Which Countries Have the Least Internet Freedom

This week we received an email from our friends at comparitech.com. They’ve put together research and awesome infographics of privacy in other countries, including internet privacy. There’s some really surprising information here and you should check it out.


They’ve pulled together data from 10 different sources to provide a comprehensive picture of not only which countries have the best and worst track record in terms of Internet freedom and cybersecurity but also those countries that are least prepared and most vulnerable.cyber internet attack

What Information Can be Found With a Phone Number

When you consider connecting the dots to create a picture, imagine your phone number as the dot that connects everything else they know about you.  Even if they have it all, it is up to you whether or not they have the dot with your phone number to complete the picture.phone hacker

All it takes to find everything is to just find that phone number connected to one of the many things we already know like your facebook account (which requires a phone number) or any shopping card from a corporate retailer you may have given your number to.  Do you still believe those corporations don’t sell or trade your private information?  Well even if you do, it doesn’t matter because they are all systematically hacked a bare minimum of every 3-5 years.

Any email you get for free is being picked off as we speak.  It doesn’t matter if you gave the provider any phone information or not.  All you have to do is reveal your phone number in the text of an email and boom!! Mission accomplished!!  Free emails mine everything that comes across your screen, including drafts.  Why do you think they always want you to “secure” your email account with a phone number?

If you have connected to an old friend or new business acquaintance by email or social media and given them your phone number in a message it is connecting you to that phone number and that media account.

It’s called the world wide WEB for a reason.  Everything you do is sucked into a giant computer and maintained for profit and micromanagement of the public.  A good researcher can take an unknown phone number and use cell towers to “pair” it with other devices already known to be in your name.  For example: a burner phone (see our article on burner phones https://privacyliving.com/2016/05/17/what-is-a-burner-phone-how-can-it-help-me/ ) can have its owner pegged pretty efficiently when it is continually detected near the same owner’s normal cell phone or other smart device.  This can include cars with smart devices embedded in them.  By detecting an unknown phone continually traveling to the same places and staying at the same address all night along with already known devices it is easy to deduce that you are the owner.

As you can see, being truly anonymous requires some serious work but it is possible.  You can always pick up a copy of “Disappear in 24 Hours” by Lonn E Wolfenstein if you want to do a total makeover.  The book is available at Brave New Books in Austin TX or can be ordered by clicking the products link at the top of this page.

Privacy is officially no longer safe around modern technologies such as smart phones, smart TVs and the like. This is something that we always kind of knew, but it’s now been confirmed in the latest Wikileak.

Via the WikiLeaks press release (courtesy of Naturalnews.com):

Recently, the CIA lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized “zero day” exploits, malware remote control systems and associated documentation. This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA. The archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.

“Year Zero” introduces the scope and direction of the CIA’s global covert hacking program, its malware arsenal and dozens of “zero day” weaponized exploits against a wide range of U.S. and European company products, include Apple’s iPhone, Google’s Android and Microsoft’s Windows and even Samsung TVs, which are turned into covert microphones

Read more: http://www.naturalnews.com/2017-03-07-vault-7-bombshell-just-vindicated-every-conspiracy-theorist-the-cia-can-spy-on-anyone-through-tvs-iphones-smart-phones-and-windows-pcs.htmlcia hacking code phone

Your TV is Watching You!

Is your TV watching you? tv-watching-you

Vizio, one of the world’s biggest makers of Smart TVs, is paying $2.2 million to settle charges that it collected viewing habits from 11 million devices without the knowledge or consent of the people watching them.

According to a complaint filed Monday by the US Federal Trade Commission, Internet-connected TVs from Vizio contained ACR—short for automated content recognition—software. Without asking for permission, the ACR code captured second-by-second information about the video the TVs displayed. The software collected other personal information and transmitted it, along with the viewing data, to servers controlled by the manufacturer. Vizio then sold the data to unnamed third-parties for purposes of audience measurement, analysis, and tracking.

Read more at arstechnica.com


Make Your Property Ownership Information Confidential

Currently, many states in the US make it super easy for anyone to search for your home address and find out information about where you live, what your home is valued, your tax information, the size of your home, your mailing address and more. With identity theft and other violent crimes being as pervasive as they are, there are ways to protect your family, make yourself more private and less of a target.

When it comes to property, such as land or homes, one of the best ways to construct a barrier between yourself and those who are searching for you (solicitors, criminals, nosy neighbors and others), is to put your property into a trust or LLC. The downside to this plan is that trusts and LLCs require time and money. For example, you may need to hire an attorney to create an LLC for your property (contact us if you want help with this – we have an easier, faster way to do this), and in many cases you must own the property outright in order to create such a legal umbrella (the bank cannot own the property). property-cad-request-confidential

A quicker, cheaper and easier way to gain a new layer of privacy between your property and your identity is to request confidentiality status for the property. How do you make your property information confidential, avoiding the prying eyes of snoops and bad guys? Your properties information is typically managed and maintained by a county appraisal district (CAD). For example, if you purchase a property, you are required to have a registered surveyor conduct a survey of the property boundaries which will be recorded legally by the CAD in your county or district. The CAD keeps hardcopies of your property survey with details of who owns the property (through county records), and also posts information about the property on their website, which is typically available to the public.

If you don’t want others to be able to view your property ownership information on the CAD website or request copies of the information, you must make a request through the CAD for property confidentiality status. Normally, this requires that the owner complete a request form and submit it to the CAD for review. It is important to note that in some places there may be limitations to what information remains confidential and who is eligible to apply for property confidentiality status. In some states, the information will be completely blocked from the website and not available for anyone but law enforcement. In addition, in the state that I live in, for example, only individuals such as law enforcement, military, judges and victims of family violence may apply for confidentiality status. However, it never hurts to apply, even if you think you might not be eligible. I contacted the CAD in my area and was told that no proof of status (law enforcement or other) was required to be submitted with the application (other states may require verification). Did I mention that the applications are, in many cases, free?!

Need help? Contact us at our “CONTACT” link at the top of the page and get started today!

How to Do a Real Acid Wash on Emails: Not the CNN Fact Check method

I’m so fed up with these CNN fact checkers!  This time it’s the “acid wash” bit where everything I try to look up for the first 10 pages of the web are Donald Trump “fact checks”.  Who cares what was said?  The real thing you are looking for is a fool proof way of dissolving your information where somebody can’t recover it and then use it against you or your family.  You are now at the right place.
Destroying a Hard Drive the Correct Way
First of all, in my book “Disappear in 24 Hours”, I discuss that there is only one good way of destroying a hard drive.  Boil it for a good while and then put it in the microwave until you start to hear lots of popping noises.  Then take a hammer and smash away.  Smash it into the smallest pieces you can get it into.  Next, find some trash cans or dumpsters around town to throw a few pieces at a time away.  I do like the idea of throwing pieces of the boiled, cooked and smashed hard drive into black water but I hate the idea of littering, so don’t do that.destroy-computer-hard-drive-hammer
Though I believe my original routine to be quite sufficient, I neglected, in my book to explain that another great strategy before destroying a hard drive is to delete everything and overwrite it.  Secondly, the acid idea is not in my book because it is a book based on time efficiency and I doubt the reader would have time or be in a position to shop around town for the chemicals needed.  Here is the acid destruction solution:
It takes a mixture of Nitric Acid (HNO3) and Hydrochloric acid (HCL) in a glass container.  Heed my warning about the glass container please!  Anything left after a couple hours in that solution and you can take those to the next level of smashing and dumping.
The Real Acid Wash of Emails
As far as the acid wash of emails is concerned that would not be a physical process.  This is a fabled process according to the usual bloggers but I am quite certain after speaking to some sources that there is a process of actually destroying actual emails and anywhere those emails may have been received or sent from can also be dealt with.  This process would require a very skilled individual in an administrative position to go into the system through a “back door” and remove the data.  This may be called “acid washing” in a metaphoric sort of way.  An example of this is Amazon Kindle.  They call it “Kindle” because it is symbolism for a book burning.  In this case no real acid is involved.  Due to the position it would require along with the risk and skill involved we can extrapolate that it is a very expensive process, as Trump stated in the debate.
So is Hillary in the Clear?
There are only 2 problems with the acid wash method: Screen shots, and hackers.  Screen shots are self explanatory.  A screen shot taken and kept out of reach is a hard copy.  Secondly, if a hacker gets into the email and takes information for himself before the acid wash then the information is still out there.  So when it comes to the hacking situation we see, the Clintons still have a problem.
Most of us could never imagine being able to afford an acid wash, so my best advice is to stick with a device that is not traceable and use a pseudonym when communicating.  When it comes time to ditch it, follow my original advice from the book “Disappear in 24 Hours”.  At Privacy Living we also offer hard drive destruction for our members.  For more information on that contact us on the blog.

The Police May Be Tracking You and Your Phone

Recently a friend told me a story of a first hand account of police knocking on his door at 3 am looking for another person.  He was completely caught off guard and terrified for the first few minutes of them banging on his door because he thought he was being robbed (they did NOT identify themselves as police). This is a fair assumption if you wake up in the middle of the night and someone is ringing your door bell and banging on your door. Burglars frequently do this to determine if someone is at home or not – after all, they typically don’t want to hassle with homeowners in the middle of stealing all of your possessions.

Now before I get to the rest of the story, which is quite interesting, I should say that apparently the police are trying to use Stingray technology more and more these days (Read our blog about it here: https://privacyliving.com/2016/05/08/you-cant-hide-from-the-police-if-they-have-stingray-tracking-device/). You’ll recall that A Stingray is a device that mimics a cell phone tower and allows law enforcement to gather information about you by accessing your cell phone. There was an article this week, oddly enough, that questioned whether the older Stingrays would even function on a 4G or greater cell network, during an operation where local police called in the Feds – but that’s a discussion for another time.

police swat team at your door

So back to the story. My friend wakes up at 3 am, he hears pounding on his front door, door bell ringing and he sees a flash light outside his window and shadows. He’s groggy, confused and scared. The fight or flight response is taking hold in his body and he’s preparing to defend himself in the event that the burglars kick in his front door. He calls 9-11, explains the situation to the operator and she asks him to hold. Seconds later, she tells him to open the front door – it’s the police. Huh?!

It turns out that the police had been using an unidentified device to track a person’s phone and the search had erroneously led to my friends front door. He explained to them that he didn’t know the person they were looking for and that he lived alone, but they still asked to search his home, which he reluctantly allowed.

The lesson to be learned here is that you should never let anyone you don’t know in your house for any reason. Period. Even if it’s the police. And second, the police will use any means necessary to find you or someone else if given the means to do so. I hate to generalize here because I’m a supporter of the police in general. But it’s important to be aware of the state of law enforcement these days. Be safe out there.



Why are The Russians Holding Back the Clinton Emails?

If there are still 30,000 of Hillary’s emails still missing and the Russians have them, you may be wondering what is the strategic drop date for the historic nemesis of America.  The writing is on the wall that the Russians most likely have those emails but it is in their best interest to release them only at the perfect time, in which the most damage can be done.

It’s hard to imagine this Hillary email scandal has gone on for so long but I wrote an article pertaining to this exact situation just over a year ago called “What Would You Do If You Were Hillary Clinton?” https://privacyliving.com/2015/07/31/what-would-you-do-if-you-were-hillary-clinton/   In that article I predicted the emails would be held to control her if she wins the presidency.  Now that we have narrowed down the search of the foreign government holding the emails, we can begin to adjust our predictions based on what the Russians prefer. top secret hillary emails

The best bet for them is to monitor the American presidential race and only use the emails during the race if needed.  It is my opinion that the Russians, while acting Pro-Trump, secretly want Clinton to win since these emails they are holding will give them some leverage in negotiations for anything they want.  However, if Trump begins to pick up in the polls and it becomes very obvious that he will win by a landslide, the Russians will release the Clinton emails so they can pull favor with the “President Trump”.

One final angle you may be stumbling over is Julian Assange.  Isn’t he supposedly the one holding the Clinton emails?  Well, yes, but he will be answering to the Russians on this one.  In fact, the Russians will be able to walk away with clean hands on this one no matter how it turns out.  They will use someone else to look like the guy (or government) that hacked these emails.  Either way, I think we are all curious what is actually in those messages.

Person of Interest: Conditioning Americans to Accept NSA Spying

I recently began watching a TV show called “Person of Interest”, starring Jim Caviezel. The premise of the show goes like this: what would you do if you had information about a crime before it happens? Would you step in and save the potential victims? Arrest the soon-to-be perpetrator?

It’s a great concept for television and presents moral and ethical dilemmas for the viewer to consider. For example, knowing the future, is it acceptable to spy on those who might consider committing a crime? And is using blanket email, phone and video feed spying acceptable if it leads to preventing one crime?

person of interest promo image

Unfortunately, there are some serious issues with “Person of Interest”. The show is blatantly hypocritical when it comes to privacy and assumes that blanket spying on Americans (something the NSA has already been caught doing) is acceptable, when it is definitely illegal (see 4th Amendment to US Constitution). Caviezel plays “Reese”, a former CIA operative who is eager to hunt down bad guys and right their wrongs, no matter how violent things have to get. He is partnered with a wealthy, cutting-edge software engineer named “Finch” who designs a software program for the US Government that use data gathered by phone, email and video to determine who will commit crimes before they happen. By the way, in case you are not aware, the US Government is already collecting and caching your data courtesy of several government agencies including NSA in a program called PRISM. Finch and Reese team up to stop crimes before they occur using their special monitoring software which tells them when the next crime is likely to occur and involving whom.

Ironically, Finch, who designs software to spy on Americans, is extremely private about his personal life. He essentially lives in hiding, using aliases, burner phones, working at menial jobs to hide his true identity and more. And when Reese constantly attempts to find out more about his new partner, Finch becomes irritated and defensive at the very idea that he should give up some of his privacy. Actually, that’s hypocritical.

And of course it’s wrong for the writers and producers of the show to just assume that blanket spying on Americans is ok, as long as we might be able to solve a crime – totally unacceptable, last time I checked the 4th Amendment. But let’s get down to brass tacks here. The bigger issue is how “Person of Interest” is meant to condition the viewer to accept the tyrannical and Orwellian ideals that spying on Americans (in the name of justice and public safety) is ok. Attention zombies: just keep watching ESPN Sports Center and Dancing with the Stars; nothing to see here.

PRISM how data collected

The reality here is that in case you didn’t notice, Hollywood has been hijacked by propagandists within our own US Government. History is being re-written every time a new blockbuster movie and new tv series premieres. The most recent, glaring example that comes to mind is the Hollywood movie “Zero Dark Thirty”, which tells the tale of how Osama Bin Laden was supposedly assassinated by the US Military. I don’t think there’s any disputing the fact that US Military personnel descended on a real mission to capture or kill Bin Laden. The problem is that the mission doesn’t appear to be genuine and was probably just a PR stunt that even the soldiers involved weren’t aware that they were a part of. The full story hasn’t come out yet, but if you’ve looked into the conspiracies behind the September 11, 2001 terrorist plot, you know that Bin Laden and the Bush Family were documented to be business partners (Former President Bush was meeting with Bin Laden’s company in Washington DC the day of 9-11), and it’s unlikely that the US ever went after Bin Laden, given his past associations with the Bush’s and the CIA. Oddly enough, most of the members of the special military group (Seal Team 6) who were involved in the Bin Laden raid died mysteriously in a helicopter crash after the raid – convenient for a cover up, at best.

I have the utmost respect for those who serve in the military, especially those on elite teams that conduct extreme training and are expected to put their lives on the line for special operations at a moment’s notice. This is why stories like these anger me even more, knowing that these patriots were likely used like pawns in a sick psychological operation to mislead the American people at large – making us believe that the “boogie man” Bin Laden had been finally put down. Yet later we find out that Bin Laden was just a CIA operative working for the US. Each year that passes makes the post 9-11 period where the US began waging war on other nations like Iraq and Afghanistan look more and more ominous and wrong.

Don’t be fooled by the propaganda in movies and on television. Hollywood will mislead you and even the “mainstream” news these days can’t be trusted. Verify things for yourself. You have the power of the internet to look up and verify every movie and story that you hear on tv. Use the internet to your advantage. Don’t be sheep!


4th Amendment: https://www.law.cornell.edu/constitution/fourth_amendment

4th Amendment Violation: https://www.lewrockwell.com/lrc-blog/the-nsa-spying-on-americans-violates-the-fourth-amendment/

Seal Team 6 Bin Laden Crash: http://www.washingtontimes.com/news/2013/oct/20/families-suspect-seal-team-6-crash-was-inside-job-/?page=all

Bin Laden and CIA: http://www.informationclearinghouse.info/article1245.htm


Bin Laden and Bushes: http://www.globalresearch.ca/george-w-bush-and-the-bin-laden-family-meet-in-new-york-city-one-day-before-911/5332870


Hollywood Propaganda:





NSA is spying on you: http://reason.com/blog/2014/03/10/edward-snowden-nsa-too-busy-spying-on-am

PRISM spy program: https://www.washingtonpost.com/news/wonk/wp/2013/06/12/heres-everything-we-know-about-prism-to-date/





Any Video Camera Can Be Accessed By Anyone At Anytime

Scientists have now revealed the technology which allows a hacker, law enforcement officer, stalker, or anyone else to access feeds to any video camera. Do you have cameras in your home? Someone could be watching you now.

https://www.wired.com/2016/05/new-surveillance-system-let-cops-use-cameras/web cam spy in home hacker