Select Page

Category: Privacy

EFF To Court: Border Agents Need Warrants to Search Contents of Digital Devices

Electric Frontier Foundation Whether Conducted Manually or Using Forensic Software, Cell Phone Searches Are Highly Intrusive New Orleans, Louisiana—Searches of mobile phones, laptops, and other digital devices by federal agents at international airports and U.S. land borders are highly intrusive forays into travelers’ private information that require a warrant, the Electronic Frontier Foundation (EFF) said in a court filing yesterday. EFF urged the U.S. Circuit Court of Appeals for the Fifth Circuit to require law enforcement officers at the border to obtain a warrant before performing manual or forensic searches of digital devices. Warrantless border searches of backpacks, purses, or luggage are...

Read More

These Lawmakers Are Speaking out Against the FCC’s Plan to Dismantle Net Neutrality

Futurism A group of 10 lawmakers has written a comment regarding the FCC’s plan to move forward with a proposal that kills net neutrality. The plan would give ISPs the ability to limit a person’s control over which legal sites and services they could access online. THE LETTER OF THE LAW Under the leadership of Ajit Pai, the Federal Communications Commission (FCC) has announced plans to repeal net neutrality rules that were approved in 2015. These rules classify an internet service provider (ISP) as a “telecommunications service” and not an “information service.” Anyone can comment on the plan, which the FCC is calling “Restoring Internet Freedom,” via the FCC site until August...

Read More

What Will You Do When You Can No Longer Buy or Sell Without Submitting to Biometric Identification?

Humans Are Free In some areas of the world, payment systems that require palm scanning or face scanning are already being tested. We have entered an era where biometric security is being hailed as the “solution” to the antiquated security methods of the past. We are being promised that the constant problems that hackers are causing with our credit cards, bank accounts, ATM machines and Internet passwords will all go away once we switch over to biometric identification. And without a doubt, we have some massive security problems that need to be addressed.  But do you really want a...

Read More

DHS Outlines MANDATORY Biometric Scans at Airports for Foreign Travel [VIDEO]

DAHBOO77 Published on Jul 16, 2017 Over the past couple of months I’ve been covering some disturbing developments at national airports that seem to show an acceleration of the plan to use biometric identification in a variety of ways. On May 19th I reported on a new program initiated by Delta Airlines at Minneapolis-St. Paul airport to have automated baggage kiosks for “priority customers” that will first scan a traveler’s passport, then their face in order to match identity to checked luggage. It was promoted as a “pilot program” that Delta launched to seek customer feedback in the hope...

Read More

California Committee Advances Bill to End Unchecked Police Surveillance

Tenth Amendment Center SACRAMENTO, Calif. (July 14, 2017) –  Earlier this week, a second California Assembly committee passed a bill that would require all law enforcement agencies in the state to get local government approval before acquiring or using surveillance technology. Passage of the bill would take the first step toward limiting the unchecked use of surveillance technologies that violate basic privacy rights and feed into a broader national surveillance state. Sen. Jerry Hill (D-San Mateo) and Sen. Steven Bradford (D-Inglewood) introduced Senate Bill 21 (SB21) earlier this year. The legislation would require law enforcement agencies to propose a Surveillance...

Read More

WikiLeaks Exposes CIA Targeting Linux Users With OutlawCountry Network Traffic Re-Routing Tool

Hot Hardwire Another day, another government spying exploit rises to the surface courtesy of Wikileaks, this time originating from the CIA. This WikiLeaks data dump specifically lets us know of a CIA-engineeredspying tool called OutlawCountry (no space), which, interestingly enough, explicitly targets Linuxusers. You know, those digital freedom loving passionate penguin peeps that appreciate having great control over their computer? But don’t worry, the CIA has targeted Windows users en massein the past as well; absolutely no one has proven safe and they obviously don’t discriminate. OutlawCountry starts out as a Linux kernel module (nf_table_6_64.ko) that gets loaded into the system and subsequently creates a new entry in the iptables firewall configuration....

Read More

Congress Needs to End Warrantless Spying, Not Make It Permanent

EFF BY KATE TUMMARELLO JULY 1, 2017 Lawmakers are getting serious about renewing the U.S. government’s Internet spying powers, so we need to get serious about stopping their bad proposals. First out of the gate is a bill from Sen. Tom Cotton, an ardent defender of government surveillance. His bill would not just reauthorize, but make permanent the expiring measure that the government says justifies the warrantless surveillance of innocent Americans’ online communications—Section 702, as enacted by the FISA Amendments Act. His bill (S. 1297) is supported by several Republicans in the Senate, including Senate Intelligence Chairman Richard Burr and...

Read More

With a single wiretap order, US authorities listened in on 3.3 million phone calls

ZD Net NEW YORK, NY — US authorities intercepted and recorded millions of phone calls last year under a single wiretap order, authorized as part of a narcotics investigation. The wiretap order authorized an unknown government agency to carry out real-time intercepts of 3.29 million cell phone conversations over a two-month period at some point during 2016, after the order was applied for in late 2015. The order was signed to help authorities track 26 individuals suspected of involvement with illegal drug and narcotic-related activities in Pennsylvania. The wiretap cost the authorities $335,000 to conduct and led to a...

Read More

THE AGE OF NO PRIVACY: THE SURVEILLANCE STATE SHIFTS INTO HIGH GEAR

The Last American Vagabond “We are rapidly entering the age of no privacy, where everyone is open to surveillance at all times; where there are no secrets from government.” William O. Douglas, Supreme Court Justice (1966) The government has become an expert in finding ways to sidestep what it considers “inconvenient laws” aimed at ensuring accountability and thereby bringing about government transparency and protecting citizen privacy. Indeed, it has mastered the art of stealth maneuvers and end-runs around the Constitution. It knows all too well how to hide its nefarious, covert, clandestine activities behind the classified language of national security...

Read More

‘State trojans’: New German law enables police to hack into encrypted messengers

RT News German police may now hack into messengers like WhatsApp using “state trojans” to intercept user communications before they are encrypted on their devices, according to a new law swiftly passed by the parliament. The new legislation allows police investigators to use a “state trojan” to hack into a suspect’s mobile device, tablet, or computer, and get full access to their chat messages, video recordings, or other private data, German media reported. The “state trojans” could make it easier to bypass the encryption employed by popular messaging services, including WhatsApp, as they can gain access to data straight from...

Read More

CITES ACROSS THE COUNTRY ARE USING STREET LIGHTS EQUIPPED WITH MICROPHONES AND SURVEILLANCE CAMERAS TO SPY ON EVERYONE

Blacklisted News SOURCE: MASS PRIVATE I According to an article in the Mercury News, the City of San Jose, California is letting anyCOMM install 300-1,000 street lights equipped with surveillance cameras and microphones on their streets. “The council ultimately voted 7-4 to allow anyCOMM, a tech company with offices in El Dorado Hills, Gold River and San Jose, to install “nodes” which could have video and audio recording capabilities on 300 to 1,000 streetlights. The “pilot program” — as proposed by Mayor Sam Liccardo — would run for a year and only in pre-agreed upon areas.” The article goes on to say, that Siemens and anyCOMM...

Read More

‘Bots used to bias online political chats’

BBC News If you’ve been chatting about politics on social media recently, there’s a good chance you’ve been part of a conversation that was manipulated by bots, researchers say. The Oxford Internet Institute (OII) has studied such discussions related to nine places – US, Russia, Ukraine, Germany, Canada, China, Taiwan, Brazil and Poland – on platforms including Twitter and Facebook. It claims that in all the elections, political crises and national security-related discussions it looked at, there was not one instance where social media opinion had not been manipulated. Bots in propaganda Bots – programs that perform simple, repetitive...

Read More

REPORT: NONLETHAL WEAPONS COULD TARGET BRAIN, MIMIC SCHIZOPHRENIA

Wired Of all the crazy, bizarre less-lethal weapons that have been proposed, the use of microwaves to target the human mind remains the most disturbing. The question has always been: is this anything more than urban myth? We may not have the final answer to this question, but a newly declassified Pentagon report, Bioeffects of Selected Non-Lethal Weapons, obtained by a private citizen under the Freedom of Information Act, provides some fascinating tidbits on a variety of exotic weapons ideas. Among those discussed are weapons that could disrupt the brain, as well as my longtime obsession, the “Voice of God”...

Read More

In Rhode Island, students and parents must let schools spy on them day and night through their laptops

Boing Boing A majority of the Rhode Island school districts with “1-1” programs where each student is issued a laptop have a blanket policy of spying on the students and everything they do on their laptops, during, before and after school hours, on or off school premises, without any evidence (or even suspicion ) of wrongdoing. The schools analogize this to school locker searches, in which students are denied any Fourth Amendment protections. But that (very dubious) principle is being stretched beyond the breaking point, as school lockers are in schools, whereas these laptop searches are being carried out remotely, everywhere,...

Read More

New Patent Reveals Facebook Can Secretly Watch You With Your Camera, Here’s How to Stop It

The Free Thought Project A newly discovered patent ( Patent #: US20150242679 ), filed on behalf of the social media monolith, Facebook, is disturbing, to say the least — and, grounds for the immediate covering of your webcam or smartphone camera. The patent, titled, Techniques for Emotion Detection and Content Delivery, explains how the device’s camera will be used to view the user’s face to determine their mental state: ie sad, happy, angry, etc. When Facebook identifies your mental state, they will use it to keep you on the site longer. Facebook would analyze the images of your face...

Read More

#Vault7: CIA’s ‘Pandemic’ turns file servers into ‘Patient Zero’

RT News The latest WikiLeaks ‘Vault7’ release details an alleged CIA project allowing the spy agency to give file servers the capability to infect machines which access them remotely. ‘Pandemic’ reveals the role of a persistent implant for Microsoft Windows file servers, accessed by remote machines to run programs, according to a statement from WikiLeaks. The project acts as a ‘Patient Zero’ – a term used to describe the first identified carrier of a communicable disease during an outbreak. #Vault7: WikiLeaks outlines ‘CIA malware’ targeting #Microsoft Windows https://t.co/oNS1aQSqU0pic.twitter.com/vxSycLhdkP — RT (@RT_com) May 12, 2017 ‘Pandemic’ disguises itself on the...

Read More

7 In 10 Smartphone Apps Share Your Data With Third-Party Services

The Conversation Our mobile phones can reveal a lot about ourselves: where we live and work; who our family, friends and acquaintances are; how (and even what) we communicate with them; and our personal habits. With all the information stored on them, it isn’t surprising that mobile device users take steps to protect their privacy, like using PINs or passcodes to unlock their phones. The research that we and our colleagues are doing identifies and explores a significant threat that most people miss: More than 70 percent of smartphone apps are reporting personal data to third-party tracking companies like...

Read More

Translate

Help Galactic Connection Thrive

Our NEW Essences and Oils lines

~ ~ ~

Unplug From The Matrix! Remove Your Controlling Implants! Phase 1

Phases 2 & 3: Soul Alignment and DNA Sequencing

The Guardian Protection Initiation

Spiritual Past Life Clearings

Alchemical Organic Light Realignment Process and Anchoring Process

Preparing for the New Divine Blueprint

Co-Creating Your Desired Reality

Intrusion Removal And Divine Essence Retrieval

Alexandra’s Galactic Connection Alchemy

Psychic Protection Tools, Proclamations, and Suggestions

Follow us on YouTube!

Subscribe on iTunes!

Are You Feeling Isolated and Stuck?

Stand In Your Authority

Break The Chains That Bind You

Go With The Flow and Live In The Now

Whip Your Finances Into Shape