Category: Privacy


50,000 Websites Hacked Through MailPoet WordPress Plugin Vulnerability

 

 

 

 

 

” The users of WordPress, a free and open source blogging tool as well as content management system (CMS), that have a popular unpatched wordPress plugin installed are being cautioned to upgrade their sites immediately.
  A serious vulnerability in the WordPress plugin, MailPoet, could essentially allows an attacker to inject any file including malware, defacements and spam, whatever they wanted on the server and that too without any authentication.
  MailPoet, formerly known as Wysija Newsletter, is a WordPress plugin with more than 1.7 million downloads that allows developers running WordPress to send newsletters and manage subscribers within the content management system.
  In a blog post, the security researcher and CEO of the security firm Sucuri, Daniel Cid, pointed out the vulnerability to be serious and said that within three weeks since the vulnerability unveiled, over 50,000 websites have been remotely exploited by the cybercriminals to install backdoors targeting the vulnerable MailPoet plugin.”
Read the rest at Hacker News
About these ads

No More `Permanent’ Emails With New Service

 

 

 

 

 

” Since the dawn of the Internet, email users have been haunted by the finality of hitting the “send” button.

No more.

  What could be the foremost of all First World problems — the inability to retrieve or delete an ill-conceived email — is now a thing of the past for users of Pluto Mail, according to the Harvard law student who created it.

“ I’ve been annoyed with the fact that any email I send lasts forever, and I think Snapchat popularized the more-forgettable Internet, and I thought it would be great to bring it to email. It’s a very salient problem. I think everyone has had this ‘uh oh’ moment,” said David Gobaud, founder and CEO of Pluto Labs Inc. “Basically the Pluto service turns your emails into dynamic ones that you can maintain control over. I built a new email server that turns an email into a living document.”

  Gobaud said Pluto Mail allows people with sender’s remorse to edit, delete or set an expiration date on their emails. The product, which was released in early March, already has thousands of 
users and continues to grow by the day, he said.

  Pluto Mail isn’t an email provider but allows users to apply the service to their own email addresses — including Gmail, Outlook and Apple Mail — and then send messages as they normally would. But once the send button is hit, the Pluto Mail user can delete an email’s content, edit it or set an expiration time. The service also informs the sender if the recipient has already opened it. “

 

Read more

 

 

 

 

 

 

 

 

 

Undocumented iOS Features Left Hidden Backdoors Open In 600 Million Apple Devices

 

 

 

 

 

” A well known iPhone hacker and forensic scientist has unearthed a range of undocumented and hidden functions in Apple iOS mobile operating system that make it possible for a hacker to completely bypass the backup encryption on iOS devices and can steal large amounts of users’ personal data without entering passwords or personal identification numbers.
  Data forensics expert named Jonathan Zdziarski has posted the slides (PDF) titled “Identifying Backdoors, Attack Points, and Surveillance Mechanisms in iOS Devices” showing his findings, from his talk at the Hackers On Planet Earth (HOPE X) conference held in New York on Friday.
  Jonathan Zdziarski, better identified as the hacker “NerveGas” in the iPhone development community, worked as dev-team member on many of the early iOS jailbreaks and is also the author of five iOS-related O’Reilly books including “Hacking and Securing iOS Applications.”
  The results of his overall research on the iOS devices indicate a backdoor into iOS device’ operating system, although it is not at all that much widely open as a number of reports have suggested.
  You can protect your iOS device settings, Messages, Camera Roll, documents, saved games, email account passwords, Wi-Fi passwords, and passwords that you enter into websites using iTunes Backup feature. iTunes also allows users to protect their backup data with an encryption.”

Just A Penny And A Rubber Band

 

 

 

” We love bikes. We love skirts. But sometimes these two don’t mix well. Which is why we came up with Penny in Yo’ Pants. An easy solution to making your skirt bikeable.

  Check out our website at pennyinyourpants.co.uk. We will be making a slicker model shortly that will be even better than a penny and a rubber band (imagine that). Proceeds will go to get more women on bikes around the world!

  This was prototyped during Cyclehack Glasgow, 2014. cyclehack.com “

 

 

 

 

 

 

 

 

 

 

 

 

Report: Ordinary Americans Caught Up In Data Sweep

 

 

 

 

 

” When the U.S. National Security Agency intercepted the online accounts of legally targeted foreigners over a four-year period it also collected the conversations of nine times as many ordinary Internet users, both Americans and non-Americans, according to a probe by The Washington Post.

  Nearly half of those surveillance files contained names, email addresses or other details that the NSA marked as belonging to U.S. citizens or residents, the Post reported in a story posted on its website Saturday night. While the federal agency tried to protect their privacy by masking more than 65,000 such references to individuals, the newspaper said it found nearly 900 additional email addresses that could be strongly linked to U.S. citizens or residents.”

The Snowden revelations continue to reveal the extent of State spying during the Age Of Obama …

” The material reviewed by the Post included roughly 160,000 intercepted e-mail and instant-message conversations, some of them hundreds of pages long, and 7,900 documents taken from more than 11,000 online accounts. It spanned President Barack Obama’s first term, 2009 to 2012, and was provided to the Post by former NSA analyst Edward Snowden.

  The daily lives of more than 10,000 account holders who were not targeted were catalogued and recorded, the Post reported. The newspaper described that material as telling “stories of love and heartbreak, illicit sexual liaisons, mental-health crises, political and religious conversions, financial anxieties and disappointed hopes.” The material collected included more than 5,000 private photos, the paper said.”

AP News

Massachusetts SWAT Teams Claim They’re Private Corporations, Immune From Open Records Laws

 

 

 

 

 

 

” As part of the American Civil Liberties Union’s recent report on police militarization, the Massachusetts chapter of the organization sent open records requests to SWAT teams across that state. It received an interesting response.

  As it turns out, a number of SWAT teams in the Bay State are operated by what are called law enforcement councils, or LECs. These LECs are funded by several police agencies in a given geographic area and overseen by an executive board, which is usually made up of police chiefs from member police departments. In 2012, for example, the Tewksbury Police Department paid about $4,600 in annual membership dues to the North Eastern Massachusetts Law Enforcement Council, or NEMLEC. (See page 36 of linked PDF.) That LEC has about 50 member agencies. In addition to operating a regional SWAT team, the LECs also facilitate technology and information sharing and oversee other specialized units, such as crime scene investigators and computer crime specialists.

  Some of these LECs have also apparently incorporated as 501(c)(3) organizations. And it’s here that we run into problems. According to the ACLU, the LECs are claiming that the 501(c)(3) status means that they’re private corporations, not government agencies. And therefore, they say they’re immune from open records requests. Let’s be clear. These agencies oversee police activities. They employ cops who carry guns, wear badges, collect paychecks provided by taxpayers and have the power to detain, arrest, injure and kill. They operate SWAT teams, which conduct raids on private residences. And yet they say that because they’ve incorporated, they’re immune to Massachusetts open records laws. The state’s residents aren’t permitted to know how often the SWAT teams are used, what they’re used for, what sort of training they get or who they’re primarily used against.”

 

 

    This is arrogance of the highest order . For any organizations funded by the taxpayers to claim to be private corporations is beyond the pale . 

 

 


” From the ACLU of Massachusetts’s report on police militarization in that state:

  Approximately 240 of the 351 police departments in Massachusetts belong to an LEC. While set up as “corporations,” LECs are funded by local and federal taxpayer money, are composed exclusively of public police officers and sheriffs, and carry out traditional law enforcement functions through specialized units such as SWAT teams . . .

  Due to the weakness of Massachusetts public records law and the culture of secrecy that has infected local police departments and Law Enforcement Councils, procuring empirical records from police departments and regional SWAT teams in Massachusetts about police militarization was universally difficult and, in most instances, impossible . . .

  Police departments and regional SWAT teams are public institutions, working with public money, meant to protect and serve the public’s interest. If these institutions do not maintain and make public comprehensive and comprehensible documents pertaining to their operations and tactics, the people cannot judge whether officials are acting appropriately or make needed policy changes when problems arise . . . “

 

 

 

    This situation cannot be allowed to stand . ALL public servants MUST be held accountable for their actions or are we to believe that these “mercenary” SWAT units are merely rogue privateers issued Letters of Marque ? If such is the case then they are no more than pirates and as such must be fought with all possible means  .

   Food for thought: If the SWAT teams are private corporations/private contractors , ala Blackwater ,  then they do not enjoy the legal immunities offered to employees of the State and thus should be subject to civil lawsuits and thus the discovery process … Let the flood gates open .

 

 

   Read the rest from Radley Balko at the Washington Post.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Supreme Court Bans Warrantless Cell Phone Searches, Updates Privacy Laws

 

 

 

 

” The Supreme Court ruled Wednesday that police must obtain warrants before snooping through people’s cellphones, delivering a unanimous decision that begins to update legal understanding of privacy rules to accommodate 21st-century technology.

  Police agencies argued that searching through data on cellphones was no different from asking someone to turn out his pockets, but the justices rejected that, saying a cellphone holds the most personal and intimate details of someone’s life and falls squarely within the Fourth Amendment’s privacy protections.

“ The fact that technology now allows an individual to carry such information in his hand does not make the information any less worthy of the protection for which the Founders fought,” Chief Justice John G. Roberts Jr. wrote in the unanimous opinion. “Our answer to the question of what police must do before searching a cell phone seized incident to an arrest is accordingly simple — get a warrant.”

  The justices even said police cannot check a cellphone’s call log because it could contain more information than phone numbers, and perusing the call log is a violation of privacy that can be justified only with a court-issued warrant.

  Privacy advocates, meanwhile, said the ruling should ignite a broader rethinking of protections at a time when Americans are putting more personal information online.”

 

 

 

Washington Times continues the story of a small step on the road to victory in the war for privacy rights .

 

 

 

 

 

 

 

 

 

 

California: 39 Woman Prisoners Were Sterilized Without Consent

 

 

 

 

” Physicians in California prisons illegally sterilized at least 39 women during an eight-year period, with cases recorded as late as 2011, according to a report put out last week by the state’s own auditing office.

  Cynthia Chandler, co-founder of the Oakland-based group Justice Now, which has been raising concerns about prison sterilization processes for years, said that the report’s release “feels like an incredible step and vindication for people who work toward challenging human rights abuses.”

  The audit found problems in 39 cases, which account for more than a quarter of the 144 women who underwent the sterilization procedure between fiscal years 2005-6 and 2012-13. In 27 of the cases, inmates’ physicians had failed to sign the necessary consent form detailing that the patients were mentally competent, had understood the lasting effects of the procedure, and that the required 30-day waiting period after initial inmate consent was given had passed. Eighteen cases potentially violated that required waiting period, which is intended to give female prisoners time to think about their decisions before their surgeries take place. In some cases there is even evidence that doctors falsified records, claiming that the waiting period had elapsed when it actually had not.”

 

 

 

Read more

 

 

 

 

 

 

 

 

 

 

 

 

New Sensors Will Scoop Up ‘Big Data’ On Chicago

 

 

 

 

 

 

” The curled metal fixtures set to go up on a handful of Michigan Avenue light poles later this summer may look like delicate pieces of sculpture, but researchers say they’ll provide a big step forward in the way Chicago understands itself by observing the city’s people and surroundings.

  The smooth, perforated sheaths of metal are decorative, but their job is to protect and conceal a system of data-collection sensors that will measure air quality, light intensity, sound volume, heat, precipitation and wind. The sensors will also count people by measuring wireless signals on mobile devices.”

 

 

 

 

” Some experts caution that efforts like the one launching here to collect data from people and their surroundings pose concerns of a Big Brother intrusion into personal privacy.

  In particular, sensors collecting cellphone data make privacy proponents nervous. But computer scientist Charlie Catlett said the planners have taken precautions to design their sensors to observe mobile devices and count contact with the signal rather than record the digital address of each device.”

 

 

Chicago Tribune has more on the latest intrusions into personal privacy 

 

 

 

 

 

 

 

 

 

Pentagon Funds ‘Cold War-Style’ Science Study To Track Mass Civil Unrest

 

 

 

 

 

 

” The Pentagon along with the Minerva Research Initiative, appears to have resuscitated and partially reconstituted a 60′s Cold War-era social science program used to detect political protest… 

  The controversial program called Project Camelot had been operational nearly a decade into the Vietnam war, as the Special Operations Research Office (SORO) located at American University had received millions in funding from the US Army to conduct a six country study on civil unrest. The current social science program directed by Minerva and the Department of Defense (DoD), appears to have also partnered with some of the most well-known universities in the United States by studying the behavior of peaceful activism and how political ideology shapes protest movements in the world at large.

  The Minerva Research Initiative has been conducting its studies with the sponsorship of the Department of Defense and its university partners since 2010. This new program has prompted a rebirth of the militarization of social science and in the process has undoubtedly opened a floodgate of ethical concerns. The creation of this partnership was born out of a speech by former Secretary of Defense as well as past Director of the CIA, Robert Gates. In April of 2008, Gates delivered a speech at the Association of American Universities, there he provided a vague outline for research that worked in conjunction with academia and other Pentagon affiliated agencies such as the DoD :

What we are considering is based to some degree on the success we had in the Cold War. During that period, we built up the Department of Defense’s – and the nation’s – intellectual capital with new research centers such as RAND and new mechanisms like, as I mentioned, the National Defense Education Act. With the Minerva initiative, we envision a consortia of universities that will promote research in specific areas. These consortia could also be repositories of open-source documentary archives. The Department of Defense, perhaps in conjunction with other government agencies, could provide the funding for these projects.”

Read more at 21st Century Wire

9 Unbelievably Absurd Acronyms the FBI Is Tracking On Twitter, Or 9UAATFBIITOT

 

 

FBI Twitterspeak

 

 

 

 

 

” In this week’s stranger news, an 83-page document was procured by self-proclaimed “FOI Geek” Jason Smathers under the Freedom of Information Act. The document, created by the FBI’s Directorate of Intelligence Research Support Unit, features an “extensive—but far from exhaustive—list of shorthand and acronyms used on Twitter and other social media venues.”

  The list contains more than 2,800 entries (you read that correctly) which the FBI asserts you “should find useful in your work or for keeping up with your children and/or grandchildren.” In case your child decides to tell you, “HGH”, during in the middle of a conversation, fret not, for now you can just pull out your handy dandy 83-page guide to internet slang and see that they’re obviously telling you “Haters Gonna Hate.” Duh.

  With over 2,800 abbreviations on the list, there are understandably some strange ones which, based on a quick internet search, have literally never even been used. Imagine employing any of these in daily conversation, not to mention trying to memorize them:

From Reason:

 

  • IOKIYAR, “It’s okay if you’re a Republican
  • ALOTBSOL, “Always look on the bright side of life”

 

 

 

 

 

 

  • BTDTGTTAWIO, “been there, done that, got the T-shirt and wore it out”
  • EOTWAWKI, “end of the world as we know it”

 

 

 

 

 

  • HCDAJFU, “He could do a job for us”
  • IITYWTMWYBMAD, “If I tell you what it means will you buy me a drink?”
  • LFBBEG, “Looking for big bad evil guy”
  • KTBSPA, “Keep the backstreet pride alive”
  • PMIGBOM, “Put mind in gear before opening mouth”

 

 

     Our tax dollars at work … Jeez . One would think that with all the threats to our way of life from those evil “right-wing extremists” , the need to change illegal’s diapers , arming terrorists and such that the Feds would have enough to do without spending a fortune studying social media acronyms … but one would be wrong , wouldn’t one ? 

   In Obama’s Amerika no job is to small for the hand of big government .

Read more  here and here:

 

FBI Releases 83-Page Guide to Social Media Slang, Acronyms

FBI’s Amusing ‘Twitter Speak’ Dictionary Revealed

WTF FBI? Agency Has Huge List of Twitter Slang (and Some of It’s Fake)

FBI discovers Twitter-speak, starts a dictionary

 

 

 

 

 

 

 

 

 

 

This Top Turns See-Through If You Leave Personal Data Exposed

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

” A Brooklyn-based designer has created a 3D-printed sculptural boob tube to spark social commentary on the state of privacy in a data-driven world — by making the top gradually more sheer.”

 

 

 

 

 

 

” X.pose’s striking black webbed rubber structure was engineered using a Stratasys printer, moulded to the body to ensure comfort and very much inspired by creator Xuedi Chen’s previous work, Invasive Growth (moss-grown jewellery based on the parasitic cordyceps fungus). But underneath, its layers tell another story about our lack of control and veritable vulnerability when it comes to who uses our data, what for and how much they take.”

 

 

The artist describes her creation thusly …

 

 

” x.pose is a wearable data-driven sculpture that exposes a person’s skin as a real-time reflection of the data that the wearer is producing. In the physical realm we can deliberately control which portions our bodies are exposed to the world by covering it with clothing. In the digital realm, we have much less control of what personal aspects we share with the services that connect us. In the digital realm we are naked and vulnerable. “

 

 

Wired UK

 

 

 

 

 

 

 

 

 

 

 

 

FREE AT LAST, FREE AT LAST–JUSTINA’S GOING HOME!

 

 

 

 

 

 

 

” Finally.

  The Pelletier family of West Hartford has told  FOXCT their daughter, Justina, will be returned to her family Wednesday.

  Lou Pelletier, Justina’s father, says a juvenile judge issued the order Tuesday afternoon, returning custody of Justina to her parents.

  The Pelletiers lost custody 16 months ago to the State of Massachusetts, after disagreements over a medical diagnosis.

  Since then, Justina has been in the care of Boston Chrildren’s Hospital and Youth facilities.

  I am so happy for Lou and Linda Pelletier.  I had several private conversations with Lou during the darkest days, and I can tell you the self-restraint he showed controlling a hurricane of emotions was amazing.  He never gave up (the easy part), and he never gave into his anger and outrage (much harder).

 

The state of Massachusetts, on the other hand, remained a-s-wipes to the bitter end:

 

  Three months ago, in a sharply worded opinion highly critical of the parents’ conduct, the judge gave permanent custody of Justina to the Mass. DCF, and said he believed psychological issues explained much of the teenager’s ailments.

  However, top officials at DCF earlier this month filed papers with the judge suggesting the parents had made significant progress and recommended that custody return to the parents.

“ Significant progress?” The parents weren’t doing anything different in June than they were in March. There was no “progress,” just as there was never any–NOT ANY–evidence ever presented that the Pelletiers had been abusing Justina before Massachusetts DCF and Boston Children’s performed their “parentectomy.”

  More on this story tomorrow. Meanwhile….FREE AT LAST, FREE AT LAST, THANK GOD ALMIGHTY JUSTINA IS FREE AT LAST! “

 

 

Thank you Michael Graham

More here:

 

Judge Rules, Justina Pelletier Is Finally Going Home!

Justice for Justina: Judge orders Connecticut girl to be returned to family

Breaking: Justina Pelletier to be released to her family Wednesday

 

 

 

 

 

 

 

 

 

Commentary From John Whitehead At The Rutherford Institute

 

 

 

 

 

” By John W. Whitehead 
June 16, 2014

A standing military force, with an overgrown Executive will not long be safe companions to liberty.”—James Madison

“ Here [in New Mexico], we are moving more toward a national police force. Homeland Security is involved with a lot of little things around town. Somebody in Washington needs to call a timeout.”—Dan Klein, retired Albuquerque Police Department sergeant.

  If the United States is a police state, then the Department of Homeland Security (DHS) is its national police force, with all the brutality, ineptitude and corruption such a role implies. In fact, although the DHS’ governmental bureaucracy may at times appear to be inept and bungling, it is ruthlessly efficient when it comes to building what the Founders feared most—a standing army on American soil.

The third largest federal agency behind the Departments of Veterans Affairs and Defense, the DHS—with its 240,000 full-time workers, $61 billion budget and sub-agencies that include the Coast Guard, Customs and Border Protection, Secret Service, Transportation Security Administration (TSA) and the Federal Emergency Management Agency (FEMA)—has been aptly dubbed a “runaway train.”

  In the 12 years since it was established to “prevent terrorist attacks within the United States,” the DHS has grown from a post-9/11 knee-jerk reaction to a leviathan with tentacles in every aspect of American life. With good reason, a bipartisan bill to provide greater oversight and accountability into the DHS’ purchasing process has been making its way through Congress.

  A better plan would be to abolish the DHS altogether. In making the case for shutting down the de facto national police agency, analyst Charles Kenny offers the following six reasons: one, the agency lacks leadership; two, terrorism is far less of a threat than it is made out to be; three, the FBI has actually stopped more alleged terrorist attacks than DHS; four, the agency wastes exorbitant amounts of money with little to show for it; five, “An overweight DHS gets a free pass to infringe civil liberties without a shred of economic justification”; and six, the agency is just plain bloated.

  To Kenny’s list, I will add the following: The menace of a national police force, a.k.a. a standing army, vested with so much power cannot be overstated, nor can its danger be ignored. Indeed, as the following list shows, just about every nefarious deed, tactic or thuggish policy advanced by the government today can be traced back to the DHS, its police state mindset, and the billions of dollars it distributes to police agencies in the form of grants.

  Militarizing police and SWAT teams. The DHS routinely hands out six-figure grants to enable local municipalities to purchase military-style vehicles, as well as a veritable war chest of weaponry, ranging from tactical vests, bomb-disarming robots, assault weapons and combat uniforms. This rise in military equipment purchases funded by the DHS has, according to analysts Andrew Becker and G.W. Schulz, “paralleled an apparent increase in local SWAT teams.” The end result? An explosive growth in the use of SWAT teams for otherwise routine police matters, an increased tendency on the part of police to shoot first and ask questions later, and an overall mindset within police forces that they are at war—and the citizenry are the enemy combatants.”

     Below are a list of other ways in which the State is busy eroding our Constitutional rights , all explored in greater depth at the Rutherford Institute .

” Spying on activists, dissidents and veterans. 

Stockpiling ammunition. 

Distributing license plate readers. 

Contracting to build detention camps. 

Tracking cell-phones with Stingray devices. 

Carrying out military drills and lockdowns in American cities. 

Using the TSA as an advance guard. 

Conducting virtual strip searches with full-body scanners. 

Carrying out soft target checkpoints. 

Directing government workers to spy on Americans.  

Conducting widespread spying networks using fusion centers. 

Carrying out Constitution-free border control searches. 

Funding city-wide surveillance cameras. 

Utilizing drones and other spybots. 

  It’s not difficult to see why the DHS has been described as a “wasteful, growing, fear-mongering beast.” If it is a beast, however, it is a beast that is accelerating our nation’s transformation into a police state through its establishment of a standing army, a.k.a. national police force.

  This, too, is nothing new. Historically, as I show in my book A Government of Wolves: The Emerging American Police State, the establishment of a national police force has served as a fundamental and final building block for every totalitarian regime that has ever wreaked havoc on humanity, from Hitler’s all-too-real Nazi Germany to George Orwell’s fictional Oceania. Whether fictional or historical, however, the calling cards of these national police agencies remain the same: brutality, inhumanity, corruption, intolerance, rigidity, and bureaucracy—in other words, evil. “

Read more here

How To Stop Facebook From Tracking Your Browsing History

 

 

 

” Last week, Facebook announced that it was going to start tracking our browsing activity. Facebook is claiming that this feature is part of its ad-tailoring program (it also recently introduced a tool that lets you give feedback on ads). Of course, it’s not quite that innocent: Advertisers will pay more for information on what you do outside of Facebook because it will help them target you better inside of Facebook.

  Sound good to you? Great, carry on! No? You have some choices, including privacy company Abine’s new DoNotTrackMe tool for Facebook.

” It is crazy for anyone to allow Facebook to collect their browsing history when they’re not even logged into Facebook,” said Abine CEO Rob Shavell, in a press release announcing the technology. “The idea that one company should be trusted to know about our friends and family and then also everything we do online is insane.”

  And the scope of Facebook’s tracking ability is greater than you may think. “Our browsing history, which Facebook can only collect because of the many ‘like’ and ‘login’ buttons they have placed on other sites, allows Facebook to connect two critical sets of information about us: ‘Who we are,’ our identity and personal information and social graph; [and] ‘what we do,’ which sites we go to each day, what we do there, and more,” Shavell explained via email. 

” You might have ‘nothing to hide,’ but if you have a Facebook account and surf without technology protecting you from this new default on data collection, you will certainly find out,” he says. “

From the DoNotTrackMe website

” If you’re like the average web user, you’re unknowingly tracked over 100 times each time you surf the web.

  DoNotTrackMe automatically blocks these tracking companies – ad networks, social networks, and sneaky data collection companies – from tracking your browsing behind the scenes. DoNotTrackMe has blocked over 1 trillion attempts to track millions of users’ browsing and actively blocks over 600 of these companies.

  DoNotTrackMe also protects your email address, phone, and credit card from being abused by companies on the web and on your mobile device.”

    The more we learn of Facebook , the more we want to have nothing to do with it . Read more on protecting your privacy from those corporate Statists of Zuckerberg’s at the Daily Dot .

Imagine … If You Will , A President Who Orders The Collection Of Virtually Every Fact About American Citizens , Yet …

 

 

 

 

 

 

… Has All Of His Own Records Sealed By Court Order Before Running For President

 

 

 

 

 

 

 

 

 

 

 

Revealed: Twin Sisters Lived In Fear Of Bowe Bergdahl’s ‘Stalker’ Father Who Was Caught ‘Peeping Into Their Windows While They Were In The Shower’

 

 

” The father of embattled POW Bowe Bergdahl, who landed on US soil today, waged a sinister campaign of stalking and harassment against pretty twin sisters – even stealing a gnome from their garden and peaking at them in the shower, the sisters claim in shocking police reports.

  Bearded Robert ‘Bob’ Bergdahl drove by the home of Lacey and Allie Hillman ‘several times a day’ over a period of months and left ‘creepy’ notes for them, the sisters allege in police documents, obtained exclusively by MailOnline.

  Once Bergdahl banged on Allie’s door and accused her of ‘two-timing’ him – despite the fact that the pair never dated or were even friends, Allie told police.”

 

Daily Mail

 

 

 

 

 

 

 

 

 

 

 

 

 

Elites Beware: Eric Cantor’s Defeat May Signal A Populist Revolution

 

 

 

 

” Expecting House Majority Leader Eric Cantor to win his GOP primary in Virginia, I spent Election Day in Pennsylvania – interviewing angry Republicans, Democrats and independents about the rise of political populism.

  I was in the wrong state, but I had the right topic. Cantor’s defeat has less to do with immigration reform than it does with an uneven movement that should frighten conservative and liberal political elites to their shallow cores.

  Americans see a grim future for themselves, their children and their country.  They believe their political leaders are selfish, greedy and short-sighted – unable and/or unwilling to shield most people from wrenching economic and social change. For many, the Republican Party is becoming too extreme, while the Democratic Party – specifically President Obama – raised and dashed their hopes for true reform.”

 

 

 

   Only someone who has lived in a cave for the past twenty years could believe that real change can come from the District of Corruption . Despite the best efforts of the Corporate-State run media to demonize all things Tea Party and despite the occasional drug-addled morons shooting up the neighborhood a la Las Vegas , more and more citizens are coming to the conclusion that the ballot box and the courts offer no recourse … 

 

 

 

” At the West Chester’s popular D.K. Diner, a U.S. veteran who served five combat tours in Iraq and Afghanistan said the only solution may be a revolution against political elites. “We may need to drag politicians out and shoot them like they did in Cuba,” said a grim-faced Frederick Derry two days after a Los Vegas couple allegedly shot two police officers. The attackers draped their bodies with a “Don’t Tread on Me” flag, according to ABC News, pinned a swastika on them and a note that read “The revolution has begun.”

  A violent revolution is unconscionable. But what may be in the air is a peaceful populist revolt – a bottom-up, tech-fueled assault on 20th century political institutions. In a memo to his fellow Democrats, former Clinton White House political director Doug Sosnik writes persuasively about “an increasing populist push across the political spectrum.

  At the core of Americans’ anger and alienation is the belief that the American Dream is no longer attainable. Previous generations held fast to the promise that anyone who worked hard and played by the rules could get ahead, regardless of their circumstances. But increasingly, Americans have concluded that the rules aren’t fair and that the system has been rigged to concentrate power and wealth in the hands of a privileged few at the expense of the many. And now the government is simply not working for anyone.”

 

 

 

    Sosnik is wrong in that the government is working for some people and some businesses , just not the bulk of the taxpaying public . It’s working just fine if you draw a publicly funded paycheck as a federal employee or are a lobbyist , politician or corporate bigwig . It also works quite well if you happen to be a member of the media elite as the cronyism and nepotism between those two entities is well-documented . 

But he is correct in thinking that the time is nigh for the average citizen to choose sides and decide if he/she will indeed take part in the destruction of the barricades .

 

 

 

” Which side of the barricade are you on? Populists from the right and the left – from the tea party and libertarian-leaning Rand Paul to economic populist Elizabeth Warren – are positioning themselves among the insurgents. Sosnik pointed to six areas of consensus that eventually may unite the divergent populist forces:

  • A pull back from the rest of the world with more of an inward focus.
  • A desire to go after big banks and other large financial institutions
  • Elimination of corporate welfare.
  • Reducing special deals for the rich.
  • Pushing back on the violation of the public’s privacy by the government and big business.
  • Reducing the size of government.

  In Washington, Cantor’s defeat is being chalked up to the tea party’s intolerance toward immigration reform. While he paid a price for flirting with a White House compromise, Cantor’s greater sin was inauthenticity – brazenly flip-flopping on the issue. Typical politician.”

 

 

 

    Mr Fournier’s contention that Elizabeth “Fauxcahontas” Warren is anything but a confirmed Statist aside , we are willing to concede that the lines of battle are being drawn and that there is much common ground to be found between the Occupy crowd and the Tea Partiers .

   The question remains , which American personage will be able to unite these disparate interests and lead the charge over the barricades of corruption to reinstate American republicanism and reestablish a nation of limited government .

 

 

Ron Fournier

 

 

 

 

 

 

 

 

 

 

Judge Says NSA Can Continue To Destroy Evidence

 

 

 

 

 

 

” Well, this is unfortunate. After yesterday’s back and forth between the DOJ and the EFF over the ongoing destruction of key evidence in the Jewel v. NSA case, the court ordered an emergency hearing for this afternoon. About an hour before the hearing, the DOJ presented its opposition to the temporary restraining order, arguing, basically, that it would be too damn complicated to stop destroying evidence in the case. Part of this is because the data collected under the Section 702 program apparently isn’t just one big database, but is quickly fed into all sorts of other systems.”

 

 

Tech Dirt has the whole story . See also :

 

Judge Asks for More Information About NSA Spying Evidence Destruction After Emergency Hearing

Judge Changes Mind, Says NSA Can Resume Destroying Evidence

Judge Says NSA Can Continue To Destroy Evidence

FISA Court Reverses Order to Destroy NSA Phone Data -CIO.com

 

 

 

 

 

 

 

 

Last Of Original Group Of Navajo Code Talkers Dies

 

 

Chester Nez

Click Picture For Video

 

 

 

” Marine veteran Michael Smith wept Wednesday when he heard about the death of Chester Nez, the last of the original Navajo Code Talkers.

  Smith, from Window Rock, who had met Nez several times, described him as a “quiet, humble” Navajo Marine.”

 

 

 

 

” Smith said that the passing of Nez — the last of the first 29 Navajo men who created a code from their language that stumped the Japanese in World War II — marked the closure of a chapter in the story of a special group of veterans.”

 

 

 

 

 

 

” Nez died Wednesday morning in Albuquerque, where he lived with his son Michael. He was 93. His family said he died of kidney failure.”

 

AZ Central has more

 

 

 

 

 

Delete Your Facebook

 

 

 

 

Published on Jun 5, 2014

” Click to tweet: http://ctt.ec/R18PL
Please share! Help spread the word! #deletefacebook
Here is my facebook, It will be gone on Sat 12PM PST.
https://www.facebook.com/Matthiasiam

Here is how to Delete Facebook- http://goo.gl/yHg29r
Reset The Net! : https://www.resetthenet.org/

Like my shirt? Find it here: http://www.longlivetheswarm.com

SOURCES —————————————-­———————–

FB Passive Listening: http://goo.gl/y1CYR0
FB Reads Your Texts: http://goo.gl/x7nPfu
NSA FB Servers: http://goo.gl/dflG51
FB Privacy Listening Issues: http://goo.gl/nluYZB
FB Stores Your Recordings: http://goo.gl/bmY6bQ
FB Silently Updates TOS: http://goo.gl/ZAajME
Reddit Thread on FB Listening: http://goo.gl/imGjs8
Users Slam FB Listening: http://goo.gl/SQZ8Ny

PROTECT YOURSELF —————————————-­—–

IOS Privacy – http://goo.gl/TSmRO6
Android Privacy – http://goo.gl/FtNUq9
Delete FB – http://goo.gl/yHg29r

FACEBOOK ALTERNATIVES ———————————–

Twitter | http://www.twitter.com
Reddit | http://www.reddit.com
Path | http://www.path.com
Vine | http://www.vine.co
Tumblr | http://www/tumblr.com

MOVIES —————————————-­————————-

V for Vendetta
Minority Report
Terms and Conditions May Apply 
1984
Got some other movies? Let me know in the comments

—————————————-­—————————————-­————-

GAME CHANNEL: http://www.youtube.com/matthiasarcade

TWITTER: http://www.twitter.com/matthiasiam

GOOGLE+: http://www.google.com/+matthiasiam

INSTAGRAM: http://www.instagram.com/matthiasiam “

 

 

 

 

 

 

 

 

 

 

 

 

U.S. Marshals Seize Cops’ Spying Records To Keep Them From The ACLU

 

 

 

 

 

 

” A routine request in Florida for public records regarding the use of a surveillance tool known as stingray took an extraordinary turn recently when federal authorities seized the documents before police could release them.

  The surprise move by the U.S. Marshals Service stunned the American Civil Liberties Union, which earlier this year filed the public records request with the Sarasota, Florida, police department for information detailing its use of the controversial surveillance tool.

  The ACLU had an appointment last Tuesday to review documents pertaining to a case investigated by a Sarasota police detective. But marshals swooped in at the last minute to grab the records, claiming they belong to the U.S. Marshals Service and barring the police from releasing them.

  ACLU staff attorney Nathan Freed Wessler called the move “truly extraordinary and beyond the worst transparency violations” the group has seen regarding documents detailing police use of the technology.

“ This is consistent with what we’ve seen around the country with federal agencies trying to meddle with public requests for stingray information,” Wessler said, noting that federal authorities have in other cases invoked the Homeland Security Act to prevent the release of such records. “The feds are working very hard to block any release of this information to the public.”

  Stingrays, also known as IMSI catchers, simulate a cellphone tower and trick nearby mobile devices into connecting with them, thereby revealing their location. A stingray can see and record a device’s unique ID number and traffic data, as well as information that points to its location. By moving a stingray around, authorities can triangulate a device’s location with greater precision than is possible using data obtained from a carrier’s fixed tower location.”

 

 

    We’ve posted about the Stingray tracking devices and the company’s harassment of citizen journalists and now we have the Feds stepping in to further prevent the public from learning the truth about this Statist tool .

 

 

 

 

 

 

 

 

 

 

 

 

 

 

How The NSA Could Bug Your Powered-Off iPhone, and How To Stop Them

 

 

 

 

 

” Just because you turned off your phone doesn’t mean the NSA isn’t using it to spy on you.

  Edward Snowden’s latest revelation about the NSA’s snooping inspired an extra dose of shock and disbelief when he said the agency’s hackers can use a mobile phone as a bug even after it’s been turned off. The whistleblower made that eye-opening claim when Brian Williams of NBC Nightly News, holding his iPhone aloft during last Wednesday’s interview, asked, “What can the NSA do with this device if they want to get into my life? Can anyone turn it on remotely if it’s off? Can they turn on apps?

They can absolutely turn them on with the power turned off to the device,” Snowden replied.

  Snowden didn’t offer any details on this seemingly magical feat. But a group of particularly cunning iPhone hackers say it’s possible. They also say you can totally and completely turn off your iPhone so no one—not even the NSA—can use it to spy on you.”

 

 

Learn mored at Wired

 

 

 

 

 

 

 

 

 

 

High Schoolers School Nancy Pelosi On NSA Abuse

 

 

 

     While being confronted about domestic surveillance and fourth amendment violations a group of high school students  get Nancy Pelosi to blame Bush and defend the NSA , thus revealing her to be the tool that she is .

Follow

Get every new post delivered to your Inbox.

Join 5,995 other followers