Category: BIG BROTHER


buckstopsherefrontsmall

From Sons of Liberty  – Use the link at left to see the entire post

The U.S. House of Representatives has passed a bill that would get the federal government heavily involved in microchipping disabled people for tracking purposes. If you would like to read it for yourself, you can find H.R. 4919 right here. The bill is also known as Kevin and Avonte’s Law, and the idea behind it is that if disabled people are microchipped it won’t be so easy for them to get lost. Of course we have been microchipping pets in this country for years, and this is yet another giant step down the road toward universal microchipping of everyone. We are being told that implanted microchips will make those with developmental disabilities “safer”, but where does this stop? Pretty soon there will be a huge push to microchip all children “for their safety”, and once that is accomplished it won’t be too long before they will want to microchip the entire population.

Unfortunately, most Americans did not even realize that this bill was being discussed. The following is what the Daily Caller had to say about the goals of this bill…

The Spy in YOUR pocket

 121022digital-340x170

Courtesy of Mozilla Firefox-   URL: https://myshadow.org/location-tracking

Location tracking

Location tracking gives a very detailed picture of who we are, where we go and who we spend time with. See how your location is tracked through your phone, your wifi connections, the websites you visit, and the social media platforms and email providers you use.

The spies in our pockets

Your devices – computers, mobile phones, and tablets – are constantly telling others where you are. Your mobile phone in particular is a very effective tracking device: Where you go, it goes, and it records your location all the time – even when you’re not connected to the internet.

Location data tells a detailed story

Location information collected over time can tell a surprisingly full story about who you are and what your life looks like. Add publicly-available addresses, tweets, photos, and/or your phone records, and the story gets really detailed.

Location information can reveal not just where you live and work, but also your visits to churches, clinics, bars, friends and lovers; it can show which protests you’ve participated in, or which political organisations or support groups you’re part of.

A map-based visualisation made recently by Open Data City and others shows how this works. Based on 6 months of communications records for Balthasar Glättli, a member of Switzerland’s Green Party, the visualisation gives a remarkable amount of insight into Glättli’s life.

In Germany, newspaper Die Zeit did a similar thing with the phone records of Green Party politician Malte Spitz, which Spitz got out of his mobile phone provider. The records included logs of calls and texts as well as location, which Zeit used to create a detailed visualisation about his life. His daily routine was crystal clear, as were any deviations from this routine. (Read more here)

Social Graph mapping

Location data can also be used to map out your relationships with others. If you and another person, or other people, are in the same place at specific times of the day, it’s possible to infer what relationships you have with these people – if, for example, they are co-workers, lovers, roommates, or family members. Or, to take another example, if you are a government employee and are in the same cafe as a specific journalist, you could be be flagged as a leaker.

Who wants this information, and why?
This kind of detailed picture can be valuable to all kinds of people and organisations. For one, it can be sold by companies to make money; it can also can be used to predict where you’ll be at a given point in the future; it can be used by governments.

 

Mobile phone towers and your phone

Mobile phone towers
To send and receive calls and messages, your phone must constantly communicate with mobile phone towers. This activity is monitored and logged by your mobile phone provider, allowing them to identify where you are and where you’ve been.

GPS tracking
Your smartphone is a GPS device. Most smart phones are equipped with a GPS chip and if your phone’s ‘location services’ are on it will communicate with the GPS satellites, allowing you and others to pinpoint your location to a remarkably accurate degree.

Location logs
Location information can then be logged by your phone and various apps on it. Most smartphones have a map app installed, and this goes so far as to log your location as you move, and even store where you’ve been in the past.

Who has access?
Your location history is accessible to anyone who has, or who can get, access to your phone. It is assumed that Google or Apple also have access to your phone’s location log, since they own the location tracking apps in the first place, as well as the Operating Systems (OSs) that almost everyone’s phones run on.

See your location logs

How do they know where I live? iPhoneUnless you’ve already turned off location services or frequent locations, your phone is probably logging your location on the device itself. On the iPhone, you can actually can see it mapped out.

If your phone is running iOS7 or a later version, go to Settings –> privacy –> location services –>  system services –> frequent locations –> select a city from your history list –>  and here’s the map.

How do they know where I live?
Again on an iPhone, you might see that the app has already identified and labeled where ‘home’ and  ‘work’ are. Apple uses an algorithm, or formula, that assumes that if your phone regularly stays in one place at night… that’s probably home. And if it stays in another place all day, that must be your workplace.

Are there other ways to map my movements on my phone?
Yes, you could install an app that we recommend called Open Paths (iPhone or Android).

Note: If you install the Open Paths app you will still be giving your personal location data to The New York Times company, who own the app.

Wifi history

Wifi History

There are two main ways your phone can give away location information when Wifi is enabled.

Before you’re even connected to a network
You’re in a new cafe, and you open your computer. Wifi functionality is on, as always. Hungry to connect, your computer will immediately start looking for a wifi network – but not just any old network. Ideally, it would like to connect to a network it already knows.
To find out if there are any of these in the vicinity, your computer will start broadcasting names of previous networks it has connected to. This could include cafes, workplaces, airports, friends’ houses, or community spaces.

Who has access?
The owner of the network, as well as anyone who can hack into this broadcast by, for example, setting up a fake network, could gain quite a detailed picture about where you’ve been.

Within a network
Some networks are set up with multiple access points – for example, a network that covers a big company or conference building (set up using something like a Wireless Distribution System). Once you’re connected to a wifi network like this, your movements can be tracked as you move from one access point to another.

See what this looks like
Visitors to the Re:publica conference in Berlin in 2013 were tracked in this way for a project by Open Data City – you can see their movements on an interactive map, here.

See your wifi history

There is no way to see your wifi connection history on an iPhone or Ipad, though you can delete all of your stored connections by going to
SettingsGeneralResetReset Network Settings.

On Android phones and on your computer (including Mac), you can see the wifi networks you’ve connected to before, and delete them individually.

Websites, social media platforms and email providers

IP addresses
When one of your devices connects to the internet, that device is assigned an IP address by the internet service provider of the network you’re on (yours, for example, or your work’s).

This IP address is a set of numbers that identifies who the internet service provider is, as well as where you are connecting from. The accuracy of this location depends on how that particular provider assigns IP addresses, but it’s likely to be somewhere between the street you’re in, and the city.

You can check your IP address here.   X: Note – On that page: For even more information, visit the More Info About You page.

Who has access?
Unless you’re using software that hides your IP, (eg Tor browser or a VPN), your computer shares your IP with every website and social media platform you visit.

Those who have access to your location information therefore include whoever owns the website you’re visiting, or who has access to the website’s analytics; any company running third party tracking technologies included in the website; or who is able to intercept your internet traffic.

See your recorded locations

Some services, like Gmail, Twitter and Facebook, record your location data in a way that you can access.

See location on TwitterIn Gmail go to → Details, next to the ‘Last account activity‘ on the right at the bottom of any Gmail page
On Twitter go to  → SettingsYour Twitter DataLogin history enter your password

‘Checking in’ on social platforms
On some social media platforms like Foursquare, Twitter or Facebook, there is a feature which allows you to ‘check in’ to a public  place like a restaurant, bar, museum, shop, or public building.

Who has access?
Anyone who wants to know. Check in to enough places over enough time, and you create a detailed public record of your movements and routines.

Adding locations to social media posts
Twitter, Facebook and others have the option to add your location to your post or tweets.

Who has access?
Unless your account is private or protected, this too could mean that what you’re actually doing is creating a detailed public record of your movements and routines.

Even if your account is only visible to a closed network of people, remember that things you post – including information about your location and movements – can still be shared by people in this network. This can happen by accident or because of lack of privacy awareness.

See your public location data

The website Please Rob Me shows you a stream of your location data, as shared via Twitter, Foursquare etc, so you might think harder next time you’re tempted to announce this information.

“The danger is publicly telling people where you are. This is because it leaves one place you’re definitely not… home.” (From the website Please Rob Me)

Your browser history

How does my browser history reveal where I’ve been?
Some search engines, like Google, see where you are from (your IP address), and then redirect you to a local version of their search engine. If you’re in Germany and you type in Google.com, you get redirected to Google.de, or in Costa Rica it will be Google.co.cr, and in Hong Kong Google.hk.

And the websites you visit are usually stored in your browser history (unless you have disabled this function, or clear your browser history regularly).

Who has access?
Anyone who has access to your computer or your browser. This includes trackers  (go here for more on browser tracking technology.

See your browser history

On your computer:
Firefox: historyshow all history
Chrome: historyshow full history

On iPhone OS:
Settings → find the browser you use → advancedwebsite data

On Android:
Open Firefox: History
Open Chrome: History

Photos, Google Maps and other sources of location data

If you have location information on your phone turned on for pictures, this information will get embedded in the picture (ie, the picture’s metadata will include where you took the picture). When you send or upload these pictures you can share your location data without thinking about it. Most social media providers extract location data when you upload the picture, but there are still many ways in which location data can be aggregated from the pictures you share.

Aljazeera’s Ask the Decoder column has a story that illustrates this quite well:  (Oct 8 2014):

In the summer of 2014, Android user Jean Yang returned from a trip through Europe to find a surprise package in her Google+ notifications: an organised photo scrapbook titled “Trip”. She hadn’t requested this, and hadn’t notified Google that she was going on holiday.

But she didn’t need to. Google’s algorithms could pick up the break in routine, and take an obvious guess that she was on holiday.

Google+ was able to organise her photos using a combination of information sources: geotags on photos (information embedded in the photos, providing the longitude and latitude of where the photo was taken), location information from Google Now or Maps, and GPS data. Google’s algorithms could have also identified locations using machine vision to match key landmarks. By the end of the trip – despite the fact that Jean’s phone was actually off most of the time – Google was able to pull together enough information to organize her photos in a location timeline.

Read Next:

See how you’re being tracked in your browser.

Control your data: Simple how-to’s

 

Courtesy of

My comment on this post:

Consider the percentage of homes that use cell phones only. (the following link is 5 and a half yrs old!) http://www.cbsnews.com/news/percentage-of-cell-phone-only-us-homes-doubles/

These you well know are a bell around your neck; moreover Caller I.D. built into the latest ones cannot be turned off. Does anyone even question these developments?  F no.

Facial recognition is a small part of the many ways Big Brother already has your number. (Pun intended)

Source: The Surveillance State: The Facial Recognition Nightmare

X here – Additionally, folks are encouraged to link everything together, including your landline.  Eliminating the landline provider is as bad as bundling your phone to their internet “service” just to save money; and there is little “savings”.  If the power goes out at your home, there is no phone service.  http://www.lavasurfer.com/info/replace-landline.html

A more recent post (2014) Suggests landlines are facing extinction:

41% of American homes are now wireless-only

Not good.

This time, it is a double edged sword.  Previously, on the rare occasion that a new credit card was sent to me, if chipped,  (despite having an RFID protective wallet) I would find the location, and use a paper punch to rid myself of this chip.  This meant the card could not be scanned, and only by “swiping” would a transaction be completed.

I recently received a new DEBIT card; I hadn’t opened the envelope for several days, and was surprised to find that it too had become chipped.  It contains a new set of account numbers I will need to memorize, and this occurred a good fifteen months prior to its original expiration date.  The header on the form containing the new card read “We’re replacing your current card which may be at risk for fraud”  *****RIGHT*****

As I was preparing to issue a check to my apartment manager for next months rent, I had not immediately de-chipped it.

Informing the manager of this new development, and my intention to de-chip it, I was told not to do this; apparently there is a new device (which 7-11’s are already implementing) that will not recognize your card,  if it doesn’t detect the chip.

Dated October 5, 2015, Via the FTC:

“To buy something in a store, instead of swiping your card, you’ll put it into a reader for a few seconds. Then you might have to sign or enter a PIN. With each transaction, the chip generates a unique code needed for approval. The code is good only for that transaction. Because the security code is always changing, it’s much more difficult for someone to steal and use.”

You should go to their site and check out some of the comments this post generated.  One demonstrates the need to keep up with notices you get about your existing cards.

I had one “encounter” with WFB, but it was their credit dept which was at fault.  The bank manager was on the line with them for the better part of an hour; the problem was corrected, but the credit dept never admitted they were at fault, and never sent a formal apology.  Some banks can be a total hemorrhoid when recognizing your consumer rights!

This example of technology being rammed down our throats is to be polite, disgusting.  How soon other merchants will adopt this technology is anybody’s guess.  The older stations that have you “swipe” your card will likely be replaced by these readers.   Essentially, this means you should shop around NOW rather than later for an RFID wallet, to avoid being scanned by a stranger in the course of doing business, and having your personal I.D. hijacked.

I could only hope this technology won’t apply to credit cards, though that is a somewhat forlorn hope…

I remain UNamused.   Please pass this along, and save others a migraine headache!

 

This info from

Missouri Education Watchdog

SOURCE

If  you agree that keeping our internet  free and open is important, if you enjoy the ability to search and access uncensored websites and media, PLEASE Contact your Congressman, your state legislators, Dept. of Commerce and ask them to NOT transfer internet authority to ICANN. Ask them to stop this transfer and instead hold public town halls, get public input, and include enforceable penalties for abuse, create  adequate guard rails that would ensure freedom of speech and protect internet privacy and security.

U.S. Dept of Commerce: (202) 482-2000

Contact info for your elected legislators:

From the Washington Examiner –

America to hand off Internet in under two months

The Department of Commerce is set to hand off the final vestiges of American control over the Internet to international authorities in less than two months, officials have confirmed.

** Title is link to this news item

Titles are links to Author’s posts

From Hammerhead Combat Systems:

Surveillance State: Push To Expand FBI Surveillance Authority Threatens U.S. Email Privacy Bill

“Currently, federal agencies do not need a warrant to access emails or other digital communications more than 180 days old due to a provision in a 1986 law that considers them abandoned by the owner.

But Republican party senators offered amendments Thursday that privacy advocates argued contravened the purpose of the underlying bill and would likely sink its chances of becoming law.

Those amendments include one by Senator John Cornyn, the second ranking Republican in the Senate, that would broaden the FBI’s authority to deploy an administrative subpoena known as a National Security Letter to include electronic communications transaction records such as the times stamps of emails and their senders and recipients.

Senators Patrick Leahy and Mike Lee, the Democratic and Republican authors of the email privacy bill, agreed to postpone the vote to give time to lawmakers to review the amendments and other provisions of the bill that have prompted disagreement.

NSLs do not require a warrant and are almost always accompanied by a gag order preventing the service provider from sharing the request with a targeted user.

The letters have existed since the 1970s, though the scope and frequency of their use expanded greatly after the Sept. 11, 2001 attacks on the United States.”

From JCscuba

Secret Text in Senate Bill Would Give FBI Warrantless Access to Email Records

A provision snuck into the still-secret text of the Senate’s annual intelligence authorization would give the FBI the ability to demand individuals’ email data and possibly web-surfing history from their service providers without a warrant and in complete secrecy. (S.B. : S.2344)

The spy bill passed the Senate Intelligence Committee on Tuesday, with the provision in it. The lone no vote came from Sen. Ron Wyden, D-Ore., who wrote in a statement that one of the bill’s provisions “would allow any FBI field office to demand email records without a court order, a major expansion of federal surveillance powers.” (Source)

Wyden did not disclose exactly what the provision would allow, but his spokesperson suggested it might go beyond email records to things like web-surfing histories and other information about online behavior. “Senator Wyden is concerned it could be read that way,” Keith Chu said.”

 

The words below, describing the influence of just one unique socialist many years ago on Hillary Clinton and Barack Obama, are very important to know, in order to understand what’s going on in the US today.

Saul Alinsky died about 43 years ago, but his writings influenced those in political control of our nation today.

Remember that Hillary did her college thesis on his writings and Obama writes about him in his books.  Both have publicly praised Alinsky frequently, even recently.

Died: June 12, 1972, Carmel-by-the-Sea, Ca

Education: University of Chicago

Spouse: Irene Alinsky

Books: Rules for Radicals, Reveille for Radicals

Anyone out there think that this stuff isn’t happening today in the U.S.? All eight rules are currently in play.

How to create a social state by Saul Alinsky:

There are eight levels of control that must be obtained before you are able to create a social state. The first is the most important.

1) Healthcare–  – Control healthcare and you control the people

2) Poverty –-  Increase the Poverty level as high as possible, poor people are easier to control and will not fight back if you are providing everything for them to live.

3) Debt – – Increase the debt to an unsustainable level. That way you are able to increase taxes, and this will produce more poverty.

4) Gun Control– – Remove the ability to defend themselves from the Government. That way you are able to create a police state.

5) Welfare –-  Take control of every aspect of their lives (Food, Housing, and Income).

6) Education –-  Take control of what people read and listen to; –take control of what children learn in school.

7) Religion –- Remove the belief in the God from the Government and schools.

8) Class Warfare –- Divide the people into the wealthy and the poor. This will cause more discontent and it will be easier to take (Tax) the wealthy with the support of the poor.

Does any of this sound like what is happening to the United States?

Alinsky merely simplified Vladimir Lenin’s original scheme for world conquest by communism, under Russian rule.  Stalin described his converts as “Useful Idiots.” The Useful Idiots have destroyed every nation in which they have seized power and control.

It is presently happening at an alarming rate in the U.S. If people can read this and still say everything is just fine, …they are “useful idiots.

“It is difficult to free fools from the chains they revere.”

I previously made a post about the “Forrest Gumping” of our educational system.  I go by the pseudonym “X”; or Professor X.

I have damned good reasons for doing so.

The video I now post, under the category Big Brother, shows exactly how I felt entering first grade, and encountering those FKG “Dick and Jane” books.

My god fearing mother had taught me phonetics at age four.  [decades later, this reading skill would be called “Phonics”]

I was reading at about the fourth grade level, and felt as if the system was trying to do a frontal lobotomy on me.  (No I couldn’t be that eloquent at six, and use that form of verbal expression; I merely felt what the title points out, being DUMBED DOWN.)

Mom had set up membership for me in a book club, which sent books via mail;  I’d already made a point of reading books outside of class.  I devoured books, bringing home at least three from the local library, per week.

Less than two years after I graduated high school,  I knew the system had started using Ritalin and other psychotropic drugs on children.  I hold that ADD, and ADHD is a ****ing  myth.

About 6:30 into this video, you discover that this horrid mechanism started before either of my parents were born.  That is when I did a “meltdown”, and decided to post it. God help us!

The Ripening Wanderer

https://theripeningwanderer.com/

The Clockwork Conservative

All wound up about politics, history, culture... lots of stuff.

blogsense-by-barb

at the Re-Birth of America!

ON MY WATCH - the writings of SamHenry

A Writer's Take on Global and National Issues with Background Information and Humor As Needed

Once Written

A Political Blog

Welcome to the Right Central

Under Construction.

markokloos.com

purveyor of space kablooie stories.

Truth in Palmyra

By Wally Fry

Truth and Shadows

Following the white rabbit

Pacific Paratrooper

This WordPress.com site is Pacific War era information

IHRA

The best in WWII aviation history

BUNKERVILLE | God, Guns and Guts Comrades!

God, Guns and Guts Comrades!

Aces Flying High

An Aussie's travels to air shows, aviation museums and related events around the world, with a bit of aerospace history along the way!

Eyes on Europe & Middle East

Des regards croisés sur l'Europe et le Moyen Orient

Doc Baize

Give me liberty or give me death!

partneringwitheagles

WHENEVER ANY FORM OF GOVERNMENT BECOMES DESTRUCTIVE OF THESE ENDS (LIFE,LIBERTY,AND THE PERSUIT OF HAPPINESS) IT IS THE RIGHT OF THE PEOPLE TO ALTER OR ABOLISH IT, AND TO INSTITUTE A NEW GOVERNMENT...

Chastisement 2014

He is ready to separate the chaff from the wheat with his winnowing fork

Decoded-Information

The Take Down Of America

The Dangers of Allah

Confused about Islam, Muslims, Taqiyya, Kitman, The Islamic State, and Sharia? I've spent 14 years studying these confused beings.  They are not at all what they want us to believe, especially those who are ruled by al Qaeda , ISIS and the Muslim Brotherhood as well as those who commit overt and covert Jihad while practicing Sharia tortures upon women

Treason Among Us

A blog by Guido Volante Author of "Treason Among Us; Secrets of the S.E.C."

The Counter Jihad Report

News ~ Resources ~ Activism

creepingsharia.wordpress.com/

Documenting the Islamization of America

Digestible Politics

Politics Made Easy!

A Conservative Christian Man

Stand for Your Belief or it is Not a Belief but an Excuse

sharia unveiled

illuminating minds

We Moved > Go To:

WWW.THEMADJEWESS.NET

%d bloggers like this: