Stephen E. Arnold: An Email That Does Not Exploit You – StartMail

Autonomous Internet
35Shares
Stephen E. Arnold

StartMail is the private email service that guards your data the way you should

No matter who handles your email services, you’re very likely, though often unknowingly, allowing them into your life. They can track you and your activities as well as read your emails in exchange for that free service. And that doesn’t even get into all the ways your emails and even your email address itself can be compromised and misused.

See Also:

Smart Nation Vision – By Invitation

Robert Steele: Law Enforcement Across US Refusing to Enforce COVID Orders

Cultural Intelligence
104Shares

Law Enforcement Across the U.S. Overwhelmingly REFUSING to Enforce COVID Orders – Will the Public Follow?

ROBERT STEELE: This is an excellent counterpoint to:

Mongoose: Citizens Stand Up to Fat Stupid Sheriffs Without a Warrant

Lockdowns are a violation of interstate commerce  protocols and masks as well as vaccines are a violation of the  Nuremberg Protocls. “Health” regulations are supposed to be enforced by the health agency, not the police. We may be looking at the beginning of the end of the state and local bureaucracies that have sold themselves to the Deep State and its Zionist Cultural Marxist gun control treat the people like cockroaches agenda.

Unz Review: The Great Replacement – Whites Out of Philadelphia

Cultural Intelligence
44Shares

The Great Replacement: Philadelphia

This is the eighth in a series about the continuing disappearance of whites from American cities (see our earlier entries for Birmingham, Washington, D.C., New York City, Chicago, Richmond, Milwaukee, and Baltimore). Many people still pretend that The Great Replacement is a myth or a conspiracy theory, but the graphs that accompany each article in this series prove them wrong. Every city has a different story but all have seen a dramatic replacement of whites by minorities.

Answers on OSINT for India 3 – OSINT & Denied Areas

Design
38Shares

Sir, kindly guide on –

1- How can OSINT ops be successively conducted on closed information states like China or North Korea? (Attaching a file I had downloaded)

2- Is the information that China generally makes public through its stare-run agencies reliable and sufficient?

3- Is there any research paper or unclassified information over the organisations collecting OSINT for China?

4- Please suggest sources on the Military Uses of OSINT.

Questions repeated & answered after graphic.

Continue reading “Answers on OSINT for India 3 – OSINT & Denied Areas”

Answers on OSINT for India 2 – OSINT & Technical vs. OSINT & Analytical

Design
10Shares

Sir,

I have noticed one particular characteristic of OSINT which is that any OSINT process involves two actions, namely, intelligence collection and then intelligence analysis. I have observed that OSINT collection process is technical and requires thorough understanding of different technologies, softwares and methodologies while intelligence analysis depends more upon the analyst’s judgment.

This brings us to breaking OSINT into two components- the technical one that relates with collection of OSINT and the non-technical one relating to analysis. Can this be depicted with the help of the following diagram?

Continue reading “Answers on OSINT for India 2 – OSINT & Technical vs. OSINT & Analytical”