Archive

Archive for the ‘Privacy’ Category

Is your smartphone watching you?

August 17, 2013 Comments off

Gmail users ‘have no legitimate expectation of privacy’

August 14, 2013 Comments off

rt.com

Image by GoogleImage by Google

 

As tensions worsen among privacy-focused email users amid the escalating scandal surrounding government surveillance, a brief filed by attorneys for Google has surfaced showing that Gmail users should never expect their communications to be kept secret.

Consumer Watchdog has unearthed a July 13, 2013 motion filed by Google’s attorneys with regards to ongoing litigation challenging how the Silicon Valley giant operates its highly popular free email service.

The motion, penned in hopes of having the United States District Court for the Northern District of California dismiss a class action complaint against the company, says Gmail users should assume that any electronic correspondence that’s passed through Google’s servers can be accessed and used for an array of options, such as selling ads to customers.

Just as a sender of a letter to a business colleague cannot be surprised that the recipient’s assistant opens the letter, people who use Web-based email today cannot be surprised if their emails are processed by the recipient’s [email provider] in the course of delivery,” the motion reads in part. “Indeed, ‘a person has no Read more…

Categories: internet, Privacy Tags: , , ,

WARNING!!!! If you take photos with your cell phone

August 13, 2013 Comments off

kyeos.wordpress.com

“Warning” If you, your kids or grand kids take pics from your phone—WATCH THIS!

This is truly alarming – please take the time to watch. At the end they’ll tell you how to set your phone so you don’t run this risk!

PLEASE PASS THIS INFO TO ANYONE YOU KNOW WHO TAKES PICTURES WITH THEIR CELL OR SMART PHONE AND POSTS THEM ONLINE.

I want everyone of you to watch this and then be sure to share with all your family and friends.

It’s REALLY important info, about what your posting things on your cell phones can do TO YOU!!!

Too much technology out there these days so beware………..

PLEASE TAKE THE TIME TO WATCH THIS VIDEO, AND TAKE THE RECOMMENDED PRECAUTIONS.

If you have children or grandchildren you NEED to watch this. I had no idea this could happen from taking pictures on the blackberry or cell phone. It’s scary.

 

NSA locates cell phones even when they are turned off

August 10, 2013 Comments off

EndtheLie.com

Reuters / Lucas Jackson
Reuters / Lucas Jackson

Never mind the non-stop collection of metadata and other sneaky surveillance tools being implemented by the NSA: a new report has revealed that the National Security Agency’s spy powers allow the government to grab location data on just about anyone.

In an article published by the Washington Post over the weekend, journalist Dana Priest detailed how one of the most secretive agencies administered by the United States government has expanded drastically in the decade-plus since the terrorist attacks of September 11, 2001. An increased demand for intelligence encouraged the development and implementation of surveillance tactics previous confined to the pages of science fiction, she wrote, and those tools today rival even what has already been unearthed by Read more…

Categories: Privacy Tags: , , ,

U.S. directs agents to cover up program used to investigate Americans

August 6, 2013 Comments off

chicagotribune.com

A slide from a presentation about a secretive information-sharing program run by the U.S. Drug Enforcement Administration’s Special Operations Division (SOD)

WASHINGTON (Reuters) – A secretive U.S. Drug Enforcement Administration unit is funneling information from intelligence intercepts, wiretaps, informants and a massive database of telephone records to authorities across the nation to help them launch criminal investigations of Americans.

Although these cases rarely involve national security issues, documents reviewed by Reuters show that law enforcement agents have been directed to conceal how such investigations truly begin – not only from defense lawyers but also sometimes from prosecutors and judges.

The undated documents show that federal agents are trained to “recreate” the investigative trail to effectively cover up where the information originated, a practice that some experts say violates a defendant’s Constitutional right to a fair trial. If defendants don’t know how an investigation began, they cannot know to ask to review potential sources of Read more…

Categories: Privacy Tags: , , ,

FBI pressures Internet providers to install surveillance software

August 5, 2013 Comments off

cnet.com

CNET has learned the FBI has developed custom “port reader” software to intercept Internet metadata in real time. And, in some cases, it wants to force Internet providers to use the software.

FBI headquarters on Pennsylvania Avenue NW in Washington, D.C.FBI headquarters on Pennsylvania Avenue NW in Washington, D.C.

(Credit: Getty Images)

The U.S. government is quietly pressuring telecommunications providers to install eavesdropping technology deep inside companies’ internal networks to facilitate surveillance efforts.

FBI officials have been sparring with carriers, a process that has on occasion included threats of contempt of court, in a bid to deploy government-provided software capable of intercepting and analyzing entire communications streams. The FBI’s legal position during these discussions is that the software’s real-time interception of metadata is authorized under the Patriot Act.

Attempts by the FBI to install what it internally refers to as “port reader” software, which have not been previously disclosed, were Read more…

10 Ways That The Iron Grip Of The Big Brother Prison Grid Is Tightening On All Of Our Lives

August 5, 2013 Comments off

endoftheamericandream.com

Trapped - Spider And WebDo you ever feel trapped in an invisible control grid that is slowly but surely closing in all around you?  Do you ever feel like virtually everything that you do is being watched, tracked, monitored and recorded?  If so, unfortunately it is not just your imagination.  Our society is rapidly being transformed into a Big Brother prison grid by a government that is seemingly obsessed with knowing everything that we do.  They want a record of all of our phone calls, all of our Internet activity and all of our financial transactions.  They even want our DNA.  They put chips in our passports, they are starting to scan the eyes of our children in our schools, and they have declared our border areas to be “Constitution-free zones” where they can do just about anything to us that they want.  The Bill of Rights has already been eroded so badly that many would argue that it is already dead.  The assault against our most basic freedoms and liberties never seems to end.  The following are 10 ways that Read more…

Categories: Privacy Tags: ,

NSA Whistleblowers: NSA Collects ‘Word for Word’ Every Domestic Communication

August 3, 2013 2 comments

washingtonsblog.com

Anyone Who Says the Government Only Spies On Metadata Is Sadly Mistaken

PBS interviewed NSA whistleblowers William Binney and Russell Tice this week.

Binney is the NSA’s former director of global digital data, and a 32-year NSA veteran widely regarded as a “legend” within the agency.  Tice helped the NSA spy with satellites.

Binney and Tice confirmed that the NSA is recording every word of every phone call made within the United States:

[PBS INTERVIEWER] JUDY WOODRUFF:   Both Binney and Tice suspect that today, the NSA is doing more than just collecting metadata on calls made in the U.S. They both point to this CNN interview by former FBI counterterrorism agent Tim Clemente days after the Boston Marathon bombing. Clemente was asked if the government had a way to get the Read more…

XKeyscore: The NSA program that collects ‘nearly everything’ that you do on the internet

August 2, 2013 1 comment

extremetech.com

Where is NSA's XKeyscore located?If you were shocked by the NSA’s Prism program, hold onto your hat: The NSA also operates another system, called XKeyscore, which gives the US intelligence community (and probably most of the US’s Western allies) full access to your email, IMs, browsing history, and social media activity. To view almost everything that you do online, an NSA analyst simply has to enter your email or IP address into XKeyscore. No formal authorization or warrant is required; the analyst just has to type in a “justification” and press Enter. To provide such functionality, the NSA collects, in its own words, “nearly everything a typical user does on the internet.” Perhaps most importantly, though, it appears that HTTPS and SSL might not protect your communications from Read more…

How secretly developed software became capable of tracking people’s movements online

February 12, 2013 Comments off

The U.S. government can track where you are, who you’re with, what you look like, and where you’ll likely be next thanks to a tool created by defense contractor Raytheon.

The tool, called Riot, or rapid information overlay technology, looks at your Twitter, Facebook, Gowalla, and Foursquare to determine Read more…