Skip to content

Time to restart the blog

December 7, 2010

This blog has been on hiatus after the completion of April 2010’s MAX AXIOM REPORT. At the time WikiLeaks had recently released the Collateral Murder video, and the REPORT covered the “CyberShockwave,” a media stunt which aired on CNN and was funded by the Bi-Partisan Police Center. For background information into internet security and privacy, watch the first MAX AXIOM REPORT.

It would seem that I was preparing for what would become the most important story of 2010. I have been following the news closely but have refrained from blogging as I pursue other projects. However, WikiLeaks, and its latest publication of documents dubbed “Cablegate,” has become the hottest topic on the planet. Julian Assange has been demonized while lamestream pundits from the establishment equate WikiLeaks with terrorism. Comically, he has been called a traitor and accused of treason, even though he is not a citizen of America. The media has cooperated with an organized smear campaign which saw consensual sex rephrased as “rape,” even though the charge appears, even more comically, to be sex without a condom, or “Sex by surprise” as they call it in Sweden.

There appears to be two camps forming – a small camp of special interest establishment types who denounce Assange and WikiLeaks, and a larger camp of quasi-revolutionaries who revel in the revelations brought forth by WikiLeaks. I, however, feel uncomfortable in either camp as I have a skeptical eye on WikiLeaks due to the unprecedented attention the media is paying to these relatively innocuous documents. WikiLeaks is not the first media organization to possess classified documents of international importance, but typically the mainstream is intent on quashing controversies. In this case, the government and media got ahead of the story and and began to promote it prior to the release. I am suspicious that this revolution is being stage managed by the establishment, and the momentum of the movement is calculated to enhance establishment priorities.

I am reluctant to worship Assange or defend him reflexively, however, check  out this website which compares Julian Assange to the transgressions revealed by WikiLeaks


The Max Axiom Report

April 26, 2010

The Max Axiom Report is a quick take on internet and cybersecurity news with a critical eye on privacy and liberty issues.

The Max Axiom Report to be released April 12

March 6, 2010

The writing you see on Axiom Today represents the research and notes for my upcoming video series: The Max Axiom Report, to be released April 12. The Max Axiom Report will be be a vehicle to inform the public of the important issues of internet news such as cybersecurity, neutrality, censorship, bias, and privacy.

The Max Axiom Report will cover the topics I have researched in this blog.

  • Australian Internet Blacklist
  • Iceland Information Haven
  • Microsoft V Cryptome
  • School laptops spy on students
  • Feature: “Cyber ShockWave’ and the Rockefeller Cybersecurity bill

…As well as your letters, so send them in to

I Am Not Ashamed Ezekiel 25:17 is my favourite bible verse

March 4, 2010

A new Christian campaign has become the object of parody at the hands of Max Axiom with this piece that mostly speaks for itself. I have decided to contribute to “be a part of the world’s first video bible!” launched this week to the sphere of social networking and is a well integrated Facebook, Twitter and YouTube implementation, hence I heard about it. “Answers in Genesis” created the campaign which aims to “call people back to the absolute truth of the Bible and teach them that the Bible has the answers for life’s ultimate questions,” the website quotes Answers in Genesis President Ken Ham.  Answers in Genesis is Kentucky-based salvation ministry with one hell of a good graphic designer and marketing manager. Really good webdesign that excellently communicates to  youth. Construction-sign grunge and dynamic interactive multimedia. Ham, from Australia, has started a nice little empire, including the infamous Creation Museum.

Ham declares in the liner-notes to his “State of the Union” speech, “Some Christians even accept the myth that the U.S. Constitution declares that there should be a separation of church and state. They are hesitant to inject Christian beliefs into politics.”

Answers Worldwide says, “AiG is the largest apologetics organization in the world and is poised to challenge evolution on every continent and in every language.”

Welcome to the new face, or a new face, in the world of Christian dominionism.  Answers in Genesis is pure marketing for political shepherding. Apologetics is an ironic name for a group that is “not ashamed”.

Max Axiom’s “Freedom!”

March 4, 2010

MAX AXIOM – FREEDOM Ft. William Wallace and George W. Bush

This is Track 3 on my album featuring a collection of video clips I collected on YouTube.  This compresses a lot of memories and experiences into a single project. This video is essentially five years in the making insomuch that I wished to be able, five years ago, to do this, and now, with practice and the right amount of effort, I finally have. It is not exactly a timely video analysis of the political situation, but it is true to the goals that inspired me. Make music that I could make compilation videos to. I started this editing project today. I downloaded about 40 different clips from so many sources such as Fahrenheit 9/11, Power of Nightmares, Military compilation videos, a propaganda campaign from 2002 called “Remember Freedom“, and  and of course, Braveheart. It took me about 11 hours straight to download all the clips and create this compilation. Well, 11 hours, and five years of imagining that I could do something like this. Now it’s done and it’s time to move on.

4 Videos of “Cyber ShockWave” Talking Points

March 1, 2010

Axiom Today predicted that Cyber ShockWave would be mind games, not war games, and indeed it was. I’m now preparing an analysis of the broadcast but for the sake of time I will release these four videos now which I grabbed from YouTube and edited in to digestible soundbyte clips. Please distribute freely.

Part I. Authority for Crisis

Part II. Actors of War

Part III. Federalized Toolkit

Part IV. Is The Public Scared?

6 Lessons From Microsoft v Cryptome

February 27, 2010

Yesterday I had a muted response to the contents of Microsoft Global Criminal Compliance Handbook, the leaked document at the centre of this week’s 24-hour shutdown of The fact that the documents were censored, albeit ineffectively, has made them more notorious than they rightly deserve. The documents stated the predictable capabilities of system administrators and explained how law enforcement can utilize this data when required by subpoena, court order, or warrant. They did not reveal that they provide government with carte blanche access, although it is troubling to see that there is a back-end administrative system built specifically for law enforcement considering there are reasons to suspect the requirements of law will not always be met. I am sure I am not alone with my concern that there could be constant “snooping” by individuals who are not legally authorized, or that legal authorization can come too readily, and that a victim would never know.

We can put that aside, for now, because vague concern is not necessary for this story. Instead we can look at the lessons from this particular case, which is not a story about a document; it is a story about abuse of power and the fight for Internet freedom.

John Young started in 1996 to “publish documents the government doesn’t want published — that’s its only purpose,” he told The Alex Jones Show on Friday. He reported Cryptome has collected about 54,000 files. “They’re all based on [the idea of] reducing the amount of secrecy by government and, through government, the secrecy of corporations who do work with government.” Hence in 2008 they posted the “Microsoft Spy guide” which they hosted for more than a year before the hammer dropped on them this week and Microsoft brought a suit against Network Solutions,.

The things I have gleaned from this case, of which each will require further investigation, are as follows.

1. Microsoft abused Digital Millennium Copyright Act, and isn’t alone in this practice

The Digital Millennium Copyright Act (2000) was used by Microsoft as a “bluff” to coerce Cryptome into taking it down. The fact they immediately backed down shows they had no authority to use DMCA. It was just a tactic, and, in this case, it failed. But the attempt is quite revealing. By using DMCA commercial firms can confront internet service providers with threat of law suit. “All they need to do is send an e-mail,” Young said. “I was hoping they would take me to court,” he told Jones. Individuals who lack this sort of intestinal fortitude could be silenced by law suits.

2. Network Solutions exceeded its authority as a domain manager

Network Solutions was providing Crpytome with hosting, and separately, provided domain registration. Not only did they halt his hosting service, as is their policy with a DMCA claim, but they took advantage of their system to prevent Young from transferring the domain to another provider, which exceeds their authority considering their role is to manage domain names, not act like they own them. Jones claimed that this was actionable damages and that Young should take them to court.

3. Major corporations have secret policies with government has a list of what they term “spy guides” from many companies including Skype, Facebook, Twitter, MySpace, and others. Very few of the major companies admit their compliance with government agencies, and Young views this as a troubling lack of transparency. This is the point made in yesterdays report at – if the relationships were public then there wouldn’t be a controversy about them, unless, of course, there’s something controversial about the relationships themselves.

4. Protection is just Justification for Spying

John Young said, “The government has admitted that they spy on social media sites like Facebook, MySpace, and Twitter… What they won’t tell us is what are they doing with the data? The key to all this is they always justify this by saying we’re trying to fight the criminals and the terrorist. Thing is, they over reach. They use it just as an open gambit, and they expand it to watch people who are not criminals, who are not terrorists… They always argue that ‘we’re doing this to protect the public.'”

5. “The Internet is A Gigantic Spy Machine,” and Spying is big business

Young portrayed an Internet whose primary function is to track the citizenry, and the organs of control are themselves quite lucrative to their operators. He said, “Since [Sept. 11] Spying on Americans has become very big business and corporations now are doing it covertly – Microsoft among them … All the giant people (businesses) online are now assisting government to spy on citizens through their customer data.”

6. This reinforces the need for a journalism haven

This incident demonstrates the need for an information freedom haven, as brought forward by WikiLeaks founders and placed on the table of the Icelandic Parliament this month. February closes with a stark demonstration of the vulnerabilities of publishers who are based on American commercial platforms. Young made mention of this. “Iceland is about to set up a regime, we hope, where freedom of information will finally come into its own,and people will be able to publish more in Iceland that they will not that they will not even in freedom-loving America.”‘

Yet, a journalism haven, a country with constitutionally defended server farms, will do nothing to protect users of American-based social media websites such as MySpace, Facebook, and Twitter, which operate within the jurisdiction of American law.

Other avenues of inquiry appeared when Alex Jones claimed the following on yesterday’s vodcast:

“Four or five months ago a secret UN treaty on copy right came out, it’s basically an expansion of this (DMCA). Italy is saying you have to have a license to post video, to be a blogger. We’ve got Australia is saying we want Chinese-style net censorship. Anyone complains, then your website is put on a list that’s banned in Australia. We have Time Magazine, Newsweek, The New  York Times calling for a ‘ Kinder, gentler,’ ‘Gate keeper internet.’ We have Cybersecurity openly taking over the entire grid, the physical transfer lines of the web. They’re definitely coming against the web right now.”

“That’s right,” Young agreed, adding, “It’s a world-wide initiative. Its not just government, it is these commercial firms who also are working with government to control freedom of speech.”