Computer hacking, information technology, ethics, harassment, and human rights and privacy
violations in US and Canada:
Using cars, dogs, numerologies, colors, objects, and personal and psychological nonsense,
the white racist societies, cops, and their stooges, attempt to portray through their
concept of so-called cultural intelligence (e.g. symbolic communications between different
living and non-living species, etc) indications, and in-between the lines talks even from
third parties, that anyone who is non-white, including legal and illegal immigrants, should
bear evil dehumanizing harassments and human rights and privacy violations without getting
provoked because the so-called whites in developed countries such as those of North America
(that became rich due to uncouthly extracting resources from developing nations by hook or
crook), are doing them a big favor to allow them privileged entry into their developed
countries, when actually it is the immigrants and non-whites who are basically fuelling the
economy of developed countries. The whites excitedly form closed community networks to
harass non-whites in the community in various ways including hacking into their
communication channels such as telephones and internet and loudly and purposely
accelerating and driving around at appropriate times when non-whites are online on
telephones and on internet email or web surfing, whether on dial-up or high-speed modems,
to show that whites are smarter than non-whites; however the whites are counter-productive,
valueless, and detrimental to success of others, but that is what the whites want - to
hamper the health, happiness and success of others capable of attaining it, just because
the whites are themselves incapable of attaining it on their own. The illegal hacking by
the whites into non-whites communications illegally empowers the whites in developed
countries to violate the human rights and privacy of non-whites and harass them in
developed countries on the pretext that they are getting to live in their so-called
self-proclaimed, media-twisted, privileged developed countries, when the truth is, that the
developed countries of North America do not belong to any whites, or any other race, but
are countries of immigrants, and countries that have a nauseating genocidal history. The
whites basically cannot bear the truths, are hypocrites, and strive to keep truths
suppressed through targetted racial harassment, invisible hand, white lies and duping
mainstream media, disrespecting and insulting the non-whites in direct and subtle ways,
physically assaulting non-whites, psychologically abusing non-whites in subtle ways, etc,
and portraying the whites as good and learned people and non-whites as bad and unlearned
people. Nothing could be farther from truth. The truth is that there is a great difference
between being literate, educated, and learned, or the absence of these qualities. The
white racist cops in developed countries use their frontline stooges and henchmenwomen to
create disturbance and harass non-whites using see-through-wall technologies, and then the
white racist cops will wail their sirens; however, the truth is that the white racist cops
use a cover-up smoke-screen and are hand-in-gloves with their other white frontline stooges
and henchmenwomen in racits white communities to harass the non-whites in evil dehumanizing
ways dirty trickster ways, outright racism, and outright blasphemy, and all this gives the
whites cheap sadistic pleasure in their nothing-better-to-do lives. The whites in North
America are intoxicated in self-exaltation and incessantly commit ugly acts and deeds as
dirty tricksters to racially harass, provoke, and ruin the health and happiness of
non-whites and their families. The whites in developed countries do all they can to cover
up their ugly history of mass genocides locally and worldwide and instead twist the human
word of God, thy Lord, to portray non-white countries as bad. They only want the money of
non-whites, self-exaltation for themselves, are full of white-lies, cannot bear the truths,
cannot bear non-conformers, are full of harmful detrimental interference and harassment
towards non-whites, and devoid of basic human values of human rights and privacy, thriving
instead on the crisis and turmoil in other developing countries to portray developed
countries as good countries and developing countries as bad countries, a very shallow
unlearned portrayal of developing countries by the so-called developed countries,
reflecting their shallowness.
For more information:
www.nospysoftware.comwww.amazon.com search for titles on hacking, hackers, crackers, phishing, etc.
www.units.muohio.edu/psybersite/cyberspace/security/focus3.shtmlwww.thamesvalley.police.uk/reduction/victimsofcrime/internet/vic7.htmblog.zonealarm.com/blog/styles.csspagead2.googlesyndication.com/pagead/show_ads.jswww.hightechharassment.com/en.wikipedia.org/wiki/Antichristgroups.google.com/group/alt.law-enforcement.london-ontario/topicsgroups.google.com/group/alt.law-enforcement.london-ontario/browse_thread/thread/a10ffa62bed24f16#99f227b5944081c7
drlwilson.com/Articles/CELLPHONES.htmcryptome.org/tempest-scotus.htmwww.uhuh.com/reports/headsup/fron232.htm#Copywww.rmc.ca/academic/gradrech/millimeter-e.pdfnovanewsnet.ukings.ca/nova_news_3588_13109.htmlwww.ncjrs.gov/pdffiles1/nij/07_01.pdfwww.nlectc.org/techbeat/summer2000/LookWallsSum2000.pdfwww.akelainc.com/pdf_files/SPIE0405.pdfwww.radioproject.org/transcript/2000/0048.htmlwww.blackcommentator.com/70/70_cover_white_terror.htmlwww.rense.com/general69/eng.htmwww.criticalconcern.com/depleted_uranium.htmwww.theglobeandmail.com/servlet/Page/dosticky white pasteent/v5/content/subscribe?user_URL=http://w
ww.theglobeandmail.com%2Fservlet%2Fstory%2FLAC.20071119.OBERICSON19%2FTPStory%2F%3Fquery%3D
Criminologist%2Bidentified%2Bboredom%2Bas%2Bthe%2Bpoliceman%2527s%2Bgreatest%2Benemy%253B%2
BUniversity%2Bof%2BToronto%2B&ord=683726&brand=theglobeandmail&force_login=true
school.familyeducation.com/african-american-history/racism/47434.html members4.boardhost.com/Avijit/www.discovervancouver.com/forum/index.php?showtopic=211819&TOPIC_ID=211819politics.propeller.com/story/2006/12/05/white-terrorist-sentenced-to-30-years-mainstream-media-ignores-story
news.bbc.co.uk/2/hi/business/7026105.stmwww.baddevelopers.green.net.au/Docs/mulwala.htmwww.democracynow.org/2005/6/13/fbi_whistleblower_white_supremacists_are_majorbooks.google.ca/books?id=uNuYKduz_kAC&vq=international+law+studies&source=gbs_summary_s&cad=0
forestpolicy.typepad.com/ecoecon/2007/11/monboit-biofuel.htmltabacco.blog-city.com/western_media_bias_why_are_white_terrorist_acts_ignored_alja.htm
hypnosiscontrol.com/the-united-states-of-fascismerica/pcwatch.blogspot.com/2006_02_01_archive.htmletd.unisa.ac.za/ETD-db/theses/available/etd-06072006-105742/unrestricted/09chapters3to5.pdf
www.earthsustainable.org/www.worldchangecafe.com/2008/01/08/after-peak-oil-will-america-survive/www.our-energy.com/en/whitewatch.wordpress.com/category/terrorism/www.timesonline.co.uk/tol/news/politics/article3230705.ecewww.polluteless.com/Welcome_Frameset.htmlwww.vexen.co.uk/USA/pollution.htmlwww.nowpublic.com/adl_org_white_supremacist_terrorist_david_lane_dieswww.searchlightmagazine.com/index.php?link=template&story=184www.reuters.com/article/companyNewsAndPR/idUSN0564256720071205www.reuters.com/article/domesticNews/idUSN0938888020071110www.reuters.com/article/companyNewsAndPR/idUSN0542758420071205en.wikipedia.org/wiki/History_of_Canadausa.mediamonitors.net/content/view/sitemap/2peopleinaction.com/board/2/353.htmlwww.canadaimmigrants.com/forum.aspwww.bharatstudent.com/blogs/viewblog.php?blogid=10460&postid=17266&mode=postwww.justlanded.com/english/canada/tools/forums/jobs/racial_profiling_and_human_rights_violations
www.discovervancouver.com/forum/topic.asp?TOPIC_ID=51628&whichpage=2www.justicia4migrantworkers.org/saw_new.htmbooks.dreambook.com/hrlink/cases1.htmlwww.debwewin.ca/racism.htmwww.linkoflinks.0catch.com/linkoflinks.htmlwww.worldhungeryear.org/fslc/faqs/ria_201.asp?section=11&click=6members.fortunecity.com/brutalitycanada/www.21stcenturycowards.blogspot.comarchives.cbc.ca/IDC-1-69-96-479/life_society/africville/clip3 www.nlhra.org/Online%20Publications/twwa/twwarins.htmcryptome.org/tempest-scotus.htmwww.uhuh.com/reports/headsup/fron232.htm#Copywww.rmc.ca/academic/gradrech/millimeter-e.pdfwww.ncjrs.gov/pdffiles1/nij/07_01.pdfwww.nlectc.org/techbeat/summer2000/LookWallsSum2000.pdfwww.akelainc.com/pdf_files/SPIE0405.pdfwww.geocities.com/albanystudent/contribution6.htmlwww.alternet.org/drugreporter/11067/www.prisonplanet.com/archive_police_state.htmlwww.schneier.com/blog/archives/2005/10/eavesdropping_t.htmlsistersincrime.toronto.on.ca/homesurveillanceequipment.phpwww.danielnpaul.com/Col/1996/RacismHindersBlacksAndMi'kmaq.html
www.hfxnews.ca/index.cfm?main=multimedia&MMID=68 www.povnet.org/node/1778 www.cbc.ca/maritimemagazine/archives/040418_africvilleReparations.html www.dominionpaper.ca/pdf/dominion-issue40.pdfwww.yourluckytoday.blogspot.comwww.telusplanet.net/public/dgarneau/indian.htmen.wikipedia.org/wiki/Racismwww.geocities.com/CapitolHill/6174/resource.htmlwww.miningwatch.ca/www.turtleisland.org/news/cerd.pdfwww.ndir.com/SI/education/debt.shtmlwww.socialjustice.org/pdfs/economicapartheid.pdfwww.canadian-health-network.ca/s … mp;lang=En
www.dominionpaper.ca/archives.htmlwww.newswire.ca/en/releases/archive/October2005/11/c9164.htmlwww.ctv.ca/servlet/ArticleNews/story/CTVNews/20070110/ghg_record_070110/20070115/groups.google.com/group/can.atlantic.general/browse_thread/thread/875b342a4966de27groups.google.com/group/can.atlantic.general/topicswww.ci.richland.wa.us/RICHLAND/enviro/docs/65/docs/HARMFUL%20SUBSTANCES%20IN%20WASTE%20ELECTRONICS.pdf?CFID=3935943&CFTOKEN=90569836
www.cellular.co.za/news_2003/091103-cell-teens-senility.htmAmato, I. (2001). Big Brother logs on. Technology Review, 104(7), 59.
Bahadur, G., Chan, W., & Weber, C. (2002). Privacy defended: Protecting yourself online.
Indianapolis, IN: Que.
Bradsher, K. (1991). Experts say it is easy to pick up conversations on cellular phones.
The New York Times, June 16, p. 8, 14.
Budiansky, S. (1987). Cheaper electronics make it a snap to snoop. USA News & World Report,
May 18, pp. 54-56.
Burke, J. & Warren, P. (2002). How mobile phones let spies see our every move. The
Observer, October 13. Available online at
observer.guardian.co.uk/uk_news/story/0,6903,811027,00.html
Bush, S. (2006, November 17). Police will use radar to see through walls. Electronics
Weekly. Available online at
www.electronicsweekly.com/Articles/2006/11/17/40181/Police+will+use+radar+to+see+through+walls.htm
Bush, S. (2002, August 12). Radar with Cell Phones? Look at CellDar. Available online at
3nw.com/pda/radar_with_cell_phones__look_at_celldar.htmCampbell, J. E. & Carlson, M. (2002). Panopticon.com: Online surveillance and the
commodification of privacy. Journal of Broadcasting and Electronic Media, 46, 586-606.
Chan, H. (1999, June 4). Cops have eyes on x-ray vision. New technology would let police
see through walls. New York: APBNews.com. Available online at
www.angelfire.com/nj3/soundweapon/xray.htmCrawford, P. (1992). Computer security: Locking up open systems. Security Management,
36(2), 42-45.
Davies, S. (1995). Privacy International calls for CCTV debate. Privacy Forum Digest 4(21).
Available online at
www.eyetap.org/wearcam/netcam_privacy_issues/privacy_forum_digest_on_CCTV.htmlDempsey, J. X. (2002, Winter). Civil liberties in a time of crisis. Human Rights Magazine.
Available online at
www.abanet.org/irr/hr/winter02/dempsey.html Farmer, D., & Mann, C. (2003). Surveillance nation. (Part one). Technology Review, 106(3),
34-42.
Free, J., Freundlich, N. & Gilmore, C. P. (1987). Bugging. Popular Science, August, 231,
pp. cover-9.
Froomkin, M. A. (2000). The death of privacy? Stanford Law Review, 52(5), 1461-1543.
Gandy Jr., O. H. (1989). The surveillance society: Information technology and bureaucratic
social control. Journal of Communication 39(3): 61-76.
Garfinkel, S. (2001). Web security, privacy and commerce (2nd ed.). Sebastopol, CA:
O'Reilly.
Gehling, R., Ashley, R. C., & Griffin, T. (2007). Electronic emissions security: Danger in
the air. Information Systems Management, 24, 305-310.
Gould, J. B. (2002). Playing with fire: The civil liberties implications of September 11th.
Public Administration Review, 62, 74-79.
Greiner, B. (1995, November 8). Lack of privacy in a networked world is a real threat.
Computing Canada, 21(23), 44-45.
Griffin, J. A. (1998). Privacy and security in the digital age. IEEE Spectrum Online.
Gumpert, G., & Drucker, S. J. (2001). Public boundaries: Privacy and surveillance in a
technological world. Communication Quarterly, 49(2), 115-129.
Haggerty, K. D. & Ericson, R. V. (2000). The surveillant assemblage. British Journal of
Sociology, 51, 283-306.
Hearn, Kelly. (2001, April 18). High tech cop tools see through walls. United Press
International cited on CommonDreams.org. Available online at
www.commondreams.org/headlines01/0418-04.htmHiggs, E. (2001). The rise of the information state: The development of central state
surveillance of the citizen in England, 1500-2000. Journal of Historical Sociology, 14,
175-197.
Hunt, A., Tillery, C., & Wild, N. (2001). Through-the-wall surveillance technologies.
Available online at
www.ncjrs.gov/pdffiles1/nij/07_01.pdfJones, W. D. (2005, November). No place to hide: Portable radar devices see through walls
and report what’s inside. IEEE Spectrum Online. Available online at
www.spectrum.ieee.org/nov05/2146 Kuhn, M. G., & Anderson, R. J. (1998). Soft tempest: Hidden data transmission using
electromagnetic emanations. In D. Aucsmith (Ed.), Information hiding: Second International
Workshop, vol. 1525 of Lecture Notes in Computer Science (pp. 124-148). Berlin, Germany:
Springer-Verlag. Available online at
groups.csail.mit.edu/cis/crypto/classes/6.857/papers/ih98-tempest.pdf Lacayo, R. (1991). Nowhere to hide: Using computers, high-tech gadgets and mountains of
data, an army of snoops is assaulting our privacy. Time, November 11, pp. 34-40.
Lamb, G. M. (2006). Does digital age spell privacy’s doom? Christian Science Monitor,
98(149).
Lehtinen, R. & Gangemi, Sr., G. T. (2006). Computer security basics. Sebastopol, CA :
O'Reilly.
Lyon, D. (2001a). Surveillance society: Monitoring everyday life. Buckingham, UK: Open
University Press.
Lyon, D. (2001b). Facing the future: Seeking ethics for everyday surveillance. Ethics and
Information Technology, 3, 171-181.
Lyon, D. (2001c). Surveillance after September 11. Surveillance after September 11.
Sociological Research Online 6(3). Available online at
www.socresonline.org.uk/6/3/lyon.htmlLyon, D. (2002a). Editorial. Surveillance Studies: Understanding visibility, mobility and
the phenetic fix. Surveillance & Society, 1(1), 1-7.
Lyon, D. (2002b). Surveillance in cyberspace: The internet, personal data, and social
control. Queen’s Quarterly, 109, 354-356.
Lyon, D. (2004). Surveillance technologies: Trends and social implications. The Security
Economy (pp. 127-148). OECD report.
Marx, G. (1991). Privacy and technology. Whole Earth Review, 73, 90-96.
Marx, G. T. (1986). The iron fist and the velvet glove: Totalitarian potentials within
democratic structures. Available online at
web.mit.edu/gtmarx/www.iron.htmlMarx, G. T. (1996, November-December). Monitoring on the job: How to protect privacy as
well as property. Technology Review. Available online at
web.mit.edu/gtmarx/www/privacy.htmlMarx, G. T. (1998). An ethics for the new surveillance. The Information Society, 14(3).
Available online at
web.mit.edu/gtmarx/www/ncolin5.htmlMarx, G. T. (2001). Murky conceptual waters: The public and the private. Ethics and
Information Technology, 3(3), 157-159. Available online at
web.mit.edu/gtmarx/www/murkypublicandprivate.html Mejia, R. (2002). More surveillance on the way. The Nation, October 30. Retrieved March 2,
2008, from
www.thenation.com/doc/20021111/mejia20021030 Menzies, D. (1998, November). Know the enemy (Hackers). CIO Canada, 6(11), 28. Retrieved
February 2, 2008, from
www.w3.org/TR/html4/loose.dtd McGowan, D. (2000, June). Sony’s Magic cameras. Available online at
www.davesweb.cnchost.com/cameras.htm Miles, D. (2006, January 3). New device will sense through concrete walls. American Forces
Information Service. US Department of Defense. Available online at
www.defenselink.mil/news/Jan2006/20060103_3822.html National Law Enforcement and Corrections Technology Center. (2000). Looking through walls.
Available online at
www.nlectc.org/techbeat/summer2000/LookWallsSum2000.pdfNunn, S. (2001). Police technologies in cities: Changes and challenges. Technology in
Society, 23, 11-27.
Patton, J. W. (2000). Protecting privacy in public? Surveillance technologies and the value
of public places. Ethics and Information Technology, 2, 181-187.
Pecora, V. P. (2002). The culture of surveillance. Qualitative Sociology, 25, 345-358.
Poster, M. (1990). The mode of information: Post-structuralism and social context. Chicago,
IL: University of Chicago Press.
Radwanski, G. (2003). Erosion of human rights begins with the loss of the right to privacy.
Canadian Speeches, 17(1), 16-22.
Redden, J. (2001). Snitch culture: How citizens are turned into the eyes and ears of the
state. Los Angeles, CA: Feral House.
Rothfeder, J., Galen, M. and Driscoll, L. (1990, January 15). Is your boss spying on you?
Business Week, pp. 74-76.
Saetnan, A. R. (2007). Nothing to hide, nothing to fear? Assessing technologies for
diagnosis of security risks. International Criminal Justice Review, 17(3), 193-206.
Sanders, Jane (2001, April 12). Flash of force: Radar flashlight could help police detect
suspects hiding behind doors and 8-inch thick walls. Georgia Institute of Technology
Research News. Available online at
gtresearchnews.gatech.edu/newsrelease/RADARFLASH.html Scott, L. (1997, October 13). A flashlight that ‘sees’ through walls. Business Week.
Shenk, D. (2003). Watching you. The world of high-tech surveillance. National Geographic,
204(5), 2-27.
Simonite, Tom. (2006, November 14). Compact radar tracks movement through a wall. New
Scientist. Available online at
www.newscientisttech.com/channel/tech/weapons/dn10524 Solove, D. (2004). The digital person: Technology and privacy in the information age. New
York, New York University Press.
Stalder, F. (2002). Opinion. Privacy is not the antidote to surveillance. Surveillance &
Society, 1(1), 120-124.
Staples, W. G. 1997. The culture of surveillance: Discipline and social control in the
United States. New York, NY: St. Martin’s Press.
Van Eck, W. (1985). Electromagnetic radiation from video display units: An eavesdropping
risk?
Withers Jr., R. A. & Albrecht, S. (1997). Pssst…wanna buy some data? Security Management,
41(12), 113-117.
Zalewski, M. (2005). Silence on the wire. San Francisco, California: No Starch Press.
Zalud, B. (2004). War of the walls. Security, 41(2), 58.