Category: Surveillance


Cellphone Privacy Is Shaky, Researchers Say

 

 

 

” German researchers have discovered security flaws that could let hackers, spies, and criminals listen to private phone calls and intercept text messages on a potentially massive scale — even when cellular networks are using the most advanced encryption available.

  The flaws, to be reported at a hacker conference in Hamburg this month, are the latest evidence of widespread insecurity on SS7, the global network that allows the world’s cellular carriers to route calls, texts, and other data to one another. Experts say it’s increasingly clear that SS7, designed in the 1980s, is riddled with serious vulnerabilities.

  The flaws discovered by the Germans are actually functions built into SS7 for other purposes, such as keeping calls connected as users speed down highways, switching from cell tower to cell tower. Hackers can repurpose them because of the lax security on the network.”

 

Read more at the Boston Globe

 

 

 

 

 

 

 

 

 

About these ads

Cops Illegally Nailed Webcam To Utility Pole For 6 Weeks To Spy On House

 

 

 

” A federal judge on Monday tossed evidence that was gathered by a webcam—turned on for six weeks—that the authorities nailed to a utility pole 100 yards from a suspected drug dealer’s rural Washington state house.

  The Justice Department contended that the webcam, with pan-and-zoom capabilities that were operated from afar, was no different from a police officer’s observation from the public right-of-way.

The government argued (PDF):

  The advantage of a police camera to law enforcement is that it saves the time and manpower required to conduct around the clock surveillance. As in this case, law enforcement is authorized to use the pole camera only to record activities that are otherwise open to public view, and not protected by the 4th Amendment.

  US District Judge Edward Shea disagreed and ruled (PDF) that a warrant was necessary to spy on Leonel Vargas via a webcam controlled by local police.”

 

 

Somehow this little tidbit doesn’t surprise us:

 

 

” Strangely, the judge noted, when the authorities raided the house in May 2013, the camera was panned on nearby sagebrush and not the house.”

 

 

ArsTechnica

 

 

 

 

 

 

 

 

 

Cops Are Scanning Social Media To Assign You A “Threat Rating”

police-social-media-threat-rating

 

 

” Online activity, purchases, and “comments that could be construed as offensive,” all contribute to your threat score.

  Imagine the following scenario: You are on your way home from work, driving down the road, when you notice police lights in your rear view mirror. You are being pulled over.

  As you sit there, on the shoulder, adrenaline rushing, simultaneously angry and nervous, the police officer, in his patrol car behind you, is sizing you up based on an algorithm that determines your “threat rating.” 

  The officer enters your license plate into a mobile application on his laptop. In a matter of seconds, this application crawls over billions of records in commercial and public databases, including all available social media engagement, recent purchases and “any comments that could be construed as offensive.” The application then determines if your “threat rating” is green, yellow, or red.”

 

 

 

 

 

 

 

 

” Imagine that you are one of our informed and frequent readers and understand the importance of police accountability and are unafraid to voice your completely peaceful, yet strong opinion about police misconduct. Imagine that you left a comment on Facebook this morning about a particular officer’s misconduct; imagine that it is this particular officer who just pulled you over.

  Up until this point, you have never committed a crime, you have never been violent, you have never even so much as run a stop sign. However, this police officer now knows that you made a comment about him punching the (insert handcuffed and helpless victim example here) on Facebook, and he literally sees red (your threat rating).

  What happens next? Does a routine traffic stop for driving 10 miles over the speed limit morph into a situation in which you now have a Smith and Wesson M&P 9mm pistol with Streamlight TLR-2s laser site being aimed just above your left ear?

  Do you receive multiple erroneous citations because this officer now has access to your personal life? Do you get cited where the officer would have otherwise let someone else go?

  Or, maybe you are a cop or a judge, or the mayor, but this application confuses you with someone else and marks you as “red,” then what? What if you are driving someone else’s car?

  The reality is, that any number of unimaginable things can and would happen next. And now, thanks to a particularly ominous product, by a company named Intrado, and the Orwellian nature of police in this country, those unimaginable situations are now a reality.

Read more at The Free Thought Project

 

 

 

 

 

 

 

 

 

 

 

Prof: ‘Elf On The Shelf’ Conditions Kids To Accept Surveillance State

 

 

 

 

Could there be something more sinister behind the little elf sitting on the shelf who returns to the North Pole each night?

  Yes, says Laura Pinto, a digital technology professor at the University of Ontario Institute of Technology.

  She recently published a paper titled “Who’s the Boss” on the doll, saying the idea of it reporting back to Santa each night on the child’s behavior “sets up children for dangerous, uncritical acceptance of power structures,” according to insideHalton.com.

  From her paper:

  When children enter the play world of The Elf on the Shelf, they accept a series of practices and rules associated with the larger story. This, of course, is not unique to The Elf on the Shelf. Many children’s games, including board games and video games, require children to participate while following a prescribed set of rules. The difference, however, is that in other games, the child role-plays a character, or the child imagines herself within a play-world of the game, but the role play does not enter the child’s real world as part of the game. As well, in most games, the time of play is delineated (while the game goes on), and the play to which the rules apply typically does not overlap with the child’s real world.

“  You’re teaching (kids) a bigger lesson, which is that it’s OK for other people to spy on you and you’re not entitled to privacy,” she tells the Toronto Star. “

 

Read the rest

 

 

 

 

 

 

 

 

 

 

Stinky Revenge: Couple Tricks Holiday Package Thief Into Stealing Box Of Dog Poop

 

Dog Poop Package

 

Click pic for video

” After falling victim to thieves who swiped packages off of their front porch several times, a Northeast D.C. couple decided to teach them a lesson.

  Tis the season for package thieves; many D.C.-area residents have recently caught robbers taking packages on surveillance. But for one couple, caught on camera wasn’t enough—they boxed up a stinky surprise from their two dogs.

  About 3 p.m. Friday, surveillance footage shows a man walking up and down the sidewalk in front of their home, before stealing their package and taking off. The caught-on-camera incident marked the third package taken from their yard since October. “

 

Continued

 

 

 

 

 

 

 

 

 

A Personal Drone?

 

 

 

” Will it soon be as normal to have a drone in your pocket as it is to have a smartphone in your pocket today?

  That is what researchers at the Delft University of Technology in the Netherlands believe. They are working on light weight, palm-sized drones for the urban environment.

  The team is responsible for the world’s smallest drone with a functional camera – weighing only 4 grams. And it is working on low cost technology that will allow such lightweight drones to navigate cities autonomously, by working in conjunction with smartphones.

  Research is already under way to see if drones can be used professionally for package deliveries, land surveying and medical care.

  But the team at Delft believe that the lightweight nature of their miniature drones makes them safer for use in populated areas than the bigger models.

  Bart Remes demonstrated a prototype model to the BBC’s Dougal Shaw at the RE.WORK Future Cities summit. “

Thanks to the BBC

Spy Drone Hacks WiFi Networks, Listens To Calls

 

 

WIFI Hacking Drone

 

 

” It’s small. It’s bright yellow, and it’s capable of cracking Wi-Fi passwords, eavesdropping on your cell phone calls and reading your text messages. It’s an unmanned spy drone and it just landed in Washington, D.C.

  Long-time friends and former Air Force buddies, Mike Tassey and Rich Perkins, describe their state-of-the-art cyber drone as hard to take down, hard to see and virtually hard to detect.”

 

 

Mike Tassey, Rich Perkins: Wireless Ariel Surveillance

 

 

” They built it in a garage, using off the shelf electronics to prove a drone can be used to launch cyber-attacks.

  It needs a human for take-off and landing but once airborne, it can fly any pre-programmed route posing as a cell phone tower and tricking wireless cell phones.

” We passed telephone calls, hacked into networks, cracked the encryption on Wi-Fi access points all of that sort of evilness is possible,” said Tassey.”

 

 

Read more

 

 

 

 

 

 

 

 

 

Congress Has Just Overruled Your 1st, 4th And 5th Amendment Rights

 

 

 

” As of today, Bill HR4681 has passed the house and senate, and is currently undergoing arbitration before being sent to the President for his signature in to law. The law says that the intelligence community can collect, retain, and disseminate all electronic communications including voice calls [without any constitutional restrictions] on all US citizens and everyone else in the world.  And they have 5 years before they are supposed to destroy the records.  However, they can keep them indefinitely if they fall into several categories of interest.

  It is all out in the open now.  Your 1st, 4th, and 5th Amendment protections are gone.  This act gives new meaning to ‘land of the free, home of the brave.’  The intelligence community isn’t doing anything in secret any more.  Americans are now living in an environment much like the days of the old Stalinist Soviet Union, where the presumption was that all conversations were monitored and one takes measures to have a ‘private’ conversations. 

  So turn up your radio or turn the water on in the sink and watch what you say on the phone or Facebook, even casual remarks on twitter may come back to haunt you in the future.  Don’t believe me, I have pasted the relevant parts of the bill below this story. Still don’t believe it? Just go to www.congress.gov/bill/113th-congress/house-bill/4681/text and read it from the horse’s mouth.

What are you willing to do about it?

[Congressional Bills 113th Congress]

[From the U.S. Government Printing Office]

 

[H.R. 4681 Enrolled Bill (ENR)]

H.R.4681

One Hundred Thirteenth Congress

of the

United States of America

TITLE III–GENERAL PROVISIONS

Subtitle A–General Matters

Sec. 309. Procedures for the retention of incidentally acquired

communications.

SEC. 309. PROCEDURES FOR THE RETENTION OF INCIDENTALLY ACQUIRED

COMMUNICATIONS.

(a) Definitions.–In this section:

(1) Covered communication.–The term “covered communication”

means any nonpublic telephone or electronic communication acquired

without the consent of a person who is a party to the

communication, including communications in electronic storage.

(2) Head of an element of the intelligence community.–The term

“head of an element of the intelligence community” means, as

appropriate–

(A) the head of an element of the intelligence community;

or

(B) the head of the department or agency containing such

element.

(3) United states person.–The term “United States person”

has the meaning given that term in section 101 of the Foreign

Intelligence Surveillance Act of 1978 (50 U.S.C. 1801).

(b) Procedures for Covered Communications.–

(1) Requirement to adopt.–Not later than 2 years after the

date of the enactment of this Act each head of an element of the

intelligence community shall adopt procedures approved by the

Attorney General for such element that ensure compliance with the

requirements of paragraph (3).

(2) Coordination and approval.–The procedures required by

paragraph (1) shall be–

(A) prepared in coordination with the Director of National

Intelligence; and

(B) approved by the Attorney General prior to issuance.

(3) Procedures.–

(A) Application.–The procedures required by paragraph (1)

shall apply to any intelligence collection activity not

otherwise authorized by court order (including an order or

certification issued by a court established under subsection

(a) or (b) of section 103 of the Foreign Intelligence

Surveillance Act of 1978 (50 U.S.C. 1803)), subpoena, or

similar legal process that is reasonably anticipated to result

in the acquisition of a covered communication to or from a

United States person and shall permit the acquisition,

retention, and dissemination of covered communications subject

to the limitation in subparagraph (B).

(B) Limitation on retention.–A covered communication shall

not be retained in excess of 5 years, unless–

(i) the communication has been affirmatively

determined, in whole or in part, to constitute foreign

intelligence or counterintelligence or is necessary to

understand or assess foreign intelligence or

counterintelligence;

(ii) the communication is reasonably believed to

constitute evidence of a crime and is retained by a law

enforcement agency;

(iii) the communication is enciphered or reasonably

believed to have a secret meaning;

(iv) all parties to the communication are reasonably

believed to be non-United States persons;

(v) retention is necessary to protect against an

imminent threat to human life, in which case both the

nature of the threat and the information to be retained

shall be reported to the congressional intelligence

committees not later than 30 days after the date such

retention is extended under this clause;

(vi) retention is necessary for technical assurance or

compliance purposes, including a court order or discovery

obligation, in which case access to information retained

for technical assurance or compliance purposes shall be

reported to the congressional intelligence committees on an

annual basis; or

(vii) retention for a period in excess of 5 years is

approved by the head of the element of the intelligence

community responsible for such retention, based on a

determination that retention is necessary to protect the

national security of the United States, in which case the

head of such element shall provide to the congressional

intelligence committees a written certification

describing–

 

(I) the reasons extended retention is necessary to

protect the national security of the United States;

(II) the duration for which the head of the element

is authorizing retention;

(III) the particular information to be retained;

and

(IV) the measures the element of the intelligence

community is taking to protect the privacy interests of

United States persons or persons located inside the

United States. “

 

 

 

 

 

   Many thanks to Universal Free Press for providing this story . Below the reader can see who voted to rob you of your rights and who voted against Statism …

 

 

 

 

 

VOTE PARTY REPRESENTATIVE DISTRICT
Alabama
YEA   R   Byrne, Bradley AL 1st
YEA   R   Roby, Martha AL 2nd
YEA   R   Rogers, Mike AL 3rd
YEA   R   Aderholt, Robert AL 4th
NAY   R   Brooks, Mo AL 5th
YEA   R   Bachus, Spencer AL 6th
YEA   D   Sewell, Terri AL 7th
Alaska
YEA   R   Young, Don AK
Arizona
YEA   D   Kirkpatrick, Ann AZ 1st
YEA   D   Barber, Ron AZ 2nd
NAY   D   Grijalva, Raúl AZ 3rd
NAY   R   Gosar, Paul AZ 4th
NAY   R   Salmon, Matt AZ 5th
YEA   R   Schweikert, David AZ 6th
YEA   D   Pastor, Ed AZ 7th
YEA   R   Franks, Trent AZ 8th
YEA   D   Sinema, Kyrsten AZ 9th
Arkansas
YEA   R   Crawford, Eric AR 1st
YEA   R   Griffin, Tim AR 2nd
YEA   R   Womack, Steve AR 3rd
YEA   R   Cotton, Tom AR 4th
California
YEA   R   LaMalfa, Doug CA 1st
NAY   D   Huffman, Jared CA 2nd
NAY   D   Garamendi, John CA 3rd
NAY   R   McClintock, Tom CA 4th
YEA   D   Thompson, Mike CA 5th
NAY   D   Matsui, Doris CA 6th
YEA   D   Bera, Ami CA 7th
YEA   R   Cook, Paul CA 8th
YEA   D   McNerney, Jerry CA 9th
YEA   R   Denham, Jeff CA 10th
YEA   D   Miller, George CA 11th
YEA   D   Pelosi, Nancy CA 12th
NAY   D   Lee, Barbara CA 13th
NAY   D   Speier, Jackie CA 14th
NAY   D   Swalwell, Eric CA 15th
YEA   D   Costa, Jim CA 16th
NAY   D   Honda, Mike CA 17th
NAY   D   Eshoo, Anna CA 18th
NAY   D   Lofgren, Zoe CA 19th
NAY   D   Farr, Sam CA 20th
YEA   R   Valadao, David CA 21st
YEA   R   Nunes, Devin CA 22nd
YEA   R   McCarthy, Kevin CA 23rd
YEA   D   Capps, Lois CA 24th
YEA   R   McKeon, Buck CA 25th
YEA   D   Brownley, Julia CA 26th
NAY   D   Chu, Judy CA 27th
YEA   D   Schiff, Adam CA 28th
YEA   D   Cárdenas, Tony CA 29th
YEA   D   Sherman, Brad CA 30th
NO VOTE   R   Miller, Gary CA 31st
YEA   D   Napolitano, Grace CA 32nd
YEA   D   Waxman, Henry CA 33rd
YEA   D   Becerra, Xavier CA 34th
NO VOTE   D   Negrete McLeod, Gloria CA 35th
YEA   D   Ruiz, Raul CA 36th
NAY   D   Bass, Karen CA 37th
YEA   D   Sánchez, Linda CA 38th
YEA   R   Royce, Ed CA 39th
YEA   D   Roybal-Allard, Lucille CA 40th
NAY   D   Takano, Mark CA 41st
YEA   R   Calvert, Ken CA 42nd
NAY   D   Waters, Maxine CA 43rd
NAY   D   Hahn, Janice CA 44th
NO VOTE   R   Campbell, John CA 45th
YEA   D   Sanchez, Loretta CA 46th
NAY   D   Lowenthal, Alan CA 47th
NAY   R   Rohrabacher, Dana CA 48th
YEA   R   Issa, Darrell CA 49th
YEA   R   Hunter, Duncan CA 50th
YEA   D   Vargas, Juan CA 51st
YEA   D   Peters, Scott CA 52nd
YEA   D   Davis, Susan CA 53rd
Colorado
YEA   D   DeGette, Diana CO 1st
NAY   D   Polis, Jared CO 2nd
NAY   R   Tipton, Scott CO 3rd
YEA   R   Gardner, Cory CO 4th
YEA   R   Lamborn, Doug CO 5th
YEA   R   Coffman, Mike CO 6th
YEA   D   Perlmutter, Ed CO 7th
Connecticut
YEA   D   Larson, John CT 1st
YEA   D   Courtney, Joe CT 2nd
YEA   D   DeLauro, Rosa CT 3rd
YEA   D   Himes, James CT 4th
YEA   D   Esty, Elizabeth CT 5th
Delaware
YEA   D   Carney, John DE
Florida
NO VOTE   R   Miller, Jeff FL 1st
YEA   R   Southerland, Steve FL 2nd
NAY   R   Yoho, Ted FL 3rd
YEA   R   Crenshaw, Ander FL 4th
YEA   D   Brown, Corrine FL 5th
YEA   R   DeSantis, Ron FL 6th
NAY   R   Mica, John FL 7th
NAY   R   Posey, Bill FL 8th
NAY   D   Grayson, Alan FL 9th
YEA   R   Webster, Daniel FL 10th
NAY   R   Nugent, Richard FL 11th
YEA   R   Bilirakis, Gus FL 12th
YEA   R   Jolly, David FL 13th
YEA   D   Castor, Kathy FL 14th
YEA   R   Ross, Dennis FL 15th
YEA   R   Buchanan, Vern FL 16th
YEA   R   Rooney, Thomas FL 17th
YEA   D   Murphy, Patrick FL 18th
NAY   R   Clawson, Curt FL 19th
NAY   D   Hastings, Alcee FL 20th
YEA   D   Deutch, Theodore FL 21st
YEA   D   Frankel, Lois FL 22nd
YEA   D   Wasserman Schultz, Debbie FL 23rd
YEA   D   Wilson, Frederica FL 24th
YEA   R   Diaz-Balart, Mario FL 25th
NAY   D   Garcia, Joe FL 26th
YEA   R   Ros-Lehtinen, Ileana FL 27th
Georgia
NAY   R   Kingston, Jack GA 1st
YEA   D   Bishop, Sanford GA 2nd
YEA   R   Westmoreland, Lynn GA 3rd
YEA   D   Johnson, Hank GA 4th
NAY   D   Lewis, John GA 5th
YEA   R   Price, Tom GA 6th
NAY   R   Woodall, Rob GA 7th
NAY   R   Scott, Austin GA 8th
YEA   R   Collins, Doug GA 9th
NAY   R   Broun, Paul GA 10th
YEA   R   Gingrey, Phil GA 11th
YEA   D   Barrow, John GA 12th
YEA   D   Scott, David GA 13th
NAY   R   Graves, Tom GA 14th
Hawaii
NAY   D   Hanabusa, Colleen HI 1st
YEA   D   Gabbard, Tulsi HI 2nd
Idaho
NAY   R   Labrador, Raúl ID 1st
YEA   R   Simpson, Mike ID 2nd
Illinois
YEA   D   Rush, Bobby IL 1st
YEA   D   Kelly, Robin IL 2nd
YEA   D   Lipinski, Daniel IL 3rd
NAY   D   Gutiérrez, Luis IL 4th
YEA   D   Quigley, Mike IL 5th
YEA   R   Roskam, Peter IL 6th
YEA   D   Davis, Danny IL 7th
NO VOTE   D   Duckworth, Tammy IL 8th
NAY   D   Schakowsky, Jan IL 9th
YEA   D   Schneider, Bradley IL 10th
YEA   D   Foster, Bill IL 11th
YEA   D   Enyart, William IL 12th
YEA   R   Davis, Rodney IL 13th
YEA   R   Hultgren, Randy IL 14th
YEA   R   Shimkus, John IL 15th
YEA   R   Kinzinger, Adam IL 16th
YEA   D   Bustos, Cheri IL 17th
VOTE PARTY REPRESENTATIVE DISTRICT
YEA   R   Schock, Aaron IL 18th
Indiana
YEA   D   Visclosky, Peter IN 1st
YEA   R   Walorski, Jackie IN 2nd
YEA   R   Stutzman, Marlin IN 3rd
YEA   R   Rokita, Todd IN 4th
YEA   R   Brooks, Susan IN 5th
YEA   R   Messer, Luke IN 6th
YEA   D   Carson, André IN 7th
YEA   R   Bucshon, Larry IN 8th
YEA   R   Young, Todd IN 9th
Iowa
YEA   D   Braley, Bruce IA 1st
YEA   D   Loebsack, David IA 2nd
YEA   R   Latham, Tom IA 3rd
YEA   R   King, Steve IA 4th
Kansas
NAY   R   Huelskamp, Tim KS 1st
YEA   R   Jenkins, Lynn KS 2nd
YEA   R   Yoder, Kevin KS 3rd
YEA   R   Pompeo, Mike KS 4th
Kentucky
YEA   R   Whitfield, Ed KY 1st
YEA   R   Guthrie, Brett KY 2nd
NAY   D   Yarmuth, John KY 3rd
NAY   R   Massie, Thomas KY 4th
YEA   R   Rogers, Hal KY 5th
YEA   R   Barr, Andy KY 6th
Louisiana
YEA   R   Scalise, Steve LA 1st
YEA   D   Richmond, Cedric LA 2nd
YEA   R   Boustany, Charles LA 3rd
YEA   R   Fleming, John LA 4th
YEA   R   McAllister, Vance LA 5th
YEA   R   Cassidy, Bill LA 6th
Maine
YEA   D   Pingree, Chellie ME 1st
YEA   D   Michaud, Michael ME 2nd
Maryland
YEA   R   Harris, Andy MD 1st
YEA   D   Ruppersberger, A. Dutch MD 2nd
YEA   D   Sarbanes, John MD 3rd
YEA   D   Edwards, Donna MD 4th
YEA   D   Hoyer, Steny MD 5th
YEA   D   Delaney, John MD 6th
NAY   D   Cummings, Elijah MD 7th
YEA   D   Van Hollen, Chris MD 8th
Massachusetts
YEA   D   Neal, Richard MA 1st
NAY   D   McGovern, Jim MA 2nd
YEA   D   Tsongas, Niki MA 3rd
YEA   D   Kennedy, Joseph MA 4th
NAY   D   Clark, Katherine MA 5th
NAY   D   Tierney, John MA 6th
NO VOTE   D   Capuano, Michael MA 7th
YEA   D   Lynch, Stephen MA 8th
YEA   D   Keating, William MA 9th
Michigan
YEA   R   Benishek, Dan MI 1st
YEA   R   Huizenga, Bill MI 2nd
NAY   R   Amash, Justin MI 3rd
YEA   R   Camp, Dave MI 4th
NAY   D   Kildee, Daniel MI 5th
YEA   R   Upton, Fred MI 6th
YEA   R   Walberg, Tim MI 7th
YEA   R   Rogers, Mike MI 8th
YEA   D   Levin, Sander MI 9th
YEA   R   Miller, Candice MI 10th
NAY   R   Bentivolio, Kerry MI 11th
YEA   D   Dingell, John MI 12th
NAY   D   Conyers, John MI 13th
YEA   D   Peters, Gary MI 14th
Minnesota
YEA   D   Walz, Timothy MN 1st
YEA   R   Kline, John MN 2nd
YEA   R   Paulsen, Erik MN 3rd
NAY   D   McCollum, Betty MN 4th
YEA   D   Ellison, Keith MN 5th
YEA   R   Bachmann, Michele MN 6th
YEA   D   Peterson, Collin MN 7th
YEA   D   Nolan, Richard MN 8th
Mississippi
YEA   R   Nunnelee, Alan MS 1st
YEA   D   Thompson, Bennie MS 2nd
YEA   R   Harper, Gregg MS 3rd
YEA   R   Palazzo, Steven MS 4th
Missouri
YEA   D   Clay, Lacy MO 1st
YEA   R   Wagner, Ann MO 2nd
YEA   R   Luetkemeyer, Blaine MO 3rd
YEA   R   Hartzler, Vicky MO 4th
YEA   D   Cleaver, Emanuel MO 5th
YEA   R   Graves, Sam MO 6th
YEA   R   Long, Billy MO 7th
YEA   R   Smith, Jason MO 8th
Montana
YEA   R   Daines, Steve MT
Nebraska
YEA   R   Fortenberry, Jeff NE 1st
YEA   R   Terry, Lee NE 2nd
YEA   R   Smith, Adrian NE 3rd
Nevada
YEA   D   Titus, Dina NV 1st
YEA   R   Amodei, Mark NV 2nd
YEA   R   Heck, Joseph NV 3rd
YEA   D   Horsford, Steven NV 4th
New Hampshire
YEA   D   Shea-Porter, Carol NH 1st
YEA   D   Kuster, Ann NH 2nd
New Jersey
YEA   D   Norcross, Donald NJ 1st
YEA   R   LoBiondo, Frank NJ 2nd
YEA   R   Runyan, Jon NJ 3rd
YEA   R   Smith, Chris NJ 4th
NAY   R   Garrett, Scott NJ 5th
NAY   D   Pallone, Frank NJ 6th
YEA   R   Lance, Leonard NJ 7th
YEA   D   Sires, Albio NJ 8th
YEA   D   Pascrell, Bill NJ 9th
YEA   D   Payne, Donald NJ 10th
YEA   R   Frelinghuysen, Rodney NJ 11th
NAY   D   Holt, Rush NJ 12th
New Mexico
YEA   D   Lujan Grisham, Michelle NM 1st
YEA   R   Pearce, Steve NM 2nd
YEA   D   Luján, Ben NM 3rd
New York
YEA   D   Bishop, Timothy NY 1st
YEA   R   King, Pete NY 2nd
YEA   D   Israel, Steve NY 3rd
YEA   D   McCarthy, Carolyn NY 4th
YEA   D   Meeks, Gregory NY 5th
YEA   D   Meng, Grace NY 6th
NAY   D   Velázquez, Nydia NY 7th
YEA   D   Jeffries, Hakeem NY 8th
NAY   D   Clarke, Yvette NY 9th
NAY   D   Nadler, Jerrold NY 10th
YEA   R   Grimm, Michael NY 11th
YEA   D   Maloney, Carolyn NY 12th
NAY   D   Rangel, Charles NY 13th
YEA   D   Crowley, Joseph NY 14th
NAY   D   Serrano, José NY 15th
YEA   D   Engel, Eliot NY 16th
YEA   D   Lowey, Nita NY 17th
YEA   D   Maloney, Sean NY 18th
NAY   R   Gibson, Christopher NY 19th
YEA   D   Tonko, Paul NY 20th
YEA   D   Owens, William NY 21st
YEA   R   Hanna, Richard NY 22nd
YEA   R   Reed, Tom NY 23rd
YEA   D   Maffei, Daniel NY 24th
YEA   D   Slaughter, Louise NY 25th
YEA   D   Higgins, Brian NY 26th
YEA   R   Collins, Chris NY 27th
North Carolina
YEA   D   Butterfield, G.K. NC 1st
YEA   R   Ellmers, Renee NC 2nd
NAY   R   Jones, Walter NC 3rd
YEA   D   Price, David NC 4th
YEA   R   Foxx, Virginia NC 5th
YEA   R   Coble, Howard NC 6th
YEA   D   McIntyre, Mike NC 7th
VOTE PARTY REPRESENTATIVE DISTRICT
YEA   R   Hudson, Richard NC 8th
YEA   R   Pittenger, Robert NC 9th
YEA   R   McHenry, Patrick NC 10th
NAY   R   Meadows, Mark NC 11th
YEA   D   Adams, Alma NC 12th
YEA   R   Holding, George NC 13th
North Dakota
YEA   R   Cramer, Kevin ND
Ohio
YEA   R   Chabot, Steve OH 1st
YEA   R   Wenstrup, Brad OH 2nd
YEA   D   Beatty, Joyce OH 3rd
NAY   R   Jordan, Jim OH 4th
YEA   R   Latta, Robert OH 5th
YEA   R   Johnson, Bill OH 6th
YEA   R   Gibbs, Bob OH 7th
NAY   D   Kaptur, Marcy OH 9th
YEA   R   Turner, Michael OH 10th
YEA   D   Fudge, Marcia OH 11th
YEA   R   Tiberi, Pat OH 12th
YEA   D   Ryan, Tim OH 13th
YEA   R   Joyce, David OH 14th
YEA   R   Stivers, Steve OH 15th
YEA   R   Renacci, James OH 16th
Oklahoma
NAY   R   Bridenstine, Jim OK 1st
YEA   R   Mullin, Markwayne OK 2nd
YEA   R   Lucas, Frank OK 3rd
YEA   R   Cole, Tom OK 4th
YEA   R   Lankford, James OK 5th
Oregon
NAY   D   Bonamici, Suzanne OR 1st
YEA   R   Walden, Greg OR 2nd
NAY   D   Blumenauer, Earl OR 3rd
NAY   D   DeFazio, Peter OR 4th
NO VOTE   D   Schrader, Kurt OR 5th
Pennsylvania
YEA   D   Brady, Robert PA 1st
YEA   D   Fattah, Chaka PA 2nd
YEA   R   Kelly, Mike PA 3rd
NAY   R   Perry, Scott PA 4th
YEA   R   Thompson, Glenn PA 5th
YEA   R   Gerlach, Jim PA 6th
YEA   R   Meehan, Patrick PA 7th
YEA   R   Fitzpatrick, Michael PA 8th
YEA   R   Shuster, Bill PA 9th
YEA   R   Marino, Tom PA 10th
YEA   R   Barletta, Lou PA 11th
YEA   R   Rothfus, Keith PA 12th
YEA   D   Schwartz, Allyson PA 13th
NAY   D   Doyle, Mike PA 14th
YEA   R   Dent, Charles PA 15th
YEA   R   Pitts, Joseph PA 16th
YEA   D   Cartwright, Matthew PA 17th
YEA   R   Murphy, Tim PA 18th
Rhode Island
YEA   D   Cicilline, David RI 1st
YEA   D   Langevin, Jim RI 2nd
South Carolina
NAY   R   Sanford, Mark SC 1st
YEA   R   Wilson, Joe SC 2nd
NAY   R   Duncan, Jeff SC 3rd
NAY   R   Gowdy, Trey SC 4th
NAY   R   Mulvaney, Mick SC 5th
YEA   D   Clyburn, Jim SC 6th
YEA   R   Rice, Tom SC 7th
South Dakota
YEA   R   Noem, Kristi SD
Tennessee
NAY   R   Roe, Phil TN 1st
NAY   R   Duncan, John TN 2nd
YEA   R   Fleischmann, Chuck TN 3rd
NAY   R   DesJarlais, Scott TN 4th
YEA   D   Cooper, Jim TN 5th
YEA   R   Black, Diane TN 6th
YEA   R   Blackburn, Marsha TN 7th
YEA   R   Fincher, Stephen TN 8th
NAY   D   Cohen, Steve TN 9th
Texas
NAY   R   Gohmert, Louie TX 1st
NAY   R   Poe, Ted TX 2nd
YEA   R   Johnson, Sam TX 3rd
NO VOTE   R   Hall, Ralph TX 4th
YEA   R   Hensarling, Jeb TX 5th
YEA   R   Barton, Joe TX 6th
YEA   R   Culberson, John TX 7th
YEA   R   Brady, Kevin TX 8th
YEA   D   Green, Al TX 9th
YEA   R   McCaul, Michael TX 10th
YEA   R   Conaway, Michael TX 11th
YEA   R   Granger, Kay TX 12th
YEA   R   Thornberry, Mac TX 13th
NAY   R   Weber, Randy TX 14th
YEA   D   Hinojosa, Rubén TX 15th
NAY   D   O’Rourke, Beto TX 16th
YEA   R   Flores, Bill TX 17th
NAY   D   Jackson Lee, Sheila TX 18th
YEA   R   Neugebauer, Randy TX 19th
YEA   D   Castro, Joaquin TX 20th
YEA   R   Smith, Lamar TX 21st
YEA   R   Olson, Pete TX 22nd
YEA   D   Gallego, Pete TX 23rd
YEA   R   Marchant, Kenny TX 24th
YEA   R   Williams, Roger TX 25th
NAY   R   Burgess, Michael TX 26th
YEA   R   Farenthold, Blake TX 27th
YEA   D   Cuellar, Henry TX 28th
YEA   D   Green, Gene TX 29th
YEA   D   Johnson, Eddie TX 30th
YEA   R   Carter, John TX 31st
YEA   R   Sessions, Pete TX 32nd
YEA   D   Veasey, Marc TX 33rd
YEA   D   Vela, Filemon TX 34th
NAY   D   Doggett, Lloyd TX 35th
NAY   R   Stockman, Steve TX 36th
Utah
YEA   R   Bishop, Rob UT 1st
YEA   R   Stewart, Chris UT 2nd
YEA   R   Chaffetz, Jason UT 3rd
YEA   D   Matheson, Jim UT 4th
Vermont
NAY   D   Welch, Peter VT
Virginia
YEA   R   Wittman, Robert VA 1st
YEA   R   Rigell, Scott VA 2nd
YEA   D   Scott, Bobby VA 3rd
YEA   R   Forbes, Randy VA 4th
YEA   R   Hurt, Robert VA 5th
YEA   R   Goodlatte, Bob VA 6th
NAY   R   Brat, Dave VA 7th
YEA   D   Moran, Jim VA 8th
NAY   R   Griffith, Morgan VA 9th
YEA   R   Wolf, Frank VA 10th
YEA   D   Connolly, Gerald VA 11th
Washington
NAY   D   DelBene, Suzan WA 1st
YEA   D   Larsen, Rick WA 2nd
YEA   R   Herrera Beutler, Jaime WA 3rd
YEA   R   Hastings, Doc WA 4th
YEA   R   McMorris Rodgers, Cathy WA 5th
YEA   D   Kilmer, Derek WA 6th
NAY   D   McDermott, Jim WA 7th
YEA   R   Reichert, David WA 8th
NO VOTE   D   Smith, Adam WA 9th
NAY   D   Heck, Denny WA 10th
West Virginia
YEA   R   McKinley, David WV 1st
YEA   R   Capito, Shelley WV 2nd
YEA   D   Rahall, Nick WV 3rd
Wisconsin
YEA   R   Ryan, Paul WI 1st
NAY   D   Pocan, Mark WI 2nd
YEA   D   Kind, Ron WI 3rd
NAY   D   Moore, Gwen WI 4th
NAY   R   Sensenbrenner, James WI 5th
YEA   R   Petri, Tom WI 6th
YEA   R   Duffy, Sean WI 7th
NAY   R   Ribble, Reid WI 8th
Wyoming
NAY   R   Lummis, Cynthia

 

 

   This is a despicable vote and all the Republicans that voted in favor of this bill should hang their heads in shame . 

 

 

 

 

 

 

 

 

Brilliant New Device Lets Protestors Block Surveillance And Stingrays

 

tun angles 2

 

 

 

” Reports about agents using a Stingray on protesters to unconstitutionally monitor their phones are circulating widely, and now protesters have a way to fight back.

  Earlier this week an anonymous leaked recording exposed the agents monitoring the protesters’ movements by tracking their phones. A Stingray mimics a cellular tower, letting agents pry into citizens’ cell phones and gather their data/location without a warrant.

  Stingrays were supposed to be used for “terrorists,” but now they’re being used against us locally — which is unconstitutional.

  And that’s where a new product called Tunnel enters the scene .

  We’ve known that the NSA spies on us ever since Edward Snowden blew the whistle on them.

  But have you ever wondered if it’s possible for somebody to spy back on them?

  The NSA has a special way of protecting itself against such a possibility.  And you’ve probably never heard of it.

  To hide its own privacy, the NSA installs copper  – yes, you read that correctly: copper – around the equipment in its buildings.

  It turns out that copper has a unique conductive property that allows it to block surveillance, letting those who use it hide their activities from would-be spies.

  The main NSA headquarters is described as ”a building covered with one-way dark glass, which is lined with copper shielding in order to prevent espionage by trapping in signals and sounds.”

  The question becomes: if they can protect their own privacy with copper, why can’t we use this same technique to protect our privacy from them?

  Well now we finally can.

  Tunnel is a portable Faraday enclosure that uses a 100% authentic copper shielding system to surround your phone.  When your phone is inside, it forms a topologically near-complete surface to prevent non-ionizing radiation from penetrating its boundaries, letting you avoid surveillance.

  Thankfully, it’s not going to cost thousands of dollars, which has come as great news for protesters and other privacy advocates. “

 

 

   Be sure to read the rest at Filming Cops and while you are there grab their coupon code that will give the first 100 purchasers 35% off of the already discounted holiday price . Order yours today , we did and got it for a mere $43 with shipping thanks to the Filming Cops coupon . 

 

 

 

 

 

 

 

 

 

 

Navy Spy “Fish” Could Be Operational Next Year

 

 

 

 

 

” It looks like a fish, sort of. It swims like one too, if you squint. It’s even named after a fish – OK, a Disney one.

  The Navy is hoping that’ll be enough to get the little swimmer into enemy territory undetected to patrol and protect U.S. ships and ports from harm.

  Project Silent Nemo is under way this week at Joint Expeditionary Base Little Creek , where a team of civilian engineers and military officers are testing the capabilities of a 5-foot, 100-pound experimental robot that’s designed to look and swim like a bluefin tuna.

  The robotic fish glided through the harbor Thursday as sailors took turns controlling it with a joystick. It can also be programmed to swim on its own. The robot’s black dorsal fin poked above water as its tail wiggled back and forth, propelling it almost silently just below the surface.

  Nemo was developed by the Office of Naval Research and is being tested by the chief of naval operation’s Rapid Innovation Cell – a group of junior Navy and Marine Corps officers tasked with putting emerging technologies to use for the military. The same group has been playing around with 3D printers, augmented-reality glasses and about 10 other breakthrough gadgets. “

 

Read more

 

 

 

 

 

 

 

 

 

The GoPro Drone

 

 

 

Published on Nov 26, 2014

” The wearable video camera maker is developing its own line of consumer multi-rotor helicopter drones to expand from its core business with surfers and other sports enthusiasts.”

 

 

 

 

 

 

 

 

 

‘Bird Bomb’ Explodes When It’s Shot By Afghanistan Police

 

 

 

 

 

” Why did the brown and white bird walk down the road? Apparently to blow somebody up. That’s what Afghanistan police surmised when they spotted the large, non-native bird walking along a highway with an antenna, explosives and an electronic device strapped to its body.

  When police shot the bird, it exploded, scattering “suspicious metal stuff,” provincial police chief Maj. Gen. Abdul Nabi Ilham told NBC News.

  Police are still examining the various remains, but have identified what appears to be a GPS device and a small camera. The bird was first spotted close to a police checkpoint in Faryab province in the north where the Taliban are active.

  Investigators speculated that the bird may have been “deployed” on a surveillance mission.

  It’s the first time ever security forces have encountered such a “bird bomb,” though Hamas militants rigged a donkey with explosives and set it on a path heading toward Israeli soldiers during fighting in Gaza last summer. No humans were injured, but the donkey exploded. “

 

Thanks to UPI Odd News

 

 

 

 

 

 

 

 

Police Shooting Of Pre-Teen In Cleveland Caught On Surveillance Video That Contradicts Cops Claims

” Last week police in Cleveland shot and killed12-year-old Tamir Rice, claiming the boy tried to pull a (fake) gun out of his pants when ordered to put his hands up. The interaction was instigated by a 911 caller who said he saw someone with what was a “probably fake” gun.

  Now surveillance video appears to contradict police claims, as it shows the police officer shooting Rice immediately after getting out of a moving patrol car.

  There could be more than 300 million (real) guns in America, and an infinitesimally small proportion are used to commit crimes. Politically expedient fearmongering over guns, however, can lead to frivolous 911 calls that, in combination with trigger-happy yet largely immune cops, can be fatal. “

Reason

Courtesy Of Rebel Z & The Free Thought Project

 

 

Ferguson Livestream

 

 

 

 

    While the live feed is offline for the moment there are hours of first person video available for viewing at Ustream and we are sure that Rebel Z will be back on line with live feeds very soon so stay tuned .

 

 

 

 

 

 

 

 

 

Researchers Uncover Government Spy Tool Used To Hack Telecoms And Belgian Cryptographer

 

 

Regin-Architecture

 

 

” It was the spring of 2011 when the European Commission discovered it had been hacked. The intrusion into the EU’s legislative body was sophisticated and widespread and used a zero-day exploit to get in. Once the attackers established a stronghold on the network, they were in for the long haul. They scouted the network architecture for additional victims and covered their tracks well. Eventually, they infected numerous systems belonging to the European Commission and the European Council before being discovered.

  Two years later another big target was hacked. This time it was Belgacom, the partly state-owned Belgian telecom. In this case, too, the attack was sophisticated and complex. According to published news reports and documents leaked by Edward Snowden, the attackers targeted system administrators working for Belgacom and used their credentials to gain access to routers controlling the telecom’s cellular network. Belgacom publicly acknowledged the hack, but has never provided details about the breach.

  Then five months after that announcement, news of another high-profile breach emerged—this one another sophisticated hack targeting prominent Belgian cryptographer Jean-Jacques Quisquater. “

 

 

 

 

 

” Now it appears that security researchers have found the massive digital spy tool used in all three attacks. Dubbed “Regin” by Microsoft, more than a hundred victims have been found to date, but there are likely many others still unknown. That’s because the espionage tool—a malicious platform capable of taking over entire networks and infrastructures—has been around since at least 2008, possibly even earlier, and is built to remain stealth on a system for years.

  The threat has been known since at least 2011, around the time the EU was hacked and some of the attack files made their way to Microsoft, who added detection for the component to its security software. Researchers with Kaspersky Lab only began tracking the threat in 2012, collecting bits and pieces of the massive threat. Symantec began investigating it in 2013 after some of its customers were infected. Putting together information from each, it’s clear the platform is highly complex and modulated and can be customized with a wide range of capabilities depending on the target and the attackers’ needs. Researchers have found 50 payloads so far for stealing files and other data, but have evidence that still more exist.

“ It’s a threat that everyone has detected for some time, but no one has exposed [until now],” says Eric Chien, technical director of Symantec’s Security Technology and Response division.

  The researchers have no doubt that Regin is a nation-state tool and are calling it the most sophisticated espionage machine uncovered to date—more complex even than the massive Flame platform, uncovered by Kaspersky and Symantec in 2012 and crafted by the same team who created Stuxnet. “

 

The whole story may be read at Wired

 

 

 

 

 

 

 

 

 

Local Judge Unseals Hundreds Of Highly Secret Cell Tracking Court Records

 

 

 

 

” A judge in Charlotte, North Carolina, has unsealed a set of 529 court documents in hundreds of criminal cases detailing the use of a stingray, or cell-site simulator, by local police. This move, which took place earlier this week, marks a rare example of a court opening up a vast trove of applications made by police to a judge, who authorized each use of the powerful and potentially invasive device.

  According to the Charlotte Observer, the records seem to suggest that judges likely did not fully understand what they were authorizing. Law enforcement agencies nationwide have taken extraordinary steps to preserve stingray secrecy. As recently as this week, prosecutors in a Baltimore robbery case dropped key evidence that stemmed from stingray use rather than fully disclose how the device was used.

  The newspaper also reported on Friday that the Mecklenburg County District Attorney’s office, which astonishingly had also never previously seen the applications filed by the Charlotte-Mecklenburg Police Department (CMPD), will now review them and determine which records also need to be shared with defense attorneys. Criminals could potentially file new claims challenging their convictions on the grounds that not all evidence was disclosed to them at the time.

  Relatively little is known about precisely how stingrays are used by law enforcement agencies nationwide, although more and more documents have surfaced showing how they’ve been purchased and used in limited instances. Last year, Ars reported on leaked documents showing the existence of a body-worn stingray. In 2010, security researcher Kristin Paget famously demonstrated a homemade device built for just $1,500.

  Worse still, local cops have lied to courts (at the direction of the United States Marshals Service) about the use of such technology. Not only can stingrays be used to determine a phone’s location, but they can also intercept calls and text messages. While they do target specific phones, they also sweep up cell data of innocents nearby who have no idea that such data collection is taking place. “

 

Ars Technica has more

 

 

 

 

 

 

 

 

 

Justice Department Defends US Marshals’ Airborne Cell Tower Spoofers; Refuses To Acknowledge Program Exists

 

 

 

 

 

 

” The Justice Department has been summoned to say a few words in defense of the US Marshals’ Cessna-mounted cell tower spoofers. And while it tried to leave a lot unsaid, it actually said quite a bit.

  The Justice Department, without formally acknowledging the existence of the program, defended the legality of the operation by the U.S. Marshals Service, saying the agency doesn’t maintain a database of everyday Americans’ cellphones.

  Because America’s criminal element is forever only moments away from permanently escaping the grasp of law enforcement, the DOJ has refused to confirm or deny the existence of technology everyone already knows exists — IMSI catchers and single-engine aircraft. The DOJ’s caginess is commendable. I’m sorry, I mean ridiculous. Here’s the same official further protecting and defending The Program That Dare Not Confirm Its Existence, using statements that indicate the program exposed by the Wall Street Journal not only exists, but functions pretty much as described.

  A Justice Department official on Friday refused to confirm or deny the existence of such a program, because doing so would allow criminals to better evade law enforcement. But the official said it would be “utterly false’’ to conflate the law-enforcement program with the collection of bulk telephone records by the National Security Agency, a controversial program already being challenged in the courts and by some members of Congress.

  No one’s conflating the feds’ airborne ‘Stingray’ with the NSA’s ongoing bulk phone records collections. All people have done is note that surveillance technology of this sort has the ability to collect (and store) millions of unrelated phone records in a very short period of time. “

 

Read the rest at Techdirt

 

 

 

 

 

 

 

 

 

Mt Martha Woman Snapped Sunbaking In G-String By Real Estate Drone

 

 

 

” A BOARD showing a G-string-clad woman has been removed after she became the accidental attraction in a real estate advertising campaign for a house sale in Mt Martha.

  An ambitious agent enlisted a drone to take an aerial photograph of the property, which includes a sweeping image of the beach.”

 

 

 

 

 

 

” But the picture also captured small business owner Mandy Lingard, a mother of three and grandmother of one, sunbaking topless in the privacy of her back yard.

  The image, which includes Ms Lingard lying face down wearing just a G-string, was on the display advertising board outside her neighbour’s house before being removed today.

“I heard a noise and then I saw this odd thing flying around and thought it was a kid’s toy. It hovered around and luckily I was face down at the time,” Ms Lingard said.”

 

 

Read more at Perth Now

AT&T Stops Adding Web Tracking Codes On Cellphones

” AT&T Mobility, the nation’s second-largest cellular provider, said Friday it’s no longer attaching hidden Internet tracking codes to data transmitted from its users’ smartphones. The practice made it nearly impossible to shield its subscribers’ identities online.

  The change by AT&T essentially removes a hidden string of letters and numbers that are passed along to websites that a consumer visits. It can be used to track subscribers across the Internet, a lucrative data-mining opportunity for advertisers that could still reveal users’ identities based on their browsing habits.

  Verizon Wireless, the country’s largest mobile firm, said Friday it still uses this type of tracking, known as “super cookies.” Verizon spokeswoman Debra Lewis said business and government customers don’t have the code inserted. There has been no evidence that Sprint and T-Mobile have used such codes.

” As with any program, we’re constantly evaluating, and this is no different,” Lewis said, adding that consumers can ask that their codes not be used for advertising tracking. But that still passes along the codes to websites, even if subscribers say they don’t want their data being used for marketing purposes.

  The tracking codes are part of the latest plan by the cellular industry to keep tabs on users and their devices. While the codes don’t explicitly contain personal information, they’re unique and nonetheless sent to websites alongside personal details that a user may submit voluntarily — like a name or a phone number.

  That means enough data can transform a large chunk of random digits into a digital fingerprint that’s as identifying as a Social Security number. AT&T said Friday its tracker was part of a testing project that’s been phased off of its network.

” This is more like a license plate for your brain,” said Jacob Hoffman-Andrews, a senior staff technologist with the Electronic Frontier Foundation, a civil liberties organization that opposed the practice. “Everything you wonder about, and read, and ask the Internet about gets this header attached to it. And there are ad agencies out there that try to associate that browsing history with anything that identifies you.”

AP News

Americans’ Cellphones Targeted In Secret Spy Program

 

 

 

” The Justice Department is scooping up data from thousands of cellphones through fake communications towers deployed on airplanes, a high-tech hunt for criminal suspects that is snagging a large number of innocent Americans, according to people familiar with the operations.

  The U.S. Marshals Service program, which became fully functional around 2007, operates Cessna aircraft from at least five metropolitan-area airports, with a flying range covering most of the U.S. population, according to people familiar with the program.

  Planes are equipped with devices–some known as “dirtboxes” to law-enforcement officials because of the initials of the Boeing Co. BA, +0.26%  unit that produces them–which mimic cell towers of large telecommunications firms and trick cellphones into reporting their unique registration information.”

 

Market Watch

 

 

 

 

 

 

 

 

 

5 Must Have Apps For Freedom Lovers

 

 

aclu police tape

 

 

 

 

” The best thing about technology is that it has granted us access of information in our hand held devices. Your smart phone has more computing power than the Apollo spacecraft.  Instead of downloading wallpapers and different applications it is time for your phone to be updated with something more powerful.”

 

 

” 4: Tinfoil for Facebook
 Link: https://play.google.com/store/apps/details?id=com.danvelazco.fbwrapper&hl=en

 
tinfoil for facebook

This free software available on Google Play store for those of us who oppose governments and spying agencies and know that Facebook is one of those platforms where information is easily available and can be taken even if we set up our Facebook with a tight security.

  This is when Daniel Velazco developed Tinfoil, the application runs Facebook’s mobile site in a sort of an incognito type environment, keeping the cookies and tracking applications out thus limiting Facebook to track you. “

 

Read the rest at AnonHQ

 

 

 

 

 

 

 

 

 

House Committee Demands Answers On Truthy Project

 

 

 

 

 

 

” The House Science, Space, and Technology Committee sent a letter to the head of the National Science Foundation (NSF) on Monday, demanding answers about the origins of the nearly $1 million taxpayer-funded project to track “misinformation” on Twitter.

  The Truthy project, being conducted by researchers at Indiana University, is under investigation for targeting political commentary on Twitter. The project monitors “suspicious memes,” “false and misleading ideas,” and “hate speech,” with a goal of one day being able to automatically detect false rumors on the social media platform.

  The web service has been used to track tweets using hashtags such as #tcot (Top Conservatives on Twitter), and was successful in getting accounts associated with conservatives suspended, according to a 2012 book co-authored by the project’s lead researcher, Filippo Menczer, a professor of Informatics and Computer Science at Indiana University.

  Menczer has also said that Truthy monitored tweets using #p2 (Progressive 2.0), but did not discuss any examples of getting liberal accounts suspended in his book.

“ The Committee and taxpayers deserve to know how NSF decided to award a large grant for a project that proposed to develop standards for online political speech and to apply those standards through development of a website that targeted conservative political comments,” wrote Chairman Lamar Smith (R., Texas) in a letter to NSF Director France Cordova. 

“ While some have argued that Truthy could be used to better understand things like disaster communication or to assist law enforcement, instead it appears Truthy focused on examples of ‘false and misleading ideas, hate speech, and subversive propaganda’ communicated by conservative groups,” he said.”

 

    Latecomers can find out more on the “Truthy Project” here and read more about the Congressional investigation here .

 

 

 

 

 

 

 

 

 

A Creepy Website Is Streaming From 73,000 Private Security Cameras

 

A Creepy Website Is Streaming From 73,000 Private Security Cameras

 

” It shouldn’t be so easy to peer into a stranger’s bedroom, much less hundreds of strangers’ bedrooms. But a website has collected the streaming footage from over 73,000 IP cameras whose owners haven’t changed their default passwords. Is this about highlighting an important security problem, or profiting off creepy voyeurism—or both?

  Insecam claims to feature feeds from IP cameras all over the world, including 11,000 in the U.S. alone. A quick browse will pull up parking lots and stores but also living rooms and bedrooms. “This site has been designed in order to show the importance of the security settings,” the site’s about page says. But it’s also clearly running and profiting off ads. “

Gizmodo has more

Rap Sheets, Watchlists And Spy Networks Now Available With Single Click

 

 

 

” Law enforcement officials nationwide now have the ability to search multiple sensitive databases, including spy agency intranets and homeland security suspicious activity reporting – with a single login. 

  The breakthrough in interconnectivity is expected to close information gaps that, among other things, have contributed to the rise in homegrown terrorism and school shootings. 

” Let’s say you have a lone-wolf incident or an active-shooter incident, where you need to be able to securely share information in a timely way. With a single sign-on capability, there is no wrong door,” Kshemendra Paul, program manager for the Information Sharing Environment at the Office of Director of National Intelligence, said during an interview. “If you have an account, you can get to the virtual command center that the fusion center may be using – in a very direct way.” “

 

Read it all at NextGov.com

 

 

 

 

 

 

 

 

 

Follow

Get every new post delivered to your Inbox.

Join 6,947 other followers