Paid Anti-Malware Programs (which also include anti-virus protection) will provide security features not available with an out of the box computer or phone setup. You [Read More…]
In late 2013 a leaked NSA document was published by the press. The document originated in the 2008-2009 timeframe and it contains 49 pages of [Read More…]
A new site feature is now available, the technology checklist page. This checklist makes it easy to see at a glance a consolidated list that [Read More…]
As a targeted individual, it is important to understand some of the fundamental behavior and organization of the NSA which is responsible directly or indirectly [Read More…]
In a previous article I recommended that targeted individuals consider purchasing electronics from retail stores. Here is further information to back up that recommendation. The [Read More…]
Targeted Individuals should consider the use of a hardware authentication key. A hardware authentication key is a physical device that looks and functions much like [Read More…]
Personally, I recommend the use of ethernet cables for network connections over the use of WiFi as a best practice for Targeted Individuals. If you’re [Read More…]
Some targeted individuals have indicated that their devices may be tampered with. According to Newman(2013), the NSA’s elite hacking division Tailored Access Operations (TAO) has [Read More…]