Freedom & Privacy Worldwide is Eroding
"Even the Catholic Church of the Middle Ages was tolerant by modern standards. Part of the reason for this was that in the past no government had the power to keep its citizens under constant surveillance. The invention of print, however, made it easier to manipulate public opinion, and the film and the radio carried the process further. With the development of television, and the technical advance which made it possible to receive and transmit simultaneously on the same instrument, private life came to an end." --1984, George Orwell
Scroll down to find our free privacy tool downloads!
Resources, News Tips & More...
“Government creep” is something we can all feel, and if we’re being honest, it’s only getting worse with time… Your freedom and privacy are at risk.
Back in 1999 when we first started our efforts at long term food storage and prepping we owned a 38-acre homestead and a 2-bedroom guest house, barns, etc. It was a lot of work but fun and we sure enjoyed the produce we grew. When we started this project we didn’t even think about Y2K until it became a newsworthy item. We maintained a shooting range (with professional training available) and held a monthly potluck dinner for all our supporters and friends.
Eventually, the world became consumed with Y2K and word spread about our “compound” and Fox news did a report on our activities…soon we were swamped with inquiries and both my wife and I were a little taken aback by all of the publicity. After the newscast, we had strangers show up at our door asking our advice. At that point we learned it was better to keep a low profile.
I even wrote a manual on the subject which promptly sold out…now, many of the techniques I advised won’t work as the government has become even more insidious…
Since June 6, the number of search queries on the DuckDuckGo search engine has doubled...
Cryptocat, an Internet chat program has also seen its business double since then. And Tor, an Internet software program, has seen its downloads increase by more than 30% in less than four weeks.
Whistle-blower Edward Snowden revealed the NSA has been abusing their stated mission. As usually happens in these situations, politicians and officials are lying to cover their tracks. They don't like the fact that they got caught with their pants down. (It is the Information Age. Duh.)
They say they are doing all of this in the interest of "national security." But I have to ask how much national security do we need before we reach a point of diminishing returns?
How many times are we going to keep going to the well of referencing the tragic events of Sept. 11 to justify deepening security while we continue sacrificing more of our privacy?
Why do the feds feel the need to violate everything we hold dear in this country?
Keep The NSA Out Of Your Internet – Avoid Unwarranted NSA Surveillance
The NSA can read your emails, listen to your phone calls, see all of your purchases, and look at your library records without a warrant. They so extensively monitor so much electronic activity that there is hardly any aspect of your life that is not databased, archived, and searchable. The continuing release of information about what the NSA is doing and how they do it is making everyday people aware of how their peaceful and lawful activity is being monitored by default.
New Assaults on American Law
By Andrew Napolitano
"For 100 years, that privilege -- the right of lawyers and their clients to speak freely and without the knowledge of the government or their adversaries -- has been respected in the U.S., until now. Now we have a lawyer who, as president, uses the NSA to give him advance warning of what his office visitors are about to ask him. And we have lawyers for the federal government who work for the president and can know of their adversaries' most intimate client communications."
Related: The Lysander Spooner Reader by Lysander Spooner
The un-Patriot Act has allowed the government to eliminate YOUR privacy in ALL financial matters including pre-paid debit cards and payment services such as PayPal. Now your Socialist Slave Number is required to transact all financial business...the government has become the proverbial Mark of the Beast!
3 Situations Where Prepaid Cards Make Sense
Despite their drawbacks, these cards can be useful in specific situations.
Sometimes you need a credit card to do everyday things like rent a car or book a hotel room. If you don't carry a credit card or if your credit score is low and you can't get a credit card, then a prepaid debit card can make these transactions possible.
If you have a teen in your life, a prepaid card can work like a credit card on training wheels. It helps your teen learn to use credit without getting into trouble with running up high balances and paying interest rates.
Some people have a tough time sticking to a budget. A prepaid card can come in handy in this situation, too. At the beginning of each month, or after each payday, you could load your spending money onto the card. When it's gone, you're out of disposable income until the next payday. It'll help you stick to your spending limits.
If you plan to get a prepaid, reloadable debit card, make sure you read up on the fine print so you know what to expect in terms of fees and protections (or lack thereof).
For online purchases that you want to make privately – such as setting up an anonymous, prepaid cell phone service – a gift card from a major bank makes much more sense.
Read more: http://www.independentlivingnews.com/privacy/financial-privacy/20951-when-is-it-ok-to-use-a-prepaid-debit-card-a.stml?utm_source=140228SURVPD&keycode=140228SURVPD#.UxCF_FEo7cs#ixzz2ucXukbFV
Thwart the Growing Homeland Surveillance Threat That’s Spying on You...
We are all being lumped in with terrorists. And one size of surveillance fits all, so far as the Washington establishment is concerned. Maybe the country will come to it senses. Maybe it won’t. But I’ll tell you this- I’m not holding my breath and neither should you.
In the meantime, honest Americans who mind their own business must find ways to cope with increasingly intrusive surveillance from video cameras, email eavesdropping, cell phone tracking, RFID chips, microphones concealed in utility poles, and even airborne drones.
These surveillance tactics aren’t science fiction, and they’re not just the talk of conspiracy theorists, either. These threats to your privacy are real, and they’re growing. The list of intrusive surveillance measures employed by the government and other law enforcement agencies is becoming rather lengthy. But some very bright people are starting to develop and market privacy protection countermeasures. Some of which are pretty exotic.
Today, I have a few new options you can add to the growing list of “keep your nose out of my business” tactics.
The Government’s Preferred Hidden Tracking Device
A pocket like that may have many other practical uses today than just protecting you from warrantless cell phone tracking.
Radio Frequency ID (RFID) chips are used primarily in commerce to track inventory. Applied in this respect, this technology is actually very efficient. According to the RFID Journal (an industry trade magazine) “Radio frequency identification is the next wave in the evolution of computing. Essentially, it’s a technology that connects objects to the Internet, so they can be tracked.”
The problem: RFID technology is popping up on the items we carry on our own physical bodies. These items are all being impregnated with privacy-sabotaging Radio Frequency ID (RFID) tracking chips.
- Driver’s licenses
- Credit cards
- Sadly, even your child’s school ID
RFID chips send out radio signals that contain all the pertinent information on the credit card, driver's license, or passport, etc. The “readers” for these chips are essentially antennas that are tuned in to read their radio signals.
Unfortunately, this also makes theft fast and easy. Demonstrations by security experts have shown how a pickpocket can hide a touch less credit-card reader (bought cheaply online and connected to a small net book computer or smart phone) inside a handheld organizer, and easily “steal” private information - right through a victim’s purse or pants pocket!
RFID chips can be read between 30 to 300 feet away (even from inside a moving car in some cases), depending on the kind of chip.
- In some instances, information on an RFID chip can be changed by the reader itself. In one study, researchers rigged RFID readers to write over and change information stored on an RFID chip. This experiment proved that someone with bad intentions could conceivably corrupt the information on your driver’s license or passport - and that could cause you untold grief with the authorities if you’re trying to cross the border and your passport has been compromised, for example.
- Regarding RFID-equipped passports, each country’s passport sends out its own unique radio signal. This could pose an additional security threat while you’re traveling if you happen to carry a non-politically correct passport – even if it’s safely stored in your luggage or jacket pocket.
What Can You Do About It?
One individual demonstrated how he destroyed the RFID chip in his new credit card by hammering a small nail through it. He reasoned the magnetic strip still worked, and he didn’t need or want his credit card broadcasting his information. (You could go this route, but it’s probably not advisable with your government-issued RFID documents, because it could come with a penalty.)
Your other options are to wrap the document in a metal, like aluminum foil, or buy a protective sleeve or stylish wallet designed to block the radio signals from the RFID chip. In fact, the State Department actually recommends doing this with your passport.
In theory, you may be able to achieve the same result with a simple object that’s already in the glove boxes of millions of motorists who use EZ-Pass or other transponder-based automatic highway toll collection devices. Users typically receive a metallic no-transmit pouch to store their transponder in should they wish to shield their device at toll booths (for example, if there’s no money in their pre-paid toll account). I haven’t tested it, but in theory this same pouch should be able to effectively shield your phone, too.
Anti-Surveillance Hairstyles? Fashion That Helps Shield Your Whereabouts...
Researchers with CVDazzle are using make-up and extreme hairstyles to temporarily alter facial features. They conducted an experiment with a series of tests to see how whether they could fool facial recognition cameras by simply using hair and make-up.
It turns out that if you alter the dimensions of the typical face with asymmetrical, bold, or highly contrasting make-up and hair color, facial recognition software glances over you as if you were invisible.
The technique is based on disguising obvious facial features like the eyes, brow, and bridge of the nose. However, if you walk around in public looking like some of CVDazzle’s test subjects, you’ll look very out of place to humans as well as machines. So, the developer of this series of experiments took it to the next level.
CVDazzle experiment developer Adam Harvey and fashion designer Johanna Bloomfield have developed an anti-surveillance clothing line.
In a Slate Magazine interview Harvey said, “Military technology is coming home from the war… These pieces are designed to live with it, to cope with it – to live in a world where surveillance is happening all the time.”
Using metallic fabrics, they developed a number of fashionable stealth ensembles. One piece looks like a hooded sweatshirt (it also comes as a scarf) that alters your body heat profile to frustrate thermal imaging used by drones to follow people on the ground.
The Stealth Pocket
Another piece of anti-surveillance attire works by using a special pocket for your cell phone or other electrics. The pocket is made from a unique material that electronic signals can’t pass through, making it difficult if not impossible for anyone to track you through your phone while it’s stored there.
The downside is you may not be able to receive any calls while your phone is stored inside the pocket, but you could still leave it on for functions such as the alarm clock.
This may be a sacrifice you’re willing to make under certain circumstances. For example, if you are travelling from Boston to New York but want to take an untraceable detour through Albany, you may wish to use the pocket to go “off” of the surveillance grid.
There’s one more interesting piece they revealed at a recent show. They have created a shirt called the ‘XX-Shirt.’ It uses special fabric that can protect your heart from X-ray radiation.
No word if this is effective against Tasers. But maybe when they’re ready to take this to the mass market, they can design a body suit for men, women, and children to wear when they plan to board a plane for a business trip or a family vacation and are forced to pass through TSA millimeter wave or radiation shower body scanners.
For the moment this is a nascent clothing line and mostly conceptual, but considering the direction things are moving, outfits like these may be as common to your closet as a paper shredder is to your home office.
Are Tech Companies in Cahoots with the Government?
Some of the largest, most popular tech firms like Google, Yahoo, Microsoft, and numerous Internet companies routinely provide details of their user’s personal information to the government – including the NSA and IRS. This allows government agents to quickly create a complete profile on you, your family, and your friends. And they don’t even need a warrant.
You may well prefer to take advantage of modern technology – and there’s nothing wrong with that – but remember that increasingly, modern technology offers other’s a peek into your personal life.
6 Things You Can Do Today To Bolster Your Online Privacy And Avoid Attention from Nosy Wi-Fi Snoops And Government Agents
Absolute Internet privacy is a thing of the past – if it ever existed at all. However, these basic precautions can help you and your loved ones achieve a lower profile than 99% of everyone else.
- Decentralize Your Internet Services
Don’t log into Google unless you have to. Google records your online activity whenever you’re logged into your account, even from services that seem separate, like YouTube, maps, and anything you search for. Try to break up these services. Consider using another webmail provider, like Yahoo, Zoho.com, Hushmail.com, or one of the many dozens of others available online.
- Install the AdBlock Plus Extension
Adblock Plus doesn’t just block pop-up advertising on the Internet, it also protects you from sites infested with malware, and from some third-party tracking ‘cookies.’ Most websites allow AdBlock Plus, but you may encounter a site that won’t allow you to visit without also viewing their ads. Don’t worry! Just right-click the red stop sign in the browser’s toolbar to disable the program temporarily. You can download AdBlock Plus by visiting www.adblockplus.org.
- Use Extensions to Stop Data Collectors and Advertisement Tracking
Third-party tracking ‘cookies’ can be located and blocked with an extension called Disconnect. A similar extension called Ghostery works just as well, but it hasn’t been updated in awhile. Disconnect also works to shield you from social networks like Twitter, Facebook, and Google, which all use your browsing activity even while you’re away from their site to collect data about you. Get Disconnect or Ghostery for your web browser by visiting either www.disconnect.me, or www.ghostery.com/download.
- Browse the Web Securely with SSL
Any computer between you and the website you’re visiting can see your activity and all of the information that is transmitted. Simply using https:// (also known as SSL) instead of the standard http:// will encrypt the information transmitted on your machine and ensure that no one is spying on your connection. Many online retailers use SSL for transactions, but using it for casual browsing certainly can’t hurt, and it might even prevent your identity from being stolen. There’s even an extension to automatically browse securely via SSL. You can download that extension by visiting www.eff.org/https-everywhere.
- Make your IP Address Anonymous with the Tor Project
Using Tor to browse the web anonymously can help prevent special types of IP analytics and statistics programs from analyzing your activity. This can work in conjunction with the Disconnect extension because each time you load a web page, your IP, which is your Internet Address, switches to the IP of a different Tor server. Imagine the privacy advantages of your identity changing each time you visit a store. You can download Tor here: www.torproject.org/download/download-easy.html.en.
Now, It’s Up to You.
Nosy advertising agencies motivated by financial incentives, ruthless hackers with too much time on their hands, and our own government. They all view your personal data as a veritable goldmine, and they’re collecting that data, and overlaying advanced algorithms to predict everything from your lifetime wages, how you respond to private medical concerns, and even for whom you are likely to vote in the next presidential election.
More Secure Alternatives
Unlike Google, Bing and Yahoo!, DuckDuckGo is a search engine that does not store personally identifiable information about peoples’ search queries on its servers. You can see exactly how your Google search information is saved and sold, thanks to this simple diagram found on DuckDuckGo’s website: http://donttrack.us/.
Another private third-party search engine is StartPage. When you search with StartPage, they remove all the identifying information from your online query and then submit it anonymously to Google themselves. They get the results and give them to you, keeping your information completely private. Your IP address is never stored… your visit is not logged and they don’t place any tracking cookies on your browser.
You can keep your intranet chats private by using Cryptocat. This site encrypts all of its users’ messages so that notes between you and family, friends, colleagues or employees stay off the radar.
What all of these companies, which have all provided customer data to the government, like Facebook, Google and Apple (and many others), realize is that many U.S. citizens still place a premium on their privacy… and you should too, before it’s too late.
It’s no secret that our government has made personal privacy a nightmare…
Why they are so damned interested in everything we do vs. terrorists is anyone’s guess but most experts tell us it stems from their NEED to CONTROL.
Shred computer files easily…Go to Download.com and find wipe programs and other security tools to ensure that old passwords, old website visits, old emails and other information on your hard drive can’t be retrieved later (for example, when you donate a computer to a charity).
Encrypt your cellphone: Stop being tracked by GPS or listened to by hackers with a cell phone frequency scanner. Two good options include CellCrypt.com and PrivateWave.com
Ramp up security by using a free open-source program such as TrueCrypt.org
The safest way to use the ‘Cloud’ is to encrypt your files first or use a service such as Wuala.com
Stop giving up your privacy on facebook, Google, Twitter, etc. by using a new technology called Privly – Learn more at: www.priv.ly
Get the current scoop on how your personal data is collected-it's just not the government that is spying on you (or profiting for your personal information).
Senate Report on Vast Amount of Personal Info Collected by Data Brokers pdf
At first we were in an arms race with sophisticated criminals and terrorists, now we’re in a race with the biggest risk to our privacy and freedom – the US government!
PRISM-ANOTHER WAY GOVERNMENT VIOLATES OUR FREEDOM
PRISM is a clandestinemasselectronic surveillancedata mining program known to have been operated by the United States National Security Agency (NSA) since 2007. PRISM is a government code name for a data-collection effort known officially by the SIGADUS-984XN. The Prism program collects stored Internet communications based on demands made to Internet companies such as Google Inc. and Apple Inc. under Section 702 of the FISA Amendments Act of 2008 to turn over any data that match court-approved search terms. The NSA can use these Prism requests to target communications that were encrypted when they traveled across the Internet backbone, to focus on stored data that telecommunication filtering systems discarded earlier and to get data that is easier to handle, among other things
What it can’t violate legally it does so through other countries such as the UK taps into the fiber optic cables of telecoms so it can collect emails, record phone calls, etc.
The NSA has already broken much of online encryption methods used by internet companies. Called Project Bullrun started about 10 years ago (before the un-Patriot Act) and by 2015 it plans to decrypt codes by all the major internet firms and 300 virtual private networks.
Secret courts, illegal snooping, spying on allies, kicking out the Bill of Rights – oh yeah, everything is just fine in America…once known as the Land of the Free.
It's common to find stories on the news of hidden cameras inappropriately taking videos of us in public bathrooms, hotels, and changing rooms…or the NSA intercepting your private emails and conversations. We do live in sick times.
Hackers and cyber crooks crave your personal and financial information and will stop at nothing to get it. They plant audio bugs, hack your cell phone, or otherwise gain access to your business and personal conversations. It's all just as profitable and desirable to them as hacking into your e-mail, because once they have possession of your personal data, they can freely tap your assets while saddling you with their debts.
Counter-surveillance manufacturer Ensure Privacy says,
"Many people believe surveillance devices are myths; however surveillance devices are easily purchased on the open market. Bugging devices and telephone taps are an effective means of stalking [you]. Body-Wires and room transmitters are unethical yet common practice. Professional burglars are using vehicle tracking systems to know when and where you are. Understanding that surveillance devices are real and they can be obtained easily for not a lot of money is why counter-surveillance equipment is necessary."
With today's technology, surveillance equipment can be made very small. On the leading edge, military researchers are developing "nano" drones the size of hummingbirds and insects.
The Free Market Provides
Counter-Surveillance Methods to
Reclaim Your Privacy, Anonymity,
and Right to be Left Alone...
Most physical surveillance equipment today transmits wirelessly using radio frequency (RF) signals. You can easily buy counter-surveillance detection equipment that zeroes in on RF signals and exposes the hidden devices.
Nine Tools To Help You Lose a Surveillance Tail
Video Bug Detector
Compact surveillance technology makes it easy to hide a video camera in almost anything: a public bathroom ceiling fan, decoy Coke can, teddy bears, key chain, you name it. If it fits, it records.
Numerous wireless video bug detectors exist on the market. On the low end, a device alerts you that a hidden video camera is near you. On the high-end, equipment pinpoints the exact location of the offending video cameras.
Laser-Based Video Camera Finder
These are typically small handheld devices that fit in a pocket or purse. They send out a laser while you look through the special viewfinder. If the laser detects a hidden video camera lens (even less than 1 mm in size), the lens "glows" through the viewfinder, like cat eyes glowing in car headlights.
These detectors are especially useful for locating cameras at a further distance or cameras that may not be transmitting wirelessly (not sending an RF signal), but instead are recording to an internal DVR.
GPS Monitor Detector
Some GPS monitors send a constant signal and are able to track you on a real-time basis. It has become an ideal weapon of choice for home-invasion specialists. They merely tag the victims' car and learn their driving habits, as well as arrival and departure times from home and work. Others send periodic signals, perhaps every five or ten minutes, and track your relative position within a window of time and document a record of your whereabouts.
Although some detectors are sensitive enough to find a GPS bug even when it's turned off, it's best to allow some time for the GPS detector to work by waiting for a potential signal to leave a hidden GPS tracker.
**Note: GPS Jammers or anti-GPS unit disrupt the GPS signal returning to the satellite. They are illegal in the U.S., even though you can find and probably buy one online from overseas.
Microphone, Wire, Audio Bug Detectors
Microphones can also be shrunk down to size and hidden in almost any place. Someone wanting to record your conversation could conceal a microphone inside a pen or necklace pendant, for instance.
The bug could be transmitting wirelessly in real time, or recording on an internal memory to be picked up and analyzed later.
Audio bug surveillance detectors are an effective countermeasure, picking up RF signals coming out of wireless microphones. However, since RF signals are sent by many types of equipment such as cell phones, cordless phones, microwaves, and Bluetooth appliances, it's common to get false positives.
In any case, Technical Surveillance Counter Measures (TSCM) professionals say RF bugs need to have a direct line of sight to work properly. So sweeping a room or office with a audio bug surveillance detector does work.
If detection isn't enough, you may prefer to "ruin" audio recordings by transmitting white noise and ambient sounds that interfere with eavesdroppers and don't allow them to accurately capture what is being said.
This counter-surveillance tool is also helpful against laser eavesdroppers, which beam a laser at a window in the room you are in, and can listen to your conversation by measuring the vibrations of the glass. This may sound novel for now, but we've seen many examples of once-innovative technology becoming totally commonplace. Creating white noise can defeat this surveillance.
According to Brickhouse Security, "Audio jammers generate a random masking sound that desensitizes microphones in the area, rendering them completely unable to record. Audio jammers are effective against any wiretapping device with a microphone as a major component, including tape recorders, RF transmitters, hardwired microphones, and shotgun microphones."
Compromised Cell-Phone Jammers
This surveillance technology is simply a microphone jammer tailor-made for the mic on your cell phone. Once activated, hackers have less control over your phone and can't use it as a recording device.
Phone Wiretap Detector
The counter-surveillance technology available to you today is sophisticated. You can buy equipment that analyzes your analog phone lines and detects wiretaps in the phone, the phone jack, outside on the pole, and even in the transformer box!
Order a Professional Sweep
Finally, if you have greater needs or dealing with sensitive information, numerous contractors exist who will complete a professional sweep of your home or business.
You can find a local company online by typing in "Technical Surveillance Counter Measures," "TSCM," or "counter surveillance" and your city.
A decent array of counter surveillance tools can easily run into the hundreds of dollars. However, you probably spend several thousand dollars each year on various insurance policies. Counter surveillance tools are essentially a form of insurance to protect your assets and your privacy. As such, they may be worthy of your consideration, based on your individual situation.
Along with these physical surveillance suggestions, remember to have your computer's counter surveillance tools in good working order, too: firewalls, virus protection, encryption, strong passwords, VPN or proxy server, etc. Using some or all of these security measures will give you a higher level of privacy, anonymity, peace of mind, and freedom compared to the general population.
Read more: http://www.independentlivingnews.com/privacy/privacy-defenses/20397-9-counter-surveillance-tools-you-can-legally-use.stml#.Ut5vCZgo7cs#ixzz2r2O1Ocqm
Continue reading to find more valuable tips...
Protecting Your Online Privacy Tips
By Darnell Jackson
#1 – Password Privacy
The easiest way to get your data stolen is to use a weak password.
Most people are not aware that most “hackers” crack into systems using a technique called social engineering.
They don’t always crack into your account with sophisticated high powered computers; many times they just simply put two and two together and try a few different password combinations using information they have about you. This is why writing your password on a note under your keyboard is a bad idea.
Password Privacy Do’s:
- Keep it simple. Use a password that you can remember.
There’s no point in having a password that you can’t recall when you need it most. Keep it simple, don’t make it too hard.
- Use a song, part of a quote, a popular movie line, or phrase as a base.
For example, “We don’t need no stinking badges.” Can become WDNNSB if you use the first letter of each word. Add to this your favorite special characters and a few numbers like your birth year and now you have a strong password, ex: WDNNSB@1971!.
Password Privacy Don’ts:
- Use a password management software.
The whole point of a PRIVATE password is that only YOU have it, if you store it in some management system, guess what? Someone else has access to it too. Instead of taking this risk, just type them in clear text in a text document somewhere in a way that only YOU can understand or interpret. Example %myfavmovieline%@yearoftheMAN!
- Use the same password.
Instead figure out an identification system to add to your password on each site that you use. For example BOA_WDNNSB@1971! Or WDNNSB@1971!boa for your Bank of America account and WDNNSB@1971!wells or WF-WDNNSB@1971! For your Wells Fargo account.
Also don’t forget to alternate the text capitalization as this adds further complexity to your password. You can capitalize the first letter only, or the last letter only, or only the first two letters, whatever it is just remember to keep it consistent and easy for you to remember.
Read STRONGEST PASSWORD by Jack William
#2 – Search privacy
Unfortunately Google, Yahoo, and Bing have all admitted to storing and sharing your data with “others”. This can put you in a predicament when you just want to keep your private communications private.
Here are the top 8 search engines that do not store information such as when you search and what you’re searching:
If you still want to use Google but you don’t want them to know what YOU search then you should try this:
- Hide your IP address.
Use software tools like Easy-Hide-Ip and Quick Hide IP Platinum. This is needed because your IP address acts almost like your social security number online. With this info your ISP, people you email, and websites you visit can easily figure out specifically WHO you are.
- Make sure you’re not logged in to Google.
Try using Google Chrome in “incognito mode”.
Open Chrome, click the options/settings button and select New incognito window:
- Go to encrypted.google.com
This will help prevent “others” from seeing what you search for Google such as your ISP, that is whoever is providing you an internet connection. Also, if you’re not logged in to Google then they won’t have an account to link to your searches.
*Remember, this helps dramatically but it’s still not a 100% private.
#3 – Email Privacy
Email privacy is now becoming increasingly more important as over and over again judges have held that emails are in fact PUBLIC information.
Although this may sound shocking it is the reality that we live in today. This effectively means that someone can obtain your email through nefarious means and then claim that is okay for them to have it because it’s public.
If you want your emails to be read only by the person that you send them to here are your options:
How To Compute in Privacy: Part 2
With the NSA scandal, privacy has been a big concern for a lot of computer users. In part 1 of this article, we looked at safe passwords, safe searching and private search. In part 2, I’ll address three other areas of concern.
#4 – Mobile Privacy
We live in a mobile world where people are always on the go and they want to stay connected while working, traveling, or doing errands simultaneously.
However, privacy on your mobile is becoming increasing more popular as celebrities and politicians continue to make the news when their nude “selfies” that end up on the Internet.
Here are the best options to protect and secure your privacy while you compute on your smart phone (Even if you’re not a freak.):
- Wickr – Self-Destructing, Secure, Private, Anonymous Messages & Media
- Private Life Texting – Send secret SMS messages
- Picture Safe – Secure Photo Vault and Private Safe for your Privacy
- NQ Vault
- Private Files and Photos – Hide Contacts, Bookmarks, Photos, Videos and More
- Secrets Folder Pro (Lock your photos, videos, contacts, accounts, notes and browser)
- Rando (Beta – send and receive photos in private)
#5 – Computer Privacy
Rather use a desktop or a laptop you have to keep your “home base” safe and secure? You’re not the only one who could have access to the precious files and folders in your “my documents,” you know.
Here’s how to keep your computer safe from privacy thieves:
#6 – Network Privacy
Many people may not think about WIFI when they think about privacy.
The fact is you could be leaving yourself totally vulnerable when you join a WIFI network at the airport or the library and you don’t even know it.
If you’d rather be safe than sorry here’s some options to keep your data private on public wireless networks:
- McAfee Wi-FiScan
Scans the WIFI network you are connected to and provides security recommendations.
- Norton Hotspot PrivacyApple version
if you have an old wireless router for your home or business it’s time to upgrade to WPA2 security. This newer version will make it very difficult for hackers to access your devices. This protocol comes standard on any popular and highly rated WIFI router.
Funny quick video on how the government ignores privacy...
Cartoonist Mark Fiore’s “Snuggly the Security Bear” says that NSA domestic spying is nothing to worry about “unless you’re a terrorist, a treasonous leaker or a fan of the Bill of Rights.”
“My administration will be the most transparent in history” – Barack Obama
Barack Obama was correct. It will be the most transparent and exposed in history thanks to the internet… and specifically thanks to Julian Assange, Bradley Manning and Edward Snowden. If you still trust the government, ignore the free report below, otherwise, grab your copy now…
How the U.S. Government
Forged a Surveillance Society
The following article is from a past issue of the DeWeese Report. For more information and to subscribe click here.
On September 12, 2001, President George W. Bush invited members of Congress and the media for a meeting in the cabinet room of the White House. The mood was understandably anxious, somber: The World Trade Center lay in rubble, the Pentagon had a hole gouged into it and shock and awe had settled over the United States. One of the most extraordinary periods of American history – what would come to be known as the “Post 9-11 Era” – was beginning.
The president gravely laid out the situation and the steps his administration would take to secure the homeland, but during the course of the meeting he also made this significant declaration: “We will not allow this enemy to win the war by changing our way of life or restricting our freedoms.”
Those were heroic words of principle and patriotism in a traumatic time, but history would show that government’s reaction to the terrorist threat was the exact opposite than the protection of freedoms. Instead, government rushed in with a massive plan to create a surveillance society, intending to watch and document every action by the American people as a means of ultimate security.
First, Congress passed the Patriot Act, giving law enforcement powers to circumvent many Constitutional guarantees to personal privacy and home security. Then Congress created the Department of Homeland Security (DHS). The department immediately became an army of more than 170,000 employees by combining twenty two existing federal agencies, including the
Border Patrol, Coast Guard, Secret Service, FEMA, Immigration and Naturalization Service, Customs Service, Animal and Plant Health Inspection, Federal Protective Service, FBI’s Computer Incident Response Center and several more lesser agencies of the same type. In the middle of this rush for security, Congress created the Transportation Security Agency (TSA). Also born in this Post 9/11 era were state fusion centers with the intention of combining federal, state and local law enforcement agencies into instant response teams, intending to eliminate bureaucratic overlap and red tape, in case of another terrorist attack or Hurricane Katrina-type disasters.
Finally, Congress passed the REAL ID Act, promoted as an attempt to standardize the process and format for creation of all state drivers’ licenses to achieve increased security. Proponents argued that, under REAL ID, we will know that anyone carrying a drivers’ license is legal in this country and therefore not a threat.
What most Americans do not know is that the blue print for REAL ID did not originate in the United States, but in the backrooms of a United Nations organization called the International Civil Aviation Organization (ICAO). That organization is tasked with the goal of creating a once-size fits all international identification system using massive data banks that contain individual biometric information on nearly everyone in the world. Biometrics is defined as measurement of the body. One might correctly think of fingerprinting, iris scans and facial recognition as biometrics.
In compliance to this goal, REAL ID mandates a certain picture quality for all drivers’ licenses. Those photos are to comply with the ICAO’s Document 9303 biometric format. Your photo taken by a local DMV is run through special software which measures and analyzes the unique identifiable characteristics of your face. The process results in a unique numeric code which identifies a person according to facial measurements. In other words, under REAL ID, using the adopted standard of the ICAO, your face is reduced to a number code, a number which is read by a computer and be tracked by surveillance cameras worldwide.
Why would the United States agree to implement such a system? What happened to the promise that we would not let the terrorists change our way of life? How did the United States move from a free society, bent on preserving our freedoms in a dangerous terrorist-driven world to one of total surveillance over the actions of every citizen? What was the unseen hand that led to such decisions?
The international focus on drivers’ licenses through REAL ID came as a result of plans for international biometric passports. Passports, of course, are a control device of travelers both coming and going through US borders. Discussion regarding the use of E-Passports started soon after 9/11. It was not until the Enhanced Border Security and Visa Entry Reform Act of 2002 that our federal government put in place the framework for the issuance of E-Passports. E-Passports utilize both biometric technology and RFID (Radio Frequency Identification) technology.
Focusing on passports, however, was about to create an international problem for the US government that would force it to accelerate and expand its surveillance plans, leading to a global surveillance system beyond what most in Congress intended.
Using the excuse that the US government wanted to learn as much about Al- Qaeda as possible, the US began to dictate to foreign governments that they also needed to implement E-Passports. Without them, said the US, their citizens would not be able to enter the US. In addition, the US wanted those nations to provide all information they had on Al-Qaeda members.
Meanwhile, the United Nations set up a committee named simply “Al-Qaeda”. Again, the stated goal was for all nations to cooperate in an Al-Qaeda clearing house of information. Each government was to provide the names of the members of Al-Qaeda that the respective governments were aware of.
What became obvious to many in our government was, if we expected information about citizens of other countries our government was also going to have to “ante up” and provide information about our citizens to the other nations. This is when things started to get out of control. Global information sharing was seen as a necessity. All “chips” were on the table. For the system to work the personal and sensitive information, including the biometrics of all citizens in all countries, had to be made available to intelligence and law enforcement people around the world.
Other nations resented the United States telling them that they must supply information about their citizens if the US wasn’t willing to do the same. The US was forced to comply with its own dictates. And so the drive was on for the creation of an international surveillance system. REAL ID, while not recommended by the 9/11 Commission, became the center piece for the drive to document each and every American and placed their biometric records in international data bases.
The Real ID Act of 2005 was signed into law in May, 2005. The rulemaking process took roughly 2 1⁄2 years to be completed. During that 2 1⁄2 years over six hundred groups and organizations came out against the law for a variety of reasons. These groups covered a broad political spectrum from the far right to the far left. Religious organizations representing all major religions spoke out against the Real ID Act.
Among the reasons for such overwhelming opposition is that Real ID is an unfunded federal mandate; the federal government intervening in the issuance of state driver’s licenses; the unfettered power Real ID provides the Secretary of the Department of Homeland Security; a variety of privacy concerns; First Amendment religious concerns of which many were by Christian evangelical ministries; the state driver’s license would become a de facto national identification card; and the requirement that each driver’s license applicant would provide biometric samples.
In order for a state to be in compliance with the law, each state has 18 “benchmarks” they must complete or satisfy the Department of Homeland Security that the state is working towards completing the individual benchmarks. Opposition has been strong as 25 states, either as a result of law or resolution, opposed the Real ID Act. Because of the opposition, the Real ID Act implementation date has been postponed twice. However, proponents are determined to force implementation anyway and DHS demands that states comply by May, 2011.
If enforced, Americans will find what the saying “under government’s thumb” really means. Biometric documents will be required for nearly every action Americans take. A digital/electronic footprint will be the only way to access bank accounts; accessing transportation (at any level); purchase of goods and services; obtaining employment; and so forth. Every one of these actions will be stored in databanks and transferred to international databanks for storage.
Along with REAL ID, more legislation is pending in Congress to create even more control, all sold as just another way to keep us secure. One piece calls for a “National Worker’s Identification Card” and Senator Lieberman wants a new biometric social security card. If these proposals are passed into law and Real ID or anything else similar is in place it will be “game over”. Employers and retailers will have to have biometric readers and RFID (Radio Frequency Identification) scanners.
In addition, American law enforcement is being changed and with it, America’s unique justice system is being changed too. Once law enforcements mission was to catch criminals after a crime was committed. And even those captured were protected as“innocent until proven guilty.” That Constitutionally-protected rights made American justice unlike any other in the world. It has been one of the cornerstones of American freedom and security over freedoms and the less-certain future they offer.
We must remember that the stated goal for the total surveillance system has been that the world would be as one, carrying the same documents to assure everyone is equal, everyone is known, and everyone is legitimate. Under the system, say the proponents, security can be guaranteed.
So now the surveillance system is nearly fully in place. What are the results? Are we safer? The fact is, with all of the biometric data bases being established, RFID chips, Closed Circuit TVs, Automatic License Plate Readers, National Security Letters, State Fusion Centers, the Patriot Act, and the establishment of the behemoth Department of Homeland Security, we are not any safer than we were on the day before 9/11.
Why? First, while the government increases surveillance over every individual in he name of protection from terrorists, our borders remain wide open. Anyone wanting to do harm to the United States is able to simply walk into the country and be aided by an entire network providing shelter, money, weapons, and access to American programs for money, schools and jobs. They can illegally purchase counterfeit birth certificates and social security cards and obtain state drivers’ licenses in any state. Only three states have the ability to authenticates birth certificates.
Programs like E-Verify, sold as a way to guarantee that only legal residents get jobs, actually aid those entering illegally. It makes the Social Security Number the most valuable commodity in the nation – a valuable prize. That makes it profitable for underground criminal networks to obtain and produce them. Terrorists networks have the means and the money to lead that effort. In addition, a study commissioned by DHS and performed by Westat reported that E-Verify is wrong more than it is right when dealing with a person in our country illegally is vetted out. In these situations E-Verify is wrong 54% of the time and right only 46% of the time.
And there is one more fact that renders the entire surveillance effort worthless in the fight against terrorism. Back to those E-Passports and the US demand for other nations to comply. The whole
Under REAL ID and the growing surveillance society, however, law enforcements mission is emerging to be one of “crime prevention” before it occurs. The only way such a policy could work is for government to be able to observe our every action, including monitoring phone calls, opening mail, monitor our financial transactions, monitor who we associate with and monitor our travel. The government has programs to achieve each and every one of these things. DHS and National Security Agency (NSA) have both engaged in domestic spying. The Defense Department had a program called “Total Information Awareness” (TIA) that was designed to combine and access all of the video cameras now in place in nearly every store, shopping mall and parking lot to monitor every move we make. Now on the back burner, TIA could be reactivated at any time. All that is missing is the final requirement that all Americans must carry in their pockets the document tying them into the system – the REAL ID drivers’ license.
Once fully implemented, REAL ID means a “one-size fits all” policy, leading to the end of Constitutionally- protected First and Fourth Amendment rights. Proponents believe “safety” trumps “freedom” and any cost. With full implementation of REAL ID, government will finally have the laws, technologies and the ability governments throughout history have always sought to exercise total control over the people. Yet many Americans still refuse to be alarmed, seeking safety program depends on honest, reliable governments producing honest, reliable, secure documents on their own citizens. They don’t.
Many Moslem countries in the Middle East consider the US to be their enemy.Pakistan’s government, for one, while pretending to be our ally, is full of government workers who are either friends or members of Al- Qaeda. They have helped hide Al-Qaeda leaders since the inception of the war on terrorism. It is a known fact by US intelligence agents. Any effort made by the US to coordinate strategy with such governments fails because plans are immediately shared with the enemy by such government workers. The internal politics of these countries put the governments in an untenable position. If the leaders of these countries are perceived to be working with U.S. intelligence officials there is blowback against them for working with the “Infidels” of the United States. As a result, information from these nations, to this day, is at best questionable and unreliable.
To rely on such countries to provide honest documentation for citizens by way of passports or other identification is pure folly. It is easy for government employees to provide Al- Qaeda operatives all the “legitimate” documentation they need to travel freely inside the surveillance bubble that has been established to supposedly catch them.
Any honest observer or government leader dealing with the situation on a daily basis has to know the truth – that REAL ID and its fellow programs are not about protecting us in the war on terror. So what is the real purpose? What are we really doing?
The fact is Real ID is designed to enroll every citizen into a single global system of identification and financial control. Doubt that – then consider these words of Robert Mocny speaking for DHS when he said, “information sharing is appropriate around the world,” and DHS plans to create a “Global Security Envelope of internationally shared biometric data that would permanently link individuals with biometric ID, personal information held by governments and corporations.”
Meanwhile, Julian Ashborn speaking as the Chairman of the International Biometric Agency said, “What information do governments share? With whom is my data shared and why?” All of these questions need to be addressed by an agency with global powers”
These officials are telling openly telling us what they plan – global governance. Americans are just not listening. The truth is we are not safe. And such a system will never make us safe. But what we have done in the name of safety is to create an international surveillance system that destroys the unique American system of liberty and justice, “harmonizing” us into the same totalitarian system that controls so much of the rest of the world.
It can be stopped now- before it is fully implemented.
But once REAL ID is enforced in every state through compliant drivers’ licenses, it will be too late. Every American who cherishes their Constitutionally- guaranteed rights have until May of this year to demand that their state governments stand strong and continue to oppose compliance with this international straight jacket. Our protests postponed it for several years. We must do it again.
Call now or understand that, once in place, there will be no way for this generation to pass freedom to the next. REAL ID is that great a threat.
The ABC’s of Offshore:
International Strategies to Protect and Privatize Estates
· The new threats US citizens now face to their wealth and personal freedom
· 6 Domestic Solutions for Asset Protection (with various degrees of security)
· When to go international (and how to do so)
Is your name on the government list? Ongoing government intrusion!
Dating back to the 1980s and known to government insiders as “Main Core,” the database reportedly collects and stores — without warrants or court orders — the names and detailed data of Americans considered to be threats to national security.
According to several former U.S. government officials with extensive knowledge of intelligence operations, Main Core in its current incarnation apparently contains a vast amount of personal data on Americans, including NSA intercepts of bank and credit card transactions and the results of surveillance efforts by the FBI, the CIA and other agencies
One former intelligence official described Main Core as “an emergency internal security database system” designed for use by the military in the event of a national catastrophe, a suspension of the Constitution or the imposition of martial law.
How Stores Spy on You...
You are being watched when you shop, and that information can be matched with other data to help build a profile of you. ShopSmart looks at the various ways we are all being tracked by stores, banks, and others. And now some stores even have a "booty cam" in dressing rooms!
Video cameras record your every move. Your face and car’s license plate are captured and filed in searchable databases. Hidden cameras classify you by age, sex, and ethnicity, and even detect your body language and mood. Even your bank account records are being pried into. The main goal of these surveillance methods, of course, is to get you to shop more and spend more…
Privacy is more precious than ever, and getting scarcer. Government agencies continue to push legal boundaries with surveillance cameras, drones, GPS tracking devices, x-ray scanners, stop-and-frisk searches without a warrant, sometimes without a suspicion of wrongdoing. It’s not just law enforcement agencies that are doing it. The tax man is in on the action, too.
The American Civil Liberties Union found this out by posing a simple question to the Internal Revenue Service (IRS): Do you obtain a warrant before reading the public’s emails, text messages and other electronic communications? The bureaucrats naturally responded with 247 pages of documents, which reveal that the IRS thinks it can read anything it pleases. Who needs a judge’s approval?
The cavalier attitude is codified in the 2009 edition of the IRS handbook, which declares the Fourth Amendment’s protection against unreasonable searches and seizures does not protect emails because users “do not have a reasonable expectation of privacy in such communications.” Citing the hopelessly obsolete Electronic Communications Privacy Act of 1986, which was written a few years before Al Gore invented the Internet, IRS snoopers argue they only need a subpoena to browse through emails that have been opened or that are more than 180 days old
Read more: http://www.washingtontimes.com/news/2013/apr/16/the-irs-snoops/#ixzz2QiOt73MS
Exactly Who to Blame in Congress for Authorizing Government Spying
The National Security Agency and the FBI don't bear all the responsibility for the revelation that Verizon is turning phone records over to the government. That responsibility lies with the members of Congress who voted for the PATRIOT Act, as well as extensions of it and the provisions related to collecting those records. Over 100 people currently serving in the House and Senate voted for the original Act in 2001. Last year, over 300 voted to extend a key provision.
We looked at seven Congressional actions generally and five in particular to assess how the government's power to collect data has evolved. From October 2001 to last December, Congress continually voted to expand or continue the government's power to collect private data, ostensibly to bolster efforts to stop terrorist activity. In addition to the PATRIOT Act, Congress has also renewed provisions of the Foreign Intelligence Surveillance Act, or FISA — the law that established the court which issued the Verizon order.
Americans Searched on a Hunch? DHS Reaffirms Broad Power
The Department of Homeland Security has reaffirmed their belief that they have the power to conduct unwarranted electronic surveillance on American citizens returning to the country based on nothing more than a hunch.
Scroll down to grab your free privacy tools downloads...
Worker Biometric ID Under Consideration in US: Socialist Senator Charles Schumer and Lindsey Graham have proposed a new national identity card. The Senators would require that "all U.S. citizens and legal immigrants who want jobs" obtain a "high-tech, fraud-proof Social Security card" with a unique biometric identifier.
It creates huge administrative burdens for state governments, while providing only minimal federal funds for implementing its onerous requirements. At the same time, it does nothing to combat terrorism, and puts us at greater risk for invasions of privacy and identity theft.
It means even less privacy and more costs…Stop the scam
U.S. to let spy agencies scour Americans' finances...
(Reuters) - The Obama administration is drawing up plans to give all U.S. spy agencies full access to a massive database that contains financial data on American citizens and others who bank in the country, according to a Treasury Department document seen by Reuters.
The proposed plan represents a major step by U.S. intelligence agencies to spot and track down terrorist networks and crime syndicates by bringing together financial databanks, criminal records and military intelligence. The plan, which legal experts say is permissible under U.S. law, is nonetheless likely to trigger intense criticism from privacy advocates.
Financial institutions that operate in the United States are required by law to file reports of "suspicious customer activity," such as large money transfers or unusually structured bank accounts, to Treasury's Financial Crimes Enforcement Network (FinCEN).
The Federal Bureau of Investigation already has full access to the database. However, intelligence agencies, such as the Central Intelligence Agency and the National Security Agency, currently have to make case-by-case requests for information to FinCEN.
The Treasury plan would give spy agencies the ability to analyze more raw financial data than they have ever had before, helping them look for patterns that could reveal attack plots or criminal schemes.
The planning document, dated March 4, shows that the proposal is still in its early stages of development, and it is not known when implementation might begin.
Financial institutions file more than 15 million "suspicious activity reports" every year, according to Treasury. Banks, for instance, are required to report all personal cash transactions exceeding $10,000, as well as suspected incidents of money laundering, loan fraud, computer hacking or counterfeiting.
"For these reports to be of value in detecting money laundering, they must be accessible to law enforcement, counter-terrorism agencies, financial regulators, and the intelligence community," said the Treasury planning document.
Stay up-to-date with our free twice weekly online newsletter!
Using the illegal unPatriot Act GOVERNMENT VIOLATES PRIVACY ACT OF 1974
For years we heard about the Mark of the Beast and I always discounted it. However, the government has mandated the use of a Socialist Slave Number on all Americans just like the Nazis used on Jews and other concentration camp conscripts.
Comrades, you are now REQUIRED to have a socialist slave number to be born, enrolled in school, apply for any government benefits, for medical treatment, to open any kind of financial account including non-interest bearing accounts and even pre-paid debit cards, to serve in the military, to apply for many utilities, etc.
Despite wording in the Privacy Act of 1974 which prevented the collection and use of a Social Security number to open non-interest bearing financial accounts (later to include pre-paid debit cards) one cannot do much of anything without the slave number - even a Taxpayer Identification Number (TIN) is no longer accepted for most transactions.
The Privacy Act of 1974, Public Law 93-579, was created in response to concerns about how the creation and use of computerized databases might impact individuals' privacy rights. It safeguards privacy through creating four procedural and substantive rights in personal data. First, it requires government agencies to show an individual any records kept on him or her. Second, it requires agencies to follow certain principles, called "fair information practices," when gathering and handling personal data. Third, it places restrictions on how agencies can share an individual's data with other people and agencies. Fourth and finally, it lets individuals sue the government for violating its provisions.
There are, however, several exceptions to the Privacy Act. For one thing, government agencies that are engaged in law enforcement can excuse themselves from the Act's rules. Agencies have also circumvented information sharing rules by exploiting a "routine use" exemption.
The government maintains an average of 40 files on every citizen and they are now inter-dependent using your slave number as its universal identifier. It’s my prediction that once ObamaCare is fully implemented, each of us will be issued a medical ID using the SSN as its unique identifier. This will be the next step in complete citizen control…don’t have the ID or SSN number, you can’t work, buy or sell goods, get credit, get into school, get medical treatment. It’s already happening but the sheeple don’t see it.
Hell, our IRS shakes down and blackmails the banks in other sovereign nations such as Switzerland in order learn about “secret” money stashes. This is what happens when a state turns rogue and is headed toward totalianarism.
Big Brother is Watching: History of Government Surveillance
"If you think the government is watching your every move, that's crazy--but if you think the government is too good or too honest to try it, that's naive. Whether in the name of fighting crime, communism, terrorism, anarchy, military enemies, or just in the name of patriotism, our government has watched us before and will watch us again. As technology improves, privacy as we know it will inevitably evaporate; the best we can hope for is the power to watch the watchers."Read more...
Scroll down to get your free privacy protection tools...
Mushrooming Government Capabilities to Control Society
The rise of the Police State in America continues to build as the Poor Man has reported on so often since the creation of the anti-citizen Patriot Act…
This is a subject that is so big, wide, and dynamic that in many cases, even members of Congress do not understand the extent of bureaucratic planning to control our lives. Or that the Department of Homeland Security's big-picture plans, tactics, and technology are based on population control tactics originally developed and used in Iraq.
For example, airport screening bureaucrats, whose authority Americans are being conditioned to accept without question, are no longer limited to airports. The Transportation Security Administration and many other agencies are expanding airport-screening technologies and systems to cover all forms of ground transportation. Complete with traveler checkpoints and individualized tracking of cars, trains, telephones, and computers.
Ever heard of government-developed software called ThinThread or Trailblazer? These computer programs collect and correlate data from emails, phone calls, credit card payments, ATMs and internet searches and then combine it all to analyze each person and produce a police profile.
The U.S. National Security Agency (NSA) is now engaged in a massive secret surveillance operation on Americans, according to one of its creators, Bill Binney, who quit after 32 years at the NSA rather than be a party to what he calls “a civil liberties nightmare come true.”
A few months ago, I reported that the NSA is building America’s largest-ever spy center in the Utah desert – and it will be watching you (if it isn’t already). This is the same NSA that 10 years ago secretly saddled us with the Constitution-busting ECHELON spy program.
This Utah NSA project is just one part of a snooping system. Presidents Bush and Obama’s massive surveillance of all our telephone calls and Internet activity has been exposed, but not stopped. And that’s just the tip of the iceberg. You may have read about iris scanners, RFID chips that trace movements and purchases, voice analyzers and fingerprint readers … or you might simply look up and see the millions of CCTV cameras arrayed in public places that use Trapwire, which allows for quick police analysis of live feeds from surveillance cameras.
Now, the FBI has announced the Next-Generation Identification program (NGI), a plan to spend $1 billion of your tax dollars to build a new type of facial recognition database that will allow FBI agents to identify suspects and “people of interest” using security footage from public cameras.
What Does NGI Mean to You?
The NGI program is already operational as a pilot program in some areas, and the FBI says NGI will be ready for national use in 2014.
Government and police agencies will combine a person’s face with other biometric data like fingerprints, iris scans and voice identification to determine their identity. NGI starts with millions of criminal records and drivers’ licenses, but it’s only a matter of time before the government taps into the wealth of photos stored on social media and image sharing websites such as Facebook.
Undoubtedly, secretly tracking people’s movements constitutes a violation of the Fourth Amendment of the Bill of Rights, but the FBI ignores that and claims NGI is legal under guidelines established by the U.S. Privacy Act!
Shades of Steven Spielberg’s action film Minority Report, based on a story by Philip K. Dick, offered movie audiences a chilling, special-effects, techno-vision glimpse of a future in which the government and police are pervasive and omnipresent. And if you step out of line, dark-clad SWAT teams will ensure your compliance.
Our government’s increasing disregard of our personal liberties...
The Drug-Sniffing Laser
And you thought the beagle sniffing out your illegally imported Spanish ham at the airport was annoying. Well, now comes a laser system that can detect drugs or gunpowder from more than 160 feet away. It can also detect your adrenaline level.
And here’s the best part… it can detect whatever it seeks at microscopic levels, but more on that in a moment.
The Department of Homeland Security is looking to deploy these scanners at airports to increase protection.
Dusting for Footprints
Turns out your footprint – and the way you walk – is as unique as your fingerprint. And a new technology known as “biometric insoles” will keep track of where you’re going.
The insoles are reportedly 99% accurate. They’ll make their debut in a few government and corporate facilities that require security clearance, since the insoles are less time-consuming than retina scans. Within three steps they can determine that you are, indeed, you – even if your stride or footfalls change because you’re tired or moving quicker than normal.
Smile! You’re on Drone Camera
Already, the FAA has issued certificates for more than 60 local, state and federal organizations to fly drones across America. Some are for research, like those deployed by universities in Texas, Alaska and elsewhere.
Others are flying under the banner of various policing organizations from the Department of Homeland Security to the FBI to police and sheriff’s departments in Miami, Houston and Seattle, among others. And you can bet those departments aren’t using their drones for benevolent flyovers at local parades. Indeed, some police departments have proposed arming their drones with tear gas and rubber bullets.
These are not big, bulky drones like you see on the nightly news guiding missiles into the barracks of terrorists hiding in Afghanistan. We’re talking drones the size of a model airplane, weighing just a few pounds and outfitted with tiny, high-resolution cameras… used for surveillance… of Americans.
Government predicts that by the end of the decade, 30,000 drones will be patrolling American skies like a swarm of bothersome mosquitos – one drone for every 126 square miles.
Back in the 90s I was a contributing editor to Privacy Times and had written a manual on privacy protection and relied on EPIC as a resource…this group has been in the forefront of civil rights protections.
As all of us know, there has been an assault on our freedom and rights from politicians and bureaucrats:
Here are some recent updates…
A federal district court has ruled that EPIC "substantially prevailed"
in a Freedom of Information Act lawsuit that resulted in the disclosure
of information about the agency's plan to deploy body scanners at bus
and train stations, sporting events, and other public venues. EPIC also
obtained documents detailing the development of body scanner technology
that would be deployed in roving, so-called "Z-Backscatter" vans.
EPIC has several related FOIA lawsuits concerning new systems
of mass surveillance.
The Court of Appeals for the DC Circuit has also issued a ruling on
EPIC's recent petition on the controversial body scanner program.
After the court's initial 2011 ruling mandating that the TSA
"promptly" undertake notice and comment rulemaking, a year passed
without agency action. EPIC then urged the court to require the
Secretary of Homeland Security to begin a public comment process or
suspend the program. The agency subsequently replied that it "finalize
documents" by February 2013.
The Department of Homeland Security has released its 2012 Privacy
Office Annual Report to Congress. The report details the expansion of
the National Counterterrorism Center's five-year retention policy for
records on US Persons, the agency's social media-monitoring initiatives,
and privacy training for fusion centers personnel; however, it does not
discuss several new DHS-funded initiatives, including the Future
Attribute Screening Technology, or FAST, a "Minority-Report"-like
proposal for "pre-crime" detection. Also, according to the report the
Transportation Security Administration has still failed to adopt privacy safeguards for body scanners
A New Breed of High-Tech Crony Capitalists
Get Rich by Feeding Off Our Freedoms
With the wind-down of the Afghan and Iraq conflicts, these same legions of high-tech companies were at risk of not having a reason to exist, and worse, of losing their biggest source of taxpayer-guaranteed profit. Unfortunately, these are very well connected interests. And like all lobbies, they need a huge new mission to justify their existence and expand.
Enter the Department of Homeland Security – which has put numerous high-tech companies that helped the military set up population control systems in Iraq to work doing the same thing here at home.
Perhaps most disturbingly, DHS is creating an artificial domestic market for all this new technology – aggressively making grants to local law enforcement agencies designed to get them into the domestic intelligence collection business (Fusion Centers) as well as militarize local police departments with the latest shiny new crowd control equipment.
The end result is the birth of an iron triangle of powerful interests that are heavily vested in unprecedented levels of federally directed policing of the general public. Kinda like the ethanol scandal, except in this case we are being robbed of our freedoms, not just our tax dollars.
A recent Wall Street Journal story, "High Tech Surveillance Comes to Small Towns," notes the proliferation of high-tech trade shows that cater to the urgent central planning agenda of the federal government, especially Homeland Security. These citizen-tracking technology expos are attracting numerous small town local police departments – many of which are flush with DHS grant money and a long shopping list for the most advanced and prestigious new military weapons being made available to them.
It’s Always a matter of ‘follow the money’ when it comes to politicians…
High-tech companies selling these intrusive surveillance and crowd control technologies do so at secretive conferences which are closed to the media. The Journal reports that small sheriffs' departments are particularly enthusiastic about the most popular training sessions offered by these trade show organizers, such as "Online Social Media and Internet Investigations" and "Exploiting Computer and Mobile Vulnerabilities for Electronic Surveillance."
Because the alliance of high-tech companies working in cahoots with the political class is helping to spawn an advanced national population control grid that Uncle Sam's armies of stodgy bureaucrats could never have created on their own.
21 Ways to Protect Your Privacy-Free Downloads
More Privacy Tools-Updated resources to preserve your privacy & assets...Share with our friends!
Experiencing The Police State Security
Your surfing sessions tracked by websites, search engines and social networks, but often your Internet service provider (ISP), web browser, government and potentially hundreds of online tracking companies.
Whether it's to collect valuable (read: sellable) marketing data or prevent terrorist activity, movie piracy or kiddie porn, everything you think you're doing privately in the comfort of your home is anything but private.
There are many different solutions that can hide your Internet connection, allowing you to remain anonymous while online.
Some are websites, such as free "online proxy servers" that conceal your identity — simply point the web address (URL) to the proxy server and surf right from their website
proxy.org for a list of great options).
Others prefer Virtual Private Network (VPN) software that encrypts your online sessions. The browser-independent Hotspot Shield from AnchorFree, for example — available for Windows, Macs, iPhone and Android — channels all web activities through a personal VPN and secures all Internet communications by turning all HTTP traffic into the safer HTTPS (which is what your bank uses for a safe connection).
Free to use but with more features packed into the "elite" version ($29.95), Hotspot Shield is ideal for email and instant messaging, too, and reduces the likelihood of identity theft because you're not leaving a digital footprint -- including cyber-snoopers and rogue connections at:
Wi-Fi hotspots, hotels, airports, etc.
Big Brother is becoming all-pervasive, and thousands of new technologies are currently being developed that will make it even easier to spy on you.
Capturing Fingerprints From 20 Feet Away
Can you imagine someone reading your fingerprints from 20 feet away without you ever knowing it?
This kind of technology is actually already here according to POPSCI....
Gaining access to your gym or office building could soon be as simple as waving a hand at the front door. A Hunsville, Ala.-based company called IDair is developing a system that can scan and identify a fingerprint from nearly 20 feet away. Coupled with other biometrics, it could soon allow security systems to grant or deny access from a distance, without requiring users to stop and scan a fingerprint, swipe an ID card, or otherwise lose a moment dealing with technology.
Currently IDair’s primary customer is the military, but the startup wants to open up commercially to any business or enterprise that wants to put a layer of security between its facilities and the larger world. A gym chain is already beta testing the system (no more using your roommate’s gym ID to get in a free workout), and IDair’s founder says that at some point his technology could enable purchases to be made biometrically, using fingerprints and irises as unique identifiers rather than credit card numbers and data embedded in magnetic strips or RFID chips.
Mobile Backscatter Vans
Police all over America will soon be driving around in unmarked vans looking inside your cars and even under your clothes using the same "pornoscanner" technology currently being utilized by the TSA at U.S. airports....
American cops are set to join the US military in deploying American Science & Engineering's Z Backscatter Vans, or mobile backscatter radiation x-rays. These are what TSA officials call "the amazing radioactive genital viewer," now seen in airports around America, ionizing the private parts of children, the elderly, and you (yes you).
These pornoscannerwagons will look like regular anonymous vans, and will cruise America's streets, indiscriminately peering through the cars (and clothes) of anyone in range of its mighty isotope-cannon. But don't worry, it's not a violation of privacy. As AS&E's vice president of marketing Joe Reiss sez, "From a privacy standpoint, I’m hard-pressed to see what the concern or objection could be."
Unmanned Drones In U.S. Airspace
Law enforcement agencies all over the United States are starting to use unmanned drones to spy on us, and the Department of Homeland Security is aggressively seeking to expand the use of such drones by local authorities....
The Department of Homeland Security has launched a program to "facilitate and accelerate the adoption" of small, unmanned drones by police and other public safety agencies, an effort that an agency official admitted faces "a very big hurdle having to do with privacy."
The $4 million Air-based Technologies Program, which will test and evaluate small, unmanned aircraft systems, is designed to be a "middleman" between drone manufacturers and first-responder agencies "before they jump into the pool," said John Appleby, a manager in the DHS Science and Technology Directorate's division of borders and maritime security.
The fact that very few Americans seem concerned about this development says a lot about where we are as a nation. The EPA is already using drones to spy on cattle ranchers in Nebraska and Iowa.
Law Enforcement Using Your Own Cell Phone To Spy On You
Although this is not new technology, law enforcement authorities are using our own cell phones to spy on us more extensively than ever before as a recent Wired article described....
Mobile carriers responded to a staggering 1.3 million law enforcement requests last year for subscriber information, including text messages and phone location data, according to data provided to Congress.
A single "request" can involve information about hundreds of customers. So ultimately the number of Americans affected by this could reach into "the tens of millions" each year....
The government is not the only one that is spying on you. The truth is that a whole host of very large corporations are gathering every shred of information about you that they possibly can and selling that information for profit. It is called "data mining", and it is an industry that has absolutely exploded in recent years.
One very large corporation known as Acxiom actually compiles information on more than 190 million people in the U.S. alone....
The company fits into a category called database marketing. It started in 1969 as an outfit called Demographics Inc., using phone books and other notably low-tech tools, as well as one computer, to amass information on voters and consumers for direct marketing. Almost 40 years later, Acxiom has detailed entries for more than 190 million people and 126 million households in the U.S., and about 500 million active consumers worldwide. More than 23,000 servers in Conway, just north of Little Rock, collect and analyze more than 50 trillion data 'transactions' a year.
Street Lights Spying On Us?
Did you ever consider that street lights could be spying on you?
Well, it is actually happening. New high tech street lights that can actually watch what you do and listen to what you are saying are being installed in some major U.S. cities. The following is from a recent article by Paul Joseph Watson for Infowars.com....
Federally-funded high-tech street lights now being installed in American cities are not only set to aid the DHS in making “security announcements” and acting as talking surveillance cameras, they are also capable of “recording conversations,” bringing the potential privacy threat posed by ‘Intellistreets’ to a whole new level.
Automated ISP Monitoring Of Your Internet Activity
As I have written about before, nothing you do on the Internet is private. However, Internet Service Providers and the entertainment industry are now taking Internet monitoring to a whole new level....
If you download potentially copyrighted software, videos or music, your Internet service provider (ISP) has been watching, and they’re coming for you.
Specifically, they’re coming for you on Thursday, July 12.
That’s the date when the nation’s largest ISPs will all voluntarily implement a new anti-piracy plan that will engage network operators in the largest digital spying scheme in history, and see some users’ bandwidth completely cut off until they sign an agreement saying they will not download copyrighted materials.
Word of the start date has been largely kept secret since ISPs announced their plans last June. The deal was brokered by the Recording Industry Association of America (RIAA) and the Motion Picture Association of America (MPAA), and coordinated by the Obama Administration.
Spying On Us Through Our Appliances
Could the government one day use your refrigerator to spy on you?
That is exactly what CIA Director David Petraeus says is coming....
Petraeus says that web-connected gadgets will 'transform' the art of spying - allowing spies to monitor people automatically without planting bugs, breaking and entering or even donning a tuxedo to infiltrate a dinner party.
'Transformational’ is an overused word, but I do believe it properly applies to these technologies,' said Petraeus.
'Particularly to their effect on clandestine tradecraft. Items of interest will be located, identified, monitored, and remotely controlled through technologies such as radio-frequency identification, sensor networks, tiny embedded servers, and energy harvesters - all connected to the next-generation internet using abundant, low-cost, and high-power computing.'
Petraeus was speaking to a venture capital firm about new technologies
These are just a small part of techno advances that we know about. The government is always seeking new ways to spy on its citizens…perhaps we should produce a new version of the classic movie 1984 to show just how invasive and insidious ‘our’ government has become.
How much freedom are you willing to give away?
When and where do American citizens draw the line?
The U.S. government has shown clearly through word and action that its concerns are not with the average American, and that its loyalties rest with decidedly smaller and more elite interest groups.
When any government decides it is no longer concerned with the freedom and prosperity of a nation, no matter how righteous that government claims to be, we MUST, as citizens, ask ourselves whether that government is still useful.
The progression of the past decade has seen a hailstorm of legislation and executive orders that impede personal liberties and erode Constitutional protections in place for centuries. So many trails towards totalitarianism have been blazed recently that it is becoming difficult to track them all, and yet, I do not think many in our country have asked themselves what this means to their future. What kind of rights are you ready to hand over to government? How many aspects of your life should the establishment be able to dictate?
The Power To Invade Your Privacy
The U.S. government has long held at least a private belief that it should be allowed access to every aspect of a citizen's personal life. In the past, the excuse of criminal suspicion was a standard rationalization, but this expanded beyond the targeting of individuals to broader surveillance of the populace as a whole with the advent of the drug war. Financial records especially became subject to government perusal without warrant and generally without any criminal charges filed.
This trampling of the 4th Amendment over a fabrication of a "war" on substances that by all rights should be legal anyway was just a taste of what was to come. With the explosion of the war on terror (another fabricated conflict), the application of mass surveillance became standardized. The Patriot Acts and the FISA bill, both upheld by so called "Republican" and "Democratic" presidents, have opened the door for centralized electronic spying in the name of "national security". Never before has the world seen such an unbridled assault on the private lives of common citizens. The big brother grids of the Soviet era are child's play compared to the data mining of the 21st century, and this tyranny is made possible by the marriage of government and corporate interests, working in tandem to ensure an ever tightening net.
The Power To Silence
From the DHS, to the private Federal Reserve, to Google and Facebook, the tides of opinion and social observation are being tracked, catalogued, and flagged for future intervention. With active programs now in place to identify and isolate negative online criticism of these institutions as well as to marginalize freelance web journalists and more mainstream media icons with a strong voice, the general public is finally beginning to see what we in the Liberty Movement have been warning about for years.
The invasion of privacy is merely the first step in the process of silencing dissent.
The Power To Financially Destroy
Of course, much of the economic distress that we suffer today was generated by the corrupt activities of the Federal Reserve (a privately controlled banking cartel) and global financing conglomerates like JP Morgan and Goldman Sachs, however, the government's complicity in these activities cannot be denied. It was the Congressional repeal of the Glass-Steagall Act that gave international banks the ability to derivitize massive numbers of mortgages and create the ongoing implosion of the housing bubble. It was the SEC that turned the other cheek for years while credit fraud flooded markets and ratings agencies gave AAA status to toxic and basically worthless assets. It is the U.S. government to this day that defends the Federal Reserve's nonstop quantitative easing, the destruction of the dollar, and increased deficit spending driving our nation even deeper into debt.
The passage of the bailouts despite an 80% opposition from the public sent a stark message; the governm ent does not care what you think about the economy, and will do what it pleases, even if it means destroying your means of fiscal survival.
The Power To Imprison Without Trial
The NDAA is truly a perfect representation of the kind of power the government would like to have over the people, no questions asked. The Obama Administration's half hearted promises to not use the provisions of the legislation to detain American citizens indefinitely without trial are little comfort, especially when one considers that the man has not kept a single positive promise since taking office in 2008. Frankly, I would have slightly more respect for the president (which isn't much) if he had the guts to come out and admit what the language of the NDAA clearly states; that American citizens can and will be designated as enemy combatants under the rules of war, and that anyone, regardless of citizenship, can be labeled a "terrorist" for any reason by the executive branch.
The Power To Militarize
Federal fusion centers and funding for local law enforcement has irreparably damaged state and county objectivity and opened the door to a steady diet of anti-liberty propaganda for police officials across the nation. Some eat it up, some don't. However, the issue here is one of intention. Why does the federal government feel the need to arm divisions of local law enforcement with automatic weapons, predator drones, and even tanks? Why is Congress going out of its way to free up FAA regulations to allow police organizations unprecedented access to predator drones, up to 30,000 by 2020, for use in civilian airspace?
Renewing your drivers license...
Just sign away your rights and privacy!
Certification/Disclosure Information Acknowledgement
Please read the following and click the box below to confirm you have read and agree with the information:
- I agree to submit to a chemical test of my blood, breath, or urine for the purpose of determining the alcohol or drug content of my blood when testing is requested by a peace officer acting in accordance with Vehicle Code §23136 or §23612.
- I understand that if I'm under 21 years of age, I cannot legally drive with a blood alcohol concentration (BAC) of 0.01% or more. Driving with a BAC of 0.01% or more, refusing to take, or failing to complete an alcohol screening or drug test, results in a one-year suspension of my driving privilege.
- I am the person whose name appears on the renewal notice used to process this application. The mailing address shown on the renewal notice is valid, existing, and accurate. I agree to accept service of process at this mailing address according to §415.20(b), §415.30(a), and §416.90 of the Civil Procedure Code.
- I understand that DMV will add convictions reported by other states' licensing authorities to my driving record, which may result in sanctions against my California driving privilege pursuant to the applicable sections of the California Vehicle Code.
- Social Security Number Collection Disclosure - You are required by law to provide your social security number or your application will be denied. Authority to collect the social security number is 42 U.S.C. 405 and California Vehicle Code Sections 1653.5, 4150, 4150.2, 12800, and 12801.
It will be used in the administration of driver license laws and motor vehicle registration laws and to respond to requests for information from the:
- Franchise Tax Board for tax administration
- Any agency operations pursuant to 42 U.S.C. 601 et.seq.
It will be used to aid in the collection of monies owed in connection with:
- Failure to pay fines or failure to appear in court by an applicant
- Aid to Families with Dependent Children
- Child Support
- Establishment of Paternity
WOW! All I have to say about this is make sure you’re using a PO Box as your home address (not a USPS government mailbox – a box at one of those neighborhood businesses with “PMB” mailboxes). One of the main steps on the road to de-slaving yourself is to make sure the authorities don’t know where you live. NEVER give out your home address to anyone but trusted friends and family if you can help it. Utilities end up getting it, but anyone else providing services to your home doesn’t need it.
Your Privacy Is Yours
"I Lived. I Died. Now Mind Your Own Business." That's how I want my tombstone to read.
What do I have to hide? Everything! Which is to say, every piece of personal information someone or something demands to know is something I don't want to tell because no one has the right to demand access to my life.
The right to privacy rests largely on a presumption of innocence. It assumes that -- in the absence of evidence of wrongdoing -- an individual has a right to shut his front door and tell other people (including government) to mind their own business.
Today, this assumption has been twisted inside out so that a desire for privacy means you have something to hide. You are expected to prove your innocence by revealing every financial transaction, by filling in pages of government paperwork, by allowing state agents to frisk your person and property when you board a plane or enter a public building. These invasions rest upon the presumption of guilt.
Privacy is also is the single most effective means of preserving freedom against an encroaching state. The act of closing your front door expresses the key distinction between the private and public spheres.
The private sphere consists of the areas of life over which you, as a peaceful human being, exert absolute authority and into which the government or any other uninvited party cannot properly intrude. Traditionally, the home or family is viewed as the private sphere. But it also includes the food you eat, your sex life, the books you read, your opinions of life.
The public sphere consists of the civic duties you owe to others. In a free society, these duties include paying your bills, respecting the equal rights of all and living up to contracts. In the current society, a set of designed duties require you to pay ruinous taxes, to restrain your own rights and to abide by a mushrooming mass of laws.
Historically, privacy has stood on the side of liberty as a bulwark between the individual and government, between freedom and social control.
Imagine a world in which you do not report your income; there are no government forms or census data; registration of everything from birth to marriage is optional; no permission is needed to open a business or travel abroad. Imagine a world in which personal data are private.
How could the tax man collect money without knowing your income or address? How could the military draft your children into war without knowing where to find them at home or at school? How could the censor punish your reading habits when no record exists of which books you buy? The machinery of the state is paralyzed without information about who you are.
Information has always empowered the state. On his infamous 1864 march through Georgia, Gen. William Tecumseh Sherman used county maps with information about livestock and crops in order to loot and pillage more efficiently.
After the 1942 bombing of Pearl Harbor, the American military used census data to locate Japanese-Americans and herd them into detention camps. The IRS has routinely compared the names on foreign government lists with those on its own in order to locate "hidden" assets.
The difference today is the higher efficiency of data collection, due to technology. Most people's employment, financial, medical, military, educational, housing, marital, telephone, travel, Internet, automobile and family records are now stored or easily accessed by government.
It is no coincidence that statist governments are renowned for wiretapping, surveillance, identification papers, informants, secret police and censorship. The control of information throughout society is akin to the control of blood flow through a body; it is vital to functioning.
The difference today is technology... and the active cooperation of businesses like Facebook and Google, who curry government favor by catering to all requests for information. Technology converts the collection of data into an art form.
At this point, it is useful to take a "time out" to assert that the collection of data and issuance of documents can be a valid function of a free society. Quite apart from facilitating social control, identifying (ID-ing) people can function as a free-market mechanism of authentication. It authenticates those who should have access to bank accounts, property titles or inheritance; it certifies people as being skilled -- for example, as a thoracic surgeon. But this authentication does not involve exploring their bank accounts, sexual preferences, reading habits, travel plans and political beliefs.
In asserting its superior claim over any free-market function of identifying people, the state does not outlaw competition; the state merely renders the free-market function irrelevant. The state makes its ID a de facto condition for functioning well in daily life. The state and its documentation have become the only way for a person to "prove" his or her identity and, thus, to access the basic rights and "niceties" of life. The "unidentified" human being cannot board a plane or train, nor drive a car. He cannot open a bank account, cash a check, take a job, attend school, get married, rent a video (let alone an apartment) or buy a house. The unidentified person is a second-class citizen to whom the government closes off much of life and almost all opportunity to advance through labor, education or entrepreneurship.
Meanwhile, those who are "identified" by the state are vulnerable to having their bank accounts frozen, their access to health care denied, credit cards canceled, wages garnished, records subpoenaed. To become known to the state is to become vulnerable to a myriad of invasions that come from the government knowing exactly where and how to find you.
Those who resist being inventoried present a problem for the state. The first line of statist attack is to accuse them of being "suspicious" -- that is, of having criminal or shameful reasons for refusing to answer questions.
"If you have nothing to hide…" the remark begins; it always ends with a demand for compliance. Invoking privacy has gone from being the exercise of a right to an indication of guilt.
This is a sleight of hand by which privacy is redefined as "concealment" or "secrecy"; of course, it is neither. It is merely a request for the personal to remain personal. As well as enabling freedom, privacy is part of a healthy, self-reflecting life.
Everyone has areas of utter privacy to protect. Some people wear lockets containing photos of deceased relatives; others daydream about a forbidden love; still other people lock the door while luxuriating in a hot bubble bath; or perhaps, they write a love letter that is meant for one other set of eyes only. These acts are a line drawn between the private and public sphere; they constitute a boundary over which no other human being can rightfully cross without invitation.
If a neighbor took it upon himself to read letters in your mailbox or copy down the details of deposits in a bankbook he "encountered" in your desk drawer, you would feel violated and enraged by the invasion. What is wrong for your neighbor to do is also wrong for a government agent to do, because there is only one standard of morality. Theft is theft; invasion is invasion. You have the right to slam the door on the face of anyone who says differently. A peaceful human being owes no debt to any other person.
Vehicle Tracking Devices: New Technology vs. Fundamental Liberty
The right to exclude intruders into your private thoughts, property and affairs is a fundamental human right. This concept is so fundamental to Western legal systems that in 1604 Sir Edward Coke was able to declare that a person’s home is their castle. The Declaration of Independence, the US Constitution and countless other documents also reflect this fundamental principle of freedom.
For example the Fourth Amendment to the US Constitution requires the government to have a warrant based on probable cause before they can intrude on someone’s privacy without their consent. In other words, they need a really good reason.
Vehicle Tracking Devices And Other Legal Erosions Of Better Privacy
In the past few years the government has permitted searches for worse and worse reasons. Sometimes, they need not have any reason at all. All branches of government have contributed to the decline. The executive branch vigorously pushes the boundaries of acceptable behavior while enforcing the law, legislatures pass Patriot Acts and other laws which erode privacy, and judiciaries interpret the language of the Constitution with no regard to the underlying principles, interpreting some provisions into dead letters.
In US v. Pineda-Moreno, police snuck onto a man’s private property in the middle of the night, without a warrant, and put one of the police GPS vehicle tracking devices on a car. The vehicle tracking device tracked his every move which the government collected.
Here are some of the highlights of Alex Kozinski’s dissent in US v. Pineda-Moreno.
“Having previously decimated the protections the Fourth Amendment accords to the home itself (citation omitted) our court now proceeds to dismantle the zone of privacy we enjoy… The needs of law enforcement, to which my colleagues seem inclined to refuse nothing, are quickly making personal privacy a distant memory. 1984 may have come a bit later than predicted, but it’s here at last…
“The panel authorizes police to do not only what invited strangers could, but also uninvited children—in this case crawl under the car to retrieve a ball and tinker with the undercarriage. But there’s no limit to what neighborhood kids will do, given half a chance: They’ll jump the fence, crawl under the porch, pick fruit from the trees, set fire to the cat and micturate on the azaleas. To say that the police may do on your property what urchins might do spells the end of Fourth Amendment protections for most people…
“In determining whether the tracking devices used in Pineda- Moreno’s case violate the Fourth Amendment’s guarantee of personal privacy, we may not shut our eyes to the fact that they are just advance ripples to a tidal wave of technological assaults on our privacy.
“If you have a cell phone in your pocket, then, at the government’s request, the phone company will send out a signal to any cell phone.
connected to its network, and give the police its location. Last year, law enforcement agents pinged users of just one service provider—Sprint—over eight million times. The
volume of requests grew so large that the 110-member electronic surveillance team couldn’t keep up, so Sprint automated the process by developing a web interface that gives agents direct access to users’ location data.
“You can preserve your anonymity from prying eyes, even in public, by traveling at night, through heavy traffic, in crowds, by using a circuitous route, disguising your appearance, passing in and out of buildings and being careful not to be followed. But there’s no hiding from the all-seeing network of GPS satellites that hover overhead, which never sleep, never blink, never get confused and never lose attention. Nor is there respite from the dense network of cell towers that honeycomb the inhabited United States. Acting together these two technologies alone can provide law enforcement with a swift, efficient, silent, invisible and cheap way of tracking the movements of virtually anyone.
To prevent the police from putting GPS vehicle tracking devices on your car, park it in a garage, enclosed in a wall or fence, or sweep the vehicle before driving it. To prevent government intrusions in other ways, use encryption to encrypt emails, prepaid cell phones, anonymous web surfing, and lots of other tools. These all keep the government honest and prevent them from intruding upon your private places without having a really good reason…
About the only U.S. Senator to stand up against the Patriot Act is Rand Paul. He is doing all he can to fight a one man battle against the Patriot Act but Senate Majority Leader Harry Reid is doing his best to extend the Patriot Act without any debate taking place
If you display the wrong political message on your car, you may find law enforcement officials cracking down on you.
A 73-year-old Virginia resident was recently kicked out of a national park for displaying a sticker promoting "Ron Paul’s Campaign for Liberty" on his car.
The following is an excerpt from a recent Rutherford Institute report about this incident....
The Rutherford Institute has come to the defense of a 73-year-old Virginia resident who was allegedly ordered by a park ranger to remove his car from a national military park in South Carolina because of political messages attached to his vehicle. Jack Faw, whose ancestors fought in the historic battle memorialized at Kings Mountain National Military Park, contacted The Rutherford Institute after being told by a park ranger that the decal promoting a political organization associated with Rep. Ron Paul (R-TX), which was displayed on the back window of Faw's car, was not allowed in the park.
Life on the plantation, just say ‘yes suh, massah!”
Please don' hits me. massah. i goina be good from naw on…
The Middle Class -- Merely plantation slaves, sharecroppers on the Kings Land.
We can’t say it too often -- the U.S. middle class faces daunting challenges, and must change the way it works, thinks, and plans. Income has stagnated for decades (see this recent CNN piece, among many others), while educational and medical costs surge by the year. Job security is a distant memory.
But that’s old news. More jarringly, the very concept of “employment” is being redefined as we speak. Every worker -- not just temps and freelancers -- is becoming “contingent,” if not in name, in function. A company may call you an “employee,” but with diminishing benefits and nothing to count on, your job is like 12-step sobriety -- you have it one day at a time.
Multinational corporations have become incredibly skilled at avoiding taxes. It has become routine for big companies to shift profitable operations to divisions in other countries where tax rates are lower. It has also become routine for big companies to set up "sham headquarters" in tax havens around the world. Many U.S. corporations have even renounced their status as American companies in order to avoid paying taxes.
We’ve become a nation of sharecroppers. Plantation slaves. We never truly ever own anything, our government does. Don’t pay your property tax and the states takes away your home. Fall behind on child support and the state will take away your licenses, home or other property or your freedom. Forget to renew any government issued permits in regard to your automobile, the state will impound your vehicle. Hunt a deer without a permit, the King will fine you. Don’t pay your annual tribute, face fines and/or imprisonment.
In the US you can longer do what you want on ‘your property’ without permission from the overseer! Whether Americans want to admit it or not, it's the single greatest fear in their lives: fear of the government. Americans who don’t obey are coerced at the end of a gun barrel. The US has the most armed agents in the world.