Everybody needs to take steps to protect their privacy online. How you do this is up to you. It's like packing your own parachute.
Now we need a spot to organize and we already have that here on Voat. We should agree on a backup site in case Voat gets taken down.
From this point on I'm going to lay out the basic conceptual framework of a decentralized public intelligence agency.This is a really simplified breakdown. I'm not going into all the intricate details and explaining how every action should be performed. This isn't a manual, it's just a basic breakdown. I'll soon write a very detailed step by step codebook which will explain how to literally do everything down to the most minute detail.
Now how do we get boots on the ground?
Like I said before, we need to crowd source private investigators which essentially makes them "agents". This would give us the ability to be anywhere at anytime. There are private investigators all around the world that can be hired anonymously over the Internet at anytime. They're basically hired goons that will go where we tell them go and talk to who we tell them to talk to, and they'll even wear hidden cameras to document everything too. Another thing we'd have to do is hire agents to investigate each other so we'd be able to keep an eye on them. Have the watchers watch themselves too.
We need to start seeing submissions that read "Need 1200$ to investigate XYZ" with a link to a Go-Fund-Me page. You shouldn't get into the details too much because all the information will be publicly accessible and so you don't want to give the people you're investigating a heads up.
Now we obviously don't want to throw money at strangers and simply hope they don't rip us off right? , correct, so how do we ensure that we're giving money to trustworthy people? First of all they'd have to provide the name of the private investigator so that way we'd be able to contact him and confirm that he was indeed being procured to do a job for us. This way we could hire another private investigator to investigate him should we choose to.
People would naturally learn which people's Go-Fund-Me campaigns were yielding the better results and eventually everybody would know who the reputable people were and they'd donate to them.
Another problem would be people feeding us misinformation. That'd be the number one threat, which is why our " agents" would be best used a drones. Instead of letting them roam free autonomously doing their own thing it'd be best to have them follow a specific series of instructions such as " go park X and film everybody that walks into Y" or " go talk to X and ask him Y" , things like that. Use them as eyes and ears. Tell them what to do and have it all documented with a hidden camera. Use them as field agents to gather Intel and that's it. Our job is to collectively analyze the information, not theirs.
Another problem is that all the information obtained by the PIs would be publicly available and so the people investigating us would know what we'd know. Well at that point it would be too late and any changes in their behaviour will be indicative of guilt. We'll be putting the heat down and watching to see who squirms. Whoever squirms from the pressure becomes a focal point of the investigation. Obviously making information publicly available will impede our effectiveness as an intelligence agency, however that's one of the disadvantages to operating publicly like this.
Now the beauty about all this is that it's also a very powerful psychological weapon and just the thought of having a decentralized public intelligence agency with an army of agents up their ass will make them sweat.
There's a lot more to this and I'm prepared to write a step by step guide, basically a codebook explaining how to do everything, and I mean absolutely everything. You won't even need to know how to think for yourself if you don't want to. You don't have to follow the code either, but If we all did we'd all be working as one despite remaining decentralized and compartmentalized.
We don't want to give our organization any focal point for them to attack. We don't want to give it a head for them to cut off. We don't want any centralized leadership at all.
You can't destroy a structure if there isn't one to destroy.
view the rest of the comments →
zofo777 ago
Can we get some resources up on how to mask computers/devices?
thefloodcontrol ago
There are problems with simple answers to this question. 1) extremely large amounts of available information. 2) divergent viewpoints (TOR or VPN? Is both a good idea or not.) 3) economics. (Buy a new computer never let windows touch it) 4) technical skill level (Browsing with Lynx/w3m over TOR) etc. If you run windows (botnet): get virtualbox and create a Ubuntu (assuming low skill) VM with full disk encryption. Then decide on using a paid VPN or TOR. Use firefox with uMatrix (spoof referers on etc) Ghostery, HTTPS everywhere.
zofo777 ago
Let's be realistic. the average joe has no clue what most of this stuff is, and certainly can't afford another computer for this purpose (I can't - I have a laptop with windows). If we really want a nice, concerted effort with security measures, we need easy(er), or at least well-guided solutions for anonymity.
LtSilverFox ago
There is no such thing.
thefloodcontrol ago
If you are not running a linux vm on top of your Windows install at a bare minimum you would only be deluding yourself into thinking you have any security. https://youtu.be/CkDd6jClqEE This seems to be a decent tut for installing VirtualBox and a Ubuntu VM on Windows.
LtSilverFox ago
And your still not completely safe lol wait till that guy realizes he has to maintain all these programs. Going anon on the Internet isn't as simple as it sounds
thefloodcontrol ago
Well, once you get used to it it becomes natural. You just have to care. TBH I just use a pretty standard linux distro, VPN normally and the plugins I mentioned. But yeah you are right: still not completely safe, thats impossible.
FuckReddit69 ago
Best thing ive heard is to rent a configured TOR bridge (obfs or w.e) from a paid service, and pay anonymously (bitcoin if they accept) . Havnt done it but this seems the best way to browse dn. They cant see TOR traffic or know your even using it