#OpChile – Anonymous Chile Hacks Carabineros Troops, Chilean Police Forces, Leaks Data Online

A group of hackers affiliated with the AnonOps IRC going by the name of “Anonymous Chile” has claimed responsibility for a large string of hacks targeting Chile’s national uniformed police forces – otherwise known as the “Carabineros.” Exposed in the leaks provided below is information such as officers names, user names and passwords, RUT, sex, addresses, ranks and the police stations they work at, as well as instructions for others to compromise Chilean data entry interfaces.

The hacks/leaks themselves are being carried out in conjunction with “Operation Chile” (#OpChile) and “”Operation Chile Desperato” (#OpChileDesperato), as well as with the Marcha Mas Grande De Chile” – supporting protesters actively being repressed by Chilean police forces and their Government. It should be noted that the group is not finished yet, and promises more leaks will soon be on the way – the longer these demonstrations continue in the streets. More importantly, the group has already had their social media accounts taken down and the location of some of the files removed – which is why I am hosting their files here – in case their index gets taken down too. Should any more leaks be published over the coming days, I will make sure to provide updates here for Rogue Media – stay tuned!

Leak Location: https://pacos.rebelside.pw/pacoleaks/

Leak Backups 11/02/2019:

25 de Octubre 2019:

https://pacos.rebelside.pw/pacoleaks/funcionarios.zip | Bases de datos con Nombres, RUT, Sexo, Zona, Prefectura, Comisaría de TODOS los Pacos de Chile (1.7MB)

https://pacos.rebelside.pw/pacoleaks/instructivos.zip | Instructivos de uso de plataforma de Documentación electrónica (DOE) (6.7MB)

26 de Octubre 2019:

https://pacos.rebelside.pw/pacoleaks/informativo.html | INFORMATIVO #1 ACERCA DEL HACKEO A CARABINEROS DE CHILE

https://pacos.rebelside.pw/pacoleaks/codigofuente.tar.gz | Código fuente plataforma de Documentación Electrónica (DOE) de Carabineros (12MB)

https://pacos.rebelside.pw/pacoleaks/dump_intranet.txt | Dump de cuentas de acceso al intranet DOE (1.02MB)

https://pacos.rebelside.pw/pacoleaks/grabaciones-walkie-talkie.zip | Algunas grabaciones de comunicaciones radiales de Carabineros (se viene más) (0.53M)

27 de Octubre 2019:

https://pacos.rebelside.pw/pacoleaks/informativo-2.html | INFORMATIVO #2 ¿EL FINAL? NO LO CREEMOS

https://pacos.rebelside.pw/pacoleaks/msg.zip | Algunos mensajes desencriptados intercambiados en la plataforma DOE (140KB)

https://pacos.rebelside.pw/pacoleaks/adjuntos-10-2019-10k.tar.gz | 10K de archivos adjuntados a los mensajes (3.11GB) Checksum de archivos

https://pacos.rebelside.pw/pacoleaks/check.txt | Checksum MD5 y SHA1 de archivos (ultima actualizacion: 29/10)

01 de Noviembre 2019:

https://pacoleaks.rebelside.pw/pacoleaks/informativo-3.html |

INFORMATIVO #3 MADE IN CHILE: https://pacos.rebelside.pw/pacoleaks/Adjunt09.zip | 20K de archivos adjuntados a mensajes (6GB)


European Parliament Approves Vote To Create International Biometric Database To Secure EU Border Countries

Last week European Parliament approved the establishment of an international biometric database referred to as the Common Identity Repository (CIN), a means to better help international authorities in securing EU borders. According to the systems parameters, the database will include identity records, including names, dates of birth, passport numbers, and other personally identifiable information, in conjunction with biometric information such as fingerprints and facial scans of both EU and non-EU citizens – estimated to encompass roughly 350 million individuals at the start.

More specifically, according to EU officials, “the systems covered by the new rules would include the Schengen Information System, Eurodac, the Visa Information System (VIS) and three new systems: the European Criminal Records System for Third Country Nationals (ECRIS-TCN), the Entry/Exit System (EES) and the European Travel Information and Authorisation System (ETIAS).” Explaining that the move comes in response to an effort to consolidate multiple databases into one browse-able place, serving to consolidate information – thus speeding up and making the jobs of border security officials much easier/proficient – whilst also simultaneously modernizing civilian records  into the 21st century.

With that said however, the vote is not without controversy. In May 2018, in anticipation of this very move, an organization known as State Watch published an investigative report into the pitfalls, short-comings and privacy violations such a database presents – see pdf accompanying this article below. Additionally, the FBI has also come under heavy scrutiny for similar databases in the US, ultimately forced to go to court after it was revealed the agency had been secretly stockpiling the biometrics records of US citizens without alerting them to this – a clear violation of the US Privacy Act in 2016.  While a federal judge did finally rule in their favor in 2017, it was later revealed that the FBI’s biometric database was hacked by the CIA, which was later hacked by Russia, meaning that all US biometric data once owned by the US Government is now out in the wild. For obvious reasons, these are all situations/lessons the EU should look to learn from as they move forward with this new initiative in the future.

Copy – State Watch Investigation: https://statewatch.org/analyses/eu-interop-morphs-into-central-database.pdf

Download CIN Presentation: https://www.securityresearch-cou.eu/sites/default/files/02.Rinkens.Secure%20safe%20societies_EU%20interoperability_4-3_v1.0.pdf

Common Identity Repository (CIN) Slideshow Presentation :

[pdf-embedder url=”https://roguemedia.co/wp-content/uploads/2019/04/02.Rinkens.Secure-safe-societies_EU-interoperability_4-3_v1.0.pdf” title=”02.Rinkens.Secure safe societies_EU interoperability_4-3_v1.0″]

Records from Over Two Dozens Local Police Departments Across The UK Hacked & Leaked Online by CyberGhost404

Yesterday, April 17th 2019, an independent hacker known as “CyberGhost404” (@CyberGhost404) of the “Philippine Cyber Eagles” (@PHCyberEagles) released a relatively large data leak effecting over two dozen police agencies across the United Kingdom. Though the exact location where they originally stole the data from remains unknown, contained within a compressed zip file posted online are various spread sheets and Microsoft Excel documents from dozens of local police offices/branches across England – including information such as local records, press releases and ongoing court cases. Rogue Media Labs has downloaded a copy of the file and can certify it is safe to the public.

Data Download (44.14 MB zip): https://anonfile.com/4ao0m7fanf/615ff8d443b27cb3a7420d48af3faa0ecdf82455_zip

While not much is known about the hacker or their group, and they appear new to Twitter as of April 2019, the Philippine Cyber Eagles have also been active in a number of DDoS attacks across Europe – all carried out under the banners of #OpAssange and #OpUK. To date, included in their attacks have been the Barnsley News Council, Council of Mid & East Antrim, Bolton Town Council, Ryedale Town District, Council of East Riding & Yorkshire and the London Datastore. The group has also posted a hit list of websites around Ecuador, said to be targets of future cyber attacks.

#OpEcudaor Target List: https://pastebin.com/yTTQUtyS

Plain Clothed Police Officers Raid 263 Chat Media In Zimbabwe – Teargas Staff & Confiscate Electronic Equipment

(AI) – A police raid on the offices of online news site 263 Chat after one of its journalists filmed the removal of street vendors in Harare is a blatant assault on the right to freedom of expression and media freedom, Amnesty International said today. Police fired tear gas into the newsroom after chasing reporter Lovejoy Mtongwiza to the website’s offices. The journalist had been taking photos and videos of the police forcing out street vendors in the Zimbabwean capital.

Today’s attack on the 263 Chat offices was designed to send a chilling message to journalists and shows the lengths the Zimbabwean police are prepared to go to muzzle media freedom,” said Muleya Mwananyanda, Amnesty International’s Deputy Regional Director for Southern Africa. “The authorities must end the attack on the media and launch a prompt, thorough and effective investigation into this attack and ensure that all suspected perpetrators are identified and brought to justice.

263 Chat is an online news site which reports on political, economic and social issues in Zimbabwe. Reporter Lovejoy Mtongwiza was deployed to the city centre to take pictures of a Zimbabwe Republic Police (ZRP) and Harare City Council operation to remove street vendors.

When a group of police and council officers pursued Mtongwiza, he ran away to his employer’s office. The police followed him and fired tear gas into the 263 Chat newsroom, where 14 other journalists were working. Officers also seized a mobile phone from one of the reporters.

This report was originally published by Amnesty International on February 19th 2019. It was republished, with permission, under a Creative Commons BY-NC-ND 4.0 International License, in accordance with the Terms & Conditions of Amnesty International | Formatting Edits and Tweets and videos added and embedded by Rogue Media Labs

ACLU Releases +1,800 Documents Obtained from US Immigration & Customs Enforcement Won via Freedom of Information Act Lawsuit

The other day I came across an interesting release of documents obtained by the American Civil Liberty Union (ACLU) as the result of a recent Freedom of Information Act lawsuit (FOIA) against US Immigration and Customs Enforcement (ICE). In this particular instance, the documents demonstrate the lengths to which different US Federal Agencies, including ICE, go in order to carry out what’s refereed to as “Mass Surveillance” against US citizens, immigrants and/or illegal aliens.  More specifically, included within the +1,800 documents released to the public last week are various contracts used by ICE to go about tracking or collecting information on various targets, as well as internal memo’s and emails detailing how ICE agents use existing networks/data centers to go about tracking these individuals online.

As was reported by the ACLU last week, March 13th 2019, “records obtained  in a Freedom of Information Act lawsuit detail ICE’s sweeping use of a vast automated license plate reader (ALPR) database run by a company called Vigilant Solutions.” Explaining how “over 9,000 ICE officers have gained access to the Vigilant system under a $6.1 million contract.” As a result, ICE now has “access to over 5 billion data points of location information collected by private businesses, like insurance companies and parking lots, and can gain access to an additional 1.5 billion records collected by law enforcement agencies.

According to the records, a little more than 80 law enforcement agencies country-wide have already signed up for this program and have already begun sharing their license plate data record with ICE. In many instances, in light of the evidence uncovered in the FOIA documents, the ACLU has also found these data transfers to be in direct violation of localized data sharing laws and ICE’s own internal policies. Making matters worse, ICE’s $6.1 million dollar contract with Vigilant isn’t set to expire until September 2020. At the present moment in time it’s estimated that Vigilant‘s databases contain over 5 billion license plate scans, enough informationto cover the movements of 150-200 millions citizens across any state – roughly 60% of the combined population of the United States. You can find all of this information and more via the newly declassified +1,800 pages of material provided below.

Original Press Release from ACLU: https://www.aclunc.org/blog/documents-reveal-ice-using-driver-location-data-local-police-deportations
Download FOIA Documents for Yourself: https://www.aclunc.org/docs/DOCS_031319.pdf

Full Cache of Documents Won/Released via FOIA Lawsuit:

[pdf-embedder url=”https://roguemedia.co/wp-content/uploads/2019/03/ICE_FOIA_Documents_Database_Tracking.pdf”%5D

Leaked Documents from Brasilian Office of General Security Ties Government Espionage To Local Police Forces

Earlier today, February 25th 2019, The Intercept published a new article entitled “145 Spies: The Secret History of Fiat Brasil’s Internal Espionage Network and Collaboration With Military Dictatorship.” The article features a series of leaked documents stolen from the Office of General Security in Brasil. In summary, the leaks reveal how the Brasilian Government carries out acts of espionage against its own citizens before manipulating local police to carry out acts on their behalf. More specifically, the documents outline how the Brasilian Government/Military regularly spy’s on its own citizens, wiretapping and/or hacking them before turning over their information to police networks, purely so those those individuals can be arrested, beaten and/or detained.

Essentially, the leaks tell the story of how rampant and widespread corruption is within the Brasilian Government, as well as how different Government agencies/offices break their own laws simply just to spy on and arrest their own citizens. You are invited to learn more about this behavior by reading the full article published by The Intercept linked below. Rogue Media Labs has also consolidated the leaks into on browse-able file to make it easier to comb through the leaked data. Happy Clicking!

Original Article from The Intercept: https://theintercept.com/2019/02/25/fiat-brazil-spying-workers-collaborated-dictatorship/
Own Leaked Doc’s for Yourself (26.78 MB): https://anonfile.com/R5Y4f8vbb9/Intercept_Brasil_Leak_pdf

Browse Through Leaked Documents:

[pdf-embedder url=”https://roguemedia.co/wp-content/uploads/2019/02/Intercept_Brasil_Leak.pdf”%5D

Polícia Militar do Amazonas Hacked, Personal Information of +100 Police Officers & +300 Staff Members Leaked Online

Over the weekend sensitive information regarding the Military Police of the State of The Amazonas was hacked and dumped online. The hack/leak has been claimed as the result of a joint operation undertaken by 4 hackers; “Kartovy,” “FoxGg,” “Heineken” and “Sr. St0rm” – though no official name for the group has been given, at least yet. Exposed in the leak is the personal information of more than 100 police officers attached to the unit, including their full names, state government email addresses, passwords necessary to log into their online accounts, as well as their personal telephone numbers.

Additionally, the leak also contains the login email addresses and passwords of 216 staff members affiliated with the agency, the login user names and passwords of 16 active duty military personnel also working with the division, as well as the full names, user names and passwords of 78 members of Oracle’s geo-security division – also run through the military police’s online platform. At the present moment in time it remains unclear how the hackers pulled off the hack or breached the website in the first place, but this in one of the most comprehensive data leaks of a police/military organization I have seen in quite some time.

View Raw Data Leak: https://pastebin.com/1v6guFJT

In a message attached to the leak, the hackers also left behind the following poem:

They say it exists to protect,
I know she can stop you,
I know she can arrest you,
Police for those who need it,
Police for those who need police Police for those who need,
Police for those who need police
They tell you to obey,
They tell you to answer,
They tell you to cooperate,
They tell you to respect

Browse Through Full Leak:

[pdf-embedder url=”https://roguemedia.co/wp-content/uploads/2019/01/policia_Amazonas.pdf”%5D

Ministério Público de Contas Hacked by Shawty Boy, Database Administrator Credentials Leaked Online

Last night, January 21st 2019, hacker “Shawty Boy” of “Pryzraky” announced a hack and leak of the Public Prosecutors Office of the Brasilian state of Roraima. Included in the leaked information provided below are the login user names and passwords of 10 site administrators, granting access to two site databases, exposing information such as photo galleries, templates of official documents, access to payrolls, prosecutor logs, journal entries and much more, as well as the user names and passwords of 50 other website clients.

Perhaps most importantly, Shawty Boy did not tag the prosecutors office in the hacks/leaks, meaning that the credentials should remain live/active for a considerable time – at least until someone reports it to the office directly. Until then, enjoy – I suppose.

Alvo: hxxp://.mpc.rr.gov.br/
Data Leak: https://ghostbin.com/paste/pbagy/raw

No photo description available.


Portal da Polícia Federal Hacked by Tr3v0r, Police Emails & Access To Department Webmail Archives Leaked Online

Early this morning, January 16th 2019, a hacker known as “Tr3v0r” announced credit for a hack of the Brasilian Federal Police – Ministry of Public of Public Safety division. In a leak made available to the public via the Pastebin web service, Tr3v0r leaked the root login credentials of 6 staff webmail administrators, exposing the entirety of the departments internal emails archives, along with the personal emails of 249 Brasilian police officers. However, it must be noted that Tr3v03 was arrogant enough to tag Brasilian police in the leak, meaning that if those passwords haven’t already gone inactive they will very shortly.

Additionally, while the hacker did not disclose how he managed to breach the site, taking a closer look at hacks he has performed throughout the past, more likely than not he was able to breach the website via SQL Injection effecting a vulnerable URL address attached to the websites back-end. You can browse through the entirety of the leak below.

No photo description available.

Website: hxxp://dpf.gov.br
Raw Leak: https://pastebin.com/HQYjqJT8
Internal Email Server: hxxp://webmail.dpf.gov.br/login.php

Admin Usernames:




Daily Trust Newspaper Raided by Military Police In Nigeria, Journalists & Editor Detained, Servers Confiscated

(HRW) – Government security forces’ January 6, 2019 raid on the Daily Trust newspaper’s offices and the arrest of staff members, including two journalists, is a disturbing attempt to stifle media freedom in Nigeria.

On January 6, 2019, armed soldiers shut down the Daily Trust’s Maiduguri office and arrested its northeast regional bureau chief, Uthman Abubakar, along with a reporter, Ibrahim Sawab. A few hours later, more troops arrived at the newspaper’s Abuja head office, arrested an operations staff member, and carted away several computers. That staff member was released later that evening, and Sawab was released early the next day, but Abubakar’s whereabouts are unknown.

The military’s raid on the Daily Trust’s offices is a chilling development that the government should take immediate steps to address,” said Anietie Ewang, Nigeria researcher at Human Rights Watch. “Nigeria’s government should ensure that the military takes no further actions to intimidate or harass journalists anywhere in the country.

In a statement released on January 7, the Army spokesman, Sani Usman, said that soldiers accompanied by members of the Nigerian Police Force and other security agencies conducted the raids and wanted the Daily Trust staff to answer questions about a story published on January 6. The statement alleged that the article divulged classified military information related to planned attacks against Boko Haram and thus undermined national security. The publication reported that the Nigerian military planned to retake the town of Baga and several other communities overrun and seized by Boko Haram fighters on December 28, 2018.

Mannir Dan-Ali, the paper’s editor-in-chief, told Human Rights Watch that the day after the raid, Abubakar was brought briefly to the newspaper’s Maiduguri office by soldiers to enable him to collect his medication and some documents related to the published story. He also said that Abubakar remains in military custody at an unknown location, and that security personnel remain in possession of over a dozen computers, including laptops and desktops confiscated at the newspaper’s Abuja office.

Security forces vacated the Daily Trust’s premises in Maiduguri on January 6 on the federal government’s orders, said Garba Shehu, President Muhammadu Buhari’s spokesman. Shehu said that “issues between the military and the newspaper as they affect the coverage of the war in the Northeast will be resolved through dialogue.

Control of Baga and its environs, which host a regional major multinational military base on the shores of the Lake Chad, has been hotly contested by Nigerian security forces and Boko Haram insurgents in the almost 10-year-long conflict. Human Rights Watch has reported about previous Boko Haram attacks on the town and about subsequent military attempts to recover the territory that led to numerous deaths and massive destruction of property in 2013 and 2015.

In line with its regular claims of Boko Haram’s “technical defeat,” the military had denied media reports that Boko Haram took control of Baga after the December attack. It has also repeatedly accused the media of undermining national security through its reporting. In December, the military banned the United Nations International Children’s Emergency Fund (UNICEF) from working in the northeast accusing it of training and deploying spies who support Boko Haram. The ban was lifted a day later. In April, the military declared three UNICEF workers persona non grata following its report about allegations of sexual abuse by Nigerian soldiers. That decision was also swiftly reversed.

Nigerian authorities should take immediate steps to curb tendencies within the military to harass and intimidate civilian actors in the northeast,” Ewang said. “Releasing Abubakar, returning the seized computers and unsealing the Daily Trust’s office is a good place to start.

This article was originally published by Human Rights Watch on January 7th 2019. It was republished, with permission, using a Creative Commons BY-NC-ND 3.0 US License, in accordance with the Terms & Conditions of Human Rights Watch | Formatting edits & Tweets added/embedded by Rogue Media Labs

Italian Trade Union of State Police Officers Hacked & Defaced by The Anonymous Anarchist Agency

Over the weekend, December 30th 2018, the Anonymous Anarchist Agency announced a hack and data leak effecting the website of the Italian Trade Union of State Police Officers. In a press release originally published by Anonymous CyberGuerrilla, hackers released the contact information of over 200 Italian police officers, including their full names and personal email addresses. Hackers also posted the user login name and password of 26 website administrators, theoretically giving anyone access to the back end of the website and its contents.

While it has since been taken down, to serve as proof of the hack and the legitimacy of the leaks, hackers also managed to deface the site.

Website Deface: https://www.silpcgil.it/articolo/6842-black_december_-_acab_-_ftp
Leak: https://zerobin.net/?9e373c259645b97f#3STa8bu41ZeJTD2kts/4wUAVBBvgSepyP/E+WeERbxw=

In a message to the public following the leak, the Anonymous Anarchist Agency stated the following:

We are the rebellion against an authoritarian society, against isolation and competition. We are the rebellion for another social and cultural reality. In the wake of global liberation attempts, the time was ripe for a decisive struggle that would no longer accept the pseudo-natural legitimacy of the system and seriously wanted to overcome it. We are looking for change for the liberation struggle, for a new way in which we can connect with others.

As democratic state is maintaining the population in a constant state of survival without starvation and widespread sicknesses, in the same way the riotcops units are using the maximum of repression without direct execution. Their presence is to impose control, their actions to re-establish order. The war is chemical and the weapons they are allowed to use are not lethal. In every way they are the frame of stability, designing the inner borders of metropolis, tracing routes and dead ends for the demonstrations. They are occupying grounds, defining the danger zones which have to be surrounded. They are used against social uprisings, against the migrants inside the camps, to secure the destruction of natural places.

We think that the tendencies of attack are the most vital part of anarchy, as direct action is the constitutive part of the fight for freedom, liberation and eco-defense. We think that it’s important to combine and multiply our struggle with comrades around the globe, because everywhere that anarchists are fighting, we can become a more dangerous and subversive threat against power when we internationalise and break down the borders between us. This is the reason that the States and corporations across the world are becoming afraid of anarchy again in the 21st Century, because we are the only real opposition to power’s domination and they do not want us to grow and link up with each other to conspire.

The insurrection of 2008 in Greece was one of the most powerful in the contemporary world. It showed an the amount of power and creativity which can be brought against the state mechanisms and how weak and small they looked those days. The murder of the anarchist Grigoropoulos from the Greek police will always be present in our memory and through our actions. Even though, we are to mark that this assassination, and the insurrection it brought within the society and the all left political spectrum was mainly because he was a 15 years old white Greek student (meanwhile they try to hide his political identity). From our sight, we are seeing the state‘s murders in various subjects, in a daily base along with the imprisonment and domination over the ground. That is why our struggles are violent and constant. Our insurrectionary acts do not depend on social legitimisation. Society is an abstract concept, more likely it refers to what is visible and approved to exist. Our struggles are connected to our experiences. We do not fight to save the people, we fight to survive and give solidarity to those who resist with the target to stimulate more individuals and collectives to join this sincere anarchist struggle.

Our tactics can easily be adopted in any metropolis of the InterState fortress. Every preparing action, every conversation, every aspect of our plan, can get us one step forward from our enemy giving us the advantage to surprise him. Let’s create an insurrectional movement without borders that will be able to spread anarchistic ideas and practices.

We send a burning signal and we join the call for a Black December announced by the comrades in Chile by communicating with this action and our words with the insurgents around the world. In fighting memory of all friends, comrades and unknown killed or imprisoned by the state.

We will never forget the comrades, we want to especially remember those who decided to give everything in the struggle and died in it. Our memory and our full respect for those whose names we can not name because we do not know them.

The future belongs to those who struggle for liberation.
Solidarity with people facing repression near and far!
Let’s light up the nights and days.”

We are Autonomen,
We are Ungovernable,
We are Action,
We do not forget our comrades,

Anonymous Anarchist Agency

Related image

Citizens Count Caught Censoring Online Political Commentary

** UPDATE: Citizens Count did re-instate my first comment back on their page this morning **

If you’ve read my biography under the editors section here on this website you would see that I included a sentence or two about being a featured author on the New Hampshire based political website Citizens Count, formerly known as The Live Free or Die Alliance. Admittedly, after attempting to flee the country and move to the Bahamas this April, I hadn’t checked in lately. But today I decided to stop by and post my first comment in nearly 8 months, only to have it immediately deleted off the web page entirely.

Interestingly enough, I couldn’t help but notice that Citizens Count has also had their official Facebook verification badge removed/revoked since the last time I visited, suspected because of this very behavior. In retrospect, it was probably even a worse idea to delete my comment, the comment of a verified news website owner, because now I am going to throw a mini ‘hissy fit‘ about it and start writing a story about it. If they are lucky, I may even pay to boost it throughout New Hampshire – lulz.

While the message has since been deleted, I had wrote about why I stepped away from the website for so long. Explaining that I was forced to apply for political asylum in two countries after being endlessly persecuted by liberal extremists and corrupt police officers in Henniker, NH. Adding that I am now more focused than ever because of the experience, and now have every intention of coming for every single one of these peoples jobs in the future. If Citizens Count has any doubts as to the validity of my statements, I invite them to ask the US Federal Bureau of Investigation. In written statements on record, under penalty of perjury, I was willing to testify how the Henniker Police force was a corrupt and nepotists police department, full of officers whom refused to do their jobs or arrest people if it involved personal friends or family – statements I also re-affirmed with International Police in Lyon, France, also on record, earlier this summer.

The sad thing is that The Live Free or Die Alliance started out with intentions of being an open source community of citizens working together to resolve important political issues and debates out in the open – at one point they even offered to have me help build their online forums. However, years after the fact, after a new change of name, logo and direction, it seems clear that the website has only succumbed to the same political partisanship that has destroyed civil dialogue in this country for the better part of the last two years, and the website is now run by liberal activists simply trying to make other liberals seem more important or in charge of all political dialect – including the immediate deletion of my comment simply for being critical of NH Democrats. Such a shame.