Tails (operating system)
Tails operating system (TAILS OS) is short for The Amnestic Incognito Live System. It is actually a host of computer OS tools-utilities to help you remain anonymous. It runs on Linux, but uses a nice GUI so you will have to click around in it to figure out how to do things. It has a free software version of Microsoft Office called Open Office. For those of you already familiar with Tor, Tails also mates Tor with a read only DVD what we call a “live CD” or USB that boots and runs your system under a special secure and anonymous version of Debian Linux operating system called Amnestic.
Tails is basically a “throw away” operating system. One of the things that has been exposed, time and time again is that “…adversaries with global reach…” track computer use in a myriad of ways. Often they will put tracking cookies or markers on your computer, loaded from websites you visit. There has been a documented case of this happening to James Wesley Rawles[1] The Survival Blog users. These then “report back” everywhere you go on the Internet. This is one way Tor can be circumvented. If your computer is already compromised (we call it “owned”) then nothing else you do can keep you secure. Once they have a tracking cookie or hackware on your computer they can then build a very expansive history of your Internet activities. Tails goes a long way to preventing that. [James Wesley Rawles suggestion on disabling cookies is “old school” and will not work against any decent hacker, since half the time we don’t use cookies. I have already showed that VPNs are only useful in protecting your anonymity if the VPN operator is willing to go to jail to for you. They are not[2]. Here is the story of hacker named Cody Krestsinger known online as Recursion now in jailed and tracked down through the United Kingdom based HideMyAss VPN service because he defaced an FBI website. Do not trust VPN services. Part of the answer to this ungodly, unconstitutional, unethical behavior is Tails and Tor.
Tails is a “read only” operating system (OS) that works from a DVD (or another external medium, such as a USB Drive). This is critical. Tails is booted from a read only DVD (your throw away media) and only operates in RAM, it does not interact with your hard drive at all, actually it is specifically prevented from doing so. Thus when you power your machine down, every thing you do goes away. And this is important. You must power down, and hopefully keep your computer out of anyone’s hands for at least 2 minutes (120 seconds). We have become aware of a tactic where “adversaries” attempt to capture your computer quickly and then deep freeze the memory to try to later at the lab pull data (history, passwords other connections) from the RAM memory of the computer. They call it a “Cold Boot Attack.”[3] This is why they “rush in” to seize computer equipment some times. This is why Tails tries to protect you, but you must shut it down, and hopefully keep it out of their hands for 120 seconds while your RAM cools. Tails Operating System does nearly every thing that is possible to remove any history of your activities. It actively wipes RAM, it stores nothing.
One reason Tails uses a bootable DVD, is that you can slip it into your work computer (or another computer), get on the Internet. You then can get on the Internet using Firefox with SSL Everywhere, through Tor anonymous service and every other open source anonymity solution they can think of. Do what you need to do like post information that you want to share with American patriots. Then you “shutdown” your computer, Tails will do every thing it can to wipe memory and it even automatically ejects the DVD to remind you to take it. After you have done what you need to do, you can then boot back to your normal computer. If you want to kick it up a level, shred the DVD with Tails on it. That is why I call Tails plastic gloves for Internet use.
"Tails was specifically designed after several major news outlets sources were burned because the government hacked into the reporters computers to find out who was sharing information with them. “With Tails”, say the distro developers, “we provide a tongue and a pen protected by state-of-the-art cryptography to guarantee…basic human rights and allow journalists worldwide to work and communicate freely and without fear of reprisal.” Tails implements most open source technology that I know of to help you be as anonymous as possible. It has SSL Everywhere, it uses a version of Firefox called Ice Weasel. It defaults to the use of Tor and allows the use of I2P. It is very careful not to use your computers hard drive for any thing and does everything in memory. If you want to work with files, you must use a USB thumb drive to save them too. No system is perfect, just because you have plastic gloves doesn’t mean you don’t think about the 10 OPSEC Commandments, or all the other stuff we have shown you and add in all the stuff you already know (your own grey matter). However again, we the American Redoubt IT guys (AmRD) are introducing the God-fearing Liberty forces to tools that you can use to fight your own Liberty Operation or communicate more anonymously."[4]
Contents
Quotes on the Need for Tails OS due to Unconstitutional Police State Surveillance
- "The progress of science in furnishing the government with means of espionage is not likely to stop with wire tapping. Ways may some day be developed by which the government, without removing papers from secret drawers, can reproduce them in court, and by which it will be enabled to expose to a jury the most intimate occurrences of the home. Advances in the psychic and related sciences may bring means of exploring unexpressed beliefs, thoughts and emotions. 'That places the liberty of every man in the hands of every petty officer' was said by James Otis of much lesser intrusions than these. 1 To Lord Camden a far slighter intrusion seemed 'subversive of all the comforts of society.' Can it be that the Constitution affords no protection against such invasions of individual security?"
- Louis Brandeis (1856-1941), United States Supreme Court Associate Justice Dissenting, Olmstead v. United States, 277 U.S. 438 (1928).
See Also
- Essay:Why Patriot Conservatives should use the Tor anonymous browser bundle
- Censorship: Tools of censorship, Censorability, Fairness Doctrine, Liberal censorship, Media censorship
- The Perpetual War: War on Drugs, War on Terror and the Police state
- Domestic Mass Surveillance of Law-Abiding Citizens: via Utah Data Center, PRISM, NSA-DHS-BATF-FBI-CIA and other Intelligence agencies' Computer surveillance, Eavesdropping, Data mining, Spyware, Wiretap - Roving wiretap, Foreign Intelligence Surveillance Act of the Foreign Intelligence Surveillance Court, NSA warrantless surveillance controversy, National security letter, Patriot Act, NDAA, Executive Orders, United States Census, Common Core, "Stasi"-like secret police "If You See Something, Say Something" informants, and other exponential expansion of the Police State
- Asset Forfeiture: Confiscation for Police budget deficit via RICO
- Mililtarization of Police: SWAT and Pre-dawn No-knock raids, Sneak and peek warrant
- War on Drugs: Addiction and Drug trafficking of the Drug cartels, Mafia, Gangs, Drug dealers, Hollywood values - Fashion industry values - Public school values - Professor values
- Computer Crime and Cyberwarfare:
- Hackers: China, Russia and others
- Bradley Manning - Homosexual Hacker Traitor of State secrets
- Wikileaks and Julian Assange - Australian leftist hacker
- Dangers of Social Media: Facebook, Twitter, Google Plus, YouTube, Yahoo
- Big Government: ObamaCare-Common Core-Social Security Welfare state leads to Nanny state, leads to Police state: Globalist-Statist-Socialist-National Socialist-Communist
- Liberal Totalitarianism
Contrast with:
- Security Software and Security-Focused Operating Systems to protect unalienable Fifth Amendment - Fourth Amendment Right to Privacy (Internet privacy, Information privacy, Expectation of privacy) and Second Amendment - First Amendment (Freedom of information and Political freedom) rights against unconstitutional Gun control - Internet censorship Big government Police state, hackers, and "all enemies, foreign and domestic" of American liberty.
- Anonymity with Tails Operating System: Linux-based with Tor (anonymity network), Firefox Iceweasel browser, HTTPS Everywhere encryption
- Prism-Break.org: Opt out of global data surveillance programs like PRISM, ECHELON, XKeyscore and Tempora.[5]
- Open Source Free software not over-priced tracking by Microsoft-Apple-Google-Android
- Privacy Search Engines: Duck Duck Go and Ixquick: Privacy-oriented Search engines instead of tracking by Google, Yahoo and Bing
- Internet Anonymity - Right to be forgotten Pseudonymity (Pseudonym) using Anonymous web browsing with Tails and VPN (Virtual Private Network), HMA, OpenVPN and IPsec , Proxy servers, Anonymizer (Anonymous proxies)
- Mozilla Firefox with Browser extensions instead of Microsoft Internet Explorer, Google Chrome, Safari (web browser) and Opera (web browser)
- Browser Security via HTTPS Everywhere (HTTPS (HTTP Secure) instead of Plaintext (Cleartext) HTTP; and NoScript to stop JavaScript
- Ad Filtering (Privacy mode and Adblock Plus or Ghostery) to stop Ad tracking - Website visitor tracking via Geolocation, Geotargeting, Personally identifiable information and Device fingerprints
- Internet Safety, Computer Security via Password strength and Password managers via KeePass or LastPass and Antivirus-Firewall
- Secure Communication:
- E-mail Privacy and Email Encryption: Claws Mail or Enigmail or Kontact using Hushmail or MyKolab, Anonymous remailer, instead of tracking by Microsoft Outlook, Mozilla Thunderbird using Yahoo! Mail, Gmail iCloud
- Secure Messaging and Off-the-Record Messaging via I2P Instant messaging, Cryptocat, Bitmessage instead of Skype, Yahoo! Messenger, Internet Relay Chat, Google Plus, Facebook
- Silent Phone with Silent Circle instead of Android or iPhone Smartphone
- OPSEC: "Loose lips sink ships"
- Encryption: Encryption software, Disk encryption software, LUKS or TrueCrypt instead of Microsoft BitLocker, PGP and GNU Privacy Guard, Data encryption, Public-key encryption, Cryptography-Cryptanalysis-Cryptology-Steganography
- Peer-to-Peer: Sneakernet, Friend-to-friend, Darknet (file sharing), Anonymous P2P instead of BitTorrent
- Deep Web - Dark Internet: Tor, AmRD, Tor2web, The Hidden Wiki, Anonymous blog
- Cryptocurrency-Digital Currency-Alternative Currency-Virtual Currency: Bitcoin and Hard money-Precious metals-Tangibles versus PayPal, Credit cards and inflation-prone U.S. Dolars: Federal Reserve System's Keynesian economics Ponzi scheme of Quantitative easing-Debt monetization devaluation of Fiat currency through Money supply-Treasury bills bought mostly by China and Japan
- Privacy Resources:
- Hologram of Liberty - The Constitution's Shocking Alliance With Big Government by Boston T. Party - Kenneth W. Royce
- One Nation, Under Surveillance - Privacy From the Watchful Eye by Boston T. Party
- How to Be Invisible - Protect Your Home, Your Children, Your Assets, and Your Life, by J. J. Luna
- Electronic Frontier Foundation and Electronic Privacy Information Center, Oath Keepers, Judicial Watch
- Freedom of Information Act, Electronic Communications Privacy Act of 1986 and Privacy Act of 1974
- Edward J. Snowden Revelations of unconstitutional domestic spying on law-abiding American citizens; GlobaLeaks
- Crypto-libertarianism Limited government implies:
- Conservative values, American values - Small town values, American Patriots and Bill of Rights liberty
- Capitalism and Free enterprise
- Family values and Parental rights: Sanctity of life, Family-Marriage, Homeschooling teaching Virtue, Patriotism, Duty, and Self-reliance
External Links
- Tails - Privacy for anyone anywhere
- Tor Project: Anonymity Online
- https://charlescarrollsociety.com/2013/06/10/prism-yes-they-can
- https://charlescarrollsociety.com/2013/05/06/memo-to-the-police-state-progressives-please-let-his-people-go
- https://charlescarrollsociety.com/2012/09/15/no-knock-raid-a-great-video
- https://charlescarrollsociety.com/2014/02/12/amrd-t-a-i-l-s-plastic-gloves-for-your-computer-american-redoubt - Tails operating system
- https://charlescarrollsociety.com/2014/01/29/amrd-introducing-the-tor-browser-bundle/ - Tor browser
- http://survivalblog.com/five_letters_re_the_fbis_cookie_caper_and_the_vpn_imperative
- https://prism-break.org/en - "Opt out of global data surveillance programs like PRISM, XKeyscore and Tempora."[6]
- https://www.eff.org - "Leading the fight against the NSA's illegal mass surveillance program"[7]
- https://www.eff.org/secure-messaging-scorecard
- http://justdelete.me
- http://survivalblog.com/category/privacy-encryption/
- http://lifehacker.com/just-delete-me-is-a-massive-list-of-links-to-close-all-1245040101
- Online Guide to Privacy Resources[8]
- http://www.nocards.org - Coalition Against Unsolicited Commercial Email[9]
References
- ↑ James Wesley Rawles, American Redoubt: The Survival Blog http://survivalblog.com/2012/03/important-message-from-jwr-the-fbis-cookie-caper-and-the-vpn-imperative.html Accessed December 6, 2014
- ↑ https://security.stackexchange.com/questions/39788/how-can-you-be-caught-using-private-vpn-when-theres-no-logs-about-who-you-are Accessed December 6, 2014
- ↑ https://tails.boum.org/doc/advanced_topics/cold_boot_attacks/index.en.html Accessed December 6, 2014
- ↑ https://charlescarrollsociety.com/2014/02/12/amrd-t-a-i-l-s-plastic-gloves-for-your-computer-american-redoubt
- ↑ "Help make mass surveillance of entire populations uneconomical! We all have an unalienable right to privacy, which you can exercise today by encrypting your communications and ending your reliance on proprietary products and services."
- ↑ "Help make mass surveillance of entire populations uneconomical. We all have a right to privacy, which you can exercise today by encrypting your communications and ending your reliance on proprietary services."
- ↑ "Organization formed in 1990 to maintain and enhance intellectual freedom, privacy, and other values of civil liberties and democracy in networked communications. Publishes newsletters, Internet Guidebooks and other documents, provides mailing lists and other online forums, and hosts a large electronic document archive. Contact: info@eff.org. 454 Shotwell Street, San Francisco, CA 94110-1914. Tel: (415) 436-9333. Fax: (415) 436-9993. Executive Director: Sheryl Steele."
- ↑ "EPIC was established in 1994 to focus public attention on emerging privacy issues relating to the National Information Infrastructure, such as the Clipper Chip, the Digital Telephony proposal, medical records privacy and the sale of consumer data. EPIC conducts litigation, sponsors conferences, produces reports, publishes the EPIC Alert and leads campaigns on privacy issues. For more information email: epic-info@epic.org, or contact EPIC, 1718 Connecticut Avenue, NW, Suite 200, Washington, DC 20009. Tel: (202) 483-1140. Executive Director: Marc Rotenberg."
- ↑ "CAUCE is an all volunteer, entirely web-based organization, created by Netizens to advocate for a legislative solution to the problem of UCE (spam). CAUCE began as a discussion group called SPAM-LAW, formed of members who felt that legislation was necessary to stop spam from choking the life out of the Internet. In 1997 CAUCE proposed an amendment to the Federal statute which outlaws junk "faxes" (47 USC 227) to also prohibit junk e-mail, and since then has remained a pre-eminent voice in the anti-spam community. Email: comments@cauce.org. President: Edward Cherlin."