Tag Archives: Privacy

RFID Implant Law Hidden in Obamacare Calls For Implementation By March 2013

29 Mar
Logo of the anti-RFID campaign by German priva...

Image via Wikipedia

Copyright 2011-3011 Alternative News Forum, All Rights Reserved.

There are presently at least 64 articles and reports on Alternative News Forum pertaining to RFID Chips.

Another Hidden Secret in Obamacare: RFID Chip Implants

RFID technology is superb for inanimate objects like store inventory and shipping containers. That is not the issue. Inserting RFID chips into living human beings is insane, and should be outlawed. It is a documented fact that the chips cause bleeding oozing sores, tumors, and cancerous growths. Further, the use of RFID chip technology in living human beings is the ultimate breach of personal privacy and constitutes a heinous disregard for public health, safety, the sanctity of personal privacy and civil rights, including the freedom to move about in life without being surreptitiously surrveiled.

The mere fact that I should even need to write blog posts about this issue indicates a level of approaching spiritual depravity in our culture that is horrific. The fact that there is now a more or less complete absence of public outrage over laws tacitly written into Obamacare [ using “stealth legislation” techniques ] which mandate RFID technology to be used in people, indicates that the moral compass within our elected leaders may be spinning out of control.

If the American people do not immediately begin expressing their outrage and refusal to be “RFID chipped” like barnyard animals then that is exactly what you can expect to happen by the Spring of 2013. Speak out against RFID chipping people, for your own sake, for your children’s sake, for America’s sake for God’s sake. Do it now before it is too late.

Chase Kyla Hunter

Please apply the pressure where it hurts: Boycott all companies which are installing and secretly manufacturing hidden RFID chips & biometrics into their products, including Grocery stores.

See: WWW.SPYCHIPS.COM WWW.NOCARDS.COM

RFIDnyc-protest-8-13-08

Which American clothing manufacturers have secret item level RFID tagging and labeling plans? Click here to see.

Biometrics: People can also be tracked via RFID through their Nike Ipod Sport Kit – creepy, huh. Did you know?

You can be secretly tracked via RFID through your Nike Ipod Spot kit
You can be secretly tracked via RFID through your Nike Ipod Spot kit

calvin-closeup

This Calvin Klein fabric label was among the items featured at the Checkpoint RFID booth. Viewed from the front, it looks looks like an ordinary clothing label that would be sewn into the collar of a shirt or sweater. When the Calvin Klein clothing label is opened, the RFID device it contains can be clearly seen. Note the computer chip in the center of the tag and the metallic antenna extending from it. This chip contains a unique ID number that can be read remotely.Other disguises for hidden RFID chips can be seen in the photo below:tag-fronts 


Mobile Edge WSS Passport Wallet Protects RFID Passports
FYI: A few seconds in the microwave will nullify the RFID chip embedded in the spine of a passport.
FYI: A few seconds in the microwave will nullify the RFID chip embedded in the spine of a passport.

A couple weeks ago, we asked readers to weigh in on the news that the U.S. was going to be issuing passports with RFID chips embedded in them. Even though the passports are supposed to be shielded, and the chips will have a very short range, many of us are concerned about keeping our info private. (We also discussed the issue on Gearlog Radio, the September 13 podcast).

Matthew from Mobile Edgesaw the post and let me know that in Q4 of this year, the company will be shipping passport covers with extra shielding built in; might be the extra protection that makes us feel better about the whole thing:

“The new leather Mobile Edge Passport Wallet protects your passport from unwanted RFID access using their exclusive Wireless Security Shield™ (WSS) technology.  The patent pending design incorporates a Zinc lined material that has conductive fibers woven into the fabric, which blocks out electromagnetic waves and radio frequencies ensuring ultimate ID security. “

Implanting Microchips into Insects  US Military Develops ‘Cybug Spies’

Originally researchers sought to control insects by gluing machinery onto their backs, but such links were not always reliable. To overcome this hurdle, the Hybrid Insect Micro-Electro Mechanical Systems (HI-MEMS) program is sponsoring research into surgically implanting microchips straight into insects as they grow, intertwining their nerves and muscles with circuitry that can then steer the critters. As expensive as these devices might be to manufacture and embed in the bugs, they could still prove cheaper than building miniature robots from scratch.’

Read more…

===@&@===

This should silence the Naysay mouths whho believe that truth researchers are crazy conspiracy theorists. There is not a reason in God's universe for this chip to be designed as a Nazi SWASTIKA unless global fascism is being planned from behind the scenes.
This should silence the those who believe that truth researchers are crazy conspiracy theorists. There is not a reason in God’s universe for this chip shown above to be designed as a Nazi SWASTIKA unless global fascism is being planned from behind the scenes.

Example of Matrix loyalty card chip

RFID proponents would like to see all loyalty cards, ATM cards and other ID’s RFID enabled with chips like this. Imagine! Banks, retailers, supermarkets and governments could find out everything about you when you walk past a reader device since line-of-sight is not necessary to access the information. The radio waves could go right through your pants and through your wallet to get the information on the card’s chip. Imagine how valuable it would be for businesses to determine who is worth serving and who should be ignored!

For more information:

Members of the press can contact us as follows:

Dr. Katherine Albrecht
Co-author of Spychips: How Major Corporations and Government Plan to Track Your Every Move with RFID
Founder and Director, CASPIAN Consumer Advocacy
(Consumers Against Supermarket Privacy Invasion and Numbering)


telephone

877-287-5854
e-mail kma(at/@)spychips.com

Liz McIntyre
Co-founder of www.spychips.com
Co-author of the Spychips series of books

For information on RFID visit Spychips.com

====@&@====

Next step in H1N1 scare: Microchip implants

Company developing under-the-skin devices to detect ‘bio-threats’


Posted: August 22, 2009
11:50 pm Eastern

By Drew Zahn
© 2009 WorldNetDaily


VeriChip’s microchip implant, about the size of a grain of rice

A Florida-based company that boasts selling the world’s first and only federally approved radio microchip for implanting in humans is now turning its development branch toward “emergency preparedness,” hoping to produce an implant that can automatically detect in its host’s bloodstream the presence of swine flu or other viruses deemed a “bio-threat.”

VeriChip Corporation currently sells a small, under-the-skin Radio Frequency Identification capsule, or RFID, that patients can opt to have implanted, containing a number computer-linked to their medical records, enabling doctors with a special reader to access the information even if the patient is unconscious or unidentified. The company boasts its microchip, roughly the size of a grain of rice, is the only such implant approved by the U.S. Food and Drug Administration.

But VeriChip has also turned its attention to other uses for the technology, including microchips that be used to tag and log human remains after a disaster and implants the company hopes will be able to warn if their host is infected with the H1N1 swine flu virus, the H5N1 bird flu virus or other pandemic agents deemed to be a “bio-threat.”

VeriChip is working with a Minnesota company, Receptors LLC, to develop the virus-detection technology.

“As we continue to build on our partnership with Receptors, which started with the development of a glucose-sensing RFID implantable microchip, we are moving beyond patient identification to sensors that can detect and identify illnesses and viruses such as influenza,” said Scott R. Silverman, chairman of VeriChip, in a statement. “This is an exciting next step for the future of our healthcare division.”

According to a joint white paper released earlier this year by both companies called “An Integrated Sensor System for the Detection of Bio-Threats from Pandemics to Emerging Diseases to Bio-Terrorism,” the research’s goal is to transform existing glucose-detection technology into pinpointing viruses instead, then couple it with an “in vivo” – meaning implanted inside a living organism – microchip that can alert others of the virus’ presence.

The ultimate goal is to develop an implant that can also diagnose which virus is infecting the host.

VeriChip has also announced earlier this month additional forays into emergency preparedness through its VeriTrace system.

According to a statement, the company sold a VeriTrace system, including 1,000 RFID microchips, to Kentucky’s Green River District Health Department “for disaster preparedness and emergency management needs.”

The company explains that VeriTrace, a separate system from its virus detection or patient records technology, was created in the aftermath of Hurricane Katrina, where it was used by the Federal Disaster Mortuary Operational Response Team. The system includes the microchips, a Bluetooth handheld reader, a customized camera that receives both RFID scanned data and GPS data wirelessly and a web-based database for storing information and images captured during emergency response operations.

The microchips are implanted in human remains following a disaster or, according to one report from the Katrina catastrophe, duct-taped to bones, in order to maintain detailed records, particularly in events that result in hundreds or thousands of fatalities.

“This database ensures the precise collection, storage and inventory of all data and images related to remains and the associated evidentiary items,” the statement boasts. “This also allows the recreation of an accurate and complete reconstruction of a disaster setting, crime scene or similar setting where recreation is necessary.”

Since Hurricane Katrina, the RFID Journal reports, the Georgia Bureau of Investigation, the Hawaii Department of Health, the Florida Emergency Mortuary Operations Response System and the medical examiner’s office in the Department of Heath in Erie County, N.Y, have also purchased the system. Earlier this year, VeriChip announced sales to Maryland’s Calvert Memorial Hospital and to Mercer and Atlantic counties in New Jersey.

WND contacted VeriChip seeking information on its progress in developing the virus detection technology and other emergency preparedness microchip implants, but received no response.

WND previously has reported on such chips when hospitals used them to identify newborns, VeriChip desired to embed immigrants with the electronic devices, a government health event showcased them and when Wal-Mart used microchips to track customers.

// Bookmark and Share


Related: “Spychips: How Major Corporations and Government plan to Track your every Move”

“Who Killed the Constitution?”

“Legalize the Constitution!” magnetic bumper sticker

“Constitutional Chaos: What Happens When the Government Breaks Its Own Laws”

“The Patriot’s Handbook: A Citizenship Primer for a New Generation of Americans”

Get “Taking America Back,” Joseph Farah’s manifesto for sovereignty, self-reliance and moral renewal


Previous stories: Vigil protests mandatory chip implants

Radio chip coming soon to your driver’s license?

Dog bleeds to death from ID chipping

Hospitals tagging babies with electronic chips

Microchip maker ‘hid ties to cancer’

Powerful new radio chip unveiled

Powerful new radio chip unveiled

Chip-maker wants to implant immigrants

Employees get microchip implants

Hold off on that chip, says Thompson

GOP star to get chip implant

People tracking closer to reality

School daypack features satellite tracking

Theme park tracks all patrons

Paying for drinks with wave of the hand

Bio-chip featured at government health showcase

Wal-Mart used microchip to track customers

Shopping to go high-tech?

GPS implant makes debut

Miami journalist gets ‘chipped’

SEC investigating Applied Digital

Applied Digital gets reprieve from creditor

Implantable-chip firm misses final deadline

Implantable-chip company in financial straits

Dark side of supermarket ‘savings cards’

Post-9/11 security fears usher in subdermal chips

Supermarket cards threat to privacy?

‘Digital Angel’ not pursuing implants

Big Brother gets under your skin

‘Digital Angel’ unveiled

Human ID implant to be unveiled soon

Concern over microchip implants

Publix ranks #1
Supermarket chain retains top spot on customer satisfaction survey
For the 12th year in a row Publix Supermarkets has retained the top rating for supermarkets in the American Customer Satisfaction Index (ACSI)
<< click here for more information >>

Another one bites the dust
Brown and Cole of Seattle drops card program
A Seattle reader dropped us a note to let us know that local grocer Brown and Cole has decided to drop their dreaded card program.
<< click here for more information >>

SOLD, to the highest bidder!
Albertsons’ assets sold to CVS, Supervalue and investor group
After announcing late last year they were putting themselves on the auction block, Albertson’s has been sold.
<< click here for more information >>

A world divided
Why your shopping history may cost you
A collection of quips and quotes from the industry that demonstrate why customer specific marketing will soon be coming to a store near you.
<< click here for more information >>

Update: SmartBargains.com
Privacy policy updated after initial article
In an update from an earlier article, we take another look at the SmartBargains privacy policy
<< click here for more information >>

Name that… name?
Ebay isn’t just for knick knacks
It may be illegal to sell your kidney, but creative ebay sellers are selling things almost as dear.
<< click here for more information >>

Scandals

DHS Wants Beefed up RFID To Silently ID People 25 Feet Away

The VeriChip Can be Cloned, May Not Work When Needed

Ex-HHS Head Puts Off Being Chipped Despite July Promise

Ex-Bush cabinet member praises & recommends VeriChip

CASPIAN uncovers Government RFID Promotion Scheme

Mexican Chipping Overstated (CASPIAN reveals 18 officials chipped, not 160)

FDA letter outlines serious health risks from VeriChip human implants

Censored! CASPIAN told to remove incriminating RFID tagging photos

Photos of chipped CVS products, Kleenex, Huggies baby wipes

Calvin Klein and other clothing labels with hidden RFID tags

Mexican Attorney General and staff take RFID implants

Wal-Mart is RFID tagging in Texas! Call 1-800-Wal-Mart to complain!

Industry Attempt to Smear RFID Activist Katherine Albrecht
Grocery Manufacturers of America and Gillette CEO asked to explain

CASPIAN finds embarrassing confidential RFID documents
Talk of “pacifying” consumers, hoping for “apathy,” and bringing lawmakers into the “inner circle.” CASPIAN asks “How can we trust these people with our personal data?”

Metro “Future Store” hides RFID in shopper cards
Protest and backlash force a recall

Wal-Mart, P&G Caught in Secret RFID Test
Consumers used as guinea pigs for controversial technology

Daily Breaking News Headlines from Alligator Farm

========

While You Watched TV They RFID Chipped Your Nikes

Posted on 08/17/2009 by Chase Hunter

I’d like to welcome several more new members this week at http://2012poleshift.wetpaint.com

NEWS BRIEFS:

The fur is flying at town halls all over the USA as everyday people have awakened with a thunderclap to the realization that Obamacare has hidden Orwellian aspects that may be very harmful to personal health, well being and civil liberties. The people that laughed at this movement last year, calling us all out as racists in a cheap desperate shot,  are now creeping back to the web with their tails between their legs to quietly join the movement and start their own patriot blogs. The Spirit of Truth is moving and shaking. Today I discovered an RFID chip in the shape of a Nazi Swastika. It’s on a new post listed under “RFID Secrets”.

If there is no global fascist conspiracy to enslave humankind, why design a swastika into the RFID reader? Well duh.

So there you have it. This is serious stuff folks and it’s going on everywhere. Menawhile, 7/8ths of several million wetpaint wikis are dedicated as TV and movie “fan” sites. Absolutely bizarre.

Yep that’ s right. An entire generation of tens of millions of otherwise intelligent American people are living in fantasyland. Is it no wonder they have tacitly RFID chipped the Calvin Klein clothes labels, groceries,. Nike shoes, et al?

No one is watching. Everyone is too busy watching TV. It’s a world not just gone mad, it’s a world gone so deep into the rabbithole of television virtual reality that they can’t get out – these are people who are litrally psychologically addicted to TV, thus leaving the actuality of life to the RFID chippers and corporate globalists to foist their designs on us with impunity.

The future will belong to those who live in actuality.

Blessings!

Chase Hunter

Filed under: 21st Century Christians, Connecting The NWO Dots, Illuminated Christianity, New progressive Christians, RFID chips, RFID secrets, addicted to tv, american spiritual wasteland,connecting the dots, cult of barack obama, dark advertising deceptions, dumbed down america,earth changes, false messiah, hidden RFID plans exposed, imminent world change, network with other souls of light, spiritual life in america, virtual reality generation, virtual reality tv existence,work while you have the light | Tagged: addicted to tv, global fascism, RFID chips, RFID secrets,secret rfid technology, tv fan sites bizarre, virtual reality generation

Related Articles

Yahoo.com’s Email Privacy Policies, Datamining Accounts Without Your Consent

22 Mar
Headquarters of Yahoo! next to Mathilda Avenue...

Yahoo's Headquarters in California

Copyright 2011-3011 Alternative News Forum, All Rights Reserved.

Privacy is disappearing on the web, and the only real way to avoid having details about your life posted without your permission or consent is to NOT use the internet. Since many millions now depend on the web, this is not an option that works. I recently found out that all my yahoo.com emails were being read by someone, somewhere, on their back end, and the salient details about me were being harvested from them. This is also called “data mining.”

I was in a dialogue with a distant relative via email. This relative had not seen or heard from me in 20 years. I temporarily forgot where I was during our email exchange [which was on Yahoo.com email ] and told her my age.

Within 48 hours my age appeared in my Youtube.com channel, without my consent, without my permission and without me even knowing it until I logged and found it posted. I quickly deduced where this information had been datamined from. Someone from Yahoo.com had provided it to Google, which owns Youtube and it appeared in my Youtube account so quickly I was stunned. And furious too.

I need to warn all readers and subscribers not to EVER discuss anything of a private or confidential nature on yahoo.com email. Your emails are being archived, examined and harvested for details about you with each send.

I learned the hard way. What made this worse is that there is NO function now operative in the new youtube.com settings where you can remove your age from their database. Now every time I log into youtube my channel is hammered with ads for a certain age group that I have no interest whatsoever in viewing or clicking. Below are yahoo.com’s protocols for “deactivating” and then eventually deleting your account. All information that passed through the account, as far as I can tell from their statements, may be stored on their servers indefinitely. Not good.

Here it is. Read, and learn.

CK Hunter

Data Storage and Anonymization

In order to provide products and services, Yahoo! collects and stores information from user account registration and site usage. Yahoo!’s policy is to de-identify user log file data within 90 days of collection, with limited exceptions to fight fraud, secure systems, and meet legal obligations. Yahoo! takes additional steps so that data collected and used to customize interest based advertising and some content on Yahoo! are not associated with personally identifiable information. Yahoo! is committed to continuous improvements and implementation of our data protection and de-identification measures.  We describe the data we store, our processes and your choices in more detail here.

Account Information

  • When you register with Yahoo! or submit information to Yahoo!, a temporary copy of that information is routinely made to prevent accidental loss of your information through a computer malfunction or human error.
  • Yahoo! keeps your account information active in our user registration databases in order to provide immediate access to your personalization preferences each time you visit Yahoo!.
  • If you ask Yahoo! to delete your Yahoo! account, in most cases your account will be deactivated and then deleted from our user registration database in approximately 90 days. This delay is necessary to discourage users from engaging in fraudulent activity.
  • Please note that any information that we have copied may remain in back-up storage for some period of time after your deletion request. This may be the case even though no account information remains in our active user databases.

Servers Log Files

  • The Yahoo! computers (called “servers”) that send your web pages and advertising banners process and store an enormous amount of information every day. These computer records are called “log files”.
  • Log files are used for analysis, research, auditing, and other purposes, as described above. After this information has been used, it is stored and is inaccessible. Until the information is stored, your Yahoo! ID may remain in our active server log files.

Anonymization/de-identification

  • Anonymization is a process of removing or replacing personal identifiers in data records so that the resulting data is no longer personally identifiable. This is also referred to as de-identification. We use these terms interchangeably.
  • Yahoo! uses a multi-step process to replace, truncate, or delete identifiers in order to de-identify data.

Log file anonymization

  • Yahoo!’s anonymization policy applies to user log file data and includes searches, ad views, ad clicks, page views and page clicks.
  • Yahoo! stores this data in an identifiable form for up to 90 days for most log file data.
  • There are certain exceptions to this policy. Yahoo! will store a limited amount of log file data in identifiable form for up to 6 months for select log file systems involved in product and financial fraud detection and abuse management. There are also exceptions for legal obligations.

Your Interests and Yahoo!

  • Yahoo collects and maintains information about your interests based on your web surfing activity when you are visiting the branded Yahoo! network of web sites as well as when you are visiting other websites in the Yahoo! advertising network.
  • Yahoo! maintains information in both identifiable and de-identified forms. When you are signed-in to the Yahoo! network, Yahoo! associates your observed interests and activity with your Yahoo! account.
    • When you log in to your Yahoo! account, a cookie is placed on that computer which contains information about your interests. This is stored on the hard drive of whatever computer or device you are using when you log in. Your browsing habits on your work computer or a library computer may affect the kinds of advertisements you see when using your home computer.
    • Information that Yahoo! collects related to your activities and interests on and off the Yahoo! network is maintained by Yahoo! on its servers and is associated with Yahoo! cookies regardless of what computer or device you use to sign in to Yahoo!.
    • If you are a Yahoo! registered user who is not signed-in, Yahoo! will continue to store information about your interests based on a unique browser cookie. This cookie is an encrypted (or “one-way secret hashed”) form of a Yahoo! cookie that is de-identified from your Yahoo! account information. This de-identified cookie cannot be used by any third-parties to identify you.
    • When you are not signed in to Yahoo!, Yahoo! will use this encrypted cookie and its stored associated interest information, to match advertisements and content to your interests.

Your Preference and Opt-out Choices

  • To see and/or customize the information that Yahoo! has stored about interests that we use for advertising customization, you can visit our Ad Interest Manager. Ad Interest Manager allows you to opt out of one or more specific interest categories or opt out of all interest-based ads that Yahoo! serves.
  • Yahoo! refreshes cookie information for registered Yahoo! users each and every time you log in to Yahoo! on whichever computer or device you are using at that time. Accordingly, if you do not want Yahoo! to store your interests to deliver more relevant advertising, deleting your cookies will not be an effective way to express this choice. Instead, you should use the persistent opt-out that Yahoo! provides for you. If you are signed-in when you exercise the opt-out, your opt-out cookie will be refreshed each time you log in to Yahoo! – even if you have had previously deleted your cookies and/or moved to a new computer.
  • You can visit the Network Advertising Initiative site to see other networks that you may want to opt-out of or to use other tools to manage your opt-out choices.

My Zip Code is My Business, Not Yours, California

11 Feb
PC054257

Image by @@ i-cha-ri-ba-cho-de @@ via Flickr

Copyright 2011-3011 By Chase Kyla Hunter, All Rights Reserved.

One of the many odd things I noticed as I traveled through California during 2009 was the peculiar new invasion of personal privacy that occurred at the grocery check-out counter. After ringing up your groceries the clerk would ask you for your zip code when you began to pay. I would invariably reply:

1-2-3-4-5-6 or

blah-blah-blah-blah-blah-blah,

and then stare blankly at the poor befuddled clerk, who was usually someone long accustomed to doing whatever someone in authority told he or she to do, without ever stopping once to ponder why. They would try to explain the inane retail reason that my zip code was now needed to finish the transaction, upon which I would flatly reply:

“I have been buying groceries for at least 35 years. No one EVER needed my zip code to check me out before, and you don’t need it now. Wanna debate this? I think the courts will agree with me….”

And the clerk would agree it was silly, type zeros on the designated spot, ring me up and I was on my way.

Apparently at one particular local grocery store no one had mustered the courage to NOT comply with this newest invasion of privacy until I was observed refusing one day, and then the next 5 people in line refused also. I knew I was right, and I knew a court of law would agree. The courts have now caught up with me and they agree.

Big Lesson: It took one person saying “no” to yet another invasion of privacy for the next 6 people standing in line to realize that they too could say “no,” and so they did. I’m glad the California court system has done right by the people of California and that the courts agree with us. They have ruled that clerks may NOT require consumers in California to provide their zip code when they shop. Here’s the link.

http://www.latimes.com/business/la-fi-0211-privacy-20110211,0,6098077.story

Know your legal and civil rights. And remember the power of “no” in numbers.

Chase Kyla Hunter

Without A Trace: Tips for Using the Web with Little or No Digital Footprint

21 Jan

Reposted from the Web By Chase Kyla Hunter on 01.20.2011

Without a Trace

If you value your rapidly disappearing privacy while surfing the Internet you need to know about these tools. Whether you want to protect yourself from snoopers, want to spy on those out to get you, or want to be able to track trends that you know will lead to something big, then these tools will help you get the job done. The best part about them is they are FREE!

“If you have something that you don’t want anyone to know, maybe you shouldn’t be doing it in the first place.”

-Google CEO Eric Schmidt

Without a Trace

If you want to use the Internet without anyone knowing who you are or leave an untraceable phone number or email address, then these tools are for you.

  1. Big String. Big String offers self-destructing IMs and emails for those who don’t want any evidence of their online communications. Use with many popular IM clients.
  2. Mozilla Firefox, Portable Edition. This free web browser leaves no personal information on your computer. Not only can you use this anywhere, but no one will know you were there.
  3. x Paranoia mod. This Firefox extension is great for those who want to leave nothing behind on the computer. With a couple of clicks you can clear all your Internet history, passwords, cookies, and cache.
  4. Bugmenot.com. If you’ve ever had to register with a site just to read an article or watch a video, then you will want this tool. Find login information for many websites that require registration and never have to give your information again.
  5. 10 Minute Mail. Use this tool to get an email address that is good for 10 minutes, then expires. This is a great way to register with sites that require an email validation or just to cover your tracks.
  6. inumbr. Get a disposable phone number that you can use to forward calls to any other phone in the U.S. No one will be able to trace you with this number.
  7. GrandCentral. Here’s another phone option when you don’t want to be traced by your number. Consolidate all your phones into one with this tool that gives you one voice mailbox and one number for all your phones.
  8. drop.io. Want to share a top-secret online file with someone and then have no sign of the evidence later? This is the tool for you. The file is deleted after 30 days.
  9. Fake Name Generator. If you need a name, address, email, or even a UPS tracking code, use this handy tool to generate any one of the necessary fakes.
  10. cl1p.net. Create a note or upload a photo that you can keep for yourself or share, then delete it when you are finished with absolutely no sign of what you had.

Browsing Security

If you want to browse the Internet in privacy, these tools will help you do just that. Use these to do the actual browsing or to check the security of your browsing privacy.

  1. Hide My Ass!. Hide your identity with this free tool. This proxy service will hide your IP address so no one will know you.
  2. Tor. Like getting secreted away, this free service allows you to hide your Internet identity with a “network of virtual tunnels.” Join journalists, government agencies, and more who use Tor for the ultimate in Internet privacy.
  3. Guardster. Another proxy service that hides your IP, this one is available in both free and for a fee versions. The free version does not work with encrypted SSL sites.
  4. Megaproxy. Paste the URL for whatever website you want to visit into this tool and you will have a completely private look at your target site. No registration or downloads needed to use this tool.
  5. Scandoo. Get real time protection when surfing the Internet with warnings about websites before you click on them. Based on ScanSafe technology, this home version is free.
  6. ShieldsUP!. Check out this tool to learn what information your browser is sending out. You can also test the effectiveness of your personal firewall when running ShieldsUP! testing.
  7. Privoxy. Privoxy is an open source non-caching web proxy with advanced filtering capabilities for enhancing privacy, modifying web page data and HTTP headers, controlling access, and removing ads and other obnoxious Internet junk.
  8. What Is My IP Address?. Use this tool to ensure your IP blocking software is working correctly and not revealing your true IP address.
  9. Clusty. Use this search engine when browsing. Clusty doesn’t save your information or track you at all when you use it.
  10. Scroogle. Try searching Google with this tool. Scroogle uses SSL to send your search terms to Google with encryption, then does the same when sending the results back to you.

Computer Security

Using the Internet is a huge open door for people to stick their nose in your business. Use these tools to slam that door tightly shut.

  1. Malwarebytes’ Anti-Malware. This anti-malware software is one of the best tools available for removing crap from your computer. Best when used in conjunction with Ad-Aware to keep your PC 99.999% malware free.
  2. avast!. This free anti-virus software is one of the best available (for free or for a fee) at protecting your computer. This tool will alert you any time malware is detected and even checks incoming email. avast! also includes a boot-time scan option.
  3. Ad-Aware. The free version of this software does an excellent job of protecting your computer against spyware and adware. The paid version gives you real-time protection which is not available with the free one.
  4. Sandboxie. This free tool is great for both protecting your computer and getting rid of evidence. It works as a temporary storage area for information that would normally go to and from your hard drive. When you are finished in the “sandbox,” you can just clear it out.
  5. ThreatFire. Use this in conjunction with your anti-virus to fend off malware. ThreatFire detects malicious behavior such as capturing keystrokes and also serves to defend against zero-day threats.
  6. SnoopFree Privacy Shield. The ultimate free software for the ultra-cautious, this tool will detect any method of privacy invasion through your keyboard, screen, and open windows.
  7. Comodo Firewall. Keep out hackers with this free firewall. This program is one of the best when it comes to protecting your computer.
  8. WinPatrol. Protect your privacy and your computer with this free tool that works by alerting you to “hijackings, malware attacks and critical changes made to your computer without your permission.”
  9. AVG Free Anti-Virus. Get anti-virus and anti-spyware protection from this free software. This software also includes a scheduled scan option.
  10. TrueCrypt. This disk encryption software will keep nosey-parkers at bay. You can create a virtual encrypted disk, encrypt USB flash drives and hard drives, and more.
  11. Trustable Downloader. Download files from the Internet without worries of Trojans, worms, or viruses with this free application. As described, this tool will help guard you against government spying on its citizens.
  12. SiteAdvisor. This software alerts you before you visit a website that has spyware or harvests your information for spam. Use their color-coded system to alert you to the potential dangers of websites.
  13. Peer Guardian 2. This IP blocker is capable of blocking incoming and outgoing connections. You can also select to block spyware, adware, and educational and government ranges.
  14. GlowWorm FW Lite . Mac users can use this software to be informed when a program attempts to make an outgoing connection. Not only will this tool protect your information, it also guards against malware.

Laptop Tracking

If someone makes off with your laptop, know how to stop them with these tools.

  1. Adeona. If you want to guard against someone taking your laptop, check out this tool. This software continually tells you where your laptop is located without the interference of any third party to help you track and recover your computer.
  2. iAlertU. Another laptop protection and tracking device, this one specifically for Macs, this software is based off mouse and keyboard movement which sets off an alarm, takes a photo of the thief, and emails the photo to a specified email address.

Spying on Those Out to Get You

If you know someone is trying to get to you, then turn the tables on them with these tools that will help you get the dirt on them.

  1. GotVoice. Take advantage of the 14 day free trial to have your target’s voice mail sent directly to you. If you need more time, get another 14 day trial with different information.
  2. Decoding Social Security Numbers in One Step. You can’t get everything out of that magical number with this tool, but you can narrow down the state and year of issue with any social security number instantly.
  3. Keylogger. This free software allows you to log everything entered on the keyboard so you can track computer usage. Be sure to use the stealth mode so your target doesn’t know you are tracking him.
  4. Decode Your License. This article describes how you can get a driver’s license from any state and decode the barcode on it to receive personal information. You will need the Internet tool described in the article and a scanner.
  5. Webcam Spy. Use this software to spy on your target using a webcam. The software activates the webcam with a motion sensor for an auto on and off feature. Spying on your target isn’t the only use for this–you can also use it in your home to see who comes by when you are gone.

Maps for Monitoring Occurrences

Whether you are looking for evidence for your conspiracy theory or trying to put all the pieces together on a plot you know is about to be hatched, then these maps will help you get all the information you need.

  1. Global Incident Map. Find out where terrorism is occurring around the world with this mapping tool. You be able to find plenty of patterns to put together your own theories.
  2. HealthMap. This tool will keep you posted on health alerts. Find outbreaks by geographical location, disease, or chronological occurrence.
  3. Who is Sick?. This Google map-based tool shows symptoms for any geographical spot. You’ll be able to track any type of outbreaks with this tool.
  4. Incident1. Track police, fire, and emergency services on this map. You can also do a search by zip code or select a region within the states.
  5. Incidentlog. If you live in the northeast and couldn’t find anything on Incident1, try Incidentlog for more options. This map is populated from a different pool of data.
  6. Havaria Information Service Alert Map. Find everything from earthquakes to hazmat incidences to biological hazards on this world map. You can narrow the results by country if you don’t want to see the world view.
  7. GeoMAC Wildfire Information. This map shows where wildfires are currently burning throughout the United States or check out past wildfires since 2002.
  8. Piracy Attacks Maps. Pirates on the high seas are not a thing of the past. Use this map to track current piracy around the world.
  9. UNEP: Atlas of Our Changing Environment. Sponsored by the United Nations Environment Programme, this map includes incidents that document environmental changes around the world. Click on each incident to see photos and read the story.
  10. Google Maps Mania. This unofficial site follows the incredible array of various interactive maps being used in conjunction with Google Maps. Find a map that tracks your favorite passion or create one of your own.

 

 

Tags: internet privacy

5 Solid Reasons to Run Like Hell From Facebook’s New Email Messaging System

21 Nov

Copyright 2010-3010 By CK Hunter. Re-posts granted leaving essay intact only.

I written before about the creepy CIA and NCS [National Clandestine Service] connections to Mark Zuckerberg‘s neo-Orwellian Facebook empire. But just in case you have not been made aware, have a look at these historical items before you read on:

Facebook Messages: The Worst Thing That Ever Happened

Facebook Gone Bad:

 


Why You Should Run Like Hell from Facebook Messaging:

1. You cannot delete Facebook messages. Stop and ponder the horrific consequences just for one moment. Drunken opinionated thought orgies, changing your politics, irate rants about your spouse, boss, about religion, atheism, about ANYTHING are archived forever in the Orwellian bowels of Facebook and may be used in some future that we have not yet imagined to socially typecast, identify, prosecute, or otherwise harm or legally call you out, when 3, 5, or 10 years have passed and yiou havce long since left those obsolete opinions behind. This one fact should stop every intelligent Facebook user dead in their tracks, and make them genuinely take pause. It’s just exactly like being pulled over by the police when you were sure you were doing nothing wrong. Suddenly anything you do or say might just be used against you later in a court of law. You won’t know until you regretably say it, and you cannot call it back, not ever. Anyone who has ever mouthed off at a tired irritated police officer, and then later got the shit kiced out of them for it, should understand what I am saying here. If there was ever a moment to read between the lines, this is that moment. Call me alarmist, call me a wing nut, I DON’T CARE. I am warning young Americans and everyone else who uses Facebook, this fact alone makes it crystal clear to me that Facebook is not much more than a cleverly disguised social surveillance tool, and an emerging format for international politically correct thought police to call out people they want to target using their own words of years gone by to indict them with.

2. Locating individual emails or messages will be complicated and tedious in that: all of your communications with any one person will be bundled into one GIANT thread of e-mail, text, and chat communication. This also just happens to be very convenient for the FED should that moment ever arise that the FED wanted to examine and investigate every conversation you ever had with one of your more politically radical tea party buddies, whose tactics you might not agree with, but nonetheless, there it is for all of USA Big Brother’s eyes to see… 5 years of unbroken threads of dialogue between you and “firehose Sam” who you emailed off and on for a few years, then moved on. You won’t be able to go in and selectively delete those uncomfortable conversations you had with “Firehose Sam” about why he should not instigate whatever. Everything, the texts, emails, and chat items, that you exchanged with “Firehose Sam” will be bundled into one huge hairball that you cannot go in and selectively edit and delete later. This is yet another breach of personal privacy and can be damning to innocent Facebook users in years to come in ways that we cannot or do not wish to imagine at this time.

3. Whenever you send someone one email, text or chat message, they are automatically granted access to your entire Facebook account. The best analogy for this might be you answer the doorbell at home, the newspaper boy hands you your daily newspaper, and to thank him, you force him to take a guided tour of every room in your home and then hand him the house keys. No one in their right mind would ever do this, right? But Facebook users do it every day when they email someone who is not on Facebook, invite them to look at some posted photos, then the recipient must actually join Facebook (thus procuring access to your own Facebook page)in order  to view the photos. It’s Orwellian, it’s creepy, it’s way too mandatory, it’s unintelligent and unnecessary. Ever heard of email attachments? Just email over the photos from your regular email program as embedded attachments, and the recipient can, with one click, enjoy looking at the photos inside their own email in-box, and leave Facebook out of it. It’s more intelligent and it protects everyone’s privacy, and their fundamental right NOT to be forced to join the ongoing crazy Facebook party.

4. In order to make your Facebook account completely private, you will need to click-through 50 buttons and either select or deselect more than 170 other options as of 11/20/2010. This can change at any time, and assuming Facebook will continue to further complicate its own “privacy policy” frequently, you can assume that in the future, it will become so intentionally complex and time-consuming to alter your privacy settings, you can pretty much be assured that most people who are busy, will give up and use the Facebook defaults, allowing all kinds of third-party websites and companies to continuously datamine their account content. Facebook will continue to outsmart it’s smartest users in the future, when privacy laws in the USA will have been altered as the USA itself becomes politically altered and merged even more deeply into the North American Union. See the video clip below:

5. Watch these videos below:

If you think your Facebook account is secure, you are woefully uninformed about how sophisticated the hackers are in data-mining Facebook for their own purposes. Let’s use simple third grade logic. If hackers can do all of the above, then just assume that the CIA, FBI, NCS, NSA and so forth can and will do 100% more than that in order to investigate you, at any time, for any reason, without a warrant or a court order, without your knowledge or consent,just by using Facebook.

Chase Kyla Hunter

5 Solid Reasons You Should Run Like Hell From Facebook’s New Email Messaging System

20 Nov
Image representing Facebook as depicted in Cru...

Image via CrunchBase

Copyright 2010-3010 By CK Hunter. Re-posts granted leaving essay intact only.

I written before about the creepy CIA and NCS [National Clandestine Service] connections to Mark Zuckerberg‘s neo-Orwellian Facebook empire. But just in case you have not been made aware, have a look at these historical items before you read on:

Facebook Messages: The Worst Thing That Ever Happened

Facebook Gone Bad:

 


Why You Should Run Like Hell from Facebook Messaging:

1. You cannot delete Facebook messages. Stop and ponder the horrific consequences just for one moment. Drunken opinionated thought orgies, changing your politics, irate rants about your spouse, boss, about religion, atheism, about ANYTHING are archived forever in the Orwellian bowels of Facebook and may be used in some future that we have not yet imagined to socially typecast, identify, prosecute, or otherwise harm or legally call you out, when 3, 5, or 10 years have passed and yiou havce long since left those obsolete opinions behind. This one fact should stop every intelligent Facebook user dead in their tracks, and make them genuinely take pause. It’s just exactly like being pulled over by the police when you were sure you were doing nothing wrong. Suddenly anything you do or say might just be used against you later in a court of law. You won’t know until you regretably say it, and you cannot call it back, not ever. Anyone who has ever mouthed off at a tired irritated police officer, and then later got the shit kiced out of them for it, should understand what I am saying here. If there was ever a moment to read between the lines, this is that moment. Call me alarmist, call me a wing nut, I DON’T CARE. I am warning young Americans and everyone else who uses Facebook, this fact alone makes it crystal clear to me that Facebook is not much more than a cleverly disguised social surveillance tool, and an emerging format for international politically correct thought police to call out people they want to target using their own words of years gone by to indict them with.

2. Locating individual emails or messages will be complicated and tedious in that: all of your communications with any one person will be bundled into one GIANT thread of e-mail, text, and chat communication. This also just happens to be very convenient for the FED should that moment ever arise that the FED wanted to examine and investigate every conversation you ever had with one of your more politically radical tea party buddies, whose tactics you might not agree with, but nonetheless, there it is for all of USA Big Brother’s eyes to see… 5 years of unbroken threads of dialogue between you and “firehose Sam” who you emailed off and on for a few years, then moved on. You won’t be able to go in and selectively delete those uncomfortable conversations you had with “Firehose Sam” about why he should not instigate whatever. Everything, the texts, emails, and chat items, that you exchanged with “Firehose Sam” will be bundled into one huge hairball that you cannot go in and selectively edit and delete later. This is yet another breach of personal privacy and can be damning to innocent Facebook users in years to come in ways that we cannot or do not wish to imagine at this time.

3. Whenever you send someone one email, text or chat message, they are automatically granted access to your entire Facebook account. The best analogy for this might be you answer the doorbell at home, the newspaper boy hands you your daily newspaper, and to thank him, you force him to take a guided tour of every room in your home and then hand him the house keys. No one in their right mind would ever do this, right? But Facebook users do it every day when they email someone who is not on Facebook, invite them to look at some posted photos, then the recipient must actually join Facebook (thus procuring access to your own Facebook page)in order  to view the photos. It’s Orwellian, it’s creepy, it’s way too mandatory, it’s unintelligent and unnecessary. Ever heard of email attachments? Just email over the photos from your regular email program as embedded attachments, and the recipient can, with one click, enjoy looking at the photos inside their own email in-box, and leave Facebook out of it. It’s more intelligent and it protects everyone’s privacy, and their fundamental right NOT to be forced to join the ongoing crazy Facebook party.

4. In order to make your Facebook account completely private, you will need to click-through 50 buttons and either select or deselect more than 170 other options as of 11/20/2010. This can change at any time, and assuming Facebook will continue to further complicate its own “privacy policy” frequently, you can assume that in the future, it will become so intentionally complex and time-consuming to alter your privacy settings, you can pretty much be assured that most people who are busy, will give up and use the Facebook defaults, allowing all kinds of third-party websites and companies to continuously datamine their account content. Facebook will continue to outsmart it’s smartest users in the future, when privacy laws in the USA will have been altered as the USA itself becomes politically altered and merged even more deeply into the North American Union. See the video clip below:

5. Watch these videos below:

If you think your Facebook account is secure, you are woefully uninformed about how sophisticated the hackers are in data-mining Facebook for their own purposes. Let’s use simple third grade logic. If hackers can do all of the above, then just assume that the CIA, FBI, NCS, NSA and so forth can and will do 100% more than that in order to investigate you, at any time, for any reason, without a warrant or a court order, without your knowledge or consent,just by using Facebook.

Chase Kyla Hunter

FEDs Are Using Your Cell Phones to Track, Surveil You Without A Warrant: Did You Know?

26 Feb
Out Geeking with mobile phones

Image by Annie Mole via Flickr

2.25.2010

We’re headed toward a surveillance society, London style, if people do not speak out against warrantless tracking and surveillance of people in America. The latest breach of privacy: FEDS are using people’s cell phones to follow them with obtaining a warrant. That’s not even legal.

CK Hunter

Here’s the story and related info:

Law enforcement is tracking Americans’ cell phones in real time—without the benefit of a warrant.

Amid all the furor over the Bush administration’s warrantless wiretapping program a few years ago, a mini-revolt was brewing over another type of federal snooping that was getting no public attention at all. Federal prosecutors were seeking what seemed to be unusually sensitive records: internal data from telecommunications companies that showed the locations of their customers’ cell phones—sometimes in real time, sometimes after the fact. The prosecutors said they needed the records to trace the movements of suspected drug traffickers, human smugglers, even corrupt public officials. But many federal magistrates—whose job is to sign off on search warrants and handle other routine court duties—were spooked by the requests. Some in New York, Pennsylvania, and Texas balked.

Prosecutors “were using the cell phone as a surreptitious tracking device,” said Stephen W. Smith, a federal magistrate in Houston. “And I started asking the U.S. Attorney’s Office, ‘What is the legal authority for this? What is the legal standard for getting this information?’ “

Those questions are now at the core of a constitutional clash between President Obama’s Justice Department and civil libertarians alarmed by what they see as the government’s relentless intrusion into the private lives of citizens. There are numerous other fronts in the privacy wars—about the content of e-mails, for instance, and access to bank records and credit-card transactions. The Feds now can quietly get all that information. But cell-phone tracking is among the more unsettling forms of government surveillance, conjuring up Orwellian images of Big Brother secretly following your movements through the small device in your pocket.

//

How many of the owners of the country’s 277 million cell phones even know that companies like AT&T, Verizon, and Sprint can track their devices in real time? Most “don’t have a clue,” says privacy advocate James X. Dempsey. The tracking is possible because either the phones have tiny GPS units inside or each phone call is routed through towers that can be used to pinpoint a phone’s location to areas as small as a city block. This capability to trace ever more precise cell-phone locations has been spurred by a Federal Communications Commission rule designed to help police and other emergency officers during 911 calls. But the FBI and other law-enforcement outfits have been obtaining more and more records of cell-phone locations—without notifying the targets or getting judicial warrants establishing “probable cause,” according to law-enforcement officials, court records, and telecommunication executives. (The Justice Department draws a distinction between cell-tower data and GPS information, according to a spokeswoman, and will often get warrants for the latter.)

The Justice Department doesn’t keep statistics on requests for cell-phone data, according to the spokeswoman. So it’s hard to gauge just how often these records are retrieved. But Al Gidari, a telecommunications lawyer who represents several wireless providers, tells NEWSWEEK that the companies are now getting “thousands of these requests per month,” and the amount has grown “exponentially” over the past few years. Sprint Nextel has even set up a dedicated Web site so that law-enforcement agents can access the records from their desks—a fact divulged by the company’s “manager of electronic surveillance” at a private Washington security conference last October. “The tool has just really caught on fire with law enforcement,” said the Sprint executive, according to a tape made by a privacy activist who sneaked into the event. (A Sprint spokesman acknowledged the company has created the Web “portal” but says that law-enforcement agents must be “authenticated” before they are given passwords to log on, and even then still must provide valid court orders for all nonemergency requests.)

//


There is little doubt that such records can be a powerful weapon for law enforcement. Jack Killorin, who directs a federal task force in Atlanta combating the drug trade, says cell-phone records have helped his agents crack many cases, such as the brutal slaying of a DeKalb County sheriff: agents got the cell-phone records of key suspects—and then showed that they were all within a one-mile area of the murder at the time it occurred, he said. In the fall of 2008, Killorin says, his agents were able to follow a Mexican drug-cartel truck carrying 2,200 kilograms of cocaine by watching in real time as the driver’s cell phone “shook hands” with each cell-phone tower it passed on the highway. “It’s a tremendous investigative tool,” says Killorin. And not that unusual: “This is pretty workaday stuff for us.”

But there is also plenty of reason to worry. Some abuse has already occurred at the local level, according to telecom lawyer Gidari. One of his clients, he says, was aghast a few years ago when an agitated Alabama sheriff called the company’s employees. After shouting that his daughter had been kidnapped, the sheriff demanded they ping her cell phone every few minutes to identify her location. In fact, there was no kidnapping: the daughter had been out on the town all night. A potentially more sinister request came from some Michigan cops who, purportedly concerned about a possible “riot,” pressed another telecom for information on all the cell phones that were congregating in an area where a labor-union protest was expected. “We haven’t even begun to scratch the surface of abuse on this,” says Gidari.

That was precisely what Smith and his fellow magistrates were worried about when they started refusing requests for cell-phone tracking data. (Smith balked only at requests for real-time information, while other magistrates have also objected to requests for historical data on cell-phone locations.) The grounds for such requests, says Smith, were often flimsy: almost all were being submitted as “2703(d)” orders—a reference to an obscure provision of a 1986 law called the Stored Communications Act, in which prosecutors only need to assert that records are “relevant” to an ongoing criminal investigation. That’s the lowest possible standard in federal criminal law, and one that, as a practical matter, magistrates can’t really verify. But when Smith started turning down government requests, prosecutors went around him (or “judge shopping,” in the jargon of lawyers), finding other magistrates in Texas who signed off with no questions asked, he told NEWSWEEK. Still, his stand—and that of another magistrate on Long Island—started getting noticed in the legal community. Facing a request for historical cell-phone tracking records in a drug-smuggling case, U.S. magistrate Lisa Pupo Lenihan in Pittsburgh wrote a 56-page opinion two years ago that turned prosecutors down, noting that the data they were seeking could easily be misused to collect information about sexual liaisons and other matters of an “extremely personal” nature. In an unusual show of solidarity—and to prevent judge shopping—Lenihan’s opinion was signed by every other magistrate in western Pennsylvania.

The issue came to a head this month in a federal courtroom in Philadelphia. A Justice Department lawyer, Mark Eckenwiler, asked a panel of appeals-court judges to overturn Lenihan’s ruling, arguing that the Feds were only asking for what amounted to “routine business records.” But he faced stiff questioning from one of the judges, Dolores Sloviter, who noted that there are some governments, like Iran’s, that would like to use such records to identify political protesters. “Now, can the government assure us,” she pressed Eckenwiler, that Justice would never use the provisions in the communications law to collect cell-phone data for such a purpose in the United States? Eckenwiler tried to deflect the question, saying he couldn’t speak to “future hypotheticals,” but finally acknowledged, “Yes, your honor. It can be used constitutionally for that purpose.” For those concerned about what the government might do with the data in your pocket, that was not a comforting answer.

Re-post courtesy  Newsweek

Reblog this post [with Zemanta]
%d bloggers like this: