Better Than Any HYIP Privacy-Rights-Army.com
JOIN the FIGHT to REGAIN OUR PERSONAL PRIVATE DATA RIGHTS..........
Most do not know it, but your private personal data is a commodity which thousands of companies are earning billions off of, but did you give your permission? Most don't have a clue, but the PrivacyArmy does, and so will you when you register.
How do we stop it, simple, under commercial law if you contract with an entity, such as we have established, and you do not want your personal private date illegally violated, then we as a poweful group can initiate a class action against any company who uses our data again.
We have a patent pending legal strategy to recoup billions from this illegal activity of selling our personal private data to other companies. We will not only sue the companies who are selling our data, but we will also sue those who purchase it, and this includes 30,000 companies we have identified to date who are selling, while hundreds of thousands are purchasing our data.
If you remember the tobacco class action suits, you will get an idea of how many hundreds of millions there are at stake. WE, as registered members will pool all proceeds from all class action suits won and devide it equally amoung members. The potential is enormous, and with our press releases soon to begin, get positioned TODAY.
We have arranged to have the same law firms who won tobacco suits working for us. We need to increase our associations registered membership to handle the millions of potential leads we will generate in press releases, and we will each be paid to assist these interested citizens to register and join the war against our rights be violated. With over 100,000,000 already registered on the DO NOT CALL list, don't think for a minute people are not concerned about their personal private data being violated. These same companies who no longer can call us on list means little, they still have our data and use it in mailings.
JOIN US TODAY and SECURE YOUR PERSONAL DATA TOMORROW.............
BETTER THAN ANY HYIP YOU WILL EVER LOSE MONEY IN.......................
SHARE IN THE HUNDREDS OF MILLIONS CLASS ACTION SUITS.................
Short term income is amazing, mid term even more amazing, but the potential long term class action suit proceeds will be awarded to each of us as a lifetime of PASSIVE income, just like HYIPsters have promised over and over, but never delivered on. Time to WAKE UP PEOPLE.....EARN REAL MONEY USING THE LEGAL SYSTEM TO OUR MUTUAL BENEFIT. NO MORE WASTING MONEY ON SCAMS, PONZI's, PYRAMIDS and HYIP's.
__________________
Wake Up People......you Are Being Ripped Off???
WAKE UP PEOPLE................LATEST UPDATE YOUR PRIVACY VIOLATIONS
Consumer Reports makes this abundantly clear in the Oct 6th issue. Going beyond this to the aggressive snooping sophistication is exposed by Kathryn Albrecht in her book Spychips , a #1 best-seller in America. Millions have read her book and been scared witless. The problem is that those who expose the problems have no answers other than ranting and moaning.
Only YOU and I TOGETHER are the answer, taking effective action.
Let me point out a strategy clarification regarding filing our opt-out letters with our vendors. Rather than piecemeal them in ones and twos, the Privacy Army strategy is to target specific vendors at one time with an avalanche of opt-out letters from masses of our people, each backed up by matching letters from our law firms averring that they have knowledge of a contract in force for each of us which gives us legal standing to have asserted our rights and be emotionally damaged and financially damaged by the continuing selling of our data by the vendor. We shall be contacted at the time and we each make our individual decision for each targeted firm as to our own participation in that particular outreach. Fully ethical and chillingly effective. Imagine yourself being an officer of one of these privacy piracy corporations and you receive thousands of letters during the same week from thousands of individuals with the same branding and coupled in each case by a letter from known, powerful class-action attorneys. Now imagine your reading that you are reading being put on legal notice that to resist opting each of us out of the continuing selling of info for each of the plaintiffs demonstrates a pattern of repetitive, purposeful defrauding of members of the class, which initiates RICO laws. Now you know that you can no longer hide behind the corporate veil. You learn that you cannot escape even by quitting your job, because you were in position when the theft-reselling violations took place. You have now two choices : either let these families off the hook by removing them and their data from future sales, or else face the personal and corporate consequences of your resistance. As you compare this collective, thoughtful action to regain control of our own private property, do you think you would have the same impact by writing your own letter to the same pirates ? [we should be able to hear their laughter from where we sit ].
Privacy Piracy Snooping & Cross-Referencing
In order to add value to their respective data files
on you, the data moguls dig deeply into all available
records, public and private. Is this what you want ?
Utility company info Settlements in the past
Past Employment info Garnishments
Present employment info Liens
Mortgage info Levies
Real Estate info Debt records
Medical info Newspaper clippings
Bank account(s) info Savings accounts
Credit card(s) info Checking accounts
Debit card(s) info Insurance policies in force
Department store info Retirement accounts
Fuel card info Ownership of debt instruments
Wholesale card info Ownership of equities
Grocery store info Travel patterns, history
Pharmacy info Hobbies
Car dealership info Disabilities of record
Tax preparation info Military record
Internet surfing habits info Veteran records
Affiliate group info Preferences for every category
Alumni assoc. info Mother's maiden name
Health insurance info Every password/non-secure sites
Car insurance info Answers to password questions
Life insurance info Every email address
Friends & others who have been references
Membership info for all group involvement
Passport info Names of all relatives and addresses
Drivers license info Every past street address
Hospital data Schools of your kids, grand kids
Viewing data from satellite TV & cable TV
Birth records Linkage to past spouses
Marriage records Online purchase history
Divorce records Every check you have ever written
Civil suit records Every traffic incident of your life
Criminal records Current pending suits
Credit complaints pending Above sold daily to all who pay for it.
WAKE UP PEOPLE.............PUT YOUR MONEY IN A REAL DEAL,
NOT THE TYPICAL RIP OFF HYIP. THIS LEGAL CLASS ACTION
POOL WILL PAY OFF BETTER THAN ANY HYIP I HAVE SEEN.
Good luck to all, Mike
Wake Up People..........you Are Being Ripped Off???
Google privacy battle likely to end in compromise
Dominic Timms
Wednesday March 15, 2006
MediaGuardian.co.uk
A legal battle between the US justice department and internet giant Google looks set to end in compromise, after a US judge signalled he intended to make the company surrender some, but not all, of the data on its huge search database. The US district court judge James Ware told a hearing last night he would make a decision "very quickly", adding that he would allow the justice department access to some of Google's index of websites and search terms.
The two sides came to court after Google refused the demands of the attorney general, Alberto Gonzales, to hand over records of the searches made on its website in January, to aid the administration in its battle against online child pornography.
In January, the justice department had demanded access to records of more than 1 million searches but it has dropped its demands to just 50,000 URLs - internet addresses - and 5,000 search terms of which, it said, it would only look at 1,000.
Judge Ware said he remained concerned about Google users' privacy but said the reduced requests, coupled with a government promise to compensate the company for lost programming days, meant he would grant the government at least some of its demands.
"It is my intent to grant some relief to the government," said Judge Ware of the US district court for the Northern District of California.
Facing similar demands from the justice department, other internet operators such as AOL, Microsoft and Yahoo! have agreed to hand over similar records.
* * * *
Thought you would like to see more into the trend. Insatiable appetites for info exceeding the Nazis. Who cares eough to act ?
I think you know who.
Good luck to all, Mike
Timing Is Everything.......PRIVACY-RIGHTS-ARMY.com
Your PRIVACY For Sale
is the title of a feature investigative article in the October issue
of Consumer Reports (pg. 41) just released today!
____________________________________
Here's the CR Quick Take...
Large data brokers have your numbers---Social Security, phone,
and credit cards. They might also know about the drugs you take,
what you buy, your political party, and your sexual orientation.
When we investigated this secretive industry, we discovered:
>> Data brokers are willing to sell even your most sensitive
information to paying customers, some of them crooks.
>> When CR staffers asked to see their own files, they received
scant information. One report contained 31 errors.
>> The federal government is a steady customer of the data collectors,
but there's no way to know what it collects or exactly how much it pays.
>> Pretexters, who lie to get information about you and sell it to anybody,
operate largely free of regulation.
A case in point is Elizabeth Rosen. Until Valentine's Day weekend 2005,
she had never heard of ChoicePoint. But ChoicePoint, it turns out, knew
plenty about her. That's when Rosen, a nurse in California, received a letter
and found out that the Alpharetta, Georgia company had collected information
about her. Among the sensitive items it had: Social Security number, records
of her insurance claims, her current and past addresses, and her employment
history. Now, ChoicePoint was informing her that it had inadvertently disclosed
her information --- and that of 165,000 other Americans --- to a group of criminals.
What galls Rosen more, she says, is that all along, ChoicePoint itself "was
profiting by collecting and selling confidential information about me without my
knowledge or consent."
If you don't think you're confidential information is being sold, just type
your name and click your state on this search engine:
http://www.zabasearch.com
Now, who would pay $49.95 for your Social Security number, address, phone
number and other information? How about 13 million illegal aliens!
According to this past Sunday edition of the Atlanta Constitution, this affected
8.9 million Americans, a loss of $56.7 billion ($6343/per person) last year!
Would you like to know how to recover your privacy and
make money selling the information you don't mind selling?
Just call in Thurs/Aug30 at 9:20pm EST, 8:20pm CST, 7:20pm MST, 6:20pm PST
Call in Number: (620) 294-4000 Pin: 988055#
WAKE UP PEOPLE..............
WAKE UP PEOPLE.....Timing Is Everything..Privacy-Rights-Army.com
ANNOUNCEMENT.....................
All around us we are seeing the facts come to the surface about our privacy being violated every singe day of our lives. What is wrong with people who do not care? This is the reason we are all in this situation, WE LET IT HAPPEN. If you don't value your Constitutional Rights to Privacy, then you will lose it.
Timing is everything in life, and here we have an opportunity to spread the word of what the PrivacyArmy is all about, it is ABOUT YOU, ME and EVERYONE in the free world. Why anyone would not get involved with us is beyond my comprehension. ROL members are international, this we know, but for those in U.S. and CAN to start is just the beginning.
Over the years I have seen many opportunities come and go, and I have researched thousands, but I have never seen one even close to what we have here. A common interest of everyone in these days where we see how our personal private data is being sold to hundreds of thousands every day. How does this make you feel when commercial enterprises are profiting off of YOUR NAME?
I don't know how to better put it, this is ILLEGAL. DO YOU CARE ABOUT YOUR PERSONAL PRIVACY RIGHTS? Well, evidently not for only a few dozen have registered to date. We have not yet officially launched, but come on, it is FREE and you can EARN while you LEARN, so what is it, you DON'T CARE about companies profiting off YOUR PERSONAL PRIVATE DATA?
Bottom line is this, we are being robbed, and unless you do something about it, it will not stop, and in fact, it is getting worse every day. No matter who you are, you are being robbed, so when are you going to wake up and put your foot down and STOP IT? Do it TODAY. If not for the reasons listed above, then do it OUT OF GREED. (g)
For those who are more interested in making money than preserving our Constitutional Rights to Privacy, then fine, that is OK with me. We are all money motivated or we would not be here on this forum. We have all lost money, and we see many complaining about it, so lets do something to change this around. PrivacyArmy is just such an opportunity which can and will change your life and provide you financial freedom.
Skeptical, yes, so way I, but once you learn what I have, this is better than anything I have ever seen before, and believe me, I have seen it all. (g) We are all people who enjoy helping others, so now is the time to step forward and prove it. Share this valuable information with everyone you know. Yes, I know all about the NFL club, no friends left, after all, we have all been burned by programs we have shared with others, but here is the opportunity to change all that. This is a mission you can be proud to educate others about, as there is nothing as near or dear to us than our RIGHT TO PRIVACY granted under the CONSTITUTION.
Look in the news, privacy issues are front page headline news. Who here has not heard that the VA Administration records were stolen, banks losing our credit card records with all our personal private data attached. What about the credit bureaus who sell your information to anyone who registers as a subscriber? So many companies who are leaking our information, including AOL which was in the news last week, Google giving up your privacy, and on and on it goes.
TIMING..............This is what we have here, perfect timing. The press is selling our Privacy Rights Message for us. And when we launch, and OUR PRESS RELEASES start with a legal solution to issue, watch what happens next. WE WILL BE OVERWHELMED WITH INQUIRES, and we NEED YOU to handle the questions as a CONSUMER ADVOCATE with the PRIVACYARMY.
The TIME IS NOW to JOIN US..............and it is FREE TO REGISTER.
Here is latest link on CONSUMER REPORTS INVESTIGATION.
Kansas City infoZine News - Consumer Reports Investigation Warns Your Privacy Is for Sale - USA
Wake Up........you Are Being Ripped Off And Profited From
Here are some excerpts from this week's current Consumer Reports October issue entitled
Your Privacy for Sale.
CR exposes a pattern among the 30,000 companies which exist solely to dig into, mine, collect, cross-reference, and re-sell the most intimate of our personal and private data. That pattern includes a cavalier disregard of the safety and privacy of We the People, arrogance about their right to go about doing so, and refusal to correct faulty, damaging data even when exposed.
Get a load of these sample quotes:
One company here in North Atlanta disclosed the information of 165,000 Americans to a fraud ring of Nigerians who have been systematically using the info to defraud people since. The Federal Trade Commission suit led to the largest fine ever levied by that agency. The $10.million fine was only one percent of ChoicePoint's annual revenues, however. CR states "ChoicePoint is only one entity in a vast and secretive data industry that feeds on private information about you and millions of other Americans. Its inhabitants include corporate mastodons with access to millions of public records, swarms of private investigators, some of whome lie to obtain confidential information; and hundreds of companies selling background checks, profiles, and address lists" A ChoicePoint spokesperson had the audacity to state "More than two thirds of what we do is regulated by state and/or federal law." {If you and I do the math right, does than not mean that one third of all they do is not regulated by those laws ?} "the company released data to crooks whose requests used commercial mail drops as business addresses, an 'obvious red flag'. " U.S. Attorney Brian Hoffstadt said "For the consumers involved, there could be a ripple effect, and we may not know the true impact for quite a while."
The U.S. Government Accountability Office (GAO) found that Congress should require info resellers to safeguard all sensitive personal info.
"CR's three-month investigation found that the practices of the data collectors can rob you of your privacy, threaten you with ID theft, and profile you as, say, a deadbeat or a security risk. Worse, there's no way to find out what they are telling others about you. When our reporters requested their own records, they were told that they could not see everything that was routinely sold to businesses. The meager information they did receive was punctuated with errors.
Data brokers say, however, that they are not in the business of correcting inaccuracies. A letter accompanying the report from LexisNexis, for example, says "we do not examine or verify our data, nor is it possible for our computers to correct or change data that is incorrect."
Is there any part of what is being said and done here infuriating to you ? Do you think that it is a great window of opportunity to have the media supply We the People with this kind of undeniable evidence as to the extent of the damage ?
When I was a child during the Second World War I remember seeing Peter Lorre and other actors portraying Nazi administrators arrogantly going about their business of enslaving people and compiling info on everyone, including one another, for use in intimidating and eliminating opposition. Then came the Cold War and the similar practices of the
elite manipulators who administered their various states.
At this point we are simply refuting and preparing to stop our
corporate enemies from pursuing our ruin in favor of their profits. Our government has passed laws which empower us to assert our rights and take back control of our own property.
Though there are a dozen other quotes and accusations, the point is well made. It is a privilege for each one of us who know this info to gather about ourselves an emerging army of concerned fellow citizens. As we build our basic foundation of advocates, we can then count on the media to help us explode to huge numbers of Americans.
Privacy Rights Army is about to launch.........don't wait.
Update..............................
Pick up this months Consumer Reports and look at heading on top of cover about our Privacy being sold to highest bidder.
Timing is everything in the world of business opportunities, so don't overlook how powerful the Privacy Army is and how well positioned we are.
One company, Choice Point, a major information broker did over a billion dollars last year, and this is just one of over 30,000 companies doing the same thing to all of us.
If there is a billion dollars being earned from just one of these companies, imagine the potential of suing all of them for violating our Constitutional Rights of privacy and what the total awards and settlements will be? Billions, maybe, hundreds of millions, obviously, so how much do you want of this class action fund pool?
Bottom line, WAKE UP, this is better than any HYIP you will ever lose money in. For next to nothing you can share in this fund pool and it will build and grow every month, every year, for many years as this industry is not going to vanish anytime soon. We want to get paid back on bases upon profits being earned on the sale of our personal private data.
Register FREE, learn how to earn a small fortune while our class action fund grows and grows.
Privacy-Rights-Army.com Class Action Pool Fund
Can people tell what I search for online?
9/12/2006 12:51:17 PM
By ANICK JESDANUN
AP Internet Writer
Q. Can people really tell what I search for over the Internet?
A. You may be searching from the privacy of your home, but when it comes to just about anything online, there's no guarantee of privacy.
Your Internet service provider may know about the controversial group you just researched. Your search engine may know about the divorce you're contemplating. And if you're surfing from work, your boss may know about the disease you just looked up.
Some advice from Lauren Weinstein, a veteran computer scientist and privacy advocate: ''Assume that everything you put into those search engines is being saved and might be handed out to somebody, someday, perhaps linked to your identity.''
All of the major search engines, which sometimes keep data for months or even years, acknowledge that they will hand over records when served with a court order, search warrant or subpoena, although Google Inc. earlier this year successfully fought to limit the scope of a Justice Department request.
Short of demanding that companies erase all data immediately or that Congress strengthen privacy laws, consumers can't be assured of any privacy, Weinstein said.
But Peter Eckersley, staff technologist with the Electronic Frontier Foundation, said there are measures consumers can take to reduce the risks:
_ Be careful what you type in. Avoid putting in personal information such as your name or credit card number. If you truly want to know what's being said about you online, do a ''vanity search'' for your name from a different computer so it's not tied to your other searches.
_ Don't use the search engine provided by your Internet service provider, because searches then can be potentially tied to customer records.
_ If you use e-mail or other services that require logging in, use a search engine from a different company or use a different browser to avoid data linkage. For instance, if you use Microsoft Corp.'s Hotmail, be careful when searching through the company's MSN search.
_ Configure your browser to block data files called ''cookies,'' or when that's not possible, periodically clear existing cookies from your browser. Cookies often have a unique identifier that can link your searches from one session to the next.
Even if consumers take all of those steps, searches can still be tied to a computer's numeric Internet Protocol, or IP, address, which can be traced back to you with a service provider's cooperation. That's less of a worry for dial-up users, because the address changes every time. High-speed users may need to reset their modems now and then, assuming they hadn't been assigned a permanent, or static, IP address.
The ultimate protection, Eckersley said, is to use anonymizer services such as Tor, whose development was partly funded by the EFF. With the free service, traffic gets routed through a number of computers, and no single one knows fully the path a packet of data takes. The search engine would only record the last computer relaying the information, not the user's real computer.
Using anonymizers, however, can slow down performance, and you're trusting that the system works as promised.
It may be possible with some poorly configured anonymizers for law-enforcement authorities to simply go to their operators with a subpoena, said Ari Schwartz, deputy director with the Center for Democracy and Technology. Although they aren't supposed to retain data, they can be asked to store information on a particular customer from a given point forward, he said.
For those reasons, Weinstein shuns anonymizers completely.
''All those things you do are chipping away at the edges of the problem, and the problem is still there glaring at us,'' he said. ''That information is being collected, and the IP numbers are there with varying degrees of ease for tracking down.''
___
THE MORE YOU LEARN......THE MORE YOU EARN.
First National Press Release........get Positioned Now
Subject: Saturday morn 100,000 people will hear us
At 9a.m. this Saturday morn October 7th over 100,000 people will hear about the Privacy Army from our leadership.
It is a live broadcast introducing that many new people to our worthy cause. Because it has been arranged by our own team,
our team will benefit from it. Others can arrange similar opportunities for their teams to benefit as well.
Because of the nature of the audience, the host of the broadcast expects tens of thousands to respond by going to our new "Give Me Privacy" website. We have been anticipating the full functionality of this website so that we can accelerate our outreach. Those who respond by going to this free registration website will notice the opportunity to learn more by being contacted by an advocate of the Privacy Army on request. Those double-respondees will be distributed to each of us who are on stream and who can convey the simple message. The call also serves as a shakedown cruise to perfect the interview, question-and-answer format for future broadcasts. This anticipates our Chairman George Blake's personal outreach to the editors of the major newspapers and wire services in America with the same message. The effects of those will be on a national scale and will benefit all advocates of the Privacy Army who have already enrolled people. Each conversation will have been requested specifically by the new person who is already a part of the Privacy Army and who has already submitted their data to the common pool.
The web site is Tom Chenault's www.tomchenault.com On the lower right there is a rectangle to click and listen to our broadcast at 9a.m. Eastern time Saturday. For those who cannot hear it at that time, it will be available on that same web site by clicking another link for one entire week. Good opportunity to spread the word and test the response for yourself. This is going to explode as people learn the truth about their privacy being illegally violated.
Huge Income Opportunity Plus Class Action Pool Fund
http://blacklion.com/privacyarmy/images/womb.jpghttp://blacklion.com/privacyarmy/images/logo.jpghttp://blacklion.com/privacyarmy/ima...mily/grave.jpghttp://blacklion.com/privacyarmy/images/Family/11.jpgWe are a Family
of "Digital Clones"
Created by Corporate America
to Target and Monitor...
EVERYONE OF US.
http://blacklion.com/privacyarmy/images/4t3.jpgOur Family Name...
is being contaminated by misuse of our personal data. Our personal risk, finacial losses and emotional stress must be stopped. How does this make you feel?
Our Family Has No Voice With Congress...
or standing in court. We have not asserted our rights and until now we could not prove damages when our personal data is sold.
Let's vote for change, ok?
Did You Know...
- Your Car's "Black Box" Can Testify Against You?
- Your Cell Phone Can Be Used to Track You?
- Your Tax Return Data May Be Sold?
- Your Medical Records Must Be Available Online?
http://blacklion.com/privacyarmy/images/Family/1.jpg http://blacklion.com/privacyarmy/images/Family/2.jpg http://blacklion.com/privacyarmy/images/Family/3.jpg
American Families
Must Unite...
and our collective Ignorance and Apathy must be replaced by Knowledge and Action. Together we can get this done, can't we?
Our Family is Being Targeted...
and monitored beyond our wildest imaginations -- with the worst to come.
- Our Children are being profiled.
- Our Private Property is being sold.
- Our Habit Patterns are being tracked.
This needs to stop,
don't you agree?
FREE of Charge
The legal stranglehold on our families' Constitutional rights can be broken by registering as households at:
Register Now!
http://blacklion.com/privacyarmy/images/4t2.jpghttp://blacklion.com/privacyarmy/images/2.jpg
Privacy-rights-army Will Make You Wealthy.....
"The Future of Privacy"
By: Satvik Suryanarayana
The thought-provoking talk on The Future of Privacy in the Age of Information by Bruce Schneier attracted as many as 600 people to the Rozsa center on October 2. Schneier has extensive knowledge in the field of cryptography and security threats. He is an internationally renowned security expert, referred to as a security guru by the Economist. Security is one of the coolest things to work on, stated Schneier as he began his talk. He emphasized on the fact that our ways of living are going to change drastically in the near future. Surveillance, data mining and data storage technologies are advancing at a lightning pace. As a result, it would be worthwhile to devote more time to think about the privacy of our data in the coming days. Schneier tried to make the public aware of the fact that surveillance is increasing at an alarming rate and one day every action of ours might be watched by someone. There are many types of surveillance: audio and video, satellite and Internet surveillance. An instance of aerial surveillance is the Baltimore city governments practice of taking aerial photos every six months to look out for violation of building permit rules. Amazon.com is an example of Internet surveillance that keeps a track of the categories of items one browses through and what one finally buys. Similarly, credit card companies can keep a track of purchasing habits.
A new concept called wholesale surveillance is also picking up fast in this insecure world. The police prefer to watch everybody so that they can track criminals and terrorists easily. Follow every car and listen to everyones phone calls are the new buzzwords in security agencies.
The invention of the Radio Frequency Identification has made it easier to track people. RFID tags contain a transponder with a digital memory chip. They can transmit information to sensors when they enter the electromagnetic zone of the tag reader. Amazingly, such a tag can be read without the knowledge of the individual. So tomorrow, we could be leaving our entry and exit times at every place we visit. RFID tags are being embedded in passports issued by many countries. The first RFID passports (e-passports) were issued by Malaysia in 1998. Within the United States, the Colorado passport office is already issuing RFID passports and by the end of 2006, all passport offices across United States would be following in step. All this seems harmless in the first thought, as it promises to make the world a safer place, by helping government catch criminals easily. But what if the same advanced technology is used by miscreants to collect our private data? The consequences of our vital and confidential data falling into nefarious hands could be disastrous. The implications of this are tough to even imagine.
The most important fact of the day is that: thanks to the latest advances in technology, vital data about anyone could be collected, consolidated and sold. Ironically, its cheaper to save data than throw it away. The collected data might fetch value to someone in the future. As technology improves, the data storage cost would reduce further and more data would accumulate. The point of concern is that the collected data could also be used for nefarious activities.
When we ponder over this whole issue, we would soon realize that we are walking through our lives leaving digital footprints. Most of the prints left behind are not controlled by you, cautioned Schneier. Schneier pointed out that the primary usage of data might be benign and that it is the secondary usage that we have to be wary about. Data collected for one purpose could be used for another without regard to the purpose for which it was collected in the first place. Presently, we are living in a unique epoch of time as we can still see the surveillance devices and are aware that we are being watched. But a few years down the lane, technology would advance to such an extent that it would be tough for us to even realize that we are being watched. Unfortunately, the legal system is not keeping pace with technological improvements. Even the administration and infrastructure need to hurry up to be at par with technology.
The call of the hour is the imperative need to formulate and implement more laws and regulations regarding the automatic collection of data and its usage. The European Union has already come up with a Data Protection Act: a comprehensive law governing the collection and usage of data. Schneier explained that all this finally boils down to a debate of liberty versus control.
Liberty is due to forced openness in the government and control can be attributed to forced openness in the people. On similar lines, secrecy would give more power to the government and privacy would give more power to the masses. The crux of the whole issue lies is ensuring real security for the citizens through a balanced combination of liberty and privacy.
Schneier is the author of eight books, including the latest best seller Beyond Fear: Thinking Sensibly about Security in an Uncertain World, Secrets and Lies, and Applied Cryptography. He has also published hundreds of academic articles and papers. The popular monthly newsletter Cryptogram published by him is read by over 130,000 people across the world. The Cryptogram has been translated into eight languages: Danish, Greek, German, Italian, Japanese, Portuguese, Russian and Spanish.
At the end of the talk, most of the students and faculty took the opportunity to talk to Schneier personally and many also took the privilege of getting his autograph on a copy of his latest best seller.
The event was organized by the Committee for Campus enrichment and Valerie Pegg, Director of Rozsa center, was one of the main organizers who helped make the event a grand success. The Van Evera Distinguished Lecture series Endowment had sponsored the event. Most of the students and faculty who attended the event seemed to be excited by it. It was an intriguing talk. It raised lots of questions in our minds about the subject of personal security versus data collection, said Shawn Sullivan, a student at Tech.
The talk also seemed to have stimulated many to give a thought to the whole issue of privacy in the future. The talk provided us with relatively new information. It was mainstream news and was very thought provoking, said Carl Knauss, a senior student at Tech.
Just a matter of time and Your Privacy is lost..............Fight Back
Timing Is Everything....your Wealth Depends On It
Privacy under attack, but does anybody care?
It's vanishing, but there's no consensus on what it is or what should be done
Mon/Oct16, 2006
BREAKING NEWS on MSNBC this morning - U.S. say air samples confirm North
Korea conducted a nuclear test - while the Techology & Science feature is the first in a series of articles regarding the loss of privacy in the United States of America:
http://msnbc.msn.com/id/15221095/
If you're not one of the tiny fraction of Americans - 7 percent, according to a recent survey by The Ponemon Institute - who will change any behavior in an effort to preserve your privacy, the key question is:
Does that matter? For many Americans, the answer apparently is "no."
However, when pollsters ask Americans about privacy, most say they are concerned about losing it. An MSNBC.com survey, which will be covered in detail on Tuesday, found an overwhelming pessimism about privacy, with 60 percent of respondents saying they feel their privacy is "slipping away, and that bothers me."
If you're one of the 60 percent who just feels bothered and pessimistic, you still may need to get really ticked off before you will take action!
Do you have children or grandchildren? If so, spend about 30 minutes on the website Our Family is Under Attack. Take time to view and read the links to print and TV media at: www.giveusprivacy.com. Take note of which corporation owns the patent for identification and tracking of persons using RFID-tagged items.
The long-term personal impact is frightening when you realize that the next phase of privacy invasion is to implant RFID spychips into products, passports (Colorado now, nationwide by year's end), paper money, a federal driver's license and eventually people, to increase monitoring and tracking efficiency.
During a CNN interview, the president of Verichip is confident that our willingness to accept implanted RFID chips for monitoring and tracking people is only a matter of time and a foregone conclusion. You can view his reassuring presentation and demonstration of an implanted RFID Verichip chip in his body contrasted to a tragic period of human suffering and recent history at: http://www.youtube.com/watch?v=x2udoNmQkR4
Is this sufficient information for you to want to learn about how to protect yourself and your family? Time is running out.
Get Educated For FREE............................
Learn Not To Get Burned With Identity Fraud
TONIGHT/Oct19 at 9:20pm EST!
__________________________________________________ _____________
PRIVACY ARMY WAKE UP CALL
- Call in number: (712) 338-8115
- Pin: 988055#
- Call PPP: www.privacyarmy.com/power/
- Moderator: Larry Napier
- Invite freedom-loving family & friends to the call/online
PRIVACY ARMY WEBSITES
PRIVACY ALERTS (selected from many) - Week of Oct 16
Big Brother..........big Business Wake Up People
WAKE UP PEOPLE............................................ ......
Tonight on CNBC at 9:00 and 12:00 EST you will want to watch this special on how our personal private data is being harvested and sold without our knowledge and billions are being made on our personal property.
The problem of our data being stolen is growing every day and it is in the news every week where data banks are violated, from banks to hospitals, our data is being ripped off with identity fraud on the rise, you need to get educated on how to protect your family and yourself.
Register for FREE, share with others and earn while you learn. Totally passive, no selling required, do your friends and family a favor and share this important information with others you care about. Join us and share in our class action suits mutually from pool fund. No selling or recruiting required, it is totally optional. No cost to become an advocate and earn commissions.
AT LAST..................THE PERFECT ONLINE or OFFLINE BUSINESS
F-R-E-E - Registration Open
Privacy Alert!!
We will either create our futures or be controlled by those who are creating them for us!
Less than Three Minutes from NOW you can know the plans that others have to track your every move!
"Big Brother Big Business"
CNBC Two Hour Special 11-01-06
(First clip- 2:49)
In less than 15 minutes you can know how we can earn significant income by
Asserting our Rights . . . Uniting our Voice to stop the invasion of our privacy and the theft of our personal data. . .
How we can Create Our Futures.
"Privacy Army Presentation"
Flash Talk (First Step- 14:30)
The right moral thing to do is the best economical thing to do! This is Media-Driven Marketing at it best!
Imagine a business which is promoted by mass media just like the CNBC special, or in Consumer Reports, Time Magazine and in the news every week, all at no cost to members. Now imagine a business with no overhead which can earn you a significant income with passive effort sharing these media news events with others? Privacy-ACT-Facts.com
Privacy Protection Issues In The News
Media Privacy Alerts this week!
Privacy problems posed by media for which
Privacy Army has a patent-pending solution
November 4, 2006
CNBC
Big Business, Big Brother documentary
http://www.cnbcbigbrother.com/index.html
United Press International
U.S. gets low ranking on privacy
http://www.upi.com/SecurityTerrorism/view.php?StoryID=20061103-040543-5195r
ABC Online
UK Privacy Commissioner issues dire security warning
http://www.abc.net.au/correspondents/content/2006/s1781232.htm
Reader's Digest, Nov '06
ID THIEVES' NEW TARGET: Your Medical Records
http://www.rd.com/content/openContent.do?contentId=30232
LAUNCH UPDATE..............Privacy-Rights-Army.com
++++++++++++++++++++++++++++++++++++++++++++++++++ ++++++++++++
Privacy Army White Paper…
From our Chairman & CEO, George Blake:
The Privacy Army is an amazing enterprise! We believe it will solve one of the greatest problems faced by individuals, which is the erosion and misuse of our privacy rights. We are going to change the nation's economy! Right now there are two basic economies… the business-to-consumer economy and the business-to-business economy, but we are going to create the consumer-to-business economy and everyone reading this can be at the forefront.
We are going to assert our privacy rights, we are going to opt out of the lists that are offering our names, our addresses, phone numbers, Internet clicks, credit card purchases, and much more to the highest bidder, and we're going to do that because we in The Privacy Army believe that's our money and we want it back!
We will use the laws that Congress has already passed, the Gramm-Leach-Bliley Act, the Privacy Act, HIPPA, RICO, The Economic Espionage Act, and more to show Congress that it has already agreed to your privacy rights… so the next steps are inevitable. We will use the first, third, fourth, fifth, ninth, and tenth amendments to the Constitution to show that the right to privacy has existed since the founding fathers…and we are going to take the fight to the thirty thousand businesses that are already selling our private information. We believe it is our private information, so we will take the fight to the media! No institution holds more power to get Congress to act. No legislature fears anything more than losing an election! Any legislator who opposes individual privacy rights risks just that, and we are going to make sure that that risk is mighty. I will be at the forefront of our drive for media support. I have been the editor of three newspapers, I have also been president of The Ohio News Paper Association, Vice President of the Florida Editors, national chairman of a joint editor-publisher action group and I have lots of highly placed friends in the media and plan to use my influence with these people to obtain exposure for our cause once we have a reasonably large group in place.
We all have a story to tell and lots of money to be made for telling our story as we move forward with The Privacy Army mission. We have elected not to use conventional advertising or expensive paid media campaigns to get the word out to every person in the U.S. Instead we will be using person-to-person contact to tell our story. Our founder and idea creator is Larry Napier. It was his vision that we will be implementing in the next few years. Our goal is to become a household name within the next 5 years and we need your assistance to achieve that goal. Below you will find an explanation of our business model and our unique compensation plan by our founder, Larry Napier.
From the founder: Larry Napier
I would like to discuss the greatest opportunity ever in person-to-person marketing. The key to extraordinary success is doing what's never been done before, but in a proven way. With the impending retirement crisis, most of us do not have time for untested theories or another lap around Mount Sinai or video replays of one failed business model after another. We are here to implement the most successful business philosophy in the modern era. Dr. W. Edwards Deming, who is described by Newsweek magazine as responsible for one of the nine major turning points in history, is the famous mathematician, statistician, who changed the word from Japan because America would not listen. The lack of implementation of his philosophy is one of the reasons why Ford and General Motors are laying off people and closing plants all over this country!
Deming's philosophy makes a very clear declaration… Get this! "The structure of the way the world does business is wrong and the worker is not to blame! What an incredibly powerful concept! We believe that it applies in a very specific way to the world of person-to-person marketing so we are here to declare that the structure of the way marketing companies have operated for the past sixty years is wrong and a 97% failure rate can't be debated!
We are here to change that structure. The Deming method requires a complete change in our most fundamental beliefs and practices with a single goal… that's restoring the power of the individuals who have been crushed by structures, in fact, Deming would say "in the morning when you awake if you are not excited about being awake, you have been crushed by a structure", and so many of us can say that's true of me!
Deming uses profound knowledge to release the dormant power that's in the heart of every single person. His influence over Japanese business practices gave them a completely different view and the average Japanese worker had the power to shut down the entire assembly line if something was not right… completely different than the view in America. Think about it this way… we are simply saying that the structure of compensation and the structural issues that determine a 97% failure rate in a 60-year-old industry is wrong and we need to change it!
I would like to ask this question… If you were to design a company with profound knowledge, that's Deming's key phrase, you would be forced to ask some hard questions and accept some hard answers. So here are some examples of the questions we had to face:
- <LI style="MARGIN: 0in 0in 0pt">Is your product totally unique… and is it protected? <LI style="MARGIN: 0in 0in 0pt">Is your product or service overpriced or is it priced as low as possible for easy sales by non-professional marketers? <LI style="MARGIN: 0in 0in 0pt">How big is your real market… do you really have hundreds of millions of potential customers or is it just rhetoric? <LI style="MARGIN: 0in 0in 0pt">Does the lion's share of the money go to the marketing force or does the majority go to the company? <LI style="MARGIN: 0in 0in 0pt">Does your offer meet deeply felt needs that will enflame the hearts of marketers and customers alike?
- Does your compensation structure solve the flaws in compensation that have plagued the person-to-person marketing world for 60 years?
We are here to address those issues and as George Blake stated above, how much help are you going to get educating and selling your product or service from the national and daily news media? Is your service or product something that is in the news every day or is it dying out? Is the news about our product or service dying out or is it just about to burst on the scene? Now, I am here to declare that the next singular issue over the next several years is going to be "Privacy." It's huge and once you become aware of the many privacy issues that are in the news daily you will become aware that it is just starting to come forth and we will play a dominate role in making sure that the news about privacy issues are highlighted to get the position we want … we won't utilize our clout for a little while because we want to have a sizeable army in place so we can explode once George Blake taps his many media sources.
The Privacy Army is addressing these critical privacy issues. Other companies are making billions of dollars from the sale of our private information… companies like, ChoicePoint, Experian, Acxiom, and Equifax, just to name a few. We believe that's our money and we want it back! One hundred seven million Americans have signed the "Do not call list" that's an overwhelming vote against the unconstitutional invasion of our privacy rights!
We need to get our hands together with those one hundred million people and say to Congress "We want this changed, we want these assaults on our private property stopped, and we want the money, not everybody else making money off of our private property!
Now, The-Privacy-Army.com is being assembled to assert our individual ownership rights and give us the legal precedent to prove those rights against everybody that has been illegally selling our personal private data. Alone, we are powerless in this legal battle! We have no clout individually, but we can take the weapons of the law and the Internet and our collective voice to defend our Constitutional Rights on three different fronts.
The first is economic. Thousands of companies are earning billions of dollars selling our personal private property and we are not being compensated for it! The Bill of Rights says you cannot take our private property, you cannot take it without my consent and permission, you cannot take it without us being compensated. The Bill of Rights was written to protect individual citizens, not corporations. Simply put, those billions of dollars are our money, and we want it back, and we have developed a legal strategy to get it back and secure it forever. Anyone who violates our Privacy Rights will be sued, plain and simple, and when we win, which we will, we will all share in this class action pool fund. Anyone familiar with the tobacco and drug company class actions will realize this could involve hundreds of millions in awards for Privacy Army and our members.
The second front in our identity rights battle is focused on our credit reports, new threats to our medical data, our tax records, and what about your car… that BLACK BOX in your car, the one that records over 300 data points, that can replay the last minutes from the last time you drove your car…what about that new tracking device in your cell phones over the past several years?
Last but not least, what about the new fast advancing RFID technology? RFID technology has the capacity to track our every move and to totally destroy our privacy without our knowledge. Try an Internet search on RFID technology and see what you find. Privacy issues are being dismissed with disinformation on tracking capabilities of only 30 feet, but this is not true, the technology will allow tracking through repeaters, similar to how cell phones and the new WI-FI operates, so don't be fooled, this technology has advanced far more than we are being told.
Now, that is an overview of what we are all about, however if you are a retiree who would like to increase your income, or if you would just like to develop a second source of additional income let me tell you about how you can substantially increase your income by joining with us at The-Privacy-Army.com and helping us get the word out to everyone in the US within the next 5 years who is fed up with the loss of privacy and power to stop this illegal violation of our rights. Do you think a few people you know would be interested?
If you look at The-Privacy-Army.com compensation plan, here is what you are going to discover. First, you can join our cause for Free. We have a $195.00 one-time license fee and Legal Strategy Kit that addresses ownership rights for you and your entire immediate family. We pay out $155.00 of the $195.00 that is 79% to the marketing group. There are no monthly costs for all of our marketing tools, which include your very own secure web site, plus one-on-one mentoring from the person who sponsors you as a member of The Privacy Army. Just like Deming said, "Give more, keep less and the world will beat a path to your door." If you want to have a personalized link to the marketing video's you will need to open an account with FlashTalk. The FlashTalk account is FREE for the first 30 days and you can extend it for $3.95 per month or $29.95 annually.
Click Here to sign up for FlashTalk FREE for 30 days. No credit card needed!
If you would like more information about our income opportunity and how our hybrid
3-D compensation plan works, please visit our web site to learn more. You may reach me by email at the address listed below. If you will email the time most convenient for you I will be happy to answer all your questions. I have been working with the founders for a year and I'm excited about our upcoming official launch of this powerful brand new and exclusive business model. Now is the time to register for FREE.
Identify Theft Must Be Stopped.................find Out How?
UPDATE............................................ ...................................
Identity theft is the fastest-growing white-collar crime in America. It has hit ordinary citizens and celebrities alike. The crime of the twenty-first century is profitable, nearly unpreventable, and hardly ever prosecuted. Some estimates say that nearly ten million Americans each year become victimsand the crime shows no sign of letting up.
Your Evil Twin: Behind the Identity Theft Epidemic covers this exploding crime from every possible angle. Filled with real-world identity theft horror stories (from both the criminal's and victim's perspective) as well as practical advice that can help you protect yourself, this book examines the institutions, industries, and individuals that have allowed identity theft to spread, and probes the tepid solutions now being cobbled together by the industry and government to curb this crime.
Author and identity theft expert Bob Sullivan agrees that criminals should, without a doubt, be blamed for this crisis, but he also notes that so should those entrusted with our identities.
Sullivan digs deep to reveal how institutions designed to protect our identities have let us down, while corporate Americain choosing profits over privacyhas shirked much of its responsibility for the problem.
You'll receive an up-close look at some of the most troubling issues associated with the identity theft epidemic, including:
How criminal, domestic, child, and elder identity theft is perpetrated
Why government agencies have been so slow to react to this problem and how our nation's identification systemsbirth certificates, driver's licenses, and Social Security cardsare so easily replicated
How credit card companies who, in their rush to push the "miracle of instant credit," have created some of the systematic flaws that allow identity theft to be profitable in the first place
Why law enforcement officers refuse to take reports of these types of crime or prosecute criminals
How the Internet and new technology has made identity theft easier for both criminals and terrorists
But there are solutions to the identity theft problem and this book examines some of themfrom individual heroic efforts being made privately to public companies whose forward-looking projects may stem the epidemic.
Identity theft is much more than a paperwork headache for victims. The crime has been blamed for everything from divorce to suicide to murder. It threatens happy retirements as well as college student loans. In its very worst form, it can even land innocent people in jail. Your Evil Twin will show you why identity theft has become so common and examine how you can prevent or prepare for the day someone tries to steal yours.
You can hear two of America's leading privacy advocates discuss a patent-pending legal and marketplace solution to the problem of Your Evil Twin on a national teleconference call and online TONIGHT...
Tu/Nov 7 - 9:20pm EST, 8:20pm CST, 7:20pm MST, 6:20pm PST
Call number - (712) 338-8115
Access code - 988055#
UPDATE on PRIVACY RIGHTS ARMY
Listen in on ONE CALL and learn not to burn..............................
You can hear two of America's leading privacy advocates discuss a patent-pending legal and marketplace solution to the problem of Your Evil Twin on a national teleconference call and online TONIGHT...
Tu/Nov 7 - 9:20pm EST, 8:20pm CST, 7:20pm MST, 6:20pm PST
Call number - (712) 338-8115
Access code - 988055#
Privacy Rights Act for your Personal Private Protection
Senate approves electronic ID card bill
By Declan McCullagh
http://news.com.com/Senate+approves+electronic+ID+card+bill/2100-1028_3-5702505.html
Story last modified Wed May 11 04:18:59 PDT 2005
http://adlog.com.com/adlog/i/r=6467&...n/dotclear.gif
Last-minute attempts by online activists to halt an electronic ID card failed Tuesday when the U.S. Senate unanimously voted to impose a sweeping set of identification requirements on Americans.
Your Cell Phone Is Eavesdropping On Your Privacy
UPDATE............................................ .......
DID YOU KNOW YOUR CELL PHONE COULD EAVESDROP ON YOU EVEN WHEN YOU ARE NOT TALKING TO ANYONE? DID YOU KNOW YOUR ONSTAR EQUIPPED VEHICLE CAN ALSO LISTEN IN ON YOUR CONVERSATIONS BY HACKERS?
WAKE UP PEOPLE..................PRIVACY RIGHTS ARE AT STAKE HERE!
FBI taps cell phone mic as eavesdropping tool
Agency used novel surveillance technique on alleged Mafioso: activating his cell phone's microphone and then just listening.
By Declan McCullagh and Anne Broache
Staff Writer, CNET News.com
Published: December 1, 2006, 2:20 PM PST Last modified: December 1, 2006, 6:35 PM PST
Update
The FBI appears to have begun using a novel form of electronic surveillance in criminal investigations: remotely activating a mobile phone's microphone and using it to eavesdrop on nearby conversations. The technique is called a "roving bug," and was approved by top U.S. Department of Justice officials for use against members of a New York organized crime family who were wary of conventional surveillance techniques such as tailing a suspect or wiretapping him.
High Impact
What's new:
The FBI is apparently using a novel surveillance technique on alleged Mafioso: activating his cell phone's microphone and then just listening.
Bottom line:
While it appears this is the first use of the "roving bug" technique, it has been discussed in security circles for years.
http://adlog.com.com/adlog/i/r=10053...n/dotclear.gif
Nextel cell phones owned by two alleged mobsters, John Ardito and his attorney Peter Peluso, were used by the FBI to listen in on nearby conversations. The FBI views Ardito as one of the most powerful men in the Genovese family, a major part of the national Mafia.
The surveillance technique came to light in an opinion published this week by U.S. District Judge Lewis Kaplan. He ruled that the "roving bug" was legal because federal wiretapping law is broad enough to permit eavesdropping even of conversations that take place near a suspect's cell phone.
Kaplan's opinion said that the eavesdropping technique "functioned whether the phone was powered on or off." Some handsets can't be fully powered down without removing the battery; for instance, some Nokia models will wake up when turned off if an alarm is set.
While the Genovese crime family prosecution appears to be the first time a remote-eavesdropping mechanism has been used in a criminal case, the technique has been discussed in security circles for years.
The U.S. Commerce Department's security office warns that "a cellular telephone can be turned into a microphone and transmitter for the purpose of listening to conversations in the vicinity of the phone." An article in the Financial Times last year said mobile providers can "remotely install a piece of software on to any handset, without the owner's knowledge, which will activate the microphone even when its owner is not making a call."
Nextel and Samsung handsets and the Motorola Razr are especially vulnerable to software downloads that activate their microphones, said James Atkinson, a counter-surveillance consultant who has worked closely with government agencies. "They can be remotely accessed and made to transmit room audio all the time," he said. "You can do that without having physical access to the phone."
Because modern handsets are miniature computers, downloaded software could modify the usual interface that always displays when a call is in progress. The spyware could then place a call to the FBI and activate the microphone--all without the owner knowing it happened. (The FBI declined to comment on Friday.)
"If a phone has in fact been modified to act as a bug, the only way to counteract that is to either have a bugsweeper follow you around 24-7, which is not practical, or to peel the battery off the phone," Atkinson said. Security-conscious corporate executives routinely remove the batteries from their cell phones, he added.
FBI's physical bugs discovered
The FBI's Joint Organized Crime Task Force, which includes members of the New York police department, had little luck with conventional surveillance of the Genovese family. They did have a confidential source who reported the suspects met at restaurants including Brunello Trattoria in New Rochelle, N.Y., which the FBI then bugged.
But in July 2003, Ardito and his crew discovered bugs in three restaurants, and the FBI quietly removed the rest. Conversations recounted in FBI affidavits show the men were also highly suspicious of being tailed by police and avoided conversations on cell phones whenever possible.
That led the FBI to resort to "roving bugs," first of Ardito's Nextel handset and then of Peluso's. U.S. District Judge Barbara Jones approved them in a series of orders in 2003 and 2004, and said she expected to "be advised of the locations" of the suspects when their conversations were recorded.
Details of how the Nextel bugs worked are sketchy. Court documents, including an affidavit (p1) and (p2) prepared by Assistant U.S. Attorney Jonathan Kolodner in September 2003, refer to them as a "listening device placed in the cellular telephone." That phrase could refer to software or hardware.
One private investigator interviewed by CNET News.com, Skipp Porteous of Sherlock Investigations in New York, said he believed the FBI planted a physical bug somewhere in the Nextel handset and did not remotely activate the microphone.
"They had to have physical possession of the phone to do it," Porteous said. "There are several ways that they could have gotten physical possession. Then they monitored the bug from fairly near by."
But other experts thought microphone activation is the more likely scenario, mostly because the battery in a tiny bug would not have lasted a year and because court documents say the bug works anywhere "within the United States"--in other words, outside the range of a nearby FBI agent armed with a radio receiver.
In addition, a paranoid Mafioso likely would be suspicious of any ploy to get him to hand over a cell phone so a bug could be planted. And Kolodner's affidavit seeking a court order lists Ardito's phone number, his 15-digit International Mobile Subscriber Identifier, and lists Nextel Communications as the service provider, all of which would be unnecessary if a physical bug were being planted.
A BBC article from 2004 reported that intelligence agencies routinely employ the remote-activiation method. "A mobile sitting on the desk of a politician or businessman can act as a powerful, undetectable bug," the article said, "enabling them to be activated at a later date to pick up sounds even when the receiver is down."
For its part, Nextel said through spokesman Travis Sowders: "We're not aware of this investigation, and we weren't asked to participate."
Other mobile providers were reluctant to talk about this kind of surveillance. Verizon Wireless said only that it "works closely with law enforcement and public safety officials. When presented with legally authorized orders, we assist law enforcement in every way possible."
A Motorola representative said that "your best source in this case would be the FBI itself." Cingular, T-Mobile, and the CTIA trade association did not immediately respond to requests for comment.
Mobsters: The surveillance vanguard
This isn't the first time the federal government has pushed at the limits of electronic surveillance when investigating reputed mobsters.
In one case involving Nicodemo S. Scarfo, the alleged mastermind of a loan shark operation in New Jersey, the FBI found itself thwarted when Scarfo used Pretty Good Privacy software (PGP) to encode confidential business data.
So with a judge's approval, FBI agents repeatedly snuck into Scarfo's business to plant a keystroke logger and monitor its output.
Like Ardito's lawyers, Scarfo's defense attorneys argued that the then-novel technique was not legal and that the information gleaned through it could not be used. Also like Ardito, Scarfo's lawyers lost when a judge ruled in January 2002 that the evidence was admissible.
This week, Judge Kaplan in the southern district of New York concluded that the "roving bugs" were legally permitted to capture hundreds of hours of conversations because the FBI had obtained a court order and alternatives probably wouldn't work.
The FBI's "applications made a sufficient case for electronic surveillance," Kaplan wrote. "They indicated that alternative methods of investigation either had failed or were unlikely to produce results, in part because the subjects deliberately avoided government surveillance."
#textCarousel { width: 140px; border-color: #360; border-width: 1px; border-style: solid; padding: 10px; float: right; margin: 15px 0 15px 15px; background-image: url(/i/ne05/fmwk/greyfadeback.jpg); background-repeat: no-repeat; background-position: -150px top; } #textCarousel li { font-size: 95%; line-height: 1em; margin-bottom: 10px; } #textCarousel h4 { margin: 0 0 5px 0; font-size: 110%; }Bill Stollhans, president of the Private Investigators Association of Virginia, said such a technique would be legally reserved for police armed with court orders, not private investigators.
There is "no law that would allow me as a private investigator to use that type of technique," he said. "That is exclusively for law enforcement. It is not allowable or not legal in the private sector. No client of mine can ask me to overhear telephone or strictly oral conversations."
Surreptitious activation of built-in microphones by the FBI has been done before. A 2003 lawsuit revealed that the FBI was able to surreptitiously turn on the built-in microphones in automotive systems like General Motors' OnStar to snoop on passengers' conversations.
When FBI agents remotely activated the system and were listening in, passengers in the vehicle could not tell that their conversations were being monitored.
Malicious hackers have followed suit. A report last year said Spanish authorities had detained a man who write a Trojan horse that secretly activated a computer's video camera and forwarded him the recordings.
NOW YOU CAN FIGHT BACK......................JOIN FREE
Privacy Rights Act Against Identity Fraud
Media Privacy Alerts this week!
Privacy problems posed by media for which
Privacy Army has a patent-pending solution
November 4, 2006
CNBC
Big Business, Big Brother documentary
http://www.cnbcbigbrother.com/index.html
United Press International
U.S. gets low ranking on privacy
http://www.upi.com/SecurityTerrorism/view.php?StoryID=20061103-040543-5195r
ABC Online
UK Privacy Commissioner issues dire security warning
http://www.abc.net.au/correspondents/content/2006/s1781232.htm
Reader's Digest, Nov '06
ID THIEVES' NEW TARGET: Your Medical Records
http://www.rd.com/content/openContent.do?contentId=30232
UPDATE on PRIVACY PROTECTION ISSUES
UPDATE ON LATEST THREAT TO OUR PRIVACY.....................
Top Ten Stories You Missed in 2006.
10. Hackable Passports
In October, the U.S. State Department began issuing biometric ePassports that contain a radio frequency identification (RFID) tag under the back cover. The tiny chip holds the usual passport data, including a digital photo. The motive behind adding the chips is ostensibly good: to combat counterfeiting and illegal immigration.
But a German hacker quickly found a vulnerability. With a laptop and a chip reader he bought for $200, he was able to steal data from an encrypted RFID tag, potentially allowing him to clone an ePassport. And its not just Americans who are at risk. Twenty-seven countries (mostly in Europe) that participate in the U.S. Visa Waiver Program are required by U.S. law to issue the new electronic passports to their citizens. The Dutch and British media have already reported major security flaws in the new IDs.
So, whats a security conscious citizen to do? Again, the answer may come out of Germany. A group of hackers there recommends that people microwave the new passports to destroy the chips. The State Department may want to go back to relying on a paper trail.
FIGHT BACK.......................