Frontier Foundation, an independent non-profit working to protect online privacy for nearly thirty years. Surveillance Self-Defense is
Who Has Your Data and Why You Should Care Cyber Privacy demystifies the digital footprints we leave in our daily lives and reveals how our
NOTHING TO HIDE is an independent documentary dealing with surveillance and its acceptance by the general public through the “I have nothing to hide” argument.
You are being watched. Private and state-sponsored organizations are monitoring and recording your online activities. privacytools.io provides knowledge and tools to protect your privacy against
Reclaim Your Digital, Financial, and Lifestyle Freedom Written with new privacy-seekers in mind, this step-by-step guide walks you through each dimension of private living, from
Darknet Diaries is a podcast covering true stories from the dark side of the Internet. Stories about hackers, defenders, threats, malware, botnets, breaches, and privacy.
The Original Manual for Living off the Land & Doing It Yourself The definitive book of basic skills and country wisdom for living off the
Data has surpassed oil as the world’s most valuable asset. It’s being weaponized to wage cultural and political warfare. People everywhere are in a battle
America's Battle Against Russia, China, and the Rising Global Cyber Threat With each passing year, the internet-linked attacks on America's interests have grown in both

T-Minus AI

  • On ·
  • By ·

In T-Minus AI: Humanity’s Countdown to Artificial Intelligence and the New Pursuit of Global Power, author Michael Kanaan explains the realities of AI from a human-oriented perspective that’s easy to comprehend. A recognized national expert and the U.S. Air Force’s first Chairperson for Artificial Intelligence, Kanaan weaves a compelling new view on our history of innovation and technology to masterfully explain what each of us should know about modern computing, AI, and machine learning.

Kanaan also illuminates the global implications of AI by highlighting the cultural and national vulnerabilities already exposed and the pressing issues now squarely on the table. AI has already become China’s all-purpose tool to impose authoritarian influence around the world. Russia, playing catch up, is weaponizing AI through its military systems and now infamous, aggressive efforts to disrupt democracy by whatever disinformation means possible.

America and like-minded nations are awakening to these new realities, and the paths they’re electing to follow echo loudly, in most cases, the political foundations and moral imperatives upon which they were formed.


The Surveillance Report - featuring Techlore & The New Oil to keep you updated on the newest weekly security & privacy news.
The National Security Agency (NSA) has released guidance warning that location data from mobile phones and other internet-connected devices can be a security threat for
Get a daily rundown of the top global open source national security stories and previews of the exclusive content available on The Cipher Brief.
Michael Bazzell has helped hundreds of celebrities, billionaires, and everyday citizens disappear completely from public view. He is now known in Hollywood as the guy
The Shadow War: Inside Russia's and China's Secret Operations to Defeat America In The Shadow War, CNN anchor and chief national security correspondent Jim Sciutto
The Shared Security Show brings you news, tips, advice, and interviews with cybersecurity and privacy experts to help you live more secure and private in
From two former military officers and award-winning authors, a chillingly authentic geopolitical thriller that imagines a naval clash between the US and China in the
Chris Parker, the founder of WhatIsMyIPAddress.com, interviews guests and tells real-life stories about topics to open your eyes to the danger and traps lurking in
In T-Minus AI: Humanity's Countdown to Artificial Intelligence and the New Pursuit of Global Power, author Michael Kanaan explains the realities of AI from a human-oriented
SecurityCheckli.st provides a beginner’s checklist for staying safe on the internet. The list is dynamic and can change. The website allows you to check things
Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journalists, and politicians.
The Long Game: China's Grand Strategy to Displace American Order For more than a century, no US adversary or coalition of adversaries has ever reached
Go Incognito is a video-based course teaching users of varying experience levels about privacy, security, and anonymity. The goal is to educate users around the
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you
Zero day: a software bug that allows a hacker to break into your devices and move around undetected. One of the most coveted tools in
The VPN Toolkit provides transparent, community-driven VPN tools and utilizes community oversight and contribution to provide unbiased reviews.
The guide to restoring your online privacy. Massive organizations are monitoring your online activities. Privacy Guides is your central privacy and security resource to protect
A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers In 2014, the world witnessed the start of a mysterious series
decentralize.today (dt.gl) is a digital media platform that covers all things tech. They publish news, analyses, op-eds and articles across a broad spectrum of topics,
The Promise and the Peril of the Digital Age Microsoft President Brad Smith operates by a simple core belief: When your technology changes the world,
Why and How You Should Take Back Control of Your Data Every minute of every day, our data is harvested and exploited… It is time
Surveillance Self-Defense is a project of the Electronic Frontier Foundation, an independent non-profit working to protect online privacy for nearly thirty years. Surveillance Self-Defense is
Who Has Your Data and Why You Should Care Cyber Privacy demystifies the digital footprints we leave in our daily lives and reveals how our
NOTHING TO HIDE is an independent documentary dealing with surveillance and its acceptance by the general public through the “I have nothing to hide” argument.
You are being watched. Private and state-sponsored organizations are monitoring and recording your online activities. privacytools.io provides knowledge and tools to protect your privacy against
Reclaim Your Digital, Financial, and Lifestyle Freedom Written with new privacy-seekers in mind, this step-by-step guide walks you through each dimension of private living, from
Darknet Diaries is a podcast covering true stories from the dark side of the Internet. Stories about hackers, defenders, threats, malware, botnets, breaches, and privacy.
The Original Manual for Living off the Land & Doing It Yourself The definitive book of basic skills and country wisdom for living off the
Data has surpassed oil as the world’s most valuable asset. It’s being weaponized to wage cultural and political warfare. People everywhere are in a battle
America's Battle Against Russia, China, and the Rising Global Cyber Threat With each passing year, the internet-linked attacks on America's interests have grown in both

The Long Game

  • On ·
  • By ·

The Long Game: China’s Grand Strategy to Displace American Order

For more than a century, no US adversary or coalition of adversaries has ever reached sixty percent of US GDP. China is the sole exception, and it is fast emerging into a global superpower that could rival, if not eclipse, the United
States. What does China want, does it have a grand strategy to achieve it, and what should the United States do about it?

In The Long Game, Rush Doshi draws from a rich base of Chinese primary sources, including decades worth of party documents, leaked materials, memoirs by party leaders, and a careful analysis of China’s conduct to provide a history of China’s grand strategy since the end of the Cold War. Taking readers behind the Party’s closed doors, he uncovers Beijing’s long, methodical game to displace America from its hegemonic position in both the East Asia regional and global orders through three sequential “strategies of displacement.”


The Surveillance Report - featuring Techlore & The New Oil to keep you updated on the newest weekly security & privacy news.
The National Security Agency (NSA) has released guidance warning that location data from mobile phones and other internet-connected devices can be a security threat for
Get a daily rundown of the top global open source national security stories and previews of the exclusive content available on The Cipher Brief.
Michael Bazzell has helped hundreds of celebrities, billionaires, and everyday citizens disappear completely from public view. He is now known in Hollywood as the guy
The Shadow War: Inside Russia's and China's Secret Operations to Defeat America In The Shadow War, CNN anchor and chief national security correspondent Jim Sciutto
The Shared Security Show brings you news, tips, advice, and interviews with cybersecurity and privacy experts to help you live more secure and private in
From two former military officers and award-winning authors, a chillingly authentic geopolitical thriller that imagines a naval clash between the US and China in the
Chris Parker, the founder of WhatIsMyIPAddress.com, interviews guests and tells real-life stories about topics to open your eyes to the danger and traps lurking in
In T-Minus AI: Humanity's Countdown to Artificial Intelligence and the New Pursuit of Global Power, author Michael Kanaan explains the realities of AI from a human-oriented
SecurityCheckli.st provides a beginner’s checklist for staying safe on the internet. The list is dynamic and can change. The website allows you to check things
Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journalists, and politicians.
The Long Game: China's Grand Strategy to Displace American Order For more than a century, no US adversary or coalition of adversaries has ever reached
Go Incognito is a video-based course teaching users of varying experience levels about privacy, security, and anonymity. The goal is to educate users around the
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you
Zero day: a software bug that allows a hacker to break into your devices and move around undetected. One of the most coveted tools in
The VPN Toolkit provides transparent, community-driven VPN tools and utilizes community oversight and contribution to provide unbiased reviews.
The guide to restoring your online privacy. Massive organizations are monitoring your online activities. Privacy Guides is your central privacy and security resource to protect
A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers In 2014, the world witnessed the start of a mysterious series
decentralize.today (dt.gl) is a digital media platform that covers all things tech. They publish news, analyses, op-eds and articles across a broad spectrum of topics,
The Promise and the Peril of the Digital Age Microsoft President Brad Smith operates by a simple core belief: When your technology changes the world,
Why and How You Should Take Back Control of Your Data Every minute of every day, our data is harvested and exploited… It is time
Surveillance Self-Defense is a project of the Electronic Frontier Foundation, an independent non-profit working to protect online privacy for nearly thirty years. Surveillance Self-Defense is
Who Has Your Data and Why You Should Care Cyber Privacy demystifies the digital footprints we leave in our daily lives and reveals how our
NOTHING TO HIDE is an independent documentary dealing with surveillance and its acceptance by the general public through the “I have nothing to hide” argument.
You are being watched. Private and state-sponsored organizations are monitoring and recording your online activities. privacytools.io provides knowledge and tools to protect your privacy against
Reclaim Your Digital, Financial, and Lifestyle Freedom Written with new privacy-seekers in mind, this step-by-step guide walks you through each dimension of private living, from
Darknet Diaries is a podcast covering true stories from the dark side of the Internet. Stories about hackers, defenders, threats, malware, botnets, breaches, and privacy.
The Original Manual for Living off the Land & Doing It Yourself The definitive book of basic skills and country wisdom for living off the
Data has surpassed oil as the world’s most valuable asset. It’s being weaponized to wage cultural and political warfare. People everywhere are in a battle
America's Battle Against Russia, China, and the Rising Global Cyber Threat With each passing year, the internet-linked attacks on America's interests have grown in both

Sandworm

  • On ·
  • By ·

A New Era of Cyberwar and the Hunt for
the Kremlin’s Most Dangerous Hackers

In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen. They culminated in the summer of 2017, when the malware known as NotPetya was unleashed, penetrating, disrupting, and paralyzing some of the world’s largest businesses—from drug manufacturers to software developers to shipping companies. At the attack’s epicenter in Ukraine, ATMs froze. The railway and postal systems shut down. Hospitals went dark. NotPetya spread around the world, inflicting an unprecedented ten billion dollars in damage—the largest, most destructive cyberattack the world had ever seen.


The Surveillance Report - featuring Techlore & The New Oil to keep you updated on the newest weekly security & privacy news.
The National Security Agency (NSA) has released guidance warning that location data from mobile phones and other internet-connected devices can be a security threat for
Get a daily rundown of the top global open source national security stories and previews of the exclusive content available on The Cipher Brief.
Michael Bazzell has helped hundreds of celebrities, billionaires, and everyday citizens disappear completely from public view. He is now known in Hollywood as the guy
The Shadow War: Inside Russia's and China's Secret Operations to Defeat America In The Shadow War, CNN anchor and chief national security correspondent Jim Sciutto
The Shared Security Show brings you news, tips, advice, and interviews with cybersecurity and privacy experts to help you live more secure and private in
From two former military officers and award-winning authors, a chillingly authentic geopolitical thriller that imagines a naval clash between the US and China in the
Chris Parker, the founder of WhatIsMyIPAddress.com, interviews guests and tells real-life stories about topics to open your eyes to the danger and traps lurking in
In T-Minus AI: Humanity's Countdown to Artificial Intelligence and the New Pursuit of Global Power, author Michael Kanaan explains the realities of AI from a human-oriented
SecurityCheckli.st provides a beginner’s checklist for staying safe on the internet. The list is dynamic and can change. The website allows you to check things
Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journalists, and politicians.
The Long Game: China's Grand Strategy to Displace American Order For more than a century, no US adversary or coalition of adversaries has ever reached
Go Incognito is a video-based course teaching users of varying experience levels about privacy, security, and anonymity. The goal is to educate users around the
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you
Zero day: a software bug that allows a hacker to break into your devices and move around undetected. One of the most coveted tools in
The VPN Toolkit provides transparent, community-driven VPN tools and utilizes community oversight and contribution to provide unbiased reviews.
The guide to restoring your online privacy. Massive organizations are monitoring your online activities. Privacy Guides is your central privacy and security resource to protect
A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers In 2014, the world witnessed the start of a mysterious series
decentralize.today (dt.gl) is a digital media platform that covers all things tech. They publish news, analyses, op-eds and articles across a broad spectrum of topics,
The Promise and the Peril of the Digital Age Microsoft President Brad Smith operates by a simple core belief: When your technology changes the world,
Why and How You Should Take Back Control of Your Data Every minute of every day, our data is harvested and exploited… It is time
Surveillance Self-Defense is a project of the Electronic Frontier Foundation, an independent non-profit working to protect online privacy for nearly thirty years. Surveillance Self-Defense is
Who Has Your Data and Why You Should Care Cyber Privacy demystifies the digital footprints we leave in our daily lives and reveals how our
NOTHING TO HIDE is an independent documentary dealing with surveillance and its acceptance by the general public through the “I have nothing to hide” argument.
You are being watched. Private and state-sponsored organizations are monitoring and recording your online activities. privacytools.io provides knowledge and tools to protect your privacy against
Reclaim Your Digital, Financial, and Lifestyle Freedom Written with new privacy-seekers in mind, this step-by-step guide walks you through each dimension of private living, from
Darknet Diaries is a podcast covering true stories from the dark side of the Internet. Stories about hackers, defenders, threats, malware, botnets, breaches, and privacy.
The Original Manual for Living off the Land & Doing It Yourself The definitive book of basic skills and country wisdom for living off the
Data has surpassed oil as the world’s most valuable asset. It’s being weaponized to wage cultural and political warfare. People everywhere are in a battle
America's Battle Against Russia, China, and the Rising Global Cyber Threat With each passing year, the internet-linked attacks on America's interests have grown in both

Tools and Weapons

  • On ·
  • By ·

The Promise and the Peril of the Digital Age

Microsoft President Brad Smith operates by a simple core belief: When your technology changes the world, you bear a responsibility to help address the world you have helped create. This might seem uncontroversial, but it flies in the face of a tech sector long obsessed with rapid growth and sometimes on disruption as an end in itself. While sweeping digital transformation holds great promise, we have reached an inflection point. The world has turned information technology into both a powerful tool and a formidable weapon, and new approaches are needed to manage an era defined by even more powerful inventions like artificial intelligence. Companies that create technology must accept greater responsibility for the future, and governments will need to regulate technology by moving faster and catching up with the pace of innovation.

In Tools and Weapons, Brad Smith and Carol Ann Browne bring us a captivating narrative from the cockpit of one of the world’s largest and most powerful tech companies as it finds itself in the middle of some of the thorniest emerging issues of our time. These are challenges that come with no preexisting playbook, including privacy, cybercrime and cyberwar, social media, the moral conundrums of artificial intelligence, big tech’s relationship to inequality, and the challenges for democracy, far and near. While in no way a self-glorifying “Microsoft memoir,” the book pulls back the curtain remarkably wide onto some of the company’s most crucial recent decision points as it strives to protect the hopes technology offers against the very real threats it also presents. There are huge ramifications for communities and countries, and Brad Smith provides a thoughtful and urgent contribution to that effort.


The Surveillance Report - featuring Techlore & The New Oil to keep you updated on the newest weekly security & privacy news.
The National Security Agency (NSA) has released guidance warning that location data from mobile phones and other internet-connected devices can be a security threat for
Get a daily rundown of the top global open source national security stories and previews of the exclusive content available on The Cipher Brief.
Michael Bazzell has helped hundreds of celebrities, billionaires, and everyday citizens disappear completely from public view. He is now known in Hollywood as the guy
The Shadow War: Inside Russia's and China's Secret Operations to Defeat America In The Shadow War, CNN anchor and chief national security correspondent Jim Sciutto
The Shared Security Show brings you news, tips, advice, and interviews with cybersecurity and privacy experts to help you live more secure and private in
From two former military officers and award-winning authors, a chillingly authentic geopolitical thriller that imagines a naval clash between the US and China in the
Chris Parker, the founder of WhatIsMyIPAddress.com, interviews guests and tells real-life stories about topics to open your eyes to the danger and traps lurking in
In T-Minus AI: Humanity's Countdown to Artificial Intelligence and the New Pursuit of Global Power, author Michael Kanaan explains the realities of AI from a human-oriented
SecurityCheckli.st provides a beginner’s checklist for staying safe on the internet. The list is dynamic and can change. The website allows you to check things
Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journalists, and politicians.
The Long Game: China's Grand Strategy to Displace American Order For more than a century, no US adversary or coalition of adversaries has ever reached
Go Incognito is a video-based course teaching users of varying experience levels about privacy, security, and anonymity. The goal is to educate users around the
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you
Zero day: a software bug that allows a hacker to break into your devices and move around undetected. One of the most coveted tools in
The VPN Toolkit provides transparent, community-driven VPN tools and utilizes community oversight and contribution to provide unbiased reviews.
The guide to restoring your online privacy. Massive organizations are monitoring your online activities. Privacy Guides is your central privacy and security resource to protect
A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers In 2014, the world witnessed the start of a mysterious series
decentralize.today (dt.gl) is a digital media platform that covers all things tech. They publish news, analyses, op-eds and articles across a broad spectrum of topics,
The Promise and the Peril of the Digital Age Microsoft President Brad Smith operates by a simple core belief: When your technology changes the world,
Why and How You Should Take Back Control of Your Data Every minute of every day, our data is harvested and exploited… It is time
Surveillance Self-Defense is a project of the Electronic Frontier Foundation, an independent non-profit working to protect online privacy for nearly thirty years. Surveillance Self-Defense is
Who Has Your Data and Why You Should Care Cyber Privacy demystifies the digital footprints we leave in our daily lives and reveals how our
NOTHING TO HIDE is an independent documentary dealing with surveillance and its acceptance by the general public through the “I have nothing to hide” argument.
You are being watched. Private and state-sponsored organizations are monitoring and recording your online activities. privacytools.io provides knowledge and tools to protect your privacy against
Reclaim Your Digital, Financial, and Lifestyle Freedom Written with new privacy-seekers in mind, this step-by-step guide walks you through each dimension of private living, from
Darknet Diaries is a podcast covering true stories from the dark side of the Internet. Stories about hackers, defenders, threats, malware, botnets, breaches, and privacy.
The Original Manual for Living off the Land & Doing It Yourself The definitive book of basic skills and country wisdom for living off the
Data has surpassed oil as the world’s most valuable asset. It’s being weaponized to wage cultural and political warfare. People everywhere are in a battle
America's Battle Against Russia, China, and the Rising Global Cyber Threat With each passing year, the internet-linked attacks on America's interests have grown in both

Privacy is Power

  • On ·
  • By ·

Why and How You Should Take Back Control of Your Data

Every minute of every day, our data is harvested and exploited… It is time to pull the plug on the surveillance economy.

Governments and hundreds of corporations are spying on you, and everyone you know. They’re not just selling your data. They’re selling the power to influence you and decide for you. Even when you’ve explicitly asked them not to.

Reclaiming privacy is the only way we can regain control of our lives and our societies. These governments and corporations have too much power, and their power stems from us–from our data. Privacy is as collective as it is personal, and it’s time to take back control.

Privacy Is Power tells you how to do exactly that. It calls for the end of the data economy and proposes concrete measures to bring that end about, offering practical solutions, both for policymakers and ordinary citizens.


The Surveillance Report - featuring Techlore & The New Oil to keep you updated on the newest weekly security & privacy news.
The National Security Agency (NSA) has released guidance warning that location data from mobile phones and other internet-connected devices can be a security threat for
Secure multiple devices at once with a Utility Bag that offers the size and strength to isolate many signals simultaneously. Operatives and executives no longer
The Apple AirTags and other Find My devices are simple, small and perfect to track Android users! Without tracking warnings, as integrated on Apple iOS,
Michael Bazzell has helped hundreds of celebrities, billionaires, and everyday citizens disappear completely from public view. He is now known in Hollywood as the guy
Money should not be an excuse to delay taking control of your safety and freedom. So Operation Privacy has made it FREE and accessible to
The gold standard in privacy. Help keep your confidential information private with the stylish 3M™ Gold Privacy Filter that offers greater clarity and a sharper
Aurora Store is an alternate to Google's Play Store, with an elegant design, using Aurora you can download apps, update existing apps, search for apps,
GrapheneOS is an open source privacy and security focused mobile OS with Android app compatibility. It's focused on the research and development of privacy and
The VPN Toolkit provides transparent, community-driven VPN tools and utilizes community oversight and contribution to provide unbiased reviews.
The EDEC USB Data Blocker protects your devices from hacking and viruses while charging from untrusted USB ports. The USB Data Blocker grants devices immunity
The OffGrid Kit includes one mobile, tablet, and laptop OffGrid bag. EDEC’s OffGrid line includes sleek designs with stitchless, thermo-welded seams and a new magnetic,
The guide to restoring your online privacy. Massive organizations are monitoring your online activities. Privacy Guides is your central privacy and security resource to protect
The Aurora AU1210MA 12-Sheet micro-cut paper/ CD/ credit card shredder with 5.0-Gallon PULLOUT basket is the perfect business and home office device to keep you
Mojave Travel Case by Mission Darkness is designed for personal security, travel protection, EMP protection, and anti-hacking/anti-tacking/anti-spying assurance. The perfect solution for protecting your phone
decentralize.today (dt.gl) is a digital media platform that covers all things tech. They publish news, analyses, op-eds and articles across a broad spectrum of topics,
Orbot is a Tor proxy app for Android brought to you by the Guardian Project. Guardian Project creates easy to use secure apps, open-source software
Orfox is a Tor Browser for Android brought to you by the Guardian Project. Guardian Project creates easy to use secure apps, open-source software libraries,
The Tor software protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody
Why and How You Should Take Back Control of Your Data Every minute of every day, our data is harvested and exploited… It is time
Since 2013, hushed has offered low cost private numbers for talk and text in 45 countries. Their goal is to provide private mobile telecommunications options
Tutanota is the world's most secure email service, easy to use and private by design. With end-to-end encryption and 2FA, your emails have never been
ProtonVPN is a security focused VPN service, developed by CERN and MIT scientists. Use the web anonymously, unblock websites & encrypt your connection. Unique Features
Linphone is an open source SIP phone for smartphones, tablets and desktop platforms. Linphone provides voice/video calls and instant messaging, and is available for mobile
Surveillance Self-Defense is a project of the Electronic Frontier Foundation, an independent non-profit working to protect online privacy for nearly thirty years. Surveillance Self-Defense is
Who Has Your Data and Why You Should Care Cyber Privacy demystifies the digital footprints we leave in our daily lives and reveals how our
Silent Pocket's flagship Faraday sleeves give anyone the ability to disappear from the grid with our patented radio frequency (RF) Faraday cage. Signal Blocking Device
DuckDuckGo does not store your personal information. Ever. Their privacy policy is simple: they do not collect or share any of your personal information. DuckDuckGo
NOTHING TO HIDE is an independent documentary dealing with surveillance and its acceptance by the general public through the “I have nothing to hide” argument.
Firefox Focus brings added privacy by allowing you to block known website trackers by category: Ads, analytics and social trackersOther content trackers – this category

Cyber Privacy

  • On ·
  • By ·

Who Has Your Data and Why You Should Care

Cyber Privacy demystifies the digital footprints we leave in our daily lives and reveals how our data is being used—sometimes against us—by the private sector, the government, and even our employers and schools. It explains the trends in data science, technology, and the law that impact our everyday privacy.

It’s high time to rethink notions of privacy and what, if anything, limits the power of those who are constantly watching, listening, and learning about us.

This book is for readers who want answers to three questions: Who has your data? Why should you care? And most important, what can you do about it?


The Surveillance Report - featuring Techlore & The New Oil to keep you updated on the newest weekly security & privacy news.
The National Security Agency (NSA) has released guidance warning that location data from mobile phones and other internet-connected devices can be a security threat for
Secure multiple devices at once with a Utility Bag that offers the size and strength to isolate many signals simultaneously. Operatives and executives no longer
The Apple AirTags and other Find My devices are simple, small and perfect to track Android users! Without tracking warnings, as integrated on Apple iOS,
Michael Bazzell has helped hundreds of celebrities, billionaires, and everyday citizens disappear completely from public view. He is now known in Hollywood as the guy
Money should not be an excuse to delay taking control of your safety and freedom. So Operation Privacy has made it FREE and accessible to
The gold standard in privacy. Help keep your confidential information private with the stylish 3M™ Gold Privacy Filter that offers greater clarity and a sharper
Aurora Store is an alternate to Google's Play Store, with an elegant design, using Aurora you can download apps, update existing apps, search for apps,
GrapheneOS is an open source privacy and security focused mobile OS with Android app compatibility. It's focused on the research and development of privacy and
The VPN Toolkit provides transparent, community-driven VPN tools and utilizes community oversight and contribution to provide unbiased reviews.
The EDEC USB Data Blocker protects your devices from hacking and viruses while charging from untrusted USB ports. The USB Data Blocker grants devices immunity
The OffGrid Kit includes one mobile, tablet, and laptop OffGrid bag. EDEC’s OffGrid line includes sleek designs with stitchless, thermo-welded seams and a new magnetic,
The guide to restoring your online privacy. Massive organizations are monitoring your online activities. Privacy Guides is your central privacy and security resource to protect
The Aurora AU1210MA 12-Sheet micro-cut paper/ CD/ credit card shredder with 5.0-Gallon PULLOUT basket is the perfect business and home office device to keep you
Mojave Travel Case by Mission Darkness is designed for personal security, travel protection, EMP protection, and anti-hacking/anti-tacking/anti-spying assurance. The perfect solution for protecting your phone
decentralize.today (dt.gl) is a digital media platform that covers all things tech. They publish news, analyses, op-eds and articles across a broad spectrum of topics,
Orbot is a Tor proxy app for Android brought to you by the Guardian Project. Guardian Project creates easy to use secure apps, open-source software
Orfox is a Tor Browser for Android brought to you by the Guardian Project. Guardian Project creates easy to use secure apps, open-source software libraries,
The Tor software protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody
Why and How You Should Take Back Control of Your Data Every minute of every day, our data is harvested and exploited… It is time
Since 2013, hushed has offered low cost private numbers for talk and text in 45 countries. Their goal is to provide private mobile telecommunications options
Tutanota is the world's most secure email service, easy to use and private by design. With end-to-end encryption and 2FA, your emails have never been
ProtonVPN is a security focused VPN service, developed by CERN and MIT scientists. Use the web anonymously, unblock websites & encrypt your connection. Unique Features
Linphone is an open source SIP phone for smartphones, tablets and desktop platforms. Linphone provides voice/video calls and instant messaging, and is available for mobile
Surveillance Self-Defense is a project of the Electronic Frontier Foundation, an independent non-profit working to protect online privacy for nearly thirty years. Surveillance Self-Defense is
Who Has Your Data and Why You Should Care Cyber Privacy demystifies the digital footprints we leave in our daily lives and reveals how our
Silent Pocket's flagship Faraday sleeves give anyone the ability to disappear from the grid with our patented radio frequency (RF) Faraday cage. Signal Blocking Device
DuckDuckGo does not store your personal information. Ever. Their privacy policy is simple: they do not collect or share any of your personal information. DuckDuckGo
NOTHING TO HIDE is an independent documentary dealing with surveillance and its acceptance by the general public through the “I have nothing to hide” argument.
Firefox Focus brings added privacy by allowing you to block known website trackers by category: Ads, analytics and social trackersOther content trackers – this category

The Watchman Guide to Privacy

  • On ·
  • By ·

Reclaim Your Digital, Financial, and Lifestyle Freedom

Written with new privacy-seekers in mind, this step-by-step guide walks you through each dimension of private living, from digital privacy and asset protection to international nomadism and privacy during the COVID lockdowns. Equally important, it presents hundreds of real examples, arguments, and historical contexts for why privacy is the most important thing one can preserve.


The Surveillance Report - featuring Techlore & The New Oil to keep you updated on the newest weekly security & privacy news.
The National Security Agency (NSA) has released guidance warning that location data from mobile phones and other internet-connected devices can be a security threat for
Secure multiple devices at once with a Utility Bag that offers the size and strength to isolate many signals simultaneously. Operatives and executives no longer
The Apple AirTags and other Find My devices are simple, small and perfect to track Android users! Without tracking warnings, as integrated on Apple iOS,
Michael Bazzell has helped hundreds of celebrities, billionaires, and everyday citizens disappear completely from public view. He is now known in Hollywood as the guy
Money should not be an excuse to delay taking control of your safety and freedom. So Operation Privacy has made it FREE and accessible to
The gold standard in privacy. Help keep your confidential information private with the stylish 3M™ Gold Privacy Filter that offers greater clarity and a sharper
Aurora Store is an alternate to Google's Play Store, with an elegant design, using Aurora you can download apps, update existing apps, search for apps,
GrapheneOS is an open source privacy and security focused mobile OS with Android app compatibility. It's focused on the research and development of privacy and
The VPN Toolkit provides transparent, community-driven VPN tools and utilizes community oversight and contribution to provide unbiased reviews.
The EDEC USB Data Blocker protects your devices from hacking and viruses while charging from untrusted USB ports. The USB Data Blocker grants devices immunity
The OffGrid Kit includes one mobile, tablet, and laptop OffGrid bag. EDEC’s OffGrid line includes sleek designs with stitchless, thermo-welded seams and a new magnetic,
The guide to restoring your online privacy. Massive organizations are monitoring your online activities. Privacy Guides is your central privacy and security resource to protect
The Aurora AU1210MA 12-Sheet micro-cut paper/ CD/ credit card shredder with 5.0-Gallon PULLOUT basket is the perfect business and home office device to keep you
Mojave Travel Case by Mission Darkness is designed for personal security, travel protection, EMP protection, and anti-hacking/anti-tacking/anti-spying assurance. The perfect solution for protecting your phone
decentralize.today (dt.gl) is a digital media platform that covers all things tech. They publish news, analyses, op-eds and articles across a broad spectrum of topics,
Orbot is a Tor proxy app for Android brought to you by the Guardian Project. Guardian Project creates easy to use secure apps, open-source software
Orfox is a Tor Browser for Android brought to you by the Guardian Project. Guardian Project creates easy to use secure apps, open-source software libraries,
The Tor software protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody
Why and How You Should Take Back Control of Your Data Every minute of every day, our data is harvested and exploited… It is time
Since 2013, hushed has offered low cost private numbers for talk and text in 45 countries. Their goal is to provide private mobile telecommunications options
Tutanota is the world's most secure email service, easy to use and private by design. With end-to-end encryption and 2FA, your emails have never been
ProtonVPN is a security focused VPN service, developed by CERN and MIT scientists. Use the web anonymously, unblock websites & encrypt your connection. Unique Features
Linphone is an open source SIP phone for smartphones, tablets and desktop platforms. Linphone provides voice/video calls and instant messaging, and is available for mobile
Surveillance Self-Defense is a project of the Electronic Frontier Foundation, an independent non-profit working to protect online privacy for nearly thirty years. Surveillance Self-Defense is
Who Has Your Data and Why You Should Care Cyber Privacy demystifies the digital footprints we leave in our daily lives and reveals how our
Silent Pocket's flagship Faraday sleeves give anyone the ability to disappear from the grid with our patented radio frequency (RF) Faraday cage. Signal Blocking Device
DuckDuckGo does not store your personal information. Ever. Their privacy policy is simple: they do not collect or share any of your personal information. DuckDuckGo
NOTHING TO HIDE is an independent documentary dealing with surveillance and its acceptance by the general public through the “I have nothing to hide” argument.
Firefox Focus brings added privacy by allowing you to block known website trackers by category: Ads, analytics and social trackersOther content trackers – this category