About Kitty Hundal

Kitty Hundal, author of From The Shadows: Persecution Games. is currently the Owner and Operator of Kitty Hundal Dot Com Solutions. She is also a contributing author to Hacktivist Culture, The Cryptosphere, The Fifth Column and several personal, special interest blogs.

Lauri Love aka @LauriLoveX permanently banned from Twitter

Wire 2017-03-09 at 16.47.17

Source: http://pastebin.com/vxNKeDBK : Author(s) are anonymous

Lauri Love, aka @LauriLoveX has been permanently banned from Twitter over an alleged “violent threat”.

This is a call to action.

While it is unclear as to what he posted that got him banned or even suspended in the first place, it is believed that this “violent threat” referenced by the Twitter support team is either Lauri’s Tweets about punching Nazis, or perhaps a post that Lauri made on Facebook after he was temporarily suspended from Twitter, which was later screen-capped and shared by multiple accounts. It is also suspected that those in charge of Twitter are resentful of the fact that Lauri and his community reacted to his suspension by openly expressing their outrage to them directly, so this is their extremely petty way of getting back at Lauri.

We must put pressure on Twitter to do the right thing and reinstate Lauri’s account, as well as stop suspending and banning people for speech that they are not personally in favour of.

Please send direct messages and tweets to @Jack, @Twitter, and @Support, as well as contact Twitter through the support center: https://support.twitter.com/forms. You can also email Twitter directly and we encourage everyone to do so: support@twitter.com

In your tweets, please use the hashtag #FreeSpeechFreeLauri,as well as #FreeLauri and #AntiFa.

Many of Lauri’s friends and supporters were concerned that his Twitter suspension was a result of pressure from UK authorities leading up to his potential extradition from the UK to the USA over hacking charges, which he is currently appealing. Lauri’s Facebook post was meant to put all of us at ease:

“Friends, Nazi-punchers, autonomist comrades-at-arms…
I have been suspended by Twitter. I don’t know why. Probably because of silly tone-policing algorithms and/or butthurt white supremacists.

However, it is not because I am about to be surprise kidnapped and rendered to the USA to be locked up and tortured.

We have submitted our perfected grounds for appeal as of last last Monday and strongly expect to hear that leave will be given for a High Court appeal to be heard in mid-to-late summer.

In the meanwhile, I would not want to be someone working on Twitter’s support desk today as I am a little bored, a little annoyed, and unicode Zalgos are quite fun to play with….

Love and Power,
L xxxx”

There is a clear hypocrisy among the Twitter support team in that there are countless self-identified Nazis and Nazi-sympathizers who spread hatred on this platform every single day, but any talk about punching them or implying that they should not be free from consequence is seen as “violence”. Free speech is a fundamental value of the Internet and this must include social media platforms like Twitter, but in this case free speech is being upheld and violated selectively to the benefit of Twitter Fascists.

This is a severe injustice and a blatant act of censorship targeting an Anti-Fascist activist, while those using Twitter to spread fear and hatred towards people of colour, refugees, immigrants, women and the queer community are allowed to keep doing so.

Did the Twitter support team really expect no response to this? By censoring Lauri they are hurting themselves, and they are showing us exactly which side of history they have chosen. We must fight back and make our position loud and clear. We will not tolerate censorship, and certainly not censorship of those who fight for the greater good while the genuinely evil people of this world get to express themselves freely.

In love and rage,

Concerned Twitter users, free speech advocates and friends and supporters of Lauri


#ActivismNow #IceRaids

BREAKING // Ongoing #ActiveCensorship by Raymond Johansen

Few will ever see this post, but that wont stop me from sharing it. An hour ago we learned that Muslims across America where being picked up for deportation. (#ICEraids across America) A family in Texas where stuck and needed an Arabic translator. I got that shared widely. When it hit 51 RT’s it stalled. Everything went quiet.

Not only that, my FB post with contact details was throttled. If you used the link from Twitter or anywhere else, not scrolling on my wall, you would only see the map and not the text with the phone number and details. (See attached photos)

Basically something that was bound for *virality* after being shared by accounts with an estimated reach of 2,8 million got stopped. It got stopped by someone with power enough to mess with Twitter and Facebook within half an hour.

This text deals with facts, but amidst it I feel obligated to share my theory. ICE started raiding Muslims for deportation and a whole row of private companies got paid to suppress social media criticism of it.

The first photo is what my post looks like for everyone clicking the link from anywhere on social media. It is blanked out. No text.


The second photo is what the post looks like on my Facebook Wall.


I am not a conspiracy nutter, nor am I a first timer. I have been through ops with governments attempting to stop us more times than most of you have ever eaten a proper fish meal. I have seen OpIsrael 1-4 succeed and then Saudi Arabia pay companies to stop us from helping #FreeRaif.

I have seen the industry grow to several hundred entities offering a service to anyone who wants to shut down any activity on social media. You can now “stop” any movement  or cause just by paying a weekly amount of anywhere between $10k-100k per week.

The last two times I shared important content to millions my RT’s stopped cold at 101 tweets. This time exactly at 51. (In the next few minutes a few RT’s happened, only because two or three people actually go to my stream or wall and see the tweet or post right there.)

Before you think I am just not thinking it through, try to get the fact that I actually have a lot of experience with this. We have been battling suppression more than two dozen times. And no, I am not merely being shadow banned. In 2017 it happens within the algorithms. Twitter started using them too, late last year. (? unsure of exact date) That change made it possible for powerful entities to quell any piece of information not to the liking of those with enough money or power.

What is going down around us is very much a sign of totalitarianism and it does not scare me. It is something we expected and are prepared for. Even though “they” (I know how it sounds) think they have put the breaks on me you will come across my thoughts everywhere. There will be no stopping me, or us. That is simply because when we meet opposition our #Resistance truly gets going. We don’t just double down. We do much much more than that.

Project Digital Border Defense : Submission by the Pirate Party of Norway to the Norwegian Parliament

by Raymond Johansen, member of the Board of Directors of the Pirate Party of Norway

This year the Norwegian government will consider copying every byte going in or out of Norway. This is the response of the Norwegian Pirate Party.

Contents List

  • 1. Why is it called Project Digital Border Defense?
  • 2. Why should we sacrifice an entire people’s privacy?
  • 2 a) Terrorism
  • 2 b) Cyber crime
  • 3. General considerations

Digital Border Defense, (DGF)

The Pirate Party understands that DGF is suggesting that the intelligence service copy all data passing our borders. This means that the collected data will be stored for a period of time. We further conclude that analyzing these large amounts of data will require enormous computing power. We also note that Parliament has allocated money to purchase and operate a supercomputer which is partly a collaboration with the US NSA. Here we read that the DGF documents are intended to protect Norway against terrorism and cybercrime.

On the basis of this simple summary, it is tempting to end our response to the consultation here. It goes without saying that this is a very bad idea. However, because we have followed the trend in many countries in this area for many years we’ve been forced to delve deeper into the issue. First, we’ll touch on the name, then we will go into why we should not sacrifice an entire people’s privacy in the fight against international terrorism and cybercrime. Finally, we will list some general considerations.

1. Why is it called Project Digital Border Defense?

The Pirate Party wonders why a name, which includes the words border and defense, was given to a project intended to copy 80 percent of what the Norwegian people do and say. For us it is crystal clear that they have chosen this name to trick people into believing that this is about a border and that they are there to protect us from an enemy.

On the internet there are simply no borders. That simply lies in the nature of the technology. Data flowing through the Internet knows no geography. An email from a Norwegian to his neighbor will potentially visit Sweden, Denmark, the Netherlands and the United States and then come back to Norway via a route that only perhaps is somewhat similar to what it took to begin with. The internet is transnational in every conceivable way. Since we cannot stop all e-mails on “a border” to see if it might contain anything criminal before we release it. We think that the name of this project is not only misleading – it is directly intended to manipulate the common man.

On our physical border crossings we have customs and passport control. Here, people from other countries are asked about their intentions for the visit and then their identity is checked. This is only natural and necessary. On the Internet there are no borders, customs or passport inspectors. That is simply not possible. It is difficult to avoid words like ridiculous, technically impossible, grossly misleading and direct manipulation – considering what they chose to name it.

The Pirate Party wants to be a Privacy Border Defense in the coming year. It is particularly sad that this work must be done, but it seems as if we are the only ones willing to take up arms against those who would erode our rights.

2. Why should we sacrifice an entire people’s privacy?

The Lysne II – Commission’s report is clear that the motivation for the invasion of the Norwegian people’s privacy is terrorism and cybercrime, (industrial espionage and criminals who want to steal your money).

2 a) Terrorism

The Pirate Party will always shape our policies based on facts. Some call this science-based policies. If we are to provide the intelligence service with access to everyone’s privacy due to terrorism, we would want to look into whether the threat is real or not. First, let’s look at GTD, Global Terrorism Database. GTD has registered all kinds of events in Norway from 1970 to 2015. The database includes everything from kidnapping and extortion – to bombs. There we find 26 events, 3 of which take place abroad and only 2 that had fatal consequences. One of them was the murder of Benjamin Hermansen at Holmlia – carried out by neo-Nazis. The other one was obviously the Utøya / Regjeringskvartalet. These are the only two incidents that can objectively be called terrorism. Source: (Global Terrorism Database – with all details)

There is no question that international terrorism is a major problem. Similarly, it is also crystal clear that it does not affect Norway at all. The Pirate Party has, to put it mildly, difficulty understanding how the monitoring of all Norwegians will help the fight against terrorism. It is not true that we have terrorist cells hiding in an apartment in Selbu or Nedre-Eiker.

All western countries have a responsibility to safeguard their security. The Pirate Party thinks that the best way of accomplishing that is to ensure that it pursues a foreign policy that does not create terrorists while at the same time implementing an effective integration policy. Let’s take a look at the numbers, or science if you will. The United States, our closest ally, has implemented national and international mass surveillance. They have not been able to document a single case where such monitoring has stopped a single terrorist act. Source: “U.S. Mass Surveillance Has No Record of Thwarting Large Terror Attacks, Regardless of Snowden Leaks”

While the NSA claims that they have thwarted terrorist attacks through mass surveillance, one can see dozens of articles refuting their claims. DHS (Department of Homeland Security), has published a report on preventing terrorist attacks which you can read here: (Isil-related arrest-in-homeland-from-jan2014). The article from The Intercept above explains why the NSA claims are not true.

As mentioned, Norway has had only two terrorist attacks in the past 30 years. What about the US then? Is terrorism really a reason to “eavesdrop” on it’s own citizens and the rest of the world? Reports show that since 9/11 there have been less than 100 people killed by terrorists. To understand how insignificant a problem that is we can point out that more than 15,000 were killed by firearms in the United States last year. If we only look at Chicago, a single city, 767 people were shot and killed in 2016. Source for the number of terrorist killed: “RAND Database of Worldwide Terrorism Incidents”

There are still politicians in the United States who claim that mass surveillance helps, (most of them are paid by entities that profit from “The War on Terror”). Here is an article from The Atlantic which solidly removes any residual doubt. (The last defenders of the NSA)

In Norway we do not have terrorism. In the US they have fewer victims of terrorism killed than those who died from falls in bathtubs in Europe during the same period. In Norway there are many who vote for a particular party because they fear Muslims.

Since we have little more than zero victims of terrorism killed in the past 30 years in this country, the Pirate Party looks at Europe in this context. From 1970 to 2016, just under 2 percent of all terrorist attacks in Europe were religiously motivated. In France, the same number is under 1 percent. Source: Global Terrorism Database, GTD.

The Pirate Party cannot find one single piece of evidence that convinces us that we need to sacrifice every citizens privacy.

2 b) Cyber crime

Hackers will break into any network where there is information that enables them to earn or steal money. Hackers working for a country such as Russia, China or the United States, do so because they want oil-secrets or to understand our country’s foreign policy. The last three years, the United States and Canada have negotiated the TPP, TTIP, CETA and TISA. They have, of course, utilized their digital spies to gain advantage in their negotiations.

From the Snowden revelations we know that the GCHQ (UK) and the NSA (USA), actually hacked Belgacom. Belgacom is the EU’s ISP (Internet Service Provider). Furthermore, we know that the main ISP for the Norwegian oil sector and oil platforms is an American company. Do we truly believe that the intelligence services that are monitoring Norwegians will protect Norway’s industry? Both Russian and American oil companies have been drooling for Norwegian technology for decades. In recent years, oil prices have been extremely low. In this kind of situation, Norwegian technology would be highly sought after. Do we have to wiretap every Norwegian to stop this kind of espionage? The answer is obviously no. The Pirate Party wants to be clear that we do not, for one second, believe the Lysne II – Commission justifications for sacrificing Norwegian privacy.

Risking ridicule, all supporters of “surveil everybody all of the time”: DGF have the dumbest rationale for mass surveillance we’ve ever heard. What the Intelligence service is proposing is that we invade the privacy of every citizen in Selbu simply to catch a potential bank robber from Russia who might be thinking about robbing a local bank. BTW the local bank is called Selbu Sparebank. The Pirate Party knows that sounds ridiculous. Equally ridiculous as Digital Border Defense. If you do not want the Russian cyber criminals to hack a business, you will help the business, of course, to close the door to the vault. Obviously, you do not expose everyone’s private life and tell them that you need to see the contents of all their letters – because bank robbers. You implement cybersecurity at the local level in every company and not on a non-existent internet border.

During the last 10 years, the NSA spent billions on mass surveillance of its own citizens and the rest of the world. Has it stopped any cybercriminals? Of course not. It was only when the Americans took a plane to China and negotiated face to face that they saw some reduction in attacks. Every day technology companies, health institutions and even intelligence companies are being hacked in the United States, even though they have had mass surveillance for years.

At this point we feel that it is right that we remind everyone of the Pirate Party’s fundamental ideas. One of them is that we make decisions based on science, or if you prefer: facts. The facts tell us that the “Monitor everybody – always” concept is not a good reason to sacrifice the privacy of an entire population. We therefore formally challenge all politicians or actors in the Intelligence services to meet with us for a debate. You can decide the time, place and content. Jacta est alea!

3. General considerations

– The Constitution

We refer to paragraph 102 and leave it at that

– The Court of Justice of the European Union (CJEU) // Cour de justice de l’Union européenne

Twice in the past two years, the EU has concluded that mass surveillance is illegal. The Pirate Party adds that it is also morally and ethically reprehensible. Here is an analysis of the Court’s decision: European Court of Justice rules against mass data retention in EU

– Norway’s adherence to international conventions

The Pirate Party is confident that the Norwegian government is aware of all the international treaties we have signed. This is just a reminder that we are signatory to many international treaties with the United Nations. We do not think it is necessary to list them all.

Form versus Content in Enforced Transparency

by Matt Goerzen and Raymond Johansen published on Dis Magazine

Transparency is seen as vital to any functioning democracy; in the United States, citizens enjoy limited powers to bring government documents into the public domain via the Freedom of Information Act (FOIA), and some legal protection is granted to public interest-motivated leakers and whistleblowers. Generally, transparency is understood as a net positive for liberal democracy, and organizations like the Pirate Parties International centralize transparency in their re-imaginings of more radical democratic politics. Activist organizations like WikiLeaks and Anonymous also dedicate themselves to bringing information about the political elite into the public domain—often this aligns with leftist agendas, but recent events raise questions about just who ultimately benefits from the publicization of secretive information.

Democratic theorists like Darin Barney and Jodi Dean warn us that the availability of information alone does not guarantee politically salutary outcomes.1 The commitment to analyzing and deliberating on an endlessly accelerating flow of information can actually push the event of real political organizing towards an always–elusive horizon. It is a mistake, warns Barney, to reduce politics to publicity alone.2 Deliberation can be debilitating.

And the idea of “post-truth” politics further suggests that the form of information’s coming to light can shape its reception in an even more substantial manner than the content of that information itself. The status of the emails hacked from the DNC and the Clinton campaign—their bulk and the illicit event of their publication via salacious leaks, hacks, and criminal investigations—may have overshadowed the relative innocuity of much of their content, and the significance of a foreign government’s involvement in bringing them to light. When does an all-encompassing commitment to transparency as an end in-and-of-itself —as upheld by organizations like WikiLeaks—facilitate the advancement of still other powerful agendas and geopolitical machinations, themselves hidden from view?

Raymond Johansen sits on the board of Pirate Parties International and is an outspoken advocate of hacker exfiltration, or “enforced transparency.” Founded in 2005 by Rick Falkvinge, the Pirate Parties received a major boost on October 29 of this year, when an unprecedented number of the parties’ representatives were elected to office in Iceland’s national elections—an accomplishment spurned, in no small way, by information contained in the Panama Papers leaks, which prompted the nation’s elected leader to resign his office.

Matt Goerzen is an artist and researcher interested in the political effects of anonymity, critical forms of trolling, security cultures, and memetic warfare.

In the two weeks straddling the election, Goerzen asked Johansen a series of questions about the mechanisms of transparency at work in this emerging political arena.

To read the Interview Click Here: Form versus Content in Enforced Transparency

Business Rocks 2016 Hackathon for the Homeless

Business Rocks 2016 has hosted a global hackathon in a bid to help solve the ever-growing problem of homelessness through technology.

From Manchester’s City Centre to the shores of the Mediterranean, homelessness isn’t just about rough sleepers and migrants fleeing war zones, it’s about the needed change in the hearts and minds of those in a position to use their skills to help solve the growing crisis.

The theme of the 2 day hack educated some of the sharpest and brightest minds about the dangers, challenges and needs of the vulnerable. A panel consisting of the homeless from Gary Neville’s Stock Exchange project, scientists, developers, technologists, social housing and experts on the current migrant crisis set the ‘tech for good’ challenge.

This was a project inspired by the homeless, for the homeless.

from the Business Rocks 2016 Homeless Hackathon web site (changed to past tense)

“The Hackathon was a collaboration between Business Rocks, TimeOverDistance and The Pirate Party of Norway. A multitude of other supporters made this happen, even a couple of banks chipped in. Worth mentioning is that hackers, hacktivists and social media activists made the world aware of this event.” – Nathan Newman of TimeOverDistance.com

Presenting the winners of the Business Rocks 2016 Hackathon for the Homeless:

Hackathon Crew, Limbo, students @ London School of Economics.

Hackathon Crew Limbo. Winners of the Business Rocks 2016 Hackathon for the Homeless

Hackathon Crew Limbo. Winners of the Business Rocks 2016 Hackathon for the Homeless

Crew Members: Emilie Maret, Hadil Dayri

Project Description:

LIMBO aims to bridge the gap between the state of homelessness and that of long-term employment by providing homeless individuals with the opportunity to work short-term missions that will reinforce their interpersonal skills, give them access to training or additional income, and make them appear more reliable in the eyes of their future employers. LIMBO will take the form of an app that matches people’s needs for spontaneous services and help, with the extensive skill sets of hidden homeless individuals. LIMBO is scalable, as it runs on a mutual incentive for end users to better allocate their time, and for workers to work towards reintegration.

Contact Information: ray@timeoverdistance.com

Introducing the other crews and their project offerings:

Hackathon Crew, SupportNet, students @ Birmingham University

SupportNet Crew

The SupportNet Crew

Crew Members: Arvid Kingl, Fillipo Bovo, Mason Cusack, Wendy Kong Wei Zhen, Marius Hente, Mohammed Ani, Riley Finch

Project Description:

Creating a one-stop shop for the homeless community to search for information about organisations dedicated to alleviate issues affecting the community. Organisations register themselves on the website and will be searchable on the web portal.


Contact Information: ray@timeoverdistance.com

Hackathon Crew, Postall

Hackathon Crew Posty

Crew Members: Mark Claydon, Wesley Hall

Project Description:

Without a fixed address it is impossible to get a bank account, without a bank account it is difficult to get a job, without a job it is hard to get a fixed address. Postall aims to help break this cycle by enabling organisations working with homeless people to automatically scan and sort mail for them, allowing access to it online and a foothold back into accommodation and work.

Contact Information: ray@timeoverdistance.com

Hackathon Crew, PlejiSoftware Engineers @ Apadmi

The Apadmi Crew

The Apadmi Crew

Crew Members: Gary Butcher, Tengiz Meskhi, Merrick Sapsford

Project Description:

Pleji is a crowd-source based solution for correcting the imbalance of supply and demand that all homeless-centric charities face. Using Pleji; charities are able to create effective donation campaigns, whether it be for material, services or finance. Pleji users are then able to pledge whatever they can to help the cause.

The full pitch keynote is available here: Keynote

Pleji Source Code on GitHub

Contact Information: ray@timeoverdistance.com

Hackathon Crew, Street Buddy

The StreetBuddy crew

The StreetBuddy crew

Crew Members: Ellie Hale, Andreas Georgiades, Aristos Michaelides, Allan Gray

Project Description:

Street Buddy is an app that helps normal people help people. It aims to connect the homeless with mentors; teams of volunteers who will form a peer support network around an individual and signpost them to crucial resources such as mental health and housing services – creating a national network of people who want to offer a holistic approach to tackling homelessness.

Mentors can volunteer as an individual and join a ‘Street Buddy Team’ in their area, or invite their friends/colleagues to form their own team. There will be a specialist ‘Street Buddy Plus’ for trained mentors that deal specifically with issues such as rehabilitation and mental health. Mentors can also offer training in particular skills, from financial management to carpentry, to help their buddy move forward in life. Homeless people can sign up to the system from organisations they already interact with, and can select volunteer buddies with the right skill sets to help them.

The application is a tool that provides community, communication, and resources for anybody that want’s to help!

StreetBuddy logo

StreetBuddy Logo


More information is available here:

Contact Information: ray@timeoverdistance.com

“Hacking is often thought of as a bad thing, but hacking means many different things. One of the ways of looking at it is taking something that works and putting it together in a different way. You have a problem, pick things apart and then come up with a solution. This Hackathon was just that. A start to hacking, or solving, some of the challenges faced by the homeless.” – Raymond Johansen, Pirate Party Activist and Anonymous Hacktivist