Category: Privacy


They’re Tracking You Everywhere You Drive

 

 

 

” Towing companies are a necessary evil when it comes to parking enforcement and property repossession. But in the Google Earth we now inhabit, tow trucks do more than just yank cars out of loading zones. They use license-plate readers (LPRs) to assemble a detailed profile of where your car will be and when. That’s an unnecessary evil.

  Plate readers have long been a tool of law enforcement, and police officers swear by them for tracking stolen cars and apprehending dangerous criminals. But private companies, such as repo crews, also photograph millions of plates a day, with scanners mounted on tow trucks and even on purpose-built camera cars whose sole mission is to drive around and collect plate scans. Each scan is GPS-tagged and stamped with the date and time, feeding a massive data trove to any law-enforcement agency—or government-approved private industry—willing to pay for it.

  You’ve probably been tagged at the office, at a mall, or even in your own driveway. And the companies that sell specialized monitoring software that assembles all these sightings into a reliable profile stand to profit hugely. Brian Hauss, a legal fellow for the American Civil Liberties Union (ACLU), says: “The whole point is so you can figure out somebody’s long-term location. Unless there are limits on how those transactions can be processed, I think it’s just a matter of time until there are significant privacy violations, if they haven’t already occurred.”

  (How Is This Even Legal? License-plate-reader companies don’t have access to DMV registrations, so while they can track your car, they don’t know it’s yours. That information is guarded by the Driver’s Privacy Protection Act of 1994, which keeps your name, address, and driving history from public view. Mostly. There are plenty of exceptions, including for insurance companies and private investigators. LPR companies say only two groups can use its software to find the person behind the plate: law-enforcement agencies and repossession companies. In addition, the encrypted databases keep a log of each plate search and allow the ability to restrict access.)

  The companies that push plate readers enjoy unregulated autonomy in most states. Vigilant Solutions of California and its partner, Texas-based Digital Recognition Network, boast at least 2 billion license-plate scans since starting the country’s largest private license-plate database, the National Vehicle Location Service, in 2009.

  In total, there are at least 3 billion license-plate photos in private databases. Since many are duplicates and never deleted, analytics can paint a vivid picture of any motorist. Predicting where and when someone will drive is relatively easy; software can sort how many times a car is spotted in a certain area and, when fed enough data, can generate a person’s driving history over time.”

 

Read the rest at Popular Mechanics

 

 

 

 

 

 

 

 

 

 

 

This Malware Can Hijack A Drone In Seconds

 

 

 

 

 

” If the White House wants to keep drones off the lawn, they might want to give Rahul Sasi a call. He’s developing malware that can hijack a drone in just a few short seconds.

  He calls his malware (fittingly enough) Maldrone, and it doesn’t gain control over its victims the way that previously-demonstrated attacks do. Most others have leveraged the APIs — like the one provided by Parrot for developers who want to tinker with their AR Drones — to do the hijacking.

  But a “Parrot drone is a toy,” Rahul says, and he went to work on an attack that was a bit more generic, able to wreak havoc on multitudes of drones regardless of whether or not the manufacturer exposes anything via an API. Maldrone is the result, and it’s impressive even though it’s very much a work in progress.”

 

    Read more about Maldrone here . In other drone news , DJI has upgraded their firmware creating a 15.5 mile radius no-fly zone around Washington DC .

 

 

 

 

 

 

 

 

 

 

 

 

 

… Clean Your Camera Lens!

 

 

 

 

 

” The NSA has issued a Public Announcement today saying that everyone who owns a laptop, cell phone, smart TV, and any other modern social device with video recording, is advised to clean their camera lens regularly.

  An unnamed member of the NSA has released the statement through their Twitter account adding that “It’s really not good for morale when you see a chick in her bedroom through the laptop, and the camera lens blurs the image because of a smudge or something, especially when she’s pretty hot.” The NSA Twitter account later stated that “if you are under a 5 out of 10 on the hotness scale then you can disregard the advisory.”

  This is not the first very open statement the NSA has made in recent months when they released a tweet saying, “You know what? Everyone knows we’re watching, so we might as well save billions on secrecy and be blatant about it. I mean, the cat’s out of the bag and we, as a tax-powered institution, should just admit it.”

  There have also been hundreds of complaints recently from all collective genders about receiving random and untraceable phone texts while at home, asking the recipients things like, “Turn around a few times” and “It’s a little warm for that sweater, don’t you think?”

  When asked about the recent unprofessional attitude they officially state that “it’s 2015, so get with the times, this is the new standard of government professionalism.”

 

Thanks to Chedoh at The People’s Cube

 

 

 

 

 

 

 

 

 

 

 

 

Does Your State Protect Your Privacy In The Digital Age?

 

Privacy Rights In The Digital Age

 

 

 

” New technologies make it possible for state and local law enforcement agencies to engage in surveillance that used to be prohibitively expensive and/or effectively impossible. The ACLU has been working with legislators across the country to put in place rules to ensure that we can take advantage of these new technologies without becoming a surveillance society in which our every movements are tracked, monitored, and scrutinized by the authorities. Much of our work to that end focuses on: law enforcement access to electronic communications content, location tracking,automatic license plate readers, and domestic surveillance drones.

  If we can address these four issue areas, we will go a long way toward protecting privacy in the digital age. This map provides a snapshot of the states that have already provided privacy protections for some or all of them. Of course, the devil is in the details of these laws, and we encourage you to review the bill text or to check out the ACLU’s blog for more information on just how much protection there is in your state.”

 

Thanks to the ACLU

 

 

 

 

 

 

 

 

 

 

 

 

U.S. Spies On Millions Of Cars

 

 

 

 

” The Justice Department has been building a national database to track in real time the movement of vehicles around the U.S., a secret domestic intelligence-gathering program that scans and stores hundreds of millions of records about motorists, according to current and former officials and government documents.

  The primary goal of the license-plate tracking program, run by the Drug Enforcement Administration, is to seize cars, cash and other assets to combat drug trafficking, according to one government document. But the database’s use has expanded to hunt for vehicles associated with numerous other potential crimes, from kidnappings to killings to rape suspects, say people familiar with the matter.

  Officials have publicly said that they track vehicles near the border with Mexico to help fight drug cartels. What hasn’t been previously disclosed is that the DEA has spent years working to expand the database “throughout the United States,’’ according to one email reviewed by The Wall Street Journal.

Many state and local law-enforcement agencies are accessing the database for a variety of investigations, according to people familiar with the program, putting a wealth of information in the hands of local officials who can track vehicles in real time on major roadways.

  The database raises new questions about privacy and the scope of government surveillance. The existence of the program and its expansion were described in interviews with current and former government officials, and in documents obtained by the American Civil Liberties Union through a Freedom of Information Act request and reviewed by The Wall Street Journal. It is unclear if any court oversees or approves the intelligence-gathering.”

 

Read more

 

 

 

 

 

 

 

 

 

 

 

Google Surrendered Private Data Of WikiLeaks Journalists To US Government

 

 

 

 

Google handed over confidential data of WikiLeaks’ staff to the U.S. government, prompting the whistleblower organization to send a letter to both the search engine giant and the U.S. Department of Justice seeking an explanation.

  WikiLeaks announced on its website on Monday that its investigations editor Sarah Harrison, section editor Joseph Farrell, and senior journalist and spokesperson Kristinn Hrafnsson have received a notice that Google had handed over all their emails and metadata to the U.S. government, which has issued warrants alleging “conspiracy” and “espionage” against the journalists. The charges carry a prison sentence of up to 45 years.

“ The US government is claiming universal jurisdiction to apply the Espionage Act, general Conspiracy statute and the Computer Fraud and Abuse Act to journalists and publishers – a horrifying precedent for press freedoms around the world,” WikiLeaks said on its website.”

 

Read more at IBT

 

 

 

 

 

 

 

 

 

 

 

Illinois Says Rule-Breaking Students Must Give Teachers Their Facebook Passwords

 

 

 

 

 

” School districts in Illinois are telling parents that a new law may require school officials to demand the social media passwords of students if they are suspected in cyberbullying cases or are otherwise suspected of breaking school rules.

  The law, which went into effect on January 1, defines cyberbullying and makes harassment on Facebook, Twitter, or via other digital means a violation of the state’s school code, even if the bullying happens outside of school hours.

  A letter sent out to parents in the Triad Community Unit School District #2, a district located just over the Missouri-Illinois line near St. Louis, that was obtained by Motherboard says that school officials can demand students give them their passwords. The full letter is embedded below.

” If your child has an account on a social networking website, e.g., Facebook, Instagram, Twitter, ask.fm, etc., please be aware that State law requires school authorities to notify you that your child may be asked to provide his or her password for these accounts to school officials in certain circumstances,” the letter says.”

 

Story continues

 

 

 

 

 

 

 

 

 

 

 

New Police Radars Can ‘See’ Inside Homes

 

 

 

 

” At least 50 U.S. law enforcement agencies have secretly equipped their officers with radar devices that allow them to effectively peer through the walls of houses to see whether anyone is inside, a practice raising new concerns about the extent of government surveillance.

  Those agencies, including the FBI and the U.S. Marshals Service, began deploying the radar systems more than two years ago with little notice to the courts and no public disclosure of when or how they would be used. The technology raises legal and privacy issues because the U.S. Supreme Court has said officers generally cannot use high-tech sensors to tell them about the inside of a person’s house without first obtaining a search warrant.

  The radars work like finely tuned motion detectors, using radio waves to zero in on movements as slight as human breathing from a distance of more than 50 feet. They can detect whether anyone is inside of a house, where they are and whether they are moving.

  Current and former federal officials say the information is critical for keeping officers safe if they need to storm buildings or rescue hostages. But privacy advocates and judges have nonetheless expressed concern about the circumstances in which law enforcement agencies may be using the radars — and the fact that they have so far done so without public scrutiny.

” The idea that the government can send signals through the wall of your house to figure out what’s inside is problematic,” said Christopher Soghoian, the American Civil Liberties Union’s principal technologist. “Technologies that allow the police to look inside of a home are among the intrusive tools that police have.”

  Agents’ use of the radars was largely unknown until December, when a federal appeals court in Denver said officers had used one before they entered a house to arrest a man wanted for violating his parole. The judges expressed alarm that agents had used the new technology without a search warrant, warning that “the government’s warrantless use of such a powerful tool to search inside homes poses grave Fourth Amendment questions.”

By then, however, the technology was hardly new. Federal contract records show the Marshals Service began buying the radars in 2012, and has so far spent at least $180,000 on them.

  Justice Department spokesman Patrick Rodenbush said officials are reviewing the court’s decision. He said the Marshals Service “routinely pursues and arrests violent offenders based on pre-established probable cause in arrest warrants” for serious crimes.

  The device the Marshals Service and others are using, known as the Range-R, looks like a sophisticated stud-finder. Its display shows whether it has detected movement on the other side of a wall and, if so, how far away it is — but it does not show a picture of what’s happening inside. The Range-R’s maker, L-3 Communications, estimates it has sold about 200 devices to 50 law enforcement agencies at a cost of about $6,000 each.”

 

 

 

Read more

 

 

 

 

 

 

 

 

 

 

FAA Grants Permits For Drones To Monitor Crops, Photograph Real Estate

 

 

 

 

 

” The Federal Aviation Administration on Tuesday issued permits to use drones to monitor crops and photograph properties for sale, marking the first time permission has been granted to companies involved in agriculture and real estate.

  The exemptions to the current ban on commercial drone flights were granted to Advanced Aviation Solutions in Star, Idaho, for “crop scouting,” and to Douglas Trudeau of Tierra Antigua Realty in Tucson, Arizona.

  Advanced Aviation Solutions plans to use its 1.5-pound, fixed-wing eBee drone to make photographic measurements of farm fields, determine the health of crops and look for pests. The aim is to save farmers time walking through fields. The drone also can carry sensors that pick up information invisible to the naked eye, which can help determine which fields need watering.”

 

 

    Will this latest licensing effort by the Feds morph into yet another example of cronyism and reward towards favored , connected corporations ? Of course . Notice that the film industry was one of the first to gain their exemption from the State .

 

CNS News has more

 

 

 

 

 

 

 

 

 

 

 

 

Facebook Copyright Hoax Goes Viral Again

 

 

 

 

 

” A fake Facebook copyright message claiming to protect users’ media has once again been making the rounds on the social network.

  The message claims to put copyright protections on a user’s posts after they share the status update.

  It typically reads:

” In response to the new Facebook guidelines, I hereby declare that my copyright is attached to all of my personal details, illustrations, comics, paintings, professional photos and videos, etc. (as a result of the Berner Convention). For commercial use of the above my written consent is needed at all times!”

  Here’s the thing: Facebook doesn’t own your posts. Under the social network’s privacy policy, they have the right to distribute and share the things a user posts, subject to their privacy and application settings. (Check out Facebook’s Statement of Rights and Responsibilities here.)

  The hoax doesn’t even have its facts right. A quick Google search will also show that there’s is no such thing as the Berner Convention. (Whoever originated it probably meant to write the Berne convention, which is an international agreement protecting literary and artistic works).

  So breathe a big sigh of relief. Your Facebook profile is fine. If anything, use this as an opportunity to double check your privacy settings by clicking on the lock icon in the upper-right corner of your profile.”

 

Thanks to ABC News

 

 

 

 

 

 

 

 

 

 

Are You Aware Of The Ziplock Method For DUI Checkpoints? Watch, Learn, And Be Amazed

 

 

 

 

” In a video posted to youtube this week, a novel and simply astonishing example of how to deal with DUI checkpoints, was illustrated by the guys from FairDUI.org.

  Sobriety checkpoints — also known as DUI checkpoints — are the most common roadblocks you might encounter. They function as a general purpose investigatory tactic where police can get a close look at passing motorists by detaining them briefly. A roadblock stop is quick, but it gives police a chance to check tags and licenses, while also giving officers a quick whiff of the driver’s breath and a chance to peer into the vehicle for a moment.

  Remember that your constitutional rights still apply in a roadblock situation. Though police are permitted to stop you briefly, they may not search you or your car unless they have probable cause that you’re under the influence or you agree to the search. As such, you are not required to answer their questions or admit to breaking the law.

  In the video, a man hangs his registration, insurance, and driver’s license from his rolled up window inside a ziplock freezer bag, in order to proceed through a DUI checkpoint.”

 

The Free Thought Project

 

 

 

 

 

 

 

 

 

 

License Plate Reader Technology Looks At Faces

 

 

 

 

” The leading suppler of automated license plate reader technology in the US (ALPR, also known as ANPR in Europe) is expanding its offerings to law enforcement. Vehicle owners have already had their movements tracked by the company Vigilant Solutions, which boasts 2 billion entries in its nationwide database, with 70 million additional license plate photographs being added each month. Now passengers can also be tracked if they hitch a ride with a friend and are photographed by a camera aimed at the front of the car. The Livermore, California-based firm recently announced expanded integration of facial recognition technology into its offerings.”

 

 

 

 

 

” ” The new Vigilant Mobile Companion app expands the benefits of license plate recognition and facial recognition technologies to all areas of the agency,” a Vigilant Solutions press release claimed. “Using many of the new analytic tools that Vigilant has released in its Learn product over the last couple of years, the app makes these tools even more easy to use and accessible on a mobile device. The app also features Vigilant’s FaceSearch facial recognition which analyzes over 350 different vectors of the human face.”

 

Read more

 

 

 

 

 

 

 

 

 

 

Cop’s Obama Rant Embarrasses Officials, Spurs 2014 Nanny of the Year Win

 

 

 

” Our nation’s control freaks got even freakier in 2014–from jetpacks to parking apps, eco-ATMs and powdered alcohol, they were determined to kill anything cutting edge.

  They targeted everything from dogs in parks to births at home, and they’ll sic cops on you for hoarding or smelling bad. You might even get busted for doing things that are legal–like vaping while driving, warning motorists about speed traps, or putting up Christmas lights.

  And whether it’s yanking chocolate milk, boogie boards, homemade libraries or sunscreen(?!), the control freaks are (all together now!): Doing it for the children.

  It’s fitting, then, that 2014’s Nanny of the Year recipients justified their power grab on the same grounds (although the real reason may have more to do with protecting city officials from future caught-on-tape embarrassments). “

 

Reason.com

 

 

 

 

 

 

 

 

 

 

On Christmas Eve, NSA Quietly Releases 12 Years Worth Of Internal Reports

 

 

 

” This holiday season, the NSA participated in a longstanding media tradition—dumping a large bit of news during a busy period of time when many likely weren’t paying attention.

  The US spy agency responded to a Freedom of Information Act lawsuit from the American Civil Liberties Union by quietly releasing 12 years worth of internal reports on Christmas Eve. Several included reports were previously withheld illegally, and they became the subject of the FOIA lawsuit in 2009.

  The new trove of information has inspired a different breed of headlines, such as “Highlights From Newly Released NSA Oversight Reports Reveal Bumbling Ineptitude But No Evidence Of Systematic Abuse” from Forbes. The newly discovered errors ran the gamut, including American data being e-mailed to unauthorized recipients, data being kept on unsecured computers, and sensitive information being sent to the wrong printer.”

 

 

 

 

 

Ars Technica has more

 

 

 

 

 

 

 

 

 

 

Hackers Released An Enormous Cache Of 13,000 Passwords And Credit Cards

 

 

 

 

 

” On Friday, a group claiming affiliation with the loose hacker collective Anonymous released a document containing approximately 13,000 username-and-password combinations along with credit card numbers and expiration dates.

  The stolen personal information was released in a massive text file posted the document sharing site Ghostbin. The compromised sites run the gamut from pornography to gaming to online shopping. 

  Some of the most significant leaks came from online video gaming networks like Xbox Live, the Sony PlayStation Network, and Twitch.tv. There was information from accounts at Walmart, Amazon, and Hulu Plus, as well as keys to computer games like The Sims 3 and Dragon Age: Origins, and a whole lot of porn sites.

  Some Anonymous members have pushed back on the assertion that this leak had anything to do with the hacktivist group. Anonymous has no official leadership or centralized organizational structure; instead, it functions as a loose affiliation of computer hackers that join together in support of various causes, ranging from battles with the Church of Scientology to doxing members of the KKK. If hackers branding themselves as Anonymous carry out a particular action, it doesn’t necessarily mean it’s any of the same people who have carried out any other Anonymous-branded action.

  Judging from the document, the following sites were compromised or, at the very least, had some of their user data stolen—possibly through malware installed onto users’ personal devices or other nefarious methods.

 

  • Amazon
  • Walmart
  • PlayStation Network
  • Xbox Live
  • Twitch.tv
  • Origin.com
  • Hulu Plus
  • Dell
  • Brazzers
  • lKnowThatGirl
  • Mofos
  • DigitalPlayground
  • Wicked
  • Twistys
  • Fantyasyhd
  • Puremature
  • Tiny4k
  • MotherFuckerXxx
  • Playboy
  • CastingCouchX
  • BangBros
  • POVD
  • BabesNetwork
  • ArtisticAddiction
  • X-art
  • Shutterstock
  • Platinumclub.com
  • AprilJordan.com
  • DareDorm
  • PrettyPetites
  • NaughtyAmerica
  • PornAccess
  • RookieBabe
  • GFMembersPass
  • HungarianHoneys
  • PleaseBangMyWife “

 

Daily Dot has more

 

 

 

 

 

 

 

 

 

 

 

How Hillary Could Make ObamaCare Worse

 

 

 

 

” An ABC-Washington Post poll shows 61 percent of Democrats support Hillary Clinton for president in 2016, far more than other contenders. If she wins the White House, health reform could become even more painful than ObamaCare.

  Clinton ducks questions about her views on health reform. But the plan she proposed in 1993, as first lady, raises concerns.

  That proposal was even more coercive than ObamaCare. She put price controls on doctors and limits on how much health care the nation could consume annually and how much you could buy for your own family — even if you paid for it yourself.

  True, that was 20 years ago. But it’s an important window into her thinking.

  Before Americans choose candidates for 2016, they ought to ask how much power they want government to have over their health care and whether Clinton stands by the coercive plan she proposed the last time she was in the White House.

  Start with whether the government should force us to have insurance. The Obama administration is using ads and street fairs to convince people to get covered. Millions are still saying “no.” ObamaCare penalizes the uninsured but also offers exemptions, including just pleading “hardship.” “

 

NY Post

 

 

 

 

 

 

 

 

 

The CIA Agent At The Center Of The Bin Laden Raid Has Been Outed

 

 

 

” In the film “Zero Dark Thirty” she was known as “Maya,” the CIA analyst who spent years doggedly tracking down Osama bin Laden, then identifying his body when US Navy Seal Team Six killed him during a raid in Pakistan.

  In real life, however, her story is more complicated, with ties to the rendition and torture of terrorist suspects, as well as a missed opportunity to head off the attacks of 9/11. And now she has been forced out of the shadows, with several news outlets revealing her identity.

  Most recently, that’s the website The Intercept, whose stated missions are “to provide a platform to report on the documents previously provided by NSA whistleblower Edward Snowden” and “to produce fearless, adversarial journalism across a wide range of issues.”

  For years, the CIA has argued forcibly against naming the analyst, frequently referred to as a bin Laden expert. Some outlets, including the Associated Press, have agreed to use only her middle name — Frances — because both her first and last names are unusual and easily identifiable.

” We would strongly object to attaching anyone’s name given the current environment,” CIA representative Ryan Trapani told The Intercept in an email. In a follow-up voicemail he added: “There are crazy people in this world and we are trying to mitigate those threats.”

  In reply, Glenn Greenwald and Peter Maass wrote Friday: “The Intercept is naming [the analyst] over CIA objections because of her key role in misleading Congress about the agency’s use of torture, and her active participation in the torture program (including playing a direct part in the torture of at least one innocent detainee). Moreover, [the analyst] has already been publicly identified by news organizations as the CIA officer responsible for many of these acts.” “

 

Read the rest

 

 

 

 

 

 

 

 

 

 

 

Cellphone Privacy Is Shaky, Researchers Say

 

 

 

” German researchers have discovered security flaws that could let hackers, spies, and criminals listen to private phone calls and intercept text messages on a potentially massive scale — even when cellular networks are using the most advanced encryption available.

  The flaws, to be reported at a hacker conference in Hamburg this month, are the latest evidence of widespread insecurity on SS7, the global network that allows the world’s cellular carriers to route calls, texts, and other data to one another. Experts say it’s increasingly clear that SS7, designed in the 1980s, is riddled with serious vulnerabilities.

  The flaws discovered by the Germans are actually functions built into SS7 for other purposes, such as keeping calls connected as users speed down highways, switching from cell tower to cell tower. Hackers can repurpose them because of the lax security on the network.”

 

Read more at the Boston Globe

 

 

 

 

 

 

 

 

 

Cops Illegally Nailed Webcam To Utility Pole For 6 Weeks To Spy On House

 

 

 

” A federal judge on Monday tossed evidence that was gathered by a webcam—turned on for six weeks—that the authorities nailed to a utility pole 100 yards from a suspected drug dealer’s rural Washington state house.

  The Justice Department contended that the webcam, with pan-and-zoom capabilities that were operated from afar, was no different from a police officer’s observation from the public right-of-way.

The government argued (PDF):

  The advantage of a police camera to law enforcement is that it saves the time and manpower required to conduct around the clock surveillance. As in this case, law enforcement is authorized to use the pole camera only to record activities that are otherwise open to public view, and not protected by the 4th Amendment.

  US District Judge Edward Shea disagreed and ruled (PDF) that a warrant was necessary to spy on Leonel Vargas via a webcam controlled by local police.”

 

 

Somehow this little tidbit doesn’t surprise us:

 

 

” Strangely, the judge noted, when the authorities raided the house in May 2013, the camera was panned on nearby sagebrush and not the house.”

 

 

ArsTechnica

 

 

 

 

 

 

 

 

 

New York Flags 278 Gun Owners As “Mentally Unstable”

 

 

 

 

” New York State’s tough new SAFE Act gun control law has flagged 278 gun owners who could lose their weapons because they have been deemed mentally unstable, a new report shows.

  Gov. Andrew Cuomo urged lawmakers to pass the SAFE Act quickly after the 2012 mass shooting at the Sandy Hook elementary school in Newtown, Conn.

  The Syracuse Post-Standard reported last week that since the law’s enactment, the state has collected 38,718 names in a database of individuals who have been found at-risk for owning guns by psychiatrists and other health professionals.

  The paper said when the database was checked against a list of pistol permit holders in the state, there were 278 matches, less than 1 percent.

  Monroe County had the most matches at 36, followed by Westchester, 17, Suffolk, 16 and Dutchess, 14. “

 

Fox News

 

 

 

 

 

 

 

 

 

 

 

Cops Are Scanning Social Media To Assign You A “Threat Rating”

police-social-media-threat-rating

 

 

” Online activity, purchases, and “comments that could be construed as offensive,” all contribute to your threat score.

  Imagine the following scenario: You are on your way home from work, driving down the road, when you notice police lights in your rear view mirror. You are being pulled over.

  As you sit there, on the shoulder, adrenaline rushing, simultaneously angry and nervous, the police officer, in his patrol car behind you, is sizing you up based on an algorithm that determines your “threat rating.” 

  The officer enters your license plate into a mobile application on his laptop. In a matter of seconds, this application crawls over billions of records in commercial and public databases, including all available social media engagement, recent purchases and “any comments that could be construed as offensive.” The application then determines if your “threat rating” is green, yellow, or red.”

 

 

 

 

 

 

 

 

” Imagine that you are one of our informed and frequent readers and understand the importance of police accountability and are unafraid to voice your completely peaceful, yet strong opinion about police misconduct. Imagine that you left a comment on Facebook this morning about a particular officer’s misconduct; imagine that it is this particular officer who just pulled you over.

  Up until this point, you have never committed a crime, you have never been violent, you have never even so much as run a stop sign. However, this police officer now knows that you made a comment about him punching the (insert handcuffed and helpless victim example here) on Facebook, and he literally sees red (your threat rating).

  What happens next? Does a routine traffic stop for driving 10 miles over the speed limit morph into a situation in which you now have a Smith and Wesson M&P 9mm pistol with Streamlight TLR-2s laser site being aimed just above your left ear?

  Do you receive multiple erroneous citations because this officer now has access to your personal life? Do you get cited where the officer would have otherwise let someone else go?

  Or, maybe you are a cop or a judge, or the mayor, but this application confuses you with someone else and marks you as “red,” then what? What if you are driving someone else’s car?

  The reality is, that any number of unimaginable things can and would happen next. And now, thanks to a particularly ominous product, by a company named Intrado, and the Orwellian nature of police in this country, those unimaginable situations are now a reality.

Read more at The Free Thought Project

 

 

 

 

 

 

 

 

 

 

 

Prof: ‘Elf On The Shelf’ Conditions Kids To Accept Surveillance State

 

 

 

 

Could there be something more sinister behind the little elf sitting on the shelf who returns to the North Pole each night?

  Yes, says Laura Pinto, a digital technology professor at the University of Ontario Institute of Technology.

  She recently published a paper titled “Who’s the Boss” on the doll, saying the idea of it reporting back to Santa each night on the child’s behavior “sets up children for dangerous, uncritical acceptance of power structures,” according to insideHalton.com.

  From her paper:

  When children enter the play world of The Elf on the Shelf, they accept a series of practices and rules associated with the larger story. This, of course, is not unique to The Elf on the Shelf. Many children’s games, including board games and video games, require children to participate while following a prescribed set of rules. The difference, however, is that in other games, the child role-plays a character, or the child imagines herself within a play-world of the game, but the role play does not enter the child’s real world as part of the game. As well, in most games, the time of play is delineated (while the game goes on), and the play to which the rules apply typically does not overlap with the child’s real world.

“  You’re teaching (kids) a bigger lesson, which is that it’s OK for other people to spy on you and you’re not entitled to privacy,” she tells the Toronto Star. “

 

Read the rest

 

 

 

 

 

 

 

 

 

 

Spy Drone Hacks WiFi Networks, Listens To Calls

 

 

WIFI Hacking Drone

 

 

” It’s small. It’s bright yellow, and it’s capable of cracking Wi-Fi passwords, eavesdropping on your cell phone calls and reading your text messages. It’s an unmanned spy drone and it just landed in Washington, D.C.

  Long-time friends and former Air Force buddies, Mike Tassey and Rich Perkins, describe their state-of-the-art cyber drone as hard to take down, hard to see and virtually hard to detect.”

 

 

Mike Tassey, Rich Perkins: Wireless Ariel Surveillance

 

 

” They built it in a garage, using off the shelf electronics to prove a drone can be used to launch cyber-attacks.

  It needs a human for take-off and landing but once airborne, it can fly any pre-programmed route posing as a cell phone tower and tricking wireless cell phones.

” We passed telephone calls, hacked into networks, cracked the encryption on Wi-Fi access points all of that sort of evilness is possible,” said Tassey.”

 

 

Read more

 

 

 

 

 

 

 

 

 

Congress Has Just Overruled Your 1st, 4th And 5th Amendment Rights

 

 

 

” As of today, Bill HR4681 has passed the house and senate, and is currently undergoing arbitration before being sent to the President for his signature in to law. The law says that the intelligence community can collect, retain, and disseminate all electronic communications including voice calls [without any constitutional restrictions] on all US citizens and everyone else in the world.  And they have 5 years before they are supposed to destroy the records.  However, they can keep them indefinitely if they fall into several categories of interest.

  It is all out in the open now.  Your 1st, 4th, and 5th Amendment protections are gone.  This act gives new meaning to ‘land of the free, home of the brave.’  The intelligence community isn’t doing anything in secret any more.  Americans are now living in an environment much like the days of the old Stalinist Soviet Union, where the presumption was that all conversations were monitored and one takes measures to have a ‘private’ conversations. 

  So turn up your radio or turn the water on in the sink and watch what you say on the phone or Facebook, even casual remarks on twitter may come back to haunt you in the future.  Don’t believe me, I have pasted the relevant parts of the bill below this story. Still don’t believe it? Just go to www.congress.gov/bill/113th-congress/house-bill/4681/text and read it from the horse’s mouth.

What are you willing to do about it?

[Congressional Bills 113th Congress]

[From the U.S. Government Printing Office]

 

[H.R. 4681 Enrolled Bill (ENR)]

H.R.4681

One Hundred Thirteenth Congress

of the

United States of America

TITLE III–GENERAL PROVISIONS

Subtitle A–General Matters

Sec. 309. Procedures for the retention of incidentally acquired

communications.

SEC. 309. PROCEDURES FOR THE RETENTION OF INCIDENTALLY ACQUIRED

COMMUNICATIONS.

(a) Definitions.–In this section:

(1) Covered communication.–The term “covered communication”

means any nonpublic telephone or electronic communication acquired

without the consent of a person who is a party to the

communication, including communications in electronic storage.

(2) Head of an element of the intelligence community.–The term

“head of an element of the intelligence community” means, as

appropriate–

(A) the head of an element of the intelligence community;

or

(B) the head of the department or agency containing such

element.

(3) United states person.–The term “United States person”

has the meaning given that term in section 101 of the Foreign

Intelligence Surveillance Act of 1978 (50 U.S.C. 1801).

(b) Procedures for Covered Communications.–

(1) Requirement to adopt.–Not later than 2 years after the

date of the enactment of this Act each head of an element of the

intelligence community shall adopt procedures approved by the

Attorney General for such element that ensure compliance with the

requirements of paragraph (3).

(2) Coordination and approval.–The procedures required by

paragraph (1) shall be–

(A) prepared in coordination with the Director of National

Intelligence; and

(B) approved by the Attorney General prior to issuance.

(3) Procedures.–

(A) Application.–The procedures required by paragraph (1)

shall apply to any intelligence collection activity not

otherwise authorized by court order (including an order or

certification issued by a court established under subsection

(a) or (b) of section 103 of the Foreign Intelligence

Surveillance Act of 1978 (50 U.S.C. 1803)), subpoena, or

similar legal process that is reasonably anticipated to result

in the acquisition of a covered communication to or from a

United States person and shall permit the acquisition,

retention, and dissemination of covered communications subject

to the limitation in subparagraph (B).

(B) Limitation on retention.–A covered communication shall

not be retained in excess of 5 years, unless–

(i) the communication has been affirmatively

determined, in whole or in part, to constitute foreign

intelligence or counterintelligence or is necessary to

understand or assess foreign intelligence or

counterintelligence;

(ii) the communication is reasonably believed to

constitute evidence of a crime and is retained by a law

enforcement agency;

(iii) the communication is enciphered or reasonably

believed to have a secret meaning;

(iv) all parties to the communication are reasonably

believed to be non-United States persons;

(v) retention is necessary to protect against an

imminent threat to human life, in which case both the

nature of the threat and the information to be retained

shall be reported to the congressional intelligence

committees not later than 30 days after the date such

retention is extended under this clause;

(vi) retention is necessary for technical assurance or

compliance purposes, including a court order or discovery

obligation, in which case access to information retained

for technical assurance or compliance purposes shall be

reported to the congressional intelligence committees on an

annual basis; or

(vii) retention for a period in excess of 5 years is

approved by the head of the element of the intelligence

community responsible for such retention, based on a

determination that retention is necessary to protect the

national security of the United States, in which case the

head of such element shall provide to the congressional

intelligence committees a written certification

describing–

 

(I) the reasons extended retention is necessary to

protect the national security of the United States;

(II) the duration for which the head of the element

is authorizing retention;

(III) the particular information to be retained;

and

(IV) the measures the element of the intelligence

community is taking to protect the privacy interests of

United States persons or persons located inside the

United States. “

 

 

 

 

 

   Many thanks to Universal Free Press for providing this story . Below the reader can see who voted to rob you of your rights and who voted against Statism …

 

 

 

 

 

VOTE PARTY REPRESENTATIVE DISTRICT
Alabama
YEA   R   Byrne, Bradley AL 1st
YEA   R   Roby, Martha AL 2nd
YEA   R   Rogers, Mike AL 3rd
YEA   R   Aderholt, Robert AL 4th
NAY   R   Brooks, Mo AL 5th
YEA   R   Bachus, Spencer AL 6th
YEA   D   Sewell, Terri AL 7th
Alaska
YEA   R   Young, Don AK
Arizona
YEA   D   Kirkpatrick, Ann AZ 1st
YEA   D   Barber, Ron AZ 2nd
NAY   D   Grijalva, Raúl AZ 3rd
NAY   R   Gosar, Paul AZ 4th
NAY   R   Salmon, Matt AZ 5th
YEA   R   Schweikert, David AZ 6th
YEA   D   Pastor, Ed AZ 7th
YEA   R   Franks, Trent AZ 8th
YEA   D   Sinema, Kyrsten AZ 9th
Arkansas
YEA   R   Crawford, Eric AR 1st
YEA   R   Griffin, Tim AR 2nd
YEA   R   Womack, Steve AR 3rd
YEA   R   Cotton, Tom AR 4th
California
YEA   R   LaMalfa, Doug CA 1st
NAY   D   Huffman, Jared CA 2nd
NAY   D   Garamendi, John CA 3rd
NAY   R   McClintock, Tom CA 4th
YEA   D   Thompson, Mike CA 5th
NAY   D   Matsui, Doris CA 6th
YEA   D   Bera, Ami CA 7th
YEA   R   Cook, Paul CA 8th
YEA   D   McNerney, Jerry CA 9th
YEA   R   Denham, Jeff CA 10th
YEA   D   Miller, George CA 11th
YEA   D   Pelosi, Nancy CA 12th
NAY   D   Lee, Barbara CA 13th
NAY   D   Speier, Jackie CA 14th
NAY   D   Swalwell, Eric CA 15th
YEA   D   Costa, Jim CA 16th
NAY   D   Honda, Mike CA 17th
NAY   D   Eshoo, Anna CA 18th
NAY   D   Lofgren, Zoe CA 19th
NAY   D   Farr, Sam CA 20th
YEA   R   Valadao, David CA 21st
YEA   R   Nunes, Devin CA 22nd
YEA   R   McCarthy, Kevin CA 23rd
YEA   D   Capps, Lois CA 24th
YEA   R   McKeon, Buck CA 25th
YEA   D   Brownley, Julia CA 26th
NAY   D   Chu, Judy CA 27th
YEA   D   Schiff, Adam CA 28th
YEA   D   Cárdenas, Tony CA 29th
YEA   D   Sherman, Brad CA 30th
NO VOTE   R   Miller, Gary CA 31st
YEA   D   Napolitano, Grace CA 32nd
YEA   D   Waxman, Henry CA 33rd
YEA   D   Becerra, Xavier CA 34th
NO VOTE   D   Negrete McLeod, Gloria CA 35th
YEA   D   Ruiz, Raul CA 36th
NAY   D   Bass, Karen CA 37th
YEA   D   Sánchez, Linda CA 38th
YEA   R   Royce, Ed CA 39th
YEA   D   Roybal-Allard, Lucille CA 40th
NAY   D   Takano, Mark CA 41st
YEA   R   Calvert, Ken CA 42nd
NAY   D   Waters, Maxine CA 43rd
NAY   D   Hahn, Janice CA 44th
NO VOTE   R   Campbell, John CA 45th
YEA   D   Sanchez, Loretta CA 46th
NAY   D   Lowenthal, Alan CA 47th
NAY   R   Rohrabacher, Dana CA 48th
YEA   R   Issa, Darrell CA 49th
YEA   R   Hunter, Duncan CA 50th
YEA   D   Vargas, Juan CA 51st
YEA   D   Peters, Scott CA 52nd
YEA   D   Davis, Susan CA 53rd
Colorado
YEA   D   DeGette, Diana CO 1st
NAY   D   Polis, Jared CO 2nd
NAY   R   Tipton, Scott CO 3rd
YEA   R   Gardner, Cory CO 4th
YEA   R   Lamborn, Doug CO 5th
YEA   R   Coffman, Mike CO 6th
YEA   D   Perlmutter, Ed CO 7th
Connecticut
YEA   D   Larson, John CT 1st
YEA   D   Courtney, Joe CT 2nd
YEA   D   DeLauro, Rosa CT 3rd
YEA   D   Himes, James CT 4th
YEA   D   Esty, Elizabeth CT 5th
Delaware
YEA   D   Carney, John DE
Florida
NO VOTE   R   Miller, Jeff FL 1st
YEA   R   Southerland, Steve FL 2nd
NAY   R   Yoho, Ted FL 3rd
YEA   R   Crenshaw, Ander FL 4th
YEA   D   Brown, Corrine FL 5th
YEA   R   DeSantis, Ron FL 6th
NAY   R   Mica, John FL 7th
NAY   R   Posey, Bill FL 8th
NAY   D   Grayson, Alan FL 9th
YEA   R   Webster, Daniel FL 10th
NAY   R   Nugent, Richard FL 11th
YEA   R   Bilirakis, Gus FL 12th
YEA   R   Jolly, David FL 13th
YEA   D   Castor, Kathy FL 14th
YEA   R   Ross, Dennis FL 15th
YEA   R   Buchanan, Vern FL 16th
YEA   R   Rooney, Thomas FL 17th
YEA   D   Murphy, Patrick FL 18th
NAY   R   Clawson, Curt FL 19th
NAY   D   Hastings, Alcee FL 20th
YEA   D   Deutch, Theodore FL 21st
YEA   D   Frankel, Lois FL 22nd
YEA   D   Wasserman Schultz, Debbie FL 23rd
YEA   D   Wilson, Frederica FL 24th
YEA   R   Diaz-Balart, Mario FL 25th
NAY   D   Garcia, Joe FL 26th
YEA   R   Ros-Lehtinen, Ileana FL 27th
Georgia
NAY   R   Kingston, Jack GA 1st
YEA   D   Bishop, Sanford GA 2nd
YEA   R   Westmoreland, Lynn GA 3rd
YEA   D   Johnson, Hank GA 4th
NAY   D   Lewis, John GA 5th
YEA   R   Price, Tom GA 6th
NAY   R   Woodall, Rob GA 7th
NAY   R   Scott, Austin GA 8th
YEA   R   Collins, Doug GA 9th
NAY   R   Broun, Paul GA 10th
YEA   R   Gingrey, Phil GA 11th
YEA   D   Barrow, John GA 12th
YEA   D   Scott, David GA 13th
NAY   R   Graves, Tom GA 14th
Hawaii
NAY   D   Hanabusa, Colleen HI 1st
YEA   D   Gabbard, Tulsi HI 2nd
Idaho
NAY   R   Labrador, Raúl ID 1st
YEA   R   Simpson, Mike ID 2nd
Illinois
YEA   D   Rush, Bobby IL 1st
YEA   D   Kelly, Robin IL 2nd
YEA   D   Lipinski, Daniel IL 3rd
NAY   D   Gutiérrez, Luis IL 4th
YEA   D   Quigley, Mike IL 5th
YEA   R   Roskam, Peter IL 6th
YEA   D   Davis, Danny IL 7th
NO VOTE   D   Duckworth, Tammy IL 8th
NAY   D   Schakowsky, Jan IL 9th
YEA   D   Schneider, Bradley IL 10th
YEA   D   Foster, Bill IL 11th
YEA   D   Enyart, William IL 12th
YEA   R   Davis, Rodney IL 13th
YEA   R   Hultgren, Randy IL 14th
YEA   R   Shimkus, John IL 15th
YEA   R   Kinzinger, Adam IL 16th
YEA   D   Bustos, Cheri IL 17th
VOTE PARTY REPRESENTATIVE DISTRICT
YEA   R   Schock, Aaron IL 18th
Indiana
YEA   D   Visclosky, Peter IN 1st
YEA   R   Walorski, Jackie IN 2nd
YEA   R   Stutzman, Marlin IN 3rd
YEA   R   Rokita, Todd IN 4th
YEA   R   Brooks, Susan IN 5th
YEA   R   Messer, Luke IN 6th
YEA   D   Carson, André IN 7th
YEA   R   Bucshon, Larry IN 8th
YEA   R   Young, Todd IN 9th
Iowa
YEA   D   Braley, Bruce IA 1st
YEA   D   Loebsack, David IA 2nd
YEA   R   Latham, Tom IA 3rd
YEA   R   King, Steve IA 4th
Kansas
NAY   R   Huelskamp, Tim KS 1st
YEA   R   Jenkins, Lynn KS 2nd
YEA   R   Yoder, Kevin KS 3rd
YEA   R   Pompeo, Mike KS 4th
Kentucky
YEA   R   Whitfield, Ed KY 1st
YEA   R   Guthrie, Brett KY 2nd
NAY   D   Yarmuth, John KY 3rd
NAY   R   Massie, Thomas KY 4th
YEA   R   Rogers, Hal KY 5th
YEA   R   Barr, Andy KY 6th
Louisiana
YEA   R   Scalise, Steve LA 1st
YEA   D   Richmond, Cedric LA 2nd
YEA   R   Boustany, Charles LA 3rd
YEA   R   Fleming, John LA 4th
YEA   R   McAllister, Vance LA 5th
YEA   R   Cassidy, Bill LA 6th
Maine
YEA   D   Pingree, Chellie ME 1st
YEA   D   Michaud, Michael ME 2nd
Maryland
YEA   R   Harris, Andy MD 1st
YEA   D   Ruppersberger, A. Dutch MD 2nd
YEA   D   Sarbanes, John MD 3rd
YEA   D   Edwards, Donna MD 4th
YEA   D   Hoyer, Steny MD 5th
YEA   D   Delaney, John MD 6th
NAY   D   Cummings, Elijah MD 7th
YEA   D   Van Hollen, Chris MD 8th
Massachusetts
YEA   D   Neal, Richard MA 1st
NAY   D   McGovern, Jim MA 2nd
YEA   D   Tsongas, Niki MA 3rd
YEA   D   Kennedy, Joseph MA 4th
NAY   D   Clark, Katherine MA 5th
NAY   D   Tierney, John MA 6th
NO VOTE   D   Capuano, Michael MA 7th
YEA   D   Lynch, Stephen MA 8th
YEA   D   Keating, William MA 9th
Michigan
YEA   R   Benishek, Dan MI 1st
YEA   R   Huizenga, Bill MI 2nd
NAY   R   Amash, Justin MI 3rd
YEA   R   Camp, Dave MI 4th
NAY   D   Kildee, Daniel MI 5th
YEA   R   Upton, Fred MI 6th
YEA   R   Walberg, Tim MI 7th
YEA   R   Rogers, Mike MI 8th
YEA   D   Levin, Sander MI 9th
YEA   R   Miller, Candice MI 10th
NAY   R   Bentivolio, Kerry MI 11th
YEA   D   Dingell, John MI 12th
NAY   D   Conyers, John MI 13th
YEA   D   Peters, Gary MI 14th
Minnesota
YEA   D   Walz, Timothy MN 1st
YEA   R   Kline, John MN 2nd
YEA   R   Paulsen, Erik MN 3rd
NAY   D   McCollum, Betty MN 4th
YEA   D   Ellison, Keith MN 5th
YEA   R   Bachmann, Michele MN 6th
YEA   D   Peterson, Collin MN 7th
YEA   D   Nolan, Richard MN 8th
Mississippi
YEA   R   Nunnelee, Alan MS 1st
YEA   D   Thompson, Bennie MS 2nd
YEA   R   Harper, Gregg MS 3rd
YEA   R   Palazzo, Steven MS 4th
Missouri
YEA   D   Clay, Lacy MO 1st
YEA   R   Wagner, Ann MO 2nd
YEA   R   Luetkemeyer, Blaine MO 3rd
YEA   R   Hartzler, Vicky MO 4th
YEA   D   Cleaver, Emanuel MO 5th
YEA   R   Graves, Sam MO 6th
YEA   R   Long, Billy MO 7th
YEA   R   Smith, Jason MO 8th
Montana
YEA   R   Daines, Steve MT
Nebraska
YEA   R   Fortenberry, Jeff NE 1st
YEA   R   Terry, Lee NE 2nd
YEA   R   Smith, Adrian NE 3rd
Nevada
YEA   D   Titus, Dina NV 1st
YEA   R   Amodei, Mark NV 2nd
YEA   R   Heck, Joseph NV 3rd
YEA   D   Horsford, Steven NV 4th
New Hampshire
YEA   D   Shea-Porter, Carol NH 1st
YEA   D   Kuster, Ann NH 2nd
New Jersey
YEA   D   Norcross, Donald NJ 1st
YEA   R   LoBiondo, Frank NJ 2nd
YEA   R   Runyan, Jon NJ 3rd
YEA   R   Smith, Chris NJ 4th
NAY   R   Garrett, Scott NJ 5th
NAY   D   Pallone, Frank NJ 6th
YEA   R   Lance, Leonard NJ 7th
YEA   D   Sires, Albio NJ 8th
YEA   D   Pascrell, Bill NJ 9th
YEA   D   Payne, Donald NJ 10th
YEA   R   Frelinghuysen, Rodney NJ 11th
NAY   D   Holt, Rush NJ 12th
New Mexico
YEA   D   Lujan Grisham, Michelle NM 1st
YEA   R   Pearce, Steve NM 2nd
YEA   D   Luján, Ben NM 3rd
New York
YEA   D   Bishop, Timothy NY 1st
YEA   R   King, Pete NY 2nd
YEA   D   Israel, Steve NY 3rd
YEA   D   McCarthy, Carolyn NY 4th
YEA   D   Meeks, Gregory NY 5th
YEA   D   Meng, Grace NY 6th
NAY   D   Velázquez, Nydia NY 7th
YEA   D   Jeffries, Hakeem NY 8th
NAY   D   Clarke, Yvette NY 9th
NAY   D   Nadler, Jerrold NY 10th
YEA   R   Grimm, Michael NY 11th
YEA   D   Maloney, Carolyn NY 12th
NAY   D   Rangel, Charles NY 13th
YEA   D   Crowley, Joseph NY 14th
NAY   D   Serrano, José NY 15th
YEA   D   Engel, Eliot NY 16th
YEA   D   Lowey, Nita NY 17th
YEA   D   Maloney, Sean NY 18th
NAY   R   Gibson, Christopher NY 19th
YEA   D   Tonko, Paul NY 20th
YEA   D   Owens, William NY 21st
YEA   R   Hanna, Richard NY 22nd
YEA   R   Reed, Tom NY 23rd
YEA   D   Maffei, Daniel NY 24th
YEA   D   Slaughter, Louise NY 25th
YEA   D   Higgins, Brian NY 26th
YEA   R   Collins, Chris NY 27th
North Carolina
YEA   D   Butterfield, G.K. NC 1st
YEA   R   Ellmers, Renee NC 2nd
NAY   R   Jones, Walter NC 3rd
YEA   D   Price, David NC 4th
YEA   R   Foxx, Virginia NC 5th
YEA   R   Coble, Howard NC 6th
YEA   D   McIntyre, Mike NC 7th
VOTE PARTY REPRESENTATIVE DISTRICT
YEA   R   Hudson, Richard NC 8th
YEA   R   Pittenger, Robert NC 9th
YEA   R   McHenry, Patrick NC 10th
NAY   R   Meadows, Mark NC 11th
YEA   D   Adams, Alma NC 12th
YEA   R   Holding, George NC 13th
North Dakota
YEA   R   Cramer, Kevin ND
Ohio
YEA   R   Chabot, Steve OH 1st
YEA   R   Wenstrup, Brad OH 2nd
YEA   D   Beatty, Joyce OH 3rd
NAY   R   Jordan, Jim OH 4th
YEA   R   Latta, Robert OH 5th
YEA   R   Johnson, Bill OH 6th
YEA   R   Gibbs, Bob OH 7th
NAY   D   Kaptur, Marcy OH 9th
YEA   R   Turner, Michael OH 10th
YEA   D   Fudge, Marcia OH 11th
YEA   R   Tiberi, Pat OH 12th
YEA   D   Ryan, Tim OH 13th
YEA   R   Joyce, David OH 14th
YEA   R   Stivers, Steve OH 15th
YEA   R   Renacci, James OH 16th
Oklahoma
NAY   R   Bridenstine, Jim OK 1st
YEA   R   Mullin, Markwayne OK 2nd
YEA   R   Lucas, Frank OK 3rd
YEA   R   Cole, Tom OK 4th
YEA   R   Lankford, James OK 5th
Oregon
NAY   D   Bonamici, Suzanne OR 1st
YEA   R   Walden, Greg OR 2nd
NAY   D   Blumenauer, Earl OR 3rd
NAY   D   DeFazio, Peter OR 4th
NO VOTE   D   Schrader, Kurt OR 5th
Pennsylvania
YEA   D   Brady, Robert PA 1st
YEA   D   Fattah, Chaka PA 2nd
YEA   R   Kelly, Mike PA 3rd
NAY   R   Perry, Scott PA 4th
YEA   R   Thompson, Glenn PA 5th
YEA   R   Gerlach, Jim PA 6th
YEA   R   Meehan, Patrick PA 7th
YEA   R   Fitzpatrick, Michael PA 8th
YEA   R   Shuster, Bill PA 9th
YEA   R   Marino, Tom PA 10th
YEA   R   Barletta, Lou PA 11th
YEA   R   Rothfus, Keith PA 12th
YEA   D   Schwartz, Allyson PA 13th
NAY   D   Doyle, Mike PA 14th
YEA   R   Dent, Charles PA 15th
YEA   R   Pitts, Joseph PA 16th
YEA   D   Cartwright, Matthew PA 17th
YEA   R   Murphy, Tim PA 18th
Rhode Island
YEA   D   Cicilline, David RI 1st
YEA   D   Langevin, Jim RI 2nd
South Carolina
NAY   R   Sanford, Mark SC 1st
YEA   R   Wilson, Joe SC 2nd
NAY   R   Duncan, Jeff SC 3rd
NAY   R   Gowdy, Trey SC 4th
NAY   R   Mulvaney, Mick SC 5th
YEA   D   Clyburn, Jim SC 6th
YEA   R   Rice, Tom SC 7th
South Dakota
YEA   R   Noem, Kristi SD
Tennessee
NAY   R   Roe, Phil TN 1st
NAY   R   Duncan, John TN 2nd
YEA   R   Fleischmann, Chuck TN 3rd
NAY   R   DesJarlais, Scott TN 4th
YEA   D   Cooper, Jim TN 5th
YEA   R   Black, Diane TN 6th
YEA   R   Blackburn, Marsha TN 7th
YEA   R   Fincher, Stephen TN 8th
NAY   D   Cohen, Steve TN 9th
Texas
NAY   R   Gohmert, Louie TX 1st
NAY   R   Poe, Ted TX 2nd
YEA   R   Johnson, Sam TX 3rd
NO VOTE   R   Hall, Ralph TX 4th
YEA   R   Hensarling, Jeb TX 5th
YEA   R   Barton, Joe TX 6th
YEA   R   Culberson, John TX 7th
YEA   R   Brady, Kevin TX 8th
YEA   D   Green, Al TX 9th
YEA   R   McCaul, Michael TX 10th
YEA   R   Conaway, Michael TX 11th
YEA   R   Granger, Kay TX 12th
YEA   R   Thornberry, Mac TX 13th
NAY   R   Weber, Randy TX 14th
YEA   D   Hinojosa, Rubén TX 15th
NAY   D   O’Rourke, Beto TX 16th
YEA   R   Flores, Bill TX 17th
NAY   D   Jackson Lee, Sheila TX 18th
YEA   R   Neugebauer, Randy TX 19th
YEA   D   Castro, Joaquin TX 20th
YEA   R   Smith, Lamar TX 21st
YEA   R   Olson, Pete TX 22nd
YEA   D   Gallego, Pete TX 23rd
YEA   R   Marchant, Kenny TX 24th
YEA   R   Williams, Roger TX 25th
NAY   R   Burgess, Michael TX 26th
YEA   R   Farenthold, Blake TX 27th
YEA   D   Cuellar, Henry TX 28th
YEA   D   Green, Gene TX 29th
YEA   D   Johnson, Eddie TX 30th
YEA   R   Carter, John TX 31st
YEA   R   Sessions, Pete TX 32nd
YEA   D   Veasey, Marc TX 33rd
YEA   D   Vela, Filemon TX 34th
NAY   D   Doggett, Lloyd TX 35th
NAY   R   Stockman, Steve TX 36th
Utah
YEA   R   Bishop, Rob UT 1st
YEA   R   Stewart, Chris UT 2nd
YEA   R   Chaffetz, Jason UT 3rd
YEA   D   Matheson, Jim UT 4th
Vermont
NAY   D   Welch, Peter VT
Virginia
YEA   R   Wittman, Robert VA 1st
YEA   R   Rigell, Scott VA 2nd
YEA   D   Scott, Bobby VA 3rd
YEA   R   Forbes, Randy VA 4th
YEA   R   Hurt, Robert VA 5th
YEA   R   Goodlatte, Bob VA 6th
NAY   R   Brat, Dave VA 7th
YEA   D   Moran, Jim VA 8th
NAY   R   Griffith, Morgan VA 9th
YEA   R   Wolf, Frank VA 10th
YEA   D   Connolly, Gerald VA 11th
Washington
NAY   D   DelBene, Suzan WA 1st
YEA   D   Larsen, Rick WA 2nd
YEA   R   Herrera Beutler, Jaime WA 3rd
YEA   R   Hastings, Doc WA 4th
YEA   R   McMorris Rodgers, Cathy WA 5th
YEA   D   Kilmer, Derek WA 6th
NAY   D   McDermott, Jim WA 7th
YEA   R   Reichert, David WA 8th
NO VOTE   D   Smith, Adam WA 9th
NAY   D   Heck, Denny WA 10th
West Virginia
YEA   R   McKinley, David WV 1st
YEA   R   Capito, Shelley WV 2nd
YEA   D   Rahall, Nick WV 3rd
Wisconsin
YEA   R   Ryan, Paul WI 1st
NAY   D   Pocan, Mark WI 2nd
YEA   D   Kind, Ron WI 3rd
NAY   D   Moore, Gwen WI 4th
NAY   R   Sensenbrenner, James WI 5th
YEA   R   Petri, Tom WI 6th
YEA   R   Duffy, Sean WI 7th
NAY   R   Ribble, Reid WI 8th
Wyoming
NAY   R   Lummis, Cynthia

 

 

   This is a despicable vote and all the Republicans that voted in favor of this bill should hang their heads in shame . 

 

 

 

 

 

 

 

 

Follow

Get every new post delivered to your Inbox.

Join 7,061 other followers