• Menu
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Healing Tao USA logo title 480x83

Medical and Spiritual Qigong (Chi Kung)

  • Home
    • Primordial Tai Chi for Enlightened Love
    • Our Mission
  • Workshops
    • Winn – Current Teaching Schedule
    • Become a Certified Tao Instructor!
  • Products
    • Guide to Best Buy Packages
      • Qigong (Chi Kung) Fundamentals 1 & 2
      • Qigong (Chi Kung) Fundamentals 3 & 4
      • Fusion of the Five Elements 1, 2, & 3: Emotional & Psychic Alchemy
      • Inner Sexual Alchemy
    • Best Buy Packages Download
    • Video Downloads
    • Audio Downloads
    • DVDs
    • Audio CD Home Study Courses
    • eBooks & Print Books
    • Super Qi Foods & Elixirs
    • Sexual Qigong & Jade Eggs
    • Medical Qigong
    • Chinese Astrology
    • Other Cool Tao Products
      • Tao T-Shirts
      • Joyce Gayheart
        CD’s and Elixirs
      • Qi Weightlifting Equipment
  • Retreats
  • Articles / Blog
    • Loving Tao of Now
      (Michael’s blog)
    • 9 Stages of Alchemy
    • Tao Articles
    • Newsletter Archive
    • Primordial Tai Chi: HOW does it Grow Self-Love?
    • Oct. 2023 Newsletter
  • FAQ / Forum
    • FAQ
    • Forum Online Discussion
    • Loving Tao of Now
      (Michael’s blog)
  • Winn Bio
    • Short Bio
    • Michael Winn: The Long Story
    • Healing Tao USA logo as Musical Cosmology
  • China Trip
    • ••• China Dream Trip: August 2026 DATES •••
    • Photos: Past China Trips
  • Contact
    • Office Manager – Buy Products
    • Find Instructor Near You
    • Links
  • Cart
  • Search
  • Home
    • Primordial Tai Chi for Enlightened Love
    • Our Mission
  • Workshops
    • Winn – Current Teaching Schedule
    • Become a Certified Tao Instructor!
  • Products
    • Guide to Best Buy Packages
      • Qigong (Chi Kung) Fundamentals 1 & 2
      • Qigong (Chi Kung) Fundamentals 3 & 4
      • Fusion of the Five Elements 1, 2, & 3: Emotional & Psychic Alchemy
      • Inner Sexual Alchemy
    • Best Buy Packages Download
    • Video Downloads
    • Audio Downloads
    • DVDs
    • Audio CD Home Study Courses
    • eBooks & Print Books
    • Super Qi Foods & Elixirs
    • Sexual Qigong & Jade Eggs
    • Medical Qigong
    • Chinese Astrology
    • Other Cool Tao Products
      • Tao T-Shirts
      • Joyce Gayheart
        CD’s and Elixirs
      • Qi Weightlifting Equipment
  • Retreats
  • Articles / Blog
    • Loving Tao of Now
      (Michael’s blog)
    • 9 Stages of Alchemy
    • Tao Articles
    • Newsletter Archive
    • Primordial Tai Chi: HOW does it Grow Self-Love?
    • Oct. 2023 Newsletter
  • FAQ / Forum
    • FAQ
    • Forum Online Discussion
    • Loving Tao of Now
      (Michael’s blog)
  • Winn Bio
    • Short Bio
    • Michael Winn: The Long Story
    • Healing Tao USA logo as Musical Cosmology
  • China Trip
    • ••• China Dream Trip: August 2026 DATES •••
    • Photos: Past China Trips
  • Contact
    • Office Manager – Buy Products
    • Find Instructor Near You
    • Links
  • Cart
  • Search

NSA (Big Brother) is watching you as you read this post (Scary Details)

by

Home › Forum Online Discussion › General › NSA (Big Brother) is watching you as you read this post (Scary Details)

  • This topic has 2 replies, 2 voices, and was last updated 11 years, 10 months ago by Steven.
Viewing 3 posts - 1 through 3 (of 3 total)
  • Author
    Posts
  • August 3, 2013 at 4:06 am #41040
    Michael Winn
    Keymaster

    NSA tool collects “Nearly Everything You Do On the Internet”; Targeting Journalists; What Google Knows About You; Warrantless Cellphone Tracking Upheld
    Posted: 02 Aug 2013 09:09 AM PDT by Mish Shedlock blog.

    Today I offer a quartet of news stories on the NSA, widespread targeting of Journalists even by New Zealand, broad cellphone tracking, and a synopsis of what Google knows about you.

    Let’s kick off with the Guardian XKeyscore: NSA tool collects ‘nearly everything a user does on the internet’.
    • XKeyscore gives ‘widest-reaching’ collection of online data
    • NSA analysts require no prior authorization for searches
    • Sweeps up emails, social media activity and browsing history

    A top secret National Security Agency program allows analysts to search with no prior authorization through vast databases containing emails, online chats and the browsing histories of millions of individuals, according to documents provided by whistleblower Edward Snowden.

    The NSA boasts in training materials that the program, called XKeyscore, is its “widest-reaching” system for developing intelligence from the internet.

    XKeyscore, the documents boast, is the NSA’s “widest reaching” system developing intelligence from computer networks – what the agency calls Digital Network Intelligence (DNI). One presentation claims the program covers “nearly everything a typical user does on the internet”, including the content of emails, websites visited and searches, as well as their metadata.

    The purpose of XKeyscore is to allow analysts to search the metadata as well as the content of emails and other internet activity, such as browser history, even when there is no known email account (a “selector” in NSA parlance) associated with the individual being targeted.

    Analysts can also search by name, telephone number, IP address, keywords, the language in which the internet activity was conducted or the type of browser used.

    William Binney, a former NSA mathematician, said last year that the agency had “assembled on the order of 20 trillion transactions about US citizens with other US citizens”, an estimate, he said, that “only was involving phone calls and emails”. A 2010 Washington Post article reported that “every day, collection systems at the [NSA] intercept and store 1.7 billion emails, phone calls and other type of communications.”
    Targeting of Investigative Journalists

    Pater Tenebrarum on the Acting Man blog writes about the Targeting of Investigative Journalists and those opposed to the War in Afghanistan.
    There are seemingly constantly new revelations about extremely questionable practices employed by the security apparatus. The latest comes from ‘five eyes’ partner New Zealand, which not too long ago had to admit that its spooks illegally spied on Kim Dotcom to help the FBI make an example of the man in the context of copyright enforcement (we have previously discussed the case of Dotcom, who is accused of breaking laws that apparently don’t even exist).

    New Zealand’s reaction to this embarrassment was, as you may have guessed, to introduce new legislation that will henceforth legalize domestic spying. In the meantime, its security apparatus seems not really deterred by the embarrassment caused to it by the Dotcom case and continues to engage in highly dubious surveillance activities, actively aided and abetted by US intelligence services. The target in the latest case was an investigative journalist working for McClatchy. Here is an excerpt from an article on the matter by the CPJ, [the Committee to Protect Journalists]. We want to direct your attention especially to the final paragraph below, which is quite chilling:

    “Concern over government surveillance of journalists has washed up on the faraway shores of New Zealand, with a report in the country’s Sunday Star this week asserting that the military there, with help from U.S. intelligence, spied on an investigative journalist who had been critical of its activities in Afghanistan.

    Compounding concerns about the New Zealand military’s targeting of journalists, the Sunday Star reported that a confidential military training manual drafted in 2003 lists investigative journalists as one of the top threats to state security–up there with terrorists and hostile foreign intelligence groups. A military official in New Zealand acknowledged the existence of the manual on Monday, referring to it as “inappropriate and heavy-handed,” and ordered a revision to remove any references to journalists, news reports said.”

    Whether or not they remove the references to journalists from their training manual, the mindset is clear – this is what they actually believe: “Investigative journalists are one of the top threats to state security–up there with terrorists and hostile foreign intelligence groups.”

    We have to admit that this is actually true – in a dictatorship. In allegedly free countries, investigative journalists are usually deemed to be among the people who help seeing to it that they remain free.
    Search for Pressure Cooker Leads to Knock on Door From Terrorism Police

    Via reference from ZeroHedge, please consider pressure cookers, backpacks and quinoa, oh my!
    It was a confluence of magnificent proportions that led six agents from the joint terrorism task force to knock on my door Wednesday morning. Little did we know our seemingly innocent, if curious to a fault, Googling of certain things was creating a perfect storm of terrorism profiling. Because somewhere out there, someone was watching. Someone whose job it is to piece together the things people do on the internet raised the red flag when they saw our search history.

    Most of it was innocent enough. I had researched pressure cookers. My husband was looking for a backpack. And maybe in another time those two things together would have seemed innocuous, but we are in “these times” now.

    I was at work when it happened. My husband called me as soon as it was over, almost laughing about it but I wasn’t joining in the laughter. His call left me shaken and anxious.

    What happened was this: At about 9:00 am, my husband, who happened to be home yesterday, was sitting in the living room with our two dogs when he heard a couple of cars pull up outside. He looked out the window and saw three black SUVs in front of our house; two at the curb in front and one pulled up behind my husband’s Jeep in the driveway, as if to block him from leaving.

    Six gentleman in casual clothes emerged from the vehicles and spread out as they walked toward the house, two toward the backyard on one side, two on the other side, two toward the front door.

    They walked around the living room, studied the books on the shelf (nope, no bomb making books, no Anarchist Cookbook), looked at all our pictures, glanced into our bedroom, pet our dogs. They asked if they could go in my son’s bedroom but when my husband said my son was sleeping in there, they let it be.

    They asked about me, where was I, where do I work, where do my parents live. Do you have any bombs, they asked. Do you own a pressure cooker? My husband said no, but we have a rice cooker. Can you make a bomb with that? My husband said no, my wife uses it to make quinoa. What the hell is quinoa, they asked.

    Have you ever looked up how to make a pressure cooker bomb? My husband, ever the oppositional kind, asked them if they themselves weren’t curious as to how a pressure cooker bomb works, if they ever looked it up. Two of them admitted they did.

    45 minutes later, they shook my husband’s hand and left. That’s when he called me and relayed the story. That’s when I felt a sense of creeping dread take over. What else had I looked up? What kind of searches did I do that alone seemed innocent enough but put together could make someone suspicious?

    They mentioned that they do this about 100 times a week.

    Mostly I felt a great sense of anxiety. This is where we are at. Where you have no expectation of privacy. Where trying to learn how to cook some lentils could possibly land you on a watch list. Where you have to watch every little thing you do because someone else is watching every little thing you do.

    All I know is if I’m going to buy a pressure cooker in the near future, I’m not doing it online.

    I’m scared. And not of the right things.

    CLARIFICATION AND UPDATE

    We found out through the Suffolk Police Department that the searches involved also things my husband looked up at his old job. We were not made aware of this at the time of questioning and were led to believe it was solely from searches from within our house.
    Warrantless Cellphone Tracking Upheld

    The New York Times reports Warrantless Cellphone Tracking Is Upheld
    In a significant victory for law enforcement, a federal appeals court on Tuesday said that government authorities could extract historical location data directly from telecommunications carriers without a search warrant.

    The closely watched case, in the United States Court of Appeals for the Fifth Circuit, is the first ruling that squarely addresses the constitutionality of warrantless searches of historical location data stored by cellphone service providers. Ruling 2 to 1, the court said a warrantless search was “not per se unconstitutional” because location data was “clearly a business record” and therefore not protected by the Fourth Amendment.

    For now, the ruling sets an important precedent: It allows law enforcement officials in the Fifth Circuit to chronicle the whereabouts of an American with a court order that falls short of a search warrant based on probable cause.

    “This decision is a big deal,” said Catherine Crump, a lawyer with the American Civil Liberties Union. “It’s a big deal and a big blow to Americans’ privacy rights.”

    Cellphone privacy measures have been proposed in the Senate and House that would require law enforcement agents to obtain search warrants before prying open location records. Montana recently became the first state to require a warrant for location data. Maine soon followed. California passed a similar measure last year but Gov. Jerry Brown, a Democrat, vetoed it, saying it did not strike what he called the right balance between the demands of civil libertarians and the police.
    What Google Knows About You

    Tyler Durden at Zerohedge has an interesting post What Google Knows About You.

    It’s safe to assume everything you have ever searched for, every address you looked up on Google, every email you sent, every chat message, every YouTube video you watched. It’s also safe to assume every entry is time-stamped, so it’s clear exactly, down to the minute, when all of this was done, and where you were at when you did it.

    The data can and will be used against you, in many imaginable ways, and in some ways you may not have remotely conceived, such as how searching for pressure cookers may get you an unexpected call from the terrorist police.

    My friend Pater Tenebrarum commented via email “The alleged ‘separation of powers’ is increasingly revealed as a sham – in the end, you have the government ‘controlling’ and ‘limiting’ itself.”

    August 5, 2013 at 8:25 am #41041
    Michael Winn
    Keymaster

    Silent Circle has a password test – you don’t need to sign up to test a password in the upper right. Note that longer passphrases, even if they are only lower case characters, are tougher to crack than shorter passwords with all sorts of numbers and non-characters.

    Examples:

    8 Character Randomized Password: T0u%p@s5 Time to crack: 14 minutes

    17 Character Passphrase: rockwell is right Time to crack: 4 Days

    26 Character Passphrase: The Country Is Not The Government! Time to crack: centuries

    Even with a passphrase take the extra security step and modify it with an algorithm you derive for every site. That way if a site is storing or transmitting passwords in cleartext (both big no-no’s but it happens), your password will not be known for all sites.

    Example – apple.com starts with “a” the 1st letter in the alphabet, so my passphrase might become: 1The Country Is Not The Government! <- note that I pre-pended number 1 at the start of the passphrase. I’d recommend adding at least 2 characters via your algorithm.

    Several readers of my blog post wrote to ask if the NSA doesn’t just have an end run around harder passwords for email. In short, they do, but mostly for US-based companies. The largest free email providers, Google, Yahoo!, and Microsoft are known to collaborate with the NSA and/or FBI, which means Hotmail, Yahoo! Mail, and Gmail are insecure despite your best passphrase. Hushmail, once considered a secure alternative, caved to the Feds over alleged drug running taking place via Hushmail accounts. If your 35 character passphrase is the moat to keep the NSA out, Gmail has the key to the backdoor and lets the NSA right in to directly read your email.

    The solution is to get an email account hosted outside the US. Here are several paid alternatives: NeoMailBox (Swiss Based), CounterMail (Swedish) MailVault (Norway), and an excellent article discussing the pros and cons of each. If this is too much hassle, at least adopt passphrases to avoid the non-government criminals from taking over your email and other accounts. Imagine the damage a hacker could do with access to monitor, send forged email, then lock you out of your email account. It wouldn’t take much effort to get your SSN, address and birthday – from there it’s off to the races. “Oh, you need those retirement funds wired where?” If you think this is far fetched, count the number of times a year you get a frantic message from a friend not to open an email because their account was taken over.

    Bottom Line: Consider an offshore email, but definitely make your passwords longer by using a passphrase rather than a shorter but “harder” password. Most sites will allow you to enter very long passphrases. Think of the minor investment in time versus the risk of identity theft, account takeover, and the extra time and resources for the government to snoop on you.

    August 6, 2013 at 2:33 pm #41043
    Steven
    Moderator

    Too much fear and paranoia in my view.

    I have a gmail email account.
    But I feel no need to get an “offshore” email account, or
    fancy ridiculous unbreakable passwords.
    I take basic precautions to protect against identity theft, but
    I’m not going to spend my time worrying about if the GOVERNMENT is secretly
    reading and learning things about me.

    If someone/gov’t is that desperate that they want to read my email, have at.
    Personally, I don’t think out of the 450 million Americans or 6 BILLION
    people on that planet, that I am that interesting or that important.
    And there aren’t many “dark secrets” of mine that I’m trying to keep hidden.
    People don’t need to do fancy deceptive things to glean such info,
    they can just ask me, lol.

    When you stand in your own truth, you don’t have any fear about what others may learn about you. Nor do you care.

    S

  • Author
    Posts
Viewing 3 posts - 1 through 3 (of 3 total)
  • You must be logged in to reply to this topic.
Log In

Primary Sidebar

Signup for FREE eBook – $20 value

Inner Smile free eBook with Signup to Newsletter

Way of the Inner Smile
130 page eBook

+ Qi Flows Naturally news

+ Loving the Tao of Now blog

Enter Email Only - Privacy Protected

Qigong Benefits – Michael Winn

Michael Winn Qi Products:

Best Buy Packages »
  1. Qigong Fundamentals 1 & 2
  2. Qigong Fundamentals 3 & 4
  3. Fusion of Five Elements 1, 2, 3
  4. Sexual Energy Cultivation
  5. Primordial Tai Chi / Primordial Qigong
  6. Inner Sexual Alchemy Kan & Li
  7. Sun-Moon Alchemy Kan & Li
  8. Inner Smile Gift
Individual Products
  1. Qigong Fundamentals 1
  2. Qigong Fundamentals 2
  3. Qigong Fundamentals 3
  4. Qigong Fundamentals 4
  5. Fusion of Five Elements 1
  6. Fusion of Five Elements 2 & 3
  7. Sexual Energy Cultivation
  8. Tao Dream Practice
  9. Primordial Tai Chi / Primordial Qigong
  10. Deep Healing Qigong
  11. Internal Alchemy (Kan & Li Series)
Michael Winn, President, Healing Tao USA Michael Winn, President, Healing Tao USA

Michael Winn, Pres.
Healing Tao USA

Use Michael Winn's Qi Gong products for one whole year — I guarantee you'll be 100% delighted and satisfied with the great Qi results. Return my product in good condition for immediate refund.

Guarantee Details

OUR PROMISE: Every Michael Winn Qi gong & meditation product will empower you to be more relaxed, smiling, joyful, and flowing in harmony with the Life Force.

yin-yang

Each Qigong video, book, or audio course will assist your authentic Self to fulfill worldly needs and relations; feel the profound sexual pleasure of being a radiant, healthy body; express your unique virtues; complete your soul destiny; realize peace – experience eternal life flowing in this human body Now.

© 2025 Healing Tao USA · Log in · built by mojomonger