Hey there! Thanks for dropping by YouViewed/Editorial! Take a look around and grab the RSS feed to stay updated. See you around!
” Every man’s dream: a group of hot women soldiers posing in lingerie.
In Israel, that dream has become a reality. A group of female Israeli soldiers has been punished for posting pictures of themselves in underwear and combat gear on Facebook. And now more images from the same base are surfacing.”
” The women were stations in southern Israel when they posted the racy pics. One photo showed the soldiers exposing their underwear and back sides. In another one, five women posed wearing only helmets and combat equipment. The faces of the women were blurred out in the pictures.”
” While the women were punished, some are outraged that they did not face harsher penalties — especially since the photos involve the use of weapons. In a statement, the military said the women had acted in a manner that demonstrated “unbecoming behavior” for soldiers. “The commanding officers disciplined the soldiers as they saw fitting.”
Regular readers will be familiar with this case from our post back in June when the pictures went viral . For those in need of a refresher check the post out here . For more pictures and info on the disciplinary measures the troopers face go here .
” We’ve asked the companies in our Who Has Your Back Program what they are doing to bolster encryption in light of the NSA’s unlawful surveillance of your communications. We’re pleased to see that
four five sixseven companies—Dropbox, Facebook, Google, Microsoft, Sonic.net,SpiderOak, and Twitter—are implementing five out of five of our best practices for encryption. See the infographic.
By adopting these practices, described below, these service providers have taken a critical step towards protecting their users from warrantless seizure of their information off of fiber-optic cables. By enabling encryption across their networks, service providers can make backdoor surveillance more challenging, requiring the government to go to courts and use legal process. While Lavabit’s travails have shown how difficult that can be for service providers, at least there was the opportunity to fight back in court.
While not every company in our survey has implemented every recommendation, each step taken helps, and we appreciate those who have worked to strengthen their security. We hope that every online service provider adopts these best practices and continues to work to protect their networks and their users.”
” The star-studded selfie tweet from Ellen Degeneres crushed the retweeting record previously held by Obama’s re-election post, but if it were up to us, this re-creation from our military would have many more than both.”
Help the soldiers out and give them a retweet . I couldn’t figure out how to embed the Tweet but if you click on it , you will be taken to the original . Let’s show the world that our soldiers are more appreciated than our narcissist in chief and the role-players in Hollyweird . Let the retweets begin .
” Rumours spread fast, and with social media sites like Twitter it’s quicker than ever to share your thoughts – and boasts – with the online world.
But be careful what you tweet; scientists from the University of Sheffield are developing an online lie detector that can tell fact from fiction in just 140 characters or less.
The lie detector, named ‘Pheme’ after a Greek goddess famed for spreading scandalous rumour, will sift through tweets from news outlets, individuals, members of the public, and automated ‘bots’ to see if their posts are as truthful as they claim.”
Daily Mail has more
” There’s a reason why two-year-old Daisy Young is cuddling Bunny the rabbit very tightly – and it’s not just because she loves her more than any other toy.
Bunny, Daisy’s constant companion since she was just ten months, vanished from her side on a family shopping trip to the January sales.
Daisy’s mother Hayley Sworn only noticed Bunny was missing when they got home. Just how would she break the news to Daisy that the precious gift from her grandma was gone forever?”
” The Shooting 50 is our list of the most influential Twitter profiles in the firearms industry.
The list includes nonprofit organizations, firearms manufacturers, media, journalists, and shooting sports athletes. Their Twitter profiles help their users navigate the complex firearms industry through engaging and informative conversations.
The majority of these movers and shakers will gather next week in Las Vegas for the National Shooting Sports Foundation’s SHOT Show, January 13-14, 2014, the largest shooting, hunting and tactical trade show in the world. Wide Open Spaces will have boots on the ground at SHOT Show bringing you complete coverage of the latest and greatest firearms products.
Throughout 2014, Wide Open Spaces will have similar lists of influential figures, organizations and companies in other outdoor sports industries, including hunting and fishing.
So, without further ado, here’s The Shooting 50:
1. The National Rifle Association - @NRA “
” Eighty retired New York City police officers and firefighters were charged on Tuesday in one of the largest Social Security disability frauds ever, a sprawling decades-long scheme in which false mental disability claims by as many as 1,000 people cost taxpayers hundreds of millions of dollars, according to court papers.
Scores of those charged in the case essentially stole in plain sight, according to a 205-count indictment and a bail letter, collecting between $30,000 and $50,000 a year based on fabricated claims that they were completely incapacitated by serious psychiatric disorders. Many said that their actions in response to the Sept. 11, 2001, terrorist attacks were responsible for their psychiatric conditions, such as post-traumatic stress disorder, anxiety or depression.
But their Facebook pages and other websites, according to the court papers, tell a starkly different story.
The bail letter includes photographs culled from the Internet that show one riding a jet ski and others working at jobs ranging from helicopter pilot to martial arts instructor. One is shown fishing off the coast of Costa Rica and another sitting astride a motorcycle, while another appeared in a television news story selling cannoli at the Feast of San Gennaro on Mulberry Street in Manhattan.”
” YG Network — a non-profit 501(c)(4) dedicated to broadening the Young Guns movement by promoting next-generation conservative policies —today released “Aloha!,” a web video highlighting the ways in which Obamacare is harming American families, as well as Obama’s out-of-touch style of leadership. The ad comes as Obama continues his lengthy Hawaiian vacation, during which Fox News reports that “there’s no escaping the buffeting winds of troubled state health insurance exchanges,” including the “botched roll-out of the ObamaCare state exchange in Hawaii.”
“Aloha!” is posted at www.ObamacareWipeOut.com, and YG Network is delivering its message to Americans in Hawaii and the Washington, D.C. area with a significant five-figure online campaign, which includes YouTube pre-roll, promoted Tweets and Facebook posts, and display ads on highly-trafficked websites such as the Honolulu Star-Advertiser.”
Picture of gold and silver plated AK 47s posted on Serafin Zambada's Twitter account.
” Young Mexican drug cartel members are flaunting their wealth on Facebook and Twitter, giving investigators important clues about their movements and contacts.
Last week, police in the Netherlands arrested Jose Rodrigo Arechiga Gamboa, an enforcer for the Sinaloa cartel, after he arrived at Schiphol airport on a flight from Mexico under an assumed name.
Arechiga’s Twitter tag is “El Chino Anthrax”, named after the deadly disease, and believed to refer to a method of disposing of opponents.
He is now in Dutch jail awaiting extradition to the United States, where he is wanted on drug trafficking charges.
On the social networking site, Gamboa has posted a picture of a Lamborghini with a rifle poking from its window, and experts believe that his online activity may have helped law enforcement officials pin him down.”
” The image is terrifying: a young man, possibly a surfer, screaming in agony and terror as he is attacked by what looks like a giant shark. The accompanying message makes it clear what to expect:
“Shark eats the swimming man in an Ocean!! Watch the Video – Heart-breaking footage behind the scene!!”
Facebook users who click on the image are asked to click “like” in order to see the whole video – and a surprising number of bloodthirsty ones do so.
However, when these surfers of the couch-bound variety click “like”, they are asked to complete a survey – and are adding to the revenue of the scammer who devised this, the latest in a series of scams aimed at users of social media sites by people who gain revenue every time people click on the page.”
” Facebook is ‘dead and buried’ to older teenagers, an extensive European study has found, as the key age group moves on to Twitter, Instagram, WhatsApp and Snapchat.
Researching the Facebook use of 16-18 year olds in eight EU countries, the Global Social Media Impact Study found that as parents and older users saturate Facebook, its younger users are shifting to alternative platforms.
” Facebook is not just on the slide – it is basically dead and buried,” wrote Daniel Miller, lead anthropologist on the research team, who is professor of material culture of University College London.
” Mostly they feel embarrassed to even be associated with it. Where once parents worried about their children joining Facebook, the children now say it is their family that insists they stay there to post about their lives.” “
Tis The Season! Politician’s Share Their Seasonal Cheer With Cheesy Christmas Photos But Where’s The Obama’s Official Portrait?
” Nothing says Christmas like sending a cheesy family photo to your relatives to show how much everyone has grown.
Never one to miss a trick, the nation’s politicians have jumped on the bandwagon and are using social media to send their messages of seasonal cheer along with some frankly ridiculous photos of their growing broods.
This Christmas has seen some impressively awful examples of these cheery seasonal photos with the Romneys and the Pelosis seemingly competing to see who can fit the most relatives into a photo.”
” The National Security Agency has been collecting contacts from people’s personal e-mail address books and instant messaging accounts in an effort to detect relationships that might be crucial to government security, the Washington Post is reporting.
The agency is collecting the data from overseas points and many of the contacts belong to Americans, the Post reports.
The Post bases its report on word from senior intelligence officials and top secret documents, including a Microsoft PowerPoint presentation, provided by former NSA contractor Edward Snowden..
The majority of the contacts harvested come from Yahoo and Hotmail accounts, but others also come from Facebook, Google and unspecified other providers, the Post reports. The contacts amount to a sizeable portion of the world’s e-mail and instant messaging accounts, according to the news organization.”
” The US National Security Agency has been spying on the social media profiles of an unknown number of users, including US citizens, since 2010 in what it calls an effort to “discover and track” connections between Americans and suspected terrorists.The New York Times reported Sunday that the latest revelation of NSA spying on Americans comes via documents provided to the paper by former NSA whistleblower Edward Snowden, who is wanted by the United States on espionage charges and is currently living in exile in Russia.
Under the new policy, the NSA is allowed to use social media, geo-location information, tax and insurance records, and other sources, both public and private, to improve spying on phone and electronic communications. The newly leaked documents reveal that the NSA authorized the “large-scale graph analysis on very large sets of communications metadata without having to check foreignness” of every identifier, such as e-mail addresses and phone numbers.”
” A school in California has hired Geo Listening Company to begin tracking their 13,000 students through social media. Glendale Unified School District, in Los Angeles County, claims this is to crack down on law-breaking, bullying, and other harmful activities. At the price of $40,000 tax payer dollars they better be catching some serious bullies.
“All of the individual posts we monitor on social media networks are already made public by the students themselves. Therefore, no privacy is violated,” Geo Listening Company said, adding it does not “monitor email, SMS, MMS, phone calls, voicemails or unlock any privacy setting of a social network user.”
It claims it can track “bullying, cyber-bullying, despair, hate, harm, crime, vandalism, substance abuse, truancy” and much more, using popular services like Twitter, Facebook, Instagram, Picasa, Vine, Flickr, Ask.fm, YouTube, Google+ or anywhere else where people share information voluntarily.”
” Who would have known that the popularity of blogs would grow to reach such mammoth levels.
Social media has revolutionized the way we communicate, share and interact and this has provided the platforms and the marketing networks for bloggers to achieve global reach and influence.
Blogs such as Huffington Post, Mashable and Gawker now rank in the top 1,000 websites in the world.
This publishing revolution has in turn led to the increase in the popularity of “Blogger Outreach” programs. While the online community remains divided upon their opinions about this new age marketing strategy (some calling it a PR gimmick), others maintain that it is merely a symbiotic channel to further strengthen the relationships.”
” More than 200 teens descended upon a mall parking lot in Lauderhill, Fla., called by Facebook and Twitter to a fight that forced the partial closure of the mall Tuesday afternoon.
The trouble apparently began across the street from the shopping center, and grew as word spread on social media.
“I just heard that anybody that had beef with each other is supposed to come over here and fight,” said Frank Francis, a witness to the fight.
“People was getting hit by [traffic] cones,” Francis said. “Like fighting, like a brawl.”
” Ship shaped Hotel in S. Korea (Sun Cruise in Jungdongjin)”
Assuming that your data is being watched, what might you do to hide it?
First, consider not putting so much stuff out there in the first place. Wuergler devised a program he calls Stalker that can siphon off nearly all of your digital information to put together an amazingly complete portrait of your life and pretty much find out where you are at all times. Use Facebook if you must, but realize you’re making it easy for the government to track and find you when they choose to do so.
A second step toward increased privacy is to use a browser like DuckDuckGo, which does not collect the sort of information—say, your IP address—that can identify you with your Internet searches. Thus, if the government bangs on their doors to find out what you’ve been up to, DuckDuckGo has nothing to hand over. I have decided to make DuckDuckGo my default for general browsing, turning to Google only for items such as breaking news and scholarly articles. (Presumably, the NSA would be able to tap into my searches on DuckDuckGo in real time.)
Third, TOR offers free software and a network of relays that can shield your location from prying eyes. TOR operates by bouncing your emails and files around the Internet through encrypted relays. Anyone intercepting your message once it exits a TOR relay cannot trace it back to your computer and your physical location. TOR is used by dissidents and journalists around the world. On the downside, in my experience it operates more slowly than, say, Google.”
Aerial View Of Taksim Square
” The mainstream media has yet to highlight the protests. Meanwhile, police brutality continues as over 900 people have been arrested and several have been killed.”
Blood in the Streets Of Istanbul
” Here are thirteen pictures from Twitter that show why we should take offense with mainstream media for not covering what could become an historic event.”
Editor’s Note : This story first appeared a year ago but we missed it . However , in light of recent revelations regarding what seems to be normal procedure for various agencies of the federal government we thought it would be of interest to our readers .
Dept. of Homeland Security Forced To Release List Of Keywords Used To Monitor Social Networking Sites
” In a story appearing earlier today on the U.K’s Daily Mail website, it was reported that the DHS has been forced to release a list of keywords and phrases it uses to monitor various social networking sites. The list provides a glimpse into what DHS describes as “signs of terrorist or other threats against the U.S.”
The list was posted by the Electronic Privacy Information Center who filed a request under the Freedom of Information Act, before suing to obtain the release of the documents. The documents were part of the department’s 2011 ’Analyst’s Desktop Binder‘ used by workers at their National Operations Center which instructs workers to identify ‘media reports that reflect adversely on DHS and response activities’.”
” (Update 1: Reading through the Desktop Binder, I discovered the DHS Twitter account is @dhsnocmmc1 and DHS appears to be using tweetdeck to monitor the various keywords. See Page 38 – Also interesting to note they seem to be using a Mac Mini as a server, and no password vaults. All Passwords appear to be shared in a plain text word document.)
(Update 2: On page 37, DHS instructs analysts to accept invalid SSL certificates forever without verification. Although invalid SSL warnings often appear in benign situations, they can also signal a man-in-the-middle attack.Not a good practice for the security conscience. Thanks to @obra on twitter for the tip.)”
” The U.S. Department of Justice and the FBI believe they don’t need a search warrant to review Americans’ e-mails, Facebook chats, Twitter direct messages, and other private files, internal documents reveal.
Government documents obtained by the American Civil Liberties Union and provided to CNET show a split over electronic privacy rights within the Obama administration, with Justice Department prosecutors and investigators privately insisting they’re not legally required to obtain search warrants for e-mail. The IRS, on the other hand, publicly said last month that it would abandon a controversial policy that claimed it could get warrantless access to e-mail correspondence.”
” CBS anchor Scott Pelley said at a speech at Quinnipiac University that journalists “are getting big stories wrong, over and over again.”
“Our house is on fire,” said Pelley. The video of Pelley’s speech is courtesy of nowthisnews.com.
“These have been a bad few months for journalism,” he added. “We’re getting the big stories wrong, over and over again.” “