Feeds:
Posts
Comments

Posts Tagged ‘police’

Image2No Comment: The Defendants Guide to Arrest has been updated and republished by LDMG (Legal Defence And Monitoring Group)

This little booklet is essential reading for anyone at risk of arrest, which means anyone involved in protests. You can download a copy of “No Comment” here or for a hard copy please send a self addressed envelope with a 2nd class stamp on it to No Comment c/o BM Haven, London WC1N 3XX. Groups wanting bulk copies should email us.

The guide was produced by the Legal Defence and Monitoring Group.”

Advertisements

Read Full Post »

rats-cover-450x600“These days, law enforcement at all levels — from the local cop shop to obscure federal agencies — uses snitches to trap ordinary people. Snitches tell lies that send their friends to jail. Paid agents provocateurs talk or trick otherwise harmless people into committing crimes. In many places, Snitch culture has virtually replaced real investigation of real crimes.

Don’t think you’re exempt if you’re a “law-abiding citizen.” The most trusting, naive, innocent people often make the easiest targets for these weaselly, lying, opportunistic vermin. Snitches specialize in targeting the vulnerable.

You may be in danger if you are:

  • A political activist
  • A recreational drug user
  • A hobbyist or business person who works with “sensitive” materials
  • A member of an unpopular religion
  • A gun owner or dealer
  • A participant in the underground economy
  • A photographer or videographer
  • A controversial thinker or writer
  • Or you just happen to hang out with the wrong people

Snitches are everywhere and they’re hard to detect. This brief, FREE ebook, Rats, can help you:

  • Identify a snitch
  • Protect yourself against snitches and agents provocateurs
  • Protect your friends or colleagues
  • Know how to handle yourself if you get arrested

It could even help you avoid being pressured into becoming a snitch, yourself.

Rats is the work of ex-cops, lawyers, security experts, experienced activists, outlaws, former outlaws, trained interrogators, and more. In the hour or so it takes you to read their information, you’ll gain a lifetime’s worth of armor against snitches, informers, informants, agents provocateurs, narcs, finks, and similar vermin.

Download the Rats ebook now. Share it with your friends. Spread it around. Offer copies for download you your own site or mirror this entire page. All we ask is that you provide a link back to http://rats-nosnitch.com/. Information is power — the power of free people against a growing police state.

If you want to read the book in one of the ereader formats but don’t own a Kindle or a Nook, you can download free reader software for phones, Windows and Mac computers, and other devices. Free Kindle apps from Amazon.com. Free Nook apps from Barnes & Noble.”

Downloads

Read Full Post »

The Boston Phoenix’s recent article on the Craigslist killer uncovered something very interesting in it’s research into how the web hunt for the killer was conducted; something neither it’s reporters, or the general public, had never seen before: The full results of a Facebook subpoena.

This is some scary stuff; for the first time, we can now see EXACTLY what Facebook sends when the Police, or a judge, ask them to hand over your information. Read the full article here.

Read Full Post »

Anti-Forensics is a community dedicated to the research and sharing of methods, tools, and information that can be used to frustrate computer forensic investigations.

Subscribe via RSS or Feedburner RSS (Google tracked) and stay up to date on issues and news of interest for the computer forensics and anti-forensics community.

In a nutshell, anti-computer forensics, in the realm of digital forensics or computer forensics, involves the hiding, destroying, and disguising of data.

A major goal of some anti-forensics software, and the focus of Anti-Forensics.com, is to make the analysis and examination of digital evidence as difficult, confusing, and time consuming as possible.

There are numerous uses of anti-forensic tools and techniques. These methods can be used to protect the privacy and the confidentiality of data. This is especially true with disk encryption and disk and file wiping software. Using software to securely delete or wipe data is a method used by criminals, businesses, government agencies, and many individuals concerned in protecting confidential or private data alike.

The most commonly used anti-forensic methods involve:

  • Data Deletion (Wiping)
  • Network Protocol Encryption
  • Data Encryption
  • Physical Destruction of Digital Media
  • Anonyminity Software and Techniques

Read Full Post »