Posted on 04/20/2022 9:27:42 AM PDT by Red Badger
I used to tell people there IS a surefire way to do it, even if the fedgov is involved, at least for a while. It involves what I posted above as well as storing your computer and disguise in a storage unit somewhere. But where it gets complicated nowadays is that there are cameras simply EVERYWHERE. So they can backtrack you from the location via ring cameras, etc., possibly all the way to the storage unit.
Of course, once they track you to the location you use, they can simply stake it out, which is why you’d need to use a different location every time. Maybe riding a bike there from a parking spot where you know there is no camera surveillance nearby.
Anyway, it can be done. You just have to be anal about it. And even then there are no guarantees. And no, I’ve not actually done this. I just like to think about ways to thwart “the system”. Way back in 1972 a workmate asked me why I was always thinking of ways to rip off the company. I told him it was just fun to find security risks. Looking back in hindsight, I probably should have gone into security.
The bottom line is this, the commie left cannot stand it when videos of themselves are posted for the world to see what utter idiots they are..they look at themselves and realize my God what a fool I have been..and they cant stand it..they literally cannot stand seeing videos of themselves behaving like the utter buffoons they are
It’s like these lefty women are forever locked into 17 magazine and all the trials and tribulations of acting like a teenager.
First, buy a USED computer from a Goodwill or thrift shop or a repair shop. Pay cash, no credit card..................
Alinsky’s Rules For Radicals:
Saul Alinsky’s 12 Rules for Radicals…
What is really interesting about the use of Alinsky’s simplistic tactics is that they were designed to be used by people with low intelligence – those whose lips move when they read. If they EVER read. Tools and fools. CNN’s audience.
Watch any video where the regular liberal “marchers” get interviewed and you will find that they can go no further, in a thought process, then the words they heard on CNN. They don’t have a message. They have a memorized chant which they cannot explain, or enlarge on. These people have no idea of what a concept is. They are very likely, these days, to be vaccine damaged.
When you understand this actuality, these Alinsky people become fun to watch.
Be aware that most proponents, and users, of these liberal tactics hide behind fake identities for GOOD reason.
Here is the complete list from Alinsky.
RULE 1: “Power is not only what you have, but what the enemy thinks you have.”
Power is derived from 2 main sources – money and people. “Have-Nots” must build power from flesh and blood. (These are two things of which there is a plentiful supply. Government and corporations always have a difficult time appealing to people, and usually do so almost exclusively with economic arguments.)
RULE 2: “Never go outside the expertise of your people.”
It results in confusion, fear and retreat. Feeling secure adds to the backbone of anyone. (Organizations under attack wonder why radicals don’t address the “real” issues. This is why. They avoid things with which they have no knowledge.)
RULE 3: “Whenever possible, go outside the expertise of the enemy.”
Look for ways to increase insecurity, anxiety and uncertainty. (This happens all the time. Watch how many organizations under attack are blind-sided by seemingly irrelevant arguments that they are then forced to address.)
RULE 4: “Make the enemy live up to its own book of rules.”
If the rule is that every letter gets a reply, send 30,000 letters. You can kill them with this because no one can possibly obey all of their own rules. (This is a serious rule. The besieged entity’s very credibility and reputation is at stake, because if activists catch it lying or not living up to its commitments, they can continue to chip away at the damage.)
RULE 5: “Ridicule is man’s most potent weapon.”
There is no defense. It’s irrational. It’s infuriating. It also works as a key pressure point to force the enemy into concessions. (Pretty crude, rude and mean, huh? They want to create anger and fear.)
RULE 6: “A good tactic is one your people enjoy.”
They’ll keep doing it without urging and come back to do more. They’re doing their thing, and will even suggest better ones. (Radical activists, in this sense, are no different that any other human being. We all avoid “un-fun” activities, and but we revel at and enjoy the ones that work and bring results.)
RULE 7: “A tactic that drags on too long becomes a drag.”
Don’t become old news. (Even radical activists get bored. So to keep them excited and involved, organizers are constantly coming up with new tactics.)
RULE 8: “Keep the pressure on. Never let up.”
Keep trying new things to keep the opposition off balance. As the opposition masters one approach, hit them from the flank with something new. (Attack, attack, attack from all sides, never giving the reeling organization a chance to rest, regroup, recover and re-strategize.)
RULE 9: “The threat is usually more terrifying than the thing itself.”
Imagination and ego can dream up many more consequences than any activist. (Perception is reality. Large organizations always prepare a worst-case scenario, something that may be furthest from the activists’ minds. The upshot is that the organization will expend enormous time and energy, creating in its own collective mind the direst of conclusions. The possibilities can easily poison the mind and result in demoralization.)
RULE 10: “If you push a negative hard enough, it will push through and become a positive.”
Violence from the other side can win the public to your side because the public sympathizes with the underdog. (Unions used this tactic. Peaceful [albeit loud] demonstrations during the heyday of unions in the early to mid-20th Century incurred management’s wrath, often in the form of violence that eventually brought public sympathy to their side.)
RULE 11: “The price of a successful attack is a constructive alternative.”
Never let the enemy score points because you’re caught without a solution to the problem. (Old saw: If you’re not part of the solution, you’re part of the problem. Activist organizations have an agenda, and their strategy is to hold a place at the table, to be given a forum to wield their power. So, they have to have a compromise solution.)
RULE 12: Pick the target, freeze it, personalize it, and polarize it.”
Cut off the support network and isolate the target from sympathy. Go after people and not institutions; people hurt faster than institutions. (This is cruel, but very effective. Direct, personalized criticism and ridicule works.)
What is REALLY interesting is that Saul Alinsky died in 1972, almost 50 years ago…
So, these political tactics are, at a minimum, fifty years old. They were designed to deal with a political situation in existence during the 1950s, 1960s, and early 1970s – a world totally different from today. Yet, many activist groups laud these tactics without realizing their in-appropriateness in the 2020 world.
What Alinsky, and his followers, failed to comprehend is that they created a whole generation of people who cannot see beyond screaming criticism and offer any modern day solutions to social problems beyond a social shift to the hungry and dreary world of socialism/communism – something they definitely do not actually want to happen.
The counter reaction to this situation has been the rise of the humongous populist movement that elected Donald Trump. This group doesn’t put up with Alinsky-like nonsense. They outnumber the Alinski-ites 100,000 to 1.
Twitter is a tool of the left which means it’s a tool of the deep state.
bttt
Don't forget that when your laptop or phone accesses a public WiFi (at, for example, a Starbucks), that your device's MAC address (which uniquely identifies your laptop) is part of the handshake to the WiFi router.
While the MAC address does not go out on the internet, it is possible that the public router may log it (and for businesses that offer "free" wifi service, it probably DOES log it (in case law enforcement comes calling with a request, because so many people use "public" wifi for doing things they want to keep hidden).
Don’t forget to turn off your phone and leave it at home.
“We” likely does not include you.
Yep. It’s all about the used computer.
Ping
Yep. I can’t forget I forgot to list that. That is the first item on the list (I used to work for law enforcement relations at a major cell provider).
Frankly, the list is not really comprehensive, but it gets to the lengths of what a person has to do to actually even entertain getting away with anything like that.
The American revolution could not have happened with today’s technology.
The leftists posting their child grooming videos want people to see them. They live on likes and views. They got more exposure this way and should be happy about it.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.