This page is an effort to maintain an updated collection of important work on privacy. Recommend stuff from this page? Link to us!
100K 275K 300K 350K views
- 1 Calendar
- 2 News
- 3 Tools help
- 3.1 secure hardware elements
- 3.2 operating systems
- 3.3 censorship resistance
- 3.4 anonymous browsing
- 3.5 browsers
- 3.6 browser tools
- 3.7 testing for problems
- 3.8 facial recognition
- 3.9 chat
- 3.10 other tools
- 3.11 Other Sites with Tools for Protecting Your Digital Rights
- 3.12 Tools for Making Consent to Privacy Policies More Informed
- 4 Why care about privacy?
- 5 Anonymity
- 6 Giving up privacy
- 7 How universities can help
- 8 Videos
- 9 Miscellaneous
Events in this calendar are to privacy-related events. Click an event for more details, and links.
- Wide-area Persistent Surveillance in Baltimore ruled unconstitutional - Continues the ongoing history not just in Baltimore, but around the country. Search "persistent" on this page. NEW
- Internet Archive is 25 years old today! - A wonderful public service, worthy of a birthday present NEW
- Leak shows NSO group's mobile device infection and exfiltration tools are used globally to spy on and harm journalists, judges, political opponents - 50,000 phones were revealed to have been attacked, but any phone with iOS and Android is vulnerable, including those kept updated.NEW
- "Chatcontrol" in the EU breaks messenger protections to search for child abuse content - In the EU privacy is a derogable right; this is a derogation. Too broad, as it scans everybody; and too narrow, as there are plenty of messengers that cannot be broken in this way.NEW
- State challenge to Census's privacy protections rejected - A federal court has rejected Alabama's challenge to the Census's use of Differentially Private mitigation techniques to protect its released data.
- Reality Winner released from prison - Winner was charged for revealing the US government's conclusion that Russia had attempted to interfere in the 2016 presidential election. The role of the public interest in truthful revelations by whistleblowers is at the heart of recent controversy over an unprecedented increase in use of the Espionage Act against them.
- Colorado passes a new privacy law, similar to California and Virginia's - The link has the state of play in other states.
- Big brother awards for 2021
- Several DoD agencies appear to be purchasing commercial data that they cannot otherwise obtain on Americans - This letter is a follow-up letter by Wyden; it implies something interesting in the five responses to his original letter that he was not allowed to share with the public. DNI Avril Haines's confirmation hearing back in January included this exchange @01:37:30:
WYDEN: "Would you agree to inform Americans about any circumstances in which the Intelligence Community purchases their data, and the legal basis for doing it?"
HAINES: "...I would try to publicize essentially a framework that helps people understand the circumstances under which we do that, and the legal basis that we do that under."
Wyden's activities since the hearing reflect that Haines's answer to the question about transparency in this area was basically "no." It is unclear whether the framework Haines mentions is in the 2021 SIGINT annex to the DoD Manual S-5240.01-A, since that document is redacted.
- Uber tracked taxi drivers who went to protests, and fired them
- Remote code execution vulnerability found in Zoom - Affects the app, not web-based access. Zoom is considered harmful.
- Google apps' data collection is embarrassing to them - Quietly collecting this much on users' every move works better than doing so openly, so they fought Apple's demand for transparency.
- Signal blocked at the ISP level by Iran - Centralization is a design weakness, and Signal defends its centralization aggressively. Consider Briar, deltachat, or Matrix chat (which combines many services) instead.
- University of Arizona Privacy Statement page is rife with trackers - Report a concern here
- AZ Supreme Ct. rules Internet users have no reasonable expectation of privacy for the information available to their ISPs - No warrant required means the risk to privacy for ordinary, innocent people increases. Fitting a pattern, a case about child exploitation is leveraged for wide impact. See tips below on using Tor or VPNs to secure your information from your ISP.
- 4th Circuit Ct of Appeals to take up challenge to use of Military Wide-Area Persistent Surveillance technology in Baltimore - Increasing use of WAPS is mentioned below multiple times; this is part of a history.
- WhatsApp pulls a switcheroo - Facebook (owner of WhatsApp) now gets your phone number, among other things.
- Police Departments around Tucson now do have agreements with Ring - See below for earlier news on this. An up to date record of police requests for video from private users of Ring doorbells here
- Apple's official guide to avoiding abuse of iOS features - Addresses problems of stalking, IPV, and other cases where personal safety is at risk.
- Mozilla argues against antitrust Google case - Not mentioned, but by now well-known: Mozilla gets the lion's share of its funding from an arrangement to have Google as the default search engine in Firefox.
- Key protecting Intel microcode extracted - These guys used their Intel Management Engine exploit to do it, which is mentioned below from a few years back (they presented it at Blackhat 2017).
- "Justice Department Sues Monopolist Google For Violating Antitrust Laws: Department Files Complaint Against Google to Restore Competition in Search and Search Advertising Markets" - That's the title. New issues compared to the FTC's look back in 2013, which involved five Attorneys General disjoint from the eleven cited by DoJ.
- GPG has an important update - Affects versions found in most package managers.
- EARN IT Act passed Senate, introduced into the House - EARN IT attempts to weaken encryption for US companies who want liability protection under 230; opens politicians who opposite it to the charge they're on the side of child predators. A similar bill, the Lawful Access to Encrypted Data Act, is more honest.
- Internet archive sued - Publishers sue during the pandemic to shut down an organization that tried to help. Thanks a lot, guys!
- Military aerial surveillance technology deployed in Baltimore - High resolution, persistent capture of images of large areas of a city. Developed for use in Fallujah, brought to Dayton, OH and Baltimore, MD pbs coverage, Radiolab on the first time this happened, PSS, a company doing WAPS
- List of third parties with which Paypal shares payment information - Used to be around 600 names; I haven't counted the updated numbers
- Transparency report about records collected under 702 has been released
- Facebook makes suckers lists easy - FB allows targeting based on interest in "pseudoscience," is called out on it, and takes it down, completing a cycle that has repeated many times before (see: targeting "jew hater").
Police Departments around Tucson appear not to have agreements with Ring- See above
- 77 day extension passed for the USA FREEDOM Reauthorization Act kicks the can to May 31st.
- Recent dust-up over FBI access to databases of records collected under 702.
- Wireguard to be included in the next Linux kernel
- Private Internet Access (PIA) is now owned by a company with questionable past - The company, formerly called Crossrider, was responsible for scads of adware.
- Startpage.com is now owned by an advertising company - Tough to trust them in the future. Consider search.disroot.org
- The trouble with Cloudflare. Blocks Tor, blocks bots (even good ones), MiTMs connections and can break TLS. Unknown history with DHS following overtures to Cloudflare's previous incarnation, Project Honeypot.
- OSTIF will audit Unbound DNS
- HTTPS interception -- Around 15% of HTTP connections over TLS are being intercepted, according to the traffic sample (about 10%) visible from Cloudflare. Maybe the green lock should turn orange-ish?
- Mark Zuckerberg's "Privacy-Focused Vision" -- "Privacy gives people the freedom to be themselves and connect more naturally, which is why we build social networks." FB was built not for your freedom, but to make money selling ads. Confidential messaging makes you feel safe, but all of FB's bad privacy practices are made more effective by that feeling, not less.
- Breach of Amadeus affecting millions of airline travelers.
- Londoners on the perpetual line-up -- Being "in public" seems to have an evolving meaning. See also the US.
- Report on the mistakes leading to the Equifax breach of 148 M records -- From the House Committee on Oversight and Government Reform. Makes you wonder if banks (and others) might compete on being less profligate "furnishers" to CRA's---maybe discriminating among CRAs by their security and privacy practices (Equifax got 0 out of 10 for these from the financial index provider MSCI here). I'd prefer a bank that did that.
- AI Now Institute issues an "urgent warning" about privacy threats from AI. -- The article and warning are problematic, but there is this bright spot from the news article on it: "'artificial intelligence' — an umbrella term that includes a myriad of both scientific attempts to simulate human judgment and marketing nonsense"
- McSweeney's End of Trust issue is available free from the EFF (but do support them for creating this great work)!
- Tim Berners-Lee's Solid project is maturing; there is now a start-up (Inrupt) developing it
- Google's deceptive location tracking under investigation by the AG in Arizona.
- California joins Illinois as among the most privacy-protective states in the US.
- IEEE is also against exceptional access
- Big privacy win in Carpenter v. U.S.
- James Clapper and James Comey make appearances to promote their books. Jim Comey is on Conan, James Clapper is on 1A on NPR (44:10 is funny), and All Things Considered on NPR.
- Spate of leaks: Grindr (which, with OPM breach, could lead to blackmail of government employees, not unlike Ashley Madison); Panera Bread; Facebook; Myfitnesspal. Consider giving an alias rather than a real name to services online (which is perfectly legal, as long as you don't use it for fraud), spamgourmet.com for addresses, privacy.com for credit cards
- Privacy fundraiser underway where DuckDuckGo will match donations!
- Mixpanel analytics, present on a zillion sites, takes in passwords on some of them
- Carpenter v. US, a SCOTUS case in which the government is arguing that owning a cell phone means your physical movements can be tracked, is now underway.
- Extent of AT&T is greater than expected (billions of emails, all communications at the UN headquarters, 1.1 billion domestic call records per day, etc.). This is all from further study of the Snowden revelations, it looks like.
- European court of human rights to rule on UK surveillance. -- Includes claim that only "sentient examination" of data violates privacy. See the NSA on 'collection' for a similar argument.
- Arbitrary code execution on the Intel Management Engine, probably! (talk is upcoming)
- DoJ says it wants to take tougher measures with technology companies whose encryption is not backdoored -- The measures they plan to take are not specified. Negotiation hasn't worked, they say.
- DHS plans to collect social media info on all immigrants, including naturalized citizens and green-card holders
- ISO rejects NSA crypto.
- Equifax loses trove of highly sensitive data
- CIA head Mike Pompeo wants bulk metadata collection back
- Germany considering fingerprinting children and spying on personal messages.
- GnuPG is running a fundraising drive. Give them a little money; their product helps people all over the world!
- US ISPs can now sell data that their subscribers send across their lines. Oh well; we should buy the records of our members of congress to thank them
- Lavabit returns. How does it compare to protonmail, or mailpile? Let me know; I haven't looked into it.
- All US visitors from Muslim majority countries soon may have to give up social media passwords to enter Given rapidly eroding rights at the border, everyone should see what you can do at the link in this section below
- WhatsApp has an in-effect-backdoor by default. The justification for failing to provide security by default is that "otherwise people might not use it," ignoring that run-of-the-mill users of WhatsApp might falsely believe that promises of end-to-end encryption for their messages means that those messages cannot be intercepted.
- Google and government, via the Google Transparency Project. Google lobbies to influence policy to reduce consumer privacy. This article also discusses the NSA-Google relationship.
- Riseup warrant canary expires, Riseup is alerted, but the canary is not updated.
- FBI now can compromise computers outside the jurisdiction of the court issuing the warrant, including overseas.
- Trump pick for CIA head, Mike Pompeo, says in the Wall Street Journal that "the use of strong encryption in personal communications may itself be a red flag" that a person is a terrorist.
- Extreme surevillance via "Snooper's Charter" is now law in the UK. Among other things, requires internet providers to log websites that their customers connect to.
- FCC requires customer opt-in for ISPs to share "sensitive data", opt-out for "other" data. Previously there was no regulation)
- be wary of dictionary sites (dictionary.com, merriam-webster.com). They have high concentrations of trackers -- Part of the "What they Know" coverage in the Wall Street Journal.
- Tucson Police Department has a "Freedom on the Move" Camera, uses it to monitor anti-islamophobia protest on U. Arizona campus (By Tucson-based Strongwatch)
- James Comey tapes his laptop camera, thus creating a "warrant-proof camera."
- Head of FTC won't use fitbit b/c of privacy worries
- Cybersecurity Sharing Act added at the last minute to a 2K page omnibus spending bill
- police and drone use in Baltimore
- U.N. Report on Encryption as a right. "... [T]he present report examines two linked questions. First, do the rights to privacy and freedom of opinion and expression protect secure online communication, specifically by encryption or anonymity? And, second, assuming an affirmative answer, to what extent may Governments, in accordance with human rights law, impose restrictions on encryption and anonymity?"
- CMU study supports that Google cannot police abuse of its ad system, resulting in violation of privacy
- CEO of Hacking Team interviewed on BusinessInsider
People often tell me they are unsure about which privacy-enhancing technologies to use, and how to set them up. Here are some suggestions.
secure hardware elements
- Qubes ...OK, not an OS... (also here is a brief description of getting wireless networking working)
- OpenBSD - Great documentation, elegant base system, fast response to security bugs. Great for firewalls , for example, but also more and more suitable for general use.
- the machine-id is a more stable identifier than other things that could be used as stable identifiers. There are other ways to identify a machine, of course, but this one is stable and easy to get in a variety of ways. Resetting it is no big deal, though (and can be done without the "unpredictable consequences" mentioned without explanation in the link)! Follow these instructions. Devuan, a systemd-free fork of Debian, patched this. The instructions here assume systemd).
- Psiphon - I don't know how good this is yet. Here's a contributor talking about it at a previous CCC.
- Lantern - I don't know how good this is yet
- Tor (see below)
- Mullvad VPN -- A good vpn. Update: they've been audited by Cure53, with good results.
- OpenVPN's latest version was audited, which helps with trustworthiness -- If you run your own VPN (which is easy), this is a good reason to make sure you're using 2.4.2 or better (I had to compile from source, as the packages aren't up to date).
- Set up an alias, with associated accounts. This is perfectly legal as long as you don't use it for fraud, as Julia Angwin notes in her article for Consumer Reports.
- Tor -- I suggest subscribing to the RSS feed of the blog of the Tor project to be sure you stay up to date.
The hardened version of Tor has been discontinued; the Tor project recommends moving to the sandboxed version for increased security.As of Tor 8.0, the sandboxed Tor is no longer a separate thing; download the experimental version (>8.0) to get the benefits.
- Also who uses Tor?
- Tor Browser for everyday Use a second installation of the Tor Browser for everyday browsing without connecting to tor. Very actively maintained (better than regular FF); works great. Why do this? A big reason is TB has much, much better fingerprinting protection.
- Related: Tor is one of the few browsers to block the prolongation attack that allows tracking using TLS. Test it here, (check under "Protocol Details" to see if "Sessions tickets" is yes.)
- A fun and useful thing to do is build your own browser to scratch your own itch. For example, if you don't like some CAs after the DarkMatter fiasco, you might rip them out (just saying). It's unfortunately kind of annoying to figure out how to do it, but fortunately I've already done that: see here.
- Changing search providers in Firefox and Tor Browser without 'search addons" etc. is an indefensible PITA. Here's how to do it: if you have rid yourself of the cruft that is the separate search bar to the right of the address bar---as all people of sound mind and good will have done---then temporarily add it in using the 'Customize...' option (right-click on an empty area to the right of the tabs to see 'Customize...', drag the search bar next to the address bar). Now go to a search engine site---currently I like searx, one instance is searx.me---, and click the magnifying glass icon with the green plus, then click "add 'searx.me'). Now go to your preferences (Edit->preferences, or Alt-E, N if you don't have a menu bar) and set your default search provider to the new one you added. Finally do the customize rigamaroll again, but drag the superfluous search bar off. Wasn't that easy?!
- Why not Chrome/Chromium? -- It does have a sandbox, but it is also the most privacy invasive browser (of the major ones). Also Google controls the extensions for it, and they are sometimes unjust.
these all work with Tor Browser, Icecat, or (vanilla) Firefox.
- Firefox extension spoofing Google's FLoC! - FLoC's cohort IDs can be correlated to identify users. Rather than having server operators send an opt-out header, do your part as a user and send a random ID! (Note: Requires resetting the User-Agent to Chromium). NEW
- Try blackhole-ing tracking domains with this handy list, formatted for ready inclusion in your /etc/hosts file from the trackers listed in the Exodus ETIP (shoutout to the Yale Privacy Project contributions). Now visit a site and watch the 0B transfers flow.
- Random Agent Spoofer (blocks a variety of fingerprinting attacks)
- RequestPolicy (By Justin Samuel and Beichuan Zhang, of University of Arizona!)
- PrivacyBadger (EFF)
- Self-Destructing Cookies
- HTTPS Everywhere (EFF)
- BetterPrivacy (removes LSO's -- supercookies -- which survive normal cleaning of cookie cache)
- decentraleyes - runs CDN scripts locally, rather than using remote CDNs (which is trackable)
- Privacy Settings (the plugin) -- Gives quick access to useful privacy settings in the browser, with toggle switches.
- Update Scanner -- Useful for watching privacy policies for changes (since that is your obligation, as a continuing user of the site. Often such changes are not highlighted; only a new version is posted).
testing for problems
- Check whether you have "safe browsing" features turned on. -- Firefox sends 32-bit prefix hashes of your URL to Google as a "safety" measure. I don't recommend using this (and related) features, since the problem with Google is bigger than the security one this mechanism is trying to solve. So if you get a warning visiting this page, investigate how to turn off "safe browsing" features here.
- new fingerprint checker, targeting Tor users in particular
- new fingerprinting technique Uses AudioContext and getClientRects. Recommended defense is NoScript.
- dns leak test -- Test whether you're leaking DNS information while on your VPN, and fix it
- Fawkes - Change your pictures imperceptibly to foil facial recognition. NEW
- Facial Weaponization Suite - More privacy protest than technical countermeasure. "Collective masks" from aggregated face data of participants in workshops.
- Hyperface Much like Glamouflage, designed to drive up false alarms in facial recognition. Update:
available in August.Delayed, with no deadline given
- Reflectacles try to ignore the goofy promo. video :-)
- Privacy Visor - Can be purchased by emailing this address at Nissey Co., Ltd.
- CV Dazzle
- Russian artists are still trying to use this. Does not work on human cops, who arrest them.
- Matrix combines a zillion services into one - Not just more private, but more convenient. IRC, Slack, Signal, SMS, WhatsApp, Mastodon, Twitter, Discord, Tox, iMessage, and many more. Contact me if you'd like to use my instance, which supports many bridges.
- OTR is not a great idea - OTR became well known after a few high-profile uses, but nowadays it's not a great idea. Biggest problem is forward secrecy, especially since quantum computing is not a question of if, but when. I disagree with one of the article's alternatives, Signal, since it's centralized and coerce-able, but some OMEMO implementations are OK (more on that soon).
- Standard SKS servers for PGP keys are broken, use Hagrid servers instead - A good one to use to keep your keys up to date (see parcimonie, below) is keys.openpgp.org.
- Security freeze for great good -- Prevent not just identity theft, but resale of your data by the Credit Reporting Agencies with a security freeze.
- Keep your PGP keys up to date, privately -- Parcimonie updates your keyring over tor (catching revocations and expirations), at random intervals. It leaves open a connection to tor for a long time, so you may want to run it as a cron job and kill it after some interval.
- anonymize scanned printouts from printers using tracking dots. From TUD, where lots of useful privacy tools have been created (kudos)
- Protecting against baseband firmware backdoors, and provider backdoors-- A little outdated, but still full of good stuff. This is a comprehensive approach; for specific tools see below. EDIT: RIP Copperhead OS.
- Silence SMS/MMS. Recommended -- Mark Zuckerberg says: "many people use Messenger on Android to send and receive SMS texts. Those texts can't be end-to-end encrypted because the SMS protocol is not encrypted." Well, I guess I wouldn't expect much understanding of privacy tech from Mr. Zuckerberg.
- Noise is just like Signal, but without the hard dependency on Google Play Store. It is therefore better! But Silence is better still...
- Get an RSS feed reader to keep up to date on privacy-related sites. For example *cough* subscribe to the PrivacyGroup's feed (It's good to use a secure RSS reader. For mobile there is Courier from The Guardian Project).
- Youtube-dl -- Downloads a variety of streaming formats -- not just for youtube! Can be used with torify (see below) to anonymously view streaming video/audio that otherwise compromises privacy (e.g., flash). Note the version in packages is often not up to date--install the latest with pip to get a version that actually works.
- Torify -- A SOCKS proxy to the Tor network, and a wrapper to use it, so you can e.g. look up GPG keys, or perform WHOIS queries, anonymously.
- Get a GPG key
- installing the latest GPG
- Get a Gnuk token! -- Good way to do encryption in a protected dedicated device. You can buy them, or build them yourself
- secure SSH
- Using gpg-agent instead of ssh-agent
Other Sites with Tools for Protecting Your Digital Rights
- Blog post on maintaining your privacy at the border.
- you broke the internet, we'll build a gnu one
- EPIC privacy-related tools
- Surveillance Self Defense (EFF)
Opt out of datasharing by Whatsapp before the deadline!All new users of WhatsApp are automatically sharing much more. FB announced that around now (May 2021) it will share even more personal data than before. Almost any other messenger is a better choice.NEW
- Tactical Technology Collective -- Toolkits and guides for digital security and privacy. Includes guides for Human Rights defenders. Security-in-a-box toolkit has a few inclusions that could be improved, including unhardened Tor, and Firefox rather than Icecat.
- Access Now Defending and extending digital rights of at risk users around the world.
Tools for Making Consent to Privacy Policies More Informed
Why care about privacy?
- Little talk on privacy that David gave to a class here at the University of Arizona
- 5 min recorded presentation David gave to local businesses on why they should care about privacy
- DoNotTrack documentary
- Why privacy matters
- Maciej Ceglowski's excellent talk
- it could happen to you, congress
- MLK Jr. and the history of bulk surveillance of people of color
- a few other reasons to care about privacy
- Talk on Loopix, predecessor to Katzenpost
- Guest lecture David gave on anonymity at The University of Arizona
Giving up privacy
- We must have been wrong about Google and Facebook all along -- On all the privacy-related organizations that accept support from companies whose business model relies on surveillance.
- Americans say they want privacy, but act as if they don't
- The End of Privacy on NPR
- Atlantic article on an Arizona man whose anti-privacy views lead him to share everything, including passwords to email, banks, etc.
- Ai Weiwei, Privacy, and the future of surveillance
- Article in Science, 'Privacy and Human Behavior in the Information Age' -- By Laura Brandimarte, of U. Arizona (et al)! Reviews of multiple topics in privacy including (esp. relevant to this section) why people who profess to care about privacy nevertheless act as though they don't (the "privacy paradox").
How universities can help
- Don't break Tor and tell the FBI before telling the Tor project
- boingboing on online privacy and libraries
- NSF "Dear Collegue" letter on privacy-related research
- Tor exit nodes list. Note the universities hosting! (MIT, UMich, BU, ...)
- Edward Snowden talks to Glenn Greenwald about privacy in the age of COVID-19
- Older video of Mike Rogers, then-Chairman of the House Permanent Select Committee on Intelligence, explaining that if you don't know your privacy was violated, it wasn't.
- Soghoian (erstwhile technologist at the ACLU) on the privacy implications of endpoint hacking
- Social media information given at the border accessible via very insecure PSN -- Video from latest CCC shows the terrible security of airline travel information. In the QA (but the whole video is very interesting) it is said that social media information gathered at the border for travellers to the US on visitor visas is linked to PSNs, which are horribly insecure. UPDATE (16 Jan.) -- A big breach at Amadeus.
- A series of privacy talks recently ended at The University of Arizona. UPDATE: you may need to download the files and play them locally, if your browser complains about playing them. Cached copies of
- Snowden talked in a startpage.com-hosted interview in the Netherlands about privacy after the election of Trump in the U.S.; his pardon Mirrored here locally, so you can jump around the video (originally live-broadcast)
- Edward Snowden came to the UA to talk privacy with Glen Greenwald and Noam Chomsky. I mirrored the video, originally available only via flash. This is audio only.
- Edward Snowden discusses removing mounted microphones and cameras from cellphones, excesses of U.S. intelligence
- Two Arizonan lawyers' role in the history of spam
- A thorough, well-executed study of web tracking (updated monthly?). Worth a look.
- Electronic Frontier Foundation's list of printers that produce tracking dots
- Privacy Bibliography
- A review of the off-Broadway play 'Privacy', with Daniel Radcliffe
- Several years on, Edward Snowden takes stock in an interview with Der Spiegel
Privacy theme music!
- MF DOOM, the subtle and obscure, has died - From Metaphorical Villainy: "'Villain' represents that anybody can wear the mask---could be male, female, any race/so-called race ... it's about where you're coming from, from your heart. What is your message; what have you got to say? That's mainly why I chose to bring the mask into the fold." (a stranger, who speaks to you in vocals)
- aNONradio - Lots of variety, brought to you by Super Dimension Fortress.
- Wireless fantasy - Ussachevsky
- Headhunter - Front 242 - (Not egghunter)
- More Data - Negativland - Negativland!
- Inspection (Check One) Calling the meek and the humble. Inspection!
- Mejores Dias (Better Days) Stego used to encourage hostages of FARC. "Escucha este mensaje, hermano." Followed by "19 people rescued. You are next. Cheer up" in Morse code (1:29 - 1:52)
- A recent edition of Under Surveillance! Great radio show - New script is available too if you want to get it yourself NEW (11 June)
- Octopus's Garden (Raffi version)
- Somebody's Watching me (Rockwell)
- 3:7:8 (Emergency Broadcast Network, or EBN)