No products in the cart.


NEWSWEEK: Using Windows 10? Microsoft Is Watching

Written by Lauren Walker, 8/1/15,  this article is at NEWSWEEK’s online site, with lots of juicy embedded links to back it up nicely. Highly recommended Intel for the human world. I will place a few teaser paragraphs below. I would like to invite readers here to read the whole NEWSWEEK article and then meditate on the revelations from DJ of Level 9 News, which we covered in this article on July 15, 2015 —

Think the writing isn’t on the Wall already?


Windows 10_i


Using Windows 10? Microsoft Is Watching

by Lauren Walker on August 1, 2015

More than 14 million devices are already running Microsoft’s Windows 10 after its global launch on Wednesday, but it’s unclear how many of their users read the company’s Privacy Policy and Service Agreement before downloading. Tucked away in the 45 pages’ worth of terms and conditions (effective August 1) is a substantial power grab: The company is collecting data on much of what you do while using its new software.

From the moment an account is created, Microsoft begins watching. The company saves customers’ basic information—name, contact details, passwords, demographic data and credit card specifics —but it also digs a bit deeper.

Other information Microsoft saves includes Bing search queries and conversations with the new digital personal assistant Cortana; contents of private communications such as email; websites and apps visited (including features accessed and length of time used); and contents of private folders. Furthermore, “your typed and handwritten words are collected,” the Privacy Statement says, which many online observers liken to a keylogger. Microsoft says they collect the information “to provide you a personalized user dictionary, help you type and write on your device with better character recognition, and provide you with text suggestions as you type or write.”

End quoted teasers from article – it’s even more spellbinding than the above paragraphs, so do go catch this info and file it in your appropriate folder


Elias Alias, editor.


Elias Alias

Editor in Chief for Oath Keepers; Unemployed poet; Lover of Nature and Nature's beauty. Slave to all cats. Reading interests include study of hidden history, classical literature. Concerned Constitutional American. Honorably discharged USMC Viet Nam Veteran. Founder, TheMentalMilitia.Net



  1. OK users must be very careful regarding questions, conversations, and plans. You can bet the government will be watching! I would also recommend that OK leadership use encryption when communicating sensitive information between themselves.

    After all that OK has been involved with, you can bet we are being watched.

    1. dd823, I’ve been with Oath Keepers for over six years, with almost six years on the Board of Directors. In those six years I’ve never heard of any “sensitive” information being discussed at national leadership level which would need to be hidden. Your comment implies subtly that Oath Keepers have something to hide, and that is just not the case, Bro. All we’re talking about is the U.S. Constitution and how we can better learn to serve that document, thereby honoring our Oath to it. There is nothing at all illegal or unlawful about that.
      Having said that, I’ll qualify it a bit in your favor. There are trolls and infiltrators who pay dues so they can gain access to our organization for their own purposes. A classic example of that is the SPLC, who somehow sees us as an extremist organization. Should we encrypt our discussions just to keep prying eyes of that NGO from knowing what we’re up to? Not really, but it could be an advantage if we encrypted some of our discussions because that would surely drive the SPLC wild, lol.
      But bottom line, Oath Keepers has nothing to hide.
      Thanks for reading here, and for leaving your comment.
      Elias Alias, editor

      1. Encryption is merely the equivalent of an envelope in which you enclose your letter. It should be a routine, all the time occurrence. It’s not a matter of hiding anything, it’s just a common practice, as common as mailing a letter.

    2. Always copy and paste the terms and conditions and put them in a word document and then search on different criteria and you will see what they are hiding. Example search on $ and you will see if they have automatic charges that they will charge your account.

  2. dd823 is correct.

    Can you break this:


    Contact Go to contact. Request a copy of Unit Secure Systems

  3. Are you telling me that OK leadership does not talk about how and when we would respond to “Orders we will not obey” then why are we forming CPTs? I hope somebody has a plan!

    1. You really need to come to terms with the fact that anything Oath Keepers discusses, any “plans” we make, are perfectly legal and lawful, and we do not need to hide our conversations, discussions, or planning sessions. Oath Keepers has one of the greatest “plans” you’ll ever encounter, and our plan is powerful and effective. The beauty in it is that we do not have to hide it, do not need to encrypt it, but instead are free to openly pursue our goal of helping all police and military to understand the values in the Oath they swore. The plan is to educate people about the Constitution. Why on earth would we need to be secretive about that? Regardless of what the damned Federal government thinks, this is still America. It would be shameful to hide our loyalty to the Constitution which created that government.
      Elias Alias, editor

  4. I hate Windows, and use it only to run my sound lab. So, those of you that don’t want to open yourselves to all the pitfalls of microsoft, go out and grab one of the freebies running the Linux core, such as Ubuntu, Kubuntu, openSUSE or many others. These systems are secure, and you don’t need the other junk installed to keep from getting viruses and so forth. I’ve been running various linux OSs for years and never had much trouble: they will do virtually anything Windows does, actually much more, and you don’t need to pay microsoft for the “privilege”. Also, if you must run windows, that can be done in a virtual machine under linux, which removes the possibility of microsoft intervention. See, I don’t much like having microsoft telling me what I can and can’t do,.

  5. Uhh, in case none of you noticed. Windows is doing nothing more than they were doing as well as another giant search provider and many other software companies. It is why there is so much hype about the loss of personal information. Best thing, lock down your computer and do not use the internet to do business if it is that worry-sum to you. I read and buy, nothing more. Then again, like Elias said, I have nothing to hide either. Been in the IT business for over 35 years and even did it for the military for 6 of those years. Point being is I do not trust my most important info on the net. Neither should anyone else. Seriously, you can encrypt every last packet of info that goes in and out of your router.

    1. Its the same as Windows 8, except now they installed spyware to monitor everything you do and say – they can turn on your cam and mic and listen to and watch you. They can even track where you go and whom you are associating with and more……………..

  6. If you encrypt, they can crack it. If you use an onion router like TOR, they have a honey pot to collect all info. Your best bet is to be as unassuming as possible. Use Linux and try not to draw attention. The more secure you try to be, the more attention you draw to yourself.

    1. That is NOT a true statement son, the government has the key to decrypt all encryption programs made and used in the USA. It is mandatory, because they are afraid that someone is going to develop something that they cant crack and then they will cry because they cannot learn your secrets. Beside Microsoft is in bed with the government and they have installed technologies that you wouldn’t understand that allows them to get into your computer regardless of the encryption. So encrypting or decrypting data doesn’t matter.

    2. You would love the newest “surfing tool” (new to me anyway). It’s called TAILS, and runs off a dvd or thumbdrive. Creates a virtual drive so that NO PART of your computer is open to anything. Everything is being done ‘inside the memory’ and leaves ‘notta’ everytime. Email is encrypted then routed through TOR. The browser setup is not unlike TOR, yet much more complex and “hair-tearing-mad” exchanges that work to keep your privacy private. Also, using the Knoppix 7.5 ‘live dvd’ (with over 2,000 programs on it), does about the same thing (everything remains in memory, no traces are left after a session). Perhaps I am paranoid, but I would NOT trust TOR using a Windows environment/OS. No No No!
      You can use proxies (free or paid for VPNs – Steganos has NEVER been cracked …by anyone). True or False (I wonder). I used their latest VPNs for a few months. No complaints (but their tech support just plain sucks).

  7. Its better to go with Apple or MAC if you want privacy. If you need something else then its better to wipe the OS from the computer and install either UNIX or Linux OS and then lock it down with security tools. Windows is for people that do not understand computers – its idiot proof for most

  8. You got to remember something – when you turn on automatic updates – Microsoft downloads tons of software to make sure that they control your computer – that is why there are so many patch updates. Every time they release a new patch it comes with malware (viruses, worms, trojans, etc…), malicious code, etc… they got to make you think that third world hackers are hacking your computer so they can sell you security software (fireall, IDS/IPS, anti virus, spam ware etc….) its a money maker for Microsoft and other companies like them. Its all a scam to make you beleive that they are security experts and that they are providing you with a services that you really dont need.

Comments are closed.