Category: Surveillance


They’re Tracking You Everywhere You Drive

 

 

 

” Towing companies are a necessary evil when it comes to parking enforcement and property repossession. But in the Google Earth we now inhabit, tow trucks do more than just yank cars out of loading zones. They use license-plate readers (LPRs) to assemble a detailed profile of where your car will be and when. That’s an unnecessary evil.

  Plate readers have long been a tool of law enforcement, and police officers swear by them for tracking stolen cars and apprehending dangerous criminals. But private companies, such as repo crews, also photograph millions of plates a day, with scanners mounted on tow trucks and even on purpose-built camera cars whose sole mission is to drive around and collect plate scans. Each scan is GPS-tagged and stamped with the date and time, feeding a massive data trove to any law-enforcement agency—or government-approved private industry—willing to pay for it.

  You’ve probably been tagged at the office, at a mall, or even in your own driveway. And the companies that sell specialized monitoring software that assembles all these sightings into a reliable profile stand to profit hugely. Brian Hauss, a legal fellow for the American Civil Liberties Union (ACLU), says: “The whole point is so you can figure out somebody’s long-term location. Unless there are limits on how those transactions can be processed, I think it’s just a matter of time until there are significant privacy violations, if they haven’t already occurred.”

  (How Is This Even Legal? License-plate-reader companies don’t have access to DMV registrations, so while they can track your car, they don’t know it’s yours. That information is guarded by the Driver’s Privacy Protection Act of 1994, which keeps your name, address, and driving history from public view. Mostly. There are plenty of exceptions, including for insurance companies and private investigators. LPR companies say only two groups can use its software to find the person behind the plate: law-enforcement agencies and repossession companies. In addition, the encrypted databases keep a log of each plate search and allow the ability to restrict access.)

  The companies that push plate readers enjoy unregulated autonomy in most states. Vigilant Solutions of California and its partner, Texas-based Digital Recognition Network, boast at least 2 billion license-plate scans since starting the country’s largest private license-plate database, the National Vehicle Location Service, in 2009.

  In total, there are at least 3 billion license-plate photos in private databases. Since many are duplicates and never deleted, analytics can paint a vivid picture of any motorist. Predicting where and when someone will drive is relatively easy; software can sort how many times a car is spotted in a certain area and, when fed enough data, can generate a person’s driving history over time.”

 

Read the rest at Popular Mechanics

 

 

 

 

 

 

 

 

 

 

 

At Retreat, Dem Staffers Escort Reporters To Restroom

 

 

 

” Reporters covering the House Democrats’ retreat in Philadelphia this week are having a much different experience than when they’re on their home turf on Capitol Hill. 

  Reporters are being escorted to and from the restroom and lobby and are being barred from entering the hotel outside of scheduled events, even if they’ve been invited by a member of Congress. 

  During Vice President Joe Biden’s remarks at the retreat Friday, reporters were required to have a staff member, usually a junior member of the press team, escort them when going to the bathroom or to the lobby. The filing center for reporters was at a separate hotel from where the retreat was taking place, so access was limited to members of Congress specifically made available to the press.

It was a police state. It was absurd how heavy handed the capitol police and Democratic staff were in trying to control everywhere the press went,” New York Times reporter Jeremy Peters said in an interview.”

 

Read more about the media being shut out by their own home team here . The irony is delicious .

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

This Malware Can Hijack A Drone In Seconds

 

 

 

 

 

” If the White House wants to keep drones off the lawn, they might want to give Rahul Sasi a call. He’s developing malware that can hijack a drone in just a few short seconds.

  He calls his malware (fittingly enough) Maldrone, and it doesn’t gain control over its victims the way that previously-demonstrated attacks do. Most others have leveraged the APIs — like the one provided by Parrot for developers who want to tinker with their AR Drones — to do the hijacking.

  But a “Parrot drone is a toy,” Rahul says, and he went to work on an attack that was a bit more generic, able to wreak havoc on multitudes of drones regardless of whether or not the manufacturer exposes anything via an API. Maldrone is the result, and it’s impressive even though it’s very much a work in progress.”

 

    Read more about Maldrone here . In other drone news , DJI has upgraded their firmware creating a 15.5 mile radius no-fly zone around Washington DC .

 

 

 

 

 

 

 

 

 

 

 

 

 

… Clean Your Camera Lens!

 

 

 

 

 

” The NSA has issued a Public Announcement today saying that everyone who owns a laptop, cell phone, smart TV, and any other modern social device with video recording, is advised to clean their camera lens regularly.

  An unnamed member of the NSA has released the statement through their Twitter account adding that “It’s really not good for morale when you see a chick in her bedroom through the laptop, and the camera lens blurs the image because of a smudge or something, especially when she’s pretty hot.” The NSA Twitter account later stated that “if you are under a 5 out of 10 on the hotness scale then you can disregard the advisory.”

  This is not the first very open statement the NSA has made in recent months when they released a tweet saying, “You know what? Everyone knows we’re watching, so we might as well save billions on secrecy and be blatant about it. I mean, the cat’s out of the bag and we, as a tax-powered institution, should just admit it.”

  There have also been hundreds of complaints recently from all collective genders about receiving random and untraceable phone texts while at home, asking the recipients things like, “Turn around a few times” and “It’s a little warm for that sweater, don’t you think?”

  When asked about the recent unprofessional attitude they officially state that “it’s 2015, so get with the times, this is the new standard of government professionalism.”

 

Thanks to Chedoh at The People’s Cube

 

 

 

 

 

 

 

 

 

 

 

 

Does Your State Protect Your Privacy In The Digital Age?

 

Privacy Rights In The Digital Age

 

 

 

” New technologies make it possible for state and local law enforcement agencies to engage in surveillance that used to be prohibitively expensive and/or effectively impossible. The ACLU has been working with legislators across the country to put in place rules to ensure that we can take advantage of these new technologies without becoming a surveillance society in which our every movements are tracked, monitored, and scrutinized by the authorities. Much of our work to that end focuses on: law enforcement access to electronic communications content, location tracking,automatic license plate readers, and domestic surveillance drones.

  If we can address these four issue areas, we will go a long way toward protecting privacy in the digital age. This map provides a snapshot of the states that have already provided privacy protections for some or all of them. Of course, the devil is in the details of these laws, and we encourage you to review the bill text or to check out the ACLU’s blog for more information on just how much protection there is in your state.”

 

Thanks to the ACLU

 

 

 

 

 

 

 

 

 

 

 

 

U.S. Spies On Millions Of Cars

 

 

 

 

” The Justice Department has been building a national database to track in real time the movement of vehicles around the U.S., a secret domestic intelligence-gathering program that scans and stores hundreds of millions of records about motorists, according to current and former officials and government documents.

  The primary goal of the license-plate tracking program, run by the Drug Enforcement Administration, is to seize cars, cash and other assets to combat drug trafficking, according to one government document. But the database’s use has expanded to hunt for vehicles associated with numerous other potential crimes, from kidnappings to killings to rape suspects, say people familiar with the matter.

  Officials have publicly said that they track vehicles near the border with Mexico to help fight drug cartels. What hasn’t been previously disclosed is that the DEA has spent years working to expand the database “throughout the United States,’’ according to one email reviewed by The Wall Street Journal.

Many state and local law-enforcement agencies are accessing the database for a variety of investigations, according to people familiar with the program, putting a wealth of information in the hands of local officials who can track vehicles in real time on major roadways.

  The database raises new questions about privacy and the scope of government surveillance. The existence of the program and its expansion were described in interviews with current and former government officials, and in documents obtained by the American Civil Liberties Union through a Freedom of Information Act request and reviewed by The Wall Street Journal. It is unclear if any court oversees or approves the intelligence-gathering.”

 

Read more

 

 

 

 

 

 

 

 

 

 

 

New Police Radars Can ‘See’ Inside Homes

 

 

 

 

” At least 50 U.S. law enforcement agencies have secretly equipped their officers with radar devices that allow them to effectively peer through the walls of houses to see whether anyone is inside, a practice raising new concerns about the extent of government surveillance.

  Those agencies, including the FBI and the U.S. Marshals Service, began deploying the radar systems more than two years ago with little notice to the courts and no public disclosure of when or how they would be used. The technology raises legal and privacy issues because the U.S. Supreme Court has said officers generally cannot use high-tech sensors to tell them about the inside of a person’s house without first obtaining a search warrant.

  The radars work like finely tuned motion detectors, using radio waves to zero in on movements as slight as human breathing from a distance of more than 50 feet. They can detect whether anyone is inside of a house, where they are and whether they are moving.

  Current and former federal officials say the information is critical for keeping officers safe if they need to storm buildings or rescue hostages. But privacy advocates and judges have nonetheless expressed concern about the circumstances in which law enforcement agencies may be using the radars — and the fact that they have so far done so without public scrutiny.

” The idea that the government can send signals through the wall of your house to figure out what’s inside is problematic,” said Christopher Soghoian, the American Civil Liberties Union’s principal technologist. “Technologies that allow the police to look inside of a home are among the intrusive tools that police have.”

  Agents’ use of the radars was largely unknown until December, when a federal appeals court in Denver said officers had used one before they entered a house to arrest a man wanted for violating his parole. The judges expressed alarm that agents had used the new technology without a search warrant, warning that “the government’s warrantless use of such a powerful tool to search inside homes poses grave Fourth Amendment questions.”

By then, however, the technology was hardly new. Federal contract records show the Marshals Service began buying the radars in 2012, and has so far spent at least $180,000 on them.

  Justice Department spokesman Patrick Rodenbush said officials are reviewing the court’s decision. He said the Marshals Service “routinely pursues and arrests violent offenders based on pre-established probable cause in arrest warrants” for serious crimes.

  The device the Marshals Service and others are using, known as the Range-R, looks like a sophisticated stud-finder. Its display shows whether it has detected movement on the other side of a wall and, if so, how far away it is — but it does not show a picture of what’s happening inside. The Range-R’s maker, L-3 Communications, estimates it has sold about 200 devices to 50 law enforcement agencies at a cost of about $6,000 each.”

 

 

 

Read more

 

 

 

 

 

 

 

 

 

 

Watch Florida Teen Rescue Police Officer While He’s Being Booked

 

 

 

 

 

 

” A Florida teen who was processed into the Ft. Lauderdale Police Department Booking Facility is set to be commended later this month for heroically helping to save the life of an officer who collapsed while booking him, an incident that was captured on surveillance camera.”

 

 

 

Florida teen saves police officer's life

 

 

” According to the Fort Lauderdale Police Department, on Sept. 10, 2014, Officer Franklin Foulks was in the process of booking 17-year-old Jamal Rutledge, when the cop collapsed. Rutledge, still in handcuffs, got up to check on Officer Foulks, who police say was losing consciousness.

  As the video shows, Rutledge “immediately began to kick the security fence and yell to alert officers in the area,” police said in a news release.”

 

ABC News

 

 

 

 

 

 

 

 

 

 

 

Rhianna The Rhino Escapes From Tel Aviv Zoo – Rhinos Escape While Zookeeper Sleeps

 

 

 

Published on Jan 7, 2015

” Raw CCTV Video: Security Guard Chases Rihanna The Rhino And Friends After They Escape From Ramat Gan Safari Park, Israel – Rhianna the Rhino Escapes From Tel Aviv Zoo – Rhinos Escape While Zookeeper Sleeps  

  This video footage shows the moment a young female rhinoceros named Rihanna led two pals on an escape bid from a safari park after spotting the security guard had fallen asleep.

  The footage shows the rhinos escaping from the front entrance of the Ramat Gan Safari Park in the city of Ramat Gan in the Tel Aviv district of western Israel after a security guard nodded off to sleep and failed to notice until too late what was happening.

  Although another employee of the park gave chase, it was too late to stop the white rhinos from hitting the road.”

 

 

 

 

 

 

 

 

 

 

 

FAA Grants Permits For Drones To Monitor Crops, Photograph Real Estate

 

 

 

 

 

” The Federal Aviation Administration on Tuesday issued permits to use drones to monitor crops and photograph properties for sale, marking the first time permission has been granted to companies involved in agriculture and real estate.

  The exemptions to the current ban on commercial drone flights were granted to Advanced Aviation Solutions in Star, Idaho, for “crop scouting,” and to Douglas Trudeau of Tierra Antigua Realty in Tucson, Arizona.

  Advanced Aviation Solutions plans to use its 1.5-pound, fixed-wing eBee drone to make photographic measurements of farm fields, determine the health of crops and look for pests. The aim is to save farmers time walking through fields. The drone also can carry sensors that pick up information invisible to the naked eye, which can help determine which fields need watering.”

 

 

    Will this latest licensing effort by the Feds morph into yet another example of cronyism and reward towards favored , connected corporations ? Of course . Notice that the film industry was one of the first to gain their exemption from the State .

 

CNS News has more

 

 

 

 

 

 

 

 

 

 

 

 

CIA Reveals The Truth Behind UFOs

 

 

 

” America’s Central Intelligence Agency has used the end-of-the-year silly season to finally come clean about UFOs.

  Anyone hoping for little green men will be disappointed, though — the CIA is claiming responsibility.

  Tweeting about its most popular stories of the year, the CIA named a 1998 report linking its activities in the 1950s to UFO sightings.

  The report, ‘The CIA and the U-2 Program, 1954-1974’, written by Gregory Pedlow and Donald Welzenbach, outlines the CIA’s involvement in the development of the U-2 spy plane.

  It explains how the testing of the planes led to a massive increase in UFO reports.”

 

Read more

 

 

 

 

 

 

 

 

 

 

 

On Christmas Eve, NSA Quietly Releases 12 Years Worth Of Internal Reports

 

 

 

” This holiday season, the NSA participated in a longstanding media tradition—dumping a large bit of news during a busy period of time when many likely weren’t paying attention.

  The US spy agency responded to a Freedom of Information Act lawsuit from the American Civil Liberties Union by quietly releasing 12 years worth of internal reports on Christmas Eve. Several included reports were previously withheld illegally, and they became the subject of the FOIA lawsuit in 2009.

  The new trove of information has inspired a different breed of headlines, such as “Highlights From Newly Released NSA Oversight Reports Reveal Bumbling Ineptitude But No Evidence Of Systematic Abuse” from Forbes. The newly discovered errors ran the gamut, including American data being e-mailed to unauthorized recipients, data being kept on unsecured computers, and sensitive information being sent to the wrong printer.”

 

 

 

 

 

Ars Technica has more

 

 

 

 

 

 

 

 

 

 

Two Arrested In Christmas Eve Cash Spill Case In Hong Kong; HK$9 Million Still Missing

 

 

 

 

 

” Police made the first arrests on Thursday night after more than HK$15 million went missing on Christmas Eve after a money transport van owned by securities firm G4S spilled large bundles of cash over a busy road in Wan Chai.

  Two passengers – a 43-year-old man and a 36-year-old woman – in a taxi that passed by Gloucester Road on Wednesday were arrested in Kowloon City and Tseung Kwan O respectively as police announced at around midnight on Friday that a total of HK$5.69 million had been recovered after 30 persons surrendered the banknotes to police.

  The man is in the electronics recycling business while the woman is a cosmetologist. Both are said to be friends.

” We found the money stored under the bed at their homes and they admitted they took the money on Gloucester [Road] after getting off the taxi they were in,” said police chief inspector Addy Li Chi-kin at a media briefing outside an industrial building on 20 Sheung Yuet Road in Kowloon Bay where the male suspect arrested.

  On Thursday afternoon, police said that 27 people had handed over cash, including two individuals who returned HK$1 million and one person who handed in HK$2 million.

  The police had previously asked the public to help return the money that went missing in the frantic scramble, most of it in HK$500 notes, the equivalent of about US$65.

  The vehicle was transporting a total of HK$270 million in cash. The HK$500 and HK$1,000 banknotes were contained in 30 plastic boxes.

  Three of the boxes with a total of HK$52.5 million cash were dropped from a door of a G4S van. A total of HK$15.23 million in cash was later found to be missing.”

 

South China Morning Post

 

 

 

 

 

 

 

 

 

 

 

Helicopter Drone Makes First Flight From Navy Destroyer

 

 

 

 

 

 

” A helicopter drone developed by Northrop Grumman Corp. has made its first flight from a U.S. Navy destroyer, the company announced.

  The MQ-8C Fire Scout on Dec. 16 completed 22 autonomous takeoffs and landings aboard the guided-missile destroyer, USS Jason Dunham (DDG 109), off the coast of Norfolk, Virginia, according to a Dec. 23 release from the Falls Church, Virginia-based defense contractor.

“ This is the first sea-based flight of the MQ-8C and the first time an unmanned helicopter has operated from a destroyer,” Capt. Jeff Dodge, who manages the program for Naval Air Systems Command, said in the release. The technology offers greater endurance, he added, allowing “ship commanders and pilots to have a longer on station presence.” “

 

Read more at Military.com

 

 

 

 

 

 

 

 

 

 

Live – NORAD Santa Tracker 2014: Follow Father Christmas’s Trip Around The Globe

 

NORAD Santa Tracker 2014

 Click pic to go live where you can follow Santa around the world

 

 

 

” Each festive season the air forces tasked with defending US airspace instead devote themselves to tracking Father Christmas.

  The North American Aerospace Defense Command – or NORAD – started tracking him when a 1955 advert encouraged children to phone Santa – but gave the wrong number.

  When he realised what had happened, Colonel Harry Shoup – who came to be known as the “Santa Colonel” – quickly told his staff to answer the calls with an update on Father Christmas’s current position.”

 

 

 

 

 

 

” And the practice has continued ever since, developing into a tradition where volunteers staff call centres on Christmas Eve and field around 70,000 phone calls each year from 200 countries.

  But the tracker has adapted with the times, becoming more advanced through the years as it took to the internet.

  It now has its own Twitter, Facebook and YouTube accounts, and not only counts down the days until Father Christmas will begin delivering presents but lets you visit the digital North Pole and play various games.”

 

Read more at Mirror.co.uk

 

 

 

 

 

 

 

 

 

 

 

—-

Cellphone Privacy Is Shaky, Researchers Say

 

 

 

” German researchers have discovered security flaws that could let hackers, spies, and criminals listen to private phone calls and intercept text messages on a potentially massive scale — even when cellular networks are using the most advanced encryption available.

  The flaws, to be reported at a hacker conference in Hamburg this month, are the latest evidence of widespread insecurity on SS7, the global network that allows the world’s cellular carriers to route calls, texts, and other data to one another. Experts say it’s increasingly clear that SS7, designed in the 1980s, is riddled with serious vulnerabilities.

  The flaws discovered by the Germans are actually functions built into SS7 for other purposes, such as keeping calls connected as users speed down highways, switching from cell tower to cell tower. Hackers can repurpose them because of the lax security on the network.”

 

Read more at the Boston Globe

 

 

 

 

 

 

 

 

 

Cops Illegally Nailed Webcam To Utility Pole For 6 Weeks To Spy On House

 

 

 

” A federal judge on Monday tossed evidence that was gathered by a webcam—turned on for six weeks—that the authorities nailed to a utility pole 100 yards from a suspected drug dealer’s rural Washington state house.

  The Justice Department contended that the webcam, with pan-and-zoom capabilities that were operated from afar, was no different from a police officer’s observation from the public right-of-way.

The government argued (PDF):

  The advantage of a police camera to law enforcement is that it saves the time and manpower required to conduct around the clock surveillance. As in this case, law enforcement is authorized to use the pole camera only to record activities that are otherwise open to public view, and not protected by the 4th Amendment.

  US District Judge Edward Shea disagreed and ruled (PDF) that a warrant was necessary to spy on Leonel Vargas via a webcam controlled by local police.”

 

 

Somehow this little tidbit doesn’t surprise us:

 

 

” Strangely, the judge noted, when the authorities raided the house in May 2013, the camera was panned on nearby sagebrush and not the house.”

 

 

ArsTechnica

 

 

 

 

 

 

 

 

 

Cops Are Scanning Social Media To Assign You A “Threat Rating”

police-social-media-threat-rating

 

 

” Online activity, purchases, and “comments that could be construed as offensive,” all contribute to your threat score.

  Imagine the following scenario: You are on your way home from work, driving down the road, when you notice police lights in your rear view mirror. You are being pulled over.

  As you sit there, on the shoulder, adrenaline rushing, simultaneously angry and nervous, the police officer, in his patrol car behind you, is sizing you up based on an algorithm that determines your “threat rating.” 

  The officer enters your license plate into a mobile application on his laptop. In a matter of seconds, this application crawls over billions of records in commercial and public databases, including all available social media engagement, recent purchases and “any comments that could be construed as offensive.” The application then determines if your “threat rating” is green, yellow, or red.”

 

 

 

 

 

 

 

 

” Imagine that you are one of our informed and frequent readers and understand the importance of police accountability and are unafraid to voice your completely peaceful, yet strong opinion about police misconduct. Imagine that you left a comment on Facebook this morning about a particular officer’s misconduct; imagine that it is this particular officer who just pulled you over.

  Up until this point, you have never committed a crime, you have never been violent, you have never even so much as run a stop sign. However, this police officer now knows that you made a comment about him punching the (insert handcuffed and helpless victim example here) on Facebook, and he literally sees red (your threat rating).

  What happens next? Does a routine traffic stop for driving 10 miles over the speed limit morph into a situation in which you now have a Smith and Wesson M&P 9mm pistol with Streamlight TLR-2s laser site being aimed just above your left ear?

  Do you receive multiple erroneous citations because this officer now has access to your personal life? Do you get cited where the officer would have otherwise let someone else go?

  Or, maybe you are a cop or a judge, or the mayor, but this application confuses you with someone else and marks you as “red,” then what? What if you are driving someone else’s car?

  The reality is, that any number of unimaginable things can and would happen next. And now, thanks to a particularly ominous product, by a company named Intrado, and the Orwellian nature of police in this country, those unimaginable situations are now a reality.

Read more at The Free Thought Project

 

 

 

 

 

 

 

 

 

 

 

Prof: ‘Elf On The Shelf’ Conditions Kids To Accept Surveillance State

 

 

 

 

Could there be something more sinister behind the little elf sitting on the shelf who returns to the North Pole each night?

  Yes, says Laura Pinto, a digital technology professor at the University of Ontario Institute of Technology.

  She recently published a paper titled “Who’s the Boss” on the doll, saying the idea of it reporting back to Santa each night on the child’s behavior “sets up children for dangerous, uncritical acceptance of power structures,” according to insideHalton.com.

  From her paper:

  When children enter the play world of The Elf on the Shelf, they accept a series of practices and rules associated with the larger story. This, of course, is not unique to The Elf on the Shelf. Many children’s games, including board games and video games, require children to participate while following a prescribed set of rules. The difference, however, is that in other games, the child role-plays a character, or the child imagines herself within a play-world of the game, but the role play does not enter the child’s real world as part of the game. As well, in most games, the time of play is delineated (while the game goes on), and the play to which the rules apply typically does not overlap with the child’s real world.

“  You’re teaching (kids) a bigger lesson, which is that it’s OK for other people to spy on you and you’re not entitled to privacy,” she tells the Toronto Star. “

 

Read the rest

 

 

 

 

 

 

 

 

 

 

Stinky Revenge: Couple Tricks Holiday Package Thief Into Stealing Box Of Dog Poop

 

Dog Poop Package

 

Click pic for video

” After falling victim to thieves who swiped packages off of their front porch several times, a Northeast D.C. couple decided to teach them a lesson.

  Tis the season for package thieves; many D.C.-area residents have recently caught robbers taking packages on surveillance. But for one couple, caught on camera wasn’t enough—they boxed up a stinky surprise from their two dogs.

  About 3 p.m. Friday, surveillance footage shows a man walking up and down the sidewalk in front of their home, before stealing their package and taking off. The caught-on-camera incident marked the third package taken from their yard since October. “

 

Continued

 

 

 

 

 

 

 

 

 

A Personal Drone?

 

 

 

” Will it soon be as normal to have a drone in your pocket as it is to have a smartphone in your pocket today?

  That is what researchers at the Delft University of Technology in the Netherlands believe. They are working on light weight, palm-sized drones for the urban environment.

  The team is responsible for the world’s smallest drone with a functional camera – weighing only 4 grams. And it is working on low cost technology that will allow such lightweight drones to navigate cities autonomously, by working in conjunction with smartphones.

  Research is already under way to see if drones can be used professionally for package deliveries, land surveying and medical care.

  But the team at Delft believe that the lightweight nature of their miniature drones makes them safer for use in populated areas than the bigger models.

  Bart Remes demonstrated a prototype model to the BBC’s Dougal Shaw at the RE.WORK Future Cities summit. “

Thanks to the BBC

Spy Drone Hacks WiFi Networks, Listens To Calls

 

 

WIFI Hacking Drone

 

 

” It’s small. It’s bright yellow, and it’s capable of cracking Wi-Fi passwords, eavesdropping on your cell phone calls and reading your text messages. It’s an unmanned spy drone and it just landed in Washington, D.C.

  Long-time friends and former Air Force buddies, Mike Tassey and Rich Perkins, describe their state-of-the-art cyber drone as hard to take down, hard to see and virtually hard to detect.”

 

 

Mike Tassey, Rich Perkins: Wireless Ariel Surveillance

 

 

” They built it in a garage, using off the shelf electronics to prove a drone can be used to launch cyber-attacks.

  It needs a human for take-off and landing but once airborne, it can fly any pre-programmed route posing as a cell phone tower and tricking wireless cell phones.

” We passed telephone calls, hacked into networks, cracked the encryption on Wi-Fi access points all of that sort of evilness is possible,” said Tassey.”

 

 

Read more

 

 

 

 

 

 

 

 

 

Congress Has Just Overruled Your 1st, 4th And 5th Amendment Rights

 

 

 

” As of today, Bill HR4681 has passed the house and senate, and is currently undergoing arbitration before being sent to the President for his signature in to law. The law says that the intelligence community can collect, retain, and disseminate all electronic communications including voice calls [without any constitutional restrictions] on all US citizens and everyone else in the world.  And they have 5 years before they are supposed to destroy the records.  However, they can keep them indefinitely if they fall into several categories of interest.

  It is all out in the open now.  Your 1st, 4th, and 5th Amendment protections are gone.  This act gives new meaning to ‘land of the free, home of the brave.’  The intelligence community isn’t doing anything in secret any more.  Americans are now living in an environment much like the days of the old Stalinist Soviet Union, where the presumption was that all conversations were monitored and one takes measures to have a ‘private’ conversations. 

  So turn up your radio or turn the water on in the sink and watch what you say on the phone or Facebook, even casual remarks on twitter may come back to haunt you in the future.  Don’t believe me, I have pasted the relevant parts of the bill below this story. Still don’t believe it? Just go to www.congress.gov/bill/113th-congress/house-bill/4681/text and read it from the horse’s mouth.

What are you willing to do about it?

[Congressional Bills 113th Congress]

[From the U.S. Government Printing Office]

 

[H.R. 4681 Enrolled Bill (ENR)]

H.R.4681

One Hundred Thirteenth Congress

of the

United States of America

TITLE III–GENERAL PROVISIONS

Subtitle A–General Matters

Sec. 309. Procedures for the retention of incidentally acquired

communications.

SEC. 309. PROCEDURES FOR THE RETENTION OF INCIDENTALLY ACQUIRED

COMMUNICATIONS.

(a) Definitions.–In this section:

(1) Covered communication.–The term “covered communication”

means any nonpublic telephone or electronic communication acquired

without the consent of a person who is a party to the

communication, including communications in electronic storage.

(2) Head of an element of the intelligence community.–The term

“head of an element of the intelligence community” means, as

appropriate–

(A) the head of an element of the intelligence community;

or

(B) the head of the department or agency containing such

element.

(3) United states person.–The term “United States person”

has the meaning given that term in section 101 of the Foreign

Intelligence Surveillance Act of 1978 (50 U.S.C. 1801).

(b) Procedures for Covered Communications.–

(1) Requirement to adopt.–Not later than 2 years after the

date of the enactment of this Act each head of an element of the

intelligence community shall adopt procedures approved by the

Attorney General for such element that ensure compliance with the

requirements of paragraph (3).

(2) Coordination and approval.–The procedures required by

paragraph (1) shall be–

(A) prepared in coordination with the Director of National

Intelligence; and

(B) approved by the Attorney General prior to issuance.

(3) Procedures.–

(A) Application.–The procedures required by paragraph (1)

shall apply to any intelligence collection activity not

otherwise authorized by court order (including an order or

certification issued by a court established under subsection

(a) or (b) of section 103 of the Foreign Intelligence

Surveillance Act of 1978 (50 U.S.C. 1803)), subpoena, or

similar legal process that is reasonably anticipated to result

in the acquisition of a covered communication to or from a

United States person and shall permit the acquisition,

retention, and dissemination of covered communications subject

to the limitation in subparagraph (B).

(B) Limitation on retention.–A covered communication shall

not be retained in excess of 5 years, unless–

(i) the communication has been affirmatively

determined, in whole or in part, to constitute foreign

intelligence or counterintelligence or is necessary to

understand or assess foreign intelligence or

counterintelligence;

(ii) the communication is reasonably believed to

constitute evidence of a crime and is retained by a law

enforcement agency;

(iii) the communication is enciphered or reasonably

believed to have a secret meaning;

(iv) all parties to the communication are reasonably

believed to be non-United States persons;

(v) retention is necessary to protect against an

imminent threat to human life, in which case both the

nature of the threat and the information to be retained

shall be reported to the congressional intelligence

committees not later than 30 days after the date such

retention is extended under this clause;

(vi) retention is necessary for technical assurance or

compliance purposes, including a court order or discovery

obligation, in which case access to information retained

for technical assurance or compliance purposes shall be

reported to the congressional intelligence committees on an

annual basis; or

(vii) retention for a period in excess of 5 years is

approved by the head of the element of the intelligence

community responsible for such retention, based on a

determination that retention is necessary to protect the

national security of the United States, in which case the

head of such element shall provide to the congressional

intelligence committees a written certification

describing–

 

(I) the reasons extended retention is necessary to

protect the national security of the United States;

(II) the duration for which the head of the element

is authorizing retention;

(III) the particular information to be retained;

and

(IV) the measures the element of the intelligence

community is taking to protect the privacy interests of

United States persons or persons located inside the

United States. “

 

 

 

 

 

   Many thanks to Universal Free Press for providing this story . Below the reader can see who voted to rob you of your rights and who voted against Statism …

 

 

 

 

 

VOTE PARTY REPRESENTATIVE DISTRICT
Alabama
YEA   R   Byrne, Bradley AL 1st
YEA   R   Roby, Martha AL 2nd
YEA   R   Rogers, Mike AL 3rd
YEA   R   Aderholt, Robert AL 4th
NAY   R   Brooks, Mo AL 5th
YEA   R   Bachus, Spencer AL 6th
YEA   D   Sewell, Terri AL 7th
Alaska
YEA   R   Young, Don AK
Arizona
YEA   D   Kirkpatrick, Ann AZ 1st
YEA   D   Barber, Ron AZ 2nd
NAY   D   Grijalva, Raúl AZ 3rd
NAY   R   Gosar, Paul AZ 4th
NAY   R   Salmon, Matt AZ 5th
YEA   R   Schweikert, David AZ 6th
YEA   D   Pastor, Ed AZ 7th
YEA   R   Franks, Trent AZ 8th
YEA   D   Sinema, Kyrsten AZ 9th
Arkansas
YEA   R   Crawford, Eric AR 1st
YEA   R   Griffin, Tim AR 2nd
YEA   R   Womack, Steve AR 3rd
YEA   R   Cotton, Tom AR 4th
California
YEA   R   LaMalfa, Doug CA 1st
NAY   D   Huffman, Jared CA 2nd
NAY   D   Garamendi, John CA 3rd
NAY   R   McClintock, Tom CA 4th
YEA   D   Thompson, Mike CA 5th
NAY   D   Matsui, Doris CA 6th
YEA   D   Bera, Ami CA 7th
YEA   R   Cook, Paul CA 8th
YEA   D   McNerney, Jerry CA 9th
YEA   R   Denham, Jeff CA 10th
YEA   D   Miller, George CA 11th
YEA   D   Pelosi, Nancy CA 12th
NAY   D   Lee, Barbara CA 13th
NAY   D   Speier, Jackie CA 14th
NAY   D   Swalwell, Eric CA 15th
YEA   D   Costa, Jim CA 16th
NAY   D   Honda, Mike CA 17th
NAY   D   Eshoo, Anna CA 18th
NAY   D   Lofgren, Zoe CA 19th
NAY   D   Farr, Sam CA 20th
YEA   R   Valadao, David CA 21st
YEA   R   Nunes, Devin CA 22nd
YEA   R   McCarthy, Kevin CA 23rd
YEA   D   Capps, Lois CA 24th
YEA   R   McKeon, Buck CA 25th
YEA   D   Brownley, Julia CA 26th
NAY   D   Chu, Judy CA 27th
YEA   D   Schiff, Adam CA 28th
YEA   D   Cárdenas, Tony CA 29th
YEA   D   Sherman, Brad CA 30th
NO VOTE   R   Miller, Gary CA 31st
YEA   D   Napolitano, Grace CA 32nd
YEA   D   Waxman, Henry CA 33rd
YEA   D   Becerra, Xavier CA 34th
NO VOTE   D   Negrete McLeod, Gloria CA 35th
YEA   D   Ruiz, Raul CA 36th
NAY   D   Bass, Karen CA 37th
YEA   D   Sánchez, Linda CA 38th
YEA   R   Royce, Ed CA 39th
YEA   D   Roybal-Allard, Lucille CA 40th
NAY   D   Takano, Mark CA 41st
YEA   R   Calvert, Ken CA 42nd
NAY   D   Waters, Maxine CA 43rd
NAY   D   Hahn, Janice CA 44th
NO VOTE   R   Campbell, John CA 45th
YEA   D   Sanchez, Loretta CA 46th
NAY   D   Lowenthal, Alan CA 47th
NAY   R   Rohrabacher, Dana CA 48th
YEA   R   Issa, Darrell CA 49th
YEA   R   Hunter, Duncan CA 50th
YEA   D   Vargas, Juan CA 51st
YEA   D   Peters, Scott CA 52nd
YEA   D   Davis, Susan CA 53rd
Colorado
YEA   D   DeGette, Diana CO 1st
NAY   D   Polis, Jared CO 2nd
NAY   R   Tipton, Scott CO 3rd
YEA   R   Gardner, Cory CO 4th
YEA   R   Lamborn, Doug CO 5th
YEA   R   Coffman, Mike CO 6th
YEA   D   Perlmutter, Ed CO 7th
Connecticut
YEA   D   Larson, John CT 1st
YEA   D   Courtney, Joe CT 2nd
YEA   D   DeLauro, Rosa CT 3rd
YEA   D   Himes, James CT 4th
YEA   D   Esty, Elizabeth CT 5th
Delaware
YEA   D   Carney, John DE
Florida
NO VOTE   R   Miller, Jeff FL 1st
YEA   R   Southerland, Steve FL 2nd
NAY   R   Yoho, Ted FL 3rd
YEA   R   Crenshaw, Ander FL 4th
YEA   D   Brown, Corrine FL 5th
YEA   R   DeSantis, Ron FL 6th
NAY   R   Mica, John FL 7th
NAY   R   Posey, Bill FL 8th
NAY   D   Grayson, Alan FL 9th
YEA   R   Webster, Daniel FL 10th
NAY   R   Nugent, Richard FL 11th
YEA   R   Bilirakis, Gus FL 12th
YEA   R   Jolly, David FL 13th
YEA   D   Castor, Kathy FL 14th
YEA   R   Ross, Dennis FL 15th
YEA   R   Buchanan, Vern FL 16th
YEA   R   Rooney, Thomas FL 17th
YEA   D   Murphy, Patrick FL 18th
NAY   R   Clawson, Curt FL 19th
NAY   D   Hastings, Alcee FL 20th
YEA   D   Deutch, Theodore FL 21st
YEA   D   Frankel, Lois FL 22nd
YEA   D   Wasserman Schultz, Debbie FL 23rd
YEA   D   Wilson, Frederica FL 24th
YEA   R   Diaz-Balart, Mario FL 25th
NAY   D   Garcia, Joe FL 26th
YEA   R   Ros-Lehtinen, Ileana FL 27th
Georgia
NAY   R   Kingston, Jack GA 1st
YEA   D   Bishop, Sanford GA 2nd
YEA   R   Westmoreland, Lynn GA 3rd
YEA   D   Johnson, Hank GA 4th
NAY   D   Lewis, John GA 5th
YEA   R   Price, Tom GA 6th
NAY   R   Woodall, Rob GA 7th
NAY   R   Scott, Austin GA 8th
YEA   R   Collins, Doug GA 9th
NAY   R   Broun, Paul GA 10th
YEA   R   Gingrey, Phil GA 11th
YEA   D   Barrow, John GA 12th
YEA   D   Scott, David GA 13th
NAY   R   Graves, Tom GA 14th
Hawaii
NAY   D   Hanabusa, Colleen HI 1st
YEA   D   Gabbard, Tulsi HI 2nd
Idaho
NAY   R   Labrador, Raúl ID 1st
YEA   R   Simpson, Mike ID 2nd
Illinois
YEA   D   Rush, Bobby IL 1st
YEA   D   Kelly, Robin IL 2nd
YEA   D   Lipinski, Daniel IL 3rd
NAY   D   Gutiérrez, Luis IL 4th
YEA   D   Quigley, Mike IL 5th
YEA   R   Roskam, Peter IL 6th
YEA   D   Davis, Danny IL 7th
NO VOTE   D   Duckworth, Tammy IL 8th
NAY   D   Schakowsky, Jan IL 9th
YEA   D   Schneider, Bradley IL 10th
YEA   D   Foster, Bill IL 11th
YEA   D   Enyart, William IL 12th
YEA   R   Davis, Rodney IL 13th
YEA   R   Hultgren, Randy IL 14th
YEA   R   Shimkus, John IL 15th
YEA   R   Kinzinger, Adam IL 16th
YEA   D   Bustos, Cheri IL 17th
VOTE PARTY REPRESENTATIVE DISTRICT
YEA   R   Schock, Aaron IL 18th
Indiana
YEA   D   Visclosky, Peter IN 1st
YEA   R   Walorski, Jackie IN 2nd
YEA   R   Stutzman, Marlin IN 3rd
YEA   R   Rokita, Todd IN 4th
YEA   R   Brooks, Susan IN 5th
YEA   R   Messer, Luke IN 6th
YEA   D   Carson, André IN 7th
YEA   R   Bucshon, Larry IN 8th
YEA   R   Young, Todd IN 9th
Iowa
YEA   D   Braley, Bruce IA 1st
YEA   D   Loebsack, David IA 2nd
YEA   R   Latham, Tom IA 3rd
YEA   R   King, Steve IA 4th
Kansas
NAY   R   Huelskamp, Tim KS 1st
YEA   R   Jenkins, Lynn KS 2nd
YEA   R   Yoder, Kevin KS 3rd
YEA   R   Pompeo, Mike KS 4th
Kentucky
YEA   R   Whitfield, Ed KY 1st
YEA   R   Guthrie, Brett KY 2nd
NAY   D   Yarmuth, John KY 3rd
NAY   R   Massie, Thomas KY 4th
YEA   R   Rogers, Hal KY 5th
YEA   R   Barr, Andy KY 6th
Louisiana
YEA   R   Scalise, Steve LA 1st
YEA   D   Richmond, Cedric LA 2nd
YEA   R   Boustany, Charles LA 3rd
YEA   R   Fleming, John LA 4th
YEA   R   McAllister, Vance LA 5th
YEA   R   Cassidy, Bill LA 6th
Maine
YEA   D   Pingree, Chellie ME 1st
YEA   D   Michaud, Michael ME 2nd
Maryland
YEA   R   Harris, Andy MD 1st
YEA   D   Ruppersberger, A. Dutch MD 2nd
YEA   D   Sarbanes, John MD 3rd
YEA   D   Edwards, Donna MD 4th
YEA   D   Hoyer, Steny MD 5th
YEA   D   Delaney, John MD 6th
NAY   D   Cummings, Elijah MD 7th
YEA   D   Van Hollen, Chris MD 8th
Massachusetts
YEA   D   Neal, Richard MA 1st
NAY   D   McGovern, Jim MA 2nd
YEA   D   Tsongas, Niki MA 3rd
YEA   D   Kennedy, Joseph MA 4th
NAY   D   Clark, Katherine MA 5th
NAY   D   Tierney, John MA 6th
NO VOTE   D   Capuano, Michael MA 7th
YEA   D   Lynch, Stephen MA 8th
YEA   D   Keating, William MA 9th
Michigan
YEA   R   Benishek, Dan MI 1st
YEA   R   Huizenga, Bill MI 2nd
NAY   R   Amash, Justin MI 3rd
YEA   R   Camp, Dave MI 4th
NAY   D   Kildee, Daniel MI 5th
YEA   R   Upton, Fred MI 6th
YEA   R   Walberg, Tim MI 7th
YEA   R   Rogers, Mike MI 8th
YEA   D   Levin, Sander MI 9th
YEA   R   Miller, Candice MI 10th
NAY   R   Bentivolio, Kerry MI 11th
YEA   D   Dingell, John MI 12th
NAY   D   Conyers, John MI 13th
YEA   D   Peters, Gary MI 14th
Minnesota
YEA   D   Walz, Timothy MN 1st
YEA   R   Kline, John MN 2nd
YEA   R   Paulsen, Erik MN 3rd
NAY   D   McCollum, Betty MN 4th
YEA   D   Ellison, Keith MN 5th
YEA   R   Bachmann, Michele MN 6th
YEA   D   Peterson, Collin MN 7th
YEA   D   Nolan, Richard MN 8th
Mississippi
YEA   R   Nunnelee, Alan MS 1st
YEA   D   Thompson, Bennie MS 2nd
YEA   R   Harper, Gregg MS 3rd
YEA   R   Palazzo, Steven MS 4th
Missouri
YEA   D   Clay, Lacy MO 1st
YEA   R   Wagner, Ann MO 2nd
YEA   R   Luetkemeyer, Blaine MO 3rd
YEA   R   Hartzler, Vicky MO 4th
YEA   D   Cleaver, Emanuel MO 5th
YEA   R   Graves, Sam MO 6th
YEA   R   Long, Billy MO 7th
YEA   R   Smith, Jason MO 8th
Montana
YEA   R   Daines, Steve MT
Nebraska
YEA   R   Fortenberry, Jeff NE 1st
YEA   R   Terry, Lee NE 2nd
YEA   R   Smith, Adrian NE 3rd
Nevada
YEA   D   Titus, Dina NV 1st
YEA   R   Amodei, Mark NV 2nd
YEA   R   Heck, Joseph NV 3rd
YEA   D   Horsford, Steven NV 4th
New Hampshire
YEA   D   Shea-Porter, Carol NH 1st
YEA   D   Kuster, Ann NH 2nd
New Jersey
YEA   D   Norcross, Donald NJ 1st
YEA   R   LoBiondo, Frank NJ 2nd
YEA   R   Runyan, Jon NJ 3rd
YEA   R   Smith, Chris NJ 4th
NAY   R   Garrett, Scott NJ 5th
NAY   D   Pallone, Frank NJ 6th
YEA   R   Lance, Leonard NJ 7th
YEA   D   Sires, Albio NJ 8th
YEA   D   Pascrell, Bill NJ 9th
YEA   D   Payne, Donald NJ 10th
YEA   R   Frelinghuysen, Rodney NJ 11th
NAY   D   Holt, Rush NJ 12th
New Mexico
YEA   D   Lujan Grisham, Michelle NM 1st
YEA   R   Pearce, Steve NM 2nd
YEA   D   Luján, Ben NM 3rd
New York
YEA   D   Bishop, Timothy NY 1st
YEA   R   King, Pete NY 2nd
YEA   D   Israel, Steve NY 3rd
YEA   D   McCarthy, Carolyn NY 4th
YEA   D   Meeks, Gregory NY 5th
YEA   D   Meng, Grace NY 6th
NAY   D   Velázquez, Nydia NY 7th
YEA   D   Jeffries, Hakeem NY 8th
NAY   D   Clarke, Yvette NY 9th
NAY   D   Nadler, Jerrold NY 10th
YEA   R   Grimm, Michael NY 11th
YEA   D   Maloney, Carolyn NY 12th
NAY   D   Rangel, Charles NY 13th
YEA   D   Crowley, Joseph NY 14th
NAY   D   Serrano, José NY 15th
YEA   D   Engel, Eliot NY 16th
YEA   D   Lowey, Nita NY 17th
YEA   D   Maloney, Sean NY 18th
NAY   R   Gibson, Christopher NY 19th
YEA   D   Tonko, Paul NY 20th
YEA   D   Owens, William NY 21st
YEA   R   Hanna, Richard NY 22nd
YEA   R   Reed, Tom NY 23rd
YEA   D   Maffei, Daniel NY 24th
YEA   D   Slaughter, Louise NY 25th
YEA   D   Higgins, Brian NY 26th
YEA   R   Collins, Chris NY 27th
North Carolina
YEA   D   Butterfield, G.K. NC 1st
YEA   R   Ellmers, Renee NC 2nd
NAY   R   Jones, Walter NC 3rd
YEA   D   Price, David NC 4th
YEA   R   Foxx, Virginia NC 5th
YEA   R   Coble, Howard NC 6th
YEA   D   McIntyre, Mike NC 7th
VOTE PARTY REPRESENTATIVE DISTRICT
YEA   R   Hudson, Richard NC 8th
YEA   R   Pittenger, Robert NC 9th
YEA   R   McHenry, Patrick NC 10th
NAY   R   Meadows, Mark NC 11th
YEA   D   Adams, Alma NC 12th
YEA   R   Holding, George NC 13th
North Dakota
YEA   R   Cramer, Kevin ND
Ohio
YEA   R   Chabot, Steve OH 1st
YEA   R   Wenstrup, Brad OH 2nd
YEA   D   Beatty, Joyce OH 3rd
NAY   R   Jordan, Jim OH 4th
YEA   R   Latta, Robert OH 5th
YEA   R   Johnson, Bill OH 6th
YEA   R   Gibbs, Bob OH 7th
NAY   D   Kaptur, Marcy OH 9th
YEA   R   Turner, Michael OH 10th
YEA   D   Fudge, Marcia OH 11th
YEA   R   Tiberi, Pat OH 12th
YEA   D   Ryan, Tim OH 13th
YEA   R   Joyce, David OH 14th
YEA   R   Stivers, Steve OH 15th
YEA   R   Renacci, James OH 16th
Oklahoma
NAY   R   Bridenstine, Jim OK 1st
YEA   R   Mullin, Markwayne OK 2nd
YEA   R   Lucas, Frank OK 3rd
YEA   R   Cole, Tom OK 4th
YEA   R   Lankford, James OK 5th
Oregon
NAY   D   Bonamici, Suzanne OR 1st
YEA   R   Walden, Greg OR 2nd
NAY   D   Blumenauer, Earl OR 3rd
NAY   D   DeFazio, Peter OR 4th
NO VOTE   D   Schrader, Kurt OR 5th
Pennsylvania
YEA   D   Brady, Robert PA 1st
YEA   D   Fattah, Chaka PA 2nd
YEA   R   Kelly, Mike PA 3rd
NAY   R   Perry, Scott PA 4th
YEA   R   Thompson, Glenn PA 5th
YEA   R   Gerlach, Jim PA 6th
YEA   R   Meehan, Patrick PA 7th
YEA   R   Fitzpatrick, Michael PA 8th
YEA   R   Shuster, Bill PA 9th
YEA   R   Marino, Tom PA 10th
YEA   R   Barletta, Lou PA 11th
YEA   R   Rothfus, Keith PA 12th
YEA   D   Schwartz, Allyson PA 13th
NAY   D   Doyle, Mike PA 14th
YEA   R   Dent, Charles PA 15th
YEA   R   Pitts, Joseph PA 16th
YEA   D   Cartwright, Matthew PA 17th
YEA   R   Murphy, Tim PA 18th
Rhode Island
YEA   D   Cicilline, David RI 1st
YEA   D   Langevin, Jim RI 2nd
South Carolina
NAY   R   Sanford, Mark SC 1st
YEA   R   Wilson, Joe SC 2nd
NAY   R   Duncan, Jeff SC 3rd
NAY   R   Gowdy, Trey SC 4th
NAY   R   Mulvaney, Mick SC 5th
YEA   D   Clyburn, Jim SC 6th
YEA   R   Rice, Tom SC 7th
South Dakota
YEA   R   Noem, Kristi SD
Tennessee
NAY   R   Roe, Phil TN 1st
NAY   R   Duncan, John TN 2nd
YEA   R   Fleischmann, Chuck TN 3rd
NAY   R   DesJarlais, Scott TN 4th
YEA   D   Cooper, Jim TN 5th
YEA   R   Black, Diane TN 6th
YEA   R   Blackburn, Marsha TN 7th
YEA   R   Fincher, Stephen TN 8th
NAY   D   Cohen, Steve TN 9th
Texas
NAY   R   Gohmert, Louie TX 1st
NAY   R   Poe, Ted TX 2nd
YEA   R   Johnson, Sam TX 3rd
NO VOTE   R   Hall, Ralph TX 4th
YEA   R   Hensarling, Jeb TX 5th
YEA   R   Barton, Joe TX 6th
YEA   R   Culberson, John TX 7th
YEA   R   Brady, Kevin TX 8th
YEA   D   Green, Al TX 9th
YEA   R   McCaul, Michael TX 10th
YEA   R   Conaway, Michael TX 11th
YEA   R   Granger, Kay TX 12th
YEA   R   Thornberry, Mac TX 13th
NAY   R   Weber, Randy TX 14th
YEA   D   Hinojosa, Rubén TX 15th
NAY   D   O’Rourke, Beto TX 16th
YEA   R   Flores, Bill TX 17th
NAY   D   Jackson Lee, Sheila TX 18th
YEA   R   Neugebauer, Randy TX 19th
YEA   D   Castro, Joaquin TX 20th
YEA   R   Smith, Lamar TX 21st
YEA   R   Olson, Pete TX 22nd
YEA   D   Gallego, Pete TX 23rd
YEA   R   Marchant, Kenny TX 24th
YEA   R   Williams, Roger TX 25th
NAY   R   Burgess, Michael TX 26th
YEA   R   Farenthold, Blake TX 27th
YEA   D   Cuellar, Henry TX 28th
YEA   D   Green, Gene TX 29th
YEA   D   Johnson, Eddie TX 30th
YEA   R   Carter, John TX 31st
YEA   R   Sessions, Pete TX 32nd
YEA   D   Veasey, Marc TX 33rd
YEA   D   Vela, Filemon TX 34th
NAY   D   Doggett, Lloyd TX 35th
NAY   R   Stockman, Steve TX 36th
Utah
YEA   R   Bishop, Rob UT 1st
YEA   R   Stewart, Chris UT 2nd
YEA   R   Chaffetz, Jason UT 3rd
YEA   D   Matheson, Jim UT 4th
Vermont
NAY   D   Welch, Peter VT
Virginia
YEA   R   Wittman, Robert VA 1st
YEA   R   Rigell, Scott VA 2nd
YEA   D   Scott, Bobby VA 3rd
YEA   R   Forbes, Randy VA 4th
YEA   R   Hurt, Robert VA 5th
YEA   R   Goodlatte, Bob VA 6th
NAY   R   Brat, Dave VA 7th
YEA   D   Moran, Jim VA 8th
NAY   R   Griffith, Morgan VA 9th
YEA   R   Wolf, Frank VA 10th
YEA   D   Connolly, Gerald VA 11th
Washington
NAY   D   DelBene, Suzan WA 1st
YEA   D   Larsen, Rick WA 2nd
YEA   R   Herrera Beutler, Jaime WA 3rd
YEA   R   Hastings, Doc WA 4th
YEA   R   McMorris Rodgers, Cathy WA 5th
YEA   D   Kilmer, Derek WA 6th
NAY   D   McDermott, Jim WA 7th
YEA   R   Reichert, David WA 8th
NO VOTE   D   Smith, Adam WA 9th
NAY   D   Heck, Denny WA 10th
West Virginia
YEA   R   McKinley, David WV 1st
YEA   R   Capito, Shelley WV 2nd
YEA   D   Rahall, Nick WV 3rd
Wisconsin
YEA   R   Ryan, Paul WI 1st
NAY   D   Pocan, Mark WI 2nd
YEA   D   Kind, Ron WI 3rd
NAY   D   Moore, Gwen WI 4th
NAY   R   Sensenbrenner, James WI 5th
YEA   R   Petri, Tom WI 6th
YEA   R   Duffy, Sean WI 7th
NAY   R   Ribble, Reid WI 8th
Wyoming
NAY   R   Lummis, Cynthia

 

 

   This is a despicable vote and all the Republicans that voted in favor of this bill should hang their heads in shame . 

 

 

 

 

 

 

 

 

Brilliant New Device Lets Protestors Block Surveillance And Stingrays

 

tun angles 2

 

 

 

” Reports about agents using a Stingray on protesters to unconstitutionally monitor their phones are circulating widely, and now protesters have a way to fight back.

  Earlier this week an anonymous leaked recording exposed the agents monitoring the protesters’ movements by tracking their phones. A Stingray mimics a cellular tower, letting agents pry into citizens’ cell phones and gather their data/location without a warrant.

  Stingrays were supposed to be used for “terrorists,” but now they’re being used against us locally — which is unconstitutional.

  And that’s where a new product called Tunnel enters the scene .

  We’ve known that the NSA spies on us ever since Edward Snowden blew the whistle on them.

  But have you ever wondered if it’s possible for somebody to spy back on them?

  The NSA has a special way of protecting itself against such a possibility.  And you’ve probably never heard of it.

  To hide its own privacy, the NSA installs copper  – yes, you read that correctly: copper – around the equipment in its buildings.

  It turns out that copper has a unique conductive property that allows it to block surveillance, letting those who use it hide their activities from would-be spies.

  The main NSA headquarters is described as ”a building covered with one-way dark glass, which is lined with copper shielding in order to prevent espionage by trapping in signals and sounds.”

  The question becomes: if they can protect their own privacy with copper, why can’t we use this same technique to protect our privacy from them?

  Well now we finally can.

  Tunnel is a portable Faraday enclosure that uses a 100% authentic copper shielding system to surround your phone.  When your phone is inside, it forms a topologically near-complete surface to prevent non-ionizing radiation from penetrating its boundaries, letting you avoid surveillance.

  Thankfully, it’s not going to cost thousands of dollars, which has come as great news for protesters and other privacy advocates. “

 

 

   Be sure to read the rest at Filming Cops and while you are there grab their coupon code that will give the first 100 purchasers 35% off of the already discounted holiday price . Order yours today , we did and got it for a mere $43 with shipping thanks to the Filming Cops coupon . 

 

 

 

 

 

 

 

 

 

 

Follow

Get every new post delivered to your Inbox.

Join 7,060 other followers