NJ: Rutgers prof (gay, self loathing, ex-Mormon fruitcake with Beyonce obsession) is taken for psych eval after ‘threatening’ white people

How on earth do these damaged, dysfunctional disaster-areas wind up ‘teaching’ young people?

In today’s “Tales from the Gender Studies Department“, we have Kevin Allred:  ex Mormon, gay, anti-white, anti-Christian, anti-2nd amendment and child of an abusive father (read his story in his words here and here.)

He has a somewhat standard gay man’s fetish for  glamorous black females. Whatever.  I pity this guy – for all his self righteous venom and sophistry – as he’s just a mess.  I am truly sorry his father was an asshole and treated him so (obviously) devastatingly.

Best, though, if the aberrance that is his broken mind were not held out by Rutgers University of someone worthy of emulation, authority or relevance.

A Rutgers University professor who’s not too crazy about the president-elect says his post-Election Day comments landed him in a psych ward.The NYPD took Kevin Allred into custody Tuesday night at his Brooklyn home, with cops saying they were answering a Rutgers police department call for help.Allred was loaded into an ambulance and taken to Bellevue Hospital for evaluation…… Source: Rutgers professor taken for psych eval after ‘threatening’ tweets

 

NSA Spreads Malware By Posing As Social Media Such As Facebook

YouViewed/Editorial

NSA Reportedly Posed As Facebook To Infect Computers With Malware

” The National Security Agency has reportedly used automated systems to infect user computers with malware since 2010, according to a Wednesday report. And at times the agency pretended to be Facebook to install its malware.

  The NSA has been using a program code-named Turbine to contaminate computers and networks with malware “implants” capable of spying on users, according to news website The Intercept, which cited documents provided by whistle-blower Edward Snowden.

  Between 85,000 and 100,000 of these implants have been deployed worldwide thus far, the report said.

To infect computers with malware, the NSA has relied on various tactics, including posing as Facebook.

Other ways the NSA infects malware onto computers include sending out spam emails.

  The NSA is capable of installing different kinds of malware, each capable of performing different tasks. According to the…

View original post 80 more words

Big Sis Monitoring Your Tweets /Facebook Posts When You Use Words on DHS Watchlist | Reaganite Republican

According to a DHS document, the snoopy agency is maintaining an arm-long list of what they call ‘Items Of Interest’, categorized by subject, i.e. ‘Domestic Security’, ‘Southwest Border Violence’, etc. These are the specific words/terms contractors have been hired to monitor online, abbreviated to ‘I.O.I’ by the DHS.  And while you might expect them to keep an eye on those posting more than a passing mention of terms like ‘Al Qaida’, ‘weapons cache’, ‘jihad’, ‘massacre’, according to the DHS order far more mundane/widely-utilized words can also bring the watchful eye of the agency if posted on Twitter or Facebook, i.e.-… via Reaganite Republican

How To Erase Your Digital Footprint | Maximum PC

Now that you’ve taken the red pill and realized the realities of living a life connected to the Internet, how can you better protect yourself in the future? There are several basic tools available for the privacy-conscious; most of them free…

If you would like to keep Facebook in check and minimize its invasion into your online life, check out Disconnect, a browser extension available for Firefox, Chrome, and Safari. The purpose of this extension is to “help people understand and control the data they share online.” Disconnect will disable third-party tracking, depersonalize searches, identify and block information requests from websites, and allows the user to easily unblock these requests if so chosen..

The service Google Alerts will actually send regular email updates every time your name is queried. Both of these simple steps can help you monitor the information other people are looking at pertaining to you and where they are accessing it from. Now that you have this handy guide to walk you through how to purge that data, channel your inner-Jason Bourne every so often and control your data like the secret agent you always wanted to be! Be sure to check out a related article by online privacy expert Dan Tynan for more information.

To help further minimize your digital footprint, privacy advocate Moxie Marlinspike created a service called GoogleSharing, which allows users to search through Google without being tracked. The technology scrambles search requests that are sent to Google, making it impossible to tell where or from whom the request is coming from…

Even with these precautions there is no absolute way to make your information available only to you. Once something is done online, expect it to be there forever. Don’t bother thinking you can hide anything online because there is nowhere to hide.

The best strategy for reducing your footprint is to remember to step back every once in awhile, and not rely on the Internet to service every facet of your life. Every picture doesn’t need to be geo-tagged; every new social media site does not have to be joined permanently. Every detail of your personal life does not have to be put on display for others to see. Just like you take steps to protect your physical information, remember to take steps to monitor and protect your digital information as well.via Maximum PC | How To Erase Your Digital Footprint – Page 2.

[Also, click here for ‘Privacy Tools’]

TMI Nation | Reason Magazine

via TMI Nation – Reason Magazine.

…But what may be most unnerving about the Web is not how it empowers malicious smear merchants but how it standardizes chronic self-disclosure through mechanisms as innocuous as Facebook “likes,” and how it allows content aggregators to amass the tiny truths we disclose about ourselves in ways we can neither predict nor control. Imagine car insurers monitoring your tweetstream to see how often you use Foursquare to check-in at bars at least 30 miles from your apartment. Imagine dating sites assigning you a narcissism quotient based on how often you review hair salons and Pilates instructors on Yelp.com.

As indiscreetly as we live now, it is possible that in 2013 we may look back to 2011 as a golden era of privacy. Flickr, Facebook, and other social media sites today are filled with millions of photos that could prove embarrassing in certain contexts, but for the most part the people in those photos remain unidentified. That’s changing fast. “When combined with facial recognition and the power of Google to find obscure information, the possibility of damage to reputation is obvious,” Fertik writes. “Anyone photographed (accidentally or intentionally) near an adult bookstore could be identified by name and made subject to ridicule by his peers…