The Surveillance State: Augury

US military using tool that captures ‘93% of the internet’ 

Multiple branches of the US military have bought access to “petabytes” of American citizens’ private online data via a tool called Augury, giving them access to an almost omniscient set of data points, Senator Ron Wyden (D-Oregon) claimed in a letter to the Office of the Inspector General (OIG) on Wednesday. The alleged data trove includes an individual’s email communications, browsing history, and other behavioral information, all on demand and without a warrant.

There is No such thing as Online Privacy.

Proceed with Caution.

 

 

A Safe and Secure Way to Decommission a Hard Drive | (ISC)² Article

Survival Homestead

Pay particular attention to damaging the platters inside the hard drives where data is magnetically recorded” says UMich.edu.

Hard drives will typically have several platters mounted on the same spindle. See featured image. Be thorough.

Hard disk with platter

Physical destruction is generally considered the most secure and permanent type of data destruction, but this must be done to a provable level, as even a small piece of a disk may contain data. Typical techniques include grinding, shredding, incineration, applying corrosive chemicals, or applying extremely high voltage.

(ISC)² Article

View original post