The Internet is rapidly being transformed into a Big Brother control grid where privacy rights are being systematically strangled to death. The control freaks that run things have become absolutely obsessed with watching, tracking, monitoring and recording virtually everything that you do on the Internet…. The following are 10 reasons why nothing you do on the Internet will ever be private again…. go here: 10 Reasons Why Nothing You Do On The Internet Will EVER Be Private Again
… Really, who needs terrorists when you have a government like ours? If it is the widespread destruction of the principles that founded our society that you fear, then the last enemy you need worry about is the Muslim boogie man. The greatest threat to our way of life is an institution that has always operated right under our noses and acted with impunity sheltered by the very borders it is tasked to defend. It is the only group in existence that has the resources, the military backing, and the proven intent to undermine liberty in America. It is the supreme threat to individual freedom in the world today. And, the worst irony of all is that it commits every one of its crimes in our name. Continue reading
Quietly, and with little fanfare, President Obama signed a “National Defense Resources Preparedness” Executive Order on Friday. As the name suggests, the order intends to shore up the country’s national defense resources in advance of a national emergency.
To be fair, this is not the first time that such an order has been written. Presidents Bush (II), Clinton, Reagan, and even Eisenhower provided directives in the same spirit as President Obama’s order– providing some level of government commandeering in times of national emergency.
In the past, these orders have related to things like production capacity for defense contractors, or giving FEMA authority to resolve disputes between other departments in federally designated emergency areas.
President Obama’s order, however, takes things much, much further. Continue reading
Well this is truly frightening ….via ol remus and the woodpile report.
From August of 2011 to November of 2011, the FBI secretly redirected the web traffic of more than 10% of SurvivalBlog’s US visitors through CJIS. There, the Feebees surreptitiously collected the IP addresses of my site visitors. In all, 4,906 of 35,494 selected connections ended up going to or through the FBI servers. Furthermore, we discovered that the FBI attached a long-lived cookie that allowed them to track the sites that readers subsequently visited. I suspect that the FBI has done the same to hundreds of other web sites, says Jim Rawles in this article at Survival Blog.
Attorney General Eric Holder gave a much publicized speech at Northwestern law school on Monday, in which he attempted to explain the Obama administration’s constitutional authority for killing U.S. citizens abroad without judicial oversight. Holder in part claimed that there is a difference between “due process” and “judicial process”, the latter of which—according to him—is not guaranteed under the Constitution. The speech was predictably and widely criticized in legal circles on Fifth Amendment grounds (see here, here, here, here, and here), but an overlooked section of his speech should also give constitutional experts pause: Holder’s stance on the FISA Amendments Act (FAA) and warrantless wiretapping. Continue reading
The important decision is In re Grand Jury Subpoena Duces Tecum Dated March 25, 2011. From the opinion by Judge Tjoflat:
We hold that the act of Doe’s decryption and production of the contents of the hard drives would sufficiently implicate the Fifth Amendment privilege. We reach this holding by concluding that (1) Doe’s decryption and production of the contents of the drives would be testimonial, not merely a physical act; and (2) the explicit and implicit factual communications associated with the decryption and production are not foregone conclusions.
First, the decryption and production of the hard drives would require the use of the contents of Doe’s mind and could not be fairly characterized as a physical act that would be nontestimonial in nature. We conclude that the decryption and production would be tantamount to testimony by Doe of his knowledge of the existence and location of potentially incriminating files; of his possession, control, and access to the encrypted portions of the drives; and of his capability to decrypt the files. Continue reading
U.S. law enforcement agencies are exposing people to radiation in more settings and in increasing doses to screen for explosives, weapons and drugs. In addition to the controversial airport body scanners, which are now deployed for routine screening, various X-ray devices have proliferated at the border, in prisons and on the streets of New York.
Not only have the machines become more widespread, but some of them expose people to higher doses of radiation. And agencies have pushed the boundaries of acceptable use by X-raying people covertly, according to government documents and interviews… via ProPublica.
via Lew Rockwell, this is a Must Read …
2011: A Civil Liberties Year in Review by John W. Whitehead | LewRockwell.com
Depressing synopsized word cloud follows (don’t bother reading it. GE.) … National Security Agency, NSA, eavesdropping, private email, phone calls, security/industrial complex, marriage of government, military and corporate interests, keeping Americans under constant surveillance, GPS tracking, secret spying on Americans, technology, our ability to control it, our Frankenstein, given it free rein in our lives, Continue reading
There’s plenty of reason to be concerned Big Brother is watching. We’re paranoid not because we have grandiose notions of our self-importance, but because the facts speak for themselves.
Here’s our short list of nine reasons that Wired readers ought to wear tinfoil hats, or at least, fight for their rights and consider ways to protect themselves with encryption and defensive digital technologies.
“… It is true that technology is advancing to track our every move, often without our knowledge. But technology is also advancing to protect privacy in ways that were not available before. There are already many tools that we can use to protect our private information and most of them are free and easy. Tor, Truecrypt, and GnuPG are three great examples…”
via Is Privacy Dead?.
“… The Constitution protects our right to be free from unreasonable searches and seizures by the government. At the same time, searches by the government exist against a very different backdrop from when the Fourth Amendment was written. How do we guard our “space” when it is neutralized as mere geography-beyond-the-house rather than the mobile positioning of the body politic? We live in an era when new technologies make the most personal information easily accessible, whether the government collects it or not.
Our private lives are available “privately” everywhere, even if it’s deemed “data mining” by businesses. The market for information is as thorough as a laser; it is as inescapable as the air we breathe: our lives are online. Our medical records are stored in “clouds.” We date through websites. Our genetic code is decipherable from any bit of discarded bubble gum. “Private” security cameras aim their ceaselessly gathering gaze on every public street. Our cellphones blip our location to satellites in space. People send compromising pictures of themselves in “sext” messages that can never be retracted. If our neighbor wishes to surveil us or to stalk us, we are all too vulnerable…”
“… Upon arriving in the morning, according to the Associated Press, each student at the CCC-George Miller preschool will don a jersey with a stitched in RFID chip. As the kids go about the business of learning, sensors in the school will record their movements, collecting attendance for both classes and meals. Officials from the school have claimed they’re only recording information they’re required to provide while receiving federal funds for their Headstart program.
However, the story has caught the attention of both the ACLU and the Electronic Frontier Foundation, who have expressed alarm at the potential infringement of privacy rights. Together, they have submitted a letter of concern to school officials, including a request that they clarify what security precautions were put in place with the program.
This is not the first time a school has tried to track its students with RFID. In 2005, according to the AP, another grade school in California handed out RFID badges and was met with an equal amount of outrage from the ACLU and privacy rights watch dogs…”
Now that you’ve taken the red pill and realized the realities of living a life connected to the Internet, how can you better protect yourself in the future? There are several basic tools available for the privacy-conscious; most of them free…
If you would like to keep Facebook in check and minimize its invasion into your online life, check out Disconnect, a browser extension available for Firefox, Chrome, and Safari. The purpose of this extension is to “help people understand and control the data they share online.” Disconnect will disable third-party tracking, depersonalize searches, identify and block information requests from websites, and allows the user to easily unblock these requests if so chosen..
The service Google Alerts will actually send regular email updates every time your name is queried. Both of these simple steps can help you monitor the information other people are looking at pertaining to you and where they are accessing it from. Now that you have this handy guide to walk you through how to purge that data, channel your inner-Jason Bourne every so often and control your data like the secret agent you always wanted to be! Be sure to check out a related article by online privacy expert Dan Tynan for more information.
To help further minimize your digital footprint, privacy advocate Moxie Marlinspike created a service called GoogleSharing, which allows users to search through Google without being tracked. The technology scrambles search requests that are sent to Google, making it impossible to tell where or from whom the request is coming from…
Even with these precautions there is no absolute way to make your information available only to you. Once something is done online, expect it to be there forever. Don’t bother thinking you can hide anything online because there is nowhere to hide.
The best strategy for reducing your footprint is to remember to step back every once in awhile, and not rely on the Internet to service every facet of your life. Every picture doesn’t need to be geo-tagged; every new social media site does not have to be joined permanently. Every detail of your personal life does not have to be put on display for others to see. Just like you take steps to protect your physical information, remember to take steps to monitor and protect your digital information as well.via Maximum PC | How To Erase Your Digital Footprint – Page 2.
[Also, click here for ‘Privacy Tools’]
The Patriot Act should never have been passed. Ten years later, it should be repealed for at least four reasons…
First, the Patriot Act attacks the First Amendment…
* Americans can be investigated for what they read and write, and what websites they’ve visited
* The Feds can “gag” my bank, my librarian, and my Internet Service Provider, preventing them from telling me if I’m under investigation
Second, it undermines the Fourth Amendment…
* The Feds do not even have to show “reasonable suspicion,” let alone “probable cause,” to gain access to my records
* Because I can be investigated without my knowledge, I have no means to challenge illegitimate searches
Third, there is little reason to believe terror acts have been prevented by the Patriot Act…
* If the law was used to foil terrorist plots, the Administration would boast about such instances
* Instead, foiled terrorist plots are frequently sting operations using undercover operatives and informants
Fourth, there is reason to doubt whether protecting the people from terrorism was ever the Patriot Act’s real purpose…
* Expanded wiretap and search authority are used in ordinary domestic criminal investigations, not just in terror cases
* The Executive branch has a “secret” interpretation of the Patriot Act that is inconsistent with a plain reading of it
* Meanwhile, the FBI continues to collect data collection through National Security Letters — some 40-50 thousand are issued per year (http://tinyurl.com/3varjc9)
How is it permissible for the Executive to have “secret” interpretations of the law? What is the Executive doing with the information it secretly collects about us, without our knowledge? Shouldn’t citizens of a Republic be ASHAMED of this behavior by their “government?”
The Patriot Act attacks our freedom, our values, and our way of life — the very things its supporters claim it protects. It promotes secrecy and prevents accountability in our federal government. It has fostered a Big Brother culture throughout Washington DC that led to similarly egregious legislation like REAL ID and the FISA Amendments Act.
Put an end to this dangerous trend. Stand up and speak out on behalf of the Bill of Rights and against the Surveillance State. Introduce legislation to repeal the Patriot Act.
…But what may be most unnerving about the Web is not how it empowers malicious smear merchants but how it standardizes chronic self-disclosure through mechanisms as innocuous as Facebook “likes,” and how it allows content aggregators to amass the tiny truths we disclose about ourselves in ways we can neither predict nor control. Imagine car insurers monitoring your tweetstream to see how often you use Foursquare to check-in at bars at least 30 miles from your apartment. Imagine dating sites assigning you a narcissism quotient based on how often you review hair salons and Pilates instructors on Yelp.com.
As indiscreetly as we live now, it is possible that in 2013 we may look back to 2011 as a golden era of privacy. Flickr, Facebook, and other social media sites today are filled with millions of photos that could prove embarrassing in certain contexts, but for the most part the people in those photos remain unidentified. That’s changing fast. “When combined with facial recognition and the power of Google to find obscure information, the possibility of damage to reputation is obvious,” Fertik writes. “Anyone photographed (accidentally or intentionally) near an adult bookstore could be identified by name and made subject to ridicule by his peers…