Tag Archive: Privacy


‘Anti-Facebook’ Social Network Gets Viral Surge

 

 

 

 

 

” In a matter of days, the new social network Ello, described as the “anti-Facebook” for its stand on privacy and advertising, has become perhaps the hottest ticket on the Internet.

  Created last year as a “private” social network, Ello (www.ello.co) recently opened its doors on an invitation-only basis.

  Because of the limited supply and strong demand, the invitations have been selling on eBay at prices up to $500. Some reports said Ello is getting up to 35,000 requests per hour as a result of a viral surge in the past week.

  Ello appears to have caught on with its simple message which seems to take aim at frustrations of Facebook users.  

” Ello doesn’t sell ads. Nor do we sell data about you to third parties,” the company says.”

 

Read more and see our previous story here

 

 

 

 

 

 

 

 

 

 

 

 

—-

About these ads

FBI Not Happy With Apple & Google’s Encryption Policy

 

 

 

 

” Users might have praised the technology companies for efforts to encrypt their latest devices that would prevent law enforcement agencies’ hands on users’ private data, but the FBI is not at all happy with Apple and Google right now.
 
  The Federal Bureau of Investigation director, James Comey, said Thursday he was “very concerned” over Apple and Google using stronger or full encryption in their Smartphones and Tablets that makes it impossible for law enforcement to collar criminals.
  According to Comey, the Silicon Valley tech giants are “marketing something expressly to allow people to place themselves above the law.”

There will come a day – well it comes every day in this business – when it will matter a great, great deal to the lives of people of all kinds that we be able to with judicial authorization gain access to a kidnapper’s or a terrorist or a criminal’s device,” Comey told reporters.

I just want to make sure we have a good conversation in this country before that day comes. I’d hate to have people look at me and say, ‘Well how come you can’t save this kid,’ ‘How come you can’t do this thing.’” “

Hacker News

The Great Facebook Exodus Begins

 

 

Ello Home Page

 

 

 

 

” A little known independent social network might be having its big moment. As the debate around Facebook’s naming policy rages on, a growing swath of Facebook users appear to be jumping ship into a smaller, social lifeboat of sorts. It’s invite-only, anti-ads, and it’s called Ello.

  Short of Google+—distrusted by many thanks to a similar recently reversed “real name” policy—no single social network could withstand a mass influx of Facebook’s 1.32 billion monthly active users. But if this week’s rumblings are any indication, disenchanted Facebook users could look to smaller, independent social networks like Ello for their next move. 

  After seeing chatter about Ello in my own social circles, I reached out to Paul Budnitz, creator of this buzzy new anti-Facebook. Budnitz is the founder of designer toy maker Kidrobot and also owns and operates Budnitz Bicycles. I explained what I’d observed in my own social circles (my 1,000+ Facebook friends admittedly skew toward LGBTQ identities) to see if users from what some are calling Facebook’s “queer mass exodus” had started showing up on his own social experiment.

Why Ello? And why now? “

 

 

From Ello’s About page:

 

 

” What is Ello?

Ello is a simple, beautiful, and ad-free social network created by a small group of artists and designers.

  We originally built Ello as a private social network. Over time, so many people wanted to join Ello that we built a public version of Ello for everyone to use.

Ad Free

Ello doesn’t sell ads. Nor do we sell data about you to third parties.

  Virtually every other social network is run by advertisers. Behind the scenes they employ armies of ad salesmen and data miners to record every move you make. Data about you is then auctioned off to advertisers and data brokers. You’re the product that’s being bought and sold.

  Collecting and selling your personal data, reading your posts to your friends, and mapping your social connections for profit is both creepy and unethical. Under the guise of offering a “free” service, users pay a high price in intrusive advertising and lack of privacy.

We also think ads are tacky, that they insult our intelligence and that we’re better without them.

Read more about our no-ad policy here.

Support Ello

Ello is completely free to use.

  We occasionally offer special features to our users. If we create a special feature that you really like, you may choose to support Ello by paying a very small amount of money to add that feature to your Ello account.

  You never have to pay anything, and you can keep using Ello forever, for free. By choosing to buy a feature now and then for a very small amount of money you support our work and help us make Ello better and better.

Privacy

  When you use Ello we collect some information related to your visit. This information helps us understand in a general way how people are using Ello, so we can make our social network better.

  Unlike virtually every other social network, on Ello you can opt out of information sharing. Read How Ello Uses Information to learn how.

Join Ello

  Ello is currently invitation-only. To join Ello, you need to know someone that is already on the network. Alternatively, you can request an invitation by visiting the Ello Home Page.”

 

 

 

Read more at The Daily Dot and visit Ello’s site here

 

 

 

 

 

 

 

 

 

 

Facebook’s Fine Print Includes Permission To Track

 

 

 

 

 

 

” In order to access Facebook, users must agree to a lengthy terms of service contract that outline everything Facebook has permission to do. That includes tracking users, even when they aren’t on Facebook, for advertising purposes.

  Facebook tracks users by placing a cookie, or a small text file, on the computers of its users. The cookie communicates with so-called pixel code installed on many popular websites.

  Pixel code is often included in Facebook services that allow companies to take advantage of Facebook in several ways. Online publishers can install “Like” and “Share” buttons on content. Those buttons increase sharing on Facebook, which increases traffic to publishers’ sites. Online retailers can use pixel code to purchase Facebook ads targeted to people who were just about to buy something, then got distracted and later ended up browsing Facebook.

  The pixel code also lets Facebook know what its users are looking at on the Web. That information is invaluable to Facebook, because it gives the company a better idea about the interests of users. That increases the effectiveness of Facebook’s targeted advertising, which means Facebook can charge companies more for ads.”

 

   It’s looking more and more like Facebook needs to be abandoned by those desiring privacy … read more at the Wall Street Journal

 

 

 

 

 

 

 

 

 

 

6 Key Supreme Court Cases This Term

 

 

 

 

” If you use Facebook, pay taxes, enjoy fishing or drive a car, the 2014-2015 term of the Supreme Court, which begins Oct. 6, will be worth watching.

  Many of the cases from the last term touched on issues such as executive power, religious liberty, free speech and racial preferences.

Here are highlights of the upcoming term:

  To hear about all these cases and how the term may unfold, join us at Heritage for our annual Supreme Court Preview on Thursday at noon (or watch online). Legal luminaries Paul Clement and Michael Carvin will discuss the big cases of the upcoming term.”

 

Daily Signal

 

 

 

 

 

 

 

 

 

Watch This Crazy Drone With Arms Fly and Turn A Wheel In Mid-Air

 

 

 

 

” Sure, drones can take videos of Martha Stewart’s farm and maybe even save the environment. But… can they unscrew a bottle cap? Play Twister? Spin a dreidel? Do anything that involves having arms? Well, now we have a drone with arms—that can fly and turn a valve wheel mid-air.

  Above is the video, and here’s the paper’s title and abstract (flip to 1:00 in the video to see the really cool stuff):

“Towards Valve Turning using a Dual-Arm Aerial Manipulator,” by Christopher Korpela, Matko Orsag, and Paul Oh, from Drexel University. “

Time has more 

Facebook Poses A Threat To Every American

 

 

 

 

 

” Participation on Facebook could prove very dangerous to your future well-being. There is a reason that Facebook is aligned with both the CIA and the NSA. I have several credible sources tell me that all data posted on Facebook goes into series of cataloged files which culminates with each person being assigned a “Threat Matrix Score”. The mere existence of a Threat Matrix Score should send chills up and the collective spines of every American.

  When, not if, martial law comes to America, this Threat Matrix Score, of which Facebook data is used to help compile an “enemies of the state” list, your future longevity could be seriously imperiled. It is too late for people like Steve Quayle, Doug and Joe Hagmann, John B. Wells and myself to avoid being placed on this list. However, it is not too late for the average American to limit their exposure by NOT posting and participating on Facebook. Facebook participation should come with a black box warning:

“ WARNING: The views expressed on Facebook can and will be used against you. Participation in Facebook could prove detrimental to the length of your life. All political dissident views are immediately reported to the CIA and the NSA. Risk of repeated exposure on Facebook could result in you and your family being hauled out of their homes at 3AM, separated from your family and sent to a re-education camp”. “

 

 

 

Read the rest

 

 

 

 

 

 

 

 

 

 

New Device In The Works To Catch Texting Drivers

 

 

 

 

 

” A Virginia company is developing a radar gunlike device that would help police catch drivers as they text.

  The technology works by detecting the telltale radio frequencies that emit from a vehicle when someone inside is using a cellphone, said Malcolm McIntyre of ComSonics. Cable repairmen use similar means to find where a cable is damaged – from a rodent, for instance – by looking for frequencies leaking in a transmission, McIntyre said.

  A text message, phone call and data transfer emit different frequencies that can be distinguished by the device ComSonics is working on, according to McIntyre. That would prove particularly useful for law enforcement in states such as Virginia, where texting behind the wheel is banned but talking on the phone is legal for adult drivers. “

  

 

Virginia Pilot

 

 

 

 

 

 

 

 

 

U.S. Threatened Massive Fine To Force Yahoo To Release Data

 

 

 

 

 

” The U.S. government threatened to fine Yahoo $250,000 a day in 2008 if it failed to comply with a broad demand to hand over user communications — a request the company believed was unconstitutional — according to court documents unsealed Thursday that illuminate how federal officials forced American tech companies to participate in the National Security Agency’s controversial PRISM program.

  The documents, roughly 1,500 pages worth, outline a secret and ultimately unsuccessful legal battle by Yahoo to resist the government’s demands. The company’s loss required Yahoo to become one of the first to begin providing information to PRISM, a program that gave the NSA extensive access to records of online com­munications by users of Yahoo and other U.S.-based technology firms.”

 

This is the power of Leviathan … we’ve been warned

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Phone Firewall Identifies Rogue Cell Towers Trying To Intercept Your Calls

 

 

 

 

 

 

 

 

 

 

” Rogue cell phone towers can track your phone and intercept your calls, and it’s only a matter of time before they’re as ubiquitous as GPS trackers. But at least now there’s a way to spot them.

  A firewall developed by the German firm GSMK for its secure CryptoPhone lets people know when a rogue cell tower is connecting to their phone. It’s the first system available that can do this, though it’s currently only available for enterprise customers using Android phones.

  GSMK’s CryptoPhone 500, a high-end phone that costs more than $3,000 and combines a Samsung Galaxy S3 handset with the CryptoPhone operating system, offers strong end-to-end encryption along with a specially hardened Android operating system that offers more security than other Android phones and the patented baseband firewall that can alert customers when a rogue tower has connected to their phone or turned off the mobile network’s standard encryption.

  The problem with rogue cell towers is widespread. The FCC is assembling a task force to address the illicit use of so-called IMSI catchers—the devices that pose as rogue cell towers. But the task force will only examine the use of the devices by hackers and criminals—and possibly foreign intelligence agencies—not their warrantless use by law enforcement agencies bent on deceiving judges about their deployment of the powerful surveillance technology.

  IMSI catchers, stingrays or GSM interceptors as they’re also called, force a phone to connect to them by emitting a stronger signal than the legitimate towers around them. Once connected, pings from the phone can help the rogue tower identify a phone in the vicinity and track the phone’s location and movement while passing the phone signals on to a legitimate tower so the user still receives service. Some of the IMSI software and devices also intercept and decrypt calls and can be used to push malware to vulnerable phones, and they can also be used to locate air cards used with computers. The systems are designed to be portable so they can be operated from a van or on foot to track a phone as it moves. But some can be stationary and operate from, say, a military base or an embassy. The reach of a rogue tower can be up to a mile away, forcing thousands of phones in a region to connect to it without anyone knowing.”

 

 

Read more on how to protect yourself from “rogue cell towers” and Stingray spy technology

 

 

 

 

 

 

 

 

 

 

Paedophile Snared As Google Scans Gmail For Images Of Child Abuse

 

 

 

 

” Technology giant Google has developed state of the art software which proactively scours hundreds of millions of email accounts for images of child abuse.

  The breakthrough means paedophiles around the world will no longer be able to store and send vile images via email without the risk of their crimes becoming known to the authorities.

  Details of the software emerged after a 41-year-old convicted sex offender was arrested in Texas for possession of child abuse images.

  Police in the United States revealed that Google’s sophisticated search system had identified suspect material in an email sent by a man in Houston.

  Child protection experts were automatically tipped off and were then able to alert the police, who swooped after requesting the user’s personal information from Google.”

 

 

       Certainly we have no desire to facilitate the proliferation of child porn , but this news report provides yet another vivid illustration of Google’s lack of respect for basic privacy rights . Anyone that uses Gmail is crazy . How long will it be before the State “persuades” the tech giant to employ software that detects the “malcontents” and “subversives” amongst us ? 

The Telegraph

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Just A Penny And A Rubber Band

 

 

 

” We love bikes. We love skirts. But sometimes these two don’t mix well. Which is why we came up with Penny in Yo’ Pants. An easy solution to making your skirt bikeable.

  Check out our website at pennyinyourpants.co.uk. We will be making a slicker model shortly that will be even better than a penny and a rubber band (imagine that). Proceeds will go to get more women on bikes around the world!

  This was prototyped during Cyclehack Glasgow, 2014. cyclehack.com “

 

 

 

 

 

 

 

 

 

 

 

 

Report: Ordinary Americans Caught Up In Data Sweep

 

 

 

 

 

” When the U.S. National Security Agency intercepted the online accounts of legally targeted foreigners over a four-year period it also collected the conversations of nine times as many ordinary Internet users, both Americans and non-Americans, according to a probe by The Washington Post.

  Nearly half of those surveillance files contained names, email addresses or other details that the NSA marked as belonging to U.S. citizens or residents, the Post reported in a story posted on its website Saturday night. While the federal agency tried to protect their privacy by masking more than 65,000 such references to individuals, the newspaper said it found nearly 900 additional email addresses that could be strongly linked to U.S. citizens or residents.”

The Snowden revelations continue to reveal the extent of State spying during the Age Of Obama …

” The material reviewed by the Post included roughly 160,000 intercepted e-mail and instant-message conversations, some of them hundreds of pages long, and 7,900 documents taken from more than 11,000 online accounts. It spanned President Barack Obama’s first term, 2009 to 2012, and was provided to the Post by former NSA analyst Edward Snowden.

  The daily lives of more than 10,000 account holders who were not targeted were catalogued and recorded, the Post reported. The newspaper described that material as telling “stories of love and heartbreak, illicit sexual liaisons, mental-health crises, political and religious conversions, financial anxieties and disappointed hopes.” The material collected included more than 5,000 private photos, the paper said.”

AP News

Happy Birthday America

Happy 4th, America. Here’s 7,000 Fireworks Going Off At The Same Time

How To Make Your Own Fireworks (In 1785)

The Fireworks Laws In Every State

Here are the states where you can buy fireworks

 

 

 

 

Liberty/Statism

 

Man Confronts Salt Lake City Police After An Officer Shot His Dog

Honor the defenders of liberty: your neighbors

This Fourth of July America Our Liberty is Under Siege From Within

With liberty in peril from within, would Founders recognize the US

 

 

 

 

 

International

 

 

US military discloses secret military presence in Somalia

US Admits Military Presence in Somalia, Eyes Expansion

U.S. Discloses Secret Somalia Military Presence

 

 

 

National


 

Border Crisis

 

Cartels Exploit Immigration Crisis To Smuggle More Drugs

Poll: Public holds Obama responsible for border crisis

Immigration Border Crisis Photos

You soon may not need citizenship to vote in the US; just become a New Yorker

 

 

 

Politics

Clinton gaffe: Former secretary of State confuses Britain’s political parties

Big break in IRS case will change scandal’s course

Richard Mellon Scaife, Influential U.S. Conservative, Dies at 82

 

 

 

Hurricane Arthur

 

NC residents flee as Arthur makes landfall

Hurricane Arthur scythes through Outer Banks of North Carolina

Track Hurricane Arthur – Up to the Minute Coverage

National Hurricane Center

 

 

 

Business/Economy

 

BBC News – Dow Jones Industrial Average hits 17,000

Time for fireworks: Dow tops 17,000!

Analyze this: what Wall Street’s saying about Dow 17k

U.S. Seen as Biggest Oil Producer After Overtaking Saudi

Inside (Monsanto) America’s Third-Most-Hated Company

 

 

 

Tech/Privacy

 

 

Facebook Experiments Had Few Limits

Russia Moves To Ban Online Services That Don’t Store Personal Data In Russia

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

—-

 

 

 

 

New Sensors Will Scoop Up ‘Big Data’ On Chicago

 

 

 

 

 

 

” The curled metal fixtures set to go up on a handful of Michigan Avenue light poles later this summer may look like delicate pieces of sculpture, but researchers say they’ll provide a big step forward in the way Chicago understands itself by observing the city’s people and surroundings.

  The smooth, perforated sheaths of metal are decorative, but their job is to protect and conceal a system of data-collection sensors that will measure air quality, light intensity, sound volume, heat, precipitation and wind. The sensors will also count people by measuring wireless signals on mobile devices.”

 

 

 

 

” Some experts caution that efforts like the one launching here to collect data from people and their surroundings pose concerns of a Big Brother intrusion into personal privacy.

  In particular, sensors collecting cellphone data make privacy proponents nervous. But computer scientist Charlie Catlett said the planners have taken precautions to design their sensors to observe mobile devices and count contact with the signal rather than record the digital address of each device.”

 

 

Chicago Tribune has more on the latest intrusions into personal privacy 

 

 

 

 

 

 

 

 

 

This Top Turns See-Through If You Leave Personal Data Exposed

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

” A Brooklyn-based designer has created a 3D-printed sculptural boob tube to spark social commentary on the state of privacy in a data-driven world — by making the top gradually more sheer.”

 

 

 

 

 

 

” X.pose’s striking black webbed rubber structure was engineered using a Stratasys printer, moulded to the body to ensure comfort and very much inspired by creator Xuedi Chen’s previous work, Invasive Growth (moss-grown jewellery based on the parasitic cordyceps fungus). But underneath, its layers tell another story about our lack of control and veritable vulnerability when it comes to who uses our data, what for and how much they take.”

 

 

The artist describes her creation thusly …

 

 

” x.pose is a wearable data-driven sculpture that exposes a person’s skin as a real-time reflection of the data that the wearer is producing. In the physical realm we can deliberately control which portions our bodies are exposed to the world by covering it with clothing. In the digital realm, we have much less control of what personal aspects we share with the services that connect us. In the digital realm we are naked and vulnerable. “

 

 

Wired UK

 

 

 

 

 

 

 

 

 

 

 

 

Commentary From John Whitehead At The Rutherford Institute

 

 

 

 

 

” By John W. Whitehead 
June 16, 2014

A standing military force, with an overgrown Executive will not long be safe companions to liberty.”—James Madison

“ Here [in New Mexico], we are moving more toward a national police force. Homeland Security is involved with a lot of little things around town. Somebody in Washington needs to call a timeout.”—Dan Klein, retired Albuquerque Police Department sergeant.

  If the United States is a police state, then the Department of Homeland Security (DHS) is its national police force, with all the brutality, ineptitude and corruption such a role implies. In fact, although the DHS’ governmental bureaucracy may at times appear to be inept and bungling, it is ruthlessly efficient when it comes to building what the Founders feared most—a standing army on American soil.

The third largest federal agency behind the Departments of Veterans Affairs and Defense, the DHS—with its 240,000 full-time workers, $61 billion budget and sub-agencies that include the Coast Guard, Customs and Border Protection, Secret Service, Transportation Security Administration (TSA) and the Federal Emergency Management Agency (FEMA)—has been aptly dubbed a “runaway train.”

  In the 12 years since it was established to “prevent terrorist attacks within the United States,” the DHS has grown from a post-9/11 knee-jerk reaction to a leviathan with tentacles in every aspect of American life. With good reason, a bipartisan bill to provide greater oversight and accountability into the DHS’ purchasing process has been making its way through Congress.

  A better plan would be to abolish the DHS altogether. In making the case for shutting down the de facto national police agency, analyst Charles Kenny offers the following six reasons: one, the agency lacks leadership; two, terrorism is far less of a threat than it is made out to be; three, the FBI has actually stopped more alleged terrorist attacks than DHS; four, the agency wastes exorbitant amounts of money with little to show for it; five, “An overweight DHS gets a free pass to infringe civil liberties without a shred of economic justification”; and six, the agency is just plain bloated.

  To Kenny’s list, I will add the following: The menace of a national police force, a.k.a. a standing army, vested with so much power cannot be overstated, nor can its danger be ignored. Indeed, as the following list shows, just about every nefarious deed, tactic or thuggish policy advanced by the government today can be traced back to the DHS, its police state mindset, and the billions of dollars it distributes to police agencies in the form of grants.

  Militarizing police and SWAT teams. The DHS routinely hands out six-figure grants to enable local municipalities to purchase military-style vehicles, as well as a veritable war chest of weaponry, ranging from tactical vests, bomb-disarming robots, assault weapons and combat uniforms. This rise in military equipment purchases funded by the DHS has, according to analysts Andrew Becker and G.W. Schulz, “paralleled an apparent increase in local SWAT teams.” The end result? An explosive growth in the use of SWAT teams for otherwise routine police matters, an increased tendency on the part of police to shoot first and ask questions later, and an overall mindset within police forces that they are at war—and the citizenry are the enemy combatants.”

     Below are a list of other ways in which the State is busy eroding our Constitutional rights , all explored in greater depth at the Rutherford Institute .

” Spying on activists, dissidents and veterans. 

Stockpiling ammunition. 

Distributing license plate readers. 

Contracting to build detention camps. 

Tracking cell-phones with Stingray devices. 

Carrying out military drills and lockdowns in American cities. 

Using the TSA as an advance guard. 

Conducting virtual strip searches with full-body scanners. 

Carrying out soft target checkpoints. 

Directing government workers to spy on Americans.  

Conducting widespread spying networks using fusion centers. 

Carrying out Constitution-free border control searches. 

Funding city-wide surveillance cameras. 

Utilizing drones and other spybots. 

  It’s not difficult to see why the DHS has been described as a “wasteful, growing, fear-mongering beast.” If it is a beast, however, it is a beast that is accelerating our nation’s transformation into a police state through its establishment of a standing army, a.k.a. national police force.

  This, too, is nothing new. Historically, as I show in my book A Government of Wolves: The Emerging American Police State, the establishment of a national police force has served as a fundamental and final building block for every totalitarian regime that has ever wreaked havoc on humanity, from Hitler’s all-too-real Nazi Germany to George Orwell’s fictional Oceania. Whether fictional or historical, however, the calling cards of these national police agencies remain the same: brutality, inhumanity, corruption, intolerance, rigidity, and bureaucracy—in other words, evil. “

Read more here

How To Stop Facebook From Tracking Your Browsing History

 

 

 

” Last week, Facebook announced that it was going to start tracking our browsing activity. Facebook is claiming that this feature is part of its ad-tailoring program (it also recently introduced a tool that lets you give feedback on ads). Of course, it’s not quite that innocent: Advertisers will pay more for information on what you do outside of Facebook because it will help them target you better inside of Facebook.

  Sound good to you? Great, carry on! No? You have some choices, including privacy company Abine’s new DoNotTrackMe tool for Facebook.

” It is crazy for anyone to allow Facebook to collect their browsing history when they’re not even logged into Facebook,” said Abine CEO Rob Shavell, in a press release announcing the technology. “The idea that one company should be trusted to know about our friends and family and then also everything we do online is insane.”

  And the scope of Facebook’s tracking ability is greater than you may think. “Our browsing history, which Facebook can only collect because of the many ‘like’ and ‘login’ buttons they have placed on other sites, allows Facebook to connect two critical sets of information about us: ‘Who we are,’ our identity and personal information and social graph; [and] ‘what we do,’ which sites we go to each day, what we do there, and more,” Shavell explained via email. 

” You might have ‘nothing to hide,’ but if you have a Facebook account and surf without technology protecting you from this new default on data collection, you will certainly find out,” he says. “

From the DoNotTrackMe website

” If you’re like the average web user, you’re unknowingly tracked over 100 times each time you surf the web.

  DoNotTrackMe automatically blocks these tracking companies – ad networks, social networks, and sneaky data collection companies – from tracking your browsing behind the scenes. DoNotTrackMe has blocked over 1 trillion attempts to track millions of users’ browsing and actively blocks over 600 of these companies.

  DoNotTrackMe also protects your email address, phone, and credit card from being abused by companies on the web and on your mobile device.”

    The more we learn of Facebook , the more we want to have nothing to do with it . Read more on protecting your privacy from those corporate Statists of Zuckerberg’s at the Daily Dot .

Judge Says NSA Can Continue To Destroy Evidence

 

 

 

 

 

 

” Well, this is unfortunate. After yesterday’s back and forth between the DOJ and the EFF over the ongoing destruction of key evidence in the Jewel v. NSA case, the court ordered an emergency hearing for this afternoon. About an hour before the hearing, the DOJ presented its opposition to the temporary restraining order, arguing, basically, that it would be too damn complicated to stop destroying evidence in the case. Part of this is because the data collected under the Section 702 program apparently isn’t just one big database, but is quickly fed into all sorts of other systems.”

 

 

Tech Dirt has the whole story . See also :

 

Judge Asks for More Information About NSA Spying Evidence Destruction After Emergency Hearing

Judge Changes Mind, Says NSA Can Resume Destroying Evidence

Judge Says NSA Can Continue To Destroy Evidence

FISA Court Reverses Order to Destroy NSA Phone Data -CIO.com

 

 

 

 

 

 

 

 

Delete Your Facebook

 

 

 

 

Published on Jun 5, 2014

” Click to tweet: http://ctt.ec/R18PL
Please share! Help spread the word! #deletefacebook
Here is my facebook, It will be gone on Sat 12PM PST.
https://www.facebook.com/Matthiasiam

Here is how to Delete Facebook- http://goo.gl/yHg29r
Reset The Net! : https://www.resetthenet.org/

Like my shirt? Find it here: http://www.longlivetheswarm.com

SOURCES —————————————-­———————–

FB Passive Listening: http://goo.gl/y1CYR0
FB Reads Your Texts: http://goo.gl/x7nPfu
NSA FB Servers: http://goo.gl/dflG51
FB Privacy Listening Issues: http://goo.gl/nluYZB
FB Stores Your Recordings: http://goo.gl/bmY6bQ
FB Silently Updates TOS: http://goo.gl/ZAajME
Reddit Thread on FB Listening: http://goo.gl/imGjs8
Users Slam FB Listening: http://goo.gl/SQZ8Ny

PROTECT YOURSELF —————————————-­—–

IOS Privacy – http://goo.gl/TSmRO6
Android Privacy – http://goo.gl/FtNUq9
Delete FB – http://goo.gl/yHg29r

FACEBOOK ALTERNATIVES ———————————–

Twitter | http://www.twitter.com
Reddit | http://www.reddit.com
Path | http://www.path.com
Vine | http://www.vine.co
Tumblr | http://www/tumblr.com

MOVIES —————————————-­————————-

V for Vendetta
Minority Report
Terms and Conditions May Apply 
1984
Got some other movies? Let me know in the comments

—————————————-­—————————————-­————-

GAME CHANNEL: http://www.youtube.com/matthiasarcade

TWITTER: http://www.twitter.com/matthiasiam

GOOGLE+: http://www.google.com/+matthiasiam

INSTAGRAM: http://www.instagram.com/matthiasiam “

 

 

 

 

 

 

 

 

 

 

 

 

How The NSA Could Bug Your Powered-Off iPhone, and How To Stop Them

 

 

 

 

 

” Just because you turned off your phone doesn’t mean the NSA isn’t using it to spy on you.

  Edward Snowden’s latest revelation about the NSA’s snooping inspired an extra dose of shock and disbelief when he said the agency’s hackers can use a mobile phone as a bug even after it’s been turned off. The whistleblower made that eye-opening claim when Brian Williams of NBC Nightly News, holding his iPhone aloft during last Wednesday’s interview, asked, “What can the NSA do with this device if they want to get into my life? Can anyone turn it on remotely if it’s off? Can they turn on apps?

They can absolutely turn them on with the power turned off to the device,” Snowden replied.

  Snowden didn’t offer any details on this seemingly magical feat. But a group of particularly cunning iPhone hackers say it’s possible. They also say you can totally and completely turn off your iPhone so no one—not even the NSA—can use it to spy on you.”

 

 

Learn mored at Wired

 

 

 

 

 

 

 

 

 

 

High Schoolers School Nancy Pelosi On NSA Abuse

 

 

 

     While being confronted about domestic surveillance and fourth amendment violations a group of high school students  get Nancy Pelosi to blame Bush and defend the NSA , thus revealing her to be the tool that she is .

Last Week Tonight with John Oliver (HBO): Net Neutrality

 

 

 

Published on Jun 1, 2014

” Cable companies are trying to create an unequal playing field for internet speeds, but they’re doing it so boringly that most news outlets aren’t covering it. 
John Oliver explains the controversy and lets viewers know how they can voice their displeasure to the FCC.”

 

 

 

 

 

 

 

 

 

 

 

 

Google Received 12,000 Requests To Be ‘Forgotten’ On First Day, Report Says

 

 

google form

 

 

” It’s been less than 48 hours since Google launched its online tool that allows people in the European Union to request to be “forgotten” from search results, and the company has already received 12,000 requests, according to a new report.

  The requests are in response to a European Court of Justice ruling earlier this month that found EU citizens have a “right to be forgotten” online and that Google must remove links to search results that can damage a person’s reputation.

  Reuters reports the company received 12,000 requests in the first 24 hours the form was online, with requests at times coming in as fast as 20 per minute.”

 

Mashable has more on people’s desire to be “forgotten”

 

 

 

 

 

 

 

 

 

Follow

Get every new post delivered to your Inbox.

Join 6,459 other followers