Tag Archive: Privacy


Congress Has Just Overruled Your 1st, 4th And 5th Amendment Rights

 

 

 

” As of today, Bill HR4681 has passed the house and senate, and is currently undergoing arbitration before being sent to the President for his signature in to law. The law says that the intelligence community can collect, retain, and disseminate all electronic communications including voice calls [without any constitutional restrictions] on all US citizens and everyone else in the world.  And they have 5 years before they are supposed to destroy the records.  However, they can keep them indefinitely if they fall into several categories of interest.

  It is all out in the open now.  Your 1st, 4th, and 5th Amendment protections are gone.  This act gives new meaning to ‘land of the free, home of the brave.’  The intelligence community isn’t doing anything in secret any more.  Americans are now living in an environment much like the days of the old Stalinist Soviet Union, where the presumption was that all conversations were monitored and one takes measures to have a ‘private’ conversations. 

  So turn up your radio or turn the water on in the sink and watch what you say on the phone or Facebook, even casual remarks on twitter may come back to haunt you in the future.  Don’t believe me, I have pasted the relevant parts of the bill below this story. Still don’t believe it? Just go to www.congress.gov/bill/113th-congress/house-bill/4681/text and read it from the horse’s mouth.

What are you willing to do about it?

[Congressional Bills 113th Congress]

[From the U.S. Government Printing Office]

 

[H.R. 4681 Enrolled Bill (ENR)]

H.R.4681

One Hundred Thirteenth Congress

of the

United States of America

TITLE III–GENERAL PROVISIONS

Subtitle A–General Matters

Sec. 309. Procedures for the retention of incidentally acquired

communications.

SEC. 309. PROCEDURES FOR THE RETENTION OF INCIDENTALLY ACQUIRED

COMMUNICATIONS.

(a) Definitions.–In this section:

(1) Covered communication.–The term “covered communication”

means any nonpublic telephone or electronic communication acquired

without the consent of a person who is a party to the

communication, including communications in electronic storage.

(2) Head of an element of the intelligence community.–The term

“head of an element of the intelligence community” means, as

appropriate–

(A) the head of an element of the intelligence community;

or

(B) the head of the department or agency containing such

element.

(3) United states person.–The term “United States person”

has the meaning given that term in section 101 of the Foreign

Intelligence Surveillance Act of 1978 (50 U.S.C. 1801).

(b) Procedures for Covered Communications.–

(1) Requirement to adopt.–Not later than 2 years after the

date of the enactment of this Act each head of an element of the

intelligence community shall adopt procedures approved by the

Attorney General for such element that ensure compliance with the

requirements of paragraph (3).

(2) Coordination and approval.–The procedures required by

paragraph (1) shall be–

(A) prepared in coordination with the Director of National

Intelligence; and

(B) approved by the Attorney General prior to issuance.

(3) Procedures.–

(A) Application.–The procedures required by paragraph (1)

shall apply to any intelligence collection activity not

otherwise authorized by court order (including an order or

certification issued by a court established under subsection

(a) or (b) of section 103 of the Foreign Intelligence

Surveillance Act of 1978 (50 U.S.C. 1803)), subpoena, or

similar legal process that is reasonably anticipated to result

in the acquisition of a covered communication to or from a

United States person and shall permit the acquisition,

retention, and dissemination of covered communications subject

to the limitation in subparagraph (B).

(B) Limitation on retention.–A covered communication shall

not be retained in excess of 5 years, unless–

(i) the communication has been affirmatively

determined, in whole or in part, to constitute foreign

intelligence or counterintelligence or is necessary to

understand or assess foreign intelligence or

counterintelligence;

(ii) the communication is reasonably believed to

constitute evidence of a crime and is retained by a law

enforcement agency;

(iii) the communication is enciphered or reasonably

believed to have a secret meaning;

(iv) all parties to the communication are reasonably

believed to be non-United States persons;

(v) retention is necessary to protect against an

imminent threat to human life, in which case both the

nature of the threat and the information to be retained

shall be reported to the congressional intelligence

committees not later than 30 days after the date such

retention is extended under this clause;

(vi) retention is necessary for technical assurance or

compliance purposes, including a court order or discovery

obligation, in which case access to information retained

for technical assurance or compliance purposes shall be

reported to the congressional intelligence committees on an

annual basis; or

(vii) retention for a period in excess of 5 years is

approved by the head of the element of the intelligence

community responsible for such retention, based on a

determination that retention is necessary to protect the

national security of the United States, in which case the

head of such element shall provide to the congressional

intelligence committees a written certification

describing–

 

(I) the reasons extended retention is necessary to

protect the national security of the United States;

(II) the duration for which the head of the element

is authorizing retention;

(III) the particular information to be retained;

and

(IV) the measures the element of the intelligence

community is taking to protect the privacy interests of

United States persons or persons located inside the

United States. “

 

 

 

 

 

   Many thanks to Universal Free Press for providing this story . Below the reader can see who voted to rob you of your rights and who voted against Statism …

 

 

 

 

 

VOTE PARTY REPRESENTATIVE DISTRICT
Alabama
YEA   R   Byrne, Bradley AL 1st
YEA   R   Roby, Martha AL 2nd
YEA   R   Rogers, Mike AL 3rd
YEA   R   Aderholt, Robert AL 4th
NAY   R   Brooks, Mo AL 5th
YEA   R   Bachus, Spencer AL 6th
YEA   D   Sewell, Terri AL 7th
Alaska
YEA   R   Young, Don AK
Arizona
YEA   D   Kirkpatrick, Ann AZ 1st
YEA   D   Barber, Ron AZ 2nd
NAY   D   Grijalva, Raúl AZ 3rd
NAY   R   Gosar, Paul AZ 4th
NAY   R   Salmon, Matt AZ 5th
YEA   R   Schweikert, David AZ 6th
YEA   D   Pastor, Ed AZ 7th
YEA   R   Franks, Trent AZ 8th
YEA   D   Sinema, Kyrsten AZ 9th
Arkansas
YEA   R   Crawford, Eric AR 1st
YEA   R   Griffin, Tim AR 2nd
YEA   R   Womack, Steve AR 3rd
YEA   R   Cotton, Tom AR 4th
California
YEA   R   LaMalfa, Doug CA 1st
NAY   D   Huffman, Jared CA 2nd
NAY   D   Garamendi, John CA 3rd
NAY   R   McClintock, Tom CA 4th
YEA   D   Thompson, Mike CA 5th
NAY   D   Matsui, Doris CA 6th
YEA   D   Bera, Ami CA 7th
YEA   R   Cook, Paul CA 8th
YEA   D   McNerney, Jerry CA 9th
YEA   R   Denham, Jeff CA 10th
YEA   D   Miller, George CA 11th
YEA   D   Pelosi, Nancy CA 12th
NAY   D   Lee, Barbara CA 13th
NAY   D   Speier, Jackie CA 14th
NAY   D   Swalwell, Eric CA 15th
YEA   D   Costa, Jim CA 16th
NAY   D   Honda, Mike CA 17th
NAY   D   Eshoo, Anna CA 18th
NAY   D   Lofgren, Zoe CA 19th
NAY   D   Farr, Sam CA 20th
YEA   R   Valadao, David CA 21st
YEA   R   Nunes, Devin CA 22nd
YEA   R   McCarthy, Kevin CA 23rd
YEA   D   Capps, Lois CA 24th
YEA   R   McKeon, Buck CA 25th
YEA   D   Brownley, Julia CA 26th
NAY   D   Chu, Judy CA 27th
YEA   D   Schiff, Adam CA 28th
YEA   D   Cárdenas, Tony CA 29th
YEA   D   Sherman, Brad CA 30th
NO VOTE   R   Miller, Gary CA 31st
YEA   D   Napolitano, Grace CA 32nd
YEA   D   Waxman, Henry CA 33rd
YEA   D   Becerra, Xavier CA 34th
NO VOTE   D   Negrete McLeod, Gloria CA 35th
YEA   D   Ruiz, Raul CA 36th
NAY   D   Bass, Karen CA 37th
YEA   D   Sánchez, Linda CA 38th
YEA   R   Royce, Ed CA 39th
YEA   D   Roybal-Allard, Lucille CA 40th
NAY   D   Takano, Mark CA 41st
YEA   R   Calvert, Ken CA 42nd
NAY   D   Waters, Maxine CA 43rd
NAY   D   Hahn, Janice CA 44th
NO VOTE   R   Campbell, John CA 45th
YEA   D   Sanchez, Loretta CA 46th
NAY   D   Lowenthal, Alan CA 47th
NAY   R   Rohrabacher, Dana CA 48th
YEA   R   Issa, Darrell CA 49th
YEA   R   Hunter, Duncan CA 50th
YEA   D   Vargas, Juan CA 51st
YEA   D   Peters, Scott CA 52nd
YEA   D   Davis, Susan CA 53rd
Colorado
YEA   D   DeGette, Diana CO 1st
NAY   D   Polis, Jared CO 2nd
NAY   R   Tipton, Scott CO 3rd
YEA   R   Gardner, Cory CO 4th
YEA   R   Lamborn, Doug CO 5th
YEA   R   Coffman, Mike CO 6th
YEA   D   Perlmutter, Ed CO 7th
Connecticut
YEA   D   Larson, John CT 1st
YEA   D   Courtney, Joe CT 2nd
YEA   D   DeLauro, Rosa CT 3rd
YEA   D   Himes, James CT 4th
YEA   D   Esty, Elizabeth CT 5th
Delaware
YEA   D   Carney, John DE
Florida
NO VOTE   R   Miller, Jeff FL 1st
YEA   R   Southerland, Steve FL 2nd
NAY   R   Yoho, Ted FL 3rd
YEA   R   Crenshaw, Ander FL 4th
YEA   D   Brown, Corrine FL 5th
YEA   R   DeSantis, Ron FL 6th
NAY   R   Mica, John FL 7th
NAY   R   Posey, Bill FL 8th
NAY   D   Grayson, Alan FL 9th
YEA   R   Webster, Daniel FL 10th
NAY   R   Nugent, Richard FL 11th
YEA   R   Bilirakis, Gus FL 12th
YEA   R   Jolly, David FL 13th
YEA   D   Castor, Kathy FL 14th
YEA   R   Ross, Dennis FL 15th
YEA   R   Buchanan, Vern FL 16th
YEA   R   Rooney, Thomas FL 17th
YEA   D   Murphy, Patrick FL 18th
NAY   R   Clawson, Curt FL 19th
NAY   D   Hastings, Alcee FL 20th
YEA   D   Deutch, Theodore FL 21st
YEA   D   Frankel, Lois FL 22nd
YEA   D   Wasserman Schultz, Debbie FL 23rd
YEA   D   Wilson, Frederica FL 24th
YEA   R   Diaz-Balart, Mario FL 25th
NAY   D   Garcia, Joe FL 26th
YEA   R   Ros-Lehtinen, Ileana FL 27th
Georgia
NAY   R   Kingston, Jack GA 1st
YEA   D   Bishop, Sanford GA 2nd
YEA   R   Westmoreland, Lynn GA 3rd
YEA   D   Johnson, Hank GA 4th
NAY   D   Lewis, John GA 5th
YEA   R   Price, Tom GA 6th
NAY   R   Woodall, Rob GA 7th
NAY   R   Scott, Austin GA 8th
YEA   R   Collins, Doug GA 9th
NAY   R   Broun, Paul GA 10th
YEA   R   Gingrey, Phil GA 11th
YEA   D   Barrow, John GA 12th
YEA   D   Scott, David GA 13th
NAY   R   Graves, Tom GA 14th
Hawaii
NAY   D   Hanabusa, Colleen HI 1st
YEA   D   Gabbard, Tulsi HI 2nd
Idaho
NAY   R   Labrador, Raúl ID 1st
YEA   R   Simpson, Mike ID 2nd
Illinois
YEA   D   Rush, Bobby IL 1st
YEA   D   Kelly, Robin IL 2nd
YEA   D   Lipinski, Daniel IL 3rd
NAY   D   Gutiérrez, Luis IL 4th
YEA   D   Quigley, Mike IL 5th
YEA   R   Roskam, Peter IL 6th
YEA   D   Davis, Danny IL 7th
NO VOTE   D   Duckworth, Tammy IL 8th
NAY   D   Schakowsky, Jan IL 9th
YEA   D   Schneider, Bradley IL 10th
YEA   D   Foster, Bill IL 11th
YEA   D   Enyart, William IL 12th
YEA   R   Davis, Rodney IL 13th
YEA   R   Hultgren, Randy IL 14th
YEA   R   Shimkus, John IL 15th
YEA   R   Kinzinger, Adam IL 16th
YEA   D   Bustos, Cheri IL 17th
VOTE PARTY REPRESENTATIVE DISTRICT
YEA   R   Schock, Aaron IL 18th
Indiana
YEA   D   Visclosky, Peter IN 1st
YEA   R   Walorski, Jackie IN 2nd
YEA   R   Stutzman, Marlin IN 3rd
YEA   R   Rokita, Todd IN 4th
YEA   R   Brooks, Susan IN 5th
YEA   R   Messer, Luke IN 6th
YEA   D   Carson, André IN 7th
YEA   R   Bucshon, Larry IN 8th
YEA   R   Young, Todd IN 9th
Iowa
YEA   D   Braley, Bruce IA 1st
YEA   D   Loebsack, David IA 2nd
YEA   R   Latham, Tom IA 3rd
YEA   R   King, Steve IA 4th
Kansas
NAY   R   Huelskamp, Tim KS 1st
YEA   R   Jenkins, Lynn KS 2nd
YEA   R   Yoder, Kevin KS 3rd
YEA   R   Pompeo, Mike KS 4th
Kentucky
YEA   R   Whitfield, Ed KY 1st
YEA   R   Guthrie, Brett KY 2nd
NAY   D   Yarmuth, John KY 3rd
NAY   R   Massie, Thomas KY 4th
YEA   R   Rogers, Hal KY 5th
YEA   R   Barr, Andy KY 6th
Louisiana
YEA   R   Scalise, Steve LA 1st
YEA   D   Richmond, Cedric LA 2nd
YEA   R   Boustany, Charles LA 3rd
YEA   R   Fleming, John LA 4th
YEA   R   McAllister, Vance LA 5th
YEA   R   Cassidy, Bill LA 6th
Maine
YEA   D   Pingree, Chellie ME 1st
YEA   D   Michaud, Michael ME 2nd
Maryland
YEA   R   Harris, Andy MD 1st
YEA   D   Ruppersberger, A. Dutch MD 2nd
YEA   D   Sarbanes, John MD 3rd
YEA   D   Edwards, Donna MD 4th
YEA   D   Hoyer, Steny MD 5th
YEA   D   Delaney, John MD 6th
NAY   D   Cummings, Elijah MD 7th
YEA   D   Van Hollen, Chris MD 8th
Massachusetts
YEA   D   Neal, Richard MA 1st
NAY   D   McGovern, Jim MA 2nd
YEA   D   Tsongas, Niki MA 3rd
YEA   D   Kennedy, Joseph MA 4th
NAY   D   Clark, Katherine MA 5th
NAY   D   Tierney, John MA 6th
NO VOTE   D   Capuano, Michael MA 7th
YEA   D   Lynch, Stephen MA 8th
YEA   D   Keating, William MA 9th
Michigan
YEA   R   Benishek, Dan MI 1st
YEA   R   Huizenga, Bill MI 2nd
NAY   R   Amash, Justin MI 3rd
YEA   R   Camp, Dave MI 4th
NAY   D   Kildee, Daniel MI 5th
YEA   R   Upton, Fred MI 6th
YEA   R   Walberg, Tim MI 7th
YEA   R   Rogers, Mike MI 8th
YEA   D   Levin, Sander MI 9th
YEA   R   Miller, Candice MI 10th
NAY   R   Bentivolio, Kerry MI 11th
YEA   D   Dingell, John MI 12th
NAY   D   Conyers, John MI 13th
YEA   D   Peters, Gary MI 14th
Minnesota
YEA   D   Walz, Timothy MN 1st
YEA   R   Kline, John MN 2nd
YEA   R   Paulsen, Erik MN 3rd
NAY   D   McCollum, Betty MN 4th
YEA   D   Ellison, Keith MN 5th
YEA   R   Bachmann, Michele MN 6th
YEA   D   Peterson, Collin MN 7th
YEA   D   Nolan, Richard MN 8th
Mississippi
YEA   R   Nunnelee, Alan MS 1st
YEA   D   Thompson, Bennie MS 2nd
YEA   R   Harper, Gregg MS 3rd
YEA   R   Palazzo, Steven MS 4th
Missouri
YEA   D   Clay, Lacy MO 1st
YEA   R   Wagner, Ann MO 2nd
YEA   R   Luetkemeyer, Blaine MO 3rd
YEA   R   Hartzler, Vicky MO 4th
YEA   D   Cleaver, Emanuel MO 5th
YEA   R   Graves, Sam MO 6th
YEA   R   Long, Billy MO 7th
YEA   R   Smith, Jason MO 8th
Montana
YEA   R   Daines, Steve MT
Nebraska
YEA   R   Fortenberry, Jeff NE 1st
YEA   R   Terry, Lee NE 2nd
YEA   R   Smith, Adrian NE 3rd
Nevada
YEA   D   Titus, Dina NV 1st
YEA   R   Amodei, Mark NV 2nd
YEA   R   Heck, Joseph NV 3rd
YEA   D   Horsford, Steven NV 4th
New Hampshire
YEA   D   Shea-Porter, Carol NH 1st
YEA   D   Kuster, Ann NH 2nd
New Jersey
YEA   D   Norcross, Donald NJ 1st
YEA   R   LoBiondo, Frank NJ 2nd
YEA   R   Runyan, Jon NJ 3rd
YEA   R   Smith, Chris NJ 4th
NAY   R   Garrett, Scott NJ 5th
NAY   D   Pallone, Frank NJ 6th
YEA   R   Lance, Leonard NJ 7th
YEA   D   Sires, Albio NJ 8th
YEA   D   Pascrell, Bill NJ 9th
YEA   D   Payne, Donald NJ 10th
YEA   R   Frelinghuysen, Rodney NJ 11th
NAY   D   Holt, Rush NJ 12th
New Mexico
YEA   D   Lujan Grisham, Michelle NM 1st
YEA   R   Pearce, Steve NM 2nd
YEA   D   Luján, Ben NM 3rd
New York
YEA   D   Bishop, Timothy NY 1st
YEA   R   King, Pete NY 2nd
YEA   D   Israel, Steve NY 3rd
YEA   D   McCarthy, Carolyn NY 4th
YEA   D   Meeks, Gregory NY 5th
YEA   D   Meng, Grace NY 6th
NAY   D   Velázquez, Nydia NY 7th
YEA   D   Jeffries, Hakeem NY 8th
NAY   D   Clarke, Yvette NY 9th
NAY   D   Nadler, Jerrold NY 10th
YEA   R   Grimm, Michael NY 11th
YEA   D   Maloney, Carolyn NY 12th
NAY   D   Rangel, Charles NY 13th
YEA   D   Crowley, Joseph NY 14th
NAY   D   Serrano, José NY 15th
YEA   D   Engel, Eliot NY 16th
YEA   D   Lowey, Nita NY 17th
YEA   D   Maloney, Sean NY 18th
NAY   R   Gibson, Christopher NY 19th
YEA   D   Tonko, Paul NY 20th
YEA   D   Owens, William NY 21st
YEA   R   Hanna, Richard NY 22nd
YEA   R   Reed, Tom NY 23rd
YEA   D   Maffei, Daniel NY 24th
YEA   D   Slaughter, Louise NY 25th
YEA   D   Higgins, Brian NY 26th
YEA   R   Collins, Chris NY 27th
North Carolina
YEA   D   Butterfield, G.K. NC 1st
YEA   R   Ellmers, Renee NC 2nd
NAY   R   Jones, Walter NC 3rd
YEA   D   Price, David NC 4th
YEA   R   Foxx, Virginia NC 5th
YEA   R   Coble, Howard NC 6th
YEA   D   McIntyre, Mike NC 7th
VOTE PARTY REPRESENTATIVE DISTRICT
YEA   R   Hudson, Richard NC 8th
YEA   R   Pittenger, Robert NC 9th
YEA   R   McHenry, Patrick NC 10th
NAY   R   Meadows, Mark NC 11th
YEA   D   Adams, Alma NC 12th
YEA   R   Holding, George NC 13th
North Dakota
YEA   R   Cramer, Kevin ND
Ohio
YEA   R   Chabot, Steve OH 1st
YEA   R   Wenstrup, Brad OH 2nd
YEA   D   Beatty, Joyce OH 3rd
NAY   R   Jordan, Jim OH 4th
YEA   R   Latta, Robert OH 5th
YEA   R   Johnson, Bill OH 6th
YEA   R   Gibbs, Bob OH 7th
NAY   D   Kaptur, Marcy OH 9th
YEA   R   Turner, Michael OH 10th
YEA   D   Fudge, Marcia OH 11th
YEA   R   Tiberi, Pat OH 12th
YEA   D   Ryan, Tim OH 13th
YEA   R   Joyce, David OH 14th
YEA   R   Stivers, Steve OH 15th
YEA   R   Renacci, James OH 16th
Oklahoma
NAY   R   Bridenstine, Jim OK 1st
YEA   R   Mullin, Markwayne OK 2nd
YEA   R   Lucas, Frank OK 3rd
YEA   R   Cole, Tom OK 4th
YEA   R   Lankford, James OK 5th
Oregon
NAY   D   Bonamici, Suzanne OR 1st
YEA   R   Walden, Greg OR 2nd
NAY   D   Blumenauer, Earl OR 3rd
NAY   D   DeFazio, Peter OR 4th
NO VOTE   D   Schrader, Kurt OR 5th
Pennsylvania
YEA   D   Brady, Robert PA 1st
YEA   D   Fattah, Chaka PA 2nd
YEA   R   Kelly, Mike PA 3rd
NAY   R   Perry, Scott PA 4th
YEA   R   Thompson, Glenn PA 5th
YEA   R   Gerlach, Jim PA 6th
YEA   R   Meehan, Patrick PA 7th
YEA   R   Fitzpatrick, Michael PA 8th
YEA   R   Shuster, Bill PA 9th
YEA   R   Marino, Tom PA 10th
YEA   R   Barletta, Lou PA 11th
YEA   R   Rothfus, Keith PA 12th
YEA   D   Schwartz, Allyson PA 13th
NAY   D   Doyle, Mike PA 14th
YEA   R   Dent, Charles PA 15th
YEA   R   Pitts, Joseph PA 16th
YEA   D   Cartwright, Matthew PA 17th
YEA   R   Murphy, Tim PA 18th
Rhode Island
YEA   D   Cicilline, David RI 1st
YEA   D   Langevin, Jim RI 2nd
South Carolina
NAY   R   Sanford, Mark SC 1st
YEA   R   Wilson, Joe SC 2nd
NAY   R   Duncan, Jeff SC 3rd
NAY   R   Gowdy, Trey SC 4th
NAY   R   Mulvaney, Mick SC 5th
YEA   D   Clyburn, Jim SC 6th
YEA   R   Rice, Tom SC 7th
South Dakota
YEA   R   Noem, Kristi SD
Tennessee
NAY   R   Roe, Phil TN 1st
NAY   R   Duncan, John TN 2nd
YEA   R   Fleischmann, Chuck TN 3rd
NAY   R   DesJarlais, Scott TN 4th
YEA   D   Cooper, Jim TN 5th
YEA   R   Black, Diane TN 6th
YEA   R   Blackburn, Marsha TN 7th
YEA   R   Fincher, Stephen TN 8th
NAY   D   Cohen, Steve TN 9th
Texas
NAY   R   Gohmert, Louie TX 1st
NAY   R   Poe, Ted TX 2nd
YEA   R   Johnson, Sam TX 3rd
NO VOTE   R   Hall, Ralph TX 4th
YEA   R   Hensarling, Jeb TX 5th
YEA   R   Barton, Joe TX 6th
YEA   R   Culberson, John TX 7th
YEA   R   Brady, Kevin TX 8th
YEA   D   Green, Al TX 9th
YEA   R   McCaul, Michael TX 10th
YEA   R   Conaway, Michael TX 11th
YEA   R   Granger, Kay TX 12th
YEA   R   Thornberry, Mac TX 13th
NAY   R   Weber, Randy TX 14th
YEA   D   Hinojosa, Rubén TX 15th
NAY   D   O’Rourke, Beto TX 16th
YEA   R   Flores, Bill TX 17th
NAY   D   Jackson Lee, Sheila TX 18th
YEA   R   Neugebauer, Randy TX 19th
YEA   D   Castro, Joaquin TX 20th
YEA   R   Smith, Lamar TX 21st
YEA   R   Olson, Pete TX 22nd
YEA   D   Gallego, Pete TX 23rd
YEA   R   Marchant, Kenny TX 24th
YEA   R   Williams, Roger TX 25th
NAY   R   Burgess, Michael TX 26th
YEA   R   Farenthold, Blake TX 27th
YEA   D   Cuellar, Henry TX 28th
YEA   D   Green, Gene TX 29th
YEA   D   Johnson, Eddie TX 30th
YEA   R   Carter, John TX 31st
YEA   R   Sessions, Pete TX 32nd
YEA   D   Veasey, Marc TX 33rd
YEA   D   Vela, Filemon TX 34th
NAY   D   Doggett, Lloyd TX 35th
NAY   R   Stockman, Steve TX 36th
Utah
YEA   R   Bishop, Rob UT 1st
YEA   R   Stewart, Chris UT 2nd
YEA   R   Chaffetz, Jason UT 3rd
YEA   D   Matheson, Jim UT 4th
Vermont
NAY   D   Welch, Peter VT
Virginia
YEA   R   Wittman, Robert VA 1st
YEA   R   Rigell, Scott VA 2nd
YEA   D   Scott, Bobby VA 3rd
YEA   R   Forbes, Randy VA 4th
YEA   R   Hurt, Robert VA 5th
YEA   R   Goodlatte, Bob VA 6th
NAY   R   Brat, Dave VA 7th
YEA   D   Moran, Jim VA 8th
NAY   R   Griffith, Morgan VA 9th
YEA   R   Wolf, Frank VA 10th
YEA   D   Connolly, Gerald VA 11th
Washington
NAY   D   DelBene, Suzan WA 1st
YEA   D   Larsen, Rick WA 2nd
YEA   R   Herrera Beutler, Jaime WA 3rd
YEA   R   Hastings, Doc WA 4th
YEA   R   McMorris Rodgers, Cathy WA 5th
YEA   D   Kilmer, Derek WA 6th
NAY   D   McDermott, Jim WA 7th
YEA   R   Reichert, David WA 8th
NO VOTE   D   Smith, Adam WA 9th
NAY   D   Heck, Denny WA 10th
West Virginia
YEA   R   McKinley, David WV 1st
YEA   R   Capito, Shelley WV 2nd
YEA   D   Rahall, Nick WV 3rd
Wisconsin
YEA   R   Ryan, Paul WI 1st
NAY   D   Pocan, Mark WI 2nd
YEA   D   Kind, Ron WI 3rd
NAY   D   Moore, Gwen WI 4th
NAY   R   Sensenbrenner, James WI 5th
YEA   R   Petri, Tom WI 6th
YEA   R   Duffy, Sean WI 7th
NAY   R   Ribble, Reid WI 8th
Wyoming
NAY   R   Lummis, Cynthia

 

 

   This is a despicable vote and all the Republicans that voted in favor of this bill should hang their heads in shame . 

 

 

 

 

 

 

 

 

Brilliant New Device Lets Protestors Block Surveillance And Stingrays

 

tun angles 2

 

 

 

” Reports about agents using a Stingray on protesters to unconstitutionally monitor their phones are circulating widely, and now protesters have a way to fight back.

  Earlier this week an anonymous leaked recording exposed the agents monitoring the protesters’ movements by tracking their phones. A Stingray mimics a cellular tower, letting agents pry into citizens’ cell phones and gather their data/location without a warrant.

  Stingrays were supposed to be used for “terrorists,” but now they’re being used against us locally — which is unconstitutional.

  And that’s where a new product called Tunnel enters the scene .

  We’ve known that the NSA spies on us ever since Edward Snowden blew the whistle on them.

  But have you ever wondered if it’s possible for somebody to spy back on them?

  The NSA has a special way of protecting itself against such a possibility.  And you’ve probably never heard of it.

  To hide its own privacy, the NSA installs copper  – yes, you read that correctly: copper – around the equipment in its buildings.

  It turns out that copper has a unique conductive property that allows it to block surveillance, letting those who use it hide their activities from would-be spies.

  The main NSA headquarters is described as ”a building covered with one-way dark glass, which is lined with copper shielding in order to prevent espionage by trapping in signals and sounds.”

  The question becomes: if they can protect their own privacy with copper, why can’t we use this same technique to protect our privacy from them?

  Well now we finally can.

  Tunnel is a portable Faraday enclosure that uses a 100% authentic copper shielding system to surround your phone.  When your phone is inside, it forms a topologically near-complete surface to prevent non-ionizing radiation from penetrating its boundaries, letting you avoid surveillance.

  Thankfully, it’s not going to cost thousands of dollars, which has come as great news for protesters and other privacy advocates. “

 

 

   Be sure to read the rest at Filming Cops and while you are there grab their coupon code that will give the first 100 purchasers 35% off of the already discounted holiday price . Order yours today , we did and got it for a mere $43 with shipping thanks to the Filming Cops coupon . 

 

 

 

 

 

 

 

 

 

 

Local Judge Unseals Hundreds Of Highly Secret Cell Tracking Court Records

 

 

 

 

” A judge in Charlotte, North Carolina, has unsealed a set of 529 court documents in hundreds of criminal cases detailing the use of a stingray, or cell-site simulator, by local police. This move, which took place earlier this week, marks a rare example of a court opening up a vast trove of applications made by police to a judge, who authorized each use of the powerful and potentially invasive device.

  According to the Charlotte Observer, the records seem to suggest that judges likely did not fully understand what they were authorizing. Law enforcement agencies nationwide have taken extraordinary steps to preserve stingray secrecy. As recently as this week, prosecutors in a Baltimore robbery case dropped key evidence that stemmed from stingray use rather than fully disclose how the device was used.

  The newspaper also reported on Friday that the Mecklenburg County District Attorney’s office, which astonishingly had also never previously seen the applications filed by the Charlotte-Mecklenburg Police Department (CMPD), will now review them and determine which records also need to be shared with defense attorneys. Criminals could potentially file new claims challenging their convictions on the grounds that not all evidence was disclosed to them at the time.

  Relatively little is known about precisely how stingrays are used by law enforcement agencies nationwide, although more and more documents have surfaced showing how they’ve been purchased and used in limited instances. Last year, Ars reported on leaked documents showing the existence of a body-worn stingray. In 2010, security researcher Kristin Paget famously demonstrated a homemade device built for just $1,500.

  Worse still, local cops have lied to courts (at the direction of the United States Marshals Service) about the use of such technology. Not only can stingrays be used to determine a phone’s location, but they can also intercept calls and text messages. While they do target specific phones, they also sweep up cell data of innocents nearby who have no idea that such data collection is taking place. “

 

Ars Technica has more

 

 

 

 

 

 

 

 

 

Mt Martha Woman Snapped Sunbaking In G-String By Real Estate Drone

 

 

 

” A BOARD showing a G-string-clad woman has been removed after she became the accidental attraction in a real estate advertising campaign for a house sale in Mt Martha.

  An ambitious agent enlisted a drone to take an aerial photograph of the property, which includes a sweeping image of the beach.”

 

 

 

 

 

 

” But the picture also captured small business owner Mandy Lingard, a mother of three and grandmother of one, sunbaking topless in the privacy of her back yard.

  The image, which includes Ms Lingard lying face down wearing just a G-string, was on the display advertising board outside her neighbour’s house before being removed today.

“I heard a noise and then I saw this odd thing flying around and thought it was a kid’s toy. It hovered around and luckily I was face down at the time,” Ms Lingard said.”

 

 

Read more at Perth Now

AT&T Stops Adding Web Tracking Codes On Cellphones

” AT&T Mobility, the nation’s second-largest cellular provider, said Friday it’s no longer attaching hidden Internet tracking codes to data transmitted from its users’ smartphones. The practice made it nearly impossible to shield its subscribers’ identities online.

  The change by AT&T essentially removes a hidden string of letters and numbers that are passed along to websites that a consumer visits. It can be used to track subscribers across the Internet, a lucrative data-mining opportunity for advertisers that could still reveal users’ identities based on their browsing habits.

  Verizon Wireless, the country’s largest mobile firm, said Friday it still uses this type of tracking, known as “super cookies.” Verizon spokeswoman Debra Lewis said business and government customers don’t have the code inserted. There has been no evidence that Sprint and T-Mobile have used such codes.

” As with any program, we’re constantly evaluating, and this is no different,” Lewis said, adding that consumers can ask that their codes not be used for advertising tracking. But that still passes along the codes to websites, even if subscribers say they don’t want their data being used for marketing purposes.

  The tracking codes are part of the latest plan by the cellular industry to keep tabs on users and their devices. While the codes don’t explicitly contain personal information, they’re unique and nonetheless sent to websites alongside personal details that a user may submit voluntarily — like a name or a phone number.

  That means enough data can transform a large chunk of random digits into a digital fingerprint that’s as identifying as a Social Security number. AT&T said Friday its tracker was part of a testing project that’s been phased off of its network.

” This is more like a license plate for your brain,” said Jacob Hoffman-Andrews, a senior staff technologist with the Electronic Frontier Foundation, a civil liberties organization that opposed the practice. “Everything you wonder about, and read, and ask the Internet about gets this header attached to it. And there are ad agencies out there that try to associate that browsing history with anything that identifies you.”

AP News

Hidden Camera Shows What Cleaners Really Get Up To In Your Hotel Room

 

 

 

 

” Almost every time we stay at a hotel, especially a ‘brand-name’ hotel, we leave our trust in the hands of those that clean our rooms when we’re out.

  It’s just normal for us to believe that these people have respect for our privacy. However, someone recently tested this theory out in a ‘brand-named’ hotel, and what he caught on camera was actually quite eye opening.

  Watch as this cleaner browses through this guy’s luggage, checks out his PS3 games, spends a good few minutes trying to log into his tablet and laptop then finally decides to do a bit of (pretty casual) cleaning.”

UniLad

 

 

 

 

 

 

 

 

 

 

 

A Creepy Website Is Streaming From 73,000 Private Security Cameras

 

A Creepy Website Is Streaming From 73,000 Private Security Cameras

 

” It shouldn’t be so easy to peer into a stranger’s bedroom, much less hundreds of strangers’ bedrooms. But a website has collected the streaming footage from over 73,000 IP cameras whose owners haven’t changed their default passwords. Is this about highlighting an important security problem, or profiting off creepy voyeurism—or both?

  Insecam claims to feature feeds from IP cameras all over the world, including 11,000 in the U.S. alone. A quick browse will pull up parking lots and stores but also living rooms and bedrooms. “This site has been designed in order to show the importance of the security settings,” the site’s about page says. But it’s also clearly running and profiting off ads. “

Gizmodo has more

California Officer Allegedly Stole Nude Photos During Arrest

 

 

 

 

” A California Highway Patrol officer is being investigated for allegedly sending nude photos of a DUI suspect from her cell phone to his personal phone.

  The Contra Costa, Calif., district attorney’s office is investigating Sean Harrington, 35, of Martinez, for a possible felony computer theft charge.

  Harrington is suspected of sending himself six photos of a 23-year-old San Ramon, Calif., woman in a state of undress while she was being booked into Martinez County Jail in August. He allegedly found the photos stored on her iPhone. “

 

UPI

 

 

 

 

 

 

 

 

 

 

Civil Liberties Groups Appeal Ruling Over Automatic License Plate Reader Data

 

 

 

 

” The Electronic Frontier Foundation and the ACLU Foundation of Southern California are taking the fight over automatic license plate reader (ALPR) data to the next level by asking the California Court of Appeal to rule that the public has a right to know how Los Angeles cops are tracking their locations.

  ALPRs are cameras mounted to patrol cars and fixed locations, such as light poles, that are able to capture, process, and store the license plates of every vehicle that passes nearby. The Los Angeles Police Department and Los Angeles County Sheriff’s Department together collect close to 3 million license plates each week; these data points could give police an intimate picture of the comings and goings of the entire population over several years. By our estimates, these agencies currently have an average of 61 plate scans for each vehicle registered in Los Angeles County.”

 

EFF has more

 

 

 

 

 

 

 

With This Tiny Box, You Can Anonymize Everything You Do Online

 

 

 

 

 

 

” No tool in existence protects your anonymity on the Web better than the software Tor, which encrypts Internet traffic and bounces it through random computers around the world. But for guarding anything other than Web browsing, Tor has required a mixture of finicky technical setup and software tweaks. Now routing all your traffic through Tor may be as simple as putting a portable hardware condom on your ethernet cable.

  Today a group of privacy-focused developers plans to launch a Kickstarter campaign for Anonabox. The $45 open-source router automatically directs all data that connects to it by ethernet or Wifi through the Tor network, hiding the user’s IP address and skirting censorship. It’s also small enough to hide two in a pack of cigarettes. Anonabox’s tiny size means users can carry the device with them anywhere, plugging it into an office ethernet cable to do sensitive work or in a cybercafe in China to evade the Great Firewall. The result, if Anonabox fulfills its security promises, is that it could become significantly easier to anonymize all your traffic with Tor—not just Web browsing, but email, instant messaging, filesharing and all the other miscellaneous digital exhaust that your computer leaves behind online.

 

Wired has more

 

 

 

 

 

 

 

 

 

 

 

 

How To Delete And Disable Your Google Location History

 

google map 1

 

 

” Google can track your location and show you on Google Maps and Google Earth where you have been recently, which you may find useful, interesting, or invasive. Here’s how to see if you have location history turned on and how to disable it.

  I had location history enabled for Google Maps and didn’t know it. I found it interesting to see which spots Google logged for me over the past week or month, and I don’t plan on disabling the service. It’s nice to know, however, that I can delete portions of my location history or all of it, as well as disable the feature from tracking me in the future.

  To see if you have location history enabled, head to the Google Maps Location history page. Click the gear-icon button to access History settings. Here, you can choose to disable or enable the service.”

 

 

 

 

 

 

” Disabling location history, however, does not remove your past history. If you’d like to erase the locations Google has stored for the past 30 days, head back to the Location history page. The default time period shows location history for the current day, so you may not see any plots on the map.

  Use the pull-down menu below the calendar on the left to show your history, up to 30 days. If you choose a time period in which Google has tracked your location, you’ll see the points where you’ve been on the map. And below the calendar, you’ll see options to delete your history from the time period you have chosen or to delete all history.”

 

 

CNET has all the details

 

 

 

 

 

 

 

 

 

 

Windows 10 Preview Has A Keylogger To Watch Your Every Move

 

 

 

” This week Microsoft announced the next version of its Operating system, dubbed WIndows 10, providing Windows 10 Technical Preview release under its “Insider Program” in order to collect feedback from users and help shape the final version of the operating system, but something really went WRONG!

Inside Microsoft’s Insider Program you’ll get all the latest Windows preview builds as soon as they’re available. In return, we want to know what you think. You’ll get an easy-to-use app to give us your feedback, which will help guide us along the way.” Microsoft website reads.

  Well, how many of you actually read the “Terms of Service” and “Privacy Policy” documents before downloading the Preview release of Windows 10? I guess none of you, because most computer users have habit of ignoring that lengthy paragraphs and simply click “I Agree” and then “next“, which is not at all a good practise.”
” Do you really know what permissions you have granted to Microsoft by installing Free Windows 10 Technical Preview edition? Of Course, YOU DON’T. Well, guess what, you’ve all but signed away your soul .
 
  If you are unaware of Microsoft’s privacy policy, so now you should pay attention to what the policy says. Microsoft is watching your every move on the latest Windows 10 Technical Preview, Thanks to portions of Microsoft’s privacy policy, which indicates that the technology giant is using keylogger to collect and use users’ data in a variety of astounding ways without the user being aware.”
Hacker News has all the details

What Instagram, Twitter, and Jelly Indicate About The Future Of Ello

 

 

 

 

” Two weeks ago almost no one had heard of Ello. But that was two weeks ago. September 24th, BetaBeat referred to Ello as the mysterious social network. September 25th, TechCrunch declared that Ello was blowing up. September 26th, The Daily Beast said the service’s problems far outweigh the benefits. September 28th, Ello experienced its first DDoS attack. September 29th, The Washington Post called Ello hopelessly, irredeemably naive.

  We were curious how much truth lay in all the hype. But other than claims that Ello was adding 3,000-4,000 new users per hour , there wasn’t much data about the rising star. So we decided to get our own. To conduct this research, we pulled Ello directly from the site — all post, follower, and following data is publicly available to all users — and collected a sample size of nearly 160,000 Ello users. Next, we loaded the raw data into RJMetrics for analysis. “

Read the entire analysis at RJ Metrics

‘Anti-Facebook’ Social Network Gets Viral Surge

 

 

 

 

 

” In a matter of days, the new social network Ello, described as the “anti-Facebook” for its stand on privacy and advertising, has become perhaps the hottest ticket on the Internet.

  Created last year as a “private” social network, Ello (www.ello.co) recently opened its doors on an invitation-only basis.

  Because of the limited supply and strong demand, the invitations have been selling on eBay at prices up to $500. Some reports said Ello is getting up to 35,000 requests per hour as a result of a viral surge in the past week.

  Ello appears to have caught on with its simple message which seems to take aim at frustrations of Facebook users.  

” Ello doesn’t sell ads. Nor do we sell data about you to third parties,” the company says.”

 

Read more and see our previous story here

 

 

 

 

 

 

 

 

 

 

 

 

—-

FBI Not Happy With Apple & Google’s Encryption Policy

 

 

 

 

” Users might have praised the technology companies for efforts to encrypt their latest devices that would prevent law enforcement agencies’ hands on users’ private data, but the FBI is not at all happy with Apple and Google right now.
 
  The Federal Bureau of Investigation director, James Comey, said Thursday he was “very concerned” over Apple and Google using stronger or full encryption in their Smartphones and Tablets that makes it impossible for law enforcement to collar criminals.
  According to Comey, the Silicon Valley tech giants are “marketing something expressly to allow people to place themselves above the law.”

There will come a day – well it comes every day in this business – when it will matter a great, great deal to the lives of people of all kinds that we be able to with judicial authorization gain access to a kidnapper’s or a terrorist or a criminal’s device,” Comey told reporters.

I just want to make sure we have a good conversation in this country before that day comes. I’d hate to have people look at me and say, ‘Well how come you can’t save this kid,’ ‘How come you can’t do this thing.’” “

Hacker News

The Great Facebook Exodus Begins

 

 

Ello Home Page

 

 

 

 

” A little known independent social network might be having its big moment. As the debate around Facebook’s naming policy rages on, a growing swath of Facebook users appear to be jumping ship into a smaller, social lifeboat of sorts. It’s invite-only, anti-ads, and it’s called Ello.

  Short of Google+—distrusted by many thanks to a similar recently reversed “real name” policy—no single social network could withstand a mass influx of Facebook’s 1.32 billion monthly active users. But if this week’s rumblings are any indication, disenchanted Facebook users could look to smaller, independent social networks like Ello for their next move. 

  After seeing chatter about Ello in my own social circles, I reached out to Paul Budnitz, creator of this buzzy new anti-Facebook. Budnitz is the founder of designer toy maker Kidrobot and also owns and operates Budnitz Bicycles. I explained what I’d observed in my own social circles (my 1,000+ Facebook friends admittedly skew toward LGBTQ identities) to see if users from what some are calling Facebook’s “queer mass exodus” had started showing up on his own social experiment.

Why Ello? And why now? “

 

 

From Ello’s About page:

 

 

” What is Ello?

Ello is a simple, beautiful, and ad-free social network created by a small group of artists and designers.

  We originally built Ello as a private social network. Over time, so many people wanted to join Ello that we built a public version of Ello for everyone to use.

Ad Free

Ello doesn’t sell ads. Nor do we sell data about you to third parties.

  Virtually every other social network is run by advertisers. Behind the scenes they employ armies of ad salesmen and data miners to record every move you make. Data about you is then auctioned off to advertisers and data brokers. You’re the product that’s being bought and sold.

  Collecting and selling your personal data, reading your posts to your friends, and mapping your social connections for profit is both creepy and unethical. Under the guise of offering a “free” service, users pay a high price in intrusive advertising and lack of privacy.

We also think ads are tacky, that they insult our intelligence and that we’re better without them.

Read more about our no-ad policy here.

Support Ello

Ello is completely free to use.

  We occasionally offer special features to our users. If we create a special feature that you really like, you may choose to support Ello by paying a very small amount of money to add that feature to your Ello account.

  You never have to pay anything, and you can keep using Ello forever, for free. By choosing to buy a feature now and then for a very small amount of money you support our work and help us make Ello better and better.

Privacy

  When you use Ello we collect some information related to your visit. This information helps us understand in a general way how people are using Ello, so we can make our social network better.

  Unlike virtually every other social network, on Ello you can opt out of information sharing. Read How Ello Uses Information to learn how.

Join Ello

  Ello is currently invitation-only. To join Ello, you need to know someone that is already on the network. Alternatively, you can request an invitation by visiting the Ello Home Page.”

 

 

 

Read more at The Daily Dot and visit Ello’s site here

 

 

 

 

 

 

 

 

 

 

Facebook’s Fine Print Includes Permission To Track

 

 

 

 

 

 

” In order to access Facebook, users must agree to a lengthy terms of service contract that outline everything Facebook has permission to do. That includes tracking users, even when they aren’t on Facebook, for advertising purposes.

  Facebook tracks users by placing a cookie, or a small text file, on the computers of its users. The cookie communicates with so-called pixel code installed on many popular websites.

  Pixel code is often included in Facebook services that allow companies to take advantage of Facebook in several ways. Online publishers can install “Like” and “Share” buttons on content. Those buttons increase sharing on Facebook, which increases traffic to publishers’ sites. Online retailers can use pixel code to purchase Facebook ads targeted to people who were just about to buy something, then got distracted and later ended up browsing Facebook.

  The pixel code also lets Facebook know what its users are looking at on the Web. That information is invaluable to Facebook, because it gives the company a better idea about the interests of users. That increases the effectiveness of Facebook’s targeted advertising, which means Facebook can charge companies more for ads.”

 

   It’s looking more and more like Facebook needs to be abandoned by those desiring privacy … read more at the Wall Street Journal

 

 

 

 

 

 

 

 

 

 

6 Key Supreme Court Cases This Term

 

 

 

 

” If you use Facebook, pay taxes, enjoy fishing or drive a car, the 2014-2015 term of the Supreme Court, which begins Oct. 6, will be worth watching.

  Many of the cases from the last term touched on issues such as executive power, religious liberty, free speech and racial preferences.

Here are highlights of the upcoming term:

  To hear about all these cases and how the term may unfold, join us at Heritage for our annual Supreme Court Preview on Thursday at noon (or watch online). Legal luminaries Paul Clement and Michael Carvin will discuss the big cases of the upcoming term.”

 

Daily Signal

 

 

 

 

 

 

 

 

 

Watch This Crazy Drone With Arms Fly and Turn A Wheel In Mid-Air

 

 

 

 

” Sure, drones can take videos of Martha Stewart’s farm and maybe even save the environment. But… can they unscrew a bottle cap? Play Twister? Spin a dreidel? Do anything that involves having arms? Well, now we have a drone with arms—that can fly and turn a valve wheel mid-air.

  Above is the video, and here’s the paper’s title and abstract (flip to 1:00 in the video to see the really cool stuff):

“Towards Valve Turning using a Dual-Arm Aerial Manipulator,” by Christopher Korpela, Matko Orsag, and Paul Oh, from Drexel University. “

Time has more 

Facebook Poses A Threat To Every American

 

 

 

 

 

” Participation on Facebook could prove very dangerous to your future well-being. There is a reason that Facebook is aligned with both the CIA and the NSA. I have several credible sources tell me that all data posted on Facebook goes into series of cataloged files which culminates with each person being assigned a “Threat Matrix Score”. The mere existence of a Threat Matrix Score should send chills up and the collective spines of every American.

  When, not if, martial law comes to America, this Threat Matrix Score, of which Facebook data is used to help compile an “enemies of the state” list, your future longevity could be seriously imperiled. It is too late for people like Steve Quayle, Doug and Joe Hagmann, John B. Wells and myself to avoid being placed on this list. However, it is not too late for the average American to limit their exposure by NOT posting and participating on Facebook. Facebook participation should come with a black box warning:

“ WARNING: The views expressed on Facebook can and will be used against you. Participation in Facebook could prove detrimental to the length of your life. All political dissident views are immediately reported to the CIA and the NSA. Risk of repeated exposure on Facebook could result in you and your family being hauled out of their homes at 3AM, separated from your family and sent to a re-education camp”. “

 

 

 

Read the rest

 

 

 

 

 

 

 

 

 

 

New Device In The Works To Catch Texting Drivers

 

 

 

 

 

” A Virginia company is developing a radar gunlike device that would help police catch drivers as they text.

  The technology works by detecting the telltale radio frequencies that emit from a vehicle when someone inside is using a cellphone, said Malcolm McIntyre of ComSonics. Cable repairmen use similar means to find where a cable is damaged – from a rodent, for instance – by looking for frequencies leaking in a transmission, McIntyre said.

  A text message, phone call and data transfer emit different frequencies that can be distinguished by the device ComSonics is working on, according to McIntyre. That would prove particularly useful for law enforcement in states such as Virginia, where texting behind the wheel is banned but talking on the phone is legal for adult drivers. “

  

 

Virginia Pilot

 

 

 

 

 

 

 

 

 

U.S. Threatened Massive Fine To Force Yahoo To Release Data

 

 

 

 

 

” The U.S. government threatened to fine Yahoo $250,000 a day in 2008 if it failed to comply with a broad demand to hand over user communications — a request the company believed was unconstitutional — according to court documents unsealed Thursday that illuminate how federal officials forced American tech companies to participate in the National Security Agency’s controversial PRISM program.

  The documents, roughly 1,500 pages worth, outline a secret and ultimately unsuccessful legal battle by Yahoo to resist the government’s demands. The company’s loss required Yahoo to become one of the first to begin providing information to PRISM, a program that gave the NSA extensive access to records of online com­munications by users of Yahoo and other U.S.-based technology firms.”

 

This is the power of Leviathan … we’ve been warned

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Phone Firewall Identifies Rogue Cell Towers Trying To Intercept Your Calls

 

 

 

 

 

 

 

 

 

 

” Rogue cell phone towers can track your phone and intercept your calls, and it’s only a matter of time before they’re as ubiquitous as GPS trackers. But at least now there’s a way to spot them.

  A firewall developed by the German firm GSMK for its secure CryptoPhone lets people know when a rogue cell tower is connecting to their phone. It’s the first system available that can do this, though it’s currently only available for enterprise customers using Android phones.

  GSMK’s CryptoPhone 500, a high-end phone that costs more than $3,000 and combines a Samsung Galaxy S3 handset with the CryptoPhone operating system, offers strong end-to-end encryption along with a specially hardened Android operating system that offers more security than other Android phones and the patented baseband firewall that can alert customers when a rogue tower has connected to their phone or turned off the mobile network’s standard encryption.

  The problem with rogue cell towers is widespread. The FCC is assembling a task force to address the illicit use of so-called IMSI catchers—the devices that pose as rogue cell towers. But the task force will only examine the use of the devices by hackers and criminals—and possibly foreign intelligence agencies—not their warrantless use by law enforcement agencies bent on deceiving judges about their deployment of the powerful surveillance technology.

  IMSI catchers, stingrays or GSM interceptors as they’re also called, force a phone to connect to them by emitting a stronger signal than the legitimate towers around them. Once connected, pings from the phone can help the rogue tower identify a phone in the vicinity and track the phone’s location and movement while passing the phone signals on to a legitimate tower so the user still receives service. Some of the IMSI software and devices also intercept and decrypt calls and can be used to push malware to vulnerable phones, and they can also be used to locate air cards used with computers. The systems are designed to be portable so they can be operated from a van or on foot to track a phone as it moves. But some can be stationary and operate from, say, a military base or an embassy. The reach of a rogue tower can be up to a mile away, forcing thousands of phones in a region to connect to it without anyone knowing.”

 

 

Read more on how to protect yourself from “rogue cell towers” and Stingray spy technology

 

 

 

 

 

 

 

 

 

 

Paedophile Snared As Google Scans Gmail For Images Of Child Abuse

 

 

 

 

” Technology giant Google has developed state of the art software which proactively scours hundreds of millions of email accounts for images of child abuse.

  The breakthrough means paedophiles around the world will no longer be able to store and send vile images via email without the risk of their crimes becoming known to the authorities.

  Details of the software emerged after a 41-year-old convicted sex offender was arrested in Texas for possession of child abuse images.

  Police in the United States revealed that Google’s sophisticated search system had identified suspect material in an email sent by a man in Houston.

  Child protection experts were automatically tipped off and were then able to alert the police, who swooped after requesting the user’s personal information from Google.”

 

 

       Certainly we have no desire to facilitate the proliferation of child porn , but this news report provides yet another vivid illustration of Google’s lack of respect for basic privacy rights . Anyone that uses Gmail is crazy . How long will it be before the State “persuades” the tech giant to employ software that detects the “malcontents” and “subversives” amongst us ? 

The Telegraph

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Follow

Get every new post delivered to your Inbox.

Join 6,942 other followers