Skip to content

Latest Dark Politricks Articles

Here are the latest essays and articles written by myself for this site. I started this site with my own work and continue to write for it as much as I can. To read all my work check out the My Articles menu link. For other posts and latest news from a wide range of diverse sources please visit the news section.

Use The Pirate Bay Browser and stick two fingers up to the authorities and corporations who jailed the Pirate Bay creators

September 20th, 2014
Use The Pirate Bay Browser and stick two fingers up to the authorities and corporations who jailed the Pirate Bay creators By Dark Politricks Gottfrid Svartholm Ward and Peter Sunde Help these two prisoners by sending them comfort items whilst they rot away in prison. Gottfrid can only receive letters whilst Peter can get letters, books and vegan... [read more]

Internet Censorship and Surfing Anonymously

September 20th, 2014
Internet Censorship and Surfing Anonymously By Dark Politricks Sometimes it feels like the good old days of the Internet and being anonymous have passed - and you would be right. With restrictive and snooping laws being passed all over the world, firewall filters wrapped around whole countries, Twitter users sued for Re-Tweeting libellous claims and... [read more]

Me and Russell Brand on ISIS and why our leaders are hypocrites when it comes to the Islamic State and Saudi Arabia

September 6th, 2014
Me and Russell Brand on ISIS and why our leaders are hypocrites when it comes to the Islamic State and Saudi Arabia By Dark Politricks Whether you like Russell Brand or not I would urge you to subscribe to the Trews YouTube channel. Whether you like the man or not it is always good to get alternative points of views on matters which are important... [read more]

Operation Protective Edge – Israelis looking for kidnapped IDF soldier can destroy whole Palestine communities

August 3rd, 2014
Operation Protective Edge - Israelis looking for kidnapped IDF soldier can destroy whole Palestine communities By Dark Politricks I have just spent a few hours watching the nightly news on a few UK TV channels such as BBC, ITV and CH4 plus and Al-Jazeeraa for some opposing points of view, and then of course FOX, MSNBC and CNN for a one... [read more]

Tell the UK Government to pressure the Israelis to stop the killing in Palestine

July 28th, 2014
Tell the UK Government to pressure the Israelis to stop the killing in Palestine By Dark Politricks 38Degrees are trying to get the UK Parliament to actually act on the current Israeli conflict with the Palestinians rather than keep their nose up the USA's ass hole. You can help by signing a petition to tell our UK Foreign Minister, Philip Hammond.... [read more]

Do Like "my articles"?

Then check out the rest. I have written essays on all kinds of topics from Climate Change to 9/11, from Israel to America, from Religion to History and from Internet Surveillence to the rise of the new high tech police state. To see all the articles I have personally written for this site you can visit the Dark Politricks articles section for a full listing.

Your help is required!

The Internet is under attack by big business and big government who are trying to control the flow of information any way they can. Using the threat of Terrorism and Cyber attacks the western world (especially USA/UK/Australian governments) are expanding their power to control internet traffic and recently Google and Verizon signed a deal that will end net neutrality.

What this means is alternative news sites like Dark Politricks and many others will find it harder to bring you the news that the mainstream media wished you didn't know about. This is because they will be either blocked by Chinese style firewalls (as Australia has already introduced) or they will be pushed down the Google rankings by special algorithms that control a sites listing.

Web servers and bandwidth costs money and articles take time to write. Whilst I try to bring you the best of the alternative news every day I have also personally written hundreds of articles for this site and you won't find many one paragraph or half hearted articles with my name at the top of them.

Please donate

Whilst you may not want to donate money to an information clearing house website that collates articles about the war on terror in one place I would like to remind you that:

  • I am asking you to help me continue my OWN writing not the collation of other articles written by others.
  • I have already been kicked off many servers and blogging sites for my own writings due to various reasons.
  • I allow my own work to be re-printed across the web without complaint. Just search Google for Dark Politricks articles that are not on this site to see for yourself. My articles have appeared in many places including, and and many others besides.

So to help continue my own writing I would appreciate any dontations that you feel appropriate, especially if you like one of my articles or essays. Just think of all the extra articles and links as a collection of related news stories that mean you don't have to visit hundreds of different sites each day to get your news about the world of politricks and the war on terror. All money goes towards hosting my own server (not a shared server) and prevents me having to litter the site with flashing adverts as many others do. I realise people are having a tough time in the current economic climate.

Thanks for your continued support.

Use The Pirate Bay Browser and stick two fingers up to the authorities and corporations who jailed the Pirate Bay creators

Use The Pirate Bay Browser and stick two fingers up to the authorities and corporations who jailed the Pirate Bay creators

By Dark Politricks

Free The Pirate Bay Founders
Gottfrid Svartholm Ward and Peter Sunde

Help these two prisoners by sending them comfort items whilst they rot away in prison. Gottfrid can only receive letters whilst Peter can get letters, books and vegan candy!

These two prisoners are in jail for doing something that Google and BING do everyday and make millions from. The only difference is that Google and Microsoft work hand in hand with the US Police State authorities such as the NSA, GCHQ and the CIA.

As these companies are doing the bidding of the empire whilst The Pirate Bay isn’t they have been targeted and the owners unfairly jailed.

So why not help these two out whilst they are stuck in jail as political prisoners for doing something Google a multi billion dollar company does constantly but on a much larger scale and is given a free pass from the Government to carry on doing it.

As Julian Assange just recently said in an interview, Google is basically a privatised NSA that collects as much data as possible from everyone it can. He said:

“It is collecting as much information about people as possible, storing it, indexing it, and using it to create profiles of people and then selling that to advertisers and others.”

“Those are the same procedures that security agencies go through. That is why the NSA has latched on top of what Google is doing.”

Watch the interview below.

Julian Assange: Google Is Like The NSA

A search engine like Pirate Bay or Google is just that – a way to search for items hosted on other computers. The search engines don’t host the files themselves they just supply a mechanism for searching for certain files JUST like Google.

I wonder how many “illegal” documents, videos, films, music, pictures and other items can be found with a Google or search? Lots – I know because I find them constantly!

So if you want to screw big business and the crackdown on Internet freedom help these two prisoners and continue to use the Pirate Bay by going through “proxies” – just search for “Pirate Bay Proxies” or if you have WAMP Server on your PC or a LINUX server that can run PHP scripts download this script to find out which proxies are not being blocked by your ISP.

You can download the PHP script to run from your own server and get ISP details from here.

Just change the file extension from .txt to .php before you run it from your server.

If you are on a Windows machine you can download WAMP, set the port to 8888 so you can run APACHE and IIS alongside each other and run PHP from your Windows computer.

Setting WAMP up on a Windows PC is pretty straight forward but if you do run into problems this article will help you troubleshoot some common issues you might face.

If you want to know other ways to protect yourself online when you are constantly being monitored server and client side, by your ISP, by your search engines and the websites that you visit ontop of the emails you send and receive then you might want to read this detailed article by myself on ways to limit the snooping that is possible.


Using Pirate Bay

Despite it supposedly being banned more and more people are pointing their servers to it so that you can use it. If you want do to the same hire a server in a freedom loving country like Iceland (not the USA or UK!) and set your DNS to point at the Pirate Bay IP address.

Now to use the Pirate Bay without getting caught – and by that I mean not getting a letter kindly warning you not to use it through in the UK. To do so you can do all of the following.

If you are being blocked from the Pirate Bay by your ISP then you have a number of choices.

1. Find a working mirror to the site – e.g search for Pirate Bay Proxies on or try this page: to find some not blocked by your ISP.

Many mirrors will first open up in something called with a JavaScript countdown. After a few seconds a link will appear saying “click here to continue”.

On clicking the page will change (usually to an advert with a blue bar at the top) and in the top right corner will be another countdown saying “Please Wait”. Usually after 5 seconds it will say “SKIP AD” and on clicking it you will end up at the Pirate Bay mirror site.

2. Use a proxy to access the Pirate Bay. There are many free proxies out there and you can find a good list at Use a tool like FoxyProxy to manage your proxy lists and toggle between them. Or you can go into your browsers network / proxy settings and manually enter the IP address and port number you want to use.

3. Download the new Pirate Bay Browser or the Mozilla TOR Browser. Both of which access the TOR network to help disguise your internet footprint by bouncing your HTTP requests through a series of servers.  As the TOR website explains.

“Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, and it prevents the sites you visit from learning your physical location. Tor works with many of your existing applications, including web browsers, instant messaging clients, remote login, and other applications based on the TCP protocol.”

With all the outrage surrounding the NSA spying on ALL American citizens and the recent revelations that they are using this information not only to catch terrorists but to catch petty criminals, drug dealers, tax avoiders and to spy on and blackmail politicians and judges it is in everyone’s best interests that they tighten up on their Internet Security.

As this article I wrote explains there are a number of measures you can take to reduce your Internet footprint and whilst you might be totally invisible you can blend into the background.

So do yourself a favour and use the Pirate Bay browser or the TOR Mozilla Browser. Not only does making use of the TOR network help protect your privacy but the Pirate Bay Browser will let you access a number of Pirate Bay Mirror sites and bypass any censorship that your ISP or country may have introduced.

Download the Pirate Bay Browser

Download the TOR Browser

Once installed when you open the .EXE you will connect to the TOR network.

Joining the TOR network

Once connected you can use the Firefox based browser that comes with The Pirate Bay software to surf the web and access various torrent sites like Bitsnoop, Torrentz and of course various Pirate Bay proxies where people have pointed their own domains at the site as mirrors to keep it alive. The more they shut the sites down the more they will spawn like a virus.

All your Pirate Bay Mirror sites and other Torrent sites are linked at the top in the icon bar. Pick one and then carry out your search for movies, applications or other content.

As you can see it’s just a search engine like Google which makes it very unfair that the Pirate Bay is being blocked by ISP’s as Google also indexes illegal content such as porn and copyrighted material.

This is a search for the US TV show Dexter.

The Pirate Bay Browser

Like most search engines once you run a search you get your results.

The Pirate Bay Search Results

As you can see from the results on the right there are two columns, seeders and leachers.

You want to choose an item with as many seeders (uploaders) and as few leachers (downloaders) as possible to get a quick download.

You can also tell from the names of the file what sort they are e.g if the file has the word CAM in it then it’s a poor quality camera in a cinema job.

If it’s HDTV quality it will be a bigger better quality file and BRRip is a BluRay copy.

Check for comments under each torrent download page to see what people have rated the audio and video quality and the type of file you will be downloading.

There are plenty of programs that will play all formats and I suggest downloading VLC Media player as well as your standard software to play .avi and .mp4 movies as it will play almost any format of movie file you might download.

Clicking on the file you want to download will open up the result page. Hopefully you will get comments telling you the quality of the file, the type of file, the quality of sound and video and other information.

Click on “Get This Torrent” to download your torrent file.

Downloading a Torrent from the Pirate Bay

When you want to download a torrent from the Pirate Bay you will first need to have a torrent client. There are many out there including:

I use utorrent myself as it’s very easy to use and configure. It lets you set a folder for movies currently being downloaded, then you can move them to a “finished” folder once complete.

You can easily see which files are seeding or leaching at the time and you can change download and upload rates from unlimited to 1KB as well as set a proxy up to pass data through and change the port number all traffic passes through.

Once you have one installed your application of choice you can just click on the torrent in your search results and it will open up in the client and start downloading.

As you can see whilst you download the file you will also be uploading at the same time. This way you are not just taking without giving back the files you have already leached.

Downloading a Torrent in UTorrent

However be-warned, ISP’s are also on the lookout for people downloading (leaching) and uploading (seeding) torrents so you need to protect yourself.

Preventing Being Tracked Downloading

Some of the ways to stop or reduce people or companies from seeing you download torrents include the following and as always with security (in this case your own) it is better to use a variety of defence methods than just one:

-Using someone else’s WIFI or network. If your neighbour has an unlocked wi-fi or you can get onto a cafe, hospital or other open WI-FI networks with applications like “The Cloud” that let you use their WI-FI network for free.

-Using an anonymous proxy that doesn’t leak identifying information or even better a VPN. A paid for tool like BTGuard which is both a proxy and encryption tool which helps prevent your ISP throttle your traffic.

-Using a block list which will mean that all traffic is bounced around ISP routers so that they cannot scan the traffic, PeerBlock is an application that you can download that will do this although other Torrent applications can accept the uploading of lists of IP addresses into the application as well. PeerBlock just runs on your PC as you run your P2P software.

-Setting your download port to a common port for HTTP traffic such as 80 or 8080/8888  so that it doesn’t look obvious to your ISP that you are downloading P2P data. Most people use a “random port” but it is better to look like you are downloading HTTP content especially if you are encrypting your traffic as well.

-Limiting your upload rate to a minimum. Although this violates the spirit of P2P (sharing) the people going after you for stealing copyrighted material are more interested in those spreading (uploading) the content rather than downloading it.

-Ensuring you force outgoing traffic to be encrypted. This will help prevent your ISP see that you are using BitTorrent traffic and may prevent them throttling your bandwidth.

-Set a download cap on your traffic. Even if you are encrypting your traffic some ISP’s may see the amount you are downloading and throttle it if they think you are up to no good.

-Using an application like PeerBlock which will block traffic from known bad IP addresses such as P2P blocklists, known bad IP addresses, spyware, FBI and copyright monitoring sites and so on. It is worth downloading and just sits in the background running as you do you’re downloading.

As with most security measures a wide range of different measures is much better than just relying on one system.

Hopefully this article will help you make use of The Pirate Bay if you have been blocked from accessing the website by your ISP then The Pirate Bay browser, UTorrent and Peerblock will help you out.

Remember the founders of The Pirate Bay do not deserve to be in prison. They are like the criminals that refuse to grass when they are interviewed. Because they won’t play ball with the authorities like Google and BING they are just criminals in the eyes of the Empire.

So stick two fingers up to the Empire and use  to download your movies and hopefully Hollywood will soon get it into their thick heads that people want to watch films ASAP without going to the cinema all the time.

Netflix and Amazon TV do a good job for a cheap price but they don’t have the latest programmes and films on as soon as you want.

If they can sort that out people will be willing to pay a small fee once a month instead of using P2P.

Therefore the authorities need to come up with a cheap fix for their biggest problem instead of jailing people and just getting ripped off.

Posted in Dark Politricks Articles, Freedom of Speech, Internet, Liberty, Public Figures, Speeches & Appeals.

Tagged with CIA, Computing, DNS, Google, Internet, Internet Privacy, internet surveillance, ISP, Microsoft, NSA, P2P, PHP, Prison, The Pirate Bay, TOR, USA.

‘All for All’: Kiev, Donetsk militia swap prisoners in E. Ukraine

‘All for All’: Kiev, Donetsk militia swap prisoners in E. Ukraine

By Russia Today

On Saturday, the self-defense forces of the People’s Republic of Donetsk and Ukrainian security services exchanged prisoners in accordance with the 40 for 40 formula on Saturday. COURTESY: RT’s RUPTLY video agency, NO RE-UPLOAD, NO REUSE – FOR LICENSING, PLEASE, CONTACT

Watch RT live at

View the original video for ‘All for All’: Kiev, Donetsk militia swap prisoners in E. Ukraine at

Posted in Analysis & Review, Russia, Television Video & Film.

Tagged with CONTACT, Kiev, Ukraine.

Restoring Humanity: Photographer keeps Abu Ghraib victims’ stories alive

Restoring Humanity: Photographer keeps Abu Ghraib victims’ stories alive

By Russia Today

While American warplanes are back in the sky over Iraq – this time bombing jihadists – it’s the victims of the previous campaign which one photographer is raising awareness of. Chris Bartlett wants people to see the Iraqis who were tortured in the U.S.-run Abu Ghraib prison. He’s been telling Marina Portnaya why it’s important to humanize those who suffered.

Watch RT live at

View the original video for Restoring Humanity: Photographer keeps Abu Ghraib victims’ stories alive at

Posted in Analysis & Review, Television Video & Film, War on terror.

Tagged with Abu Ghraib, bombing, War on terror.

​Enemy or victim? Syria and West in ISIS era

Enemy or victim? Syria and West in ISIS era

AFP Photo

Remember the Arab Spring? That joyous mass revolutionary upsurge which toppled the Wests dictator Ben Ali in Tunisia, followed by their man in Egypt, Hosni Mubarak, before being turned into a counter revolutionary and reactionary process courtesy of the West’s intervention in Libya under the auspices of NATO? It now seems a million miles away, the sunshine of hope supplanted by a dark night of barbarism descending on the region like a shroud.

You might think the continuing and unfolding disaster that has engulfed Syria and latterly Iraq thousands of jihadists with a medieval-type attachment to brutality in service to the objective of turning the region into a graveyard for minorities, both Muslim and non Muslim alike would give policymakers in the West cause to reflect on the part played by their disastrous intervention in the region over the past decade and more.

Youd be wrong.

Instead, what we are witnessing is yet more evidence of the cognitive dissonance that has underpinned the actions of Washington and its allies when it comes to the Middle East since 9/11. Hard power has succeeded in sowing chaos and carnage while nourishing the roots of radicalism and extremism, from which has sprouted ISIS and various other millenarian Islamic extremist groups in recent years.

Imperialism is a disease which in the words of Frantz Fanon, leaves germs of rot which we must clinically detect and remove from our land but from our minds as well.

The Middle East has suffered from this rot over many decades, a state of affairs responsible for the social, political, and economic dislocation of a part of the world that sits on a sea of oil. Western leaders and ideologues have proved time and again that when it comes to trying to exert control over the region, there is no lie they will not tell, no act of hypocrisy they wont engage in, and no violation of international law they wont commit. Even so, the eruption of ISIS across Syrias eastern border and Turkeys southern border into northern Iraq these past two months has exposed the aforementioned to a degree never witnessed previously.

Panic has been the order of the day in Washington and London and Paris, as men in expensively tailored suits rich men who carry in their hearts the morals of the gutter have scrambled to respond to the emergence of a monster created by their own perfidy. It has given rise not to sober reflection, but yet more reactive measures guaranteed to deepen rather than alleviate what is now an enveloping crisis.

It was Nietzsche who wrote that insanity in individuals is something rare but in groups, parties, nations and epochs, it is the rule.

The wisdom in the German philosophers words which has been reflected in the messages emanating from the Pentagon and White House in recent days, with talk of airstrikes against ISIS in Syria and the possible redeployment of ground troops in Iraq without the prior cooperation or permission of either the Syrian or Iraqi governments in either scenario has come as stark evidence of the madness bordering on insanity which pervades the US political class.

Syria is a nation and a people whose resistance to the forces of barbarism these past three years is resistance that history will record as heroic. This makes it all the more depraved to listen to the blatant violation of Syrian sovereignty being contemplated by the Obama administration and Britains Prime Minister David Cameron. President Assads recent letter to Obama, which called for an alliance to defeat ISIS, was a plea for sanity. A beleaguered but unbowed government, reaching out on behalf of its people to a government whose responsibility for the crisis that has engulfed their country is beyond dispute, is redolent of Carthage reaching out to Rome in a last ditch attempt to forestall its destruction.

Syria is not the enemy of the West; it is a victim of the West, and must be regarded as such.

The colonial attitude towards Syria and the entire region we can trace back to the 1916 Sykes Picot Agreement, probably the most tawdry imperialist lash-up in history, which divided up the Middle East between the Allied powers as the Ottoman Empire approached its collapse as part of the losing side in the First World War. Ever since the Wests orientation towards the Arab world has involved propping up any government willing to do its bidding, while subverting those who dare resist its domination. The human suffering that has resulted as a direct consequence is impossible to quantify, but it has been of biblical magnitude.

If the United States was serious about tackling ISIS in Syria and Iraq, it would be seeking an alliance between both governments, along with the Iranians, in order to do so. Instead, the most powerful nation on earth is behaving like a drunken giant staggering around a China shop, causing mayhem as he goes.

When Barack Obama was elected president of the United States in 2008, he came to power pledging a change in US foreign policy, involving a return to diplomacy and respect for international law. Six years on, the only thing that has changed are the curtains in the White House. They began his presidency spotlessly clean. Now they are covered in blood.

View the original article at

Posted in Analysis & Review, Middle East, Politics, War on terror.

Tagged with Ben Ali, Hosni Mubarak, Iraq, ISIS, jihadists, Middle East, Muslim, Obama, power, the Arab Spring, Tunisia, United States, US foreign policy, War on terror, Washington, White House.

Are We Ready for Daily-Life Drones?

Are We Ready for Daily-Life Drones?

By Charles Hugh Smith

This exploration illustrates how ill-prepared we are, legally and socially, for the multitude of issues and conflicts that will inevitably arise as private drones become cheap and ubiquitous.

A recent experience provided grist for a “what-if” exploration of how drones may start impacting daily life. And I don’t mean delivery of packages and pizzas.

On the return drive of a trip north in summer, we were stopped for over an hour on Highway 101 by a helicopter that had landed in the middle of the four-lane highway to airlift people injured in an accident.

Since the line of stopped cars extended over a bridge and around a curve for at least a quarter-mile, we couldn’t see the cause of the blockage. As a result, I walked all the way to the front of the line to see what was going on. Another passenger from one of the hundreds of waiting vehicles joined me and we questioned people close to the front to learn what had happened.

Apparently a car had swerved off the highway and careened down a steep, forested embankment. Several tow trucks were attempting to pull the vehicle up to the roadway with little evident success while local rescue personnel were attempting to get the injured people up to the helicopter on stretchers.

Our return to our cars was leisurely, as we stopped to brief people waiting in vehicles who had not walked to the scene. One local driver told me there was a bypass road, but he suspected it too had been blocked by the California Highway Patrol (CHP).

A radio station news employee happened to be stuck behind us, and in chatting with her we discovered her contact in the news department had been unable to get any information out of the CHP.

When the helicopter finally lifted off and traffic crawled forward, our brother-in-law Fred’R.speculated how this scene would be changed by the ubiquity of personal drones.

For those who haven’t seen such drones in action yet–they are small enough to fit in the trunk of a car and generally have three rotors, which enable them to move freely in all directions and hover for extended periods.

Here are some of the scenarios we foresaw playing out once having a drone in one’s vehicle becomes common:

1. An attorney with a super-fast drone could race ahead of other drones, reach the scene of the accident first, record the rescue operation with an onboard camera and assess the liability issues in real time; if a legal opportunity was present, the attorney could upload the recording to associates and be “firstest with the mostest” in a legal claim.

2. A free-lance stringer with a connection to a news organization would navigate his/her drone to the accident site and record close-ups of the victims, rescue personnel at work, etc., and then upload the recording to a news bureau that would have an exclusive (“if it bleeds, it leads”).

3. A techie with a drone equipped with a powerful wi-fi router could hover the drone above the scene and send the video to anyone with a wi-fi-enabled device, eliminating the need for dozens of drones to compete for airspace.

4. The CHP could ban drones from hovering over or near accident sites, except for officially sanctioned drones from government agencies and vetted news agencies.

5. Someone stuck in the traffic blockage could send their drone high enough to scope out alternative routes and zoom in to see if they were blocked, jammed or free of vehicles.

6. One of the mass of circling private drones malfunctions and crashes into another drone, causing it to crash on a rescuer, inflicting injuries. The liability thread runs in various directions: can the manufacturer of the malfunctioning drone be sued, along with its operator?

7. Frustrated by the delay and the lack of official drones/sources of information, someone breaks the law by flying their drone over the accident scene. the CHP wants to issue a citation, but how can they trace the drone to the owner if the operator is clever enough not to return the drone to his vehicle straightaway?

8. A badly injured victim of the wreck finds that graphic close-up recordings of their injuries have been shown on TV, and sues the station and stringer for invasion of privacy. Are there any limits on what private drones can record in public spaces?

This brief list shows how ill-prepared we are, legally and socially, for the multitude of issues and potential conflicts that will inevitably arise as private drones become cheap and ubiquitous.

For example: If ownership of a drone can be obscured, then how can liability be traced back to the owner/operator? Will drones be required to send the equivalent of a mobile-phone ID code or IP address? What if the owner switches this signal off? Will downing a drone invading one’s privacy create liability? If so, does this trump the liability for violating privacy? How can regulations about drones possibly be enforced, much less monitored?

This isn’t your father’s job market:
Get a Job, Build a Real Career and Defy a Bewildering Economy,
a mere $9.95 for the Kindle ebook edition and $15.47 for the print edition.

View the original article at Washingtons Blog

Posted in Analysis & Review, Civil Rights and Privacy.

Tagged with Bewildering Economy, Job, news, Real Career, Washingtons Blog.