
In a special joint radio program, Ami Chen Mills joins Luigi Oppido, host of “The Computer Man” show to discuss the massive breaches of security at the Treasury Department and multiple, other federal departments by Elon Musk and his DOGDY team of apparently virulently racist youngsters–and how to protect our information, if we still can.
What do we do about our private information and communications now that Tech Broligarchs seem intent on gaining entry into every aspect of our lives?
Covered in this episode:
- Freezing lines of credit, due to DOGE security breaches
- Signal, Protonmail, etc.
- Google and Gmail privacy
- License plate readers and ring cams
- Can you keep your phone from being tracked?
- Can people listen in to your phone conversations or hack your phone?
- How safe our desktop and laptop devices?
Note to Listeners: Our resources were going to include a comprehensive list of what to do about what. Due to what we felt was some urgency getting this episode, we offer what we can below (which turns out to be a lot, actually). We have been very busy! We will add more later. Thanks.
Personal Data and Cyber Security
First, the Dodgy Musk Team’s mass, illegal theft of personal data from various federal agencies, including: social security numbers, Tax ID numbers, medical records via Medicare and Medicaid and bank accounts linked to IRS payment systems.
First, we recommend you listen to this entire program and/or see the program transcription at Apple Podcasts.
Luigi recommends:
- Initiate a credit freeze with the major credit companies: Experian. Equifax. TransUnion. (See contact info in resources below.)
- Move money out of IRS accessed accounts and close those accounts (these are the accounts where you get your direct deposit tax refunds. Set up on account to receive funds from the IRS)
- If you are very concerned (and we recommend moving money locally and out of the big, fossil-fueled banks), move money into local credit unions and (possibly) foreign banks or block chain monies (however, risky!)
A few questions we asked:
MOT: What are the capacities of the Department of Homeland Security (DHS) and now the federal government in general? … with their tracking/hacking software, along with that of major tech companies?
Luigi: DHS is able to intercept photo data via technology that acts as a “middleman” between cell towers and your phone. Additionally, malware from hackers from China and elsewhere have hacked into AT&T and Verizon and this malware has not been removed. Update: these companies now say they have handled this problem, as of last December. You be the judge.
MOT: What happens when you shut your phone off? Turn off location services? Can it still be tracked?
Luigi: According to Edward Snowden, there are parts of our phones that can be “powered up” via electromagnetics even if our phones are off.
To be very safe, leave phones at home. Or use a Faraday Cage and put your phone inside. You can buy a Faraday Cage online, or you can make your own Faraday Cage with a few layers of tin/aluminum foil, a metal garbage can or cocktail shaker: https://www.pcmag.com/how-to/how-to-make-your-own-faraday-cage
MOT: What happens when you get off of wifi on your desk or laptop? Can it still be “hacked”?
Luigi: Recommends turning of your modem entirely to be safe. Some of his clients have a timer that turns their modems off automatically.
Info & Resources re: Security Concerns
Freeze Your Credit:
Transunion:
- 1-800-916-8800
- https://service.transunion.com/dss/orderStep1_form.page
Experian:
- 1-888-397-3742
- Link to register.
Equifax:
Instagram Reel on Why It’s Important to Freeze Your Credit:
https://www.instagram.com/reel/DFuE-sOA90d/?igsh=NjZiM2M3MzIxNA==
The following is compiled by Todd Zimmerman of Nativerse Studios and Hard Left News.
On the encrypted Signal Chat App and its Relative Security, plus how to Lock It Down.
https://freedom.press/digisec/blog/locking-down-signal/#keep-your-phone-number-more-private
Social Media monitoring
https://theintercept.com/2025/02/11/ice-immigration-social-media-surveillance/
https://www.theverge.com/news/610951/federal-workers-privacy-surveillance-signal-facebook-messenger
MS Dynamics 365
https://www.404media.co/how-a-microsoft-app-is-powering-employee-surveillance/
Google Gemini
Apple Backdoor
Previously Trusted Companies
Mozilla/Firefox/Thunderbird
AI Integration via Roost, partnering with the likes of Microsoft https://blog.mozilla.org/en/mozilla/ai/roost-launch-ai-safety-tools-nonprofit/
Cooperating with governments to prevent use of anti-surveillance tools https://theintercept.com/2024/06/12/mozilla-firefox-russia-censorship-blocked/
Proton Mail/Wallet
Proton Mail called into question beginning with CEO, Andy Yen, tweeting support of Trump Admin & cabinet picks.
https://theintercept.com/2025/01/28/proton-mail-andy-yen-trump-republicans/
Surveillance Info
https://atlasofsurveillance.org/
https://www.surveillancewatch.io/
Security Culture Resources
Open Source Home Security Firmware
Networking/Cloud Options
https://taggart-tech.com/wireguard/
https://www.privacyguides.org/articles/2025/01/29/installing-and-using-tails/
Security Culture – Digital Resources
https://www.privacyguides.org/en/
https://www.optoutproject.net/the-cyber-cleanse-take-back-your-digital-footprint/
https://neighborhoodanarchists.org/
What is Security Culture? A Guide to Staying Safe – Sprout Distro Zines
Towards a Collective Security Culture – CrimethInc.
Eugene Neighborhood Anarchists Resource Guide – https://neighborhoodanarchists.org/security-culture/
- Civil Liberties Defense Center website
- The Cybersecurity and Security Culture sections of our empowered self-education page.
- The Mysterious Rabbit Puppet Army presents: “Donny, Don’t!”– a security culture training skit (text transcript or 3.7 MB MP3)
- The following documents are a must-read for any activist.
- Agent At The Door: one-page guide to handling visits from government officials in the US. You may want to print this out and post it by your door.
- You Have the Right to Remain Silent
- Operation Backfire
- Security Culture: A Handbook for Activists
- Computer security
- NAC digital tool recommendations
- CLDC – Security Recommendations
- Security in a Box – Digital security tools and tactics
- Encryption Works: How to Protect Your Privacy in the Age of NSA Surveillance by the Freedom of the Press Foundation
- PRISM BREAK – detailed list of software options.
- The Grand Jury Resistance Project provides useful information about grand juries