Archive for the ‘Government Intimidation’ Category

Susan Lindauer was a major CIA asset leading up to the 9/11 attacks. She was the main person in charge of communicating back-channel relations between Iraq and the U.S. Because she had inside knowledge that the U.S. knew for months in advance that the 9/11 attack was coming, the U.S. government had her detained under the Patriot Act and imprisoned in a military facility for a year. And then she remained under legal indictment for five years. She was apparently very close to having her brain scrambled via drugs by the government. Hers is a tragic and harrowing story, but her story proves beyond doubt, that corruption exists at the highest levels of the U.S. government. She is a real American Hero.

See this interview with former CIA intelligence asset Susan Lindauer.

And this followup interview: Former CIA Asset Susan Lindauer on naysayers, her post 9/11 story, the Patriot Act, NDAA, and more.

(The text below was taken from the followup interview above, as located on the ActivistPost.com website. Thanks!)

Back in September, we spoke to former CIA asset Susan Lindauer (here and here), in an interview that generated a lot of discussion online. Ms. Lindauer’s story, which completely counteracts the idea that there was no specific intelligence regarding the 9/11 attacks in advance, was received extremely positively by the majority of our audience.

With some message board chatter centering around questions of credibility, we decided to give her the opportunity to set the record straight on her CIA involvement and, in particular, a character assassination piece from the New York Times in April 2004. Susan also picks up her story from where she left off last time, and touches on the Patriot Act and the NDAA 2012.


Read Full Post »

The following is an excerpt from the conclusion of the paper listed below:

The nothing to hide argument speaks to some problems, but not to others. It represents a singular and narrow way of conceiving of privacy, and it wins by excluding consideration of the other problems often raised in government surveillance and data mining programs. When engaged with directly, the nothing to hide argument can ensnare, for it forces the debate to focus on its narrow understanding of privacy. But when confronted with the plurality of privacy problems implicated by government data collection and use beyond surveillance and disclosure, the nothing to hide argument, in the end, has nothing to say.

‘I’ve Got Nothing to Hide’ and Other Misunderstandings of Privacy

Daniel J. Solove

George Washington University Law School

San Diego Law Review, Vol. 44, p. 745, 2007
GWU Law School Public Law Research Paper No. 289

In this short essay, written for a symposium in the San Diego Law Review, Professor Daniel Solove examines the nothing to hide argument. When asked about government surveillance and data mining, many people respond by declaring: “I’ve got nothing to hide.” According to the nothing to hide argument, there is no threat to privacy unless the government uncovers unlawful activity, in which case a person has no legitimate justification to claim that it remain private. The nothing to hide argument and its variants are quite prevalent, and thus are worth addressing. In this essay, Solove critiques the nothing to hide argument and exposes its faulty underpinnings.

Number of Pages in PDF File: 28

Keywords: privacy, nothing to hide, data mining, surveillance

Accepted Paper Series

Read Full Post »

John Taylor Gatto, American hero, is a former New York State and New York City Teacher of the Year and the author of a number of books including Dumbing Us Down: The Hidden Curriculum of Compulsory Schooling, and The Underground History of American Education, which can be read in its entirety online at his website. He was a participant in the Harper’s Magazine forum “School on a Hill,” which appeared in the September 2001 issue. The reason that I see Gatto as a hero is because he was willing to stand up and tell the truth, and he has done so admirably.

(The following article first appeared in September 2003 issue of Harper’s Magazine. Thanks!)

Against School

By John Taylor Gatto

How public education cripples our kids, and why

I taught for thirty years in some of the worst schools in Manhattan, and in some of the best, and during that time I became an expert in boredom. Boredom was everywhere in my world, and if you asked the kids, as I often did, why they felt so bored, they always gave the same answers: They said the work was stupid, that it made no sense, that they already knew it. They said they wanted to be doing something real, not just sitting around. They said teachers didn’t seem to know much about their subjects and clearly weren’t interested in learning more. And the kids were right: their teachers were every bit as bored as they were.

Boredom is the common condition of schoolteachers, and anyone who has spent time in a teachers’ lounge can vouch for the low energy, the whining, the dispirited attitudes, to be found there. When asked why they feel bored, the teachers tend to blame the kids, as you might expect. Who wouldn’t get bored teaching students who are rude and interested only in grades? If even that. Of course, teachers are themselves products of the same twelve-year compulsory school programs that so thoroughly bore their students, and as school personnel they are trapped inside structures even more rigid than those imposed upon the children. Who, then, is to blame?

We all are. My grandfather taught me that. One afternoon when I was seven I complained to him of boredom, and he batted me hard on the head. He told me that I was never to use that term in his presence again, that if I was bored it was my fault and no one else’s. The obligation to amuse and instruct myself was entirely my own, and people who didn’t know that were childish people, to be avoided if possible. Certainly not to be trusted. That episode cured me of boredom forever, and here and there over the years I was able to pass on the lesson to some remarkable student. For the most part, however, I found it futile to challenge the official notion that boredom and childishness were the natural state of affairs in the classroom. Often I had to defy custom, and even bend the law, to help kids break out of this trap.

The empire struck back, of course; childish adults regularly conflate opposition with disloyalty. I once returned from a medical leave to discover that all evidence of my having been granted the leave had been purposely destroyed, that my job had been terminated, and that I no longer possessed even a teaching license. After nine months of tormented effort I was able to retrieve the license when a school secretary testified to witnessing the plot unfold. In the meantime my family suffered more than I care to remember. By the time I finally retired in 1991, I had more than enough reason to think of our schools – with their long-term, cell-block-style, forced confinement of both students and teachers – as virtual factories of childishness. Yet I honestly could not see why they had to be that way. My own experience had revealed to me what many other teachers must learn along the way, too, yet keep to themselves for fear of reprisal: if we wanted to we could easily and inexpensively jettison the old, stupid structures and help kids take an education rather than merely receive a schooling. We could encourage the best qualities of youthfulness – curiosity, adventure, resilience, the capacity for surprising insight – simply by being more flexible about time, texts, and tests, by introducing kids to truly competent adults, and by giving each student what autonomy he or she needs in order to take a risk every now and then.

But we don’t do that. And the more I asked why not, and persisted in thinking about the “problem” of schooling as an engineer might, the more I missed the point: What if there is no “problem” with our schools? What if they are the way they are, so expensively flying in the face of common sense and long experience in how children learn things, not because they are doing something wrong but because they are doing something right? Is it possible that George W. Bush accidentally spoke the truth when he said we would “leave no child behind”? Could it be that our schools are designed to make sure not one of them ever really grows up?

Do we really need school? I don’t mean education, just forced schooling: six classes a day, five days a week, nine months a year, for twelve years. Is this deadly routine really necessary? And if so, for what? Don’t hide behind reading, writing, and arithmetic as a rationale, because 2 million happy homeschoolers have surely put that banal justification to rest. Even if they hadn’t, a considerable number of well-known Americans never went through the twelve-year wringer our kids currently go through, and they turned out all right. George Washington, Benjamin Franklin, Thomas Jefferson, Abraham Lincoln? Someone taught them, to be sure, but they were not products of a school system, and not one of them was ever “graduated” from a secondary school. Throughout most of American history, kids generally didn’t go to high school, yet the unschooled rose to be admirals, like Farragut; inventors, like Edison; captains of industry, like Carnegie and Rockefeller; writers, like Melville and Twain and Conrad; and even scholars, like Margaret Mead. In fact, until pretty recently people who reached the age of thirteen weren’t looked upon as children at all. Ariel Durant, who co-wrote an enormous, and very good, multivolume history of the world with her husband, Will, was happily married at fifteen, and who could reasonably claim that Ariel Durant was an uneducated person? Unschooled, perhaps, but not uneducated.

We have been taught (that is, schooled) in this country to think of “success” as synonymous with, or at least dependent upon, “schooling,” but historically that isn’t true in either an intellectual or a financial sense. And plenty of people throughout the world today find a way to educate themselves without resorting to a system of compulsory secondary schools that all too often resemble prisons. Why, then, do Americans confuse education with just such a system? What exactly is the purpose of our public schools?

Mass schooling of a compulsory nature really got its teeth into the United States between 1905 and 1915, though it was conceived of much earlier and pushed for throughout most of the nineteenth century. The reason given for this enormous upheaval of family life and cultural traditions was, roughly speaking, threefold:
1) To make good people.
2) To make good citizens.
3) To make each person his or her personal best.

These goals are still trotted out today on a regular basis, and most of us accept them in one form or another as a decent definition of public education’s mission, however short schools actually fall in achieving them. But we are dead wrong. Compounding our error is the fact that the national literature holds numerous and surprisingly consistent statements of compulsory schooling’s true purpose. We have, for example, the great H. L. Mencken, who wrote in The American Mercury for April 1924 that the aim of public education is not to fill the young of the species with knowledge and awaken their intelligence. . . . Nothing could be further from the truth. The aim.. . is simply to reduce as many individuals as possible to the same safe level, to breed and train a standardized citizenry, to put down dissent and originality. That is its aim in the United States . . . and that is its aim everywhere else.

Because of Mencken’s reputation as a satirist, we might be tempted to dismiss this passage as a bit of hyperbolic sarcasm. His article, however, goes on to trace the template for our own educational system back to the now vanished, though never to be forgotten, military state of Prussia. And although he was certainly aware of the irony that we had recently been at war with Germany, the heir to Prussian thought and culture, Mencken was being perfectly serious here. Our educational system really is Prussian in origin, and that really is cause for concern.

The odd fact of a Prussian provenance for our schools pops up again and again once you know to look for it. William James alluded to it many times at the turn of the century. Orestes Brownson, the hero of Christopher Lasch’s 1991 book, The True and Only Heaven, was publicly denouncing the Prussianization of American schools back in the 1840s. Horace Mann’s “Seventh Annual Report” to the Massachusetts State Board of Education in 1843 is essentially a paean to the land of Frederick the Great and a call for its schooling to be brought here. That Prussian culture loomed large in America is hardly surprising, given our early association with that utopian state. A Prussian served as Washington’s aide during the Revolutionary War, and so many German- speaking people had settled here by 1795 that Congress considered publishing a German-language edition of the federal laws. But what shocks is that we should so eagerly have adopted one of the very worst aspects of Prussian culture: an educational system deliberately designed to produce mediocre intellects, to hamstring the inner life, to deny students appreciable leadership skills, and to ensure docile and incomplete citizens – all in order to render the populace “manageable.”

It was from James Bryant Conant – president of Harvard for twenty years, WWI poison-gas specialist, WWII executive on the atomic-bomb project, high commissioner of the American zone in Germany after WWII, and truly one of the most influential figures of the twentieth century – that I first got wind of the real purposes of American schooling. Without Conant, we would probably not have the same style and degree of standardized testing that we enjoy today, nor would we be blessed with gargantuan high schools that warehouse 2,000 to 4,000 students at a time, like the famous Columbine High in Littleton, Colorado. Shortly after I retired from teaching I picked up Conant’s 1959 book-length essay, The Child the Parent and the State, and was more than a little intrigued to see him mention in passing that the modern schools we attend were the result of a “revolution” engineered between 1905 and 1930. A revolution? He declines to elaborate, but he does direct the curious and the uninformed to Alexander Inglis’s 1918 book, Principles of Secondary Education, in which “one saw this revolution through the eyes of a revolutionary.”

Inglis, for whom a lecture in education at Harvard is named, makes it perfectly clear that compulsory schooling on this continent was intended to be just what it had been for Prussia in the 1820s: a fifth column into the burgeoning democratic movement that threatened to give the peasants and the proletarians a voice at the bargaining table. Modern, industrialized, compulsory schooling was to make a sort of surgical incision into the prospective unity of these underclasses. Divide children by subject, by age-grading, by constant rankings on tests, and by many other more subtle means, and it was unlikely that the ignorant mass of mankind, separated in childhood, would ever reintegrate into a dangerous whole.

Inglis breaks down the purpose – the actual purpose – of modem schooling into six basic functions, any one of which is enough to curl the hair of those innocent enough to believe the three traditional goals listed earlier:

1) The adjustive or adaptive function. Schools are to establish fixed habits of reaction to authority. This, of course, precludes critical judgment completely. It also pretty much destroys the idea that useful or interesting material should be taught, because you can’t test for reflexive obedience until you know whether you can make kids learn, and do, foolish and boring things.

2) The integrating function. This might well be called “the conformity function,” because its intention is to make children as alike as possible. People who conform are predictable, and this is of great use to those who wish to harness and manipulate a large labor force.

3) The diagnostic and directive function. School is meant to determine each student’s proper social role. This is done by logging evidence mathematically and anecdotally on cumulative records. As in “your permanent record.” Yes, you do have one.

4) The differentiating function. Once their social role has been “diagnosed,” children are to be sorted by role and trained only so far as their destination in the social machine merits – and not one step further. So much for making kids their personal best.

5) The selective function. This refers not to human choice at all but to Darwin’s theory of natural selection as applied to what he called “the favored races.” In short, the idea is to help things along by consciously attempting to improve the breeding stock. Schools are meant to tag the unfit – with poor grades, remedial placement, and other punishments – clearly enough that their peers will accept them as inferior and effectively bar them from the reproductive sweepstakes. That’s what all those little humiliations from first grade onward were intended to do: wash the dirt down the drain.

6) The propaedeutic function. The societal system implied by these rules will require an elite group of caretakers. To that end, a small fraction of the kids will quietly be taught how to manage this continuing project, how to watch over and control a population deliberately dumbed down and declawed in order that government might proceed unchallenged and corporations might never want for obedient labor.

That, unfortunately, is the purpose of mandatory public education in this country. And lest you take Inglis for an isolated crank with a rather too cynical take on the educational enterprise, you should know that he was hardly alone in championing these ideas. Conant himself, building on the ideas of Horace Mann and others, campaigned tirelessly for an American school system designed along the same lines. Men like George Peabody, who funded the cause of mandatory schooling throughout the South, surely understood that the Prussian system was useful in creating not only a harmless electorate and a servile labor force but also a virtual herd of mindless consumers. In time a great number of industrial titans came to recognize the enormous profits to be had by cultivating and tending just such a herd via public education, among them Andrew Carnegie and John D. Rockefeller.

There you have it. Now you know. We don’t need Karl Marx’s conception of a grand warfare between the classes to see that it is in the interest of complex management, economic or political, to dumb people down, to demoralize them, to divide them from one another, and to discard them if they don’t conform. Class may frame the proposition, as when Woodrow Wilson, then president of Princeton University, said the following to the New York City School Teachers Association in 1909: “We want one class of persons to have a liberal education, and we want another class of persons, a very much larger class, of necessity, in every society, to forgo the privileges of a liberal education and fit themselves to perform specific difficult manual tasks.” But the motives behind the disgusting decisions that bring about these ends need not be class-based at all. They can stem purely from fear, or from the by now familiar belief that “efficiency” is the paramount virtue, rather than love, liberty, laughter, or hope. Above all, they can stem from simple greed.

There were vast fortunes to be made, after all, in an economy based on mass production and organized to favor the large corporation rather than the small business or the family farm. But mass production required mass consumption, and at the turn of the twentieth century most Americans considered it both unnatural and unwise to buy things they didn’t actually need. Mandatory schooling was a godsend on that count. School didn’t have to train kids in any direct sense to think they should consume nonstop, because it did something even better: it encouraged them not to think at all. And that left them sitting ducks for another great invention of the modem era – marketing.

Now, you needn’t have studied marketing to know that there are two groups of people who can always be convinced to consume more than they need to: addicts and children. School has done a pretty good job of turning our children into addicts, but it has done a spectacular job of turning our children into children. Again, this is no accident. Theorists from Plato to Rousseau to our own Dr. Inglis knew that if children could be cloistered with other children, stripped of responsibility and independence, encouraged to develop only the trivializing emotions of greed, envy, jealousy, and fear, they would grow older but never truly grow up. In the 1934 edition of his once well-known book Public Education in the United States, Ellwood P. Cubberley detailed and praised the way the strategy of successive school enlargements had extended childhood by two to six years, and forced schooling was at that point still quite new. This same Cubberley – who was dean of Stanford’s School of Education, a textbook editor at Houghton Mifflin, and Conant’s friend and correspondent at Harvard – had written the following in the 1922 edition of his book Public School Administration: “Our schools are . . . factories in which the raw products (children) are to be shaped and fashioned.. . . And it is the business of the school to build its pupils according to the specifications laid down.”

It’s perfectly obvious from our society today what those specifications were. Maturity has by now been banished from nearly every aspect of our lives. Easy divorce laws have removed the need to work at relationships; easy credit has removed the need for fiscal self-control; easy entertainment has removed the need to learn to entertain oneself; easy answers have removed the need to ask questions. We have become a nation of children, happy to surrender our judgments and our wills to political exhortations and commercial blandishments that would insult actual adults. We buy televisions, and then we buy the things we see on the television. We buy computers, and then we buy the things we see on the computer. We buy $150 sneakers whether we need them or not, and when they fall apart too soon we buy another pair. We drive SUVs and believe the lie that they constitute a kind of life insurance, even when we’re upside-down in them. And, worst of all, we don’t bat an eye when Ari Fleischer tells us to “be careful what you say,” even if we remember having been told somewhere back in school that America is the land of the free. We simply buy that one too. Our schooling, as intended, has seen to it.

Now for the good news. Once you understand the logic behind modern schooling, its tricks and traps are fairly easy to avoid. School trains children to be employees and consumers; teach your own to be leaders and adventurers. School trains children to obey reflexively; teach your own to think critically and independently. Well-schooled kids have a low threshold for boredom; help your own to develop an inner life so that they’ll never be bored. Urge them to take on the serious material, the grown-up material, in history, literature, philosophy, music, art, economics, theology – all the stuff schoolteachers know well enough to avoid. Challenge your kids with plenty of solitude so that they can learn to enjoy their own company, to conduct inner dialogues. Well-schooled people are conditioned to dread being alone, and they seek constant companionship through the TV, the computer, the cell phone, and through shallow friendships quickly acquired and quickly abandoned. Your children should have a more meaningful life, and they can.

First, though, we must wake up to what our schools really are: laboratories of experimentation on young minds, drill centers for the habits and attitudes that corporate society demands. Mandatory education serves children only incidentally; its real purpose is to turn them into servants. Don’t let your own have their childhoods extended, not even for a day. If David Farragut could take command of a captured British warship as a preteen, if Thomas Edison could publish a broadsheet at the age of twelve, if Ben Franklin could apprentice himself to a printer at the same age (then put himself through a course of study that would choke a Yale senior today), there’s no telling what your own kids could do. After a long life, and thirty years in the public school trenches, I’ve concluded that genius is as common as dirt. We suppress our genius only because we haven’t yet figured out how to manage a population of educated men and women. The solution, I think, is simple and glorious. Let them manage themselves.

Read Full Post »

Note: While I agree with the article below in general, I have not personally verified all of the particulars of the claimed details.

Also see Wake Up Citizens! and New World Order, and this video: 3/01/12 Michael Parenti: The Face of Imperialism, U.S. Empire – OneRadioNetwork.com

(The following article was taken from the educate-yourself.org website. Thanks!)

The New World Order (NWO) – An Overview

By Ken Adachi <Editor@educate-yourself.org>

Google Translator: Convert English into 51 Different Languages


There is a worldwide conspiracy being orchestrated by an extremely powerful and influential group of genetically-related individuals (at least at the highest echelons) which include many of the world’s wealthiest people, top political leaders, and corporate elite, as well as members of the so-called Black Nobility of Europe (dominated by the British Crown) whose goal is to create a One World (fascist) Government, stripped of nationalistic and regional boundaries, that is obedient to their agenda. Their intention is to effect complete and total control over every human being on the planet and to dramatically reduce the world’s population by 5.5 Billion people. While the name New World Order is a term frequently used today when referring to this group, it’s more useful to identify the principal organizations, institutions, and individuals who make up this vast interlocking spiderweb of elite conspirators.

The Illuminati is the oldest term commonly used to refer to the 13 bloodline families (and their offshoots) that make up a major portion of this controlling elite. Most members of the Illuminati are also members in the highest ranks of numerous secretive and occult societies which in many cases extend straight back into the ancient world. The upper levels of the tightly compartmentalized (need-to-know-basis) Illuminati structural pyramid include planning committees and organizations that the public has little or no knowledge of. The upper levels of the Illuminati pyramid include secretive committees with names such as: the Council of 3, the Council of 5, the Council of 7, the Council of 9, the Council of 13, the Council of 33, the Grand Druid Council, the Committee of 300 (also called the “Olympians”) and the Committee of 500 among others.

In 1992, Dr John Coleman published  Conspirators’ Hierarchy: The Story of the Committee of 300. With laudable scholarship and meticulous research, Dr Coleman identifies the players and carefully details the Illuminati agenda of worldwide domination and control. On page 161 of the Conspirators Hierarchy, Dr Coleman accurately summarizes the intent and purpose of the Committee of 300 as follows:

“A One World Government and one-unit monetary system, under permanent non-elected hereditary oligarchists who self-select from among their numbers in the form of a feudal system as it was in the Middle Ages. In this One World entity, population will be limited by restrictions on the number of children per family, diseases, wars, famines, until 1 billion people who are useful to the ruling class, in areas which will be strictly and clearly defined, remain as the total world population.

     There will be no middle class, only rulers and the servants. All laws will be uniform under a legal system of world courts practicing the same unified code of  laws, backed up by a One World Government police force and a One World unified military to enforce laws in all former countries where no national boundaries shall exist. The system will be on the basis of a welfare state; those who are obedient and subservient to the One World Government will be rewarded with the means to live; those who are rebellious will simple be starved to death or be declared outlaws, thus a target for anyone who wishes to kill them. Privately owned firearms or weapons of any kind will be prohibited.”

The sheer magnitude and complex web of deceit surrounding the individuals and organizations involved in this conspiracy is mind boggling, even for the most astute among us. Most people react with disbelief and skepticism towards the topic, unaware that they have been conditioned (brainwashed) to react with skepticism by institutional and media influences that were created by the Mother of All mind control organizations: The Tavistock Institute of Human Relations in London. Author and de-programmer Fritz Springmeier (The Top 13 Illuminati Bloodlines ) says that most people have built in “slides” that short circuit the mind’s critical examination process when it comes to certain sensitive topics. “Slides”, Springmeier reports, is a CIA term for a conditioned type of response which dead ends a person’s thinking and terminates debate or examination of the topic at hand. For example, the mention of the word “conspiracy” often solicits a slide response with many people. (Springmeier has co-authored three books on trauma-based programming which detail how the Illuminati employs highly tuned and extremely sophisticated Mind Control (MC) training programs that begin the programming process while the intended victim is still within the womb. Mind Control is a much greater problem than most people realize. According to Cisco Wheeler, a former Illuminati mind control programmer, there are 10 million people who have been programmed as mind controlled slaves using trauma-based MC programs with names like Monarch and MK Ultra. The newer, non-trauma, electronic means of MC programming that grew out of the Montauk Project, may include millions more. Al Bielek, who played a principle role in the development of the Montauk Project, said that there likely 10 million victims of Montauk style mind control programming worldwide, the majority located in the USA. He also said that there are covert Montauk Programming ‘Centers’ in every major city in the U.S. )

What most Americans believe to be “Public Opinion” is in reality carefully crafted and scripted propaganda designed to elicit a desired behavioral response from the public. Public opinion polls are really taken with the intent of gauging the public’s acceptance of the Illuminati’s planned programs. A strong showing in the polls tells the Illuminati that the programing is “taking”, while a poor showing tells the NWO manipulators that they have to recast or “tweak” the programming until the desired response is achieved. While the thrust and content of the propaganda is decided at Tavistock, implementation of the propaganda is executed in the United States by well over 200 ‘think tanks’ such as the Rand Corporation and the Brookings Institute which are overseen and directed by the top NWO mind control organization in the United States, the Stanford Research Institute (SRI) in Menlo Park, California.

The NWO global conspirators manifest their agenda through the skillful manipulation of human emotions, especially fear. In the past centuries, they have repeatedly utilized a contrivance that NWO researcher and author David Icke has characterized in his latest book, The Biggest Secret, as Problem, Reaction, and Solution.

The technique is as follows: Illuminati strategists create the Problem- by funding , assembling, and training an “opposition” group to stimulate turmoil in an established political power (sovereign country, region, continent, etc.) that they wish to impinge upon and thus create opposing factions in a conflict that the Illuminati themselves maneuvered into existence. In recent decades, so called “opposition” groups are usually identified in the media as ‘freedom fighters’ or ‘liberators’ (recently the KLA-Kosovo Liberation Army).

At the same time, the leader of the established political power where the conflict is being orchestrated is demonized and, on cue, referred to as ‘another Hitler’ (take your pick: Saddam Hussein, Milosevic, Kadaffi, etc.). The ‘freedom fighters’ are not infrequently assembled from a local criminal element (i.e. KLA, drug traffickers). In the spirit of true Machiavellian deceit, the same NWO strategists are equally involved in covertly arming and advising the leader of the established power as well (the Illuminati always profits from any armed conflict by loaning money, arming, and supplying all parties involved in a war).

The conflict is drawn to the world stage by the controlled  media outlets with a barrage of photos and video tape reports of horrific and bloody atrocities suffered by innocent civilians. The cry goes up “Something has to be done!” And That is the desired Reaction (note: the  same technique is presently being used to bring about gun control in the United States).

The NWO puppeteers then provide the Solution by sending in UN ‘Peace Keepers’ (Bosnia) or a UN ‘Coalition Force’ (Gulf War) or NATO Bombers and then ground troops (Kosovo). Once installed, the ‘peace keepers’ never leave (Bosnia, Kosovo).  The idea is to have NWO controlled ground troops in all major countries or strategic areas where significant resistance to the New World Order takeover is likely to be encountered.

East Timor, Indosnesia. (9/14/99) Virtually , the same strategy used to occupy Kosovo with UN/NATO troops was applied by the NWO manipulators to take military control of  East Timor. Once again, the same morality play is trotted out for public consumption: the local evil and demonic Indonesian Army trained militias responsible for the slaughter of innocent civilians following the August 30 vote for Independence (from Indonesian control), must be stopped at all costs. This time, Australia (to keep up the appearance of an ‘international’ humanitarian effort) will lead the charge with ‘peacekeeping’ troops. Of course, it didn’t take long for Madeline Albright to announce that US ‘support assets’ will be part of the “UN Peacekeeping Team”. In a  front page story in the LA Times (9/13/99), Mike Jendrzejczyk  of Human Rights Watch (an Illuminati front group)in Washington DC  said that it’s “crucial” that “peacekeepers have the authority to disarm militia forces and any Indonesian soldiers actively working with them”. ]

The local, sovereign military force is either defeated (i.e. Yugoslavia) or, as in the case of the United States itself, replaced by foreign UN “Partnership For Peace” (PFP) troops who take over the jobs of  US soldiers who have been sent overseas on  ‘peacekeeping’ missions. In addition to being killed in ground conflicts on foreign soil, US military forces will likely be reduced in the next few years through disease induced attrition (i.e. from mandatory Anthrax Vaccinations required of all US military personnel). These vaccinations will, in all probability, eventually produce the symptoms of the so-called Gulf War Illness, which was acquired by a certain percentage of Gulf War soldiers who were given a “special” anthrax vaccine (intended by the Illuminati/CIA as a test run to ascertain how quickly (and fatally) the disease would progress with a substantial population of healthy young men and women).

The corporate portion of the NWO pyramid seems to be dominated by international bankers and the big pharmaceutical cartels, as well as other major multinational corporations. The Royal Family of England, namely Queen Elizabeth II and the House of Windsor, (who are, in fact, descendants of the German arm of European Royalty -the Saxe-Coburg-Gotha family-changed the name to Windsor in 1914 ), are high level players, along with the British oligarchy which controls the upper strata of the Illuminati. The decision making Illuminati nerve centers of  this effort are in the London (especially the City of London), Basel Switzerland, and Brussels (NATO headquarters).

The United Nations, along with all the agencies working under the UN umbrella, such as the World Health Organization (WHO), are full time players in this scheme. Similarly, NATO is a military tool of the NWO.

The leaders of all major industrial countries like the United States, England, Germany, Italy, Australia, New Zealand, etc. (E.g. members of the “G7/G8” ) are active and fully cooperative participants in this conspiracy. In this century, the degree of control exerted by the Illuminati has advanced to the point that only certain hand-picked individuals, who are groomed and selected by the Illuminati are even eligible to become the prime minister or president of countries like England, Germany, or The United States. It didn’t matter whether Bill Clinton or Bob Dole won the Presidency  in 1996, the  results would have been the same (except maybe for Zipper Gate ). Both men are playing on the same team for the same ball club. Anyone who isn’t a team player is taken out: i.e.President Kennedy, Ali Bhutto (Pakistan) and Aldo Moro (Italy). More recently, Admiral Borda and William Colby were also killed because they were either unwilling to go along with the conspiracy to destroy America, weren’t cooperating in some capacity, or were attempting to expose/ thwart the Takeover agenda.

Most of the major  wars, political upheavals,  and economic depression/recessions of the past 100 years (and earlier)  were carefully planned and instigated by the machinations of these elites. They include The Spanish-American War (1898), World War I and World War II; TheGreat Depression; the Bolshevik Revolution of 1917; the Rise of Nazi Germany; the Korean War; the Vietnam War; the 1989-91″fall” of Soviet Communism, the 1991 Gulf War;  and the recent War in Kosovo. Even the French Revolution was an orchestrated into existence by the Barvaian Illuminati and the House of Rothchild.


In America, the Federal Emergency Management Administration (FEMA) was created in 1979 under Presidential Memorandum 32 authored for President Carter by Prof. Samuel P. Huntington, a Harvard professor and former FEMA Advisory Board chairman. Huntington wrote the Seminal Peace for the Trilateral Commission in the mid 70’s, in which he criticized democracy and economic development as outdated ideas. As co-author of another report prepared for the Trilateral Commissiosn, The Crisis of Democracy, Huntington wrote:

We have come to recognize that there are potential desirable limits to economic growth. There are also potentially desirable limits to the indefinite extension of political democracy. A government which lacks authority will have little ability short of cataclysmic crisis to impose on its people the sacrifices which may be necessary.”

Huntington’s ideas were rewritten into National Security Decision Directive #47 (NSDD47), which was enacted in July 1982 by President Reagan. Treated as a passing footnote by the media, this law identified legitimate areas to be upgraded to maintain national defense, but it also laid the groundwork for Emergency Mobilization Preparedness, a plan under which existing socioeconomic regulations or other legal constraints would be waived in the event of a national emergency. This plan was further strengthened in Public Law 101-647, signed by President Bush in November 1990.What it boils down to is this: in the event that the President declares a national emergency, for any reason (from major earthquakes to increased international tensions or economic /financial crisis of any stripe), FEMA can then, at their discretion, implement Executive Orders 10995 through 11005. These Executive Orders permit a takeover by FEMA of local, state, and national governments and the suspension of constitutional guarantees. FEMA will have the authority to exert any sort of control that it deems necessary upon the American public. Atrained National Police Force, formally referred to by the name of Multi Jurisdictional Task Force (MJTF), wearing black uniforms and composed of:

1. specially selected US military personnel
2. foreign military units carrying United Nations ID cards, and
3. specially trained existing police groups from larger metropolitan American cities.

These members of the MJTF will implement and enforce martial law under the direction and control of FEMA. The President and Congress are out of the loop.

FEMA is the Trojan Horse by which the New World Order will implement overt, police-state control over the American populace.

War on Drugs

The “War on Drugs” is a cruel joke. The US government, specifically the CIA, is the biggest ‘drug lord’ on the planet. Drug money is used to pay for innumerable ‘black projects’, including the construction of huge underground cities housing both humans and aliens working with the secret US government.

The instigation of a trumped-up war as a cover for amassing  fortunes can be dated back to at least the 12th Century when only a core group of nine members of an Illuminati group called the Knights Templar, the military arm of an Illuminati secret society known as the Priory of Sion, kicked off the The Crusades that lasted for over a century and a half. A rift later developed between the Templars and the Priory of Sion when Jerusalem was lost to Saracen Turks in 1187. In 1307, the king of France, Philippe the Fair (a Merovingian Illuminati), coveted the wealth and was jealous of the Templars’ power. The French king, being a puppet of the Priory of Sion, set out to arrest all the Templars in France on October 13. While many Templars were seized and tortured, including their Grand Master, Jacques de Molay, many other Templars (who had been tipped off) escaped. They eventually resurfaced in Portugal, in Malta (as the Knights of Malta) and later in Scotland as The Scottish Rites of Free Masonry.

The acquisition and consolidation of ever greater wealth, natural resources, total political power, and control over others are the motivating forces which drives the decisions of the Illuminati. The toll in human suffering and the loss of innocent lives are non issues for these individuals, who are aligned with very dark and malevolent 4th dimensional aliens. The dominant group of 4th dimentional malevolent aliens controlling and manipulating the human Iluminati are known as Draconians or Drakos Reptilians. Not all alien reptilians are of a negative spiritual orientation.

Mind Control

Recent revelations from deprogrammed Illuminati (government) mind controlled individuals such as Arizona Wilder (The Biggest Secret), Cisco Wheeler( The Illuminati Formula to Create an Undetectable Total Mind Control Slave),Cathy O’Brien (Trance Formation of America), and Brice Taylor (Thanks for the Memories) leave NO DOUBT that the upper levels of the  Illuminati engage in Satanic rituals which usually include the killing of young children, the drinking of  human blood and the consuming of flesh and human organs.

The details of the Illuminati conspiracy are brilliantly laid out in the books of David Icke (Tales from the Time Loop, Children of the Matrix, Alice in Wonderland and the World Trace Center Disaster, The Biggest Secret, The Truth Shall Set You Free, and I am Me, I am Free; and in three books by Dr. John Coleman (Conspirators’ Hierarchy: The Story of The Committee of 300; One World Order: Socialist Dictatorship; and  Diplomacy by Deception

To be Continued & Expanded…

Read Full Post »

This whole subject of disinformation is a very tricky business. The elite that are in control are exceptionally good at deception in many ways, so you really have to be on your toes when researching a subject. See CIA-Sponsored Trolls Monitor Internet & Interact With Users to Discredit Factual Information for starters.

You really have to be careful where you put your trust because there are many places, prominently placed on search engine results, that are there to “debunk” the truth for you. While the truth can’t really be debunked, they make a good try at it. These sites can be well funded and provide convincing arguments against the truth. They seem to tend to do this in a way that, if you’re not watching carefully, can make you feel foolish for believing whatever it is that you are investigating. They will also provide true information as well so the site looks legit until you investigate a bit more closely. If you use the Snopes.com website to vet information, see the article below.

Similarly, there are sites that sound like they’re going to talk about what you’re interested in, and they do, only they tell you a fabricated or misleading story, craftily bending the details to suit their ends. In fact, mainstream media is quite adept at this. From my perspective, I have to carefully pick and choose only very specific parts of mainstream media articles because (with occasional exceptions) they produce highly biased, government and corporate approved, “news”. Propaganda is closer to the truth of it.

There are also other sites that appear to provide alternative news, and they actually do so, but they also produce propaganda along with this already discovered news. Assuming the latest information regarding the VeteransToday.com website is true, and I’m gathering from numerous sources that it is true, the main man there, Gordon Duff, admitted in a video interview that about 40% of the content on the website is knowingly and intentionally not true. The video has been removed from YouTube for copyright issues, and Duff has since denied that he said it, and/or that it was actually the Israeli Mossad that modified the video! This does not ring true for numerous reasons if you do the research.

There are other sites that seem to only report the truth, and may perhaps even break new stories, but they steer clear of the real issues with Israel. There are two persons where I (and others) find this to be true: Alex Jones (infowars.com prisonplanet.tv) and Jesse Ventura. There are probably others. I can only speculate as to the reason that they steer clear of outing Israel for what it is. Maybe they have been threatened or bribed, or maybe they’re really working for the “other side”. I really don’t know, but I do know that something is gigantically wrong when Israel is not shown to be what it is – a terrorist state that is essentially in control of the U.S. government.

As I point out in my main page for Israel, Israel has invaded the U.S. government like a virus, to the point of being in complete control of U.S. foreign policy, and it is, with rare exception, the gatekeeper for every President, Senator and Representative and most likely, the heads of other agencies like the CIA – see this. In other words, if the Israeli lobby group of AIPAC and the JDL and Anti-Defamation League watchdog groups don’t like you, you will not be elected. Period. And if you say anything against Israel, they won’t like you, they’ll brand you as anti-Semitic, and they’ll work to destroy you, and they’re damn good at doing just that. I’m sure there are exceptions to this rule, but this is, without exaggeration, the rule accepted by almost every politician. For this reason, almost every person that is in congress, is by necessity, in league with these Israeli groups, and these groups don’t give a shit about what’s good for America. Those groups, along with many, many very high ranking self-professed Zionist government officials, are there to make sure that anything and everything that happens in the American government is, first and foremost, to the direct benefit of Israel. This is why the American government continues to vote, time after time, against the interests of America, and for the interests of Israel. Insanity. It’s just like a virus or a cancer that has invaded a body.

There are websites that do go against Israel, which I still find to be suspect. David Icke’s site falls into this category. I can’t say for sure whether his website is legit or not. I like quite a bit of what he has to say, and find some of his messages to be downright inspiring. On the other hand, his beliefs regarding what’s actually going on are so far out that it sounds ridiculous; this detracts from the overall believability of his messages. However, I also have to say, I’ve seen many things that initially sound completely crazy, that I eventually discover to be true. So I have to admit that he may be correct, I really don’t know. He may present completely legitimate information, and those in power are using his site (or any and every alternative news site) to gather names and information of people that are interested in following this type of information. Tracking the names of the believers, the people that actually know the truth. David may or may not be in on such an effort. As I said before, I really don’t know, but I feel that caution is warranted. As you’ll see, on this site and others, Big Brother IS listening, looking, recording, researching, harassing, arresting, detaining, torturing, maiming, murdering…

The following article was taken from the rense.com website. Thanks!)

Is Snopes A Disinformation Operation?

For those of you that put your trust in Snopes…

Many of the emails that have been sent or forwarded that had any anti Obama in it were negated by Snopes. I thought that was odd. Check this out.

Snopes, Soros and the Supreme Court’s Kagan.   We-l-l-l-l now, I guess the time has come to check out Snopes! You don’t suppose it might not be a good time to take a second look at some of the stuff that got kicked in the ditch by Snopes, do you?

We’ve known that it was owned by a lefty couple but hadn’t known it to be financed by Soros!

Snopes is heavily financed by George Soros, a big time supporter of Obama! In our Search for the truth department, we find what I have suspected on many occasions.

I went to Snopes to check something about the dockets of the new Supreme Court Justice. Elena Kagan, who Obama appointed, and Snopes said the email was false and there were no such dockets. So I Googled the Supreme Court, typed in Obama-Kagan, and guess what? Yep, you got it; Snopes Lied! Everyone of those dockets are there.

So Here is what I wrote to Snopes:

Referencing the article about Elana Kagan and Barak Obama dockets:

The information you have posted stating that there were no such cases as claimed and the examples you gave are blatantly false. I went directly to the Supreme Courts website, typed in Obama Kagan and immediately came up with all of the dockets that the article made reference to. I have long suspected that you really slant things but this was really shocking. Thank You. I hope you will be much more truthful in the future, but I doubt it.

That being said, Ill bet you didn’t know this.

Kagan was representing Obama in all the petitions to prove his citizenship. Now she may help rule on them. Folks, this is really ugly.

Chicago Politics and the beat goes on and on and on. Once again the US Senate sold us out!

Now we know why Obama nominated Elana Kagan for the Supreme Court. Pull up the Supreme Courts website, go to the docket and search for Obama. She was the Solicitor General for all the suits against him filed with the Supreme Court to show proof of natural born citizenship. He owed her big time. All of the requests were denied of course. They were never heard. It just keeps getting deeper and deeper, doesn’t it? The American people mean nothing any longer.It’s all about payback time for those who compromised themselves to elect someone who really has no true right to even be there.

Here are some websites of the Supreme Court Docket: You can look up some of these hearings and guess what?

Elana Kagan is the attorney representing Obama!

Check out these examples:




Read Full Post »

(This article was taken from the occupycorporatism.com website. Thanks!)

CIA-Sponsored Trolls Monitor Internet & Interact With Users to Discredit Factual Information

Nov 29th, 2012 0 Comment

Susanne Posel
Occupy Corporatism
November 29, 2012

In July of this year it became apparent through a flood of mainstream media reports that the National Security Agency (NSA) was “desperate to hire new hacking talent to protect the nation’s critical infrastructure” yet the NSA is notorious for its surveillance programs on American digital activity.

David Petraeus, former director of the CIA, said at a summit for In-Q-Tel, that he was speculating on the “internet of things” and that “‘Transformational’ is an overused word, but I do believe it properly applies to these technologies . . . particularly to their effect on clandestine tradecraft.”

Petraeus is seeking to better the CIA’s ability to create online identities for undercover spies. Currently, each internet user has a digital footprint that can trace the movements online to the person on the other end of the screen. Petraeus wants to utilize technology that will essentially erase a digital footprint; erasing all traces of anyone at the whim of the CIA.

In a possible preparation for the ability of the CIA to spy on American citizens with their household items, the NSA’s Utah Data Center is located in the Utah desert in the foot hills of the Wasatch mountain range. This is the centerpiece of the Global Information Grid; a military project that collects yottabytes of data. They are listening to every conversation, reading every post, intercepting every text message under the false flag of terrorism.

The facility has the technological ability to record and analyze every communication in the world. From emails to phone calls to text messages to chats; nothing is private anymore.

Based on “threat Levels” the NSA can use all the technology at their disposal to obtain information on:

• Finances
• Stock transactions
• Business deals
• Foreign military
• Diplomatic secrets
• Legal documents
• Personal civilian communications

This information could be used at Fusion Centers for the DHS to create a more efficient profile on each and every American citizen. The implications are staggering. This ability to collect these types of data are a violation of the 4th Amendment guard against unreasonable searches and seizures. By collecting intelligence on every American citizen, the US government is treating everyone as if they were a potential foreign or domestic terrorist. Whether this assumption is valid or not, under the US constitution, Americans are supposed to be protected from intrusion of government; even if that government is their own.

At the same time the NSA spy center was being constructed, Attorney General Eric Holder new guidelines for the National Counterterrorism Center (NCTC). These guidelines will allow the NCTC access to data on American citizens once held under right to privacy. The NCTC will focus on collecting and sharing information; regardless of whether or not there is the threat of terrorism. The will collaborate with local state officials, tribal courts and private partners; as well as the FBI and DHS and other federal agencies.

The Obama administration empowered the NCTC with the authority afforded Obama under Presidential Executive Order 13354. This EO was codified by the Intelligence Reform and Terrorism Prevention Act of 2004. The NCTC reports directly to the President and director of National Intelligence as instructed by the President and Department of Homeland Security (DHS). Sen. John McCain was integral in the creation of this combination of military strength and governmental power culminating in all-encompassing tyranny.

Both private and public corporations will be employed to mine the data. Silicon Valley and other technology giants in the private sector will have open access to private information on any and all American citizens.

Since the manufactured attack on 9/11, the US government has created a “vast domestic intelligence apparatus” that spies on Americans and collects massive amounts of data to be profiled and used at the discretion of the Federal Bureau of Investigations (FBI), local law enforcement, DHS and military criminal investigators. The FBI and NSA house more than 1.5 billion government and private sector profiles. The information on average citizens includes all sources of criminal and non-criminal databases that assist the US government in creating a filing system on each American.

The NSA has a comprehensive program to search out our schools into scouting grounds for a team of American grown hacker community. The Obama administration has made it a concern of theirs that the future of cybersecurity rest with the college graduates of tomorrow. The NSA is focusing on colleges and universities within the US. Four schools have already been singled out as official Centers of Academic Excellence in Cyber Operations (CAE-COP).

The CAE-COP focuses on recruiting persons with “particular emphasis on technologies and techniques related to specialized cyber operations (e.g., collection, exploitation, and response), to enhance the national security posture of our Nation.”

Those chosen for this program become vital researchers expected to assist the NSA in:

• Global communications and computing networks
• Developing a digital strategic advantage
• Collaboration with the US government on cyber issues
• Carry out directives on designated targets at the discretion of the US government

These “cyber operators” are trained to become an elite team of “computer geniuses” that are experts in computer hacking, digital communications, cyber intelligence – for the purpose of spying on Americans; as well as conducting interactive digital psy-ops with users of the internet.

Earlier this month, Janet Napolitano, in her blog entitled “Inspiring the Next Generation of Cyber Professionals”, would like future generations to learn about cybersecurity so that their contribution to the federal government is secure to “ensure their professional development.” The collaboration of the Department of Homeland Security and the National Security Agency will support “the nation’s educational infrastructure by supporting Centers of Academic Excellence” to make sure that the “scope of cyber education” becomes an important function for those in the field as inspired by the National Initiative for Cybersecurity Education (NICE).

NICE is meant to “establish an operational, sustainable and continually improving cybersecurity education program for the nation to use sound cyber practices that will enhance the nation’s security.” The National Institute of Standards and Technology (NIST) oversee NICE by providing information and leverage to encourage the development of citizens to become “responsible” when using the Internet.

Beginning in kindergarten, Napolitano hopes that the DHS-sponsored US Cyber Challenge will provide schools, universities and all forms of academia in the private sector the federal government-allocated tools they would need to “develop the best and brightest cyber talent to meet our nation’s growing and changing security needs.”

In 2011, the NICE report entitled, “Shaping the Future of Cybersecurity Education”, explored intercepting children in the public education system, as well as continuing the focus throughout their educational career, there can be a national recruitment and retention process that produces “skilled workers for the private sector and government.”

Napolitano’s Secretary’s Honors Program for Cybersecurity Professionals is meant to recruit college students for the purpose of assimilating their talents into the federal government for “missions including cyber” security as defined by the DHS Advisory Council Task Force on CyberSkills. This focus is to ensemble the most effectual cybersecurity team comprised of civilians, US veterans and those educated specifically in the field of IT technologies. For the sake of national security, DHS is selecting the most technically skilled citizens in the avenues of malware and digital forensic analysis, to participate in the Cybersecurity Internship Program for a 2 year internship that will result in a devotional career in the federal government and service to Big Sis.

In August, the DHS was central in the taking of domain names for websites without due process or explanation – simply using the blanket claim of copyright infringement. Holder and Napolitano received correspondence from several members of the House of Representatives who were in protest of the domain name seizures, citing that the copyright claims were questionable and that the websites were clearly being censored for alternative reasons.

The letter stated that: “Our concern centers on your Department’s methods, and the process given, when seizing the domain names of websites whose actions and content are presumed to be lawful, protected speech.”

According to Lynnae Williams, former CIA clandestine service trainee and DIA analyst, the FBI and CIA use trolls to monitor social media and interact with users to discredit information disseminated on the web. Williams explains that the CIA provides training videos to new recruits on how to troll the internet. Once a target is locked-in, all open source information is obtained on the individual, and then any angle to discredit them in public forum is used on social media sites.

Software is used to sift through the “mountains” of users on social networking sites. At the Atlanta CIA branch where Williams was trained, she personally witnessed CIA-sponsored and sanctioned trolling of Americans on social networking sites.

In 2011, the CIA revealed its Open Source Center where recruited personnel are used as government trolls to “analyze” websites for information pertinent to the objective of the US government – meaning discrediting targets on certain websites. Under the guise of conducting business intelligence (i.e. cyberespionage), the Open Source software gathers digital data on targets; including all Facebook posts, Twitter posts, comments on website threads. Those assigned to monitor this data can interact with users online through anonymous portals. Agents are designated to surveillance operations to message anyone, analyze political and religious speech, assess trends and conduct electronic eavesdropping through cell phones, satellites and other digital apparatus.

Agents not only survey the internet and interact as anonymous persons through directed postings, but also are deployed to wander through the streets domestically and in foreign nations to monitor newspaper and other printed media to extract useful information about the temperament of the general public.

When professional trolls want to attack for copyright infringement, they may combine defamatory comments across the internet with a fraudulent DMCA notice of takedown, to discredit a source of information that they feel threatened by.

The EFF have reported on copyright trolls that experiment with claiming copyright infringement to “extract settlements from individuals.” These trolls “try to grow businesses out of suing Internet users.”

Professional trolls litter the court system with frivolous lawsuits based on wild accusations of copyright infringement in order to wear down the victim as well as hoping to squeeze monetary restitution for fraudulent claims. The members of the alternative media as well as readers need to be aware of these individuals who are cloaked in truth yet rife with disinformation. Their intention is to cut off the free flow of information on the internet and stifle voices that are exposing truth for their own selfish gains.

Read Full Post »

(This article was taken from the TorrentFreak.com website. Thanks!)

Which VPN Providers Really Take Anonymity Seriously?

Last month it became apparent that not all VPN providers live up to their marketing after an alleged member of Lulzsec was tracked down after using a supposedly anonymous service from HideMyAss. We wanted to know which VPN providers take privacy extremely seriously so we asked many of the leading providers two very straightforward questions. Their responses will be of interest to anyone concerned with anonymity issues.

As detailed in yesterday’s article, if a VPN provider carries logs of their users’ activities the chances of them being able to live up to their claim of offering an anonymous service begins to decrease rapidly.

There are dozens of VPN providers, many of which carry marketing on their web pages which suggests that the anonymity of their subscribers is a top priority. But is it really? Do their privacy policies stand up to scrutiny? We decided to find out.

Over the past two weeks TorrentFreak contacted some of the leading, most-advertised, and most talked about VPN providers in the file-sharing and anonymity space. Rather than trying to decipher what their often-confusing marketing lingo really means, we asked them two direct questions instead:

1. Do you keep ANY logs which would allow you or a 3rd party to match an IP address and a time stamp to a user of your service? If so, exactly what information do you hold?

2. Under what jurisdictions does your company operate and under what exact circumstances will you share the information you hold with a 3rd party?

This article does not attempt to consider the actual quality of service offered by any listed provider, nor does it consider whether any service is good value for money. All we are interested in is this: Do they live up to claims that they provide a 100% anonymous service? So here we go, VPN providers in the file-sharing space first.

P2P Supporting VPN providers


Response to Q1: “It’s technically unfeasible for us to maintain log files with the amount of connections we route,” BTguard explain. “We estimate the capacity needed to store log files would be 4TB per day.”

Response to Q2: “The jurisdiction is Canada. Since we do not have log files, we have no information to share. We do not communicate with any third parties. The only event we would even communicate with a third party is if we received a court order. We would then be forced to notify them we have no information. This has not happened yet.”

BTguard website (with discounts)

Private Internet Access

Response to Q1: “We absolutely do not maintain any VPN logs of any kind. We utilize shared IP addresses rather than dynamic or static IPs, so it is not possible to match a user to an external IP. These are some of the many solutions we have implemented to enable the strongest levels of anonymity amongst VPN services. Further, we would like to encourage our users to use an anonymous e-mail and pay with Bitcoins to ensure even higher levels of anonymity should it be required. Our core verticals are privacy, quality of service, and prompt customer support.”

Response to Q2: “Our company currently operates out of the United States with gigabit gateways in the US, Canada, UK, Switzerland, and the Netherlands. We chose the US, since it is one of the only countries without a mandatory data retention law. We will not share any information with third parties without a valid court order. With that said, it is impossible to match a user to any activity on our system since we utilize shared IPs and maintain absolutely no logs.”

Private Internet Access website


Response to Q1: “We have connection logs, but we don’t store IP addresses there. These logs are kept for 7 days. Though it’s impossible to determine who exactly have used the service.”

Response to Q2: “We have servers in Netherlands, Sweden and USA while our company is based on Seychelles. We do not disclose any information to 3rd parties and this can be done only in case of a certain lawsuit filed against our company.”

TorrentPrivacy website


Response to Q1: “Our sever connection logs are purged on a daily basis since we don’t maintain hard drive’s big enough to store all this data. TorGuard’s torrent proxy and VPN connection logs do not associate an IP with each request as there are hundreds of users sharing the same connection at any given time. Since there are no logs kept or IP’s recorded, it is not possible to identify exactly who has used the connection.”

Response to Q2: “Our parent company is based in Panema, with secure servers in Netherlands, Romania, Ukraine and Panema. We do not share any of our user’s information with third parties, period. Only in the event of an official court order would we be forced to communicate with a third party. This scenario has never occurred, but if it were to, we would be forced to explain in more technical terms how we don’t maintain usage logs.”

TorGuard website


Response to Q1: “No logs, they are not kept. Even system logs that do not directly link to users are rotated on an hourly basis.”

Response to Q2: “The company has recently been sold and falls under the Jurisdiction of the Seychelles. As such there is no requirement [to log] within that jurisdiction.”

ItsHidden website


Response to Q1: “We don’t store the IP at all actually. It’s in temporary use for the session you have when you’re connected but that’s it. We’ve had very few issues with not having logs, but not keeping them makes it safer even for us since we can’t accidentally give out information about anyone.”

Response to Q2: “We fall – mostly – under Swedish jurisdiction when it comes to the service. When it comes to organisational stuff (who keeps the data, who owns the service, who owns the server, who owns the network etc etc) it’s very mixed, intentionally. This is to make it hard and/or impossible to legally bully us around if that would be the case.”

“We can’t be easily shut down, and we can’t be pressured by courts to implement stuff we would oppose. For end-users this is not affecting them in a negative way at all, only the opposite.”

Ipredator website


Response to Q1: “We do not log any IP addresses and no information about what data is accessed by our users, so we have no information that could be interesting to third-parties.”

Response to Q2: “We have servers in The Netherlands and our company is based in Cyprus. If authorities would contact us we would have to tell them that we have no connection logs or IP-addresses saved on our systems.”

Faceless website

General VPN providers


Response to Q1: We in no way record or store any user’s activity while connected to IPVanish. The only information we collect from a VPN session is: Timestamp (date and server time) of the connection to us, duration of the connection, IP address used for the connection and bytes transferred. Logs are also regularly cycled. Additionally, IPVanish users are given dynamic and SHARED IP addresses on the same servers—making it impossible for us to single out anyone for anything.

Response to Q2: ” We operate out of the US and, like all companies and citizens, must comply with local law. As detailed earlier, we have generic connection logs, but that information is not sufficient for identifying individual users. We take privacy and reliable extremely seriously and will also never share, rent or lease any information to any 3rd party.”

IPVanish website


Response to Q1: The company carries no identifying logs.

Response to Q2: “Jurisdiction is in the EU, under most circumstances Italy (country of the company and home of the person legally responsible for data protection), but applicable law may be one of the EU Member States where the servers of the network are physically located (no servers are in Italy),” AirVPN told us.

“We don’t share any information with anyone.”

AirVPN website


Response to Q1: “We do not log anything, not even temporary logs. We do not have any “personal information”, since we only require a working e-mail address to sign up. Many customers use anonymous e-mail services like hushmail and the like. Even if a customer gives us their information, we do not use it.”

Response to Q2: “We fall under Swedish jurisdiction, no circumstances will be accepted to share information, since we do not have any information to share.”

PRQ website


Response to Q1: “Only for 5 days to stop abuse[..]. After 5 days we have absolutely no way to match any IP address or time stamp to any users. Privacy and Security is further enhanced for individual users because their VPN connections are basically lost in the crowd.”

“Our free VPN users share a block of IPs when they connect to the internet via VPNReactor. So at any given time hundreds/thousands of our VPN users that have active connections could all be sharing a single IP address. None of our VPN users are assigned individual public IPs.”

Response to Q2: “We strive to be upfront and transparent with our logging policies for the benefit of our VPN users.” Logs seen by TorrentFreak seemed to confirm no identifiable information being stored.

“We are a U.S. based company and are bound by U.S. based court orders,” VPNReactor continued. “However, if a U.S. based subpoena comes in requesting info for activity that occurred more then 5 days prior, we have absolutely nothing to provide as our logs would have expired off. Request for connection details outside a U.S. based court order will be fully ignored.”

VPNReactor website


Response to Q1: “We do not keep any logs about our users internet activities including which sites they access or what data they transfer. We also run log cleaners on our systems which removes the IPs from logs before they are written to disk,” the company told TorrentFreak.

“For tax and legal reasons we do store some billing information (name, email, country), but it is stored with a third-party and separate from the rest of BlackVPN.”

BlackVPN say they hold a username and email address of their subscribers and the times of connection and disconnection to their services along with bandwidth consumption. Logging is carried out as follows:

“On our Privacy Servers, NL & LT we don’t log anything that can identify the user, but on our US & UK server where we don’t allow sharing copyrighted materials we do log the internal RFC1918 IP that is assigned to the user at a specific time,” BlackVPN explain.

“So to clarify, we don’t log the real external IP of the user, just our RFC1918 internal one, this we have to do to comply with local laws and to be able to handle DMCAs.”

Update: in their FAQ BlackVPN now writes:

“Although we do not monitor the traffic, incoming or outgoing connections of our users we may assign users to a unique IP address and log which user was assigned which IP address at a given time. If we receive a copyright violation notice from the appropriate copyright holder then we will forward the violation to the offending user and may terminate their account. We therefore ask our users not to distribute or transmit material which violates the copyright laws in either your country or the country in which our Service is hosted.”

Response to Q2: “We operate under the jurisdiction of the Netherlands and we will fiercely protect the privacy and rights of our users and we will not disclose any information on our users to anyone, unless forced to by law enforcement personnel that have produced the proper legal compliance documents or a court order. (In which case we don’t really have a choice).”

BlackVPN website


Response to Q1: “We don’t keep ANY logs that allow us or a 3rd party to match an IP address and a time stamp to a user our service. The only thing we log are e-mails and usernames but it’s not possible to bind a activity on the Internet to a user.”

Please note: PrivatVPN also offer use of a US server for watching services like Hulu. IP logs are kept when users use this service.

Response to Q2: “Since we do not log any IP addresses [we have] nothing to disclose. Circumstances doesn’t matter in this case, we have no information regarding our customers’ IP addresses.”

PrivatVPN website


Response to Q1: “No logs whatsoever are kept. We therefore simply are not able to hand data out. We believe that if you are not required to have logs, then you shouldn’t. It can only cause issues as seen with the many data leaks in recent years. Should legislation change in the juristictions we operate in, then we’ll move. And if that’s not possible, then we’ll shut the service down. No compromises.”

Response to Q2: “We span several jurisdictions to make our service less prone for legal attacks. Servers are currently located in Sweden. We do not share data because we don’t have it. We built this system because we believe only when communicating anonymously, you can really freely express yourself. As soon as you make a compromise, you are going down a slippery slope to surveilance. People will ask for more and more data retention as seen around the world in many countries recently. We do it because we believe in this, and not for the money.”

Privacy.io website


Response to Q1: “No. And we don’t see why anyone would. It would be dishonest towards our customers and mean *more* potential legal trouble.”

Response to Q2: “Swedish jurisdiction. We don’t know of any way in which the Swedish state in practice could make us behave badly towards our clients and that has never happened. Another sign we take privacy seriously is that we accept payments in Bitcoin and cash in the mail.”

Mullvad website


Response to Q1: “We log nothing at all.”

Response to Q2: “We don’t log anything on the customer usage side so there are no dots to connect period, we completely separate the payment information,” they told us.

“Realistically unless you operate out of one of the ‘Axis of Evil Countries” Law Enforcement will find a way to put the screws to you,” Cryptocloud add.

“I have read the nonsense that being in Europe will protect you from US Law Enforcement, worked well for HMA didn’t it? Furthermore I am pretty sure the Swiss Banking veil was penetrated and historically that is more defend-able than individual privacy. The way to solve this is just not to log, period.”

Cryptocloud website

VPN providers who log, sometimes a lot


VyprVPN is the VPN service connected to and offered by the Giganews Usenet service, although it can be used completely standalone. In common with many other providers we contacted, VyprVPN acknowledged receipt of our questions but then failed to respond. We’ve included them here since they have such a high-profile.

The company policy says that logging data “is maintained for use with billing, troubleshooting, service offering evaluation, [Terms of Service] issues, [Acceptable Use Policy] issues, and for handling crimes performed over the service. We maintain this level of information on a per-session basis for at least 90 days.”

On Usenet forum NZBMatrix several users have reported having their VyprVPN service terminated after the company processed “a backlog” of DMCA notices which pushed them over the “two-strikes-and-out” acceptable use policy.

So, does VyprVPN log? You bet.


We included SwissVPN in our survey because they are well known, relatively cheap and have been used by those on a tight budget. To their credit, they were also the fastest company to respond. They are one of the few companies that do not make anonymity claims.

Response to Q1: “SwissVPN is being operated based on Swiss Telecommunications and Personal Data Protection Law. Session IP’s (not visited content, websites, mail, etc.) are being logged for 6 months,” the company told us.

Response to Q2: The company responds to requests from 3rd parties under Swiss criminal law (pdf).

SwissVPN website


This company did not directly answer our questions but pointed us to their logkeeping policy instead.

StrongVPN do log and are able to match an external IP address to their subscribers. We have included them here since they were the most outwardly aggressive provider in our survey when it came to dealing with infringement.

“StrongVPN does not restrict P2P usage, but please note sharing of Copyrighted materials is forbidden, please do not do this or we will have to take action against your account,” they told us, later adding in a separate mail: “StrongVPN Notice: You may NOT distribute copyright-protected material through our network. We may cancel your account if that happens.”

StrongVPN website

Disappointing: VPN providers who simply failed to respond

In addition to the above, TorrentFreak also approached a number of other fairly well known VPN providers. It’s not clear if our questions were simply too tricky to answer in a positive light or whether there was some other reason, but disappointingly none of them responded to our emails, despite in some cases having acknowledged receipt of our questions.

They include Blacklogic.com, PureVPN.com, VPNTunnel.se [Update: VPNTunnel.se have now responded, see here], Bolehvpn.net [Update: Boleh responded after publication – they carry no logs] and Ivacy.com.

Should the above now feel able to respond directly to our questions, or if there are any other VPN providers reading who would like to be included in a future update, please contact us now with direct responses to the questions above. Apologies to the providers who contacted us at the last minute but were too late to be included in the report – we had to stop somewhere.

Final thoughts

When signing up to a VPN provider it really is evident that their their logging and privacy policies should be read slowly. And then read again, even more slowly than at first. Many are not as straightforward as they first appear (some even seem to be deliberately misleading) and that is the very reason why we asked our own questions instead.

In contrast to the the pessimism generated by yesterday’s report, as we can see from the list above, when it comes to offering real privacy there are plenty of services out there.

Related Posts

Previous Post | Next Post

Comments for this page are closed.

Showing 1-100 of 289 comments

  • thanks for this TF!

  • That. This article is simply gold. Amazing work TF!

  • This item would have been complete if a third question had been asked of these providers, specifically;

    Are you, or are you considering becoming a member of the VPN Council?

    This orchestrated group of companies has the potential to completely nullify any concept of neutrality and anonymity in their pursuit of profit.

  • Like I said on the HideMyAss article, I am completely in agreement with you. The last thing the VPN industry needs is a RIAA-style “trade group” to screw over their customers, and I will actively avoid all its members.

  • I don’t think in the long run it will matter if VPN providers are a part of the VPN Council or not, and here’s why:

    The VPN council is attempting to legitimize their industry, to separate itself as far as possible from the negative press of illegal activities. As this battle of legislation continues, the VPN council will take whatever members it does have and attempt to work with lawmakers and IP industries to draft VPN-related law.

    At that point, the number or specifics of the council’s members is meaningless; all that will matter is that a portion of the VPN industry can reach an agreement with copyright groups. This will lead to (in the political scene) the idea that VPN’s are merely unwilling to play ball and do what is best.

    In the end, the Council will inflict political damage that causes non-Council VPN providers to suffer anyway.

  • Probably it’s already obvious, anyway we are not part of the VPN Council. Also, we have no plans to enter the council: it would jeopardize the most important asset of any VPN service like ours, the privacy of the customers. Furthermore, under a more cynical point of view, it would pose serious concerns on potential infringements of 95/46/EC (the so called Data Protection Directive – we are based in the EU) and could result in a disaster in case of a Council database leak.

    AirVPN admins

  • Agreed 🙂

    Thanks TF for a quick follow-up article to the earlier HMA one. This will be useful.. like me many others were concerned and you guys have done a commendable job!!!
    ‘Ivacy’ was looking good but their non-response to your queries does put a question over what they advertise and what they practice in reality 😦

    Edit: Thought of adding a few more points. I have used HMA, Strong VPN, VyprVPN (with Giganews). While Strong is great in terms of C/Care support, they do log for sure. But their tech support is great. Vypr was good at speed initially…now they totally suck with all the customers being added through Giganews. Also their response to TF will now keep me away. HMA – No more comments 😀

    Now someone here asked about Witopia .. My feedback..Stay Clear of them !!! Why ?? Not only are they expensive, this is what they also state in their FAQ …. Their mindset is exactly like RIAA…I couldn’t believe it when i first read it..is this really a response from a VPN provider ?

    ” Do you support torrents and P2P services? ”

    ” We’re a data security and privacy (not piracy) 🙂 company first and foremost and although torrent technology has many legitimate applications, it is often used in the trading and sharing of media files with 100,000 of your closest friends.

    It is a fact that P2P sites are often riddled with viruses, law enforcement honeypots, identity thieves, as well as, of course, copyrighted material. We also hear regularly from customers that when they subscribed to proxy services that cater to P2P activity they were sometimes attacked through these sites…. ”


    Also no word here for Express VPN ( http://www.expressvpn.com/ ) . I was contemplating taking their service…but a word or two about them in TF would have helped. Cheers !!!

    (Edited by author 1 year ago)

  • I’ve been using Witopia for the better part of a year now and I’ve had zero issues. I urge anyone reading this far not to run with the snap judgement of newagegeek there as they seriously have not made informed statements about the company, its service nor its performance.

  • Edit : In response to ‘Thatwitopiauser’ below :
    I agree that WiTOPIA does not have stability issues or issues with server but they are not P2P friendly. Please do check that my thoughts are provided in terms of their policies regarding p2p services – particularly BitTorrent and their own words also provided in the above link. Even Strong VPN is a solid VPN provider… but we are not looking at pricing and stability or tech support service only in this article.
    End of the day its your own money and you may still decide to go with HMA, Strong,Vypr or WiTOPIA.
    Cheers !!!

  • Witopia. Can you say honeypot??? A little research and you’ll find they are located in Washington D. C. – red flag #1. A little more research and you’ll see they share their building with the CIA. Hello – McFly?!?!?

  • ++1;

  • Hi,

    Thank you for contacting us. Firstly, the media is over reacting and exaggerating the fact that we cooperated with law enforcement agencies where we being a legitimate company being issued a UK court order on this lulzsec incident.

    We DID NOT sell any infos to any party. We are not paying anyone nor anyone is paying to release information. May i know were did you read about us selling off information anyway?

    We ONLY store logs of your original IP, date and time of connection. We DO NOT store any records on your internet activities as all the data transferred through the tunnel is encrypted anyway, we have no idea what are you accessing.

    You have to understand that what we did was helping law enforcement agencies in hunting down a cyber criminal which played a part in hacking the Sony Playstation Network, hacking into NATO military servers, defacing British newspaper The Sun and The times and many more activities which are deemed illegal and violate the law which governed the internet. A valid UK court order was being issued to us and that is only the right thing to do.

    For your info, he use of VPN does not allow one to perform illegal activities. And I can guarantee you that all VPN providers keep logs, if they claimed that they do not, they are seriously misleading you. These logs are for us to locate abusive users (spamming, bots, file sharing complaints etc etc) to prevent our VPN servers from going down due to these abuses. It is very naive for one to think that by paying $11/month you will get total anonymity where you can abuse the service however they like and performing illegal activities behind a VPN.

    There is nothing to ‘fight’ against this case as it is clearly a violation of laws in which we are a legitimate company and we DO NOT protect criminals. If we do, what’s the difference are we compared to these cyber criminals?

    You might want to read our blog on this entire Lulzsec fiasco: http://blog.hidemyass.com/2011…

    HMA! Team

    Ticket Details

  • Excellent article. I’m luckily finally in a situation where I don’t have to deal with any of these anymore, but some thoughts on names I’ve used in that list:

    – Strong VPN may log, and so is not ideal if you’re concerned entirely about privacy, but they’re absolutely FANTASTIC for avoiding technical blocks. They’ll let you use PPTP, OpenVPN, whatever. Moreover, you can go TCP/UDP for the VPN, change ports, the whole 9 yards. I had an INCREDIBLY aggressive uni ISP that would slow down anything they didn’t recognize, and strong was the only vpn that let me disguise my traffic sufficiently to get full speed. If you’re worried not about privacy but instead about shaping, I do recommend them.

    – I can’t say enough negative things about BlackLogic. They offered me an unmetered plan. They had buried within their ToS a line which said “please try to keep bandwidth reasonable” but didn’t offer any specific cap on their “unmetered” plan bandwidth usage. At some point it was decided that I used more than what they deemed reasonable, and temporarily terminated my account. They then told me that I would need to limit my bandwidth to 2GB/day or upgrade to a premium account for $50/mo (lol). I said fine, I’ll limit my bandwidth, and asked for more information about what the 2GB cap entailed (e.g. upload only? upload/download totaled?)

    They responded by permanently canceling my account and refusing to give me a refund, less than a week into the service I had bought for a month.

  • I would report them to the Better Business Bureau if you are in the US/Canada or try http://www.econsumer.gov/ to report them. That or you could take them to small claims court for breach of contract.

  • Thanks for sharing your thoughts. I personally don’t feel the need to use any vpns so far, my country is light years ahead of the us in this issue and file-sharing is not forbidden here. But it’s nice to keep track of what to use to be effectively anonymous.

  • hmm – how’s the weather there?

  • My country is light-years behind, which is also fine, since they simply don’t care about file sharers. They crack down however very hard on warez FTP (typical “pay with an overpriced SMS” services). But as a filesharer you don’t have to worry.

  • All filesharing works to an extent, it’s just a matter of how much work and performance you get on your hands in the end.

  • check Cryptocloud’s TosCryptocloud’s ToS

    No surprise, we take privacy seriously. This privacy policy isn’t filled with the usual mumbo-jumbo because we’re not afraid to say it like it is. Let the lawyers bill someone else by the word.

    When you sign up with CryptoCloud, we ask for the following information in order to complete your purchase:
    Your name (purely for billing purposes)
    Your username
    Your choice of password
    Your contact email address
    Payment Info – either creditcard, or you may use paypal

    If you prefer, we are happy to work with you to pay for your CryptoCloud service with a 100% anonymous procedure: cashier’s checks, etc. Not many customers ask for this service, but we’ve never said no to any procedure a customer suggested.

    We don’t store logs of your network activity whilst “in the Cloud.” Ever. Yes, we mean that: we do not store logs of your network activity. We don’t have a privacy policy regarding those records because we don’t keep those records. Yes, sometimes less is more.
    If you open a ticket in our support area or email us with a question, we’ll make a record of your inquiry. This record exists in an entirely separate database from our operational datasets. If you’d like, we can delete all record of your inquiry when we’ve responded. Normally we do keep those records, to help us track places ripe for improvement in our service.

    We do routine visitor traffic analysis for our public website. To do so, we keep standard Apache visitor logs in our encrypted, secure server partitions (Xen VMs). If you don’t like leaving “footprints” like this, you should sign up for a good online privacy service. . . like CryptoCloud.

    We do not sell or provide your customer information to anyone, ever. We are a 100% privately-owned company. We do not have a parent company. We are not owned by the CIA, NSA, or INTERPOL. We are happy to provide ample evidence of these assertions, if you would like to confirm them yourself via independent sources. Our business is entirely dependent on our public reputation for providing reliable, secure service to our customers – we will do nothing to jeopardize this, it benefits neither our company nor our customers.
    If you cancel your CryptoCloud service, we wipe your account information – completely – after 14 days. This includes payment information. If your payment method is having trouble during renewal, we’ll do our best to let you know so that we can get it fixed. If we can’t get ahold of you, we’ll delete your old information. Completely.

    If a law enforcement agency with proven jurisdiction over our business comes to us with a valid order from a valid judicial authority that our own corporate lawyers are able to independently verify, we will comply with that order as written. Naturally, we can’t provide information we don’t store – such as network traffic logs. We cannot be compelled to provide what we do not have.

    If a court orders us to close an account, we will do so. If a court orders us to allow them to secretly place surveillance “sniffers” on a specific account, we will fight this order to the highest judicial authority possible. If we lose, we will shut down the business and call it a day. End of story.

    No, we can’t promise that our service will be running 24/7/365. We do our best, always, but perfection is elusive. We can’t indemnify you for any economic losses if our service has an interruption and it is really inconvenient to you. We do – as standard policy – provide generous subscription extensions in the (very rare) event we have a “Situation,” i.e. network outage. We think that’s fair.

    If these terms don’t seem fair, don’t sign up for our service – when you sign up, you specifically agree to these terms. If you have questions, ask us and we’ll be glad to provide any additional data we can.

  • Now THAT’S how you gain customer loyalty!

  • Roobik 1 year ago

    What about Astrill?

  • I’m with Astrill and before I joined I asked questions very similar to TF, below is the response from Saad Atta – Astrill support.

    “We simply don’t keep any logs on our server. You can use all servers with asterisk (*), they are all good and specially optimized for P2P. We do not entertain such requests as we are not obliged to do so under Australian law.

    however, we may do so if we find a user engaged in some criminal activity.”

    (Edited by author 1 year ago)

  • WAIT… They don’t keep logs unless they find a user engaged in some criminal activity?? How would they know unless they were keeping logs?

  • Great article. I just wonder how some of these VPN providers can be so sure that they won’t be forced to hand over logs, or be forced to keep them.

    This was one of BTguard’s responses, “It’s technically unfeasible for us to maintain log files with the amount of connections we route. We estimate the capacity needed to store log files would be 4TB per day.”

    If some VPN’s keep logs for 6 months then it can be argued that it is feasible. However, if there aren’t any laws that force VPN’s to keep logs for a certain period of time then they can continue to do business as usual.

    If this is the case then I suspect that the **AA’s next move against VPN providers will be to lobby government’s around to world to enact laws that will force these services to maintain logs for 6+ months. They have already tried to force ISP’s to do this.

    I had never heard of Mullvad before but I noticed that they accept payments via BitCoin. I’ve heard arguments from technically savvy people who have said that BitCoin was never intended to be anonymous and transactions can be traced but I’ve never heard of a case where this has actually happened.

    I think that accepting payments via BitCoin adds another element of anonymity and hopefully this will catch on. The currency fluctuates quite a bit though, so coming up with a set rate might be tricky.

  • Question is, have any of these logging policies been tested? I.e., what info is there on court cases involving vpns? Can we trust the answers we’ve been

    The problem is that the setting in which such a test case is likely to arise is usage alleged to be unlawful.

    Most if not all service providers carefully limit their liability and disclaim reliance on the privacy policy in cases where the account holder engages in unlawful conduct.

    And some providers even go so far as including bad reputation or adverse regulatory action as ground for account termination or disclosure.

    The only favorable test setting I can think of is setting up a false flag operation where the account holder uses P2P to share something with the understanding of the copyright holder.

    The copyright holder then sends a DMCA complaint to the service provider in order to test how the privacy policy works in practice.

    If the provider terminates or warns the account holder, we now have solid info on
    the actual implementation of the privacy policy.

    Filing a knowingly false DMCA complaint is criminal, but since the copyright holder can’t know whether the person behind the IP address is legally entitled to share the content, testing the DMCA in this way is effective and risk free.

  • I didn’t read everything you wrote, but I totally agree with the first paragraph you wrote in bold print. The VPNs are a business. They obviously aren’t gonna tell you anything that’s going to hurt their business. You would need an independent reviewer to make a credible assessment of how secure these services are. Nonetheless this article was really enlightening. While the obviously PR friendly statements of the VPNs are alittle annoying the only thing worse was not answering the question at all. Those VPNs really look like they have something to hide.

  • This is a good point. Someone needs to test this out. I would want the vpn to also contact me if they were to get a dmca complaint. I would happily oblige and stop.

  • Well if they don’t log they can’t give any info. But feel free to test if that is the answer they give. Oh and the work being shared in the test case can be your own work of art (a one hour video of your feet) so there will be no false DMCA.

  • I think the fact that BTGuard specializes in BitTorrent which performs far more socket connections then other typically protocols and because they’re popular that they would probably amass larger logs then those that do keep logs.

  • There is a guy on the apple board and other places he spams on freenet/frost trying to sell cp using bitcoin. He won’t give it away and says use bitcoin and also everyone says he is lea. Any suggestion = bitcoin can be traced or else the lea wouldn’t be trying to get people to buy cp with it. Also I have read to run tor then a vpn over it then bitcoin by one provider, while the others just say run vpn then tor. I guess just look into it alot if ur going to use it.

  • RobinSure 1 year ago

    Question is, have any of these logging policies been tested? I.e., what info is there on court cases involving vpns? Can we trust the answers we’ve been given?

  • Good point!

  • CanadianBoy 1 year ago

    Could you post the answers of Hostizzle VPN ? its the one i’m using right now.

    Thanks for the great article TF 🙂

  • what about relakks? same as ipredator?

  • What’s with Witopia? They’re “famous” for westerners in a certain Asian country…

  • Okarin 1 year ago

    only the one taught in school, but be careful in the real world

  • astrill? 12vpn? gotrusted? witopia?

  • R.Balloon 1 year ago

    Nice work Mr.Max

  • Windoze 1 year ago

    I am currently using ibVPN’s Netherlands server and man I love it it’s fully encrypted and such. They say they don’t support P2P but that’s just to shut the industry up.


    (I am not an ibVPN employee or affiliate eventhough I sound like one.)

  • ThumbsUpThumbsDown 1 year ago in reply to Windoze

    “Only to shut the industry up?” Are you kidding? Sounds like what the wolf said to the virgin on the honeymoon night.

  • You don’t like opinions do you.

  • ThumbsUpThumbsDown 1 year ago in reply to Windoze

    Please forgive me. I intended no offense. I meant only to express a general warning that these VPN companies will continue to overpromise and underdeliver, and, while they’re at it, put us all at greater risk.

  • I can’t reply to your reply so I’m gonna reply to your older reply.. lol

    It’s alright I just understood you the wrong way. Maybe you are right, but ibVPN says that they keep NO logs of what you are doing. They only keep your IP to make sure you don’t lend your account to your friends I guess.


    Be safe. Cheers.

  • “ibVPN reserves the right to take whatever actions ibVPN deems appropriate to enforce ibVPN’s policies including, but not limited to Terms of Use.”

    “ibVPN also reserves the right to change ibVPN policies without prior notice at any time.”

    So they can screw you if they choose.

    “We do not spy on our users and we don’t monitor their Internet usage. We do not keep logs with our users’ activity. If we have reasonable grounds to suspect that an end user is involved in criminal activities, we reserve the right to notify law enforcement agencies.”

    They don’t log usage or activity, but that doesn’t mean they don’t log IPs and/or timetables.

    I would recommend not using ibVPN.

  • I’ve done a search on the NZB Matrix forums and can’t find any posts from people who have had their service terminated by VyprVPN?

    A google search also seems to bring up no results either.

    Can you post any links?

  • I can vouch for what they are saying about VyprVPN. If you’re using the service provided with GN’s Diamond package, they will also cancel your GN membership. If you request the DMCA notices, they will not give them to you either. I’d highly advise staying away from VyprVPN….and whatever you do, don’t use it with their Diamond package since they’ll cancel all of your access – not just the VPN.

  • I generally only use it to access US content on the web that is blocked in the UK (TV, Pandora etc.) I don’t use it for regular Giganews stuff or any other kind of P2P things. Just interested really, as I hadn’t heard anything like this about them and it makes me wonder why Giganews are partnering with them rather than one of the better VPN services that are listed in the article.

  • i read deep into it before and decided its a overpriced logging facility. Shit might as well seed and download from the police station. I am talking about GigaNews Vpn. Also usenet is supposed to be anonamous but ask dreamboard members and the thousands of other people who were arrested for using newsgroups and posting and even just subscribing to the news service. See Pedo News on Freenet/Frost and search back 6 months and you will see some of the articles.

  • Andy did I scan this TREASURE of an article too fast, or did you deliberately omit the UK’s HideMyAss (sic.) as a waste of space and time?

  • hey Rob, I left it out since I think we already have the answers 🙂

  • Sure, but those who share the link to this Article with non-regular TF readers may not read any other TF article, so they’ll miss out on HMA being ‘naughty’, ye ken?

  • I like mullvad, mainly because it takes bitcoins as payment..

  • I use Private Tunnel by OpenVPN for my vacations.

  • Salazasu 1 year ago

    what about your-freedom.de?

  • A German company? Over here, protection of minors and media rights trump free speach big time. German authorities are quick to raid IT-Companies for not paying a parking ticket…

    (doesn’t mean they save logs, but they will be bullied out of business in no time)

  • “We do not log what you access on the Internet; German telecommunications laws do not even permit this. We do log the fact that you have used our service, from where you have logged in to our service, the lowest 16 bit of IP addresses you have connected to (but not the full address!) and statistical data about your usage needed for accounting and quality assurance. This information is typically held on file for only a few days and no longer than 4 weeks.”

    – your-freedom AUP

  • Oh right, it’s been around since 2004 (as per news section on the site)

  • Great article Thanks very much.

    Bit of a cheak but if you made a chart showing who logs and who doesnt and for how long. Maybe have it as a link on your front page. It would be a fantastic resource.


  • Reuben 1 year ago

    Bolehvpn has now responded 🙂 Apologies for the late reply.

    Great work on this post!

  • I can confirm BolehVPN responded a little while ago and they don’t log at all.

  • Out of 4 VPN’s we listed at GT as ‘safe and problem-free’ only the Malaysian-based bolehVPN has so far survived the last year. So your article is awfully helpful to boost our emaciated list Andy.

    Victims falling foul of bad reports from our Members who’d experienced trouble or no response/help from customer services were –


  • Hey Rob,
    Sorry for my ignorance but what is GT?

  • @Reuben I believe ur answer is only a quick google away

  • correction: google *search* away

  • I’d like to know what GT is about too, so I can compare VPN providers.

  • Article update?…

  • What’s with perfect-privacy.com ?

  • Great service there! It can be a bit slower than some others (and a bit more expensive), but you won’t be able to beat it if you want ultimate privacy. They don’t log at all, but more importantly, everyone is given the IP address of the VPN server when connected. So, at any given time, 100 people might have the same IP address, which makes tracking much harder – especially with no logs.

  • I remember reading about this vpn where a group of pedos were using it and they gave out all of their information and they were v’d. Google it. Also the company should change their name to Perfect-arrest.com instead.

  • They accept paysafecard… So I don’t see how they could track you if you sign up with a ame email address and name…

  • Fake not “ame” stupid spellcorrector…

  • Googled it, couldn’t find nothing.. please confirm your source. I think what really happened is law enforcement raided the server (without Perfect-Privacy’s knowledge) and started sniffing packets. International governments have been know to take extreme actions such as this..depending on the severity of the crime. AFAIK no VPN is bulletproof enough to defend against that sort of threat!

  • The perfect-privacy admin lives in Germany which is the weakest link 😦

  • Anon12424 1 year ago

    Now THIS is an awesome list TF! Cheers!

  • Civilian 1 year ago

    So as far as I can tell from this list, ItsHidden gives the most clear answer stating you are protected?

  • There is PrivacyProtector.eu
    Our RiccoVPN works like using Internet over Skype-like network. We do not have logs, as we do not handle any traffic. We do not have any servers either – so there is nothing to block by ISP or jam with traffic. No Login, No Pass is needed, no traffic quota. We offer FREE service as well.
    Despite many contact attempts we where not invited by TF to participate in this pool, that’s a real shame.

  • Interesting. So whose servers are used then? And could “the media” set up such servers and log usage?

  • Hi Blazej

    We looked at your system 6 months ago but couldn’t really see why your solution needed to be so complex. If you want to contact us with a *simple* description of how your system works, especially the use of peers, we’ll take another look

  • Hi Enigmax,
    I didn’t know complexity is bad, especially for You guys 😉 I’ve sent all info to Ernesto, but I guess I was trying too much. If You don’t mind I will describe it here, so anyone can read it.

    So as we all know VPN is straight forward: desktop client (or OS account) -> vpn server (logs) -> Web. We know all the risks here.
    Our solution in essence is a gateless VPN: we successfully combined P2P and VPN technology. It works like using Internet over Skype: we shred transmission, heavily encrypt all fragments and sent over multiple routes at once. Every connection goes in different way, through different nodes of our P2P network, means You can access the same website from several different IP’s at once. Since it’s random and can go through many countries, recreating Your traffic is nearly impossible. Bigger network, more random and faster it gets. With country IP selection management – means if You want to listed to Pandora You just select US IP address and viola! IP access limitations of most web services are not effective with our software. Our client does not require any config, we install our own virtual network driver intercepting all incoming and outgoing WAN connections, bypassing LAN traffic.
    You can check if this is true: try now http://demo.privacyprotector.e…, and refresh with RiccoVPN connected. Or use any other IP-check tool. More advanced: sniff transmissions made through our soft and You can see if we do as we say.
    All: feel free to as any questions at support(at)privacyprotector.eu

  • Failstation 1 year ago

    By not answering this survey, VPNTunnel.se just lost a customer. Yes, it’s simple as that.

  • Why not? I’ve been using it and have not had any issues…

  • We’ve always heard good things about VPNTunnel.se but if they don’t respond to emails we can’t include them. Maybe we’ll do a follow up sometime…we’re overrun with VPN providers emailing us now

  • On the wesite of vpntunnel is written:

    Is any trafficdata stored? No, our policy is to care for our users integrity, therefore we do not store your real IP, we do not store any trafficdata, all that we store is your E-mail address and your username.

    Can someone find out my real IP address? No, since we do not store your real IP or any trafficdata, it is not possible to link the IP that you receive from us to your real IP.

    Will any of my information be disclosed to third parties? It is not a choice that we make. Since we do not have any information (except E-mail and username) we are simply not capable to hand out any information that could jeopardize the integrity of any of our users.

    I am still waiting for a reply from them, but since it is the weekend….

  • It doesn’t surprise me that they didn’t respond to the questions. They are quick to respond to simple questions. However when I opened a support ticket about why their featured connection guard program wasn’t working I was given a canned answer, when I followed up they didn’t respond, ignored me and closed the ticket. However their service runs great I can get about 25mbs down in NA, but their support leaves something to be desired.

  • A followup article would be great. At least now that more providers are contacting you guys. Would be nice to get them on the list.

  • I have just written to vpntunnel directly and I hope for a reply soon so I do not have to change vpn supplier. I will post the reply here, if I receive one!

  • VPNtunnel has servers in Europe and in the US. As a customer, you have the choice of which you connect to. In the US, they are legally bound to keep records, while in Sweden they are not legally bound to and do not log activity. I did ask them about this as I was concerned about my privacy. I only connect to the Swedish server (their largest and probably fastest). It’s a great VPN.

  • The fact that they did not reply does not worry me. They clearly state their logging policy on their site. As described above,if you use the swedish servers you are not logged. I am glad I did ditch vyprvpn for them though. Also ditched giganews for astraweb due to cost. For $15 I get the same services (vpn and nntp) I got at giganews for double the price (and I they log me). Easy decision.

  • FACT: There’s NO legal requirement for web services to log anything in the U.S. If they’re telling you that, it means they’re just feeding you a line of B.S.–probably because they’re a bunch of spineless cowards who are afraid to stand up to those scumbag American lawyers and tell them to get lost!

  • +1 Mullvad for accepting Bitcoin

  • +1 AirVPN as well for accepting Bitcoin payments (although not stated above, it is on their website – https://airvpn.org/index.php?o…

  • Indeed, great article, hope the list can expand in the future 🙂

    Good to know wich VPN providers to trust.

  • Anyone know when ipredator will start to offer openvpn?

  • I agree that this is a great list and am SO pleased to know this about the logging of these particular VPN companies, thank you TF! I wish, however, that one more question was added to the list, that concerning means of payment, and how it might possibly link up to an individual that some 3rd party might be wanting to extract from the VPN provider. Question 1 might have covered that somewhat, but I had hoped for more revelations on that particular point, as it is practically impossible to pay for VPN anonymously, at least in the U.S.

  • Violated0 1 year ago

    I use CyberGhost VPN and they don’t keep logs meaning no data to give out.

    One aspect that is ignored though in these questions is that a court can directly order a VPN service to track a user. It would need a deeper study if local law would do such for copyright infringement. Those LulzSec and Anonymous people need even better.

  • Thats a good point, but I’m assuming a VPN provider will advise u to stop using ht vpn service well before something like this is a court issue

  • Think this is one of the best articles TF has ever done, especially relevant in light of what hidemyass did, bookmarked this page already.

    As a heavy torrent user, would be good if this article was made into a page from the main link section at the top of the page with a comparison of the providers. Would also be useful to know for each provider if it could be classed as:

    A) Standard VPN Connection provider
    B) Preconfigured utorrent client like BT Guard
    C) Custom software like hidemyass that kills connections if the VPN goes down
    D) Custom software like hidemyass but DOES NOT kill connections if VPN goes down

    Just did a search on youtube for Mullvad as never heard of it and saw they were using some software called webtrust from http://www.webtrust.se. It disconnects torrents if the VPN line goes down so maybe worth looking at for anyone who uses a normal VPN.

    Myself, I’ve tried BTGuard in the past, great speeds, but still blocked on USA sites like HULU as obviously BTGuard isnt a VPN provider so not really a fair opinion.

    Currently with hidemyass (reconsidering in light of whats happened), love the fact they kill all apps if the VPN goes down, but cant see me sticking with them after the Lulzsec incident.

  • yes hidemyass should be shut down or name changed to WeSuckAmericasDickVPN or maybe WeLoveUSFBI.com and that should help them get suctomers aka not.

1 2 3 Next →

(This article was taken from the TorrentFreak.com website. Thanks!)

Read Full Post »

Older Posts »


Res ipsa loquitur - The thing itself speaks

Amber Lyon

"Well-behaved women seldom make history..."

Writings of J. Todd Ring

Independent Research and Analysis, Essays in Politics and Philosophy.

________________Child Health Safety_________________

The facts about vaccine safety your government won't give you