Skip to main content

Operational Security

Operational security is not optional. It is a requirement.

The establishment is coming after free speech and communication networks.

In 2023, the social media network known as X (formally Twitter) announced that it would collect biometric and employment information from its users. It also now requires you to scan your face alongside government-issued ID to remain monetised with the images given over to AU10TIX, a private company based in Israel that contracts mainly with the military industrial complex.

Meanwhile, Facebook sold its user’s private messages to Netflix for $100 million USD, so they could be used to target you with advertisements. The technology used is Lavender AI which is currently in use in the world’s current war theatres.

More recently, Microsoft has introduced a new ‘Recall’ feature which takes privacy invasion to new heights!  This feature takes screenshots of your active screen every few seconds and uses AI to analyse them which has significant implications for user privacy and security. This is no mere passive violation of your data for profit.


Top threats to your privacy

Big tech companies covertly installed a “COVID-19 contact tracing” app into all mobile phone operating systems (Microsoft, Google, Apple).

Microsoft has also added overt and covert data scraping which will harvest everything you have ever typed, including passwords, email addresses, phone numbers, etc.

Apple is permanently storing all data (even deleted files you thought were permanently deleted) in their iCloud infrastructure.

Google is making attempts to prevent resellers from removing Google code from its phones even after they are purchased.


SMART Systems

Many are unaware of this, but the term “smart” is an acronym for Self-Monitoring, Analysis and Reporting Technology.  This technology is included in:

  • Phones ~ data sharing with third companies, tracking and monitoring your every move.
  • Televisions ~ records and sends all of your private conversations to third parties.
  • Baby Monitors ~ reveals the location of your child(ren).
  • “Alexa” and “Ring” ~ monitoring devices that can lock you out of your home without your knowledge.
  • Connected car technology ~ the integration of the internet and wireless communication enables cars to share data, communicate with other vehicles, access the internet, and interact with various devices and services.

These are the tools of control are sold to you as “convenient automation” but are a trojan horse for complete control and surveillance over your daily life.

These technologies pave the way to further enslave you through data selling/sharing, targeted advertisement, disabling free-speech, location monitoring/tracking – and could later be used to force unlawful house arrest.


Financial Systems

Central Bank Digital Currencies (CBDC’s) are a digital replacement for physical cash. The Central Banks will be able to monitor and control the money going into and coming out of every person’s account.

They are and instrument of control since they are programmable, can expire, are not private, and can even be directly deleted from your “wallet”, for example, Paypal’s PYUSD “stablecoin” has a built-in wallet freezing and wiping function.

At least 130 countries around the world are now considering issuing digital cash to their citizens, and CBDC is being implemented in Paypal, Apple Pay, Google Pay, Zelle, and Venmo.

This level of government control is incompatible with both economic and political freedom.


Espionage as a service

Artificial Intelligence (OpenAI, ChatGPT, Worldcoin) is upon us.

OpenAI employs the former head of the National Security Agency (NSA). It was started by Elon Musk, Peter Thiel, and Sam Altman, with funding from Amazon Web Services, among others. Their Worldcoin project, which collects biometric data for a small payment of its native cryptocurrency, has been banned by regulators across the world and is under investigation in multiple countries over privacy concerns.


Free Open-Source Software (F.O.S.S.)

FOSS is the future of technology and there are many operating systems that are excellent alternatives to what big tech companies are offering.

LinuxMint, for example, is a very easy to use Operating System and is backwards compatible even with much older hardware. For the extreme privacy conscious, QubesOS is also an excellent choice.

For mobile devices, eOS (for most phones) or Graphene OS (for Google Pixel phones) are both excellent choices. GrapheneOS even provides a sandbox for Big Tech apps that will allow you to run them in an isolated manner that is not able to talk to the rest of the phone on the OS or file system level.


Privacy respecting solutions

It is FAR beyond time to wake up and kick this trash technology to the curb, before it is too late.

If you are still using big tech infrastructure (software or hardware) for daily use, those days are numbered because the technocratic agenda is moot if you leave the ecosystem.

You can do this easily by deleting all your big tech accounts and protecting yourself using privacy-friendly solutions.

Privacy-respecting laptops, ‘DeGoogled’ phones, and personal consultations are available at Incognito Privacy Tech.


Want to find out more?

We offer free access to our library of recorded presentations and host weekly members meetings where our knowledgeable experts and volunteers share valuable insights and tips on how to navigate the challenges of technological operational security.

Join our membership today and be supported within a community, whatever your circumstances may be | Join now

Powered By MemberPress WooCommerce Plus Integration