How To Make A Secret Phone Call

His step-by-step instructions for making a clandestine phone call are as follows:

Analyze your daily movements, paying special attention to anchor points (basis of operation like home or work) and dormant periods in schedules (8-12 p.m. or when cell phones aren’t changing locations);
Leave your daily cell phone behind during dormant periods and purchase a prepaid no-contract cell phone (“burner phone”);
After storing burner phone in a Faraday bag, activate it using a clean computer connected to a public Wi-Fi network;
Encrypt the cell phone number using a onetime pad (OTP) system and rename an image file with the encrypted code. Using Tor to hide your web traffic, post the image to an agreed upon anonymous Twitter account, which signals a communications request to your partner;
Leave cell phone behind, avoid anchor points, and receive phone call from partner on burner phone at 9:30 p.m.—or another pre-arranged “dormant” time—on the following day;
Wipe down and destroy handset.

http://m.fastcompany.com/3044637/secret-phone-network

this is part of an art project which was looking at the surveillance state we live in

How Washington State Could Turn Aircraft Carriers Into Bridges

Washington State just received federal funds to study a totally unique toll bridge concept, one made out of decommissioned US Navy Super Carriers. The bridge would consist of two or three carriers and would link Bremerton and Port Orchard, Washington, spanning the Sinclair Inlet.

http://foxtrotalpha.jalopnik.com/how-washington-state-could-turn-aircraft-carriers-into-1696976267

apparently they are fighting an uphill battle but what an awesome idea!

Republican Senators Just Voted To Sell Off US National Forests

SA 838 is a budgetary amendment which backs support for and funding of state efforts to take over federal land. It was part of a larger debate over the 2016 fiscal year federal budget.

While yes, its language does note that it’s impossible to sell National Parks, National Monuments and National Preserves (which enjoy extraordinary legal protection), it leaves the door open to sell National Forests, Wildlife Refuges and Wildernesses. That’s some of you and I’s most beautiful lands on which we’re currently able to camp, hunt, hang out with our dogs and on which a large portion of wild animals rely for their habitat.

http://indefinitelywild.gizmodo.com/republican-senators-just-voted-to-sell-off-your-nationa-1696862450

aside from it not being theirs to sell, don’t they get that these are resources you can only sell once?

Hacker hijack ‘threat’: Your car’s security is Adobe Flash-grade BAD

as we’ve long suspected, the computers in today’s cars can be hijacked wirelessly by feeding specially crafted packets of data into their networks. There’s often no need for physical contact; no leaving of evidence lying around after getting your hands dirty.

This means, depending on the circumstances, the software running in your dashboard can be forced to unlock doors, or become infected with malware, and records on where you’ve have been and how fast you were going may be obtained. The lack of encryption in various models means sniffed packets may be readable.

Key systems to start up engines, the electronics connecting up vital things like the steering wheel and brakes, and stuff on the CAN bus, tend to be isolated and secure, we’re told.

http://www.theregister.co.uk/2015/02/09/car_security_senator_report/